IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Technology

RSS Feed    Add to Google    Add to My Yahoo!
Speech Technology Multimedia (View All Report Types)
 
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
WEBCAST: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 27 May 2010 | Premiered: Jun 8, 2010, 11:00 EDT (15:00 GMT)

West Interactive

Benefits of an Application Adaptive Data Infrastructure
sponsored by DataCore Software Corporation
WEBCAST: A parallel I/O storage software can handle the different levels of performance, flexibility and availability required by dynamic applications. Access now to learn about one software solution that can handle multiple vendors and reduce cost by 75%.
Posted: 09 Aug 2016 | Premiered: Aug 8, 2016

DataCore Software Corporation

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Meet Changing Business Needs with Modern ECM Platforms
sponsored by IBM
WEBCAST: Earlier this year, Forrester conducted research to explore the hypothesis that modern businesses require ECM platforms that offer faster deployment and operational flexibility. Watch now to hear about their findings and get insight into new strategies for ECM systems.
Posted: 27 Jul 2016 | Premiered: Jul 27, 2016

IBM

Cut Through the Hype of Hyper-Converged
sponsored by NTT ICT
VIDEO: Get informed about the truth behind hyper-converged infrastructure in the following webcast featuring HPE's Director of Software-Defined Storage, Rob Strechay. Learn where this technology fits, where it doesn't; how to utilize it in your own business and more.
Posted: 05 Aug 2016 | Premiered: 16 Dec 2015

NTT ICT

Automated Test Data Creation: An IT Manager's Review
sponsored by CA Technologies
VIDEO: Don't let manual data creation bog down IT ops. Tune into this video to discover a test data manager (TDM) that creates data on demand, allowing IT to revolutionize testing. View now to learn how to capture and recreate data models on demand from existing legacy apps with this TDM.
Posted: 09 Sep 2016 | Premiered: 29 Feb 2016

CA Technologies

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement