Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
SYS-CON.TV
TCDI Now SOC 2SM Compliant

TCDI announced today that the company has undergone a Service Organization Control 2SM (SOC 2SM) examination resulting in a CPA’s report stating that the management of Technology Concepts & Design, Inc. maintained effective controls over the security, availability, and confidentiality of its Litigation Support Service. The engagement was performed by Cherry, Bekaert & Holland, L.L.P (CBH).

Earlier this year, the SOC 2SM reports replaced SAS 70 Type II audits as the benchmark compliance report for service organizations. The new standards required TCDI to complete and submit a written assessment of the operating effectiveness and suitability of its controls, which was analyzed and validated in person by the independent auditors.

The SOC 2SM report is designed to meet the needs of existing or potential clients who need assurance about the effectiveness of controls that are relevant to the security and availability of the system used to process the clients’ information, or the confidentiality that information. The report provides valuable data that clients of the service organization need to assess and address the risks associated with an outsourced service.

"We are pleased that our SOC 2SM report has shown that we have the appropriate controls in place to mitigate risks related to availability, security, and confidentiality.” said Kittie Pearson, Managing Director of Compliance & CDS. “We believe this report provides significant value and assurance to our clients by demonstrating our commitment to operational excellence in meeting their needs while providing a secure and reliable solution.”

The following principles and related criteria have been developed by the American Institute of CPAs (AICPA) and the Canadian Institute of Chartered Accountants (CICA) for use by practitioners in the performance of trust services engagements:

  • Security. The system is protected against unauthorized access (both physical and logical).
  • Processing Integrity: System processing is complete, accurate, timely and authorized.
  • Availability. The system is available for operation and use as committed or agreed.
  • Confidentiality. Information designated as confidential is protected as committed or agreed.
  • Privacy: Personal information is collected, used, retained, disclosed and destroyed in conformity with the commitments in the privacy notice and with criteria set forth in generally accepted privacy principles issued by the AICPA.

About TCDI

Since 1988, TCDI® has partnered with large corporations and law firms to provide advanced litigation support software and services for eDiscovery, hosted Review & Production, and large-scale Litigation Case-File Management. The company combines advanced technology and automation with superior client partnerships and has been a technology partner in some of the largest litigation in U.S. history.

To learn more, visit www.tcdi.com or call 888.823.2880.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

SOA World Latest Stories
Processes are not documented and reused by a set of individuals because they lead to failure. Like design patterns, they are documented and reused because they lead to success. They are all put together by very talented people who have successfully used them to develop software multip...
I've been writing recently about the dimensions of Big Data in the IoT: urgency, importance, frequency, consequences, remedy, cost. You can find my stories on IoT Journal or at my personal website. The big item missing from this list is, of course, size. How big are individual messa...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
Vormetric on Tuesday announced that Rackspace Hosting has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the performance, flexibility...
I'm reading a McKinsey report from May 2013 that talks about 12 disruptive technologies, including cloud computing and the Internet of Things (IoT). I'll focus on the IoT here. The report estimates the IoT Internet to be worth between $2.7 and $6.2 trillion by the year 2025.(The world'...
up.time, from uptime software, monitors performance, availability and capacity across all servers, virtual machines, applications, IT services, and the network. Proactively find IT system performance issues before they happen, report on total capacity, easily identify troublemakers, tr...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021


SYS-CON Featured Whitepapers
ADS BY GOOGLE