OAUTH

OAUTH

One of RSI’s processes is monitoring a primary email address for a client and performing various operations on incoming messages, including scanning attachments. A primary crux of the process is the authorization protocol used to provide process access to incoming messages.  Recently RSI updated to OAUTH 2.0, the industry standard for online authorization.

learn more
Answering Your Top Questions About Custom Software Development

Answering Your Top Questions About Custom Software Development

A custom-tailored suit will fit and work a lot better than your standard suit at Dillard’s. The same can be said of custom software development—when you invest in custom software solutions, you can expect a better fit and performance for your company. It’s natural to have some software development questions.

learn more
Is Your Company Protected from Today’s Latest Threats?

Is Your Company Protected from Today’s Latest Threats?

From weak passwords to human error, many common security vulnerabilities can make an organization’s network susceptible to a cyberattack — and hackers are aware of them all. Whether you have a small mom and pop shop or a Fortune 500 company, information technology security can never be overlooked.  Data breaches can happen in an instant and the ramifications can be costly and burdensome. 

learn more
Microsoft Authorization Requirements

Microsoft Authorization Requirements

In the past, Microsoft, like other software service providers, used its own protocols and services to provide authentication. Recently, however, Microsoft has announced its shift to OAuth (Open Authorization 2.0) for all of its authorization requirements. RSI worked with our clients to seamlessly switch over to system update which included code changes and redeployments. We were able to complete the task with minimal risk and impact.

learn more
How to Avoid a Computer Virus

How to Avoid a Computer Virus

No one likes getting a virus, especially when it attacks your computer!  A virus can affect the speed, delete your files, and steal your personal information. One question always lingers, “What exactly is a virus, and how can a virus be avoided?”

learn more
.NET Framework

.NET Framework

With .NET 7 Core Framework, our clients are jumping into the most up-to-date and flexible framework released by Microsoft, keeping up with technology and security trends.

learn more