IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Processing

RSS Feed   
Voice Processing Reports
 
The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

Presentation Transcript: Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
PRESENTATION TRANSCRIPT: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This transcript will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

West Interactive

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
WEBCAST: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 27 May 2010 | Premiered: Jun 8, 2010, 11:00 EDT (15:00 GMT)

West Interactive

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

Speech Recognition Allows for Better Patient Care
sponsored by Nuance
EGUIDE: This expert guide from SearchHealthITExchange.com examines the advantages of speech recognition and how it can aid the patients. Read on to find out more.
Posted: 13 Mar 2014 | Published: 13 Mar 2014

Nuance

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
WHITE PAPER: End-user-focused security education and training is a rapidly growing market that has experienced a nearly 40% growth from 2016 through 2017. As products within this market mature, each vendor seeks to differentiate its products and services in a variety of ways. This white paper compares the strengths and cautions of many important vendors.
Posted: 05 Dec 2018 | Published: 13 Nov 2018

MediaPRO

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement