Autonomy Announces Peer-To-Peer Implementation of its Technology
New Module Harnesses Power of Multiple PCs Without Requiring Additional Hardware or Infrastructure
San Francisco, Calif. (November 30, 2000) - Autonomy Corporation plc (NASDAQ: AUTN; EASDAQ: AUTN; LSE: AU.), a global leader in infrastructure software for the Web and the enterprise, today announced the availability of a peer-to-peer implementation of its technology for the automated processing, managing and delivery of unstructured information.
Autonomy's Personal Distributed Query Handler (PDQH) implementation allows multiple networked PCs to work as one seamless system. Enabling team members to harness the combined processing and storage capacity of their personal computers with the information they own, Autonomy PDQH transparently unites resources with information to solve business critical issues from all locations. Autonomy PDQH technology automatically categorizes, tags, links and delivers documents stored on an individual's hard drive and corporate file servers, providing a single point of access for all intellectual property in an organization. Actual processing is evenly distributed across all networked machines creating a highly scalable information exchange.
For over two years, Autonomy's DQH technology has allowed large systems, composed of multiple servers working together and reporting to one controlling system, to appear as one, virtual system. By distributing complex systems across multiple computers, Autonomy has powered some of the highest load and largest volume unstructured information systems in the world while keeping hardware and management costs exceedingly low. Autonomy is able to provide fast and highly scalable systems that process hundreds of gigabytes of content within tenths of milliseconds. Autonomy PDQH is a true peer-to-peer version of this technology and comes to market tested and proven.
To effectively leverage intellectual capital, people need instant access to both published and work-in-progress information. In both cases, access is hampered by the necessity to manually publish the documents, spread sheets, Web pages, presentations, etc. into a central repository or portal. In addition, for work-in-progress, which is rarely published, someone first must find out who is working on a particular project and then must request the information. Ultimately this is inaccurate, inefficient, and unsustainable in a large organization. The only way to effectively incorporate intellectual capital is to teach computers how to understand it.
Autonomy's software provides that intelligence. It enables computers to form an understanding of text, Web pages, e-mails, voice, documents and people's area of expertise. Because of this ability, it automates the process of categorizing, managing, personalizing and delivering of unstructured information. In a peer-to-peer environment, this enables access to both published and un-published work without having to know who specifically is working on it. For example, an employee researching market conditions in Asia for an upcoming product launch would automatically be provided with a report that a co-worker in Hong Kong is researching about the manufacturing industry in China.
"Peer-to-peer represents an evolution in business' approach to knowledge management and enhanced intellectual property," says Mike Lynch, CEO of Autonomy. "Businesses are realizing that valuable data resides not just in their databases, but in the real-time work of employees. Connecting these employees, through the information they create on their own PCs, can dramatically accelerate the time to market for new products and services. However, this data can't be efficiently managed unless computers learn to understand information the way humans do. Autonomy teaches them how. We make computers smarter."
PDQH is available for Windows, NT, LINUX and most versions of UNIX in both product and OEM format.
About Autonomy Corporation plc
Autonomy's infrastructure technology enables computers to form an understanding of text, Web pages, e-mails, voice, documents and people. Because of this unique ability, Autonomy's technology automates business operations on unstructured information, such as categorizing, linking, personalizing and delivering operations, which, to date, have been completely manual. Autonomy's technology powers any application dependant upon unstructured information including: e-commerce, customer relationship management, knowledge management, enterprise information portals and online publishing.
Among Autonomy's 390-plus customers are Alcatel, Associated Press, BBC, British Aerospace, Clorox, Reed Elsevier, News Corp., Lucent Technologies, Merrill Lynch, SF Gate, Reuters, Semi-tech, The Royal Mail, TF1, Unilever and the United States Department of Defense. In addition, many of the world's leading software companies license Autonomy's technology to add intelligence to their own products, in areas as diverse as online publishing, knowledge management, email routing and document management. These include Vignette, Sybase, Corechange, Brio, Delano, Epiphany, Filenet, Hyperwave, Insight, Intranet Solutions, Intraspect, KnowledgeTrack, Nexor, Novient and OpenMarket.
Autonomy was founded in 1996 and has offices in Boston, Chicago, Dallas, San Francisco, New York and Washington, D.C. in the United States, as well as offices through Europe, including Amsterdam, Brussels, Cambridge, Frankfurt, Milan, Paris, Oslo, and Sydney. In July 1998, the company went public on the EASDAQ exchange (EASDAQ:AUTN). Autonomy floated on The Nasdaq National Market (NASDAQ: AUTN) in May 2000, and on the London Stock Exchange (LSE: AU.) in November 2000.
Note:
With the exception of historical information, the matters set forth in this news release are forward-looking statements that involve risks and uncertainties. A number of important factors could cause actual results to differ materially from those in the forward-looking statements. These factors include, among others, technology risks, including dependence on core technology; fluctuations in quarterly results; dependence on new product development; rapid technological and market change; reliance on sales by others; management of growth; dependence on key personnel; rapid expansion; growth of the Internet; financial risk management; and future growth subject to risks. These factors and other factors which could cause actual results to differ materially are also discussed in the company's filings with the United States Securities and Exchange Commission, including Autonomy's Registration Statements on Form F-1.
Summary: ...no consistent management. There was no cohesion in our editorial file management, which hampered internal collaboration.” Security was another issue of importance to Blair and her team. With the organisation audited on a regular basis, Kaplan determined that the company required document version control,...
Summary: ...Genpact Case Study. “We’ve created online “New clients don’t want to come in and teach us their business; they want someone who already knows it. Interwoven makes it simple for us to leverage everything we’ve already done in a particular industry. It’s a huge competitive advantage.” Genpact...
Summary: ...people are the bits that our clients buy. They don’t necessarily buy our documents and our services. They buy our people’s brains, experience and knowledge.” The challenge, however, is one that many large knowledge-based organizations face. The intellectual capital at KPMG LLP (UK) was growing uncontrollably....
Summary: ...move on indefinite hold. What couldn’t be put on hold, however, was the doubling of users from 450 to 900 and the need to get firm-wide content and information processes under control. Paul Bromwell, the firm’s CIO, recalls, “Our original system involved index cards and we had file rooms spread...
Summary: ...Jinan Steel’s Oracle EBS/ERP came online in January 2004, the size of system data has been growing continually, with the size of the current database exceeding 531GB, with 420GB of actual data. This is expected to grow to 1TB within four to five years, at a monthly increase of around 13GB. Since the...
Summary: ...Autonomy iManage Case Study - VKA. Industry Management Consulting Challenges • Project information and emails scattered across servers, local drives, and paper files couldn’t be managed or audited effectively • Consultan tslacked an efficient way to leverage information and peer expertise from past...
Summary: ...Internet Site, and the Massachusetts Interactive Media Council presented the company its 2003 award for Best Use of Technology and Best in Category for Healthcare. Perhaps most gratifying of all, BCBSMA has won high recognition from its peers at the Best of Blue Awards, where the company earned first...
Summary: ...Capture was employed to work with Cardif Pinnacle’s internal management team to establish business process and workflows pertaining to capture and processing of multiple versions of their customer claim forms. Cardif Pinnacle: Process Before Automation Before automation, these forms were delivered via...
Summary: ...this benefit will be extended to external customers. “When a form is updated for compliance purposes we know that everyone will be using the most current version. In the past, we commonly saw documents floating around that should have been destroyed two to three updates before-hand,” said Stacy Hall,...
Summary: ...a custom form could be designed that would require no manual verification. MOD chose Cardiff® TeleForm®. At each site, depending on volume, it installed one or two PCs with a copy of TeleForm and a midrange Canon DR 3020 Scanner to capture the form image. Now, after each session, all forms are scanned...
Summary: ...and reliability limitations and required a seamless data protection solution for its server and PC environments. Solution: Autonomy’s comprehensive cloud data backup and recovery for PCs and servers gave Copeland Toyota a simplified, rapid recovery solution it required to assure business continuity....
Summary: ...loaner computer. For the Boston College administrators, being able to back up both PC and Mac laptops and desktops with a single product simplifies their tasks significantly. In addition, managing all backups from a single console reduces the complexity of the backup process for both PCs and Macs. Connected...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Notes, Microsoft Exchange, ODBC, Oracle, POP3 and Audio etc. System Requirements Platforms Supported Windows XP, Macintosh OS X (version 10.3 and above) Minimum Recommended Server Specifications Windows: 1GHz Pentium Processor 256 MB RAM 400 MB min free hard disk space Mac OS X: Mac OS X Version 10.3...
Summary: ...Scrittura Overview Brochure: Interwoven's Capital Markets Solutions. n Achieve fast, accurate, direct STP between any and all parties via a real-time peer-to-peer infrastructure that eliminates the risks, constraints, inadequacies and delays associated with brokered messaging n Signifcantly reduce trade...
Summary: ...protected information, and is specifically designed to make user data more accessible and useful. Enterprise-Grade, Unmatched Scalability Today, a wide range of enterprise companies use Connected Backup to protect their 250,000+ employee laptops and desktops. Organizations having as few as five PCs to...
Summary: ...and recovery performance. HP StoreOnce’s thin, efficient footprint minimizes the load on CPU processing and maximizes application availability. It uses as little as a tenth of the memory of other available solutions, which means it can be deployed on application or backup servers, and even virtual machines,...
Summary: ...is Powered by IDOL Autonomy’s IDOL platform is highly secure and used by the largest and most protected intelligence organizations in the world. With over 20,000 customers across the globe, IDOL is massively scalable with the largest installation exceeding 10 billion documents and delivering sub-second...
Summary: ...server load on Microsoft Exchange without limiting the use of e-mail • Empowers end-users by providing enhanced access, retrieval, and protection of e-mail • Enables the organization to incorporate e-mail as part of an enterprise records management strategy • Secures corporate intellectual property...
Summary: ...physical environments through unified recovery and advanced automation. Visit: www.hp.com/go/dataprotector. Follow what industry experts have to say about HP Data Protector software, connect with enterprise business peers and HP experts, visit www.hp.com/go/imhub/dataprotector. Read detailed product specifications,...
Summary: ...buy. To take advantage of proven records management capabilities, increase compliance, improve employee productivity, and business process efficiency, visit www.hp.com/go/hptrim. Follow what industry experts have to say about HP Information Management, and connect with enterprise business peers and HP...
Summary: ...the user’s query. Simple keyword search techniques and relevance algorithms are unable to return quality search results, particularly when legacy content lacks adequate metadata or has incorrect metadata altogether. IDOL’s ability to understand the meaning of content removes the dependence on metadata...
Summary: ...the user’s query. Simple keyword search techniques and relevance algorithms are unable to return quality search results, particularly when legacy content lacks adequate metadata or has incorrect metadata altogether. IDOL’s ability to understand the meaning of content removes the dependence on metadata...
Summary: ...HP TRIM version 7.2 – Fact sheet (US English). The HP TRIM SDK.Net can be used to develop integration to file systems and external archive repositories such that the HP TRIM Records Authority provides disposition control in place. HP TRIM can be configured as the document archive repository with records...
Summary: ...The Autonomy end to end eDiscovery Suite spans the EDRM and extends beyond it into other areas of Proactive Information Governance. The Autonomy eDiscovery family of products includes: • Autonomy Legal Hold: software for automatically applying legal hold policy in place on PCs and laptops, even when...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...process, and report on compliance metrics cannot realize its full business potential unless there is a secure, real-time communication framework to deliver the right message to the right stakeholder at the right time. Peer-to-peer networking technology enables reliable on-time communication and collaboration...
Summary: ...could be spent on more important tasks. In addition, e-mail stored in users’ folders cannot be shared, leading to inefficient/incomplete information when working across a team, and the duplication of attachments causes further needless strain on storage. With multiple copies floating around, it is almost...
Summary: ...may want to know if a subscriber is male or female to promote products based on general gender preferences. Because fields have such an impact on response, make sure you carefully weigh the benefits of having that field versus not having it. A good example of a field that is often used, but rarely necessary,...
Summary: ...analysis report enables organizations to benchmark their disaster preparedness against peers and best-in-class strategies. Contents Executive summary 3 The pressures organizations face 4 Backup and recovery difficulties 4 Costs of downtime 4 Causes of downtime 6 Backup strategies 7 Backup frequency 7...
Summary: ...A common problem associated with desktop search technologies is that they deliver security on the desktop itself, offering lock downs for specific desktops. As soon as peer-to-peer search is implemented, massive security breaches are exposed. To counter these risks, enterprises must provide the user with...
Summary: ...heavily on leveraged instruments backed by assets thousands of miles away.43 As the crisis claims victims across the globe, political leaders and investors are quick to point to lax compliance requirements (or enforcement) in other countries as a major cause. These factors, coupled with consolidation...
Summary: ...access. As the scope of this paper is focused on legal and compliance obligations for organizations (as opposed to individuals), this is a critical point of analysis. The most common social media sites— Facebook, Twitter, and LinkedIn—and their peers, allow individuals and/or organizations to establish...
Summary: ...exercise…it is a natural fit for organizations that are looking at ESR from a strategic perspective.” “The vendor is an order of magnitude larger than most other peers in ESR and delivers the most sophisticated and comprehensive search functionalities among peers.” “The vendor edges past competition...
Summary: ...why. To answer that question, the Bell Labs project team queried reams of data in AT&T’s billing and operational systems, looking for hidden patterns that might signal the root causes of subscriber discontent. Privately, though, they shared a frustrating suspicion that the data they most needed to study...
Summary: ...of information produced in US business these days is in digital format. Seventy percent of that electronic data is never printed out. It remains in its original electronic format. Data that is sitting on employee PCs, file shares, and the e-mail system make up the vast majority of the data generated....
Summary: ...that reason, EAS is designed to offer the widest possible range of options at every level of the EAS product family. EAS is a trusted, proven solution that allows customers to realize the critical importance of the intellectual data stored in email and file systems. Summary 22 White Paper ZANTAZ has developed...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.