Access
The provisioning of telephone interpreting generally fits into two main categories:
- Automated: an Interactive Voice Response (IVR) application is employed to convert spoken or keyed Dual Tone Multi Frequency (DTMF) data into a request for connecting to an interpreter in a specific language (identified by unique language-codes). Companies such as CyraCom developed this voice recognition technology to save time for customers who may have the need for very fast (and sometimes a fully integrated) connections to an interpreting service. Previously, customers had to look up the three digit code for a language in order to access an interpreter.
- Operator-led: utilise customer-care staff to answer the call, gather the required information from the caller, and facilitate the connection to the interpreter. A service of this nature can be preferred by organisations such as emergency services, where the client's knowledge of language codes is absent.
Additionally, some of the companies that have the required capability will offer a hybrid of the two principles, where for example a customer can:
- Call in to the service
- Input their "account code" into a single-layer Interactive Voice Response (IVR) using the phone keypad
- Be connected to a call-centre agent who will already know who the caller is, and will facilitate other data capture relevant to the call (including the required language)
Read more about this topic: Telephone Interpreting
Famous quotes containing the word access:
“Knowledge in the form of an informational commodity indispensable to productive power is already, and will continue to be, a majorperhaps the majorstake in the worldwide competition for power. It is conceivable that the nation-states will one day fight for control of information, just as they battled in the past for control over territory, and afterwards for control over access to and exploitation of raw materials and cheap labor.”
—Jean François Lyotard (b. 1924)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)
“Power, in Cases world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldnt kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.”
—William Gibson (b. 1948)