IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Biometrics

RSS Feed    Add to Google    Add to My Yahoo!
Voice Biometrics White Papers (View All Report Types)
A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013


The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008


Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014


7 Ways to Make Yourself Harder to Hack
sponsored by LogicNow
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016


Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016


Data Centers in the Crosshairs: Today's Most Dangerous Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

PCIO Special Report, "Enterprise Modernization"
sponsored by Pure Storage
WHITE PAPER: This research report examines how government agencies can modernize enterprise systems more quickly and will provide some examples of how it's being done. Most importantly, it will discuss best practices that show how iterative, agile IT development can take root and flourish in the public sector.
Posted: 20 Sep 2016 | Published: 01 Aug 2016

Pure Storage

Red Hat CloudForms Unifies and Improves Service Delivery and Management
sponsored by Red Hat
WHITE PAPER: As your infrastructure evolves toward an Infrastructure-as-a-Service model, you need a management platform that follows suit. Download this white paper to simplify hybrid IT management with a platform that evolves to handle all container, virtual, private, and public cloud infrastructures.
Posted: 12 Oct 2016 | Published: 30 Jun 2016

Red Hat

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement