Knowledge Library

 

The knowledge that you need for familiarization is here.

Let us know if there is anything else we can get for you.

We will provide it free of charge.

 

articlesNews Blog

Our Focus

Our Knowledge Library

focuses on three

distinctive areas:

Artificial Intelligence Technology

is the foundation upon which we build our systems. 

Intelligent System Business Design

Profitability support business objectives and create value in process improvements, innovation, or new paradigm. 

Security and Risk Management

are crucial to success in any deployment of products and services.

knowledge library

AI Technology

 

Hover Blurb

Dartmouth 1956

Five of the attendees of the 1956 Dartmouth Summer Research Project on Artificial Intelligence reunited at the July AI@50 conference. From left: Trenchard More, John McCarthy, Marvin Minsky, Oliver Selfridge, and Ray Solomonoff. (Photo by Joseph Mehling ’69) 

Article link to the right

 

Hover Blurb

The Dartmouth College Artificial Intelligence Conference: The Next Fifty Years

AI Magazine article by James Moor, article link provided by Semantic Scholar

 

Alan Turing

Alan Turing was an English mathematician and computer science expert. Visit the Scientific American website for more detail about Turing’s accomplishments.

Photo: © National Portrait Gallery

John Ross Quinlan

Quinlan is an artificial intelligence expert whose work on ID3 and C4.5 is widely recognized. He founded his own company, RuleQuest, and specializes in  Data Mining and Machine Learning.

Edward Feigenbaum

“The Father of Expert Systems”
Knowledge is power, and the computer is an amplifier of that power. We are now at the dawn of a new computer revolution… Knowledge itself is to become the new wealth of nations. ~ Edward Feigenbaum

Source: computerhistory.org

Marvin Minsky

Marvin Minsky’s advances in artificial intelligence and robotics were some of the first well known AI advances.One of his first of several papers and books written was “Steps Towards Artificial Intelligence.”

Photo courtesy of Philip Greenspun: MIT Technology Review

Hover Blurb

AI Technology

A Timeline of Artificial Intelligence

by piero scaruffi

Hover Blurb

Sprints & Methods

Article summary and link coming soon

Hover Blurb

Google Language

Article summary and link coming soon

Hover Blurb

GPS

Article summary and link coming soon

knowledge library

Intelligent System Business Design

 

Michael E Porter Competitive Strategy

The two basic types of competitive advantage combined with the scope of activities for which a firm seeks to achieve them, lead to three generic strategies for achieving above average performance in an industry: cost leadership, differentiation, and focus.

Hover Blurb

Peter Drucker Innovation and Entrepreneurship

PDF link provided from businessnowllc.com; A hardcover edition of this bookwas published by Harper &Row, Publishers, Inc.

Sun Tzu The Art of War

Chinese miliatry general Sun Tzu’s philosophy on how to be a great leader while also focusing on how to win in various capacities.  Forbes writer, Eric Jackson, summarizes Sun Tzu’s 33 best pieces of leadership advice in this article link. Book available for purchase online.

Hover Blurb

Paul Beswick, Partner, Global Head of Oliver Wyman Labs, on competing at the new pace of business: Clock Speed

A New Paradigm for Competition: Clock Speed – Digital disruptors have been a force in business for a decade or more, but their collective impact is now reaching an inflection point.  oliverwyman.com

knowledge library

Security & Risk Information

 

Hover Blurb

Ponemon (Sponsored by HP)

Quantify the economic impact of cyber attacks and observe cost trends over time. Internet attacks include stealing IP, bank accounts, distributing viruses, posting confidential business information, and disrupting a country’s critical national infrastructure.

Hover Blurb

Unrestricted Warfare

Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.

Hover Blurb

Mandiant APT1 Report

The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

SANs 20

The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.

Hover Blurb

Verizon’s Data Breach Investigations Report (DBIR)

Continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them.

Hover Blurb

Symantec

Reports on internet threat data from one of the world’s most comprehensive vulnerability databases.

Hover Blurb

Gartner - Prevention is Futile

Advanced targeted attacks make prevention-centric strategies obsolete. Securing enterprises in 2020 will require a shift to information- and people-centric security strategies, combined with pervasive internal monitoring and sharing of security intelligence.

DHS - Cyber Insurance

Meetings objectives were to Improve the Cyber Insurance Market and encourage establishment of Stakeholder Roles and Responsibilities and encourage the market to move forward.

Hover Blurb

IP Commission Report

On the Theft of Intellectual Property The scale of international theft of American intellectual property (IP) is unprecedented—hundreds of billions of dollars per year.

Hover Blurb

Harvard Journal of Law & Technology

Cyber attacks are increasingly targeting lawyers, and the legal profession must respond more energetically to the threat than it has to date. Volume 26, Number 2 Spring 2013 HACKERS, SPIES, AND STOLEN SECRETS: PROTECTING LAW FIRMS FROM DATA THEFT.