This is Cogswell's first Hackathon hosted by the Cogswell Engineering Society.
It is a 24-hour event running from Friday, March 29 11:00am - Saturday, March 30 1:00pm.
The theme is Improvement.
The main purpose of this hackathon is to have students at Cogswell come together to learn and use technologies they never have used before, come up with solutions for a variety of problems, whether it's fixing their personal projects, social problems, contributing to open source projects, or creating helpful tools.
Participants will be working in teams on projects of their choice, those doing challenges are encouraged to collaborate with other teams using their project.
For example, Gamification Challenge can use project from Open Data Challenge in raising awareness for wildfires, they can see the most common causes and ways to prevent it and add it as a mechanic to their game.
Address
191 Baypoint Pkway, San Jose, CA
Rooms
Opening & Closing Ceremonies: 158
Workshops: 158
Computer Labs: 151, 149(Only Friday)
Mentors & Hardware Rental: 158
Schedule
Friday 3/29/2019
10:00am - 11:00am Getting together and Welcome
11:00am - 11:30am Opening Ceremony
11:30am - 1:00pm Team Building & Lunch
1:00pm - 2:30pm Project Brain Storming & Research
2:30pm - 3:30pm Prototyping Workshop
3:30pm - 5:00pm Finalizing Prototype Plan For All Teams.
5:00pm - 12:50am Development Time
1:00am Campus Closed
Saturday 3/30/2019
10:00am - 11:00 am Submission Period
11:00am - 12:30pm Judging Period
12:30pm - 1:00pm Closing Ceremony
CHALLENGES
Mentors
Vinayak Sathe
- Co-Founder and head of AI, Big Data, Cloud &IoT Practice, Astute Amplifiers Inc.
- Innovation and Technology advisor : Stealth Startup in Health Care
Sanghamitra Roy Chowdhury
- Cogswell Adjunct Professor & Club Advisor
Prince Christian Basiga
- Cogswell Engineering Club President
RJ Revita
- Cogswell Engineering Club Vice President
Ethan Ching
- Game Development Club President
Eligibility
Participants must be Cogswell Students, Alumni, or participating with people who are.
Requirements
Submissions Must Include These Items
- Name of the project.
- Members on the team.
- The problem the project solves.
- Challenges the project solves.
Prizes
Devpost Achievements
Submitting to this hackathon could earn you:
How to enter
Participants must create a DevPost account, then register to this event.
Upon registering to the event, introduce yourself in the Participants specifying what role you want to be on a team and what you're willing to be, along with listing your skillset.
All Submissions go through DevPost. If you do not submit your project or try to submit it through other means, we do not guarantee that your project will be judged.
Judges
Bineet Sharma
Computer Science Professor at Cogswell College
Vinayak Sathe
Co-Founder and head of AI, Big Data, Cloud &IoT Practice, Astute Amplifiers Inc. Innovation and Technology advisor : Stealth Startup in Health Care
Judging Criteria
-
Clear Intention
The project's target audience and goals are clear and focused. -
Open Data (If Applicable)
Was the Open Data used in the application utilized well? Was the representation of the Open Data clear? -
Open Source Contribution (If Applicable)
Why was the contribution needed? Does the contribution follow closed for modification and open for extension design for future contributions? Documented well. -
Database (If Applicable)
The chosen schema takes into consideration all of the properties and actions that are done on the items in the database. -
Simulation (If Applicable)
The simulation takes into consideration changes of environment and other attributes over time. -
Optimization (If Applicable)
The optimization considers the intended use cases, and takes advantage of the constraints -
Developer Tool(If Applicable)
The tool is easy to use, integrate, and build upon. -
Gamification(If Applicable)
The game raises awareness of a problem in the world or teaches ways to resolve them in its mechanics or theme. -
IAAA (Identification, Authentication, Authorization, Accountability)
Clear Unique Identifiers, Restricted actions needing authorization are tracked, multi-level authentication appropriate to the intended audience.
Questions? Email the hackathon manager
Tell your friends
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.