yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Conference, the world’s leading information security
conferences and expositions, will conduct its annual
teleconference featuring three of today’s leading security
analysts from Gartner, 451 Research and Forrester. The
teleconference will discuss top cybersecurity trends including
mobile and big data security, as well as preview upcoming sessions
at RSA Conference 2013, being held on February 25 – March 1 at
Moscone Center in San Francisco.
The teleconference will feature research and commentary from Ramon
Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of
Forrester. Hugh Thompson, Program Chair of RSA Conference, will act
as the moderator.
There will be a 15-minute Q&A prior to the conclusion of the call.
Ramon Krikken is a Research Vice President within Gartner's Risk
Management Strategies team. He covers software/application
security; mobile application security and service-oriented
architecture (SOA) security; structured and unstructured data
security management, including data masking, redaction and
tokenization; cryptography, key management and PKI; security
monitoring and security analytics; security metrics; and
virtualization and cloud computing security as it pertains to the
other categories. In addition to his participation in this
teleconference, Krikken will participate in the following RSA
Conference 2013 session: “Software Security: A Waste of Time,” on
Wednesday, February 27 at 9:20 AM.
Wendy Nather, 451 Research
Wendy Nather is Research Director, Security, within 451 Research's
Enterprise Security Program, providing analysis on the current
state of security from the perspective of a veteran CISO. Nather’s
primary areas of coverage are application security, identity and
access management, threat intelligence, and security services. She
is co-author of the book, ‘The Cloud Security Rules,’ and was
named one of Tripwire's "Top 25 Influencers in Security You Should
Be Following." In addition to her participation in this
teleconference, Nather will participate in the following RSA
Conference 2013 sessions, “Psychographics of the CISO,” on
Wednesday, February 27 at 9:20 AM, and “Living Below the Security
Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.
Chenxi Wang, Forrester
Chenxi Wang is Vice President and Principal Analyst at Forrester
serving Security and Risk Professionals. She is a leading expert
on mobile security, endpoint security, application security, and
cloud security. Wang leads the effort at Forrester to build the
research portfolio that addresses how enterprise mobility,
consumerization, and emerging threats affect security strategy,
policy, architecture, application development, and operations. She
has also written extensively about global data privacy laws and
the China technology market and closely follows the technology
adoption trends in that market. In addition to her participation
in this teleconference, Wang will participate in the following
RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging
Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a
VDI Desktop More Secure Than a Standard Desktop,” on Thursday,
February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT
and Risk Footprint,” on Thursday, February 28 at 1:40 PM.
Moderator: Dr. Herbert “Hugh” Thompson,
Program Chair of RSA Conferences
Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences
and a world-renowned expert on IT security. He has co-authored
several books on the topic and has written more than 80 academic
and industrial publications on security. In 2006, Thompson was
named one of the "Top 5 Most Influential Thinkers in IT Security"
by SC Magazine and has been interviewed by top news organizations
including the BBC, CNN, MSNBC, Financial Times, Washington Post
and others. He has been an adjunct professor at Columbia
University in New York for the past few years where he taught
courses on computer security. In addition to his participation in
this teleconference, Thompson will be one of the speakers at
the day-long Security Basics seminar at RSA Conference 2013 on
Monday, February 25 beginning at 8:30 AM. He will also be
keynoting on Friday at 1:00 PM with special guests.
About RSA Conference RSA Conference helps drive the global
information security agenda with annual events in the U.S., Europe, and
Asia. Since 1991, RSA Conference consistently attracts the best and
brightest in the field, creating opportunities to learn about
information security’s most important issues through face-to-face and
online interactions with peers, luminaries and emerging and established
companies. As information security professionals work to stay ahead of
ever-changing security threats and trends, they turn to RSA Conference
for a 360-degree view of the industry. RSA Conference seeks to arm
participants with the knowledge they need to remain at the forefront of
the information security business. More information on events, online
programming and the most up-to-date news pertaining to the information
security industry can be found at www.rsaconference.com.
RSA and the RSA Conference logo are either registered trademarks or
trademarks of EMC Corporation in the United States and/or other
countries. All other products and/or services referenced are trademarks
of their respective companies.
Java 9 ships with some minor—yet awesome—new language features that make developing easier and cleaner. In this post, we’ll take a look at three of these new features.
You probably remember interface methods, which were introduced in Java 8. These are required so that Java itself, as ...
The notion of improving operational efficiency is conspicuously absent from the healthcare debate - neither Obamacare nor the newly proposed GOP plan discusses the impact that a step-function improvement in efficiency could have on access to healthcare (through more capacity), quality ...
In 2011, Marc Andreessen wrote a thought provoking article in the Wall Street Journal that software is eating the world. Today, in 2017, we can say that cloud transformation is happening all around us and cloud is now indeed eating the world. While Cloud services consumption is becomin...
Thanks to the plethora of communication and messaging apps available to the average user, unified communications (UC) is becoming more important than ever before. UC is a set of products and services designed to give employees a uniform communications experience, integrating different ...
Cloud providers like AWS have proven to be a viable option for running mainframe application workloads. The most effective method to exploit the value of Unisys mainframe applications and data is a transformative migration to modern systems frameworks in AWS, reusing as much of the ori...