Marshaling information requires these two things: at least one dictionary and at least one grammar.
As shown in the IMT example, there can be many layers of dictionaries, and the grammar can be quite fuzzy. The grammar and dictionary often interact with one another, as well.
These issues speak to intent. It is not enough to form symbols; it is not enough to form words; it is not enough to form sentences. Before communication can begin, there must be an intention to communicate which results in the creation of dictionaries and grammars which interact with one another and are often layered in complex ways. Intent, then, is a critical component of communication.
The implication for artificial intelligence is this: it is not enough, as Turing proposed, to trick a person into thinking a computer is a person. Somewhere there must be a person who intends this result. If the artificial intelligence cannot provide that intent, then the person who designs the system must.
Practitioners in the field of artificial intelligence often follow Turing’s lead in either one of two things. Either they assume that intent does not matter in defining intelligence, as he does in the imitation game and in arguing that it is possible to replace human calculators with machines. Or they presuppose that intent does not exist, that it is a useful illusion.
Neither of these approaches, however, will ultimately work — real communication requires intent, not only in the communication itself but even in the creation of dictionaries and grammars which interact with one another and are often layered in complex ways.Russ White, “Why monkeys, typing forever, can’t produce Shakespeare” at Mind Matters News
Further reading by Russ White, on the real world of high tech:
Pop-ups? Just say no, and close those tabs! Making the internet work for YOU means, among other things, getting control of who can follow you around. If allowing these notifications sounds like a perfect avenue for an attacker, that’s because it is. This attack surface is a very large hole in the security of your computer.
Should You Pay For a Virtual Private Network (VPN)? Here’s what a VPN can and can’t do for you. In some cases, specifically when you are using public wireless services, using a VPN can add measurably to your privacy and security. But VPNs are not a “silver bullet” in solving the many security and privacy issues users face today.
The internet’s structure builds in privacy flaws. The Domain Name resolver knows every service you visit, and every service those services rely on, as you move around the internet
You think you have nothing to hide? Then why are Big Tech moguls making billions from what you and others tell them?
Why you can’t just ask social media to forget you. While we now have a clear picture of the challenges current social media pose to peoples and cultures, what to do is unclear
Follow UD News at Twitter!