Functionality |
![]() ![]() |
IDOL Eduction | | | Content Rationalization | | | Social Technologies |
![]() ![]() |


![]() |
![]() |
![]() |
Content Rationalization
When content is created or indexed, IDOL automatically detects whether the information already exists in the system and can trigger the appropriate action, automating the rationalization of content and reducing duplication of both storage and effort.
For example, if this operation is performed at content creation time, the author may be alerted to the existence of duplicate files, providing the opportunity to aggregate the two sources. Alternatively, this detection can be executed when the data is spidered and indexed. For example, when spidering multiple websites or document management servers that contain an overlap of information, IDOL helps avoid search results filled with many pages that are nearly identical.
IDOL can automatically suggest similar documents within a user interface, allowing administrators to manually choose the exact data that is to be deleted.
Key Benefits
Forthcoming Events for Content Rationalization
Promote Seminar |
Location: United States, IL
Event Date: 10th September, 2013
Event Relevance:
21.09%
|
Archived Events for Content Rationalization
Protect Webinar |
Status: Archived Webinar
Event Relevance:
29.30%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
29.29%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
26.89%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
26.73%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
26.60%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
25.45%
|
Power Webinar |
Status: Archived Webinar
Event Relevance:
21.50%
|
Power Webinar |
Status: Archived Webinar
Event Relevance:
21.45%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
21.10%
|
Protect Webinar |
Status: Archived Webinar
Event Relevance:
20.80%
|
Promote Webinar |
Status: Archived Webinar
Event Relevance:
20.24%
|
This is a selection of our forthcoming events, please visit our seminars page for more information.
Automatic Hyperlinks provided by IDOL Server
![]() |
Location: /Power/Case Studies/Financial Services
Date: 2013/3/1
Relevance: 41.67%
Summary: ...Minimize duplicate data entry • Standardize forms and processing • Consolidate forms • Reduce lost documents/incomplete files • Decrease training time The solution After evaluating a variety of solutions, First Interstate Bank selected a suite of products from leading technology vendors including:...
|
![]() |
Location: /Power/Case Studies/Education
Date: 2013/2/28
Relevance: 39.47%
Summary: ...external ASU databases. 3 Binary Office’s Marc Carleno explained: “The name on every application or supporting document has to be matched to the university’s main databases, to avoid duplicate files and make sure that related documents get matched up by student ID or other identifier. With TeleForm’s...
|
![]() |
Location: /Protect/Case Studies/Technology
Date: 2013/2/21
Relevance: 39.07%
Summary: ...challenges. Because the credit union is regulated by a number of different government agencies, they must meet a range of unique and complicated requirements dealing with the retention and deletion of data. These requirements make it nearly impossible to effectively manage these intricate requests using...
|
![]() |
Location: /Protect/Case Studies/Financial Services
Date: 2012/8/10
Relevance: 38.99%
Summary: ...ABN AMRO Integrates Global Compliance Platform - Case Study. Through the software's ability to learn and understand information as it grows and changes, in combination with its automatic alerting features, Autonomy's technology could keep ABN AMRO's staff continuously informed of the latest available...
|
![]() |
Location: /Backup/Case Studies
Date: 2013/3/18
Relevance: 38.09%
Summary: ...of server data but also the administration and management processes, ZRI’s IT staf is freed up to perform other valued activities that are strategic to their business. LiveVault’s continuous backup methodology minimizes data loss, and its open file and database protection safeguards all data without...
|
![]() |
Location: /Autonomy-IM/Case Studies
Date: 2010/10/15
Relevance: 37.72%
Summary: ...ageing data, the solution can save space occupied by key data, minimise as far as possible the key systems’ disaster recovery time and improve (software and hardware) downtime, while reducing associated management and maintenance problems. In addition, HP DBA software has also reduced Jinan Steel’s...
|
![]() |
Location: /Power/Case Studies/Media
Date: 2012/7/25
Relevance: 36.91%
Summary: ...El Mundo case study. These automatic hyperlinks point to conceptually related items and alert site visitors to similar information they would also like. In addition to this, suggested further query terms are automatically generated to further refine the user’s results, all based on the meaning contained...
|
![]() |
Location: /Power/Case Studies
Date: 2013/3/1
Relevance: 36.83%
Summary: ...as well as developing the most appropriate uses of the application. This is an ideal example of how companies can benefit through Autonomy Capture, Channel Program. “The advantage of being a reseller for Autonomy Capture, is that we can train a client based on their exact needs,” Baker said. “Our...
|
![]() |
Location: /Autonomy-IM/Case Studies
Date: 2010/6/9
Relevance: 36.66%
Summary: ...Objective HP wanted to update its records management processes and solution to reduce the information population by identifying a process to keep records it needs to and delete the rest at the appropriate time Approach Develop an enhanced electronic records declaration and retention program and use HP...
|
![]() |
Location: /Protect/Case Studies/Government
Date: 2012/11/2
Relevance: 36.53%
Summary: ...Connected Backup, TNPA’s users were required to manually save their valuable data, an inefficient and unreliable process that presents risk of data loss if laptops are lost, hard drives fail, or a user inadvertently deletes a file. TNPA needed to ensure that all critical user data was protected at all...
|
![]() |
Location: /Promote/Case Studies/Government
Date: 2012/7/20
Relevance: 36.28%
Summary: ...Web sites. An online communication strategy focused on making the public website clearer and more comprehensive, providing page authors with writing guidelines that emphasized simple language rather than jargon and acronyms. Additionally, internal positions have been created for content authors and content...
|
![]() |
Location: /Power/Case Studies/Government
Date: 2013/3/1
Relevance: 35.93%
Summary: ...devices for obtaining electronic signatures was also important.” – Taylor Huynh, Trinity River Authority Overview The Trinity River Authority of Texas uses Autonomy Process Automation to save time and money by reducing paper processes within its HR department. The Trinity River Authority of Texas...
|
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Automatic Hyperlinks provided by IDOL Server
![]() |
Location: Power Product Briefs
Date: 2005/1/4
Relevance: 49.16%
Summary: ...duplicated effort as well as identifying experts within the organization. • View results of similar community agents • Copy similar community agents • Send email to owners of similar community agents.
...
|
![]() |
Location: Autonomy Product Briefs
Date: 2013/1/16
Relevance: 47.54%
Summary: ...SendOnce® • Eliminates duplicate files across the enterprise by saving each file only once. This patented technology backs up files to a SendOnce pool, preventing identical copies from being stored in multiple user archives. Enterprises avoid the time and expense of storing the same files repeatedly....
|
![]() |
Location: Protect Product Briefs
Date: 2013/4/22
Relevance: 45.86%
Summary: ...avoid the time and expense of storing the same files repeatedly. Optional Connected EmailOptimizer® (PC only) Reduces the storage space for email files by 30 percent. This optional service recognizes duplicate email attachments and stores them only once, significantly reducing storage requirements and...
|
![]() |
Location: Protect Product Briefs
Date: 2008/9/30
Relevance: 45.06%
Summary: ...that have been created. Aungate Supervisor can detect and exclude false positives generated via disclaimers, embedded tables, ticker symbols or other irrelevant information contained within the messages. This intelligent filtering enables reviewers to focus their supervision efforts on relevant content...
|
![]() |
Location: Autonomy Product Briefs
Date: 2011/10/12
Relevance: 44.47%
Summary: ...reduces backup time, minimizes network traffic, decreases the size of stored files, and enables backup even over low-bandwidth connections. SendOnce® eliminates duplicate files by saving each file only once. This patented technology backs up files to a SendOnce pool, preventing identical copies from...
|
![]() |
Location: Protect Product Briefs
Date: 2011/10/11
Relevance: 42.38%
Summary: ...Enterprise Data Capture (EDC), the process of identification of content can be automated, leveraging automatic categorization using the power of IDOL. Through duplicate and near duplicate identification, storage costs are minimized. The asynchronous transfer to the Autonomy compliance store in background...
|
![]() |
Location: Protect Product Briefs
Date: 2011/5/9
Relevance: 42.38%
Summary: ...Enterprise Data Capture (EDC), the process of identification of content can be automated, leveraging automatic categorization using the power of IDOL. Through duplicate and near duplicate identification, storage costs are minimized. The asynchronous transfer to the Autonomy compliance store in background...
|
![]() |
Location: Power Product Briefs
Date: 2009/6/29
Relevance: 42.27%
Summary: ...solution. The out-of-the-box suite of Autonomy’s most commonly used IDOL functions ensures that administrators can configure IDOL Retina with minimal effort, while the user-friendly interface and conversational search experience guarantees high user adoption. For enterprises that require an information...
|
![]() |
Location: Protect Product Briefs
Date: 2013/5/10
Relevance: 42.22%
Summary: ...governing all aspects of information lifecycle, including deletion prevention, storage management and ultimately disposition management by applying meaning-based policies at data creation •We b-based, non-IT centric dashboard to create policies •De-duplication across repositories to minimize storage...
|
![]() |
Location: Power Product Briefs
Date: 2007/8/9
Relevance: 42.15%
Summary: ...knowledge networks overcome situational myopia and bring experts together to establish congruent goals, reducing duplicated effort and increasing productivity. The Challenge In small companies finding an expert can be as easy as asking a question across a desk, but in large enterprises numbers, languages,...
|
![]() |
Location: Protect Product Briefs
Date: 2013/6/4
Relevance: 41.98%
Summary: ...to categorize and tag information on an individual basis, ControlPoint leverages IDOL to analyze information, arranging it into self-similar groups or clusters and leveraging IDOL by matching the data against trained categories. Through duplicate and near-duplicate identification, storage costs are minimized,...
|
![]() |
Location: Protect Product Briefs
Date: 2013/1/23
Relevance: 41.63%
Summary: ...same WorkSite location without manual effort, and IDOL’s robust analytics learns from users’ past filing actions to suggest filing locations and decrease errors. Powerful organization tools WorkSite provides powerful tools to keep an attorney’s everincreasing matter workload organized, making it...
|
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Automatic Hyperlinks provided by IDOL Server
![]() |
Location: Autonomy White Papers
Date: 2010/11/9
Relevance: 44.79%
Summary: ...challenge is to maintain a level of consistency and ensure that if there are similar functions, that terminology accurately reflects the shared activities and that a merging of existing hierarchies doesn’t create duplication or potential overlap. In some cases change management processes will be helpful...
|
![]() |
Location: Power White Papers
Date: 2007/7/25
Relevance: 44.28%
Summary: ...Autonomy User Experience White Paper. • Boost efficiency • Increase productivity while at the same time cutting costs • Avoid duplication of effort • Keep employees informed and up-to-date • Reduce the cost of maintaining unstructured information within any environment • Reduce the time taken...
|
![]() |
Location: Protect White Papers
Date: 2011/11/25
Relevance: 43.81%
Summary: ...the data at hand. With conceptual search at the foundation of information access technology, enterprises can conduct content-based archiving and legal hold, as well as perform exact and near de-duplication in legal applications. IDOL is able to perform these evaluations with surprisingly little overhead...
|
![]() |
Location: Power White Papers
Date: 2012/3/7
Relevance: 43.72%
Summary: ...Autonomy Whitepaper - Performance and Scalability. • Monitoring and Alerting – With high availability deployments, it is critical for administrators or knowledge workers to be alerted to potential faults or when maintenance may be required. The Distributed Service Handler (DiSH) allows effective auditing,...
|
![]() |
Location: Protect White Papers
Date: 2006/9/26
Relevance: 43.24%
Summary: ...the deletion action by preserving at least the date of deletion, the preservation criteria, and the identities of authorizing entities. 2.) Know what data you have and in which format it exists. Rule 26(f) requires the parties to meet and discuss issues regarding the disclosure or discovery of electronically...
|
![]() |
Location: Power White Papers
Date: 2008/9/16
Relevance: 42.80%
Summary: ...suggest people of similar interest when a user performs a search. IDOL’s meaning-based approach applies across all SharePoint sites and even across languages, reducing duplicate effort and encouraging collaboration. • • • • • • • • 10 Autonomy’s Advanced Search and Scalability Solutions...
|
![]() |
Location: Protect White Papers
Date: 2008/5/19
Relevance: 42.60%
Summary: ...while minimizing cost and complexity. attorneys are often unable to fnd and re-use materials from similar past matters. Knowledge management suffers greatly, and duplication of effort becomes the norm as past work is recreated time and again. The silo content environment described earlier requires attorneys...
|
![]() |
Location: Power White Papers
Date: 2009/9/29
Relevance: 42.34%
Summary: ...Autonomy Technology Overview. Legal Search In order to scale without impeding performance, some technologies fail to search each document in its entirety. This prevents users from retrieving valuable information and it exposes the enterprise to significant compliance risk. Such technologies begin to calculate...
|
![]() |
Location: Autonomy White Papers
Date: 2011/8/17
Relevance: 42.04%
Summary: ...In contrast, providers of cloud data protection services allow businesses to automatically assign the appropriate retention period to different types of data, reducing error in meeting compliance regulations. Services with historical catalogs allow organizations with minimal technical staff to meet discovery...
|
![]() |
Location: Protect White Papers
Date: 2013/1/19
Relevance: 41.82%
Summary: ...due to privilege, work product or another exception. Courts are already grappling with the revisions to the federal rules relating to electronically stored information, but it is clear that judges will not condone a law firm’s actions when the law firm could have easily, with little effort, retained...
|
![]() |
Location: Protect White Papers
Date: 2007/2/27
Relevance: 41.75%
Summary: ...USA) NASD 3010 & 3110 5 Wall Street & Technology: IT Not Aware of GRC Needs Says Compliance Pros; identical efforts in multiple business units and the implementation of duplicate technologies. These stovepipe projects trap information in silos of paper and electronic documents, contributing to inconsistent...
|
![]() |
Location: Power White Papers
Date: 2012/3/6
Relevance: 41.58%
Summary: ...of one-box solutions to provide a 360-degree view of the information scattered across the business and the advanced search tools to pinpoint potentially compromising documents. 6. How to Expose the Weaknesses in Legacy Systems During the technology selection process, many customers choose to run a prepared...
|
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
Automatic Hyperlinks provided by IDOL Server
This is a small selection of the Autonomy press releases available, please visit the news section on www.autonomy.com for the latest news.
Automatic Hyperlinks provided by IDOL Server
This is a small selection of the Autonomy press releases available, please visit the news section on www.autonomy.com for the latest news.
Automatic Hyperlinks provided by IDOL Server
This is a small selection of the Autonomy press releases available, please visit the news section on www.autonomy.com for the latest news.
Automatic Hyperlinks provided by IDOL Server
Functionality |
![]() ![]() |
IDOL Eduction | | | Content Rationalization | | | Social Technologies |
![]() ![]() |