Browse Definitions :
Definition

voice search

What is voice search?

Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field. The proliferation of smart phones and other small, Web-enabled mobile devices has spurred interest in voice search.

Applications of voice search include:

  • Making search engine queries.
  • Clarifying specifics of the request.
  • Requesting specific information, such as a stock quote or sports score.
  • Launching programs and selecting options.
  • Searching for content in audio or video files.
  • Voice dialing.

Although voice search is usually built as a software application, it can also be built as a service. Voice search applications such as Google Mobile App with Voice and Vlingo for iPhone rely on speech recognition programs. The free voice search service ChaCha, however, uses another approach. ChaCha employs human beings, called guides, to look up queries and provide search results. According to a July 2009 study by MSearchGroove, the accuracy of search results from ChaCha’s guides was much higher than those from either speech recognition program..

Learn More About IT:
> The Voice Search Conference website offers background information and news about voice search.
> RealWire has more information about how human-enabled voice search outperformed its algorithm-based counterpart.
> Kate Greene writes about voice search in 'How Google's Ear Hears,' on Technology Review.

This was last updated in July 2009
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

  • click fraud (pay-per-click fraud)

    Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close