Playing with Prometheus: The Paradox of Artificial General Intelligence and the Future of Humanity

“Here is another analogy that comes to mind, grandiose as it might initially seem. Scientists don’t know exactly how or when humans first wrangled fire as a technology, roughly 1 million years ago. But we have a good idea of how fire invented modern humanity. As I in my review of James Suzman’s book Work, fire softened meat and vegetables, allowing humans to accelerate their calorie consumption. Meanwhile, by scaring off predators, controlled fire allowed humans to sleep on the ground for longer periods of time. The combination of more calories and more REM over the millennia allowed us to grow big, unusually energy-greedy brains with sharpened capacities for memory and prediction. Narrowly, fire made stuff hotter. But it also quite literally expanded our minds.

Our ancestors knew that open flame was a feral power, which deserved reverence and even fear. The same technology that made civilization possible also flattened cities. The ancient myths about fire were never simple. When Prometheus stole it from the gods, he transformed the life of mortals but was doomed to live in agony. The people building artificial general intelligence today don’t need media mythmaking to inflate their ego; they in the humanity-altering potential of their invention. But it is a complex thing, playing at Prometheus. They have stolen from the realm of knowledge something very powerful and equally strange. I think this technology will expand our minds. And I think it will burn us.”

Promethean IT is fully embracing the ChatGPT generative A.I. movement. If you’re ready to talk about how we’re helping companies achieve efficiencies in IT and cybersecurity, please reach out.

-Excerpt from “Why All the ChatGPT Predictions Are Bogus”, Derek Thompson

Previous
Previous

Revolutionizing Backup and Disaster Recovery for Small Companies with RPA Technology: A Data Protection Approach

Next
Next

The Rise of Ransomware in 2023: Embracing Data Protection and Zero Trust for Robust Cybersecurity