yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
Conference, the world’s leading information security
conferences and expositions, will conduct its annual
teleconference featuring three of today’s leading security
analysts from Gartner, 451 Research and Forrester. The
teleconference will discuss top cybersecurity trends including
mobile and big data security, as well as preview upcoming sessions
at RSA Conference 2013, being held on February 25 – March 1 at
Moscone Center in San Francisco.
The teleconference will feature research and commentary from Ramon
Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of
Forrester. Hugh Thompson, Program Chair of RSA Conference, will act
as the moderator.
There will be a 15-minute Q&A prior to the conclusion of the call.
Ramon Krikken is a Research Vice President within Gartner's Risk
Management Strategies team. He covers software/application
security; mobile application security and service-oriented
architecture (SOA) security; structured and unstructured data
security management, including data masking, redaction and
tokenization; cryptography, key management and PKI; security
monitoring and security analytics; security metrics; and
virtualization and cloud computing security as it pertains to the
other categories. In addition to his participation in this
teleconference, Krikken will participate in the following RSA
Conference 2013 session: “Software Security: A Waste of Time,” on
Wednesday, February 27 at 9:20 AM.
Wendy Nather, 451 Research
Wendy Nather is Research Director, Security, within 451 Research's
Enterprise Security Program, providing analysis on the current
state of security from the perspective of a veteran CISO. Nather’s
primary areas of coverage are application security, identity and
access management, threat intelligence, and security services. She
is co-author of the book, ‘The Cloud Security Rules,’ and was
named one of Tripwire's "Top 25 Influencers in Security You Should
Be Following." In addition to her participation in this
teleconference, Nather will participate in the following RSA
Conference 2013 sessions, “Psychographics of the CISO,” on
Wednesday, February 27 at 9:20 AM, and “Living Below the Security
Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.
Chenxi Wang, Forrester
Chenxi Wang is Vice President and Principal Analyst at Forrester
serving Security and Risk Professionals. She is a leading expert
on mobile security, endpoint security, application security, and
cloud security. Wang leads the effort at Forrester to build the
research portfolio that addresses how enterprise mobility,
consumerization, and emerging threats affect security strategy,
policy, architecture, application development, and operations. She
has also written extensively about global data privacy laws and
the China technology market and closely follows the technology
adoption trends in that market. In addition to her participation
in this teleconference, Wang will participate in the following
RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging
Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a
VDI Desktop More Secure Than a Standard Desktop,” on Thursday,
February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT
and Risk Footprint,” on Thursday, February 28 at 1:40 PM.
Moderator: Dr. Herbert “Hugh” Thompson,
Program Chair of RSA Conferences
Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences
and a world-renowned expert on IT security. He has co-authored
several books on the topic and has written more than 80 academic
and industrial publications on security. In 2006, Thompson was
named one of the "Top 5 Most Influential Thinkers in IT Security"
by SC Magazine and has been interviewed by top news organizations
including the BBC, CNN, MSNBC, Financial Times, Washington Post
and others. He has been an adjunct professor at Columbia
University in New York for the past few years where he taught
courses on computer security. In addition to his participation in
this teleconference, Thompson will be one of the speakers at
the day-long Security Basics seminar at RSA Conference 2013 on
Monday, February 25 beginning at 8:30 AM. He will also be
keynoting on Friday at 1:00 PM with special guests.
About RSA Conference RSA Conference helps drive the global
information security agenda with annual events in the U.S., Europe, and
Asia. Since 1991, RSA Conference consistently attracts the best and
brightest in the field, creating opportunities to learn about
information security’s most important issues through face-to-face and
online interactions with peers, luminaries and emerging and established
companies. As information security professionals work to stay ahead of
ever-changing security threats and trends, they turn to RSA Conference
for a 360-degree view of the industry. RSA Conference seeks to arm
participants with the knowledge they need to remain at the forefront of
the information security business. More information on events, online
programming and the most up-to-date news pertaining to the information
security industry can be found at www.rsaconference.com.
RSA and the RSA Conference logo are either registered trademarks or
trademarks of EMC Corporation in the United States and/or other
countries. All other products and/or services referenced are trademarks
of their respective companies.
The theme for this year’s International Women’s Day is Inspiring Change. As one of Europe’s leading cloud companies iomart has long championed the employment possibilities that working in the field of technology offers to women. Sadly current statistics show that our industry is still ...
DevOps, when done right, usually goes unnoticed. It’s only when something breaks that all eyes turn to IT. If your boss only sees you when the app is down, however, that’s not really doing your career any favors.
In his session at 2nd DevOps Summit, Dustin Whittle, Developer Evangeli...
Citrix Ready program helps customers identify third-party solutions that are recommended to enhance virtualization, networking and cloud computing solutions from Citrix. Appcore AMP completed a rigorous verification process to ensure compatibility with Citrix CloudPlatform™, providing ...
In the past 10 years, numerous solutions have been developed to deal with limitations in the leading relational databases. But knowing which offering works best per use case can be difficult to decipher.
Avi’s usual recommendation for Hadoop-type jobs is the MapR distribution. He hav...
IBM on Wednesday announced it has deployed a business-to-business (B2B) cloud-based network that will help transform the Indian automotive industry by accelerating the movement of data and reducing transaction costs by up to 80 percent. The new exchange – AutoDX – was developed in part...
CloudBees, Inc., on Wednesday announced it has closed an $11.2 million Series C financing round. The round was led by Verizon Ventures, the investment arm of Verizon Communications Inc. The round also included existing investors Matrix Partners and LightSpeed Venture Partners, as well ...