Enterprises that have embraced "socialware" have benefited from the enthusiastic wave of information creation as well as the connection it engenders between disparate members of the enterprise community. Unfortunately, social methods also have critical flaws in an enterprise context:
User-generated content and manual tags are subjective and privy to personal habits that can be exploited at the expense of accurate and reliable information. Tag spamming, in which people label their information inaccurately in order to generate interest, can also become an issue.
Their form of classification is too wild and unpredictable to deliver a stable and accessible taxonomy.
Not enough distinction is made between contributions from experts and thoughts from amateur enthusiasts who volunteer information beyond their expertise.
Granting editing access to a large number of employees on internal wikis invites greater potential for security breaches.
Social methods inherently require manual effort for creation and maintenance.
"The biggest challenge in the information society is the fact that we are drowning in information. With Autonomy we can save time and costs that we used to spend on maintenance and information retrieval. Additionally we can support our users with personalized interfaces. When we trialled Autonomy we had already chosen a more traditional keywordbased technology, but Autonomy changed our mindset."
Peter Rasmussen, Danske Bank
Ultimately, the enterprise has much to gain when social methods can be automated. Autonomy's IDOL platform incorporates a range of unique functions to automate and enhance social networking tools, automatically generating comprehensive user profiles, recommending appropriate tags and generating hyperlinks to related material. Autonomy can also monitor the evolution of content to alert management to vandalism and automatically repair damaged articles. At every stage, authorized administrators are able to modify entries and settings by a comprehensive range of parameters, delivering full control. In short, Autonomy's holistic approach provides all the benefits of social methods, but also negates the pitfalls of intensive maintenance and user bias.
Summary: ...it installed one or two PCs with a copy of TeleForm and a midrange Canon DR 3020 Scanner to capture the form image. Now, after each session, all forms are scanned and read by TeleForm. For MOD, the benefits have been excellent. It needed a low maintenance solution for this large national effort, but it...
Summary: ...N.A. was very wary of applying any significant patches to the Oracle E-Business suite. The Tupperware IT department has benefited because it has one less major application modification to support. In addition, Tupperware N.A. will save in ongoing development and maintenance costs. Company profile Tupperware...
Summary: ...However, database operating performance has been gradually worsening. At this point, the importance of database archiving is evident, as it can provide stable database performance while maintaining a mostly unchanged online database scale, thereby ensuring efficient and stable running of systems. Since...
Summary: ...shops. It is rumored that their store in San Rafael was home to some of the first mountain bikes in the country. Today, Mike's Bikes is part of a growing family of local bike shops, all with a singular purpose: to get as many people on bikes as possible. They locally own and operate eight wildly successful...
Summary: ...selection enables users to easily sort content by selecting pre-set parameters, then perform a full-text search to accelerate discovery. For example, in the case of a business intelligence task at KPMG LLP (UK), structured parameters like industry, geography, services, and competitors can be selected....
Summary: ...center in the disaster area has access to this information and can follow up on the inquiry. Because disasters are intermittent and of varying scale, the Red Cross relies to some extent on volunteers rather than a full-time staff to enter the data into the database. Unfortunately, the number of volunteers...
Summary: ...projects from other universities and local, state and national government agencies, essentially acting as a service bureau. “We’ve expanded the scope of operation and have been able to inherently increase business coming into the center,” said Stagg. “TeleForm has allowed us to be cost effective,...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...paper documents) by subject matter into automatically created, matter-specific concept folders based on a sophisticated statistical analysis of their content. Irrelevant documents such as spam emails or IT memos can be easily segregated and triaged.
...
Summary: ...breaches may not represent a pattern to authorities but to the advanced software that mines and analyzes audio, video and text fi les, they do. By instantly connecting the dots of each of the security breaches as they surface on the network, the software reveals that all four individuals share the same...
Summary: ...Autonomy Explore - Product brief. Autonomy augments the value of these data sources by finding the unpredicted relationships, trends, sentiments, and issues that develop in real time. Further, data from customer conversations in social media networks or call centers can be mined dynamically for the underlying...
Summary: ...simplifies filing for busy professionals Capture client email communications as they are sent and received Benefits · Increased productivity – Business users can file emails in the proper location with a single click, encouraging adoption with ease of use. Emails marked with a WorkSite luggage tag...
Summary: ...Autonomy iManage Email Management for Outlook - Autonomy Product Brief. At the same time, the solution allows the entire document management repository to be exposed to users as a navigable set of engagement-based folders. Emails can be easily be tagged or dragged and dropped directly into the repository...
Summary: ...based on news, social media or industryspecific data sources, without relying on manual tagging or keywords. Inside the enterprise, IUS can search intranets, wikis, email stores, SharePoint sites and content management systems for specific information or for experts who may be working on similar projects....
Summary: ...found in rich media and automates critical processes such as meta-tagging and categorizing. Instead of depending on people to spend valuable time tagging these assets, which can produce subjective, inconsistent results, MediaBin delves deep within the audio and video file itself to provide a highly-detailed,...
Summary: ...ranking Social search Multichannel delivery Link gap analysis Summarization Multivariate testing Reputation analysis Automatic query guidance 400+ Connectors 3 Automate your key tasks Finding and repurposing every image, video, and audio file requires generating tags and metadata—a laborious and time-consuming...
Summary: ...across repositories to minimize storage costs and reduce discovery times ControlPoint Automatic Categorization – No User Involvement Needed Categorization is critical to the application of policies. Whereas traditional collaboration and ECM systems rely upon users to categorize and tag information on...
Summary: ...across repositories to minimize storage costs and reduce discovery times ControlPoint Automatic Categorization – No User Involvement Needed Categorization is critical to the application of policies. Whereas traditional collaboration and ECM systems rely upon users to categorize and tag information on...
Summary: ...initiation time from weeks to hours • REDUCE abandonment rates • IMPROVE client satisfaction and retention • STANDARDS based through support of NAVA Straight-Through Processing Initiative • TRANSPARENT compliance with regulatory standards Pitfalls with Alternative Approaches • PAPER-INTENSIVE...
Summary: ...or without recursion) • Filtering of content based on file extensions and dates • Filtering based on field name/ value pairs using wildcards, negation and case-(in)sensitivity • HTML rendering of various data formats • Batch processing • Import parameters compatible with any other Autonomy indexing...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...False-positives are items incorrectly flagged as suspicious, reducing valuable time available to investigate truly suspicious activities. Lexicon- and keyword-based monitoring methods are inherently flawed in that they only catch a percentage of the actual incriminating communications that have taken...
Summary: ...as easily as text. Retrieval is based on an approach that analyzes the incorporated audio stream together with image recognition technology rather than on the output of a flawed transcript or imprecisely applied data labels. Advanced Operations IDOL provides an abundance of advanced operations to be performed...
Summary: ...Transitioning to a new Era of Human Information. If the question is whether to take the time to create accurate metadata, or finish it quickly and spend time creating a new marketing program, which would you choose? How should I tag this file? Another shortfall of metadata is the high instance of spelling,...
Summary: ...takes information availability to the next level by allowing workers to find relevant business concepts, entities, and experts contained in all types of human information, including documents, email, audio and video files, and social media content. Without relying on tags or keywords, Universal Search...
Summary: ...neatly into the rows and columns of a traditional database. In fact, old-style, survey-centric VoC projects have always been designed around the capabilities of the relational database. Net Promoter or customer satisfaction scores are two common examples. However, there’s a fatal flaw in relying on...
Summary: ...analyzing it so difficult,” Malden observes. “How do you derive meaning from information that’s as disparate and unpredictable as the people creating it?” Needless Risks and Missed Opportunities Unfortunately, that’s a question few big data solutions can answer well at present. “Most legacy...
Summary: ...desktop search that upholds the existing security infrastructure of the enterprise, while not compromising the performance or accuracy of information delivery. An additional flaw with some desktop search technologies is that by default (and very difficult to stop) they ‘phone home’ even in straight...
Summary: ...and connectors to external systems, are managed through a modular server architecture, and share a common security metaphor. Security, user administration and maintenance are thus simpler, more efficient, less error-prone and less costly, with no duplication of content or effort. Matter centric collaboration...
Summary: ...trends to mitigate debt recovery and collections and minimize financial loss • Improves talk times, revenue, and customer satisfaction • Increases productivity by more than 15% • Immediately retrieves calls for FSA and HIPAA compliance Investment Bank: Audio eDiscovery • Reviews, tags, and redacts...
Summary: ...archive serves as the anchor to mission critical solutions for eDiscovery, records management, risk mitigation, and information management. Autonomy Consolidated Archive (ACA) – Greater awareness about the pitfalls of legacy archiving methods are changing the mindset that archives should exist as standalone,...
Summary: ...When a search result is generated, the product enables the team to rapidly review the information without launching native applications. Reviewers can subject documents to a litigation hold to prevent their deletion from the archive, and can attach one or more tags to indicate their status relative to...
Summary: ...failing or merging at unprecedented rates and governments and regulators responding with financial support packages. The crisis has led to the failure of respected institutions that survived both World Wars and the Great Depression and has seen financially stable institutions acquire others at fire-sale...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2013 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2012 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2011 at the moment, please visit the news section on www.autonomy.com for the latest news.