A History Of Artificial Intelligence And Its Current & Future Development [extract]

A History Of Artificial Intelligence And Its Current & Future Development


Research Report: This Premium article is exclusive to premium  subscribers. For unrestricted website access please Subscribe: £5 monthly / £50 annual.



Artificial Intelligence (AI) is defined as computer systems that simulate human thinking and capacities such as learning.  Modern AI is made up of different categories of systems that each have unique specialisations. 

Common AI Types

AI systems generally are divided into four main types.  They are similar to the weak and strong categories in that they start from practical applications that exist today and evolve to envision what could exist in the future. These are:-

1. Reactive Machines: As the name implies, reactive machines are the simplest form of artificial intelligence systems: They react to what is put in front of them. Their performance is reliable, as they will respond the same way to the same stimuli every time. 

On the other hand, they have a very limited functionality set because the AI will not learn or grow over time. 
A famous example of this is IBM’s chess-playing computer Deep Blue, which relied on programmed rules and variables to understand the game of chess.

2. Limited Memory: Limited memory AI systems have some capacity to recall information and make predictions as to what function is needed. They do require human feedback to train the machine to learn how best to perform in each instance. 

A common example of this type of AI would be the automated chatbots that many organisations use as a way to scale their customer support and streamline their interactions.

3. Theory of Mind: Theory of mind is the first theoretical stage of AI development. It does not exist currently, but it represents the point when an artificial intelligence system will be able to discern emotion as it makes a decision about how to respond to a prompt from a user. 

A system might be able to understand if there is an urgent tone in someone’s voice or if someone is frustrated. This capacity would enable the system to adjust its responses to different situations far beyond what is possible today.

4. Self-Awareness: In the very distant future, an AI system that has mastered theory of mind might be able to reach a stage of self-awareness. In this stage, the system would understand what it is and that it was made by humans. 

 A self-aware AI system would essentially have human-level consciousness, which would allow it to adapt to immensely complex situations. This development would rely on vastly more advanced technology than what we have today.

(Full article length: 3,250 words)

To continue reading please Subscribe

« Cyber Threat Forecast Part 2 - India   

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.