yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Conference, the world’s leading information security
conferences and expositions, will conduct its annual
teleconference featuring three of today’s leading security
analysts from Gartner, 451 Research and Forrester. The
teleconference will discuss top cybersecurity trends including
mobile and big data security, as well as preview upcoming sessions
at RSA Conference 2013, being held on February 25 – March 1 at
Moscone Center in San Francisco.
The teleconference will feature research and commentary from Ramon
Krikken of Gartner, Wendy Nather of 451 Research and Chenxi Wang of
Forrester. Hugh Thompson, Program Chair of RSA Conference, will act
as the moderator.
There will be a 15-minute Q&A prior to the conclusion of the call.
Ramon Krikken is a Research Vice President within Gartner's Risk
Management Strategies team. He covers software/application
security; mobile application security and service-oriented
architecture (SOA) security; structured and unstructured data
security management, including data masking, redaction and
tokenization; cryptography, key management and PKI; security
monitoring and security analytics; security metrics; and
virtualization and cloud computing security as it pertains to the
other categories. In addition to his participation in this
teleconference, Krikken will participate in the following RSA
Conference 2013 session: “Software Security: A Waste of Time,” on
Wednesday, February 27 at 9:20 AM.
Wendy Nather, 451 Research
Wendy Nather is Research Director, Security, within 451 Research's
Enterprise Security Program, providing analysis on the current
state of security from the perspective of a veteran CISO. Nather’s
primary areas of coverage are application security, identity and
access management, threat intelligence, and security services. She
is co-author of the book, ‘The Cloud Security Rules,’ and was
named one of Tripwire's "Top 25 Influencers in Security You Should
Be Following." In addition to her participation in this
teleconference, Nather will participate in the following RSA
Conference 2013 sessions, “Psychographics of the CISO,” on
Wednesday, February 27 at 9:20 AM, and “Living Below the Security
Poverty Line: Coping Mechanisms,” on Friday, March 1 at 9:00 AM.
Chenxi Wang, Forrester
Chenxi Wang is Vice President and Principal Analyst at Forrester
serving Security and Risk Professionals. She is a leading expert
on mobile security, endpoint security, application security, and
cloud security. Wang leads the effort at Forrester to build the
research portfolio that addresses how enterprise mobility,
consumerization, and emerging threats affect security strategy,
policy, architecture, application development, and operations. She
has also written extensively about global data privacy laws and
the China technology market and closely follows the technology
adoption trends in that market. In addition to her participation
in this teleconference, Wang will participate in the following
RSA Conference 2013 sessions, “Privacy Perspectives: Leveraging
Data to Protect Data” on Tuesday, February 26 at 3:50 PM, “Is a
VDI Desktop More Secure Than a Standard Desktop,” on Thursday,
February 28 at 8:00 AM, and “Stateless Architecture for Smaller IT
and Risk Footprint,” on Thursday, February 28 at 1:40 PM.
Moderator: Dr. Herbert “Hugh” Thompson,
Program Chair of RSA Conferences
Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences
and a world-renowned expert on IT security. He has co-authored
several books on the topic and has written more than 80 academic
and industrial publications on security. In 2006, Thompson was
named one of the "Top 5 Most Influential Thinkers in IT Security"
by SC Magazine and has been interviewed by top news organizations
including the BBC, CNN, MSNBC, Financial Times, Washington Post
and others. He has been an adjunct professor at Columbia
University in New York for the past few years where he taught
courses on computer security. In addition to his participation in
this teleconference, Thompson will be one of the speakers at
the day-long Security Basics seminar at RSA Conference 2013 on
Monday, February 25 beginning at 8:30 AM. He will also be
keynoting on Friday at 1:00 PM with special guests.
About RSA Conference RSA Conference helps drive the global
information security agenda with annual events in the U.S., Europe, and
Asia. Since 1991, RSA Conference consistently attracts the best and
brightest in the field, creating opportunities to learn about
information security’s most important issues through face-to-face and
online interactions with peers, luminaries and emerging and established
companies. As information security professionals work to stay ahead of
ever-changing security threats and trends, they turn to RSA Conference
for a 360-degree view of the industry. RSA Conference seeks to arm
participants with the knowledge they need to remain at the forefront of
the information security business. More information on events, online
programming and the most up-to-date news pertaining to the information
security industry can be found at www.rsaconference.com.
RSA and the RSA Conference logo are either registered trademarks or
trademarks of EMC Corporation in the United States and/or other
countries. All other products and/or services referenced are trademarks
of their respective companies.
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential.
In his ...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Servic...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the...
Ten short years ago, Apache Hadoop was just a small project deployed on a few machines at Yahoo and within a few years, it had truly become the backbone of Yahoo’s data infrastructure. Additionally, the current Apache Hadoop market is forecasted to surpass $16 billion by 2020.
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will ad...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the n...