Verity to Present at Lehman Brothers Software Conference
Company President to Discuss Global Business Strategy
SUNNYVALE, CA - 2002-03-12 - Verity, Inc. (NASDAQ: VRTY), a leading provider of infrastructure software that powers enterprise and e-commerce portals as well as e-business applications, announced that it will make a presentation at the Lehman Brothers' Second Annual Global Software Conference at 8:30 a.m. PST, Wednesday, March 13. The investment conference will be held at The Ritz Carlton in Half Moon Bay, CA.
Anthony Bettencourt, Verity's president, will offer the company's view of the software market in which it competes, its approach for extending category leadership, and evidence of how its innovative technology is helping customers solve business problems and realize measurable return on investment.
"Business, on a global scale, is in the throes of great change," commented, Anthony J. Bettencourt, president of Verity, Inc. "This conference is an excellent opportunity for Verity to explain how its technology can effectively help organizations successfully deal with that change to investors interested in our software marketplace."
Lehman Brothers, a leading global investment bank, is hosting this conference for investors seeking a better sense of the global software industry. Verity is one of a select group of software companies given the opportunity to make presentations to conference participants.
About Lehman Brothers
Lehman Brothers (NYSE: LEH), an innovator in global finance, focuses on serving the corporations, governments and municipalities, institutional clients and high-net-worth individuals worldwide. Founded in 1850, Lehman Brothers maintains leadership positions in equity and fixed income sales, trading and research, investment banking, private equity, and private client services. The Firm is headquartered in New York, London, and Tokyo and operates a network of offices around the world. For further information about Lehman Brothers' services, products and recruitment opportunities, visit our Web site at www.lehman.com
About Verity
Headquartered in Sunnyvale, California, Verity is a leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to improve access to vital information and perform a range of e-business operations, while enhancing the end-user experience. Verity-powered business portals, which include corporate portals used for sharing information within an enterprise, e-commerce portals for online selling, and market exchange portals for B2B activities, all provide personalized information to employees, partners, customers and suppliers.
Verity products are used by 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include Adobe Systems, American Greetings, AT&T, Cap Gemini Ernst & Young, Cisco, CNET, Compaq, Dow Jones, EDGAR Online, FairMarket, Financial Times, Globe and Mail, Home Depot, Lotus, NewsEdge Corporation, SAP, Siemens, Sybase, Time New Media and Timex. In 2001, Delphi Group named Verity as the market leader in the portal infrastructure software market.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...minute. “We have eight applications running on the floor,” Cooksey explained. “In our business, it is imperative that we are able to assess where potential issues within our call center are and then quickly fix the problem. For example, is the agent struggling with call content or with desktop navigation?...
Summary: ...firm with offices in the United States, Europe and Asia. Established in 1919, Baird has more than 2,600 associates serving the needs of individual, corporate, institutional and municipal clients. Baird oversees and manages client assets of more than $82 billion. The Challenge Traditionally, when Baird’s...
Summary: ...HP Data Protector software is therefore a critical component of our IT services portfolio, because we know we can never lose more than a few minutes’ worth of our production system data.” —Tone Kavcic, head of IT, Iskratel Group For over half a century, Iskratel Group has been developing technology...
Summary: ...on IT assistance even for minor changes—a highly inefficient way of managing large volumes of constantly changing material. “Viewers would tune into watch ‘Big Brother,’ only to see the same footage as last time,” says Neil Blumfield, CMS Team Lead, Channel 4. As the number of content authors...
Summary: ...for its proven scalability and singleplatform approach, as well as its unique deduplication and email optimization capabilities when backing up local Microsoft® Outlook PST files. TNPA chose Autonomy because of its leadership in the corporate PC backup market and its proven track record for protecting...
Summary: ...Cardiff Case Study, Napa County. information@cardiff.com Other Offices Cardiff has additional offices in Boston, New York, Sunnyvale, Vista and Washington DC, as well as in Amsterdam, Beijing, Brussels, Hamburg, London, Madrid, Milan, Munich, Oslo, Paris, Rome, Shanghai, Singapore, Stockholm and Sydney...
Summary: ...had decided that Autonomy's technology could sufficiently reduce time spent searching and duplicating effort, they had it "embedded" into a number of website portals, all accessible by BAE SYSTEMS 50,000 intranet networked employees, and a continuous measurement process instituted. These included the...
Summary: ...data quality and timeliness to better track effectiveness Solution: Cardiff TeleForm Results: • Purchase time to production: Two days Return-on-investment completed in one project • Increase in client base: The center maintains six ongoing relationships and several dozen projects for smaller clients...
Summary: ...Optus Success with Microsearch and Autonomy an HP Company. Since commencing operations in 1992, Optus has invested more than A$17 billion in the construction of fixed, mobile and satellite networks, including central business district and suburban local access networks. These networks provide the company...
Summary: ...point and other categories. When the user clicks on one category, subcategories appear,” says Iagnemmo. “And because of K2, GSA Advantage! reduced search time to about a half a second for anything in our 3.4 million record database.” Another important consideration for GSA Advantage! is IDOL K2’s...
Summary: ...political subdivision of the State of Texas that provides water, wastewater, reservoir and recreation facilities within the Trinity River watershed. This 18,000 square mile watershed lies in the eastern third of the state, includes the rapidly growing Dallas/Fort Worth metropolitan area, and is home to...
Summary: ...Costs As a fast-growing municipality, the County of San Diego faces continued pressure to control expenses and streamline operations. Several areas were targeted for efficiency improvements: Recruitment in the Department of Human Resources: The County employs more than 15,000 people, and receives in excess...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...steps on the Moon President Nixon speaks live to the astronauts 21 Jul 1969 19 Nov 1969 Timeline: Space Man takes first steps on the Moon Second Apollo mission lands on the Moon 1969: Man takes first steps on the moon American Neil Armstrong has become the first man to walk on the Moon. The astronaut...
Summary: ...and duplicate effort, which results in increased costs and can expose the enterprise to undue risk. Without real-time updates mobile executives can easily fail to derive maximum value from business opportunities. At the same time, executives conducting business on mobile devices must be protected from...
Summary: ...the effective legal hold process mitigates the risk of spoliation sanctions. Reduce Costs The yard stick of a law firm’s profitability is its profits per partner. To impact these numbers, firms look for opportunities to reduce their overhead expenses. There is clear evidence that using the right technology...
Summary: ...for the entire solution. No longer does a customer need to worry about whom to call—service provider or software vendor—should a question arise concerning the service. This offering also addresses key e-mail storages issues, including PST migration and deletion, email server overload, and data migration...
Summary: ...Auminence Product Brief. MEANING BASED HEALTHCARE Auminence Based on Autonomy’s unique Bayesian inference technology, Auminence represents a breakthrough for healthcare providers seeking to transform healthcare delivery through a deeper and more meaningful understanding of their data. At its essence,...
Summary: ...HP Data Protector Software - Data sheet. So we use HP Data Protector to automate the copying of our critical production data and logs on our HP (StorageWorks) EVA systems every half hour.” Tone Kavcic, head of IT, Iskratel Group Key Data Protector components Advanced Backup to Disk―simplify migration...
Summary: ...Security to the field level, protecting privilege and intellectual property • Consistent review and production across 100 languages and 1000 file types including email, documents and audio • EDRM XML load file for PST native file ingestion About Autonomy Autonomy Corporation plc (LSE: AU. or AU.L)...
Summary: ...location with which they are already familiar. The user doesn’t need to be aware of the potentially complex fileplan structure. Managing Email in Exchange 2007 Organizations are facing the difficult task of managing the litigation liability that email brings, while at the same preserving the key institutional...
Summary: ...LiveVault® Virtualization - Autonomy Product Brief. POWER PROMOTE PROTECT Cloud Backup and Recovery for Virtual Server Environments Today many organizations are using virtualization to consolidate servers and reduce infrastructure costs. As the number of virtual machines grows, it becomes increasingly...
Summary: ...the duplicate with a link to the original chunk. There are two architectural approaches to chunking. A fixed deduplication algorithm breaks data into blocks of a fixed size. Variable chunking groups the data into blocks based on patterns in the data itself.
...
Summary: ...Autonomy Meaning Based Healthcare. However, the world’s computing infrastructure has evolved around a paradigm of structured data and fixed processes – an infrastructure that is ill-suited for healthcare. Autonomy’s technology benefits the entire medical delivery cycle: our ability to conceptually...
Summary: ...combine Boolean and Proximity operators to form simple or complex Boolean expressions Parametric search Users can search for items by certain field values. When they provide fixed values in parametric fields, the parametric search returns consistent values in the non-fixed parametric fields. For example,...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Challenge or Opportunity? Compliance in the Financial Services Industry White Paper. But compliance specialists are not always very good at explaining compliance rules and relating them to the business so that staff understand what is required of them and why. If staff don't understand why they need to...
Summary: ...The Business Process Management Guide for Government. information@cardiff.com Other Offces Cardiff has additional offices in Boston, New York, Sunnyvale, Vista and Washington DC, as well as in Amsterdam, Beijing, Brussels, Hamburg, London, Madrid, Milan, Munich, Oslo, Paris, Rome, Shanghai, Singapore,...
Summary: ...of e-mail management into document management have already helped frms worldwide achieve new levels of performance, and made Interwoven the technology partner of choice for many of the industry’s largest and most successful organization, including Cleary, Gottlieb, Steen & Hamilton; Coudert Brothers;...
Summary: ...as Enron, WorldCom, and a host of internet companies, governments passed legislation to increase financial transparency, as well as responsibility by corporate leadership to exercise greater control over their operations.2 In fact, the large publicly financial institutions at the core of the current crisis...
Summary: ...value 2 Table of contents 3 Information overload and business risk 3 Managing information for regulatory compliance 4 The cost of information overload 4 The impact of information overload on productivity 4 New technology increases the pressure to act 4 Compliance leadership requires effective information...
Summary: ...Matter Centric Collaboration: A New Foundation for Law Firm IT. Knowledge Management Although law firms have long recognized the theoretical value of knowledge management for promoting the re-use of information, bringing new team members up to speed quickly and preserving institutional memory and insight,...
Summary: ...Browsing Similar to employees, online browsers are on the lookout for information on a range of websites from health information portals, news, entertainment and investment sites as well as a myriad of government-to-citizen portals. Like Web shoppers, users can swap websites easily if their user experience...
Summary: ...the desired effect. Conclusion These are just some of the many elements you can potentially optimize on your web form. Some other elements you may also consider optimizing include design, graphics, color schemes, font types, sizing of logos, and so on. In addition, for very long forms, it may be worth...
Summary: ...and home workers • Great efficiency in carrying out business processes • Information sharing across departments • As part of a business application As noted in the eDRM improvement opportunity matrix these eDRM solutions may be introduced departmentally or enterprise-wide and to address a specific...
Summary: ...hits. 6. The presentation of customized views to suit end users; users rarely care about the whole of enterprise approach—what they really want is “my space.” The ability to create lists of frequently used, last used, favorites offers the opportunity to customize and make the complex scheme a more...
Summary: ...deployment in over 20,000 customers worldwide and embedding in over 400 OEMs. Customers can leverage content and drive interactions from existing applications that handle unstructured information, including enterprise search projects, eCommerce, KM and e-learning portals, mobile devices, Business Intelligence,...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.