Feeds

HP's fraught union with Autonomy bears first fruit

IDOL 10 turns big biz data chaos into some sort of sense

HP ProLiant Gen8: Integrated lifecycle automation

HP has announced the first offspring of its mammoth $10.24bn (£6.6bn) union with British software firm Autonomy.

The progeny, Autonomy IDOL 10, is a platform that pulls data from various sources including phone calls, email, social media and the web together with a company's data – such as customer logs – so it can be processed.

"For far too long, organisations have confined structured data to relational databases and unstructured data to simplistic keyword matching technologies," Mike Lynch, executive VP of information management at HP and founder of Autonomy, said in a canned statement.

"IDOL 10 brings these worlds together, allowing organisations to automatically process, understand and act on 100 per cent of their data in realtime."

Along with the platform, the firms are also introducing three new HP Autonomy Appliances powered by IDOL for archiving, rediscovery and enterprise search.

Both Lynch and HP must be glad to finally see the fruits of their labour, as the match was not an easy one.

HP was forced to extend the deadline on the deal when Autonomy shareholders dithered, even though they were unlikely to get a better offer. Then HP went through its PC business spin-off and WebOS debacles. And then the CEO backing the deal, Leo Apotheker, left HP.

However, now that HP has gulped Autonomy down, they're both keen to talk up what a good idea the whole thing was.

"Today's HP Autonomy Appliances announcement is a great example of the tremendous benefits we can deliver to customers as a result of the combination of HP and Autonomy," Lynch enthused. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.