Browse Definitions :
605 results for:

strong AI

AI winter

Definition | SearchEnterpriseAI

AI winter is a quiet period for artificial intelligence research and development. In the past few years, AI has been on a long, strong upswing, but ...

Google AI

Definition | WhatIs.com

Google AI is the new name under which Google Research, the search giant’s artificial intelligence (AI) research and development branch, will continue...

narrow AI (weak AI)

Definition | SearchEnterpriseAI

Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates – and perhaps surpasses -- ...

AI accelerator

Definition | SearchEnterpriseAI

An AI accelerator is a microchip designed specifically to enable faster processing of artificial intelligence (AI) tasks.

Asilomar AI Principles

Definition | WhatIs.com

Asilomar AI Principles are 23 main beliefs for guiding the research and development of artificial intelligence (AI).

AI for Good

Definition | SearchEnterpriseAI

AI for Good is a public charity and UN platform that hosts annual summits in Geneva, Switzerland to discuss the beneficial use of artificial ...

strong password

Definition | SearchEnterpriseDesktop

A strong password is one that is designed to be hard for a person or program to discover.

AI governance

Definition | SearchEnterpriseAI

AI governance is the idea that there should be a legal framework for ensuring that machine learning (ML) technologies are well researched and ...

AI code of ethics

Definition | WhatIs.com

An AI code of ethics is a formalized specification guiding the human-generated design of intelligent AI agents and the autonomous behavior of those ...

strong cryptography

Definition | SearchSecurity

Strong cryptography is used by most governments around the world to protect communications. It involves secreted and encrypted communication that is ...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close