Browse Definitions:
Definition

IT Olympics (Geek Games)

The IT Olympics (less formally known as the "Geek Games") is a parody Web site set up as the computer world's version of the Olympic contests. The IT Olympics began in 1996, when they were ostensibly held in Nagano (Ohio) and the tradition has been carried on. The 2000 Games were set in Sydney (South Dakota), and the 2002 Winter IT Games are being held, of course, in Salt Lake (Michigan). A spokesperson claims that the group behind the IT Olympics is a legitimate, non-existent organization and expresses hopes that it will continue to be so.

IT Olympic events include:

  • The CPU Tower Jump
  • Multi-platform System Configuration
  • The Software Byathlon
  • Long Distance Fax Race
  • Technical Support vs Management Sumo Wrestling
  • XML Interface Gymnastics
  • Code Wrestling (in which teams attempt to wrangle incompatible code from incompatible versions of incompatible software into a functional program)
A similarly themed Web site, The FidoNet Olympics, features such events as Greco-Roman Thread Wrestling and the 14.4K Protocol Negotiation.

Like the regular Games, the IT Olympics have to change with the times, which is why the popular Diskette Toss is a thing of the past, as the industry moves on. Another popular event, "Bringing Down the Server When a Significant Number of Users is on Deadline" was cancelled as well, since all contestants were equally skilled.

Sadly, competitors do not always prove themselves worthy of the Olympic ideals; there are reports that illegal Java subroutine s were found in the Legacy Code Event and there have also been occasional rumours of keyboard abuse. Another controversy surrounds the exclusion of the Printer/Copier category, which supporters feel should be included, despite the official ruling that printers and copiers don't fully meet the requirements to be considered IT devices. Nevertheless, the IT Olympics claim to be a unifying force. As Carl Jenson, ITO event manager, was quoted (in Wired Magazine) as saying, "It brings me great joy to see all these people from all different operating systems coming together to code in peace and unity."

This was last updated in March 2011

Continue Reading About IT Olympics (Geek Games)

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

  • software-defined storage (SDS)

    Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close