Capture Components Unveils 'Scan to the Cloud' for Google Docs

Capture Components Unveils ‘Scan to the Cloud’ for Google Docs

Capture Components has introduced a new scan to the Cloud product for Google Docs- ccScan for Google Docs- a full-featured capture application, which allows users to scan, import, identify, store and share documents directly to Google Docs.

The company has also announced a scan to the Cloud product- ccScan for Box.net. Capture Components claims that both new releases are approved listings on the Google Apps Marketplace and Box Apps.  These two products have been designed specifically to fit user needs for capturing documents to the Cloud.

Users can easily scan, import, identify, store and share documents directly to Google Docs by leveraging ccScan for Google Docs.  This full-featured capture application successfully eliminates wasted time typically spent on activities such as scanning to a folder, naming documents, creating folders in Google Docs and then manually uploading the documents to Google Docs folders.  All these steps can effectively be done in one single step by ccScan, which also automatically creates and names files and folders with barcode and macros and establishes hierarchical folder storage schemes.

Capture Components’ second release also offers several benefits to the users. Thanks to ccScan for Box, scanned documents can be automatically named, uploaded to automatically created and named folders at Box in a single step.  Users can also pre-configure or enter at scanning time Box document properties such as title, description, tags, sharing mode, naming conflict resolution, user notification and email.

Capture Components brings document capture to the Cloud, allowing users to quickly and easily scan documents directly to their Cloud provider,” said Clark Fegraus, company co-founder and CTO.

Capture Components adds that its ccScan also features powerful ad hoc importing and bulk importing capabilities where tens, hundreds or even thousands of documents can be uploaded in one step with wildcard specifications.

By Anuradha Shukla

Sorry, comments are closed for this post.

Recent

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Popular Archives

Wearable Tech – Will It Ever Be Fashionable?

Wearable Tech – Will It Ever Be Fashionable?

Wearable Tech – Will It Ever Be Fashionable? Wearable tech is taking over the world, and in that sense, it’s already fashionable. As we noted last week, the sector is expected to grow from $14 billion in 2014 to $70+ billion in 2024. But what about ‘high-fashion’? The catwalks and runways of London, Paris, and Milan? Can…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising