facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IBM’s Supercomputer Watson: Jeopardy! Winner, Customer Service Rep., and Now, Tax Professional

IBM’s Supercomputer Watson: Jeopardy! Winner, Customer Service Rep., and Now, Tax Professional

Watson, IBM’s famous question-answering supercomputer, has held many jobs over the years. After dominating the competition on the quiz show Jeopardy! In 2011, Watson moved on to help companies like Macy’s and Geico answer customer questions and improve their mobile apps. More impressively, Watson has even helped doctors diagnose cancer. Now, Watson is tackling a new occupation: Tax Professional.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices Quick Tips User Tips Smartphones Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Android Network Social Media Mobile Office Virtualization Data Backup Collaboration Productivity Server Smartphone Mobile Device Management Communication Miscellaneous Data Recovery Ransomware Windows 10 Upgrade communications Tech Term IT Support Unified Threat Management Windows Passwords Holiday Facebook Remote Monitoring Operating System Apps Cybersecurity Managed IT services Mobile Computing BYOD Remote Computing Phishing Vendor Management Users BDR WiFi Automation Mobile Device Analytics Marketing Data Management Apple The Internet of Things Outsourced IT Firewall History Internet of Things Browser Alert Artificial Intelligence Save Money Managed IT Services App Encryption Big data IT Consultant Gmail Bandwidth Bring Your Own Device Office Antivirus Maintenance Printer Cloud Computing Office 365 Spam Health Content Filtering Going Green Training Saving Time Windows 8 Cybercrime Help Desk Managed IT Outlook Wireless Technology Windows 10 Search Cost Management Virus Tech Support Hiring/Firing Budget Best Practice Information Technology Hard Drives Lithium-ion Battery Two-factor Authentication Business Technology Blockchain IBM Computers VPN Travel Recovery Employer-Employee Relationship Update Hacking Healthcare Access Control Money Document Management Phone System Managed Service Law Enforcement Augmented Reality Website Government Twitter PowerPoint Intranet Compliance Education File Sharing Data storage Hard Drive Administration Information Mobility Risk Management Humor Networking Save Time Legal iPhone Regulations It Management Applications Running Cable Customer Service SaaS Proactive IT Social Networking Telephone Systems End of Support Current Events Patch Management Wireless Hosted Solution Data Loss Robot DDoS Customer Relationship Management Securty Scam Data Breach Solid State Drive Fax Server Word Digital Flexibility Project Management Google Maps Black Market Management Value Websites Password Cortana Cryptocurrency Laptop Social Engineering Business Intelligence Hacker Business Growth Avoiding Downtime Digital Payment Router Downtime Tablet User Paperless Office Comparison Data Security Sports Company Culture Computer Repair Excel Computing Machine Learning Social Disaster Distributed Denial of Service Documents Conferencing Heating/Cooling Programming Co-managed IT Entertainment Statistics User Error Network Congestion Storage IT service Public Cloud Cooperation Redundancy Gaming Console Identity Theft Monitoring Vendor Text Messaging Streaming Media Evernote Retail Webcam Bluetooth Lifestyle eWaste Virtual Reality Politics Automobile Google Docs Emails Net Neutrality Start Menu Tech Terms Mobile Technology Vulnerabilities Chromebook Chrome Experience Computing Infrastructure Hack Inbound Marketing Monitors Software as a Service Processors Cleaning USB How To Office Tips Uninterrupted Power Supply Download Presentation Computer Accessories Vulnerability Private Cloud YouTube Bitcoin Pain Points Data Protection Virtual Desktop Telephony Specifications Safety Unified Communications Settings Trending Microchip Taxes Mouse Skype WannaCry Downloads Fiber-Optic Database Digital Signature SSID Archive HTML Reading Samsung Upselling Dark Web Corporate Profile Teamwork G Suite Telephone System Video Surveillance Processing Time Management Freedom of Information Mobile Security Employer Employee Relationship Permissions Language Health IT Managed IT Service Point of Contact Webinar Assessment SharePoint Software License Hacks Trends Physical Security Saving ZTime Multi-Factor Security Cost Licensing Bookmark Google Calendar Fraud Banking Tactics Botnet switches Writing Tip of the week Devices Relocation PDF Tablets Music VoIP Best Available Sync Keyboard Upgrades Debate Google Play Touchscreen News UTM Content Harddrive GPS Processor Analytic Consultation IT Plan Notifications Enterprise Resource Planning CCTV Domains LiFi Recycling Knowledge Legislation Error Browsers Product Reviews Technology Tips email scam Business Metrics Addiction Computer Malfunction Public Speaking External Harddrive Medical IT Virtual Assistant Accountants Reliable Computing A.I. Audit In Internet of Things Shortcut Deep Learning Security Cameras Read Fake News Multi-factor Authentication Work/Life Balance User Tip Best Practives Telephone Entrepreneur 3D Ebay Navigation Data Warehousing Migration Connected Devices Troubleshooting Visible Light Communication Thin CLient Memory Wireless Headphones Data Analysis Access Network Management HIPAA Motion Sickness Smart Phones IT consulting Professional Services Device Management Microserver Emergency Hard Drive Disposal Equifax Scalability Fleet Tracking Environment Computer Care Competition GDPR Content Management Microsoft Excel Device security Messenger MSP Electronic Payment Tracking Business Managemenet Nanotechnology Social Network CIO Adminstration Pirating Information Tech Google Drive Windows Server 2008 Desktop Rental Service Finance Business Owner Meetings Advertising Leadership Flash Get More Done Fileless Malware Printer Server Spyware Mobile Payment Business Cards Service Level Agreement Web Server IP Address Windows XP Voice over Internet Protocol online Currency Turn Key Startup Asset Tracking Cabling Staffing Google Wallet Trojan Electricity Printing Unified Threat Management Wi-Fi Backup and Disaster Recovery Administrator Application Displays Modem Books Username Workers Human Resources Society Proxy Server Screen Reader Customer Resource management Micrsooft Term Organize Windows 7 Gamification Supercomputer Electronic Medical Records LinkedIn Drones Directions cache Television Piracy Upload Recording Smart Tech Distribution Worker Managing Stress CrashOverride Regulation Capital 3D Printing Productuvuty Printers

toner1