TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2019-01-25

AI Tools Can Help Police Fight Crime

AI-based cognitive computing can organise evidence like unstructured audio and video data, transforming it into actionable intelligence.

2019-01-22

AI Will Find You In The Crowd

Neural network researchers say artificial intelligence can detect and identify individuals without facial recognition.

2018-12-27

The Fourth Industrial Revolution Built On Blockchain And AI

The need for Big Data analytics and the combination of AI and blockchain are key components of the Fourth Industrial Revolution.

2018-12-21

Robots And AI Will Create More Jobs Than They Replace

Robotics and AI will displace millions of jobs, but reduced costs and increased spending in some areas could generate a net gain in jobs.

2018-12-17

AI Will Solve Marketing Problems

When it comes to marketing, AI has implications in different dimensions that nudge customers towards the sale.

2018-12-11

US Marines Turn To Artificial Intelligence To Better Deploy Troops

The US Marine Corps is experimenting with AI to improve the way it deploys its forces and spot potential weaknesses years in advance.

2018-12-06

Artificial Intelligence Or Deep Learning? What's The Difference?

AI, machine learning, and deep learning often overlap and are easily confused. Here's a concise guide.

2018-12-05

AI Will Create Employment And Generate New Skills

AI and automation will open the door for scores of new job opportunities, many of which we can’t yet imagine.

2018-12-03

AI Will Monitor 3D Printing

Lockheed Martin and the US Office of Naval Research are exploring how to apply AI to oversee and optimize 3-D printing of complex parts.

2018-11-29

From Machine Learning To Machine Reasoning

AI doesn’t fit the technology adoption lifecycle pattern. Rather it’s a quest… a quest for the intelligent machine.

2018-11-23

Next-Gen Robotic Process Automation Leverages AI And Machine Learning

Kofax’s next-generation robotic process automation platform provides integrated AI, and ‘intuitive’ bot creation and management.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.