The IQ of a shrimp

CCTV Handbook 2018 Editor's Choice, Integrated Solutions, Infrastructure, Security Services & Risk Management

The world is full of reports and predictions about how artificial intelligence (AI) and deep learning (DL) will change the future. Some see the changes as positive, others as negative, and still others are predicting a robot apocalypse.

But what exactly is AI? How does it work? What’s the difference between AI and the current video analytics capabilities we see from many vendors?

Bernard Senekal, MD of Naxian Systems explains that current analytics is based on linear processes: if one event occurs, another follows and so on. That is not AI. Artificial intelligence is non-linear, it learns and makes predictions about what will happen based on analysis of past data instead of step-by-step processes.

And despite all the talk of AI and robots taking over the world, he says today’s AI has about the IQ of a shrimp, so we still have some time left.

The foundation for this AI learning is data. An AI system is trained by providing it with large amount of data to analyse, from which it can learn. Each bit of data is analysed and categorised, and applied to a model (which is the heart of AI). The more data there is to analyse, the better the model is ‘populated’ and the better the system learns.

During its analysis, the AI learns how one event or ‘thing’ influences another in a positive or negative manner. These events and things add up to allow the system to eventually predict when something will happen.

“An AI will deliver intelligence based on current data that says there is a probability that ‘x’ may happen within a certain timeframe,” explains Senekal.

End of life AI

Take the life of a hard drive as an example. In a data centre, you can’t simply stop a server to check on the status of the hard drives, but you still want to know which drives are nearing failure so you can replace them without causing problems or downtime. Naxian has fed its AI, called Annie ((Artificial Neural Network Inside Everything), with data from millions of hard drives as they perform over their lifespans.

Agent Annie monitors the drives in the data centre continuously, collecting various pieces of data about each drive (what exactly is measured we weren’t told as it is the secret sauce that makes the solution so valuable to clients). Because so many drives were analysed at the start of the modelling process, Annie is able to detect when certain readings of the drive dip below a threshold, indicating the device is about to fail. This provides the administrators with ample warning to replace the drive before the problem escalates. (As an aside, Naxian has patents for six of Annie’s algorithms.)

In the security world, the same process could be used to monitor the infrastructure of an estate (or any other security infrastructure) on a continual basis. Once enough data has been analysed, Annie would be able to warn that a UPS is losing battery power, or a camera is about to fail, or that a surge protector isn’t capable of protecting anything anymore. The list is endless, from the component on an electric fence through to the control room.

Electronic profiling

Of course, the question must be asked, how does Annie know what devices are on the network? We don’t want to go through a drama of integration and software development just to get things talking to Annie. Senekal explains that this is not necessary as Annie creates a profile of devices on the network by observing what they do and determines what they are from that profile – a camera, an air conditioner or a surge protector etc.

Annie watches the devices and learns their behaviours, and over time is able to build the knowledge to predict when something is wrong or when maintenance is required (assuming these are devices she has not been able to model from past data). This intelligence has been developed by Naxian and will soon be at the stage where Annie can be attached to a network and will be able to automatically identify the attached components, communicate with them and observe them without any manual intervention.

Real AI, therefore, offers real-time operational intelligence that delivers value, not post-event reports.

Of course, Senekal is aware of the importance of post-event reports and this is actually another area where Annie plays a roll. AI allows for a new type of reporting where large sets of data can be compared and delivered to the relevant person, not only reporting on what happened in the last six or 12 months, but discovering trends and patterns over all the data one can provide.

This allows executives to make decisions, develop business models and create strategies based on huge amounts of structured and unstructured data that are analysed and presented in a way that looks ahead and not backwards.

The effectiveness of AI, as mentioned above, depends on data and this is why an AI system must be able to collect data from anywhere. Whether it’s structured data such as financial statements, or unstructured data such as chats over the Internet or random directories with any number of files or various types.

Proof of value

Senekal notes that many executives are somewhat sceptical about what AI can do for them, so Naxian has developed a process it calls ‘Proof of Value’ (PoV) – as opposed to a Proof of Concept. He says a PoC solves yesterday’s problems, while PoV delivers measurable value for tomorrow.

IN a PoV, Annie will be applied to a small part of the potential client’s data and show what results can be delivered. Once executives see what can be done, the sale is made.

Summing it up, Senekal says, “AI is not about the theory of how things can or could be done, it is about the results, the output.”

For more information contact Naxian, +27 (0)87 820 0620, bernards@naxiansystems.com, www.naxiansystems.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.