Autonomy enables users to search across numerous repositories – and even multiple languages – using a single query. Results from all repositories are returned in a single unified results list. Relevance can be normalized across all repositories, enabling users to compare relevance across multiple repositories easily. Users may also choose to keep the original relevance scoring.
Autonomy AQF
Autonomy can perform federated searches across multiple, disparate resources, including:
Federation across the enterprise from desktop, to corporate intranet, to external valuable repositories (FDA data for pharma)
Web federation
Federated queries to other search engines
IDOL federates the query to a subsystem it has identified as the correct specialist based on its conceptual understanding of the query itself. For example, if a user enters a shipment tracking number, IDOL recognizes from the form of the query that the shipping company will be most likely to return the correct result, and federates the query to that system. In this way, unlike alternative approaches, IDOL avoids bombarding all of the systems with the same query – and simply selects the one most likely to return the specialist result. Using the hybrid spider and ant technology, AQF updates what is happening to rapidly changing data and trains itself to use the optimum search technique. For each query, it can identify whether it is better to look in internal applications for data, or whether to search for fresh information and update the index dynamically.
When Spiders Talk to Ants
The information that drives the enterprise comes from an ever-increasing number of sources. Experts estimate that 20% of results in new information access projects will be refreshed every time a query is entered. The average worker is dealing with information overload on a daily basis - how to process it, where to locate it and how to derive meaning from it. Increasingly, workers familiar with consumer search technologies expect access to all forms of data, including information from the Internet, and not just static files.
At the moment, most search engines use spiders that navigate an information web and create a basic configuration of the linked documents. By rebuilding the image from scratch at defined intervals, the spider creates a simplified picture of the overall structure of the network it is searching. In between those time intervals, however, the information can easily become outdated and the results returned irrelevant. Spiders are unable to return real-time, dynamic information.
Ant technologies, on the other hand, respond to the current landscape and deal with rapid changes. Real ants do not formulate a conceptual image of the landscape as they explore; they simply relay new discoveries back to the colony, which responds in a dynamic fashion. Software ants behave similarly, in that each ant will travel familiar paths to find the most relevant piece of information. However, in the Internet Age, ants are required to make periodic investigations of relevant enterprise applications to ensure they locate the optimum route and deliver results quickly.
The solution lies in a hybrid of both technologies where the two work together to access and deliver relevant information. Spiders go about their normal tasks, such as monitoring and analyzing information, then relay the information to an ant. When something changes, ants learn from the variation and can pass it along in real-time. Variations allow ants to adapt and optimize the way in which information is gathered. Systems react instantly because updates are reported immediately and new paths are dynamically created.
Forthcoming Events for Automatic Query Federation (AQF)
Archived Events for Automatic Query Federation (AQF)
Summary: ...in combination with its automatic alerting features, Autonomy's technology could keep ABN AMRO's staff continuously informed of the latest available news and compliance updates, without disrupting their natural workflow. In addition to that, the software offered the bank the facility to identify experts...
Summary: ...The Need Developing the medicines of tomorrow is time-consuming, complex and costly. Pharmaceutical professionals spend years tearing apart molecules, running experiments and refining and building on their discoveries in a bid to find new and better ways to treat disease. The process is made even more...
Summary: ...and agent evaluation in place, Team Leaders could spend more time - as much as 80 percent - on their core function of agent skill development. Qfiniti made it easy for them to evaluate customer/agent interactions and spot potential problems quickly, make adjustments and ensure optimum customer satisfaction....
Summary: ...Autonomy, we’d have to double or triple the size of our team just to handle uploads,” says Blumfield. “It would be an enormous investment.” In the past, a new version of an existing site required an average of three months to recreate from scratch, incurring huge costs. Autonomy now supports a...
Summary: ...Au tomated deployment speeds up site updates Benefits of Using Autonomy •Strea mlined content editing and approval processes using workflow, automation and metadata tools • Elimination of IT bottlenecks in the publishing cycle • CITEC now provides readers with current, fresh, relevant information...
Summary: ...a lot of elements of a page that are candidates for testing and improvement. You can put this kind of thing into effect quickly without the pain of a complete redesign, then keep moving down the path of continued testing, validation, and optimization.” Expanding on Success LexisNexis and Autonomy have...
Summary: ...Meeting regulatory requirements for data retention As a multi-specialty physician practice, research facility and university, the UNT Health Science Center must comply with a host of legislation, including the Health Insurance Portability and Accountability Act (HIPAA), Food and Drug Administration (FDA)...
Summary: ...HP Software | IT Case Study | The Department of Business, Innovation and Skills (BIS)| HP. The department therefore introduced the concept of Electronic Document and Record Management (EDRM) by implementing an electronic file tracking system. However, pressure from the government‘s modernising agenda...
Summary: ...Case Study: Prologue Research. Customer at a Glance Prologue Research Prologue Research provides immediate feedback on clinical patient data with Cardiff TeleForm. TeleForm helps ensure high-quality clinical trials—increasing the chance of FDA approvals. Do you know where your trial is today? That’s...
Summary: ...the Goods In department locates the Purchase Requisition form relating to that delivery in the Awaiting Delivery Queue. When the employee opens the form and checks the Order Completed Check box, an email is automatically sent to the originator alerting them that the shipment has arrived. The form is then...
Summary: ...IDG,” says Effron. “In those circumstances in which a site has not chosen (Autonomy), we can still accommodate it in our IDG.net portal.” IDG rolled IDOL Federator out in August 2003 on the rebuilt IDG.net portal. Leading technology publications such as PC World, InfoWorld, Computerworld, CIO magazine,...
Summary: ...search box at the bottom of the portal page made it more convenient for visitors to conduct searches, as well as boosted search queries. EarthLink has even used Autonomy to optimize the user experience based on how dialup users behave versus broadband users, as well as logged-in versus anonymous users....
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...profile of the information usage of each user. The system can then identify user’s current interests to refine search accuracy without any manual input and deliver targeted updates instantly. Agents – Agents can be created to deliver conceptually related information based on users’ profiles and...
Summary: ...from results • Fast query speeds Federation • Search criteria can be pre-processed and results post-processed in nearly any way imaginable • Intelligently selects the specialist most likely to return a query result, avoiding the need to bombard multiple systems with the same query • Automatically...
Summary: ...Trail Echo combines in real-time this harvested attribute data with the holistic and complete conceptual understanding of the entire enterprise data set. Echo can not only follow a traffic pattern, such as the path of an email attachment or voice mail i.e. the what and when of who read, heard, forwarded...
Summary: ...rule editing using 43 query language operators. • Thematic Mapping that evaluates documents across your enterprise, identifies themes, arranges the themes as categories in a hierarchical fashion and defines the categories with business rules. Each category is also labeled with a name that makes sense...
Summary: ...proactive security CCTV surveillance is a significant component of modern security. Independent analyst research suggests that there are currently 25 million CCTV cameras worldwide, and this number is set to increase by 37% by 2009. However, indiscriminate recording is not the answer. Poor quality footage...
Summary: ...Comprehensive Information Management Solutions from HP and KPMG - US English. CIM also deals with key issues relating to your information overload by applying corporate-wide processes for data retention—helping you understand what to keep and for how long. You can implement policies and lifetime management...
Summary: ...provide 128-bit encryption protection. Additionally, IDOL can leverage SSL for both aggregation and querying of content, including access to SSL encrypted sites. IUS Overcomes the Limitations of Other Approaches IUS supports all legacy methods described below. However, Autonomy recognizes the limitations...
Summary: ...or dies within the organization. Echo follows a file’s path and history and can report on who or what the asset has influenced. It can not only follow a traffic pattern such as the path of an email attachment or voice mail (i.e. the what and when of who read, heard, forwarded and retained it), but also...
Summary: ...of taxonomy generation, allowing experts to focus on the details that really matter. A Unique Approach Autonomy takes a unique, holistic approach to taxonomy generation that strikes the optimum balance between automating processes and support for manual refinement, meaning it’s not an either/or choice....
Summary: ...costs incurred by downloading a document over the WAN every time it is requested. Deep integration with remote monitoring and management tools enable a system administrator to easily track and analyze cache performance remotely and to tune the cache for optimum performance. APIs enable administrators...
Summary: ...message fields for all supported eConfirm product types. • Trade status reporting and updating in real-time (e.g. running a query against ICE of all alleged trades). • Guaranteed ongoing live support for any new ICE eConfirm specification update via Autonomy’s EnConnect connectivity solution. Out-of-the-box...
Summary: ...for all supported eConfirm product types. • Trade status reporting and updating in real-time (e.g. running a query against ICE of all alleged trades). • Guaranteed ongoing live support for any new ICE eConfirm specification update via Autonomy’s EnConnect connectivity solution. Out-of-the-box supported...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...process • Weight of every field can be manipulated • User feedback used to calculate relevancy and primacy • Recently added features include: • Query bread-crumbing/Audit • Real-time validation sampling • Defensibility reporting • Intent-based ranking • Social media scoring New Enhancements...
Summary: ...Internationalization and Advanced Linguistics White Paper page nine Figure 4: Autonomy document level property model Autonomy does not require the use of stemming rules, as the statistical analysis would normally determine the importance and relationship of those words automatically. However, an initial...
Summary: ...Autonomy XML White Paper 20031003. 4.3 Autonomy and XML in other applications A more subtle application of Autonomy and XML combined, lies in areas such as supply chain management where, building on the strengths of XML to accurately record precise product codes or catalog numbers, additional unstructured...
Summary: ...convenience stores, supermarkets, pubs and clubs and fast food outlets. More than ever companies are seeking new measures to combat this illegal activity, however, many businesses still only rely on manual surveillance techniques alone. Research carried out indicates that businesses lost as much as $60...
Summary: ...6, 2009). (Non-Party: OFHEO) 2 Inside Counsel Seminar ECA Scoping Strategies There is nothing revolutionary about the concepts underpinning early case assessment. “This isn’t something invented last week,” Allman said. “In-house counsel have always had the responsibility for managing litigation...
Summary: ...is a manual process that involves querying a structured database of clients, matters and parties to the matters. Conficts analysts laboriously research the new piece of business and develop complex queries to run against the conficts database for the purpose of generating a report that can be reviewed...
Summary: ...laws regarding transparency requirements, businesses are increasingly aware of the risks of poor governance practices. There is a heightened realization of the need to consistently govern all content types and source targets. The traditional focus on email is outdated, and archive strategies must now...
Summary: ...remain seamlessly accessible to users. See What Happens to Archived E-Mail Messages? for more information on the user perspective. While other solutions archive according to mailbox size and e-mail message age, EAS allows organizations to apply extremely flexible archive rules that reflect both quantitative...
Summary: ...inbox now represents a potential repository for matter information. Disconnected from the rest of the corporate information network, these isolated islands of content are neither searchable nor scalable, and lie beyond the parameters of traditional document management systems. Over time, they inevitably...
Summary: ...passwords, the software is left vulnerable to intrusion. It is pertinent that you not only change passwords after the initial install, but change them frequently thereafter. Default port numbers should also be changed after the installation. Maintain a Secure System Systems should be regularly updated...
Summary: ...Security Policy 2 Autonomy Qfiniti Enhanced Security Features 2 Requirement 1: Install and maintain firewalls 2 Requirement 2: Do not use vendor-supplied passwords 2 Requirement 3: Protect stored data 3 Requirement 4: Encrypt transmission of cardholder data 3 Requirement 5: Use and regularly update anti-virus...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2013 at the moment, please visit the news section on www.autonomy.com for the latest news.