Feeds

X-Prize offers $10m for working Trek tricorder

Fascinating

Security for virtualized datacentres

Fancy getting your hands on $10 million? Of course you do. Then just grab a tool kit and build a working Star Trek-style medical tricorder. Simples.

The X Prize Foundation, famed for innovative big-prize challenges in technical advancement, has outlined its next contest: make an all-purpose mobile device that can do a doctor's work better than a medical professional.

The Foundation, in collaboration with Qualcomm, has put up a $10m (£6.5m) prize to help the winner develop the tricorder, which should combine a range of tech from wireless sensors to medical imaging and microfluidics.

Tricorder

Wibbly-wee. Wibbly-wee. Wibbly-wee.

The device must provide a quick assessment of a patient's health issues and provide a comparable diagnosis to that presented by a panel of board-certified physicians. A patient would have to breathe, bleed or pee into the device, which would be use the fluids to produce an initial opinion.

The idea is to "bring understandable, easily accessible health information and metrics to consumers on their mobile devices, pointing them to earlier actions for care”.

The competition's rules have yet to be formalised, but the Tricorder X-Prize competition will launch in early 2012. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.