Knowledge Library

The Knowledge You Need for Familiarization Is Here

Our Knowledge Library focuses on three distinctive areas: Artificial Intelligence Technology, Intelligent System Business Design, and Security and Risk Management. Let us know if there is anything else we can get for you. We will provide it free of charge.

AI Technology

Artificial Intelligence Technology is the foundation upon which we build our systems.

Scroll down and click on the corresponding links to read the full text.

2azine article by James Moor, article link provided by Semantic Scholar

Image of Trenchard More, John McCarthy, Marvin Minsky, Oliver Selfridge, and Ray Solomonoff

The Dartmouth College Artificial Intelligence Conference: The Next Fifty Years

Dartmouth 1956 - Five of the attendees of the 1956 Dartmouth Summer Research Project on Artificial Intelligence reunited at the July AI@50 conference. From left: Trenchard More, John McCarthy, Marvin Minsky, Oliver Selfridge, and Ray Solomonoff. (Photo by Joseph Mehling ’69)

Click here to read the full paper.

Alan Turing

Alan Turing

How Alan Turing Cracked the Enigma Code.

Alan Turing was an English mathematician and computer science expert. Visit the Scientific American website for more detail about Turing’s accomplishments.

Photo: © National Portrait Gallery

Edward Feigenbaum

Edward Feigenbaum

Expert Systems: Principles and Practice

The Father of Expert Systems
"Knowledge is power, and the computer is an amplifier of that power. We are now at the dawn of a new computer revolution… Knowledge itself is to become the new wealth of nations."
~ Edward Feigenbaum


Marvin Minsky

Marvin Minsky

Society of Mind

Marvin Minsky’s advances in artificial intelligence and robotics were some of the first well known AI advances.One of his first of several papers and books written was “Steps Towards Artificial Intelligence.”

Photo courtesy of Philip Greenspun: MIT Technology Review

John Ross Quinlan

John Ross Quinlan

Induction of Decision Trees

Quinlan is an artificial intelligence expert whose work on ID3 and C4.5 is widely recognized. He founded his own company, RuleQuest, and specializes in Data Mining and Machine Learning.

Side view of a robot.

AI Technology

What's the Difference Between Robotics and Artificial Intelligence?

The Difference Between Robotics & AI


Google AI logo

Google Language

Read about Google’s AI Philosophy

Intelligent System Business Design

Profitably support business objectives and create value in process improvements, innovation, or new paradigm. The articles provided below explain the use of Intelligent Agents.

Competitive Strategy book cover

Michael E Porter

Competitive Strategy

The two basic types of competitive advantage combined with the scope of activities for which a firm seeks to achieve them, lead to three generic strategies for achieving above average performance in an industry: cost leadership, differentiation, and focus.

Innovation and Entrepreneurship book cover

Peter Drucker

Innovation and Entrepreneurship

A hardcover edition of this book was published by Harper & Row, Publishers, Inc.

Link provided by

Art of War book cover

Sun Tzu

The Art of War

Chinese miliatry general Sun Tzu’s philosophy on how to be a great leader while also focusing on how to win in various capacities. Forbes writer, Eric Jackson, summarizes Sun Tzu’s 33 best pieces of leadership advice in this article link. Book available for purchase online.

Paul Beswick

Paul Beswick

A New Paradigm for Competition: Clock Speed

Paul Beswick, Partner, Global Head of Oliver Wyman Labs, on competing at the new pace of business: Clock Speed. Digital disruptors have been a force in business for a decade or more, but their collective impact is now reaching an inflection point.

Screenshot of the SPE paper

Society of Petroleum Engineers (SPE)

Real Time Diagnostics of Gas Lift Systems Using Intelligent Agents: A Case Study

Screenshot of the SPE paper

Society of Petroleum Engineers

(SPE - Decision Support and Workflow Automation for the Development and Management of Hydrocarbon Assets Using Multi-Agent Systems)

Security & Risk

Security and Risk Management are crucial to success in any deployment of products and services.

Ponemon Study

Ponemon (Sponsored by HP)

Cost of Cyber Crime Study: United States

Quantify the economic impact of cyber attacks and observe cost trends over time. Internet attacks include stealing IP, bank accounts, distributing viruses, posting confidential business information, and disrupting a country’s critical national infrastructure.

Verizon’s Data Breach Investigations Report 2018

Verizon’s (DBIR)

Verizon’s Data Breach Investigations Report (DBIR)

Continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them.

Mandiant APT1 Report

Mandiant APT1 Report

Cyber Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities

The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

Cyber Insurance Roundtable


Cyber Insurance

Meetings objectives were to Improve the Cyber Insurance Market and encourage establishment of Stakeholder Roles and Responsibilities and encourage the market to move forward.

IP Commission Report

IP Commission Report

The Report of the Commisssion on the Theft of American Intellectual Property

On the Theft of Intellectual Property The scale of international theft of American intellectual property (IP) is unprecedented—hundreds of billions of dollars per year.



Critical Security Controls

The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.

Unrestricted Warfare

Unrestricted Warfare

Unrestricted Warfare

Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.

Computer, book, phone, and mouse surrounded by a metal chain and padlocked.


Prevention is Futile

Advanced targeted attacks make prevention-centric strategies obsolete. Securing enterprises in 2020 will require a shift to information- and people-centric security strategies, combined with pervasive internal monitoring and sharing of security intelligence.



Cyber Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities

Reports on internet threat data from one of the world’s most comprehensive vulnerability databases.

Harvard Journal of Law & Technology

Harvard Journal of Law & Technology

Hackers, Spies, and Stolen Secrets

Cyber attacks are increasingly targeting lawyers, and the legal profession must respond more energetically to the threat than it has to date. Volume 26, Number 2 Spring 2013 HACKERS, SPIES, AND STOLEN SECRETS: PROTECTING LAW FIRMS FROM DATA THEFT.

Privacy & Content Disclaimer

This site includes links to information created by other public and private organizations. These links are provided for the user’s convenience. Veloxiti AI Works does not control or guarantee the accuracy, relevance, timeliness, or completeness of this information. The inclusion of these links is not intended to reflect their importance, nor is it intended to endorse views expressed, or products or services offered.