"Unskilled manual laborers have felt the pressure of automation for a long time - but, increasingly, they're not alone. The last few years have been a bonanza of advances in artificial intelligence. As our software gets smarter, it can tackle harder problems, which means white-collar and pink-collar workers are at risk as well.
Here are eight jobs expected to be automated (partially or entirely) in the coming decades.
Call Center Employees
call-center
Telemarketing used to happen in a crowded call center, with a group of representatives cold-calling hundreds of prospects every day. Of those, maybe a few dozen could be persuaded to buy the product in question. Today, the idea is largely the same, but the methods are far more efficient.
Many of today's telemarketers are not human. In some cases, as you've probably experienced, there's nothing but a recording on the other end of the line. It may prompt you to "press '1' for more information," but nothing you say has any impact on the call - and, usually, that's clear to you.
But in other cases, you may get a sales call and have no idea that you're actually speaking to a computer. Everything you say gets an appropriate response - the voice may even laugh. How is that possible? Well, in some cases, there is a human being on the other side, and they're just pressing buttons on a keyboard to walk you through a pre-recorded but highly interactive marketing pitch. It's a more practical version of those funny soundboards that used to be all the rage for prank calls.
Using soundboard-assisted calling - regardless of what it says about the state of human interaction - has the potential to make individual call center employees far more productive: in some cases, a single worker will run two or even three calls at the same time. In the not too distant future, computers will be able to man the phones by themselves.
At the intersection of big data, artificial intelligence, and advanced
"But the bigger problem with things like public tweets is that no-one knows what information can be derived from them, either now or in the future. I write as a data analyst who's done a fair bit of work with this kind of material. What follows are a few techniques that aren't at all obvious to the average Twitter user. They go far beyond reading the surface text (or metadata) of an individual tweet. And these are just some of the techniques currently used to mine this data, ethically or unethically, legally or illegally."
"It's highly unlikely investigative or intelligence agencies have much of an interest in protecting the privacy of non-targeted citizens, even in non-terrorist-related surveillance -- not if it means using alternate (read: "less effective") investigative methods or techniques. It has been demonstrated time and time again that law enforcement is more interested in the most direct route to what it seeks, no matter how much collateral damage is generated. "
"Wired recently started an anti-ad-blocking campaign that attempts to prevent ad-blocked users from reading articles unless they pay a monthly subscription fee. On the heels of this decision comes a roundup of the major ad-blockers, some of which are pretty dodgy indeed.
Adblock Plus comes off the worst of the lot. The company charges publishers fees to allow their ads through its filters, based on criteria about size and placement. Ghostery blocks trackers, but by default gathers "anonymized" data about your browsing habits (it's very hard to conclusively describe any deep data set as anonymized). "
"Google stunned the world by defeating Go legend Lee Se-dol yesterday, and it wasn't a fluke - AlphaGo, the AI program developed by Google's DeepMind unit, has just won the second game of a five-game Go match being held in Seoul, South Korea. AlphaGo prevailed in a gripping battle that saw Lee resign after hanging on in the final period of byo-yomi ("second-reading" in Japanese) overtime, which gave him fewer than 60 seconds to carry out each move."
""The email has good spelling and grammar and my exact home address...when I say exact I mean, not the way my address is written by those autofill sections on web pages, but the way I write my address.
"My tummy did a bit of a somersault when I read that, because I wondered who on earth I could owe £800 to and what was about to land on my doormat."
She quickly realised it was a scam and did not click on the link."
"And, of course, there's the law-enforcement angle. Instead of relying on sketch artists and police lineups, a real-life version of a Recaller could tap into a witness's memory and reconstruct what they saw. Forget security-camera footage - cops just need your thoughts."
"The researchers, Tero Karras, Samuli Laine, and Timo Aila, came up with a new way of constructing a generative adversarial network, or GAN.
GANs employ two dueling neural networks to train a computer to learn the nature of a data set well enough to generate convincing fakes. When applied to images, this provides a way to generate often highly realistic fakery. The same Nvidia researchers have previously used the technique to create artificial celebrities (read our profile of the inventor of GANs, Ian Goodfellow)."
"In a world of cloud computing, everything we do is governed by tens of thousands of words of legal fine-print (including the fine print that warned Mr da Silva that his movies might stop working if he changed the region associated with his Itunes account) that no one (including Mr da Silva, and you, and me) has ever, ever read (famously so!)."
"I wasn't so much addicted to the spectacle as to the ongoing certainty that the next click, the next link, would bring clarity. I felt like if I watched everything, if I read every last conspiracy theory and threaded tweet, the reward would be illumination. I would finally be able to understand not just what was happening but what it meant and what consequences it would have. But there was never a definitive conclusion. I'd taken up residence in a hothouse for paranoia, a factory manufacturing speculation and mistrust."
"The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email?
One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
""The disproportionally high arrest rates for members of the black community make the use of facial recognition technology by law enforcement problematic," the letter reads, "because it could serve to reinforce this trend."
"My latest Locus Magazine column is DRM Broke Its Promise, which recalls the days when digital rights management was pitched to us as a way to enable exciting new markets where we'd all save big by only buying the rights we needed (like the low-cost right to read a book for an hour-long plane ride), but instead (unsurprisingly) everything got more expensive and less capable. "
"A group of current and former contractors who worked for years at the social network's Berlin-based moderation centres has reported witnessing colleagues become "addicted" to graphic content and hoarding ever more extreme examples for a personal collection. They also said others were pushed towards the far right by the amount of hate speech and fake news they read every day."