Sort Alphabetically

Computer Systems / IT is a key complement and requirement of almost every industry, institution, company and government operation. With the increased information and the demands for “translation” of massive amounts of data, automated systems are now depended upon more than ever.

Years ago, the computer was viewed as a toy, and sold in stores to those who could afford them to play games and do “tricks”. As the automated systems started to evolve, their importance as a complement to company operations was deemed valuable; however it was treated as a “financial” device and therefore placed under the jurisdiction of the accounting and finance divisions. It was not until two decades after their integration into the business and government sections that their true potential came to reality. The power, capabilities and functionality of automated systems allowed it to become “independent” from the framework of being governed by accounting and finance and the IT division was born. There is no question that automated systems are a major factor and requirement in the demands of companies and government operations. From commercial businesses and individual users, to the military and defense industries/operations, that are now dependent upon.
With the birth if the Internet, computers now are the mainstream of communications, news and knowledge. However, with the good, comes the bad. The Computer/IT industry is also a target for corruption, a device to launder monies and assets and to provide information that could be nothing less that inaccurate/dead-wrong. It is also a target for those who hack such automated systems for numerous reasons from “griefing”, vengeance, spying, corporate espionage and financial gain. The actual hardware and software available is staggering, and making sense of it all can truly be a serious problem. Companies looking for the best anti-fraud programs and systems. Individuals who need a system where that can have a mobile office available at all times. Military applications which are too numerous to even list. This section deals with a plethora of issues of the Computer Systems and IT operations that will enlighten the readers with a source of reports, white papers and articles that address a wide spectrum of subjects, all applicable to this field.

“Research Solutions, Inc. (RSI™) – Length of Operations – History – Geographic Scope of Services”

  Research Solutions, Inc. (RSI™) Length of Operations – History – Geographic Scope of Services Published © 1979 – 2014 Quality Assurance Laboratories, Inc. / Research Solutions, Inc. (all rights reserved) Published © 2014 Research Solutions, Inc. (all rights reserved) Quality Assurance Laboratories, Inc. (QAL™) started computer operations in 1971 More >

Online Gaming Frauds – Part1″

“On-line Gaming Frauds – PART-1” Published ©2010-2013 Dr. Mark D .Lurie/RSI (all rights reserved) Published ©2014 Dr. Mark D. Lurie/RSI (all rights reserved) Another area or serious frauds that businesses and consumers alike fall prey to, is internet on-line gaming fraud (e.g. Massive (or Massively) Multi-Player Online Role Playing Games, More >

“RSI™ Length of Computer/IT Operations – History – Geographic Scope of Services”

Research Solutions, Inc. (RSI™) Length of Computer/IT Operations – History – Geographic Scope of Services Quality Assurance Laboratories, Inc. (QAL™) started computer operations in 1971 with mainframes and mini-computers (IBM, Burroughs, DEC) and has performed services for over 30 years in North America, Canada, South America, Europe and Asia Pacific More >

“The False Sense of Security – The Illusion of Automated Protection for Business Assets”

How many more cases of successful frauds have to take place before the IT industry, especially those that produce anti-fraud, security systems and auditing controls, are going to acknowledge (perhaps admit is a better choice of words) that their product is not a “total solution”? It is not, and never More >