Blog

Why Other Peoples Code Stinks

Why Other People’s Code Stinks

The following is an excerpt from Chapter 22 of Jeffrey Garbus’ book Transact SQL which can be purchased here.  Have you ever changed accountants? The first thing the new accountant does is explain to you, in detail, how stupid your previous accountant was, how much the old one cost you, and how much the new one […]

READ MORE
Tips to Protect Your Company’s Data from Ransomware

6 Tips to Protect Your Company’s Data from Ransomware

Editor’s Note: This article was originally published on Home Business Magazine Online, a community information sharing site for home-based entrepreneurs and business owners. Ransomware can quickly cripple a business and the problem appears to be growing, as evidenced recently when the U.S. government issued a warning about Bad Rabbit, a ransomware attack that spread through Russia, Ukraine, and […]

READ MORE
Why Are Cyber Security Breaches So Common

Why Are Cyber Security Breaches So Common?

Once upon a time, hearing or reading about a cybersecurity breach would be scandalous. How could American Express put clients in such a vulnerable position? Today, it’s common to read about such news regularly. It’s happened to Anthem, Target, Yahoo, JP Morgan, Equifax, eBay, The Home Depot, LinkedIn, Sony, Dropbox…. Chances are your own information […]

READ MORE
Soaring High Helping Companies to Implement Database Solutions

Soaring High Helping Companies to Implement Database Solutions

Editor’s Note: This post was originally published on TMT News, a news site that shares the latest information on technology, media, and telecommunication.  Soaring Eagle Database Consulting are experts at all things database. Recently, we invited Soaring Eagle Database Consulting CEO, Jeffrey Garbus to tell us more about this well-­established company. Twenty years ago, founder Jeffrey Garbus, was […]

READ MORE
How Much Do You Know About the Dark Web

How Much Do You Know About the Dark Web?

Did you know that when you do a Google, Bing, or Yahoo search, only about 4% of the Internet pops up? Yes, even when search results show more pages than you have time to read, the provided information is only scratching the surface. This is precisely why it’s called the surface web. But cyberspace has […]

READ MORE
Is Your Cell Phone Vulnerable to Eavesdropping?

Is Your Cell Phone Vulnerable to Eavesdropping?

Do you ever feel like Big Brother is always watching? George Orwell’s apocalyptic novel, 1984, gave us the creeps: No matter what a person did or said, nothing was private. There was always someone monitoring every movement; including people’s thoughts. While the book was published in 1949, it has never been more relevant than what […]

READ MORE
Are You Ready For a Cyber Attack

Are You Ready For a Cyber Attack?

When we first started using the internet a couple of decades ago (yes, it’s been that long), our main concerns were that dial-up would take too long to connect, or that an incoming phone call would disconnect us in the middle of something important. Those issues were right at the top of the list of […]

READ MORE
Cybersecurity Tips for Cyber Monday

Cybersecurity Tips for Cyber Monday

November is finally here! (Where did 2017 go?) This is when time really starts speeding up for the rest of the year, and before you know it, it’ll be America’s favorite holiday: Cyber Monday. Because what says “This is USA!” louder than rampant consumerism? And while it’s great to get good deals right before the […]

READ MORE
Why Optimizing SQL Matters

Why Optimizing SQL Matters

MS SQL Server is a fabulous product, but it does need some care and attention. We have found that many companies in today’s mid-market tier have grown faster than expected. Thus they were worried about their application development, and security but haven’t had the time to tend to their database and SQL code structure. In […]

READ MORE
How to Choose a Cloud Service Provider

How to Choose a Cloud Service Provider

Remember the first computer you ever used? Back in the early days, it was common to store information on diskettes. Walking around with one made us feel a bit futuristic. Today, those disks are as anachronistic as pay phones. When you run a business, or your job entails sending and receiving significant amounts of data, […]

READ MORE