EtherFax

EtherFax

With EtherFax, RSI’s clients can continue their main business functions in an efficient and organized way every day even during unprecedented times without interruptions. This helps to eliminate a lot of manual work and errors in collecting and organizing essential data from employees on a day-to-day basis.

learn more
LLBLGen Pro

LLBLGen Pro

Flexibility is a big asset when it comes to updating the general structure of our applications or databases. RSI recently upgraded a client’s application entity framework and the LLBLGen Pro integration was seamless with the latest version of the product.

learn more
Safeguarding Business Networks: The Crucial Role of Network Firewalls in Work Offices

Safeguarding Business Networks: The Crucial Role of Network Firewalls in Work Offices

As work offices become increasingly dependent on computer networks, network firewalls are indispensable tools for ensuring robust cybersecurity. Their ability to protect against external threats, provide secure remote access, control network traffic, and prevent data loss makes them vital components of a comprehensive network security strategy. By investing in advanced firewall solutions and regularly updating them to address emerging threats, businesses can fortify their networks, protect sensitive information, and maintain uninterrupted operations.

learn more
The Importance of Keeping Your IT Infrastructure Up to Date

The Importance of Keeping Your IT Infrastructure Up to Date

Keeping your IT infrastructure up to date is vital for the success and security of your business. By prioritizing regular updates and upgrades, you can enhance security, improve performance, ensure compatibility, save costs, and gain a competitive advantage. Embracing a proactive approach to IT infrastructure maintenance will not only drive efficiency and productivity but also enable your business to thrive in an increasingly technology-driven world.

learn more
7 Steps of Having a Secure Email Account

7 Steps of Having a Secure Email Account

RSI assists users who have reported their email accounts have been compromised and what the user can do in that situation to better protect themselves. Here’s a quick emergency list of what to do if your account may have been compromised.

learn more
SSO Token

SSO Token

Successful implementation of SSO token encryption requires careful consideration of several challenges to provide a secure and user-friendly authentication experience within the SSO ecosystem.

learn more
Why It’s Important to Replace a Server

Why It’s Important to Replace a Server

The benefits of improved performance, capacity, and security combined with the reduction of maintenance, downtime, and resources are a clear indication a regular system migration to a new server should be heavily considered by a software team.

learn more
.NET Framework

.NET Framework

With .NET 7 Core Framework, clients are jumping into the most up-to-date and flexible framework released by Microsoft, keeping up with technology and security trends. The payoff for RSI clients will be immense.

learn more
Working with Polly Reporting

Working with Polly Reporting

Occasionally, challenges arise when servers aren’t quick to respond, and processes fail to download or upload information at the time they were attempting to. These challenges could cause crucial information to not transfer to its appropriate destination in a timely manner. One way RSI continues to improve capability is to handle these interactions with the implementation of the asynchronous retry policies provided by Polly.

learn more
OAUTH

OAUTH

One of RSI’s processes is monitoring a primary email address for a client and performing various operations on incoming messages, including scanning attachments. A primary crux of the process is the authorization protocol used to provide process access to incoming messages.  Recently RSI updated to OAUTH 2.0, the industry standard for online authorization.

learn more
Answering Your Top Questions About Custom Software Development

Answering Your Top Questions About Custom Software Development

A custom-tailored suit will fit and work a lot better than your standard suit at Dillard’s. The same can be said of custom software development—when you invest in custom software solutions, you can expect a better fit and performance for your company. It’s natural to have some software development questions.

learn more
Is Your Company Protected from Today’s Latest Threats?

Is Your Company Protected from Today’s Latest Threats?

From weak passwords to human error, many common security vulnerabilities can make an organization’s network susceptible to a cyberattack — and hackers are aware of them all. Whether you have a small mom and pop shop or a Fortune 500 company, information technology security can never be overlooked.  Data breaches can happen in an instant and the ramifications can be costly and burdensome. 

learn more
Microsoft Authorization Requirements

Microsoft Authorization Requirements

In the past, Microsoft, like other software service providers, used its own protocols and services to provide authentication. Recently, however, Microsoft has announced its shift to OAuth (Open Authorization 2.0) for all of its authorization requirements. RSI worked with our clients to seamlessly switch over to system update which included code changes and redeployments. We were able to complete the task with minimal risk and impact.

learn more
How to Avoid a Computer Virus

How to Avoid a Computer Virus

No one likes getting a virus, especially when it attacks your computer!  A virus can affect the speed, delete your files, and steal your personal information. One question always lingers, “What exactly is a virus, and how can a virus be avoided?”

learn more