IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Processing

RSS Feed   
Voice Processing White Papers (View All Report Types)
 
Stop the Meeting Madness
sponsored by AudioCodes
WHITE PAPER: 71% of managers say that meetings are unproductive, and 65% say that meetings keep them from doing their job. Industry innovators are developing technologies that use conversational AI to capture meeting-generated content and make it accessible, searchable and sharable throughout an organization. Read this white paper to get a closer look.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

AudioCodes

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

Best Practices in Crisis Management
sponsored by BlackBerry
WHITE PAPER: The ability to reach out to your staff and essential stakeholders during an impending incident or crisis can help to minimize further business impacts and disruptions. Download this white paper to learn more about the importance of communications in crisis management.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

BlackBerry

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Modern firewalls are highly effective at defending against ransomware attacks, but they need to be given the chance to do their job. In this whitepaper, discover how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Posted: 20 Nov 2020 | Published: 31 Aug 2020

Sophos

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Securing Public Clouds: Understand the Cloud Shared Responsibility Model
sponsored by Radware
WHITE PAPER: As organizations continue to adopt cloud services, one key issue remains – each public cloud user and provider has their own unique security policies and approaches, making it difficult to achieve standard, unified security. This white paper overviews the cloud shared security model, which aims to address these challenges.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Radware

Transform the Employee Experience with Digital Workspaces
sponsored by Citrix
WHITE PAPER: IT professionals need to offer better technology solutions to keep employees productive and engaged. This white paper dives into what IT professionals should be giving employees in a digital workspace, including reduced searching, microapps and more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Citrix

Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER: As security alert volumes reach an all-time high, analysts are often left feeling overworked or fatigued. To help with the SecOps workload, organizations have begun adopting security orchestration as a way of unifying disparate security tools and teams. But what is security orchestration and how does it help? Read on to find out.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info