摘要:
A method and system to perform analysis, recovery or repair of devices attached to a remote computing system from a local computing system is presented. The remote computing system is initialized with an independent operating system that executes computer code, and interfaced, over a digital network, with a local computing system. This converts the remote computing system into an analysis, recovery and repair tool for the remote delivery of advanced technical services such as: network analysis, data recovery, digital forensics, software installation and operating system repair, data cloning, and malware remediation.
摘要:
Described is a speech-to-text conversion system and method that provides secure, real-time and high-accuracy conversion of general-quality speech into text. The system is designed to interface with external devices and services, providing a simple and convenient manner to transcribe audio that may be stored elsewhere such as a wireless phone's voice mail, or occurring between two or more parties such as a conference call. The first step in the system's process ensures secure and private transcription by separating an audio stream into many audio shreds, each of which has duration of only a few seconds and cannot reveal the context of the conversation. A workforce of geographically distributed transcription agents who transcribe the audio shreds is able to generate transcription in real time, with many agents working in parallel on a single conversation. No one agent (or group of agents) receives a sufficient number of audio shreds to reconstruct the context of any conversation. The use of human transcribers allows the system to overcome limitations typical of computer-based speech recognition and permits accurate transcription of general-quality speech even in acoustically hostile environments.
摘要:
Described is a speech-to-text conversion system and method that provides secure, real-time and high-accuracy conversion of general-quality speech into text. The system is designed to interface with external devices and services, providing a simple and convenient manner to transcribe audio that may be stored elsewhere such as a wireless phone's voice mail, or occurring between two or more parties such as a conference call. The first step in the system's process ensures secure and private transcription by separating an audio stream into many audio shreds, each of which has duration of only a few seconds and cannot reveal the context of the conversation. A workforce of geographically distributed transcription agents who transcribe the audio shreds is able to generate transcription in real time, with many agents working in parallel on a single conversation. No one agent (or group of agents) receives a sufficient number of audio shreds to reconstruct the context of any conversation. The use of human transcribers allows the system to overcome limitations typical of computer-based speech recognition and permits accurate transcription of general-quality speech even in acoustically hostile environments.
摘要:
A method, comprising the steps of receiving an audio stream, filtering the audio stream to separate identifiable words in the audio stream from unidentifiable words, creating a word text file for the identifiable words and storing the word text file in a database, the word text file including word indexing information. Creating audio segments from the audio stream, the audio segments including portions of the audio stream having unidentifiable words, creating audio shreds from the audio segments, the audio shreds including audio shred indexing information to identify each of the audio shreds and storing the audio shred indexing information in the database. Mixing the audio shreds with other audio shreds from other audio streams, delivering the audio shreds to a plurality of transcribers, transcribing each of the audio shreds into a corresponding audio shred text file, the audio shred text file including the audio shred indexing information corresponding to the audio shred from which the audio shred text file was created and reassembling the audio shred text files and the word text files into a conversation text file corresponding to the audio stream.
摘要:
Described is a speech-to-text conversion system and method that provides secure, real-time and high-accuracy conversion of general-quality speech into text. The system is designed to interface with external devices and services, providing a simple and convenient manner to transcribe audio that may be stored elsewhere such as a wireless phone's voice mail, or occurring between two or more parties such as a conference call. The first step in the system's process ensures secure and private transcription by separating an audio stream into many audio shreds, each of which has duration of only a few seconds and cannot reveal the context of the conversation. A workforce of geographically distributed transcription agents who transcribe the audio shreds is able to generate transcription in real time, with many agents working in parallel on a single conversation. No one agent (or group of agents) receives a sufficient number of audio shreds to reconstruct the context of any conversation. The use of human transcribers allows the system to overcome limitations typical of computer-based speech recognition and permits accurate transcription of general-quality speech even in acoustically hostile environments.
摘要:
A method and system for software deployment or maintenance where procedures for software installation or maintenance are defined by a skilled individual; site-specific or confidential information is separated from operating system native commands; parameterized commands referencing a hierarchy of variables are acquired by another individual; site-specific or confidential information of the other individual is combined with parameterized commands; new operating system native commands are generated; and, the new operating system native commands are execute on a computing system to reproduce the procedures for software installation or maintenance originally defined by the skilled individual.The software deployment or maintenance procedures originally defined by the skilled individual may be applied to any number of computing systems maintained by any number of other individuals without the skilled individual's further involvement in the process. The site-specific or confidential information belonging to the other individuals is not shared with the skilled individual.
摘要:
The system is designed to interface with external devices and services, to transcribe audio that may be stored elsewhere such as a wireless phone'voice mail, or occurring between two or more parties such as a conference call. An audio stream is separated into many audio shreds, each of which has duration of only a few seconds and cannot reveal the context of the conversation. A workforce of geographically distributed transcription agents who transcribe the audio shreds is able to generate transcription in real time, with many agents working in parallel on a single conversation. No one agent (or group of agents) receives a sufficient number of audio shreds to reconstruct the context of any conversation. The use of human transcribers allows the system to overcome limitations typical of computer-based speech recognition and permits accurate transcription of general-quality speech even in acoustically hostile environments.
摘要:
A method and system for software deployment or maintenance where procedures for software installation or maintenance are defined by a skilled individual; site-specific or confidential information is separated from operating system native commands; parameterized commands referencing a hierarchy of variables are acquired by another individual; site-specific or confidential information of the other individual is combined with parameterized commands; new operating system native commands are generated; and, the new operating system native commands are execute on a computing system to reproduce the procedures for software installation or maintenance originally defined by the skilled individual.The software deployment or maintenance procedures originally defined by the skilled individual may be applied to any number of computing systems maintained by any number of other individuals without the skilled individual's further involvement in the process. The site-specific or confidential information belonging to the other individuals is not shared with the skilled individual.
摘要:
A method and system for software deployment or maintenance where procedures for software installation or maintenance are defined by a skilled individual; site-specific or confidential information is separated from operating system native commands; parameterized commands referencing a hierarchy of variables are acquired by another individual; site-specific or confidential information of the other individual is combined with parameterized commands; new operating system native commands are generated; and, the new operating system native commands are execute on a computing system to reproduce the procedures for software installation or maintenance originally defined by the skilled individual.The software deployment or maintenance procedures originally defined by the skilled individual may be applied to any number of computing systems maintained by any number of other individuals without the skilled individual's further involvement in the process. The site-specific or confidential information belonging to the other individuals is not shared with the skilled individual.
摘要:
A method and system for software deployment or maintenance where procedures for software installation or maintenance are defined by a skilled individual; site-specific or confidential information is separated from operating system native commands; parameterized commands referencing a hierarchy of variables are acquired by another individual; site-specific or confidential information of the other individual is combined with parameterized commands; new operating system native commands are generated; and, the new operating system native commands are execute on a computing system to reproduce the procedures for software installation or maintenance originally defined by the skilled individual.The software deployment or maintenance procedures originally defined by the skilled individual may be applied to any number of computing systems maintained by any number of other individuals without the skilled individual's further involvement in the process. The site-specific or confidential information belonging to the other individuals is not shared with the skilled individual.