Archive | April 2015

You are browsing the site archives by date.

Translation Memory Tools (Part 2)

Originally posted on 2 April 2015 at http://www.josephwojowski.com/transtech-blog/translation-memory-tools-part-2 I ended Part 1 in stating an important aspect of technology, “those who create hardware or software in any form must always be focused and stay on top of how users use the technology and how they could want to use the technology in the future.” An excellent […]

Translation Memory Tools (Part 1)

Originally posted on 20 March 2015 at http://www.josephwojowski.com/transtech-blog/translation-memory-tools-part-1 This blog post will be in two parts, the first sets up the second in that it talks about my experience starting out as a project manager and how I got into working with translation software. The second part will express my views on my preferred translation memory […]

The Next Generation of Translators

Originally posted on 6 February 2015 at http://www.josephwojowski.com/transtech-blog/the-next-generation-of-translators This is the first post I am writing that does not criticize a piece of technology as it relates to the translation industry. In fact, it has nothing to do with technology at all; but it does have to do with translation and not in a way you […]

Data Storage and Security

Originally posted on 29 January 2015 at http://www.josephwojowski.com/transtech-blog/data-storage-and-security Ever since the posting of my first article, I have been getting questions about internet security and cloud solutions; and rightfully so, everything these days seems to be about the cloud. Cloud-based data storage, cloud-based computer backup and restore, and cloud-based applications, cloud-based translation memory, these all are […]

Machine Translation Technology and Internet Security

Originally posted at http://www.josephwojowski.com/transtech-blog/machine-translation-technology-and-internet-security on 9 December 2014 An issue that seems to have been brought up once in the industry and never addressed again are the data collection methods used by Microsoft, Google, Yahoo!, Skype, and Apple as well as the revelations of PRISM data collection from those same companies, thanks to Edward Snowden. More […]