Artificial Intelligence: Myths, Facts and Future

550x418-cochrane-mobile-intelligence.jpg

Computer scientists have been trying to creative smarter, more capable programs and, to an extent, robots, since the birth of the computer technology. It’s one thing to program something that takes cues from the operator and another to watch something operate on their own.

This was made possible through machine learning – programs were made such that they could take cues from the environment and “decide” what to do with them. This can manifest as computer adversaries in video games, robots walking on uneven land, cleaning robots knowing the layout of your apartment or predicting financial markets. This, however, is not true intelligence.

So what is true intelligence in this sense? Well, it’s somewhat ambiguous. Should artificial intelligence be as smart as an average human? Should it be smarter? Could it be as smart as a dog? Is “smart” even the right word here?

One of the key aspects of artificial intelligence, should it ever be created, is "formal" reasoning, or logic. The first programmable digital computer was based on the work of Alan Turing. His paper "Computing Machinery and Intelligence" published back in 1950, opens with the words:  “I propose to consider the question, ‘Can machines think?’ “ He expresses his views on then-emerging field:

We may hope that machines will eventually compete with men in all purely intellectual fields. But which are the best ones to start with? Even this is a difficult decision. Many people think that a very abstract activity, like the playing of chess, would be best. It can also be maintained that it is best to provide the machine with the best sense organs that money can buy, and then teach it to understand and speak English. This process could follow the normal teaching of a child.
Of course, at the time, all of this was just theory. But as far as the initial question goes, the author finds it difficult to precisely define the meaning of "thinking", at least in this situation.

He thus proposes a simple test, which would allow to determine whether a machine possesses intelligence or not – or appears to. He calls the test "imitation game" — it was only later dubbed the Turing test. Anyway, the "standard interpretation" of the Turing test is this: there are players A and B, one of which is a human, the other is a computer. Then there's the player C, the interrogator who doesn't see A and B and can communicate with them only through text. Player C asks player A and B questions, again, only in written form. Based on answers provided, eventually C has to make a choice, which one of the players A and B is a machine and which one is a human. There are different views on what actually a Turing test is, but however it may be, to this day no machine has passed any variation of the Turing test.

Not everyone wants machines to think, though. Elon Musk, engineer, inventor, business magnate, and generally one of the personalities the more tech-inclined people look up to, expressed his concern with artificial intelligence last year: I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it’s probably that. So we need to be very careful. I’m increasingly inclined to think that there should be some regulatory oversight, maybe at the national and international level, just to make sure that we don’t do something very foolish. With artificial intelligence we’re summoning the demon. You know those stories where there’s the guy with the pentagram, and the holy water, and he’s sure he can control the demon? It doesn’t work out.

This fear of artificial intelligence is understandable – if a robot can “reason”, there’s no telling what conclusions it will come to regarding humans. With ‘digital shackles’ it won’t be a true intelligence, and without them there’s simply no telling what it will be capable of doing.

Sputnik News

 

« The Robots Taking Your Job Could Get You Killed
Hacking Critical Infrastructure: How-To Guide »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.