yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
Conference, the world’s leading information security
conferences and expositions, will conduct its annual
teleconference featuring three of today’s leading security
analysts from Gartner, 451 Research and Forrester. The
teleconference will discuss top cybersecurity trends including
mobile and big data security, as well as preview upcoming sessions
at RSA Conference 2013, being held on February 25 – March 1 at
Moscone Center in San Francisco.
The teleconference will feature research and commentary from Ramon
Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of
Forrester. Hugh Thompson, Program Chair of RSA Conference, will act
as the moderator.
There will be a 15-minute Q&A prior to the conclusion of the call.
Ramon Krikken is a Research Vice President within Gartner's Risk
Management Strategies team. He covers software/application
security; mobile application security and service-oriented
architecture (SOA) security; structured and unstructured data
security management, including data masking, redaction and
tokenization; cryptography, key management and PKI; security
monitoring and security analytics; security metrics; and
virtualization and cloud computing security as it pertains to the
other categories. In addition to his participation in this
teleconference, Krikken will participate in the following RSA
Conference 2013 session: “Software Security: A Waste of Time,” on
Wednesday, February 27 at 9:20 AM.
Wendy Nather, 451 Research
Wendy Nather is Research Director, Security, within 451 Research's
Enterprise Security Program, providing analysis on the current
state of security from the perspective of a veteran CISO. Nather’s
primary areas of coverage are application security, identity and
access management, threat intelligence, and security services. She
is co-author of the book, ‘The Cloud Security Rules,’ and was
named one of Tripwire's "Top 25 Influencers in Security You Should
Be Following." In addition to her participation in this
teleconference, Nather will participate in the following RSA
Conference 2013 sessions, “Psychographics of the CISO,” on
Wednesday, February 27 at 9:20 AM, and “Living Below the Security
Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.
Chenxi Wang, Forrester
Chenxi Wang is Vice President and Principal Analyst at Forrester
serving Security and Risk Professionals. She is a leading expert
on mobile security, endpoint security, application security, and
cloud security. Wang leads the effort at Forrester to build the
research portfolio that addresses how enterprise mobility,
consumerization, and emerging threats affect security strategy,
policy, architecture, application development, and operations. She
has also written extensively about global data privacy laws and
the China technology market and closely follows the technology
adoption trends in that market. In addition to her participation
in this teleconference, Wang will participate in the following
RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging
Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a
VDI Desktop More Secure Than a Standard Desktop,” on Thursday,
February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT
and Risk Footprint,” on Thursday, February 28 at 1:40 PM.
Moderator: Dr. Herbert “Hugh” Thompson,
Program Chair of RSA Conferences
Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences
and a world-renowned expert on IT security. He has co-authored
several books on the topic and has written more than 80 academic
and industrial publications on security. In 2006, Thompson was
named one of the "Top 5 Most Influential Thinkers in IT Security"
by SC Magazine and has been interviewed by top news organizations
including the BBC, CNN, MSNBC, Financial Times, Washington Post
and others. He has been an adjunct professor at Columbia
University in New York for the past few years where he taught
courses on computer security. In addition to his participation in
this teleconference, Thompson will be one of the speakers at
the day-long Security Basics seminar at RSA Conference 2013 on
Monday, February 25 beginning at 8:30 AM. He will also be
keynoting on Friday at 1:00 PM with special guests.
About RSA Conference RSA Conference helps drive the global
information security agenda with annual events in the U.S., Europe, and
Asia. Since 1991, RSA Conference consistently attracts the best and
brightest in the field, creating opportunities to learn about
information security’s most important issues through face-to-face and
online interactions with peers, luminaries and emerging and established
companies. As information security professionals work to stay ahead of
ever-changing security threats and trends, they turn to RSA Conference
for a 360-degree view of the industry. RSA Conference seeks to arm
participants with the knowledge they need to remain at the forefront of
the information security business. More information on events, online
programming and the most up-to-date news pertaining to the information
security industry can be found at www.rsaconference.com.
RSA and the RSA Conference logo are either registered trademarks or
trademarks of EMC Corporation in the United States and/or other
countries. All other products and/or services referenced are trademarks
of their respective companies.
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging tech...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches.
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth.
In his sessio...
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “De...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedente...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Based on a collective appreciation for user experience, design, and technology, G2G3 i...