yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
This book is a great addition to my collection of Mac how to books. I like this one because it steps over the line into the more technical side of Mac features than most of the Mountain Lion guide books do.
The book is broken down into seven parts. I have listed the parts below along with the chapters they each contain.
I. Back to Basics 1. The Best Shortcuts (and How to Make Your Own) 2. Starting Applications Automatically at Login 3. Finding Files and Folders Fast 4. Organizing Windows 5. Cleaning House 6. Adjusting Energy and Display Settings
II. Boosting Productivity 7. Launching Applications Fast 8. Customizing Trackpad and Mouse Gestures 9. Connecting Multiple Displays to Your Mac 10. Talking to Your Mac
III. Automation 11. Automating Tasks with Macros 12. Automating Tasks with AppleScript 13. Creating a Bluetooth Proximity Monitor 14. Automating File and Folder Actions 15. Triggering Location-Based Actions
IV. Managing Your Life 16. Managing Your Email 17. Killing Spam 18. Creating Quick and Easy Alerts 19. Managing Your Music
V. Internet and Networks 20. Creating Your Own Safari Extension 21. Turning Websites into Applications 22. Storing Files in the Cloud 23. Accessing Your Mac Remotely 24. Turning Your Mac into a Web and FTP Server 25. Wirelessly Sharing a Printer and Hard Drive 26. Synchronizing Files Between Computers
VI. Serious Security 27. Creating Strong Passwords and Storing Them Securely 28. Enabling Firmware Password Protection 29. Encrypting Your Mac’s Internet Connection 30. Enabling Firewalls 31. Preserving Your Anonymity Online 32. Encrypting Your Hard Disks and Backups
VII. Monitoring, Troubleshooting, and Maintenance 33. System and Process Monitoring 34. Repairing Disk Permissions 35. Verifying and Repairing the Hard Disk 36. Making Better File Backups 37. Maintaining a MacBook’s Battery 38. Creating an Emergency USB Drive
One of the things I like about the book is the way it is laid out. It has a very comfortable and easy to read format. Each chapter starts with an overview of the topic, the project goal for the chapter, and a What You'll be using section. The author then digs into the details of the topic.
At the beginning of each chapter there is a "What You'll be Using" section. This section lists all the tools the author takes advantage of in the chapter. The tools are not all free open source tools. There are some tools listed that must pay for, but I would rather have the tools that get the job done right, than just partial open source tools. Some books I've read have only used open-source tools and a lot of times they've been limited in their functionality.
The author's writing style makes the topics at hand very easy to understand and makes the book a very easy read. It not only can be read from cover to cover, it also make a great reference.
Some of the chapters that were a pleasant surprise were Turning Your Mac into a Web and FTP Server, Preserving Your Anonymity Online, Encrypting Your Mac’s Internet Connection, Creating Your Own Safari Extension, Automating Tasks with AppleScript, and Creating a Bluetooth Proximity Monitor.
The author covers downloading, installing, and configuring MAMP. The author helps you get Apache and MySQL up and running in no time at all.
I love that the author introduces the Tor Browser Bundle and Vidalia Bundle in the Preserving Your Anonymity Online chapter. Not many people know about it. I have used it several time when running through white hat hack attacks during security testing.
This book will stay in my backpack. I highly recommend it to anyone who wants to take the Mac user skills to the next level.
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and se...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
Maintaining lower development environments can become an unbearable headache. Changes to an application, service or API are seldom completely testable, leaving us to discover broken code when it’s too late. This lack of visibility into application dependencies severely limits early cod...
In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational co...
SYS-CON Events announced today that ActiveState, providers of Stackato, the platform for the agile enterprise, has been named “Silver Sponsor” of SYS-CON's 2nd DevOps Summit, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York.
VASCO Data Security International, Inc., has announced on Tuesday that it will release its Q1 2014 results on Thursday, April 24th.
On April 24, at 10.00 am EDT/16.00 CET, VASCO will hold a conference call, which will be streamed on the VASCO website.
Mr. T. Kendall Hunt, Chairman an...