Knowledge Library


The knowledge that you need for familiarization is here. Let us know if there is anything else we can get for you. We will provide it free of charge. 




Privacy & Content Disclaimer

This site includes links to information created by other public and private organizations. These links are provided for the user’s convenience. IMARC Robotics, Inc. does not control or guarantee the accuracy, relevance, timeliness, or completeness of this information. The inclusion of these links is not intended to reflect their importance, nor is it intended to endorse views expressed, or products or services offered. No personal information is collected unless you choose to provide that information to us via our Contact Us page. We do not give, share, sell, or transfer any personal information to a third party.

Knowledge Library

Our Knowledge Library focuses on Artificial Intelligence (AI) Technology, Robotic Systems, Intelligent System Business Design, and Security and Risk Management.

These four (4) distinctive areas are summarized in the table below. Click on the title headers below to learn more about your area of interest.

Artificial Intelligence Technology

Artificial Intelligence (AI) is the foundation upon which we build our systems. AI enables robotic devices to function autonomously as a conveyance device, to carry out analysis and diagnosis of information acquired, and to provide recommendations, or take actions, to achieve optimization of production activities.

Robotic Systems

In-Well Robots and AI are the Future of Oil and Gas Offshore and Onshore. Robots are designed primarily for three markets: (1) Offshore Highly deviated and Horizontal wells, (2) Onshore conventional oil & gas wells, and (3) Unconventional fractured wells. The in-well robots carry “plug and play” tools that are designed to address problems related to each specific market. Robots carry out activities in the wells, both while the wells are producing, or when the well is not producing, and use AI to carry out analysis during the operation of the robot to provide a higher-level product than conventional tools in these markets.

Intelligent System Business Design

Intelligent Agents (IAs) can be integrated with existing products and services to improve their efficacy. IAs can enhance profitability and performance, support business objectives and create value in process improvements, innovation, and/or new paradigms.

Security and Risk Management

Data Security and Risk Management are crucial to success in any deployment of products and services.  Innovative Intelligent Systems that deal with big data and analytics provide corporations with a means of becoming more secure.  

knowledge library

Artificial Intelligence (AI) Technology


Click on the images below to read the full article.

Dartmouth 1956

Five of the attendees of the 1956 Dartmouth Summer Research Project on Artificial Intelligence reunited at the July AI@50 conference. From left: Trenchard More, John McCarthy, Marvin Minsky, Oliver Selfridge, and Ray Solomonoff. (Photo by Joseph Mehling ’69) 


The Dartmouth College Artificial Intelligence Conference: The Next Fifty Years

Magazine article by James Moor, article link provided by Semantic Scholar

Alan Turing

Alan Turing was an English mathematician and computer science expert.

Visit the Scientific American website for more detail about Turing’s accomplishments.

Photo: © National Portrait Gallery

John Ross Quinlan

Quinlan is an artificial intelligence expert whose work on ID3 and C4.5 is widely recognized. He founded his own company, RuleQuest, and specializes in  Data Mining and Machine Learning.

Photo: KDnuggets

Edward Feigenbaum

“The Father of Expert Systems”
Knowledge is power, and the computer is an amplifier of that power. We are now at the dawn of a new computer revolution… Knowledge itself is to become the new wealth of nations. ~ Edward Feigenbaum


Marvin Minsky

Marvin Minsky’s advances in artificial intelligence and robotics were some of the first well known AI advances.One of his first of several papers and books written was “Steps Towards Artificial Intelligence.”

Photo courtesy of Philip Greenspun: MIT Technology Review

knowledge library

Robotic Systems


Articles Coming Soon!

knowledge library

Intelligent System Business Design 

Michael E Porter Competitive Strategy

The two basic types of competitive advantage combined with the scope of activities for which a firm seeks to achieve them, lead to three generic strategies for achieving above average performance in an industry: cost leadership, differentiation, and focus.

Hover Blurb


Society of Petroleum Engineers (SPE) – Real Time Diagnostics of Gas Lift Systems Using Intelligent Agents: A Case Study

Hover Blurb

Peter Drucker Innovation and Entrepreneurship

Summary available from A hardcover edition of this bookwas published by Harper & Row, Publishers, Inc. Link provided by

Hover Blurb


Society of Petroleum Engineers (SPE – Decision Support and Workflow Automation for the Development and Management of Hydrocarbon Assets Using Multi-Agent Systems)

Sun Tzu The Art of War

Chinese miliatry general Sun Tzu’s philosophy on how to be a great leader while also focusing on how to win in various capacities.  Forbes writer, Eric Jackson, summarizes Sun Tzu’s 33 best pieces of leadership advice in this article link. Book available for purchase online.

Hover Blurb

Paul Beswick, Partner, Global Head of Oliver Wyman Labs, on competing at the new pace of business: Clock Speed

A New Paradigm for Competition: Clock Speed – Digital disruptors have been a force in business for a decade or more, but their collective impact is now reaching an inflection point.

knowledge library

Security & Risk Information


Hover Blurb

Ponemon (Sponsored by HP)

Quantify the economic impact of cyber attacks and observe cost trends over time. Internet attacks include stealing IP, bank accounts, distributing viruses, posting confidential business information, and disrupting a country’s critical national infrastructure.

Hover Blurb

Unrestricted Warfare

Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.

Hover Blurb

Mandiant APT1 Report

The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

SANs 20

The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.

Hover Blurb

Verizon’s Data Breach Investigations Report (DBIR)

Continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them.

Hover Blurb


Reports on internet threat data from one of the world’s most comprehensive vulnerability databases.

Hover Blurb

Gartner - Prevention is Futile

Advanced targeted attacks make prevention-centric strategies obsolete. Securing enterprises in 2020 will require a shift to information- and people-centric security strategies, combined with pervasive internal monitoring and sharing of security intelligence.

DHS - Cyber Insurance

Meetings objectives were to Improve the Cyber Insurance Market and encourage establishment of Stakeholder Roles and Responsibilities and encourage the market to move forward.

Hover Blurb

IP Commission Report

On the Theft of Intellectual Property The scale of international theft of American intellectual property (IP) is unprecedented—hundreds of billions of dollars per year.

Hover Blurb

Harvard Journal of Law & Technology

Cyber attacks are increasingly targeting lawyers, and the legal profession must respond more energetically to the threat than it has to date. Volume 26, Number 2 Spring 2013 HACKERS, SPIES, AND STOLEN SECRETS: PROTECTING LAW FIRMS FROM DATA THEFT.