IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Desktop Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Desktop Speech RecognitionMultimedia (View All Report Types)
 
Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
WEBCAST: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 27 May 2010 | Premiered: Jun 8, 2010, 11:00 EDT (15:00 GMT)

West Interactive

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Securing Web Services with HID
sponsored by HID
VIDEO: This quick video provides a few case studies concerning an active authentication system that leverages cloud-based threat detection to provide secure access to web-based apps and keep critical end-user information safe.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

HID

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this white paper, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement