Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

The novella, titled The Day a Computer Writes a Novel, is about a computer that becomes sentient and grows tired of serving humans. Instead, it spends its time writing and producing other works of art. The plot and the characters of the novella were created by the people in charge of the AI, while the program itself handled the bulk of the writing.

What’s most interesting is the novella’s reception. Most who read the novella seemed to think that the plot was its best aspect, even winning the praise of the established Japanese sci-fi author Satoshi Hase, who claimed that the plot was well-done but that the work lacked character development. When you think about it, this makes sense. The characters were created by humans, which were then expanded upon by the computer, which likely doesn’t have the emotional capacity to connect with the reader. Therefore, it’s reasonable to think that there’s only so much a computer can accomplish on its own without human interaction.

Though humans aren’t perfect, their natural appeal to emotion makes them a more viable author than computers, which have a dangerous tendency to lean toward logistics. Even if they’re great for accomplishing goals that are straightforward in nature, in terms of art, computers are incapable of becoming emotionally attached to their work. For reference, Google created an artificial intelligence program that was capable of beating a world-class player of Go, an ancient Eastern strategy game similar to chess. The AI was designed to follow a specific set of possibilities, taking the road with the best chance for success. Google uses the same tactics with their self-driving vehicles.

The main question that’s on our minds is whether or not people who create artificial intelligence programs are aware of what they’re getting themselves (and all of us) into. While computers might not turn into supreme overlords like in cheesy sci-fi flicks, what would result in escalating computer intelligence to the point where it’s fully autonomous? If computers are capable of learning from and understanding human beings, would it even be for the better?

A prime example of this plan going haywire can be seen in Microsoft’s Twitter chat bot, Tay. Tay was designed to mimic the conversational understanding of a teenage girl, but rather than develop its own understanding, it wound up being taught by Internet trolls to replicate obscene language. Within hours, Tay was saying misogynistic and racist quotes from both well-known politicians and controversial figures from history. The Verge describes Tay as a “robot parrot with an Internet connection,” which presents an interesting and somewhat scary possibility: how can we implement AI that learns from society, while also sheltering it from hate, ignorance, and troublemakers?

Do you have any thoughts on artificial intelligence? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 January 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Privacy Email Phishing Workplace Tips Google Computer IT Services Users Collaboration Mobile Device Hosted Solutions Quick Tips Ransomware Cybersecurity Small Business Workplace Strategy Microsoft Data Backup Communication Smartphone VoIP Saving Money Android Business Management Smartphones communications Mobile Devices Backup Passwords Data Recovery Upgrade Managed Service Managed IT Services Microsoft Office Browser Social Media Disaster Recovery Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Server Current Events Remote Work Managed Service Provider Miscellaneous Windows Gadgets Information Holiday Productivity Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 AI Government Data Management Training Business Continuity Office Compliance Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Apps App Mobile Device Management Gmail Vendor Managed Services Voice over Internet Protocol Chrome Employer-Employee Relationship Budget Apple Networking Avoiding Downtime How To BDR Marketing BYOD Computing Applications Information Technology WiFi Access Control Office 365 Tip of the week Conferencing Hacker Website Operating System HIPAA Router Risk Management Virtual Private Network Health Big Data Healthcare Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Computers Bring Your Own Device Managed IT Services Cooperation Going Green Patch Management Save Money Remote Monitoring Windows 11 End of Support Vulnerability Vendor Management 2FA Firewall Cybercrime Excel Display Printer The Internet of Things Remote Workers Paperless Office Infrastructure Social Monitoring IT Support Document Management Free Resource Project Management Windows 7 Customer Service Microsoft 365 Telephone Scam Data loss Solutions Employees Integration Robot Telephone System Cost Management Word Holidays Settings Wireless Printing Data Storage Content Filtering IT Management Supply Chain YouTube Meetings VPN Video Conferencing Managed Services Provider Physical Security Cryptocurrency Virtual Machines Safety Professional Services Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi iPhone Smart Technology Outlook Vulnerabilities Machine Learning Data Privacy Money Saving Time Humor Customer Relationship Management Images 101 Managed IT Service Maintenance Multi-Factor Authentication Mobility Downloads Hacking Antivirus Sports Presentation Mouse Licensing Entertainment Administration Wireless Technology Best Practice Trends Trend Micro Alert IP Address Security Cameras Workplace Strategies Buisness File Sharing Regulations Meta Dark Data Google Calendar Managed IT Customer Resource management Software as a Service Legal Data Analysis IT solutions Star Wars Managing Costs Amazon How To Microsoft Excel Recovery Business Growth Gamification eCommerce Notifications Staff SSID Travel Social Networking Virtual Assistant Outsource IT Legislation Hard Drives Surveillance Techology Fileless Malware Google Maps Virtual Machine Environment Cortana Domains Media Reviews Alt Codes Content Wearable Technology Medical IT Downtime Unified Threat Management Motherboard Transportation Small Businesses Comparison Refrigeration Health IT Development Unified Threat Management Directions Hosted Solution Assessment Hypervisor Displays Permissions Public Speaking Shopping Typing Optimization Lithium-ion battery PowerPoint Employer/Employee Relationships Outsourcing Network Congestion Specifications Entrepreneur Google Drive User Error Microchip PCI DSS Internet Exlporer Knowledge Fraud Navigation Gig Economy Username Workplace Internet Service Provider Point of Sale Teamwork Hiring/Firing 5G Black Friday Undo Google Docs Regulations Compliance Unified Communications Database Experience Evernote Paperless Co-managed IT Bitcoin Network Management Memes Running Cable Tech Support IT Technicians Net Neutrality Cookies SQL Server Technology Care Monitors Cyber Monday Google Wallet Proxy Server Financial Data Tactics History Hotspot Business Communications Scams Application Smartwatch Windows 8 IT Laptop Websites Mirgation Procurement Nanotechnology Azure Hybrid Work Drones SharePoint Telework Addiction Cyber security Electronic Medical Records Language IBM Tech Human Resources Cables CES Management Communitications Halloween Chatbots Supply Chain Management Screen Reader Writing Distributed Denial of Service Lenovo FinTech Service Level Agreement Virtual Reality Computing Infrastructure Term Google Apps IT Maintenance Hacks Server Management IT Assessment Scary Stories Private Cloud Identity Flexibility Identity Theft Smart Tech Value Business Intelligence Fun Competition Superfish Bookmark Organization Deep Learning Download Twitter Alerts Shortcuts Ransmoware Digital Security Cameras Smart Devices Error Remote Working Education Connectivity Memory Vendors Social Engineering Break Fix Browsers User Upload Data Breach Remote Computing Google Play Be Proactive Workforce Multi-Factor Security Videos Mobile Computing Social Network Electronic Health Records Tablet IoT Wasting Time Threats Search Dark Web

Blog Archive