Enterprises that have embraced "socialware" have benefited from the enthusiastic wave of information creation as well as the connection it engenders between disparate members of the enterprise community. Unfortunately, social methods also have critical flaws in an enterprise context:
User-generated content and manual tags are subjective and privy to personal habits that can be exploited at the expense of accurate and reliable information. Tag spamming, in which people label their information inaccurately in order to generate interest, can also become an issue.
Their form of classification is too wild and unpredictable to deliver a stable and accessible taxonomy.
Not enough distinction is made between contributions from experts and thoughts from amateur enthusiasts who volunteer information beyond their expertise.
Granting editing access to a large number of employees on internal wikis invites greater potential for security breaches.
Social methods inherently require manual effort for creation and maintenance.
"The biggest challenge in the information society is the fact that we are drowning in information. With Autonomy we can save time and costs that we used to spend on maintenance and information retrieval. Additionally we can support our users with personalized interfaces. When we trialled Autonomy we had already chosen a more traditional keywordbased technology, but Autonomy changed our mindset."
Peter Rasmussen, Danske Bank
Ultimately, the enterprise has much to gain when social methods can be automated. Autonomy's IDOL platform incorporates a range of unique functions to automate and enhance social networking tools, automatically generating comprehensive user profiles, recommending appropriate tags and generating hyperlinks to related material. Autonomy can also monitor the evolution of content to alert management to vandalism and automatically repair damaged articles. At every stage, authorized administrators are able to modify entries and settings by a comprehensive range of parameters, delivering full control. In short, Autonomy's holistic approach provides all the benefits of social methods, but also negates the pitfalls of intensive maintenance and user bias.
Summary: ...it installed one or two PCs with a copy of TeleForm and a midrange Canon DR 3020 Scanner to capture the form image. Now, after each session, all forms are scanned and read by TeleForm. For MOD, the benefits have been excellent. It needed a low maintenance solution for this large national effort, but it...
Summary: ...N.A. was very wary of applying any significant patches to the Oracle E-Business suite. The Tupperware IT department has benefited because it has one less major application modification to support. In addition, Tupperware N.A. will save in ongoing development and maintenance costs. Company profile Tupperware...
Summary: ...shops. It is rumored that their store in San Rafael was home to some of the first mountain bikes in the country. Today, Mike's Bikes is part of a growing family of local bike shops, all with a singular purpose: to get as many people on bikes as possible. They locally own and operate eight wildly successful...
Summary: ...However, database operating performance has been gradually worsening. At this point, the importance of database archiving is evident, as it can provide stable database performance while maintaining a mostly unchanged online database scale, thereby ensuring efficient and stable running of systems. Since...
Summary: ...n Unstable, unreliable legacy DM system n Inability to conduct efficient full-text searches of current and past matters n Labor-intensive manual filing due to lack of integrated e-mail management Benefts of Using Interwoven n A highly stable, low-maintenance DM solution comparable to those used by much...
Summary: ...selection enables users to easily sort content by selecting pre-set parameters, then perform a full-text search to accelerate discovery. For example, in the case of a business intelligence task at KPMG LLP (UK), structured parameters like industry, geography, services, and competitors can be selected....
Summary: ...center in the disaster area has access to this information and can follow up on the inquiry. Because disasters are intermittent and of varying scale, the Red Cross relies to some extent on volunteers rather than a full-time staff to enter the data into the database. Unfortunately, the number of volunteers...
Summary: ...projects from other universities and local, state and national government agencies, essentially acting as a service bureau. “We’ve expanded the scope of operation and have been able to inherently increase business coming into the center,” said Stagg. “TeleForm has allowed us to be cost effective,...
Summary: ...Linklaters has a dedicated team at its London headquarters to probe all new deals that the firm works on around the world, looking specifically for legal and commercial conflicts. “Legal conflicts of interest arise if we are instructed in breach of professional rules. For example if we are asked to...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...paper documents) by subject matter into automatically created, matter-specific concept folders based on a sophisticated statistical analysis of their content. Irrelevant documents such as spam emails or IT memos can be easily segregated and triaged.
...
Summary: ...breaches may not represent a pattern to authorities but to the advanced software that mines and analyzes audio, video and text fi les, they do. By instantly connecting the dots of each of the security breaches as they surface on the network, the software reveals that all four individuals share the same...
Summary: ...simplifies filing for busy professionals Capture client email communications as they are sent and received Benefits · Increased productivity – Business users can file emails in the proper location with a single click, encouraging adoption with ease of use. Emails marked with a WorkSite luggage tag...
Summary: ...Autonomy iManage Email Management for Outlook - Autonomy Product Brief. At the same time, the solution allows the entire document management repository to be exposed to users as a navigable set of engagement-based folders. Emails can be easily be tagged or dragged and dropped directly into the repository...
Summary: ...that is capable of capturing the complete spectrum of human information including gestures, tone and facial expressions. By its nature, video carries more meaning than can be narrowed down into a few lines of text. Because it requires a considerable number of hours to tag this type of content, many rich...
Summary: ...found in rich media and automates critical processes such as meta-tagging and categorizing. Instead of depending on people to spend valuable time tagging these assets, which can produce subjective, inconsistent results, MediaBin delves deep within the audio and video file itself to provide a highly-detailed,...
Summary: ...ranking Social search Multichannel delivery Link gap analysis Summarization Multivariate testing Reputation analysis Automatic query guidance 400+ Connectors 3 Automate your key tasks Finding and repurposing every image, video, and audio file requires generating tags and metadata—a laborious and time-consuming...
Summary: ...across repositories to minimize storage costs and reduce discovery times ControlPoint Automatic Categorization – No User Involvement Needed Categorization is critical to the application of policies. Whereas traditional collaboration and ECM systems rely upon users to categorize and tag information on...
Summary: ...across repositories to minimize storage costs and reduce discovery times ControlPoint Automatic Categorization – No User Involvement Needed Categorization is critical to the application of policies. Whereas traditional collaboration and ECM systems rely upon users to categorize and tag information on...
Summary: ...initiation time from weeks to hours • REDUCE abandonment rates • IMPROVE client satisfaction and retention • STANDARDS based through support of NAVA Straight-Through Processing Initiative • TRANSPARENT compliance with regulatory standards Pitfalls with Alternative Approaches • PAPER-INTENSIVE...
Summary: ...or without recursion) • Filtering of content based on file extensions and dates • Filtering based on field name/ value pairs using wildcards, negation and case-(in)sensitivity • HTML rendering of various data formats • Batch processing • Import parameters compatible with any other Autonomy indexing...
Summary: ...Aungate Real-Time Policy Supervisor. Both of these approaches are inherently limited in that they only catch a percentage of the actual incriminating communications taking place within the organization and, in the case of lexicon filters, often result in many false positive results that can greatly lengthen...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...False-positives are items incorrectly flagged as suspicious, reducing valuable time available to investigate truly suspicious activities. Lexicon- and keyword-based monitoring methods are inherently flawed in that they only catch a percentage of the actual incriminating communications that have taken...
Summary: ...as easily as text. Retrieval is based on an approach that analyzes the incorporated audio stream together with image recognition technology rather than on the output of a flawed transcript or imprecisely applied data labels. Advanced Operations IDOL provides an abundance of advanced operations to be performed...
Summary: ...takes information availability to the next level by allowing workers to find relevant business concepts, entities, and experts contained in all types of human information, including documents, email, audio and video files, and social media content. Without relying on tags or keywords, Universal Search...
Summary: ...of a traditional database. In fact, old-style, survey-centric VoC projects have always been designed around the capabilities of the relational database. Net Promoter or customer satisfaction scores are two common examples. However, there’s a fatal flaw in relying on the structured data alone. The structured...
Summary: ...desktop search that upholds the existing security infrastructure of the enterprise, while not compromising the performance or accuracy of information delivery. An additional flaw with some desktop search technologies is that by default (and very difficult to stop) they ‘phone home’ even in straight...
Summary: ...analyzing it so difficult,” Malden observes. “How do you derive meaning from information that’s as disparate and unpredictable as the people creating it?” Needless Risks and Missed Opportunities Unfortunately, that’s a question few big data solutions can answer well at present. “Most legacy...
Summary: ...and connectors to external systems, are managed through a modular server architecture, and share a common security metaphor. Security, user administration and maintenance are thus simpler, more efficient, less error-prone and less costly, with no duplication of content or effort. Matter centric collaboration...
Summary: ...trends to mitigate debt recovery and collections and minimize financial loss • Improves talk times, revenue, and customer satisfaction • Increases productivity by more than 15% • Immediately retrieves calls for FSA and HIPAA compliance Investment Bank: Audio eDiscovery • Reviews, tags, and redacts...
Summary: ...archive serves as the anchor to mission critical solutions for eDiscovery, records management, risk mitigation, and information management. Autonomy Consolidated Archive (ACA) – Greater awareness about the pitfalls of legacy archiving methods are changing the mindset that archives should exist as standalone,...
Summary: ...that favors both high and low IQs. It is human nature to emphasize what one does well and de-emphasize what one does not. When determining how to tag and rank information, it will always be the metadata that fits the users metrics of what to emphasize that will get tagged, which may not be representative...
Summary: ...When a search result is generated, the product enables the team to rapidly review the information without launching native applications. Reviewers can subject documents to a litigation hold to prevent their deletion from the archive, and can attach one or more tags to indicate their status relative to...
Summary: ...in a reasonable time-scale, an even more challenging process. The great paradox about XML is that the more tags you have defined, the more accurate and precise your application will be. However, the more tags you have means the more subjective choices your taggers will have to make and therefore the more...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2012 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2011 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2010 at the moment, please visit the news section on www.autonomy.com for the latest news.