Solid Communications

Writing * Editing * Publishing

Category: Book Reviews

Book Review: You’re Saying It Wrong

youre-saying-it-wrong

Geez, as a word nerd, I thought I had it all right. Wrong! Acai (as in the berry) is pronounced ah-SIGH-ee. I also was certain I had moussaka right, but apparently true foodies and chefs know it’s pronounced moos-ah-KAH.  Who knew. Uranus, I was assured, is NOT pronounced yer-AY-nus. And I finally learned how to pronounce the surname Nguyen correctly.

Ross and Kathryn Petras, the authors of You’re Saying It Wrong, have rounded up some of the most misunderstood words and phrases in the English language.

But even though I encountered my own comeuppance more than once, many of my favorite faux pas are in here, like:

  • for all intents and purposes (do NOT say for all intensive purposes!)
  • albeit (hint, it’s not pronounced all-bite)
  • nip it in the bud (not butt!)
  • would have (it makes me cray-cray when people write would of)

And, thank the Lord, the book also includes Oregon, the most abused and mispronounced state name in politics and newscasting.

orygun

Each page gives a quick definition and pronunciation  plus a few paragraphs explaining the source of the word, the pronunciation, or the confusion. So you’ll learn why we say woulduv, but should write would have, and why the Samoan island of Pago Pago is pronounced pongo pongo.

Throughout the book there are little blue pages called “How to sound like …” with a quick list of words that help you sound like a wine connoisseur, a patron of fine arts, a fashionista, or a dozen other groovy things.

The authors don’t take themselves (or anyone else) too seriously though—it’s a fun little book to browse through and keep handy for reference.

Book Review: Countdown to Zero Day

CountdownIn Countdown to Zero Day, investigative journalist Kim Zetter recounts the story of the discovery and shocking origins of the Stuxnet virus, which attacked uranium enrichment facilities in Iran, effectively crippling their nuclear capabilities.

The first part of the book reads like a high-octane thriller, following the employees of a very small technology security firm as they try to unravel the puzzle of a strange new “zero day” exploit – a new and unique virus that has had no security patches created for it yet – which means there has been zero protection.  She also covers the thriving and lucrative “gray market” for zero day exploits, in which our government is apparently a high bidder.

In the middle third of the book, Zetter delves into many examples of vulnerable US and worldwide infrastructures, their reliance on computer technology, and the dire consequences when that technology fails.  Critical systems can be easily unbalanced by “an autonomous worm delivered via USB flash dive or via the project files …”

Examples are taken from real life failures, like this one in 2008:

“Disabled protective relays played a role in a large outage in February 2008, when nearly 600,000 people in Florida lost power after a field engineer with Florida Power and Light turned off the protective relays at a substation while investigating a malfunctioning switch.  The result was a cascading outage that spread to thirty-eight substations, including one that fed electricity to a nuclear plant, causing the plant to go into automatic shutdown.”

And this one, also in 2008:

“In Poland in 2008 a fourteen-year-old boy in Lodz caused several trains to derail when he used the infra-red port of a modified TV remote control to hijack the railway’s signaling system and switch the tram tracks.  Four trams derailed, and twelve people were injured.”

After convincing the reader of the fragility of our national utilities and infrastructures, Zetter reveals some of the white hat hacking performed on the same systems, exposing even more vulnerabilities and lapses of common sense security measures.

In the latter third of the book, Zetter returns to the story of the small Belarus firm that accidentally discovered Stuxnet, but lacked the skill and experience to tackle the threat, and the people and firms who eventually untangled it.  She interviews them on the precarious balance between trying to help people – ordinary folk like you and me – and the political pressures created by national security.

The entire book is thoroughly researched, and includes excerpts from interviews with the key players, plus footnotes for intrepid readers who may want to read more on a topic.

If you’re a fan of thriller/adventure fiction, I highly recommend reading Countdown to Zero Day, and then following it up with Zero Day by David Baldacci.