| Functionality |
![]()
|
IDOL Eduction | | | Content Rationalization | | | Social Technologies |
![]()
|
![]() |
![]() |
![]() |
Content Rationalization
When content is created or indexed, IDOL automatically detects whether the information already exists in the system and can trigger the appropriate action, automating the rationalization of content and reducing duplication of both storage and effort.
For example, if this operation is performed at content creation time, the author may be alerted to the existence of duplicate files, providing the opportunity to aggregate the two sources. Alternatively, this detection can be executed when the data is spidered and indexed. For example, when spidering multiple websites or document management servers that contain an overlap of information, IDOL helps avoid search results filled with many pages that are nearly identical.
IDOL can automatically suggest similar documents within a user interface, allowing administrators to manually choose the exact data that is to be deleted.
Key Benefits
Forthcoming Events for Content Rationalization
| Protect Seminar |
|
Location: United Kingdom
Event Date: 17th January, 2013
Event Relevance:
20.94%
|
Archived Events for Content Rationalization
| Power Webinar |
|
Status: Archived Webinar
Event Relevance:
34.17%
|
| Power Webinar |
|
Status: Archived Webinar
Event Relevance:
33.49%
|
| Protect Webinar |
|
Status: Archived Webinar
Event Relevance:
29.41%
|
| Power Webinar |
|
Status: Archived Webinar
Event Relevance:
29.23%
|
| Power Webinar |
|
Status: Archived Webinar
Event Relevance:
26.93%
|
| Protect Webinar |
|
Status: Archived Webinar
Event Relevance:
26.84%
|
| Protect Webinar |
|
Status: Archived Webinar
Event Relevance:
26.84%
|
| Protect Webinar |
|
Status: Archived Webinar
Event Relevance:
26.75%
|
| Power Webinar |
|
Status: Archived Webinar
Event Relevance:
26.25%
|
| Protect Webinar |
|
Status: Archived Webinar
Event Relevance:
25.85%
|
| Power Webinar |
|
Status: Archived Webinar
Event Relevance:
25.22%
|
| Protect Webinar |
|
Status: Archived Webinar
Event Relevance:
21.75%
|
This is a selection of our forthcoming events, please visit our seminars page for more information.
Automatic Hyperlinks provided by IDOL Server 10
|
Location: /Power/Case Studies/Education
Date: 2010/7/19
Relevance: 41.14%
Summary: ...Shanghai, Singapore, Santiago, Sao Paulo, Stockholm, Sydney, Tokyo, Utrecht and Washington, D.C. Binary Office’s Marc Carleno explained: “The name on every application or supporting document has to be matched to the university’s main databases, to avoid duplicate files and make sure that related...
|
|
Location: /Power/Case Studies/Financial Services
Date: 2010/7/23
Relevance: 39.50%
Summary: ...copying, faxing • Minimize duplicate data entry • Standardize forms and processing • Consolidate forms • Reduce lost documents/incomplete files • Decrease training time The Solution After evaluating a variety of solutions, First Interstate Bank selected a suite of products from leading technology...
|
|
Location: /Protect/Case Studies/Financial Services
Date: 2012/8/10
Relevance: 39.06%
Summary: ...ABN AMRO Integrates Global Compliance Platform - Case Study. Through the software's ability to learn and understand information as it grows and changes, in combination with its automatic alerting features, Autonomy's technology could keep ABN AMRO's staff continuously informed of the latest available...
|
|
Location: /Power/Case Studies/Media
Date: 2008/3/14
Relevance: 36.94%
Summary: ...their searches by selecting to view results by source or between specific dates. “When we saw the Federator, we said this is the right way to do what we want to do,” says Effron. “We couldn’t find another product on the market that enabled us to avoid having to store or aggregate content locally.”...
|
|
Location: /Autonomy-IM/Case Studies
Date: 2010/6/9
Relevance: 36.83%
Summary: ...Objective HP wanted to update its records management processes and solution to reduce the information population by identifying a process to keep records it needs to and delete the rest at the appropriate time Approach Develop an enhanced electronic records declaration and retention program and use HP...
|
|
Location: /Power/Case Studies/Education
Date: 2008/4/8
Relevance: 36.83%
Summary: ...to help solve any problem, as well as developing the most appropriate uses of the application. This is an ideal example of how companies can benefit through Cardiff’s Channel Program. “The advantage of being a reseller for Cardiff is that we can train a client based on their exact needs,” Baker...
|
|
Location: /Protect/Case Studies/Government
Date: 2012/11/2
Relevance: 36.81%
Summary: ...Connected Backup, TNPA’s users were required to manually save their valuable data, an inefficient and unreliable process that presents risk of data loss if laptops are lost, hard drives fail, or a user inadvertently deletes a file. TNPA needed to ensure that all critical user data was protected at all...
|
|
Location: /Promote/Case Studies/Telecommunications
Date: 2012/7/25
Relevance: 36.52%
Summary: ...Orange Telecom Turns Insight to Action with Speech Analytics - case study. autonomy@autonomy.com Other Offices Autonomy has additional offices in Antwerp, Barcelona, Beijing, Boston, Calgary, Cambridge, Chicago, Dallas, Kuala Lumpur, London, Madrid, Mexico City, Milan, Mountain View, Munich, New York,...
|
|
Location: /Power/Case Studies/Media
Date: 2008/3/14
Relevance: 36.39%
Summary: ...been able to reach the full potential of this company if we did not implement K2,” says Christensen. “It’s as simple as that.” Technical Information Platform Windows NT Content Aggregated Nine million articles from the most important media sources in Denmark and across the world, including nearly...
|
|
Location: /Promote/Case Studies/Government
Date: 2012/7/20
Relevance: 36.34%
Summary: ...Web sites. An online communication strategy focused on making the public website clearer and more comprehensive, providing page authors with writing guidelines that emphasized simple language rather than jargon and acronyms. Additionally, internal positions have been created for content authors and content...
|
|
Location: /Power/Case Studies/Investigative
Date: 2012/8/3
Relevance: 36.02%
Summary: ...handling tools and plans are in place to roll out new solutions in the near future. The success of the initiative has attracted other forces. Humberside, Cheshire, Kent and Staffordshire, for example, have since implemented similar solutions in their regions. 1. Lynx One particular use of Autonomy’s...
|
|
Location: /Power/Case Studies/Government
Date: 2010/7/22
Relevance: 35.91%
Summary: ...Trinity River Authority of Texas - Case Study. POWER PROMOTE PROTECT Trinity River Authority of Texas The Trinity River Authority of Texas uses Autonomy Process Automation to save time and money by reducing paper processes within its HR department. The Trinity River Authority of Texas (TRA) is an independent...
|
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Automatic Hyperlinks provided by IDOL Server 10
|
Location: Power Product Briefs
Date: 2005/1/4
Relevance: 49.33%
Summary: ...duplicated effort as well as identifying experts within the organization. • View results of similar community agents • Copy similar community agents • Send email to owners of similar community agents.
...
|
|
Location: Autonomy Product Briefs
Date: 2012/1/23
Relevance: 47.56%
Summary: ...even over low-bandwidth connections. • SendOnce® eliminates duplicate files by saving each file only once. This patented technology backs up files to a SendOnce pool, preventing identical copies from being stored in multiple user archives. Enterprises avoid the time and expense of storing the same...
|
|
Location: Autonomy Product Briefs
Date: 2011/10/12
Relevance: 46.16%
Summary: ...reduces backup time, minimizes network traffic, decreases the size of stored files, and enables backup even over low-bandwidth connections. SendOnce® eliminates duplicate files by saving each file only once. This patented technology backs up files to a SendOnce pool, preventing identical copies from...
|
|
Location: Power Product Briefs
Date: 2009/6/29
Relevance: 44.29%
Summary: ...Boolean or Proximity operators. Boolean searching includes: • Boolean operators AND, NOT, OR, EOR, XOR • Proximity operators NEAR, DNEAR, WNEAR, BEFORE and AFTER • Bracketed expressions • Query refinement by example • Wildcard search • Query language specification • Result restriction by...
|
|
Location: Power Product Briefs
Date: 2007/8/9
Relevance: 44.04%
Summary: ...knowledge networks overcome situational myopia and bring experts together to establish congruent goals, reducing duplicated effort and increasing productivity. The Challenge In small companies finding an expert can be as easy as asking a question across a desk, but in large enterprises numbers, languages,...
|
|
Location: Protect Product Briefs
Date: 2008/9/30
Relevance: 43.38%
Summary: ...be created using existing documents or records as a sample, training the system to flag any content that is similar in context to the communications that have been created. Aungate Supervisor can detect and exclude false positives generated via disclaimers, embedded tables, ticker symbols or other irrelevant...
|
|
Location: Protect Product Briefs
Date: 2008/9/4
Relevance: 43.36%
Summary: ...ACID solves this problem by alerting content owners instantly as the breach is taking place. While other solutions require manually intensive processes that delay action, ACID offers real-time, fully automatic detection for proactive enforcement. Potential Deterrent-Action Media companies using ACID will...
|
|
Location: Protect Product Briefs
Date: 2009/8/5
Relevance: 42.96%
Summary: ...make significant changes in the systems that they already use. The actions users need to perform are accomplished in a simple, intuitive and high-performance manner, using advanced computing techniques to automate user tasks. Using Meaning Based Computing, the system automatically suggests where a set...
|
|
Location: Protect Product Briefs
Date: 2011/10/11
Relevance: 42.78%
Summary: ...Enterprise Data Capture (EDC), the process of identification of content can be automated, leveraging automatic categorization using the power of IDOL. Through duplicate and near duplicate identification, storage costs are minimized. The asynchronous transfer to the Autonomy compliance store in background...
|
|
Location: Protect Product Briefs
Date: 2011/5/9
Relevance: 42.78%
Summary: ...Enterprise Data Capture (EDC), the process of identification of content can be automated, leveraging automatic categorization using the power of IDOL. Through duplicate and near duplicate identification, storage costs are minimized. The asynchronous transfer to the Autonomy compliance store in background...
|
|
Location: Protect Product Briefs
Date: 2011/11/21
Relevance: 41.57%
Summary: ...related email to be filed to the same WorkSite location without manual effort, and IDOL’s robust analytics learns from users' past filing actions to suggest filing locations and decrease errors. Powerful Organization Tools WorkSite provides powerful tools to keep an attorney’s ever-increasing matter...
|
|
Location: Protect Product Briefs
Date: 2008/9/16
Relevance: 40.59%
Summary: ...Autonomy Virage Command and Control Product Brief. Command and Control automates the capture, encoding and indexing of video surveillance and tags video with relevant data, reducing operational costs and allowing staff to dedicate its efforts to higher level work. Open architecture –compatible with...
|
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Automatic Hyperlinks provided by IDOL Server 10
|
Location: Power White Papers
Date: 2012/3/7
Relevance: 45.23%
Summary: ...remediates” when issues are identified during data and search monitoring. By combining analytical data with standard administrative housekeeping tasks (performed in real-time via sentient components), Dashboard can automatically spawn new aggregation processes to cover identified corpus gaps. For example,...
|
|
Location: Autonomy White Papers
Date: 2010/11/9
Relevance: 45.10%
Summary: ...challenge is to maintain a level of consistency and ensure that if there are similar functions, that terminology accurately reflects the shared activities and that a merging of existing hierarchies doesn’t create duplication or potential overlap. In some cases change management processes will be helpful...
|
|
Location: Power White Papers
Date: 2008/9/16
Relevance: 44.62%
Summary: ...suggest people of similar interest when a user performs a search. IDOL’s meaning-based approach applies across all SharePoint sites and even across languages, reducing duplicate effort and encouraging collaboration. • • • • • • • • 10 Autonomy’s Advanced Search and Scalability Solutions...
|
|
Location: Power White Papers
Date: 2007/7/25
Relevance: 44.28%
Summary: ...Autonomy User Experience White Paper. • Boost efficiency • Increase productivity while at the same time cutting costs • Avoid duplication of effort • Keep employees informed and up-to-date • Reduce the cost of maintaining unstructured information within any environment • Reduce the time taken...
|
|
Location: Power White Papers
Date: 2009/9/29
Relevance: 44.12%
Summary: ...Autonomy Technology Overview. Legal Search In order to scale without impeding performance, some technologies fail to search each document in its entirety. This prevents users from retrieving valuable information and it exposes the enterprise to significant compliance risk. Such technologies begin to calculate...
|
|
Location: Protect White Papers
Date: 2011/11/25
Relevance: 43.98%
Summary: ...the data at hand. With conceptual search at the foundation of information access technology, enterprises can conduct content-based archiving and legal hold, as well as perform exact and near de-duplication in legal applications. IDOL is able to perform these evaluations with surprisingly little overhead...
|
|
Location: Protect White Papers
Date: 2012/7/31
Relevance: 43.72%
Summary: ...due to privilege, work product or another exception. Courts are already grappling with the revisions to the federal rules relating to electronically stored information, but it is clear that judges will not condone a law firm’s actions when the law firm could have easily, with little effort, retained...
|
|
Location: Protect White Papers
Date: 2006/9/26
Relevance: 43.40%
Summary: ...the deletion action by preserving at least the date of deletion, the preservation criteria, and the identities of authorizing entities. 2.) Know what data you have and in which format it exists. Rule 26(f) requires the parties to meet and discuss issues regarding the disclosure or discovery of electronically...
|
|
Location: Autonomy White Papers
Date: 2011/9/7
Relevance: 43.23%
Summary: ...to disk or tape media. Restore operations can be performed to any point in time. Backup windows are decreased, and recovery operations take less time and effort. Data Protector supports Microsoft SQL 2000, 2005, and 2008. Data Protector uses VSS, SQL API, and intuitive wizards for simpler configuration,...
|
|
Location: Protect White Papers
Date: 2008/5/19
Relevance: 42.79%
Summary: ...while minimizing cost and complexity. attorneys are often unable to fnd and re-use materials from similar past matters. Knowledge management suffers greatly, and duplication of effort becomes the norm as past work is recreated time and again. The silo content environment described earlier requires attorneys...
|
|
Location: Autonomy White Papers
Date: 2011/8/17
Relevance: 42.17%
Summary: ...In contrast, providers of cloud data protection services allow businesses to automatically assign the appropriate retention period to different types of data, reducing error in meeting compliance regulations. Services with historical catalogs allow organizations with minimal technical staff to meet discovery...
|
|
Location: Power White Papers
Date: 2003/10/3
Relevance: 42.16%
Summary: ...powerful retrieval features, including natural language, conceptual search, refine by example, crosslanguage search and query by example. Autonomy also supports legacy retrieval mechanisms, such as keyword, Boolean, Proximity, Exact Phrase, Soundex and many others etc. ? Active matching Proactively link...
|
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
Automatic Hyperlinks provided by IDOL Server 10
This is a small selection of the Autonomy press releases available, please visit the news section on www.autonomy.com for the latest news.
Automatic Hyperlinks provided by IDOL Server 10
This is a small selection of the Autonomy press releases available, please visit the news section on www.autonomy.com for the latest news.
Automatic Hyperlinks provided by IDOL Server 10
This is a small selection of the Autonomy press releases available, please visit the news section on www.autonomy.com for the latest news.
Automatic Hyperlinks provided by IDOL Server 10
| Functionality |
![]()
|
IDOL Eduction | | | Content Rationalization | | | Social Technologies |
![]()
|



















































RSS Feeds
Find us on Facebook
Follow us on Twitter
See us on YouTube
Find us on LinkedIn







