Telephony Speech Recognition White Papers

(View All Report Types)
A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER: Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 28 Dec 2021 | Published: 04 Mar 2021

Illumio

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Is It True That the Hybrid Cloud Definition Has Been Lost in Translation?
sponsored by Dell EMC and IntelĀ®
WHITE PAPER: Not all IT pros are on the same page when it comes to the "true" definition of hybrid cloud. And unfortunately, the original definition has been lost in vendor marketing jargon. Download this guide to cut through the vendor jargon and discover the true definition of hybrid cloud, as our experts elaborate on the subject.
Posted: 07 Mar 2017 | Published: 06 Mar 2017

Dell EMC and IntelĀ®

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

The Power To Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: View this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo