Man vs machine: AI, created by IBM, lost debate to a human
9 - 11 minutes
WASHINGTON: IBM conceded Tuesday its artificial intelligence-powered Project Debater lost a competition to a human debate champion but said the experience was an important milestone in efforts to get computers to master human language.
In the first live, public debate before a large, in-person and online audience, the declared winner was Harish Natarajan, who holds the record for most debate competition victories, IBM said in a blog post.
In the San Francisco debate on Monday, Project Debater and Natarajan were given 15 minutes to prepare for the debate on the merits of subsidising preschools. The IBM program argued for subsidies, calling it an important tool for helping the poorest members of society; Natarajan spoke against the idea, saying the subsidy fails to address the root causes of poverty and is a "politically motivated giveaway" to middle-class families. The winner of the event was determined by the debater's ability to change the minds of the audience. Before the debate, 79 percent of the audience agreed that preschools should be subsidised, while 13 percent disagreed. After the debate, 62 per cent of respondents agreed that preschools should be subsidised, while 30 percent disagreed, meaning Natarajan was able to persuade more people to change their minds. IBM Research director Dario Gil said the experience "is not about winning or losing" but about creating artificial intelligence "that can master the infinitely complex and rich world of human langauge." The debate marked a new challenge for artificial intelligence for IBM, whose Watson computer previously defeated a grand chessmaster and won the television trivia game Jeopardy. Ranit Aharanov, manger of the Project Debater team, said in a discussion after the debate that the goal is to help humans deal with complex decision. "It's not a question of whether AI is going to be better than humans," she said, but to help people filter and find key bits of information in large quantities of text. "It can debate both sides, so it can very quickly help you understand both sides of the problem, so you have a wider view of the problem and can make a better decision."
By Rajarshi BhattacharjeeDo you know some apps on your phone could be tracking your device usage with an ultrasonic beacon? Or that you can achieve digital immortality with a few clicks? Here are a few emerging technologies you shouldn’t miss.(Image: Getty)
At present, mobile computing is defined by our ability to move around with devices. The next is spatial computing, which will allow us to use space as a medium to interact with technology. Since space is the native medium of human interaction, spatial computing is easier to use and quicker to learn. It will make human-computer interaction more like our real-world interaction.
Personally identifiable information or PII, is any data that could potentially be used to identify a particular person. It is the first category of information that the General Data Protection Regulation (GDPR) in the EU protects. It covers information such as names and national identifiers like social security numbers (SSN) in the US and European identifiers such as driver’s licence numbers, etc. PII is among the most critical info targeted during data breaches and identity theft. Exposed PII can be sold on the dark web and used for identity theft, putting breach victims at risk.
Some apps in our smartphones can track us through ultrasonic tones. These tones can’t be picked up by the human ear, but the apps are always listening for them. The technology is called ultrasonic cross-device tracking and works by emitting high-frequency tones from ads, billboards, web pages and across retail outlets, etc. Apps with access to the phone’s microphone can pick up these tones and build a profile about your smartphone usage and, in some cases, even the websites you have visited.
It is not exactly a new term. In fact, it’s a field that’s more than 20 years old. Unlike traditional cryptology methods — encoding and decoding information or messages — quantum cryptology depends on physics, not mathematics. The encryption is encoded by a key, which is generated using photons. Since the method uses physics instead of math to create the key, there is little chance that it can be cracked using mathematics.