Verity to Address 11th International World Wide Web Conference
Senior Architect to Discuss "Social Networks for Enterprise Webs"
SUNNYVALE, CA. - 2002-05-06 - Verity, Inc. (NASDAQ: VRTY), a leading provider of infrastructure software that powers corporate portals and e-commerce sites as well as e-business applications, today announced that senior architect Mani Abrol will be a featured speaker at the 11th International World Wide Web (WWW2002) Conference.
The presentation will be held on Thursday, May 9, 2002, from 3:30 to 4:15 p.m. at the Sheraton Waikiki Hotel in Honolulu, Hawaii.
In her speech, "Social Networks for Enterprise Webs," Abrol will cover the benefits enterprises can gain from leveraging Social Networks technologies. Social Networks have been exploited on the Web in specific applications, resulting in an improved online experience for its users. However, Web-derived methods are not directly applicable to enterprise settings. Abrol will explain how the technologies that have shaped the Web are different than the ones needed in an enterprise setting. According to Abrol, enterprises must make use of Social Networks technologies to take advantage of human expertise, operate more effectively and gain competitive advantage. She will also show how Verity has incorporated Social Networks technologies into its K2 Enterprise software.
"The development team's work in Social Networks has enabled Verity to take our enterprise portal infrastructure software to the next level," said Anthony J. Bettencourt, Verity's president. "Verity has successfully implemented Social Networks technologies, including personalization, recommendation and expertise location, into its software, along with advanced search and content organization capabilities. Our premise is that an enterprise knowledge management system must bring into play the human element as well as the machine element to be successful."
Abrol completed her bachelor's degree in electronics and electrical communications in 1993 from Punjab Engineering College, Chandigarh, India. She received her master's degree in computer science in 1996 from the University of Maryland, Baltimore County. Prior to joining Verity in 1997, Abrol worked for Compaq (then Digital Equipment Corporation) in Maryland.
The WWW2002 conference is produced by the International World Wide Web Conference Committee (IW3C2), the University of Hawaii and the Pacific Telecommunications Council (PTC). Additional information about the conference can be found at http://www2002.org.
About Verity
Headquartered in Sunnyvale, California, Verity is a leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to improve access to vital information and perform a range of e-business operations, while enhancing user experience. Verity-powered business portals, which include corporate portals used for sharing information within an enterprise; e-commerce portals for online selling; and market exchange portals for B2B activities, all provide personalized information to employees, partners, customers and suppliers. In addition, most leading software vendors, as part of their e-business applications, utilize Verity technology.
Verity products are used by approximately 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include Adobe Systems, AT&T, Cap Gemini Ernst & Young, Cisco, CNET, Compaq, Dow Jones, EDGAR Online, FairMarket, Financial Times, Globe and Mail, Home Depot, Lotus, NewsEdge Corporation, SAP, Siemens, Sybase, Time New Media and Timex. In 2001, Delphi Group named Verity as the market leader in the portal infrastructure software market.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...the portal was rapidly becoming overwhelming to the County’s understaffed Online Services team tasked with managing an escalating volume of content submitted by the County’s 40 different departments and agencies. “In many ways, the first portal let the genie out of the bottle,” explains Darlene...
Summary: ...Application Server • J2EE, Spring, AJAX, Freemarker Microsearch added value • Expertise in building enterprise search solutions and Autonomy IDOL. • Expertise in Portal and Application Development. • Methodology and Industry best practices. • Local presence and reliable local support. Delivery...
Summary: ...can now learn basic facts about technology, do more in-depth research, take in an online briefing, and connect with Avaya anywhere in the world. We have a way to keep our organization aligned around the brand.” FYI Portal Fuels Future Growth “To measure ROI,” Rodgers explained, “we use customer...
Summary: ...money. It is the best data protection solution I have used.” – Derek McConnell, Infrastructure Architect, Maricopa Integrated Health System Introduction Maricopa Integrated Health System (MIHS) is a hospital in Maricopa County, Arizona, that ensures that health care is available to all area residents....
Summary: ...many institutions, including Scotiabank, to seek solutions that minimize turbulence and increase operational agility and productivity. The explosive growth in derivatives volumes and tightening regulatory guidelines has created new and greater risks that financial institutions must mitigate. Disparate...
Summary: ...the best candidates to its graduate programs. As a result, the number of individuals applying to its 91 masters and 48 doctoral programs has grown from 13,829 applications in 1999-2000 to 16,423 in 2001-2002, in addition to several thousand applications for non-degree study. About 46% of the degree applicants...
Summary: ...strive to achieve. Boston College (Chestnut Hill, MA) is a private university that consistently appears on lists of top US colleges. Boston College includes undergraduate and graduate schools of arts and sciences, management, law, education, nursing, social work, and theology. Their Information Technology...
Summary: ...also determine what should and should not be backed up while managing the network and storage impact of user data. In addition, Connected Backup provides a secure web portal, through which users can recover data—without relying on IT department or helpdesk intervention. The Connected Backup solution...
Summary: ...Belga’s in-house reporters and, in turn, allow them to provide the fastest possible news service for their customers. The Solution Belga chose Autonomy to set up and power a fully integrated and intuitive press portal that would provide clients with a rapid and reliable news service. Through the software’s...
Summary: ...Wetherspoon uses Aurasma to attract young customers and increase food and beverage sales. Students downloaded the app and used it to unlock 56,000 vouchers (and counting) with an astonishing 74 percent redemption rate. The app also enabled students to tag physical locations and objects with their own...
Summary: ...by increasing clicks on its portal, while delivering an improved online experience. For instance, EarthLink was able to determine that placing a second search box at the bottom of the portal page made it more convenient for visitors to conduct searches, as well as boosted search queries. EarthLink has...
Summary: ...conversion rates, and improve operational efficiency. The company had already implemented Autonomy TeamSite for the consolidated portal that serves its 500 wholesale customers. Thanks to tight integration between Autonomy and BEA, the company was able to fully leverage its existing investment in portal...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...IBM Lotus Notes/Domino • IBM Lotus Sametime • IMLogic • Microsoft Exchange • MS Office Communications Server File systems • Netware File System • NT File Systems • UNIX File System Business Applications • JD Edwards/Oracle • PeopleSoft/Oracle • PTC Windchill • Salesforce.com • SAP...
Summary: ...and the like. However, the world’s computing infrastructure has been based on structured data and fixed processes. This infrastructure is ill-suited for healthcare – which is based on unstructured, human information and must take numerous variables into account when caring for an individual. Autonomy’s...
Summary: ...agent-sensitive information from unauthorized access has long been a requirement in contact centers, and it is especially critical to protect this data when recording agent-caller conversations where credit card or other customer sensitive data is exposed. This technical brief will explain the approach...
Summary: ...Caretakers must deliver care more efficiently, starting with a quicker and more accurate diagnosis process. They need to be cognizant of the cost of care and practice in a manner which responsibly considers healthcare resource constraints. HDOs must oversee a standardized and efficient practice of medicine,...
Summary: ...Autonomy DiSH 0605. Product specifications and features are subject to change without notice. Use of Autonomy software is under license. Service port Service port DiSH Service port ACI port Service action commands Service port Autonomy Applications Autonomy Service Dashboard Web Browser HTTP ACI API/...
Summary: ...to SharePoint when building up a results list •File filtering, transformation and rendering support for over 1,000 file formats, including audio, video, structured and unstructured files •Import parameters compatible with any Autonomy indexing process •Sup port for all common file types, including...
Summary: ...and portal deployments in the world, with presence in virtually every vertical market. Since IDOL’s scalability is based on its modular, distributed architecture, it can handle massive amounts of data on commodity, dual-CPU servers. For instance, only a few hundred entry level enterprise machines are...
Summary: ...Autonomy LiveVault Data Sheet. In addition, unlike snapshots of the host, backing up with LiveVault provides enforced retention of backups, off-site storage, and consistency in the execution of backups. LiveVault can restore data back to physical or virtual machines, including those in a completely different...
Summary: ...entries. Interfaces are available to allow connection with 300 types of cash registers, automatic teller machines, toll booths, and other facilities. Container surveillance and management If your agency is involved in functions as diverse as port security, transportation management, shipping, or storage...
Summary: ...of every child service, including a continuous service status display separate from the rest of the Dashboard interface. ? Service status: start time, whether the service is running, how long the service has been running for ?Service location: host machine and ports used to communicate with the service...
Summary: ...This "data agnostic" capability is facilitated through a variety of Autonomy connectors for a considerable number of proprietary data repositories and file formats. File System Fetch File System Fetch analyzes file systems on local or networked machines (including Novell, NT, UNIX file systems and Samba...
Summary: ...or folders from the drop down menu. • view document content Documents selected by the user can either be viewed from its current location or saved to disk. • downloading folders to a local machine Documents selected by the user can either be viewed from its current location or saved to disk. When...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...from around the world. With approximately 61,971,065 visitor days for 2003, there is a significant amount of visitors traveling in and out of Hawaii. Each traveler who enters Hawaii from the mainland via airplane or cruise ship must complete a mandatory Department of Agriculture Declaration Form to declare...
Summary: ...spoliation and employee malfeasance absent a preservation effort. Preservation Best Practices Once the duty to preserve attaches, counsel must take several affirmative steps to meet the obligation. First, counsel must scope out the case to determine relevant facts and issues, dates, file types, and potential...
Summary: ...Autonomy Internationalization White Paper 20031003. ? Expertise identification Automatically gaining an understanding of every individual in the community IDOL facilitates the recognition of highly focused experts enabling users to engage in proactive collaboration ventures. 1.3 Language independence...
Summary: ...creation to destruction ? Documents may go through many iterations before they are finalised and need to be under change control ? Records are those files and documents that must be kept for a fixed period (often years) in an unchanged form under strict access control ? Documents and records that are...
Summary: ...a secure Web portal from anywhere around the globe, it is possible to retrieve the backup and continue with the meeting unscathed. Selecting a Provider The goal of data protection is to make sure that a company can recover from varying degrees of failure (from individual file loss to an entire system)...
Summary: ...California) have ethics rules based, to a greater or lesser degree, on the American Bar Association’s Model Rules of Professional Conduct (“ABA Model Rules”). Lawyers must consider a number of different rules governing the conduct of lawyers when developing a records management policy: • ABA Model...
Summary: ...the file at his or her expense.3 Ethical considerations All but one state (California) have ethics rules based, to a greater or lesser degree, on the American Bar Association’s Model Rules of Professional Conduct (“ABA Model Rules”). Lawyers must consider a number of different rules governing the...
Summary: ...downloading recordings onto their machines. • Audit Trails – Qfiniti’s integrated audit trail function automatically monitors such activities as log-ins, log outs, and call playback for all system users. This ability is especially critical for companies to maintain compliance, as they must frequently...
Summary: ...a query may be, the user will not be impressed if the time needed to achieve this high degree of relevancy is perceived as being too long. Performance is a top requirement for a business website or portal that wishes to ensure the maximum satisfaction for users. Knowing that “it will only take a second”...
Summary: ...Intelligent Documents. Better BPM. The Reader then recognizes and converts a multitude of inputs (e.g.handwriting, computer text, barcodes, bubbles, signatures) into an electronic format. 3. TeleForm Verifer–Any characters that are considered ambiguous by TeleForm’s industry-leading RecoFlex engine...
Summary: ...and stronger DR or business continuity plans. There are also ongoing benefits derived from leveraging the resources of the cloud data protection vendor, including taking advantage of the vendor’s investment in technology and data protection expertise, and better alignment of IT resources with strategic...
Summary: ...on essentials for Data Protection in Distributed Environments (detailed in Table 1) • Typically are limited in their offerings for retention of specific types of data— and the ease with which historical versions can be retrieved • Developers must stretch limited resources to develop both fundamental...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.