IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Speech Recognition White Papers (View All Report Types)
 
Real-Time Voice Authentication at the Call Center
sponsored by NICE Systems, Inc
WHITE PAPER: Biometrics offers one of the best opportunities to improve security and the customer experience. Discover how your enterprise can reduce handle time by 25 to 45 seconds, save significantly in the call center, and more.
Posted: 23 Aug 2016 | Published: 31 May 2016

NICE Systems, Inc

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

Overview: Modern Data Center Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Learn how to address these challenges with comprehensive and dynamic security for data centers. Uncover key capabilities of comprehensive threat prevention.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

Check Point Software Technologies Ltd.

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Transform Data Risk Into Business Reward
sponsored by Blue Coat Systems
WHITE PAPER: Learn how, in the face of changing laws, unsecure cloud apps, and worrying cybercrime techniques, you can protect your data. Discover what must be done to remain compliant, secure, and maximize the benefits of the resources available to you.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Blue Coat Systems

Market Guide for Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.
Posted: 18 Nov 2016 | Published: 24 Oct 2016

BitGlass

Evolving Threats Call For Integrated Endpoint, Comprehensive Security Strategies
sponsored by Trend Micro
WHITE PAPER: IT departments have increasingly prioritized preventing, detecting, and controlling threats. Learn why your peers believe this interconnected threat mitigation structure is important, and how this sentiment is increasing across the enterprise.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement