Saturday August 20th 2011@2:14pm ( searching for biometric voice recognition soft ware and voice/person identifier article from Capterra )




so after the person on the phone yesterday freaked when we discussed  conversations being recorded… it made me start thinking about  the voice recognition software  tha tmust be out there somewhere… soi googled to gain information … staples was listed as a compnay that had such software….. so i called an dspoke with a really nice lady rochelle id # 3770993893 I spoke with her at 1:32pm  and after explaining what I am looking for  she told me that her people will look for items and contact me… 

items that I found that would  be nice would :
1.  dragon naturally speaking II: premium wiht digital voice recorder
item 915933 model 8064901  $249.00

2.  Cyber Acoustice AC-648 Speech recognition neckbank stero headset and boom Mic. 
item326478 model AC-648  $29.99 

3.  Sony ICD-UX 200 Digital Voice reecorder /direct USB connection
Stores up to 535 hurs of voice quality audi in LP mode
item 856039 model ICDUC200

now if someone coudl create an affordable recorder + voice recognition softwared tha tcodl connect to your compter. no chords.. and be able to store upto the  535 hours of phone conversations… and be able to distinguish if anyone is using softward that alters a person’s voice…and can give an accurate caller id..    Thank would be almost exactly what I am looking for .. anyone know of such an item? 
please let me know…

Next I went on line and found a compnay  


Capterra_logo



Articles and Advice for Business Software Buyers







Twodots

Articles




Security in the Cloud



Share |
Written by Jody Vandergriff
April 19, 2011



When we talk about security in the cloud, what do we really mean? Are we referring to a friendly security officer keeping watch over the data? Or are we referring to protection against hackers on the web? Or is it security at the application-level, such as user accounts with unique passwords?


The answer to all three of these is a resounding “Yes!” Security can take on many forms and be implemented at different levels. All of these are important and absolutely necessary in order to protect your data. Let’s break down the various types of security in the cloud:



  • Physical Security – Physical security is the easiest to understand and probably the most self-explanatory. It refers to the security measures taken on-site to protect the actual data center. At the very least, these typically include security guards watching over the facility 24/7, building access restrictions, and video surveillance. The level and volume of these security measurements varies by location, but any reputable company will have more than enough security measures to keep your valuable data safe.
  • Network Security – Network security is a huge field that encompasses everything from intrusion monitoring to firewalls. For instance, firewall policies dictate which ports and services can be accessed from an external network. Firewalls keep unwanted intruders from penetrating your network and authorized network traffic in. However, firewalls alone cannot completely safeguard against viruses, hackers, and other types of undesirable access. A secure network includes sophisticated intrusion monitoring and detection systems that report violations and suspicious network activity in real time.
  • Application Security – Application security refers to policies implemented within the application to protect your data from unauthorized access. For example, the application’s login mechanism usually requires a unique username and password for each user. Passwords are obviously valuable, so secure applications protect them in multiple ways. On the back-end of the application, encryption methods protect against hacking attempts to retrieve passwords. On the front-end (user interface), password policies often include minimum length requirements or format restrictions and new-password requirements at regular intervals, such as every 90 days. Applications may also limit the amount of login attempts to further protect passwords from “guess” attempts. When a user logs in, the application may also assign data access permissions to appropriate levels. For instance, one user may have read only access while another user can delete data.

Outside of passwords, application security also entails protection against web vulnerability. An example of this lies in the encryption used to protect web forms against hacker intrusion. Many web browsers display when a site or a page is secure and encrypted (often with a padlock icon in the browser corner). In today’s internet, security is a critical component to the software development process and a secure application adds many layers of protection from the ground up.


When considering cloud vendors, don’t be afraid to bring up security – it’s your data, after all, and you deserve to feel confident in their security measures. A good vendor will be able to talk openly about their security measures and is happy to answer your questions.



Jody Vandergriff


Jody Vandergriff is Co-Founder at WebDAM Solutions a leader in digital asset management, offering a cloud-based platform for creative professionals to manage, share and distribute digital media. She brings 10 years experience in web user interface, data management, and software development. In her role as VP of Marketing and Sales at WebDAM Solutions, Jody enjoys working with professionals across diverse industries, providing new insights into the everyday struggles of media management. She is passionate about educating people on ways to make their jobs more efficient through digital asset management.


http://www.capterra.com/articles