|
3NL
|
Three Nested Levels architecture organizing the platform into hierarchical layers of abstraction for agents, knowledge, and system operations.
|
Architecture
|
Intermediate
|
glossary
architecture
3nl
+1
|
8
|
--
|
|
3NL Framework
|
Three Nested Levels: a hierarchical epistemic integration framework that bridges NABLA Infinity axioms to AIAD agent operations across operational, strategic, and emergent systemic layers
|
Epistemic
|
Intermediate
|
glossary
epistemic
3nl-framework
+1
|
21
|
--
|
|
Abstract Syntax Tree (AST)
|
|
Compiler Theory
|
Advanced
|
ast
compiler-theory
metaprogramming
+4
|
10
|
--
|
|
Access Control
|
Mechanisms and policies that regulate who or what can view, use, or modify resources within a system, enforced through authentication, authorization, and role-based permission structures
|
Security
|
Intermediate
|
glossary
access-control
security
+7
|
10
|
--
|
|
Accuracy
|
The degree to which a measurement, computation, or intelligence assessment correctly reflects the true state of affairs, critical for OSINT analysis and data quality validation
|
Data Analytics
|
Intermediate
|
glossary
accuracy
data-quality
+5
|
7
|
--
|
|
ACID Transactions
|
|
Database Systems
|
Intermediate
|
glossary
acid
database
+7
|
10
|
--
|
|
Actor Model
|
|
Elixir
|
Advanced
|
actor-model
concurrency
beam
+10
|
12
|
2026-02-22
|
|
Adapter
|
|
Software Architecture
|
Intermediate
|
glossary
adapter
design-pattern
+7
|
10
|
--
|
|
Adapter Pattern
|
Unified storage interface abstracting 7 backend technologies through Elixir behaviours and compile-time contract enforcement
|
Storage
|
Advanced
|
glossary
architecture
design-patterns
+3
|
12
|
2026-02-22
|
|
Addiction Recovery
|
The platform's epistemic discipline principle requiring constant vigilance against evidence rationalization, cherry-picking, and premature contradiction resolution, analogous to addiction recovery's perpetual vigilance against relapse.
|
Epistemic
|
Advanced
|
epistemic
nabla
doctrine
+2
|
12
|
--
|
|
Adversarial Architecture
|
System design methodology that assumes and accounts for adversarial inputs, hostile environments, and attack vectors by building structured opposition directly into the architecture through continuous red-blue team dynamics and formal verification.
|
Security
|
Advanced
|
security
architecture
color-teams
+2
|
14
|
--
|
|
Adversarial Conditions
|
Operating environments where malicious actors, compromised data sources, hostile network conditions, or epistemic manipulation campaigns actively threaten system integrity, requiring defensive architectures that assume hostile context as the default.
|
Security
|
Advanced
|
security
resilience
threat-modeling
+2
|
13
|
--
|
|
Adversarial Drift
|
Gradual, sub-threshold changes in system behavior induced by adversarial manipulation that individually appear benign but collectively compromise system integrity, analogous to boiling frog syndrome applied to security and epistemic operations.
|
Security
|
Expert
|
security
drift
epistemic
+3
|
13
|
--
|
|
Adversarial Simulation
|
Controlled execution of adversarial scenarios in sandboxed environments with synthetic data to test system resilience, calibrate defenses, and validate epistemic integrity under attack conditions without risking production systems.
|
Security
|
Advanced
|
security
testing
red-team
+3
|
14
|
--
|
|
Adversarial Testing
|
A systematic security testing methodology where testers deliberately adopt an attacker mindset and employ offensive techniques to identify vulnerabilities, weaknesses, and failure modes in software systems before real adversaries can exploit them
|
Security
|
Advanced
|
security
testing
adversarial
+3
|
10
|
--
|
|
Adversarial Thinking
|
A cognitive framework and disciplined mental approach for anticipating hostile actions, reasoning about attacker motivations and capabilities, and designing systems that remain resilient under deliberate, intelligent attack
|
Security
|
Advanced
|
security
cognition
adversarial
+3
|
10
|
--
|
|
Advisory
|
A formal notification or bulletin issued by security organizations, CERTs, or vendors describing vulnerabilities, threats, or recommended actions for system protection
|
Security
|
Intermediate
|
glossary
advisory
security
+6
|
7
|
--
|
|
AES
|
Advanced Encryption Standard -- a symmetric block cipher algorithm adopted as a federal standard, providing fast and secure encryption for data at rest and in transit
|
Security
|
Intermediate
|
glossary
aes
encryption
+6
|
6
|
--
|
|
Agent
|
Autonomous software entity within the AIAD ecosystem that performs specialized tasks with defined authority levels and doctrine compliance.
|
Agent Systems
|
Advanced
|
glossary
architecture
agent
+1
|
12
|
2026-02-22
|
|
Agent Module
|
Elixir module for simple state management around a process
|
Technology
|
Intermediate
|
glossary
technology
agent-module
+1
|
6
|
--
|