AI Is currently a buzzword in the physical security industry, and it is also a force that has the potential to transform the industry. Following are the basics of AI (and the related term “deep learning") in part one of our AI series.

Artificial intelligence (AI) is the broad computing category referring to intelligence that is displayed by a machine, as opposed to a living creature. Informally, AI refers to machines that mimic the cognitive functions we associate with living creatures, such as learning and problem-solving.

Trends driving growth in AI

Three trends in the computer industry are driving rapid growth in artificial intelligence. The trends are:

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...