Knowledge Library

 

The knowledge that you need for familiarization is here.

Let us know if there is anything else we can get for you.

We will provide it free of charge.

 

articlesNews Blog

Our Focus

Our Knowledge Library

focuses on three

distinctive areas:

Artificial Intelligence Technology

is the foundation upon which we build our systems. 

Intelligent System Business Design

Profitability support business objectives and create value in process improvements, innovation, or new paradigm. 

Security and Risk Management

are crucial to success in any deployment of products and services.

knowledge library

AI Technology

 

Hover Blurb

AI Technology

Hover Blurb

Google Language

Article summary goes here or hover CSS settings.
Hover Blurb

GPS

Article summary goes here or hover CSS settings.
Alan Turing Ross Quinlan IMB  Edward Feigenbaum Marvin Minsky
Hover Blurb

Dartmouth 1956

Article summary goes here or hover CSS settings.
Hover Blurb

Sprints & Methods

Article summary goes here or hover CSS settings.
Hover Blurb

Methods

Article summary goes here or hover CSS settings.
Hover Blurb

SPE Papers

knowledge library

Intelligent System Business Design

 

Michael E Porter Competitive Strategy

Hover Blurb

Peter Drucker Innovation and Entrepreneurship

Hover Blurb
Clock Speed
Sun Tzu The Art of War
Hover Blurb
Society of Petroleum Engineers (SPE) – Real Time Diagnostics of Gas Lift Systems Using Intelligent Agents: A Case Study
Hover Blurb
Society of Petroleum Engineers (SPE – Decision Support and Workflow Automation for the Development and Management of Hydrocarbon Assets Using Multi-Agent Systems)
Hover Blurb
Innovators Dilemma
Hover Blurb
Engineers

knowledge library

Security & Risk Information

 

Hover Blurb

Ponemon (Sponsored by HP)

Quantify the economic impact of cyber attacks and observe cost trends over time. Internet attacks include stealing IP, bank accounts, distributing viruses, posting confidential business information, and disrupting a country’s critical national infrastructure.
Hover Blurb

Unrestricted Warfare

Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.
Hover Blurb

Mandiant APT1 Report

The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

SANs 20

The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.
Hover Blurb

Verizon’s 2015 Data Breach Investigations Report (DBIR)

Continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them.
Hover Blurb

Symantec

Reports on internet threat data from one of the world’s most comprehensive vulnerability databases.
Hover Blurb

Gartner - Prevention is Futile

Advanced targeted attacks make prevention-centric strategies obsolete. Securing enterprises in 2020 will require a shift to information- and people-centric security strategies, combined with pervasive internal monitoring and sharing of security intelligence.

DHS - Cyber Insurance

Meetings objectives were to Improve the Cyber Insurance Market and encourage establishment of Stakeholder Roles and Responsibilities and encourage the market to move forward.
Hover Blurb

IP Commission Report

On the Theft of Intellectual Property The scale of international theft of American intellectual property (IP) is unprecedented—hundreds of billions of dollars per year.
Hover Blurb

Harvard Journal of Law & Technology

Cyber attacks are increasingly targeting lawyers, and the legal profession must respond more energetically to the threat than it has to date. Volume 26, Number 2 Spring 2013 HACKERS, SPIES, AND STOLEN SECRETS: PROTECTING LAW FIRMS FROM DATA THEFT.