IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Automated Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Automated Speech Recognition White Papers (View All Report Types)
 
Using AI-Powered Interaction Analytics to Transform the Enterprise
sponsored by NICE Systems, Inc
WHITE PAPER: This article examines the business benefits of voice recognition and analysis. Learn 5 positive outcomes businesses can realize thanks to customer experience analytics powered by neural networks.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

NICE Systems, Inc

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

Building Effective Azure Active Directory Practices
sponsored by Quest
WHITE PAPER: In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Quest

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Build Your Own vs. Appliance – A Comparison of HCI Deployment
sponsored by StorMagic
WHITE PAPER: The best place to start the hyper-converged infrastructure buying processes is by clearly defining the goals you wish to achieve with your deployment. Explore this white paper to help outline these criteria. Then go through 6 things to consider before making the decision to build or buy.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

StorMagic

For CTO’s: The No-Nonsense Way to Accelerate Your Business with Containers
sponsored by Canonical
WHITE PAPER: Containers are improving data center efficiency and performance without having to make additional investments in hardware or infrastructure. This white paper explains the background and timeline to the development of containers, and the technology that has led to the proliferation of containers on the Linux platform.
Posted: 19 Oct 2017 | Published: 28 Feb 2017

Canonical

Modernizing IT Starts with Hyper-Converged
sponsored by Dell EMC and Intel®
WHITE PAPER: Go inside and learn how Dell EMC's VxRail Hyper-converged Appliance could be the right technology on which to base your virtual IT environment. Hear what real-world users had to say about this appliance's manageability, performance, reliability, and more.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Dell EMC and Intel®

Top Five Cloud Migration Mistakes
sponsored by Carbonite
WHITE PAPER: The bad news is that there are five common mistakes that cause cloud migration failures. The good news is that these can be avoided fairly easily, as long as you plan for them. Access this white paper for the list and how to account for them in your cloud migration strategy.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Carbonite
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement