Skip to content

Commit acdb791

Browse files
committed
Update: 03-02-2025
1 parent bba63e1 commit acdb791

File tree

4 files changed

+12
-11
lines changed

4 files changed

+12
-11
lines changed

.build.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
includes:
22
- https://github.ibm.com/cloud-docs/watson
33
- https://github.ibm.com/cloud-docs/overview
4-
- https://github.ibm.com/cloud-docs/account
4+
- https://github.ibm.com/cloud-docs/account
5+
- https://github.ibm.com/cloud-docs/vpc

data-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22

33
copyright:
4-
years: 2022, 2023
5-
lastupdated: "2023-02-23"
4+
years: 2022, 2025
5+
lastupdated: "2025-02-03"
66

77
subcollection: speech-to-text
88

@@ -39,7 +39,7 @@ The service provides security for all user data both in motion and at rest:
3939
- Transport Layer Security (TLS) 1.2 is used to secure data in transit.
4040
- Advanced Encryption Standard (AES)-256 with Secure Hash Algorithm (SHA)-256 is used to secure data at rest.
4141

42-
For more information about data security for cloud applications, see [Security architecture for cloud applications](https://www.ibm.com/topics/data-security){: external}.
42+
For more information about data security for cloud applications, see [Security architecture for cloud applications](https://www.ibm.com/think/topics/data-security){: external}.
4343

4444
## Information security
4545
{: #data-security-info-security}
@@ -79,7 +79,7 @@ The service's Plus and Premium pricing plans offer different levels of data sepa
7979
- Plus plans are multi-tenant solutions that provide logical separation of data by using common encryption keys.
8080
- Premium plans are single-tenant solutions that provide physical separation of data. Premium plans provide dedicated data storage accounts that use unique encryption keys.
8181

82-
Users of Premium plans can also integrate with {{site.data.keyword.keymanagementservicefull}} to create, import, and manage their encryption keys. This process is commonly referred to as *Bring your own keys* (BYOK). For more information about using {{site.data.keyword.keymanagementservicefull}}, see [Protecting sensitive information in your Watson service](/docs/speech-to-text?topic=speech-to-text-keyservice).
82+
Users of Premium plans can also integrate with {{site.data.keyword.keymanagementservicefull}} to create, import, and manage their encryption keys. This process is commonly referred to as *Bring your own keys* (BYOK). For more information about using {{site.data.keyword.keymanagementservicefull}}, see [Protecting sensitive information in your Watson service](/docs/speech-to-text?topic=speech-to-text-getting-started-keyservice).
8383

8484
## Network endpoints
8585
{: #data-security-network-endpoints}

release-notes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22

33
copyright:
4-
years: 2015, 2023
5-
lastupdated: "2024-09-26"
4+
years: 2015, 2025
5+
lastupdated: "2025-02-03"
66

77
keywords: speech to text release notes,speech to text for IBM cloud release notes
88

@@ -1179,7 +1179,7 @@ New network and data security features available
11791179
Users of Premium plans can create private network endpoints to connect to the {{site.data.keyword.speechtotextshort}} service over a private network. Connections to private network endpoints do not require public internet access. For more information, see [Public and private network endpoints](/docs/speech-to-text?topic=speech-to-text-public-private-endpoints).
11801180
- *Support for data encryption with customer-managed keys*
11811181

1182-
Users of new Premium and Dedicated instances can integrate {{site.data.keyword.keymanagementservicefull}} with the {{site.data.keyword.speechtotextshort}} service to encrypt your data and manage encryption keys. For more information, see [Protecting sensitive information in your Watson service](/docs/speech-to-text?topic=speech-to-text-keyservice).
1182+
Users of new Premium and Dedicated instances can integrate {{site.data.keyword.keymanagementservicefull}} with the {{site.data.keyword.speechtotextshort}} service to encrypt your data and manage encryption keys. For more information, see [Protecting sensitive information in your Watson service](/docs/speech-to-text?topic=speech-to-text-getting-started-keyservice).
11831183

11841184
## 10 December 2019
11851185
{: #speech-to-text-10december2019}

science.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22

33
copyright:
4-
years: 2015, 2020
5-
lastupdated: "2020-07-29"
4+
years: 2015, 2025
5+
lastupdated: "2025-02-03"
66

77
subcollection: speech-to-text
88

@@ -13,7 +13,7 @@ subcollection: speech-to-text
1313
# The science behind the service
1414
{: #science}
1515

16-
As [Pioneering Speech Recognition](https://www.ibm.com/ibm/history/ibm100/us/en/icons/speechreco/){: external} describes, {{site.data.keyword.IBM}} has been at the forefront of speech recognition research since the early 1960s. For example, [Bahl, Jelinek, and Mercer (1983)](/docs/speech-to-text?topic=speech-to-text-references#bahl1983) describes the basic mathematical approach to speech recognition that is employed in essentially all modern speech recognition systems. And [Jelinek (1985)](/docs/speech-to-text?topic=speech-to-text-references#jelinek1985) describes the creation of the first real-time large vocabulary speech recognition system for dictation. This paper also describes problems that are still unsolved research topics today.
16+
{{site.data.keyword.IBM}} has been at the forefront of speech recognition research since the early 1960s. For example, [Bahl, Jelinek, and Mercer (1983)](/docs/speech-to-text?topic=speech-to-text-references#bahl1983) describes the basic mathematical approach to speech recognition that is employed in essentially all modern speech recognition systems. And [Jelinek (1985)](/docs/speech-to-text?topic=speech-to-text-references#jelinek1985) describes the creation of the first real-time large vocabulary speech recognition system for dictation. This paper also describes problems that are still unsolved research topics today.
1717
{: shortdesc}
1818

1919
{{site.data.keyword.IBM_notm}} continues this rich tradition of research and development with the {{site.data.keyword.speechtotextfull}} service. {{site.data.keyword.IBM_notm}} has demonstrated industry-record speech recognition accuracy on the public benchmark data sets for Conversational Telephone Speech (CTS) ([Saon and others, 2017](/docs/speech-to-text?topic=speech-to-text-references#saon2017)) and Broadcast News (BN) transcription ([Thomas and others, 2019](/docs/speech-to-text?topic=speech-to-text-references#thomas2019)). {{site.data.keyword.IBM_notm}} leveraged neural networks for language modeling ([Kurata and others, 2017a](/docs/speech-to-text?topic=speech-to-text-references#kurata2017a), and [Kurata and others, 2017b](/docs/speech-to-text?topic=speech-to-text-references#kurata2017a)), in addition to demonstrating the effectiveness of acoustic modeling.

0 commit comments

Comments
 (0)