Your questions, answered
In today's competitive business environment, publishers need to leverage economies of scale wherever possible. Outsourcing your circulation fulfillment and database management allows you to leverage our unparalleled fulfillment and audience relationship management expertise and infrastructure to reduce headcount, streamline operations, and focus your attention on developing new products and increasing your revenue.
Because every publishers' needs are unique to their business models, it is impossible to estimate your fulfillment costs without knowing specific information about your publications, circulation, and ancillary product offerings.
Do not hesitate to contact us to tell us about your specific needs so we can provide you with estimated costs.
Every publishers' files are unique. As a result, there is no way to generalize the time a conversion will take. A Conversion Plan is developed for each customer which defines stages and timelines in advance of any conversion.
Prior to each conversion, we request a complete master file, full set of reports, and duplicates of output such as issue files, invoices, renewals, financials, and any other documents produced from a recent issue close. Once those documents are received, Computer Fullfilment produces full statistics and replicates all output from the conversion test file to ensure that the replicated output matches the sample issue documents prior to scheduling the actual conversion.
Computer Fulfillment, Inc has specialized in meeting the needs of business publishers for nearly 60 years and prides itself in being a full-service provider. In addition to handling all of your controlled and paid fulfillment needs, we can also:
Our offices are located in Billerica, MA, just outside of Boston.
All of our customer and technical support is conducted from our Billerica, MA offices. We do not utilize 3rd-party vendors, or outsource our customer service, but, instead, rely on in-house staff to handle all of your service and support issues.
Computer Fulfillment, Inc will provide online training for all users.
Send 10 or 10 million emails. We've invested heavily in our IT infrastructure to ensure that our customers can quickly and easily send email marketing efforts quickly and easily.
No, we offer web based SaaS (software-as-a-service) solutions which means we handle any updates or patches required and you can rest-assured your data is hosted on the most up-to-date hardware/software available.
CF’s Disaster Recovery solution mitigates risk and maximizes availability with geographic diversity between two datacenter locations. Paired with best-of-breed replication and recovery technology platforms, this protects critical systems and data from loss in the event of an emergency.
Hard-copy documents are stored in their original form on-site in Billerica AM. BPA and AAM have disaster recovery procedures to authenticate documents lost in transit, fire or flood, and the costs of these processes are covered by Computer Fulfillment's insurance.
Our datacenter locations utilize best practices in on-site physical security, including biometric access controls, perimeter monitoring, and 24×7 staffing, as well as cutting-edge digital security measures. The datacenters have fully-redundant power, networking, and environmental systems, ensuring that the facilities are available at all times. Both also feature concrete and brick construction, raised floors, robust facility controls, backup power generator systems, state-of-the-art cooling and humidity controls, diverse power feeds.
All servers are protected by state-of-the-art firewalls, configured with a multivendor security incident and events management solution for reporting and logging of all network traffic.
All computers on our network have both anti-virus and malware software that is updated on set schedules. Virus/Malware definition files are downloaded hourly.
All data transfers are done in a secure manner. Such secure transfers include FTP of data using SFTP (SSL) or FTPS (SSH) encryption, depending on the capabilities of the receiving party. Any data file sent via email is encrypted and password protected. CF uses Mimecast Secure Messaging to transfer personal data or password information vie email.
All employees undergo Security Awareness Training that teaches employees about cybersecurity and IT best practices.
Standard circulation reports for each issue served are automatically generated as downloadable PDF files and include:
In addition, you can create unlimited ad hoc reports using any data element in any record type. The only limit is your imagination. Typical reports include: