Autonomy and NEXOR Deliver Automated Corporate EMail Routing
April 20, 1999 - Autonomy, the leading provider of knowledge management solutions, and NEXOR, the innovative supplier of electronic messaging products, have formed a technology partnership to provide an automated solution to the growing problem of corporate email routing. Due for launch in June, the solution will provide a context sensitive email routing and distribution system, specifically developed to cope with the escalating quantities of unsolicited and generically addressed emails.
By using Autonomy's advanced pattern recognition technology, emails and their attachments can be automatically categorised and distributed to the relevant department or person without manual intervention. This saves time and money whilst increasing responsiveness. "The sheer volume of unsolicited and generically addressed emails is causing corporate email chaos" said Dominic Johnson, Marketing Director at Autonomy. "The partnership between Autonomy and NEXOR is a major step towards solving such an important problem."
At the heart of this technology is the ability to analyse a message or document and identify the context. The software then determines how the message should be categorised, who should see it and what other material it should be linked to. NEXOR systems ensure secure and reliable delivery of the message to the appropriate point in the organization.
Steve Kingan, Chief Executive of NEXOR, said, "This partnership enables NEXOR to build on our successes and expertise, in providing secure messaging solutions to deliver real business benefits to organizations requiring reliable and cost effective, automated email routing".
Email is rapidly becoming the business medium that companies rely on for its speedy delivery of news and information. However, the increasing volume of generically addressed emails received each day represents a major cost-burden and efficiency drain, especially in the areas of customer service, help desks, corporate affairs or investor relations. The need for a reliable system that delivers each message to the correct part of an organization is essential to an organization's success. The Autonomy and NEXOR solution will ensure that important messages go to the right place and employees don't waste resources chasing mis-routed information. Other benefits include filtering of unsolicited emails prior to them entering the organization and potentially can be used for automated response to emails.
About Autonomy:
Autonomy (www.autonomy.com) develops software that automatically organizes large, unstructured volumes of information into personally relevant communications to help corporate Intranets and commercial websites serve the changing needs and interests of users. Autonomy's products for knowledge management and new media publishing save time, labour and money by automatically and precisely categorising, linking, personalising and searching large volumes of information.
The intelligent pattern recognition technology that fuels Autonomy's software was originally developed by Autonomy's sister company, Neurodynamics, for use in intelligence and defence applications. That technology is at the heart of the British police force's Holmes2 system, named after Sir Arthur Conan Doyle's legendary detective. The Holmes2 system helps the police solve crimes by matching fingerprints or by finding similarities and connections in disparate crime witness statements or police reports. The same technology is now being used to find connections in commercial data.
About NEXOR
Formed in 1990, NEXOR, a premier defence messaging provider, delivers mission-critical solutions to business and government organizations demanding a robust, secure and scaleable messaging infrastructure. NEXOR's range of high-performance messaging and directory products meets the industry standards and conformance criteria demanded by the US and Canadian defence forces and the UK Ministry of Defence as well as similar high profile organizations. NEXOR products are used as the reference platform against which other standards-based products are measured by the UK's National Computing Centre in Manchester and the US Department of Defense, Joint Interoperability Test Center. More information on NEXOR can be found at the NEXOR website located at http://www.nexor.com/.
For more information, please contact:
Dominic Johnson
Autonomy Corporation plc
(415) 243-9955
Summary: ...witnesses and quickly spreading news updates on incidents • Speeds the analysis of social media trends, improving allocation of appropriate resources, saving time and money • Identifies new, key influencers in the community along with early identification of potential issues and a gauge of community...
Summary: ...usefulness to live operations, identifying witnesses and quickly spreading news updates on incidents • Speeds the analysis of social media trends, improving allocation of appropriate resources, saving time and money • Identifies new, key influencers in the community along with early identification...
Summary: ...15489 and the European MoReq standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • • • • • • • • • • •
...
Summary: ...is the UK's leading media intelligence provider, servicing major organisations across the corporate, consumer, financial, charity and government sectors, including over 75% of the FTSE 100, most major government departments and agencies and over 100 of the UK’s top 150 Public Relations agencies. Precise...
Summary: ...University streamlines the grant application process with Autonomy Process Automation. There’s now less time chasing approvals and more time writing competitive proposals. Like most academic institutions, grants are vital to the financial health of Iowa State University (ISU). Not only does grant money...
Summary: ...directly employing over 9,600 people through its national network of retail, processing and delivery centres. 2 Case study | An Post The challenge An Post’s parcel delivery division had a requirement to process POD (proof of delivery) cards for its customers. When a customer required a signature to...
Summary: ...enable affiliates to rapidly distribute fresh dynamic content. Sun Oracle hardware provides the AHA with the reliability, scalability, and security it requires using Sun servers and storage system running on the Solaris® operating system as well as the Sun Directory Server, Sun Web Server and Sun Messaging...
Summary: ...made it difficult to achieve the high level of personalization required for such an important purchasing decision and the marketing agility demanded by the highly competitive auto market. As the Internet grew into a primary marketing medium for Chrysler Group, it became increasingly urgent to address...
Summary: ...Toshiba - Case Study. PROMOTE POWER PROTECT Toshiba Realizes Huge Cost Savings Through Autonomy Toshiba America Business Solutions Inc. (TABS) is an independent division of Toshiba Corporation, the 5th largest electronics/electrical equipment company in the world. For more than twenty years, Toshiba has...
Summary: ...Japanese pharmaceutical giant chooses HP TRIM. As a major multinational organisation, our corporate language is English.” 2 “We now have no concerns whatsoever about archive inspections as we know all our mission-critical data is safe in a fully compliant records management system.“ Steven van der...
Summary: ...through search. We want to guarantee that everyone is getting the same message and communication across the entire lifecycle.” Enabling Employees and Partners to Speak with One Voice Rodgers explained that in order to solve their communication and brand challenges, Avaya’s marketing and IT teams had...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...increasing review speeds by more than 300 percent over traditional legacy methods. Introspect enables an efficient, nonlinear review and utilizes IDOL's patented concept-based pattern recognition technology for Meaning Based Coding. IDOL learns how reviewers tag documents and automatically suggests coding...
Summary: ...Autonomy Message Manager easily integrates and scales with our messaging environment, reducing storage costs and saving time for users and administrators.” Paul Cattafi, Sr. Systems Administrator, Hill International, Inc. Delivery Approach Autonomy Message Manager can be deployed on-premise or as a...
Summary: ...Microsoft Exchange and Lotus Notes and natively supports all types of Instant Messaging and Bloomberg, including Bloomberg Internet Messages, Blackberry pin-to-pin messages, Terminal Messages and Persistent Chats. The Real-Time Policy Supervisor module is also the only solution available that offers the...
Summary: ...recognized as the market leader in information access, and automation of documentation, processes and counterparty messaging for middle and back office operations in the capital markets. Autonomy GCM enables financial institutions to adapt to the increasingly complex workflow needs of middle and back...
Summary: ...Autonomy KeyView IDOL - Product Brief. Messaging Domino XML Language (.dxl) Legato Extender (.onm) Lotus Notes (.nsf) Mailbox (Thunderbird 1.0, Eudora 6.2) (.mbx) Microsoft Outlook (multiple versions) (.msg) Microsoft Outlook Express (multiple versions, Mac and PC) (.eml) Microsoft Outlook Personal Folder...
Summary: ...of trade documentation to enforce best practices and approved procedures. • Dispatch, track, and chase – Whether creating and dispatching electronic messages or paper documents the routing, dispatch, tracking, and chasing of confirmations and supporting documents is handled in a consistent and reportable...
Summary: ...lets users view the files they need without installing multiple client applications. KeyView provides viewing functionality in the Meridio Viewer and Meridio Browser, HTML conversion and file recognition functionality. OLE linking Object Linking and Embedding (OLE) links are links between documents that...
Summary: ...There is growing recognition that these types of implicit information are critical to enterprise operations. For example, the employees of geographically dispersed organizations typically have difficulty determining what others are doing and which resources can best address their problems. Failure to...
Summary: ...For organizations looking to make the most of their existing data center resources, HP Data Protector delivers storage optimization. It can help IT teams meet their service level agreements and save money by delaying the need to invest in additional storage and server hardware. Figure 8. In small, standalone...
Summary: ...Autonomy Scrittura for Commodities Product Brief. As a result, capital markets institutions will benefit from unsurpassed levels of efficiency and transparency, allowing them to meet the increasingly rigorous compliance requirements in the derivatives industry. Autonomy’s platform approach to Global...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...common forms can be broken into two major categories (1) private email or messaging services (including instant message/ chat), and (2) methods to post content, links, or comments for others to see. In each instance, the assumption is that these interactions are in some way limited to a group of specified...
Summary: ...Processes Internal operations within government offices are dominated by numerous business-critical processes, including HR forms, spending approval requests and document approvals. BPM can assist government administrative functions and departments in increasing efficiency and reducing agency operating...
Summary: ...corporate legal departments must first understand the issues involved. Unsolicited e-mail, or spam, is a high-profile component of the problem, but three other factors can have an even greater cost impact. One is risk: as a majority of matter-related content is being communicated over e-mail, these messages...
Summary: ...counsel have the ability to find information much more readily with completeness and security. For many organizations, EAS solves the problems and high risks associated with PST files by allowing organizations to gain control over their electronic messaging environment and providing a reliable, flexible...
Summary: ...has necessitated the “findability” of such content, especially as it has seen increasing importance in eDiscovery cases. “Search of video files is important for training, security, compliance and e-discovery. Search of audio files will increase in importance to address issues of unified messaging,...
Summary: ...new implementations and initiatives, and adopt a defensive crouch until better days arrive. On closer examination, though, this attitude proves to be penny wise but pound foolish − especially when the projects themselves will actually save money over time. In recent years, professionalservices organisations...
Summary: ...CJOs) for which it as responsible. Many cases took years to come to court, denying justice to crime victims and causing inefficiency and waste of taxpayers’ money. A major programme was implemented over several years. Prior to the system being 6.5 million pieces of paper were circulated each year. This...
Summary: ...that each and every contact with potential suppliers was recorded and accountable, including phone conversations and text messaging. The procurement process needed records that were auditable, which required a conscious process from staff so that patterns of contact could be measured, variations could...
Summary: ...is dedicated to selecting methods which optimize its technology, whether they are old or new. Autonomy embraces traditional or legacy methods such as keyword, Boolean, parametric and others. However, Autonomy is best known for its pioneering work in conceptual search based on computational pattern recognition...
Summary: ...Needs Sponsored by: messaging, structured data, office files, and file shares; today, the vast majority of information– approximately 92%–is electronic, not paper. Outdated policies do not address newer regulations; often a document retention policy is more than 15 years old and simply addresses some...
Summary: ...Make discounts and savings prominent Discounts or savings should be prominently placed on your web page. Play with size, color, location, and even animation to draw attention. Everyone likes to save money, so remind them how much they can or did save. Set yourself apart Be sure to differentiate yourself...
Summary: ...pattern-matching technology, Autonomy continuously learns and adapts. The technology identifies the patterns that naturally occur in unstructured data such as social media, voice, video, and customer surveys, providing unparalleled understanding of concepts, patterns, and trends implicit in the data....
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.