UAT Student Blog

Machine Learning Magic

Posted on May 18, 2021 1:34:25 PM by Kody Mitchell

The term Machine Learning gets thrown around a lot recently, but what does it really mean and how does it work? Imagine a task that is simple for us humans, reading a sentence, or even just recognizing a character on a piece of paper. That is a task so simple that it is literally taught to 5-year-olds, some of which are not yet trained how to use a toilet, but for a computer this is normally a very difficult task. A program is a collection of statements and conditions, meaning that the programmer tells a computer what to do for every situation it encounters. This is not possible for things like handwriting; everyone writes differently. So how can machines read handwriting? That is where machine learning comes in.

0 CommentsContinue Reading →

Hobbies and Stress Relief

Posted on Apr 14, 2021 1:35:00 PM by Isis Boone in Dealing with stress, in Hobbies

Do you have a hobby that makes you feel like everything is all good in your world? Hobbies are a great way to spend your open time to be productive and learn something new. Spending time on an activity that you have fun with or enjoy can improve your mental health. Among all the research having a hobby, you are less likely to suffer from stress, low moods, and depression. Have you found your hobby that lets you let go? Having a hobby can either be a personal thing or a group thing, depending on what you want it to be. A hobby can be anything you enjoy enough to keep doing it time and time again.

0 CommentsContinue Reading →

How Does the Internet Work?

Posted on Apr 6, 2021 1:36:00 PM by Kody Mitchell

The Internet, the information superhighway, the global hivemind. The Internet has many names, but what is it really and how does it work? The Internet is comprised of billions of computers that are all connected together. But this isn't a haphazard connection, it is all organized in a very efficient manner. When you type in the name of a website in your browser, such as uat.edu, your browser doesn't actually know what computer to connect to in order to retrieve that website. First it takes the address you put in and asks a Domain Name System, or DNS, name server where it should go. It does this by converting the name of the address into an IP Address and sending it back to the computer that asked for it. The IP address is then directly connected to by your computer and retrieves the desired information.

0 CommentsContinue Reading →

Golang the new standard for malware langauge?

Posted on Mar 30, 2021 1:37:00 PM by Marcos Xochihua in Cyber Security, in Malware, in Network Security, in GoLang

In a recent security report by cybersecurity firm Intezer, they reported that a huge spike of malware strains being coded in Go programming has increased about 2,000% in recent years. 

0 CommentsContinue Reading →

VMware vulnerability leaves about 6,700 servers ripe for the picking.

Posted on Mar 4, 2021 8:50:00 AM by Marcos Xochihua in Cyber Security, in virtual machines

VMware vCenter servers have been hit in a new attack which left them exposed and vulnerable by the hackers which allowed them to take over any unpatched machine and take over companies' entire networks. Mind you this is about 6,700 servers that are at risk.

0 CommentsContinue Reading →

DOTA: Dragon's Blood

Posted on Mar 2, 2021 8:51:00 AM by Isis Boone in anime, in Dota 2, in new

Have you ever watched an anime based on a game, you know besides Pokémon or Danganronpa? Well, I have news for you!

0 CommentsContinue Reading →

The Food Revolution

Posted on Feb 1, 2021 1:21:00 PM by Kody Mitchell

Have you ever been playing a game or watching a movie where a character eats or drinks some fantastical item and  you think to yourself, "I wonder what that tastes like."? Well in the near future, you may not have to wonder anymore. 3D printing has come a long way from its infant stages of barely printing out plastic shapes. Now we can print high fidelity prototypes for motorcycles, human organs, and even chocolate shapes. 

0 CommentsContinue Reading →

Doing Real Work with Fake Computers

Posted on Jan 27, 2021 11:32:55 AM by Kody Mitchell

Long ago, people were starting to run into the problem of needing to access many servers at the same time, but each server only running at a smidge of its potential. Thus Virtualization was born. Virtualization is the process of taking a real physical system and creating virtual components for it. With this technique you can create an entire computer including its operating system within your own computer. 

0 CommentsContinue Reading →

SolarWinds massive Malware attack now tied to Russia.

Posted on Jan 12, 2021 1:22:00 PM by Marcos Xochihua in Cyber Security

The FBI, CISA, ODNI, and the NSA released a statement stating that Russia has orchestrated the SolarWinds attack. It was believed that the hackers were working with a foreign government, but the security agencies have pointed the blame to Russia.

(Photo by Alexander Ryumin TASS via Getty Images)

0 CommentsContinue Reading →

The Computers of Christmas Past, Present, and Future

Posted on Dec 21, 2020 11:33:00 AM by Kody Mitchell

0 CommentsContinue Reading →

   

Email me when there is a new post.

I'd like more information about UAT

Lists by Topic

see all

Recent Posts

Posts by Topic

see all

Posts by Author

see all