IEEE Computer Society (Singapore Section)

December 1st, 2015

An in-depth look at Google BigQuery & some use cases

Friday, December 4 2015 | 5:30pm – 8:00pm

Ayer Rajah Crescent, NUS Enterprise@Blk71, #02-01


IEEE Singapore CS presents you the following event organized by GDG Singapore.

Please register via



September 15th, 2015

Be Internationally Recognized as a Certified Software Quality Assurance (CSQA)

3 – 5 November 2015 |9 am – 5 pm

SCS Resource Center



IEEE Singapore CS presents you the following event organized by Singapore Computer Society:


Raise the Bar for your Software Quality Assurance skills and stand out from the rest in your profession.
Be a part of the elite community of QA practitioners.


Why You Should Attend?

Quality Assurance is a professional competency whose focus is directed at critical processes, which has a direct impact on the success of an IT project.  As an IT specialist, it is imperative that you are equipped with the essential skills to identify, propose and execute tactical process improvement initiatives that are strategically aligned to the goals of the organization.  Being certified not only proves to your employee that you are trained to analyze, resolve and streamline potential gaps in the process but also demonstrate your professionalism in this field.


Major Benefits of Attending – You Will Be Able To:

  • UNDERSTAND quality concepts and principals
  • ESTABLISH foundation of a quality-managed environment
  • APPLY systematic framework to baseline your quality performance
  • MANAGE and execute quality planning with process management concepts and process
  • LEARN the various types of quality control practices that are applied throughout the product change and operation
  • UNDERSTAND AND APPLY concepts related toVerification and Validation
  • LEARN AND APPLY techniques of Review, Testing and Internal Auditing
  • REVIEW process when it comes to outsourcing, COTS and contracting quality and measurement
  • OBTAIN free one-year SCS membership to continue advancing your professionalism with wide range of ICM themed seminars


Who Should Attend?

  • Quality Analysts
  • Requirement Analyst
  • Project Managers
  • Software Developers
  • IT specialists who are involved in leading process improvement initiatives


Group discount of 10% for 3 or more registrants and government funding support available.


As seats are limited, do register HERE soon. For further queries, feel free to contact me at 6226 2567 ext 15 or email:


June 28th, 2015

Google IO Extended – Singapore

Friday, July 10, 2015


IEEE Singapore CS and GDG Singapore in association with Google will be organizing an IO Extended 2015 event in Singapore on July 10 2015 (Friday).

The following topics will be covered:

Google Cast:
– Introduction to Google Cast & Chromecast
– Adding Google Cast to Android Apps

Material design:
– What’s new in Material design
– Material design in action, app architecture

Virtual Reality, App Indexing:
– Google Card Board and Virtual Reality
– Android App Indexing

Using Ads for monetization:
– Admob for developers
– Ads for Mobile Apps

The event time and venue are as follows:

Date: July 10 2015
Time: 09:00AM – 06:00PM
Venue: Auditorium @ Matrix Building, Biopolis

Registration fees are as follows:

Public and Partners: S$20
GDG Members: S$10 (until July 3, 2015)
IEEE CS Members: S$10 (until July 3, 2015)

IEEE CS members are reminded to register before July 3 to enjoy the subsidized price. Please register through this link. IEEE CS members can register through the same channel as the GDG members in the registration webpage.


June 18th, 2015

SCS Workshops on Secure Software Development Model (24-25 Aug) & Secure Development for Banking & Finance (31 Aug-01 Sep)


IEEE Singapore CS is pleased to announce the upcoming SCS workshops on Secure Software Development Model and Secure Software Development for Banking & Finance. IEEE Singapore CS members will enjoy a 10% discount on the guest rate or SCS rate (if he/she is a SCS member).

The TWO 2-day workshops will be focusing on the implementation of Secure Software Development practices and adaptation of the practices with cloud computing and Agile methodologies but targeting to different industries. Join this upcoming training workshops that guide you on the best practices for Secure Software Development. The seminars have received glowing recommendations from past participants.

Register today and indicate ‘IEEE-SCS 2015’ besides your name to enjoy the 10% discount on your registration rate!

Please contact Sharon at 6226 2567 ext 15 or email at for further assistance.




June 2nd, 2015

SCS IT Law Seminar : Managing Personal Data Collection and Data Breaches [New]

Friday, 26 June 2015

SMU, SIS Seminar Room 2.3, 80 Stamford Road


IEEE Singapore CS is pleased to announce the upcoming SCS seminar on IT Law. IEEE Singapore CS members will enjoy a 10% discount for every group of 3 sign-ups.

What’s next after having put in place the procedures and policies to govern your organization’s data privacy and security? Having rules in place does not mean your people know them. Or that they will be sufficient in practice. Moreover, do you know what to do when a data breach occurs?

Attend this power-packed seminar and glean best practices and tips on how to comply with the law and the newly released PDPC guidelines. Know how to evaluate and manage your collection activities. Know what it is you need to do if a breach occurs and you need to control and mitigate the damage.

People have already been convicted of offences under the PDPA. One business paid $78, 000 in fines; another $27,000. The maximum penalty is $1 million. SMEs cannot afford that kind of punishment. Join us in this session to lower your risks of being punished.

Register HERE or contact Cindy at tel: 6226 2567 ext 10 or for further assistance.



June 2nd, 2015

Hackathon@SG 2015

25-26 July


Hackathon@SG 2015


The IEEE Singapore Computer Society in collaboration with Information Technology Standards Committee (ITSC) and Infocomm Development Authority of Singapore (iDA) are pleased to announce the Hackathon@SG 2015.

The Infocomm Development Authority of Singapore (IDA) and the IT Standards Committee are organizing their largest hackathon ever by combing the code::XtremeApps:: and Data in the City. The technologies for this year’s hackathon are as follows:

  • IoT
  • Virtual Reality
  • Cloud Computing
  • Open Data

Hackathon@SG will challenge participants to work on urban challenges impacting Singapore and help ideate, code, and create solutions to contribute towards Singapore’s Smart Nation building efforts. There will be more than S$50,000 worth of prizes up for grabs, you just have to checkout Hackathon@SG!

Hackathon@SG 2015 will comprise 3 overarching categories:

  • Junior Category for children aged 12 and below. Participants in this category will create animations using Scratch, a free educational programming language. Please click here to sign up for the Junior Category hackathon.
  • Student Category for all students. Participants in this category will be tasked to build solutions using IoT technologies. Please click here to sign up for the Student Category hackathon.
  • Open Category for working professionals and computer programming enthusiasts. Participants in this group will be tasked to create innovative applications using Open Data, and have an option to use IoT technologies as well.


For more information please refer to or contact the organizers via or


UPDATE: The registration deadline has been extended to July 16!

September 25th, 2014

On 27 August 2014, the IEEE Computer Society and the Singapore Computer Society (SCS) had signed an unprecedented Memorandum of Understanding (MoU) in Singapore between our IEEE-CS President, Dejan Milojicic, and the SCS President, Chak Kong Soon. Through this MoU, both organisations have planned to bring many more exciting technical and social activities to all our members in Singapore.

For a good start, members of the IEEE-CS Singapore Section can enjoy a 20% discount of the membership dues when you sign up as a new member with SCS now, and vice versa.

[nggallery id=20]

August 6th, 2014

Prize Presentation Ceremony and Showcase

Date: 5 August 2014

Venue: Auditorium, Level 2, National Design Centre, 111 Middle Road, Singapore 188969


Co-organized by Infocomm Development Authority of Singapore (IDA) and Information Technology Standards Committee (ITSC), the code::XtremeApps 2014 is a 24-hour Hackathon Challenge held annually, with both Open Category and Junior Category.  The IEEE Computer Society Singapore Section is proud to be a supporting organization of this year’s event.


















[nggallery id=19]


May 5th, 2014

Today we had an interesting talk by Fabio di Franco on the topic of

Wireless Body Sensor Network (WBSN): suitable Wireless protocols and propagation characteristics around the human body.

[nggallery id=18]


Wireless body sensor network (WBSN) is a promising technology for caregivers to provide continuous heath monitoring on dedicated health parameters, such as blood pressure, ECG, motion, SpO2, etc. Due to body blockage and limited battery capacity, reliability and energy efficiency is a fundamental challenges in the practical use and deployment of WBSNs.
This seminar will be divided in 2 half an hour presentations:
Wireless protocols suitable in Wireless Body Sensor Networks: It includes a tutorial on IEEE802.15.6, Zigbee, Bluetooth Low energy and an analysis of the protocol performance for Wireless Body Sensor applications.
Propagation Characteristics around the human body and topology analysis An analysis of the propagation conditions based on human mobility, environment (indoor /outdoor), sensor positions will be presented. It will also includes an analysis of the suggested network topology in terms of reliability, energy consumption, network lifetime.

About the speaker:

Fabio Di Franco is a PhD Student from University of Palermo-Italy. He is currently doing part of his PhD in I2R under the supervision of Dr. Ge Yu.
Fabio started his career as a RF engineer in Motorola in 2004 designing the Front end of 3G mobile phones. In 2006 Fabio moved to Cambridge Silicon Radio (CSR) where he was Hardware and Radiofrequency applications engineer in Bluetooth technology. In 2009 he joined the WISAR Lab, an Irish hub of technology solution for Wireless Sensor Networks where he worked as a research engineer. In 2012 he started his PhD in Electronic Engineering focusing on Reliable and Energy Efficient Wireless Body Sensor Networks for Human-centric Sensing Applications. He published 5 papers in IEEE conferences and two journal papers.
Fabio holds a full 5-year degree in Electronics and Telecommunications from University of Palermo and a master in Radio frequency from University of Messina.

March 13th, 2014

Subramanian pic

Today we had two interesting talks presented by Prof. K Subramanian.
Vice Chair, IEEE Computer, Education Society Delhi Section;
Chair, Technology Management Council, IEEE Delhi.

About the speaker:

Prof. K Subramanian was the first director and Professor at Advanced center for Informatics and Innovative Learning (ACIIL) and introduced Advanced Technology, Engineering and Management Courses at the Masters Level and started Research Programs in the Interdisciplinary areas of Knowledge Management, Informatics and Information and Communications Technologies and Management through Partnership Institutions at IGNOU.

He has contributed to many International/National Bodies: as a Panel Member in some of UN Technological Committees including ICAO(International Civil Aviation Organisation), served as the Indian Representative in the International Federation for Information Processing (IFIP), TC-11, Immediate Past Chairman of Bureau of Indian Standards’ LTD-38 -Committee on Information systems & Security, Member-MSD 7: Quality management systems committee of BIS in finance and also as a Member for Universal curriculum committee in the area of IT security and audit–ISACA (USA). He was the Vice chairman of the Task force on Identity managemet, set up by Government of Indias Department of Information Technology and awarded a UN fellowship.

Prof. Subramanian was also a Visiting Professor at National Institute for Multimedia Education, Japan, adjunct professor at IIM Lucknow, IIT Delhi, Fore School of Management, IIM Bangalore, IMT Ghaziabad, MDI and NILLM, IIITM Kerala, IIIT Bangalore.

Prof. Subramanian holds a B.Sc. degree from Madras University and B.E., M.E. in Electronics and Communications Engineering and Ph.D. in Computer Science & Automation from Indian Institute of Science, Bangalore. Awarded Doctor of the Faculty Degree from Commonwealth Open University, UK and appointed as a Life Visiting Professor at COU.

[nggallery id=17]

Securing the Unsecured in Cyberspace: Cyber Security→Cyber Assurance

Internet, Globalization, the Information technology and web technologies have made the world flat today as a global village, transcending political and national boundaries.  They interconnect people all over the world in the virtual world of cyberspace– the virtual space behind the computer screen. Innovations in communications technology keep us all wired 24/7.  Cyberspace is currently used for social interactions and networking through emails, instant messaging or video telephony, while the commercial enterprises and organizations transact business globally, transferring massive information and funds at phenomenal speed through optical fibres using wireless and satellite technology.

With the advent of Internet of Things and the associated technologies, we can see and feel the reorientation of business transformations, business deliveries and electronic transactions handled and Electronic Delivery Systems undergoing massive transformation.  As organizations have become more dependent on the networks and business transactions, external data sharing and simple day to day communications, the need drives the networks to be more transparent and accessible but also protected from illegal access and abuse.   It is also fraught with threats from organized criminals of the Cyber underworld running an underground Cyber Economy.  There is thus a need for governing this virtual world to support global social, political, economic collaboration and exchange while managing associated risks. The objective is to provide trustworthy and efficient computing in Cyber space, calling for a effective Governance of cyberspace. This is a paradigm shift from eSecurity to eAssurance1 in cyberspace. This presentation outlines the ramifications of governing such a cyberspace that impacts individual human life, social life, global business and governments on such a massive scale in a border-less world, and describes the different facets of Cyber Governance and how do we design and implement efficient, effective and trustworthy Cyber Governance systems?  Ultimately Cyber Governance must lead to cyber-assurance, that Governance leads to IT value delivery and IT risk management, with due consideration of  the global, national and corporate perspectives of Cyber Governance and Cyber Assurance. A multilayer model Cyber/Business Assurance will be outlined, comprising managerial, operational, technical, financial, legal and revenue assurance. The Research Challenges and Cooperation covers Digital Asset Protection, & Assurance, Digital/Cyber Forensics for BFSI, Energy, Aviation, Transportation, IT/ITes services, Health Care & education, Threat Models for insiders’ threats & External Threats, Security Assurance for Digital Archives-Protect tools and techniques.

Today the current security solutions are basically comprised of multi-point products designed for an isolated task (such as detecting a virus, preventing an intrusion).  This results in lack of interoperability, unmanageability and a higher cost of ownership. Integrated security is emerging as an effective approach to address the new challenges. Multiple security technologies such as anti-virus, firewall intrusion and combines policy compliance management, service and support and advance research for more complete protection.  The holistic addressing of security at each tier and of the network (i.e. client, server, gateway), the organizations are able to reduce cost, improve manageability, enhance performance, tighten security and reduce risk exposure. A challenge of perfect security is not practical, economical, or achievable—Sound practices, not best practices, will prevail. The elements of any holistic model need to address culture, policy and procedures, technology, alliances, harmonized legislation, and trusted enterprise challenges. eSecurity, Group sector specific standards & Six Sigma Approach:

Different standards covers different aspects of the process, environment, services, quality etc., No one Standard Covers All.  Every enterprise expects an assurance and cyber assurance is complex.

Assuring Quality Engineering Education for ALL

A Techno-Management framework covering content development, faculty interaction, and delivery and Educational governance Using Open source-Technology is an Enabler for Sustainable development

Emerging Telecommunications, Information & Media Technologies play a vital role in social development of any nation.  In a developing country like India, the Information Technologies and another associated supporting technologies facilitate, catalyze and help in organizing, gathering, structuring, analyzing and making information available for decision makers for devising and implementing various socio-economic development programs for making India as “super power in the new millennium”.  In order to thrive in this transition economies, the Information and Communication Technologies play a vital role in the way in which businesses are conducted, enable cost economy and improve the productivity of the work force in order to compete and survive in the market/consumer driven environments.  What we have at present is “a first generation system/process, a second generation layer, third generation concepts, fourth generation computers and fifth generation aspirations”.  The parameters, which are driving global competitiveness such as TQM, use of IT, innovation, market penetration, implementation strategies and up gradation in the work place are vital to be adapted in the Indian environment to adapt a “framework of transition”.  This involves, Re-literate the Mind, Re-tool the Body and Re-vitalize the Spirit.  We have to graduate from not only automating the environments but also work out strategies for managing around outcomes, from individual excellence to team excellence and also utilizing communication to service at all levels.  Legacy systems/processes/procedures/rules inherited to be reframed for self-reliance.  We are going to experience a fast phase of change in the next few years compared to the last 50 years what we had.  We are going to be pushed into living with uncertainty in the years to come.  What we need is speed of action, which matters the entire operation of the Governance, Government, Industry and Services.  The technological/regulatory/time/distance barriers are slowly disappearing.  The convergence of technologies and use of Internet as a catalyst and emerging of global telecommunication is opening new worlds for the individuals and society.  The more high tech we get, the more high touch we are in this paradoxical world.  The challenges such as People, Processes, Customers and Partners to work out successful relationship and achieve operational excellence and make organizations more effective by use of these technologies and processes.  The global network is driven by self-organizing concept and the feedback system enables self-correction.  The transformation is from the “Technological phenomena” to the “Social phenomena” which will enable the money to grow towards “Talent Energizing Resources”.  “The Internet changes everything”.  Every worker is transformed to be a knowledge worker.  The businesses will become customer centric.  The knowledge management assumes greater significance.  The business and commerce will become more “E” centric.  The companies/industry will reform itself to work in the newly wired economy.  The whole world will become global village.  The Technologies will pave the way for better-managed economies.  Any country adapting the above strategies will certainly become the super power in the next millennium.  Every country has to frame a strategy, vision, mission and implementation priorities with customization and localization of needs. The Internet, which is a fast development open infrastructure, is deployed for education and has opened up new opportunities in learning.  It offers companies a powerful tool to turbo charge their work-force learning efforts.  It creates new “learning space” industry.  E-Learning enables reinventing the way we learn things in our life.  e-Learning is an appealing innovative concept for companies and learners.  New learning value proposition where the power of the responsibility of learning is given to the individual learners.  In the past, organizations and trainers were the ones who took charge in providing learning opportunities and designing contents.  With e-learning, learners can receive customized training curricula according to his needs and his own time, pace and plays without compromising its effectiveness.  Learning content can be granulized into bite-sized modules that meets the learners’ needs.  Learner can also engage in collaborative learning and benefit from the experience and expertise of like-minded learners worldwide.  This is impossible at the traditional set up except at an exorbitant cost.  E-Learning offers plug-and-play training modularity, thus benefiting adult learners, enabling them effectively balance their work and family commitments while learning and enriching their skill sets.  It enables learner access to knowledge information resources and services on a scale unimagined before. E-Learning hence makes learning “convenient, relevant and enjoyable”. Everyone is talking about “change” in the new millennium.  The only one constant thing in the world is “change”.  The change is changing faster with new generation of inventions.  There are two components of the change, one is pace of change and other one is force of change.  To achieve 15 Million users penetration, telephone technology took 75 years, radio technology took 30 years, TV technology took 13 years, wireless technology took 12 years and Internet technology took only less than 5 years.  The convergence of technologies leads to e-revolution.  The four ‘C’s assume greater significance. C-ComputerGiga htz. Chips will make super computers to be available on desktops; C-Communication Voice over I/P, fax over I/P, email, Music (MP3), video image (streaming technology), 3 G wireless. C-Content New media development-multi-media technologies ;C-Consumer Electronics Intelligent and interactive appliances and interfaces.  Today personal computers streams video; the telephone provides access to WEB, wireless phones handle online transaction, tomorrow Internet based devices will do everything with the limitation of our own Imagination and Creativity. Technology is Neutral; the challenge is to enhance technology and innovate with it ahead of competition.   Creative destruction is the new rule of the game.  What worked well in the old economy has lost relevance in the new economy.  Old economies thrust on quality and productivity level to low cost production and high margin of productivity.  New economy stress on bright ideas, which are the new raw materials from making everything intelligent and integrated to the work culture.  Competitive issue is value creation; new break through products and services is the need of the hour.  Designing effective learning solutions to implement on demand learning.-Success of e-learning depends on the way learning solutions are designed and content is delivered.  An effective and appropriate pedagogy is required to teach learners and verify that they acquire the knowledge and competence to the desired level.  Design of response in e-learning environment is the need of the hour.  It is based on the content and process information based cognitive and learning models.