Enterprises that have embraced "socialware" have benefited from the enthusiastic wave of information creation as well as the connection it engenders between disparate members of the enterprise community. Unfortunately, social methods also have critical flaws in an enterprise context:
User-generated content and manual tags are subjective and privy to personal habits that can be exploited at the expense of accurate and reliable information. Tag spamming, in which people label their information inaccurately in order to generate interest, can also become an issue.
Their form of classification is too wild and unpredictable to deliver a stable and accessible taxonomy.
Not enough distinction is made between contributions from experts and thoughts from amateur enthusiasts who volunteer information beyond their expertise.
Granting editing access to a large number of employees on internal wikis invites greater potential for security breaches.
Social methods inherently require manual effort for creation and maintenance.
"The biggest challenge in the information society is the fact that we are drowning in information. With Autonomy we can save time and costs that we used to spend on maintenance and information retrieval. Additionally we can support our users with personalized interfaces. When we trialled Autonomy we had already chosen a more traditional keywordbased technology, but Autonomy changed our mindset."
Peter Rasmussen, Danske Bank
Ultimately, the enterprise has much to gain when social methods can be automated. Autonomy's IDOL platform incorporates a range of unique functions to automate and enhance social networking tools, automatically generating comprehensive user profiles, recommending appropriate tags and generating hyperlinks to related material. Autonomy can also monitor the evolution of content to alert management to vandalism and automatically repair damaged articles. At every stage, authorized administrators are able to modify entries and settings by a comprehensive range of parameters, delivering full control. In short, Autonomy's holistic approach provides all the benefits of social methods, but also negates the pitfalls of intensive maintenance and user bias.
Summary: ...N.A. was very wary of applying any significant patches to the Oracle E-Business suite. The Tupperware IT department has benefited because it has one less major application modification to support. In addition, Tupperware N.A. will save in ongoing development and maintenance costs. Company profile Tupperware...
Summary: ...However, database operating performance has been gradually worsening. At this point, the importance of database archiving is evident, as it can provide stable database performance while maintaining a mostly unchanged online database scale, thereby ensuring efficient and stable running of systems. Since...
Summary: ...shops. It is rumored that their store in San Rafael was home to some of the first mountain bikes in the country. Today, Mike's Bikes is part of a growing family of local bike shops, all with a singular purpose: to get as many people on bikes as possible. They locally own and operate eight wildly successful...
Summary: ...to bid on survey processing projects from other universities and local, state and national government agencies, essentially acting as a service bureau. “We’ve expanded the scope of operation and have been able to inherently increase business coming into the center,” said Stagg. “TeleForm has allowed...
Summary: ...across London • Improves timeliness and relevance of Community Impact Assessment reports “To be able to now monitor sentiment, respond to messages, and reply on a London-wide or national scale is of tremendous beneft. Just in terms of resources saved scanning papers, Internet, and other social media...
Summary: ...ensuring joined-up intelligence on search criteria/topics across London • Improves timeliness and relevance of Community Impact Assessment reports “To be able to now monitor sentiment, response to messages and reply on a London-wide or national scale is of tremendous beneft. Just in terms of resources...
Summary: ...Estate, BAE Sy Lloyds Banking Group, The Nuclear Decommissioning Auth and FirstGroup. Burges Salmon is based at a single sit Bristol and aims to be the first choice law firm for staff seeking a real alternative to City firms. Their rep winning challenging “City quality” work allows Burges Sa to attract...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...paper documents) by subject matter into automatically created, matter-specific concept folders based on a sophisticated statistical analysis of their content. Irrelevant documents such as spam emails or IT memos can be easily segregated and triaged.
...
Summary: ...simplifies filing for busy professionals Capture client email communications as they are sent and received Benefits · Increased productivity – Business users can file emails in the proper location with a single click, encouraging adoption with ease of use. Emails marked with a WorkSite luggage tag...
Summary: ...Autonomy iManage Email Management for Outlook - Autonomy Product Brief. At the same time, the solution allows the entire document management repository to be exposed to users as a navigable set of engagement-based folders. Emails can be easily be tagged or dragged and dropped directly into the repository...
Summary: ...Deliver personalized customer experiences and drive revenue. You can successfully engage customers who are now more sophisticated, social, unpredictable, and as unique as their email addresses. Instead of relying on approaches that are not suited for the fast-paced digital marketplace, you can now rely...
Summary: ...Autonomy Explore - Product brief. Autonomy augments the value of these data sources by finding the unpredicted relationships, trends, sentiments, and issues that develop in real time. Further, data from customer conversations in social media networks or call centers can be mined dynamically for the underlying...
Summary: ...based on news, social media or industryspecific data sources, without relying on manual tagging or keywords. Inside the enterprise, IUS can search intranets, wikis, email stores, SharePoint sites and content management systems for specific information or for experts who may be working on similar projects....
Summary: ...extracts key concepts found in rich media and automates critical processes such as meta-tagging and categorizing. Instead of depending on people to spend valuable time tagging these assets, which can produce subjective, inconsistent results, MediaBin delves deep within the audio and video file itself...
Summary: ...and eCommerce Autonomy extranet search and ecommerce solutions 2 Brochure Autonomy extranet search and ecommerce solutions Provide real-time access to more information Almost every organization today is drowning in data. Most firms are doubling their data intake every 90 days, with the vast majority of...
Summary: ...across repositories to minimize storage costs and reduce discovery times ControlPoint Automatic Categorization – No User Involvement Needed Categorization is critical to the application of policies. Whereas traditional collaboration and ECM systems rely upon users to categorize and tag information on...
Summary: ...across repositories to minimize storage costs and reduce discovery times ControlPoint Automatic Categorization – No User Involvement Needed Categorization is critical to the application of policies. Whereas traditional collaboration and ECM systems rely upon users to categorize and tag information on...
Summary: ...negative sentiment. But the problem is that people’s reviews are often complex and multifaceted. They have mixed feelings, for instance, a harsh criticism can contain appreciation for one aspect of the product. Or unabashed admiration can include nit-picking of a flaw. Unfortunately, these subtleties...
Summary: ...initiation time from weeks to hours • REDUCE abandonment rates • IMPROVE client satisfaction and retention • STANDARDS based through support of NAVA Straight-Through Processing Initiative • TRANSPARENT compliance with regulatory standards Pitfalls with Alternative Approaches • PAPER-INTENSIVE...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...False-positives are items incorrectly flagged as suspicious, reducing valuable time available to investigate truly suspicious activities. Lexicon- and keyword-based monitoring methods are inherently flawed in that they only catch a percentage of the actual incriminating communications that have taken...
Summary: ...as easily as text. Retrieval is based on an approach that analyzes the incorporated audio stream together with image recognition technology rather than on the output of a flawed transcript or imprecisely applied data labels. Advanced Operations IDOL provides an abundance of advanced operations to be performed...
Summary: ...Transitioning to a new Era of Human Information. If the question is whether to take the time to create accurate metadata, or finish it quickly and spend time creating a new marketing program, which would you choose? How should I tag this file? Another shortfall of metadata is the high instance of spelling,...
Summary: ...content. Without relying on tags or keywords, Universal Search automatically identifies information and delivers alerts based on news, social media, or industry-specific data sources. Inside the enterprise, Universal Search can search intranets, wikis, SharePoint and applications for specific information...
Summary: ...neatly into the rows and columns of a traditional database. In fact, old-style, survey-centric VoC projects have always been designed around the capabilities of the relational database. Net Promoter or customer satisfaction scores are two common examples. However, there’s a fatal flaw in relying on...
Summary: ...desktop search that upholds the existing security infrastructure of the enterprise, while not compromising the performance or accuracy of information delivery. An additional flaw with some desktop search technologies is that by default (and very difficult to stop) they ‘phone home’ even in straight...
Summary: ...analyzing it so difficult,” Malden observes. “How do you derive meaning from information that’s as disparate and unpredictable as the people creating it?” Needless Risks and Missed Opportunities Unfortunately, that’s a question few big data solutions can answer well at present. “Most legacy...
Summary: ...and connectors to external systems, are managed through a modular server architecture, and share a common security metaphor. Security, user administration and maintenance are thus simpler, more efficient, less error-prone and less costly, with no duplication of content or effort. Matter centric collaboration...
Summary: ...archive serves as the anchor to mission critical solutions for eDiscovery, records management, risk mitigation, and information management. Autonomy Consolidated Archive (ACA) – Greater awareness about the pitfalls of legacy archiving methods are changing the mindset that archives should exist as standalone,...
Summary: ...The charge for cloud backup is a known monthly service fee, rather than the capital cost of acquiring software licenses for specific servers, which allows for simpler budgeting and predictable monthly costs. There are no costs for software, backup hardware, maintenance, or media with cloud backup. The...
Summary: ...three years. Premature deletion of messages, especially e-mail, can put a company in jeopardy of violating regulations; this type of standardization can save both regulatory pain and provide substantial cost savings. Having systems in place that perform this record maintenance for you is a major advantage;...
Summary: ...When a search result is generated, the product enables the team to rapidly review the information without launching native applications. Reviewers can subject documents to a litigation hold to prevent their deletion from the archive, and can attach one or more tags to indicate their status relative to...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2013 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2012 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2011 at the moment, please visit the news section on www.autonomy.com for the latest news.