IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Spoken Language Understanding

RSS Feed    Add to Google    Add to My Yahoo!
Spoken Language UnderstandingWhite Papers (View All Report Types)
 
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC

Best Practices for Selling Best-of-Breed Solutions
sponsored by Webroot
WHITE PAPER: This white paper describes the many advantages to the best-of-breed approach to selecting technologies from multiple providers, and also offers a number of helpful suggestions for VARs to capitalize on this approach.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

4 Steps to Effective Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, learn about a new security event information management solution that enables faster event processing and real-time security information.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities ofĀ LogRhythm's automation suite for NERC CIP compliance, which helpsĀ organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement