User contributions for Gmelli
Jump to navigation
Jump to search
9 June 2025
- 05:1605:16, 9 June 2025 diff hist −99,822 blnk Blanked the page Tags: Blanking Manual revert
- 05:1505:15, 9 June 2025 diff hist +6,779 N Artificial Applied AI Research Intelligence Created page with "An Artificial Applied AI Research Intelligence is an artificial intelligence system that is an applied AI research framework that can support artificial applied AI research tasks. * <B>AKA:</B> AARI System, Autonomous AI Research Intelligence, Applied AI Research Automation System. * <B>Context:</B> ** It can typically execute Artificial Applied AI Research Experiments through artificial applied AI research autonomous planning and ar..." current
- 05:1505:15, 9 June 2025 diff hist +11,835 N AI Research Evaluation Framework Created page with " An AI Research Evaluation Framework is an AI research system that is an evaluation framework that can support AI research assessment tasks. * <B>AKA:</B> Research Assessment Framework, AI Research Quality Framework, Scientific Evaluation System, AI Research Validation Framework, Research Performance Measurement System, AI Research Review Framework. * <B>Context:</B> ** Task Input: AI Research Work Product, AI Research Ev..."
- 05:1505:15, 9 June 2025 diff hist +11,147 N AI Research Knowledge Graph Created page with " An AI Research Knowledge Graph is an AI research system that is a knowledge graph system that can support AI research knowledge organization tasks. * <B>AKA:</B> Research Knowledge Graph, AI Research Semantic Network, Scientific Knowledge Graph System, AI Research Ontology System, Research Information Graph, AI Research Knowledge Base. * <B>Context:</B> ** Task Input: AI Research Publication Collection, AI Research Datas..." current
- 05:1505:15, 9 June 2025 diff hist +10,814 N AI Research System Created page with " An AI Research System is an AI system that can be used to create research automation solutions (that support research discovery tasks). * <B>AKA:</B> Research AI System, Automated Research System, AI-Powered Research Platform, Intelligent Research Infrastructure, Computational Research Framework, AI Research Engine. * <B>Context:</B> ** Task Input: AI Research Problem Statement, AI Research Domain Specification, AI R..."
- 05:1405:14, 9 June 2025 diff hist +6,352 N AI Research Experimental Pipeline Created page with " An AI Research Experimental Pipeline is an AI research framework that is an experimental workflow system that can support AI research systematic investigation tasks. * <B>AKA:</B> AI Research Workflow Pipeline, Automated AI Research Experimental Framework, AI Research Process Pipeline. * <B>Context:</B> ** Task Input: AI Research Experimental Design, AI Research Data Source Specification, AI Research Computational Requirements..." current
- 05:1305:13, 9 June 2025 diff hist +7,055 N Enterprise Digital Transformation Strategy Created page with " An Enterprise Digital Transformation Strategy is an organizational strategy that can be used to create enterprise technology adoption plans (that support enterprise modernization tasks). * <B>AKA:</B> Digital Business Strategy, Corporate Transformation Plan, Enterprise Modernization Strategy, Technology Transformation Framework. * <B>Context:</B> ** It can typically define Enterprise Digital Transformation Strategy Objective through [..." current
- 05:1305:13, 9 June 2025 diff hist −46,617 blnk No edit summary Tag: Reverted
- 05:1205:12, 9 June 2025 diff hist +6,162 N Enterprise AI Agent Platform Created page with " An Enterprise AI Agent Platform is an AI agent development environment that can be used to create enterprise autonomous AI solutions (that support enterprise AI automation tasks). * <B>AKA:</B> Business AI Agent Framework, Corporate Agent Platform, Enterprise Autonomous System, AI Agent Infrastructure. * <B>Context:</B> ** It can typically orchestrate Enterprise AI Agent Platform Agent through enterprise ai agent platform coordinati..." current
- 05:1105:11, 9 June 2025 diff hist +6,806 N Enterprise Meeting Transcription System Created page with " An Enterprise Meeting Transcription System is an automated speech-to-text transcription system that can be used to create enterprise meeting documentation solutions (that support enterprise meeting analysis tasks). * <B>AKA:</B> Business Meeting Transcription, Corporate Meeting Recording, Enterprise Audio Analysis, Meeting Intelligence System. * <B>Context:</B> ** It can typically capture Enterprise Meeting Transcription System Audio..."
- 05:1105:11, 9 June 2025 diff hist +6,541 N Enterprise Cloud Integration Connector Created page with " An Enterprise Cloud Integration Connector is an enterprise integration system that can be used to create enterprise cloud connectivity solutions (that support enterprise data access tasks). * <B>AKA:</B> Enterprise Cloud Connector, Business Cloud Integration, Corporate Data Connector, Enterprise Service Connector. * <B>Context:</B> ** It can typically establish Enterprise Cloud Integration Connector Connection through enterprise clo..."
- 05:0905:09, 9 June 2025 diff hist +46 Autonomous Collaborative LLM-Agent Workspace No edit summary current
- 05:0805:08, 9 June 2025 diff hist +30 Token-Based LLM Safety Bypass Attack No edit summary current
- 05:0705:07, 9 June 2025 diff hist −30 Constitutional AI Filter No edit summary current
- 05:0705:07, 9 June 2025 diff hist +38 N Safety Classifier System Redirected page to Constitutional AI Filter current Tag: New redirect
- 05:0705:07, 9 June 2025 diff hist +38 N AI Constitutional Defense Redirected page to Constitutional AI Filter current Tag: New redirect
- 05:0705:07, 9 June 2025 diff hist +5,376 N Constitutional AI Filter Created page with "A Constitutional AI Filter is a AI safety defense system that can be used to create constitutional classifier protections (that support constitutional classifier input output filtering through constitutional classifier synthetic data training). * <B>AKA:</B> Constitutional AI Filter, Safety Classifier System, AI Constitutional Defense. * <B>Context:</B> ** It can typically implement Constitutional Classifier Input Filters with consti..."
- 05:0705:07, 9 June 2025 diff hist −5,339 Constitutional Classifier Redirected page to Constitutional AI Filter current Tag: New redirect
- 05:0605:06, 9 June 2025 diff hist +28 N Goal-Directed Activity Redirected page to Performed Task current Tag: New redirect
- 05:0605:06, 9 June 2025 diff hist +28 N Goal-Oriented Activity Redirected page to Performed Task current Tag: New redirect
- 05:0605:06, 9 June 2025 diff hist +28 N Completed Activity Redirected page to Performed Task current Tag: New redirect
- 05:0605:06, 9 June 2025 diff hist +28 N Executed Task Redirected page to Performed Task current Tag: New redirect
- 05:0605:06, 9 June 2025 diff hist +123 Performed Task No edit summary current
- 05:0405:04, 9 June 2025 diff hist −6 Act Changed redirect target from Performed Task to Activity current Tag: Redirect target changed
- 05:0405:04, 9 June 2025 diff hist −6 act Changed redirect target from Performed Task to Activity current Tag: Redirect target changed
- 05:0405:04, 9 June 2025 diff hist +3,412 Performed Task No edit summary
- 05:0305:03, 9 June 2025 diff hist −5 Activity No edit summary
- 05:0305:03, 9 June 2025 diff hist +3,618 Activity No edit summary
- 05:0105:01, 9 June 2025 diff hist −3 Activity Removed redirect to Performed Task Tag: Removed redirect
- 05:0105:01, 9 June 2025 diff hist −6 activity Changed redirect target from Performed Task to Activity current Tag: Redirect target changed
- 05:0105:01, 9 June 2025 diff hist +4,078 N Malicious Activity Created page with "A Malicious Activity is an activity that is deliberately performed to cause harm, damage, or unauthorized access to systems, data, or resources. * <B>AKA:</B> Malicious Act, Harmful Activity, Malevolent Action. * <B>Context:</B> ** It can typically target Computer Systems through cyberattack methods. ** It can typically compromise Data Assets through unauthorized access techniques. ** It can typically disrupt..." current
- 04:5904:59, 9 June 2025 diff hist +27 N malicious act Redirected page to Malicious Act Tag: New redirect
- 04:5904:59, 9 June 2025 diff hist +32 N Malicious Act Redirected page to Malicious Activity current Tag: New redirect
- 04:5904:59, 9 June 2025 diff hist +27 N malicious activity Redirected page to Malicious Act Tag: New redirect
- 04:5804:58, 9 June 2025 diff hist +29 N Security Compromise Attempt Redirected page to Security Attack current Tag: New redirect
- 04:5804:58, 9 June 2025 diff hist +29 N Hostile Security Action Redirected page to Security Attack current Tag: New redirect
- 04:5804:58, 9 June 2025 diff hist +29 N Security Breach Attempt Redirected page to Security Attack current Tag: New redirect
- 04:5804:58, 9 June 2025 diff hist +4,679 N Security Attack Created page with "A Security Attack is a malicious activity that attempts to compromise security controls to achieve security attack unauthorized objectives. * <B>AKA:</B> Security Breach Attempt, Hostile Security Action, Security Compromise Attempt. * <B>Context:</B> ** It can typically target Security Attack Vulnerability through security attack exploitation attempts. ** It can typically threaten Security Attack Asset via sec..." current
- 04:5804:58, 9 June 2025 diff hist +29 N security attack Redirected page to Security Attack current Tag: New redirect
- 04:5604:56, 9 June 2025 diff hist +4,749 Security Vulnerability Exploit Removed redirect to Security Exploit current Tag: Removed redirect
- 04:5604:56, 9 June 2025 diff hist −4,762 Security Exploit Redirected page to Security Vulnerability Exploit current Tag: New redirect
- 04:5604:56, 9 June 2025 diff hist +30 N Vulnerability Exploitation Redirected page to Security Exploit Tag: New redirect
- 04:5504:55, 9 June 2025 diff hist +30 N Security Vulnerability Exploit Redirected page to Security Exploit Tag: New redirect
- 04:5504:55, 9 June 2025 diff hist +30 N Exploit Redirected page to Security Exploit Tag: New redirect
- 04:5504:55, 9 June 2025 diff hist +4,806 N Security Exploit Created page with "A Security Exploit is a security attack that takes advantage of security vulnerabilities to achieve security exploit unauthorized objectives. * <B>AKA:</B> Exploit, Security Vulnerability Exploit, Vulnerability Exploitation, Security Breach Method. * <B>Context:</B> ** It can typically leverage Security Exploit Vulnerability through security exploit attack mechanisms. ** It can typically bypass Security E..."
- 04:5504:55, 9 June 2025 diff hist +46 N Software Vulnerability Exploit Redirected page to Software System Security Exploit current Tag: New redirect
- 04:5504:55, 9 June 2025 diff hist +46 N Software Exploit Redirected page to Software System Security Exploit current Tag: New redirect
- 04:5504:55, 9 June 2025 diff hist +46 N System Security Exploit Redirected page to Software System Security Exploit current Tag: New redirect
- 04:5404:54, 9 June 2025 diff hist +547 Software System Security Exploit No edit summary current
- 04:5304:53, 9 June 2025 diff hist +30 N security exploit Redirected page to Security Exploit Tag: New redirect