Meridio Ranked Number One Fastest Growing Technology Company in Northern Ireland on the 2004 Deloitte Technology Rising Stars
Meridio Holdings Limited today announced that it ranked Number One in the 2004 Deloitte Technology Rising Stars, a ranking of the fastest growing technology companies in Northern Ireland, sponsored by InterTradeIreland's EquityNetwork. Rising star rankings are based on average percentage revenue growth over three years. Meridio grew seven hundred and fifty four percent during this period.
Meridio's CEO, Brian Baird, credits Meridio's business strategy and the excellent teamwork between Meridio's staff and partners with the company's 754 % revenue growth over the past three years. He said, "Meridio's strong performance reflects our determination to grow a world class global organization focused on enterprise document records management and the excellence of the team we have put together."
"The Fast 50 programme ranks companies that have demonstrated innovative strategies, sound management practices and marketplace vision driving them to achieve the status of high-growth leaders. Growing the top line enough to make the Deloitte Technology Fast 50 is especially meaningful during tough economic times for the technology sector," said Tom Keenan, partner Deloitte Belfast.
"Ireland's Fast 50 technology companies have performed exceptionally well, reporting an average turnover growth of around 333 % over a five year period and we congratulate Meridio on becoming one of the fastest growing companies in Ireland."
Summary: ...of the paper-electronic divide. Paperbased files posed obstacles to collaboration, since any given folder could be used by only one lawyer in one location at a time. Meanwhile, the rising volume of electronic content in the firm’s work, especially e-mail, was becoming increasingly difficult to manage...
Summary: ...Recipient for the past five years in a row, and for six of the past nine years, recognizing the company for excellence in customer sales and service satisfaction. The Challenge Even while this popular Toyota dealership grew, the company had limited IT resources, both in terms of staff and budget. Even...
Summary: ...is a major challenge for organizations, especially since many financial companies are geographically dispersed and compliance standards differ for every region. ABN AMRO is no exception to this rule. Being a multi-national company and employing over 400 lawyers and compliance officers, the banking group...
Summary: ...Northern Ireland Civil Service. The 25,000 civil servants who comprise the Northern Ireland Civil Service (NICS) deliver a number of important services to Ireland’s government ministers and citizens. NICS develops economic and social policy and legislation, as well as delivering and supporting key public...
Summary: ...or Word form from a computer. The evaluation had to be accompanied by a separate personnel status change form, recommending the salary increase for the employee being reviewed. Each of these forms required up to four or five signatures and contained much of the same information, resulting in wasted time...
Summary: ...Japanese pharmaceutical giant chooses HP TRIM. Share with colleagues “Over 370 users currently employ our upgraded EDRM platform at the research centre. An on-going roll-out across other European sites, we will increase that number to over five hundred. They are finding it easy to use and especially...
Summary: ...Brown Rudnick Case Study. Although our existing system does these things, it isn’t transparent enough and that has hindered overall user adoption.” Challenges • Bring the firm’s over 8 million documents under a unified, state-of-the-art system • Streamline and increase transparency in document...
Summary: ...Denise Fishel, director of eBusiness planning and development at TABS. In 1997, TABS created a dealer extranet, called Internet FYI, which allowed TABS dealer and distributor networks to place orders and retrieve status online, 24/7. Immediately popular, Internet FYI grew and new applications were developed...
Summary: ...says Joost Beukers, managing director, VKA. “We also found that it was becoming more difficult for new consultants to discover and apply the lessons of projects not just from the past couple of years, but throughout our entire history.” VKA turned to Morningstar, a leading IT consultancy and integrator,...
Summary: ...surveys with Cardiff Intelligent Documents, giving senior management a cost-effective way to chart strategy and react to market trends with confidence. In nearly six decades, Arrowhead Credit Union has grown from 147 members to approximately 161,000. The company grew quickly and expanded from serving...
Summary: ...grocery sales reached an all-time high of £10 million per week for the first time ever. The accelerated and cost effective development cycle enabled through Autonomy has also been instrumental in helping Tesco manage its global expansion to Ireland, the United States, and soon South Korea.
...
Summary: ...relevance. Radioplayer's innovative search facility powered by IDOL offers listeners five easy ways to search radio content online: by station, programme, location, presenter or topic. These functionalities are available for on-demand programmes, "listen again" and commercial radio podcasts alike. Through...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...on the surviving node. More efficient data management The StoreOnce deduplication engine uses an extremely efficient Adaptive Micro-Chunking technique to segment data into very small blocks ranging from one kilobyte to 10 kilobytes in size, with an average of four kilobytes. These four-kilobyte chunks...
Summary: ...capabilities •Automatic detection of file types without relying on filename extensions •Elim inate the need for developers to stay current with native applications’ releases, past or present •Benchm ark studies show KeyView IDOL performs at least 3x faster, and often up to 10x faster, than competing...
Summary: ...two to five times faster than with legacy review solutions. Mitigate Risk Many law firms face a greater risk of litigation than ever before. In cases like Refco, bankruptcy trustees are now attempting to hold the law firms liable and are suing firms for tens to hundreds of millions of dollars. [New York...
Summary: ...Autonomy ZANTAZ-EMC End-to-End Archiving Solution. Centera’s content addressing also ensures that each record cannot be overwritten, while retention protection ensures that a record cannot be prematurely erased before the expiration of its retention period. Unlike any other media, Centera can ensure...
Summary: ...interface to create custom policies that define how documents transition from a Document Library or SharePoint Content Type into Meridio as a document or record. Policies can be used automatically and interactively. • When used interactively, the policy is examined to determine if enough information...
Summary: ...agent-sensitive information from unauthorized access has long been a requirement in contact centers, and it is especially critical to protect this data when recording agent-caller conversations where credit card or other customer sensitive data is exposed. This technical brief will explain the approach...
Summary: ...without crippling performance.4 The StoreOnce deduplication engine uses an extremely efficient Adaptive Micro-Chunking technique to segment data into very small blocks ranging from one kilobyte to 10 kilobytes in size, with an average of four kilobytes. These four-kilobyte chunks are up to one sixteenth...
Summary: ...in the data which may be indicative of fraud. It recognizes patterns of kickbacks in exchange for referrals, charges posted outside of an appropriate treatment period, procedure "upcoding", excessive physician billing, medically unnecessary tests, and other areas of waste or fraud. Autonomy’s fraud...
Summary: ...Sao Paulo, Stockholm, Sydney, Tokyo, Utrecht and Washington, D.C. Expertise Locator The profiling technology facilitates the recognition of highly focused experts (sorted by location, department, availability) within the community and reduces the duplication of effort through teamwork. Administrator Interface...
Summary: ...to be relevant to the case and ALH collects the data, automatically, in a forensically sound manner. Automated Forensically Sound Collections ALH offers automated, forensically sound collections via a secure, encrypted connection from all enterprise data sources.
...
Summary: ...of spoliation. Laptop and desktop collections utilize a compact agent that runs transparently and applies legal hold policies against relevant data to preserve and lock the data in-place, or collect it in a forensically sound manner. Unlike legacy solutions that require a constant connection to the network,...
Summary: ...collections utilize a compact agent that runs transparently and applies legal hold policies against relevant data to preserve and lock the data in-place or collect it in a forensically sound manner. Unlike legacy solutions that require a constant connection to the network, ALH uses a distributed model...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...the start of business on Monday,” he says. Belfast solicitor Ciaran McAteer commented in The Writ, Northern Ireland’s Law Society journal, that he “knows of no other product that has enhanced (his) company in so many ways, so quickly”. Ciaran’s secretary is especially pleased that he now does...
Summary: ...department, language or system. The email-monitoring team doesn’t crossreference alerts with the team that monitors system access or trade policy violations. The on-going and escalating risk slips innocently (or maliciously) past the monitors whose vision is limited to a small slice of the information...
Summary: ...possibly three levels. This is often a good way to start testing. However, as more is learned, there is often a need to examine five, six, or even more values for some of the variables. In the case of pre-planned designs this is especially a problem. While some designs can accommodate six-value variables,...
Summary: ...Frost & Sullivan Moving to Next-Generation Speech Analytics - White Paper. A Frost & Sullivan White Paper www.frost.com 50 Years of Growth, Innovation and Leadership Moving to Next-Generation Speech Analytics: Words are No Longer Enough Sponsored by Frost & Sullivan CONTENTS Executive Summary. 3 Introduction...
Summary: ...save old e-mails automatically for three years or a similar time frame and their attachments for three years, instead of trying to determine what should be saved and what should be deleted. Document Retention Models Comparison Figure 4 is a chart of these four different types of policies. This figure...
Summary: ...5 Survey: All’s Not Well at Endpoints 1 Introduction With compliance requirements and external threats on the rise, no business can afford to leave its data unprotected, especially at the endpoint. Fortunately, IT leaders understand the risk: Fifty-nine percent of recent IDG survey respondents rate...
Summary: ...E-Mail Archiving School: What Do You Need to Consider Before Buying an E-Mail Archiving Product. You will need to determine the average number of e-mails per day that are sent/received, the average size of those e-mails, the ratio of e-mails with attachments and those without, and the percentage of e-mails...
Summary: ...toward making more effective use of technology by embracing basic document management (DM). Traditional DM does overcome some of the drawbacks of paper, but it doesn’t go nearly far enough.
...
Summary: ...Encrypting Recordings is Not Enough: Steps to Protect Your Most Sensitive Data. Autonomy etalk White Paper Encrypting Recordings is Not Enough: Steps to Protect Your Most Sensitive Data Proprietary and Confdential to Autonomy etalk. Encrypting Recordings is Not Enough: Steps to Protect Your Most Sensitive...
Summary: ...that allows us to bring these capabilities for BPM users as well. Every task has a start date, end date and duration. These reflect projections when the work- flow is defned, and as it executes they are updated to reflect $$ $$ FIGURE 3: Order Processing Workfow Proprietary and Confidential to Cardiff....
Summary: ...that hit him again keep a high grade in his color index the Forbidden Forest in the grounds and especially Goodrich the most popular sport in the woods of the world” Language Model customized using text from Harry Potter novels: “Sleeping his four poster bed in the tower dormitory visiting the gamekeeper...
Summary: ...depreciated over the life of the hardware, typically 36 months. As with software, hardware maintenance may be charted as a percentage of the total hardware costs (for instance, 15 percent). Alternatively, it may be necessary to track the warranty periods for different servers supported and estimate the...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.