Latest Verity Ultraseek Capabilities Enhance Integration of Dynamic Content in Business Applications
SUNNYVALE, Calif - 2003-09-08 - Verity Inc. (NASDAQ: VRTY), a leading provider of enterprise software that helps organizations maximize the return on their intellectual capital investment, today announced the availability of Verity Ultraseek XPA Search API version 2.1.
This latest release of the Java XPA Search application programming interface (API) is intended to significantly enhance the integration of Verity Ultraseek 5.1, the company's recently-announced powerful, downloadable search engine software, into enterprises' applications. The XPA Search API is designed to allow developers to optimize Ultraseek's advanced capabilities and extend its new features for easy and effective search of dynamic content in many business applications.
"Verity Ultraseek has been recognized by many global organizations for its highly relevant search results and ease of deployment," said Andrew D. Feit, Verity's senior vice president of marketing. "The XPA Search API further extends the product's powerful performance to allow customers to search content and include those results in key business applications. The product also gives developers a foundation for creating custom search interface and results pages, enhancing the appeal of Verity Ultraseek in portal deployments."
Verity Ultraseek XPA Search API 2.1 also extends support for advanced search functions, including the merging of search results from multiple servers in different geographic regions. In addition, search results can be passed through third-party thesauri, taxonomies, translation tools, and other complementary systems. The results from the XPA Search API are Java data structures that can be processed to fit a broad range of customers' display requirements, allowing transformation for small-format displays such as PDA's or cellular phones.
Verity Ultraseek version 5.1 is designed to allow users to spend less time searching for information and more time acting on it through a set of new features that optimize the way results are displayed and through intelligent analysis of content sources. The product includes advanced capabilities such as In-document Term Highlighting, a feature that visually calls-out query terms for faster location of a specific item or phrase; Results by Location, a feature that groups search results by site, directory or folder for easier, speedier navigation of source content; and Reporting Manager, a feature that offers administrators valuable insight into users' search behaviors and changes in search patterns to permit improvement of search relevance and usability. Detailed analysis reports can be generated on a wide range of search processes to help administrators and business-line managers improve the search relevance on their Web sites, including top search queries, queries yielding no results, top requested documents and query trends.
Additional information on the latest version of Verity Ultraseek version 5.1 and the product's XPA Search API can be found at the company's Web site, www.verity.com, which also provides access to the Verity Ultraseek software download center.
About Verity
Headquartered in Sunnyvale, Calif., Verity provides software solutions that help organizations maximize the return on their intellectual capital investment by utilizing Verity's industry-leading enterprise search, classification and personalization technologies. Verity software is used for sharing information within and between enterprises; for facilitating e-commerce sales; and for B2B activities on Web-based market exchanges. In addition, Verity technology serves as a core component of many leading e-business applications.
Verity products are used by more than 3,500 organizations in the private and public sectors. Customers include Adobe Systems, AT&T, Bristol-Myers Squibb, Cap Gemini Ernst & Young, Cisco, Documentum, Dow Jones, EDGAR Online, Financial Times, H-P, Home Depot, Lotus, META Group, SAP, Siemens, Stellent, Sybase, Time New Media and Timex.
The statements in this press release regarding the benefits that Verity expects its customers will receive from Verity Ultraseek version 5.1 and Verity Ultraseek's XPA Search API version 2.1 are forward-looking statements. These statements are subject to risks and uncertainties, including the risk that: the benefits may not be obtained due to technical or other reasons; and the structure of certain customers' organizations may not be conducive to realizing these benefits. Other risks relating to Verity and its products are set forth under the caption "Risk Factors" in its Annual Report on Form 10-K filed with the United States Securities and Exchange Commission on August 7, 2003.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...Bristol Myers Squibb Case Study - Pharmaceutical Research and Development. The Solution Bristol-Myers Squibb turned to IDOL K2 to address the challenges of its Pharmaceutical Research Accelerating the Drug-to-market Process Organization Bristol-Myers Squibb Industry Life-sciences Type of Application Research...
Summary: ...specifications and features are subject to change without notice. Use of Cardiff software is under license. [CDF PNCLE] 10.03.06 www.cardiff.com The Solution Following a detailed audit of Cardif Pinnacle’s processes Capital Capture recommended Cardiff’s TeleForm® solution, part of Cardiff’s Intelligent...
Summary: ...site with extreme accuracy,” says Andrew Robinson, Head of Jane’s e-Services. “This is a powerful tool. It makes it even easier for our subscribers to access the latest news.” The Benefits Jane’s strengthened its value proposition by partnering with Autonomy.
...
Summary: ...IDG Communications Case Study - High-Tech Media Portal. We were able to leverage what each of the existing sites was doing with Ultraseek and draw on that functionality for our central portal.” For sites not taking advantage of Ultraseek or IDOL solutions, IDOL Federator offers the ability to easily...
Summary: ...care industry. Earlier this year, the company decided to lay the groundwork for a new generation of enhancements. “Our next step was to migrate to a more contemporary ECM platform based on the latest version of each solution so we could start looking at more interesting ways of using technology,” says...
Summary: ...matter-related content, including documents, emails, scanned images, and media files, is stored within a unified environment, eliminating the risks associated with unmanaged or misfiled content. Integration with the latest version of Microsoft Office lets people drag-and-drop items directly into electronic...
Summary: ...out from the alternatives. Further simplifying the frm’s decision, because Universal Search is built upon the same search technology that is currently embedded in the latest version of WorkSite, it was easy to extend the reach beyond their existing WorkSite libraries to their other enterprise content...
Summary: ...navigation as any other user.” Similarly, site content is adjusted automatically to reflect each visitor’s geographic location, including both the products displayed and the features highlighted. “Autonomy helps us use our website not just to communicate our products and value propositions, but...
Summary: ...Santiago, Sao Paulo, Stockholm, Sydney, Tokyo, Utrecht and Washington, D.C. Over the course of two years, Autonomy Optimost conducted a series of tests to see exactly how ThomasNet’s visitors were interacting with the site, yielding results that helped increase user interaction with content, make it...
Summary: ...significantly lowering paper usage and generating valuable office space. The agency uses fewer fi ling cabinets and notably fewer desks per employee. Over the lifetime of the contract, BIS believes that the HP TRIM platform will yield considerable savings because it will use and store less paper, and...
Summary: ...records need to be destroyed. Martin recalls one instance following a root cause analysis investigation conducted by a medical center. This type of investigation is intended to be non-punitive, so the anonymity of witnesses must be protected. Therefore, after the investigation was completed, the OMI was...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...control for metadata revisions. Enterprise security controls Provides system login and access controls on folders, retrieval tasks, and metadata fields based on existing user and group IDs managed within Windows Domains, Active Directory, and LDAP. Detailed activity logging Tracks who downloads what and...
Summary: ...design or platform environment. The ACI API Object The fundamental construct in this API is the aciObject. This is implemented as a structure in the C API and as an object in the Java API. In the Com API and the Com+ API, aciObjects are manipulated via the Com or Com+ object. You can use the ACI API object...
Summary: ...provide greater insight into active processes. Log and configuration viewing tools are also provided or you can build your own using the rich API. LiquidBPM Manager ships with a Java and a Web client. Design and Deploy Business Processes as Web Services The LiquidBPM BPEL Orchestrator offers an extensive...
Summary: ...archiving performance and reduce maintenance Certified for multiple open systems databases, and designed to take advantage of vendor-specific database capabilities, HP Database Archiving software takes advantage of the solution throughout your organisation. This native API and deep integration approach...
Summary: ...Web-based front-end is available for use as a standalone client, as well as a comprehensive API for integration and a WebDAV interface. DocManager is built on EJB 2.0, JSP, and Servlets. DocManager supports version control, check-in, check-out, a loose or strict hierarchical structure, full-text search,...
Summary: ...cues • Integrate into applications written in C, Visual Basic, Java and .NET using simple, feature-rich APIs • Break-up large documents based on file size for easier download and navigation • Provides conversion of PST files on all platforms • Extract document-level and page-level attachments...
Summary: ...HP Data Protector Software - Data sheet. O p e r a t i o n a l e f f i c i e n c y P r o t e c o i t n B u s i n e s s i n s i g h t G o v e r n a n c e C A P T U R E M O N I T O R P R O T E C T R E T A I N F I N D HP Information Management HP Information Management HP Data Protector software is a key...
Summary: ...include document comparison for version management, signature identification, among other features, and can accommodate data extraction requirements from complex data sources such as contracts, forms, productivity tools, and spreadsheets. In addition, standard connectors and flexible APIs assist customers...
Summary: ...task in the process. It is a Java-based application that can run anywhere. Process API The functionality available in the Process Studio is exposed through the Process API. Designers have full control of the object models with access to all of the methods inside of the classes. Designers can use BeanShell...
Summary: ...such as Unicode or UTF-8. Detect File Formats Automatically The KeyView IDOL Filter SDK automatically recognizes file types and applies the correct filter without relying on filename extensions. Rapidly Integrate Filtering into Your Applications A flexible, easy-to-use Java, .NET and C API delivers rapid,...
Summary: ...Capital Market solutions presents a dramatic shift from the legacy approaches currently offered by other vendors in the capital markets space. Puts Business Users in Control The latest version of Autonomy Document Generator and Template Manager provides rapid, flexible and reliable template creation by...
Summary: ...Autonomy Scrittura Product Brief. Autonomy’s platform approach to Global Capital Market solutions presents a dramatic shift from the legacy approaches currently offered by other vendors in the capital markets space. Puts Business Users in Control The latest version of Autonomy Document Generator and...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...and e-mail management repositories, only one backup need be performed. A three-tier architecture with a full .NET API is designed to accommodate even the most geographically diverse organizations flexibly and cost-effectively. Empowering Users As content and matter teams blur geographic boundaries, the...
Summary: ...9 Proprietary and Confidential to Cardiff. Publisher’s Note: Information contained in this document is intended for guideline purposes only. Cardiff product documentation supersedes information contained in this document. The situations described in this document are offered as examples; actual configurations...
Summary: ...Platform functionality and some basic understanding of technology standards including J2EE, HTTP, HTML and Java programming (servlets, JSP or EJB development). I. Executive Summary This document summarizes the findings from benchmark tests conducted by Autonomy R&D to evaluate the performance of the application...
Summary: ...Application Source Deduplication”), HP’s StoreOnce Catalyst API development kit empowers backup software to fully utilize its StoreOnce hardware. As proof of the power of Catalyst’s capabilities, HP also announced that version 7 of HP Data Protector is StoreOnce Catalyst-enabled (with other vendors...
Summary: ...Protector software is tightly integrated with the VMware infrastructure and provides a variety of methods for protecting VMware virtual machines to meet your own unique RPOs, RTOs, and other priorities. It provides support for any VMware hypervisor version, including the VMware vStorage API for Data Protection...
Summary: ...such as XML, to fully formed web pages, digital assets, and video files. Access to the data layer can be achieved via RESTful APIs that extract raw data, or with application-level APIs that can be used to dynamically assemble a site, page, or portion of a page. Java and .NET environments are fully supported....
Summary: ...a user may see results they no longer have permission to access. 10 Enterprise Search: Addressing Security and Entitlement Issues Java Security Modules Employing Java modules to provide security opens a door to potential liability. Java is traditionally not used in high transaction environments due to...
Summary: ...a cloud service provider who offers a predictable rate that makes your budgeting simpler. We’ve all experienced delays in version upgrades due to busy schedules. Cloud service providers offer the latest versions and upgrades in storage, security, and data transfer technology, without taxing your own...
Summary: ...e-mail produced or received by the firm and files them by client and project/engagement; ■ Full document check-in/check-out so that users always know which version is the latest, eliminating conflicting and confusing edits; ■ Tight security and access control, allowing the electronic file to be safely...
Summary: ...of broadcast material, users can be alerted to the development of news stories, financial events or even the latest sports results. Users receive links, sound bites or video footage of the latest events based upon their personal interests rather than what is deemed important by the broadcasters. This...
Summary: ...monitoring where mentions of specific terms must be identified, regardless of the language. The Power of Autonomy IDOL 7 Accuracy and Learning Ability Building on the flexibility of IDOL to easily build in a new language model, it is also very easy to add in existing corporate thesauri, style guides and...
Summary: ...sound recordings, images, and other data or data compilations—stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form.
...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.