yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

CSO Launches New Security Awards Program: CSO40 Awards
Awards to Recognize 40 Innovative Security Organizations and Presented at 10th Annual CSO National Conference

FRAMINGHAM, MA -- (Marketwire) -- 11/19/12 -- IDG's CSO -- the premier security media brand providing insight into business risk leadership -- announces the launch of the CSO40 Awards and invites organizations to nominate their security initiatives which demonstrate outstanding business value and thought leadership. Award honorees will be recognized at the CSO40 Security Confab + Awards in April 2013 near Atlanta, Georgia.

CSO40 Awards: Call for Nominations
Nomination Deadline: November 30, 2012
The CSO40 Awards will recognize 40 organizations that have delivered ground-breaking business value through the innovative application of risk and security concepts and technologies. Honorees will be recognized at the CSO40 Security Confab + Awards conference and announced publically in CSO magazine. Honorees -- selected by an expert panel of security thought leaders and practitioners -- may have an opportunity to share their best practices during a conference session. To learn more about the award's program and/or submit a nomination, please visit:

CSO40 Security Confab + Awards Conference
April 2-3, 2013
Chateau Elan near Atlanta, Georgia
The CSO40 Security Confab + Awards conference will focus on "Defining the Future of Security and Risk" by leveraging a unique combination of keynote sessions and rapid-fire, short-format presentations, designed to deliver a range of thought leadership ideas, concepts and trends that will shape the future of security and risk management.

More than 200 security, IT and business decision-makers will attend the CSO40 Security Confab + Awards conference to discuss:

  • Data governance -- particularly big data
  • Securing the mobile enterprise
  • Ongoing and future cyber security challenges
  • Securing the cloud
  • Mitigating organizational risk

"As businesses continue to transform and leverage new technologies -- including mobile, cloud and big data -- to streamline how they operate, security has become more important than ever," said Bob Bragdon, vice president and publisher, CSO. "Continuing our 10 year tradition of providing an atmosphere for ongoing dialogue, the CSO40 Security Confab + Awards will provide security peers and thought leaders an environment to share best practices and hear from innovative providers with valuable solutions to ease the transition."

Sponsorship Opportunities
Current conference sponsors include: AsTech, nCircle, Quantum Secure, Solutionary, Inc., Tripwire and Wombat Security Technologies, Inc.

For sponsorship opportunities, please contact Per Melker at 508.935.4729 or

Register to Attend
To attend the CSO40 Security Confab + Awards, please call 800.883.9090 or visit to register online.

For more information about the CSO40 Security Confab + Awards, please visit

The CSO40 Security Confab + Awards conference is produced by CSO magazine.

CSO is the premier content and community resource for security decision-makers leading "business risk management" efforts within their organization. For more than a decade, CSO's award-winning Web site (, publication, executive conferences, custom solutions and research has equipped security decision-makers to mitigate both IT and corporate/physical risk for their organization and provides opportunities for security vendors looking to reach this audience. To assist CSOs in educating their organizations' employees on corporate and personal security practices, CSO also produces the quarterly newsletter, Security Smart. CSO is published by IDG Enterprise, a subsidiary of International Data Group (IDG), the world's leading media, events, and research company. Company information is available at

Add to Digg Bookmark with Add to Newsvine

Media Contact:
Heather Davis
Marketing & PR Specialist
IDG Enterprise
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers