New use cases for Optical Character Recognition (OCR) technology continues to materialize. Veterans of the OCR and document capture industry that we speak with are gobsmacked when we share how this well-established technology is being used in new and innovative ways. A recent example involves the use of computer vision in the online gaming industry.
We have all heard about GDPR (General Data Protection Regulation), which came into force on May 25, 2018. Its many strict rules for personal data privacy required organizations to do complete audits of their internal systems and processes, which led many to implement new solutions to help them comply. Now, many organizations will also have to understand and prepare for the CCPA (California Consumer Privacy Act), which goes into effect on January 1, 2020.
There’s a saying in the OCR industry, “garbage in, garbage out”. In short, it is very challenging to get accurate OCR output from documents that even humans struggle to read. Thankfully, due to advancements in computer vision, there are now solutions for these challenges.
Welcome to part three of our six-part series that will take readers on a journey through the latest concepts in multichannel document capture and intelligent OCR, with an emphasis on how AI has transformed what’s possible in making your documents and data work for you – and not against you.
In part three of our series, we are doing a deeper dive into what you should look for in a CDA solution. (Hint: You’ll need much more than just OCR functionality)
Recently, the U.S. Department of Justice (DOJ) released the 400+ page Mueller Report (140MB PDF document). If you are interested in the workings of the U.S. government, you may have downloaded it, expecting to be able to educate yourself. Unfortunately, your attempts at searching for specific topics with the trusty Control-F key sequence ended in utter frustration. You may have just given up and looked for a summary write up, but others may not have that luxury.
“A chain is only as strong as its weakest link” is a common term heard around IT security talk, but the unpleasant truth is weak links in the security chain are frequently overlooked. Until they are exploited. Credit card skimmers on ATMs and gas pumps are so successful because they appear to have no user vulnerability, and so commonplace they are potential risks are ignored.