Feeds

10 top New Year's Eve party apps for iPhone, iPad, iPod touch

Eats, drinks, tunes, games

Remote control for virtualized desktops

Tunes

The idea behind Party Playlist HD (iPad, $1.99 or a free "lite") is a simple one: to make it easy for you or your guests to create party-specific playlists on the fly.

Party Playlist HD

Let your guests reorder party playlists. Well, guests with reasonable taste, that is...

Party Playlist scans your iPad for the tunes you've loaded onto it, arranges them into your playlists, displays them by album cover, then lets you drag them into new playlists and rearrange their playing order while they're being pumped out through the iPad's headphone jack into your sound system of choice.

If your iPad doesn't contain enough party-worthy tunes, Minimal Party HD by mix.dj (iPad, free but ad-supported) accesses mixes from the Mix.dj website, which contains over 100,000 DJ-created compilations averaging around an hour long apiece.

Minimal Party's minimalistic, electronica-flavored mixes may or may not be your cup of tea, but at this price the app is well worth a look-see. And if you like one or more of the tunes in a mix, the artists who uploaded their mixes to Mix.dj would be quite happy if you bought those tunes through an iTunes link in the app.

If you'd prefer to entice your party guests into making fools of themselves providing real-time entertainment, the App Store has plenty of karaoke apps to choose from.

Karaoke Anywhere (iPhone, iPod touch, iPad, $1.99) is unique among the karaoke apps that we found in that it can play the CD+G files used in professional karaoke machines. It may be more than the average user needs, but a true karaoke addict should take a look at its features on the KaraokeAnywhere website.

More casual karaokists might want to check out Glee Karaoke (iPhone, iPod touch, iPad, 99¢) from Smule, the publishers of a collection of "social music" apps, from Leaf Trombone World Stage to Magic Fiddle and more.

Glee Karaoke

Glee Karaoke lets you listen in to brave amateurs from all over the globe

In addition to straightforward karaoking, Glee Karaoke – like other Smule apps – lets you share your talents with the world in real time, or lets you listen to other contributors embarassing themselves in London, New York, Sydney, Tierra del Fuego, and beyond.

Choosing a cloud hosting partner with confidence

Next page: Games

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.