yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

NQ Mobile™ Contributes tips to the FCC's New Cross Platform Smartphone Security Checker

DALLAS, Dec. 24, 2012 /PRNewswire/ -- With the Federal Communications Commission (FCC) reporting that more than 40 percent of smartphone users have no antivirus software on their smartphones and less than 50 percent use password protection, how can you better protect your mobile devices? The FCC has your answer.

(Logo: )

NQ Mobile contributed to the FCC's new Smartphone Security Checker. The tool was developed in collaboration with government experts, smartphone developers, and private IT and security companies like NQ Mobile. The checker allows consumers to create a customized 10-step security checklist tailored to their smartphone's operating system (Apple iOS, Android, BlackBerry, or Windows Phone).

To help your friends and family stay safe this holiday season, visit The site will walk you through the following:

  • How to set pins and passwords for your smartphone
  • Download security apps that enable remote locating and data wiping
  • Back-up the data on your smartphone if your device is lost or stolen
  • Wipe data on your old phone and where to go to donate, resell or recycle it
  • Safely use public Wi-Fi networks and what steps to take if your phone is stolen

It's crucial that consumers around the nation become educated about growing mobile malware threats and learn how to protect their mobile devices. By offering a security solution like the new FCC security checker, we're actively assuring that the public has access to tools that will insure the safety and security of their valuable mobile data.

About NQ Mobile
NQ Mobile Inc. (NYSE: NQ) is a leading global provider of trusted mobile Internet services built on its world-class acquisition, engagement and monetization platform.  The company was one of the first to recognize the growing security threats targeting smartphone users and now has about 242 million registered and 85 million active user accounts globally. NQ Mobile's cloud-based trust platform has been recognized by third-party testing facilities around the world as the most effective solution for detecting and combating mobile threats. NQ Mobile is recognized as a global pioneer in mobile innovation and technology leadership.  NQ Mobile maintains dual headquarters in Dallas, TX, USA and Beijing, China. For more information on NQ Mobile, please visit

SOURCE NQ Mobile Inc.

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers