Computer Program Passes Turing Test; Judged As Plausible 13-Year-Old Boy

Like a technological Pinocchio, a computer program called "Eugene Goostman" has convinced researchers that "he" is a real boy.

Ostensibly a 13-year-old boy from the Ukraine, the program was able to pass the Turing Test, which states that a computer could be considered to be "thinking" if it could fool 30 percent of researchers during a five-minute text conversation. First dictated in 1950 by computer pioneer Alan Turing, the test is considered the preeminent benchmark for computational philosophy and artificial intelligence. The Russian-made program, tested by the Royal Society in England, fooled 33 percent of its interrogators.

As reported by the Independent UK, in regards to his success Mr. Goostman stated, “I feel about beating the turing test in quite convenient way. Nothing original."

The success of the test brings about many questions, including many regarding the safety of computer users when dealing with possible cybercriminals. Fortunately the Goostman program has not evolved to a stage of teenage mischief...yet.

UPDATE:  The validity of this article has been proven wrong.  My apologies, that's what I get for trusting the corporate media and their wannabe-robot minds.


23 comments:

  1. 33% !? There are two outcomes; the enity taking the test is a human or it is an AI. Given that we would expect that flipping a coin would on average give the right answer 50% of the time! The only place I can find references to turing saying 30% is in articles about this same chatbot. Some of which date back to 2012: http://www.newscientist.com/blogs/onepercent/2012/06/bot-with-boyish-personality-wi.html This is a non-story being trotted out for at least the second time.

    ReplyDelete
    Replies
    1. This study may say more about random people's estimation of 13 year old boys than anything else. TechDirt also provides a critical perspective on the report:
      https://www.techdirt.com/articles/20140609/07284327524/no-supercomputer-did-not-pass-turing-test-first-time-everyone-should-know-better.shtml

      Delete
  2. My apologies for the inaccurate post. AdminX's attached article is wholly correct.

    ReplyDelete
  3. Incorporate a whitepaper or pamphlet about your specialty or business sector. BT Mail

    ReplyDelete
  4. The entire college admission process can be exhausting and nerve-racking but there are few things worse than writing the personal statement for college applications. See more computer science statement of purpose

    ReplyDelete
  5. If you are the kind of people who called "geeks", you should visit this blog for even more articles on the thematic of usinig various 'interesting' software.

    ReplyDelete
  6. You can just download Cocospy app to be able to hack snapchat for free.

    ReplyDelete
  7. Who has tried Spyic app which can hack Snapchat with no survey? This fact is hard to believe, as many other websites offers software to hack Snapchat, but we will need to do survey for them first.

    ReplyDelete
  8. This comment has been removed by the author.

    ReplyDelete
  9. Go visit this site to do Snapchat hack no survey: https://clickfree.com/phone-hack/snapchat-hack-no-survey/. Snapchat hacking is not that easy, but the explanation it gave is so good I am amazed by it. Certainly all what we need from the website to hack an account immediately.

    ReplyDelete
  10. If you want to learn on how to track a phone number, try this link. You will then able to find the location of the phone, regardless the ISP or many other difficulties. You will only need a phone number to do so. This will make it easier for many to implement.

    ReplyDelete
  11. I find it easy if you want to look for a guide on how to read someones WhatsApp messages without their phone: www.techtimes.com/articles/248554/20200402/how-to-read-someones-whatsapp-messages-without-their-phone.htm. One of my friend has tried it and happy on the outcome. So you do not need to worry about the trustworthy issues it could possess.

    ReplyDelete
  12. Tracking a cell phone is an easy task right now. By the help of an app anyone can do that? Would you like to know about this hack? Just follow the guide this will help you how to track a phone number more details at Spyine. All the best!

    ReplyDelete
  13. How many cell phone location tracker do you use? I don't think you need to use too many apps for this. Only one can fulfill your all requirements. I use Minspy this one helps me to track phone by number www.minspy.com/phone-tracker/how-to-track-a-phone-number/. This is much popular app I have ever used.

    ReplyDelete



  14. Wonderful information! I found amazing information on the blogs i suggest everyone to follow the links below to get download files from this website.



    https://apkfasak.com/fmwhatsapp-apk/
    https://apkfasak.com/gb-whatsapp-apk/

    ReplyDelete
  15. If you want to know how I managed to used an app to track a cell phone without them knowing, visit: http://neatspy.com/track/app-to-track-a-cell-phone-without-them-knowing/. It is no easy task but you can just read this guide where the explanation is so detailed, you can just follow the step by step guide and voila you will be good.

    ReplyDelete
  16. Just want to try to answer your question bro. You can just use this alternative guide if you need another guide on how to track an iPhone by number online 2020 updated as of here: http://medium.com/@paymentmaruf/how-to-track-an-iphone-by-number-online-2020-updated-626100c99af10. Let me know what you think. I am open to discussion.

    ReplyDelete
  17. There have been so many questions on this iPhone spy app: https://www.fonemonitor.co/iphone-spy-app.html. In case you are interested in knowing this topic in full detail, I recommend you to visit the website right now and start to learn about it from scratch.

    ReplyDelete
  18. 📁ARE YOU IN NEED OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE, RECOVERY OF LOST FUNDS, WEBSITE HACK...)
    High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know. This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
    If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
    Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    💰Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
    📲 Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
    💳Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
    🅱️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
    The company is large enough to provide comprehensive range of services such as.
    • Email hacks📲
    • Hacking of websites.📲
    • Uber free payment hacks.📲
    • website hack.📲
    Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    Contact:
    ✉️Email: clarksoncoleman(at)gmail • com.
    Theglobalkos(at)gmail •com.
    ©Global KOS™
    2030.•

    ReplyDelete
  19. I just want to let you know of my findings about iPhone spy app at FoneMonitor. This can be regarded as the best one right now which I can get a hand on this year. You might be thinking if there are better ones out there. There are not. You can just take my input in this case.

    ReplyDelete