Beyond Brushstrokes: Exploring the Pros and Cons of AI Art

On June 21, Marvel Studios’ released their new show “Secret Invasion.” The title sequence of “Secret Invasion” was created using artificial intelligence. This comes after they employed incredibly talented artists for the creation of the hit movie “Spider-Man: Across the Spider-Verse.”  Artists and visual effects creators have called for unionizing and regulations to protect...

Gadgets and Tech to Look Out For in 2020

Drones, electric cars, and AI Assistants are set to take over 2020 If you want to see what’s the biggest and brightest as far as upcoming tech, then CES is where you want to be. Organized by the Consumer Technology Association, CES is a yearly conference held in Las Vegas where companies exhibit and show off all the new gadgets and technologies they have been working on. This year’s...

Cyber Security: Social Engineering and Hacks

Cyber security is the protection and recovery of any network, infrastructure and the devices associated with those networks from threats and incidents. Internet threats are constantly evolving and makes cyber security challenging. Photo by Michael Geiger on Unsplash Who is at risk for cyber threats? Cyber threats, simply put, are attempts to disrupt a computer network. These include phishing,...

OwlTec: KSU’s Apple & Tech Resource

Located across from the bookstore on the lower level of the Carmichael Student Center sits a small storefront packed to the brim with tech. A table of Macbooks to play with sits just feet from the entrance, and calculators and phone accessories line the walls. OwlTEC may be on the small side, but it serves as Kennesaw State’s hub for all your technological needs.  The entrance to OwlTEC,...

Amazon Web Services: Take Your Code Around the World

Many companies in the medical, security and financial fields have access to sensitive customer data that must be protected. Companies can sometimes be lax in their dealings with this data, and this attitude toward security is often the cause of large breaches. It can be difficult to find the perpetrators of these large breaches, especially if the company that was breached is not in the same...
Group of people sitting around a table coding in front of a wall covered in sticky notes displaying the system they're working on.

Hacking the Hackathon

What is a Hackathon? Now that it’s hackathon season, many STEM students are stressing about whether or not they should participate, and even asking what they are. Contrary to popular belief, hackathons don’t actually require “hacking.” Instead, they're a collaborative event in which teams from a range of computing and design backgrounds come together to solve proposed problems. Hackathons...
Hand holding the new PlayStation Classic console in front of a white background.

Sony PlayStation Classic: The Retro Console Market Expands

As video gamers get older and older, nostalgia for titles of the past grows stronger. “Retro” titles are readily available through online distribution platforms such as Steam, the Nintendo E-Shop, and the PlayStation Store. Gamers looking to play their old favorites no longer have to search through lost or damaged consoles and games to get a taste of the past. However, one must ask: do you...
Allen Pan and grant Umehara are holding recreations of comic book weapons they made. Allen is holding a Captain America flying shield drone, and Grant is holding a Iron Man laser arm.

Science & Tech YouTubers: Trying Stuff at Home So You Don’t Have To

As college students, we spend a vast majority of our time doing something we shouldn't: browsing YouTube. I am one of the worst offenders of this, spending hours of my precious free time - and most of the time that I should be working - wandering through links until I realize I have no idea where I started (honestly, sometimes it gets worse than Wikipedia). Throughout my journeys I have collected...
photos of three drones, each from a different stage in history

An Abridged History of Drones in the Western World

Drones are a hot topic here in the United States. From the military, to corporations, to the average consumer, everyone seems to be hopping on the unmanned aerial vehicle train. One question may cross your mind: when did this drone mess all start? It actually goes back a lot further than you might expect. One thing needs to be said first: the actual timeline of drones is contested. You can find...

Into the Breach: Everything You Need to Know About the Equifax Leak

How often have you checked the strength of your passwords? How often do you check your bank statements? Would you know if someone tried to open a line of credit in your name? Personal data is stolen all the time in events known as data breaches. A data breach can be as small as looking over the shoulder of a friend as they type their password, or as big as stealing millions of confidential credit...