Feeds

Introducing the UK Imagine Cup Team

From Hull and Back

SANS - Survey on application security programs

Welcome to the first blog entry from team ‘Three Pair’. Team who?

To introduce ourselves, we are a team of three students who all attend The University of Hull on various computer-related courses: James Lissiak, Tom Randell and Andy Sterland. On 10 March, after a day of presentations and camera interviews, it was announced that we had won the UK final of the Imagine Cup 2006 and would be going to the world final in India to represent our country.

For readers out there who haven’t heard of the Imagine Cup, this is a worldwide, Microsoft-run competition for student developers. The competition has numerous countries and regions taking part and is broken down into a number of stages. We entered the Software Design Challenge for which each region runs a local competition and then enters their winner into the worldwide final, where ultimately an overall winner is decided.

The UK finals were focused on our idea and its potential, where we had to deliver a short presentation with a brief demonstration of our prototype. Now, after the UK final, we really need to get down to it and get our hands dirty, and with a bit of luck, and a lot of caffeine, knock out some cleaner code…

So, we’ve gone over who we are and what the Imagine Cup is, but what in God’s name were we developing? And how did we come up with the idea?

It all began a long time ago, about three months ago actually, in a place far away, that place would be Hull. The three of us sat down to discuss a few ideas with our mentor, the ever Google-able Rob Miles. Is Google-able even a word? We discussed several ideas based around this year’s theme: “Imagine a world where technology enables us to live healthier lives”.

This soon concluded as we realised we were all completely clueless; it became apparent that we knew next to nothing about health. Being a bunch of struggling student geeks, with an unrelenting appetite for caffeine and sugar, meant health was quite a way down on our list of priorities. Probably sitting just below getting hold of one of those quirky binary watches you can buy. Can anyone actually really use those things? Do they feel clever for it?

So, basically we came to the conclusion that we needed to speak with an expert. Another one of our lecturers, Jon Purdy, just happened to have collaborated with an “Intensivist” called Paul Dark; before you ask, yes Intensivist is a real word they are medical staff who specialise in working in Intensive Care Units. It just so happens that Paul works for the University of Manchester lecturing on such areas of health care. It was decided that we should pop across and have a chat with Paul.

After a three hour meeting with Paul, during which he described the ICU environment and how he thought technology could play a part there, it surfaced that the idea of a journal of things that happened in the real world while the patients was in ICU might be of use in the recovery of the patient. Patients in recovery can then go over events they had missed during periods of coma or incapacity and fill in the memory gaps associated with this, from here the patient could build up an anchor and continuity of reality that they would otherwise be without. And so the basic premise for the application was born, over the next few days and weeks it suffered somewhat from feature creep and has now become something of a project behemoth.

During the build up to the final we put in a lot of effort and consumed mucho caffeine in order to cobble together some working demos along with the required bumf, the technical term for that pretty stuff people like to look at e.g. presentations and their ilk.

As we progressed through the project we are going to be examining and working with some fun and interesting technologies like WinFX, JavaScript (we’d say AJAX but buzz words scare us), tonnes of .NET 2.0 and of course some SQL type stuff; just because you can’t seem to do anything without a database nowadays.

So, despite having won the UK final, we’re only just setting off on our journey and over the coming weeks this blog will be chronicling our adventures as we prepare for and embark on the road to Delhi.

We’re hoping that we can get as much support from The Register readers and the backing of the UK IT industry, so please subscribe to our blog and continue to come to check on our progress… ®

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.