Amid all the hubbub over Google DNS on Thursday, the search giant also released two more helpful tools to help you get a richer search experience and improve your language skills. Dictionary Google dictionary puts a full-service resource right at your fingertips that can be accessed through Google's Dictionary page or through a regular Web search. Google launched its dictionary project, offering a feature-rich resource that goes beyond simple definitions of words; and its new translated Web search makes it easier to find Web pages written in more than 40 languages.

To access words through regular search, click on the "definitions" link on the top right of your results page next to where it says how many results Google has returned for your query (click to enlarge the screen cap). Google dictionary isn't just for English. Notable languages currently missing from the project include Japanese and Persian. The project contains 27 other languages, including the major Western European languages, Chinese (simplified and traditional), Korean, Arabic, Hebrew, and many more. Google Dictionary also has an English-to-foreign language component, allowing you to translate single words from English into a foreign language or vice versa. Rich Definitions Page Google's word definitions page is full of useful information including an International Phonetic Alphabet (IPA) pronunciation guide, synonyms, standard definitions, and usage examples. This is similar to what you can do in Google Translate.

You can also find external links to Princeton University, Wikipedia, and elsewhere to see to further definitions and usages of the word in question; however, it should be noted this collection of aggregated links on Google's dictionary page has been around for some time, according to The Los Angeles Times. Try searching in English for words such as schadenfreude or Zoroastrianism to see this in action. If the word you're searching for is found in another language, Google provides a link to that dictionary as well, and particularly difficult or unusual words include an audio file to let you hear how the word is pronounced. Some words may also trigger image results; search for winceyette to see an example of this. From what I can tell, Google's dictionary project has not been merged with the spell check on Google Docs.

You can also bookmark particular words for easier access at another time. TIP: Google's dictionary is very comprehensive, so for all you juveniles out there: Yes, you can find your favorite dirty words and their definitions in Google Dictionary. Translated Search Google has added a feature to its search options panel that allows you to search in English across Web sites in other languages. And no, these words don't have pronunciation sound files. Google has had a similar feature for some time that allows you to automatically translate foreign language Web sites appearing in Google's regular search results. To activate the feature, choose a search term like "Beethoven" and then click on "Show Options" on the top left of the results page.

But this newest feature searches only foreign language Web sites. Then click on "Translated Search" at the bottom of the options panel on the left side. (Click on the screen cap for a closer look.) Once you've got your translated search, a box at the top of the results page tells you what language the results are being translated into and what language the results are being translated from. TIP: If you installed the javascript uncovered by Gizmodo that gives you the rumored visual revamp of Google, you won't be able to access translated search or Google Dictionary from the search results page. You have the option to add other languages to expand your search; Google supports 42 choices. To get this functionality you either have to delete your Google cookie or use another Web browser. Connect with Ian on Twitter (@ianpaul).

NASA's Ares I-X test rocket has been delayed today in part because of the number of lightning strikes in the area – 154 since last evening, NASA said. That's because NASA built an enormous lightning protection system at the Kennedy Space Center that will not only protect people and equipment but collects strike information for analysis by launch managers. While NASA can't control the weather, the Ares launch pad and surrounding area as well protected from lighting strikes as can be. NetworkWorld Extra:10 NASA space technologies that may never see the cosmosTop 10 cool satellite projects The structure called a catenary wire system, is the largest on the space compound and features large cables strung between three 594-foot-tall steel and fiberglass towers.

This configuration helps keep the vehicle isolated from dangerous lightning currents, NASA said. Each tower is topped with a fiberglass mast and a series of catenary wires and down conductors designed to divert lightning away from the rocket and service structure. The system will also include an array of sensors, both on the ground and the mobile launcher, will help determine the vehicle's condition after a nearby lightning strike. The system is being built around Kennedy's Launch Pad 39B, the location for NASA'a next generation of space vehicles: the Constellation Program and Ares/Orion launches. This can help prevent days of delays, NASA said on its Web site.

Pad B is the site of the first Ares vehicle launch, including Ares I-X. NASA said current Launch Pads 40 and 41 already each have lightning protection systems similar to the new version. The massive steel towers were assembled horizontally on the ground, then lifted into the vertical position by a 60-story-tall crane. The $28 million lightning protection system, received NASA's go-ahead to proceed in September 2008. The system's foundation includes 216 pilings extending up to 55 feet below ground. According to NASA, lightning dispersal systems have changed dramatically over the years. This system provides shielding to the space shuttle and diverts strike currents down to the ground, making it an isolated system and an improvement over the Apollo arrangement, NASA said. According to its Web site, The Apollo system, for example, was a bonded system. "A bonded structure is part of the launch structure," says Constellation Senior Pad Project Manager Jose Perez Morales. "Obviously, if you get a lightning strike, it doesn't matter how well you place your wires - you're going to get current going through the structure." For the space shuttle, the lightning protection system consists of a lightning mast on the top of each pad's service structure and two catenary wires.

The test flight that will happen today if the weather holds, will provide NASA an early opportunity to test and prove hardware, models, facilities and ground operations associated with the Ares I launch vehicle. Data collected, including from more than 700 sensors throughout the rocket, will begin to confirm the vehicle as a whole is safe and stable in flight before astronauts begin traveling into orbit, NASA stated. The flight also will allow NASA to gather critical data during ascent of the integrated stack, which includes the Ares I launch vehicle with a simulated upper stage, Orion crew exploration vehicle and launch abort system. The Ares I-X test rocket is similar in mass and size to the actual Ares I rocket and Orion spacecraft systems, but it will incorporate a mix of proven spaceflight and simulated, or mock-up, hardware, NASA stated. Mock-ups of the upper stage, Orion crew module and launch abort system will be used to simulate the integrated spacecraft, according to NASA. The flight test profile will closely follow the approximate flight conditions that will be experienced by the Ares and Orion vehicles through Mach 4.7 - more than four times the speed of sound. The flight test vehicle will be powered by a single, four-segment reusable solid rocket booster - flight hardware currently in the space shuttle inventory - modified to include a fifth, inactive segment to simulate the Ares I five-segment booster.

Approximately two minutes into flight and at about 130,000 feet, the launch vehicle's first stage will separate from the upper stage. The maximum altitude, or apogee, of the flight test will be about 150,000 feet, or 28 miles.

Security certifications are the most sought-after area of specialty among information technology professionals, according to a new study from Computing Technology Industry Association (CompTIA). (Check out CSO's certification directory to see certification options.) The survey of more than 1,500 IT workers found that 37 percent intend to pursue a security certification over the next five years. The results are included in the CompTIA study 'IT Training and Certification: Insights and Opportunities.' "Given the growing reach of security, with threats becoming more pervasive and dangerous and with no business or industry immune to those threats, it makes sense that many IT professionals view this as a must-have for career advancement," said Terry Erdle, senior vice president, skills certifications, CompTIA. The results fall in line with a survey conducted by the same organization earlier this year that found more companies are requiring IT security certification. Another 18 percent of IT workers said they will seek ethical hacking certifications during the same time period, while 13 percent identified forensics as their next certification target. In that research, the number of organizations where IT security certification is required has increased by half and is continuing to grow; 32 percent of employees were required to have certifications in 2008, compared to 20 percent in 2006. Other technology areas where survey respondents said they will seek new certifications over the next five years include green IT, healthcare IT, mobile and software-as-a-service.

Eighty-eight percent of certification holders indicated they pursue a certification to enhance their resume. Economic advancement and personal growth are key drivers for seeking IT certifications, the CompTIA study also reveals. An identical 88 percent said personal growth is a major or minor reason in their decision to pursue a certification.

Technology can help mitigate the new dangers presented by online dating and the "hook-up" culture of today's youth, as well as the long-present threat of sexual misconduct by trusted authority figures, according to three companies presenting at the DEMO conference on Tuesday. Date Check requires users to input the name or phone number of the man or woman in question. One of the companies, Date Check , lets people do quick background checks on potential dates and mates from their mobile phones. "Look up before you hook up," said John Arnold, executive vice-president of Intelius Inc. , which is offering the service. Date Check will then search Intelius' vast database and rate the person on a number of factors, including: After digesting that information, users can rate the potential mate on a scale of one to five kisses.

Another Web site, GelatoDating.com , also lets people check out their prospective dates beforehand. Date Check is even more necessary today because of the popularity of online dating, and today's mobile populace, Arnold said. "I do love it," Anu Shukla, founder and CEO for Offerpal Media, Inc., said during an on-stage interview at DEMO following Date Check's presentation. "I could see giving it to all of my dating friends or nieces." The app runs on the iPhone now, and will come to Android and BlackBerry smartphones next month. Gelato aggregates all of the online activity of a person - blog posts, Tweets, FaceBook posts, and other things that can be found manually via Google - into an easy to read "lifestream," says Gelato's founder, Steve Odom. Gelato lets people sign up and control their "lifestream" profile. This lets users "get away from static dating site profiles, to something more authentic," Odom said. They can limit which FaceBook status updates are displayed by Gelato, as well as which Tweets.

It costs $8 per school employee, Origer said. A third company, MicroAssist Inc., is debuting an e-learning service called EthicsEd. It is a training curriculum on topic such as online sexual misconduct that is sold to school administrators and designed to be viewed by school teachers and youth coaches. "It helps the schools protect the children," said Chuck Origer, vice-president of business development at MicroAssist.

Technology can help mitigate the new dangers presented by online dating and the "hook-up" culture of today's youth, as well as the long-present threat of sexual misconduct by trusted authority figures, according to three companies presenting at the DEMO conference on Tuesday. Date Check requires users to input the name or phone number of the man or woman in question. One of the companies, Date Check , lets people do quick background checks on potential dates and mates from their mobile phones. "Look up before you hook up," said John Arnold, executive vice-president of Intelius Inc. , which is offering the service. Date Check will then search Intelius' vast database and rate the person on a number of factors, including: After digesting that information, users can rate the potential mate on a scale of one to five kisses.

Another Web site, GelatoDating.com , also lets people check out their prospective dates beforehand. Date Check is even more necessary today because of the popularity of online dating, and today's mobile populace, Arnold said. "I do love it," Anu Shukla, founder and CEO for Offerpal Media, Inc., said during an on-stage interview at DEMO following Date Check's presentation. "I could see giving it to all of my dating friends or nieces." The app runs on the iPhone now, and will come to Android and BlackBerry smartphones next month. Gelato aggregates all of the online activity of a person - blog posts, Tweets, FaceBook posts, and other things that can be found manually via Google - into an easy to read "lifestream," says Gelato's founder, Steve Odom. Gelato lets people sign up and control their "lifestream" profile. This lets users "get away from static dating site profiles, to something more authentic," Odom said. They can limit which FaceBook status updates are displayed by Gelato, as well as which Tweets.

It costs $8 per school employee, Origer said. A third company, MicroAssist Inc., is debuting an e-learning service called EthicsEd. It is a training curriculum on topic such as online sexual misconduct that is sold to school administrators and designed to be viewed by school teachers and youth coaches. "It helps the schools protect the children," said Chuck Origer, vice-president of business development at MicroAssist.

Shortly after European regulators opened an antitrust probe into Oracle's pending acquisition of Sun Microsystems, SAP CEO Léo Apotheker wrote Oracle CEO Larry Ellison, asking for a meeting to discuss the merger and "other open issues" between the vendors, according to a Wall Street Journal editorial published late Thursday. The letter was sent Sept. 15 and consisted of the following brief statement, according to the Journal: "As you know, we have significant concerns about Oracle's proposed takeover of Sun. SAP spokesman James Dever confirmed on Friday that Apotheker had written Ellison "seeking a dialogue," but declined to provide a copy of the letter. We renew our invitation to meet to attempt to resolve our concerns and other open issues between our companies.

Oracle has said its damages could top US$1 billion. Please let us know if and when you would like to meet." The WSJ's editorial referred to speculation that the European Commission is blocking the Sun acquisition due to lobbying efforts by SAP. It also noted that one major "open issue" between the companies is the intellectual property lawsuit Oracle filed against SAP in connection with TomorrowNow, a now-shuttered subsidiary of SAP that provided third-party support for Oracle applications. Meanwhile, the timing of Apotheker's letter implies that he "either believed, or wanted Oracle to believe, that he could smooth the merger review if he so desired," the editorial alleged. Meanwhile, the European Commission is reportedly planning to issue a formal "statement of objections" against the merger. The insinuations raised by the WSJ are baseless, according to Dever. "I disagree with the assumptions and inferences that were made," he said. "It certainly overstates what SAP can and is able to do." "The fact is we have a deep relationship with Oracle that goes beyond a lawsuit," including many mutual customers, Dever added. "We're partners as well as competitors." An Oracle spokeswoman didn't immediately respond to a request for comment. If that happens, Oracle plans to mount a vigorous offensive campaign with the aid of senior US political officials, IDG News Service reported this week.

Twitter warned users Tuesday of a new phishing scam on the social networking site. The message reads, "hi. this you on here?" and includes a link to a fake Web site designed to look like a Twitter log-in page. It's the latest in a series of scams that have plagued the site over the past year, designed to trick victims into giving up their user names and passwords. "We've seen a few phishing attempts today, if you've received a strange DM and it takes you to a Twitter login page, don't do it!," Twitter wrote on its Spam message page.

After entering a user name and password, victims enter an empty blogspot page belonging to someone named NetMeg99. Neither of these pages appears to include any type of attack code, but both should be considered untrustworthy, according to Sophos Technology Consultant Graham Cluley. "It seems like this was a straightforward phishing campaign, rather than an attempt - at this stage at least - to spread virally," he said via email. Once a user has been phished by the attack, the criminals are then able to direct message all of the victim's contacts with the phishing spam. "These sort of things have been happening for over a year on Twitter," Cluley said in an interview. Victims get these direct messages only from people they follow on Twitter, so they seem more believable than other types of spam. Hacked Twitter accounts are a great launching pad for more attacks, Cluley said. "We don't know precisely what they're going to do in this case, but often they will send spam messages to advertise a particular site." Because about a third of users have the same passwords for all of their online activity, criminals can also use the same log-in information to try to get into other Web services such as Gmail or Yahoo, Cluley said. "If you've fallen for one of these traps, don't just change your Twitter password; change your password on every Web site you use," Cluley siad. "Use non-dictionary words and use something that's hard to guess." The Twitter attack comes as Facebook users are also under siege. When victims try to open an attachment that supposedly contains their new password, they end up running a Trojan horse program, called Bredolab, that then installs unwanted software on their PCs.

Security researchers say that a spam botnet is has sent out hundreds of thousands of fake password reset messages.