ChatGPT4-Questions/User:Darwin2049/Overview
OpenAI - ChatGPT4.
In what follows we attempt to address several basic questions about the onrushing progress with the current focus of artificial intelligence. There are several competing actors in this space. These include OpenAI, DeepMind, Anthropic, and Cohere. A number of other competitors are active in the artificial intelligence market place. But for purposes of brevity and because of the overlap we will limit focus on ChatGPT4 (CG4). Further, we focus on several salient questions that that raise questions of safety, risk and prospects.
Specifically, risks that involve or are:
- Interfacing/Accessibility-Conformability - Synthesis. how will different groups interact with, respond to and be affected by it; might access modalities available to one group have positive or negative implications for other groups;
- Political/Competitive - Synthesis. how might different groups or actors gain or lose relative advantage; also, how might it be used as a tool of control;
- Evolutionary/Stratification - Synthesis. might new classifications of social categories emerge; were phenotypical bifurcations to emerge would or how would the manifest themselves;
- Epistemological/Ethical Relativism - Synthesis how to reconcile ethical issues within a society, between societies; more specifically, might it provide solutions or results that are acceptable to the one group but unacceptable to the other group;
Synthesis.
The above four question groups form the core of what follows. Attempting to respond to these questions obliged the development of a review and response plan. What followed is a set of steps that have attempted to shed light on each of these areas. Responding to these areas however has not mapped directly to any given question area. Instead the steps that emerged proceeded along the lines of:
- perform a sentiment scan: if possible group together into camps;
- spotlight the technology's elements: offer a cursory breakdown of the underpinning technology;
- articulate and identify risks: the foregoing questions implicitly suggest risk, therefore, spotlight them;
frame responses to the questions as posed in terms of what the risks that they imply
for various known risks suggest possible developments that this new technology might entail;
Sentiment. In order to maintain focus and forward momentum sentiment has been expressed as voices arguing in favor of further development. Other notable voices have urged caution going forward. Not least among them were such notable figures as Elon Musk. Voices expressing the same sentiment but with greater force suggested that all efforts going forward with this research should be paused for a limited amount of time. Then there were voices that expressed grave concern that this represents an existential all-of-national-resources imperative to go pedal to the metal. The risk to slow down or pause while avowed rivals are pressing ahead was just too great. In short the main camps that seem to have coalesced include: press on, proceed with caution, severe storm warnings ahead, damn the torpedoes full speed ahead.
Literature Review. Therefore the path of progress proceeded along the lines of: what are informed people saying about this new capability was foretelling. Reporting seemed to be increasing by the day. This necessitated limiting the choices of what to view and include since trying to gather it all could become a research project in and of itself.
Based upon these sentiment it should come as no surprise that the risks are real and pressing. Anyone viewing a real time world map of malicious attacks shows a planet awash in twenty-four seven activity.
Model Variations. By this point in the examination it became evident that putting a spotlight the underlying technology might help. This revealed that there were several variations on the underlying approach of Deep Learning systems. Prominent ones included:
generative, transformers, bidirectional, bidirectional encoders, generative adversarial, convolutional, recursive, large language models.
We briefly touch on each of these but the main focus has been on the LLM approach that uses a Pretrained approach, hence the name GPT... generative pretrained transformers.
Risks. Therefore the immediate follow on question became given that this is a major advance in a known technology how might it be incorporated, the answer to that rhetorical question fell right out into plain view as being how might this new technology pose risks, and what kinds of risks. These immediately fell into three main categories... i.e. risks that were organic (they arose innately as a result of their existence), malicious (actors with malevolent intent) and theoretical (possible new developments that are possible or newly enabled).
Looking Forward. The picture that appears to be emerging suggests that looking forward a short distance in time suggests that a range of surprises await those who are using this technology.
Black Swan Event. Recent developments in the area of quantum computing suggests that as this technology gains it grounding everything done with computing and especially artificial intelligence will be totally eclipsed by the capabilities that this new environment will offer.
A list of instances for each emerged in short order. They are presented after a short section on sentiment has been presented. We propose to suggest we look
- Impressions that has been expressed by knowledgeable observers; a short sampling of impressions and perceptions include voices that are or are saying:
- Caveats.
After assessing the range of sentiment from very well informed observers and experts our conclusion is that a summary of caveats and qualifications might help in constraining and focusing the discussion going forward. - mapping: the reader is advised to notice that the responses and deliberations to the four primary questions do not map directly to each other; instead the responses themselves emerged from an examination of the primary risk areas: organic, malicious and theoretical;
- An inflection point either has or momentarily will be or has been reached;
- mitigating surprise the concerned community would be well advised to regularly monitor the archive for papers so as to mitigate the gain early warning;
- Imaginative expectation is advised because novel combinations are emerging that will herald entirely new forms of CP capabilities; most of which can not be guessed at as of this writing (Fall 2023);
- quantum computing will eclipse all advances to date As of this report the major actors in this space have already reported advances. In the case of the IBM corporation their Quantum System Two may very well shatter all expectations. Current indications are that deep learning tools can be hosted on these new environments. At that point in time the ability of a deep learning CP based tool will take on qualities that can not now be estimated. Current training times have been reported to have required weeks to months to train as was the case of CG4. These times may now collapse to seconds or less.
- pseudo-AGI (PAGI) might be a way to envision what to expect. This terminology is intended to suggest that the term AGI might be too simplistic and may require further analysis and refinement.
- Quantum Based CP (QBCP)soon-to-be formally announced quantum computing systems will become the next logical environment in which to host CPs; when this happens expect training volumes to explode and training times to collapse; incorporation of knew knowledge will become almost instant;
- intelligent interfacing tools incorporating advanced theory of mind metrics will minimize the interval between end user motivation hypothesis and action plan to mere instants; such a capability might appear to even an expert user like interacting with an extremely well versed, empathetic and supportive colleague;
- autonomous QBCP/PAGI linking' multiple QBCP's will form ad hoc or permanent communications pathways between themselves; these assemblages will enable the merging of multiple skills and capabilities that can not now be guessed at; these new capabilities will extend and then supersede the current trend of using communications tools such as WebEx or Zoom for conferencing; rather individuals who are in possession of their own targeted CP will enable access to peer CP's; this access might be transitory and transactional or might form the basis of new enterprises;
- exponential growth - Cambrian explosion no capabilities such as this have yet been reported; yet there appear to be no obstacles to their development; the rise of
- dawn of advanced composite CP's construction of modern cruise ships might serve as a basis upon which to understand the scale of capability that will shortly emerge;
- Darwinian evolution AGI may have yet to arrive; however close approximations may soon become evident; we could see an accelerated Moore's Law of evolution where problems that have heretofore taken months or years to solve might not only be solved in a morning but that highly sophisticated access and control tools might become commonly available mid-afternoon;
- high ground.The reality of a near-pear in the guise of a demonstrably hostile CCP urges caution;
- knowledgeable observers have provided numerous reports of CCP hacking and related malicious efforts;
- CCP literature and propaganda has made very clear that the West is an obstacle and that the US is the prime target;
- demonstrated practices on the part of PRC companies to demand access to corporate IPR are numerous; therefore
- anticipating that the PRC will attempt to neutralize the best efforts from the West can safely be assumed; otherwise we in the West risk seeing experiencing disruptive or devastation pre-emptive actions against our corporate and defense capacities from means or techniques that our best and brightest find mysterious and unfathomable.
- Terms, Theory of Operation of technology paradigm used to produce its results;
- concepts are presented that contrast large language models with generative and generative adversarial models;
- several other deep learning models are summarized as well for the purpose of further context;
- LLM operation is sketched out in this section; several helpful video segments are presented that are intended to further facilitate why the LLM approach has become so successful;
- novel and unexpected forms of emergent behavior are mentioned;
- Risks our approach has been to present a few commonly occurring risks these have collected into groups that are
- organic or otherwise systemic and innate within the science or technology itself;
- malicious actors should be expected to formulate highly elaborate netcentric attacks; we should expect that elaborate collections of actions, bait and switch, false flag and seemingly random but covertly connected acts of sabotage to become the new normal;
- theoretical risks are speculative; but are based upon what is know known and are intended to spotlight what is possible within the purview of known capabilities;
- Intermediate Considerations. If we step back for a moment and summarize what some observers have had to say about this new capability then we might tentatively start with that:
- is based upon and is a refinement of its predecessor, the Chat GPT 3.5 system;
- has been developed using the generative predictive transformer (GPT) model;
- has been trained on a very large data set including textual material that can be found on the internet; unconfirmed rumors suggest that it has been trained on 1 trillion parameters;
- is capable of sustaining conversational interaction using text based input provided by a user;
- can provide contextually relevant and consistent responses;
- can link topics in a chronologically consistent manner and refer back to them in current prompt requests;
- is a Large Language Models that uses prediction as the basis of its actions;
- uses deep learning neural networks and very large training data sets;
- uses a SAAS model; like Google Search, Youtube or Morningstar Financial;
Back to root page: ChatGPT4-Questions