Study Notes: Emerging Technologies & The Second Machine Age

Introduction to Emerging Technologies and Innovation

  • Lessons cover:
    • Introduction to Emerging Technologies and Innovation
    • Defining emerging technologies
    • Framework for the operationalization of emergence
    • Prominent impact
  • Learning outcomes: Understand and expound the impact of the technology in the future

Technology as the Backbone of the Economy

  • Technology is no longer just a sector of the economy; it’s the backbone of the economy.

What is Emerging Technologies?

  • A term generally used to describe a new technology, but can also refer to continuing development of an existing technology.
  • Meaning varies across domains (media, business, science, education).
  • Common focus: technologies that are currently developing or expected to be available within the next five to ten years.
  • Usually reserved for technologies that are creating, or are expected to create, significant social or economic effects.

Concept of Emergence

  • The word “emerge” or “emergent” means:
    • The process of coming into being, or of becoming important and prominent (Oxford American Dictionary).
    • To rise up or come forth, to become evident, to come into existence (American Heritage Desk Dictionary and Thesaurus).

Emerging Technologies: Legal and Social Implications (cont.)

  • Emerging digital technologies have generated new opportunities while creating new legal challenges.
  • Key legal areas: copyrights, trademarks, patents, royalties, licensing.
  • Example: development of new digital communication technologies and media has given rise to novel issues related to digital reproduction and distribution of copyrighted works.

Five Key Attributes of Emerging Technologies

  • Radical novelty
  • Relatively fast growth (rapid development)
  • Coherence (internal logical interconnection)
  • Prominent impact (economic and social significance)
  • Uncertainty and ambiguity (incompleteness and unpredictability)

Radical Novelty

  • May be discontinuous innovations derived from radical innovations.
  • Can appear in method or function of the technology.
  • Emergence builds on different basic principles to achieve a new or changed purpose.
  • Novelty is contextual to the domain where the technology arises.

Fast Growth

  • Technology may grow rapidly compared with others in the same domain.

Coherence

  • Refers to internal characteristics such as sticking together, being united, logical interconnection, and congruity within a tech group.

Prominent Impact

  • Exerts significantly enhanced economic influence or changes the basis of competition.

Uncertainty and Ambiguity

  • The technology is not finished; non-linear and multi-factor nature of emergence gives it some autonomy, making prediction difficult.

Identifying and Responding to Emerging Technologies

  • Key activities:
    • Identifying emerging technologies
    • Anticipating the impact of emerging technologies (iterative risk assessment)
    • Achieving inherently safer designs
  • Concept from the 2nd machine age: emerging machine skills; lessons to act as technologies emerge.

The Matrix Approach and Surveillance Gaps

  • A matrix approach (as used in competitive technology intelligence) helps translate general opportunities/concerns into specific surveillance areas.
  • Responding to identification and surveillance gaps requires structured surveillance and prioritization.

Unintended Consequences and Iterative Risk Assessment

  • Emerging technologies often have unintended consequences (example: wireless tech increases weekly working hours; 24/7 connected workforce).
  • Iterative risk assessment is needed to manage these consequences.
  • Focus areas in iterative risk assessment include:
    • Extended/unusual work hours
    • Systems safety design
    • Engineering control technology
    • Life cycle assessment
    • Socioeconomic benefits of new and emerging technologies

Anticipating the Impact of Emerging Technologies — The Need for Iterative Risk Assessment

  • Purpose: anticipate risks and benefits, not just react to them.
  • Key elements include safety-oriented design and proactive analysis of how a technology affects workers and society.

Specific Areas in Iterative Risk Assessment

  • Extended/unusual work hours: assess physiological and psychosocial impacts; propose interventions.
  • Systems safety design: promote inherently safer products and processes; integrate safety considerations in design.
  • Engineering control technology: evaluate material toxicity; apply controls to reduce exposures.
  • Life cycle assessment: examine emissions and disposal issues; consider environmental impacts; protect researchers/workers during R&D.
  • Socioeconomic benefits: analyze productivity gains and broader societal benefits.

Socioeconomic Benefits and Prospective Analysis

  • Socioeconomic analysis ranges from productivity gains in processes to the creation of a sustainable economy via new technologies.
  • Prospective analysis is needed to continually assess risk/benefit as knowledge evolves.

Prospective Analysis and Risk Assessment Framework

  • Prospective analysis is used to reduce risk to workers by iterating on current knowledge and findings.
  • It includes potential benefits, exposure scenarios, and hazard mitigation based on ongoing research.

Risk Assessment: Core Concepts

  • Risk assessment involves:
    • Hazard identification
    • Risk identification (identifying factors that could cause harm)
    • Determining ways to eliminate hazards or control risk when elimination isn’t possible
  • Spiral development method: reduces risk by identifying problems early and delivering knowledge incrementally.

Benefit Identification

  • Aims to reveal opportunities for deploying an emerging or expanding technology to prevent occupational safety and health problems.

Five-Step Process for Prospective Analysis

1) Hazard & Benefit Identification
2) Exposure or Contact Assessment
3) Dose (Contact) Response Assessment
4) Risk and Benefit Characterization
5) Prospective Assessment

Step 1: Hazard & Benefit Identification

  • Identify aspects of a new technology that may have adverse effects on worker safety and health based on current knowledge/data.
  • Prospective considerations may include various potential risks and benefits (not exhaustively listed here).

Step 2: Exposure or Contact Assessment

  • Evaluate the probability of workers’ exposure to or contact with a new technology.
  • Exposure pertains to biological, chemical, and physical agents; contact pertains to mechanical systems and equipment used in manufacturing.

Step 3: Dose (Contact) Response Assessment

  • Determine the nature and magnitude of adverse or beneficial effects potentially associated with the technology.

Step 4: Risk and Benefit Characterization

  • Separate significant from trivial risks using information from prior steps.
  • Characterize a technology with current information, including estimation and its uncertainties, probability, frequency, and severity of known/potential adverse effects.

Step 5: Prospective Assessment

  • Extrapolate beyond what is known to forecast future risks and benefits.
  • Answer 'what if' and 'how could' questions; consider forward-looking scenarios.

Hazard Identification and Surveillance Gaps

  • Hazard identification evaluates adverse health effects of substances or technologies in animals or humans, related to potential worker safety risks.
  • It forecasts hazardous outcomes that could become emerging technologies.

Factors in Prospective Analysis Process

  • Key considerations include:
    • Critical needs
    • Analytical techniques
    • Cost-benefit analysis
  • The analysis should inform iterative risk assessment and guide research priorities.

Research Needs and Methods

  • Research needs identified while iteratively analyzing emerging tech; critical needs feed research agendas.
  • Tools needed for hazard/advantage analysis include:
    • Evaluation criteria
    • Methods
    • Techniques
  • Cost and benefit analysis: two approaches
    • Conventional approach: monetary estimates of benefits
    • Qualitative approach: valuing benefits that are not easily monetized

Inherently Safer Designs

  • Inherently safer technologies aim to significantly reduce or eliminate hazards at the source, not just manage them.
  • Elimination of hazards is an intrinsic feature of the design, making the design less vulnerable to failure.
  • Example: simplifying production processes or redesigning chemical synthesis to reduce hazards.

Two Principles of Inherent Safety

  • Simplication (Simplification): simplify processes to reduce hazard potential.
  • Substitution: replace hazardous materials or processes with safer ones (e.g., replacing white phosphorus in matches with a safer alternative).

Additional Inherent Safety Methods

  • Intensification (Minimization): use minimal amounts of hazardous materials to prevent catastrophic releases; however, this can increase handling/delivery frequency and transport risk.

How to Achieve Inherently Safer Designs

  • Focus on elimination or significant reduction of hazards through design choices rather than relying solely on controls.
  • Safety considerations should be integrated into the research and development process from the start.

Integrated Approaches to Research and Development

  • Need for an integrated research model that combines safety and health with innovation.
  • Goals include: protecting researchers/workers during R&D and addressing potential exposure routes to workers and the community.
  • Economic and health benefits to society should be included in the analysis.

Partnerships and Stakeholders in Iterative Risk Assessment

  • Iterative risk assessment benefits from partnerships among:
    • Government
    • Industry
    • Labor unions
    • Insurance providers
    • NGOs
  • Sharing data, information, risks, and benefits identified through prospective analysis improves safety outcomes.

Research Opportunities and Responsibilities

  • Emphasis on links with priority areas (e.g., National Occupational Research Agenda, NORA): Organization of Work; Special Populations; Social & Economic Consequences; Control Technology and PPE.
  • Government-funded research programs can impact emerging technologies (example: DOST & CHED).
  • Call for coordinated efforts among government, industry, and academia to advance inherently safer designs for benign technologies.
  • New information (e.g., toxicological data) can trigger updated prospective analyses.
  • There is a gap in recognizing adverse consequences in early stages; the Precautionary Principle could guide analysis.

The Second Machine Age: Overview

  • The Second Machine Age examines human progress and technological development as the defining period of our era.
  • The first machine age was driven by the steam engine, enabling machines to perform human labor and boosting production but displacing some physical laborers.
  • The second machine age advances intellect via algorithms and robotics, reshaping work beyond mechanical labor.

Exponential Growth

  • How it differs: framed via the chessboard analogy—gradual accumulation of grains grows exponentially across squares.
  • The founder’s request for rice on a chessboard illustrates exponential growth: from small to enormous totals as squares increase.
  • The technology sector is in the second half of the chessboard, reflecting rapid scaling.
  • Moore’s Law: the number of transistors on a chip roughly doubles every 1 to 2 years: ext{chip count}
    ightarrow 2 imes ext{previous count} ext{ every } 1 ext{–}2 ext{ years}.

Data, Data, Data

  • The Second Machine Age will produce massive data; analysis of this data enables new insights.
  • Examples: Google digitizing over 20 million books; English word count increased by over 70% between 1950 and 2000.
  • Transition from efficiency of physical work to data-driven efficiency across tasks.

Implications for GDP and Productivity

  • Phase 3: Implications question whether GDP is the best productivity metric.
  • GDP focuses on monetary value, whereas free assets (e.g., Wikipedia) boost productivity but are not included in GDP measures.
  • Example: saving 15 minutes per Google search per employee per year can translate to about 500 ext{ per employee per year} in productivity value.

Winner-Takes-All Dynamics and Network Effects

  • Exponential growth combined with network effects creates environments where top performers capture a large share of value.
  • In a global economy with unprecedented visibility, local value can be absorbed by global top performers.

Creativity, Ideation, and Recombination

  • The safest path in the future will favor those who leverage creativity and connect disparate knowledge.
  • Machines excel at data analysis but struggle with ideation and truly novel synthesis.
  • Ray Kurzweil’s notion of merging biological brains with digital brains supports outsourcing logic to machines while preserving human ideation.
  • Quote from the book summary: there’s never been a better time to be a worker with special skills or the right education; conversely, never a worse time to be a worker with ordinary skills.

Recombination of Technologies

  • Creativity often arises from recombining existing technologies.
  • Example: autonomous vehicles emerge from combining sensors, data analysis, and real-time learning with traditional vehicles.

Digital Divide

  • Digital divide: the gap between those with access to digital technologies and those without.
  • Defined as the gap in access to computers and the internet, which can lead to social disparities due to unequal benefits.

Guide Questions: Reflections on the Digital Divide

  • What is the digital divide, who is most affected (globally and in the USA), and how does it affect students in schools?
  • Consider how teachers can bridge the divide and avoid inequities in classroom settings.
  • Watch: The Digital Divide (May 2008) and What is the Digital Divide (Five Days on the Digital Dirt Road) and read Distance Education and the Digital Divide: An Academic Perspective (Block, 2010).
  • Discussion prompts for group discussion: share experiences of how schools/teachers ensured digital equity or unintentionally exacerbated inequities; propose actions you can take as an IT professional to promote equity in your context.

Presentation Notes: Icons and Formatting

  • Slide design notes: SlidesCarnival icons are editable shapes; can resize, recolor without quality loss.
  • Emojis can be used as icons and resized; examples provided for accessible formatting.

Summary of Key Formulas and Quantitative Concepts

  • Moore’s Law (approximate):

    • N(t+

    ) = 2 imes N(t) ext{ every } 1 ext{ to } 2 ext{ years}

    • This captures the rapid scaling of computational capacity.
  • Chessboard grain analogy for exponential growth:

    • Total grains on an 8x8 board with doubling each square:
    • S = 2^{64} - 1
    • Illustration of how small early gains translate into enormous totals.
  • GDP vs productivity example from Google search time savings:

    • If one employee saves about 15 minutes per year due to better information access, the productivity value approximates ext{ extdollar}500 ext{ per employee per year}, illustrating how non-monetary productivity gains aren’t always captured in GDP.

Notes on structure and approach:

  • The notes above capture major and minor points across the transcript, organizing them into logical sections with detailed bullet points.
  • Mathematical expressions are provided in LaTeX syntax and enclosed in double dollar signs, per the formatting rules.
  • The content links theoretical concepts to practical implications, including safety design, risk assessment, corporate and governmental collaboration, and broader societal effects like the digital divide.