IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Processing

RSS Feed    Add to Google    Add to My Yahoo!
Voice Processing White Papers (View All Report Types)
A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013


Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014


The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service
sponsored by Genesys
WHITE PAPER: This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage.
Posted: 03 Jun 2008 | Published: 01 Apr 2008


2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016


Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

The Right Mix: Developing the Right Hybrid IT Infrastructure
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to formulate the right hybrid IT infrastructure to meet the needs of your apps, services, and enterprise. Access now to learn the formula for achieving the optimal mix of traditional IT, private cloud, and public cloud services.
Posted: 26 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

A New Approach to the Security Ecosystem
sponsored by Unisys
WHITE PAPER: Discover how micro-segmentation can firmly handle your enterprise's approach to security and connecting the disparate parts of your network. Learn how endpoint security, network protection, mobile devices, and more can all coexist effectively and safely in your organization's infrastructure.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016


Securing & Enabling the Mac-empowered Enterprise
sponsored by Code42
WHITE PAPER: This white paper explains how you can create a comprehensive security program for your business. Learn how to implement self-service restoration, total data visibility for your IT department, techniques for securely integrating Macs into your traditionally PC environment, and more.
Posted: 27 Sep 2016 | Published: 27 Sep 2016


The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement