004_VOL1ISS8 by isbangee

VIEWS: 3 PAGES: 4

									VOLUME 1 ISSUE 8 JUNE 1ST, 2009
806 Hastings Street Suite L Traverse City, MI 49686

WE’RE ON THE WEB!! HTTP:// WWW.ACSSERVICE.COM

Networking Solution Providers

Phone: 231-933-6333 Fax: 231-346-5941

Networking Now, June 2009 Hubble Mission #4
Servicing Mission 4, the final astronaut mission to the Hubble Space Telescope, has come to an end. Over the course of five spacewalks, astronauts successfully installed two new instruments, repaired two others, and replaced a number of components essential to the telescope's smooth functioning, such as batteries and insulation. "Not everything went as we planned, but we planned a way to work around everything and with the whole team pulling together ... we've been able to do some incredible things," Commander Scott Altman reported as the shuttle released Hubble to return to space. "And now Hubble can continue on its own, exploring the cosmos and bringing it home to us." Engineers continue to perform testing on the telescope, with the first new images expected in September.

Inside this issue:
Hubble Mission #4 1

Pentagon 2 Waging Wars in Cyberspace Digitalizing Honolulu Top 5 Most Wanted E3 Games
Something New From Google

2

3

3

The Web’s Most Dangerous Keywords

4

Page 2

NETWORKING NOW, JUNE 2009

Pentagon Plans New Arm to Wage Wars in Cyberspace
By David E. Sanger and Thom Shanker, 5-28-09
WASHINGTON — The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare. The military command would complement a civilian effort to be announced by President Obama on Friday that would overhaul the way the United States safeguards its computer networks. Mr. Obama, officials said, will announce the creation of a White House office — reporting to both the National Security Council and the National Economic Council — that will coordinate a multibillion-dollar effort to restrict access to government computers and protect systems that run the stock exchanges, clear global banking transactions and manage the air traffic control system. White House officials say Mr. Obama has not yet been formally presented with the Pentagon plan. They said he would not discuss it Friday when he announced the creation of a White House office responsible for coordinating private-sector and government defenses against the thousands of cyber attacks mounted against the United States — largely by hackers but sometimes by foreign governments — every day. But he is expected to sign a classified order in coming weeks that will create the military cyber command, officials said. It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts. The White House office will be run by a “cyber czar,” but because the position will not have direct access to the president, some experts said it was not high-level enough to end a series of bureaucratic wars that have broken out as billions of dollars have suddenly been allocated to protect against the computer threats.

Digitalizing Honolulu
By Herbert A. Sample- 05/28/09 9:32 AM PT
There was some disagreement Wednesday over why only 6.3 percent of eligible voters used a new, first-inthe-U.S. digital voting procedure to cast ballots for Honolulu neighborhood board seats via the Internet or by touch-tone phone. Still, officials at both the Neighborhood Commission, which oversees the neighborhood board elections, and the San Diego, Calif.-based company that created the voting system, insist that digital voting is probably the wave of the future. "The technology side -- it works," said Joan Manke, executive secretary of the commission, "but it's a whole new arena. It's something that's removed from your traditional paper ballots, which has been done for years and years. "So my sense is because it's a change -- it's something totally new -- it takes time, I think, for people to buy into it, to want to actually try it," she added.

VOLUME 1 ISSUE 8

Page 3

Top 5 Most Wanted E3 Games
Right: Project Trico

Top: Zelda Right: Red Dead Redemption

Top: Heavy Rain Right: Modern Warfare 2

Learn More At: http:// www.msnbc.msn. com/ id/30989393/? pg=6#games_top5 _090529_E3

Something New From Google
By Miguel Helft– NY Times, 5/28/09 Jens and Lars Rasmussen, the two brothers who created what would become Google Maps, have spent the last couple of years holed up in Google’s offices in Sydney, Australia, dreaming up a new tool for communicating over the Web. On Thursday, at a Google conference for developers in San Francisco, they showcased the fruits of their work: Google Wave. Google Wave is an application running in a Web browser that creates a shared online desktop where two or more users can interact easily. They can exchange messages as they would do in e-mail or instant messaging conversation. They can share and edit rich documents that include formatted text, images and graphics. They can also drag and drop simple applications called widgets into a Wave to, for example, play a game together. And they can save and publish any Wave resulting from their collaboration to the Web. “We like to think that we invented something new here,” Lars Rasmussen said in an interview. “It is a communications and collaborations tool. We call it a Wave. It is equal measure document and conversation.”

Left: A screen shot of Google’s newest feature Google Wave.

The Web’s Most Dangerous Keywords
Which is the most dangerous keyword to search for using public search engines these days? It’s “screensavers” with a maximum risk of 59.1 percent, according to McAfee’s recently released report “The Web’s Most Dangerous Search Terms“. Upon searching for 2,658 unique popular keywords and phrases across 413,368 unique URLs, McAfee’s research concludes that lyrics and anything that includes ‘free” has the highest risk percentage of exposing users to malware and fraudulent web sites. The research further states that the category with the safest risk profile are health-related search terms.

Learn More: http://blogs.zdnet.com/security/?p=3457

806 Hastings Street Suite L Traverse City, MI 49686


								
To top