In this report, we will assess the usage of AI in the context of drones, especially autonomous and semi-autonomous drones. We address the following questions:
Contents:
Management Summary
Introduction
AI-enhanced Drones – Use Cases, Value, Drivers and Inhibitors
IT Providers Leveraging the Opportunities Offered by AI-enhanced Drones
PAC’s Recommendations
SHARE :
Secure Access Service Edge (SASE) is still a hot topic in cybersecurity. It has been hyped by many vendors, IT and security service providers, and ...
Event Date : December 01, 2023
With the Corporate Sustainability Reporting Directive set to take effect at the start of the 2024 financial year, European companies are gearing up ...
Event Date : February 06, 2024
This Excel document delivers market figures broken down by products and services. Figures cover a seven-year time frame (results from the past two ...
Event Date : December 03, 2024
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : December 20, 2024
This short vendor profile provides a quick overview of the local portfolio and performance of Oracle in the US.
Event Date : March 28, 2025
Workday - Figures - Worldwide - FY 31-Jan-2025
Datamart August 15, 2025
Workday - Vendor Profile - Worldwide
Vendor Profile August 15, 2025
DXC Technology - Figures - Switzerland - FY 31-Mar-2025
Datamart August 15, 2025
DXC Technology – Vendor Profile – Switzerland
Vendor Profile August 15, 2025
SAP - Figures - Germany - FY 31-Dec-2024
Datamart August 14, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 3: Navigating the Cybersecurity Rulebook: A Business Guide to Key Regulations and Standards
Blog Post August 12, 2025
GenAI Search Is Disrupting Customer Engagement
Blog Post August 11, 2025
Swiss Manufacturing Faces U.S. Tariffs: Implications for the Swiss IT Industry
Blog Post August 08, 2025
Wired for Growth: Network Infrastructure as the Economy’s Nervous System
Blog Post August 05, 2025
Part 2: Decoding GRC: What Governance, Risk, and Compliance Mean in Cybersecurity
Blog Post August 05, 2025