Artificial Intelligence: Myths, Facts and Future

550x418-cochrane-mobile-intelligence.jpg

Computer scientists have been trying to creative smarter, more capable programs and, to an extent, robots, since the birth of the computer technology. It’s one thing to program something that takes cues from the operator and another to watch something operate on their own.

This was made possible through machine learning – programs were made such that they could take cues from the environment and “decide” what to do with them. This can manifest as computer adversaries in video games, robots walking on uneven land, cleaning robots knowing the layout of your apartment or predicting financial markets. This, however, is not true intelligence.

So what is true intelligence in this sense? Well, it’s somewhat ambiguous. Should artificial intelligence be as smart as an average human? Should it be smarter? Could it be as smart as a dog? Is “smart” even the right word here?

One of the key aspects of artificial intelligence, should it ever be created, is "formal" reasoning, or logic. The first programmable digital computer was based on the work of Alan Turing. His paper "Computing Machinery and Intelligence" published back in 1950, opens with the words:  “I propose to consider the question, ‘Can machines think?’ “ He expresses his views on then-emerging field:

We may hope that machines will eventually compete with men in all purely intellectual fields. But which are the best ones to start with? Even this is a difficult decision. Many people think that a very abstract activity, like the playing of chess, would be best. It can also be maintained that it is best to provide the machine with the best sense organs that money can buy, and then teach it to understand and speak English. This process could follow the normal teaching of a child.
Of course, at the time, all of this was just theory. But as far as the initial question goes, the author finds it difficult to precisely define the meaning of "thinking", at least in this situation.

He thus proposes a simple test, which would allow to determine whether a machine possesses intelligence or not – or appears to. He calls the test "imitation game" — it was only later dubbed the Turing test. Anyway, the "standard interpretation" of the Turing test is this: there are players A and B, one of which is a human, the other is a computer. Then there's the player C, the interrogator who doesn't see A and B and can communicate with them only through text. Player C asks player A and B questions, again, only in written form. Based on answers provided, eventually C has to make a choice, which one of the players A and B is a machine and which one is a human. There are different views on what actually a Turing test is, but however it may be, to this day no machine has passed any variation of the Turing test.

Not everyone wants machines to think, though. Elon Musk, engineer, inventor, business magnate, and generally one of the personalities the more tech-inclined people look up to, expressed his concern with artificial intelligence last year: I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it’s probably that. So we need to be very careful. I’m increasingly inclined to think that there should be some regulatory oversight, maybe at the national and international level, just to make sure that we don’t do something very foolish. With artificial intelligence we’re summoning the demon. You know those stories where there’s the guy with the pentagram, and the holy water, and he’s sure he can control the demon? It doesn’t work out.

This fear of artificial intelligence is understandable – if a robot can “reason”, there’s no telling what conclusions it will come to regarding humans. With ‘digital shackles’ it won’t be a true intelligence, and without them there’s simply no telling what it will be capable of doing.

Sputnik News

 

« The Robots Taking Your Job Could Get You Killed
Hacking Critical Infrastructure: How-To Guide »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

ITsMine

ITsMine

ITsMine’s Beyond DLP™? solution is a leading Data Loss Prevention (DLP) solution used by organizations to protect against internal and external threats automatically.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.