Geekcamp Singapore 2020

{  "title": "GeekcampSG 2020 Online",  "dates": {    "day1": {       "start": "2020-09-19T14:00",       "end": "2020-09-19T18:00"    },    "day2": {       "start": "2020-09-20T14:00",       "end": "2020-09-20T18:00"    }  },  "location": "bit.ly/geekcampsg2020",  "breakout": "bit.ly/geekcampsg2020-watercooler",  "description": "Join us for 2 days of    afternoon geek talks."}
Enter command. Type help to see available commands
$

What is
Geekcamp?

A one day event that brings together hundreds of geeks to share about technologies and knowledge. We are celebrating our 11th anniversary this year as we continue to connect the community through curated talks, by Geeks, for Geeks.

schedule

Day 1 : 19 September

  • Ushering

  • Opening

    Ambrose

  • Bridging the Cyber-Physical World with Robotics and Smart Sensors

    Chong Jia Yi

    GovTech’s Digital Operations Smart Services (DOSS) platform uses deep learning to develop smart sensors and autonomous robotics. The robot dog SPOT and smart thermal scanner SPOTON were both developed on the DOSS platform. Jia Yi will share his experiences developing DOSS and plans for the platform.

  • CBOR: For Faster M2M Communication

    Isham Mohammed

    In this talk, Isham will introduce CBOR (RFC 7049 standard) to the audience and explain the essence of the existence of CBOR and how that makes M2M communication faster.

  • Break

  • The Socially Responsible Behaviour through Embodied Thinking (SORBET) Project: a COVID-19 response

    Kenneth Y T Lim, Ahmed Hazyl Hilmy

    Have you been thinking about how settings of learning might be designed to help nurture socially responsible behaviour, such as investing the self-discipline to develop the habit of social distancing? Both Kenneth and Ahmed will invite you to their sharing on the SORBET Project.

  • Workshop: Hiding PII and malware with Stegware

    Juan Araya

    In this workshop, learn what is steganography, how it can be used to hide PII data and even send malware and C&C IPs on pictures and audio files.

  • A Change-Data-Capture use-case: designing an evergreen cache

    Nicolas Frankel

    CDC is a brand new approach that "turns the database inside out": it allows to get events out of the database state. This can be leveraged to get a cache that is never stale.

  • Closing

    Ambrose

    Thanks all & see you tmr!

Day 2 : 20 September

  • Ushering

  • Opening

    Terence

  • Don't be Afraid of the Terminal

    Adrienne Tacke

    At some point in our developer careers, we've all looked at this intimidating window of darkness called the terminal. Despite its efficiency & power, many choose GUIs instead. Adrienne will demystify the terminal, from its origins up to its powerful commands. You'll leave a new fan of the terminal!

  • Securing Singapore with Augmented Reality: a pandemic-proof prototype

    Tan Li Yuan Marcus, Siddhant Shrivastava

    PlantAR is an AR application for securing our National Critical Infrastructures in COVID19. The talk and live demo will share the best practices learned about designing pandemic-proof teleoperation software through the lens of a hobby project in an operational Cyber-Physical Systems testbed.

  • Break

  • META II: A compiler-compiler that generates its own code

    Melvin Zhang

    Most of the time we treat compilers as black boxes but what really goes on under the hood? In this demo, I will demonstrate a DSL for writing compilers and a compiler-compiler that turns the DSL into a compiler. Amazingly, we can describe the compiler-compiler itself in only 26 lines of the DSL.

  • Supercharge your JavaScript with Web Assembly

    Tamas Piros

    Browser & Web APIs along with JavaScript have seen an incredible amount of enhancement over the past decade, however they still have certain limitations. With the rise of Web Assembly we can easily enhance JavaScript and give application(s) access to low-level processing & transform web experiences.

  • Closing

    Terence

    Thanks all!

WebVR.community.security.go.javascript.python.music.WebOfThings.science.serverless.IoT.hardware.authentication.nature.
WebVR.community.security.go.javascript.python.music.WebOfThings.science.serverless.IoT.hardware.authentication.nature.

Our Past
Speakers

Dr Vivian BalakrishnanMinister
Sebastiaan DeckersStaff Software Engineer, Zendesk
Michelle LyeProduct Manager, AIS Cube
Omer IqbaliOS Dev, SEA
Bunnie HuangHacker, Bunnie Studios
Melvin ZhangVP of Software, The Intelligent Warehouse

What
People
Said

/*Talking about browser extensions was never ever so exciting! It wasworth flying all overfrom India for @geekcamp\o/- Jyotsna Gupta*/ /*Subtle things why Ilove SG: SingaporeMinister Balakrishnangiving a talk about hisArduino endeavors@geekcamp :D- Thomas Gorissen*/
@##&@@&@@@@@&#%&&@%%@@@@@@&@@@@@@@@@&&*,**,,*,,...,,(#/
@@#%&@@@@@@@@#%&%%#%@@%%&@@@@@@@@@@@&&/#&#@%,,....,.&@#
&@@#&@@&@@@@@&/(((((///(((/*@@@@@@@@&&((&/&&/,,,,,,.&@#
@&@@#&@@@@@#(//,,.,/***/(//,,*@@@@@@&&%*&...(&@%,,%%&@#
@&@@#%&@@#(//**,*.... ....,,,,,*&@@@@%%*&,*.%@&&%#@&*/#
@@#@&&&@**,*,*,,*,......    ...,,(&@@%%,.,*,*/,###,.(%(
@@&@@#%**,,,,,.,,,,*/((*,,..   ..,*&@%%,          @.(  
@@&#@%*,,,,......,*(####((/*,.  ..,*&%%,/ ,& %@@&@@%&&.
###(/,*,*,..  .../########((*,.  ..,(%%,%.*//&@&&(/*/@#
%%#(//.*, .    ./#%%%%%%###((/,.  ..,#%,/./&#&@&%&@@%%#
##(/*,,....   .((//(/*,*((((//*.  .../%/&&&@@@@@&@@@@&%
##/,,,,,..  .*/((,. ...,/((/,,,,.  ..,%(##(%%#//*,,,,,.
%(/,.,..    *(####(/***((##,..*    ...## .. ...........
%(*,,,.. .  ,/#%%%%####%%%%#/**,.   .,#%...............
#(..... . ,..*#%%%%%%%##%&&%/(//,  ..#%%...............
#/.,...     .*/(#####(#(#(###(((....%@%%...............
#/,. .      .,//((((/(###((((/(. ,./@@%%.....*.,,/#%%/#
#/*...      .,,/(((((/*(#(#//(/ .(@@@@%%.(%#/#(&&%(*,,.
#(/...       ,,,*//((##(((((#(  .*...*#&...............
@@@&... .   .,*,.,*/((######/. ...,,&@&/,..............
@@@&(,..        ...,,/(((((///,//(./(#(**..............
@@&%##,.      ,*/*///*,,**//((,,/###%&@*(...,......,,,,
@@&%&&%#((*, .///((((*/#######(%%%%#%%%&&/,*,,,,,/,//,.
@@&&&&&&,../,/(((##(//##%###(##%%###%&%%(((%*,,.,,.,,./
&&&&&&(**/(/*/(###/(/ /%####%(###%%%#&%(&&&@@..........
%@&&&&((####((,,,...*//(**##(((#%%%#%%%&%#%&&@,.#.,*...
&&&&&%#%%###,**///(((##(#(#(#%%&&%&%%%%%&&&&@&@/,..,,,,
%%#%%%%%%&%%%%%%%%%%&%%%%%%&&%&%%%%%%%%%%%&&%&%%%%#&&&@
%%%%%%%%%%%%%%%%%&@@&%&&&&&@@@%&%%%%%%%%&%%%%%%%%%@@%&@
&%%%#%%%%@@&&&%%%%%%%%%%%%&%##%%%%%%%%(##%%%%%%%%%@@#%%
&&&%%%%%%#(%&(###%%%%%%%%%%/*/##%#######((#######%%%%%%
&&&&&&%%%#%%&%%%%%%%%%%%/*****,..*/((#%%%%%%%%%%%%%%%%%
&&&&&&&&&%%%##&&&&&&&&(*,*,,,*/***,,*,/%&&&&&&&&&&&&&&&
@@@&&&&&&&&&&&&&&&&&&**...,*,,....**.,,*%&&&&&&@&&&@&@@
@@@@@@@@@@@&&&&@@@@(.,.  .,*,*(%%%%%(,..,&&&@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@,**, .,/(#%%%%%%%%#/,. *@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@&,,../(#%%%%%%%%%%%#/*.,.,@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@,, /##%%%%%%%%%%%##/,.. .#@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@%  .*/,*(##(,,,*,*/**.* ,&@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@ //*/((*#.*((((/,(#,/( *@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@(###((%%*#%##/##(*##%@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@#####%%%#((#####/,#%@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@(#**/,,,*//(((#(**&@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@&**#,%&&&(/#/(/*,%@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@%*(#######(/*..( &&&@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@%*((/(%%(*,,,(#. /&&@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@&%*,,,,,,.../(##/,(*@&@@@@@@@@@@@
@@@@@@@@@@@@@@@@&/**#*/* /(/,**///(###/*((/(%*(&@@@@@@@
@@@@@@@@@@@&##&(///####*,,/(////((#####,((/*(#%&##%%%@@
@@@@@@@@@&###%//###%(((,//*((((#######(***#(&((((##%%**
@@@@@@@@%(//#%/*(#%(##(. /%########%%#...##%%(/*/#&##%%
@@@@@@@%*/*/#,,.,/%(/*//.,,*#%%%%%%#* , %%%(./##(%&%%%%
@@@@@@@/,#**(.,..(,****(.,(/#%%%%%%%/%((*.(#***//###(((
@@@@@@((/*,**,,,.(,*//*#*. ,#%%%%%%.., .*/#.,,.,,#,//**

Sponsor

Code
of
Conduct

All attendees, speakers, sponsors and volunteers at our conference are required to agree with the following code of conduct. Organizers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.

Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.

Participants asked to stop any harassing behavior are expected to comply immediately.

Sponsors are also subject to the anti-harassment policy. In particular, sponsors should not use sexualized images, activities, or other material. Booth staff (including volunteers) should not use sexualized clothing/uniforms/costumes, or otherwise create a sexualized environment.

If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they'll be wearing branded t-shirts.

Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.

We expect participants to follow these rules at conference and workshop venues and conference-related social events.

Need help?

You have our contact details in the emails we've sent. Please feel free to approach (a few designated people we appointed to handle, emails here) to report any incidents. Rest assured it will be kept confidental.