IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Speech Recognition White Papers (View All Report Types)
 
Using AI-Powered Interaction Analytics to Transform the Enterprise
sponsored by NICE Systems, Inc
WHITE PAPER: This article examines the business benefits of voice recognition and analysis. Learn 5 positive outcomes businesses can realize thanks to customer experience analytics powered by neural networks.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

NICE Systems, Inc

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

The Business Value of Red Hat CloudForms
sponsored by Red Hat
WHITE PAPER: This report highlights a vendor-agnostic platform for self-service provisioning and workload life-cycle management across hybrid multivendor virtualized, private cloud, public cloud, and container-based environments. Access now to deliver services and infrastructure resources with agility across the entire ecosystem, and more.
Posted: 30 Oct 2017 | Published: 30 Sep 2016

Red Hat

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Continuous Integration and Delivery with Ansible
sponsored by Red Hat
WHITE PAPER: If your team is struggling to enable continuous integration and continuous deployment (CI/CD), it may be time to consider implementing an IT automation engine. Read on here to learn about an open source automation engine that could help you enable CI/CD with zero downtime.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Red Hat

Building Effective Azure Active Directory Practices
sponsored by Quest
WHITE PAPER: In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Quest

Finding the Right SAM Model for Your Needs
sponsored by Snow Software
WHITE PAPER: Read this exclusive resource to explore the pros and cons of various Software Asset Management (SAM) delivery options, 8 SAM questions to consider when making your decision, and how to go about analyzing SAM models based on your organization's software requirements.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Snow Software

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement