Feeds

IBM answer machine makes chumps of trivia chimps

'Robots will keep us as pets'

Choosing a cloud hosting partner with confidence

If you've been watching the first two days of the Jeopardy! game show pitting two of humanity's trivia champs against IBM's Watson question-and-answer machine, you probably had a sinking feeling – mixed with a sense of awe.

All-time champ Ken Jennings put up a good fight, and Brad Rutter stole away a few questions, but the supercomputer took no prisoners in rounds three and four of the tournament. The pace was twice as fast on Wednesday, with less marketing speak on behalf of Big Blue, and they got quickly down to quizness.

Here's how the third round played out:

Watson Jeopardy Round Three Count

After a slow start, Jennings worked up some momentum and Rutter did his best to keep up. By the end of the round, Jennings had amassed $8,600, Watson only $4,800, and Rutter $2,400.

In round four, it was a slug-fest between Jennings and Watson. But as you can see below, it wasn't enough:

Watson Jeopardy Round Four Count

By the end of the fourth round, Jennings had $18,200, Watson had $23,440, and Rutter had $5,600.

The show closed out with the Final Jeopardy! clue: "An Account of the Principalities of Wallachia and Moldovia inspired this author's most famous novel."

Rutter, who was in third place, bet $5,600, everything he had, and wrote "Who is Bram Stoker?" That boosted him to $11,200 for the day and $21,600 for the three-day tourney. Jennings bet a mere $1,000, and his response was "Who is Stoker (I personally welcome our new computer overlords)?" That gave him $19,200 for the day and $24,000 for the week. Watson, ever the perplexing wagerer, bet $17,973 and responded, "Who is Bram Stoker?" That gave him $41,413 for the day and $77,147 for the entire Jeopardy! challenge.

As Oren Etzioni, director of the Turing Center at the University of Washington, put it in a report on National Public Radio on Monday ahead of the tournament: "Does that mean that it's Game Over for humans, that robots will keep us as pets?" Etzioni says no. We say: "Middle managers, get used to the dog food." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.