Artificial Intelligence: Myths, Facts and Future

550x418-cochrane-mobile-intelligence.jpg

Computer scientists have been trying to creative smarter, more capable programs and, to an extent, robots, since the birth of the computer technology. It’s one thing to program something that takes cues from the operator and another to watch something operate on their own.

This was made possible through machine learning – programs were made such that they could take cues from the environment and “decide” what to do with them. This can manifest as computer adversaries in video games, robots walking on uneven land, cleaning robots knowing the layout of your apartment or predicting financial markets. This, however, is not true intelligence.

So what is true intelligence in this sense? Well, it’s somewhat ambiguous. Should artificial intelligence be as smart as an average human? Should it be smarter? Could it be as smart as a dog? Is “smart” even the right word here?

One of the key aspects of artificial intelligence, should it ever be created, is "formal" reasoning, or logic. The first programmable digital computer was based on the work of Alan Turing. His paper "Computing Machinery and Intelligence" published back in 1950, opens with the words:  “I propose to consider the question, ‘Can machines think?’ “ He expresses his views on then-emerging field:

We may hope that machines will eventually compete with men in all purely intellectual fields. But which are the best ones to start with? Even this is a difficult decision. Many people think that a very abstract activity, like the playing of chess, would be best. It can also be maintained that it is best to provide the machine with the best sense organs that money can buy, and then teach it to understand and speak English. This process could follow the normal teaching of a child.
Of course, at the time, all of this was just theory. But as far as the initial question goes, the author finds it difficult to precisely define the meaning of "thinking", at least in this situation.

He thus proposes a simple test, which would allow to determine whether a machine possesses intelligence or not – or appears to. He calls the test "imitation game" — it was only later dubbed the Turing test. Anyway, the "standard interpretation" of the Turing test is this: there are players A and B, one of which is a human, the other is a computer. Then there's the player C, the interrogator who doesn't see A and B and can communicate with them only through text. Player C asks player A and B questions, again, only in written form. Based on answers provided, eventually C has to make a choice, which one of the players A and B is a machine and which one is a human. There are different views on what actually a Turing test is, but however it may be, to this day no machine has passed any variation of the Turing test.

Not everyone wants machines to think, though. Elon Musk, engineer, inventor, business magnate, and generally one of the personalities the more tech-inclined people look up to, expressed his concern with artificial intelligence last year: I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it’s probably that. So we need to be very careful. I’m increasingly inclined to think that there should be some regulatory oversight, maybe at the national and international level, just to make sure that we don’t do something very foolish. With artificial intelligence we’re summoning the demon. You know those stories where there’s the guy with the pentagram, and the holy water, and he’s sure he can control the demon? It doesn’t work out.

This fear of artificial intelligence is understandable – if a robot can “reason”, there’s no telling what conclusions it will come to regarding humans. With ‘digital shackles’ it won’t be a true intelligence, and without them there’s simply no telling what it will be capable of doing.

Sputnik News

 

« The Robots Taking Your Job Could Get You Killed
Hacking Critical Infrastructure: How-To Guide »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.