A History Of Artificial Intelligence And Its Current & Future Development [extract]

A History Of Artificial Intelligence And Its Current & Future Development


Research Report: This Premium article is exclusive to premium  subscribers. For unrestricted website access please Subscribe: £5 monthly / £50 annual.



Artificial Intelligence (AI) is defined as computer systems that simulate human thinking and capacities such as learning.  Modern AI is made up of different categories of systems that each have unique specialisations. 

Common AI Types

AI systems generally are divided into four main types.  They are similar to the weak and strong categories in that they start from practical applications that exist today and evolve to envision what could exist in the future. These are:-

1. Reactive Machines: As the name implies, reactive machines are the simplest form of artificial intelligence systems: They react to what is put in front of them. Their performance is reliable, as they will respond the same way to the same stimuli every time. 

On the other hand, they have a very limited functionality set because the AI will not learn or grow over time. 
A famous example of this is IBM’s chess-playing computer Deep Blue, which relied on programmed rules and variables to understand the game of chess.

2. Limited Memory: Limited memory AI systems have some capacity to recall information and make predictions as to what function is needed. They do require human feedback to train the machine to learn how best to perform in each instance. 

A common example of this type of AI would be the automated chatbots that many organisations use as a way to scale their customer support and streamline their interactions.

3. Theory of Mind: Theory of mind is the first theoretical stage of AI development. It does not exist currently, but it represents the point when an artificial intelligence system will be able to discern emotion as it makes a decision about how to respond to a prompt from a user. 

A system might be able to understand if there is an urgent tone in someone’s voice or if someone is frustrated. This capacity would enable the system to adjust its responses to different situations far beyond what is possible today.

4. Self-Awareness: In the very distant future, an AI system that has mastered theory of mind might be able to reach a stage of self-awareness. In this stage, the system would understand what it is and that it was made by humans. 

 A self-aware AI system would essentially have human-level consciousness, which would allow it to adapt to immensely complex situations. This development would rely on vastly more advanced technology than what we have today.

(Full article length: 3,250 words)

To continue reading please Subscribe

« Cyber Threat Forecast Part 2 - India   
File Transfers Can Be The Weakest Link »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.