A History Of Artificial Intelligence And Its Current & Future Development [extract]

A History Of Artificial Intelligence And Its Current & Future Development


Research Report: This Premium article is exclusive to premium  subscribers. For unrestricted website access please Subscribe: £5 monthly / £50 annual.



Artificial Intelligence (AI) is defined as computer systems that simulate human thinking and capacities such as learning.  Modern AI is made up of different categories of systems that each have unique specialisations. 

Common AI Types

AI systems generally are divided into four main types.  They are similar to the weak and strong categories in that they start from practical applications that exist today and evolve to envision what could exist in the future. These are:-

1. Reactive Machines: As the name implies, reactive machines are the simplest form of artificial intelligence systems: They react to what is put in front of them. Their performance is reliable, as they will respond the same way to the same stimuli every time. 

On the other hand, they have a very limited functionality set because the AI will not learn or grow over time. 
A famous example of this is IBM’s chess-playing computer Deep Blue, which relied on programmed rules and variables to understand the game of chess.

2. Limited Memory: Limited memory AI systems have some capacity to recall information and make predictions as to what function is needed. They do require human feedback to train the machine to learn how best to perform in each instance. 

A common example of this type of AI would be the automated chatbots that many organisations use as a way to scale their customer support and streamline their interactions.

3. Theory of Mind: Theory of mind is the first theoretical stage of AI development. It does not exist currently, but it represents the point when an artificial intelligence system will be able to discern emotion as it makes a decision about how to respond to a prompt from a user. 

A system might be able to understand if there is an urgent tone in someone’s voice or if someone is frustrated. This capacity would enable the system to adjust its responses to different situations far beyond what is possible today.

4. Self-Awareness: In the very distant future, an AI system that has mastered theory of mind might be able to reach a stage of self-awareness. In this stage, the system would understand what it is and that it was made by humans. 

 A self-aware AI system would essentially have human-level consciousness, which would allow it to adapt to immensely complex situations. This development would rely on vastly more advanced technology than what we have today.

(Full article length: 3,250 words)

To continue reading please Subscribe

« Cyber Threat Forecast Part 2 - India   
File Transfers Can Be The Weakest Link »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Adaptive Security

Adaptive Security

Adaptive is a next-generation cybersecurity platform. We're working with pioneering security teams to protect critical systems from AI-powered cyber attacks.

Synqly

Synqly

Synqly are on a mission to enable quick, secure, and sustainable integrations between any cybersecurity and infrastructure technologies.