IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Processing

RSS Feed    Add to Google    Add to My Yahoo!
Speech Processing White Papers (View All Report Types)
 
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Access this paper to view the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.
Posted: 25 Mar 2016 | Published: 25 Mar 2016

Dell SecureWorks

Time is Money and Downtime is Expensive: A Look at ITSM Best Practices
sponsored by IBM
WHITE PAPER: Discover in this white paper a proven 3-step initiative to bolster your ITSM technical support strategy to combat the costly issues of downtime. Read on to achieve optimal IT support and begin this initiative by learning how to develop a roadmap to define and prioritize transformative initiatives.
Posted: 10 Mar 2016 | Published: 31 Oct 2014

IBM

The Total Economic Impact Of CA Technologies Workload Automation
sponsored by CA Technologies
WHITE PAPER: In the following Forrester TEI white paper, learn about the actual economic impact of workload automation and see for yourself the potential value of this technology.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

CA Technologies

Transform and Simplify IT for Business Innovation
sponsored by Oracle, in association with Intel
WHITE PAPER: In this white paper, you will learn how to leverage current IT trends to increase efficiency, boost flexibility, lower costs, and keep up with agile new competitors. Read on to learn why innovation today requires a data-driven approach with the right IT system.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Oracle, in association with Intel

The Essential CIO's Guide to Data Center Outsourcing
sponsored by Windsor Group
WHITE PAPER: Dive into this exclusive CIO's guide to discover how to transform your IT operations by way of data center outsourcing. Learn how you can gain better efficiency, service, and disaster preparedness, as well as see why a quantifiable impact analysis is the first critical step to your IT transformation.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

Windsor Group

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement