• it-consultant
    IT Consultant
  • custom software development
    Custom Software Development
  • data scanning
    Data Scanning

Information Roy & Roy Inc, the pioneers in Software Solutions, Internet Technologies, E-Commerce and E-Business Consultancy is here to help you do your business, the smartest way.


While we develop the same high quality solutions you find at larger consulting companies, we have the best competitive prices.


Find theeeee exact solution for your business needs from our experienced and committed team of professionals.





Information

Information Roy & Roy Inc. is a software development, contracting and consulting services firm. We provide pragmatically innovative solutions for clients, based on their needs and environment. We build competitive advantages for our clients over their competitors. Our experience and expertise lies in advanced networking, communication, information infrastructures and application development.

Roy & Roy Inc. is a wholly owned, US subsidiary of Rich International Pvt. Ltd. (RIPL), Trivandrum , Kerala , India . The company is a pioneer in providing software solutions and was founded in 1996 with its office at Software Technology Parks of India, Trivandrum , Kerala; it is licensed by the Ministry of Information Technology, Government of India. RIPL has a vast clientele base at home and abroad, and deals with the development and export of software in addition to providing effective software and Internet solutions.

Our business is to provide your business with the competitive edge by implementing State of Art Technology that leverages with your existing business strategies. We make sure that your resource of intellectual skill pool is mobilized towards planning new business strategies and conquering new frontiers. We are there to ensure your IT infrastructure is up and running, round the clock, all through the year.

System Architecture

security The word "architecture" is derived from the Greek word "architecton", which means master mason or master builder.

We design the highest-level concept of a system in its environment. The fundamental and unifying system structure defined in terms of system elements, interfaces, processes, constraints, and behaviors.

We provide design methodologies to identify hardware platforms, automated processes, manual procedures, databases, organizational structures and similar dimensions of a selected solution. At Roy & Roy Inc, business experts and technology specialists understand each other's needs to develop a state-of-the-art system architecture.

We support re-engineering of organizations and their mission-critical systems. This support includes requirements analysis, operational architecture design, modeling and simulation of the operational architecture, and the systems to evaluate performance at various levels of detail. We design business processes, business rules, business data, and organizational structure.


We perform:

  • Top down analysis of business functions
  • Business-focused IT project prioritization
  • Risk assessment and contingency planning

Your Benefits:

  • Recognize the actual scope of a potential change
  • Instill ownership of business problems and solutions
  • Flush out overlap between competing projects
  • Achieve consensus across multiple functional areas
  • Prioritize competing projects
  • Increase understanding of project scope
  • Define project deliverables consistentl

Internet Technologies

security We are specialized in developing Web Presence, Corporate Web Sites, Vertical Portals and B2B/B2C Portal Solutions and Intranet. Static pages have been replaced by dynamic community and content management applications in recent years. Adding artificial intelligence and interactivity to a business website became the main focus. We have been providing real world solutions for specific needs for years.

While we develop the same high quality solutions you find at larger consulting companies, we have the best competitive prices. We provide consultation for defining appropriate web services for your business scenarios and implement the same through a choice of Microsoft .Net and Java J2EE technologies.

Roy & Roy Inc is one of the top notch companies in providing Web Design services. We showcase a very talented and inspired team of graphic designers.

  • Technologies: C#, ASP.Net, PHP, JAVA, JavaScript, JSP, Servlets
  • Operating Systems: 2000, 2003, NT, XP, Linux, Unix and its derivatives
  • Architectures: .Net Framework, J2EE, Struts Framework.
  • Methodologies: OOAD with UML, MVC Design Pattern, Automated Testing.

Website Redesign

It is obvious that websites need continuous improvement. Just browse around for a few minutes and you will discover sites that look old and obsolete. The reasons to redesign your site may not always be evident. For example, the core idea of the site itself may need to be revamped. We help you redesign your website according to your audience's needs and changing perceptions. It is no longer good enough to have a static website. It must capture attention, have new information, and engage the visitor or else they are off to your competitor's site.


Online payments
To accept online credit card payments you would need to sign up for a merchant account and payment gateway like, VeriSign.com, linkpoint.com or authorize.net. We offer configuring the payment gateway for your online payment solution.

Encryption and SSL
Using a Digital Certificate (Digital ID) in conjunction with SSL encryption provides complete security for all parties involved in a transaction. Secure Socket Layer (SSL) is again a service that is universally accepted on the World Wide Web for authenticated and encrypted communication between clients and servers. The most commonly used agencies are Verisign and Thawte.

We offer implementation of SSL in your website along with the web hosting.


E-commerce Development

Powerful and automated E-commerce systems at affordable prices...

We focus on complete E-commerce solutions that fit your business challenges. Our E-commerce initiatives improve sales performances, customer satisfaction, and marketing undertaken.

Whatever your business maybe, Interactive Web Solutions can help you market and sell your products and services more cost effectively. With designs that stand out from the crowd, we offer small businesses and corporate enterprises innovative and unique ways to sell online.

We have a proven background in the designing and development of E-commerce solutions and will ensure that your company gains a competitive edge within your marketplace. We have an extensive knowledge base of building online stores using: .NET ASP, XML, CGI, PHP and Perl etc.


Web Site Security Assessment / Penetration Testing

  • Attempt standard / common vulnerability exploits
  • Backdoor checking
  • Denial-of-Service Exploitation
  • Server / HTTP Known-Fault Checking
  • Threat-Assessment Consultation
  • Mitigation Consultation
  • Comprehensive reports

XBRL business reporting and financial data analysis

XBRL (eXtensible Business Reporting Language) is the new standard to prepare and analyze financial information. XBRL is set to become the standard way of recording, storing and transmitting business financial information.  It is capable of use throughout the world for a wide variety of business purposes.  It will deliver major cost savings and gains in efficiency, improving processes in companies, governments and other organisations.  A company finance division, for example, could quickly and reliably generate internal management reports, financial statements for publication, tax, SEC and other regulatory filings, as well as credit reports for lenders.  Not only can data handling be automated, removing time-consuming, error-prone processes, but the data can be checked by software for accuracy. 


XBRL can be applied to a very wide range of business and financial data.  Among other things, it can handle:

  • Company internal and external financial reporting.
  • Business reporting to all types of regulators,including tax and financial authorities, central banks and goverments.
  • Filing of loan reports and applications; credit risk assessments.
  • Exchange of information between government departments or between other institutions, such as central banks.
  • Authorative accounting literature - providing astandard way of describing accounting documents provided by authoritative bodies.
  • A wide range of other financial and statistical data which needs to be stored exchanged and analysed.

Some of the benefits of using XBRL include:

  • Cuts down on data manipulation
  • Facilitates paper-less financial reporting
  • Conforms to industry-accepted methods
  • Can cut time required to perform various accounting tasks
  • Major software vendors will incorporate XBRL
  • Permits interchangeability of data
  • Analysis of multiple company financial information improves

Data manipulation happens when companies need to re-position the output from their financial systems to meet the needs of diverse users. A quarterly IRS tax form is very different in format and content from a quarterly SEC filing, although the information needed to file both documents comes typically from the same financial database. With XBRL, information will be entered once and the same information can be "rendered" as a printed financial statement, an HTML document for a Web site, an EDGAR filing file, a raw XML file, or a specialized reporting format such as periodic banking and other regulatory reports. The financial information chain is enhanced with accelerated delivery of relevant data, and lower preparation costs.

Paper-less reporting is facilitated by employing XBRL. Prior to XBRL, financial information for reports was extracted from databases such as a general ledger. The extracted information would then need to be processed several times depending upon the needs of the user. For example, a typical balance sheet would need to be individually processed for SEC filings, for placement in the annual report, for examination by external auditors and for analysis by management. Each process could require an extra handling of the information to create the desired report. With XBRL, the information is coded once and ready for extraction electronically into reports for all information users. With the proper tools in place, the desired output for all uses of the balance sheet information can be transmitted electronically, without the need for a paper-based report.

XBRL conforms to industry-accepted methods. First, XBRL is a language based on a W3C recommendation, XML. The W3C, or World Wide Web Consortium, is the world’s most authoritative body for establishing Internet protocols. XML’s growing acceptance for use as a vehicle for data exchange is well documented. Second, the XBRL development team created a specification that conforms to US generally accepted accounting principles (US GAAP) when developing XBRL for Financial Statements. The design is a GAAP/industry sector tagging scheme that allows room for additional XBRL taxonomies to be created.

Time savings from XBRL will come from several areas. First, multiple report preparations will take less time. XBRL-coded information can easily be fed into various instance documents to create customized output. Second, internal analysis of financial data will be quicker. This is because the data will already be in a format ready for analysis and will not have to be re-keyed. Third, financial analysts will able to extract, analyze and process this information with software tools designed specifically for this purpose.

Interchangeability of data is facilitated by the use of XML-compatible coding. XBRL is fully-compliant with the W3C’s XML 1.0 recommendation. When an XBRL-coded file is created, the document does not make any assumptions about how the data will be used by the requestor (or client). In other words, the XBRL-coded information could be displayed in a Web browser, sent to a database, sent to a printer, used to create another XML document or even listened to as a sound document. The same document can be used by many different applications using the intelligence of the data to build powerful applications.


What are the benefits to a company from putting its financial statements into XBRL?

XBRL increases the usability of financial statement information.  The need to re-key financial data for analytical and other purposes can be eliminated.  By presenting its statements in XBRL, a company can benefit investors and raise its profile.  It will also meet the requirements of regulators, lenders and others consumers of financial information, who are increasingly demanding reporting in XBRL.  This will improve business relations and lead to a range of benefits.  

With full adoption of XBRL, companies can automate data collection. For example, data from different company divisions with different accounting systems can be assembled quickly, cheaply and efficiently.  Once data is gathered in XBRL, different types of reports using varying subsets of the data can be produced with minimum effort.  A company finance division, for example, could quickly and reliably generate internal management reports, financial statements for publication, tax and other regulatory filings, as well as credit reports for lenders.  Not only can data handling be automated, removing time-consuming, error-prone processes, but the data can be checked by software for accuracy.


Who developed XBRL?

XBRL is being developed by an international non-profit consortium of major companies, organisations and government agencies.  These include the world’s leading accounting, technology, government and financial services bodies.  For more information visit at www.xbrl.org


Contact us for a free consultation on how we can interpret your vision into reality.

Custom Software Development

Custom Software DevelopmentWe offer tailor made software application to your business needs within fixed timeframes and budget. We also offer analyzing your existing business application and propose a cost-effective re-design / enhancement that will enable you to reach your business targets with a cutting-edge technical solution. We work closely with our customers, communicating thoroughly with defined "deliverables" at every phase of the development process, specification, design, construction, testing, and implementation.

We are committed to increase your company's operational efficiency by helping you develop a tailor made solution for your business to cope with your client, supplier and distributor relationships. Keep a finger on various internal processes of your business by organizing them all into a single main server or database.


  • Business strategy: You may require a specific solution to cope with your client, supplier and distributor relationships.
  • Internal organization : You may wish to streamline your various internal processes into one main software/database application.
  • Software lifecycle : You may wish to develop software solutions that have a longer lifecycle than off-the-shelf packages with greater flexibility.
  • System integration : You may require compatibility between existing and new applications with a web interface.

We develop software solutions that are flexible and have a longer lifecycle. Ensuring compatibility between existing and new applications with a web interface. Let our team of professionals know your special needs. Our engineers have strong experience in handling all major programming languages and technologies to bring you a solution that is tailor-made for your enterprise.

We are committed to supplying you with state-of-the-art C++, Java, .Net development services as well as Unix/Linux, Web interface and Database solutions.


We are experienced in developing and supporting custom software solutions for the following vertical industries:

  • Travel and Tourism
  • Real estate
  • Insurance
  • Financial
  • Warehousing and logistics
  • Pharmaceutics
  • Network communications

Our competence and experience ensure that we deliver excellent services and products to our customers. At every stage of the development process, from conceptual design to product release, the highest quality standards are maintained. Our extensive communication facilities allow us to keep in touch with our customers 24 hours a day.

IT Consultants

it consultants Roy & Roy Inc helps you build and maintain Information Technology (IT) infrastructures for your business. We are also determined to protect your company from security breaches by ensuring compliance with industry standards and by offering our consulting services. Investing wisely on technology that is fast and effective with long lasting usability increases your efficiency and will ultimately save you time and money.

Roy & Roy Inc, provides end-to-end information systems consulting and management consulting, from up front business strategic planning and analysis through systems design, implementation and support of advanced networks and software applications.

If you're looking for software application solutions tailored to fit your needs, you want us to be your application solutions provider. From design and development to support, we know there's only one way to help you overcome your software application challenges - providing solutions that work for your business, not against it.

Efficient and effective businesses are connected - on a personal level, a network level and a computer level. Whether you are implementing large-scale applications (ERP, CRM, Custom, Package), moving to a new location, or going through any substantial changes within your business, you need a reliable infrastructure. Depend on Roy & Roy Inc for all your network and infrastructure solutions, from assessment and design to support services and desktop management. We're here for you!.


Following are the core area of consultation we offer:

  • Customization and implementation of Enterprise Resource Planning (ERP) connected with Customer Relationship Management (CRM) and E-commerce applications. No matter the size, we provide customization and implementation of Enterprise Resource Planning (ERP) connected with Customer Relationship Management (CRM) and E-commerce applications. We provide offshore development and onsite implementation.
  • We offer customized solutions to our  clients through consulting and software services enabled by a B2B components repository resulting in substantial increase in business effectiveness.
  • Our services portfolio includes end-to-end infrastructure management encompassing network devices, security, databases, systems, and Internet site operations management, allowing corporations to focus on their core business. A comprehensive solution of 24x7 Advanced Infrastructure Management Services delivered through a combination of automated tools and engineering expertise enables organizations to build and maintain a technology infrastructure that is scalable, reliable, cost-effective and easily adaptable to dynamic business requirements.
  • Provide experienced engineers for onsite developments and implementation.

Careers

security Don't just find a job, Find a Career at Roy & Roy Inc

Are you dynamic, dependable, and driven by success? Do you enjoy using your creativity to solve problems? Do you like being rewarded for your achievements? If so, consider using your technical and interpersonal skills to work for a dynamic, successful, global company. we invite you to consider joining the Roy & Roy Inc team today.

We provide a challenging, creative atmosphere, and a wealth of opportunity to do your best work in a work environment that encourages employees to work hard. Whether you are a recent graduate or someone with experience and determination, contact us today. We can help you unleash your career.

Get Started Now.

To submit your resume to Roy & Roy Inc, you can apply directly to a position of interest or email us for future consideration.

Send your resume and cover letter outlining your career objectives to our human resources department at hrd@roynroy.com

Business Process Outsourcing

Business Process OutsourcingWhen your business is running twenty-four seven to come up with innovative means to maximize its potential, outsourcing isn't just an option, it is a necessity. Today, efficient business process outsourcing has become the lever to unload your organization of resource-consuming procedures and controllable costs. Outsourcing allows your organization to get relief of time and resource consuming activities and lets you focus more on core business areas.

The BPO arm of Roy & Roy Inc came about as a pro-active endeavor to channelize our experience to enhance client performance that exceeds the cost arbitrage. Merging IT and BPO gives us the ability to 'leapfrog' the competition to deliver maximum value to our clients. With a vision to be a Top 10 global technology service provider by 2010, BPO is a central pillar for realizing this goal.

Why Outsource Work?

Because your time is limited - You have to concentrate on core business strategies and want the day to day management done without wasting your resources.

Because you don't have the money to do it yourself - Your business is growing exponentially but your resources can't cope with the growth.

Because you'd rather focus on mission-critical issues - You're not interested in frittering away time and energy on non-core functions

Because you don't have the skills to do it yourself - You need the best talent in the world, but it's just not available in your country.

In today's globalization and networked economy, outsourcing has never been so easy or made so much business sense. The relevant answere today is to "Outsource?".

Electronic commerce and enterprise systems has become a way of life. Converging technologies of telecommunication, information technology and media have redefined the way we do business. At the same time, there came a sharp increase in the need for qualified software professionals to manage these functions. Demand exceeds supply, and the dearth of human resources has resulted in increased personnel costs, longer time to market and delayed product development.

Chances are you won't find these highly skilled people in your area. Yet you need them more than ever. You realize that without them, your big dreams for a flourishing enterprise could eventually go up in smoke. But you don't have to manage all business functions in-house. Outsourcing provides a neat solution to several of your business problems.

25 Reasons why outsourcing makes business sense

When you consider the advantages of outsourcing, you'll realize there's a lot to gain by using it as an intrinsic part of your business strategy.

By outsourcing, you can:

  • Reduce overheads, free up resources.
  • Avoid capital expenditure.
  • Improve efficiency.
  • Offload non-core functions.
  • Get access to specialized skills.
  • Save on manpower and training costs.
  • Reduce operating costs.
  • Improve speed and service.
  • Establish long-term, strategic relationships with world-class service providers to gain a competitive edge.
  • Enhance tactical and strategic advantages.
  • Focus on strategic thinking, process reengineering and managing trading partner relationships.
  • Spread your risks.
  • Provide the best quality services, products and people.
  • Be reliable and innovative.
  • Provide value-added services.
  • Increase customer satisfaction.
  • Avoid the cost of chasing technology.
  • Leverage the provider's extensive investments in technology, methodologies and people.
  • Benefit from the provider's expertise in solving problems for a variety of clients with similar requirements.
  • Focus scarce resources on time-critical projects such as application reengineering.
  • Obtain needed project management and implementation consulting expertise, along with access to best practices and proven methodologies.
  • Reduce the risk of technological obsolescence and increase efficiency by consolidating and centralizing functions.
  • Keep pace and minimize the impact of rapid changes in applications and standards.
  • Extend the reach to more trading partners quickly and efficiently.
  • Reduce the overall IT management burden while retaining control of strategic decision making.

The Outsourcing Institute finds, "Outsourcing is rapidly becoming an accepted management tool for redefining and re energizing the corporation. It challenges today's executives to rethink the traditional, vertically integrated firm in favor of a more flexible organization structured around core competencies and long-term, outside relationships."


Acquire technology skills

49%

Gain industry expertise

48%

Increase application expertise

38%

Add flexibility/reliability

25%

Improve IT performance

22%

Improve competitive position

13%

Link IT and business strategy

12%

Share risk

10%

Reduce costs

10%


Note: Numbers don't add to 100% because multiple responses were allowed.
Data: Dataquest survey of 250 IS executives. Source: Information Week

Highlights:

  • Global giants such as IBM, Microsoft, Novell, Oracle, AT&T, Fujitsu, Motorola, Digital, Hewlett-Packard, Philips, General Electric, IBM, Reebok, Fujitsu, British Aerospace, General Motors and Sears are keeping ahead of their rivals thanks to the competitive advantage conferred on them by some of the best software companies in India . You too can benefit immensely from a successful outsourcing strategy.
  • Several convergent forces like an exponential increase of technology in the workplace, electronic commerce, enterprise systems and a sharp increase in Internet related new entities are resulting in an increased demand for software professionals. The need is further compounded by the lack of trained programmers in the developed countries, especially United States , Western Europe and Japan.
  • Demand exceeds supply, which has led to increased labor costs, longer product development and even longer time to market. A recent Wall Street Journal article related a greater willingness on the part of CEO s to outsource software work that is not mission critical.
  • Reduce your marketing and software delivery costs.
  • Gain access to global buyer base needing software development.
  • Manage your projects online with buyer participation.
  • Neutral marketplace with global choices.

Remote System Admin

Remote System Admin Remote System Administration service has been designed to complement your IT infrastructure by diverting time consuming monitoring and system management tasks away from your existing IT team, freeing them up for more productive duties.

The Remote System Administration service views, identifies and fixes problems on your IT systems in real time, remotely, twenty four hours a day and seven days a week without compromising network security. Our highly skilled system engineers provide real time system administration, fault diagnosis and trouble shooting.

On-going maintenance checks are carried out to identify potential problems and quickly fix them before they escalate to threaten the stability of your mission critical applications. These checks include a measurement of the availability of systems, scanning for known bugs, enhancements, software upgrades and a technical health check.


How we helps your organization:

  • The need to staff a full-time systems administrator is eliminated.
  • Server performance is monitored regularly and any anomalies are reported to you.
  • We provide a log of the maintenance of your system.

Daily Support

  • Check back-up status (reacts to backup logs).
  • Check operating system event logs for any conditions that may cause data loss or lack of service and proactively report failures to Monolith support for resolution./li>

Weekly support

  • Check free disk space and proactively report failures to Monolith support for resolution.
  • Review history of Windows Operating System event logs and clean up.
  • Review performance thresholds.

Other supports

  • Install service packs and hot fixes
  • Assist in the recovery of data in the event of machine failure
  • Set up database server log-in IDs and security levels
  • Assign permissions
  • Assists in event scheduling, such as backups
  • Manage users, groups, and profiles
  • Manage users, rights, permissions, and auditing
  • Manage shared directories, printers, and connections
  • Start, stop, and pause any service or remote service
  • Create and maintain computer accounts
  • Define/Set tunable parameters
  • Monitor system performance (os / network / hardware)

Rich International (India) Pvt Ltd.places great emphasis on client communication and our team works closely with clients to ensure that their requirements are fully understood and reflected in the solution which is delivered. Our commitment to clients extends beyond the delivery of the working solution. If we are responsible for the management of the system in operation we utilize an extensive range of monitoring tools to ensure that systems are monitored 24 hours a day, 7 days a week.

Virtual IT Staffing

Virtual IT Staffing Virtual IT staffing is an innovative concept of creating a virtual extension of your internal resources in a cost effective manner. Virtual IT Staffing provides you to save costs by more than 50% compared to traditional on-site staffing. Avail the service of an individual or a dedicated team without running through the hassles of recruitment or any employee overheads (desks, computers, office supplies, office space, insurance, taxes, and un-employment).


What we do?

We analyze your present needs and work with you to set up your own Extended Virtual Office (EVO - an offshore arm of your company. We provide a dedicated team to help you extend your virtual team to form your offshore office, that runs in a 24/7 basis. We provide the infrastructure and its management while you focus on core management competencies.


We provide you:

  • Permanent, temporary and project life-cycle Virtual IT Staffing.
  • We hire candidates who meet the demands of your specific business needs.
  • We hire IT Professionals nurtured from premier educational institutions.
  • Allow you and your team to have meetings with candidates over IM or phone before being hired.
  • We completely dedicate the hired candidates for your technical development needs.
  • We provide hired candidates necessary training to adapt to your specific needs.
  • We provide the computers, network and professional office space for each hired employee so that you can ensure their service at times you need.

Data Scanning & Conversion

Data Scanning & Conversion Over 90 percent of the information in the world is still on paper. Many of those paper documents include color graphics and/or photographs that represent significant invested value, and almost none of that rich content is on the Internet.
 
That's because scanning such documents and getting them onto a website has been problematic at best. At the high resolution necessary to ensure the readability of the text and to preserve the quality of the images, file sizes become far too bulky for acceptable download speed. Reducing resolution to achieve satisfactory download speed means forfeiting quality and legibility. Conventional web formats such as JPEG, GIF, and PNG produce prohibitively large image files at decent resolution. DjVu is a new Image Compression Technology that enables small file sizes for high quality image files.

There are two types of scanning - bitonal or grey scale. It is fairly important for any publication to use one of these methods for consistency, although it is possible to scan a book that has the occasional photograph or lithographic illustration as bitonal with interspersed grey scale scans.

Either type can be used with optical character recognition (OCR) if required. (Subject to a satisfactory original document or book).

Creation of PDF files (for Adobe Acrobat)

It is possible to convert the TIFF image files to PDF format for use with Adobe Acrobat. This includes:

- Creation of page numbered bookmarks for the whole document
- Supply of the PDF file(s) on CD

 

Specification

Details

Bitonal scanning
This is simple black and white and is ideal for most printed books, including those with illustrations that are line engravings.

An exception might be an old printed book that is very inconsistent in print density, i.e. a mixture of grey and black.

The end result graphics files are much smaller than grey scale scans, and therefore more images can be stored on a CD either as graphics files or PDF files.
Grey scale scanning
Grey scale scanning is ideal for documents or books that contain:
- hand written pages
-photographs
- lithographs

Hand written documents can sometimes be scanned as bitonal, but the ink density needs to be very good, and very consistent.

Images scanned in grey scale can result in very large file sizes, and therefore fewer images can be stored on a single CD. Typically about 500 pages, either as TIFF files or PDF files fit on a CD.
Paper Size A2 / A3 / A4
Dpi Resolution 75 / 150 / 200 / 300 / 600 / 1200
Scanning Format Tiff (CCITT G4) Black & White format
  PDF Image
  DjVu

E-book Publishing: Cost effective and environment friendly content delivery

E-book publishing is a cost effective method of digital content delivery. We have wide experience in publishing e-books in a number of formats, and targeted towards various delivery platforms.

We create PDF, REB, OEB and LIT formats destined for computers and hand held devices. We have successfully delivered large e-book creation projects to numerous international clients.

Methodology : Text is extracted from either Hard Copy / TIFF / PDF / page layout formats such as Quark, Pagemaker etc. This is initially converted to XML and then further processed to the Open E-book Standard (OEB 1.0) and from there on to different e-book formats as specified by the client.

We can deliver fully interactive, multimedia enabled e-books in any format that you desire.


Acrobat PDF Conversion

We use most of the Adobe suite of products for PDF creation, selecting tools depending upon output requirements.

This is a list of the most common PDF outputs that we deliver:

  • PDF Normal
    (Fully Text searchable with Image and Graphics)
  • PDF Image+Text
    (OCR text embedded over original Image)
    Clients who do not have big budgets for conversion generally use PDF Image+Text. The output will have full text search though accuracy will be input image dependent. No parsing on converted text is generally done for PDF Image+Text outputs. However we can also deliver parsed (99.995% accurate) text embedded on an image.
  • Full color PDF
    (Exact replica of printed books)
    E-Book publishers prefer these outputs.
  • (Blank PDF forms)
    Widely used on the internet to collect, submit and transfer information./li>

In addition to Adobe tools, we also use other color-supporting applications to create high quality color pdf output files.


Forms Processing

We offers high volume forms processing solutions. We employs a combination of the world's best ICR / OMR applications with internally developed Image View applications to offer you competitive pricing and rapid turnaround times. Some of the kinds of forms we have handled are:

  • Hospital Records Indexing
  • Medical Claims Processing
  • Insurance Application Docket Processing
  • Insurance Claims Processing
  • Educational Institutions – Admission Forms and Pre admission process
  • Education Boards – Pre and Post Examination process
  • Company Personnel Records Digitization
  • Company Forms Digitization

Word Processing / Text Conversion


Scope and Objective

Many industries today generate documents in various proprietary formats that cannot be distributed widely due to the requirement of the application, or even a specific version of the application on the target platform. Word Processing enables the conversion of the data in these proprietary formats to universally accepted delivery formats such as RTF and DOC.

The finished documents are cross-platform, require freely downloadable viewers and have compact file sizes. They are also printable with no loss in image or data quality.


Methodology:

With the help of the latest OCR software, we achieve the highest possible accuracy. This is followed by multiple manual proofreading

The following is a list of formats that we are proficient in converting:

Hard Copy (Paper) / Scanned Images of Hard Copy documents:

Paper documents are scanned and converted to an image format which can then be indexed using a search tool or be OCR (Optical Character Recognition) to create editable searchable text documents. eg. TIFF, GIF, PDF, JPEG, and DjVu.


Tagging & Markup

These services are required where highly complicated unstructured data in various disoriented formats need to be structured in a cohesive manner for immediate access at any given point of time through the Internet / Intranet.

SGML (Standard Generalized Markup Language)

The SGML language allows to describe the hierarchical logical structure of a class of textual documents written in a DTD (Document Type Definition). We can create a book DTD or a journal article DTD. HTML (Hypertext Markup Language) is the DTD for the structure of Web pages.

SGML is currently used for data creation, for data exchange, for data storage, for indexing, searching and retrieving, for printing out and for data viewing.

Security


Firewall

securityFirewall technology has emerged as one of the most widely deployed Internet security solutions worldwide, behind antivirus solutions, according to a recent IDC study. The demand for firewalls, software and appliance-based, has increased dramatically due to three major factors:

  • Increased reliance on the Internet by enterprises for daily business communications, both internal and external.
  • Companies are increasingly opening up their internal systems to the outside world via the Internet while utilizing firewalls to assist in controlling access.
  • As companies increasingly utilize the Internet and open their internal systems to others, organizations are exposed to an increasing array of threats, intrusions and risks from outside hackers and employees.




A firewall is a combination of software and hardware that resides between the public and private network and is utilized to monitor and control the traffic between these networks. Firewalls are commonly referred to as “the first layer of defense”, protecting the network perimeter. The firewall inspects packets of data entering a network and enforces pre-set security policies. These policies may include restricting traffic from certain IP addresses, restricting types of traffic either in the inbound or outbound direction for different types of applications. The Firewall is an effective tool to monitor Internet traffic destined for private corporate networks, as well as private network traffic destined for the outside world.

Firewall technology today is a business necessity. It is well established, comes in three major technology architectures and can be implemented on three major platforms. These platforms include software-based firewalls on open systems (i.e.: NT, UNIX, Linux servers, etc.), appliance-based systems, and router-based systems. While all three of these implementation types are acceptable solutions, the implementation will vary among organizations depending on the needs of the organization, and the levels of performance, scalability, and manageability required.


Firewall Solution Partners:

  • Check Point
  • Cisco
  • Sonic Wall
  • Watch Guard

Internal Security Assessment

Threats, intrusions and attacks perpetrated by hackers abusing the Internet are, without question, on the rise in today's business environment. The security of internal trusted networks may not have been provided the attention it deserves and requires in order to protect your valuable business information. Properly implemented network security controls, from both a management process and technology implementation standpoint, are required to thwart intentional attacks from outsiders, while at the same time minimizing unintentional mistakes from trusted insiders. The key driver in today's Security and Privacy environment is preventing exposure of valuable information assets unnecessarily.

Roy & Roy Inc's Internal Security Assessment focuses on the security controls implemented and in place for your internal trusted networks. The assessment is custom designed to analyze system platforms, routers, bridges, switches, or other network components that provide the security within your organization.

The technology review component consists of "intrusion tests" and configuration analysis to present a thorough understanding of the strengths and weaknesses of your internal network components.

The management review component consists of interviews with administrators and management and the review of documented security policies, standards and processes. This process provides the client with insight into how your organization is prepared to handle the security of your trusted networks against potential threats from insiders who get through your external security controls.


Service covers:

  • A review of the overall enterprise architecture to determine how effectively it isolates untested outside networks from gaining access to your internal trusted networks and systems.
  • A review of your internal network design to determine how effectively it isolates insiders based on their business function and need to access your organization's valuable information assets.
  • A review of the security design of your selected internal network security components (routers, remote access servers, bridges, etc.) to determine if any related functions could cause undesirable security exposures.
  • A test designed to exercise the security components within the scope of the project in an attempt to gain unauthorized access to portions of your internal trusted network. This test relates the perspectives of a trusted insider or an outsider who has penetrated your external defenses.
  • A comprehensive review of the security management controls covering policy, organization, personnel, asset classification and control, physical security, access control, network and computer management, business continuity, system development and maintenance, and compliance.
  • A report describing the strengths and weaknesses found in all areas along with recommendations for short and long term adjustments and improvements.

Portfollio

Gurus Garden – California, USA

An E-Commerce web store transact secure online payments, Shopping cart, Validating payments within a matter of seconds through payment gateway.

This project is developed using C#, .NET ASP, Java scripting, XML, XSLT, CSS. The architecture of this project involves web services, Business objects and MS SQL Database with ADO.NET, XML transformation to XSLT. The live XML feed to cross platforms for data transfer and capture with real time online Payment Gateway connectivity through web services. End to end online transactions are protected using SSL 128 bit.

The project includes an administrative back office for managing real time sales of resellers, shipping and inventory management. The back office provides MIS for company and its individual affiliates to monitor web traffic, sales and commission etc.

https://gurusgarden.com

Achillion Pharmaceuticals Inc - Connecticut, USA

Achillion is an innovative biopharmaceutical company dedicated to bringing important new treatments to patients with infectious disease.

This website is developed using ASP .NET, C# and Macromedia Flash.

http://www.achillion.com

Premier Oil & Gas, Inc - Las Vegas, Nevada, USA

Premier Oil & Gas, Inc. is an independent oil and gas exploration and development company providing high quality direct participation (Joint Ventures) opportunities for non-industry accredited investors seeking lower risk yet realistic economic returns on their investment capital.

This website is developed using ASP .NET, C# and Macromedia Flash.

http://www.premieratrockyflats.com

Clipsal Middle East - A subsidiary of Clipsal Australia

Enterprise Resource Planning (ERP) software designed in .NET architecture that takes full advantage of .NET, XML, Web Services, Business objects and the new features of Microsoft SQL Server.

The ERP platform integrate all business management functions, including planning, inventory / materials management, engineering, order processing, manufacturing, purchasing, accounting and finance, human resources etc.

Yusuf Ahmed Alghanim & Sons WLL – Kuwait – HRM module

Human Resources Management Module supports the entire human resource management process - from recruitment and employment to redistribution, competence development and, finally, winding down. There is no limit to the number of employees it can handle.

  • Employee Master Data
  • Employee loan
  • Mutation, rotation, promotion, demotion, termination and registration
  • Incoming applications
  • New employee requirements
  • Training
  • Leave management
  • Attendance recording
  • Payroll

Movieclubplus.com – California – MLM Company - USA

Portal development, MLM online development

Sub contract of Verizon - USA

Privacy Policy

Privacy Policy Roy & Roy Inc. Privacy Statement

Your privacy is important to Roy & Roy Inc. Corp and its subsidiaries. Roy & Roy Inc. provides this Privacy Statement to inform you of our privacy policies and practices, including the types of information we may collect, why we collect it, how we use that information, and how you can exercise your choices as to how your information is used. This Privacy Statement is accessible from the bottom of each page of each Roy & Roy Inc. site to which it applies, and at every point where personal information is requested.


1. Global Privacy Policy

Roy & Roy Inc., with its subsidiaries, is a global company, with business operations and customers in many countries around the globe. Roy & Roy Inc's intent is to comply with the privacy laws and regulations in all of the jurisdictions in which we conduct business, and our privacy practices are designed to provide protection for your personal information around the world. We may share your information within Roy & Roy Inc. and its subsidiaries, including transferring that information to countries in which we do business. Any Roy & Roy Inc. subsidiaries receiving your information will be governed by this Privacy Statement and are also bound by appropriate confidentiality and data transfer agreements.

Your information may be stored and processed in the United States or any other country where Roy & Roy Inc. or its subsidiaries are located. Your personal information is never shared outside Roy & Roy Inc. or its subsidiaries without your permission, except under conditions explained herein.


2. Personal Information

Personal information is information that identifies an individual personally, including but not limited to name, address, phone number, e-mail address, personal characteristics, and financial information. You can visit many Roy & Roy Inc. Web sites without disclosing any personal information; however, in some instances, you will be required to provide personal information in order to complete a transaction or take advantage of the online resources made available by Roy & Roy Inc. Roy & Roy Inc. will only collect the personal information reasonably necessary to accomplish the purpose for which it is collected, and will retain it only as long as is reasonably necessary. Personal information collected online by Roy & Roy Inc. may be combined with information you provide through other sources such as product registration, customer service call centers, or other methods.


3. Cookies and Tracking Technology

Like most Web sites, Roy & Roy Inc.'s Web sites may collect and log information automatically through the use of electronic tools that may be transparent to you. Information collected may include items such as your IP address, the type and version of your browser, the length of time that you visit our site, search queries, your click-stream data, the location that referred you to our web site and the average number of pages viewed. In addition, in order to improve our sites and your experiences with them, we may use "cookies" or other electronic means to track your visits. Cookies are simply small text files that our Web site can place on your computer's hard drive in order, for example, to collect information about your activities on the site or to make it possible for you to use an online "shopping cart" to keep track of items you wish to purchase. Our site's server, generally speaking, is the only computer that can read it. Many consumers do not know that "cookies" are being placed on their computers when they visit most Web sites. Cookies cannot read data from your hard disk or read cookie files created by other Web sites and they cannot infect your computer with viruses. If you want to know when this happens, or to prevent it from happening, you can set your browser to warn you when a Web site attempts to place a "cookie" on your computer. Please click on the "Help" menu of your browser for information on setting your cookie preferences. You can also read more about cookies and how they work at various online sources, including www.cookiecentral.com.


4. Children and Privacy

Roy & Roy Inc. is committed to protecting the online privacy of children. Roy & Roy Inc. does not knowingly collect or solicit personal information from or about children under the age of 13, and Roy & Roy Inc. does not target its web sites to children under 13. Additionally, Roy & Roy Inc. does not knowingly collect or solicit personal information from or about children above the age of 13, without their parent's or guardian's consent. If Roy & Roy Inc. ever includes children above 13 as part of our intended Web site audience, those specific Web site pages will be clearly identified and provide an express privacy notice for children above 13, as well as processes to obtain parental approval and allow parental access to request removal of their children's personal information.

Roy & Roy Inc. encourages parents and guardians to spend time with their children online and participate in their interactive activities and interests.


5. How We Use Your Information

Roy & Roy Inc. collects personal information to enable us to provide products, services and information to our customers, potential customers, and business partners. We intend to let you know how we will use the information you provide before we collect it from you; and we intend to limit our use of that information to those purposes for which you give us permission. For example, Roy & Roy Inc. may collect financial information to facilitate the purchase of products or services online, and postal or e-mail addresses to provide information in response to your request or to allow you to participate in promotions.

We do not sell, trade or lease your information to others. Roy & Roy Inc. will not share your information with third parties except in responding to your requests for products, services or other Roy & Roy Inc. information. When we collect the information, we will obtain your consent regarding how you want or do not want us to use it. We may share your information with other persons or companies to help us manage our business. When we do so, we require them to use that information only for the purposes for which we provided it.

We might use your information to develop aggregate statistics about our sales, customers, users, and site visitors, but these statistics will not include any personally identifiable information.


6. Protecting Your Information

Roy & Roy Inc. uses procedural, manual and electronic security controls to maintain the confidentiality and integrity of personal information in our possession, and guard against its unauthorized access or use. We are responsible for providing an adequate level of protection for that information, and for limiting or granting access as required by applicable law. Roy & Roy Inc. employees may have access to your personal information as part of their job. Such employees are expected to keep that information in confidence and share it only with those Roy & Roy Inc. employees who have a business reason to know. Unauthorized disclosures or uses are strictly prohibited, and employees who violate our policies may be subject to disciplinary action.


7. Communications from Us

If you provide us with your email address, we may occasionally send you, in accordance with relevant regulations, email with information or special offers about Roy & Roy Inc. products and services that may be of interest to you. We will give you opportunity to let us know if you want to receive such email when you provide us your personal data or register for an online Roy & Roy Inc. promotion. This applies to promotional email only, as Roy & Roy Inc. may find it necessary to email you relating to your customer account or order. All promotional email that you receive from Roy & Roy Inc. will tell you how to decline receiving future promotional email.


8. Access to and Accuracy of Your Information

Roy & Roy Inc. strives to keep your personal information accurate. We have implemented technology, management processes and policies to maintain data accuracy. Where practical, we will provide you online access to your information and the ability to correct it. Otherwise, you can request access to your personal information by contacting Roy & Roy Inc., as described below. To protect your privacy and security, we will also take reasonable precautions to verify your identity before granting access to your information. Certain areas of Roy & Roy Inc.'s Web sites may limit access to users with a user id and password.


9. Merger or Acquisition

Roy & Roy Inc. or its related entities could merge with or be acquired by another business entity, or its assets could be acquired. If that should happen, Roy & Roy Inc. will make every reasonable effort to notify you in the event we share your information with the merging or acquiring entity to allow us to continue serving you.


10. Links to Non-Roy & Roy Inc. Web Sites

Roy & Roy Inc. Web sites may provide links to third-party Web sites for your convenience and information. If you access those links, you will leave the Roy & Roy Inc. web site. Roy & Roy Inc. does not control those sites or their privacy practices, nor do we make any representations about third-party sites. Any information you provide to or through those sites is covered by the privacy policies of that site, not by this privacy statement. Please review the privacy policies of such sites before sharing your personal information.


11. Disclosures Required by Law

Please be aware that in certain circumstances, Roy & Roy Inc. may be required by law to disclose your personal information. We will make every reasonable effort to limit the disclosure to only that information which is necessary to comply with such law.


12. Employment Application Information

If you provide us your personal information in relation to an application for employment with Roy & Roy Inc., we may use this information throughout Roy & Roy Inc. and its related entities for the purpose of consideration of your potential employment with Roy & Roy Inc. Unless you instruct us otherwise, we will retain the information for future consideration.


13. Contacting Us

If you wish to contact us about our privacy policies or to correct or delete information we may have about you, please send an e-mail to privacy@RichInternational.com, or send a letter to:

Roy & Roy Inc.
7201 Archibald Ave, Suite 4 - 178,
Alta Loma, CA 91701

Please include your name, postal address, and e-mail address.


14. Changes to this Privacy Statement

Roy & Roy Inc. may change this Privacy Statement from time to time. If and when we do, we will post those changes to our web site and update the revision date of this document, so you will always be aware of our privacy policies.

Revision April, 2005

Any questions?
To contact us about any matter related to privacy, please contact our Privacy Officer at 1 909 972 6799.

Get In Touch

Location

Roy & Roy Inc.
77 Alpha Ave, Muskegon,
MI 49441-2659,United States of America

E-mail

rr@roynroy.com

Phone

+1 909 972 6799