Feeds

Who is the sexiest geek alive?

The annual competition returns for a second time

  • alert
  • submit to reddit

Security for virtualized datacentres

The competition to find the sexiest geek alive is on again. We wrote about the competition last year - just catching the end of it - but this time it's bigger and better than ever.

Following last year's success - where Tony Northrup won, was crowned and then did the chat-show circuit - the show will now be running heats at various IT conferences all over the States, with the final taking place on 21 June in San Jose.

The contest does what Miss World promised it would and bases choice of finalists not only on looks but also brains. Thus, to get through the first round you will need geek knowledge. Contestants will be asked 40 questions - apparently located on the competition's site www.sexiestgeekalive.com. If you score well, you will then face an interview.

And for those lucky few remaining onto the semi-finals and then the final. Win and you shall be a God among men. Nearly win and you might get some cash or a prize or something.

If you want to know more, visit the site here. Oh, and check out the Hall of Fame. ®

Related Link

Sexiest Geek Alive site

Related Story

Click here for genuinely sexy geeks

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.