What is generative AI and why is it so popular? Here’s everything you need to know

Jason Macuray
Generative AI is a hot topic right now, but what actually is it? We have the answers.

Generative AI models take a vast amount of content from across the internet and then use the information they are trained on to make predictions and create an output for the prompt you input. These predictions are based off the data the models are fed, but there are no guarantees the prediction will be correct, even if the responses sound plausible.

The responses might also incorporate biases inherent in the content the model has ingested from the internet, but there is often no way of knowing whether that’s the case. Both of these shortcomings have caused major concerns regarding the role of generative AI in the spread of misinformation.

Also: 4 things Claude AI can do that ChatGPT can’t

Generative AI models don’t necessarily know whether the things they produce are accurate, and for the most part, we have little way of knowing where the information has come from and how it has been processed by the algorithms to generate content.

There are plenty of examples of chatbots, for example, providing incorrect information or simply making things up to fill the gaps. While the results from generative AI can be intriguing and entertaining, it would be unwise, certainly in the short term, to rely on the information or content they create.

Some generative AI models, such as Bing Chat or GPT-4, are attempting to bridge that source gap by providing footnotes with sources that enable users to not only know where their response is coming from, but to also verify the accuracy of the response.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Ransomware Strikes New Zealand’s Regional Transportation Authority: Lessons in Cybersecurity Preparedness

Next Post

Predators: Point This at Anyone’s Phone to Instantly Hack It

Related Posts

Code Keepers: Mastering Non-Human Identity Management

Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard
Avatar
Read More

Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan

Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called Decoy Dog. Cybersecurity company Positive Technologies is tracking the activity cluster under the name Operation Lahat, attributing it to an advanced persistent threat (APT) group called HellHounds. "The Hellhounds group compromises organizations they select and
Avatar
Read More