Lone Star Ruby Hackathon Recap

Posted on

Last weekend after the Lone Star Ruby Conference in Austin, a group of developers gathered at Capital Factory for an overnight hackathon with a focus on communications. In addition to the awesome support and space donated by Capital Factory, the event was put on by Context.io, Twilio, SendGrid, and Searchify. The prizes were big ticket items, with first place taking home a MacBook Pro with Retina Display, and the runner-up getting a Thunderbolt Cinema Display. There were also prizes for the best use of Twilio and the best use of SendGrid.

After some dinner and a quick brainstorm session, the hackers got to work. I only made it until midnight, but several teams didn’t sleep a wink from when we kicked off at 7pm Staruday until demos started at noon on Sunday. There were 9 awesome demos, and it was very tough for the judges to decide on the winners.

LSRC Hackathon

The first place hack was deadman.io, created by Jesse Lovelace. Deadman.io is an online deadman switch that used SMS, phone calls, and email. Jesse started the demo by describing what a deadman switch is: “You might be going into a drug deal, or smuggling something…” and you need to make sure you come out alive. Using deadman.io, you can tell the other party “if you kill me, then this thing out there is going to send all these important documents to the police.” To use deadman.io, you define some arbitrary content and the intended recipients for the content. If you don’t respond to the text or email that deadman.io sends you periodically, it assumes you’re dead and sends that content out.

The runner-up was NotifHack, created by the team of Ben Hamill and Bob Potter. NotifHack uses Context.io webhooks to watch your inbox and alert you via SMS if an incoming email matches your filters, allowing you to disable annoying push notifications on your phone without missing the important stuff. Filters can be based folders, subject line, from address, to address, etc. You can also reply to the text with instructions to manipulate the email, such as archiving or deleting it.

The winner of the Twilio spot prize was Textopia, a hack created by Julien that allows you to interact with Wolfram Alpha (the engine that also powers Siri) via text message for times when you don’t have data access on your cell phone. Textopia also tied into Context.io to allow to text things like “send me the last email I received” and get the results via text.

The SendGrid prize went to Patrick Lu, who also happens to be internet famous for taking a picture of a wedding proposal that went viral. Pat created OrangeSend, a service that allows you to forward an email to addhttp://twitter.com/orangesend.com. You then receive a link to the that content that you can then share with friends, so you can easily share emails your receive with your social networks or friends.

Other hacks included:

  • Infoquarium by (Jeff Linwood)[http://twitter.com/jefflinwood], an iPad app for displaying email and twitter updates as a fish tank so you can check your status on an info appliance without becoming too distracted.
  • Email ⇔ SMS Gateway from Dominik. Let’s you send and receive SMS messages in your email. Send by putting the recipient phone number as the subject line, and responses go to your email.
  • remail.io from Taylor and Nathaniel, An email queueing system that removes the scheduled send if the user gets in touch before it goes out.
    Reply Analytics
  • Reply Analytics by Eric, an awesome dashboard that allows you to view email response time (“the most important metric for customer happiness”) based filters of your choosing.
  • Email Breakdown created by Dan DeFelippi. Email breakdown Generates a infographic for your email account showing Total emails, total attachments, emails per day, email sent per month, avg emails per day, top contacts, and more.

After that, I hit up some awesome craft beer bars with some new friends that I made at the hackathon. It was a great time, and I can’t wait to go back to Austin! Thanks to all of the teams and hackers that participated, and I’ll see you again soon!

Tags: , , , , , ,

As a Developer Evangelist for SendGrid, Brandon's focus is on empowering developers to build things, gathering feedback for new features and improvements, and fostering a cooperative developer community for anything that needs email integration.

Brandon West on Twitter

One thought on “Lone Star Ruby Hackathon Recap

  1. I tried to sign up with context.io several days ago. First the login/demo sequence terminated unexpectedly with an opaque raw xml style error message. I found a validate email in my inbox but when I clicked the link the page said validate error. I tried logging in about three times with similar results before one of the links finally worked. After wandering around the dashboard trying to figure out what went wrong I tried to manually sync. Forced syncing is a paid feature so I was out of a debug tool. After more wandering I found the app engine demo app at appspot.com. I logged in but the page was basically empty. There was a search box but no matter what I typed I got reply "no results found." When I tried logging out and logging back in my normal gmail pane died with a gmail server error/ I logged back in to gmail and 30 seconds later it timed out. This was so bizarre that I changed my gmail passwords, closed my context.io google authorizations and turned off IMAP. Is it really a good idea to give IMAP access to a company you know nothing about? Once you give out your password there is no google managed layered protection. How can anyone trust any company with such access? Has anyone else had a similar experience? Or is it just me? Is this behavior conext.io or google induced? Slow trouble desk response isn't helping. Bizarre things happen and I have to just stew for 24 hours or more.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>