{"id":951,"date":"2013-06-13T12:58:50","date_gmt":"2013-06-13T19:58:50","guid":{"rendered":"https:\/\/www.kevinneal.com\/blog\/?p=951"},"modified":"2024-09-28T14:50:34","modified_gmt":"2024-09-28T22:50:34","slug":"the_opportunity_of_network_scanning","status":"publish","type":"post","link":"https:\/\/www.kevinneal.com\/blog\/the_opportunity_of_network_scanning\/","title":{"rendered":"The opportunity of Network Scanning"},"content":{"rendered":"<div>\n<p style=\"text-align: center;\"><span style=\"color: #0000ff;\"><strong><span style=\"text-decoration: underline;\">Network Scanning<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: center;\">By Kevin Neal<\/p>\n<p><a href=\"https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-965\" style=\"margin: 10px;\" alt=\"fi-6000ns_scan-searchable\" src=\"https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable-300x300.jpg\" width=\"240\" height=\"240\" srcset=\"https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable-300x300.jpg 300w, https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable-150x150.jpg 150w, https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg 320w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a>\u201c<em>We live in a connected world<\/em>\u201d. \u00a0It\u2019s a simple phrase, but it means so much.<\/p>\n<p>At the present time, most of us take for granted things like cell phones, blackberries, PDA\u2019s, \u00a0Bluetooth, pagers, etcetera. \u00a0All these communication devices are examples of being \u201c<em>connected<\/em>\u201d all the time; \u00a0however this wasn&#8217;t always the case. \u00a0Not all too long ago we lived within a very disconnected world in comparison to the technology currently available in 2007. \u00a0With the dramatic adoption of the Internet over the past decade, more people \u00a0than ever are connected via their home computers with a Digital Subscriber Line (DSL), Cable modem or even broadband \u00a0wireless. \u00a0According to Gartner, the number of households with broadband connections will double between 2005 and 2010. \u00a0The rate of business connectivity is a great deal of the same, just on a grander scale with greater bandwidth and a higher level of service guarantees.<\/p>\n<p>With this rapid growth of computers and servers connected with high speed networking, the likely next step was to connect peripherals.\u00a0 \u00a0One of the most prevalent examples of a connected peripheral in an office environment would be a laser printer. \u00a0There are many advantages to having a networked printer, including sharing among groups of users, because the volume of printing for each user did not dictate a dedicated printer. \u00a0Network printers are fairly common these days; however a new, emerging trend is to use network connectivity to INPUT information into computer systems via a scanner instead of OUTPUT via a printer.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #0000ff;\">Networking Scanning enters the connected world<\/span><\/strong><\/p>\n<p>Network Scanning is the concept of taking a scanner engineered specifically with mission critical scanning considerations. \u00a0This includes paper handling, image quality or advanced multi-feed technology, subsequently connecting them directly to a network without the need for a computer system to be physically connected to the scanner.<\/p>\n<p>These advanced scanning solutions, on the other hand, should not be confused with digital copiers or multifunction devices, which most of us are familiar with. While these sorts of devices are handy for extremely low-volume \u00a0scanning requirements, the majority of these devices lack either the physical attributes or true integration desired to effectively utilize them in the connected business world. \u00a0As an example, when performing \u00a0automated forms processing with advanced data extraction techniques such as Optical Character Recognition, or OCR, good image quality and excellent paper handling provided by dedicated network scanners, could dramatically increase the automation process, thus, decrease human intervention.\u00a0 \u00a0This undoubtedly increases efficiency, reduces costs and improves customer service.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #0000ff;\">Concepts and Terminology of Networking Scanning<\/span><\/strong><\/p>\n<div>\n<p><strong><span style=\"color: #ff0000;\">Basic \u00a0connectivit<\/span><span style=\"color: #ff0000;\">y<\/span><\/strong> is the most rudimentary to direct network attach solutions used for a scanner.\u00a0 \u00a0This translates into a scanner, which can be used as a network device and the scanner appears as a local device on the network. Or, as I like to refer to it \u201cextends network connectivity\u201d. \u00a0This is the least expensive, yet most restrictive option. \u00a0It is ideal for ease of use and is cost effective however it is deficient on flexibility for true integration.<\/p>\n<p><strong><span style=\"color: #ff0000;\">Biometric connectivity<\/span><\/strong> is the ability to attach a scanner directly to the network exactly as in the Basic connectivity scenario; \u00a0however, it incorporates much more intelligence into the scanning process. \u00a0For example, with a biometric scanning solution, users could merely walk \u00a0up to a supported scanner, position their documents in the scanner, place thumbprint on, or hover their palm over, a biometric device then initiate scanning of the documents based on pre-configured profiles, destinations and\/or applications.<\/p>\n<p><strong><span style=\"color: #ff0000;\">\u2018Push-Scanning\u2019<\/span><\/strong> refers to a scenario where the scanner operator walks up to a scanner, drops the documents into the automatic document feeder, or places them on the flatbed, then initiates the scanning process to send the images to the desired location on the computer network.\u00a0 \u00a0This could perhaps be a \u201cwatch folder\u201d for high-volume OCR processing for example, or it could be a shared network drive of the scan operator\u2019s personal computer.<\/p>\n<p><strong><span style=\"color: #ff0000;\">\u2018Pull-Scanning\u2019<\/span><\/strong>\u00a0is a term \u00a0characteristically used when a scanner \u00a0operator controls the scanner to connect to a device, scan images and transmit, or pull these images from the scanner to a certain location.\u00a0 \u00a0The ability to pull these images can be achieved in many different ways and one of the most common ways is to scan via a web browser.\u00a0 \u00a0In other words, the user would enter the name of the device and would have the ability to scan images as well as send them to the destination of their choice.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>ECM Scanning.\u00a0<\/strong><\/span> \u00a0Enterprise Content Management, or ECM, scanning takes one or more of the above Network Scanning concepts; however, it adds an additional powerful layer of functionality.\u00a0 \u00a0ECM scanning incorporates a network scanner directly into content management systems via software drivers and scanning software.\u00a0 \u00a0The document imaging industry has seen a dramatic focus on the importance of document capture, for example.\u00a0 \u00a0These are extremely focused software packages so as to assist in the ability to extract important business data from scanned documents.<\/p>\n<p><strong><span style=\"color: #ff0000;\">ECM + Secure \u00a0Scanning<\/span><\/strong> \u00a0is the next logical step in the networked scanning connected world. \u00a0Now that the benefits of document imaging have been proven via return on investment, increased productivity or compliance reasons, more than ever mission critical business data or highly confidential information resides in a digital format and not on paper. \u00a0It\u2019s crucial to secure this sensitive information during the entire lifecycle of the data. \u00a0From the instant the data is scanned, when it\u2019s hosted on the network, until the time of its destruction, or the end of the retention period.<\/p>\n<\/div>\n<div>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #0000ff;\">What could be the future of Network Scanning<\/span><\/strong><\/p>\n<p>Now that connecting persons and computer systems for personal and business uses is nearly common-place, emerging technologies are being introduced that will continue to stimulate connected systems. \u00a0One of these emerging methods being utilized by Information Technology (IT) departments is called \u201cService Orientated Architecture\u201d, or (SOA).\u00a0 SOA is a way to create new business applications by re-using or better utilizing current technical assets within the organization. \u00a0Connected systems played a major role in developing the SOA model with industry standards such as HTML, XML and Web Services. \u00a0In a nutshell, SOA is a way to add functionality and features to a computer networks without the disadvantage of closed or proprietary systems.<\/p>\n<p>SOA plays an important role for Network Scanning in particular.\u00a0 \u00a0While the conceptual design of SOA may be applied in traditional scanning configurations with a dedicated computer controlling the scanners operation, there are a few important considerations making a Network Scanner quite appealing to network administrators, Chief Intelligence Officers and end users. \u00a0These \u00a0important considerations include system security, updates\/patches and ease of use, just to name a few.<\/p>\n<p style=\"padding-left: 30px;\">\u2022 \u00a0From a Network Administrators point of view, the SOA Network Scanner allows them to deploy network scanners in a controlled \u00a0method \u00a0making future firmware\/software updates much easier.<\/p>\n<p style=\"padding-left: 30px;\">\u00a0\u2022 \u00a0System Administrators could ship one integrated device, or a scanner plus a network connectivity device, directly to any location where they \u00a0would like to deploy scanning. \u00a0Once the physical hardware is received the user would simply plug the network cable into the hardware and one could, in theory, be scanning in minutes.\u00a0 \u00a0This eliminates the costly and time-consuming tasks such as updates operating systems with patches or installing new software when versions change.\u00a0 \u00a0In addition, the Network Administrator would be able to diagnose any technical issues or view usage reports easily from one intuitive interface.<\/p>\n<p>CIO\u2019s, or Chief Information Officers, must earnestly consider a Network Scanning SOA approach from the understanding of compliance, security and regulation. \u00a0A scanner attached directly to a network via SOA architecture \u00a0gives the organization the ability to provide activity reports based on the individual device for example, which could help play a major role in assisting with adherence to these corporate policies and governance.<\/p>\n<\/div>\n<p>Finally, ease of use for the scanner operator plays a chief role in that it is driving the adoption of network scanning within the SOA infrastructure. \u00a0In fact, should a corporation wish to use the Pull Scanning technique, they have the capability to assemble a system that could in effect eliminate the need for any sort of user intervention whatsoever. \u00a0Imagine the power of this total SOA\/Network Scanning approach.\u00a0 \u00a0Let\u2019s use a Customer Service example to illustrate a few of the benefits.<\/p>\n<p>In our example, the Customer Service scanning deployment will demonstrate too many remote site locations. \u00a0Our IT department benefits from the fact that they would avoid building a computer system to act as the connectivity\/scanning device; we simply ship the hardware to the remote site and they plug it into the network. \u00a0Subsequently, for Pull Scanning, all the user would be required to do is physically place the items to be scanned on the scanner itself, and someone in a completely different part of the connected world would initiate scanning; receiving all of the resulting images.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #0000ff;\"><b>The opportunity of Network Scanning<\/b><\/span><\/p>\n<p>While Network Scanning is quickly becoming the buzz among the industry, there still are certain technical deficiencies that will need to be addressed with some of these devices in order to be considered part of a true IT integration.<\/p>\n<p>As the connected world continues to improve infrastructure and new, innovative ways \u00a0to communicate emerge, the industry trend towards more Network Scanning should continue. \u00a0For example, organizations most likely will move forward on plans for additional remote location \u201cTelecommuting\u201d of individual workers and satellite office locations. \u00a0Couple factors that include ease of use, simplified IT management of hardware and software resources as well as additional adherence to compliance and regulation standards and the future of Network Scanning seems bright.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Scanning By Kevin Neal \u201cWe live in a connected world\u201d. \u00a0It\u2019s a simple phrase, but it means so much. At the present time, most of us take for granted things like cell phones, blackberries, PDA\u2019s, \u00a0Bluetooth, pagers, etcetera. \u00a0All these communication devices are examples of being \u201cconnected\u201d all the time; \u00a0however this wasn&#8217;t always [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":965,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[15,109,53,3],"tags":[298,294,63,296,297,295,100,11,95,33],"class_list":["post-951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-capture","category-imaging","category-scanners","category-technology","tag-architecture","tag-attach","tag-network","tag-opportunity","tag-orientated","tag-rj45","tag-scanner","tag-scanning","tag-service","tag-soa"],"uagb_featured_image_src":{"full":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false],"thumbnail":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable-150x150.jpg",150,150,true],"medium":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable-300x300.jpg",300,300,true],"medium_large":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false],"large":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false],"1536x1536":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false],"2048x2048":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false],"post-thumbnail":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",210,210,false],"coral-dark-medium-large-2x":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false],"coral-dark-large-2x":["https:\/\/www.kevinneal.com\/blog\/wp-content\/uploads\/2013\/06\/fi-6000ns_scan-searchable.jpg",320,320,false]},"uagb_author_info":{"display_name":"Kevin","author_link":"https:\/\/www.kevinneal.com\/blog\/author\/kneal\/"},"uagb_comment_info":0,"uagb_excerpt":"Network Scanning By Kevin Neal \u201cWe live in a connected world\u201d. \u00a0It\u2019s a simple phrase, but it means so much. At the present time, most of us take for granted things like cell phones, blackberries, PDA\u2019s, \u00a0Bluetooth, pagers, etcetera. \u00a0All these communication devices are examples of being \u201cconnected\u201d all the time; \u00a0however this wasn&#8217;t always&hellip;","_links":{"self":[{"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/posts\/951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/comments?post=951"}],"version-history":[{"count":15,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/posts\/951\/revisions"}],"predecessor-version":[{"id":13572,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/posts\/951\/revisions\/13572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/media\/965"}],"wp:attachment":[{"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/media?parent=951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/categories?post=951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kevinneal.com\/blog\/wp-json\/wp\/v2\/tags?post=951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}