Feeds

Introducing the UK Imagine Cup Team

From Hull and Back

High performance access to file storage

Welcome to the first blog entry from team ‘Three Pair’. Team who?

To introduce ourselves, we are a team of three students who all attend The University of Hull on various computer-related courses: James Lissiak, Tom Randell and Andy Sterland. On 10 March, after a day of presentations and camera interviews, it was announced that we had won the UK final of the Imagine Cup 2006 and would be going to the world final in India to represent our country.

For readers out there who haven’t heard of the Imagine Cup, this is a worldwide, Microsoft-run competition for student developers. The competition has numerous countries and regions taking part and is broken down into a number of stages. We entered the Software Design Challenge for which each region runs a local competition and then enters their winner into the worldwide final, where ultimately an overall winner is decided.

The UK finals were focused on our idea and its potential, where we had to deliver a short presentation with a brief demonstration of our prototype. Now, after the UK final, we really need to get down to it and get our hands dirty, and with a bit of luck, and a lot of caffeine, knock out some cleaner code…

So, we’ve gone over who we are and what the Imagine Cup is, but what in God’s name were we developing? And how did we come up with the idea?

It all began a long time ago, about three months ago actually, in a place far away, that place would be Hull. The three of us sat down to discuss a few ideas with our mentor, the ever Google-able Rob Miles. Is Google-able even a word? We discussed several ideas based around this year’s theme: “Imagine a world where technology enables us to live healthier lives”.

This soon concluded as we realised we were all completely clueless; it became apparent that we knew next to nothing about health. Being a bunch of struggling student geeks, with an unrelenting appetite for caffeine and sugar, meant health was quite a way down on our list of priorities. Probably sitting just below getting hold of one of those quirky binary watches you can buy. Can anyone actually really use those things? Do they feel clever for it?

So, basically we came to the conclusion that we needed to speak with an expert. Another one of our lecturers, Jon Purdy, just happened to have collaborated with an “Intensivist” called Paul Dark; before you ask, yes Intensivist is a real word they are medical staff who specialise in working in Intensive Care Units. It just so happens that Paul works for the University of Manchester lecturing on such areas of health care. It was decided that we should pop across and have a chat with Paul.

After a three hour meeting with Paul, during which he described the ICU environment and how he thought technology could play a part there, it surfaced that the idea of a journal of things that happened in the real world while the patients was in ICU might be of use in the recovery of the patient. Patients in recovery can then go over events they had missed during periods of coma or incapacity and fill in the memory gaps associated with this, from here the patient could build up an anchor and continuity of reality that they would otherwise be without. And so the basic premise for the application was born, over the next few days and weeks it suffered somewhat from feature creep and has now become something of a project behemoth.

During the build up to the final we put in a lot of effort and consumed mucho caffeine in order to cobble together some working demos along with the required bumf, the technical term for that pretty stuff people like to look at e.g. presentations and their ilk.

As we progressed through the project we are going to be examining and working with some fun and interesting technologies like WinFX, JavaScript (we’d say AJAX but buzz words scare us), tonnes of .NET 2.0 and of course some SQL type stuff; just because you can’t seem to do anything without a database nowadays.

So, despite having won the UK final, we’re only just setting off on our journey and over the coming weeks this blog will be chronicling our adventures as we prepare for and embark on the road to Delhi.

We’re hoping that we can get as much support from The Register readers and the backing of the UK IT industry, so please subscribe to our blog and continue to come to check on our progress… ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.