Tight time scales biggest challenge for Atos’ Paralympic IT switchover

Atos has a two-week window to switch its technology over for the Paralympics, with the outsourcer saying the tight timescale is the biggest challenge.

Atos has a two-week window to switch its technology over for the Paralympics, with the outsourcer saying the tight timescale is the biggest challenge.

The Paralympics has 21 sporting disciplines compared to 36 for the Olympics. For each discipline, there are disability categories and classifications to organise athletes according to their level of impairment.

The IT systems need to be updated to include these changes and alignment to the federation rules for each sport. The technology used for the Olympics and Paralympics is the same, only deployed in a smaller number of venues.

“The media starts arriving several days before the Opening Ceremony. At the same time, we have to manage the accreditation system for the Paralympics,” the official IT integrator for the Games told Computer Weekly.

“Where the same venue is used for both the Olympics and Paralympics, we simply transition to the Paralympics system. Where the venue was not used for Olympics, such as Eton Manor for wheelchair tennis, then a new deployment will take place at the Paralympic venue,” it said.

At the end of the event all equipment will be decommissioned and brought back to the Equipment Deployment Centre. London 2012 organiser Locog will then decide what happens to it at the end of the Games.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT suppliers

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close