Category Archives: IT EVENTS

Hacking, Design Concepts, and Network Security for Simpletons

Has everyone tried to hack their neighbor’s Wi-Fi hotspot? Or maybe looked into the deep web, curious about the magic of the world-wide web. In bad cases, is your hotspot the one being hacked into? Worry no more, this article will taket you to the basic steps in securing your network. We will also try to bring you inside the mind of your not-so-friendly neighborhood hacker.

Campus Devcon at De La Salle Araneta University

Brace yourselves, summer is coming! But this does not end the overspread of knowledge brought by Developers Connect Phillipines around the country. So just before the semester wraps up, DevCon PH landed on De La Salle Araneta University and poured down a heavy rain of information among the university’s ecstatic collegiate.

Friday, March 24. The students did not mind entering the weekend by spending just a little more of their time listening to lightning talks even until dusk. The seminar started a bit late in the afternoon. Nevertheless, the enthusiastic students learned a lot from the ever-inspiring speakers featured on that day.

cdevDlsau (1)
Jun de Jesus, the event host, interviews some of the students to break the ice.
cdevDlsau (2)
JC Marquez, the event lead, introduces DevCon PH.

An Ethical Hacker

“Warriors of the night, assemble!” No, hackers don’t yell out this dorkily phrase before committing their honest crime. They can be called cyber soldiers, the stealth warriors of the cloud. But for educational purposes and a more appropriate disambiguation, ethics iis applied. Therefore, penetration testers is a wiser industry-friendly designation.

There are three methods in the philosophy of penetration attacks. The first one is called Black Box. This is where the hacker tries to penetrate into a network without actually knowing anything about the target, it’s like starting from a blank piece of paper, and the hacker should be able to draw his way into a progressive full detailed masterpiece. This method requires an advanced hacking ability. Knowing where to come in and what to do once so is the main idea of infiltrating a network. When an attack is only made to get to know its target and there is no manipulation performed, it is called a reconnaissance attack. It’s like going on a first date without planning to take it all the way just yet.

If the ethical hacker is provided with his starting course, and they only need to fill it up, that method is called the White Box. This skips the first step of the earlier method, which is knowing the target’s profile and the main doors in their network. Companies use this method to save time and money. Since black boxing requires a demanding amount of work and time is of the essence, this method solves that constraint.

The last method, called the Grey Box, is a coalescence of the two earlier methods. There are two teams, the insiders, and the outsiders. The insiders give information to the outsiders and the latter black box their way inside.  The disadvantage to this approach is the probability of overlooking other vulnerabilities since the attackers are already provided with the way in. Although mindful checklisting can be planned to avoid this problem.

The concept of these methods is narrowly defined here. But if you get the idea, you can pass a Q&A in basic networking exploit. Now that you know the three methods of philosophical hacking, you are now ready to be a hacker. Kidding. You are not. There are a couple more things you need to keep in mind. DevCon speaker Emmanuel Alcartado further adverted his ethical hacking cmd-ments to the audience:

Thou shalt not set thy goals. Only fulfill what your client tells you to do, do not wander off, remember that curiosity killed the cat. Moreover, thou shalt plan thy work, lest thou go off course. Take that checklist and jot it in your head. But when your unshakable and you really want to take a turn, thou shalt obtain permission. You should always remind yourself that you are a working professional.

However irresistible, climb on to your discipline. Thou shalt respect privacy of others. Do not break the law for your own deluded perversion. Thou shalt do no harm, your client writes your paycheck, don’t make them fire you. Thou shalt use a scientific process, like writing a case study.

When you use an application to infiltrate, and it is not yours, make sure to acknowledge its original creator and avoid claiming it as your own. Thou shalt not covet thy neighbor’s tools. And when you are done with your work, make sure everything is reported. Thou shalt report all thy hackings.

Aggressive and careless hacking is unethical. An IT expert may choose to become an anonymous assassin like those in the movies. But hacking is better a profession than a hobby, and there is always dignity is professionalism.

Securing Your Hotspot

You’re sitting at home alone watching Netflix. Despite your superspeed internet, your favorite episode keeps on buffering. You blame it on your provider. Then you look at the window and see some kids sit outside your home, with their phones by their hands. By then you realize that your sweet hotspot has been hacked.

It’s time to reset your router and keep these things in mind:

  • Don’t throw the papers which came with the router’s package. RYFM – Read That F****** Manual
  • Make sure your SSID is hidden. (Service Set Identifier – the name of your Wi-Fi)
  • Set a difficult password. m@y13E$0meThIiiGLiK3TIIi$
  • You can filter the mac addresses that can access your router
  • Always update your firmware

Don’t feel bad. Those kids are not the badasses you think they are. They just had to google up ‘neighbor wi-fi hacking app‘.

cdevDlsau (6)
Speaker Emmanuel Alcartado holds up a WiFi Pineapple.

Engaging Designs

Catching a little break on network powwow, the next speaker Denick Espares, talked about game design analysis. Graphic design cannot be interpreted as a careless art. Game designing is not an easy job. A user’s first glance at an interface could tell the future of any mobile applications. In this lightning talk, Denick aided his discussion by showing the user interface of Light Beats, a mobile game developed by Haliya Interactive.

He discussed five points to consider when making a game: Number one is highlighting important information. The user should be able to get a clue on which button or shape hangs loose and which is just a wallflower. This way, a game design does not bring confusion to the eye.

A controlling game that subsequently gives order can’t be good. Players are supposed to be given cool options. They should be the one telling the game what to do, and not the other way around. If they stay locked in on your game, inevitably users want to explore and discover more parts of it. Your game now becomes engaging. Also, challenge the user by maximizing the use of all navigational buttons to achieve a goal. It’s like beating an opponent with a combo. In short, make the controls work together to achieve a goal. Finally, a fulfilling game cannot be called as such if it doesn’t give satisfaction. Show how special a player can be by giving out rewards such as achievement tokens, medals, coins, gems, etc. But only give these rewards if the player deserves it.

There are players and there are gamers. The difference between them is their satisfaction level and profound criticism. The former can enjoy whatever’s handed to them, while the latter can be a little bit of perfectionists.

cdevDlsau (8)
Speaker Denick Espares talks about game design analysis.

A Backbreaking Career in Network Administration

Securing a network seems easy. You might say it is the most unchallenging job in the IT industry. Maybe it looks like it, but it’s not. Network Engineers work harder than computer programmers. Developers can work alone, while network admins can’t. If they do, we wouldn’t call them security professionals. They are working in line with hackers, malwares, viruses, and other attackers.

The last speaker Daryl Solangon, a network administrator from Fujitsu, spoke about securing the Campus and Data Center. Is there a difference between the two? Let’s take this useful reference from

The “Campus” is where USERS (employees) connect to the network, along with all of the devices those employees use (e.g. desktops, laptops, ip phones, mobile phones, video conferencing, printers, etc). These types of applications have a wide range of bandwidth and delay sensitivity requirements.

The “Data Center” is where DEVICES connect to the network, and are mainly rack servers, load balancers, firewalls and other such devices designed to process and exchange “data”. These types of applications have relatively simple bandwidth (albeit large in quantity) and little delay sensitivity.

Unusual usage of bandwidth can be easily monitored by network administrators. This instance might be a signal in improper use of network loads. Sometimes, to prevent improper or unimportant usage of bandwidth, administrators see to it that the units connected to the network have limited accesses. Example, employees are not allowed to visit certain sites or directly download large files. Access control lists can be configured to control both inbound and outbound flow in the network. These are some things typically set in a network design.

Unlawful hackers target organizations unswiftly. They also have to follow several stages of attack to perfectly sabotage or manipulate their attackees. As described before by the previous speaker, organizations hire penetration testers to see if their network is secured enough to survive thieves in the night.

cdevDlsau (11)
Daryl Solangon, speaker for network design.

Mission Vulnerable: Public and Private

Campus Devcon is not complete without a friendly squabble from the participating audience. The Birds of Feather session brings out critical thinking and listening skills of the students while also promoting camaraderie. The topic brought the teams to cross swords on which offers a better network security, the government sector or the private sector.

cdevDlsau (12)
Team Private: Micah Chan, Ian Ronquillo, Brian Antonio, and Angelo Regalado. Third Year CS Students.
cdevDlsau (13)
Team Government: Furple Calupa, Zysa Villaruel, Ma. Odea Guerra, Julienne Ramos, and Leionai Papa. Third Year CS Students.

Several factors including potency of risks or budget could affect the level of security a certain agency may have. But in this debate, the students must generalize the sectors regardless of specific constraints to come up with unbiased, good defenses. The speakers looked for persuasive statements and even though the crowd cheered for the boys, it was the girls that caught the judges’ final decision. Nevertheless, everybody enjoyed the afternoon and brought awesome devcon goodies. The social media winners also brought home freebies from DevCon.

cdevDlsau (14)
Lucky social media winners!
cdevDlsau (17)
Thank you DLSAU!

Dusk settled in as the seminar finally came to its end. It was an engaging afternoon for all the attendees. The students, the speakers, and the volunteers. The knowledge gained by the students will always remind them that there is F-U-N to whichever way their IT career leads them.

If you want to solve a network security problem, a wide range of professionals at the DevCon community is available to help you. DevCon serves the Filipino IT by conducting seminars, workshops, and conventions. For more information, visit the DevCon website.

Photos by Aira Barashari

Campus Devcon – STI Muñoz

The vogue of application development arrived at senior high and college students of STI Muñoz last September 27, 2016. Students enjoyed a two-hour seminar about the trends in game development, clean coding, hybrid programming, and bots, with the help of DevCon PH.

Little by little, students showed up to fill the entire venue, eager to know what can they expect in the first world of computer science in the aspect of leisure and entertainment, not to mention the business alongside it. Ma-Reiko Borras, a resident academic secretary and ICT coach of STI-Muñoz started the afternoon with her welcoming remarks. The first task of the students was to choose a team leader to represent their sections named after the sixteen regions of the Philippines.

Ma-Reiko Borras warms up the student body.

Ezekiel Ponciano, DevCon’s representative for the day’s event introduced Developers Connect to the crowd. Without much talk, the seminar finally started with its first speaker. An explanation of the life of a game developer was discussed by Denick Espares. He is an FEU graduate and has walked through paths of game development cycles. Denick has always been a game enthusiast. This pushed him to co-found a start-up company, NightOwl Studios, where he plays as the lead game designer. He introduced their newly developed app Velocity to the students, which they downloaded and played enjoyably.

A game application development starts with pre-production. A car that flies with automatic expandable wings and shoots bombs or a game character that uses earwax (which explodes on target) as a primary weapon. Anything is possible. The first part of creating a game is the brainstorming phase. All ideas are consolidated and analyzed for feasibility. This might be the most critical and busiest part of the process since this is where bugs are fixed and improvements to the game are constantly added. The main production phase, however, is where the real development starts. After coming up with timelines and due dates, everybody has to turn their berserk modes on.

A game is now ready to be played. It is now packed up and ready to meet its judgment. The Beta Phase shall then turn the tides up and down by developer bug-fixing and player criticism. Fortunately for a game to encounter few glitch fixes, a full market release is inevitable. Meanwhile, if a game becomes a hit or meets a significant applause from the public, it should be expected to offer support and release updates every once in a while.

Denick Espares, a fresh grad. Co-founder of their start-up company NightOwl Studios

The clarity of a programmer’s code is highly significant. Students must learn how to write their hard work in an effective and understandable manner. Edwin Richbald Salinas, discussed the way of creating clean codes. Ed is a software engineer and is currently the CEO of Convonaut. To him, a programmer’s coding technique reflects their discipline. Anyone who wants to become a developer must be capable of designing comprehensible scripts.

For newbies, early practice of clean coding can result to perfect codemanship. For existing programmers who did not begin with the right technique, it’s not a hard thing to apply. There are only a few pointers to remember.

A few tips include the use of intention-revealing names. Single character declarations can be made self-explanatory.

int x; //product of two factors

can be declared as:

int myProduct;

Another tip is avoiding disinformation. Short comments that define some operations can be made straightforward and non-confusing. For example:

//This array enlists alphabetically arranged employee surnames
$cars = array("Badiola", "Dela Cruz", "Cruz", "Delgado");

A careful review of your code can eliminate unnecessary comments that can leave false information. The code above can settle without a comment. Don’t worry about the array, it won’t judge you.

public Date dob; //date of birth

The code above is fine. But, the best suggestion would be:

public Date dateOfBirth;

The variable named ‘dob’ can stand for many things. Why not just declare it unambiguously? If you do, you make the world a better place. Another tip on naming convention applies to Classes. Class names should be a noun or a noun phrase in Pascal case. Reserve your verbs for functions. A lot of reading about Clean Code by Uncle Bob is available for purchase online.

Ed Salinas, shares about the perks of code clarity.

Humans can always get some help from artificial intelligence, whether for great use or just for fun. Jover Nuevaespaña, on “The Rise of the Bots”, talked about the new age of artificial intelligence. Bots are software applications that run automated tasks, they are abundant over the world wide web. Now, they can be run through stand-alone applications as well. Jover engaged the students to try his own creation, joverbot, by opening the commonly used facebook messenger app and chatting it up.

Since bots are easier to install, they can be distributed in a snap. Maintenance can also be a big advantage for bots since major updates can be done on the back-end alone. Although today, people are interested mainly in engaging with lots of messaging apps and find little time facing with a good bot. The time for bots to entirely meet the gen-pop can be declared transitional and shall eventually be valued highly, if not in a few years, within just a blink of an eye.

Jover Nuevaespaña, on The Rise of Bots

Kurt Nolan Lopez, the last speaker, is a Creative Director of Convonaut. He featured the use of the mobile app framework Ionic. Kurt is a freelance designer and application developer, he is a co-founder of Banyera, a start-up company which recently got in ideaspace.

Ionic app development can be very handy. It is an easy to learn hybrid programming. HTML5, CSS3 and AngularJS are necessary to come up with an Ionic application. On limited time, budget constraints, and small manpower, Ionic programming can offer its best for creation of small scale applications.

Ionic provides all the functionality that can be found in native mobile development SDKs. Users can build their apps, customize them for Android or iOS, and deploy through Cordova. Ionic includes mobile components, typography, interactive paradigms, and an extensible base theme. – source

Kurt Nolan on a quick Ionic programming run-through

Excitement still filled the atmosphere even after the lightning talks. The students were engaged in debate or what DevCon calls the “Birds of Feather” session. Two teams argued about which OS was better, Windows or Mac. One side of the team composed of one college student and two senior highs. The other team had two college students and one senior high.

Mac team (above from left to right) Ronan Nicolas Chua, Christian Matthew Alcaria, and Daniel Pangilinan. Windows team (below from left to right) Nathaniel Ocular, Jocelle Chua, and Arif Tabonawas (no photo)

Each team explained the benefits of owning a device with the said operating systems. They boasted on device capabilities on the aspect of customization, user-friendliness, security features, and affordability. They were judged by the four speakers. After a series of intense argument, the Mac team won the debate.

Nathaniel Ocular, second year CS student, speaks the good thing about Windows.
The teams with the speakers and Ms. Reiko. Mac team brought home awesome devcon geek shirts.

Indeed it was a very informative yet gratifying day for the students. Once again it was another successful day for Developers Connect, sharing knowledge around campuses like STI Muñoz. To know more about DevCon events, check out their website. To become a volunteer, fill out the online form here.

DevCon Summit 2016 is scheduled to invade MOA SMX Convention Center at November 16-17, 2016. Register now to enjoy unlimited talks from professionals around the globe and visit fantastic booths. See you there!

Nexcon3: Hack-a-Superpower with Bluemix

An asteroid coming straight to planet Earth. A devastating solar flare. A threatening alien invasion. Mankind is in trouble, and they need the help of superheroes. But, no superhero can save everyone at once. People need to be forewarned before all else. To help them get ready, several teams of young developers from universities around Metro Manila were assigned to create an app that will bolster up the people when mega-disasters like these occur.

As a part of Nexcon 3 – a two-day celebration of fantasy, science fiction, the science behind it, and a gathering of fans from all over the country – DevConPH and IBM collaborated with and held a Hackathon in line with the genre of the celebration at the Mall of Asia SMX Convention Center last April 2-3, 2016, where students enjoyed two days of ‘learning how to Bluemix’ and a bonus engagement with cosplayers from all around the Philippines. Prior to the main event, a briefing on Bluemix APIs were conducted last March 30, 2016 at Oakwood Ortigas.

Bluemix is an implementation of IBM’s Open Cloud Architecture, leveraging Cloud Foundry to enable developers to rapidly build, deploy, and manage their cloud applications, while tapping a growing ecosystem of available services and runtime frameworks. – IBM


Students were given a chance to spend the day coding their disaster-preparedness and alert app. Mr.Tom Neil Wagan, External Relations Manager from IBM, acted as the host for the hackathon. To start the event proper, RJ Ramirez from DevelopersConnect began with introducing the non-profit org’s pledge of service to the IT industry.

RJ Ramirez from DevCon presents the organization’s mission to the developing community.
Tom Wagan, IBM External Relations Manager, warming up the morning session.

A few team members from the participants introduce themselves to break some little more ice.

The audience watched a short clip about IBM’s evolution as it reached its 100th year of innovation. In the book Making the World Work Better, IBM tells a story of its progress.

IBM engineers and scientists invented many of the building blocks of modern information technology, including the memory chip, the mainframe, the personal computer and even new fields of mathematics. This story points to the future of science, and of thinking itself.

IBM’s business innovations-from progressive workforce policies, to new ideas of societal responsibility, to global engagement, to the deliberate creation of corporate culture—shaped the modern corporation.

IBM’s big bets—including enablement of the US Social Security System, space travel, modern banking and more—made a lasting impact on our world, and laid out a path to progress the company is still pursuing today.


Whether a team consists of a full-on three or a one-man team, they all possessed the ability to save the world (or in this case, create an app). But only one team will be chosen to take home the ultimate prize. PHP 12,000 worth of gift certificates from Sodexo, Event hoodies, powerbanks, smartwatches and much more goodies.








They spent the whole morning working on their codes. Bluemix served as their platform for creating and managing their apps. To pause the tension, a short game of human bingo took place during lunchbreak. Participants were given a bingo card with character personalities, hobbies, preferences, and the like. A perfect socializing game for the attendees. Almost everyone filled up the card completely. Of course, greater effort received cooler rewards.

The winners of the bingo card game who completed the patterns, receives IBM goodies.

Along with the hackaway, they were introduced to IBM Philippines’ country manager Mr. Luis Pineda. He delivered an inspirational speech about his endeavors from a competent student during his youth to a renowned developer and manager that he is today. The students were surely inspired by his talk about how he managed to discover his talent in computer science and the decisions that helped him carry out his triumphs.

Mr. Luis Pineda, as he talks about his early days as a programmer.

The ‘hackers’ were also introduced to three Bluemix professionals, which gladly gave mentoring advices and tips to whoever needed their assistance. Benzon Cervas, an IT Architect, Jerome Clyde Bulanadi, an IT Specialist from IBM, and Ranjith Radmahanohar, an Application Architect.

Mentors Benzon Cervas and Jerome Bulanadi give intructions to Team Tomas.
Participant JC from STI seeks advice from mentor Ranjith Radmahanohar.

A thankful appreciation was commended to the mentors for offering their genuine services later in the afternoon just before the day ended. A final advice from the mentors adjourned the hackathon. Their words uttered the importance of focusing on an app’s functionality features rather than design. The quality of the interface should be the least concern of the developer. Teams must focus on the usability of the software and do the best they can to meet the challenge’s requirement.

Mentors receive their certificate of appreciation as Tom Wagan thanks their presence.
Just one final moment with the mentors to end the day’s hackathon.

Meanwhile at the NexCon Main Hall

Fans gather to witness the showcase of outfits and booths at the function hall of SMX Convention Center. Participants for the hackathon were also given free tickets for this Nexcon 3 main event.


The second day was welcomed with the introduction of the panel of judges. They were DevCon President Bryan Bibat; Adrian Arcega, co-organizer of NexCon; TJ Dimacali, Science & Technology Editor for GMA News Online and the President  of the IT Journalists Association of the Philippines; Dr. Jay Sabido, IBM R&D Executive and Lope Doromal, IBM Chief Technologist. The students were then ready to present their work after a few given minutes for final polish. Although some teams appeared with a white flag, a few survived and continued their tale.

The pitching hours began early in the morning. Mangga Apps was the first one to present, followed by RAMS, Overknights, Team Tomas, and Shadow Master. Pretty much everyone had the same concept when it came to implying their disaster-response functionality. The use of GPS, evidently, and on the upper hand taking applicability of social media apps to easily inform netizens and the authority for potential SOS scenarios.

Superbly, some teams were able to apply Watson API to their work. They designed the API to behave as an artificial-intelligence chat service. It was a definite bonus for the judges’ criticism.

Teams present their one-day masterpiece.
Judges listen to a team’s presentation.

The top three teams who satisfied the judges by the level of usefulness and feasibility were Rams from Asia Pacific College, Team Tomas from University of Santo Tomas, and Overknights from Polytechnic University of the Philippines. They were obliged and privileged to present their app at the main hall of the Nexcon3 event, in front of all the groupies.

The judges, as they accept and present their certificate of appreciation.

at NEXCON3 Main Hall

The top three teams were then prepared to pitch in front of the audience, but they still did not know their winning places. To start their pitch in, Tom Wagan introduced IBM Watson and to the whole lot.

The last part of the hackathon event, lead by Tom Wagan at NexCon3 SMX Function Hall.
Team Overknights, catching the audience with their app GEODATA.
Team Tomas, on their app HELPLINATOR.
RAMS, on Flash Tap.

Finally, the places were announced, all the top three teams received hoodies, smart watches, and powerbanks, for each team member. The first place, RAMS, received an additional 12,000 pesos worth of Gift Certificates. Overknights made it to the second place, and Team Tomas, third place. Of course, there were consolation prices for the rest of the students. It was an amazing experience according to the them, as they spoke out about their app on the stage. Still thrilled and excited, they enjoyed the rest of the day around the cosplay event. One highlight of NexCon, the Cosplay Rumble, where contestants dress and act their favorite character on stage, took place after the hackathon pitch in.

The participants with the DevCon and IBM Team. See you again, guys!

For more DevCon events, click here. See more event photos here.

Java Code Camp

It’s graduation month and summer just kicked in. Students are finally out of the campus. While geeks, plus the heat of vacation is equal to more coding. That’s why last March 19, at Chikka Philippines, Ortigas,  DevelopersConnect wrapped a whole day of Java application development fundamentals for snoops.

Cath Soriano, the event’s lead from DevCon opened with expressing the accomplishments of the organization and its much further mission scheduled throughout the year. Check them out! You might find yourself interested on the events. Or might as well volunteer as an event staff. It’s fun either way.

Cath, presenting the last DevCon Summit.

During the partner talk, Mr. Rodolfo Duldulao Jr, Technology Evangelist for Chikka Philippines stuffed the audience with his introduction to Chikka API. Today, Chikka offers SMS API to everyone interested in development of mobile application inclined to telecommunications.

The Chikka SMS API gives you the freedom to use standard web languages to build your SMS-based applications. And one of the best things about our API is that it will seamlessly connect your applications to the major Philippine carriers without any hassle. – Chikka

For fifteen years, Chikka had been and still is a continuing partner of large telcom networks as well as other companies. Other than text blasts feature, their brainstorming and customer feedback review predicts an account conduct for Philippine postpaid subscribers. For more info, documentations, faqs, visit their website.

Going back more years, it was 1995 when a boom in application development occured. Java penetrated the whole world with its universal prowess.Thus becoming lined with today’s generation. Setting up the hands of the students to their laptops, Tristan Babasa– with an outstanding seven years of Java experience – punched the clock and started the workshop.

Today, Java not only permeates the Internet, but also is the invisible force behind many of the applications and devices that power our day-to-day lives. From mobile phones to handheld devices, games and navigation systems to e-business solutions, Java is everywhere! – Java history

A beginner’s first line. Hello world. Tristan spoke up the agenda and told the pupils to get ready with the afternoon activity. That is, involving pocket monsters. As the workshop went on – from the declaration of statements, objects and classes – everything were applied with references from the Pokemon series.

Tristan, supervising the hands-on workshop.

public class Hello

{ public static void main(String[] args)

     { System.out.println(“Hello World.”); }


 * This class implements an application that
 * simply displays "Hello World." to the standard output.

Program structures, data types, variables, modifiers, and operators. The audience easily got the vibes of their mentor as they pushed further on the basics. Eagerly getting by with different statements, code conventions, and very importantly, the pillars of Java: Polymorphism, the ability of an object to take on many forms. Encapsulation, a mechanism of wrapping the variables and code acting on the methods together as as single unit. And Inheritance, a mechanism wherein a new class is derived from an existing class.

Students deliberately focus on the exercise.

In a matter of a few hours, everyone was able to make an simple program of an automated pokemon battle from the instructions of Tristan. A user may choose one from three monsters as their offense, and the computer then chooses from the remaining options. A fight take place until one of the monsters fall.

I choose you! Pokemon battle using Java.

They all finished the exercise and evidently most of them were able to modify and/or add codes to present in front after the tutoring hours. A few were given the chance to show-and-tell their work. Tons of freebies were given to the jolly and active. Every so often questions were asked and the audience were bold to answer them. More freebies to take home for the early bird and the winners of the social media contest – for posting online with hashtags #DevConPH and #JavaCodeCamp.

One of the students who modified the exercise with his own preferred characters goes in front to talk about it.

Everyone was thankful for definitely enjoying the day of learning the basics of Java. One full group photo and the students went on their way with a big smile. Til we see you again on the next DevCon events!

Happy faces. We hope to see you again, guys!

More photos below:

This slideshow requires JavaScript.


Android Code Camp

Even before the spike of Gingerbread, Android has captured the attention of enthusiastic developers. That’s why last March 12, 2016 at KLab Cyscorpions BGC, DevelopersConnect launched a one day Android code camp for thirty hankering students.

Preceding the dev hours, Ed Salinas introduced everyone to the volunteer org’s lifework. Afterwards, Rei Flores, a software engineer at Everest Consulting brought up Beta Realm. It is a community interaction web service that allows app developers to take responses from testers worldwide. As registered testers of the web service, you will be privileged to download, take assessment, and report bugs of the site’s featured apps. Testers can earn points and then convert them into cash. Nice and easy.

Ed, DevCon event lead for the day, introduces DevelopersConnect.
Rei, KLab representative, on BetaRealm.

All the way from Pangasinan, Jamie Rose Aguinaldo stepped up to start handling the day’s objective . She is a web and mobile application developer from Pixelhub Creative. Starting with a quick introduction to Android with a few slides, the audience were asked to open up their gadgets and prepare to be caught up with application development using the Android Studio. Jamie Rose has explained some tips. She pointed out to keep in mind the target OS version with the most users for the app you are trying to build.

Time for coding. Step one, know your activity. Whether its a login system, a fullscreen wide narrative, a game, whatever. But, for starters, a blank one would be a good icebreaker. An activity represents a single screen much like a window or a java frame. Choosing a template can help you with the basics of what you are trying to accomplish.

Jamie Rose Aguinaldo, as she teaches the basic concepts of Android app dev.

There are several layouts to choose from for your interface. An understanding of layouts concept can help you figure the ease and toils of your UI. A layout defines the virtual structure for an interface. You have FrameLayout, LinearLayout, RelativeLayout, Table, and Grid. The mostly used are linear and relative. For declaring sizes, use dpx. That is density pixels. Although five other units are accepted, this is the most recommended.

The basic when it comes to applying actions, is the onClickListener. A button’s action that leads to another. It’s when you want your components to react when users click on ’em. Jamie also pointed out the value of naming conventions. She favors a descriptive name for variables.

Listen and code. The participants take some serious notes and applies it directly on their lappies.

After the first few line of codes, the students were asked to run their script with an emulator. Successfully, they were able to show the button Jamie demonstrated for them to do.

Finally, the brainstorming began. Everyone was asked to make an application and present it at the end of the day. As the minutes turned to hours, all laptops appeared with so many lines we ought to think they’re on serious business. Lunch passed, and afternoon snack, too. A few has been able to develop a complete functioning app. Those remaining got stuck with development. Even so, Jamie was thankful that the students were able to get ahold of the three most important steps she thought them. Setting up the activity, the layout, and the action listeners.

Jamie assists the participant with his queries.
These guys were able to make a simple detection game and brought home amazing goodies.

Still and all, the students had a wonderful time learning something new. It was indeed a great experience for them. A definitely superb day of Android application development.

Thank you guys!

-View photo gallery-