IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Desktop Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Desktop Speech Recognition White Papers (View All Report Types)
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014


A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013


The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008


5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices, as well as how to apply them to cloud-based infrastructures and 5 considerations for securing hybrid clouds. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016


Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016


Unisys Managed Security Services Featuring LogRhythm
sponsored by Unisys
WHITE PAPER: Many enterprises find the task of sifting through their vast stores of logs in order to identify critical security events a daunting task. Learn about a simplified way to not only monitor your network logs for malicious activity, but implement a fully-fledged security monitoring policy covering the entire holistic attack surface.
Posted: 07 Oct 2016 | Published: 16 Jul 2016


Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016


10 Facts Every I&O Pro Should Know About Cloud Economics
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Are you making the most of your cloud investments? Discover in this Forrester report the core principles of strategic cloud use, and from it you will glean the 10 most important facts every I&O professional should know about cloud economics.
Posted: 27 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

The Current and Future States of Cybersecurity in the Digital Economy: Part 1
sponsored by Unisys
WHITE PAPER: In part 1 of this 3-part cybersecurity report, explore the vulnerabilities in ICS systems, as well as methods for assessing risk in your ICS cybersecurity plan – helping you combat costly and damaging attacks to critical ICS systems.
Posted: 11 Oct 2016 | Published: 16 Sep 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement