Feeds

Samsung blows wad on Bada bling app compo starlets

Go with sailors - and edit out shameful exes

Top 5 reasons to deploy VMware with Tegile

Samsung's Developer Challenge is over, with the top app earning a prize of $300,000 as the company continues to big up its third mobile platform.

Not content with manufacturing the flagship Android handset and one of the best Windows Phone 7 devices, Samsung is still banging the Bada drum. In June, the company put almost $3m in prize money on the table for its Global Developer Challenge, which has now been awarded to the 24 winners split across eight categories.

The winning application, which scooped $300,000, was Little Sailor - a 3D sailing emulator that attempts to teach the basics of dinghy sailing without all that mucking about with boats. Other category winners (netting $100,000 each) include games, an OCR package and a photograph retouching app, all of which are free to download for the next month.

Other than Little Sailor we were taken by the superbly Stalinist TouchRetouch, which perfectionists and passive-aggressives alike can use to remove an ex-partner or unlovely child from a photograph.

BadaShelf is another highlight - it reads barcodes to catalogue your book collection, useful for those who've resorted to boxes in lieu of shelf space. Also worth a look for free is the snappily-named bControl12, which enables the Wave handset to be used as a PC remote control.

There's a bundle of other apps listed on the winners' page.

Samsung owns the whole Bada value chain, in the same way that Apple owns the iOS chain, but is hedging its bets by supporting Android and Windows Phone 7 too. Bada is supposed to bring smartphone functionality into mid-range handsets, where Symbian is also expected to play, but such aspirations are apparently undermined by the decreasing price of Android handsets.

We say "apparently" as some industry pundits, notably Timi Ahonen, reckon there are more than 1.3 million Wave handsets being used: this would make the Wave second only to the original iPhone in speed of adoption.

Those figures sound optimistic to us, but the competition has generated some interesting applications and genuine innovation, which is more than can be said for some. ®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.