IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Technology

RSS Feed    Add to Google    Add to My Yahoo!
Speech Technology Reports
 
Presentation Transcript: Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
PRESENTATION TRANSCRIPT: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This transcript will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

West Interactive

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
WEBCAST: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 27 May 2010 | Premiered: Jun 8, 2010, 11:00 EDT (15:00 GMT)

West Interactive

Speech Recognition Allows for Better Patient Care
sponsored by Nuance
EGUIDE: This expert guide from SearchHealthITExchange.com examines the advantages of speech recognition and how it can aid the patients. Read on to find out more.
Posted: 13 Mar 2014 | Published: 13 Mar 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

How to Harden Your Servers In Elastic Infrastructures
sponsored by CloudPassage
WEBCAST: Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.
Posted: 19 Jul 2016 | Premiered: Jun 21, 2016

CloudPassage

Eliminating Constraints to SSL Implementation
sponsored by Blue Coat Systems
RESOURCE: In this resource you'll find a comprehensive and quick to digest info cache on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Inside you'll also find ways to increase its performance, scalability, and root out malicious activity using it as a cover.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement