yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
This book is a great addition to my collection of Mac how to books. I like this one because it steps over the line into the more technical side of Mac features than most of the Mountain Lion guide books do.
The book is broken down into seven parts. I have listed the parts below along with the chapters they each contain.
I. Back to Basics 1. The Best Shortcuts (and How to Make Your Own) 2. Starting Applications Automatically at Login 3. Finding Files and Folders Fast 4. Organizing Windows 5. Cleaning House 6. Adjusting Energy and Display Settings
II. Boosting Productivity 7. Launching Applications Fast 8. Customizing Trackpad and Mouse Gestures 9. Connecting Multiple Displays to Your Mac 10. Talking to Your Mac
III. Automation 11. Automating Tasks with Macros 12. Automating Tasks with AppleScript 13. Creating a Bluetooth Proximity Monitor 14. Automating File and Folder Actions 15. Triggering Location-Based Actions
IV. Managing Your Life 16. Managing Your Email 17. Killing Spam 18. Creating Quick and Easy Alerts 19. Managing Your Music
V. Internet and Networks 20. Creating Your Own Safari Extension 21. Turning Websites into Applications 22. Storing Files in the Cloud 23. Accessing Your Mac Remotely 24. Turning Your Mac into a Web and FTP Server 25. Wirelessly Sharing a Printer and Hard Drive 26. Synchronizing Files Between Computers
VI. Serious Security 27. Creating Strong Passwords and Storing Them Securely 28. Enabling Firmware Password Protection 29. Encrypting Your Mac’s Internet Connection 30. Enabling Firewalls 31. Preserving Your Anonymity Online 32. Encrypting Your Hard Disks and Backups
VII. Monitoring, Troubleshooting, and Maintenance 33. System and Process Monitoring 34. Repairing Disk Permissions 35. Verifying and Repairing the Hard Disk 36. Making Better File Backups 37. Maintaining a MacBook’s Battery 38. Creating an Emergency USB Drive
One of the things I like about the book is the way it is laid out. It has a very comfortable and easy to read format. Each chapter starts with an overview of the topic, the project goal for the chapter, and a What You'll be using section. The author then digs into the details of the topic.
At the beginning of each chapter there is a "What You'll be Using" section. This section lists all the tools the author takes advantage of in the chapter. The tools are not all free open source tools. There are some tools listed that must pay for, but I would rather have the tools that get the job done right, than just partial open source tools. Some books I've read have only used open-source tools and a lot of times they've been limited in their functionality.
The author's writing style makes the topics at hand very easy to understand and makes the book a very easy read. It not only can be read from cover to cover, it also make a great reference.
Some of the chapters that were a pleasant surprise were Turning Your Mac into a Web and FTP Server, Preserving Your Anonymity Online, Encrypting Your Mac’s Internet Connection, Creating Your Own Safari Extension, Automating Tasks with AppleScript, and Creating a Bluetooth Proximity Monitor.
The author covers downloading, installing, and configuring MAMP. The author helps you get Apache and MySQL up and running in no time at all.
I love that the author introduces the Tor Browser Bundle and Vidalia Bundle in the Preserving Your Anonymity Online chapter. Not many people know about it. I have used it several time when running through white hat hack attacks during security testing.
This book will stay in my backpack. I highly recommend it to anyone who wants to take the Mac user skills to the next level.
IT systems will need to adapt, and evolving — or simply adding on to the existing relational database management system architecture — isn’t going to cut it. What does this mean, if not Hadoop or in-memory as the end-all, be-all? TechTarget writer Nicole Laskowski sums it up nicely: Ar...
14th International Cloud Expo, held on June 10–12, 2014 at the Javits Center in New York City, featured three content-packed days with a rich array of sessions about the business and technical value of cloud computing, Internet of Things, Big Data, and DevOps led by exceptional speaker...
As more applications and services move "to the cloud" (public or on-premise) cloud environments are increasingly adopting and building out traditional enterprise features. This in turn is enabling and encouraging cloud adoption from enterprise users. In many ways the definition is blur...
Internet of @ThingsExpo Silicon Valley announced on Friday its first 18 all-star speakers and sessions for its upcoming event, which will take place November 4-6, 2014, at the Santa Clara Convention Center in California. @ThingsExpo, the first and largest IoT event in the world, debute...
Until recently, many organizations required specialized departments to perform mapping and geospatial analysis, and they used Esri on-premise solutions for that work.
In his session at 15th Cloud Expo, Dave Peters, author of the Esri Press book Building a GIS, System Architecture Des...
Back when we were doing DB2 at IBM, there was an important older product called IMS which brought significant revenue. With another database product coming (based on relational technology), IBM did not want any cannibalization of the existing revenue stream. Hence we coined the phrase ...