SlideShare a Scribd company logo
1 of 13
Information Network
Information Network: Overview

 •Information Network consists of compliance related
 web-based business applications that access a
 Compliance Library (regulatory content repositories)
 for managing product compliance.

 •It is comprised of Sources of content and the
 applications that act on that stored information
 (Sources include: Internet based, company specific
 information, data from content and regulatory
 information suppliers, government and information
 from industry associations).
Information Network: Overview

 •With Ithos Information Network (IIN) an unlimited
 number of users can access the Compliance
 Libraries constructed to enable the company to
 ensure product compliance.


 •The Compliance Libraries are built with Taxonomies
 (for guided navigation) and Thesauri (for handling
 multi-lingual requirements, searchable Legislation,
 and content that needs to be loaded into other
 business applications).
Information Network: Components




                             Details
Information Network: Components




    Search (Information Retrieval)-
    organizes unstructured content to
    enable enterprise-wide users to
    access hard to find information fast
    and easy.
                                PLM
Information Network: Components




    PLM Compliance (Regulatory
    PLM)- provides access to
    documentation on formula
    ingredients. Rules are designed
    and constructed for aiding
    recurring workflows.       Document Mgmt
Information Network: Components




    Document Management
    (Integrates Regulatory with PLM)-
    reduces the cost and integrates
    compliance document creation with
    design and development functions.
                            Content Mgmt
Information Network: Components




    Content Management (Maintained
    Content)- achieve product
    compliance with expert
    systems, product screening, and
    application integration all with one
    centralized repository.      Discovery
Information Network: Components



              Discovery

    Discovery: simplify the process of
    finding enterprise information that
    is “hard to find” and maintained in
    large, disparate repositories.
                              Authoring
Information Network: Components



             Authoring

    Authoring: stores and manages
    substance information to be used
    in template driven hazardous
    document creation.
                             Mining
Information Network: Components



                Mining

    Mining: the detailed analysis of
    document collections. Users can
    “find” more relevant content, in its
    context.
                               Supply Chain
Information Network: Components


               Supply
               Chain

    Supply Chain: sustainability begins
    with the supply chain. Ensure
    compliance and reduce the potential
    for liability.
                             Why Ithos
Information Network
 •International Food companies are increasingly challenged to
 quickly “Find, Interpret, and Maintain” Global Regulations that
 are imposing restrictions on Ingredients.

 •Food Processing companies need enterprise software
 solutions to ensure traceability from their suppliers who leave
 them vulnerable to RISK:
         Damages and Costs due to recall & Negative impact on Brands

 •Ithos develops software automation and advanced SEARCH
 technologies that will change these conditions by providing fast
 and easy access to Global Regulatory Content and solutions
 that Reduce Risk due to unknown supplier issues.


         Info@ithosglobal.com | www.IthosGlobal.com

More Related Content

What's hot

Records Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationRecords Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationEverteam
 
The Top 6 Data Challenges of Cloud Computing
The Top 6 Data Challenges of Cloud ComputingThe Top 6 Data Challenges of Cloud Computing
The Top 6 Data Challenges of Cloud ComputingDarren Cunningham
 
Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics Hybrid Cloud
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Fuji Xerox Asia Pacific
 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetDimitri Sirota
 
IBM Incorporates Actiance Software into Information Governance Product
IBM Incorporates Actiance Software into Information Governance ProductIBM Incorporates Actiance Software into Information Governance Product
IBM Incorporates Actiance Software into Information Governance ProductTimothy Valihora
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Sohaib Mahmood
 
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...Beatriz Esteves
 
What’s new in OpenText Legal Tech
What’s new in OpenText Legal TechWhat’s new in OpenText Legal Tech
What’s new in OpenText Legal TechOpenText
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Inc
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID Inc
 
SOLIX - Empowering Data Management
SOLIX - Empowering Data ManagementSOLIX - Empowering Data Management
SOLIX - Empowering Data Managementxmeteorite
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetDimitri Sirota
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
 

What's hot (18)

Records Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationRecords Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your Information
 
The Top 6 Data Challenges of Cloud Computing
The Top 6 Data Challenges of Cloud ComputingThe Top 6 Data Challenges of Cloud Computing
The Top 6 Data Challenges of Cloud Computing
 
Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics
 
W3C DPVCG - DPV v0.2
W3C DPVCG - DPV v0.2W3C DPVCG - DPV v0.2
W3C DPVCG - DPV v0.2
 
Information classification
Information classificationInformation classification
Information classification
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?
 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data Sheet
 
IBM Incorporates Actiance Software into Information Governance Product
IBM Incorporates Actiance Software into Information Governance ProductIBM Incorporates Actiance Software into Information Governance Product
IBM Incorporates Actiance Software into Information Governance Product
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
 
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
 
What’s new in OpenText Legal Tech
What’s new in OpenText Legal TechWhat’s new in OpenText Legal Tech
What’s new in OpenText Legal Tech
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
SOLIX - Empowering Data Management
SOLIX - Empowering Data ManagementSOLIX - Empowering Data Management
SOLIX - Empowering Data Management
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 

Viewers also liked

Oppa brand buzz survey
Oppa brand buzz survey   Oppa brand buzz survey
Oppa brand buzz survey KASIS
 
Ingredient Safe
Ingredient SafeIngredient Safe
Ingredient Safekbubeck
 
Web Discovery
Web DiscoveryWeb Discovery
Web Discoverykbubeck
 
Oppa viewability NL
Oppa viewability NLOppa viewability NL
Oppa viewability NLKASIS
 
Smartphones in the Mobile World of Content Publishers
Smartphones in the Mobile World of Content PublishersSmartphones in the Mobile World of Content Publishers
Smartphones in the Mobile World of Content PublishersKASIS
 
Building brands in a digital age
Building brands in a digital ageBuilding brands in a digital age
Building brands in a digital ageKASIS
 
Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)
Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)
Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)Lauri Anttila
 
Oppa viewability FR
Oppa viewability FROppa viewability FR
Oppa viewability FRKASIS
 
Ithos Global Best Practices In Supplier Quality And Risk Mgmt
Ithos Global Best Practices In Supplier Quality And Risk MgmtIthos Global Best Practices In Supplier Quality And Risk Mgmt
Ithos Global Best Practices In Supplier Quality And Risk Mgmtkbubeck
 
Galería de obras del arte rococó
Galería de obras del arte rococóGalería de obras del arte rococó
Galería de obras del arte rococóJosé Milán
 
creating online brand awareness : 5 misunderstandings
creating online brand awareness : 5 misunderstandings creating online brand awareness : 5 misunderstandings
creating online brand awareness : 5 misunderstandings KASIS
 
Electronic work order management case study
Electronic work order management case studyElectronic work order management case study
Electronic work order management case studyLauri Anttila
 

Viewers also liked (15)

Oppa brand buzz survey
Oppa brand buzz survey   Oppa brand buzz survey
Oppa brand buzz survey
 
Mystic Marriott
Mystic MarriottMystic Marriott
Mystic Marriott
 
Ingredient Safe
Ingredient SafeIngredient Safe
Ingredient Safe
 
Web Discovery
Web DiscoveryWeb Discovery
Web Discovery
 
Oppa viewability NL
Oppa viewability NLOppa viewability NL
Oppa viewability NL
 
Smartphones in the Mobile World of Content Publishers
Smartphones in the Mobile World of Content PublishersSmartphones in the Mobile World of Content Publishers
Smartphones in the Mobile World of Content Publishers
 
Mspp
MsppMspp
Mspp
 
Building brands in a digital age
Building brands in a digital ageBuilding brands in a digital age
Building brands in a digital age
 
Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)
Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)
Mobiilikehitys Elenia Oy:ssä (vierailijaluento TAMKissa)
 
The jungle book
The jungle bookThe jungle book
The jungle book
 
Oppa viewability FR
Oppa viewability FROppa viewability FR
Oppa viewability FR
 
Ithos Global Best Practices In Supplier Quality And Risk Mgmt
Ithos Global Best Practices In Supplier Quality And Risk MgmtIthos Global Best Practices In Supplier Quality And Risk Mgmt
Ithos Global Best Practices In Supplier Quality And Risk Mgmt
 
Galería de obras del arte rococó
Galería de obras del arte rococóGalería de obras del arte rococó
Galería de obras del arte rococó
 
creating online brand awareness : 5 misunderstandings
creating online brand awareness : 5 misunderstandings creating online brand awareness : 5 misunderstandings
creating online brand awareness : 5 misunderstandings
 
Electronic work order management case study
Electronic work order management case studyElectronic work order management case study
Electronic work order management case study
 

Similar to Information Network Why Ithos

Information network why ithos
Information network  why ithosInformation network  why ithos
Information network why ithoslmljlzc002
 
Coyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.pptCoyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.pptMurugesanJeyakumar1
 
Industrial Data Space Association - New Members, New Insights, New Future Dir...
Industrial Data Space Association - New Members, New Insights, New Future Dir...Industrial Data Space Association - New Members, New Insights, New Future Dir...
Industrial Data Space Association - New Members, New Insights, New Future Dir...Thorsten Huelsmann
 
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...John Newton
 
BigFix Inventory
BigFix InventoryBigFix Inventory
BigFix InventoryHCLSoftware
 
Enterprise content management (in short)
Enterprise content management  (in short)Enterprise content management  (in short)
Enterprise content management (in short)Anatoliy Arkhipov
 
Big Data and Semantic Web in Manufacturing
Big Data and Semantic Web in ManufacturingBig Data and Semantic Web in Manufacturing
Big Data and Semantic Web in ManufacturingNitesh Khilwani
 
fiware-lab-dev-6.pdf
fiware-lab-dev-6.pdffiware-lab-dev-6.pdf
fiware-lab-dev-6.pdfssuser8c74ba
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database TechnologyJacqueline Thomas
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Explain the IAR document and how it should be filled__YASHODA Hospital.pptx
Explain the IAR document and how it should be filled__YASHODA Hospital.pptxExplain the IAR document and how it should be filled__YASHODA Hospital.pptx
Explain the IAR document and how it should be filled__YASHODA Hospital.pptxUndersam
 
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTMicro Focus
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule miningStudsPlanet.com
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceSonatype
 
Directive № 2/ 2010 INTEGRABILITY and Metrics
Directive № 2/ 2010 INTEGRABILITY and MetricsDirective № 2/ 2010 INTEGRABILITY and Metrics
Directive № 2/ 2010 INTEGRABILITY and MetricsGustavo Giorgetti
 
Improving Performance, Efficiency and Information Governance Control of Share...
Improving Performance, Efficiency and Information Governance Control of Share...Improving Performance, Efficiency and Information Governance Control of Share...
Improving Performance, Efficiency and Information Governance Control of Share...Bishop Technologies
 

Similar to Information Network Why Ithos (20)

Information network why ithos
Information network  why ithosInformation network  why ithos
Information network why ithos
 
Coyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.pptCoyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.ppt
 
Industrial Data Space Association - New Members, New Insights, New Future Dir...
Industrial Data Space Association - New Members, New Insights, New Future Dir...Industrial Data Space Association - New Members, New Insights, New Future Dir...
Industrial Data Space Association - New Members, New Insights, New Future Dir...
 
Content management
Content managementContent management
Content management
 
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
 
BigFix Inventory
BigFix InventoryBigFix Inventory
BigFix Inventory
 
Software and Information Technology Glossary of Terms
Software and Information Technology Glossary of TermsSoftware and Information Technology Glossary of Terms
Software and Information Technology Glossary of Terms
 
Enterprise content management (in short)
Enterprise content management  (in short)Enterprise content management  (in short)
Enterprise content management (in short)
 
Big Data and Semantic Web in Manufacturing
Big Data and Semantic Web in ManufacturingBig Data and Semantic Web in Manufacturing
Big Data and Semantic Web in Manufacturing
 
fiware-lab-dev-6.pdf
fiware-lab-dev-6.pdffiware-lab-dev-6.pdf
fiware-lab-dev-6.pdf
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database Technology
 
Ch03
Ch03Ch03
Ch03
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Explain the IAR document and how it should be filled__YASHODA Hospital.pptx
Explain the IAR document and how it should be filled__YASHODA Hospital.pptxExplain the IAR document and how it should be filled__YASHODA Hospital.pptx
Explain the IAR document and how it should be filled__YASHODA Hospital.pptx
 
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule mining
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
 
Directive № 2/ 2010 INTEGRABILITY and Metrics
Directive № 2/ 2010 INTEGRABILITY and MetricsDirective № 2/ 2010 INTEGRABILITY and Metrics
Directive № 2/ 2010 INTEGRABILITY and Metrics
 
Improving Performance, Efficiency and Information Governance Control of Share...
Improving Performance, Efficiency and Information Governance Control of Share...Improving Performance, Efficiency and Information Governance Control of Share...
Improving Performance, Efficiency and Information Governance Control of Share...
 

Information Network Why Ithos

  • 2. Information Network: Overview •Information Network consists of compliance related web-based business applications that access a Compliance Library (regulatory content repositories) for managing product compliance. •It is comprised of Sources of content and the applications that act on that stored information (Sources include: Internet based, company specific information, data from content and regulatory information suppliers, government and information from industry associations).
  • 3. Information Network: Overview •With Ithos Information Network (IIN) an unlimited number of users can access the Compliance Libraries constructed to enable the company to ensure product compliance. •The Compliance Libraries are built with Taxonomies (for guided navigation) and Thesauri (for handling multi-lingual requirements, searchable Legislation, and content that needs to be loaded into other business applications).
  • 5. Information Network: Components Search (Information Retrieval)- organizes unstructured content to enable enterprise-wide users to access hard to find information fast and easy. PLM
  • 6. Information Network: Components PLM Compliance (Regulatory PLM)- provides access to documentation on formula ingredients. Rules are designed and constructed for aiding recurring workflows. Document Mgmt
  • 7. Information Network: Components Document Management (Integrates Regulatory with PLM)- reduces the cost and integrates compliance document creation with design and development functions. Content Mgmt
  • 8. Information Network: Components Content Management (Maintained Content)- achieve product compliance with expert systems, product screening, and application integration all with one centralized repository. Discovery
  • 9. Information Network: Components Discovery Discovery: simplify the process of finding enterprise information that is “hard to find” and maintained in large, disparate repositories. Authoring
  • 10. Information Network: Components Authoring Authoring: stores and manages substance information to be used in template driven hazardous document creation. Mining
  • 11. Information Network: Components Mining Mining: the detailed analysis of document collections. Users can “find” more relevant content, in its context. Supply Chain
  • 12. Information Network: Components Supply Chain Supply Chain: sustainability begins with the supply chain. Ensure compliance and reduce the potential for liability. Why Ithos
  • 13. Information Network •International Food companies are increasingly challenged to quickly “Find, Interpret, and Maintain” Global Regulations that are imposing restrictions on Ingredients. •Food Processing companies need enterprise software solutions to ensure traceability from their suppliers who leave them vulnerable to RISK: Damages and Costs due to recall & Negative impact on Brands •Ithos develops software automation and advanced SEARCH technologies that will change these conditions by providing fast and easy access to Global Regulatory Content and solutions that Reduce Risk due to unknown supplier issues. Info@ithosglobal.com | www.IthosGlobal.com