Enterprises that have embraced "socialware" have benefited from the enthusiastic wave of information creation as well as the connection it engenders between disparate members of the enterprise community. Unfortunately, social methods also have critical flaws in an enterprise context:
User-generated content and manual tags are subjective and privy to personal habits that can be exploited at the expense of accurate and reliable information. Tag spamming, in which people label their information inaccurately in order to generate interest, can also become an issue.
Their form of classification is too wild and unpredictable to deliver a stable and accessible taxonomy.
Not enough distinction is made between contributions from experts and thoughts from amateur enthusiasts who volunteer information beyond their expertise.
Granting editing access to a large number of employees on internal wikis invites greater potential for security breaches.
Social methods inherently require manual effort for creation and maintenance.
"The biggest challenge in the information society is the fact that we are drowning in information. With Autonomy we can save time and costs that we used to spend on maintenance and information retrieval. Additionally we can support our users with personalized interfaces. When we trialled Autonomy we had already chosen a more traditional keywordbased technology, but Autonomy changed our mindset."
Peter Rasmussen, Danske Bank
Ultimately, the enterprise has much to gain when social methods can be automated. Autonomy's IDOL platform incorporates a range of unique functions to automate and enhance social networking tools, automatically generating comprehensive user profiles, recommending appropriate tags and generating hyperlinks to related material. Autonomy can also monitor the evolution of content to alert management to vandalism and automatically repair damaged articles. At every stage, authorized administrators are able to modify entries and settings by a comprehensive range of parameters, delivering full control. In short, Autonomy's holistic approach provides all the benefits of social methods, but also negates the pitfalls of intensive maintenance and user bias.
Summary: ...N.A. was very wary of applying any significant patches to the Oracle E-Business suite. The Tupperware IT department has benefited because it has one less major application modification to support. In addition, Tupperware N.A. will save in ongoing development and maintenance costs. Company profile Tupperware...
Summary: ...However, database operating performance has been gradually worsening. At this point, the importance of database archiving is evident, as it can provide stable database performance while maintaining a mostly unchanged online database scale, thereby ensuring efficient and stable running of systems. Since...
Summary: ...shops. It is rumored that their store in San Rafael was home to some of the first mountain bikes in the country. Today, Mike's Bikes is part of a growing family of local bike shops, all with a singular purpose: to get as many people on bikes as possible. They locally own and operate eight wildly successful...
Summary: ...to bid on survey processing projects from other universities and local, state and national government agencies, essentially acting as a service bureau. “We’ve expanded the scope of operation and have been able to inherently increase business coming into the center,” said Stagg. “TeleForm has allowed...
Summary: ...ensuring joined-up intelligence on search criteria/topics across London • Improves timeliness and relevance of Community Impact Assessment reports “To be able to now monitor sentiment, response to messages and reply on a London-wide or national scale is of tremendous beneft. Just in terms of resources...
Summary: ...across London • Improves timeliness and relevance of Community Impact Assessment reports “To be able to now monitor sentiment, respond to messages, and reply on a London-wide or national scale is of tremendous beneft. Just in terms of resources saved scanning papers, Internet, and other social media...
Summary: ...Estate, BAE Sy Lloyds Banking Group, The Nuclear Decommissioning Auth and FirstGroup. Burges Salmon is based at a single sit Bristol and aims to be the first choice law firm for staff seeking a real alternative to City firms. Their rep winning challenging “City quality” work allows Burges Sa to attract...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...role of the next generation archive is to serve as an anchor to mission critical solutions for eDiscovery, records management, risk mitigation, and information management. Autonomy Consolidated Archive (ACA) – Greater awareness about the pitfalls of legacy archiving methods are changing the mindset...
Summary: ...and eCommerce Autonomy extranet search and ecommerce solutions 2 Brochure Autonomy extranet search and ecommerce solutions Provide real-time access to more information Almost every organization today is drowning in data. Most firms are doubling their data intake every 90 days, with the vast majority of...
Summary: ...it does not remove the critical defect. Page Rank: Determines the “importance” of a web page based on the number of pages linked to it. This ranking is then used with a keyword entered by a user to retrieve the most relevant results. The flaw with this approach is that search results rely on manually...
Summary: ...negative sentiment. But the problem is that people’s reviews are often complex and multifaceted. They have mixed feelings, for instance, a harsh criticism can contain appreciation for one aspect of the product. Or unabashed admiration can include nit-picking of a flaw. Unfortunately, these subtleties...
Summary: ...or without recursion) • Filtering of content based on file extensions and dates • Filtering based on field name/ value pairs using wildcards, negation and case-(in)sensitivity • HTML rendering of various data formats • Batch processing • Import parameters compatible with any other Autonomy indexing...
Summary: ...Autonomy KeyView IDOL - Product Brief. This flaw is wholly unacceptable (and costly) in today’s litigious environment, where companies are required by law to produce all electronically stored information (ESI) relevant to a case. In another example, if the technology is unable to filter through all...
Summary: ...initiation time from weeks to hours • REDUCE abandonment rates • IMPROVE client satisfaction and retention • STANDARDS based through support of NAVA Straight-Through Processing Initiative • TRANSPARENT compliance with regulatory standards Pitfalls with Alternative Approaches • PAPER-INTENSIVE...
Summary: ...the enterprise, from instant messaging (IM), wikis and workflow applications to team calendaring, each of which has its own incompatible proprietary expertise repository, non-uniform schema and distinctive interfaces. Whereas labour-intensive technologies and “point solutions” force the user to adapt...
Summary: ...Aungate Real-Time Policy Supervisor. Both of these approaches are inherently limited in that they only catch a percentage of the actual incriminating communications taking place within the organization and, in the case of lexicon filters, often result in many false positive results that can greatly lengthen...
Summary: ...editing tools, including storyboard, jump to scene, select excerpt, add bumpers and trailers, and re-ingest as new asset. Deep video indexing )DVI) Automatically extracts information from within the video file itself rather than relying on frequently subjective, incomplete, and unreliable user-defined...
Summary: ...ICE can be configured to automatically alert business managers, IT personnel, or compliance officers to potential data breaches or violations within the defined parameters. It can also Highlights • Minimizes information theft, fraud, and data risk by proactively managing all interactions, including...
Summary: ...request that should be made to the server (for example, the server action command and the parameters that it requires). • Data object Allows you to store the HTML or XML reply of a server request as a plain text buffer (for later parsing or outputting to a browser, for example) or to parse and map XML...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...False-positives are items incorrectly flagged as suspicious, reducing valuable time available to investigate truly suspicious activities. Lexicon- and keyword-based monitoring methods are inherently flawed in that they only catch a percentage of the actual incriminating communications that have taken...
Summary: ...neatly into the rows and columns of a traditional database. In fact, old-style, survey-centric VoC projects have always been designed around the capabilities of the relational database. Net Promoter or customer satisfaction scores are two common examples. However, there’s a fatal flaw in relying on...
Summary: ...desktop search that upholds the existing security infrastructure of the enterprise, while not compromising the performance or accuracy of information delivery. An additional flaw with some desktop search technologies is that by default (and very difficult to stop) they ‘phone home’ even in straight...
Summary: ...analyzing it so difficult,” Malden observes. “How do you derive meaning from information that’s as disparate and unpredictable as the people creating it?” Needless Risks and Missed Opportunities Unfortunately, that’s a question few big data solutions can answer well at present. “Most legacy...
Summary: ...and connectors to external systems, are managed through a modular server architecture, and share a common security metaphor. Security, user administration and maintenance are thus simpler, more efficient, less error-prone and less costly, with no duplication of content or effort. Matter centric collaboration...
Summary: ...The charge for cloud backup is a known monthly service fee, rather than the capital cost of acquiring software licenses for specific servers, which allows for simpler budgeting and predictable monthly costs. There are no costs for software, backup hardware, maintenance, or media with cloud backup. The...
Summary: ...three years. Premature deletion of messages, especially e-mail, can put a company in jeopardy of violating regulations; this type of standardization can save both regulatory pain and provide substantial cost savings. Having systems in place that perform this record maintenance for you is a major advantage;...
Summary: ...archive serves as the anchor to mission critical solutions for eDiscovery, records management, risk mitigation, and information management. Autonomy Consolidated Archive (ACA) – Greater awareness about the pitfalls of legacy archiving methods are changing the mindset that archives should exist as standalone,...
Summary: ...because they can get a more complete view of the customer and overcome channel biases that arise when analyzing a single channel or touchpoint. For instance, analyzing only call recordings creates a bias towards people that are more inclined to call the company rather than self-serve online. These people...
Summary: ...Autonomy User Experience White Paper. Legacy keyword searches, in particular, have the inherent flaw of retrieving the most popular rather than the most accurate results. Thus, traditional approaches fall short of locating desired products or pieces of information in a hassle-free and efficient manner....
Summary: ...and best practices, reusable content of all kinds—is lost forever. It is also essential to understand the distinction between archiving and e-mail management for Filtering/Security Policy and Compliance Productivity Archiving/ Records ■ Spam blocking ■ Virus protection ■ DRM ■ Storage ■ Archiving...
Summary: ...vs. disaster recovery Highly available systems build redundancy into storage, networking, and compute resources in an effort to keep the application online and available in the event of a component failure. Typically, this also includes the ability to replicate data to different storage locations. Unfortunately,...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2013 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2012 at the moment, please visit the news section on www.autonomy.com for the latest news.
Relevance
Date
Press Release
There do not seem to be any press releases related to this page in 2011 at the moment, please visit the news section on www.autonomy.com for the latest news.