IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Speech Synthesis

RSS Feed   
Speech Synthesis White Papers (View All Report Types)
 
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

3 Threat Vectors Addressed By Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

High-Velocity Cloud Security At Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

Vulnerability Management 2020
sponsored by TechTarget
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

TechTarget

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

IBM Gotchas Guide
sponsored by ClearEdge
WHITE PAPER: Complex contract language and licensing practices make increased costs and audit exposure nearly inevitable unless you understand the risks hidden in your IBM agreements. This easy-to-digest guide shares pitfalls that can lead to lost credits, best practices to mitigate price increases, and more.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ClearEdge

The Observability Pipeline Buyer’s Guide
sponsored by Cribl.io
WHITE PAPER: Download this guide to explore a checklist of key ideas to consider when looking at a observability pipeline, such as protocol support and management systems. Plus, alternative build strategies for implementing one in your organization.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Cribl.io

6 Myths of AIOps Debunked
sponsored by Splunk
WHITE PAPER: Like many hyped technologies, it’s hard to sift through all of the information to get at what’s really going on. What really is AIOps, and how can it be used to create tangible business value? Download 6 Myths of AIOps Debunked to tackle some of the most common myths and misconceptions regarding AIOps.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Splunk

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences