IzaakWeiss

820 28th Street Frontage Rd | Boulder, Colorado | 80302

720 979 3744 | izaak.weiss@gmail.com | work@izaakweiss.com

www.linkedin.com/in/izaakweiss | www.github.com/lalaithion

Education

University of Colorado Boulder.
College of Engineering.
      2014 - 2018
BS in Computer Science
      GPA 3.425     Major GPA 3.685
Minors in Math and Linguistics
Dean's List Fall 2015, Spring 2016, Fall 2016

Skills

Classes

Work

Student Research Assistant (VI), University of Colorado.

February 2015 - Present

I work as a computer programmer under Prof. Elizabeth Bradley on CSciBox, a software that uses AI techniques for paleoclimate age-model construction. I have worked with parallelizing code in Python and storing data with JSON and Bagit. I also built releases of the software and communicated with geoscientists to determine goals for future development. In December 2016 I went to AGU to present on the work I had done with LiPD. | Link to CSciBox Website | Link to CSciBox Github Repository

Extracurricular Activities and Projects

Grumpy

January 2017

I had a pull request accepted to the Google project Grumpy which transcompiles Python code into Go code. I rewrote the Python Math library to work with Grumpy, expanding the set of programs that could be successfully compiled to Go. This involved writing Python code that conformed to the standard CPython implementation, and making the public functions call Go code to perform the underlying mathematics. | Link to Grumpy | Link to Pull Request

Cisco Network Engineering Hackathon

April 2017

Won First Place. My teammates and I built a location based Two Factor Authentication that would check whether a person accessing an account was in an authorized location to do so by pulling data on connected devices to routers using Meraki, and then processed the data and tracked it using Python and served a website using this authentication using Flask. | Link to GitHub Repository

Hack CU

March 2016

Won Third Place - Twitter Prize. My teammates and I built a techincal demo for an app that would use Bluetooth LE to form a decentralized and distributed social network, similar to Twitter. In the Arab Spring, Twitter was used as a tool by revolutionaries to spread their message under the censoring hand of their government. By building our app as a decentralized network, we bypass any attempts of censorship by blocking access to a server or ip address. | Link to GitHub Repository

Applied Trust Security Hackathon

February 2017

Won Second Place. We built a website that matched users into games and play against each other and chat with each other. In the second phase, we defended our website against denial of service attacks, overflow attacks, and other attempts to take our server down. | Link to GitHub Repository

Co-President of the CU Ethical Hacking Club

Summer 2016 - Present

I have been a member of the Ethical Hacking Club at CU since fall 2014. I became Co-President at the end of spring semester 2016. The club holds several meetings during the semester where we discuss issues such as encryption, web and application security, and testing systems by attempting to hack them, with a focus on how to do so in a way that is ethical.

arbitraryGo

June 2016

I built a web app that expands the ancient board game "Go" to work on arbitrary undirected discrete graphs. I used a two dimensional javascript rendering library called two.js, but besides that I wrote the code entirely on my own. The app currently is capable of generating a square, hexagonal, or entirely random graph (based on Bridson's algorithm for Poisson disk sampling). | Link to arbitraryGo | Link to GitHub Repository

EggCrypto

September 2016

I implemented a Diffie Hellman style key exchange program using Elliptic Curve Cryptography on finite fields of integers modulus prime numbers. The program is written in Haskell and creates types for elements of the finite field, and implements addition, subtraction, multiplication, and division for these elements, as well as implements addition and multiplication for points on the elliptic curve. The program also includes a short text based interface for creating a shared secret using Diffie Hellaman key exchange. | Link to GitHub Repository