Intelligence Application to utilize Autonomy's Infrastructure Technology
Cambridge, England., March 3, 2003-Autonomy Corporation plc (Nasdaq: AUTN; Nasdaq Europe: AUTN; LSE: AU.), a leading provider of information infrastructure software, today announced a new agreement with the Italian Government in the area of protecting the security of homeland territories. The government has purchased Autonomy's IDOL platform including multimedia-handling capabilities for the automation of operations on voice and video data.
Numerous Government agencies are already using Autonomy's automatic technology, in particular within security applications. These include the US Government's newly created Department of Homeland Security, which comprises 200,000 employees across 21 federal agencies. Autonomy's technology enables the automatic aggregation of content from a wide range of sources, including text, voice and video, and analyzes the concepts within them, delivering a highly intelligent infrastructure layer. Autonomy powers a range of real-time operations, including automatic categorization, classification and proactive alerting to relevant information, which simply could not be achieved with a manually driven technology. Because Autonomy's software is conceptual (and therefore not reliant on keywords), it assists agencies in uncovering suspicious activity by identifying patterns of meaning and relationships between pieces of data that may denote cause for concern. Consequently, government agencies are able to act upon information to prevent or minimize potential security threats. In addition, the agencies are using Autonomy to identify relevant experts within the intelligence services, driving a cohesive and effective anti-terrorist community, despite the disparate locations of the agencies concerned and the wide-range of data sources used.
The unique advantage of Autonomy's automatic approach was recently highlighted by Giga Group's Dan Rasmus, Vice President, Strategic Knowledge Initiatives, in his paper, "Autonomy Connects with Homeland Security" where he notes, "The other model [to Autonomy's], using a rules-based or explicit knowledge approach, is too costly because rules must be written with the assumption that things are known. In the case of Homeland Security, the investigators are looking not only for the known, but also for the unknown (new relationships) and rules cannot accommodate that."
Mike Lynch, CEO and Founder of Autonomy today commented, "We are delighted to announce this new sale of Autonomy's infrastructure technology which represents one of the largest applications of our technology. Autonomy is rapidly becoming the de facto standard for high level information management within security and intelligence applications. To date, Autonomy holds the impressive status of being used within more than 50 civilian, defense and Homeland Security agencies."
Autonomy's unique Intelligent Data Operating Layer (IDOL) integrates unstructured, semi-structured and structured information from multiple repositories through an understanding of their content. Autonomy grants enterprises the flexibility to use advanced information retrieval or legacy-based approaches. At the heart of Autonomy's software is its ability to process text, voice and video and identify and rank the main concepts within them. It then automatically categorizes, links, summarizes, personalizes and delivers that information. Autonomy's technology also drives collaboration across the enterprise and enables organizations to effectively leverage expertise. Autonomy's infrastructure technology is used to automate operations within enterprise information portals, customer relationship management, knowledge management, business intelligence and e-business applications, among others.
About Autonomy
Autonomy Corporation plc (Nasdaq: AUTN; Nasdaq Europe: AUTN; LSE: AU.) is a global leader in infrastructure software for the enterprise. Autonomy's technology powers applications dependent upon unstructured information including customer relationship management, knowledge management, enterprise portals, enterprise resource planning, online publishing and security applications. Autonomy's customer base includes more than 600 global organizations including AstraZeneca, BAE Systems, Ford, Ericsson, Hutchison 3G, the BBC, RoyalSunAlliance, Sun Microsystems and public sector agencies including the US Department of Homeland Security, the US Department of Defense, NASA and the US Department of Energy, as well as the UK Government's Department of Trade and Industry. Strategic reseller and OEM partners include leading companies such as ATG, BEA, Business Objects, Computer Associates, Hewlett Packard, IBM Global Services, Vignette, EDS and Sybase. The company has offices worldwide and is on the Web at www.autonomy.com.
Caution Concerning Forward-Looking Statements
With the exception of historical information, the matters set forth in this news release are forward-looking statements that involve risks and uncertainties. A number of important factors could cause actual results to differ materially from those in the forward-looking statements. These factors include, among others, technology risks, including dependence on core technology; fluctuations in quarterly results; dependence on new product development; rapid technological and market change; reliance on sales by others; management of growth; dependence on key personnel; rapid expansion; growth of the Internet; financial risk management; and future growth subject to risks. These factors and other factors, which could cause actual results to differ materially are also discussed in the company's filings with the United States Securities and Exchange Commission, including Autonomy's Annual Report on Form 20-F and Registration Statements on Form F-1.
Summary: ...Jane's Information Group Case Study - Intelligence Portal. Case Study Company Background Jane’s Information Group—once called “the closest thing there is to a commercial intelligence operation,” by CBS television newsmagazine, 60 Minutes—is the leading provider of defense, security and transportation...
Summary: ...collection was vulnerable to the hazards of physical degradation. Despite being of extraordinary historical and cultural significance, these videos were an untapped resource requiring costly and prolonged manual intervention to process and index. Consequently, much of the footage was left unseen and important...
Summary: ...is responsible for policing a population of approximately one million people throughout Halton, Warrington, Cheshire East and West Cheshire & Chester. The force employs more than 2,000 regular Police Constables, supported by more than 1,500 civilian staff and Police Community Support Officers. In 2010,...
Summary: ...challenge of duplicate data, it would also need to be able to identify links between related data based on more than a simple keyword match. Finally the system would also need to be fully scalable to accommodate the potential exponential increase in information from police forces across the country. The...
Summary: ...by identifying if multiple groups are working on similar projects as well as ensuring knowledge and expertise is shared amongst different departments and locations within the organization. The Benefits Thanks to Autonomy’s technology, Ernst & Young Tax Advisors Netherlands has been able to extract intelligence...
Summary: ...KPMG Case Study - Professional Services Intranet. The descriptions of the results that match those parameters can then be searched for “mergers and acquisitions” to quickly narrow in on tax prospects and clients in Europe’s financial services industry with an M&A history. The Benefits IDOL K2 delivers...
Summary: ...problems. More information about HP (NYSE: HPQ) is available at hp.com. “With Autonomy’s unique ability to dynamically populate forms across multiple systems, the information can exist as either standalone entities or as part of a collection depending upon real-time conditions that are automatically...
Summary: ...rolled IDOL Federator out in August 2003 on the rebuilt IDG.net portal. Leading technology publications such as PC World, InfoWorld, Computerworld, CIO magazine, Network World, Macworld, Darwin and BIO-IT World—all powered by Ultraseek’s site search—are among the publications that visitors can now...
Summary: ...to help our properties and agencies guide creative development,” explains Mohn. “By leveraging a clearly identifiable brand footprint and proven best practices, we can make every piece that goes out more effective.” To build the portal, and lay the foundation for further brand initiatives, Harrah’s...
Summary: ...Training– Speech analytics identifies coaching and training opportunities on the call center floor, both in realtime and when trending calls over a specific time period. • Realtime Alerts – Immediate trend and sentiment analysis allows operations to uncover reasons customers are calling at a specific...
Summary: ...and legal documents. This content had existed in paper form—creating numerous problems for the frm. Collaboration among teams in different locations was an ineffcient process with no system to share knowledge. And fles that were checked out or missing caused frequent productivity bottlenecks. Eisner’s...
Summary: ...on a high volume of users to attract new advertisers and to increase the click-through rates on its current advertising accounts, the company knew its future success was contingent upon providing high-performance, user-friendly search and content organization technology. Millions of dollars in revenue...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...in video surveillance and analytics, Business Process Management, and Meaning-Based Computing, Command and Control proactively assists security officers retrieving relevant intelligence in real time. Command and Control is operated through Virage Visor, a cohesive, user-friendly interface which provides...
Summary: ...connecting the dots of each of the security breaches as they surface on the network, the software reveals that all four individuals share the same workplace and that the woman arrested shares a common address with the driver of the towed truck. Cause for concern? Perhaps, but piecing together these clues...
Summary: ...in the DTIC thesaurus. Homeland Security Taxonomy Autonomy’s knowledge engineers have built an extensive Autonomy Taxonomy on Homeland Security issues. Based on direct experience solving content organization issues for intelligence agencies in the U.S. and around the globe, this comprehensive taxonomy...
Summary: ...Autonomy IDOL 10. POWER PROMOTE PROTECT Features • Single processing layer for conceptual, contextual, and real-time understanding of all data, inside and outside the enterprise • Unique pattern-matching powered by statistical algorithms recognize distance in ideas, concepts, and context in real time...
Summary: ...management is performed across every vertical market. Autonomy Records Manager enables organizations to find, access and act upon content from across multiple disparate repositories - regardless of its location, format or record status. Autonomy is not reliant on any single file or data format, and aggregates...
Summary: ...roots, Auminence securely integrates with electronic health record systems, medical journals and research, and other medical infrastructures, leveraging additional information for a more accurate view of each patient’s clinical situation. It also acts upon the inherently Bayesian idea that prior experience...
Summary: ...may be used to defend compliance practices in case of a regulatory or legal investigation. Leveraging IDOL Capabilities Following the successful pattern of the Autonomy Proactive Information Risk Management products, Aungate Real-Time Policy Supervisor utilizes the intelligence of the Autonomy Intelligent...
Summary: ...to enhance the capabilities of law enforcement agencies, firefighters, and emergency response teams. • Security solutions to guard critical infrastructure assets and defend against catastrophic threats. • Architecture solutions to transform heterogeneous IT environments into an integrated infrastructure...
Summary: ...Hyperlinking IDOL Retina automatically finds related pieces of information, regardless of their format. The concepts in a document can be linked automatically to those in another file. They can also be linked to related concepts within video or voice mail. Hyperlinks are generated in real-time at the...
Summary: ...and frequency of words or terms that correspond to specific ideas or concepts. This unique search capability underlies Autonomy Express Search, providing unmatched accuracy of results across the desktop and enterprise content. Autonomy is not reliant on any single file or data format. Autonomy aggregates...
Summary: ...both the United States and Europe, these data centers are under 24/7 surveillance to ensure that critical client data is preserved and protected against any potential threats.
...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...be written with the assumption that things are known. In the case of Homeland Security, the investigators are looking not only for the known, but also for the unknown (new relationships) and rules cannot accommodate that.” Autonomy Connects with Homeland Security, Dan Rasmus, Giga Challenge: Internal...
Summary: ...intelligence and defense agencies worldwide including the U.S. Department of Homeland Security, U.S. Department of Defense, The British Ministry of Defense, the Olympic Games Security Committee, National Nuclear Security Administration and numerous other intelligence and defense agencies worldwide. One...
Summary: ...wanted to identify the major issues causing customers to call about their monthly bills. Autonomy Explore identified a new concept (eg: issue), which had a negative sentiment, concerning fees for one of their premium channels. The company had recently changed the way packages were billed and customers...
Summary: ...legislative governance rules also apply to Homeland Security organizations and provide further reasons why eDRM solutions are gaining importance as a key component of IT systems. Meridio has been designed to take into account the special needs of both the Defense and Homeland Security sectors. Meridio...
Summary: ...of all enterprise content. • Advanced Analytics and Visualization – With an understanding of both the context and concepts of enterprise data, organizations can easily evaluate and identify patterns in information to learn not only what is known, but what is unknown • Seamless Connectivity via a...
Summary: ...modern centers have engaged in this more complex mission has been to add a layer of analysis to the data gathering. There is a special emphasis on the unstructured voice recordings. Speech analytics software has been helpful in turning voice conversations into vital customer and contact center performance...
Summary: ...accept compromising the performance of their infrastructure platforms. Vendors must provide sub-second response times, and promises must be backed up with legal warranties. Among the many challenges that IT vendors face in addressing security and performance issues are accommodating: • Diverse security...
Summary: ...including email, instant messaging, text documents, presentations, PDF files and rich media content including voice, other audio and video content is brought to the corporate desktop though the Enterprise Desktop Search. No longer reliant on explicit searching, or manually intensive legacy keyword or...
Summary: ...being stored and transmitted every day, businesses require advanced technologies that proactively monitor employee interactions and provide business and compliance managers with intelligence that enables them to take decisive action on violations and their proprietors. The combination of 24/7 activity...
Summary: ...Act (SOX) Although the underlying cause of the crisis is debatable, it is clear the current framework failed. These failures transcended oversight and regulatory models, and new regulations and oversight will be implemented to prevent this from happening again. Future Regulations & Oversight While we...
Summary: ...of downtime can be tolerated. The relative business value of different types of information and data is driving organizations toward a tiered approach to recovery. Similar to the concept of tiered storage architectures, a tiered recovery approach allows IT organizations to tailor recovery strategies to...
Summary: ...has dropped to 3%, from 3.8% a year earlier. The results have been so impressive that AHOM branches that have not yet deployed LiquidOffice can’t wait to get their hands on the software. “As soon as they lose an employee, the first thing they do is call headquarters and say, ‘Can we get on LiquidOffice?...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.