๐Ÿ“Œ Schedule ๐Ÿ—’

Saturday, 5th January

8:30 am Registration
9:15 am Opening Remarks
9:30 am
Genetic Algorithms in Go by Chang Sau Sheong

Genetic algorithms are metaheuristics that are based on the process of natural selection. This talk give a simple introduction to GA, with a couple of examples including evolving a phrase from Shakespeareโ€™s Hamlet, and also an image of Mona Lisa.

10:00 am
Serverless - Looking beyond the hype by Monika Puhazhendhi

We all know serverless as a top buzzword today. But is it suitable for everything? How cost effective is it? What are the pitfalls to avoid? How does it fit in with microservices? In this talk, we will explore these questions and more. We will look beyond the hype to grasp what serverless really is.

10:30 am Break โ˜•๏ธ
10:45 am
How Alan Turing accidentally invented Software by Melvin Zhang

We use software regularly without thinking too much of it, but do you wonder how it all came to be? Turing was the first person to realize that by using different software a single machine can be made to perform any task. In this talk, we will demonstrate his insight through a series of demos.

11:15 am
5 cool things about Haskell by Stephan February

Haskell is often seen as daunting to beginners. While this can certainly be the case, I would love to share 5 cool (non-intimidating) things which Iโ€™m sure will get you excited about digging a little deeper into this language.

11:45 am
When life gives you Orange, make data speak volumes! by Drishti Jain

Have you ever thought of using data visualization to represent data; but feel that it is a cumbersome process? Worry not โ€“ Orange is here to the rescue! Come, dive into the world of this magical open source data mining tool that can also be used as a Python library. Beginner friendly!

12:15 pm Lunch ๐Ÿฑ
1:45 pm
The Incredibly Fine Balance of an Open Source Project and an Open Source Product by Harish Pillay

โ€œOpen sourceโ€ as a label has been used in many places and yet, there are nuances that it has that gets either lost or not articulated. This talk will explain the fine balance that is between open source PROJECTs and open source PRODUCTs.

2:15 pm
Pocket Science Lab - An Open Source Hardware for Electronics Teaching & Learning by Wai Gie

Pocket Science Lab (PSLab) is an Open Source hardware device (open on all layers) that can be used for experiments by teachers, students and citizen scientists to learn and teach electronics. The hardware comes with a firmware, desktop app, android app - all open source. This tiny pocket lab provides an array of sensors for doing science and engineering experiments. It comes with functions of numerous measurement devices including an oscilloscope, a waveform generator, a frequency counter, a programmable voltage, current source and as a data logger. During this session, Wai Gie will speak about the project development and current use cases of the device through a short demo.

2:45 pm
So what's exactly a JIT Compiler? by Omer Iqbal

What exactly makes Javascript so much faster than other dynamic languages? Or why is Pypy so much faster than CPython? And how is it, that our old friend Java, which runs on a โ€œVMโ€, can almost compete with native compiled languages? The answer partially is due to JIT (Just In Time) compilation.

3:15 pm Break โ˜•๏ธ
3:45 pm
United we serve, divided we scale by Sebastiaan Deckers

The story of why & how I am building a global CDN to make the web & DNS fast, secure, and cheap even in regions others canโ€™t. Free software. Open hardware. Cooperative infrastructure ownership.

4:15 pm
Application Security for FREE !! by Harley Davidson Karel

This topic will cover how to find vulnerability on java, python,ruby on rails,php using free/open source SAST.It will demonstrate on CLI,IDE and Jenkins integration.So that developer can found & fixed the vulnerability since on development stage without waiting for penetration testing stage

4:45 pm
DevSecOps by Cheah Eng Soon

Are you looking to build Cloud-based applications using DevOps methodology but worried that the traditional security methods may not adapt to the modern development techniques?

5:30 pm Closing Address + Photo taking

๐Ÿ‘ฉโ€๐Ÿซ Workshop ๐Ÿ‘จโ€๐Ÿ’ป

Two Sessions:
10:45 AM – 11:45 AM1:45 PM – 2:45 PM
Level 22 (one floor above)

Building cross-platform browser add-ons using Extensions APIs

We use Ad-block, Grammarly, Containers, and a lot more other add-ons in our browser every day. How about being on the other side of the table and build one with the javascript we already knew? Letโ€™s talk about add-ons, Extension apis and build an add-on of our own with existing AI/ML models.

Conducted by: Jyotsna Gupta

Participants should bring their laptops along with the latest Firefox browser installed in it and a text editor such as atom, Sublime text, etc would suffice.

Prior knowledge of Javascript is required.

โ„น๏ธ Interested particpants are to register at the participation booth, at least 15 minutes before the start of each session. Each session can only hold a maximum of 50 participants. โ—๏ธ

๐Ÿ•๏ธ Community Villages โ›ฒ

Challenge by OSI Layer 8

Pick up some security basics through a mini capture-the-flag game run by team OSI Layer 8. There are three categories to choose from: web exploits, binary exploits and forensics, each challenge gives you points and a place on a scoreboard. Do bring your laptop if you want to take part. Prizes to be won for top 5 teams! Village

Hangout, code or get your hands on VR, 3D printing and soldering at the Village with the guys/gals from Singaporeโ€™s first co-working/tech community space.

๐ŸŽ– Sponsors ๐Ÿ’ฐ

๐Ÿ’ก Conference Code of Conduct ๐Ÿ™

All attendees, speakers, sponsors and volunteers at our conference are required to agree with the following code of conduct. Organizers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.

Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.

Participants asked to stop any harassing behavior are expected to comply immediately.

Sponsors are also subject to the anti-harassment policy. In particular, sponsors should not use sexualized images, activities, or other material. Booth staff (including volunteers) should not use sexualized clothing/uniforms/costumes, or otherwise create a sexualized environment.

If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they'll be wearing branded t-shirts.

Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.

We expect participants to follow these rules at conference and workshop venues and conference-related social events.

Need help?

You have our contact details in the emails we've sent. Please feel free to approach (a few designated people we appointed to handle, emails here) to report any incidents. Rest assured it will be kept confidental.

Geekcamp Singapore is a one day event that brings together hundreds of geeks to share about technologies and knowledge.