Computer Sciences Dept.

Kai (Tommy) Zhao

Email: kzhao32 'at' cs 'dot' wisc 'dot' edu
Computer Architect & Software Engineer
Department of Computer Sciences
University of Wisconsin-Madison

Work Experience

Click and hold to move, and use mouse wheel to zoom.

  • Software Engineer

    Google, Silicon Valley, California
     July 2018 - Present

    • Work on platforms for search performance

  • CPU Diagnostics Engineer

    Advanced Micro Devices (AMD), Austin, Texas
     Aug 2017 - July 2018

    • Developed software tool to generate test cases to validate processors post-silicon
    • Used random instruction generator to stress micro-architectural features
    • Found, reported, and root caused silicon hardware bugs

  • Teaching Assistant

    University of Wisconsin-Madison, Madison, Wisconsin
     Spring 2017: CS 354 Machine Organization and Programming
     Summer 2016: CS 302 Introduction to Programming
     Spring 2016: CS 368 Learning a Programming Language: MATLAB Programming
     Fall 2015: CS 252 Introduction to Computer Engineering

    • Created and graded homework, quizzes, and exams
    • Hosted office hours, answered questions on discussion board, and led review sessions
    • Wrote scripts to assist in grading programming assignments

  • Lecturer

    University of Wisconsin-Madison, Madison, Wisconsin
     Fall 2016: CS 252 Introduction to Computer Engineering

    • Prepared and presented lectures for a class of 132 students
    • Created and graded exams and homework
    • Hosted office hours and answer questions on discussion board

  • Embedded Engineer

    Extreme Engineering Solutions (X-ES), Middleton, Wisconsin
     Jan 2016 - Sept 2016

    • Implemented, tested, debugged, and released VxWorks for custom hardware
    • Resolved VxWorks issues involving spin locks, page faults, and virtual memory maps

  • ECE Laboratory Research Assistant

    University of Illinois at Chicago, Chicago, Illinois
     June 2012 - June 2014

    • Researched achieving fair resource distribution under connectivity constraints
    • Researched hardware security by withholding keys
    • Discussed and developed algorithms, implementations, visualizations, and simulations
    • Developed the simulation tool set to verify hypotheses and test algorithm efficiencies

Computer Sciences | UW Home