A History Of Artificial Intelligence And Its Current & Future Development [extract]

A History Of Artificial Intelligence And Its Current & Future Development


Research Report: This Premium article is exclusive to premium  subscribers. For unrestricted website access please Subscribe: £5 monthly / £50 annual.



Artificial Intelligence (AI) is defined as computer systems that simulate human thinking and capacities such as learning.  Modern AI is made up of different categories of systems that each have unique specialisations. 

Common AI Types

AI systems generally are divided into four main types.  They are similar to the weak and strong categories in that they start from practical applications that exist today and evolve to envision what could exist in the future. These are:-

1. Reactive Machines: As the name implies, reactive machines are the simplest form of artificial intelligence systems: They react to what is put in front of them. Their performance is reliable, as they will respond the same way to the same stimuli every time. 

On the other hand, they have a very limited functionality set because the AI will not learn or grow over time. 
A famous example of this is IBM’s chess-playing computer Deep Blue, which relied on programmed rules and variables to understand the game of chess.

2. Limited Memory: Limited memory AI systems have some capacity to recall information and make predictions as to what function is needed. They do require human feedback to train the machine to learn how best to perform in each instance. 

A common example of this type of AI would be the automated chatbots that many organisations use as a way to scale their customer support and streamline their interactions.

3. Theory of Mind: Theory of mind is the first theoretical stage of AI development. It does not exist currently, but it represents the point when an artificial intelligence system will be able to discern emotion as it makes a decision about how to respond to a prompt from a user. 

A system might be able to understand if there is an urgent tone in someone’s voice or if someone is frustrated. This capacity would enable the system to adjust its responses to different situations far beyond what is possible today.

4. Self-Awareness: In the very distant future, an AI system that has mastered theory of mind might be able to reach a stage of self-awareness. In this stage, the system would understand what it is and that it was made by humans. 

 A self-aware AI system would essentially have human-level consciousness, which would allow it to adapt to immensely complex situations. This development would rely on vastly more advanced technology than what we have today.

(Full article length: 3,250 words)

To continue reading please Subscribe

« Cyber Threat Forecast Part 2 - India   
File Transfers Can Be The Weakest Link »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.