ASR - Automatic Speech Recognition
The Automatic Speech Recognition (ASR) system, operates on cloud which could be the Speech-i's cloud, customer's cloud, and/or third-party cloud infrastructure. It handles transcriptions of audio sources (recording, direct audio, audio/video, etc.), can handle real-time (audio in streaming) or batch, with or without subtitling. Available in over 20 languages.
Features
- Real-time or batch Automatic Speech Recognition
- Digital recording and/or streaming with ASR
- Cloud based / on-premise / hybrid architecture
- Archiving indexing and search of AV files synchronised with text
- Live subtitling
- Open API's for full integration with exisiting systems
- Audio segmentation and transcriptions
- Workflow management of all the reporting activities
- Multilingual (including British English, US English, Italian, Spanish, French, German)
- Acoustic/Language models could be tuned according to customer needs.
Benefits
- Improve the efficiency in parliamentary and local authority reporting
- Simplify and automate the reporting workflow in Public Sector
- Time saving, increased productivity & employee satisfaction, cost reduction
- Customisable reporting process for any Public Administration
- Supporting different Language Models, Acoustic Models, accents
- Full indexing and search capabilities to retrieve contents
- Workforce automation and optimization of the resources
- Reduce the time to deliver for verbalisation of the meetings
- Inclusion and accessibility to the reporting activities
- Archiving and indexing solution for better access to content
Pricing
£0.00 to £2 a unit a minute
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 8 0 2 5 1 3 3 9 9 8 8 9 9 0
Contact
Speech-i Ltd.
Selena Gray
Telephone: +44 7383 477888
Email: s.gray@speech-i.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Recording devices, any software that needs real time or batch transcriptions of Audio/video file Speech to text. (i.e., call centres, voice chatbots, meeting services, lectures, training, media & broadcasting program transcriptions, etc.)
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- There are no specific constraints.
- System requirements
- Nothing specific
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLA can vary from real-time to deferred support, if real-time 24x7 extra cost could be applied. No additional cost for working days office hours. Ad-hoc SLA's are designed for each customer's needs.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
The assistance and technical support will be carried out by Speech-i employees, organised in shifts that will guarantee a 24x7 coverage, according to the SLA agreed with the final customer.
Support is delivered via phone, email, and on-site. The protocol is as follow:
The Helpdesk will open the ticket according to the following scheme:
• Telephone/email assistance - includes the set of anomalies and reports that can be resolved within the same call/email.
• First level assistance - includes the intervention of a technician at the headquarters and is related to ordinary maintenance.
• Second Level assistance - includes the intervention of a specialised technician on the open issue, which will intervene on site.
A priority is assigned according to the urgency and impact of the support case.
The urgency level is determined depending on how many functionalities are impacted
The impact level is determined depending on the number of impacted users.
The Client's staff can open a ticket directly through the trouble ticketing service or call the toll-free number or send an email. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide on-site and/or remote training online. We provide a full set of documentation. We are available for on-site consulting prior to the acquisition.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Website
- End-of-contract data extraction
- Via APIs all the data are downloaded in real-time or batch as they happen. If other architectures are agreed, we will define the most suitable method to return the data to the customer.
- End-of-contract process
- There are license terms expiration and all the access to the platform will be deactivated unless agreed differently with the customer. If customers have selected the archiving feature, additional costs could be expected.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- All APIs are documented at https://developer.speech-i.com/v1/ the users can upload an retrieve files through APIs
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The entire workflow management reporting system can be customised using the interface
Acoustic and Language Models are customisable in cooperation with the Speech-i's Linguistic Team.
User Interface (UI) can be customised
APIs can be customised
The entire process can be customised
Scaling
- Independence of resources
- Separated at a software level, we have a multiplatform dedicated service to handle load balancing and scalable infrastructure
Analytics
- Service usage metrics
- Yes
- Metrics types
- We have a specific file that stores metrics, about volumes, time stamping, and any other information related to the provided services .
- Reporting types
-
- API access
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Cedat85
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Via API's or FTP
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- SRT
- TXT
- WORD
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- JSON
- Audio Formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
- Power and Cooling Datacentre (PDC) 99,8%
- Datacentre and Backbone Network (SDC) 99,5%
- Internet Access (BI) 99%
The availability and operational continuity of the services will be guaranteed 24x24x7x7.
The architectures are redundant and scalable.
The Data Centre has conformity certifications in accordance with ISO/IEC 27001:2013, 27017:2015 and 27018:2014. The certifications are approved by independent third-party control entities.
Security is entrusted to specific enterprise firewalls, configured in Full Meshed High Availability mode, with fully redundant network architecture without any single point of failure (SPOF).
The redundant power supply, the dual UPSs in active-active configuration located in a separate room from the main data centre and the dedicated electrical generator guarantee full autonomy even in the event of long power outages.
To respond promptly in case of fire, two VESDA (Very Early Smoke Detection Alarm) systems are active, for smoke and dust detection.
The percentage of availability is calculated as follows: the total number of minutes in the contract year, minus the total number of minutes of service Inactivity in the contract year, divided by the total number of minutes in the contract year.
Availability Penalty
Less than 99,95% 10%
Less than 99,90% 25% - Approach to resilience
- It is available on request.
- Outage reporting
- Through email alerts and APIs
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Depends on the platform, every user has their own roles, so the system administrator define where users can access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- IMQ
- ISO/IEC 27001 accreditation date
- 19/04/2019
- What the ISO/IEC 27001 doesn’t cover
- The certification covers the full process managed by Automatic Speech Recognition
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Spanish National Security Scheme Certification (ENS)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Security is entrusted to specific enterprise firewalls, configured in Full Meshed High Availability mode, with fully redundant network architecture without any single point of failure (SPOF).
The redundant power supply, the dual UPSs in active-active configuration located in a separate room from the main data centre and the dedicated electrical generator guarantee full autonomy even in the event of long power outages.
To respond promptly in case of fire, two VESDA (Very Early Smoke Detection Alarm) systems are active, for smoke and dust detection.
The backbone is configured on redundant fibre optic connections and routing, certified on different devices to increase the resilience of the infrastructure, and is interconnected directly to CN RUPAR SPC.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Actually not defined, but customisable according to the specific project needs.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have a unique platform that collects every log (not all) and define which actions to take. Afterwards we classify the threat and create rules for mitigating that one.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We have a monitoring system that sends several alerts on services or hosts. Afterwards we fix the problem with different priority/SLA.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
A priority is assigned according to the urgency and impact.
Urgency: depending on losses of critical functionalities and how they impact the system.
High - Total/severe loss of business functionality, complete section/department affected potential major risk.
Medium - Partial loss of business functionality.
Low - Minor issue that does not impact business functionality.
Impact:
Impact level is determined depending on the number of users affected
High - Whole organisation, trust, site or multiple sites; single large/multiple business units impacted.
Medium - Group of users or one site affected.
Low - One user affected
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
1 EQUAL OPPORTUNITIES STATEMENT
Speech-i Limited is committed to promoting equal opportunities in employment. Any job applicants will receive equal treatment regardless of age, disability, gender reassignment, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation (Protected Characteristics).
2 ABOUT THIS POLICY
2.1 Our policy sets out our approach to equal opportunities and the avoidance of discrimination at work.
2.2 Managing Director is responsible for this policy and any necessary training on equal opportunities.
2.3 This policy does not form part of any employee's contract of employment and we may amend it at any time.
3 DISCRIMINATION
3.1 The following forms of discrimination are prohibited under this policy and are unlawful:
3.1.1 Direct discrimination
3.1.2 Indirect discrimination
3.1.3 Harassment
3.1.4 Victimisation
3.1.5 Disability discrimination
4 RECRUITMENT AND SELECTION
4.1 Recruitment and promotion will be conducted on the basis of merit, against objective criteria.
4.2 Vacancies generally advertised to a diverse section of the labour market, avoiding stereotyping or using wording that may discourage particular groups from applying.
5 DISABILITIES
If you are disabled or become disabled, we encourage you to tell us about your condition so that we can consider what reasonable adjustments or support may be appropriate.
6 PART-TIME AND FIXED-TERM WORK
Part-time and fixed-term employees should be treated the same as comparable full-time or permanent employees.
7 BREACHES OF THIS POLICY
7.1 We take a strict approach to breaches of this policy, which will be dealt with in accordance with our Disciplinary Procedure.
7.2 Employees that suffered discrimination can raise the matter through our Grievance Procedure or Anti-harassment and Bullying Policy.
7.3 Making a false allegation deliberately and in bad faith will be treated as misconduct and dealt with under our Disciplinary Procedure. - Wellbeing
-
Wellbeing
We are committed to protecting the health, safety and wellbeing of our staff. We recognise the importance of identifying and tackling the causes of work-related stress, and personal stress, while unrelated to the workplace, can adversely affect the wellbeing of staff at work. Our policy sets out the measures we have in place to support the mental wellbeing of all our staff. This policy applies to all employees, officers, consultants, self-employed contractors, casual workers, agency workers, volunteers, and interns. We have a legal duty to take reasonable care to ensure that your health is not put at risk by excessive pressures or demands arising from the way work is organised. This policy takes account of our obligations under the Health and Safety at Work etc Act 1974, Management of Health and Safety at Work Regulations 1999, Employment Rights Act 1996, Protection from Harassment Act 1997, Working Time Regulations 1998 and Equality Act 2010. We recognise that individuals react to similar situations in different ways and that what triggers stress and poor mental health varies from person to person. Our company promotes a culture of open communication by providing both formal and informal channels through which staff can raise concerns. We take account of stress and mental wellbeing when planning and allocating workloads.
Information about stress, mental health and mental wellbeing is highly sensitive. Every member of staff is responsible for observing the high level of confidentiality that is required when dealing with information about stress or mental health. Staff who report that they are suffering from work-related stress or mental ill health, who support a colleague in making such a report or who participate in any investigation connected with this policy in good faith will be protected from any form of intimidation or victimisation.
Pricing
- Price
- £0.00 to £2 a unit a minute
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Testing the ASR.
The entire testing platform is excluded from a free trial, but we work case by case