SlideShare a Scribd company logo
1 of 25
Strategic Business Data Solutions March 10, 2009 CONFIDENTIAL © All Rights Reserved
codeMantra Brief Intro March 10, 2009 CONFIDENTIAL © All Rights Reserved Established in the United States in 2002 codeMantra is an American company with the offshore advantage.  The offshore operation (Chennai, India) established in 1990’s, has now expanded to three facilities employs 750 people - including  200 dedicated LPO specialists and 500 xml specialists
Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Litigation Support Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Our Information Security Framework codeMantra Assess Transfer of only required project specs and data  Secure Data Transfer Transfer via SSL FTP or HTTPS  Technology Firewalls 128-bit SSL Encryption Antivirus Secure Configurations Data Processing Deploy controls to secure systems and processes Security Measures Clear Desk Activity log Vulnerability and Event Mgmt Training & Awareness Quality Control Systems to ensure quality of service and deliverables Production Facility Customer data received and stored on secure network server Security Protocol Network & Privacy Policy Confidentiality Agreement Physical Security Segregation of duties & access Dispatch Deliver processed data via  SSL FTP or HTTPS Audit Trial Activity review and  check for any  breaches in security  Respond Inform and initiate steps to improve or resolve security issues Monitor Procedure to monitor  security systems are adequate March 10, 2009 CONFIDENTIAL © All Rights Reserved
Our Security Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Office Security Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Business Redundancy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Litigation Support Services Process Source Electronic Files Assessment Project Training / Instructions Update Client Instructions & Feedback Database with Version Control Unitization  using proprietary software EzLit  Coding  using proprietary software EzLit Online Backup with Version Control Processing  using tools   PERL, VB, C Scripts, Concordance, Doculex and Spreadsheets Final Audit Tools:  PERL, VB, C Scripts, Concordance, Doculex, Spreadsheets Dispatch Formats:   CSV, Summation, Concordance, Ringtail and others Medium:   Secure FTP, Web-based System and Others Source Data Archive Hardcopy – 6 months Electronic Data – 3 months Internet based status tracking system Quality Check II Quality Check I Quality Check III Processing  using tools   PERL, VB, C Scripts, Concordance, Doculex and Spreadsheets Processing  using tools   PERL, VB, C Scripts, Concordance, Doculex and Spreadsheets Source material audit is done and errors/queries are reported to client through E-Mail/Phone and are documented Professional translation for Japanese, Spanish, German and French External databases are queried to validate common names, City, State and ZIP codes; OCR is done to find keywords March 10, 2009 CONFIDENTIAL © All Rights Reserved
Unitization – Screen shot of our proprietary software “EzLit” March 10, 2009 CONFIDENTIAL © All Rights Reserved
Coding - Screen shot of our proprietary software “EzLit” March 10, 2009 CONFIDENTIAL © All Rights Reserved
Quality Check I – Cross-Check Error Log Coded Data March 10, 2009 CONFIDENTIAL © All Rights Reserved
Quality Check II – Spell check for data integrity  March 10, 2009 CONFIDENTIAL © All Rights Reserved
Quality Check III - Final Audit  March 10, 2009 CONFIDENTIAL © All Rights Reserved
March 10, 2009 CONFIDENTIAL © All Rights Reserved Source Electronic Files . pst,  . eml,  . msg Instructions & Updates ESI PROJECT WORK FLOW Dispatch Database, Load file & Images Converting to Image Files Assessment Extracting Metadata Bates Numbering Extraction of Attachments Parent Child Relationship Creating Load file
Standard ESI Fields List ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Data and Document Management ,[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Data Identification & Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Data Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Deduplication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Data Delivery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Collection Point™ ,[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
Online Review ,[object Object],[object Object],[object Object],[object Object],March 10, 2009 CONFIDENTIAL © All Rights Reserved
For Additional information contact: Robert Grande Senior Business Development Manager [email_address] March 10, 2009 CONFIDENTIAL © All Rights Reserved

More Related Content

What's hot

Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstonecarl1968
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone ProjectKyle Montoya
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infobloxislamet
 
Network Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping QuarterNetwork Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping Quarterrichlan421
 
ITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone ProjectITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone Projectvegasgirl1
 
Company Profile PT. Berca Hardayaperkasa
Company Profile PT. Berca HardayaperkasaCompany Profile PT. Berca Hardayaperkasa
Company Profile PT. Berca HardayaperkasaAulia Rahman
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010Darrin Campbell
 
Lanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-studyLanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-studyZAG Technical Services
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentawlegalservices
 
Daniel Senior Resume
Daniel Senior ResumeDaniel Senior Resume
Daniel Senior ResumeDaniel Senior
 
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios
 

What's hot (13)

Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
IT Portfolio
IT PortfolioIT Portfolio
IT Portfolio
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
 
Network Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping QuarterNetwork Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping Quarter
 
ITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone ProjectITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone Project
 
Company Profile PT. Berca Hardayaperkasa
Company Profile PT. Berca HardayaperkasaCompany Profile PT. Berca Hardayaperkasa
Company Profile PT. Berca Hardayaperkasa
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
Lanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-studyLanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-study
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 
Daniel Senior Resume
Daniel Senior ResumeDaniel Senior Resume
Daniel Senior Resume
 
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
 

Viewers also liked

Competitive Intelligence Services
Competitive Intelligence ServicesCompetitive Intelligence Services
Competitive Intelligence ServicesMuruga J
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsMuruga J
 
Curso vendas passo a passo 2016 - aula-01
Curso   vendas passo a passo 2016 - aula-01Curso   vendas passo a passo 2016 - aula-01
Curso vendas passo a passo 2016 - aula-01Sigmar Sabin
 
Unleashing the Power of the Unbound Book
Unleashing the Power of the Unbound BookUnleashing the Power of the Unbound Book
Unleashing the Power of the Unbound BookMuruga J
 

Viewers also liked (7)

Competitive Intelligence Services
Competitive Intelligence ServicesCompetitive Intelligence Services
Competitive Intelligence Services
 
силаева татьяна эмбиент медиа
силаева татьяна   эмбиент медиасилаева татьяна   эмбиент медиа
силаева татьяна эмбиент медиа
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical Considerations
 
11seconds
11seconds11seconds
11seconds
 
11seconds
11seconds11seconds
11seconds
 
Curso vendas passo a passo 2016 - aula-01
Curso   vendas passo a passo 2016 - aula-01Curso   vendas passo a passo 2016 - aula-01
Curso vendas passo a passo 2016 - aula-01
 
Unleashing the Power of the Unbound Book
Unleashing the Power of the Unbound BookUnleashing the Power of the Unbound Book
Unleashing the Power of the Unbound Book
 

Similar to SBDS

Advantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class EmailAdvantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class EmailRefresh Central Arkansas
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overviewexpetec
 
Advantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton RohrscheibAdvantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton RohrscheibCotton Rohrscheib
 
Proactive Computer Support Company
Proactive Computer Support CompanyProactive Computer Support Company
Proactive Computer Support Companyexpetec
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEsecuritysytem
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010James Cheng
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technologyNicola (Grice) Tatters
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014 "The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014 RMS
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 
M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVMahmoud Yassin
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slidesharepapdev
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: SecurityVoIPstudio
 

Similar to SBDS (20)

Advantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class EmailAdvantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class Email
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
 
Advantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton RohrscheibAdvantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton Rohrscheib
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
Proactive Computer Support Company
Proactive Computer Support CompanyProactive Computer Support Company
Proactive Computer Support Company
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014 "The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_Admin
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CV
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

SBDS

  • 1. Strategic Business Data Solutions March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 2. codeMantra Brief Intro March 10, 2009 CONFIDENTIAL © All Rights Reserved Established in the United States in 2002 codeMantra is an American company with the offshore advantage. The offshore operation (Chennai, India) established in 1990’s, has now expanded to three facilities employs 750 people - including 200 dedicated LPO specialists and 500 xml specialists
  • 3.
  • 4.
  • 5.
  • 6. Our Information Security Framework codeMantra Assess Transfer of only required project specs and data Secure Data Transfer Transfer via SSL FTP or HTTPS Technology Firewalls 128-bit SSL Encryption Antivirus Secure Configurations Data Processing Deploy controls to secure systems and processes Security Measures Clear Desk Activity log Vulnerability and Event Mgmt Training & Awareness Quality Control Systems to ensure quality of service and deliverables Production Facility Customer data received and stored on secure network server Security Protocol Network & Privacy Policy Confidentiality Agreement Physical Security Segregation of duties & access Dispatch Deliver processed data via SSL FTP or HTTPS Audit Trial Activity review and check for any breaches in security Respond Inform and initiate steps to improve or resolve security issues Monitor Procedure to monitor security systems are adequate March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 7.
  • 8.
  • 9.
  • 10. Litigation Support Services Process Source Electronic Files Assessment Project Training / Instructions Update Client Instructions & Feedback Database with Version Control Unitization using proprietary software EzLit Coding using proprietary software EzLit Online Backup with Version Control Processing using tools PERL, VB, C Scripts, Concordance, Doculex and Spreadsheets Final Audit Tools: PERL, VB, C Scripts, Concordance, Doculex, Spreadsheets Dispatch Formats: CSV, Summation, Concordance, Ringtail and others Medium: Secure FTP, Web-based System and Others Source Data Archive Hardcopy – 6 months Electronic Data – 3 months Internet based status tracking system Quality Check II Quality Check I Quality Check III Processing using tools PERL, VB, C Scripts, Concordance, Doculex and Spreadsheets Processing using tools PERL, VB, C Scripts, Concordance, Doculex and Spreadsheets Source material audit is done and errors/queries are reported to client through E-Mail/Phone and are documented Professional translation for Japanese, Spanish, German and French External databases are queried to validate common names, City, State and ZIP codes; OCR is done to find keywords March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 11. Unitization – Screen shot of our proprietary software “EzLit” March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 12. Coding - Screen shot of our proprietary software “EzLit” March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 13. Quality Check I – Cross-Check Error Log Coded Data March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 14. Quality Check II – Spell check for data integrity March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 15. Quality Check III - Final Audit March 10, 2009 CONFIDENTIAL © All Rights Reserved
  • 16. March 10, 2009 CONFIDENTIAL © All Rights Reserved Source Electronic Files . pst, . eml, . msg Instructions & Updates ESI PROJECT WORK FLOW Dispatch Database, Load file & Images Converting to Image Files Assessment Extracting Metadata Bates Numbering Extraction of Attachments Parent Child Relationship Creating Load file
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. For Additional information contact: Robert Grande Senior Business Development Manager [email_address] March 10, 2009 CONFIDENTIAL © All Rights Reserved