Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


ASACoE Appointed Security Assertion Certifier for Air Force Applications and Services Hosted in the DISA Secure Technology Application eXecution Environment

Acting in his role as Air Force Designated Accrediting Authority, Gen. William Shelton, commander of Air Force Space Command, has appointed the Application Software Assurance Center of Excellence to be security assertion certifier for Air Force applications and services hosted in the Secure Technology Application eXecution environment hosted by Defense Information Systems Agency.

ASACoE is the first and only organization given this appointment and will develop the processes to be used by future appointees. Using its suite of leading software assurance tools, provided by Telos Corporation and industry partners, to conduct static and dynamic analysis, the ASACoE will establish repeatable and reliable processes for validating the security posture of the Air Force applications hosted in STAX.

“As the security assertion certifier, ASACoE will apply their stringent software assurance assessment processes to the STAX environment,” said Charisse Stokes, vice president for cybersecurity and network management for Telos. “This appointment ensures that the organization tasked with developing and implementing software assurance best practices for the Air Force will be the guiding light for applications transitioning to or developed in STAX.”

STAX is a cloud capability for hosting Java and Microsoft .NET Web services to be used by the Department of Defense. DoD’s cloud computing strategy articulates a vision for acquiring and operating innovative, efficient, and agile IT in support of the DoD's mission anywhere, anytime, and on any authorized device. STAX is designed to aid the department’s effort to bring that vision to reality by providing development, test, and production environments for computing, storage, network infrastructure, and software from a secure facility and under a single pricing model.

In 2007 Telos was awarded an initial task order to help ASACoE ensure application security best practices are incorporated across the Air Force, identify critical vulnerabilities, and secure Air Force applications. Leveraging Xacta® IA Manager, Xacta Flux and other partner products, Telos is tasked with ensuring that applications address security hand-in-hand with performance and application availability throughout the system development lifecycle, significantly reducing the time and expense associated with remediation efforts. As the prime contractor, Telos assembled a powerful team, including application security industry leaders that specialize in source code analysis, web application penetration and security testing, application shielding, database monitoring, training and implementation services. The team includes Cigital, Inc., HP Enterprise Security (which includes the former Fortify Software, Inc.), IBM Rational and Application Security, Inc. As an option, products and services from Coverity, Aspect Security and Imperva are also available to the Air Force under this agreement.

About Telos Corporation

Telos Corporation has provided innovative IT solutions and services to the federal government for more than 30 years, focusing since 1997 on cybersecurity. Telos solutions ensure that the government's most security-conscious organizations comply with demanding federal and DoD information security mandates. Offerings include Xacta® IA Manager and other solutions for cybersecurity and information assurance, secure networks, network management and defense, mission applications and development, secure communications, and identity assurance and access. Solutions are represented to the federal government on Telos' GSA schedule. For more information, visit www.telos.com.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Silver shows that predictions in areas such as economics have been less successful, e.g. he examines why many economists missed the recession, and why supposedly expert forecasters get election predictions wrong so often. For example, before the recession of 2008, the assumption was ma...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is ob...
You can then easily piece together full transaction traces by ordering all method calls by sequence number. Further analysis can be applied to this information for a number of purposes. For example, by analysing the transactions, developers can easily construct design diagrams that can...
Every day and every second, the system administrator gets tones of information on the network operation, network devices’ operation, and messages from users; he sets dozens of challenges, which must help to avoid the existing and possible problems in the future. Often, it is rather dif...
With the increasing complexity of software, organizations are more cognizant than ever about the potential pitfalls of including open source code in their products. Below are some quick tips to continue leveraging open source code, while keeping your manager and legal department happy.
The industry is heated with debates on whether adopting private or public cloud is the smartest, best, cheapest, you name it choice. But this debate is missing the mark. Businesses shouldn’t be discussing public vs. private, but rather how can they make the two work together to their g...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE