Verity Completes Acquisition of Inktomi Enterprise Search Software Business
Customers to Realize Benefits of "Full Spectrum" Information Retrieval
SUNNYVALE, Calif. - 2002-12-18 - Verity Inc., (NASDAQ: VRTY), a leading provider of infrastructure software that powers corporate intranets and e-commerce sites as well as e-business applications, today announced the completion of its acquisition of the enterprise search software business from Inktomi Corp. (NASDAQ: INKT).
"We are excited to have the opportunity to provide customers with the ability to benefit from a portfolio of products that covers the full spectrum of enterprise search solutions," said Gary J. Sbona, Verity's chairman and CEO. "With the depth and breadth of our product offering, customers will be able to start with us and stay with us as their needs grow. Verity and Inktomi enterprise search technologies and products, in combination, deliver the broadest and strongest information retrieval offerings available today."
Inktomi® Enterprise Search will be renamed Verity Ultraseek, bringing back the product's original and well-regarded brand on a worldwide basis. Verity also gains access to Inktomi's enterprise search customer base of 2,500 companies worldwide, considerably expanding Verity's installed base of customers. Support and maintenance services for existing Verity Ultraseek customers are already in place. In addition, work to create linkages between Verity Ultraseek and other Verity products is being conducted by a development team that includes developers from Inktomi who are joining Verity. The company intends to provide further details on Verity Ultraseek branding as well as service and maintenance programs for the product shortly.
"Overall, this transaction means a healthier market for enterprise search because Verity can address a broader range of market requirements and move down market by creating an in-house channel that can help drive further demand for its enterprise products," states Laura Ramos, director at Giga Information Group in research entitled "Enterprise Search Consolidation Signals Healthier Market Ahead."
"Rationalizing the IT infrastructure continues to be a major priority for Global 2000 executives," said Hadley Reynolds, director of research, Delphi Group, a leading market advisor. "With Verity Ultraseek incorporated in the software portfolio, Verity can offer enterprises that seek better returns from content intelligence solutions a new level of business unification. This single channel offer, crossing the spectrum of smart analytics and presentation options, is a harbinger of what will be demanded of search providers going forward."
About Verity
Headquartered in Sunnyvale, Calif., Verity is a leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to improve access to vital information and perform a range of e-business operations, while enhancing the end-user experience. Verity-powered business portals, which include corporate intranets used for sharing information within an enterprise; e-commerce sites for online selling; and market exchange portals for B2B activities, all provide personalized information to employees, partners, customers and suppliers.
Verity products are used by approximately 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include Adobe Systems, AT&T, Cap Gemini Ernst & Young, Cisco, CNET, Compaq, Dow Jones, EDGAR Online, FairMarket, Financial Times, Globe and Mail, Home Depot, Lotus, SAP, Siemens, Sybase, Time New Media and Timex.
Forward-Looking Statements
The statements in this press release regarding the benefits Verity expects to obtain from the acquisition, including the potential benefits of the Inktomi products and technologies acquired, are forward-looking statements that involve a number of uncertainties and risks. The success of the acquisition and benefits Verity ultimately obtains may differ from Verity's expectations. Such uncertainties and risks include, without limitation: the potential difficulties and uncertainties in the assimilation of technologies, methodologies and products of Inktomi into Verity's products; the risk of loss of key personnel Verity hired from Inktomi; diversion of management attention from other business concerns; and the risk that the integration of the potential benefits of Inktomi technology and personnel into Verity will not be successful due to company culture or other issues. As a result actual results may differ substantially from expectations. For further information on risks affecting Verity, refer to the section entitled "Risk Factors" in Verity's most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission. Verity undertakes no obligation to update the information in this press release.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...KPMG Case Study - Professional Services Intranet. Accelerating Value Organization KPMG LLP (UK) Industry Professional Services Type of Application Professional Services Intranet Autonomy Solution IDOL K2 infrastructure Functionality Classification Parametric Selection Conceptual Retrieval Repository Interfacing...
Summary: ...in, KeySpan has seen a threefold increase in website usage. As part of the site redesign, AGENCY.COM simplified navigation, created a new lookand-feel that reflected the brand messages of the regulated and unregulated businesses (which each had separate offline marketing campaigns) and redesigned page...
Summary: ...University of California, San Francisco (UCSF) - Case Study. That’s a productivity boost of 1500%. UCSF realizes these gains because TeleForm automates the capture of critical research information and processes high volumes of data accurately—with minimal ongoing maintenance required. TeleForm’s...
Summary: ...Director of Avaya Interactive, the sheer volume and diversity of the websites and their more than 500 content creators resulted in an inefficient, people-based content distribution system rife with divergent branding, messaging, and product information. “Our intranets, sales extranets, and customer-facing...
Summary: ...The compatibility between Ultraseek and IDOL Federator was crucial, Effron says. “Federator appeared to be an ideal solution because it exploited the fact that most of our IDG sites already use Ultraseek for local site search functionality,” he says. “And Federator didn’t require any central content...
Summary: ...aren’t able to do,” says Gibbons. “Content syndication will take our online operations to the next level by enabling the generation of revenue through online channels.” Russell has standardized its corporate site, many of its intranets, and its institutional investor extranets on the Autonomy...
Summary: ...Global Brand Ensures Competitive Edge for Aon - case study. Aon sought a partner that could help it build an enterprise-wide system that met its goal to unite its businesses under a single brand and provide new tailored country-specific information. Aon turned to Autonomy. “We looked at many different...
Summary: ...Fast turnaround time • Data entry staff free to do other tasks • Project expanded to include French National Statistics Bureau forms for its ongoing national data collection efforts “For MOD, the benefits have been excellent. It needed a low maintenance solution for this large national effort, but...
Summary: ...independent sales force of two million. Product brands and categories include designcentric preparation, storage and serving solutions for the kitchen and home through the Tupperware brand, and beauty and personal care products through its Avroy Shlain, BeautiControl, Fuller, NaturCare, Nutrimetics, Nuvo...
Summary: ...Evolving Relationship The CSO, Autonomy and Inpute have now been working together for over eight years and the relationship between the companies continues to thrive with Inpute providing technical support and maintenance. Any software problems the CSO encounters are immediately dealt with by Inpute....
Summary: ...BAE Systems - The right information to the right people in real time - Case Study. Tools like Autonomy ensure that this sharing of best practice is more likely, particularly in a global organization", (Richard West, Head of Organisational and e-learning). Ease of maintenance and scalability Once BAE SYSTEMS...
Summary: ...a seamless research tool linking similar items together, as well as for external visitors since it increases time spent on the site and encourages subscription. Furthermore, due to Autonomy’s automation of backend website maintenance, such as sitemap generation, El Mundo has been able to save staff...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...SharePoint metadata, for example, the title and descriptions of lists and sites Security Autonomy provides all aspects of security management, including front-end user authentication, back-end entitlement checking and secure encrypted communication between the IDOL Server and its client applications with...
Summary: ...Security and surveillance. • Scalability – Scalable in a linear manner, the Autonomy system can grow with the evolving information needs of your enterprise. • Mapped security – Enable document and intra-document access control by user, group, and role level entitlement. • Global language support...
Summary: ...of all corporate assets, including internal and external communications. Autonomy Express Search employs Autonomy’s mapped security, providing high-performance automatic verification against user, group and role level entitlement and advanced user authentication, including the facility for an administrator...
Summary: ...Type: Toolkit Dependencies: Information flows into: IDOL server™, DIH Information received from: Dynamic Link Library Modules it can communicate with: DiSH, IDOL server™ NT 200 MHz Pentium processor 128 MB RAM 3 GB hard disk recommended UNIX 256 MB of RAM 4 GB hard disk recommended Standard plug-ins:...
Summary: ...Intelligent Universal Search - Autonomy Product Brief. Autonomy provides all aspects of security management, including front-end user authentication, back-end entitlement checking and secure encrypted communication between the IDOL Server and its client applications, with 128-bit Block Tiny Encryption...
Summary: ...that enters the enterprise • All types of communication supported including documents, telephone calls, voicemails, attachments, e-mails, and video • Holistic understanding of enterprise information • Minimal human intervention and maintenance costs • Rapid, accurate extraction of data • Format...
Summary: ...with benefits for both the firm and the business users. • Productivity, efficiency, and consistency – Easy to use, familiar Network File Share interface – Compatible with broader set of applications, end user roles, tasks – Quickly able to import contents, even file hierarchies via drag and drop...
Summary: ...Type: Connector Dependencies: Information flows into: IDOL server™, DIH Information received from: Lotus Notes Domino server or client Modules it can communicate with: DiSH, IDOL server™ NT 200 MHz Pentium processor 128 MB RAM 3 GB hard disk recommended Third Party Drivers: Lotus Notes Client Standard...
Summary: ...autonomy.com Other Offices Autonomy has additional offices in Amsterdam, Beijing, Boston, Brussels, Buenos Aires, Calgary, Dallas, Frankfurt, Kuala Lumpur, London, Madrid, Milan, Munich, New York, Oslo, Paris, Rome, Shanghai, Singapore, Stockholm, Sunnyvale, Sydney, Tokyo and Washington DC. www.autonomy.com...
Summary: ...understanding of the data space. This “self-learning” capability is extremely valuable in a business context, as organizations can leverage the insights to continually improve processes, operations, and interactions with customers. IDOL SPE can be broadly explained within the context of two spheres...
Summary: ...a lower total cost of ownership and rapid return on investment. System requirements Intel Pentium processor Microsoft Windows 95, Windows Millennium, Windows NT 4.0, Windows 2000 or Windows XP 64MB RAM 50MB of available hard-disk space About Autonomy Autonomy Corporation plc (LSE: AU. or AU.L), a global...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...among both clients and the professionals that serve them. WorkSite enables firms to address all of their extranet and intranet needs with a single system by providing a security model that supports both internal and external users within the same workspace. Firms can use WorkSite to deploy a broad diversity...
Summary: ...systems into that archive should not generate a whole new set of policies and procedures. Nor should it require the creation and maintenance of another set of indexes. In the event of an eDiscovery or compliance request, it should be possible to undertake a single cohesive project encompassing both live...
Summary: ...constitute a complex and dynamic environment of code, static content and configurations in which updates are aggregated, synchronized and deployed from multiple development systems to distributed servers throughout testing, staging and production environments. Changes can be initiated by a broad spectrum...
Summary: ...as new mail servers can be expensive when one considers the added acquisition, licensing, administration, and maintenance costs. As an example, according to research conducted by The Radicati Group, the average organization running Microsoft Exchange spends $20,442 per server per year for server administration....
Summary: ...Selecting an Enterprise Records Management system enabling best practice records management (US English). Recordkeeping is an important part of information management but not the whole and the terms are not interchangeable. Records are not the same as other information resources; they need to be regarded...
Summary: ...How to Reduce the Cost of Compliance: Change and Release Management Processes. Regulations, due to their necessarily broad scope, tend not to be very prescriptive. Regulators need to leave the requirements very broad to make them withstand the test of time and relevance. Any attempt to make them concise...
Summary: ...companies, often newcomers to the data protection marketplace. “Point solution” providers base services on software they have developed that addresses only data protection, rather than a broader spectrum of information management and protection solutions. Niche service providers attempt to focus exclusively...
Summary: ...that serve them. WorkSite enables legal departments to address all of their extranet and intranet needs with a single system by providing a security model that supports both internal and external users within the same workspace. Departments can use WorkSite to deploy a broad diversity of content accessible...
Summary: ...converting their information into XML-aware formats. Autonomy's XML automation addresses the major obstacle posed by today's requirement to manually prepare XML business documents." Hadley Reynolds, Research Director, Delphi Group, Boston 4.2 Autonomy and XML Autonomy’s technology was XML-compliant...
Summary: ...a Solution 3 Conclusion 4 About Autonomy 4 Audio Governance and COBS 11.8 1 Overview of COBS 11.8 Introduction Financial services firms have no shortage of regulatory obligations with which they must comply. Each year brings greater scrutiny by regulators and the public, while the breadth and volume of...
Summary: ...is to ensure that all additional security checks are done in the background, hidden to the user. Company Intranets and Intelligence Applications Although the requirements for company intranets and intelligence scenarios are more demanding and require highperformance mapped security, vendors must still...
Summary: ...architecture that has multiple design attributes in place to form an optimal solution to the complex problem of entitlement resolution. Autonomy is the only technology in the world to offer Mapped Security, a highly configurable, secure, accurate, and fast method for respecting third-party security entitlements....
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.