IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Recognition

RSS Feed   
Speech Recognition Multimedia (View All Report Types)
 
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

The Future of Work the Hut Group HotTopics Interview
sponsored by Okta
VIDEO: For organizations and their employees, adjusting to remote work and digital interactions has been as challenging as it is necessary. In this webinar, join Joanna Drake, CIO of The Hut Group, and Peter Stojanovic, editor at HotTopics.HT as they discuss the new normal and the future of work.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Okta

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

Turn Your Phishing Links Into Read Only
sponsored by Menlo Security
WEBCAST: Check out this webcast to uncover the 3 email security limitations of Office 365 and discover how Menlo can ‘air gap” your enterprise network from the pubic web while still allowing employees seamless access to the internet.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Menlo Security

Cloud Native Application Security: Have You Covered All Your Bases?
sponsored by Rackspace
WEBCAST: The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.
Posted: 19 May 2020 | Premiered: May 19, 2020

Rackspace

Creating Digital Trust: Anchoring Remote Users to Real Identities
sponsored by Onfido
VIDEO: As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.
Posted: 23 Jul 2020 | Premiered: 03 Jun 2020

Onfido

Where Law and Tech Will Collide in 2020
sponsored by RSA Conference
WEBCAST: The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.
Posted: 09 Jul 2020 | Premiered: Jan 7, 2020

RSA Conference

Why DevOps Has Not Become DevSecOps
sponsored by WhiteHat Security
WEBCAST: Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.
Posted: 18 Nov 2020 | Premiered: Nov 18, 2020

WhiteHat Security

HID FARGO INK1000 Inkjet Card Printer & Encoder
sponsored by HID Global
VIDEO: In this short video, learn about the capabilities of the HID FARGO INK1000 Inkjet Card Printer & Encoder. It’s ideal for cost-conscious small- to medium-sized businesses and K-12 schools that need to print high-quality corporate and visitor badges, student and faculty IDs, or gift and loyalty cards.
Posted: 12 Nov 2020 | Premiered: 12 Nov 2020

HID Global

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info