IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Processing

RSS Feed   
Voice Processing White Papers (View All Report Types)
 
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
WHITE PAPER: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

6 Steps to Successful Capacity Management
sponsored by BMC
WHITE PAPER: Inside this 12-page guide, uncover 6 IT infrastructure best practices that can help you smooth out capacity inconsistencies across your entire stack – including on-prem and cloud.
Posted: 17 May 2019 | Published: 17 May 2019

BMC

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

Emerging Trends with IT Monitoring Tools
sponsored by Zenoss, Inc.
WHITE PAPER: Read this brief interview with 451 Research senior analyst Nancy Gohring to learn her takes on the latest IT monitoring trends – including AI, IT tool consolidation, and more.
Posted: 26 Aug 2019 | Published: 26 Aug 2019

Zenoss, Inc.

Splunk IT Operations Predictions 2020
sponsored by Splunk
WHITE PAPER: Read through some of Splunk’s 2020 IT operations predictions – including increased AR/VR utilization, a renewed emphasis on UX design, AI integration, and more.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

PeerPaper Report: Top 10 Benefits of Switching to FlexPod
sponsored by NetApp
WHITE PAPER: Based on feedback from real users, this report explores the top 10 tangible benefits of investing in a converged infrastructure solution like FlexPod, versus a traditional infrastructure stack. Learn more here.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

NetApp
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info