Feeds

Siri, what do you make of IBM's Cognea gobble? Oh, we can't print THAT

Big Blue plugs virtual-assistant upstart into celebrity supercomputer Watson

Intelligent flash storage arrays

IBM's Watson supercomputer team has acquired virtual-assistant maker Cognea.

We're told the upstart developer will slot into the “Watson Platform” to help sharpen the Jeopardy!-winning machine's chitchat with humanity.

Now that the celebrity super has won a gameshow, thanks to its banks of POWER7 processors and a copy of Wikipedia in 15TB of RAM, Big Blue is touting access to the beast – and it hopes to use Cognea's knowhow to lure in more developers.

“At IBM, we’re working on a host of technologies – a set of conversational services – aimed at enriching the relationship between you and the system,” wrote Michael Rhodin, senior veep at IBM Watson Group, yesterday. “These conversational services range from helping systems understand us as individuals to selecting the appropriate words and responses that are most meaningful to each of us.”

These "conversational services" will be available to programmers signing up to access a slice of Watson, we're told.

The supercomputer group was keen on Cognea as a first acquisition for the platform because its virtual assistants can adopt a personality to suit the situation: the software can act like a formal business stereotype, a friendly neighbour character, and so on, as required.

“We believe this focus on creating depth of personality, when combined with an understanding of the users’ personalities will create a new level of interaction that is far beyond today’s 'talking” smartphones',” Rhodin continued, letting slip a little stab at Apple's Siri and Microsoft's Cortana.

Big Blue is putting a lot of effort into turning Watson into a money-spinner, forming the Watson Group around it, and investing $1bn in R&D for the system. Having plonked the supercomputer into a "cloud", IBM is offering its DeepQA software to businesses such as DBS Bank, which is using the Watson platform to give better advice to wealthy customers. ®

Intelligent flash storage arrays

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.