Merriam-Webster defines Marshaling as arranging, grouping, lining up, ordering, organizing. Our Document Marshaling Service (DMS) arranges, groups and lines up all your documents (digital or not) into an organized set of PDF files.
\nOur on-site process ingests your digital documents from various sources and converts them into a tree of normalized, named, searchable PDF/X, A, E, U files with smart bookmarks and rich metadata embedded in it.
\nEMAILs are ingested from various mailboxes and converted to searchable PDFs containing email body and all attachments. Bookmarks are named after each attachment’s file name and are also embedded as search keywords.
\nEXCEL: Bookmarks are named after each sheet’s name and are also embedded as search keywords.
\nWORD, PowerPoint, Images (PCX, PNG, TIF, PDF, JPG, etc.): Converted to searchable PDF with pertinent metadata.
\nAudio/Video: Embedded as PDF attachments.
\nZIP files: Zipped files convert to PDF where possible and are bookmarked. Nested Zips are recursively extracted.
\nPassword Protected files: Via approval requests email notification to author and/or admin staff
\nPDF Integrity Validation with Repair: Each converted PDF validates PDF syntax compliance and, wherever possible, performs repairs to comply.
\nNon-digital sources (paper, microfilm, microfiche): Must be digitized, ideally classified and/or indexed, then ingested.
\nSearchability metrics: Reports are generated showing searchability metrics for each page of each doc in the collection, or once for the entire document. Metric entries are based on dictionary-based spell checking of searchable words.
\nRule-based foldering: Folders are named and structured as dictated by business rules.
\n"},"options":{"text":"
Merriam-Webster defines Marshaling as arranging, grouping, lining up, ordering, organizing. Our Document Marshaling Service (DMS) arranges, groups and lines up all your documents (digital or not) into an organized set of PDF files.
Our on-site process ingests your digital documents from various sources and converts them into a tree of normalized, named, searchable PDF/X, A, E, U files with smart bookmarks and rich metadata embedded in it.
\nEMAILs are ingested from various mailboxes and converted to searchable PDFs containing email body and all attachments. Bookmarks are named after each attachment’s file name and are also embedded as search keywords.
\nEXCEL: Bookmarks are named after each sheet’s name and are also embedded as search keywords.
\nWORD, PowerPoint, Images (PCX, PNG, TIF, PDF, JPG, etc.): Converted to searchable PDF with pertinent metadata.
\nAudio/Video: Embedded as PDF attachments.
\nZIP files: Zipped files convert to PDF where possible and are bookmarked. Nested Zips are recursively extracted.
\nPassword Protected files: Via approval requests email notification to author and/or admin staff
\nPDF Integrity Validation with Repair: Each converted PDF validates PDF syntax compliance and, wherever possible, performs repairs to comply.
\nNon-digital sources (paper, microfilm, microfiche): Must be digitized, ideally classified and/or indexed, then ingested.
\nSearchability metrics: Reports are generated showing searchability metrics for each page of each doc in the collection, or once for the entire document. Metric entries are based on dictionary-based spell checking of searchable words.
\nRule-based foldering: Folders are named and structured as dictated by business rules.
\n"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"ud1rv59z46glu4my","name":"text","icon":"scrolltwo","title":"On Site Capture","description":"We developed special methodologies and technology to balance critical building blocks of a successful capture workflow. A smart allocation of resources and talents to between on-site and off-site tasks makes it happen.","rich_title":"On Site Capture","rich_description":"We developed special methodologies and technology to balance critical building blocks of a successful capture workflow. A smart allocation of resources and talents to between on-site and off-site tasks makes it happen.","active":true,"position":2,"image":null,"button_type":"button","config":{"text":"
Invoice Curation Service for Clients: Designed for clients receiving invoices from multiple suppliers. The goals are to reduce liabilities and costs by avoiding penalties, service disruptions, missed discounts, vendor management burden, vendor complaints, etc.
\nIn a nutshell, our service turns paper and emailed invoice messages into clean, safe, traceable PDF files showing always the invoice as page 1, followed by supporting docs, ending with the email body if emailed.
\nAll emails and physical paper are ingested and metadata extracted that includes Document Type, Invoice date, invoice number, PO number, company code, exception reason and any other metadata items as dictated by business rules.
\nDesignated non-invoice classes (statements, tax forms, junk, spam, irrelevant messages, zero balance invoices, Pcards, shipment notices, checks, suspicious messages and attachments, etc.) are archived and/or routed via email and/or sFTP to destinations established by business rules.
\nInvoice class documents are turned into clean, error-free, validated, searchable multipage PDF files free of structural PDF syntax errors with invoice page(s) first, followed by supporting docs and ending with the email body text if emailed, then routed via email and/or sFTP to destinations established via business rules.
\nWherever safe and possible, defective incoming PDF attachments are repaired. PDF file naming is fully customizable. All emailed attachments are converted to PDF regardless of their format (nested zips, Tiff, Jpg, Word, Excel with multiple tabs, pdfs with one or more invoices, etc.).
\nQuestioned or rejected attachments (password protected, restricted, suspicious formats, corrupted files, etc.) are flagged as dictated by business rules. The reduced set of metadata extracted is typically used for classification, validation, routing, reporting and tracking purposes, but could also be used to initiate a full payment processing cycle by adding line item details and other required metadata. Each extracted metadata item can be linked to client supplied lookup tables.
\nCustomizable sub-workflows such as third-party validations and auditing are negotiated with users.
\nRouting destinations include client users, exception handlers, email senders, BPOs, auditors, etc.
\nBPO business rules such as log file structures, routing and email notification criteria, attachment size restrictions, formats, naming, etc.) are customizable. If BPOs or recipients reply with confirmation numbers, these are captured to complete a full QA circle. Negotiated business rules may include detection of duplicate and “buried” invoices, confidential executive correspondence, etc.
\n\n
Invoice Curation Service for Suppliers: Designed for suppliers submitting invoices to their clients. The goals are to reduce or eliminate payment delays and labor costs of repairing and resubmitting rejected or questioned invoices.
\nIn simple terms, this service makes possible to create the perfect invoice that will not be rejected or questioned because it fully complies with submission criteria established by each client.
\nConceptually, is the reverse of what is described above as “curation service for clients”. This service would be a layer in between a supplier and its clients and could include XMP or XML supplemental files that may be welcomed by some invoice payers because they may reduce their payment processing costs.
"},"options":{"text":"Invoice Curation Service for Clients: Designed for clients receiving invoices from multiple suppliers. The goals are to reduce liabilities and costs by avoiding penalties, service disruptions, missed discounts, vendor management burden, vendor complaints, etc.
\nIn a nutshell, our service turns paper and emailed invoice messages into clean, safe, traceable PDF files showing always the invoice as page 1, followed by supporting docs, ending with the email body if emailed.
\nAll emails and physical paper are ingested and metadata extracted that includes Document Type, Invoice date, invoice number, PO number, company code, exception reason and any other metadata items as dictated by business rules.
\nDesignated non-invoice classes (statements, tax forms, junk, spam, irrelevant messages, zero balance invoices, Pcards, shipment notices, checks, suspicious messages and attachments, etc.) are archived and/or routed via email and/or sFTP to destinations established by business rules.
\nInvoice class documents are turned into clean, error-free, validated, searchable multipage PDF files free of structural PDF syntax errors with invoice page(s) first, followed by supporting docs and ending with the email body text if emailed, then routed via email and/or sFTP to destinations established via business rules.
\nWherever safe and possible, defective incoming PDF attachments are repaired. PDF file naming is fully customizable. All emailed attachments are converted to PDF regardless of their format (nested zips, Tiff, Jpg, Word, Excel with multiple tabs, pdfs with one or more invoices, etc.).
\nQuestioned or rejected attachments (password protected, restricted, suspicious formats, corrupted files, etc.) are flagged as dictated by business rules. The reduced set of metadata extracted is typically used for classification, validation, routing, reporting and tracking purposes, but could also be used to initiate a full payment processing cycle by adding line item details and other required metadata. Each extracted metadata item can be linked to client supplied lookup tables.
\nCustomizable sub-workflows such as third-party validations and auditing are negotiated with users.
\nRouting destinations include client users, exception handlers, email senders, BPOs, auditors, etc.
\nBPO business rules such as log file structures, routing and email notification criteria, attachment size restrictions, formats, naming, etc.) are customizable. If BPOs or recipients reply with confirmation numbers, these are captured to complete a full QA circle. Negotiated business rules may include detection of duplicate and “buried” invoices, confidential executive correspondence, etc.
\n\n
Invoice Curation Service for Suppliers: Designed for suppliers submitting invoices to their clients. The goals are to reduce or eliminate payment delays and labor costs of repairing and resubmitting rejected or questioned invoices.
\nIn simple terms, this service makes possible to create the perfect invoice that will not be rejected or questioned because it fully complies with submission criteria established by each client.
\nConceptually, is the reverse of what is described above as “curation service for clients”. This service would be a layer in between a supplier and its clients and could include XMP or XML supplemental files that may be welcomed by some invoice payers because they may reduce their payment processing costs.
"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"5t9zkywfzxw67zjd","name":"youtube","icon":"play","title":"Watch our 5 minute video","description":"You will learn how we reimagined 100% QC in our digitization services","rich_title":"Watch our 5 minute video","rich_description":"You will learn how we reimagined 100% QC in our digitization services","active":true,"position":4,"image":null,"button_type":"button","config":{"video_url":"https://youtu.be/Wd3XM7Nxs9g","video_id":"Wd3XM7Nxs9g"},"options":{"video_url":"https://youtu.be/Wd3XM7Nxs9g","video_id":"Wd3XM7Nxs9g"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":" Watch this 5' video to reimagine 100% QC in document digitization projects ","missing_info":false,"context":"livesite"},{"uid":"9zvi2vu5gn3n4epi","name":"pay","icon":"creditcard","title":"Make a payment\t","description":"We accept credit card and Paypal","rich_title":"Make a payment\t","rich_description":"We accept credit card and Paypal","active":false,"position":6,"image":null,"button_type":"button","config":{"title":""},"options":{"title":""},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"0x3i8gk4qdquo3pa","name":"call","icon":"phone","title":"Click-to-call","description":null,"rich_title":"Click-to-call","rich_description":"","active":false,"position":7,"image":null,"button_type":"button","config":{"business_default":true,"call_phone":"+18053750422","display_phone":"8053750422"},"options":{"business_default":true,"call_phone":"+18053750422","display_phone":"8053750422"},"action_background_color":"#ae485e","action_text_color":null,"default_brand":false,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"qcctvco2n5veq7sm","name":"document","icon":"doc","title":"Send us a file","description":"If you send us simple photographic samples of what your documents look like now, we may respond with cost estimates and turnaround times.","rich_title":"Send us a file","rich_description":"If you send us simple photographic samples of what your documents look like now, we may respond with cost estimates and turnaround times.","active":true,"position":8,"image":null,"button_type":"button","config":null,"options":{},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"f9q249kqchimb3os","name":"contact","icon":"facejoyful","title":"Send us a message","description":"","rich_title":"Send us a message","rich_description":"","active":true,"position":9,"image":"Action images/Message/message2","button_type":"button","config":{"title":"Contact Request","message":""},"options":{"title":"Contact Request","message":""},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"46ssk06c9skn4474","name":"googlemaps","icon":"pin","title":"Get Directions","description":null,"rich_title":"Get Directions","rich_description":"","active":false,"position":10,"image":null,"button_type":"image","config":{"business_default":true,"map_address":"2363 Teller Rd #102 Newbury Park CA 91320"},"options":{"business_default":true,"map_address":"2363 Teller Rd #102 Newbury Park CA 91320"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"437jmjjxx4s1so8m","name":"text","icon":"scrolltwo","title":"Define Production Level Scanner","description":"","rich_title":"Define Production Level Scanner","rich_description":"","active":false,"position":11,"image":null,"button_type":"button","config":{"text":"What makes a scanner a “Production” scanner?
\nDocument capture industry experts share a general consensus around the concept of “Production” level status as an elusive threshold that separates low to high volume document capture. “Volume” is usually measured in deliverable documents per month as opposed to images per minute.
\nA “Production Level” document capture workflow can be represented by a complex graph starting with the ingestion of source documents (paper, micrographic, born digital) and ending with approved deliverables. The nodes of the graph handle scanning, QA/QC, repairs, image cosmetics, image processing, classification, coding, indexing, formatting, validation, publishing, deployment, auditing, reporting and more. Scanning nodes may or may not end up as part of the critical path in that graph. In turn, a scanning node can be represented by a sub-graph that includes scanning equipment as a sub-node which again, may or may not be part of its critical path.
\nFor the hardware component of a scanner to qualify as production level, it must meet or exceed certain thresholds based on:
\n· Throughput: measured in compliant images per minute. Compliant images meet service level agreement acceptance criteria, do not need rescan and are not mutilated, overlapped, duplicated or missing.
\n· Trustworthiness: Must be dependable, reliable, robust and durable. High volume throughputs need to rely on it.
\n· Versatility, resilience: Must smartly adapt to the many challenges of real world media and should not require frequent human attention during capture. It requires technological sophistication in cameras, light sources, feeding mechanisms, error detection and recovery, etc.
\n· Batch versus transactional: The unit of work in a production level capture workflow is a batch (collection of images) managed by combinations of human and automated processes. All production level workflows hinge on automation and batch processing. Stop and go, transactional, on-demand processes and the like do not belong to the production realm.
\n\n
The software component of a scanner plays a very important role in accomplishing all of the above. However, a line must be drawn separating intrinsic from supplemental software functionalities. To fairly qualify a scanner as production level, only intrinsic, integral software functionalities count. Supplemental functionalities escape the scanner domain, as they belong to the production workflow instead.
\n\n
Finally, we must include the cost-effectiveness component, which includes factors such as productivity, cost and risks. A scanner that is highly dependent on human labor or fails to satisfy the criteria described above is likely to squander the initial cost savings before the high volume project is completed. Also, the risks may outlive the project, as some of the fallouts of using a sub-production scanner may start popping up weeks or months after final project acceptance.
\n\n
In conclusion, a scanner can be only considered a production scanner if when plugged into a high volume production workflow, meets or exceeds SLA volume thresholds while sustaining an acceptable level of cost-effectiveness.
\nWhat makes a scanner a “Production” scanner?
\nDocument capture industry experts share a general consensus around the concept of “Production” level status as an elusive threshold that separates low to high volume document capture. “Volume” is usually measured in deliverable documents per month as opposed to images per minute.
\nA “Production Level” document capture workflow can be represented by a complex graph starting with the ingestion of source documents (paper, micrographic, born digital) and ending with approved deliverables. The nodes of the graph handle scanning, QA/QC, repairs, image cosmetics, image processing, classification, coding, indexing, formatting, validation, publishing, deployment, auditing, reporting and more. Scanning nodes may or may not end up as part of the critical path in that graph. In turn, a scanning node can be represented by a sub-graph that includes scanning equipment as a sub-node which again, may or may not be part of its critical path.
\nFor the hardware component of a scanner to qualify as production level, it must meet or exceed certain thresholds based on:
\n· Throughput: measured in compliant images per minute. Compliant images meet service level agreement acceptance criteria, do not need rescan and are not mutilated, overlapped, duplicated or missing.
\n· Trustworthiness: Must be dependable, reliable, robust and durable. High volume throughputs need to rely on it.
\n· Versatility, resilience: Must smartly adapt to the many challenges of real world media and should not require frequent human attention during capture. It requires technological sophistication in cameras, light sources, feeding mechanisms, error detection and recovery, etc.
\n· Batch versus transactional: The unit of work in a production level capture workflow is a batch (collection of images) managed by combinations of human and automated processes. All production level workflows hinge on automation and batch processing. Stop and go, transactional, on-demand processes and the like do not belong to the production realm.
\n\n
The software component of a scanner plays a very important role in accomplishing all of the above. However, a line must be drawn separating intrinsic from supplemental software functionalities. To fairly qualify a scanner as production level, only intrinsic, integral software functionalities count. Supplemental functionalities escape the scanner domain, as they belong to the production workflow instead.
\n\n
Finally, we must include the cost-effectiveness component, which includes factors such as productivity, cost and risks. A scanner that is highly dependent on human labor or fails to satisfy the criteria described above is likely to squander the initial cost savings before the high volume project is completed. Also, the risks may outlive the project, as some of the fallouts of using a sub-production scanner may start popping up weeks or months after final project acceptance.
\n\n
In conclusion, a scanner can be only considered a production scanner if when plugged into a high volume production workflow, meets or exceeds SLA volume thresholds while sustaining an acceptable level of cost-effectiveness.
\nTO QUALIFY: send an email to sales@isausa.com describing the collections you plan to digitize.
TO QUALIFY: send an email to sales@isausa.com describing the collections you plan to digitize.
Then... (scroll down)
\n"},"options":{"text":"
Then... (scroll down)
\n"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"livesite"},{"uid":"uodmk37yuhw1v9xo","name":"text","icon":"scrolltwo","title":"Fiche Navigation Option B","description":"COM Fiche - No Custom Software","rich_title":"Fiche Navigation Option B","rich_description":"COM Fiche - No Custom Software","active":false,"position":18,"image":null,"button_type":"button","config":{"text":"
Invoice Curation Service for Clients: Designed for clients receiving invoices from multiple suppliers. The goals are to reduce liabilities and costs by avoiding penalties, service disruptions, missed discounts, vendor management burden, vendor complaints, etc.
\nIn a nutshell, our service turns paper and emailed invoice messages into clean, safe, traceable PDF files showing always the invoice as page 1, followed by supporting docs, ending with the email body if emailed.
\nAll emails and physical paper are ingested and metadata extracted that includes Document Type, Invoice date, invoice number, PO number, company code, exception reason and any other metadata items as dictated by business rules.
\nDesignated non-invoice classes (statements, tax forms, junk, spam, irrelevant messages, zero balance invoices, Pcards, shipment notices, checks, suspicious messages and attachments, etc.) are archived and/or routed via email and/or sFTP to destinations established by business rules.
\nInvoice class documents are turned into clean, error-free, validated, searchable multipage PDF files free of structural PDF syntax errors with invoice page(s) first, followed by supporting docs and ending with the email body text if emailed, then routed via email and/or sFTP to destinations established via business rules.
\nWherever safe and possible, defective incoming PDF attachments are repaired. PDF file naming is fully customizable. All emailed attachments are converted to PDF regardless of their format (nested zips, Tiff, Jpg, Word, Excel with multiple tabs, pdfs with one or more invoices, etc.).
\nQuestioned or rejected attachments (password protected, restricted, suspicious formats, corrupted files, etc.) are flagged as dictated by business rules. The reduced set of metadata extracted is typically used for classification, validation, routing, reporting and tracking purposes, but could also be used to initiate a full payment processing cycle by adding line item details and other required metadata. Each extracted metadata item can be linked to client supplied lookup tables.
\nCustomizable sub-workflows such as third-party validations and auditing are negotiated with users.
\nRouting destinations include client users, exception handlers, email senders, BPOs, auditors, etc.
\nBPO business rules such as log file structures, routing and email notification criteria, attachment size restrictions, formats, naming, etc.) are customizable. If BPOs or recipients reply with confirmation numbers, these are captured to complete a full QA circle. Negotiated business rules may include detection of duplicate and “buried” invoices, confidential executive correspondence, etc.
\n\n
Invoice Curation Service for Suppliers: Designed for suppliers submitting invoices to their clients. The goals are to reduce or eliminate payment delays and labor costs of repairing and resubmitting rejected or questioned invoices.
\nIn simple terms, this service makes possible to create the perfect invoice that will not be rejected or questioned because it fully complies with submission criteria established by each client.
\nConceptually, is the reverse of what is described above as “curation service for clients”. This service would be a layer in between a supplier and its clients and could include XMP or XML supplemental files that may be welcomed by some invoice payers because they may reduce their payment processing costs.
"},"options":{"text":"Invoice Curation Service for Clients: Designed for clients receiving invoices from multiple suppliers. The goals are to reduce liabilities and costs by avoiding penalties, service disruptions, missed discounts, vendor management burden, vendor complaints, etc.
\nIn a nutshell, our service turns paper and emailed invoice messages into clean, safe, traceable PDF files showing always the invoice as page 1, followed by supporting docs, ending with the email body if emailed.
\nAll emails and physical paper are ingested and metadata extracted that includes Document Type, Invoice date, invoice number, PO number, company code, exception reason and any other metadata items as dictated by business rules.
\nDesignated non-invoice classes (statements, tax forms, junk, spam, irrelevant messages, zero balance invoices, Pcards, shipment notices, checks, suspicious messages and attachments, etc.) are archived and/or routed via email and/or sFTP to destinations established by business rules.
\nInvoice class documents are turned into clean, error-free, validated, searchable multipage PDF files free of structural PDF syntax errors with invoice page(s) first, followed by supporting docs and ending with the email body text if emailed, then routed via email and/or sFTP to destinations established via business rules.
\nWherever safe and possible, defective incoming PDF attachments are repaired. PDF file naming is fully customizable. All emailed attachments are converted to PDF regardless of their format (nested zips, Tiff, Jpg, Word, Excel with multiple tabs, pdfs with one or more invoices, etc.).
\nQuestioned or rejected attachments (password protected, restricted, suspicious formats, corrupted files, etc.) are flagged as dictated by business rules. The reduced set of metadata extracted is typically used for classification, validation, routing, reporting and tracking purposes, but could also be used to initiate a full payment processing cycle by adding line item details and other required metadata. Each extracted metadata item can be linked to client supplied lookup tables.
\nCustomizable sub-workflows such as third-party validations and auditing are negotiated with users.
\nRouting destinations include client users, exception handlers, email senders, BPOs, auditors, etc.
\nBPO business rules such as log file structures, routing and email notification criteria, attachment size restrictions, formats, naming, etc.) are customizable. If BPOs or recipients reply with confirmation numbers, these are captured to complete a full QA circle. Negotiated business rules may include detection of duplicate and “buried” invoices, confidential executive correspondence, etc.
\n\n
Invoice Curation Service for Suppliers: Designed for suppliers submitting invoices to their clients. The goals are to reduce or eliminate payment delays and labor costs of repairing and resubmitting rejected or questioned invoices.
\nIn simple terms, this service makes possible to create the perfect invoice that will not be rejected or questioned because it fully complies with submission criteria established by each client.
\nConceptually, is the reverse of what is described above as “curation service for clients”. This service would be a layer in between a supplier and its clients and could include XMP or XML supplemental files that may be welcomed by some invoice payers because they may reduce their payment processing costs.
"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"client_portal"},{"uid":"9zvi2vu5gn3n4epi","name":"pay","icon":"creditcard","title":"Make a payment\t","description":"We accept credit card and Paypal","rich_title":"Make a payment\t","rich_description":"We accept credit card and Paypal","active":0,"position":4,"image":null,"button_type":"button","config":{"title":""},"options":{"title":""},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"client_portal"},{"uid":"0x3i8gk4qdquo3pa","name":"call","icon":"phone","title":"Click-to-call","description":null,"rich_title":"Click-to-call","rich_description":"","active":0,"position":5,"image":null,"button_type":"button","config":{"business_default":true,"call_phone":"+18053750422","display_phone":"8053750422"},"options":{"business_default":true,"call_phone":"+18053750422","display_phone":"8053750422"},"action_background_color":"#ae485e","action_text_color":null,"default_brand":false,"button_text":null,"missing_info":false,"context":"client_portal"},{"uid":"qcctvco2n5veq7sm","name":"document","icon":"doc","title":"Send us a file","description":"If you send us simple photographic samples of what your documents look like now, we may respond with cost estimates and turnaround times.","rich_title":"Send us a file","rich_description":"If you send us simple photographic samples of what your documents look like now, we may respond with cost estimates and turnaround times.","active":1,"position":6,"image":null,"button_type":"button","config":null,"options":{},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"client_portal"},{"uid":"f9q249kqchimb3os","name":"contact","icon":"facejoyful","title":"Visit our website (see link at the bottom of this page). If you prefer we contact you instead, please click here to leave your coordinates.","description":"","rich_title":"Visit our website (see link at the bottom of this page). If you prefer we contact you instead, please click here to leave your coordinates.","rich_description":"","active":1,"position":7,"image":"Action images/Message/message2","button_type":"button","config":{"title":"Contact Request","message":""},"options":{"title":"Contact Request","message":""},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"client_portal"},{"uid":"46ssk06c9skn4474","name":"googlemaps","icon":"pin","title":"Get Directions","description":null,"rich_title":"Get Directions","rich_description":"","active":0,"position":8,"image":null,"button_type":"image","config":{"business_default":true,"map_address":"2363 Teller Rd #102 Newbury Park CA 91320"},"options":{"business_default":true,"map_address":"2363 Teller Rd #102 Newbury Park CA 91320"},"action_background_color":null,"action_text_color":null,"default_brand":true,"button_text":null,"missing_info":false,"context":"client_portal"},{"uid":"437jmjjxx4s1so8m","name":"text","icon":"scrolltwo","title":"Define Production Level Scanner","description":"","rich_title":"Define Production Level Scanner","rich_description":"","active":0,"position":9,"image":null,"button_type":"button","config":{"text":"What makes a scanner a “Production” scanner?
\nDocument capture industry experts share a general consensus around the concept of “Production” level status as an elusive threshold that separates low to high volume document capture. “Volume” is usually measured in deliverable documents per month as opposed to images per minute.
\nA “Production Level” document capture workflow can be represented by a complex graph starting with the ingestion of source documents (paper, micrographic, born digital) and ending with approved deliverables. The nodes of the graph handle scanning, QA/QC, repairs, image cosmetics, image processing, classification, coding, indexing, formatting, validation, publishing, deployment, auditing, reporting and more. Scanning nodes may or may not end up as part of the critical path in that graph. In turn, a scanning node can be represented by a sub-graph that includes scanning equipment as a sub-node which again, may or may not be part of its critical path.
\nFor the hardware component of a scanner to qualify as production level, it must meet or exceed certain thresholds based on:
\n· Throughput: measured in compliant images per minute. Compliant images meet service level agreement acceptance criteria, do not need rescan and are not mutilated, overlapped, duplicated or missing.
\n· Trustworthiness: Must be dependable, reliable, robust and durable. High volume throughputs need to rely on it.
\n· Versatility, resilience: Must smartly adapt to the many challenges of real world media and should not require frequent human attention during capture. It requires technological sophistication in cameras, light sources, feeding mechanisms, error detection and recovery, etc.
\n· Batch versus transactional: The unit of work in a production level capture workflow is a batch (collection of images) managed by combinations of human and automated processes. All production level workflows hinge on automation and batch processing. Stop and go, transactional, on-demand processes and the like do not belong to the production realm.
\n\n
The software component of a scanner plays a very important role in accomplishing all of the above. However, a line must be drawn separating intrinsic from supplemental software functionalities. To fairly qualify a scanner as production level, only intrinsic, integral software functionalities count. Supplemental functionalities escape the scanner domain, as they belong to the production workflow instead.
\n\n
Finally, we must include the cost-effectiveness component, which includes factors such as productivity, cost and risks. A scanner that is highly dependent on human labor or fails to satisfy the criteria described above is likely to squander the initial cost savings before the high volume project is completed. Also, the risks may outlive the project, as some of the fallouts of using a sub-production scanner may start popping up weeks or months after final project acceptance.
\n\n
In conclusion, a scanner can be only considered a production scanner if when plugged into a high volume production workflow, meets or exceeds SLA volume thresholds while sustaining an acceptable level of cost-effectiveness.
\nWhat makes a scanner a “Production” scanner?
\nDocument capture industry experts share a general consensus around the concept of “Production” level status as an elusive threshold that separates low to high volume document capture. “Volume” is usually measured in deliverable documents per month as opposed to images per minute.
\nA “Production Level” document capture workflow can be represented by a complex graph starting with the ingestion of source documents (paper, micrographic, born digital) and ending with approved deliverables. The nodes of the graph handle scanning, QA/QC, repairs, image cosmetics, image processing, classification, coding, indexing, formatting, validation, publishing, deployment, auditing, reporting and more. Scanning nodes may or may not end up as part of the critical path in that graph. In turn, a scanning node can be represented by a sub-graph that includes scanning equipment as a sub-node which again, may or may not be part of its critical path.
\nFor the hardware component of a scanner to qualify as production level, it must meet or exceed certain thresholds based on:
\n· Throughput: measured in compliant images per minute. Compliant images meet service level agreement acceptance criteria, do not need rescan and are not mutilated, overlapped, duplicated or missing.
\n· Trustworthiness: Must be dependable, reliable, robust and durable. High volume throughputs need to rely on it.
\n· Versatility, resilience: Must smartly adapt to the many challenges of real world media and should not require frequent human attention during capture. It requires technological sophistication in cameras, light sources, feeding mechanisms, error detection and recovery, etc.
\n· Batch versus transactional: The unit of work in a production level capture workflow is a batch (collection of images) managed by combinations of human and automated processes. All production level workflows hinge on automation and batch processing. Stop and go, transactional, on-demand processes and the like do not belong to the production realm.
\n\n
The software component of a scanner plays a very important role in accomplishing all of the above. However, a line must be drawn separating intrinsic from supplemental software functionalities. To fairly qualify a scanner as production level, only intrinsic, integral software functionalities count. Supplemental functionalities escape the scanner domain, as they belong to the production workflow instead.
\n\n
Finally, we must include the cost-effectiveness component, which includes factors such as productivity, cost and risks. A scanner that is highly dependent on human labor or fails to satisfy the criteria described above is likely to squander the initial cost savings before the high volume project is completed. Also, the risks may outlive the project, as some of the fallouts of using a sub-production scanner may start popping up weeks or months after final project acceptance.
\n\n
In conclusion, a scanner can be only considered a production scanner if when plugged into a high volume production workflow, meets or exceeds SLA volume thresholds while sustaining an acceptable level of cost-effectiveness.
\n