Intelligence Application to utilize Autonomy's Infrastructure Technology
Cambridge, England., March 3, 2003-Autonomy Corporation plc (Nasdaq: AUTN; Nasdaq Europe: AUTN; LSE: AU.), a leading provider of information infrastructure software, today announced a new agreement with the Italian Government in the area of protecting the security of homeland territories. The government has purchased Autonomy's IDOL platform including multimedia-handling capabilities for the automation of operations on voice and video data.
Numerous Government agencies are already using Autonomy's automatic technology, in particular within security applications. These include the US Government's newly created Department of Homeland Security, which comprises 200,000 employees across 21 federal agencies. Autonomy's technology enables the automatic aggregation of content from a wide range of sources, including text, voice and video, and analyzes the concepts within them, delivering a highly intelligent infrastructure layer. Autonomy powers a range of real-time operations, including automatic categorization, classification and proactive alerting to relevant information, which simply could not be achieved with a manually driven technology. Because Autonomy's software is conceptual (and therefore not reliant on keywords), it assists agencies in uncovering suspicious activity by identifying patterns of meaning and relationships between pieces of data that may denote cause for concern. Consequently, government agencies are able to act upon information to prevent or minimize potential security threats. In addition, the agencies are using Autonomy to identify relevant experts within the intelligence services, driving a cohesive and effective anti-terrorist community, despite the disparate locations of the agencies concerned and the wide-range of data sources used.
The unique advantage of Autonomy's automatic approach was recently highlighted by Giga Group's Dan Rasmus, Vice President, Strategic Knowledge Initiatives, in his paper, "Autonomy Connects with Homeland Security" where he notes, "The other model [to Autonomy's], using a rules-based or explicit knowledge approach, is too costly because rules must be written with the assumption that things are known. In the case of Homeland Security, the investigators are looking not only for the known, but also for the unknown (new relationships) and rules cannot accommodate that."
Mike Lynch, CEO and Founder of Autonomy today commented, "We are delighted to announce this new sale of Autonomy's infrastructure technology which represents one of the largest applications of our technology. Autonomy is rapidly becoming the de facto standard for high level information management within security and intelligence applications. To date, Autonomy holds the impressive status of being used within more than 50 civilian, defense and Homeland Security agencies."
Autonomy's unique Intelligent Data Operating Layer (IDOL) integrates unstructured, semi-structured and structured information from multiple repositories through an understanding of their content. Autonomy grants enterprises the flexibility to use advanced information retrieval or legacy-based approaches. At the heart of Autonomy's software is its ability to process text, voice and video and identify and rank the main concepts within them. It then automatically categorizes, links, summarizes, personalizes and delivers that information. Autonomy's technology also drives collaboration across the enterprise and enables organizations to effectively leverage expertise. Autonomy's infrastructure technology is used to automate operations within enterprise information portals, customer relationship management, knowledge management, business intelligence and e-business applications, among others.
About Autonomy
Autonomy Corporation plc (Nasdaq: AUTN; Nasdaq Europe: AUTN; LSE: AU.) is a global leader in infrastructure software for the enterprise. Autonomy's technology powers applications dependent upon unstructured information including customer relationship management, knowledge management, enterprise portals, enterprise resource planning, online publishing and security applications. Autonomy's customer base includes more than 600 global organizations including AstraZeneca, BAE Systems, Ford, Ericsson, Hutchison 3G, the BBC, RoyalSunAlliance, Sun Microsystems and public sector agencies including the US Department of Homeland Security, the US Department of Defense, NASA and the US Department of Energy, as well as the UK Government's Department of Trade and Industry. Strategic reseller and OEM partners include leading companies such as ATG, BEA, Business Objects, Computer Associates, Hewlett Packard, IBM Global Services, Vignette, EDS and Sybase. The company has offices worldwide and is on the Web at www.autonomy.com.
Caution Concerning Forward-Looking Statements
With the exception of historical information, the matters set forth in this news release are forward-looking statements that involve risks and uncertainties. A number of important factors could cause actual results to differ materially from those in the forward-looking statements. These factors include, among others, technology risks, including dependence on core technology; fluctuations in quarterly results; dependence on new product development; rapid technological and market change; reliance on sales by others; management of growth; dependence on key personnel; rapid expansion; growth of the Internet; financial risk management; and future growth subject to risks. These factors and other factors, which could cause actual results to differ materially are also discussed in the company's filings with the United States Securities and Exchange Commission, including Autonomy's Annual Report on Form 20-F and Registration Statements on Form F-1.
Summary: ...is responsible for policing a population of approximately one million people throughout Halton, Warrington, Cheshire East and West Cheshire & Chester. The force employs more than 2,000 regular Police Constables, supported by more than 1,500 civilian staff and Police Community Support Officers. In 2010,...
Summary: ...up-to-date and relevant intelligence.” Autonomy is also set to play a major role in the planned expansion of www.janes.com. In the near-term, Jane’s will introduce new sections of premium content to its site called “Intelligence Centres” that cover specific subject areas such as Defense, Transport,...
Summary: ...challenge of duplicate data, it would also need to be able to identify links between related data based on more than a simple keyword match. Finally the system would also need to be fully scalable to accommodate the potential exponential increase in information from police forces across the country. The...
Summary: ...collection was vulnerable to the hazards of physical degradation. Despite being of extraordinary historical and cultural significance, these videos were an untapped resource requiring costly and prolonged manual intervention to process and index. Consequently, much of the footage was left unseen and important...
Summary: ...by identifying if multiple groups are working on similar projects as well as ensuring knowledge and expertise is shared amongst different departments and locations within the organization. The Benefits Thanks to Autonomy’s technology, Ernst & Young Tax Advisors Netherlands has been able to extract intelligence...
Summary: ...KPMG Case Study - Professional Services Intranet. The descriptions of the results that match those parameters can then be searched for “mergers and acquisitions” to quickly narrow in on tax prospects and clients in Europe’s financial services industry with an M&A history. The Benefits IDOL K2 delivers...
Summary: ...problems. More information about HP (NYSE: HPQ) is available at hp.com. “With Autonomy’s unique ability to dynamically populate forms across multiple systems, the information can exist as either standalone entities or as part of a collection depending upon real-time conditions that are automatically...
Summary: ...rolled IDOL Federator out in August 2003 on the rebuilt IDG.net portal. Leading technology publications such as PC World, InfoWorld, Computerworld, CIO magazine, Network World, Macworld, Darwin and BIO-IT World—all powered by Ultraseek’s site search—are among the publications that visitors can now...
Summary: ...Training– Speech analytics identifies coaching and training opportunities on the call center floor, both in realtime and when trending calls over a specific time period. • Realtime Alerts – Immediate trend and sentiment analysis allows operations to uncover reasons customers are calling at a specific...
Summary: ...including file systems, a customer relationship management database, Web servers and a content management application. Softlab also needed a solution that could simplify the information-finding process for hundreds of users within Europe. “We require tools that are not only able to search for information,...
Summary: ...time and budget savings from e-discovery in hours vs. days • More IT team time available for projects such as new business intelligence platform • 210 basis point increase in gross margin in 2009 despite recession, due to increased efficiencies “HP Integrated Archive Platform has gone beyond expectations...
Summary: ...First Interstate Bank - Case Study. First Interstate used Cardiff to standardize on its form design, with common headers and field names, to make it more user friendly for employees. Embedded Intelligence Cardiff Intelligent Documents include built-in business rules that determine what information is...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...in video surveillance and analytics, Business Process Management, and Meaning-Based Computing, Command and Control proactively assists security officers retrieving relevant intelligence in real time. Command and Control is operated through Virage Visor, a cohesive, user-friendly interface which provides...
Summary: ...connecting the dots of each of the security breaches as they surface on the network, the software reveals that all four individuals share the same workplace and that the woman arrested shares a common address with the driver of the towed truck. Cause for concern? Perhaps, but piecing together these clues...
Summary: ...in the DTIC thesaurus. Homeland Security Taxonomy Autonomy’s knowledge engineers have built an extensive Autonomy Taxonomy on Homeland Security issues. Based on direct experience solving content organization issues for intelligence agencies in the U.S. and around the globe, this comprehensive taxonomy...
Summary: ...roots, Auminence securely integrates with electronic health record systems, medical journals and research, and other medical infrastructures, leveraging additional information for a more accurate view of each patient’s clinical situation. It also acts upon the inherently Bayesian idea that prior experience...
Summary: ...to easily test offers, price points, images, and content on their sites simultaneously • Full-Page Multivariate Testing is the most powerful and flexible online optimization method. It enables marketers to test millions of content variations and test relationships among elements to identify optimal...
Summary: ...technologies to enhance the capabilities of law enforcement agencies, firefighters, and emergency response teams. • Security solutions to guard critical infrastructure assets and defend against catastrophic threats. • Architecture solutions to transform heterogeneous IT environments into an integrated...
Summary: ...may be used to defend compliance practices in case of a regulatory or legal investigation. Leveraging IDOL Capabilities Following the successful pattern of the Autonomy Proactive Information Risk Management products, Aungate Real-Time Policy Supervisor utilizes the intelligence of the Autonomy Intelligent...
Summary: ...Autonomy IDOL 10. POWER PROMOTE PROTECT Features • Single processing layer for conceptual, contextual, and real-time understanding of all data, inside and outside the enterprise • Unique pattern-matching powered by statistical algorithms recognize distance in ideas, concepts, and context in real time...
Summary: ...management is performed across every vertical market. Autonomy Records Manager enables organizations to find, access and act upon content from across multiple disparate repositories - regardless of its location, format or record status. Autonomy is not reliant on any single file or data format, and aggregates...
Summary: ...layer that helps you automatically unlock key ideas and concepts in all your information, structured and unstructured. You can understand and act upon documents, emails, video, chat, phone calls, and application data at the same time and faster than ever before. Because we know you store data in a variety...
Summary: ...both the United States and Europe, these data centers are under 24/7 surveillance to ensure that critical client data is preserved and protected against any potential threats.
...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...be written with the assumption that things are known. In the case of Homeland Security, the investigators are looking not only for the known, but also for the unknown (new relationships) and rules cannot accommodate that.” Autonomy Connects with Homeland Security, Dan Rasmus, Giga Challenge: Internal...
Summary: ...intelligence and defense agencies worldwide including the U.S. Department of Homeland Security, U.S. Department of Defense, The British Ministry of Defense, the Olympic Games Security Committee, National Nuclear Security Administration and numerous other intelligence and defense agencies worldwide. One...
Summary: ...legislative governance rules also apply to Homeland Security organizations and provide further reasons why eDRM solutions are gaining importance as a key component of IT systems. Meridio has been designed to take into account the special needs of both the Defense and Homeland Security sectors. Meridio...
Summary: ...of all enterprise content. • Advanced Analytics and Visualization – With an understanding of both the context and concepts of enterprise data, organizations can easily evaluate and identify patterns in information to learn not only what is known, but what is unknown • Seamless Connectivity via a...
Summary: ...accept compromising the performance of their infrastructure platforms. Vendors must provide sub-second response times, and promises must be backed up with legal warranties. Among the many challenges that IT vendors face in addressing security and performance issues are accommodating: • Diverse security...
Summary: ...wanted to identify the major issues causing customers to call about their monthly bills. Autonomy Explore identified a new concept (eg: issue), which had a negative sentiment, concerning fees for one of their premium channels. The company had recently changed the way packages were billed and customers...
Summary: ...or its customers. Data privacy laws such as the Data Protection Act in the UK, the European Union Internet Privacy Law of 2002, as well as the U.S. PATRIOT Act, the Payment Card Industry Data Security Standards, and the Health Insurance Portability and Accountability Act, among many others, mandate provisions...
Summary: ...8 Conclusion . 10 frost.com 3 Moving to Next-Generation Speech Analytics EXECUTIVE SUMMARY Speech analytics is one of the most powerful tools on the contact center workbench. Its business value lies in understanding the precise intent of the customer and driving actionable intelligence. Traditional speech...
Summary: ...PCI Compliance - Autonomy Whitepaper. Non-compliance with these requirements can result in fines and or restrictions, as well as causing irreparable damage to valuable relationships businesses have established with their partners and customers. But more pressingly, non-compliance can create easy access...
Summary: ...Act (SOX) Although the underlying cause of the crisis is debatable, it is clear the current framework failed. These failures transcended oversight and regulatory models, and new regulations and oversight will be implemented to prevent this from happening again. Future Regulations & Oversight While we...
Summary: ...the unique "signature" of the concepts, then enable a host of operations to be performed on that text, automatically. Bringing IDOL to the Desktop The presence of IDOL at the very foundation of IDOL Enterprise Desktop Search brings previously unknown levels of search accuracy, real-time data delivery...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.