Geekcamp Singapore 2022

{
  "title": "GeekcampSG 2022",
  "date": "2022-10-29",
  "inPersonLocation": "SP Digital, 180 Clemenceau Ave, Singapore 239922",
  "onlineLocation": "Discord, YouTube",
  "registration": "Get tickets!",
  "cfp": "CFP is now closed.",
  "volunteer": "Volunteer with us",
  "description": "Join us for an eventful day of geek talks."
}
Enter command. Type help to see available commands =>

Watch the Livestream

Geekcamp

Barcamp

What is
Geekcamp?

A one-stop event to get acquainted and grow your tech network in Singapore: a hybrid online + in-person GeekcampSG. The end goal: to reignite vibrant and inspiring meetups in the tech community.

GeekcampSG
X
Local Tech Communities

Local tech communities are most welcome to present a talk and get involved!

Rally your community to submit talk proposals relevant to your interest areas. There are limited slots for both headline and parallel tracks, so submit early to avoid disappointment! If your talk is accepted, we will work closely with you to promote it to GeekcampSG attendees and our social media.

For more information, get in touch with the organiser who contacted you. :)

Schedule - Oct 29, 22

Time shown is in SGT (UTC+8)

  • Opening

  • The horizontal overflow problem

    Track 0

    Have you ever visited a website on a phone only to find that when you want to scroll down, the entire page also sways from left to right due to some mysterious horizontal overflow? Unintended horizontal overscrolling is not a great experience. Let's break the problem down and also try to solve it.

  • Don't be shy - how to ask your senior devs for the help

    Track 1

    As a junior dev, have you ever wanted to ask your senior dev for help, but felt paiseh (Singlish for embarrassed)? My senior is so busy all the time... What if my question is too bodoh (Singlish for stupid) and irritates my senior? Let me teach you the art of asking good questions.

  • Let's learn about the Life2Well Project without frying your brain

    Track 0

    What might the collision of maker culture, data science, electroencephalograms, the Internet of Things, and climate science look like? In this session, we share a student-initiated project which explores this very intersection. Come join us and BYOCM (bring your own craft materials)!

  • Rolling Your Own Cryptography: Why You Shouldn't

    Track 1

    In 2019, a trivial flaw existed on Flickr that allowed user impersonation. It's one of many that come from flaws in the use of cryptography: And it's not the developer's fault; Crypto is fragile. This talk describes the wide contexts crypto is used (and attacked) and all that can go wrong.

  • Better migrations in PostgreSQL using Squawk

    Track 0

    Learn how Squawk can help improve your migrations and schema definitions in PostgreSQL. We will discuss the various rules that Squawk lints against and how they can lead to more resilient database design in PostgreSQL.

  • A Day in Cyber Security

    Track 1

    In the past edition of "Geekcamp.SG", I received a lot of queries on what it takes to start in CyberSecurity. This workshop is part presentation and part hands-on on some of the tasks and the different roles that a Cyber Security Blue Teamer might carry out.

  • Parsing Differential Problem

    Track 0

    As microservices have become popular in the current software engineering landscape, it is important to consider security risks arising from interactions between components within a system. We will explore the parsing differential problem and discuss remedies with examples.

  • Storage and Retrieval in databases from scratch

    Track 1

    Based on content from Martin Kleppmann's Designing Data Intensive Applications, go under the hood of databases and simulate with code examples (in JS), how DBs read and write files: append-only, hash index, LSMTrees and B+Trees. Also will touch on Online Analysis Processing DB strategies

  • ChIPs - Polycube (Voxel) Construction Set

    Track 0

    Have you wanted to use a construction set to build a model but don't want to deal with complicated techniques to remove studs/build sideways? Not Square? Too many different types of bricks? Something you can freely 3D print cheaply? etc. Look no further; this is the construction set for you!

  • The Lord of the Monorepos: An efficient setup with pnpm and NX

    Track 0

    One setup to rule all your repositories, One setup to find them, One setup to bring them all, and in the darkness bind them. On the laptop of the developer where the node_modules lie.

  • Verifiable Computing Project - Building truly open-source computing hardware

    Track 1

    Processors are at the heart of our devices. As they become more integrated with other functions, what do we know about how they work? Do we trust their designers? We present a computer design with a FPGA RISC-V processor implementation, allowing for the underlying hardware to be inspected.

  • The Unreasonable Effectiveness of Dumb Values

    Track 0

    There are many ways to solve a problem, some better than others: copy from StackOverflow, use a popular library, callbacks, promises, goroutines, meta programming, queue, regexes, and so on. But there’s one dumb approach that keeps ending up as the better solution in many situations: plain values.

  • Bitcoin, Blockchain & Cryptography, Part II: A look back of blockchain evolution over the last 10 years.

    Track 1

    I gave a Geekcamp opening keynote in 2012 titled "Bitcoin – How it is safer than you bank", when Bitcoin was barely known outside of a small group of users.This is a no-hype talk that covers both my personal journey in the blockchain scene, as well as evolution of blockchain, from my eyes.

  • Creating Art From Databases

    Track 0

    When I ask, what does a database look like? An ER Diagram may come to mind. How about, what does a DB sound like? Hmm.. maybe, the screams of one being accidentally deleted. Ultimately, art is made up of data. A song has notes, a painting has pixels etc. So, why not turn our databases into art?

  • Software best practices in a Hard(ware) world

    Track 0

    Software processes and best practices like version control, build automation and CI/CD are widely adopted in the software industry, but how to adapt these ideas to hardware design and development? Does git work on schematics? Can I automate hardware testing? Let's explore!

  • Understanding the TLS Ecosystem by Probing the Internet

    Track 0

    This talk looks at how to perform an internet-wide scan supporting TLSv1.3. We collect data from the entire IPv4 space on port 443 and analyze 9,461,056 data points to baseline the state of the TLS ecosystem. We conclude the talk by looking at how the ecosystem can be improved.

  • How Python 3.11 is Speeding Up

    Track 1

    Speed is coming to Python. After years of mostly stagnant year-on-year Python performance improvements, Python 3.11 is 25% faster than Python 3.10, thanks to various contributors. I'd love to share the technical details of how this was achieved.

  • Using math, statistics, and JavaScript - to automate the solving of WORDLE - so I will never need to do so again

    Track 0

    My wife is really addicted to Wordle, and she's been bugging me to try it every day, and compete for a better score then me ....But I suck at Wordle! So I used math, statistics, and JavaScript - to automate solving of wordle for me (so I will never need to do so again)

  • The L4 Compiler: a toolchain for a DSL for law

    Track 1

    Programmers and lawyers do the same thing: we anticipate a range of future scenarios and try to say what is, and is not, supposed to happen in each one. But lawyers program in English. What if CS had been invented before law? What would lawyers be programming in instead?

2022
Speakers

Chen Hui Jing
Chen Hui Jing

Shopify
Chew Choon Keat
Chew Choon Keat

Head of Engineering, Hobnob
Chinmay Pendharkar
Chinmay Pendharkar

CTO, Subnero
Eugene Cheah
Eugene Cheah

CTO, Uilicious
Gao Wei
Gao Wei

Senior Engineer, BlackRock
Joyce Ng
Joyce Ng

Chief Technical Officer, Hyan Technologies Pte. Ltd.
Jules Poon
Jules Poon

Hobbyist
Ken Jin
Ken Jin

Contributor, CPython
Kenneth Y T Lim
Kenneth Y T Lim

National Institute of Education
Kenny Shen
Kenny Shen

Programmer, Genk Capital
Liao Choon Way
Liao Choon Way

Inventor/Engineer, Independent
Muhammad Hazwan
Muhammad Hazwan

Senior Cyber Security Researcher, Custodio Technologies
Nguyen Duc Minh Anh
Nguyen Duc Minh Anh
Nguyen Thien Minh Tuan
Nguyen Thien Minh Tuan
Sam Poder
Sam Poder

Software Engineer, Hack Club
Shi Ling
Shi Ling

CEO, UIlicious
Sim Cher Boon
Sim Cher Boon

Security Engineer, Grab
Thomas Huchedé
Thomas Huchedé

Consultant, Zenika
U-Zyn Chua
U-Zyn Chua

Co-Founder & CTO, Cake DeFi
Wong Meng Weng
Wong Meng Weng

Principal Research Fellow, SMU YPHSOL
Wong Wai Tuck
Wong Wai Tuck

Senior Penetration Tester
Zhi-Yang Ten
Zhi-Yang Ten

Software Developer, Shopify

What People Said

Code
of
Conduct

All participants are expected to adhere to the CoC both onsite and online. The guiding principle is respect and care for self and others. Examples of unacceptable behaviours include (not exhaustive):

  • Offensive comments related to gender identity and expression, sexual orientation, disability, mental illness, neuro(a)typicality, physical appearance, body size, race, or religion
  • Gratuitous or off-topic sexual images or behavior in spaces where they are not appropriate
  • Threats of violence or incitement of violence towards any individual, including encouraging a person to commit suicide or to engage in self-harm
  • Publication of non-harassing private communication or another member's personal information without their explicit consent

The CoC applies to all GeekcampSG attendees, including organisers, sponsors, speakers and talk attendees.

Reporting violations

In the event that you need to report a CoC violation:

  1. Reporting methods
    1. On-site
      • Approach any Geekcamp organiser (wearing an Organiser shirt)
      • Alternatively, head to the registration desk and inform the volunteers that you would like to report a violation.
    2. Online: Discord
      • Create a ticket at Contact Us > #report-issue. A new, private ticket channel will be created under the Tickets category, where you can send a moderator more details on the violation.
      • If you feel uncomfortable creating a ticket, feel free to reach out to us via private message.
  2. What to include when reporting
    • Identifying information of the participant doing the harassing
      • On-site: Name and outfit description
      • Online: Discord username (Username#1234), server nickname
        • Discord username: Right-click on the participant’s profile picture.
        • Server nickname: The name displayed on top of the message.
    • The behaviour that was in violation
    • The approximate time of the behaviour
    • The circumstances surrounding the incident
    • Evidence of the violation, if available
      • Online: A screenshot of the conversation where the violation occurred

We will respect confidentiality requests for the purpose of protecting victims of abuse. At our discretion, we may publicly name a person about whom we’ve received harassment complaints. We will not name harassment victims without their affirmative consent.

Consequences

The participant will face the following, in order of increasing severity:

  1. Time-out

    If a participant has exhibited concerning behavior, as outlined in the rules, they may be pulled into timeout. During timeout, the participant will have a discussion with our Code of Conduct representatives about any concerning behaviors until we have come to an agreement.

    1. On-site

      The participant will be separated from other participants and have a discussion with our Code of Conduct representatives in a private setting.

    2. Online

      The participant loses access to all channels on the Geekcamp server other than timeout. Only the timed-out participant and the mods will be able to see the conversation.

  2. Kicked from Geekcamp Conference
    1. On-site

      The participant will be escorted off the premises and will not be allowed to re-enter.

    2. Online

      The user will be banned from the Geekcamp Discord server.

  3. Escalation to authorities
    1. On-site

      Geekcamp organisers will liaise with the venue host to initiate actions such as reporting to building security and/or police for their follow-up action.

    2. Online

      Geekcamp organisers will provide supporting evidence to Discord administrators and/or local law enforcement authorities for their follow-up action.

Sponsors

Platinum Sponsor
Gold Sponsor
Silver Sponsor

Partners

Organisers

Alan
Alan
Alvin
Alvin
Ambrose
Ambrose
Brian
Brian
Chiran
Chiran
Don
Don
Eliot
Eliot
Hazel
Hazel
Hong Kheng
Hong Kheng
Jian Zhen
Jian Zhen
Juliana
Juliana
Li Hau
Li Hau
Luther
Luther
Mr Gi
Mr Gi
Nori
Nori
Patricia
Patricia
Perwyl
Perwyl
Sam
Sam
Sam Poder
Sam Poder
Shao
Shao
Sreedhar
Sreedhar
Stephanie
Stephanie
Terence
Terence
Thye
Thye
Tomoe
Tomoe
Vina
Vina
Wei Tat
Wei Tat