Raytheon Uses Verity's Data Discovery Program to Organize Intranet Data
SUNNYVALE, Calif - 2004-02-09 - Verity Inc. (NASDAQ: VRTY), a leading provider of enterprise software that helps organizations maximize the return on their intellectual capital investment, today announced that the Raytheon Company (NYSE: RTN), has utilized the Verity Data Discovery Program to optimize organization of its intranet information.
Raytheon, an industry leader in defense, developed an Information & Knowledge Management Plan to help organize the enormous amount of data on its intranet and make it readily available to its more than 78,000 employees worldwide.
Raytheon uses Verity's Data Discovery Program to analyze information in its various repositories across the enterprise as part of the company's deployment of Verity search and classification technologies. The analysis, which leverages Verity's pre-structured industry-standard taxonomies and the Verity K2 Enterprise Thematic Mapping capability, has helped establish an Information Model and set of custom taxonomies - making it easier for employees to find and use company information.
"We are pleased to contribute to Raytheon's Information and Knowledge Management program with the Verity Data Discovery Program," said Sunil D. Nagdev, senior vice president of professional services at Verity. "Verity's technology will enable Raytheon to fully leverage its most valuable competitive advantage - its information."
About Raytheon
Raytheon Company, with 2003 sales of $18.1 billion, is an industry leader in defense and government electronics, space, information technology, technical services, and business and special mission aircraft. With headquarters in Waltham, Mass., Raytheon employs 78,000 people worldwide.
About Verity
Headquartered in Sunnyvale, Calif., Verity provides software solutions that help organizations maximize the return on their intellectual capital investment by utilizing Verity's industry-leading enterprise search, classification and personalization technologies. Verity software is used for sharing information within and between enterprises; for facilitating e-commerce sales; and for B2B activities on Web-based market exchanges. In addition, Verity technology serves as a core component of many leading e-business applications.
Verity products are used by more than 3,500 organizations in the private and public sectors. Customers include Adobe Systems, AT&T, Bristol-Myers Squibb, Cap Gemini Ernst & Young, Cisco, Documentum, Dow Jones, EDGAR Online, Financial Times, H-P, Home Depot, Lotus, META Group, SAP, Siemens, Stellent, Sybase, Time New Media and Timex.
This press release contains forward-looking statements relating to Verity and the expected benefits Raytheon will receive from utilizing the Verity Data Discovery Program. Actual results are subject to risks and uncertainties, including the risk that integration of the Verity software into Raytheon's Information and Knowledge Management program will not perform as anticipated as a result of unforeseen technical difficulties. These and other risks relating to Verity and its business and products are set forth under the caption "Risk Factors" in Item 1 of Verity's latest Form 10-K filed with the Securities and Exchange Commission.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...PFSweb - Case Study. PROMOTE POWER PROTECT PFSweb Leverages Autonomy Q finiti to Boost Performance and Popularity of Quality Monitoring Program PFSweb (www.pfsweb.com) is a supply chain and contact center outsourcing partner supporting global brands like IBM, HP, Nokia, Raytheon Aircraft Company, CHiA'SSO,...
Summary: ...Bristol Myers Squibb Case Study - Pharmaceutical Research and Development. The Solution Bristol-Myers Squibb turned to IDOL K2 to address the challenges of its Pharmaceutical Research Accelerating the Drug-to-market Process Organization Bristol-Myers Squibb Industry Life-sciences Type of Application Research...
Summary: ...outdated results. • Internal and External customers started using search as a primary tool to source information. • Super-fast responses via a distributed implementation. • Search utilisation has risen 10 folds – Internal users and External customers started using search as a primary tool to source...
Summary: ...EnergySolutions was formed in 2006 by merging BNG America, Duratek, Envirocare of Utah, and the D&D division of Scientech. These acquisitions brought together complementary services to establish a vertically integrated company and formed one of the largest providers of services to safely transport, process,...
Summary: ...in separate offices needed to look at the same taxpayer return,” said Rick Clayburgh, North Dakota’s tax commissioner. The State was quickly reaching critical mass with its two biggest obstacles: the lack of storage space and the difficulty in finding a skilled workforce. The State is required to...
Summary: ...people are the bits that our clients buy. They don’t necessarily buy our documents and our services. They buy our people’s brains, experience and knowledge.” The challenge, however, is one that many large knowledge-based organizations face. The intellectual capital at KPMG LLP (UK) was growing uncontrollably....
Summary: ...Jane's Information Group Case Study - Intelligence Portal. autonomy@autonomy.com Other Offices Autonomy has additional o?ces in Boston, New York, Sunnyvale, Vista and Washington DC, as well as in Amsterdam, Beijing, Brussels, Hamburg, London, Madrid, Milan, Munich, Oslo, Paris, Rome, Shanghai, Singapore,...
Summary: ...Kaplan Professional Case Study. Case Study ever-increasing amount of material developed in multimedia format or available online complementing the traditional paper format documents available in Word or PDF files. “With so much content and intellectual property, the need to integrate our information...
Summary: ...over lost documents—everyone blamed someone else. Now report logs allow us to trace errors, resolve them quickly and prevent them in the future.” Cardiff also delivered a rapid return on investment for First Interstate Bank. LiquidOffice helped them reduce the waste associated with manual processes,...
Summary: ...Aurasma Wetherspoon- case study. Such was the interest in the campaign that Wetherspoon decided to capitalise by producing a series of sweatshirts – or “hoodies” as they’re known on campus – which were given to students. The design on the hoodies could also be “unlocked” by the app, meaning...
Summary: ...financial institutions. The sheer volume presented an enormous challenge because the data was subject to litigation and needed to be collected in a defensible and FRCP-compliant manner. As a result, the Governance, Legal and IT teams collaborated to establish the baseline requirements needed to secure,...
Summary: ...system that relate to what they're doing, or to other employees in the company whose interests and expertise match their own. BAE SYSTEM’S CEN Clustering. This intuitive java based user interface allows user’s profiles to be clustered to enable organizations to map strengths or weaknesses in expertise....
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...intellectual capital, not just a tool to manage it. Create and manage taxonomies in real-time Autonomy Collaborative Classifier’s workflow features let your end-users realize the benefits of distributed management in real-time. Taxonomies can be created and deployed incrementally as categories and subcategory...
Summary: ...Scrittura Overview Brochure: Interwoven's Capital Markets Solutions. member company, has deployed Scrittura SellSide in its Greenwich, CT trading and operations headquarters to streamline generation and tracking of confrmations for foreign exchange options. This implementation interfaces directly with...
Summary: ...the Business Console. This facilitates collaboration on the management of taxonomies between the users of taxonomies, and knowledge engineers who specialize in classification. The taxonomy management feature can be used to create, view, edit and test the classification of information into categories for...
Summary: ...piece of text. If overlap is disabled, only the longest and highest scoring match is returned. The results also include the details of forms, components, and occurrences, as well as a confidence score for each instance and form. Users can also return the extraction statistics for each target entity. Automatically...
Summary: ...allowing them to meet the increasingly rigorous compliance requirements in the derivatives industry. Autonomy’s platform approach to Global Capital Market solutions presents a dramatic shift from the legacy approaches currently offered by other vendors in the capital markets space. Puts Business Users...
Summary: ...Autonomy Scrittura Product Brief. Autonomy’s platform approach to Global Capital Market solutions presents a dramatic shift from the legacy approaches currently offered by other vendors in the capital markets space. Puts Business Users in Control The latest version of Autonomy Document Generator and...
Summary: ...Autonomy Global Capital Markets. Autonomy's software powers the full spectrum of mission-critical enterprise applications, including information access technology, pan-enterprise search, information governance, end-to-end eDiscovery and archiving, records management, business process management, web content...
Summary: ...Enterprise Taxonomies Autonomy’s enterprise taxonomies are based on standard business terminology and processes that apply across industries. Human Resources Taxonomy The Autonomy Human Resources Taxonomy consists of standard human resource categories that are pre-defined with easily modified business...
Summary: ...Autonomy Introspect - Product Brief. Product Brief Top Provider S o c h a - G e l b m a n n E L E C T R O N C I D I S C O V E R Y S U R V E Y Autonomy received the highest possible ratings in Gartner’s recent report, “MarketScope for eDiscovery Software Vendors.” Manage-In-Place Manage-In-Place...
Summary: ...identification by integrating into an organization’s IT infrastructure to obtain custodian information from a variety of sources, such as Active Directory or HR systems. Unique to Aungate Legal Hold is the ability to return a suggested set of custodians to be included in the legal hold process by automatically...
Summary: ...of archive projects using transportable design files • Provides easy integration of custom scripts and external programmes into automated archive operations using Business Flows Benefits • Enhances return on investment by extending database archiving to virtually any application or database • Reduces...
Summary: ...HP Data Protector Software - Data sheet. O p e r a t i o n a l e f f i c i e n c y P r o t e c o i t n B u s i n e s s i n s i g h t G o v e r n a n c e C A P T U R E M O N I T O R P R O T E C T R E T A I N F I N D HP Information Management HP Information Management HP Data Protector software is a key...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...The difficulty of monitoring advice sent via e-mail can expose a firm to liability, and the complexity of recovering e-mail records in the event of a civil action can make legal discovery enormously expensive and time-consuming. If a PC or laptop is lost or damaged, its contents might prove irretrievable....
Summary: ...look at the same taxpayer return,” said Rick Clayburgh, North Dakota’s tax commissioner. The state was quickly reaching critical mass with its two biggest obstacles: The lack of storage space and the difficulty in finding a skilled workforce. The state is required to retain four years of paper forms,...
Summary: ...Critical to proper retention, organizations must establish plans for dealing with longevity, readability, and the aging of business records, regardless of format or difficulty in migration. Autonomy helps companies automate the process of executing review and migration strategies, and provides conversion...
Summary: ...The 4 Keys: Core Competencies to Winning the Compliance and Audit Game. Maintain adequate records to provide fair view of organization’s financial condition and publish financial statements that reflect that condition. Reg D: Maintain reserve balances either with their Federal Reserve Bank or as cash...
Summary: ...that allows customers to realize the critical importance of the intellectual data stored in email and file systems. Summary 22 White Paper ZANTAZ has developed a proprietary ROI model that a sales associate can operate for you to help determine a return on investment that your organization can expect...
Summary: ...your company to deploy a Lotus Domino solution that meets your needs today, with the ability to grow as your needs change. The singlesystem approach reduces your acquisition and operational costs and increases your return on investment. A highly efficient storage structure utilizes an incremental file...
Summary: ...periods of affected files and messages. Once captured in the archive, emails and files can be readily searched, reviewed and produced as required for regulatory audits, litigation preparation or ongoing business operations. Effi cient Utilization of Distributed Email Storage Assets Another important cost-saving...
Summary: ...expertise to manage application data and file shares, especially when dealing with a collection of different interfaces found in legacy infrastructures • An increase in storage costs, which diminishes return on investment (ROI) and productivity • Difficultly determining the organizations approach...
Summary: ...facility or other data center. The following sections help companies identify and assign value to these cost categories. These costs can then be incorporated in a Return on Investment (ROI) analysis. 4 How To Measure The ROI of Cloud Data Protection Calculating the Costs: Tape Backup Systems Many companies...
Summary: ...concepts and the 2 Enterprise Search: Addressing Security and Entitlement Issues context of information to determine access rights. Only by actually understanding the meaning of the whole document can effective security measures be put in place. A more granular approach utilizing clusters, subsets and...
Summary: ...under all load levels. It provides a highly-secure, gridbased hosted archive and storage environment for monitoring and managing content in over 400 other enterprises systems, including Documentum, SAP and SharePoint. Autonomy utilizes five ultrasecure, fully redundant data centers for hosted operations....
Summary: ...map the XML content into static-structured keyword engines, and often these engines only provide support for limited pre-defined static structured data alongside the textual information. This severely hampers their use in any XML system and increases implementation and integration times enormously. page...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.