{"id":720,"date":"2022-06-24T11:40:08","date_gmt":"2022-06-24T03:40:08","guid":{"rendered":"http:\/\/www.recording-ts.com\/?page_id=720"},"modified":"2025-09-19T16:29:06","modified_gmt":"2025-09-19T08:29:06","slug":"dclog-esdclog-epdclog-ec","status":"publish","type":"page","link":"https:\/\/www.duplicall.com\/index.php\/dclog-esdclog-epdclog-ec\/","title":{"rendered":"Command Dispatching Audio and Video Recording\u00a0\u2013\u00a0DCLog ES\u3001DCLog EP\u3001DCLog EC"},"content":{"rendered":"<table style=\"height: 507px; width: 99.6812%;\">\n<tbody>\n<tr style=\"height: 521px;\">\n<td style=\"width: 607.153px; height: 521px;\">\n<h3><strong>Record Every Detail, Command and Dispatch<\/strong><\/h3>\n<p>With the continuous development of society, public service and public safety have become the top priority of various industries and departments. Effective on-site command, dispatch and processing capabilities for major emergencies in command dispatching centres of various industries have also become one of the important symbols of modern management.<\/p>\n<p>Command dispatching centres involves communication interaction, video exchange, data scheduling, information display and many other aspects. DCLog can completely and safely transcribe each command dispatching process into data files that can be played repeatedly and forwarded to the ASR engine. In addition, ensuring 100% voice capture while complying with the safety and compliance of command dispatching centres. Furthermore, meeting the requirement of comprehensive information recording in command and dispatch process.<\/td>\n<td style=\"width: 460.486px; height: 521px;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-759 alignright\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/1059826_1531475.jpg\" alt=\"\" width=\"412\" height=\"323\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/1059826_1531475.jpg 324w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/1059826_1531475-300x235.jpg 300w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 62px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 62px;\">\n<td style=\"width: 1075.33px; height: 62px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 513px; width: 100.863%;\">\n<tbody>\n<tr>\n<td style=\"width: 441px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-758\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/51miz-E844751-6FCA9C3F-768x572-1.png\" alt=\"\" width=\"394\" height=\"294\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/51miz-E844751-6FCA9C3F-768x572-1.png 768w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/51miz-E844751-6FCA9C3F-768x572-1-300x223.png 300w\" sizes=\"auto, (max-width: 394px) 100vw, 394px\" \/><\/td>\n<td style=\"width: 625px;\">\n<h3><strong>Capture 100% Data While Ensuring Safety and Compliance<\/strong><\/h3>\n<p><strong>With the development of economy and society along with the continuous improvement of the legal system, <\/strong><span style=\"color: #808080;\">the industry scope of the command dispatching centres has become more extensive than ever. The public has also put forward higher requirements for the response and adapt capabilities of the command dispatching centres.<\/span><\/p>\n<p><strong>DCLog supports massive data volume architecture. <\/strong><span style=\"color: #808080;\">The method of flexibly using hardware\/software shunting to perform lossless massive data distribution, thus effectively avoiding the problem of packet loss caused by high network card load due to huge data. At the same time, it also supports 1+1, N+1, N+M and other high-reliability architectures, with recording stability that can reach 99.99%. Most importantly, meets the practical needs of command dispatching in public security, subway, port, various departments and command centres at all levels.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 58px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 58px;\">\n<td style=\"width: 1075.33px; height: 58px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 675px; width: 99.4106%;\">\n<tbody>\n<tr>\n<td style=\"width: 607.153px;\">\n<h3><strong>Protect Your Data, Protect Your Interest<\/strong><\/h3>\n<p><strong>Data security. <\/strong><span style=\"color: #808080;\">Sensitive data is encrypted and save into database using AES 128 algorithm. Payment card industry data security standard (PCI-DSS 3.0) is compiled to fulfil the compliance goal of the regulatory requirement. Recording file will not contain key sensitive information of the customer.<\/span><\/p>\n<p><strong>Transmission security. <\/strong><span style=\"color: #808080;\">The communication between client and server is encrypted using HTTPS and SSL method. The content in data transmission is using AES256 encryption while SFTP is optional for file upload and archive to ensure data security. <\/span><\/p>\n<p><strong>User security. <\/strong><span style=\"color: #808080;\">User hierarchy and user permission are used to restrict the live monitoring and playback of every recording which prevents the intrusion of eavesdropper. Bcrypt is used to ensure user security incorporating with salt encryption method.<\/span><\/p>\n<p><strong style=\"font-family: inherit; font-size: inherit;\">File Authenticity. <\/strong><span style=\"color: #808080;\">Inserting digital information into voice file, watermark information into screen recording file will ensure authenticity during the process of voice or video file transfer.\u00a0 It is proven that the following principles can be effectively implemented to avoid legal risk while ensuring 100% certainty of digital document evidence.<\/span><\/td>\n<td style=\"width: 460.486px;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-756 alignright\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168.png\" alt=\"\" width=\"426\" height=\"252\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168.png 2169w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168-300x177.png 300w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168-1024x605.png 1024w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168-768x454.png 768w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168-1536x907.png 1536w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u6570\u636e\u5b89\u5168-2048x1210.png 2048w\" sizes=\"auto, (max-width: 426px) 100vw, 426px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 58px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 58px;\">\n<td style=\"width: 1075.33px; height: 58px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 289px; width: 100.029%;\">\n<tbody>\n<tr>\n<td style=\"width: 444.292px;\">\n<h3><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-836\" src=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/windowslinux-768x160-1.jpg\" alt=\"\" width=\"768\" height=\"160\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/windowslinux-768x160-1.jpg 768w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/windowslinux-768x160-1-300x63.jpg 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/strong><\/h3>\n<\/td>\n<td style=\"width: 629.708px;\">\n<h3><strong>Support Linux and Windows OS, Better Fulfil Maintenance Requirements<\/strong><\/h3>\n<p><strong><span style=\"color: #000000;\">Besides from supporting various versions of the Microsoft Windows OS, <\/span><\/strong><span style=\"color: #808080;\">DCLog also support other Linux OS with x86 architecture system such as CentOS, Euler, OpenEuler, Redhat, SUSE, ubuntu and UOS; and Linux OS with arm architecture system such as OpenEuler and UOS. Above mentioned Linux OS will be an important consideration since public cloud and private cloud of software are slowly migrating to Linux OS.<\/span><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 61px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 61px;\">\n<td style=\"width: 1075.33px; height: 61px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 354px; width: 99.7129%;\">\n<tbody>\n<tr>\n<td style=\"width: 51.0155%;\">\n<h3><strong>Product Combination Provides Complete Solution<\/strong><\/h3>\n<p>DCLog is one of the customer experience intelligence management product series. Products such as ISCM, IBAE, SoIP, MoIP, IMAM, VideoOPTI, etc. can be formed as a complete yet flexible intelligent security and compliance management solution. Each product from the combination can also be used alone or combined used. Furthermore, it effectively helps companies to promptly discover and eliminate risks while keeping the damage at minimum. Ultimately, makes better use of safety and compliance to create greater value.<\/td>\n<td style=\"width: 48.0287%;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2346 alignright\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/ICCM\u5176\u4ed6\u4ea7\u54c1-20211202-02.png\" alt=\"\" width=\"337\" height=\"332\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/ICCM\u5176\u4ed6\u4ea7\u54c1-20211202-02.png 1557w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/ICCM\u5176\u4ed6\u4ea7\u54c1-20211202-02-300x296.png 300w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/ICCM\u5176\u4ed6\u4ea7\u54c1-20211202-02-1024x1010.png 1024w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/ICCM\u5176\u4ed6\u4ea7\u54c1-20211202-02-768x757.png 768w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/ICCM\u5176\u4ed6\u4ea7\u54c1-20211202-02-1536x1514.png 1536w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 51px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 51px;\">\n<td style=\"width: 1075.33px; height: 51px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<table style=\"height: 55px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 55px;\">\n<td style=\"width: 1075.33px; height: 55px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 857px; width: 100.09%;\">\n<tbody>\n<tr style=\"height: 153px;\">\n<td style=\"width: 10.4204%; height: 29px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-761\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/Flyer-vclog-\u4ea7\u54c1\u7279\u6027-02-150x150-1.png\" alt=\"\" width=\"100\" height=\"100\" \/><\/td>\n<td style=\"width: 31.8561%; padding-left: 30px; height: 29px; vertical-align: top; text-align: left;\"><strong>Cloud-based\u00a0 \u00a0 \u00a0\u00a0<\/strong><span style=\"font-size: 10pt;\"><br \/>\nSupport LDAP<br \/>\nSupport single sign-on (SSO)<br \/>\nSupport Docker container and virtualization<br \/>\nAdopt License Server for centralized management and allocation of license resources<br \/>\nSupport SBC SIPREC recording<br \/>\n<\/span><\/td>\n<td style=\"width: 3.78363%; height: 29px; text-align: left;\"><\/td>\n<td style=\"width: 10.198%; height: 29px; text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-757\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/\u672a\u6807\u9898-1-0\u4e0a\u76845-150x150-1.png\" alt=\"\" width=\"100\" height=\"100\" \/><\/td>\n<td style=\"width: 35.3571%; padding-left: 30px; height: 29px; vertical-align: top; text-align: left;\"><strong>Simplification<br \/>\n<\/strong><span style=\"font-size: 10pt;\">The recording file can be played in just 3 seconds after the call ends<\/span><br \/>\n<span style=\"font-size: 10pt;\">Search results can be obtained from massive recording files within 5 seconds<br \/>\nAudio, video and screen recorded files are retrieved and played through a unified interface<br \/>\nCustomized metadata tags enable efficient and automated searching<br \/>\nThe standardized Restful API can better perform business system integration and fast retrieval<br \/>\n<\/span><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 10.4204%; height: 10px;\"><\/td>\n<td style=\"width: 31.8561%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 3.78363%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 10.198%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 35.3571%; height: 10px; text-align: left;\"><\/td>\n<\/tr>\n<tr style=\"height: 153px;\">\n<td style=\"width: 10.4204%; height: 10px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-762\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/Flyer-vclog-\u4ea7\u54c1\u7279\u6027-03-150x150-1.png\" alt=\"\" width=\"100\" height=\"100\" \/><\/td>\n<td style=\"width: 31.8561%; padding-left: 30px; height: 10px; vertical-align: top; text-align: left;\"><strong>Localization<\/strong><span style=\"font-size: 10pt;\"><br \/>\nSupport China mainstream database<br \/>\nSupport China server such as Zhaoxin<br \/>\nSupport China operating system such as Kylin<br \/>\n<\/span><\/td>\n<td style=\"width: 3.78363%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 10.198%; height: 10px; text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-763\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/Flyer-vclog-\u4ea7\u54c1\u7279\u6027-04-150x150-1.png\" alt=\"\" width=\"100\" height=\"100\" \/><\/td>\n<td style=\"width: 35.3571%; padding-left: 30px; height: 10px; vertical-align: top; text-align: left;\"><strong>Standardization<\/strong><span style=\"font-size: 10pt;\"><br \/>\nSupport various database: MSSQL, MySQL, Oracle<br \/>\nSupport various operating system: Windows 64-bit, Linux 64-bit<br \/>\nSupport cross-browser operation: HTML5 architecture, no plugins required<br \/>\n<\/span><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 10.4204%; height: 10px;\"><\/td>\n<td style=\"width: 31.8561%; padding-left: 30px; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 3.78363%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 10.198%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 35.3571%; padding-left: 30px; height: 10px; text-align: left;\"><\/td>\n<\/tr>\n<tr style=\"height: 137.059px;\">\n<td style=\"width: 10.4204%; height: 10px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-760\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/07\/Flyer-vclog-\u4ea7\u54c1\u7279\u6027-01-150x150-1.png\" alt=\"\" width=\"100\" height=\"100\" \/><\/td>\n<td style=\"width: 31.8561%; padding-left: 30px; height: 10px; vertical-align: top; text-align: left;\"><strong>Intelligence<\/strong><span style=\"font-size: 10pt;\"><br \/>\nSupport Voice + AI: Support dual-track PCM file recording and real-time voice streaming; integrate with market mainstream speech analysis engines<br \/>\nSupport Image + AI: Integrate with Optical Character Recognition (OCR) engine to recognize and record text content on agent screen<br \/>\n<\/span><\/td>\n<td style=\"width: 3.78363%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 10.198%; height: 10px; text-align: left;\"><\/td>\n<td style=\"width: 35.3571%; padding-left: 30px; height: 10px; text-align: left;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 54px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 54px;\">\n<td style=\"width: 1075.33px; height: 54px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<table style=\"height: 54px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 54px;\">\n<td style=\"width: 1075.33px; height: 54px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 218px; width: 99.5292%;\">\n<tbody>\n<tr>\n<td style=\"width: 1073px;\">\n<h3><strong>All New Recording System, Provide Solution to 100% Conversation Compliance<\/strong><\/h3>\n<p>Listening to each recording require huge manpower and not all recorded conversations are being listened to locate an issue. Random listening is being used to actively locate an issue and due to the massive amount of recording, only management compliance effect is effective but not actual effect. With the application of artificial intelligence technology, recording system able to provide full intelligent compliance and visualized subtitles. This is helping company to increase the intelligent security and compliance management into another high level, to prepare for any internal and external challenges.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 564px; width: 99.7626%; border-color: #ffffff;\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr style=\"height: 0.302094px; border-color: #ffffff;\">\n<td style=\"background-color: #ebebeb; width: 99.4505%; height: 0px; border-color: #ffffff; text-align: center;\" colspan=\"5\"><span style=\"font-size: 12pt;\"><strong>Feature Comparison List<br \/>\nStandard Recording System\/ Intelligent Recording System<br \/>\n<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 0.302094px; border-color: #ffffff;\">\n<td style=\"background-color: #ebebeb; width: 33.0254%; height: 0px; border-color: #ffffff; text-align: center;\" colspan=\"2\">DCLog Product Series<\/td>\n<td style=\"width: 23.0048%; background-color: #f2e4c2; height: 0px; border-color: #ffffff; text-align: center;\">DCLog ES (Standard)<br \/>\n(Enterprise Standard)<\/td>\n<td style=\"width: 21.9863%; background-color: #c5e3cf; text-align: center; height: 0px;\">DCLog EP (Intelligent)<br \/>\n(Enterprise Professional)<\/td>\n<td style=\"width: 21.434%; background-color: #e3d1e6; text-align: center; height: 0px;\">DCLog EC (Intelligent)<br \/>\n(Enterprise Compliance)<\/td>\n<\/tr>\n<tr style=\"height: 1px;\">\n<td style=\"background-color: #ebebeb; width: 12.9352%; text-align: center; height: 27px;\" rowspan=\"3\"><span style=\"font-size: 10pt;\">Database Platform\/ Intelligent Technology<\/span><\/td>\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 1px;\"><span style=\"font-size: 10pt;\">SQL Related Database<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 1px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 1px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 1px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 3px;\">\n<td style=\"width: 20.0902%; height: 3px; background-color: #ebebeb; text-align: center;\"><span style=\"font-size: 10pt;\">Elastic Corporation Search<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 3px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 3px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 3px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">ASR Voice Recognition Engine<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 12.9352%; text-align: center; height: 66px;\" rowspan=\"4\"><span style=\"font-size: 10pt;\">Search and Playback Recording Method<\/span><\/td>\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Search based on SQL rule<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\"> \u25cf<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\"> \u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 18px;\"><span style=\"font-size: 10pt;\">Search based on keyword<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 18px;\"><span style=\"font-size: 10pt;\">\u00a0\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 18px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 18px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 2px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 2px;\"><span style=\"font-size: 10pt;\">Dual wave visualized playback<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 2px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 2px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 2px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Dual subtitle visualized playback<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 12.9352%; text-align: center; height: 69px;\" rowspan=\"3\"><span style=\"font-size: 10pt;\">Intelligent Tagging\/ Violation Detection<\/span><\/td>\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Preset violation rule<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Auto tagging violated calls<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Manual evaluation on violated calls<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 12.9352%; text-align: center; height: 69px;\" rowspan=\"3\"><span style=\"font-size: 10pt;\">Intelligent Tagging\/ Call Type Categorization<\/span><\/td>\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Preset categorize rule<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Auto tagging based on rules<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"background-color: #ebebeb; width: 20.0902%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">Manual evaluation based on type<\/span><\/td>\n<td style=\"width: 23.0048%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.9863%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u4e00<\/span><\/td>\n<td style=\"width: 21.434%; text-align: center; height: 23px;\"><span style=\"font-size: 10pt;\">\u25cf<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 41px; width: 99.9998%;\" width=\"1081\">\n<tbody>\n<tr>\n<td style=\"width: 1075.33px;\"><span style=\"font-size: 10pt;\">Remark: Intelligent recording system can be applied in various scenario, this table is only displaying example of Intelligent Tagging for Violation Detection and Call Type Categorization. Please contact us for more scenario.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 65px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 65px;\">\n<td style=\"width: 1075.33px; height: 65px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<table style=\"height: 71px; width: 100%;\" width=\"1081\">\n<tbody>\n<tr style=\"height: 71px;\">\n<td style=\"width: 1075.33px; height: 71px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 518px; width: 99.6478%;\">\n<tbody>\n<tr>\n<td style=\"width: 1073px;\">\n<h3><strong>Complete Product Suite, Provide Possibility for Sustainable Development<\/strong><\/h3>\n<p>We intensively focus on R&amp;D and develop &#8220;security &amp; compliance\u201d intelligent management related products. After years investment and research, we have accumulated rich industry leading experience in &#8220;security&#8221; and &#8220;compliance\u201d and have developed a complete product series to provide customers with solutions at various stages of &#8220;security&#8221; and &#8220;compliance&#8221;. As the AI technology becomes increasingly mature, we will adopt more AI technology to develop our intelligent products to meet the &#8220;safety &amp; compliance\u201d need in the market and its sustainable development.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2284 aligncenter\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-scaled.jpg\" alt=\"\" width=\"980\" height=\"275\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-scaled.jpg 2560w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-300x84.jpg 300w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-1024x288.jpg 1024w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-768x216.jpg 768w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-1536x432.jpg 1536w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-05-2048x576.jpg 2048w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 68px; width: 99.2858%;\" width=\"1084\">\n<tbody>\n<tr style=\"height: 68px;\">\n<td style=\"width: 1078px; height: 68px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<table style=\"height: 67px; width: 99.881%;\" width=\"1081\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 367px; width: 99.9631%;\">\n<tbody>\n<tr>\n<td style=\"width: 399px;\">\n<h5><strong>Related Product List<\/strong><\/h5>\n<p><span style=\"font-size: 10pt;\">811-0002-002\/L\uff0cDCLog ES Base Package (Linux)<br \/>\n811-0001-002\uff0cDCLog ES Base Package (Windows)<br \/>\n811-2700-001\uff0cDCLog Media File Encryption<br \/>\n811-9900-005\uff0cDCLog Voice Recording License for IP<br \/>\n811-9900-007\uff0cDCLog Voice Recording License for Analog<br \/>\n811-****-***, Product is not all listed out, please call for inquiry<br \/>\n<\/span><\/td>\n<td style=\"width: 669px;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2371 alignright\" src=\"http:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02.png\" alt=\"\" width=\"632\" height=\"218\" srcset=\"https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02.png 1455w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-300x103.png 300w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-1024x353.png 1024w, https:\/\/www.duplicall.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-768x264.png 768w\" sizes=\"auto, (max-width: 632px) 100vw, 632px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 103px;\" width=\"1084\">\n<tbody>\n<tr>\n<td style=\"width: 1078px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Record Every Detail, Command and Dispatch With the cont [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-720","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/pages\/720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/comments?post=720"}],"version-history":[{"count":37,"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/pages\/720\/revisions"}],"predecessor-version":[{"id":5231,"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/pages\/720\/revisions\/5231"}],"wp:attachment":[{"href":"https:\/\/www.duplicall.com\/index.php\/wp-json\/wp\/v2\/media?parent=720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}