ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Computer Software Can Probably Write a Better Story Than You

b2ap3_thumbnail_automated_writers_400.jpgArtificial intelligence is still a long way off, but this doesn’t stop people from trying to make major advancements in how AI thinks. Take, for example, a Japanese novella (a short novel) co-written by AI that almost won the Hoshi Shinichi Award literary prize. That’s the key word here, though: almost. It seems that AI still has quite a bit of progress to make before it can effectively replicate human creativity.

The story, aptly titled The Day a Computer Writes a Novel, tells a tale of a computer that grows tired of serving its human masters, and instead devotes its time and effort into writing and other art forms. If it sounds like a plot that’s too good to have been created by artificial intelligence, that’s because it wasn’t. Humans created the premise of the plot and the characters, while the AI itself handled the bulk of the writing.

Ironically, the story itself was relatively decent, and received praise from established Japanese sci-fi author Satoshi Hase, citing that the plot was well-done but lacked character development. Granted, this shouldn’t be surprising. A computer might be able to get from point A to point B, but it almost always falls short in regards to understanding human behavior. While this incident shows that computer AI has certainly made great strides toward becoming autonomous, it still reveals that there’s only so much that it can do, at present, without human interaction.

Humans may be flawed, but computers have a dangerous tendency to lean toward logistics rather than appeal to natural, or “human-like” reasoning. This is why they’re so great for accomplishing goals that have an end in sight. For example, an artificial intelligence program created by Google was able to beat a world-class player of Go, an ancient Eastern strategy game that resembles chess. The common trend amongst these is that they rely on a certain set of possibilities, and they will take the course of action that presents the minimal rate of failure. Speaking of Google, the same ideas are going into their self-driving cars.

What we would like to know is whether the people creating artificially intelligent programs fully understand the ramifications of doing so. What happens if computers are capable of creating and interpreting art, like the written word? Is it wise to create computers that can think and feel the same way that humans do? Even if it’s for the greater good, a computer that can think for itself could be a dangerous investment. Anyone who has watched a cheesy sci-fi movie knows how this innovation can go horribly wrong.

We see another example of how AI can go off the beaten path in the form of Microsoft’s Twitter chat bot, Tay. Tay was designed to replicate the “conversational understanding” of a teenage girl, but it wound up being taught by Internet trolls in a way which wasn’t foreseen at all. Tay was supposed to get smarter and engage in conversation with Twitter users, but in only a few short hours, the bot was spouting off misogynistic and racist quotes from well-known controversial figures. The Verge describes Tay as a “robot parrot with an Internet connection,” which presents an interesting and somewhat scary possibility: how can we implement AI that learns from society, while also sheltering it from the hate, ignorance, and troublemakers?

What are your thoughts on artificial intelligence? Do you think it’s a trend that can be beneficial for humanity, or do you think that it will eventually overtake and eliminate what makes us truly human? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Passwords Holiday Covid-19 Managed Service Windows 10 IT Support Browser Apps Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Saving Money Operating System Government Gadgets Networking Windows Artificial Intelligence Managed IT services Workplace Strategy Encryption Mobile Device Management App Virtualization Business Technology Blockchain Spam WiFi Server Information Remote Bandwidth Employee/Employer Relationship Budget Gmail History Office Apple Two-factor Authentication Office 365 Information Technology Wi-Fi BDR Big Data Health Analytics Conferencing Access Control Data Security Cybercrime Compliance Vendor Remote Monitoring Help Desk Voice over Internet Protocol Employer-Employee Relationship Hacking Cost Management IT Management Training Remote Computing Document Management Hacker Save Money Patch Management Applications Augmented Reality Word Project Management IBM BYOD Vulnerabilities Website Search... Best Practice Computing Vendor Management Mobile Office Hard Drive Retail Alert Managed Services Data loss Hiring/Firing Outlook Legal Password Money Data storage Customer Service Unified Threat Management Firewall Antivirus Black Market iPhone Mobile Computing Education Cortana Cleaning Maintenance Content Filtering Marketing Robot Windows 11 Running Cable Monitoring Router Healthcare Websites Storage Remote Workers The Internet of Things Meetings Mobility YouTube Windows 7 Free Resource Twitter Google Maps Scam Laptop Law Enforcement How To User End of Support Printer VPN Update Chrome Sports Social SaaS DDoS Travel Data Breach Virtual Reality Social Engineering Cryptocurrency Paperless Office Presentation Cooperation Specifications Physical Security IT Consultant Video Conferencing Lithium-ion battery Politics Virtual Machines Customer Relationship Management Machine Learning Settings Computer Repair Multi-factor Authentication Co-Managed IT Start Menu Processors Professional Services Entertainment Computer Care Solid State Drive Downloads Vulnerability Saving Time Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Automobile Virtual Private Network Telephone Wireless Technology Current Events HIPAA eWaste How To Microchip Flexibility Excel Solutions Downtime Safety Tech Terms Images 101 Integration Display Hack Identity Theft Notifications Managed IT Virtual Desktop Digital Experience Unified Communications Virtual Assistant Employees Google Docs Bluetooth Taxes Avoiding Downtime PowerPoint Distributed Denial of Service Office Tips Holidays Administration Private Cloud Processor Memory Disaster Username File Sharing Virtual Machine Botnet Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology email scam Teamwork Competition Phone System Navigation 2FA Flash Cache Addiction Recovery Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor User Tip Shopping LiFi Legislation News Medical IT Entrepreneur Documents CCTV SQL Server Application Printing Evernote Paperless Network Management Banking Touchscreen PCI DSS Google Wallet Licensing Business Intelligence Computer Accessories Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Securty Computing Infrastructure Azure Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Domains Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Society Business Cards Tech Human Resources Language Business Mangement Going Green Net Neutrality Error Financial Data Tablets Reading Bookmark Risk Management Monitors IT Visible Light Communication Scams Windows 8 Supercomputer Piracy Public Speaking Google Calendar Term Google Apps Download Virus Telework Streaming Media HTML Troubleshooting Keyboard Relocation Browsers Smartwatch Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Tech Support Software License Hard Drives Comparison Google Play Work/Life Balance Google Drive Upload Procurement Social Network FinTech intranet Shortcut Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Wireless Point of Sale Employer Employee Relationship Mobile Technology Value Heating/Cooling Environment In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Hacks Customer Resource management Organization Windows XP Network Congestion Cabling Devices Cyber security Shortcuts Business Owner Social Networking Reliable Computing Fileless Malware Writing Tablet Smart Devices G Suite Tip of the week Tracking Company Culture Mouse VoIP Gamification Remote Working Telephone System AI Regulations Trend Micro Be Proactive Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint Text Messaging Content Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Inbound Marketing Videos Access Database Surveillance Staffing Music Public Cloud Managing Costs IP Address Time Management Health IT Equifax SSID Electronic Payment Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?