Subhead Can Go Here
OTHER: More Than A Research Lab.
Solutions for Real World Impact.
Vencore Labs is bringing the following next generation products to market:
Automation is critical to cost effectively resolve data quality and transformation issues. Our Arroyo Data Transformation Tool automates the data extract, transform and load activities allowing visual exploration of data for pattern detection. Arroyo is a high performance tool which scales up to the most demanding transaction volumes involving terabytes of data and billions of records. It is able to read data sources in many formats including unstructured text documents to extract named entities, events and relationships and to sort, classify, compare, transform and store the data in various ways.
Arroyo maybe used for one-time data manipulation for systems migration projects and for continuous data manipulation with links to systems with incompatible data models. Arroyo addresses data quality challenges where rules and solutions differ from domain to domain, flexible resolution rules are essential and processing and cleaning varies with the nature of the data.
Phonetic Pronunciation Tool
Our researchers have been successfully improving speech accuracy for 30 years. In the fields of health care, call centers, credit verification, transaction processing, security, appointment reminders, smart phones and more, our Phonetic Pronunciation Package provides vendor-independent name pronunciations of the highest quality and accuracy. Representative client feedback includes:
- "Generated better pronunciations 3.4 times more often than our own." – Leading search-engine company
- "Retrievals rated 'excellent' for more than 92% of our listings." – Major wireless vendor
- "At least as good as pronunciations hand-created by our linguists." – Primary TTS vendor
Applications of the Phonetic Pronunciation Package tool include patient appointment and refill reminders, personalized outbound calling, credit contacts, automated directions, auto attendants, smart phone intelligent personal assistants, and more.
Organizations of all types require increasingly sophisticated, yet uncomplicated, tools to manage access to their information systems and applications. Our Information Systems Access and Authorization Center (ISAAC) provides a centralized, web-based, intuitive interface that streamlines the definition and maintenance of access and authorization requirements for any information system or application. ISAAC provides on demand reporting to assess and control system access to mitigate cyber risks, especially for insider threats. It also enables the use of custom or template-based access rules, supports multiple authentication options (e.g., PKI, and single and multi-factor), and uses automatic routing for exception handling. The ISAAC system works with most authentication methods in use today and integrates with commonly used authorization models that control authorization and related privileges.