Speech Technology Multimedia

(View All Report Types)
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

The power of AI and Automation: Productivity and agility
sponsored by IBM
VIDEO: Forward-thinking executives are harnessing data-driven innovation to improve performance, and in this Data Story IBM looks at research that shows how leading companies are using data as an asset and using intelligent automation to as a means to growth and operational advantage.
Posted: 02 Apr 2024 | Premiered: 01 Apr 2024

IBM

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Windows Azure Platform Security Essentials for Technical Decision Makers
sponsored by Microsoft
WEBCAST: In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform.
Posted: 01 Dec 2010 | Premiered: Dec 1, 2010

Microsoft

Enhancing Server and Cloud Security with Intel® Trusted Execution Technology (Intel® TXT)
sponsored by Dell, Inc. and Intel®
VIDEO: This brief animation highlights the technologies, benefits, and uses of Intel® Trusted Execution Technology (Intel® TXT) in server and cloud environments.
Posted: 07 Apr 2011 | Premiered: 14 Dec 2010

Dell, Inc. and Intel®

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow