yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

How to Build Physical Security into Your Data Center
There are components that can be used just about anywhere

In some ways, virtual security of your data center can be easier to manage than physical security. At least, some data center managers seem to be more concerned about the former than they are the latter. Yet physical security breaches make up a significant portion of data center security risks.

Fortunately, there are ways you can build physical security into your data center. While some of these principles apply primarily to new data center construction, there are components that can be used just about anywhere:

  • Choose the right location. Stay away from airports, power plants, and bad neighborhoods. Get at least 100 feet from the main road, more if possible. Be at least 30 miles from your headquarters. Stay off fault lines and flood plains.
  • Install redundant utility feeds. You should have at least two feeds each for power, water, voice, and data. Make sure each feed comes in from a separate direction, and that they don’t trace back to the same substation.
  • Minimize windows. If you need some windows in the administrative area or break room, use bomb-resistant glass.
  • Utilize landscaping. There are a number of types of landscaping that will hide the building from passing vehicles, such as boulders, trees, and gulleys. You can also use fending to obscure the view and keep cars from getting too close.
  • Consider retractable barriers. Retractable crash barriers to control access to your lot and your loading dock can help to minimize physical risk.
  • Limit the number of entry points to the building. There should be exactly two ways into the building: one for the main entrance to the data center and a loading dock for equipment.
  • Emergency doors should be exit only. You’re going to have to have more doors than that, of course. Install doors that don’t have outside handles, and make sure that an alarm sounds and the security command center is notified when one of these doors is open.
  • Lots of cameras. Surveillance cameras at the perimeter, entrances, access points, and more should be used as much as possible. Consider adding motion-detection devices and low-light cameras, too.

Read the original blog entry...

About Unitiv Blog
Unitiv, Inc., is a professional provider of enterprise IT solutions. Unitiv delivers its services from its headquarters in Alpharetta, Georgia, USA, and its regional office in Iselin, New Jersey, USA. Unitiv provides a strategic approach to its service delivery, focusing on three core components: People, Products, and Processes. The People to advise and support customers. The Products to design and build solutions. The Processes to govern and manage post-implementation operations.

Web 2.0 Latest News
I have three words for everyone in software testing: prioritize, prioritize, and prioritize. You can't test every possible permutation of your software, especially so with APIs and IoT devices where you're placing much of the user experience in the hands of integrators to your core pro...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an o...
Recently announced Azure Data Lake addresses the big data 3V challenges; volume, velocity and variety. It is one more storage feature in addition to blobs and SQL Azure database. Azure Data Lake (should have been Azure Data Ocean IMHO) is really omnipotent. Just look at the key capabi...
CodeBug is a cute, programmable and wearable device designed to introduce simple programming and electronic concepts to anyone, at any age. It is easy to program CodeBug using the online interface, which features colourful drag and drop blocks, an in-browser emulator and engaging commu...
Azure IoT Suite became Generally Available starting September 29. This suite consist of technologies to monitor and manage devices that come under Internet of Things. Microsoft according to Scott Guthrie provides advanced capabilites like stream processing and predictive analytics. En...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers