Verity to Address the 2002 Air Force Information Technology Conference
Director of Solutions Marketing Kevin Lindsay to Speak on Content Organization and Search Technologies for Distributed, Complex Portals
Sunnyvale, Calif. - 2002-08-26 - Verity Inc. (NASDAQ: VRTY), a leading provider of infrastructure software powering corporate intranets and e-commerce sites as well as e-business applications, today announced that Kevin Lindsay, director of solutions marketing, will deliver a presentation at the Air Force Information Technology Conference (AFITC) on Wednesday, Aug. 28 from 10:30 to 11:15a.m. at the Montgomery Civic Center in Montgomery, Ala.
Lindsay will explore, "Five Considerations for Organizing and Searching Content on Distributed, Complex Portals." Using examples from the My.AirForce portal, which will connect more than 28,000 legacy information systems and more than 1,500 Air Force Web sites and intranets around the world, Lindsay will discuss the features that an advanced search and organization solution should contain. These features include a robust spidering solution, document-level security, a scalable and fault-tolerant distributed architecture, an efficient classification system and easy integration with existing systems and other vendors' products.
The U.S. Air Force is deploying Verity's K2-based portal infrastructure software for the My.AirForce portal. Verity's K2 Spider with support for 128-bit secure sockets layer (SSL) encryption will index and store documents in hundreds of formats from thousands of internal and external locations so that users can find content quickly and with the highest available security. In addition, Verity's content organization technology will combine automatic classification with domain expertise to help users navigate through familiar directories and categories to find exactly what they need.
"I am proud to support the Air Force IT Conference's mission to help DoD personnel stay current on the latest technologies and learn of future industry offerings and advances," said Lindsay. "I look forward to sharing Verity's experience in helping the Air Force manage the complexities of My.AirForce portal and enabling more than one million authorized users to quickly and accurately access information on everything from deployment logistics to local family services."
Lindsay is responsible for Verity's product pricing, market and competitive analysis and industry analyst relations. Lindsay joined Verity as product marketing manager in 1997 and was promoted to director of product marketing in 2000. Prior to joining Verity, Lindsay spent two years in product marketing at FTP Software in Canada.
The AFITC, being held Aug. 26-29, is open to active duty military and federal government employees. The Air Force's Standard Systems Group at Maxwell Air Force Base and the City of Montgomery have co-sponsored the conference since it began in 1983 as the Air Force Small Computer Conference. More information about the conference can be found at https://web1.ssg.gunter.af.mil/AFITC.
About Verity
Headquartered in Sunnyvale, Calif., Verity is a leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to improve access to vital information and perform a range of e-business operations, while enhancing the end-user experience. Verity-powered business portals, which include corporate intranets used for sharing information within an enterprise; e-commerce sites for online selling; and market exchange portals for B2B activities, all provide personalized information to employees, partners, customers and suppliers.
Verity products are used by approximately 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include Adobe Systems, AT&T, Cisco, CNET, Compaq, Dow Jones, EDGAR Online, Cap Gemini Ernst & Young, FairMarket, Financial Times, Globe and Mail, Home Depot, Lotus, SAP, Siemens, Sybase, Time New Media and Timex.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...accessible to everyone involved in a project. Easy location and retrieval of information: The ability to find information from document libraries, as well as many other portals and intranets, has fundamentally changed the way the MoD works. Compliance:
...
Summary: ...capability in air, sea, land and space with a world-class prime contracting ability supported by a range of key skills. BAE SYSTEMS designs, manufactures and supports military aircraft, surface ships, submarines, space systems, radar, avionics, communications, electronics, guided weapon systems and a...
Summary: ...Since purchasing Worksite the frm has obtained billions in settlements in cases such as Parker v. Sears Roebuck & Co, Case No. 04-L-716 (Ill.Cir.Ct, Jan. 16, 2008) (settlement valued at $544.5 million); Cooper v. The IBM Pers. Pension Plan, 2005 WL 1981501, 35 Employee Benefts Cas. 2488 (S.D. Ill. Aug....
Summary: ...standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • •
...
Summary: ...15489 and the European MoReq standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • • • •
...
Summary: ...15489 and the European MoReq standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • • • • • • • • • • •
...
Summary: ...Plate Recognition), custody records from legacy systems, and its own Lotus Notes repositories, as well as the force intranet. Case Study Customer Cheshire Constabulary Industry Law Enforcement Autonomy Solution IDOL “Policing is about rapid-response – we need to quickly find exactly what we’re looking...
Summary: ...leading companies, professional services frms, and governments have chosen Interwoven, including adidas, Airbus, Amnesty International USA, Avaya, BT, Cisco, Citi, Delta Air Lines, DLA Piper, FedEx, Grant Thornton, Hilton Hotels, HKMP LLP, Hong Kong Trade and Development Council, HSBC, LexisNexis, MasterCard,...
Summary: ...tool in cross-border investigations to ensure effective information sharing and the provision of mutual aid between forces across the country. New government regulations on intelligence handling and vetting set by the Bichard enquiry meant that the South Yorkshire Police Force faced fresh challenges in...
Summary: ...on the site or ensure consistency in branding—especially for locally-maintained web sites serving overseas markets. “We knew that to stay competitive on the web, we had to be able to do things ourselves rather than beg IT for mindshare,” says Fredrik Lindkvist, Senior Manager of Global Web Marketing,...
Summary: ...operated a mature EDRM system. „A move away from paper-based records offered several business benefits including long-term cost savings, better access to information and the sharing of knowledge and information,“ explains Greg Wynne, information and workspace project manager, Department of Business,...
Summary: ...Customer EUROCONTROL is the European Organization for the Safety of Air Navigation. With 36 member states, its primary objective is the development of a seamless, pan-European Air Traffic Management System. Industry Aviation Challenges • Inconsistent institutional image across 50,000+ web pages and...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...vendor that can scale security to large numbers of users with complex repository security. Autonomy’s technology employs a unique security infrastructure, respecting the enterprise’s existing security levels. Secure Sockets Layer (SSL) encryption protects the security and confidentiality of all corporate...
Summary: ...use because only a Web browser is needed for access from anywhere in the world. Security features of the Web user interface include: • Encrypted communication: Secure Sockets Layer (SSL) encryption protects the LiveVault Web user interface. • Data protection: The contents of backed-up files are not...
Summary: ...the enterprise, from instant messaging (IM), wikis and workflow applications to team calendaring, each of which has its own incompatible proprietary expertise repository, non-uniform schema and distinctive interfaces. Whereas labour-intensive technologies and “point solutions” force the user to adapt...
Summary: ...and passwords remotely • Secure Content at Rest and in Transit – delivering data to / from the mobile device to the WorkSite Mobility for iOS Server via secured SSL transactions and encoding the data on the local device using FIPS certified AES file encryption • Revoke Access and Remote Wipe – rescind...
Summary: ...between IDOL modules. All of the system's modules are capable of operating in a secure communications mode, with minimal processing overhead, to provide 128-bit encryption protection. Additionally, IDOL can leverage SSL for both aggregation and querying of content, including access to SSL encrypted sites....
Summary: ...or many machines using a mass deployment script and template; agent upgrades are automatic. Data is transmitted – without manual intervention – via the Secure Sockets Layer (SSL) protocol, and encrypted at the source using 256-bit AES encryption with a unique key only accessible by its associated...
Summary: ...using a mass deployment script and template; agent upgrades are automatic. Data is transmitted—without manual intervention—via the Secure Sockets Layer (SSL) protocol, and encrypted at the source using 256-bit AES encryption with a unique key only accessible by its associated organization. LiveVault...
Summary: ...step of the way using stringent procedures, protocols, and standards. Autonomy LiveVault encrypts all data at the source using 256-bit AES encryption with a unique private/ public key pair. For an additional layer of protection, LiveVault uses the Secure Sockets Layer (SSL) protocol to establish a secure,...
Summary: ...Autonomy is the only vendor that can scale security to large numbers of users with complex repository security. Autonomy’s technology employs a unique security infrastructure, respecting the enterprise’s existing security levels. Secure Sockets Layer (SSL) encryption protects the security and confidentiality...
Summary: ...and content access at the object level based on user’s group or role • Business Continuity - Clustering and load balancing ensure performance, fault tolerance, high availability and business continuity 2 IDOL enables WorkSite to leverage managed content and locate relevant information instantly, providing...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Addresses the Challenge 5 Ability to Choose 6 Always Up-To-Date 6 Security at Every Scale 7 Automatic Redaction of Information within Documents 7 Kerberos and SSL Encryption 7 Fully Scalable 8 Mitigates Risk 8 4. Real-world Examples 8 5. The Problems with Alternative Approaches 9 Impact on Relevance Calculations...
Summary: ...of the Web user interface include: • Encrypted communication: Secure Sockets Layer (SSL) encryption protects the LiveVault Web user interface. • Data protection: The contents of backed-up files are not accessible. • Privacy protection: Because data encryption passwords are not set or accessed with...
Summary: ...technology to zero in on the relevant documents based on its meaning and context. 9 McNearney v. Wash. Dep’t of Corr, 2012 U.S. Dist. LEXIS 108386, at *15-16 (W.D. Wash. Aug. 1, 2012). 10 Moore v. Publicis Groupe & Msl Group, 2012 U.S. Dist. LEXIS 23350, at *20-23 (S.D.N.Y. Feb. 24, 2012). The “proportionality...
Summary: ...Department of Education and Skills Ginnie Mae Derby City Council Intelligence Community Harlow District Council Internal Revenue Service Home Office U.S. Air Force Information Commissioners Office U.S. Special Operations Command Lewisham Borough Council Defense Information Systems Agency (DISA) MoD Corporate:...
Summary: ...was not just being established to further transparency or general compliance objectives, but more specifically “to increase the probability of successful enforcement.”6 Compliance Failures The credit crisis was undoubtedly the result of global, macro-economic forces. However, within this crisis were...
Summary: ...Counsel Seminar ECA Contents Introduction 1 Scoping Strategies 2 Analytics Assistance 2 Article Sources 4 About Autonomy 5 About HP 5 Inside Counsel Seminar ECA 1 In January, a federal appeals court affirmed orders in re Fannie Mae Securities Litigation1 to force the Office of Federal Housing and Enterprise...
Summary: ...news 5 page eighteen 5 Application examples Figure 9: Tom.com - Chinese internet portal Customer Languages Description TOM.COM Chinese Asian telecommunications giant Hutchinson Whampoa has set up the first series of portals designed specifically for the Chinese community. The portals, which will represent...
Summary: ...contained in the system, the administrator can setup password creation rules that force users to create strong passwords and, if required, to change passwords after user-defined periods of time. Any password sent over the network is encrypted using SSL, and if stored in the database, the password is encrypted...
Summary: ...SharePoint Web Portal Microsoft SharePoint provides a simple, familiar, and consistent user experience for sharing business information. From a management point of view, the software also provides a single, integrated platform to manage intranet, extranet, and Internet applications across the enterprise...
Summary: ...Aug. 9, 2005) (emphasis added). 29 Id. 30 In re Walt Disney Co. Deriv. Litig, 825 A.2d 275 (Del. Ch. 2003). 31 Id. (quoting Official Comm. Of Unsecured Creditors of Integrated Health Serv’s, Inc. v. Elkins, 2004 WL 1949290 (Del. Ch. Aug. 24, 2004)). 32 Griffith at 29 (quoting analysis from Professor...
Summary: ...surrounding scalability • Details Autonomy’s approach • Presents some of the hard facts regarding performance • Explains Autonomy’s architectural underpinnings • Describes Autonomy’s fault tolerant system design The Challenges The growth of information, both structured and unstructured,...
Summary: ...to make purchases on the Web using their credit cards. Today, Internet business is measured in hundreds of billions of dollars. The technology has not changed – secure sockets layer (SSL) existed in 1997, and it’s still what we use today to make purchases on the Web. What has changed is the perception,...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.