yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Two Thirds of British Texters Have Received Spam, But Most Are Unsure of How to Take Appropriate Action

Cloudmark, Inc., the global leader in messaging threat protection for mobile, fixed and social networks, today released a national survey on mobile users’ interaction with and awareness of text message spam in the UK. The survey, conducted online by Harris Interactive on behalf of Cloudmark among 1,164 UK adults aged 16+, found that 64% of UK mobile text message users aged 16 and older have received spam texts in the past year, but most are still unsure of how to take appropriate action.

The survey found 63% of British texters would ignore an unsolicited text message, as few as 10% would actually take the correct action by reporting spam to their carrier, and more worryingly 31% would text “STOP.” This response only works with text alerts that the recipient has legitimately signed up to, and has the reverse effect for spam texts – merely confirming that the number is live and encouraging the spammer to continue to target that phone.

Mobile users are strongly encouraged to forward spam texts to their carrier via “7726” spelling out "SPAM" on the keypad (or 87726 for Vodafone customers and 37726 for customers of Three UK). UK carriers collate spam reports from their customers, including operators that subscribe to the GSMA’s Spam Reporting Service powered by Cloudmark. Suspicious texts submitted to this service help Cloudmark tackle spam on behalf of participating carriers, who receive comprehensive reports with detailed information on spam content, senders and reporters, which enables them to block numbers and help to reduce further spam.

Cloudmark Chief Technology Officer Neil Cook said: “This survey has revealed a remarkable lack of awareness in the UK about the threat of mobile spam. It is a vicious circle that needs to be broken as the spammers that run these campaigns are making a living from duping UK mobile texters and selling data to fellow spammers. More often than not, the snippets of personal data a mobile texter offers in the hope to ‘win’ or ‘claim’ a prize is being used by very targeted third-parties to send even more spam. These findings must act as a rallying cry to raise awareness of the 7726 Spam Reporting Service and public participation is key to its success and effectiveness.

Neil continued: “Since the Spam Reporting Service launched in the UK in February 2011, Cloudmark have seen at least a tenfold increase in spam reports to the service in the UK. There is, however, clearly work to be done as the greater the volume of reports submitted to 7726, the greater impact it can have in preventing spammers from targeting UK consumers and attempting to extort money from them.”

Notes to Editors

To view an infographic that highlights key findings from the UK survey, please visit:

Survey Methodology

This study was conducted online within Great Britain by Harris Interactive on behalf of Cloudmark from September 25 – October 1, 2012 among 1,164 adults aged 16-64 (among whom 1,046 use a mobile phone to send/receive text messages) via its Global Omnibus product. Figures for age, sex, region, and internet usage were weighted where necessary to bring them into line with their actual proportions in the population. This data was weighted to reflect the composition of the general adult population.

For complete survey methodology, including weighting variables, please contact Deepika Bharadwa of MSL London at

About Cloudmark

Cloudmark protects 2 billion global subscribers daily from an explosion in messaging abuses across more operator networks than anyone else. Only Cloudmark defends the world’s largest Mobile, Fixed and Social Networks, including AT&T, Comcast, MySpace, NTT, Swisscom and Time Warner Cable, with scalable and accurate protection against the widest range of existing and emerging messaging threats.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers