Geekcamp Singapore 2022

{  "title": "GeekcampSG 2022",  "date": "2022-10-29",  "inPersonLocation":"SP Digital, 180 Clemenceau Ave, Singapore 239922.",  "onlineLocation":"Discord, YouTube",  "registration": "Get tickets!",  "cfp": "CFP is now closed.",  "volunteer": "https://bit.ly/geekcampsg-volunteer-2022",  "description": "Join us for an eventful day of    geek talks."}
Enter command. Type help to see available commands
=>

What is
Geekcamp?

A one-stop event to get acquainted and grow your tech network in Singapore: a hybrid online + in-person GeekcampSG. The end goal: to reignite vibrant and inspiring meetups in the tech community.

GeekcampSG
X
Local Tech Communities

Local tech communities are most welcome to present a talk and get involved!

Rally your community to submit talk proposals relevant to your interest areas. There are limited slots for both headline and parallel tracks, so submit early to avoid disappointment! If your talk is accepted, we will work closely with you to promote it to GeekcampSG attendees and our social media.

For more information, get in touch with the organiser who contacted you. :)

schedule - Oct 29, 2022

Time shown is in SGT (UTC+8)

  • Opening

  • The horizontal overflow problem

    Chen Hui Jing, Gao Wei

    Track 0

    Have you ever visited a website on a phone only to find that when you want to scroll down, the entire page also sways from left to right due to some mysterious horizontal overflow? Unintended horizontal overscrolling is not a great experience. Let's break the problem down and also try to solve it.

  • Don't be shy - how to ask your senior devs for help

    Shi Ling

    Track 1

    As a junior dev, have you ever wanted to ask your senior dev for help, but feel paiseh (Singlish for embarrassed)? My senior is so busy all the time... What if my question too bodoh (Singlish for stupid) and irritates my senior? Let me teach you the art of asking good questions.

  • Let's learn about the Life2Well Project without frying your brain

    Nguyen Duc Minh Anh, Nguyen Thien Minh Tuan, Kenneth Y T Lim

    Track 0

    What might the collision of maker culture, data science, electroencephalograms, the Internet of Things, and climate science look like? In this session, we share a student-initiated project which explores this very intersection. Come join us and BYOCM (bring your own craft materials)!

  • Rolling Your Own Cryptography: Why You Shouldn't

    Jules Poon

    Track 1

    In 2019, a trivial flaw existed on Flickr that allowed user impersonation. It's one of many that come from flaws in the use of cryptography: And it's not the developer's fault; Crypto is fragile. This talk describes the wide contexts crypto is used (and attacked) and all that can go wrong.

  • Better migrations in PostgreSQL using Squawk

    Kenny Shen

    Track 0

    Learn how Squawk can help improve your migrations and schema definitions in PostgreSQL. We will discuss the various rules that Squawk lints against and how they can lead to more resilient database design in PostgreSQL.

  • A Day in Cyber Security

    Muhammad Hazwan Bin Hassan Mokyi

    Track 1

    In the past edition of Geekcamp.SG, I received a lot of queries on what it takes to start in CyberSecurity. This workshop is part presentation and part hands-on on some of the tasks the different roles that a Cyber Security Blue Teamer might carry out.

  • Parsing Differential Problem

    Sim Cher Boon

    Track 0

    As microservices have become popular in the current software engineering landscape, it is of increased importance to consider security risks arising from interactions between components within a system. We will explore the parsing differential problem, and discuss remedies with examples.

  • Storage and Retrieval in databases from scratch

    Zhi-Yang Ten

    Track 1

    Based on content from Martin Kleppmann's Designing Data Intensive Applications, go under the hood of databases and simulate with code examples (in JS), how DBs read and write files: append-only, hash index, LSMTrees and B+Trees. Also will touch on Online Analysis Processing DB strategies

  • ChIPs - Polycube (Voxel) Construction Set

    Liao Choon Way

    Track 0

    Have you wanted to use a construction set to build a model, but don't want to deal with complicated techniques to remove studs / build sideways? Not Square? Too many different types of bricks? Something you can freely 3D print cheaply? etc. Look no further, this is the construction set for you!

  • The Lord of the Monorepos: An efficient setup with pnpm and NX

    Thomas Huchedé

    Track 0

    One setup to rule all your repositories, One setup to find them,One setup to bring them all, and in the darkness bind them. On the laptop of the developer where the node_modules lie.

  • Verifiable Computing Project - Building truly open source compute hardware

    Joyce Ng

    Track 1

    Processors are at the heart of our devices. As they become more integrated with other functions, what do we know about they work? Do we trust their designers? We present a computer design with a FPGA RISC-V processor implementation, allowing for the underlying hardware to be inspected.

  • The Unreasonable Effectiveness of Dumb Values

    Chew Choon Keat

    Track 0

    There are many ways to solve a problem, some better than others: copy from stackoverflow, use a popular library, callbacks, promises, goroutines, meta programming, queue, regexes… But there’s one dumb approach that keeps ending up as the better solution in surprisingly many situations: plain values.

  • Bitcoin, Blockchain & Cryptography, Part II: A look back of blockchain evolution over the last 10 years.

    U-Zyn Chua

    Track 1

    I gave a Geekcamp opening keynote in 2012 titled "Bitcoin – How it is safer than you bank", when Bitcoin was barely known outside of a small group of users.This is a no-hype talk that covers both my personal journey in the blockchain scene, as well as evolution of blockchain, from my eyes.

  • Creating Art From Databases

    Sam Poder

    Track 0

    When I ask, what does a database look like? An ER Diagram may come to mind. How about, what does a DB sound like? Hmm.. maybe, the screams of one being accidentally deleted. Ultimately, art is made up of data. A song has notes, a painting has pixels etc. So, why not turn our databases into art?

  • Software best practices in a Hard(ware) world

    Chinmay Pendharkar

    Track 0

    Software processes and best practices like version control, build automation and CI/CD are widely adopted in the software industry, but how to adapt these ideas to hardware design and development? Does git work on schematics? Can I automate hardware testing? Let's explore!

  • Understanding the TLS Ecosystem by Probing the Internet

    Wong Wai Tuck

    Track 0

    In this talk, we look at how to perform an internet wide scan supporting TLSv1.3. We collect data from the entire IPv4 space on port 443 and analyze 9,461,056 data points to baseline the state of the TLS ecosystem. We conclude the talk by looking at how the ecosystem can be improved.

  • How Python 3.11 is Speeding Up

    Ken Jin

    Track 1

    Speed is coming to Python. After years of mostly stagnant year-on-year Python performance improvements, Python 3.11 is 25% faster than Python 3.10 thanks to various contributors. I'd love to share the technical details of how this was achieved.

  • Using math, statistics, and javascript - to automate the solving of WORDLE - so I will never need to do so again

    Eugene Cheah

    Track 0

    My wife is really addicted to Wordle, and she's been bugging me to try it every day, and compete for a better score then me ....But I suck at Wordle! So I used math, statistics, and javascript - to automate solving of wordle for me (so I will never need to do so again)

  • The L4 Compiler: a toolchain for a DSL for law

    Wong Meng Weng

    Track 1

    Programmers and lawyers do the same thing: we anticipate a range of future scenarios and try to say what is, and is not, supposed to happen in each one. But lawyers program in English. What if CS had been invented before law? What would lawyers be programming in instead?

2022
Speakers

Chen Hui Jing
Chen Hui JingShopify
Chew Choon Keat
Chew Choon KeatHead of Engineering, Hobnob
Chinmay Pendharkar
Chinmay PendharkarCTO, Subnero
Gao Wei
Gao WeiSenior Engineer, BlackRock
Ng Rui Lin Joyce
Ng Rui Lin JoyceChief Technical Officer, Hyan Technologies Pte. Ltd.
Jules Poon
Jules PoonHobbyist
Ken Jin
Ken JinContributor, CPython
Kenneth Y T Lim
Kenneth Y T LimNational Institute of Education
Kenny Shen
Kenny ShenProgrammer, Genk Capital
Liao Choon Way
Liao Choon WayInventor/Engineer, Independent
Wong Meng Weng
Wong Meng WengPrincipal Research Fellow, SMU YPHSOL
Muhammad Hazwan
Muhammad HazwanSenior Cyber Security Researcher, Custodio Technologies
Nguyen Duc Minh Anh
Nguyen Duc Minh Anh
Nguyen Thien Minh Tuan
Nguyen Thien Minh Tuan
Eugene Cheah
Eugene CheahCTO, Uilicious
Sam Poder
Sam PoderSoftware Engineer, Hack Club
Shi Ling
Shi LingCEO, UIlicious
Sim Cher Boon
Sim Cher BoonSecurity Engineer, Grab
Ten Zhi-Yang
Ten Zhi-YangSoftware Developer, Shopify
Thomas Huchedé
Thomas HuchedéConsultant, Zenika
U-Zyn Chua
U-Zyn ChuaCo-Founder & CTO, Cake DeFi
Wong Wai Tuck
Wong Wai TuckSenior Penetration Tester

What
People
Said

/*  Talking about browser   extensions was never   ever so exciting! It was  worth flying all over  from India for @geekcamp  \o/  - Jyotsna Gupta*/ /*  Subtle things why I  love SG: Singapore  Minister Balakrishnan  giving a talk about his  Arduino endeavors  @geekcamp :D  - Thomas Gorissen*/
@##&@@&@@@@@&#%&&@%%@@@@@@&@@@@@@@@@&&*,**,,*,,...,,(#/
@@#%&@@@@@@@@#%&%%#%@@%%&@@@@@@@@@@@&&/#&#@%,,....,.&@#
&@@#&@@&@@@@@&/(((((///(((/*@@@@@@@@&&((&/&&/,,,,,,.&@#
@&@@#&@@@@@#(//,,.,/***/(//,,*@@@@@@&&%*&...(&@%,,%%&@#
@&@@#%&@@#(//**,*.... ....,,,,,*&@@@@%%*&,*.%@&&%#@&*/#
@@#@&&&@**,*,*,,*,......    ...,,(&@@%%,.,*,*/,###,.(%(
@@&@@#%**,,,,,.,,,,*/((*,,..   ..,*&@%%,          @.(  
@@&#@%*,,,,......,*(####((/*,.  ..,*&%%,/ ,& %@@&@@%&&.
###(/,*,*,..  .../########((*,.  ..,(%%,%.*//&@&&(/*/@#
%%#(//.*, .    ./#%%%%%%###((/,.  ..,#%,/./&#&@&%&@@%%#
##(/*,,....   .((//(/*,*((((//*.  .../%/&&&@@@@@&@@@@&%
##/,,,,,..  .*/((,. ...,/((/,,,,.  ..,%(##(%%#//*,,,,,.
%(/,.,..    *(####(/***((##,..*    ...## .. ...........
%(*,,,.. .  ,/#%%%%####%%%%#/**,.   .,#%...............
#(..... . ,..*#%%%%%%%##%&&%/(//,  ..#%%...............
#/.,...     .*/(#####(#(#(###(((....%@%%...............
#/,. .      .,//((((/(###((((/(. ,./@@%%.....*.,,/#%%/#
#/*...      .,,/(((((/*(#(#//(/ .(@@@@%%.(%#/#(&&%(*,,.
#(/...       ,,,*//((##(((((#(  .*...*#&...............
@@@&... .   .,*,.,*/((######/. ...,,&@&/,..............
@@@&(,..        ...,,/(((((///,//(./(#(**..............
@@&%##,.      ,*/*///*,,**//((,,/###%&@*(...,......,,,,
@@&%&&%#((*, .///((((*/#######(%%%%#%%%&&/,*,,,,,/,//,.
@@&&&&&&,../,/(((##(//##%###(##%%###%&%%(((%*,,.,,.,,./
&&&&&&(**/(/*/(###/(/ /%####%(###%%%#&%(&&&@@..........
%@&&&&((####((,,,...*//(**##(((#%%%#%%%&%#%&&@,.#.,*...
&&&&&%#%%###,**///(((##(#(#(#%%&&%&%%%%%&&&&@&@/,..,,,,
%%#%%%%%%&%%%%%%%%%%&%%%%%%&&%&%%%%%%%%%%%&&%&%%%%#&&&@
%%%%%%%%%%%%%%%%%&@@&%&&&&&@@@%&%%%%%%%%&%%%%%%%%%@@%&@
&%%%#%%%%@@&&&%%%%%%%%%%%%&%##%%%%%%%%(##%%%%%%%%%@@#%%
&&&%%%%%%#(%&(###%%%%%%%%%%/*/##%#######((#######%%%%%%
&&&&&&%%%#%%&%%%%%%%%%%%/*****,..*/((#%%%%%%%%%%%%%%%%%
&&&&&&&&&%%%##&&&&&&&&(*,*,,,*/***,,*,/%&&&&&&&&&&&&&&&
@@@&&&&&&&&&&&&&&&&&&**...,*,,....**.,,*%&&&&&&@&&&@&@@
@@@@@@@@@@@&&&&@@@@(.,.  .,*,*(%%%%%(,..,&&&@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@,**, .,/(#%%%%%%%%#/,. *@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@&,,../(#%%%%%%%%%%%#/*.,.,@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@,, /##%%%%%%%%%%%##/,.. .#@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@%  .*/,*(##(,,,*,*/**.* ,&@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@ //*/((*#.*((((/,(#,/( *@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@(###((%%*#%##/##(*##%@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@#####%%%#((#####/,#%@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@(#**/,,,*//(((#(**&@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@&**#,%&&&(/#/(/*,%@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@%*(#######(/*..( &&&@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@%*((/(%%(*,,,(#. /&&@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@&%*,,,,,,.../(##/,(*@&@@@@@@@@@@@
@@@@@@@@@@@@@@@@&/**#*/* /(/,**///(###/*((/(%*(&@@@@@@@
@@@@@@@@@@@&##&(///####*,,/(////((#####,((/*(#%&##%%%@@
@@@@@@@@@&###%//###%(((,//*((((#######(***#(&((((##%%**
@@@@@@@@%(//#%/*(#%(##(. /%########%%#...##%%(/*/#&##%%
@@@@@@@%*/*/#,,.,/%(/*//.,,*#%%%%%%#* , %%%(./##(%&%%%%
@@@@@@@/,#**(.,..(,****(.,(/#%%%%%%%/%((*.(#***//###(((
@@@@@@((/*,**,,,.(,*//*#*. ,#%%%%%%.., .*/#.,,.,,#,//**

Code
of
Conduct

All attendees, speakers, sponsors and volunteers at our conference are required to agree with the following code of conduct. Organizers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.

Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.

Participants asked to stop any harassing behavior are expected to comply immediately.

Sponsors are also subject to the anti-harassment policy. In particular, sponsors should not use sexualized images, activities, or other material. Booth staff (including volunteers) should not use sexualized clothing/uniforms/costumes, or otherwise create a sexualized environment.

If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they'll be wearing branded t-shirts.

Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.

We expect participants to follow these rules at conference and workshop venues and conference-related social events.

Need help?

You have our contact details in the emails we've sent. Please feel free to approach (a few designated people we appointed to handle, emails here) to report any incidents. Rest assured it will be kept confidental.

Partners

Engineers.SGGeeksHackingGoSGHackerspaceSGPUGSRubySGSingaporeCSSSingaporeJS