AI Topics

Filter by Categories

Explore Concepts

Get to know terms and and topics across innovation, development, industry, society, and culture.

AI brain icon with magnifying glass revealing internal connections

What is Explainability and Interpretability?

Explainability and interpretability in AI ensure transparency and trust, especially in sensitive sectors like healthcare and education, supporting accountability and informed decision-making for mission-driven organizations.
Learn More >

Social Innovation

Definitions focused on work to improve life for people and planet.

Checklist clipboard next to AI brain icon symbolizing language model evaluation

Model Evaluation for LLMs

Model evaluation for large language models ensures accuracy, fairness, and safety, helping organizations deploy AI responsibly across diverse sectors like education, healthcare, and humanitarian aid.
Learn More >
Digital text blocks transforming into audio waves from speaker icon

Text to Speech

Text-to-Speech technology converts written text into natural-sounding speech, enhancing accessibility across literacy, vision, and language barriers in various sectors including health, education, and humanitarian aid.
Learn More >
Justice scale balancing data blocks with pink and neon purple accents

Data Justice

Data justice ensures fairness in data collection and use, addressing power imbalances and promoting equity across sectors like health, education, and humanitarian aid.
Learn More >

Sustainable Development

Terms associated with development policy, funding, and delivery systems.

Digital Transformation for Social Impact

Digital transformation integrates technology with organizational change to enhance equity, efficiency, and impact in mission-driven...

Learn More >

Nonprofit office digitizing paper files into digital icons

Exit and Portability

Exit and portability enable organizations to move data and applications across platforms, preventing vendor lock-in...

Learn More >

Data blocks transferring between servers symbolizing portability and exit

Key Management

Key management involves securely handling cryptographic keys to protect sensitive data, ensuring trust and compliance...

Learn More >

Secure key vault with multiple cryptographic keys hanging inside

Agent Frameworks

Agent frameworks enable developers to build autonomous software agents that automate complex workflows, enhancing efficiency...

Learn More >

network of AI agent nodes connected performing tasks

Proximatepedia List of Concepts

Academic & Research Institutions shaping Evidence & Standards Accelerators Market Landscape Accessibility by Design Accessibility Services Accountability and Escalation Paths Agent Frameworks Agile Delivery in Mission Contexts AI Ethics AI Governance Operating Model AI in Human Rights Frameworks AI Readiness Frameworks AI System Architecture AI Value Chain AI-Supported Mentorship and Coaching AIOps Algorithmic Bias and Fairness Anti Corruption Analytics API Gateways APIs and SDKs Artificial Intelligence (AI) Attention and Transformers Autoscaling and Load Balancing Backups and Disaster Recovery Batch Processing Benchmarking and Leaderboards Beneficiary Support Chatbots Bilateral & Multilateral Institutions in AI Governance Build vs Buy vs Partner Decisions Caching and CDNs Campaign Personalization Capability Maturity Models Carbon Accounting for AI Case Management Systems Cash and Voucher Assistance Targeting Change Fatigue and Adoption Barriers Change Management for Tech Adoption Chatbots and Assistants Child Online Protection in AI Systems Chip Supply Chains and Foundries CI and CD for Data and ML Civic Engagement and Participatory Platforms Civil Society & Community Organizations as Local AI Stewards Cloud Service Providers Command Line Interfaces (CLI) Communities of Practice and Learning Loops Computer Vision Consent Management Containers and Docker Content Authenticity and Watermarking Content Management Systems Continuous Learning Systems Cooling and Data Center Design Copilot Interfaces CRM Platforms Crop Yield and Food Security Modeling Cross Border Data Transfers and Data Residency CUDA and ROCm basics Data Collection and Labeling Data Exfiltration Data Justice Data Lake, Warehouse, Lakehouse Data Minimization and Purpose Limitation Data Pipelines Data Protection Laws Data Provenance and Lineage Data Supply Chains Data Visualization and BI Dataset Licensing and Consent Datasheets for Datasets De Identification and Pseudonymization Deep Learning Differential Privacy Diffusion Models Digital Divide and Connectivity Gaps Digital ID and Authentication Policies Digital Literacy for AI Digital Public Goods Digital Transformation for Social Impact Donors & Philanthropic Foundations in AI Adoption Early Warning for Climate and Disasters Edge Computing Education Tutoring and Learning Companions Email Service Providers Embeddings Encryption at Rest and In Transit Energy Use in AI Workloads Epidemiological Surveillance and Forecasting Ethical Responsibilities of AI Users ETL and ELT Event Driven Architecture Event Tracking and Analytics Exit and Portability Experiment Tracking for ML Explainability and Interpretability Fair Compensation in Annotation Markets Fairness Metrics and Audits Feature Flagging and A B Testing Feature Stores Federated Learning Field Data Collection Apps Foundation Models Fraud, Waste, and Abuse Detection Fundraising Optimization and Donor Segmentation Gender and AI Generative AI GIS and Remote Sensing Tools Governments & Public Agencies as AI Regulators & Users GPU and TPU Acceleration Grant Triage and Review Assistance GraphQL Grievance and Redress Mechanisms gRPC Guardrails for AI Hallucination Health Triage and Clinical Decision Support High Availability and Fault Tolerance Homomorphic Encryption Hotline and Triage Automation Human Agency and Autonomy in AI Workflows Human Centered Design for AI Human in the Loop and Human on the Loop Human in the Loop Labeling Human Oversight and Decision Rights Hybrid Human–AI Teams Identity and Access Management (IAM) Incident Response for AI Systems Inclusive Hiring in an AI Context Information Asymmetry Integration Middleware Intellectual Property and Training Data Interoperability Standards Investors & Impact Funds shaping Capital Flows for AI Jailbreaks and Safety Bypasses JSON Web Tokens (JWT) Key Management Knowledge Commons Knowledge Sovereignty and Indigenous Data Sovereignty Kubernetes and Orchestration Labor Conditions in Data Work Language Inclusion and Low Resource Languages Large Language Models (LLMs) Latency, Throughput, Concurrency Leadership Competencies for AI Adoption Lean Experimentation and Pilot to Scale Logic Models and Outcome Mapping Low Code and No Code Machine Learning (ML) Measurement for Improvement vs Accountability Mental Health and Wellbeing Assistants Message Queues and Brokers Microservices vs Monoliths Misinformation and Content Integrity Tools MLOps Mobile Application Frameworks Model and Dataset Licensing Model Cards and System Cards Model Compression and Distillation Model Evaluation for LLMs Model Hubs and Registries Model Serving and Endpoints Model Supply Chain Security Model Training vs Inference Monitoring & Evaluation Providers as AI-augmented Accountability Agents Monitoring and Alerting for ML Monitoring, Evaluation, and Learning Automation Multi-Factor Authentication (MFA) Multilingual Models Multimodal Models Named Entity Recognition (NER) Natural Language Processing (NLP) Natural Language Understanding (NLU) Networks & Associations enabling Collective Learning Nonprofits & NGOs in an AI World OAuth Observability (logs, metrics, traces) Offline First and Sync Omni Channel Communications Open Data Open Source Communities and Governance Open Source Licensing in Practice Open Weights vs Closed Weights OpenID Connect (OIDC) Operating Models for Digital Teams Optical Character Recognition (OCR) Organizational Culture and AI Readiness Outcome and Impact Dashboards Participatory Design and Co Creation Payments and Donation Gateways Perplexity and Calibration Portfolio Approach to Innovation Predictive Analytics for Program Planning Privacy Threats and Data Leakage Private Sector Tech Companies as Builders & Partners Procurement and Vendor Risk Procurement for AI and Open Source Program Targeting and Eligibility Prompt Injection Prompting and Prompt Design Public Finance Transparency Public Interest Technology Regulatory Landscape Reinforcement Learning Relational vs Document Databases Remote and Distributed Collaboration Tools Responsible AI Responsible Data Sharing Collaboratives REST Retrieval Augmented Generation (RAG) Risk Assessment for AI Route Optimization for Field Operations Safety Evaluations and Red Teaming SAML Sandboxes and Controlled Pilots SBOM and Dependency Provenance Scheduling Platforms Secrets Management Secrets Vaults and KMS Secure Enclaves and Trusted Execution Serverless Computing Single Sign-On (SSO) SMS and Messaging APIs Social Enterprises and AI Innovation Social License to Operate Speech to Speech Speech to Text Standards Bodies and Protocols Startups & Innovators in AI for Good Stream Processing Supervised Learning Supply Chain and Humanitarian Logistics Surveillance Risks and Safeguarding Survey and Form Platforms Sustainability and Sunsetting Plans Synthetic Data Text to Speech Theory of Change in the AI Era Third Party Risk Management Tokens and Context Window Topic Modeling Total Cost of Ownership for AI Systems Toxicity and Content Moderation Transfer Learning Translation and Localization at Scale Transparency Reporting Unsupervised Learning Vector Databases Vector Similarity Search Volunteer Management and Matching Water, Sanitation, and Hygiene Monitoring Web Application Frameworks Webhooks WebSockets Workflow Automation Platforms Workforce Transformation in the AI Era Zero Trust Architecture
Filter by Categories