yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

TASC, Inc. Appoints Rick Howard Chief Information Security Officer

CHANTILLY, Va., Jan. 9, 2013 /PRNewswire/ -- TASC, Inc., has named Rick Howard Chief Information Security Officer.  In this role, Howard will lead the development of TASC's strategic vision, security architecture and technical roadmaps for information security throughout the company.


"Cyber threats against government and industry are increasingly advanced, and we must be prepared with aggressive and integrated measures to protect our information and intellectual property," says Barbie Bigelow, senior vice president and chief information officer of TASC.  "Rick's deep expertise in cybersecurity will ensure that TASC's corporate information infrastructure, and specifically the operations of our Cybersecurity Operations Center, remain secure, resilient and agile."

Howard joins TASC from VeriSign where he was the general manager responsible for the iDefense business unit, a cybersecurity intelligence organization that delivers decision-support services to Fortune 500 companies and key federal agencies.  Before VeriSign, he led the intelligence-gathering activities at Counterpane Internet Security and ran Counterpane's global network of security operations centers. Howard served in the U.S. Army for 23 years in various command and staff positions involving information technology and computer security, and spent the last two years of his career as the US Army's Computer Emergency Response Team Chief (ACERT). Howard holds a master's in computer science from the Naval Postgraduate School and an engineering degree from the U.S. Military Academy. He also taught computer science at the Academy from 1990 to 1995. He has published many academic papers on technology and security and contributed as executive editor of two books, "Cyber Fraud: Tactics, Techniques and Procedures" and "Cyber Security Essentials."

About TASC

Founded in 1966, TASC, Inc., helps solve complex national security and public safety challenges by providing advanced systems engineering, integration and decision-support services to the Intelligence Community, Department of Defense and civilian agencies of the federal government.  With about 5,000 employees in 40 locations, TASC generates more than $1.5 billion in annual revenue.  For more information and career opportunities, visit our website at

Media Contact:  Christine Nyirjesy Bragale, TASC Public Relations Manager,, (703) 653-5996


About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers