Machine Translation Errors

Machine translation (MT) is still a huge challenge for both IT developers and users. From the initiation of machine translation, problems at the semantic levels have been faced. Machine translation can be referred to as the process by which computer software is used to translate a text from one natural language (such as English/Afrikaans) to another (such as French/Swahili).

Today despite progress in the development of MT, its systems still fail to recognize which synonym; collocation or word meaning that should be used. Although mobile apps are very popular among users, errors in their translation output create misunderstandings.

A brief history about machine translation

The origins of machine translation can be traced back to the work of Al-Kindi, a 9th-century Arabic cryptographer who developed techniques for systematic language translation, including crypt-analysis, frequency analysis, and probability and statistics, which are used in modern machine translation. The idea of machine translation later appeared in the 17th century. The field of machine translation was founded with Warren Weaver’s Memorandum on Translation (1949). The first researcher in the field, Yehosha Bar-Hillel, began his research at MIT (1951). A Georgetown University MT research team followed (1951) with a public demonstration of its Georgetown-IBM experiment system in 1954. MT research programs popped up in Japan and Russia (1955), and the first MT conference was held in London (1956).(wikipedia)

Can Machine translations out-compete professional translators too!

Although computer/technology has stolen the spotlight from humans in many sectors, they aren’t a threat to professional translators. Here are the main reasons why.

Today, we all have access to an automatic translator, and it is also true that we are often tempted to use this tool. But only a couple of uses are enough to realize that these tools are not always effective. This is because they provide literal translations in their raw state, without taking into account cultural and contextual factors, which is essential to any professional translation. This is the main reason why automatic translations often make mistakes.

Some sample machine translation error instances

The type of document

machine translation errors

Firstly, translation tools are very general. The reason is simple: they’re supposed to be useful with any type of document. This is where the worst enemy of machine translation tools comes in: ambiguity. You will find below a small example that should make you smile, where the computer obviously unwanted translated “female jacket” in Brazilian PT and into Spanish languages.

Translation model

Another flaw of translation tools lies in the translation model. These tools compare numerous collections of texts and draw translation rules from them. Despite these rules, for each new translation, the professional translator is faced with new issues which only they alone can solve by making choices. These choices cannot be made by the software.

Machine translation errors

Some examples of machine translation errors:

Machine translation errors

Here’s another example of a machine translation error of a sentence in French that was automatically translated into English

Here, ambiguity has led to a computer error still. The verb “sauter” in French can be translated as to jump, or to skip in English, depending on the context. Unluckily for these far-from-perfect tools, the verb “sauter” was used incorrectly. It should have been used to mean “skip” in order to conserve the original meaning of the sentence.

In addition, in a medical or legal context, a bad translation could have serious consequences.

In conclusion

The results are disappointing, because even after almost 70 years of MT research and improvement, researchers still cannot offer a system that would be able to translate with at least 50% correctness.

Always be cautious of these types of tools. They can be useful in some cases, but their limits must never be overlooked. Our advice to you is to always opt for professional translation services.

How to escape Cyber attacks by 2020!

With the number of cyber-attacks increasing across the globe day by day, businesses are seeking for new ways to ensure the cyber safety of their organizations. One way to double-check that cyber-security is the best it can be; is to seek assistance from companies that specialize in safeguarding systems and data. Regardless of the size of your business, enlisting a cyber-security firm’s help could be your best defense against a potentially devastating system attack or data breach. How about Cyber security localization!

Businesses large and small are at risk. To counteract this threat, companies need to invest in more sophisticated verification technologies, including AI and machine learning algorithms, as well as staff trained to identify the tiny details. However, results can be for sure if these are all fully localized! Cyber security localization solutions can help you strengthen your business security with less incurred.

 

What’s the meaning of Cyber-security!

Cyber-security refers to the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories, namely:-

  • Network security which refers to the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
  • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to data it’s designed to protect. Successful security begins in the design stage, well before a program or device is deployed.
  • Information security protects the integrity and privacy of data, both in storage and in transit.
  • Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fans under this umbrella.
  • Disaster recovery and business community define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery polices dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.
  • End-user education addresses the most unpredictable cyber-security factor: People. Anyone can accidentally introduce a virus to an otherwise secure by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

Check out the common Cyber-security threats

Along with the increase in the number of cyber-security attacks that are occurring worldwide, the implementation of these attacks has become more sophisticated, meaning that businesses cannot simply count on standard software to ensure that they are protected. Some of the types of cyber-security threats that companies face include:

Phishing: Scammers will use social media or emails to persuade users to click on misleading links and give sensitive information, such as financial data.

Malware: By inadvertently downloading malware, users give access to their computer systems, which cyber-criminals can use as a basis to spy or initiate a virus.

Password theft: When cyber attackers are able to determine the password of a network, they can gain access to a grave amount of important and sensitive information.

Ransomware: With this type of malware, cyber-criminals can lock down a system and encrypt a device, rendering it unusable. To regain access, the user might have to pay a large sum of money to the attacker.

Distributed denial of service (DDoS): By flooding a server with requests from numerous sources, attackers cause the server to crash or slow down considerably.

Considering that half of these attacks are aimed at small businesses! Every company, regardless of their size, should have a localized approached to cyber-security.

Here’s an insight of how Cyber Security Localization can help

Since language and cultural barriers can prevent the user from recognizing a potential cyber-attack, multilingual training and localized products from cyber-security companies are critical to heading off cyber threats. Whether used by a large corporation or an individual, ensuring that the product is understandable to everyone is a vital step toward prevention. Here are some ways that cyber-security firms can ensure that their products and services are used to their full potential:

  • Provide product training in all regions that the company serves. This multilingual approach will give users the information they need without language barriers interfering.
  • Make certain that the users interface resonates with customers in their language. If someone doesn’t understand the symbols or text used to explain the product, then the user will not be able to prevent an impending attack. Understanding what a particular action entails is vital to using the cyber-security system properly.
  • Ensure that any region where the product is used has a localized website that provides important information and delivers the tools necessary for the product.
  • Offer localized instruction documents that include step by step descriptions of how to use the cyber-security product. With the help of localized brochures, user manuals, websites, and videos, employees in each region that your company is located will be able to participate in helping to protect your systems and data.
  • Work with a professional translation services company to make certain that the cyber-security product training and documentation is the best it can possibly be. Cyber-security companies provide a crucial service to their clients, so it is vital that the information is translated and localized properly. One mistake in the language or cultural nuances can make a huge difference for a client, as well as cause future customers not to have confidence in the product.

“2020 will be the year of 5G, bringing with it not only faster speeds and bandwidth capabilities to our mobile devices, but also making them highly coveted targets by DDoS attackers. While mobile devices have always been targeted by financial or personal data thieves, 5G’s increased bandwidth allows attackers to take control over a relatively small number of mobile handsets and unleash a tremendous amount of damage. A potential DDoS attack may be distributed via an innocent-looking app on the Play or App store and an attacker just needs a few hundred installs to create a massive outbreak”-Hagai Shapira, Research Team Lead, SAM

In the final analysis

With the above in mind, every company, especially those that handle sensitive customer information, should have a plan in place to prevent such attacks in each region it serves. Get in touch with a professional translation services company to help you with your Cyber Security Localization Solutions.