Return to Video

The rise of human-computer cooperation

  • 0:01 - 0:03
    I'd like to tell you about two games of chess.
  • 0:03 - 0:07
    The first happened in 1997, in which Garry Kasparov,
  • 0:07 - 0:11
    a human, lost to Deep Blue, a machine.
  • 0:11 - 0:13
    To many, this was the dawn of a new era,
  • 0:13 - 0:16
    one where man would be dominated by machine.
  • 0:16 - 0:19
    But here we are, 20 years on, and the greatest change
  • 0:19 - 0:22
    in how we relate to computers is the iPad,
  • 0:22 - 0:24
    not HAL.
  • 0:24 - 0:26
    The second game was a freestyle chess tournament
  • 0:26 - 0:29
    in 2005, in which man and machine could enter together
  • 0:29 - 0:34
    as partners, rather than adversaries, if they so chose.
  • 0:34 - 0:36
    At first, the results were predictable.
  • 0:36 - 0:38
    Even a supercomputer was beaten by a grandmaster
  • 0:38 - 0:41
    with a relatively weak laptop.
  • 0:41 - 0:44
    The surprise came at the end. Who won?
  • 0:44 - 0:46
    Not a grandmaster with a supercomputer,
  • 0:46 - 0:48
    but actually two American amateurs
  • 0:48 - 0:52
    using three relatively weak laptops.
  • 0:52 - 0:54
    Their ability to coach and manipulate their computers
  • 0:54 - 0:57
    to deeply explore specific positions
  • 0:57 - 0:59
    effectively counteracted the superior chess knowledge
  • 0:59 - 1:02
    of the grandmasters and the superior computational power
  • 1:02 - 1:04
    of other adversaries.
  • 1:04 - 1:07
    This is an astonishing result: average men,
  • 1:07 - 1:11
    average machines beating the best man, the best machine.
  • 1:11 - 1:14
    And anyways, isn't it supposed to be man versus machine?
  • 1:14 - 1:18
    Instead, it's about cooperation, and the right type of cooperation.
  • 1:18 - 1:21
    We've been paying a lot of attention to Marvin Minsky's
  • 1:21 - 1:24
    vision for artificial intelligence over the last 50 years.
  • 1:24 - 1:26
    It's a sexy vision, for sure. Many have embraced it.
  • 1:26 - 1:29
    It's become the dominant school of thought in computer science.
  • 1:29 - 1:32
    But as we enter the era of big data, of network systems,
  • 1:32 - 1:35
    of open platforms, and embedded technology,
  • 1:35 - 1:38
    I'd like to suggest it's time to reevaluate an alternative vision
  • 1:38 - 1:41
    that was actually developed around the same time.
  • 1:41 - 1:45
    I'm talking about J.C.R. Licklider's human-computer symbiosis,
  • 1:45 - 1:49
    perhaps better termed "intelligence augmentation," I.A.
  • 1:49 - 1:51
    Licklider was a computer science titan who had a profound
  • 1:51 - 1:54
    effect on the development of technology and the Internet.
  • 1:54 - 1:57
    His vision was to enable man and machine to cooperate
  • 1:57 - 2:01
    in making decisions, controlling complex situations
  • 2:01 - 2:02
    without the inflexible dependence
  • 2:02 - 2:05
    on predetermined programs.
  • 2:05 - 2:07
    Note that word "cooperate."
  • 2:07 - 2:10
    Licklider encourages us not to take a toaster
  • 2:10 - 2:12
    and make it Data from "Star Trek,"
  • 2:12 - 2:16
    but to take a human and make her more capable.
  • 2:16 - 2:18
    Humans are so amazing -- how we think,
  • 2:18 - 2:21
    our non-linear approaches, our creativity,
  • 2:21 - 2:23
    iterative hypotheses, all very difficult if possible at all
  • 2:23 - 2:24
    for computers to do.
  • 2:24 - 2:26
    Licklider intuitively realized this, contemplating humans
  • 2:26 - 2:29
    setting the goals, formulating the hypotheses,
  • 2:29 - 2:32
    determining the criteria, and performing the evaluation.
  • 2:32 - 2:34
    Of course, in other ways, humans are so limited.
  • 2:34 - 2:37
    We're terrible at scale, computation and volume.
  • 2:37 - 2:39
    We require high-end talent management
  • 2:39 - 2:41
    to keep the rock band together and playing.
  • 2:41 - 2:43
    Licklider foresaw computers doing all the routinizable work
  • 2:43 - 2:47
    that was required to prepare the way for insights and decision making.
  • 2:47 - 2:49
    Silently, without much fanfare,
  • 2:49 - 2:52
    this approach has been compiling victories beyond chess.
  • 2:52 - 2:55
    Protein folding, a topic that shares the incredible expansiveness of chess —
  • 2:55 - 2:59
    there are more ways of folding a protein than there are atoms in the universe.
  • 2:59 - 3:01
    This is a world-changing problem with huge implications
  • 3:01 - 3:03
    for our ability to understand and treat disease.
  • 3:03 - 3:07
    And for this task, supercomputer field brute force simply isn't enough.
  • 3:07 - 3:10
    Foldit, a game created by computer scientists,
  • 3:10 - 3:12
    illustrates the value of the approach.
  • 3:12 - 3:15
    Non-technical, non-biologist amateurs play a video game
  • 3:15 - 3:18
    in which they visually rearrange the structure of the protein,
  • 3:18 - 3:20
    allowing the computer to manage the atomic forces
  • 3:20 - 3:23
    and interactions and identify structural issues.
  • 3:23 - 3:26
    This approach beat supercomputers 50 percent of the time
  • 3:26 - 3:28
    and tied 30 percent of the time.
  • 3:28 - 3:32
    Foldit recently made a notable and major scientific discovery
  • 3:32 - 3:35
    by deciphering the structure of the Mason-Pfizer monkey virus.
  • 3:35 - 3:38
    A protease that had eluded determination for over 10 years
  • 3:38 - 3:40
    was solved was by three players in a matter of days,
  • 3:40 - 3:42
    perhaps the first major scientific advance
  • 3:42 - 3:45
    to come from playing a video game.
  • 3:45 - 3:47
    Last year, on the site of the Twin Towers,
  • 3:47 - 3:48
    the 9/11 memorial opened.
  • 3:48 - 3:51
    It displays the names of the thousands of victims
  • 3:51 - 3:54
    using a beautiful concept called "meaningful adjacency."
  • 3:54 - 3:56
    It places the names next to each other based on their
  • 3:56 - 3:59
    relationships to one another: friends, families, coworkers.
  • 3:59 - 4:02
    When you put it all together, it's quite a computational
  • 4:02 - 4:06
    challenge: 3,500 victims, 1,800 adjacency requests,
  • 4:06 - 4:09
    the importance of the overall physical specifications
  • 4:09 - 4:11
    and the final aesthetics.
  • 4:11 - 4:14
    When first reported by the media, full credit for such a feat
  • 4:14 - 4:16
    was given to an algorithm from the New York City
  • 4:16 - 4:20
    design firm Local Projects. The truth is a bit more nuanced.
  • 4:20 - 4:22
    While an algorithm was used to develop the underlying framework,
  • 4:22 - 4:25
    humans used that framework to design the final result.
  • 4:25 - 4:28
    So in this case, a computer had evaluated millions
  • 4:28 - 4:31
    of possible layouts, managed a complex relational system,
  • 4:31 - 4:33
    and kept track of a very large set of measurements
  • 4:33 - 4:36
    and variables, allowing the humans to focus
  • 4:36 - 4:39
    on design and compositional choices.
  • 4:39 - 4:40
    So the more you look around you,
  • 4:40 - 4:42
    the more you see Licklider's vision everywhere.
  • 4:42 - 4:45
    Whether it's augmented reality in your iPhone or GPS in your car,
  • 4:45 - 4:48
    human-computer symbiosis is making us more capable.
  • 4:48 - 4:50
    So if you want to improve human-computer symbiosis,
  • 4:50 - 4:51
    what can you do?
  • 4:51 - 4:53
    You can start by designing the human into the process.
  • 4:53 - 4:56
    Instead of thinking about what a computer will do to solve the problem,
  • 4:56 - 5:00
    design the solution around what the human will do as well.
  • 5:00 - 5:01
    When you do this, you'll quickly realize that you spent
  • 5:01 - 5:04
    all of your time on the interface between man and machine,
  • 5:04 - 5:07
    specifically on designing away the friction in the interaction.
  • 5:07 - 5:10
    In fact, this friction is more important than the power
  • 5:10 - 5:12
    of the man or the power of the machine
  • 5:12 - 5:14
    in determining overall capability.
  • 5:14 - 5:16
    That's why two amateurs with a few laptops
  • 5:16 - 5:19
    handily beat a supercomputer and a grandmaster.
  • 5:19 - 5:22
    What Kasparov calls process is a byproduct of friction.
  • 5:22 - 5:24
    The better the process, the less the friction.
  • 5:24 - 5:28
    And minimizing friction turns out to be the decisive variable.
  • 5:28 - 5:31
    Or take another example: big data.
  • 5:31 - 5:32
    Every interaction we have in the world is recorded
  • 5:32 - 5:35
    by an ever growing array of sensors: your phone,
  • 5:35 - 5:38
    your credit card, your computer. The result is big data,
  • 5:38 - 5:40
    and it actually presents us with an opportunity
  • 5:40 - 5:42
    to more deeply understand the human condition.
  • 5:42 - 5:45
    The major emphasis of most approaches to big data
  • 5:45 - 5:47
    focus on, "How do I store this data? How do I search
  • 5:47 - 5:49
    this data? How do I process this data?"
  • 5:49 - 5:51
    These are necessary but insufficient questions.
  • 5:51 - 5:54
    The imperative is not to figure out how to compute,
  • 5:54 - 5:56
    but what to compute. How do you impose human intuition
  • 5:56 - 5:58
    on data at this scale?
  • 5:58 - 6:01
    Again, we start by designing the human into the process.
  • 6:01 - 6:04
    When PayPal was first starting as a business, their biggest
  • 6:04 - 6:07
    challenge was not, "How do I send money back and forth online?"
  • 6:07 - 6:11
    It was, "How do I do that without being defrauded by organized crime?"
  • 6:11 - 6:13
    Why so challenging? Because while computers can learn
  • 6:13 - 6:16
    to detect and identify fraud based on patterns,
  • 6:16 - 6:17
    they can't learn to do that based on patterns
  • 6:17 - 6:20
    they've never seen before, and organized crime
  • 6:20 - 6:22
    has a lot in common with this audience: brilliant people,
  • 6:22 - 6:26
    relentlessly resourceful, entrepreneurial spirit — (Laughter) —
  • 6:26 - 6:29
    and one huge and important difference: purpose.
  • 6:29 - 6:31
    And so while computers alone can catch all but the cleverest
  • 6:31 - 6:34
    fraudsters, catching the cleverest is the difference
  • 6:34 - 6:36
    between success and failure.
  • 6:36 - 6:38
    There's a whole class of problems like this, ones with
  • 6:38 - 6:41
    adaptive adversaries. They rarely if ever present with a
  • 6:41 - 6:44
    repeatable pattern that's discernable to computers.
  • 6:44 - 6:48
    Instead, there's some inherent component of innovation or disruption,
  • 6:48 - 6:50
    and increasingly these problems are buried in big data.
  • 6:50 - 6:53
    For example, terrorism. Terrorists are always adapting
  • 6:53 - 6:55
    in minor and major ways to new circumstances, and despite
  • 6:55 - 6:58
    what you might see on TV, these adaptations,
  • 6:58 - 7:00
    and the detection of them, are fundamentally human.
  • 7:00 - 7:04
    Computers don't detect novel patterns and new behaviors,
  • 7:04 - 7:07
    but humans do. Humans, using technology, testing hypotheses,
  • 7:07 - 7:11
    searching for insight by asking machines to do things for them.
  • 7:11 - 7:14
    Osama bin Laden was not caught by artificial intelligence.
  • 7:14 - 7:16
    He was caught by dedicated, resourceful, brilliant people
  • 7:16 - 7:21
    in partnerships with various technologies.
  • 7:21 - 7:23
    As appealing as it might sound, you cannot algorithmically
  • 7:23 - 7:25
    data mine your way to the answer.
  • 7:25 - 7:28
    There is no "Find Terrorist" button, and the more data
  • 7:28 - 7:30
    we integrate from a vast variety of sources
  • 7:30 - 7:32
    across a wide variety of data formats from very
  • 7:32 - 7:36
    disparate systems, the less effective data mining can be.
  • 7:36 - 7:38
    Instead, people will have to look at data
  • 7:38 - 7:41
    and search for insight, and as Licklider foresaw long ago,
  • 7:41 - 7:44
    the key to great results here is the right type of cooperation,
  • 7:44 - 7:45
    and as Kasparov realized,
  • 7:45 - 7:48
    that means minimizing friction at the interface.
  • 7:48 - 7:51
    Now this approach makes possible things like combing
  • 7:51 - 7:54
    through all available data from very different sources,
  • 7:54 - 7:57
    identifying key relationships and putting them in one place,
  • 7:57 - 8:00
    something that's been nearly impossible to do before.
  • 8:00 - 8:02
    To some, this has terrifying privacy and civil liberties
  • 8:02 - 8:05
    implications. To others it foretells of an era of greater
  • 8:05 - 8:07
    privacy and civil liberties protections,
  • 8:07 - 8:10
    but privacy and civil liberties are of fundamental importance.
  • 8:10 - 8:13
    That must be acknowledged, and they can't be swept aside,
  • 8:13 - 8:15
    even with the best of intents.
  • 8:15 - 8:18
    So let's explore, through a couple of examples, the impact
  • 8:18 - 8:20
    that technologies built to drive human-computer symbiosis
  • 8:20 - 8:23
    have had in recent time.
  • 8:23 - 8:26
    In October, 2007, U.S. and coalition forces raided
  • 8:26 - 8:29
    an al Qaeda safe house in the city of Sinjar
  • 8:29 - 8:31
    on the Syrian border of Iraq.
  • 8:31 - 8:33
    They found a treasure trove of documents:
  • 8:33 - 8:35
    700 biographical sketches of foreign fighters.
  • 8:35 - 8:38
    These foreign fighters had left their families in the Gulf,
  • 8:38 - 8:41
    the Levant and North Africa to join al Qaeda in Iraq.
  • 8:41 - 8:43
    These records were human resource forms.
  • 8:43 - 8:46
    The foreign fighters filled them out as they joined the organization.
  • 8:46 - 8:47
    It turns out that al Qaeda, too,
  • 8:47 - 8:49
    is not without its bureaucracy. (Laughter)
  • 8:49 - 8:51
    They answered questions like, "Who recruited you?"
  • 8:51 - 8:54
    "What's your hometown?" "What occupation do you seek?"
  • 8:54 - 8:58
    In that last question, a surprising insight was revealed.
  • 8:58 - 9:00
    The vast majority of foreign fighters
  • 9:00 - 9:02
    were seeking to become suicide bombers for martyrdom --
  • 9:02 - 9:07
    hugely important, since between 2003 and 2007, Iraq
  • 9:07 - 9:11
    had 1,382 suicide bombings, a major source of instability.
  • 9:11 - 9:13
    Analyzing this data was hard. The originals were sheets
  • 9:13 - 9:16
    of paper in Arabic that had to be scanned and translated.
  • 9:16 - 9:18
    The friction in the process did not allow for meaningful
  • 9:18 - 9:21
    results in an operational time frame using humans, PDFs
  • 9:21 - 9:23
    and tenacity alone.
  • 9:23 - 9:25
    The researchers had to lever up their human minds
  • 9:25 - 9:28
    with technology to dive deeper, to explore non-obvious
  • 9:28 - 9:31
    hypotheses, and in fact, insights emerged.
  • 9:31 - 9:34
    Twenty percent of the foreign fighters were from Libya,
  • 9:34 - 9:37
    50 percent of those from a single town in Libya,
  • 9:37 - 9:39
    hugely important since prior statistics put that figure at
  • 9:39 - 9:41
    three percent. It also helped to hone in on a figure
  • 9:41 - 9:44
    of rising importance in al Qaeda, Abu Yahya al-Libi,
  • 9:44 - 9:47
    a senior cleric in the Libyan Islamic fighting group.
  • 9:47 - 9:50
    In March of 2007, he gave a speech, after which there was
  • 9:50 - 9:53
    a surge in participation amongst Libyan foreign fighters.
  • 9:53 - 9:56
    Perhaps most clever of all, though, and least obvious,
  • 9:56 - 9:58
    by flipping the data on its head, the researchers were
  • 9:58 - 10:01
    able to deeply explore the coordination networks in Syria
  • 10:01 - 10:04
    that were ultimately responsible for receiving and
  • 10:04 - 10:06
    transporting the foreign fighters to the border.
  • 10:06 - 10:09
    These were networks of mercenaries, not ideologues,
  • 10:09 - 10:11
    who were in the coordination business for profit.
  • 10:11 - 10:13
    For example, they charged Saudi foreign fighters
  • 10:13 - 10:15
    substantially more than Libyans, money that would have
  • 10:15 - 10:18
    otherwise gone to al Qaeda.
  • 10:18 - 10:20
    Perhaps the adversary would disrupt their own network
  • 10:20 - 10:23
    if they knew they cheating would-be jihadists.
  • 10:23 - 10:26
    In January, 2010, a devastating 7.0 earthquake struck Haiti,
  • 10:26 - 10:29
    third deadliest earthquake of all time, left one million people,
  • 10:29 - 10:32
    10 percent of the population, homeless.
  • 10:32 - 10:35
    One seemingly small aspect of the overall relief effort
  • 10:35 - 10:37
    became increasingly important as the delivery of food
  • 10:37 - 10:39
    and water started rolling.
  • 10:39 - 10:41
    January and February are the dry months in Haiti,
  • 10:41 - 10:44
    yet many of the camps had developed standing water.
  • 10:44 - 10:46
    The only institution with detailed knowledge of Haiti's
  • 10:46 - 10:47
    floodplains had been leveled
  • 10:47 - 10:50
    in the earthquake, leadership inside.
  • 10:50 - 10:53
    So the question is, which camps are at risk,
  • 10:53 - 10:55
    how many people are in these camps, what's the
  • 10:55 - 10:57
    timeline for flooding, and given very limited resources
  • 10:57 - 11:00
    and infrastructure, how do we prioritize the relocation?
  • 11:00 - 11:03
    The data was incredibly disparate. The U.S. Army had
  • 11:03 - 11:06
    detailed knowledge for only a small section of the country.
  • 11:06 - 11:08
    There was data online from a 2006 environmental risk
  • 11:08 - 11:11
    conference, other geospatial data, none of it integrated.
  • 11:11 - 11:14
    The human goal here was to identify camps for relocation
  • 11:14 - 11:16
    based on priority need.
  • 11:16 - 11:19
    The computer had to integrate a vast amount of geospacial
  • 11:19 - 11:21
    information, social media data and relief organization
  • 11:21 - 11:25
    information to answer this question.
  • 11:25 - 11:27
    By implementing a superior process, what was otherwise
  • 11:27 - 11:30
    a task for 40 people over three months became
  • 11:30 - 11:33
    a simple job for three people in 40 hours,
  • 11:33 - 11:36
    all victories for human-computer symbiosis.
  • 11:36 - 11:38
    We're more than 50 years into Licklider's vision
  • 11:38 - 11:40
    for the future, and the data suggests that we should be
  • 11:40 - 11:43
    quite excited about tackling this century's hardest problems,
  • 11:43 - 11:46
    man and machine in cooperation together.
  • 11:46 - 11:48
    Thank you. (Applause)
  • 11:48 - 11:51
    (Applause)
Title:
The rise of human-computer cooperation
Speaker:
Shyam Sankar
Description:

Brute computing force alone can’t solve the world’s problems. Data mining innovator Shyam Sankar explains why solving big problems (like catching terrorists or identifying huge hidden trends) is not a question of finding the right algorithm, but rather the right symbiotic relationship between computation and human creativity.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
12:12

English subtitles

Revisions Compare revisions