Can You Understand Me Now?
Voice technologies now in the labs mean the answer will be yes.
Computerworld - Every few years, researchers say that automated voice recognition technology has finally arrived, but it seems as though the reality never lives up to the hype.
For the past two decades, systems that enable touch-tone responses to automated voice prompts have been used by businesses for telephone-based routing and self-service. But today, a large number of businesses are investing in newer two-way interactive voice response (IVR) to move beyond the limitations of touch-tone.
Datamonitor PLC, a market research firm in New York, says the next five years will see widespread deployment of IVR across companies, and the applications of speech recognition will grow in complexity and sophistication.
In particular, says Datamonitor analyst Daniel Hong, "in the next five years, the market will witness several large voice-authentication deployments, primarily in the financial services market, because of the increasing need for security and a proliferation of PIN/password-reset applications."
One company that offers such an application today is Nuance Communications Inc. in Menlo Park, Calif. Here's how Nuance's system works: A caller spends a few moments "enrolling" his voice, creating a "voiceprint." Then, when calling the application at a later time, his voice is compared with the voiceprint on file. If there's a match, the caller is validated.
In the next five years, there will also be a tighter integration between speech engines and speech applications, which tend to be separate pieces of software today, says Jim Blake, a senior software engineer at San Diego-based LumenVox LLC.
That will improve the accuracy of speech engines by enabling them to get clues about users and applications when they are stumped, he says.
For example, if the speech engine in an airline reservation system recognizes the cities spoken by a user but not the flight numbers, it might ask the application for a list of possible flight numbers. "This is all done in one interaction," Blake says. "Typically, if one section of the audio isn't understood well, the caller must be reprompted for the missing information. But in our example, we are making the [speech recognizer] smarter by talking with the application."
Moreover, those applications will be able to handle a user's request in a more human way, says Peter Mahoney, vice president of ScanSoft Inc., a supplier of speech software in Burlington, Mass.
"Today, if you're talking to an automated system to make a flight reservation, you have to tell the system what it wants to hear in the way it wants to hear it," Mahoney says. The system will ask you where you're departing from, where you're going and the date
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...