facebook linkedin twitter

Computerware Blog

Can a Robot Win the Pulitzer Prize?

b2ap3_thumbnail_robots_writing_stories_400.jpgTo maximize your business' communicative abilities, you need to produce content. Content is found almost everywhere and it is an essential variable in every form of written communication. Innovators don’t miss out on the importance of content, and have developed content-writing software. Yet, this poses an important question: can a robot truly imitate prose written by a human?

According to Slate, many organizations, like The Associated Press, Edmunds, and Yahoo, have turned to automation processes for producing content. How can you tell that this article wasn’t written by a robot? Maybe you can, or maybe you can’t. Either way, the point remains that there are some things that robots can’t do, and writing, thinking, and acting like a human are a few of them.

At least, for the moment these statements are true. It’s fairly easy to tell when a robot has composed an article. Humans have the ability to think like humans, whereas computers don’t. They are limited to what is happening, not why it is happening. We, as thinking creatures, have the capacity and desire to understand why things happen and learn from them.

What does a computer have? A ton of computing power and the ability to display data quickly and efficiently; two entirely separate roles, almost to the point where it’s insulting to even compare the two. Until computers can think and act like human beings, they will not cross the metaphysical existence threshold into being.

The Benefits of RoboWriting
While a computer doesn’t have that deep emotional attachment to its work that many writers and journalists have for their writing, there are arguably some benefits that computers have over human writers. For one, the computer is most adept at running data and information. It can report cold, hard facts in a clear and concise manner. Computers are much faster than a human writer, and with the proper amount of work and input, they can shell out stories like it’s nobody’s business.

The overall cost of having a robot (a machine with software) write articles is that the cost margin is very close to zero after the initial cost of building and installing the software. You don’t have to worry about breaks, sick days, or other problems that could hamper a computer’s work attendance. A computer can write a story in no time at all, and then write another, and another. Computers aren’t meant to write complex, opinionated articles. They are good at writing the kinds of articles that humans dislike writing, and they suit this role marvelously.

Benefits of Human Journalists
What it basically comes down to is whether or not a computer can replicate the human mindset, which it can’t. As mentioned previously, a machine can’t feel the text that it is producing. It doesn’t have a personality, and it can’t connect with other humans on a fundamental level the way that a real human being can.

A machine can’t tell what a human wants to read. Only a real person can really know what is interesting or not. A droll, monotone article isn’t going to attract readers. What humans can offer is a bit of flair and excitement--something in the article that makes the reader want to read it.

A computer also doesn’t have the cognitive capabilities that a human does. It can’t make connections or understand context of a broader idea, nor can it call upon real-world, human thoughts and ideas that can connect the writer to their audience via shared experiences. Humans can be opinionated and share these thoughts with an appeal for responses, while computers have no such opinion or free-thinking to share.

Can Computers and Humans Coexist?
The two have their differences, but they can most certainly work together to achieve a greater good. Computers can be used for small briefs, while humans can add context and make connections in addition to adding a little bit of personality to the work.

Be sure to let us know in the comments what you think about robot writers, and whether you think this article was written by a computer or not!

Tip of the Week: How to Walk the Line between Boss...
Why Your Team Should Have A Basic Understanding of...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, December 03, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Network Security Microsoft Backup Productivity Business Email Managed Service Provider Hosted Solutions Productivity Saving Money IT Services Malware Efficiency Google Innovation Computer Small Business User Tips Collaboration IT Support VoIP Quick Tips Smartphones Data Backup IT Support Network Mobile Devices communications Business Continuity Data Recovery Microsoft Office Disaster Recovery Gadgets Android Cybersecurity Social Media Smartphone Phishing Upgrade Mobile Office Communication Server Virtualization Miscellaneous Windows Mobile Device Mobile Device Management Users Ransomware Passwords Holiday Vendor Management Managed IT Services Operating System Outsourced IT Internet of Things Windows 10 Apps Tech Term BDR Remote Monitoring Unified Threat Management Facebook BYOD Automation WiFi Analytics Managed IT services Mobile Computing Data Management Remote Computing Apple Windows 10 Training Browser Save Money Help Desk Artificial Intelligence History Cloud Computing Marketing The Internet of Things Managed Service Business Technology Firewall Covid-19 Health Alert Big data Encryption App Spam Bandwidth Office IT Consultant Office 365 Budget Two-factor Authentication Information Technology Going Green Gmail Printer Blockchain Government VPN Cybercrime Bring Your Own Device Managed IT Information Antivirus Access Control Content Filtering Maintenance Hard Drives Windows 7 Tech Support Virus Computers Saving Time Recovery Employer-Employee Relationship Retail Wireless Technology Search Cost Management Healthcare Windows 8 Outlook Networking Wi-Fi Remote Work Document Management Hiring/Firing Lithium-ion Battery Best Practice Conferencing Computing IBM Storage Data Loss Augmented Reality Travel Education Phone System Update Project Management Hacking iPhone Money It Management Customer Service Humor Data Security Proactive IT Wireless Computer Repair Running Cable Patch Management SaaS End of Support Customer Relationship Management Website File Sharing Law Enforcement Hard Drive PowerPoint Intranet Vendor Twitter Data Breach Compliance Solid State Drive Mobility Data storage Value Current Events Administration Password Flexibility Risk Management Hacker Laptop Save Time Avoiding Downtime Downtime Voice over Internet Protocol Legal Applications Regulations Sports Excel Employee/Employer Relationship DDoS Social Networking Disaster Hosted Solution Cooperation Remote Robot Monitoring Scam Securty Word Google Maps Management Social Engineering Cortana Digital Websites Vulnerabilities Black Market Net Neutrality Cryptocurrency Chrome Meetings Business Intelligence Software as a Service Digital Payment Business Growth Private Cloud Router Fax Server User Telephony Machine Learning Virtual Desktop Comparison Tablet Social Company Culture Telephone Systems Paperless Office How To Mouse Unified Communications Settings Documents Public Cloud Licensing Teamwork Heating/Cooling Cost Entertainment Downloads Managed Services Programming Statistics Managed IT Service Network Congestion Identity Theft Redundancy IT service Notifications Gaming Console Smart Devices Processor Streaming Media Evernote Virtual Reality Webcam Politics Text Messaging eWaste Multi-factor Authentication Automobile Telephone Virtual Assistant Video Conferencing Bluetooth Emails Co-managed IT Solutions Chromebook User Error Professional Services Computing Infrastructure Hack Start Menu Tech Terms Employees Google Docs How To Memory Processors Mobile Technology Inbound Marketing USB Integration Download Experience Monitors Presentation Lifestyle Uninterrupted Power Supply Cleaning Office Tips Computer Accessories Vulnerability Distribution Bitcoin Microchip Taxes Pain Points Specifications Safety Managed Services Provider YouTube Distributed Denial of Service Trending Data Protection Display Television SSID 2FA Micrsooft G Suite Digital Signature Microserver Telephone System Dark Web Managing IT Services Free Resource Employer Employee Relationship Mobile Security cache Drones Multi-Factor Security Archive Health IT Surveillance Hacks Physical Security Upselling Software License Trends WannaCry Skype Processing Telework Devices Time Management Freedom of Information IT Logistics Virtual Machines Banking Botnet Get More Done Fraud Tactics Corporate Profile Remote Workers Wasting Time Relocation Tablets Video Surveillance Point of Contact Assessment SharePoint Cyber security Sync Saving ZTime Turn Key Bookmark Virtual Private Network Permissions Language PDF Printer Server UTM Content Best Available Keyboard Legislation Error Tip of the week Development Employer/Employee Relationships CCTV Trojan IT Plan Enterprise Resource Planning Google Calendar Google Play FinTech Telephone Service Organize Accountants A.I. Touchscreen News Microsoft 365 switches Writing Business Metrics Computer Malfunction Harddrive Domains email scam Addiction VoIP Data Storage Managing Costs Music Reliable Computing Debate Consultation Analytic Medical IT Reviews Trend Micro Upgrades In Internet of Things Public Speaking Recycling Knowledge Browsers Procurement GPS External Harddrive Shortcut Wireless Headphones User Tip Proactive Maintenance LiFi Migration Connected Devices Product Reviews Technology Tips Security Cameras Organization Threats Entrepreneur Equifax Fleet Tracking Read Fake News Communitications Motion Sickness Troubleshooting Network Management Audit Navigation PCI DSS Virtual Machine Scalability Device security MSP Data Warehousing eCommerce Deep Learning Thin CLient HIPAA Data Analysis Supply Chain Management Work/Life Balance Messenger Tracking 3D Ebay Environment Webinar Smart Phones Competition Nanotechnology Social Network Device Management Emergency Printers Hard Drive Disposal Internet Service Provider SQL Server Visible Light Communication Rental Service Electronic Payment Desktop Finance Access GDPR AI Managing Risk Cabling Startup Asset Tracking Content Management Microsoft Excel IT Assessment IT consulting Web Server Business Owner Business Cards Service Level Agreement Business Managemenet Computer Care Tech Regulations Compliance Hypervisor Username Google Drive Windows Server 2008 Holidays Administrator Leadership IP Address Unified Threat Management Backup and Disaster Recovery Fileless Malware Remote Working Hybrid Cloud Books Workers Adminstration Pirating Information Supply Chains Strategy CIO Application Screen Reader Customer Resource management online Currency Proxy Server Azure Advertising Flash Supercomputer Human Resources Gamification Spyware Mobile Payment Modem Worker Smart Tech Electronic Medical Records Electronic Health Records Transportation Windows XP Best Practives Piracy Upload Electricity Printing Term Financial Data Staffing Google Wallet HTML Memes Recording Optimization Displays Fiber-Optic Database LinkedIn Directions Society Reading Samsung Managing Stress Regulation Personal Information CrashOverride Financial Capital 3D Printing Productuvuty

toner1