Skip to main content
Close Search
  • Menu
uh!iveuh!iveuh!iveuh!iveuh!iveuh!ive
search
Menu
  • Solutions

    Take advantage of the most accurate and secure Speech-to-Text API on the market, with 95% accuracy, providing real-time transcription and low-latency processing for audio files.

    Discover More

    Strengthen customer relationships by measuring Relational Experience: analyze relational skills to drive loyalty, identify emotional journeys, and predict NPS without direct solicitation.

    Discover More

    Link your phone leads to marketing campaigns: reduce costs, automate lead qualification and scoring, personalize the experience, and optimize in real time.

    Discover More
  • Resources
    • Websocket Documentation
    • MRCP Documentation
  • Enterprise
    • Expertise
  • About Us
    • uh!ive’s Story
  • Blog
  • Status
  • Get a demo
  • EN
    • FR
  • search
The Importance of High Availability in IT Systems Information SystemsInfrastructure & ArchitectureTechnology & Engineering

The Importance of High Availability in IT Systems

One of the critical points in any information system architecture—and something everyone dreams of—is infallible, fully resilient high availability. Let’s be honest: it doesn’t truly exist. But several methods still…
Guillaume Delacroix
Guillaume Delacroix9 December 2025
Not Everything Is GenAIous: Rethinking Artificial Intelligence Artificial IntelligenceInnovation & ResearchVision & Technology

Not Everything Is GenAIous: Rethinking Artificial Intelligence

Not Everything Is GenAIous: Rethinking Artificial Intelligence Since the launch of ChatGPT in late 2022, artificial intelligence has been on everyone’s lips. By 2025, more than 700 million users interact…
Guillaume Delacroix
Guillaume Delacroix12 November 2025
What is the MRCPv2 protocol? MRCPV2

What is the MRCPv2 protocol?

MRCPv2 (Media Resource Control Protocol) is a set of standards used in the field of ASR (Automatic Speech Recognition). It enables communication between voice processing applications, voice resource servers and…
Utilisateur Uh!ive
Utilisateur Uh!ive17 December 2024
GenAI at the Service of Conversational Analysis Tools: Challenges and Strengths GenAi

GenAI at the Service of Conversational Analysis Tools: Challenges and Strengths

In the modern business world, human interaction remains a central pillar, and the telephone continues to be a preferred channel for these exchanges. Despite the predominance of digital communication, telephone…
Utilisateur Uh!ive
Utilisateur Uh!ive13 June 2024
Optimise your transcriptions with the Language Model Factory LM-Factory

Optimise your transcriptions with the Language Model Factory

Today, quality transcription is essential for extracting relevant information and implementing strategic actions, such as improving the customer experience and detecting trends. Beyond simply minimising errors, effective transcription means precise…
Utilisateur Uh!ive
Utilisateur Uh!ive22 March 2024
PRX as a measure of advisor involvement according to call intentions

PRX as a measure of advisor involvement according to call intentions

The customer experience is at the heart of every service-oriented company. However, to deliver a quality experience, it's essential to consider the customer's calling intent. Each call may be motivated…
Utilisateur Uh!ive
Utilisateur Uh!ive10 January 2024
Evaluate each call as closely as possible to the customer’s actual experience

Evaluate each call as closely as possible to the customer’s actual experience

Evaluating the quality of the relationship between an advisor and a customer is a constant preoccupation for companies keen to offer exceptional customer service, on a par with the quality…
Utilisateur Uh!ive
Utilisateur Uh!ive12 December 2023
Implementing PCI DSS (SAQ-D): Securing our Transactions

Implementing PCI DSS (SAQ-D): Securing our Transactions

In a world where electronic transactions play a central role in our daily lives, the security of payment card data has become a major concern. It is in this context…
Utilisateur Uh!ive
Utilisateur Uh!ive14 November 2023
An event driven architecture – Part 3 Tech

An event driven architecture – Part 3

In this new post, let’s talk about the actual implementation of core principles of the event driven architecture. Topology The topology describes how the bus is implemented on the message broker. As…
Utilisateur Uh!ive
Utilisateur Uh!ive26 September 2022
An event driven architecture – Part 2 Tech

An event driven architecture – Part 2

In the previous post of this series, we explained why we ditched our old architecture based on synchronous REST services for a completely asynchronous event-driven architecture. Today, we address the core design…
Utilisateur Uh!ive
Utilisateur Uh!ive2 February 2022
An event driven architecture Tech

An event driven architecture

At Allo-Media, like many other businesses, our value chain looks like a pipeline: we collect conversations (mainly through phone) sent to us by our customers, we transcribe them, we tag the…
Utilisateur Uh!ive
Utilisateur Uh!ive17 February 2020
Elasticsearch Percolator use case for document classification Tech

Elasticsearch Percolator use case for document classification

Currently at Allo-Media, we use Elasticsearch in its general workflow which is to create an index and store documents holding our phone call audio transcripts metadata, and then allowing to…
Utilisateur Uh!ive
Utilisateur Uh!ive5 December 2019
  • 1
  • 2
  • Next

Solutions

Speech-to-Text

PRX™

Vocal Cookie™

Resources

Websocket Documentation

MRCP Documentation

Blog

Entreprise

Expertise

About Us

uh!live’s story

Legal Notices

Status
Démo
Contact
  • x-twitter
  • facebook
  • linkedin
  • youtube
  • instagram

© 2025 uh!ive.

Close Menu
  • Solutions
  • Resources
    • Websocket Documentation
    • MRCP Documentation
  • Enterprise
    • Expertise
  • About Us
    • uh!ive’s Story
  • Blog
  • Status
  • Get a demo
  • EN
    • FR
  • twitter
  • x-twitter
  • facebook
  • linkedin
  • youtube
  • instagram
Gérer le consentement
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
L’accès ou le stockage technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
L’accès ou le stockage technique est nécessaire dans la finalité d’intérêt légitime de stocker des préférences qui ne sont pas demandées par l’abonné ou l’internaute.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
L’accès ou le stockage technique est nécessaire pour créer des profils d’internautes afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Voir les préférences
  • {title}
  • {title}
  • {title}