Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Online Teaching Assistants are Really Robots in Disguise

When Online Teaching Assistants are Really Robots in Disguise

Many students are taking advantage of online education, yet there are some pitfalls that can hold students back; namely, the lack of face-to-face interaction and assistance from the instructor. Now, artificially intelligent teaching assistants might be able to offer some reprieve to this issue.

You might remember how teaching assistants functioned from your own days at the university. They typically act as an aid to the professor, taking on responsibilities that professors don’t have time for, or simply don’t want to do, like administering tests, handing out homework assignments, and helping students who need assistance. In many cases, teaching assistants have been known to actually teach the class and lead in discussions. If students don’t get enough attention or are finding themselves falling behind, the teaching assistant is usually the first person they would go to for answers.

In order to fill this position for online classrooms, some universities have experimented with artificial intelligence programs called “bots” that can help students, should the need arise. One such bot, Jill Watson, was used as a TA for a class in Knowledge-Based Artificial Intelligence at the Georgia Institute of Technology to a degree of success. Jill helped students understand the core curriculum of the class, and wound up being so helpful that students couldn’t guess that “she” wasn’t a real person.

Online teaching focuses on learning management systems, many of which use a discussion board interface that’s designed to facilitate classroom-like discussion. Students can ask questions, which are answered by TAs or the professor. ComputerWorld reports that the KBAI class that’s offered every semester sees about 10,000 messages in its online forums, all of which need to be addressed. This is clearly too many messages and posts for just the TAs and the professor, so implementing an automated solution was a natural step forward.

Ashok Goel, the instructor of the KBAI class, explains that he and his team of graduate students had trained Jill on nearly 40,000 potential questions that have been asked since the class’s inauguration in the fall of 2014. Students that are invested in the subject matter will naturally ask questions, many of which are the same or similar, which makes AI the perfect way to respond to such inquiries.

At first, Jill had some difficulty working as a TA. Her answers would often be skewed off-topic or taken out of context by keywords. After some tweaking, Jill was capable of answering questions properly about 97 percent of the time. ComputerWorld states: “Initially, the human TAs would upload her successful responses to the students, but by the end of March, Jill didn’t need any assistance. She wrote to the class directly if she was 97 percent positive her answer was correct.”

This recent technology is also being used for many businesses. Utilizing automated “chatbot” solutions, businesses can divert some of their basic support to a carefully programmed AI. This AI is simply taught to look for certain keywords in questions, and then pulls up the appropriate answer to help the customer. In the event that the chatbot’s resources are exhausted and it can’t help the customer, it will drive the customer to a live person for a more hands-on approach. These solutions are reachable for small businesses, too - many of them just require time and careful planning to set up, so if you are tracking the types of questions that often bog down your customer service, you can automate them.

We tend to concentrate on the plus-side of working with recent technologies, but taking an objective approach is arguably the most important part of discussing new solutions. As robots continue to grow more realistic, will the line between humans and machines blur? Can developments such as these be good for society, or do they eliminate that which makes us human? Share your thoughts in the comments, and be sure to subscribe to our blog.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 15 September 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Productivity Business Hosted Solutions Microsoft Software Internet Network Security IT Services Computer Windows 10 Managed Service Provider Productivity Backup Ransomware Innovation Mobile Devices Outsourced IT Smartphone Data Backup Android Hardware User Tips Google Managed IT services Social Media Business Continuity Efficiency Browser Communication IT Support Disaster Recovery Workplace Tips Upgrade Data Recovery Data Cloud Computing Managed IT Services Small Business Business Management IT Support Data Management Smartphones App Holiday Internet of Things Microsoft Office Phishing Office Server Remote Monitoring Windows Miscellaneous WiFi Facebook Network Paperless Office Office 365 Artificial Intelligence Gmail Spam Big Data Passwords Encryption Save Money communications Password Tech Term VoIP Customer Relationship Management Bandwidth Unified Threat Management Firewall Apps Robot Hosted Solution Recovery Collaboration Employer-Employee Relationship Saving Money Risk Management Document Management Tip of the week Vendor Management Compliance Cybersecurity Word Hacker Chrome Content Filtering How To Apple Avoiding Downtime Government Money Downtime Wi-Fi Customer Service Mobile Device Management Work/Life Balance Office Tips Managed IT Infrastructure Operating System Windows 10 Remote Computing Analytics The Internet of Things Computers Automation Going Green Vulnerability Alert Outlook Help Desk Printing Data storage Data Security Applications Education Computing Cybercrime Health IT Management Virtual Reality Training Mobile Device Hacking Antivirus SaaS Social Mobile Computing BYOD Website Tech Support Data loss Project Management BDR Business Technology Two-factor Authentication Telephone Systems Settings File Sharing Healthcare Presentation Business Growth Politics Monitors Managed Service Patch Management Travel Identity Theft Augmented Reality Google Drive Scam Websites Specifications Physical Security IBM Regulations Running Cable Taxes Proactive Botnet User VPN Net Neutrality Assessment Bring Your Own Device Samsung Search Remote Monitoring and Management Server Management Licensing Sports Retail Windows 7 IT service Virtual Private Network Smart Technology Meetings Consultation Digital Payment Cortana Storage Virtualization HIPAA Best Practice Software as a Service Maintenance Administration Lithium-ion battery Router Mobile Security Computer Care Business Owner IT solutions Safety Marketing Wireless Technology Wireless Tablet Upgrades Competition Automobile Budget Laptops Access Control End of Support YouTube Information Technology Unified Communications Mouse Humor LiFi Legal Display Analyitcs Twitter Hard Drives business communications systems Staff Multi-Factor Security Laptop Virtual Desktop Cyberattacks Current Events Phone System Professional Services flu shot Solid State Drive G Suite How To Processors Cost Management Batteries Permissions Refrigeration Internet Protocol Flexibility Heating/Cooling Google Calendar Halloween MSP Virtual Assistant Fort Worth IT Motion Sickness Hard Disk Drive Firefox Deep Learning Supercomputer Fun Google Docs Recycling Remote Work Networking Fraud VoIP streamlines Operations Bookmarks Servers Legislation Scary Stories Writing Personal Information Social Networking Voice over Internet Protocol DFW IT Service IT Consultant IT Budget Management File Management Undo business network infrastructure Wearable Technology Favorites Machine Learning Social Engineering Computer Repair iPhone IP Address Motherboard Techology Internet Exlporer Cleaning Alt Codes Notifications Enterprise Resource Planning WPA3 Conferencing Statistics Relocation Software Tips Webcam Electronic Medical Records Mobile Office Google Wallet Manufacturing Mail Merge Distributed Denial of Service Disaster Resistance data services Typing Crowdsourcing Dark Data Mobile Fleet Tracking IT Technicians Employees Bluetooth Technology Tips Private Cloud Buisness Point of Sale Corporate Profile Drones Modem Proactive Maintenance Address Managed IT Service Proactive IT Hotspot Quick Tips User Error Cryptocurrency Knowledge Company Culture Asset Tracking Mirgation PowerPoint Zero-Day Threat Comparison Error History WannaCry Cookies Processor Redundancy Break Fix IT Consulting Language Time Management Printer Bitcoin Experience Vulnerabilities Consumers Remote Workers Migration Backup and Disaster Recovery Mobility Black Friday Cabling Web Server Update Staffing Nanotechnology Dark Web Data Breach Computing Infrastructure Network Management Windows 8 Geography 3D Printing Information eWaste Domains Chatbots RMM Cyber Monday Administrator Cameras VoIP Chromebook GPS 5G IoT Active Directory Entrepreneur Data Warehousing IT Sevices Application Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Cables Users Unsupported Software Monitoring Environment Public Speaking Identity Procurement flu season Disaster CCTV Digital Emoji Tracking Utility Computing Windows Server Lenovo Microsoft Excel Unified Threat Management Cooperation Downloads Gadget Wires Mobile Data Electronic Health Records Troubleshooting Hacks Remote Worker Shortcut Fort Worth Uninterrupted Power Supply Spyware User Management Superfish Blockchain

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code