This talk was in the making for more than two years.
My biggest inspiration for this topic is my nine-year-old (then seven) daughter, Shayna, who loves to draw.@geekcamp is also one of the fantastic events where I met with many like-minded friends in Singapore. https://twitter.com/geekcamp/status/1562405727440084992 …
{ "title": "GeekcampSG 2022", "date": "2022-10-29", "inPersonLocation": "SP Digital, 180 Clemenceau Ave, Singapore 239922", "onlineLocation": "Discord, YouTube", "registration": "Get tickets!", "cfp": "CFP is now closed.", "volunteer": "Volunteer with us", "description": "Join us for an eventful day of geek talks." }Enter command. Type help to see available commands
=>
Watch the Livestream
Geekcamp
Barcamp
What is
Geekcamp?
A one-stop event to get acquainted and grow your tech network in Singapore: a hybrid online + in-person GeekcampSG. The end goal: to reignite vibrant and inspiring meetups in the tech community.
GeekcampSG
X
Local Tech Communities
Local tech communities are most welcome to present a talk and get involved!
Rally your community to submit talk proposals relevant to your interest areas. There are limited slots for both headline and parallel tracks, so submit early to avoid disappointment! If your talk is accepted, we will work closely with you to promote it to GeekcampSG attendees and our social media.
For more information, get in touch with the organiser who contacted you. :)
Schedule - Oct 29, 22
Time shown is in SGT (UTC+8)
Opening
The horizontal overflow problem
Track 0Have you ever visited a website on a phone only to find that when you want to scroll down, the entire page also sways from left to right due to some mysterious horizontal overflow? Unintended horizontal overscrolling is not a great experience. Let's break the problem down and also try to solve it.
Don't be shy - how to ask your senior devs for the help
Track 1As a junior dev, have you ever wanted to ask your senior dev for help, but felt paiseh (Singlish for embarrassed)? My senior is so busy all the time... What if my question is too bodoh (Singlish for stupid) and irritates my senior? Let me teach you the art of asking good questions.
Let's learn about the Life2Well Project without frying your brain
Track 0What might the collision of maker culture, data science, electroencephalograms, the Internet of Things, and climate science look like? In this session, we share a student-initiated project which explores this very intersection. Come join us and BYOCM (bring your own craft materials)!
Rolling Your Own Cryptography: Why You Shouldn't
Track 1In 2019, a trivial flaw existed on Flickr that allowed user impersonation. It's one of many that come from flaws in the use of cryptography: And it's not the developer's fault; Crypto is fragile. This talk describes the wide contexts crypto is used (and attacked) and all that can go wrong.
Better migrations in PostgreSQL using Squawk
Track 0Learn how Squawk can help improve your migrations and schema definitions in PostgreSQL. We will discuss the various rules that Squawk lints against and how they can lead to more resilient database design in PostgreSQL.
A Day in Cyber Security
Track 1In the past edition of "Geekcamp.SG", I received a lot of queries on what it takes to start in CyberSecurity. This workshop is part presentation and part hands-on on some of the tasks and the different roles that a Cyber Security Blue Teamer might carry out.
Parsing Differential Problem
Track 0As microservices have become popular in the current software engineering landscape, it is important to consider security risks arising from interactions between components within a system. We will explore the parsing differential problem and discuss remedies with examples.
Storage and Retrieval in databases from scratch
Track 1Based on content from Martin Kleppmann's Designing Data Intensive Applications, go under the hood of databases and simulate with code examples (in JS), how DBs read and write files: append-only, hash index, LSMTrees and B+Trees. Also will touch on Online Analysis Processing DB strategies
ChIPs - Polycube (Voxel) Construction Set
Track 0Have you wanted to use a construction set to build a model but don't want to deal with complicated techniques to remove studs/build sideways? Not Square? Too many different types of bricks? Something you can freely 3D print cheaply? etc. Look no further; this is the construction set for you!
The Lord of the Monorepos: An efficient setup with pnpm and NX
Track 0One setup to rule all your repositories, One setup to find them, One setup to bring them all, and in the darkness bind them. On the laptop of the developer where the node_modules lie.
Verifiable Computing Project - Building truly open-source computing hardware
Track 1Processors are at the heart of our devices. As they become more integrated with other functions, what do we know about how they work? Do we trust their designers? We present a computer design with a FPGA RISC-V processor implementation, allowing for the underlying hardware to be inspected.
The Unreasonable Effectiveness of Dumb Values
Track 0There are many ways to solve a problem, some better than others: copy from StackOverflow, use a popular library, callbacks, promises, goroutines, meta programming, queue, regexes, and so on. But there’s one dumb approach that keeps ending up as the better solution in many situations: plain values.
Bitcoin, Blockchain & Cryptography, Part II: A look back of blockchain evolution over the last 10 years.
Track 1I gave a Geekcamp opening keynote in 2012 titled "Bitcoin – How it is safer than you bank", when Bitcoin was barely known outside of a small group of users.This is a no-hype talk that covers both my personal journey in the blockchain scene, as well as evolution of blockchain, from my eyes.
Creating Art From Databases
Track 0When I ask, what does a database look like? An ER Diagram may come to mind. How about, what does a DB sound like? Hmm.. maybe, the screams of one being accidentally deleted. Ultimately, art is made up of data. A song has notes, a painting has pixels etc. So, why not turn our databases into art?
Software best practices in a Hard(ware) world
Track 0Software processes and best practices like version control, build automation and CI/CD are widely adopted in the software industry, but how to adapt these ideas to hardware design and development? Does git work on schematics? Can I automate hardware testing? Let's explore!
Understanding the TLS Ecosystem by Probing the Internet
Track 0This talk looks at how to perform an internet-wide scan supporting TLSv1.3. We collect data from the entire IPv4 space on port 443 and analyze 9,461,056 data points to baseline the state of the TLS ecosystem. We conclude the talk by looking at how the ecosystem can be improved.
How Python 3.11 is Speeding Up
Track 1Speed is coming to Python. After years of mostly stagnant year-on-year Python performance improvements, Python 3.11 is 25% faster than Python 3.10, thanks to various contributors. I'd love to share the technical details of how this was achieved.
Using math, statistics, and JavaScript - to automate the solving of WORDLE - so I will never need to do so again
Track 0My wife is really addicted to Wordle, and she's been bugging me to try it every day, and compete for a better score then me ....But I suck at Wordle! So I used math, statistics, and JavaScript - to automate solving of wordle for me (so I will never need to do so again)
The L4 Compiler: a toolchain for a DSL for law
Track 1Programmers and lawyers do the same thing: we anticipate a range of future scenarios and try to say what is, and is not, supposed to happen in each one. But lawyers program in English. What if CS had been invented before law? What would lawyers be programming in instead?
2022
Speakers






















What People Said
On my way to @geekcamp , can't wait to check out the awesome talks this year.
Code
of
Conduct
All participants are expected to adhere to the CoC both onsite and online. The guiding principle is respect and care for self and others. Examples of unacceptable behaviours include (not exhaustive):
- Offensive comments related to gender identity and expression, sexual orientation, disability, mental illness, neuro(a)typicality, physical appearance, body size, race, or religion
- Gratuitous or off-topic sexual images or behavior in spaces where they are not appropriate
- Threats of violence or incitement of violence towards any individual, including encouraging a person to commit suicide or to engage in self-harm
- Publication of non-harassing private communication or another member's personal information without their explicit consent
The CoC applies to all GeekcampSG attendees, including organisers, sponsors, speakers and talk attendees.
Reporting violations
In the event that you need to report a CoC violation:
-
Reporting methods
-
On-site
- Approach any Geekcamp organiser (wearing an Organiser shirt)
- Alternatively, head to the registration desk and inform the volunteers that you would like to report a violation.
-
Online: Discord
- Create a ticket at Contact Us > #report-issue. A new, private ticket channel will be created under the Tickets category, where you can send a moderator more details on the violation.
- If you feel uncomfortable creating a ticket, feel free to reach out to us via private message.
-
On-site
-
What to include when reporting
-
Identifying information of the participant doing the harassing
- On-site: Name and outfit description
-
Online: Discord username (Username#1234), server nickname
- Discord username: Right-click on the participant’s profile picture.
- Server nickname: The name displayed on top of the message.
- The behaviour that was in violation
- The approximate time of the behaviour
- The circumstances surrounding the incident
-
Evidence of the violation, if available
- Online: A screenshot of the conversation where the violation occurred
-
Identifying information of the participant doing the harassing
We will respect confidentiality requests for the purpose of protecting victims of abuse. At our discretion, we may publicly name a person about whom we’ve received harassment complaints. We will not name harassment victims without their affirmative consent.
Consequences
The participant will face the following, in order of increasing severity:
-
Time-out
If a participant has exhibited concerning behavior, as outlined in the rules, they may be pulled into timeout. During timeout, the participant will have a discussion with our Code of Conduct representatives about any concerning behaviors until we have come to an agreement.
-
On-site
The participant will be separated from other participants and have a discussion with our Code of Conduct representatives in a private setting.
-
Online
The participant loses access to all channels on the Geekcamp server other than timeout. Only the timed-out participant and the mods will be able to see the conversation.
-
On-site
-
Kicked from Geekcamp Conference
-
On-site
The participant will be escorted off the premises and will not be allowed to re-enter.
-
Online
The user will be banned from the Geekcamp Discord server.
-
On-site
-
Escalation to authorities
-
On-site
Geekcamp organisers will liaise with the venue host to initiate actions such as reporting to building security and/or police for their follow-up action.
-
Online
Geekcamp organisers will provide supporting evidence to Discord administrators and/or local law enforcement authorities for their follow-up action.
-
On-site
Sponsors
Partners
Organisers


























