IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Recognition

RSS Feed    Add to Google    Add to My Yahoo!
Speech Recognition White Papers (View All Report Types)
A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013


Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014


The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008


Protecting the Distributed Enterprise: Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: The solution guide provides 5 key requirements that will collectively dictate the success of a distributed enterprise firewall deployment. It will elaborate on the details of each requirement and how it can be adopted to drive a cost-effective and reliable way to better protect your organization.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


The Right Mix: Developing the Right Hybrid IT Infrastructure
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to formulate the right hybrid IT infrastructure to meet the needs of your apps, services, and enterprise. Access now to learn the formula for achieving the optimal mix of traditional IT, private cloud, and public cloud services.
Posted: 26 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

Your Roadmap to IoT and Cybersecurity Trends
sponsored by Unisys
WHITE PAPER: See how security and privacy considerations of the internet of things can be addressed, how to form a strategy for public awareness of cybersecurity, and overall and formative cybersecurity trends. Learn the benefits and pitfalls of this ever changing landscape.
Posted: 12 Oct 2016 | Published: 16 Sep 2016


The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016


Enterprise Apps OWASP Mobile Security Risks Report
sponsored by Wandera
WHITE PAPER: This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.
Posted: 18 Oct 2016 | Published: 31 May 2016


The Virtual Firewall Buyer's Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Juniper Networks, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement