IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice ID

RSS Feed    Add to Google    Add to My Yahoo!
Voice ID White Papers (View All Report Types)
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014


A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013


The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008


Antivirus and Antimalware Solutions for VARs
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based endpoint security as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015


Holistic Protection against Today's Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses how implementing a holistic threat protection technology can help you protect more of your network while spending less.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Empower More Productive Users with EMM and Enterprise Mobility
sponsored by VMware
WHITE PAPER: This white paper will review how current mobility trends (like the expansion of cloud architecture) are affecting EMM. Discover how cloud-enabled EMM can power the productivity of your users and IT, as well as 5 reasons to employ advanced EMM.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Special Report: The Cost of Failed Trust
sponsored by Venafi
WHITE PAPER: This Ponemon report uses recent cybersecurity data to reveal why cryptographic keys and digital certificates are less trustworthy than many organizations believe.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Five Ways To Ensure the Success of Your Digital Workspace
sponsored by Dell, Inc.
WHITE PAPER: In this Forrester report, you will learn 5 ways to guarantee superior user experience and ensure the success of your digital workspace. Read on now to access these 5 measures, as well as some takeaway advice about lowering IT costs while improving security and user experience.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

Dell, Inc.

3 Essential Components for a Strong End User Security Strategy
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.
Posted: 06 Oct 2015 | Published: 30 Nov 2014

Dell, Inc. and Intel®

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement