IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice ID

RSS Feed    Add to Google    Add to My Yahoo!
Voice IDWhite Papers (View All Report Types)
 
Dragon Medical Frees Up More Time To Care at Coquet Medical Practice
sponsored by Nuance
WHITE PAPER: What are the benefits of speech-recognition software in a healthcare setting? Coquet Medical Practice, treating 11,000 patients annually, answers questions on why they turned to the software to free up time to focus on patients, improve levels of care and service and save time by creating instant patient letters.
Posted: 27 Oct 2014 | Published: 31 Aug 2014

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008

Genesys

Addressing the Full Attack Continuum- A New Security Model For Before, During and After an Attack
sponsored by Cisco
WHITE PAPER: This important whitepaper will teach you how to develop a threat-centric security approach.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Cisco

Akamai's (State of the Internet) / Security
sponsored by Akamai Technologies
WHITE PAPER: The following white paper explores the explosion of DDoS attacks that took place Q3 2014 and examines the various methods used, potential ways to thwart future attacks, and much more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
sponsored by Schneider Electric
WHITE PAPER: In this white paper, you will uncover the three common pitfalls of deploying DCIM software and how to avoid them. DCIM automates and simplifies your data center, but misuse and carelessness do not provide the ROI your organization expects.
Posted: 14 Nov 2014 | Published: 01 Nov 2012

Schneider Electric

Edison: Streamline Data Protection with IBM Tivoli Storage Manager Operations Center
sponsored by IBM
WHITE PAPER: This resource describes a storage manager that has been an industry-standard data protection solution for two decades. It focuses on more than backup and restore.
Posted: 14 Nov 2014 | Published: 30 Jun 2013

IBM

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: This exclusive whitepaper offers up 10 tips for improving your incident response capabilities.
Posted: 14 Nov 2014 | Published: 14 Nov 2013

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement