Hack, build, and innovate at MIT's largest hackathon. Sept 17 - 18.

HackMIT is MIT’s largest hackathon. Over a 24-hour period from September 17 to 18, 1,000 hackers from around the world will gather on MIT’s campus to experiment and innovate on software and hardware projects. This is your weekend to dust off old ideas or try something completely new. Imagine the craziest projects possible, and work on the hack of your dreams!

Please submit your team name and table number in our GOOGLE FORM (https://go.hackmit.org/submit) by 9:30am on Sunday, September 20th. You may continue to hack on your project until hacking stops at 11am on Sunday, September 20th.

View full rules

Eligibility

Teams that were admitted through the HackMIT lottery system and follow the Code of Conduct are eligible to submit an entry. You must be at least 18 years old and an undergraduate college student. 

Requirements

Make sure you submit the Google From at go.hackmit.org/submit or your project will not be included in judging.

How to enter

Registration is now closed for HackMIT. There is no longer any way to enter HackMIT unless you are a local student trying to walk-in the day-of.

 

Judges

Katie Siegel

Katie Siegel
Full-stack software engineer @ Samsara

John Werner

John Werner
VP @ Meta

Peter Boyce II

Peter Boyce II
Founder @ Rough Draft Ventures

John Bicket

John Bicket
Founder & CTO @ Samsara

John Whaley

John Whaley
Founder & CEO @ UnifyID

Judging Criteria

  • Technical Complexity
    Is the hack technically difficult or interesting? Does the hack apply technical skills to solve a challenging problem? Is the hack impressive when considering the time constraints?
  • Idea, Novelty, and Wow Factor
    How creative or original is the idea? Does the hack present a new and unique functionality? Or does the hack demonstrate a new solution/new angle/increased scale on an older problem or goal?
  • Design and Implementation
    Is the user experience smooth, intuitive, and clear? Is the hack aesthetically pleasing? Does the design of the hack contribute to its functionality? Does the hack feature clever integration of different kinds of hardware/API?