Future Watch: A.I. comes of age
After decades of limited application, artificial intelligence is everywhere. And it really works this time.
Computerworld - "Stair, please fetch the stapler from the lab," says the man seated at a conference room table. The Stanford Artificial Intelligence Robot, standing nearby, replies in a nasal monotone, "I will get the stapler for you."
Stair pivots and wheels into the adjacent lab, avoiding a number of obstacles on the way. Its stereoscopic camera eyes swivel back and forth, taking in the contents of the room. It seems to think for a moment, then approaches a table for a closer look at an oblong metallic object. Its articulated arm reaches out, swivels here and there, and then gently picks up the stapler with long, rubber-clad fingers. It heads back to the conference room.
"Here is your stapler," says Stair, handing it to the man. "Have a nice day."
These are indeed nice days for artificial intelligence researchers. While Stair's performance might not seem much better than that of a dog fetching the newspaper, it's a technological tour de force unimaginable just a few years ago.
Indeed, Stair represents a new wave of AI, one that integrates learning, vision, navigation, manipulation, planning, reasoning, speech and natural-language processing. It also marks a transition of AI from narrow, carefully defined domains to real-world situations in which systems learn to deal with complex data and adapt to uncertainty.
AI has more or less followed the "hype cycle" popularized by Gartner Inc.: Technologies perk along in the shadows for a few years, then burst on the scene in a blaze of hype. Then they fall into disrepute when they fail to deliver on extravagant promises, until they eventually rise to a level of solid accomplishment and acceptance.
AI has its roots in the late 1950s but came to prominence in the "expert systems" of the 1980s. In those systems, experts -- chess champions, for example -- were interviewed, and their rules of logic were hard-coded in software: If Condition A occurs, then do X. But if Condition B occurs, then do Y. While they worked reasonably well for specialized tasks such as playing chess, they were "fragile," says Eric Horvitz, an AI researcher at Microsoft Research.
"They focused on capturing chunks of human knowledge, and then the idea was to assemble those chunks into reasoning systems that would have the expertise of people," Horvitz says. But they couldn't "scale," or adapt, to conditions that had not explicitly been anticipated by programmers.
Today, AI systems can perform useful work in "a very large and complex world," Horvitz says. "Because these small [software] agents don't have a complete representation of the world, they are uncertain about their actions. So they learn to understand the probabilities of various things happening, they learn the preferences [of users] and costs of outcomes and, perhaps most important, they are becoming self-aware."
These abilities derive from something called machine learning, which is at the heart of many modern AI applications. In essence, a programmer starts with a crude model of the problem he's trying to solve but builds in the ability for the software to adapt and improve with experience. Speech recognition software gets better as it learns the nuances of your voice, for example, and over time Amazon.com more accurately predicts your preferences as you shop online.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts