Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
Gunnar E Wolf
Instituto de Investigaciones Económicas UNAM
Coyoacán, Mexico
 

Gunnar Wolf teaches operating systems at the School of Engineering and is the network and systems administrator at the Institute of Economic Research, both at the National Autonomous University of Mexico (UNAM). Having worked in computing from a young age, his self-taught passion for the field earned him the equivalency of a bachelor of science degree in 2011. He then pursued specialization and master’s degrees in information security at the National Polytechnic Institute of Mexico (IPN), and is currently pursuing doctoral studies in computer science and engineering at UNAM.

Together with computer security, Gunnar’s passion has always been free software. He has been an Emacs and LaTeX (back then, just TeX) user for 40 years, since 1983, and a Linux user and enthusiast since 1996. After joining the Mexican Linux User Group, he founded and coordinated Congreso Nacional de Software Libre (National Free Software Conference, CONSOL) from 2001 to 2005, and Encuentro en Línea de Educación y Software Libre (Online Encounter for Education and Free Software, EDUSOL) from 2005 to 2010. He has been a member of the Debian Project since 2003, which creates one of the leading GNU/Linux distributions, and has been involved in different aspects of organizing its annual conference (DebConf) since 2005.

His research focus has long been aligned with cryptographic protocols as a way to ensure both anonymity and identity verification, with a specific interest in centralization-free implementations.

Gunnar has been a reviewer for Computing Reviews since 2022.


     

 Hacks, leaks, and revelations: the art of analyzing hacked and leaked data
Lee M., No Starch Press, San Francisco, CA, 2024. 544 pp.  Type: Book (9781718503120)

Imagine you’ve come across a trove of files documenting a serious deed and you feel the need to “blow the whistle.” Or maybe you are an investigative journalist and this whistleblower trusts you and wants to give you said data. O...

 

10 things software developers should learn about learning
Brown N., Hermans F., Margulieux L. Communications of the ACM 6778-87, 2024.  Type: Article

As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital brains” in the 1940s--we so...

 

Humble AI
Knowles B., D’Cruz J., Richards J., Varshney K. Communications of the ACM 66(9): 73-79, 2023.  Type: Article

While readers of Computing Reviews are more aware than the general population when it comes to whether artificial intelligence (AI) is a magical panacea or the probability of a general intelligence that will develop thinking capabilities an...

 

How computers make books: from graphics rendering, search algorithms, and functional programming to indexing and typesetting
Whitington J., O’Reilly Media, Inc., Sebastopol, CA, 2023. 176 pp.  Type: Book (9781638354383)

If we look at the age-old process of creating books, how many different areas can a computer help us with? And how can each of them be used to teach computer science (CS) fundamentals to a nontechnical audience? This is the premise of John Whiting...

 

A deep learning technique for intrusion detection system using a recurrent neural networks based framework
Kasongo S. Computer Communications 199113-125, 2023.  Type: Article, Reviews: (1 of 2)

So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron is too limited to get “int...

 
  more...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy