View

Sorting

Products found: 2137

logo
Offer a reference bonus
0.00

24translate Translation memory systems

What is a translation memory system? The use of translation memory systems (or TMS) is an essential guarantor of quality in modern translation. In 'translation memories', a customer's existing translations are stored in the form of text segments that can be automatically retrieved by a translator working on a new translation. As such, there is no need to re-translate previously translated text segments, phrases and terms, an advantage that improves both the consistency of the translations and the translator's efficiency, while also reducing translation costs. In order to make the best possible use of these capabilities 24translate, working alongside 24technology, developed a TMS with a unique range of functions: 24|tcm. How do translation memory systems support our translators with their work? Like glossaries, translation memory systems are effective aides in the translation process. The decision as to how to translate a given sentence fragment, however, is still up to the translator. Our software does not replace the translator but rather supports them by providing access to intelligent memory and search functions. As such, our system continues to rely on quality work by specialist translators: Only when it is 'fed' with intelligent translations can it provide intelligent suggestions for translation. In practice, the individual translation segments are stored as a language pair consisting of source and target text, which is then automatically suggested in future translation projects bearing identical or similar text passages. All translators working for a specific company rely on the same translation memory (database). On the one hand, this significantly lowers translators' manual research efforts, while on the other it prevents deviation from specific terminology or phrases in subsequent translations and/or the work of additional translators. 24|tcm in use 24translate maintains a company-specific translation memory (abbreviated TM) for each of its clients. In order to provide customers with the full benefit of already existing translations, we will gladly maintain and store these at the beginning of our collaboration. Each new translation provided by us is then automatically stored in your translation memory. Clients may also access their translation memories and view existing translations at any time via various interfaces and tools (e.g. our customer portal). The advantages of a translation memory system
  • Eliminates double translations, leading to greater efficiency: Translators focus on 'new', previously untranslated text segments.
  • Saves the customer time and money: Translations can be delivered more quickly and at significantly lower rates.
  • Quality assurance: Consistency with regard to content and terminology is maintained at all times.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
16
logo
Offer a reference bonus
1.00

2Event

The main advantage of 2Event over hundreds of regular ticket sites is its all-in-one service, where you get 100+ useful features from one source. The platform contains the main functions for organizing events: registration of visitors, tickets, schedule, speaker schedule, networking (list of visitors, appointment of meetings), search for fellow travelers (people who go to the event and are coordinated with each other), polls and voting, Twitter Wall , badges with QR, push-mailing.

Basic functionality
  • Landing Page for your event: get a ready-made "landing page"
  • Simple registration of visitors via mail or social networks
  • Purchase tickets directly from your smartphone, with a minimum commission of 2.5%
  • Ticket and face scanners in smartphone: put an unlimited number of volunteers at the entrance with regular smartphones for control
  • Schedule and questions to speakers on the user's phone. In addition to interactivity, this is also saving on printing
  • Push notifications: send instant messages to your guests' smartphones with information about schedule changes, promotions or announcements of your next events
  • Polls, polls and contests, QR quests: get feedback, hold contests and sweepstakes from partners, engage your audience
  • Badges with QR: create your own ticket / badge design and use at your events
  • Analytics: get access to full event statistics 24/7, connect Google Ads and track conversions

Networking
  • List of visitors in the application and on the website. It can be seen who else will go to the event
  • Meetings: scheduling and scheduling meetings between event attendees
  • Correspondence between event participants: private and general chats, the ability to ask questions to speakers
  • Chat for the projector (Twitter Wall): a large screen on the wall, where posts of event visitors and all posts from social networks with the # hashtag of your event are broadcast in real time. Twitter Wall is one of the visitor attention centers and additional advertising space for sponsors

Advanced networking
  • Fellow travelers by car / taxi: visitors create groups by car / taxi or join existing ones to save money and get more time for communication
  • Travel Companions Between Cities: Scan your transport ticket and find out who else is someone from your city traveling to the same event in your carriage. This way you will find fellow travelers and meet like-minded people on the road.
  • Search for roommates among event participants: reduce living expenses, meet visitors from other cities and spend the night with them
  • Geolocation: look at the location of the event participants on the map. An indispensable feature if you are in an unfamiliar city
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

360Learning

This Collaborative Learning platform relies on peer learning where anyone can elevate and respond to requests for knowledge, closing skills gaps faster. With it’s iterative training framework, minimum viable courses are shipped quickly and improved constantly by peers who identify out-of-date content or suggest additions.

Feedback & data from interactions within the course are also pushed to coaches on the platform, who facilitate peer learning by ensuring that courses are easily accessible, actionable & impactful. From onboarding new employees to training sales reps on a new product pitch, 360Learning aligns employee aspirations with organization expectations.

Overview of 360Learning benefits

360Learning Collaborative Learning platform reduces the feedback loop between expert & employee with lightweight reactions and qualitative forums for asking experts questions while allowing L&D to identify where courses are working and where they need work.

L&D leaders spend less time monitoring course completion (360Learning courses have a 90%+ completion rate) and more time demonstrating business impact.

With build-in Salesforce integration, L&D teams connect the dots between training & time-to-first deal, while our analytics dashboard tracks employee progress - giving them a nudge when they’re falling behind!

With HCM & TMS integrations, 360Learning enables you to evolve on top of our robust platform as an orchestrator of continuous learning throughout the organization.
Thanks to the dedicated sales enablement features, sales trainers using 360Learning to train their new reps also see great results:

  • 15% increase in quota attainment
  • 30% decrease in ramp up time
  • From $500k to $3m in yearly onboarding savings

Level up your sales team with 360Learning's Collaborative Learning Platform. Fast track new hires. Reps hone their script 10x faster with our digital role-play tool. Leverage your team's best examples. Continuously upskill your reps. Co-create impactful courses in just a few hours. Make them available at the point of need through our Salesforce connector and mobile app. Skyrocket sales performance: Demonstrate the impact of training on quota attainment through CRM integration.

360Learning is a learning engagement and training platform that provides learners and trainers with a commonplace to create a learning culture. It allows users to setup digital learning culture in less time and enables them to create online courses in just a few clicks. The platform uses social interaction, gamification and mobile friendly features to get learners engaged and involved in online courses. For trainers, it works more like a marketing and management platform and offers course optimizations, A/B testing and real-time tracking. The platform is being used by some key industry players that all aim to create a global digital learning culture within the organization. It allows trainers and experts to achieve more in less time and helps them become digital experts without having to go through lengthy technology lessons.

  • For Trainers and Experts

The platform is compatible with all web and media formats and allows organizations to reuse their existing resources. This allows businesses to leverage their existing best online content and helps them discover innovative formats that make it easier to produce new interactive content. The platform allows creating different kinds of evaluations, including open-ended and closed-ended questions. Trainers can also develop brainstorming sessions, business goals, collaborative activities, exams and more. Trainers and experts can be reviewed by the community, while the platform highlights such reviews to encourage participation. The platform uses a gamified ranking system, which makes it easier to identify top performers for each skill. Advanced tools promote continuous improvement by generating actionable suggestions for course improvement.

  • For Learners

360Learning involves learners in online courses on a day-to-day basis and helps increase engagement rates using gamification methods, which are inspired by popular web practices. Groups can be created based on different variables such as by class, by arrival date or by theme, while detailed analysis on these groups or communities can also be performed. The platform puts human interaction at the center of the training strategy by allowing effectively collaborating and innovating during the courses. All the features the platform has to offer are mobile friendly, which allows learners to access important stuff right from their mobile devices, and from anywhere.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

360Suite Security and Administration

Identify who has access to what
  • View, manage and audit security
  •  

  • Document security (XLS, CSV, PDF)
  •  

  • View explicit, inherited and granular rights
  •  

  • Get a user-centric and object-centric view of security
  •  

Shorten time required for upgrades
  • Spend less time on administrative and analytic tasks
  •  

  • Bulk update crystal connections and report instances
  •  

  • Bulk re-point Webi (UNV to UNX, update BEx/BICS queries)
  •  

  • Update Webi variables en masse
  •  

Simplify audits and administrative tasks
  • Archive objects content & report instances (WID, PDF, XLS, CSV, text)
  •  

  • Automate any administrative task (update owners, purge reports, update recurring instances, etc.)
  •  

  • Clean up unused content and dormant users
  •  

  • Data Catalog for documents
  •  

Explore your content
  • Drill down capabilities with export
  •  

  • Replace Query Builder
  •  

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
4
14
logo
Offer a reference bonus
0.00

3Ants

Our technology and our team work hard to protect your intellectual property. We have profound knowledge of how piracy is distributed and we have developed advanced technological tools especially design for content protection.
  • DETECTION. 3Ants has advanced and innovative software and processes specifically designed to protect your property and content from piracy.
  • ANALYSIS. 3Ants' software and team of experts studies the gathered data and offers specialziaed feedback to the processes so you have more sophisticated content protection methods.
  • DELETION. The tools 3Ants uses and its team is fully capable of deleting the links and the pirate content that put your intellectual property at risk.
We protect your brand on the Internet We offer a custom-made solution and top quality content protection.
  • Brands and companies. We prevent the dishonest use of your brand by watching over your online reputation. With innovative methods, we protect your brand's image and the use of your identity to improve your consumers' opinion of you.
  • Digital contents. We offer content protection of the best quality by removing the illegal copies and unauthorized sharing. We also redirect the user to legal pages where they can purchase your product or find information on it.
  • Physical Products. We work to increase and protect your legal sales, as well as to eliminate forgeries in online sales.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
20
logo
Offer a reference bonus
0.00

3D Warehouse

With over 4 million models and 23 million users every year, 3D Warehouse is the world’s largest and most popular repository of free 3D models. It is an open library where anyone using SketchUp Pro can download and share.

A community for all
Anyone can search, download models from, and contribute content to 3D Warehouse, for free. The world’s largest 3D content platform features direct integration with SketchUp Pro and compatibility with CAD apps.
Sharing is caring Not every model in 3D Warehouse has to be shared; private items are accessible only to you. Public models can be searched and downloaded. Models can be organised into collections and shared to social media.
Content marketing platform 3D Warehouse offers product manufacturers a unique way to showcase catalogs, allowing prospects to specify product into their own designs. The 3D model is a native channel to reach and engage new customers.
Certified content development SketchUp has built a strong network of Certified Content Developers; together they are equipped to build professional models for those organisations seeking to get their content noticed on 3D Warehouse.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
0
logo
Offer a reference bonus
1.00

3DEXPERIENCE platform

With a single, easy-to-use interface, it powers Industry Solution Experiences – based on 3D design, analysis, simulation, and intelligence software in a collaborative, interactive environment. It is available on premise and on cloud. Dassault Systèmes offers industry-leading applications delivered on the 3DEXPERIENCE platform: Design & Engineering, Manufacturing & Production, Simulation, Governance & Lifecycle, 3D Design Experience for Professionals, as well as a broad catalog of services.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
5
5
logo
Offer a reference bonus
0.00

4iQ IDHunt

The only way to stop cyber-enabled crimes is to unmask whoever is truly behind it. By identifying bad actors, you can recover funds, freeze accounts, takedown infrastructure — and, most importantly, thwart additional attacks and exploitations. For even the most advanced intelligence operations, however, identifying threat actors can be a slow and difficult process. And one with many dead ends. That’s where 4iQ IDHunt comes in. We help investigators analyze monikers or pseudonyms and other identity related attributes, connect the dots and unmask bad actors around the globe, by combining open source intelligence and our one-of-a-kind 4iQ IDLake. 4iQ IDHunt Core IDHunt Core is an easy to use web application for intel analysts to analyze personas, enhance attribution analysis, and uncover the real identities behind criminal activities.
  • Targeted Threat Analysis. Instead of searching for a needle in a haystack, investigators start with what they already know – suspected bad actors – and search the 4iQ IDLake to begin making connections.
  • Accelerate Findings. 4iQ has spent years curating and verifying billions of identity records, so that you can more efficiently unmask adversaries — sometimes within a matter of hours.
  • Analytics. A single actor analysis can require hundreds of pivots. With 4iQ IDHunt, you can automatically connect the dots, generate graphs and calculate maliciousness scores in seconds.
  • No Training Required. 4iQ IDHunt application is simple. Using an intuitive interface, Investigators can search and immediately start seeing results with no prior training.
4iQ IDHunt Enterprise IDHunt Enterprise (unified OSINT and DARKINT) is software that can be deployed in the cloud or on-premise. It provides intel analysts complete control over the full intelligence cycle; from defining custom threat models and collection plans to dynamic taxonomies and dashboards for ongoing investigations. With IDHunt Enterprise, intel units can discover the real identity behind bad actors, configure collections, gather information and fuse data from across the surface, social, deep and dark web, internal file systems and third party data sources in order to prevent and disrupt attacks. Multiple Missions Supports multiple investigations across Fraud, Financial Crime, Cyber and Corporate Security units. Complete Control Tailor data to every part of the full intel lifecycle. Simply configure thousands of sources, collection schedules, dynamic taxonomies, and real-time queries. Collection Engine Large portfolio of built-in collectors can scan surface, social, deep, and dark web, as well as internal email and file systems. Turnkey Solution No integration required. Get Cyber and Corporate Security units up and running quickly.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
6
0
logo
Offer a reference bonus
1.00

6Connex Platform

Unlimited possibilities
6Connex is a virtual platform like no other — with the robust flexibility needed to create any interactive environment in the cloud. You have the ability to power fully-remote and hybrid events for Marketing, Sales, HR, Business Development, and more.

Attendee-centric experiences
Attendees can easily interact with advanced engagement tools, such as 1:1 chat, video chat, gamification, social sharing, and webcasting, while leveraging our sophisticated A.I. technology that allows for a unique, personalized event experience with content-matching and networking opportunities.

Enterprise-level security
As the virtual event industry’s leader in security and privacy, many of the world’s most admired companies have put their trust in our security and privacy protocols. We comply with the most stringent enterprise security requirements with features including whitelisting, blacklisting, and secure cookie handling.

Actionable insights

Track activity and ROI with 24/7 access to 35+ real-time reports. Understand the Who, What, Where, and When for every activity in your virtual environment. Provide your sponsors with actionable data that allows them to target campaigns accurately. Key features of 6Connex: Unmatched Scalability with Enterprise Level Security The 6Connex platform is ISO 27001 certified, offering a secure virtual environment with unlimited capacity and flexibility to host any hybrid or virtual use case.

The Perpetual VE Concept

The 6Connex platform handles multiple use cases, allowing customers to repurpose the Environment and leverage their long-term license to support multiple engagements in a single location.

Immersive Experience
Our environment templates and navigation design drive attendees through a unique immersive experience, delivering a new level of engagement and virtual experience.

Open VE Universe

6Connex’s platform is technology agnostic allowing clients to bring the tools they use day-to-day and are approved by their IT protocols to integrate with our platform and drive engagement.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
15
8
logo
Offer a reference bonus
0.00

6Scan

6Scan is a full service security solution for you website. Patent-pending technology combines a full suite of features that scan and automatically fix critical issues that - if left unresolved - could damage your business and customers, your reputation and destroy your web presence.        

What Does 6Scan Do?

  1. Find. The 6Scan six independent scanners work to detect vulnerabilities, scan for malware and inspect your website's files to determine any security issues or risks.
  2. Fix. Patent-pending technology automatically fixes any security issues as soon as they are detected. We deploy a WAF (Web Application Firewall) and custom vulnerability patches to make sure any attack vectors are blocked. The entire process of detecting and fixing vulnerabilities is fully automated, managed through a unified dashboard.
  3. Protect. 6Scan will continue to monitor your site for new vulnerabilities and security risks. The scanning is scheduled automatically or can be triggered manually and you will be notified of any issues. As with all our services, this process can be monitored from your dashboard where you have the opportunity to roll back any changes.
Malware Scan. A complex scan that runs a number of different tests to detect any signs of malware on your website. The 6Scan malware scan deploys a much larger set of tests than most of the simple or embedded scanners to make sure that even the latest emerging threats are detected.                         Malware Removal. A service to restore your website after a malware attack. 6Scan's security experts will access your website and remove any malicious code or backdoors.             Server-Side Scan. A scan and examination of the files on your hosting account for any signs of backdoors or hidden malware code which could be used to compromise your website.             Website Scan. Detects vulnerabilities that could make your site a target for attacks. The proactive service works seamlessly in the background to maintain website security.                                     Auto Vulnerability Repair. Patent-pending patching technology acts immediately to resolve problems with vulnerable website code. Left unchecked these issues become entry points for hackers to gain access to your website.                                         CMS Scan/Repair. Automatically repairs problems created by outdated and vulnerable plug-ins and content management systems such as WordPress, Drupal, and Joomla, used by millions of websites.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
3
logo
Offer a reference bonus
0.00

802 Secure AirShield

The 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only the IT network but the surrounding Physical environment (off-network systems). Gartner and NIST refer to this as Cyber-Physical Security. The lack of Physical visibility, management, and security exposes organizations to risks including unmanaged, Shadow IoT, and adversarial devices such as wireless thermostats, Smart TVs, spy cameras, drones, rogue cell towers, wireless storage devices, and much more. AirShield Solution 802 Secure’s AirShield is an autonomous and non-intrusive wireless monitoring solution that provides immediate visibility and protection across the Cyber-Physical space. AirShield provides scans across multiple wireless protocols and frequencies to detect wireless devices and networks and protect against misconfigurations, Shadow IoT, unknown and unmanaged IoT devices, and previously undetected adversarial attacks. This is accomplished using wireless deep packet inspection, situational awareness, zero trust security, anomaly detection, machine learning, and behavioral analysis.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
12
11
logo
Offer a reference bonus
1.00

A10 THUNDER®TPS

SURGICAL MULTI-VECTOR DDOS PROTECTION Mitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users. POWERFUL & EFFICIENT Lower TCO with industry-best 300 Gbps at 440 Mpps. FPGA-based acceleration mitigates without burdening CPUs. AUTOMATED THREAT MITIGATION Respond faster and minimize manual changes with automated mitigation and escalation based on 28 behavioral indicators. PRECISE DETECTION Swiftly detect attacks with in-line or flow-based methods, or integrate third party detection with open APIs. HYBRID DDOS PROTECTION On-premise protection integrates with Verisign’s cloud-based DDoS Protection Services. FLEXIBLE MANAGEMENT Use 100 percent API coverage for SecOps, on-box GUI, CLI, or to manage multiple TPS devices via aGalaxy. THREAT INTELLIGENCE SERVICE Leverage more than three dozen intelligence sources to block malicious traffic. Included with A10 support. 24-7 ATTACK SUPPORT Spin up 24-7 DDoS attack support from the A10 DDoS Security Incident Response Team (DSIRT). Included with A10 support. REACTIVE MODE Larger networks benefit from on-demand mitigation, which is triggered manually or via flow-based analytical systems. Thunder TPS fits any network configuration with integrated BGP and other routing protocols support. PROACTIVE MODE Proactive mode provides continuous, comprehensive detection and faster mitigation. Deployable in asymmetric or symmetric configurations, this mode is most useful for real-time environments where the user experience is critical. OUT-OF-BAND (TAP) MODE The out-of-band mode is used when packet-based DDoS detection and monitoring is required.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
12
11
logo
Offer a reference bonus
0.00

Abatis for Maritime ICS SCADA

In conjunction with our partners CLA Consulting, SETEL PowerLineand ECDIS Ltd, Abatis is pleased to launch a Cyber Malware Protection System created specifically to meet the needs of the Maritime sector.  In particular, it can protect the following vulnerable systems on board ship as well as shore-based systems:
  • Communication Systems
  • Bridge Systems including ECDIS
  • Propulsion & Power Control
  • Access Control Systems
  • Cargo Management Systems
  • Passenger Servicing & Mgt.
  • Passenger-facing Networks
  • Core Infrastructure Systems
  • Admin & Crew Welfare Systems
Protect Your Fleet from External and Internal Threats
  • Proactive Protection
  • No Updates Required
  • Fast
  • Safe
  • Efficient
  • Low Power Consumption
  • Evaluated Extremely Small Footprint (<100KB)
  • Fit-and-Forget
  • Protects Legacy and New Operating Systems Can Identify and Isolate Existing Malware Infections
  • Works with Existing Security Tools
  • Easy to Use Reduces Maintenance Burden
  • Improve Green Credentials through Energy Saving
  • Ship & Shore Capability
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
12
logo
Offer a reference bonus
0.00

Abatis HDF

Abatis HDF is a host-based software-only solution that is implemented as a kernel driver on Windows platforms. It intercepts and mediates file write access to the computer’s permanent storage e.g. local hard disk, network shares and removable storage devices such as USB stick and external disk. It is designed to help enforce system and file integrity without complex management overheads. It achieves this security objective by exercising robust access control over the writing of executable files and user-defined files (protected files) to a computer. It protects against unauthorized modification and denies unauthorized write operations. While HDFblocks unwanted executables by default, the HDF system administration can define files for integrity protection according to the computer’s roles. Ideally, Abatis HDF should be deployed on a newly installed ‘clean’ operating system. From this secure initial state (baseline), Abatis HDF will prevent malware infection than on. For most corporate environments, Abatis HDFis rolled out in stages and there may be extant undetected infections on systems –often referred to as Advanced Persistent Threats (APTs). Abatis HDF’s unique operation and extensive audit log allow the malware to be identified. Abatis HDF can also reveal rootkit infections and facilitates the subsequent removal of such programs. Features:
  • Defeats zero-day malware, rootkits, Trojans, APTs and viruses/worms
  • Protects legacy and new operating systems from Windows NT4 to Windows 7
  • Has a tiny software footprint(less than 100KB)that requires no ongoing updates
  • Is extremely fast in operation
  • Prevents exploitation of Alternate Data Streams (ADS)
  • Protects all permanent storage on the device, thereby ensuring no threats can penetrate
  • Is non-signature-based protection for Windows and Linux
  • Provides anti-malware and anti-hacker protection
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
7
logo
Offer a reference bonus
2.00

ABBYY FineReader

ABBYY FineReader is a versatile PDF tool which empowers information workers to efficiently manage documents in the digital workplace. It harnesses ABBYY’s AI-based OCR technology to make it easier to digitize, retrieve, edit, protect, share, and collaborate on all kinds of documents in the modern working world. FineReader reduces inefficiencies resulting from a variety of causes: inaccessible, nonsearchable documents and information; workflows that involve a mix of paper and digital documents; and tasks that require the use of multiple software applications. This allows information workers to focus on their areas of expertise, rather than the intricacies of their administrative tasks.

BENEFITS
Optimize document processes
Digitize, retrieve, edit, protect, share, and collaborate on all kinds of documents in one workflow.
Make the most of PDFs
Edit digital and scanned PDFs with a newfound ease: correct whole sentences and paragraphs or even adjust the layout.

Digitize the document workflow
Incorporate paper documents into a digital workplace with AI-based OCR technology to simplify daily work.

Streamline IT costs
Benefit from one-time payment and progressive volume discounts to maximize the impact across your organization.

Standardize software assets
Deploy one PDF solution throughout your organization to ensure multiple stakeholders can collaborate smoothly.

Simplify license management
Lower IT workload with automated deployment and straightforward license management.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
19
12
logo
Offer a reference bonus
2.60

ABBYY FlexiCapture

ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition technologies, automatic document classification, plus a highly scalable and customizable architecture, mean that it can help companies and organizations of any size to streamline their business processes, increase efficiency and reduce costs. Transform streams of documents of any structure and complexity into business-ready data Capture With Mobile ABBYY FlexiCapture for iOS turns smartphones into portable scanners that capture information from paper documents and deliver it to back-end systems. Software for Document-driven Business Processes One system for processing all kinds of paper documents in any industry Intelligent Auto-learning Technology Makes Set Up Easy Interactive training technology simplifies system implementation and set up. Mobile Document Capture FlexiCapture’s mobile capture client provides an alternative entry point for documents – usable at anytime, from anywhere. What is Forms Processing? Forms processing is a process whereby information entered into data fields is converted into electronic form. Automated form processing software interprets machine-print (OCR), isolated handprint (ICR), mark sense (OMR) and barcodes from paper forms.  Product History The development of ABBYY data capture products started in 1995. At that time the team was working on two projects: the development of hand-written form recognition and FlexiCapture technology - which enables data extraction from documents with flexible layouts.
... Learn more
ROI-calculator
Configurator
ROI-
-
20
3
logo
Offer a reference bonus
2.00

ABBYY Lingvo

ABBYY Lingvo Dictionaries ABBYY Lingvo Dictionaries for desktop and mobile devices let you translate words, expand your vocabulary and master foreign languages. It contains trusted dictionaries for up to 29 languages, including German, Spanish, Italian, and English. Choose Platform ABBYY Lingvo for Windows ABBYY Lingvo for Mac ABBYY Lingvo Live for Web ABBYY Lingvo for Windows 8 Touch ABBYY Lingvo Mobile Dictionaries ABBYY Lingvo API
... Learn more
-
ROI-calculator
Configurator
ROI-
-
1
10
logo
Offer a reference bonus
2.40

ABBYY Mobile Imaging SDK II

Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II. Available for iOS and Android
  • Fast image capture - Save your end users time and resources. Create apps that reduce manual interaction and capture the best quality images for OCR.
  • Front-end mobile data capture solution - Increase your apps’ productivity. Power up your mobile apps with a front-end mobile data capture solution that can easily integrate into your back-end systems.
  • Pre-built comprehensive image capture solution - Optimize your development resources. Easily integrate a pre-built comprehensive image capture solution into your mobile app.
Key features
  • Automatic photo capture. Automatically captures the best quality image suitable for OCR by hovering the smartphone’s camera over the document, minimizing manual image verification.
  • Document detection. This new feature automatically finds the boundaries of the document in a video stream or photo and crops the image and corrects its perspective.
  • New API. The new and optimized API, with high level methods for image capturing, saves you development time. In additional, it supports common programming languages used for mobile application development.
  • Image export. Improved export functionality provides you the flexibility to choose between different image export formats (PDF, JPEG, JPEG2000, PNG) and compression levels for further back-end processing.
... Learn more
ROI-calculator
Configurator
ROI-
-
1
5
logo
Offer a reference bonus
2.40

ABBYY Real-Time Recognition SDK

Why ABBYY Real-Time Recognition SDK?
  • Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OCR step or entering the text manually.
  • Improved business performance. Real-time text capture from documents such as invoices, waybills, sick notes or letters can be quickly implemented into existing corporate apps in banks, transport companies, insurance, and other organizations.
  • Suitable for high security requirements. As the text does not need to be photographed, saved in the memory storage, uploaded to cloud services or external servers, this modern way of information capture is suitable for organizations with the highest data security standards.
  • Outstanding recognition accuracy. We have combined ABBYY’s proven OCR technology with new intelligent algorithms that recognize text from live video streams. This SDK technology ensures superior text recognition accuracy within apps for both businesses and consumers.
Real-Time Recognition SDK can be integrated into mobile apps supporting various use cases. The integration of the development toolkit into a mobile app can significantly speed up mobile data capture processes in organizations, allow automated quality control in production companies and offer convenient data entry to users of smartphones and tablets. Use cases
  • Customer registration and on-boarding. By simply pointing the mobile device’s camera at ID cards, passports and other identification documents, customer data is transferred into company systems without the need to type them in.
  • Mobile payment. Information necessary for a money transfer can be inserted directly into the fields of a mobile banking app by focusing the smartphone’s camera on payment slips, invoices or other payment documents.
  • Customer self-service. Enterprise companies can increase customer satisfaction and loyalty by providing modern apps that allow clients to communicate easily and exchange data with their vendors.
Key features
  • Specific data capture. When described by regular expressions, specific data fields can be automatically detected and extracted in real time. Requested information (for example, total amounts on invoices, email addresses or phone numbers on business cards, promotional codes on vouchers, or other data fields) can be obtained immediately, even if they are part of larger text areas.
  • Text detection from video stream and photo library. When pointing the smartphone’s camera at text, the technology is continuously recognizing the text from the ‘live’ video stream. This enables instant recognition of text on documents or objects without the need to take a picture. Also the capability to recognize text from images saved within the photo library of the mobile device.
  • 63 OCR languages. Text recognition in 63 languages allows for the quick creation of mobile apps for international business organizations as well as consumer travel apps.
See the full list of OCR languages
  • OCR for iOS and Android. Usage of toolkits from one OCR vendor leads to consistent functionality and comparable recognition results for both the iOS and Android platforms.
  • MRZ support and data capture from IDs. Built-in support for capturing MRZ information, coupled with the ability to capture personal information from ID documents such as passports, ID cards, driver’s licenses and other sources, helps create mobile apps with fast personal data entry and identity verification.
  • Text capture from objects. Text on objects such as street signs or license plates can now be easily captured. Intelligent algorithms enable quick text detection and produce highly accurate recognition results, even when the mobile device camera is in poor lighting and angle conditions.
  • Bank card recognition and IBAN capture. Built-in support for the detection and extraction of IBAN and bank card numbers opens up endless possibilities for mobile banking apps. With SDK integrated, smartphone cameras just focus on the IBAN code or bank card number, and the data is instantly detected and transferred into the mobile banking app.
  • Instant translation. Developers can create apps that instantly translate words viewed through smartphones or tablets in real time. The dictionaries with menu lexis and some general lexis are included and allow instant translation with no internet connection**. The translated text will replace the original text on the camera preview screen, giving the user a ‘real-live’ translation experience.
  • Highly accurate OCR results. The SDK is based on premium ABBYY text recognition technology, acknowledged by major software developers and used on 100M+ devices worldwide by enterprise companies, and ultimately consumers. 
... Learn more
ROI-calculator
Configurator
ROI-
-
15
13

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.