Evi Nemeth | |
---|---|
Born | June 7, 1940 |
Occupation | Author, retired professor |
Known for | Lead author of "bibles" of system administration |
Evi Nemeth is an internationally recognized engineer, author, and teacher known for her expertise in computer system administration and networks. She is the lead author of the “bibles” of system administration: UNIX System Administration Handbook (1989, 1995, 2000) Linux Administration Handbook (2002, 2006), and UNIX and Linux System Administration Handbook (2010).
Nemeth is best known in mathematical circles for originally identifying inadequacies in the “Diffie-Hellman trap,” the basis for a large portion of modern network cryptography. (R. Mullin, E. Nemeth and N. Weidenhofer, "Will Public Key Cryptosystems Live up to Their Expectations? HEP Implementation of the Discrete Log Codebreaker" in Proceedings of the International Parallel Processing Conference, pp. 193–196, 1984.) Evi has an Erdos number of 2.[1]
Nemeth received her bachelor's degree in mathematics from Penn State in 1961 and her PhD in mathematics from the University of Waterloo, Ontario in 1971. She taught at Florida Atlantic University and the State University of New York at Utica (SUNY Tech) before joining the computer science department at the University of Colorado at Boulder (CU Boulder) in 1980. She served as manager of the college’s computing facility from 1982 to 1986. She also was a visiting Associate Professor at Dartmouth College in 1990, and at UC San Diego in 1998, while on sabbatical from CU Boulder.[2][3]
While at CU Boulder, Nemeth was well-known for her undergraduate systems administration activity, in which students over the years had the opportunity to develop in-depth knowledge and skills in Unix system administration. Together with Steve Wozniak, Nemeth established the Woz scholarship program at CU Boulder which funded inquisitive undergraduates for many years. Nemeth also has a special talent for inspiring and teaching young people. She mentored numerous middle- and high-school students, who worked with her to support computing in the college and came to be known as "the munchkins." She also mentored talented young undergraduates, taking them to national meetings where they installed networks and broadcast the meetings’ sessions on the Internet on the multicast backbone. She coached the university's student programming teams in the ACM's annual International Collegiate Programming Contest.[4]
From 1998 to 2006, Nemeth worked with CAIDA (Cooperative Association for Internet Data Analysis) at the University of California, San Diego, on various Internet measurement and visualization projects.[5]
Outside the United States, Nemeth has helped bring Internet technology to the developing world through her involvement with programs of the Internet Society and the United Nations Development Programme.[6]
Since her retirement, Nemeth has been sailing her 40-foot sailboat named Wonderland around various parts of the world, including a circuit of the Atlantic, Panama Canal, and across the Pacific to New Zealand.[7]
Contents |
Nemeth, E., Hein, T., Snyder, G., and Whaley, B., Unix and Linux System Administration Handbook, Prentice Hall, 2010.
Several Internet measurement papers; see www.caide.org/publications/papers.
Mullin, R., Nemeth, E. and Weidenhofer, N., "Will Public Key Crypto Systems Live up to Their Expectations? HEP Implementation of the Discrete Log Codebreaker," Proc. of the 1984 Intl Conf on Parallel Processing, Aug. 21-24, 1984, pp. 193–196. Selected for the best paper award for this conference.
Several papers on combinatories in ancient paper journals.
“I think MIME is evil.” (LISA)[10]
“Early [ethernet] developers... objected to a roundoff error that exceeded the ARPANET's entire bandwidth, but marketing won out.”[11]
“Many people equate the word ‘daemon’ with the word ‘demon,’ implying some kind of Satanic connection between Unix and the underworld. This is an egregious misunderstanding. ‘Daemon’ is actually a much older form of ‘demon’; daemons have no particular bias towards good or evil, but rather serve to help define a person's character or personality. The ancient Greeks' concept of a ‘personal daemon’ was similar to the modern concept of a ‘guardian angel’ – ‘eudaemonia’ is the state of being helped or protected by a kindly spirit. As a rule, Unix systems seem to be infested with both daemons and demons.” (p403, USAH)