IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Processing

RSS Feed    Add to Google    Add to My Yahoo!
Speech Processing White Papers (View All Report Types)
 
A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

Increase End User Productivity and Reduce Operating Costs with a Social Collaboration Platform
sponsored by IBM
WHITE PAPER: In this Forrester brief, learn how a social collaboration platform can improve productivity by providing a unified location for content, reduce the burden on IT resources by bringing disparate resources together, provide anytime, anywhere access to information, and more.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

IBM

Transform and Simplify IT for Business Innovation
sponsored by Oracle, in association with Intel
WHITE PAPER: In this white paper, you will learn how to leverage current IT trends to increase efficiency, boost flexibility, lower costs, and keep up with agile new competitors. Read on to learn why innovation today requires a data-driven approach with the right IT system.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Oracle, in association with Intel

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and IntelĀ®

The Path to Self-Disruption: 9 Steps to Complete Your Digital Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, you will discover how to overcome the reality of self-disruption and plot out your IT's digital transformation in 9 steps. Read on to apply the following expert guidelines to your unique digital transition.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

Hewlett-Packard Enterprise

A Quantum Leap in Hyper-converged Infrastructure: The VCE VxRail Appliance
sponsored by Avnet Technology Solutions
WHITE PAPER: In this paper, discover how to create an automated, dynamic infrastructure that quickly adopts to business demands with the VCE hyper-converged infrastructure appliance. Read on to take advantage of a full suite of industry-leading data services, including replication, backup, and cloud tiering.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

Avnet Technology Solutions

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Access this paper to view the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement