Skip to main content

Jeopardy! IBM Challenge ends with a big win for Watson the AI

Image used with permission by copyright holder

After three hard-fought nights of trivia play, Jeopardy!‘s IBM Challenge has come to an end. It seemed to be almost a certainty at the end of round two that thinking computer Watson would wipe the floor with human competitors Ken Jennings and Brad Rutter, and it did just that last night.

The bloodbath really happened on Tuesday, the end of the two-day first round, when Watson emerged as the victor with more than double the winnings of its fleshsack competitors. Watson had $23,440 banked going into Final Jeopardy last night, a short distance from second-place contender Ken Jennings’ $18,200. Rutter meanwhile was left in in the dust, only grabbing $5,600 for himself.

Recommended Videos

In the end, Jennings accepted defeat with a smile and an ominous quip, bidding just $1,000 on the final question — assuring a win over former Million Dollar Challenge competitor Rutter –and writing below the bid, “I for one welcome our new computer overlords.” Ken, man… don’t encourage it!

The damage had already been done. Only a massive upswing for the humans in last night’s final round would have clinched a win. The final count for the three-day, two-round IBM Challenge puts Watson on top with $77,147, Jennings in the runner-up spot with $24,000 and Rutter not far behind with $21,600.

Have we seen the birth of Skynet this week, the first indication of a machine-dominated future to come? Probably not. We know for sure now that machines have faster reflexes than humans, that much is true. Watson’s key advantage over the three day tourney seemed to be its ability to ring in ahead of its competitors. We can also applaud IBM’s technical achievement. Sure, this whole tournament feels and in many ways is a product placement gimmick. It’s also a remarkable achievement in artificial intelligence development. A computer appeared on a quiz show and puzzled out mostly correct responses to clues with an unusual syntax (ie not framed as questions).

In unrelated news, a baby named John Connor was born in a small California hospital late yesterday…

Adam Rosenberg
Former Digital Trends Contributor
Previously, Adam worked in the games press as a freelance writer and critic for a range of outlets, including Digital Trends…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more