Enter command. Type help to see available commands=>
Watch the Livestream
What is Geekcamp?
A one-stop event to get acquainted and grow your tech network in Singapore:
a hybrid online + in-person GeekcampSG. The end goal:
to reignite vibrant and inspiring meetups in the tech community.
Local Tech Communities
Local tech communities are most welcome to present a talk and get
Rally your community to submit talk proposals relevant to your interest
areas. There are limited slots for both headline and parallel tracks, so
submit early to avoid disappointment! If your talk is accepted, we will
work closely with you to promote it to GeekcampSG attendees and our social
For more information, get in touch with the organiser who contacted you.
Have you ever visited a website on a phone only to find that when you want to scroll down, the entire page also sways from left to right due to some mysterious horizontal overflow? Unintended horizontal overscrolling is not a great experience. Let's break the problem down and also try to solve it.
Don't be shy - how to ask your senior devs for the help
As a junior dev, have you ever wanted to ask your senior dev for help, but felt paiseh (Singlish for embarrassed)? My senior is so busy all the time... What if my question is too bodoh (Singlish for stupid) and irritates my senior? Let me teach you the art of asking good questions.
Let's learn about the Life2Well Project without frying your brain
What might the collision of maker culture, data science, electroencephalograms, the Internet of Things, and climate science look like? In this session, we share a student-initiated project which explores this very intersection. Come join us and BYOCM (bring your own craft materials)!
In 2019, a trivial flaw existed on Flickr that allowed user impersonation. It's one of many that come from flaws in the use of cryptography: And it's not the developer's fault; Crypto is fragile. This talk describes the wide contexts crypto is used (and attacked) and all that can go wrong.
Learn how Squawk can help improve your migrations and schema definitions in PostgreSQL. We will discuss the various rules that Squawk lints against and how they can lead to more resilient database design in PostgreSQL.
In the past edition of "Geekcamp.SG", I received a lot of queries on what it takes to start in CyberSecurity. This workshop is part presentation and part hands-on on some of the tasks and the different roles that a Cyber Security Blue Teamer might carry out.
As microservices have become popular in the current software engineering landscape, it is important to consider security risks arising from interactions between components within a system. We will explore the parsing differential problem and discuss remedies with examples.
Based on content from Martin Kleppmann's Designing Data Intensive Applications, go under the hood of databases and simulate with code examples (in JS), how DBs read and write files: append-only, hash index, LSMTrees and B+Trees. Also will touch on Online Analysis Processing DB strategies
Have you wanted to use a construction set to build a model but don't want to deal with complicated techniques to remove studs/build sideways? Not Square? Too many different types of bricks? Something you can freely 3D print cheaply? etc. Look no further; this is the construction set for you!
The Lord of the Monorepos: An efficient setup with pnpm and NX
Processors are at the heart of our devices. As they become more integrated with other functions, what do we know about how they work? Do we trust their designers? We present a computer design with a FPGA RISC-V processor implementation, allowing for the underlying hardware to be inspected.
There are many ways to solve a problem, some better than others: copy from StackOverflow, use a popular library, callbacks, promises, goroutines, meta programming, queue, regexes, and so on. But there’s one dumb approach that keeps ending up as the better solution in many situations: plain values.
Bitcoin, Blockchain & Cryptography, Part II: A look back of blockchain evolution over the last 10 years.
I gave a Geekcamp opening keynote in 2012 titled "Bitcoin – How it is safer than you bank", when Bitcoin was barely known outside of a small group of users.This is a no-hype talk that covers both my personal journey in the blockchain scene, as well as evolution of blockchain, from my eyes.
When I ask, what does a database look like? An ER Diagram may come to mind. How about, what does a DB sound like? Hmm.. maybe, the screams of one being accidentally deleted. Ultimately, art is made up of data. A song has notes, a painting has pixels etc. So, why not turn our databases into art?
Software processes and best practices like version control, build automation and CI/CD are widely adopted in the software industry, but how to adapt these ideas to hardware design and development? Does git work on schematics? Can I automate hardware testing? Let's explore!
Understanding the TLS Ecosystem by Probing the Internet
This talk looks at how to perform an internet-wide scan supporting TLSv1.3. We collect data from the entire IPv4 space on port 443 and analyze 9,461,056 data points to baseline the state of the TLS ecosystem. We conclude the talk by looking at how the ecosystem can be improved.
Speed is coming to Python. After years of mostly stagnant year-on-year Python performance improvements, Python 3.11 is 25% faster than Python 3.10, thanks to various contributors. I'd love to share the technical details of how this was achieved.
Programmers and lawyers do the same thing: we anticipate a range of future scenarios and try to say what is, and is not, supposed to happen in each one. But lawyers program in English. What if CS had been invented before law? What would lawyers be programming in instead?
All participants are expected to adhere to the CoC both onsite and online.
The guiding principle is respect and care for self and others. Examples of
unacceptable behaviours include (not exhaustive):
Offensive comments related to gender identity and expression, sexual
orientation, disability, mental illness, neuro(a)typicality, physical
appearance, body size, race, or religion
Gratuitous or off-topic sexual images or behavior in spaces where they
are not appropriate
Threats of violence or incitement of violence towards any individual,
including encouraging a person to commit suicide or to engage in
Publication of non-harassing private communication or another member's
personal information without their explicit consent
The CoC applies to all GeekcampSG attendees, including organisers,
sponsors, speakers and talk attendees.
In the event that you need to report a CoC violation:
Approach any Geekcamp organiser (wearing an Organiser shirt)
Alternatively, head to the registration desk and inform the
volunteers that you would like to report a violation.
Create a ticket at Contact Us > #report-issue. A new, private ticket channel will be created under the
Tickets category, where you can send a moderator more details on
If you feel uncomfortable creating a ticket, feel free to reach
out to us via private message.
What to include when reporting
Identifying information of the participant doing the harassing
On-site: Name and outfit description
Online: Discord username (Username#1234), server nickname
Discord username: Right-click on the participant’s profile
Server nickname: The name displayed on top of the message.
The behaviour that was in violation
The approximate time of the behaviour
The circumstances surrounding the incident
Evidence of the violation, if available
Online: A screenshot of the conversation where the violation
We will respect confidentiality requests for the purpose of protecting
victims of abuse. At our discretion, we may publicly name a person about
whom we’ve received harassment complaints. We will not name harassment
victims without their affirmative consent.
The participant will face the following, in order of increasing severity:
If a participant has exhibited concerning behavior, as outlined in the
rules, they may be pulled into timeout. During timeout, the
participant will have a discussion with our Code of Conduct
representatives about any concerning behaviors until we have come to
The participant will be separated from other participants and have
a discussion with our Code of Conduct representatives in a private
The participant loses access to all channels on the Geekcamp
server other than timeout. Only the timed-out participant and the
mods will be able to see the conversation.
Kicked from Geekcamp Conference
The participant will be escorted off the premises and will not be
allowed to re-enter.
The user will be banned from the Geekcamp Discord server.
Escalation to authorities
Geekcamp organisers will liaise with the venue host to initiate
actions such as reporting to building security and/or police for
their follow-up action.
Geekcamp organisers will provide supporting evidence to Discord
administrators and/or local law enforcement authorities for their