yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
Conference, the world’s leading information security
conferences and expositions, will conduct its annual
teleconference featuring three of today’s leading security
analysts from Gartner, 451 Research and Forrester. The
teleconference will discuss top cybersecurity trends including
mobile and big data security, as well as preview upcoming sessions
at RSA Conference 2013, being held on February 25 – March 1 at
Moscone Center in San Francisco.
The teleconference will feature research and commentary from Ramon
Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of
Forrester. Hugh Thompson, Program Chair of RSA Conference, will act
as the moderator.
There will be a 15-minute Q&A prior to the conclusion of the call.
Ramon Krikken is a Research Vice President within Gartner's Risk
Management Strategies team. He covers software/application
security; mobile application security and service-oriented
architecture (SOA) security; structured and unstructured data
security management, including data masking, redaction and
tokenization; cryptography, key management and PKI; security
monitoring and security analytics; security metrics; and
virtualization and cloud computing security as it pertains to the
other categories. In addition to his participation in this
teleconference, Krikken will participate in the following RSA
Conference 2013 session: “Software Security: A Waste of Time,” on
Wednesday, February 27 at 9:20 AM.
Wendy Nather, 451 Research
Wendy Nather is Research Director, Security, within 451 Research's
Enterprise Security Program, providing analysis on the current
state of security from the perspective of a veteran CISO. Nather’s
primary areas of coverage are application security, identity and
access management, threat intelligence, and security services. She
is co-author of the book, ‘The Cloud Security Rules,’ and was
named one of Tripwire's "Top 25 Influencers in Security You Should
Be Following." In addition to her participation in this
teleconference, Nather will participate in the following RSA
Conference 2013 sessions, “Psychographics of the CISO,” on
Wednesday, February 27 at 9:20 AM, and “Living Below the Security
Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.
Chenxi Wang, Forrester
Chenxi Wang is Vice President and Principal Analyst at Forrester
serving Security and Risk Professionals. She is a leading expert
on mobile security, endpoint security, application security, and
cloud security. Wang leads the effort at Forrester to build the
research portfolio that addresses how enterprise mobility,
consumerization, and emerging threats affect security strategy,
policy, architecture, application development, and operations. She
has also written extensively about global data privacy laws and
the China technology market and closely follows the technology
adoption trends in that market. In addition to her participation
in this teleconference, Wang will participate in the following
RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging
Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a
VDI Desktop More Secure Than a Standard Desktop,” on Thursday,
February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT
and Risk Footprint,” on Thursday, February 28 at 1:40 PM.
Moderator: Dr. Herbert “Hugh” Thompson,
Program Chair of RSA Conferences
Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences
and a world-renowned expert on IT security. He has co-authored
several books on the topic and has written more than 80 academic
and industrial publications on security. In 2006, Thompson was
named one of the "Top 5 Most Influential Thinkers in IT Security"
by SC Magazine and has been interviewed by top news organizations
including the BBC, CNN, MSNBC, Financial Times, Washington Post
and others. He has been an adjunct professor at Columbia
University in New York for the past few years where he taught
courses on computer security. In addition to his participation in
this teleconference, Thompson will be one of the speakers at
the day-long Security Basics seminar at RSA Conference 2013 on
Monday, February 25 beginning at 8:30 AM. He will also be
keynoting on Friday at 1:00 PM with special guests.
About RSA Conference RSA Conference helps drive the global
information security agenda with annual events in the U.S., Europe, and
Asia. Since 1991, RSA Conference consistently attracts the best and
brightest in the field, creating opportunities to learn about
information security’s most important issues through face-to-face and
online interactions with peers, luminaries and emerging and established
companies. As information security professionals work to stay ahead of
ever-changing security threats and trends, they turn to RSA Conference
for a 360-degree view of the industry. RSA Conference seeks to arm
participants with the knowledge they need to remain at the forefront of
the information security business. More information on events, online
programming and the most up-to-date news pertaining to the information
security industry can be found at www.rsaconference.com.
RSA and the RSA Conference logo are either registered trademarks or
trademarks of EMC Corporation in the United States and/or other
countries. All other products and/or services referenced are trademarks
of their respective companies.
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your custom...
Transforming cloud-based data into a reportable format can be a very expensive, time-intensive and complex operation. As a SaaS platform with more than 30 million global users, Cornerstone OnDemand’s challenge was to create a scalable solution that would improve the time it took custom...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, will describe how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term c...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die...
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder.
Kubernetes offers sev...
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st C...