IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Speech Recognition White Papers (View All Report Types)
 
The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

10 Ways to Reduce TCO with Converged Infrastructure Unified Management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore the top 10 methods for leveraging unified management platforms within converged infrastructures to lower TCO. Boost the agility of the IT department by reading this expert white paper, and learn how to accelerate app deployments and automate operations by unifying management of this infrastructure.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

Dell, Inc. and Intel®

Prevent Insider Threats with Behavioral Analytics
sponsored by Exabeam
WHITE PAPER: Not all threats exist outside your organization. Insider threats could be potentially worse if they go undetected—leaking critical information. So how do you distinguish an insider attack, and more importantly, how do you stop them? Find out in the following exclusive white paper.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Exabeam

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Read on to find out how such an approach has increased massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Discover in this white paper 5 reasons investing in highly manageable infrastructure will help IT support changing business needs while reducing TCO. Access now to examine the critical criteria to which IT architecture should meet, including the capabilities of automation, simplification, workload optimization, and more.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

Dell, Inc. and Intel®

The Benefits of Agentless Architecture
sponsored by Red Hat
WHITE PAPER: Discover in this white paper the top 12 benefits of implementing agentless IT architecture, utilizing an open source orchestration tool. Read on to learn to effectively manage systems by connecting to them over SSH, and employ a management tool that doesn't impose additional demands on your environment.
Posted: 11 Jul 2016 | Published: 31 Dec 2013

Red Hat

Powering Transformation: The IT Revolution is Now
sponsored by ServiceNow
WHITE PAPER: This white paper covers the important changes IT needs to make in order to keep up with tech savvy employees and emerging technology trends.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

ServiceNow

Cyber Risk Report 2016 Executive Summary
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.
Posted: 10 Jun 2016 | Published: 19 Feb 2016

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement