The Knowledge You Need for Familiarization Is Here
Our Knowledge Library focuses on three distinctive areas: Artificial Intelligence Technology, Intelligent System Business Design, and Security and Risk Management. Let us know if there is anything else we can get for you. We will provide it free of charge.
Artificial Intelligence Technology is the foundation upon which we build our systems.
Scroll down and click on the corresponding links to read the full text.
2azine article by James Moor, article link provided by Semantic Scholar
The Dartmouth College Artificial Intelligence Conference: The Next Fifty Years
Dartmouth 1956 - Five of the attendees of the 1956 Dartmouth Summer Research Project on Artificial Intelligence reunited at the July AI@50 conference. From left: Trenchard More, John McCarthy, Marvin Minsky, Oliver Selfridge, and Ray Solomonoff. (Photo by Joseph Mehling ’69)
Alan Turing was an English mathematician and computer science expert. Visit the Scientific American website for more detail about Turing’s accomplishments.
Photo: © National Portrait Gallery
The Father of Expert Systems
"Knowledge is power, and the computer is an amplifier of that power. We are now at the dawn of a new computer revolution… Knowledge itself is to become the new wealth of nations."
~ Edward Feigenbaum
Marvin Minsky’s advances in artificial intelligence and robotics were some of the first well known AI advances.One of his first of several papers and books written was “Steps Towards Artificial Intelligence.”
Photo courtesy of Philip Greenspun: MIT Technology Review
John Ross Quinlan
Quinlan is an artificial intelligence expert whose work on ID3 and C4.5 is widely recognized. He founded his own company, RuleQuest, and specializes in Data Mining and Machine Learning.
The Difference Between Robotics & AI
Intelligent System Business Design
Profitably support business objectives and create value in process improvements, innovation, or new paradigm. The articles provided below explain the use of Intelligent Agents.
Michael E Porter
The two basic types of competitive advantage combined with the scope of activities for which a firm seeks to achieve them, lead to three generic strategies for achieving above average performance in an industry: cost leadership, differentiation, and focus.
A hardcover edition of this book was published by Harper & Row, Publishers, Inc.
Chinese miliatry general Sun Tzu’s philosophy on how to be a great leader while also focusing on how to win in various capacities. Forbes writer, Eric Jackson, summarizes Sun Tzu’s 33 best pieces of leadership advice in this article link. Book available for purchase online.
Paul Beswick, Partner, Global Head of Oliver Wyman Labs, on competing at the new pace of business: Clock Speed. Digital disruptors have been a force in business for a decade or more, but their collective impact is now reaching an inflection point.
Society of Petroleum Engineers (SPE)
Security & Risk
Security and Risk Management are crucial to success in any deployment of products and services.
Ponemon (Sponsored by HP)
Quantify the economic impact of cyber attacks and observe cost trends over time. Internet attacks include stealing IP, bank accounts, distributing viruses, posting confidential business information, and disrupting a country’s critical national infrastructure.
Continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them.
Mandiant APT1 Report
The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.
Meetings objectives were to Improve the Cyber Insurance Market and encourage establishment of Stakeholder Roles and Responsibilities and encourage the market to move forward.
IP Commission Report
On the Theft of Intellectual Property The scale of international theft of American intellectual property (IP) is unprecedented—hundreds of billions of dollars per year.
The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.
Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.
Advanced targeted attacks make prevention-centric strategies obsolete. Securing enterprises in 2020 will require a shift to information- and people-centric security strategies, combined with pervasive internal monitoring and sharing of security intelligence.
Reports on internet threat data from one of the world’s most comprehensive vulnerability databases.
Harvard Journal of Law & Technology
Cyber attacks are increasingly targeting lawyers, and the legal profession must respond more energetically to the threat than it has to date. Volume 26, Number 2 Spring 2013 HACKERS, SPIES, AND STOLEN SECRETS: PROTECTING LAW FIRMS FROM DATA THEFT.
Privacy & Content Disclaimer
This site includes links to information created by other public and private organizations. These links are provided for the user’s convenience. Veloxiti AI Works does not control or guarantee the accuracy, relevance, timeliness, or completeness of this information. The inclusion of these links is not intended to reflect their importance, nor is it intended to endorse views expressed, or products or services offered.