Newton's Telecom Dictionary

Although you probably won't be looking for everything in the book you can be fairly sure that what you are looking for is there.
  • Author: Harry Newton

  • Publisher: Telecom Library, Inc. ISBN: 0-936648-42-2

  • Price: $24.95

  • Reviewer: Phil Hughes

Newton bills his book as the “world's number 1 selling telecommunications dictionary”. This new edition weighs in at 1110 pages and is totally filled with computer and telecommunications terms. Although you probably won't be looking for everything in the book you can be fairly sure that what you are looking for is there.

For example, look under “error control protocols” and you will find a very good explanation of V.42, MNP and LAP-M stretching to about a page. Or look up “group 1, 2, 3, 3bis & 4” and get another one-page explanation of various FAX standards. I even found “pentium” in the book. I had to look for PEP, Telebit's proprietary modem protocol, to stump the book.

If it has anything mildly to do with telecommunications it seems to be in the book. That's the good news. But there's some bad news as well. First, the whole book is set in Helvetica type. This works ok for short definitions but it becomes just plain hard to read for longer explanations. The type face is fairly large so that isn't a serious problem, but Harry could have made a better book and saved a lot of paper by doing the work in a serifed face and smaller point size.

The second problem with the book is an assortment of small errors. For example, the 8088 is described as the 8-bit version of the 16-bit 8080. Most anyone knows the 16-bit cousin is the 8086, not the 8080, but such an error makes me nervous that there may be some real hidden “gotchas” hidden in the more technical information. The book even defines the 80387SX as the coprocessor for the 80385SX microprocessor. Yeah, we all know that this was supposed to be the 80386SX as the book has already said but, once again, simple typos like this scare me.

The bottom line? I think Newton's book is worth purchasing, but I hope the 7th edition addresses these concerns.


Phil Hughes

One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix