Verity to Address the 2002 Air Force Information Technology Conference
Director of Solutions Marketing Kevin Lindsay to Speak on Content Organization and Search Technologies for Distributed, Complex Portals
Sunnyvale, Calif. - 2002-08-26 - Verity Inc. (NASDAQ: VRTY), a leading provider of infrastructure software powering corporate intranets and e-commerce sites as well as e-business applications, today announced that Kevin Lindsay, director of solutions marketing, will deliver a presentation at the Air Force Information Technology Conference (AFITC) on Wednesday, Aug. 28 from 10:30 to 11:15a.m. at the Montgomery Civic Center in Montgomery, Ala.
Lindsay will explore, "Five Considerations for Organizing and Searching Content on Distributed, Complex Portals." Using examples from the My.AirForce portal, which will connect more than 28,000 legacy information systems and more than 1,500 Air Force Web sites and intranets around the world, Lindsay will discuss the features that an advanced search and organization solution should contain. These features include a robust spidering solution, document-level security, a scalable and fault-tolerant distributed architecture, an efficient classification system and easy integration with existing systems and other vendors' products.
The U.S. Air Force is deploying Verity's K2-based portal infrastructure software for the My.AirForce portal. Verity's K2 Spider with support for 128-bit secure sockets layer (SSL) encryption will index and store documents in hundreds of formats from thousands of internal and external locations so that users can find content quickly and with the highest available security. In addition, Verity's content organization technology will combine automatic classification with domain expertise to help users navigate through familiar directories and categories to find exactly what they need.
"I am proud to support the Air Force IT Conference's mission to help DoD personnel stay current on the latest technologies and learn of future industry offerings and advances," said Lindsay. "I look forward to sharing Verity's experience in helping the Air Force manage the complexities of My.AirForce portal and enabling more than one million authorized users to quickly and accurately access information on everything from deployment logistics to local family services."
Lindsay is responsible for Verity's product pricing, market and competitive analysis and industry analyst relations. Lindsay joined Verity as product marketing manager in 1997 and was promoted to director of product marketing in 2000. Prior to joining Verity, Lindsay spent two years in product marketing at FTP Software in Canada.
The AFITC, being held Aug. 26-29, is open to active duty military and federal government employees. The Air Force's Standard Systems Group at Maxwell Air Force Base and the City of Montgomery have co-sponsored the conference since it began in 1983 as the Air Force Small Computer Conference. More information about the conference can be found at https://web1.ssg.gunter.af.mil/AFITC.
About Verity
Headquartered in Sunnyvale, Calif., Verity is a leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to improve access to vital information and perform a range of e-business operations, while enhancing the end-user experience. Verity-powered business portals, which include corporate intranets used for sharing information within an enterprise; e-commerce sites for online selling; and market exchange portals for B2B activities, all provide personalized information to employees, partners, customers and suppliers.
Verity products are used by approximately 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include Adobe Systems, AT&T, Cisco, CNET, Compaq, Dow Jones, EDGAR Online, Cap Gemini Ernst & Young, FairMarket, Financial Times, Globe and Mail, Home Depot, Lotus, SAP, Siemens, Sybase, Time New Media and Timex.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...capability in air, sea, land and space with a world-class prime contracting ability supported by a range of key skills. BAE SYSTEMS designs, manufactures and supports military aircraft, surface ships, submarines, space systems, radar, avionics, communications, electronics, guided weapon systems and a...
Summary: ...its commitments to Central Government and the public in this area. Re-use of technology: The Accelerator working environment has now also been rolled out to other parts of the MoD, including the Royal Air Force Headquarters, the Royal Navy’s Headquarters and the Permanent Joint Headquarters, to a total...
Summary: ...standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • •
...
Summary: ...15489 and the European MoReq standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • • • •
...
Summary: ...15489 and the European MoReq standard. Customers include BioPAD, ConocoPhillips, CDW, Hipoteku Banka, NZ Ministry of Fisheries, Pacific Life, StatoilHydro, Scottish and Southern Energy, the UK Ministry of Defence and the US Air Force. • • • • • • • • • • • •
...
Summary: ...Since purchasing Worksite the frm has obtained billions in settlements in cases such as Parker v. Sears Roebuck & Co, Case No. 04-L-716 (Ill.Cir.Ct, Jan. 16, 2008) (settlement valued at $544.5 million); Cooper v. The IBM Pers. Pension Plan, 2005 WL 1981501, 35 Employee Benefts Cas. 2488 (S.D. Ill. Aug....
Summary: ...Plate Recognition), custody records from legacy systems, and its own Lotus Notes repositories, as well as the force intranet. Case Study Customer Cheshire Constabulary Industry Law Enforcement Autonomy Solution IDOL “Policing is about rapid-response – we need to quickly find exactly what we’re looking...
Summary: ...is to a commercial intelligence operation,” by CBS television newsmagazine, 60 Minutes—is the leading provider of defense, security and transportation information to governments, militaries, universities and businesses. Jane’s publishes primarily in electronic formats in addition to more than 200...
Summary: ...leading companies, professional services frms, and governments have chosen Interwoven, including adidas, Airbus, Amnesty International USA, Avaya, BT, Cisco, Citi, Delta Air Lines, DLA Piper, FedEx, Grant Thornton, Hilton Hotels, HKMP LLP, Hong Kong Trade and Development Council, HSBC, LexisNexis, MasterCard,...
Summary: ...is under license. [AUT GO] 08.0 9.05 had to sort through numerous irrelevant hits—everything from pigpens to pendants. With IDOL K2, users can specify “writing pens,” and the system intuitively knows exactly what they want. Customers can also type in a sentence, a part number, a manufacturer number...
Summary: ...tool in cross-border investigations to ensure effective information sharing and the provision of mutual aid between forces across the country. New government regulations on intelligence handling and vetting set by the Bichard enquiry meant that the South Yorkshire Police Force faced fresh challenges in...
Summary: ...operated a mature EDRM system. „A move away from paper-based records offered several business benefits including long-term cost savings, better access to information and the sharing of knowledge and information,“ explains Greg Wynne, information and workspace project manager, Department of Business,...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...vendor that can scale security to large numbers of users with complex repository security. Autonomy’s technology employs a unique security infrastructure, respecting the enterprise’s existing security levels. Secure Sockets Layer (SSL) encryption protects the security and confidentiality of all corporate...
Summary: ...between IDOL modules. All of the system's modules are capable of operating in a secure communications mode, with minimal processing overhead, to provide 128-bit encryption protection. Additionally, IDOL can leverage SSL for both aggregation and querying of content, including access to SSL encrypted sites....
Summary: ...or many machines using a mass deployment script and template; agent upgrades are automatic. Data is transmitted – without manual intervention – via the Secure Sockets Layer (SSL) protocol, and encrypted at the source using 256-bit AES encryption with a unique key only accessible by its associated...
Summary: ...using a mass deployment script and template; agent upgrades are automatic. Data is transmitted—without manual intervention—via the Secure Sockets Layer (SSL) protocol, and encrypted at the source using 256-bit AES encryption with a unique key only accessible by its associated organization. LiveVault...
Summary: ...and protected at every step of the way, using stringent procedures, protocols, and standards. Autonomy LiveVault encrypts all data at the source using 256-bit AES encryption with a unique key. For an additional layer of protection, LiveVault uses the Secure Sockets Layer (SSL) protocol to establish a...
Summary: ...Autonomy is the only vendor that can scale security to large numbers of users with complex repository security. Autonomy’s technology employs a unique security infrastructure, respecting the enterprise’s existing security levels. Secure Sockets Layer (SSL) encryption protects the security and confidentiality...
Summary: ...content ensures high customer service levels at all times • Robust Security - WorkSite has the ability to control system functionality and content access at the object level based on user's group or role • Business Continuity - Clustering and load balancing ensure performance, fault tolerance, high...
Summary: ...of known or suspected threats. The solution also enables you to identify regular traffic patterns, authorizing entry to secured facilities, and logging arrivals and departures. You can also include time scheduling as a standard facility to offer vehicle access control for commercial and industry entry/...
Summary: ...professionals. • Government:In addition to the above capabilities, this module provides support for real-time data delivery, FOIA processing and enhanced military-grade security. Autonomy is an early adopter of international standards and is certified against the US DoD 5015.02 (ch 2,3,4) , UK TNA,...
Summary: ...operating them, and virtually all failures to respond appropriately to alerts are due to human error. Recent industry figures show that within the first 15 minutes of logging on to the system a security officer will miss 85% of what happens on screen, and logistical factors such as multiple duties, shift...
Summary: ...the enterprise, from instant messaging (IM), wikis and workflow applications to team calendaring, each of which has its own incompatible proprietary expertise repository, non-uniform schema and distinctive interfaces. Whereas labour-intensive technologies and “point solutions” force the user to adapt...
Summary: ...data movement and administrative churn. Desktop PST Collections Digital Safe can silently install an intelligent, lightweight agent on user desktops to analyze and run policy-based PST collections. No longer are enterprises forced to collect and store the massive amounts of PST that reside on desktops,...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Addresses the Challenge 5 Ability to Choose 6 Always Up-To-Date 6 Security at Every Scale 7 Automatic Redaction of Information within Documents 7 Kerberos and SSL Encryption 7 Fully Scalable 8 Mitigates Risk 8 4. Real-world Examples 8 5. The Problems with Alternative Approaches 9 Impact on Relevance Calculations...
Summary: ...of the Web user interface include: • Encrypted communication: Secure Sockets Layer (SSL) encryption protects the LiveVault Web user interface. • Data protection: The contents of backed-up files are not accessible. • Privacy protection: Because data encryption passwords are not set or accessed with...
Summary: ...Department of Education and Skills Ginnie Mae Derby City Council Intelligence Community Harlow District Council Internal Revenue Service Home Office U.S. Air Force Information Commissioners Office U.S. Special Operations Command Lewisham Borough Council Defense Information Systems Agency (DISA) MoD Corporate:...
Summary: ...was not just being established to further transparency or general compliance objectives, but more specifically “to increase the probability of successful enforcement.”6 Compliance Failures The credit crisis was undoubtedly the result of global, macro-economic forces. However, within this crisis were...
Summary: ...Counsel Seminar ECA Contents Introduction 1 Scoping Strategies 2 Analytics Assistance 2 Article Sources 4 About Autonomy 5 About HP 5 Inside Counsel Seminar ECA 1 In January, a federal appeals court affirmed orders in re Fannie Mae Securities Litigation1 to force the Office of Federal Housing and Enterprise...
Summary: ...contained in the system, the administrator can setup password creation rules that force users to create strong passwords and, if required, to change passwords after user-defined periods of time. Any password sent over the network is encrypted using SSL, and if stored in the database, the password is encrypted...
Summary: ...the administrator can setup password creation rules that force users to create strong passwords and, if required, to change passwords after user-defined periods of time. Any password sent over the network is encrypted using SSL, and if stored in the database, the password is encrypted with a one-way hash....
Summary: ...news 5 page eighteen 5 Application examples Figure 9: Tom.com - Chinese internet portal Customer Languages Description TOM.COM Chinese Asian telecommunications giant Hutchinson Whampoa has set up the first series of portals designed specifically for the Chinese community. The portals, which will represent...
Summary: ...SharePoint Web Portal Microsoft SharePoint provides a simple, familiar, and consistent user experience for sharing business information. From a management point of view, the software also provides a single, integrated platform to manage intranet, extranet, and Internet applications across the enterprise...
Summary: ...Encryption Algorithm (BTEA) or General Security Services (GSS). Autonomy has fully integrated Kerberos authentication together with Secure Socket Layer (SSL) encryption across all transactions. As a result, packet sniffers (programs that monitor data traveling over a network) that are able to break past...
Summary: ...Aug. 9, 2005) (emphasis added). 29 Id. 30 In re Walt Disney Co. Deriv. Litig, 825 A.2d 275 (Del. Ch. 2003). 31 Id. (quoting Official Comm. Of Unsecured Creditors of Integrated Health Serv’s, Inc. v. Elkins, 2004 WL 1949290 (Del. Ch. Aug. 24, 2004)). 32 Griffith at 29 (quoting analysis from Professor...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.