Outsourcing & Offshoring

Outsourcing is when a company contracts with an outside provider for services or other business processes, rather than employing staff to do these services in-house. These services may be provided on-site or off-site. Typically outsourcing is done with an eye toward efficiency and cost-saving for the company. Outsourcing could be as simple as hiring a freelancer to edit a company newsletter or as large-scale as hiring an outsourcing company to handle all credit card issuing activities in a bank.


BPO stands for "Business Process Outsourcing," which is simply another term for outsourcing. This is when a company contracts an outside provider for services or business processes. This might include manufacturing or back-office functions such as data entry, data processing, credit card processing, accounting and human resources. But BPO might also includes front-end services such as customer care and technical support.

IPTC (image metadata)

IPTC data is a method of storing textual information in images defined by the International Press Telecommunications Council. It was developed for press photographers who need to attach information to images when they are submitting them electronically but it is useful for all photographers. It provides a standard way of storing information such as  keywords, location and captions.

Changjie Chinese Input Method

The Changjie input method is a system by which Chinese characters can be entered into a computer using a standard keyboard.

Changjie is based on the graphological aspect of the characters: each basic, graphical unit is represented by a basic character component, 24 in all, each mapped to a particular letter key on a standard QWERTY keyboard. An additional "difficult character" function is mapped to the X key.

Data Collection

Data collection means collecting data from various sources such as offline resources, websites, business directories, job postings, search engines and then convert the gathered data into your preferred output template.

Data collection is an important facet in maintaining the financial strength of your business. With the help of data collection you can have ready access to any information you might require to help you with your decision making process.

DoD 5220.22-M

Data destruction software, sometimes called data sanitization software, disk wipe software, or hard drive eraser software, is a software-based method of completely erasing the data from a hard drive.

Data destruction software is just one of several ways to completely erase a hard drive.

When you delete files and then empty the Recycle Bin, you don't actually erase the information, you just delete the reference to it so the operating system can't find it. All the data is still there and, unless it's overwritten, can be easily recovered using file recovery software.

Single PC Dual-Monitor

In a study conducted by John Peddie results show a staggering 42% improvement on productivity with the use of dual monitors. Another study, this time by an NEC commissioned research team at the University of Utah found that people who used two 20-inch monitors were 44 percent more productive at certain text-editing operations compared with people using a single 18-inch monitor.

Public Key Encryption

In public key cryptography, the private key is generally kept secret, while the public key may be widely distributed. In a sense, one key "locks" a lock; while the other is required to unlock it. It should not be possible to deduce the private key of a pair given the public key.

There are many forms of public key cryptography, including:

* public key encryption — keeping a message secret from anyone that does not possess a specific private key.

* public key digital signature — allowing anyone to verify that a message was created with a specific private key.


PGP Encryption (Pretty Good Privacy) is a computer program which provides cryptographic privacy and authentication.To the best of publicly available information, there is no known method for any entity to break PGP encryption by cryptographic, computational means regardless of the version being employed.


OCR Workflow

Optical character recognition, usually abbreviated to OCR, is computer software designed to translate images of handwritten or typewritten text (usually captured by a scanner) into machine-editable text, or to translate pictures of characters into a standard encoding scheme representing them (e.g. ASCII or Unicode).


Subscribe to RSS - Glossary