IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Processing

RSS Feed    Add to Google    Add to My Yahoo!
Voice Processing Multimedia (View All Report Types)
 
Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
WEBCAST: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 27 May 2010 | Premiered: Jun 8, 2010, 11:00 EDT (15:00 GMT)

West Interactive

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

How CIOs Gain a Competitive Edge with a Service-centric Enterprise
sponsored by Atos
WEBCAST: When it comes to digital transformation, you face a myriad of challenges. IT organizations are pursuing a graduated bi-modal strategy that industrializes and automates self-service capabilities. Watch this webcast to learn about a three-step roadmap that includes practical examples, real-world use cases, and more.
Posted: 26 Jun 2017 | Premiered: Jun 26, 2017

Atos

Tech ONTAP Podcast: Technical Rundown of NetApp's HCI
sponsored by NetApp
PODCAST: By tuning into this podcast, you'll hear an in-depth discussion of the technical features of NetApp's hyper-converged infrastructure. Listen in now as Derek Leslie—Principal Product Manager for NetApp HCI—and Gabriel Chapman—Sr. Manager HCI GTM—discuss how HCI simplifies the provisioning of virtual assets, and which workloads it best suits.
Posted: 14 Aug 2017 | Premiered: Jun 5, 2017

NetApp

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement