Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

The novella, titled The Day a Computer Writes a Novel, is about a computer that becomes sentient and grows tired of serving humans. Instead, it spends its time writing and producing other works of art. The plot and the characters of the novella were created by the people in charge of the AI, while the program itself handled the bulk of the writing.

What’s most interesting is the novella’s reception. Most who read the novella seemed to think that the plot was its best aspect, even winning the praise of the established Japanese sci-fi author Satoshi Hase, who claimed that the plot was well-done but that the work lacked character development. When you think about it, this makes sense. The characters were created by humans, which were then expanded upon by the computer, which likely doesn’t have the emotional capacity to connect with the reader. Therefore, it’s reasonable to think that there’s only so much a computer can accomplish on its own without human interaction.

Though humans aren’t perfect, their natural appeal to emotion makes them a more viable author than computers, which have a dangerous tendency to lean toward logistics. Even if they’re great for accomplishing goals that are straightforward in nature, in terms of art, computers are incapable of becoming emotionally attached to their work. For reference, Google created an artificial intelligence program that was capable of beating a world-class player of Go, an ancient Eastern strategy game similar to chess. The AI was designed to follow a specific set of possibilities, taking the road with the best chance for success. Google uses the same tactics with their self-driving vehicles.

The main question that’s on our minds is whether or not people who create artificial intelligence programs are aware of what they’re getting themselves (and all of us) into. While computers might not turn into supreme overlords like in cheesy sci-fi flicks, what would result in escalating computer intelligence to the point where it’s fully autonomous? If computers are capable of learning from and understanding human beings, would it even be for the better?

A prime example of this plan going haywire can be seen in Microsoft’s Twitter chat bot, Tay. Tay was designed to mimic the conversational understanding of a teenage girl, but rather than develop its own understanding, it wound up being taught by Internet trolls to replicate obscene language. Within hours, Tay was saying misogynistic and racist quotes from both well-known politicians and controversial figures from history. The Verge describes Tay as a “robot parrot with an Internet connection,” which presents an interesting and somewhat scary possibility: how can we implement AI that learns from society, while also sheltering it from hate, ignorance, and troublemakers?

Do you have any thoughts on artificial intelligence? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 27 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Smartphone Data Backup Android Upgrade AI Business Management Smartphones VoIP Mobile Devices Data Recovery communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Automation Information Artificial Intelligence Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Employee/Employer Relationship Encryption IT Support Windows 10 Office Business Continuity Government Data Management Bandwidth Business Technology Virtualization Blockchain Wi-Fi Windows 10 Apps Data Security Vendor Mobile Office Two-factor Authentication Budget Tip of the week Apple Employer-Employee Relationship App Networking Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Chrome WiFi How To Hacker HIPAA BDR Computing Avoiding Downtime Applications Information Technology Marketing Office 365 Conferencing Access Control Storage Big Data Password Bring Your Own Device Retail Managed IT Services Computers Router Operating System Website Healthcare Risk Management 2FA Help Desk Virtual Private Network Analytics Office Tips Augmented Reality Health The Internet of Things Telephone Solutions Social Document Management Cooperation Scam Data loss Customer Service Going Green Cybercrime Patch Management Save Money Remote Workers Windows 11 Remote Monitoring Vulnerability End of Support Vendor Management Monitoring Physical Security Excel Firewall Free Resource Display Project Management Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Downloads Sports Machine Learning Licensing Mouse Data Privacy Employees Entertainment Integration Administration Maintenance Customer Relationship Management Antivirus Holidays Telephone System Cost Management Data Storage Hacking Settings Video Conferencing Presentation Printing Wireless Managed Services Provider Virtual Machines Professional Services Content Filtering Wireless Technology YouTube Robot Modem User Tip Processor Mobile Security Cryptocurrency iPhone Supply Chain Word IT Management Virtual Desktop VPN Meetings Vulnerabilities Smart Technology Data storage LiFi Saving Time Computer Repair Outlook Images 101 Mobility Safety Money Multi-Factor Authentication Managed IT Service Humor Hacks Scams Scary Stories Remote Working Download Websites Memory Alerts Google Play Hybrid Work Fun Data Breach Videos Browsers Electronic Health Records Connectivity Electronic Medical Records Break Fix Deep Learning Human Resources SharePoint Cables Upload Wasting Time Trend Micro Writing Security Cameras Multi-Factor Security Application Education Lenovo Social Network Software as a Service IoT Virtual Reality Dark Web Google Apps IBM Mobile Computing IT Maintenance Server Management Trends Private Cloud Managing Costs eCommerce Regulations SSID Google Calendar Business Intelligence Superfish Search Customer Resource management Identity Theft Data Analysis Surveillance Star Wars Twitter Virtual Assistant Microsoft Excel Best Practice Shortcuts Ransmoware Buisness Gamification Error Virtual Machine Staff Social Networking Social Engineering Medical IT Legislation Legal Vendors IT solutions Reviews Fileless Malware Development Remote Computing Transportation Competition Business Growth Be Proactive Workforce Content Hypervisor Wearable Technology Optimization Motherboard PowerPoint Comparison Threats Shopping Cortana Health IT Tablet Directions Assessment Alert Employer/Employee Relationships Permissions Alt Codes Workplace Strategies Navigation Meta User Downtime Managed IT PCI DSS File Sharing Dark Data How To Specifications Amazon Hosted Solution Gig Economy Microchip Internet Service Provider Internet Exlporer Notifications Teamwork Fraud Typing Evernote IP Address Outsource IT Regulations Compliance Username Travel Memes Black Friday Google Drive Environment Media Techology Knowledge Google Maps Net Neutrality Database SQL Server Small Businesses Recovery Financial Data 5G Unified Threat Management History IT Technicians IT Cookies Cyber Monday Google Docs Displays Hard Drives Unified Communications Unified Threat Management Smartwatch Experience Proxy Server Running Cable Procurement Tactics Azure Hotspot Domains Bitcoin Network Congestion Tech Google Wallet Outsourcing Telework Cyber security Mirgation Communitications Nanotechnology Refrigeration User Error CES Workplace Laptop Supply Chain Management Addiction Language Public Speaking Windows 8 Chatbots Term Lithium-ion battery Drones Hiring/Firing FinTech Management Point of Sale IT Assessment Screen Reader Distributed Denial of Service Paperless Entrepreneur Co-managed IT Halloween Network Management Flexibility Service Level Agreement Tech Support Value Computing Infrastructure Identity Monitors Technology Care Organization Bookmark Smart Devices Smart Tech Undo Business Communications Digital Security Cameras

Blog Archive