The IDOL Sentient Dashboard is a stand-alone front-end Web interface that allows administrators to manage all of IDOL's modules and services, whether they are running locally or remotely. It provides application administrators with a complete workbench to monitor and control all aspects of system performance.
IDOL Sentient Dashboard
Dashboard monitors all IDOL's "child" services in real-time and presents bottom line statistics on index rate, peak load, de-duplication and redundancy in all target repositories via graphics and figures.
Editing & Configuration
Dashboard facilitates the architecting, configuring and deploying of an IDOL system. In the Topology Explorer window, administrators can architect a system by simply dragging and dropping components from a palette of pre-configured base definitions (i.e. HTTP Fetch, Distributed Action Handler) as well as custom-defined definitions. Using a simple GUI, the administrator can link the components together to set the flow of information, as well as apply modifications along the way (e.g. number of instances). Dashboard allows connectors and indexing processes to be easily configured and controlled before deployment. All aspects, which are bundles of parameters, can be configured. Once the architecture is established, the same application can be used to deploy the system across the network, making it immediately available to end-users.
Centralized Simultaneous Service Control
Dashboard provides full control to start, stop, pause and restart services such as IDOL Server, Distributed Handlers, group servers or connectors via Service Control Management (SCM) or direct HTTP communication.
Fully Configurable Monitoring
Dashboard gives administrators all the tools they need to monitor the performance of the Autonomy installation. It displays the statistics and status information of every Autonomy service across a multi-node, distributed architecture, including:
Service Status
Service Location
Product Type and Version Numbers
Logging
Document Tracking
Statistical Generation
Graphical Analysis
Tabular Analysis
Advanced Alert Triggers
Dashboard can automatically alert administrators to concerns in any type of data repository, via email, log files or SMS. Irregularities such as a user searching for material contrary to his or her security level or, more subtly, browsing outside their normal area of interest can instantly be flagged.
The "conceptual efficiency" of materials such as FAQ's, statutory and educational documents can be measured on a per user, departmental, demographic sample or global population basis. "Return" and readership statistics across such material can be displayed in real-time in addition to "point of entry" analysis for each document type.
Sentient Architecture
Advanced heuristics manage the system on behalf of the administrator, correcting available bandwidth and a target site's responsiveness. The ability to support distributed architectures, identify potential problems and prompt a real-time, dynamic substitution ensures 24/7 uptime.
Auto-Remediation
By combining analytical data with standard, real-time administrative housekeeping tasks, the dashboard can automatically spawn new aggregation processes to cover identified corpus gaps.
Modular Design
The modular nature of Autonomy's architecture gives administrators the flexibility to address performance constraints on an individual component basis. The ability to scale these components independently means that only the affected parts of the system need to be extended, yielding platform cost-savings in areas that are not growing.
Security and Confidentiality
Autonomy separates the business role and the administrator role, in effect, assigning "super-user" privileges to a business owner. The technical administrator is then only assigned sufficient rights to manage and operate the system, but lacks the level of access granted to the business owner, which includes visibility of the data itself, thereby establishing a system of checks and balances.
Dashboard is also compliant with Autonomy's mapped security so that for a given level of entitlement, the system may reveal the query but not the person who made the query. Autonomy also recognizes that privileges can change over time and provides intradocument security based on the occurring concepts. It keeps a record of all the logs that are accessed and this audit trail cannot be edited or destroyed, not even by the "super-user" or the administrator.
Summary: ...Monitors collection processes, validates all transactions and assures the correctness of the transmission process. Digital Safe: This organization expects to double previous data volumes. Collected data is automatically classified and flagged with project specific retention requirements. Accessibly to...
Summary: ...our alignment with the success of our customers. Our investment in multivariable testing drives greater ROI in the form of leads delivered to the firms listed in our online properties Lawyers.com and Martindale.com, which we demonstrate to them through statistics and dashboards. This kind of real-world...
Summary: ...Ogilvy Action approached Aurasma because they wanted to bridge their physical poster campaign with their online presence and at the same time connect with the 91% of first year undergraduate students who own a smartphone – a key target demographic for the chain. They opted to embed Aurasma’s code...
Summary: ...and dispose of radioactive materials. Today, EnergySolutions is a leading provider of nuclear services across the entire nuclear fuel cycle. EnergySolutions offers a full range of services for the decommissioning and remediation of nuclear sites and facilities, management of spent nuclear fuel, the transportation...
Summary: ...bank and hired temporary staff. Once the income tax forms were processed for accuracy, they were sent on to a different group for validation, and passed again to another group for manual entry before data was imported into the mainframe. Eventually, the paper forms were sent to vaults in the basement...
Summary: ...more time to service the referral and the customer." Process Automation, with logic programmed by AccuImage and AHOM’s IT development staff, also raises red flags during the revenue qualification phase that saves AHOM money and keeps the company in compliance with U.S. government regulations. “Medicare,...
Summary: ...Cardiff Case Study: Customer at a Glance French Ministry of Defense. The forms are designed to collect information on a demographics, interests, and individual qualifications. The data from these other forms will be given to the French National Statistics Bureau as part of its ongoing national data collection...
Summary: ...built an automated forms processing system using Cardiff® TeleForm®. When implemented, all forms will be faxed to a service bureau with a “never busy” 800 number. The faxes will be immediately identified as Red Cross forms and sent electronically to a processing center in Tulsa, Okla. There, the...
Summary: ...Streamlining Agent Evaluation Process By searching for specific calls, such as those that have above-average handle times or mention a specific product or promotion, the business could more effectively pinpoint calls for coaching opportunities or flag calls for future promotions. With this ability, Orange...
Summary: ...Severino Santirso; CTO at La Voz de Galicia Organization La Voz de Galicia www.lavozdegalicia.es Industry Media Application External Integrated Press Portal and Internal Knowledge Management Platform Autonomy Solution Portal-in-a-Box Autonomy Server Autonomy Dish Dashboard Autonomy HTTP Fetch Functionality...
Summary: ...Autonomy ControlPoint: Information Governance for SharePoint. This unified architecture, visible through a single dashboard, enables automatic and rapid linking of information with innovative analytics features which have added an unprecedented level of intelligence to KLA’s data access and processing....
Summary: ...technology implementation. For years, the company has refined that value proposition and now offers services which span from strategy through deployment to support. Roundarch’s projects range from HBO’s high-traffic consumer site to private banking portals to Tesla Motors’ touch-screen dashboard....
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...are sent using the ACI port of the machine that DiSH is situated on. You can also send service commands to the DiSH via the Autonomy Service Dashboard or you web browser (for example, to pause or stop the DiSH, or to display statistics on the DiSH’s operation). The DiSH distributes operates and monitors...
Summary: ...Allows set-up of an alert triggered when a specified statistic’s value falls outside a user-defined range or when the service doesn’t respond ? Alerts can be automatically sent as emails, or added to one of a service’s log files ? Configuration of a periodic email alert containing status summary...
Summary: ...the operations that are important to their job. Robust physical records management and tracking Firms can manage physical files at the warehouse, shelf, box, folder, subfolder, or document level. A Circulation Dashboard helps file room managers stay productive during peak workloads by consolidating repetitive...
Summary: ...piece of text. If overlap is disabled, only the longest and highest scoring match is returned. The results also include the details of forms, components, and occurrences, as well as a confidence score for each instance and form. Users can also return the extraction statistics for each target entity. Automatically...
Summary: ...and minimize cost Autonomy Legal Hold’s Litigation Lifecycle Management Module tracks data from preservation and collection through processing, review and production. Organizations can automatically track data through an intuitive dashboard, provide a projected completion time, properly budget and minimize...
Summary: ...plans, all based on diagnoses. Auminence is perfectly positioned to help doctors and patients succeed at this moment of truth. Auminence is a powerful point-of-care analysis dashboard designed to help the provider make better quality, data-driven, evidence-based, diagnosis decisions. Auminence allows...
Summary: ...Santa Clara, Shanghai, Singapore, Santiago, Sao Paulo, Stockholm, Sydney, Tokyo, Utrecht and Washington, D.C. Increased Performance Capabilities Autonomy IDOL 10 enables sophisticated analytics for real world applications by leveraging performance enhancements such as subqueries, database statistics,...
Summary: ...Litigation Lifecycle Management Module tracks data from preservation and collection through processing, review and production. Organizations can automatically track data through an intuitive dashboard, provide a projected completion time, properly budget and minimize costs. ALH can automatically estimate,...
Summary: ...about the preservation and collection process, including information critical to maintaining chain-of-custody. Included in the user-friendly dashboard are real-time statistics on divisions, cases, requests, and collection and preservation efforts. The real-time audit reports create a comprehensive tracking...
Summary: ...directly responsible for the communications that are sent by their employees. Emails, instant messages and even recorded web events and voicemails that contain privileged client or industry information pose a huge risk should they be sent beyond approved boundaries and should be monitored as closely as...
Summary: ...with Autonomy’s file recognition and viewing solution: KeyView. KeyView provides support for WYSIWYG viewing and printing of all popular word processing, spreadsheet, presentation, graphic, multimedia, compression and encoding formats. This powerful and flexible viewing and file management interface...
Summary: ...can be routed in parallel. Only the right personnel with the proper security credentials can effect the proper level of modification and feedback. To ease the process of compliance reporting, Autonomy CLM includes analytics with graphical reporting dashboards, KPI’s and internal controls. Meaning-Based...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...remediates” when issues are identified during data and search monitoring. By combining analytical data with standard administrative housekeeping tasks (performed in real-time via sentient components), Dashboard can automatically spawn new aggregation processes to cover identified corpus gaps. For example,...
Summary: ...states, and can take a number of patterns based on server topology. The Interwoven solution enables companies to choose the appropriate approach and pattern for each update performed based on the specific requirements of the target application. Audit control and rollback One of the most important compliance...
Summary: ...patient outcomes, reduce costs and understand patient satisfaction. For most fields, the methods of collecting this data have not changed in 40 years. That is, they record a patient’s demographics and statistics on non-standardized, hand-written documents, which are often incomplete and may be illegible....
Summary: ...Document Capture (EDC) rules engine. Managed Folders and the Meridio EDC allows an organization to target information added to specific managed folders at Meridio in combination with any other rules appropriate for the content. As an example, all emails sent externally and added to the “HR Contracts”...
Summary: ...application across all aspects of the information lifecycle, including application of meaning-based policies at the point of creation, storage management, and ultimately, disposition management. Automatic alerts for document custodians can be sent if deletion of important information is attempted.
...
Summary: ...Autonomy Whitepaper - Enterprise Search: Addressing Security and Entitlement Issues. Furthermore, select passages can be automatically obscured from a user’s view based on their conceptual meaning.This unique intradocument capability permits a granularity in security well beyond the most advanced document...
Summary: ...of suspicious content or the option to monitor the communication thread as it flows through the organization. In parallel, records are compared to the records management policies for categorization and retention period assignment. Records not subject to compliance requirements are not sent to the compliant...
Summary: ...forms an understanding of all content and can deduce the category, or the taxonomy, to which the document belongs. Policies can also be created manually, or in combination with Autonomy’s automatic categorization tool, with numerous fields available for configuring. Policies can be edited, reverted,...
Summary: ...the location/path information of the content databases and those of other services. Restore: By using the agent, individual component selection can be used for restore: – Restore is supported through Data Protector GUI and Data Protector CLI for the advanced integration. – Full farm or individual...
Summary: ...HP Data Protector best practices for backing up and restoring Microsoft SharePoint Server 2010. omniinetpasswd -add {SHP farm admin@HSL|HSL\.} [Password] Omniinetpasswd prompts for the password if not specified in the command line. • Open the Data Protector GUI: 1. In the Context List, click Clients....
Summary: ...Covered in more detail in the Administration section of this book, both system administrators and business users are provided with a full workbench to control and tune the relevancy of search results.
...
Summary: ...Frost & Sullivan Moving to Next-Generation Speech Analytics - White Paper. It uses advanced statistical analysis to understand the intent of the unstructured conversations, and likely topics, not just a literal readout of what was said. Autonomy’s meaning-based computing platform, which powers all of...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.