Hackathon 2011-12

From SkullSpace Wiki
Revision as of 22:30, 28 November 2011 by Ron (talk | contribs) (Created page with "== What == It's been a year since SkullSpace started, and it's time to have a special hackathon! We've lined up some great speakers and projects to keep you busy on a cold Dece...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

What

It's been a year since SkullSpace started, and it's time to have a special hackathon! We've lined up some great speakers and projects to keep you busy on a cold December day! If you've never been to SkullSpace before, or if you come every day, you're welcome to join us!

Usually what goes on is something of a social event, with people talking about all kinds of things, trying out some lock picking, playing video games, sampling bake sale delicacies and generally just having a good time. The original intent was to get the amazing SkullSpace community together to work on projects and bounce ideas around, but it has evolved from that into something of a geek social with a focus on learning something new. There are still a handful of people that come out to work on their projects and everyone is welcome to bring anything they're currently working on to show off or just hack on with others. Even if you know nothing about coding/hacking/etc don't be afraid to stop by, our members are all types of creatives from architects and programmers to graphic designers and amateur radio enthusiasts.


When and Where

December 17 is the day of our December hackathon! It will be held in our space on the 3rd floor of 125 Adelaide. We open the doors at noon, and the first talk is at 2:00. It tends to end between 6 and 8pm.


Talks/Workshops

When Who What Description
2:00 Ian Trump Threat Intelligence Brief Is Cyber Armageddon coming? Is a Cyber Apocalypse on the horizon? Ian Trump will share his latest knowledge and research on the business threat landscape with all participants. You will learn about what steps business can take to be resilient against an emerging , dynamic and persistent attempts to breach corporate networks. Leveraging inputs from the US DoD and Canadian Forces, Ian maps out the origins of Advanced Persistent Threats, Attacks on Supervisory Control and Data Acquisition Systems and deconstructs the buzz word of the week, Cyber espionage.
3:00 DigitalBlue Lockpicking Have you ever wondered how a lock works? And how they can be bypassed? Wonder no more!
4:00 Burke Libbey CoffeeScript

Bake "Sale"

Who What Vegan?
Ron Something Yes

What We Need

Who What
??? Drapes for the windows in the Education room

Projects / Contests

We're discussing having a contest similar to the "555 contest", where people will be given a particular piece of hardware and given a set period of time to do something cool with it. More details as this unfolds!