U.S. Department of Defense to Use Verity Technology in Next-Generation Message Handling Platform for Military Intelligence Community
Verity Software to Enhance Search and Notification Capabilities of Department of Defense?s New Multimedia Message Manager
SUNNYVALE, Calif. - 2002-07-22 - Verity, Inc. (NASDAQ: VRTY), a leading provider of infrastructure software powering corporate intranets and e-commerce sites as well as e-business applications, today announced that the Department of Defense Intelligence Information Systems (DODIIS) has integrated Verity's advanced search and notification software into its new message handling platform.
The new platform, called the Multimedia Message Manager (M3), is the DODIIS' next generation message handling system. It marks an evolution in the ability of the U.S. military's intelligence community to handle information in the form of graphics and rich-media files, in addition to text messages. M3 provides messaging services at more than 40 sites worldwide, and has the capacity to process as many as 35,000 messages at each site per day.
As the M3 messaging platform expands in the number of sites, users and messages handled, the need to make certain the right information gets delivered to the right person in the right way becomes critical. Verity's notification technology will handle this requirement. This software actively monitors all key sources across the Internet and the DODIIS' intranet and automatically filters and delivers highly personalized information to individuals and groups, based on their content and delivery preferences.
Another important aspect of the use of Verity's software within the M3 system is the ability of users to search quickly and accurately through more than 15 years' worth of stored messages, or about 20 million messages. Verity advanced search software helps users discover what they need and connect to millions of messages with the highest available security.
"The quantity of data accumulated by the Department of Defense Intelligence Information Systems is staggering," said Anthony J Bettencourt, president of Verity. "We are proud that the Department of Defense sought Verity's experience in helping major organizations in the private and public sectors improve the accessibility and navigation of information to facilitate the messaging system for the military intelligence community. With Verity's software, Military personnel not only can search for and get delivery of highly relevant messages in text format, but also in graphics and rich media formats."
About Verity
Headquartered in Sunnyvale, California, Verity is the leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to access vital information and perform a range of e-business operations, while enhancing the end-user experience. Verity-powered business portals, which include corporate intranets used for sharing information within an enterprise; e-commerce sites for online selling; and market exchanges site for B2B activities, all provide personalized information to employees, partners, customers and suppliers.
Verity products are used by approximately 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include Adobe Systems, AT&T, Cisco, CNET, Compaq, Dow Jones, EDGAR Online, Cap Gemini Ernst & Young, FairMarket, Financial Times, Globe and Mail, Home Depot, Lotus, NewsEdge Corporation, SAP, Siemens, Sybase, Time New Media and Timex.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...Jane's Information Group Case Study - Intelligence Portal. Case Study Company Background Jane’s Information Group—once called “the closest thing there is to a commercial intelligence operation,” by CBS television newsmagazine, 60 Minutes—is the leading provider of defense, security and transportation...
Summary: ...organization.” —Richard West, Head of Organisational and e-learning The Benefits Using Autonomy technology, BAE SYSTEMS has been able to personalize the delivery of business-critical information to employees across the company, as well as adding significant value to the vast volumes of data held in...
Summary: ...Precise – Next-Generation Media Intelligences - Case Study. POWER PROMOTE PROTECT Precise – Next-Generation Media Intelligence Company Background Precise is the UK's leading media intelligence provider, servicing major organisations across the corporate, consumer, financial, charity and government...
Summary: ...Handling System (AMHS) business unit. The Need Every day, organizations are overwhelmed by endless waves of e-mail, news feeds, organizational messages and collaborative messages. The only way to stem the tide is by ranking the messages by importance and responding to them as quickly and concisely as...
Summary: ...the contribution, management and delivery of content across the full spectrum of Avaya’s business environment. Consolidating its many extranets and intranets, Avaya implemented Autonomy’s solution to launch a unified, global enterprise extranet capable of providing personalized views for employees...
Summary: ...LiveSite with technology from Hybris, a multichannel commerce solution, to dynamically deliver appropriate content based on consumer interests and purchasing activity on TransUnion.com. The company also plans to leverage Autonomy Web Content Management to localize content as the business continues its...
Summary: ...KPMG Case Study - Professional Services Intranet. Accelerating Value Organization KPMG LLP (UK) Industry Professional Services Type of Application Professional Services Intranet Autonomy Solution IDOL K2 infrastructure Functionality Classification Parametric Selection Conceptual Retrieval Repository Interfacing...
Summary: ...Cardiff Case Study: Customer at a Glance French Ministry of Defense. Customer at a Glance French Ministry of Defense The installation of an automated data capture solution from Cardiff has improved efficiency at the French Ministry of Defense. Though the French Military has moved to an all-volunteer army,...
Summary: ...Frank Russell Company - Case Study. Phase I of Russell’s syndication model involved the delivery of public content to Northwestern Mutual’s (Russell’s parent company) public site, and to agents’ personalized sites. “Autonomy already enables us to communicate in a way that many of our competitors...
Summary: ...identified and linked so that all relevant information is immediately available to officers. In this way IDOL is able to unify intelligence handling across the force, from the moment the crime is reported in the call centre, to the moment the prisoner is incarcerated.
...
Summary: ...our business users; they can easily make any needed adjustments to make sure we’re reaching the right customers with the right message in the right way to boost conversions and maximise their value to our business.” Winning the Market Battle While Creating New Value The business impact of Virgin Mobile’s...
Summary: ...serve its numerous subsidiary companies, Rogers operates a large call center network that handles thousands of calls each day. Recently, Rogers sought a way to control the escalating costs of operating these centers, while at the same time increase customer satisfaction. “We have a massive network of...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...enterprise-wide eDiscovery requests and track data loss activity centrally with executive dashboards and reports. • Reduce dependency on IT and end users to search, preserve, retrieve, and produce evidence. • Minimize disruption to IT and business processes within your organization • Create a defensible...
Summary: ...professionals. • Government:In addition to the above capabilities, this module provides support for real-time data delivery, FOIA processing and enhanced military-grade security. Autonomy is an early adopter of international standards and is certified against the US DoD 5015.02 (ch 2,3,4) , UK TNA,...
Summary: ...possible to set up an array of WordML applications on remote computers to handle large volumes of data). Scrittura Messaging Scrittura Messaging comprises the messaging infrastructure of the Scrittura software platform. Based on JMS, it generates FpML and other XML-based message types for use with central...
Summary: ...Autonomy Cloud Solutions. The Autonomy private cloud adheres to global certification standards, including PCI DSS, US DOD 5015.02, UK TNA2002, and Australia’s VERS. Data centers are located around the globe to meet jurisdictional requirements, and are protected by biometrically controlled doors, exterior...
Summary: ...Microsoft Exchange and Lotus Notes and natively supports all types of Instant Messaging and Bloomberg, including Bloomberg Internet Messages, Blackberry pin-to-pin messages, Terminal Messages and Persistent Chats. The Real-Time Policy Supervisor module is also the only solution available that offers the...
Summary: ...size Automatic set up with user-defined alarm codes and actions Generates real-time alerts across a range of media, such as email or instant messaging Automatic video and data transmission across ADSL, LAN, WAN, Intranet and Internet for remote system management Instantly generates automatic reports of...
Summary: ...and adjust relevance in response to changing demand. Offer the Ultimate in Personalization IDOLme automatically profiles the way users interact with each other and with information on the handset, building a conceptual understanding of their interests and location to deliver tailored commercial content....
Summary: ...to SharePoint’s native collaboration capabilities and makes it possible to publish documents between the two repositories. In this way, firms can build composite applications that display content stored in WorkSite through their SharePoint intranet or extranet, and enable professionals using WorkSite’s...
Summary: ...Autonomy KeyView IDOL - Product Brief. Messaging Domino XML Language (.dxl) Legato Extender (.onm) Lotus Notes (.nsf) Mailbox (Thunderbird 1.0, Eudora 6.2) (.mbx) Microsoft Outlook (multiple versions) (.msg) Microsoft Outlook Express (multiple versions, Mac and PC) (.eml) Microsoft Outlook Personal Folder...
Summary: ...Cardiff LiquidOffice Mobile for BlackBerry. The LiquidOffice Process Designer is a graphical design application that allows business users to quickly and logically map the fow of a particular forms process with little or no coding required. The System Developed in partnership with RIM, the LiquidOffce...
Summary: ...Autonomy's Top Ranked Hosted eDiscovery for Financial Institutions. Audio files relevant to eDiscovery include voicemail and call recordings from phone systems. Like the US, the FSA in the UK requires the recording and retention of relevant telephone conversations or electronic communications subject...
Summary: ...is under license. [AUT TB] 27.06.07 Defense Taxonomy The Autonomy Defense Taxonomy is based on the Defense Technical Information Centre (DTIC) thesaurus published by the U.S. Department of Defense (DoD). This provides a basic multidisciplinary vocabulary that includes close to 12,000 topics, such as “communications,...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...IDOL Enterprise Desktop Search White Paper. Autonomy software identifies the patterns that naturally occur in text, based on the usage and frequency of words or terms that correspond to specific ideas or concepts. In this way, Autonomy is able to extract the information’s digital essence and encode...
Summary: ...becomes. To avoid system outages and degradation, administrators often impose a limit, or quota, of how much storage users are allowed to consume. Once this threshold is reached users are forced to delete messages.
...
Summary: ...Building a GARP-Compliant Solution - Autonomy White Paper. - Know what information they have - Quickly respond to requests for information - Organize information for efficient access - Ensure that all content is properly secured - Retain and dispose of content, based on defensible policy - Identify unknown...
Summary: ...the ability for organizations to comprehensively and continuously monitor employee activity, including desktop applications, website activity, emails, instant messages, and phone calls, as well as the ability to identify and act on potential data privacy violations. For example, although copying and pasting...
Summary: ...forums to provide a fully comprehensive view of media coverage and profile, and with the overall aim of developing and marketing next-generation media intelligence services to the PR and communications sectors. Traditional search capabilities fell short of delivering the capability Precise required in...
Summary: ...Frost & Sullivan Moving to Next-Generation Speech Analytics - White Paper. Speech analytics, on the other hand, can tell you what that call was about and issues that may have impacted the length of the call. As a result, frost.com 6 Frost & Sullivan speech analytics applications have become powerful tools...
Summary: ...Scrittura Global Capital Markets. New Messaging Standards for Electronic Confirmations Our EnConnect platform was introduced in 2007 in order to provide a capital markets focused solution for messaging. It has now been deployed to several members of the G16 group and supports all of the major affirmation...
Summary: ...common forms can be broken into two major categories (1) private email or messaging services (including instant message/ chat), and (2) methods to post content, links, or comments for others to see. In each instance, the assumption is that these interactions are in some way limited to a group of specified...
Summary: ...significant quantity of email enters the archive, new issues arise with regard to the management of the physical storage resources, the interaction with the archives for compliance auditing activities, and the ongoing lifecycle management of the information contained in the archives. With EAS Storage...
Summary: ...to defer capital outlays - The legal and regulatory environment is evolving so quickly that organizations are turning to a third party with specific expertise as a trusted partner to share risk The most common way that outsourcing IT is manifesting itself today is when an enterprise contracts with a hosted...
Summary: ...is to ensure that all additional security checks are done in the background, hidden to the user. Company Intranets and Intelligence Applications Although the requirements for company intranets and intelligence scenarios are more demanding and require highperformance mapped security, vendors must still...
Summary: ...and applications requiring support.3 And during times of economic downturn, like any part of the organization, IT might have caps on spending and staffing. Ironically, economic downturns tend to aggravate the support of distributed data technology in another way. As corporations cut back on desktop and...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.