{
"title": "GeekcampSG 2020 Online",
"dates": {
"day1": {
"start": "2020-09-19T14:00",
"end": "2020-09-19T18:00"
},
"day2": {
"start": "2020-09-20T14:00",
"end": "2020-09-20T18:00"
}
},
"location": "bit.ly/geekcampsg2020",
"breakout": "bit.ly/geekcampsg2020-watercooler",
"description": "Join us for 2 days of
afternoon geek talks."
}
Enter command. Type help to see available commands
$


What is
Geekcamp?
A one day event that brings together hundreds of geeks to share about technologies and knowledge. We are celebrating our 11th anniversary this year as we continue to connect the community through curated talks, by Geeks, for Geeks.
2020
Speakers
schedule
Day 1 : 19 September
Ushering
Opening
Ambrose
Bridging the Cyber-Physical World with Robotics and Smart Sensors
Chong Jia Yi
GovTech’s Digital Operations Smart Services (DOSS) platform uses deep learning to develop smart sensors and autonomous robotics. The robot dog SPOT and smart thermal scanner SPOTON were both developed on the DOSS platform. Jia Yi will share his experiences developing DOSS and plans for the platform.
CBOR: For Faster M2M Communication
Isham Mohammed
In this talk, Isham will introduce CBOR (RFC 7049 standard) to the audience and explain the essence of the existence of CBOR and how that makes M2M communication faster.
Break
The Socially Responsible Behaviour through Embodied Thinking (SORBET) Project: a COVID-19 response
Kenneth Y T Lim, Ahmed Hazyl Hilmy
Have you been thinking about how settings of learning might be designed to help nurture socially responsible behaviour, such as investing the self-discipline to develop the habit of social distancing? Both Kenneth and Ahmed will invite you to their sharing on the SORBET Project.
Workshop: Hiding PII and malware with Stegware
Juan Araya
In this workshop, learn what is steganography, how it can be used to hide PII data and even send malware and C&C IPs on pictures and audio files.
A Change-Data-Capture use-case: designing an evergreen cache
Nicolas Frankel
CDC is a brand new approach that "turns the database inside out": it allows to get events out of the database state. This can be leveraged to get a cache that is never stale.
Closing
Ambrose
Thanks all & see you tmr!
Day 2 : 20 September
Ushering
Opening
Terence
Don't be Afraid of the Terminal
Adrienne Tacke
At some point in our developer careers, we've all looked at this intimidating window of darkness called the terminal. Despite its efficiency & power, many choose GUIs instead. Adrienne will demystify the terminal, from its origins up to its powerful commands. You'll leave a new fan of the terminal!
Securing Singapore with Augmented Reality: a pandemic-proof prototype
Tan Li Yuan Marcus, Siddhant Shrivastava
PlantAR is an AR application for securing our National Critical Infrastructures in COVID19. The talk and live demo will share the best practices learned about designing pandemic-proof teleoperation software through the lens of a hobby project in an operational Cyber-Physical Systems testbed.
Break
META II: A compiler-compiler that generates its own code
Melvin Zhang
Most of the time we treat compilers as black boxes but what really goes on under the hood? In this demo, I will demonstrate a DSL for writing compilers and a compiler-compiler that turns the DSL into a compiler. Amazingly, we can describe the compiler-compiler itself in only 26 lines of the DSL.
Supercharge your JavaScript with Web Assembly
Tamas Piros
Browser & Web APIs along with JavaScript have seen an incredible amount of enhancement over the past decade, however they still have certain limitations. With the rise of Web Assembly we can easily enhance JavaScript and give application(s) access to low-level processing & transform web experiences.
Closing
Terence
Thanks all!
Our Past
Speakers
What
People
Said
/*
Talking about browser
extensions was never
ever so exciting! It was
worth flying all over
from India for @geekcamp
\o/
- Jyotsna Gupta
*/
/*
Subtle things why I
love SG: Singapore
Minister Balakrishnan
giving a talk about his
Arduino endeavors
@geekcamp :D
- Thomas Gorissen
*/
@##&@@&@@@@@&#%&&@%%@@@@@@&@@@@@@@@@&&*,**,,*,,...,,(#/ @@#%&@@@@@@@@#%&%%#%@@%%&@@@@@@@@@@@&&/#&#@%,,....,.&@# &@@#&@@&@@@@@&/(((((///(((/*@@@@@@@@&&((&/&&/,,,,,,.&@# @&@@#&@@@@@#(//,,.,/***/(//,,*@@@@@@&&%*&...(&@%,,%%&@# @&@@#%&@@#(//**,*.... ....,,,,,*&@@@@%%*&,*.%@&&%#@&*/# @@#@&&&@**,*,*,,*,...... ...,,(&@@%%,.,*,*/,###,.(%( @@&@@#%**,,,,,.,,,,*/((*,,.. ..,*&@%%, @.( @@&#@%*,,,,......,*(####((/*,. ..,*&%%,/ ,& %@@&@@%&&. ###(/,*,*,.. .../########((*,. ..,(%%,%.*//&@&&(/*/@# %%#(//.*, . ./#%%%%%%###((/,. ..,#%,/./&#&@&%&@@%%# ##(/*,,.... .((//(/*,*((((//*. .../%/&&&@@@@@&@@@@&% ##/,,,,,.. .*/((,. ...,/((/,,,,. ..,%(##(%%#//*,,,,,. %(/,.,.. *(####(/***((##,..* ...## .. ........... %(*,,,.. . ,/#%%%%####%%%%#/**,. .,#%............... #(..... . ,..*#%%%%%%%##%&&%/(//, ..#%%............... #/.,... .*/(#####(#(#(###(((....%@%%............... #/,. . .,//((((/(###((((/(. ,./@@%%.....*.,,/#%%/# #/*... .,,/(((((/*(#(#//(/ .(@@@@%%.(%#/#(&&%(*,,. #(/... ,,,*//((##(((((#( .*...*#&............... @@@&... . .,*,.,*/((######/. ...,,&@&/,.............. @@@&(,.. ...,,/(((((///,//(./(#(**.............. @@&%##,. ,*/*///*,,**//((,,/###%&@*(...,......,,,, @@&%&&%#((*, .///((((*/#######(%%%%#%%%&&/,*,,,,,/,//,. @@&&&&&&,../,/(((##(//##%###(##%%###%&%%(((%*,,.,,.,,./ &&&&&&(**/(/*/(###/(/ /%####%(###%%%#&%(&&&@@.......... %@&&&&((####((,,,...*//(**##(((#%%%#%%%&%#%&&@,.#.,*... &&&&&%#%%###,**///(((##(#(#(#%%&&%&%%%%%&&&&@&@/,..,,,,
%%#%%%%%%&%%%%%%%%%%&%%%%%%&&%&%%%%%%%%%%%&&%&%%%%#&&&@ %%%%%%%%%%%%%%%%%&@@&%&&&&&@@@%&%%%%%%%%&%%%%%%%%%@@%&@ &%%%#%%%%@@&&&%%%%%%%%%%%%&%##%%%%%%%%(##%%%%%%%%%@@#%% &&&%%%%%%#(%&(###%%%%%%%%%%/*/##%#######((#######%%%%%% &&&&&&%%%#%%&%%%%%%%%%%%/*****,..*/((#%%%%%%%%%%%%%%%%% &&&&&&&&&%%%##&&&&&&&&(*,*,,,*/***,,*,/%&&&&&&&&&&&&&&& @@@&&&&&&&&&&&&&&&&&&**...,*,,....**.,,*%&&&&&&@&&&@&@@ @@@@@@@@@@@&&&&@@@@(.,. .,*,*(%%%%%(,..,&&&@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@,**, .,/(#%%%%%%%%#/,. *@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@&,,../(#%%%%%%%%%%%#/*.,.,@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@,, /##%%%%%%%%%%%##/,.. .#@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@% .*/,*(##(,,,*,*/**.* ,&@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@ //*/((*#.*((((/,(#,/( *@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@(###((%%*#%##/##(*##%@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@#####%%%#((#####/,#%@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@(#**/,,,*//(((#(**&@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@&**#,%&&&(/#/(/*,%@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@%*(#######(/*..( &&&@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@%*((/(%%(*,,,(#. /&&@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@&%*,,,,,,.../(##/,(*@&@@@@@@@@@@@ @@@@@@@@@@@@@@@@&/**#*/* /(/,**///(###/*((/(%*(&@@@@@@@ @@@@@@@@@@@&##&(///####*,,/(////((#####,((/*(#%&##%%%@@ @@@@@@@@@&###%//###%(((,//*((((#######(***#(&((((##%%** @@@@@@@@%(//#%/*(#%(##(. /%########%%#...##%%(/*/#&##%% @@@@@@@%*/*/#,,.,/%(/*//.,,*#%%%%%%#* , %%%(./##(%&%%%% @@@@@@@/,#**(.,..(,****(.,(/#%%%%%%%/%((*.(#***//###((( @@@@@@((/*,**,,,.(,*//*#*. ,#%%%%%%.., .*/#.,,.,,#,//**
Code
of
Conduct
All attendees, speakers, sponsors and volunteers at our conference are required to agree with the following code of conduct. Organizers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.
Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.
Participants asked to stop any harassing behavior are expected to comply immediately.
Sponsors are also subject to the anti-harassment policy. In particular, sponsors should not use sexualized images, activities, or other material. Booth staff (including volunteers) should not use sexualized clothing/uniforms/costumes, or otherwise create a sexualized environment.
If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.
If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they'll be wearing branded t-shirts.
Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.
We expect participants to follow these rules at conference and workshop venues and conference-related social events.
Need help?
You have our contact details in the emails we've sent. Please feel free to approach (a few designated people we appointed to handle, emails here) to report any incidents. Rest assured it will be kept confidental.