Hi, I’m Jack

My Skills

Kafka

Java

k8s

Python

Swift

Linux

I’m a computer science student at UT Austin

About Me



Relevant Coursework

  • The purpose of this course was to learn how to use and implement canonical data structures such as lists, iterators, stacks, queues, priority queues, trees, binary search trees, balanced binary search trees, sets, maps, hash tables, heaps, tries, and graphs.

  • This course was an introduction to methods of reasoning used in computer science. Main topics included: logical notation and proof methods; induction and recursion; sets, functions, and relations; the growth of functions; annotated programs and loop invariants.

  • The purpose of this class was to introduce us to a programmer’s perspective of a computer, at a fairly low level of abstraction. We covered: Programming in C in a Linux environment, Machine-level representation of programs, Processor architecture and implementation, Storage system architecture and performance, and linking.

  • Gaining a comprehensive foundation of the core concepts of machine learning. Delves into a variety of machine learning algorithms, methods to evaluate and assess results, techniques to improve model performance, the art of data cleaning and feature engineering, and the importance of training data and inputs.

  • Topics included matrix operations, systems of linear equations, introductory vector-space concepts, determinants, introductory concepts of eigensystems, introductory finite state Markov chains, and least square problems.

  • There are three main learning goals:

    1. Understand how operating systems and, more generally, computers work.

    2. Learn how an OS manages the resources of a computer to better the user experience

    3. To enhance our ability to understand, design, use, and implement such systems.

  • A practical, hands-on opportunity to learn real world security principles with security tools to assess, defend, and investigate hosts and networks. Exploration of the fundamentals of secure coding through analysis of vulnerable applications.