Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Online Teaching Assistants are Really Robots in Disguise

When Online Teaching Assistants are Really Robots in Disguise

Many students are taking advantage of online education, yet there are some pitfalls that can hold students back; namely, the lack of face-to-face interaction and assistance from the instructor. Now, artificially intelligent teaching assistants might be able to offer some reprieve to this issue.

You might remember how teaching assistants functioned from your own days at the university. They typically act as an aid to the professor, taking on responsibilities that professors don’t have time for, or simply don’t want to do, like administering tests, handing out homework assignments, and helping students who need assistance. In many cases, teaching assistants have been known to actually teach the class and lead in discussions. If students don’t get enough attention or are finding themselves falling behind, the teaching assistant is usually the first person they would go to for answers.

In order to fill this position for online classrooms, some universities have experimented with artificial intelligence programs called “bots” that can help students, should the need arise. One such bot, Jill Watson, was used as a TA for a class in Knowledge-Based Artificial Intelligence at the Georgia Institute of Technology to a degree of success. Jill helped students understand the core curriculum of the class, and wound up being so helpful that students couldn’t guess that “she” wasn’t a real person.

Online teaching focuses on learning management systems, many of which use a discussion board interface that’s designed to facilitate classroom-like discussion. Students can ask questions, which are answered by TAs or the professor. ComputerWorld reports that the KBAI class that’s offered every semester sees about 10,000 messages in its online forums, all of which need to be addressed. This is clearly too many messages and posts for just the TAs and the professor, so implementing an automated solution was a natural step forward.

Ashok Goel, the instructor of the KBAI class, explains that he and his team of graduate students had trained Jill on nearly 40,000 potential questions that have been asked since the class’s inauguration in the fall of 2014. Students that are invested in the subject matter will naturally ask questions, many of which are the same or similar, which makes AI the perfect way to respond to such inquiries.

At first, Jill had some difficulty working as a TA. Her answers would often be skewed off-topic or taken out of context by keywords. After some tweaking, Jill was capable of answering questions properly about 97 percent of the time. ComputerWorld states: “Initially, the human TAs would upload her successful responses to the students, but by the end of March, Jill didn’t need any assistance. She wrote to the class directly if she was 97 percent positive her answer was correct.”

This recent technology is also being used for many businesses. Utilizing automated “chatbot” solutions, businesses can divert some of their basic support to a carefully programmed AI. This AI is simply taught to look for certain keywords in questions, and then pulls up the appropriate answer to help the customer. In the event that the chatbot’s resources are exhausted and it can’t help the customer, it will drive the customer to a live person for a more hands-on approach. These solutions are reachable for small businesses, too - many of them just require time and careful planning to set up, so if you are tracking the types of questions that often bog down your customer service, you can automate them.

We tend to concentrate on the plus-side of working with recent technologies, but taking an objective approach is arguably the most important part of discussing new solutions. As robots continue to grow more realistic, will the line between humans and machines blur? Can developments such as these be good for society, or do they eliminate that which makes us human? Share your thoughts in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Google Phishing Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Miscellaneous Holiday Automation Facebook Compliance Training Gadgets Covid-19 Cloud Computing Server Outsourced IT Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Virtualization Bandwidth Business Technology Blockchain Wi-Fi Windows 10 Managed Services Apps Vendor Mobile Office Data Security Two-factor Authentication Chrome Budget Voice over Internet Protocol Employer-Employee Relationship Apple Tip of the week App Networking Mobile Device Management Gmail BYOD WiFi Physical Security Access Control HIPAA Hacker Applications Avoiding Downtime Marketing Computing Managed IT Services How To Information Technology BDR Conferencing Office 365 Augmented Reality Big Data Virtual Private Network Storage Password Bring Your Own Device Health Healthcare 2FA Computers Router Retail Website Operating System Help Desk Risk Management Analytics Office Tips Social Display Cooperation Printer Remote Workers Paperless Office Infrastructure Windows 11 Customer Service Document Management Free Resource Project Management Excel Going Green Windows 7 Microsoft 365 Scam Data loss Cybercrime Solutions Monitoring Firewall Patch Management Save Money Remote Monitoring End of Support Vulnerability Managed IT Service The Internet of Things Vendor Management Telephone Money VPN Video Conferencing Meetings Managed Services Provider Humor Licensing Virtual Machines Professional Services Entertainment Computer Repair Sports Mouse Customer Relationship Management Telephone System iPhone Cost Management Administration Supply Chain Machine Learning Vulnerabilities Hacking Presentation Images 101 Wireless Technology Maintenance Multi-Factor Authentication Settings Mobility User Tip Modem Printing Antivirus Wireless Content Filtering Processor Mobile Security YouTube Word Employees Cryptocurrency Smart Technology Integration Data Privacy Robot Saving Time Virtual Desktop LiFi Data storage Holidays Safety Data Storage Outlook IT Management Downloads Employer/Employee Relationships Network Congestion Workforce Browsers Connectivity Break Fix PCI DSS Threats Navigation Upload User Error Social Network Gig Economy Hacks Multi-Factor Security Scary Stories Application Workplace Strategies Teamwork Fun Meta IoT Dark Web Internet Service Provider Point of Sale Regulations Compliance Deep Learning IBM Amazon Evernote Trends Customer Resource management Regulations Network Management Google Calendar Memes Tech Support SQL Server Monitors Outsource IT Data Analysis Star Wars Microsoft Excel Net Neutrality Education Staff Financial Data History Environment Media Gamification Social Networking Smartwatch Mobile Computing Legislation IT Websites Azure Search Competition Small Businesses Fileless Malware Procurement SharePoint Wearable Technology Telework Best Practice Cyber security Electronic Medical Records Displays Tech Content Health IT Motherboard CES Comparison Communitications Buisness Writing Outsourcing Directions Assessment Legal Lenovo Permissions Supply Chain Management IT solutions FinTech Business Growth Virtual Reality Term User Workplace Server Management Specifications IT Assessment Private Cloud Identity Theft Value Cortana Hiring/Firing Microchip Internet Exlporer Superfish Fraud Flexibility Organization Alt Codes IP Address Twitter Paperless Username Co-managed IT Digital Security Cameras Black Friday Smart Devices Downtime Error Memory Social Engineering Technology Care Database Remote Working Hosted Solution IT Technicians Typing Data Breach Remote Computing Google Play Recovery Business Communications Hard Drives Scams Proxy Server Cookies Videos Cyber Monday Electronic Health Records Tablet Wasting Time Knowledge Domains Hybrid Work Tactics Google Drive Hotspot Mirgation Trend Micro Alert Security Cameras Human Resources Refrigeration Dark Data Cables Nanotechnology Managed IT Software as a Service File Sharing 5G Unified Communications Managing Costs Experience Public Speaking How To Addiction Google Docs Language Chatbots Bitcoin eCommerce Running Cable Lithium-ion battery Notifications SSID Google Apps Management IT Maintenance Entrepreneur Screen Reader Google Wallet Distributed Denial of Service Surveillance Travel Virtual Assistant Google Maps Virtual Machine Business Intelligence Service Level Agreement Techology Computing Infrastructure Identity Reviews Windows 8 Laptop Medical IT Shortcuts Undo Ransmoware Bookmark Smart Tech Drones Development Unified Threat Management Transportation Hypervisor Vendors Download Unified Threat Management Alerts Shopping Optimization Halloween PowerPoint Be Proactive

Blog Archive