Microsoft Buys Into AI Speech Recognition

Microsoft is on an aggressive growth path and has agreed terms to buy Nuance Communications, an AI speech recognition company, for $19.7 billion, subject to regulators approval and Nuance's shareholders. 

The aim is to improve Microsoft’s cloud healthcare business and to expand Microsoft’s potential. "Nuance provides the AI layer at the healthcare point of delivery and is a pioneer in the real-world application of enterprise AI," said Microsoft CEO Satya Nadella.

Based near Boston, Nuance is prominent in the type of voice recognition technology that is currently being used by more than 55 per cent of physicians and 75 per cent radiologists in the US. "Together, with our partner ecosystem, we will put advanced AI solutions into the hands of professionals everywhere to drive better decision-making and create more meaningful connections, as we accelerate growth of Microsoft Cloud for Healthcare and Nuance."

Nuance's conversational AI tools are well-versed in specialised medical terms and can capture and document every word of a physician during their encounter with patients.

More than 77 per cent of the hospitals in the US use Nuance products including the Dragon Ambient eXperience, Dragon Medical One, and PowerScribe One. They all are SaaS offerings built on Microsoft Azure. Nuance's Dragon software, which uses deep learning to transcribe speech, can adapt to a particular user's voice to improve accuracy.

Microsoft is aiming to beat its competitors like Google and Amazon in the race to establish a strong position in AI  and the Nuance acquisition will be Microsoft's second largest under Nadella. In 2014, Microsoft acquired the Mojang AB, the owner of the Minecraft videogame, within months of Nadella becoming the chief of the company while two years later, the company spent $26.2 billion (£18.8 billion) to acquire professional network Linkedin Corp.   

Microsoft:      CBS:        Axios:     Computing:    

You Might Also Read: 

The Coronavirus Is Increasing Investments In AI:

 

« New Tool To Detect Microsoft 365 Compromises
US Sanctions Russia In Retaliation For Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

National Accreditation Agency of Ukraine (NAAU)

National Accreditation Agency of Ukraine (NAAU)

NAAU is the national accreditation body for Ukraine. The directory of members provides details of organisations offering certification services for ISO 27001.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.