Tech + AI + Science NewsTech + AI + Science News
14 item(s)
How frontier enterprises are building an AI advantage new
OpenAI News · 2026-05-06
OpenAI’s B2B Signals research shows how frontier enterprises deepen AI adoption, scale Codex-powered agentic workflows, and build durable competitive advantage.
Introducing ChatGPT Futures: Class of 2026 new
OpenAI News · 2026-05-06
Meet the ChatGPT Futures Class of 2026—26 student innovators using AI to build, research, and drive real-world impact. Discover how this generation is redefining learning, creativity, and opportunity with ChatGPT.
GPT-5.5 Instant: smarter, clearer, and more personalized
OpenAI News · 2026-05-05
GPT-5.5 Instant updates ChatGPT’s default model with smarter, more accurate answers, reduced hallucinations, and improved personalization controls.
GPT-5.5 Instant System Card
OpenAI News · 2026-05-05
Going Full Time on Open Source new
Hacker News · 2026-05-06
Comments
From Supabase to Clerk to Better Auth new
Hacker News · 2026-05-06
Comments
Colombia hosts talks on exiting fossil fuels as global energy crisis deepens new
Hacker News · 2026-05-06
Comments
The Disadvantages of an Elite Education (2008) new
Hacker News · 2026-05-06
Comments
Clinical Trial Results: From Data to Discovery
Brave News
Clinical trial results undergo rigorous analysis and regulatory review before becoming new treatments. Learn how research data transforms into approved therapies.
What If Ed Tech Does More Harm Than Good? (Opinion)
Brave News
Jared: The first meta-analysis of digital technology in education, published in 1977, reported an effect size of about 0.29. Nearly sixty years and tens of thousands of additional studies later, that average effect size is still about 0.29. Think about what’s changed since 1977: personal computing, the internet, cloud computing. If all those developments didn’t significantly move the needle, it suggests the limiting factor may be human learning ...
Nvidia's exposure to Asian supply chains for components hits 90% of its production costs — marked increase from 65% could intensify as physical AI adds even more exposure | Tom's Hardware
Brave News
Memory shortages are killing off older Jetson modules while newer ones compete for the same constrained supply.
Vulnerability Patch Wave Driven By AI Risks: NCSC
Brave News
As part of preparing for the vulnerability patch wave, the NCSC advises organisations to first focus on their external attack surfaces.
Welcome to Maintainer Month: Celebrating the people behind the code
GitHub Blog · 2026-05-05
What maintainers are telling us, what we've shipped, and how to celebrate the people behind open source. The post Welcome to Maintainer Month: Celebrating the people behind the code appeared first on The GitHub Blog .
Register now for OpenClaw: After Hours @ GitHub
GitHub Blog · 2026-05-04
OpenClaw builders will gather at GitHub HQ during Microsoft Build 2026 for demos and conversations. Join in person, or watch the livestream on Twitch. The post Register now for OpenClaw: After Hours @ GitHub appeared first on The GitHub Blog .
Research (arXiv)Research (arXiv)
10 item(s)
FTPrimitiveBench: A Benchmark Suite For Logical Computation Under Hardware-Motivated and Biased Noise Models new
arXiv · 2026-05-05
Fault-tolerant quantum computing requires understanding how error-correcting codes perform on diverse physical hardware. This is typically assessed via noisy stabilizer simulation of logical circuits at HPC scale, combined with a noise model that yields a logical error rate for the relevant code distances and depths. The uniform depolarizing model is the standard baseline, but its homogeneous assumptions fail to capture the heterogeneity, asymmetries, and correlations of real devices, where Pauli, measurement, and spatio-temporal errors are not weakly coupled. Yet these same structured features create opportunities for joint code-hardware co-design, motivating noise models that more faithfully reflect target hardware while remaining tractable to simulate. We introduce FTPrimitiveBench, a systematic benchmarking approach for studying how logical primitives interact with hardware-motivated
Sequential vs. Simultaneous Entanglement Swapping under Optimal Link-Layer Control new
arXiv · 2026-05-05
Connection-less, packet-switched quantum network architectures distribute entanglement across multi-hop paths through sequential entanglement swapping, in which each node acts on purely local state information. The architectural advantages over the connection-oriented alternative -- simultaneous SWAP-ASAP -- are compelling, but sequential swapping holds partial chains in intermediate buffers between successive swaps, exposing them to memory decoherence in a way simultaneous SWAP-ASAP avoids by design. We present a proof-of-principle study at fixed chain length $n = 4$ in which each elementary link is governed by a fixed reinforcement-learning policy optimizing the secret-key rate of the six-state protocol, leaving the network-layer protocol as the sole independent variable. Sweeping the network-layer memory coherence time $T_c^{\mathrm{ext}}$ over four orders of magnitude reveals a clear
A Closed-Form Adaptive-Landmark Kernel for Certified Point-Cloud and Graph Classification new
arXiv · 2026-05-05
We introduce PALACE (Persistence Adaptive-Landmark Analytic Classification Engine), the data-adaptive companion to PLACE, paying a small cross-validation tier on three knobs (budget, radii, bandwidth; $\leq 5$ choices each). A cover-theoretic core (Lebesgue-number criterion on the landmark cover) yields four closed-form guarantees. (i) A structural lower distortion bound $λ(τ;ν)$ on $\mathcal{D}_n$ under cross-diagram non-interference, with a $(D/L)^2$ budget reduction over the uniform grid when diagrams concentrate. (ii) Equal weights $w_k = K^{-1/2}$ maximizing $λ$, and farthest-point-sampling positions $2$-approximating the optimal $k$-center covering radius; both derived from training labels alone, no gradient training. (iii) A kernel-RKHS classification rate $O((k-1)\sqrt{K}/(γ\sqrt{m_{\min}}))$ with binary necessity threshold $m = Ω(\sqrt K/γ)$ from a matching Le Cam lower bound, a
Audio-Visual Intelligence in Large Foundation Models new
arXiv · 2026-05-05
Audio-Visual Intelligence (AVI) has emerged as a central frontier in artificial intelligence, bridging auditory and visual modalities to enable machines that can perceive, generate, and interact in the multimodal real world. In the era of large foundation models, joint modeling of audio and vision has become increasingly crucial, i.e., not only for understanding but also for controllable generation and reasoning across dynamic, temporally grounded signals. Recent advances, such as Meta MovieGen and Google Veo-3, highlight the growing industrial and academic focus on unified audio-vision architectures that learn from massive multimodal data. However, despite rapid progress, the literature remains fragmented, spanning diverse tasks, inconsistent taxonomies, and heterogeneous evaluation practices that impede systematic comparison and knowledge integration. This survey provides the first com
UniCorrn: Unified Correspondence Transformer Across 2D and 3D new
arXiv · 2026-05-05
Visual correspondence across image-to-image (2D-2D), image-to-point cloud (2D-3D), and point cloud-to-point cloud (3D-3D) geometric matching forms the foundation for numerous 3D vision tasks. Despite sharing a similar problem structure, current methods use task-specific designs with separate models for each modality combination. We present UniCorrn, the first correspondence model with shared weights that unifies geometric matching across all three tasks. Our key insight is that Transformer attention naturally captures cross-modal feature similarity. We propose a dual-stream decoder that maintains separate appearance and positional feature streams. This design enables end-to-end learning through stack-able layers while supporting flexible query-based correspondence estimation across heterogeneous modalities. Our architecture employs modality-specific backbones followed by shared encoder a
Ergotropy Protection via Cavity Detuning in Collective Open Quantum Batteries new
arXiv · 2026-05-05
This study investigates the performance and ergotropy protection of open collective quantum batteries subject to superradiant decay. By employing a passive spectral detuning strategy within an intermediate cavity, an optimal detuning value ($Δ^*$) is analytically derived and numerically verified to spectrally isolate the system and protect quantum coherence, achieving up to 1088% ergotropy improvement for single qubits and superextensive collective advantage for $N \ge 3$. Our analysis resolves a "non-Markovian paradox," revealing that maximizing ergotropy does not strictly require non-Markovian memory; rather, suppressing environmental memory via detuning optimally preserves coherence, which serves as the fundamental resource. Survival maps across different environments demonstrate that thermal noise dissipates coherence more severely than telegraph noise. Finally, we establish that col
Large Language Models are Universal Reasoners for Visual Generation new
arXiv · 2026-05-05
Text-to-image generation has advanced rapidly with diffusion models, progressing from CLIP and T5 conditioning to unified systems where a single LLM backbone handles both visual understanding and generation. Despite the architectural unification, these systems frequently fail to faithfully align complex prompts during synthesis, even though they remain highly accurate at verifying whether an image satisfies those same prompts. We formalize this as the \emph{understanding-generation gap} and propose UniReasoner, a framework that leverages the LLM as a universal reasoner to convert its understanding strength into direct generation guidance. Given a prompt, the LLM first produces a coarse visual draft composed of discrete vision tokens. It then performs a self-critique by evaluating the draft for prompt consistency, producing a grounded textual evaluation that pinpoints what needs to be cor
Safety and accuracy follow different scaling laws in clinical large language models new
arXiv · 2026-05-05
Clinical LLMs are often scaled by increasing model size, context length, retrieval complexity, or inference-time compute, with the implicit expectation that higher accuracy implies safer behavior. This assumption is incomplete in medicine, where a few confident, high-risk, or evidence-contradicting errors can matter more than average benchmark performance. We introduce SaFE-Scale, a framework for measuring how clinical LLM safety changes across model scale, evidence quality, retrieval strategy, context exposure, and inference-time compute. To instantiate this framework, we introduce RadSaFE-200, a Radiology Safety-Focused Evaluation benchmark of 200 multiple-choice questions with clinician-defined clean evidence, conflict evidence, and option-level labels for high-risk error, unsafe answer, and evidence contradiction. We evaluated 34 locally deployed LLMs across six deployment conditions
Model order reduction for parametrized variational inequalities: application to crowd motion new
arXiv · 2026-05-05
This work investigates model order reduction for time-dependent parametrized variational inequalities, with a focus on discrete contact problems. As a prototypical example, we consider an agent-based crowd model [Maury et al., 2011] in which agent velocities are obtained at each time step from a constrained least-squares problem. Geometric parameter variations induce significant variability in both agent positions and contact forces, leading to a slowly decaying Kolmogorov $n$-width of the solution manifold. We propose a nonlinear approach that combines a linear reduced-order model with a deep-learning-based correction. The method utilizes a greedy index selection (gIS) algorithm for compressing Lagrange multipliers and Proper Orthogonal Decomposition (POD) applied to velocity snapshots. Additionally, we explore hyper-reduction techniques, comparing the Empirical Interpolation Method (EI
OpenSeeker-v2: Pushing the Limits of Search Agents with Informative and High-Difficulty Trajectories new
arXiv · 2026-05-05
Deep search capabilities have become an indispensable competency for frontier Large Language Model (LLM) agents, yet their development remains dominated by industrial giants. The typical industry recipe involves a highly resource-intensive pipeline spanning pre-training, continual pre-training (CPT), supervised fine-tuning (SFT), and reinforcement learning (RL). In this report, we show that when fueled with informative and high-difficulty trajectories, a simple SFT approach could be surprisingly powerful for training frontier search agents. By introducing three simple data synthesis modifications: scaling knowledge graph size for richer exploration, expanding the tool set size for broader functionality, and strict low-step filtering, we establish a stronger baseline. Trained on merely 10.6k data points, our OpenSeeker-v2 achieves state-of-the-art performance across 4 benchmarks (30B-size
Security (NVD + CISA KEV)Security (NVD + CISA KEV)
14 item(s)
CVE-2025-29165· CVSS 9.8 CRITICAL new
NVD · 2026-03-06
An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component
CVE-2014-125112· CVSS 9.8 CRITICAL new
NVD · 2026-03-26
Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution. Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie.
CVE-2026-31282· CVSS 9.8 CRITICAL new
NVD · 2026-04-13
Totara LMS v19.1.5 and before is vulnerable to Incorrect Access Control. The login page code can be manipulated to reveal the login form. An attacker can chain that with missing rate-limit on the login form to launch a brute force attack. NOTE: this is disputed by the Supplier because (1) local login is enabled/disabled server side (this is not a client side control); (2) there is no evidence SSO login can be bypassed to allow local login; and (3) there is no evidence that local login can be performed when disabled server side.
CVE-2026-4739· CVSS 9.4 CRITICAL new
NVD · 2026-03-24
Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (Modules/ThirdParty/Expat/src/expat modules).This issue affects ITK: before 2.7.1.
CVE-2026-25192· CVSS 9.3 CRITICAL new
NVD · 2026-03-21
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.
CVE-2026-28474· CVSS 9.3 CRITICAL new
NVD · 2026-03-06
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.
CVE-2026-22552· CVSS 9.3 CRITICAL new
NVD · 2026-03-06
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.
CVE-2026-26288· CVSS 9.3 CRITICAL new
NVD · 2026-03-06
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.
CVE-2025-11158· CVSS 9.1 CRITICAL new
NVD · 2026-03-10
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.
CVE-2022-39269· CVSS 9.1 CRITICAL new
NVD · 2022-10-06
PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability.
CVE-2026-4750· CVSS 9.1 CRITICAL new
NVD · 2026-03-24
Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.
CVE-2026-4753· CVSS 9.1 CRITICAL new
NVD · 2026-03-24
Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.
CVE-2026-0300 · Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability new
CISA KEV · 2026-05-06
Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. · Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required. · Due: 2026-05-09
CVE-2026-3288· CVSS 8.8 HIGH new
NVD · 2026-03-10
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
Projects + Resources (Discovery)Projects + Resources (Discovery)
10 item(s)
IMS Bearings - Dataset - NASA Open Data Portal new
Brave Search
Experiments on bearings. The data set was provided by the Center for Intelligent Maintenance Systems (IMS), University of Cincinnati.
GitHub - VictorBauler/awesome-bearing-dataset: Bearing fault detection public datasets collection. · GitHub new
Brave Search
Data Characteristics: Provides high-resolution vibration and motor current signals, both sampled at 64 kHz, in .mat format. Operating Conditions: Data was collected under four conditions, with different combinations of rotational speed (1500/900 RPM), load torque, and radial force. Source: Paderborn University Bearing Datacenter
NASA Bearing Dataset new
Brave Search
Checking your browser before accessing www.kaggle.com · Click here if you are not automatically redirected after 5 seconds
Simple Patch Antenna — openEMS 0.0.35 documentation new
Brave Search
View page source · A simple patch antenna for 2.4 GHz. This tutorial covers: <strong>Setup a patch, substrate and ground</strong>. Setup of a lumped feeding port. Adding a near-field to far-field (nf2ff) recording box. Calculate the S-Parameter of the antenna. Calculate and plot the far-field pattern · Get ...
Tutorials - openEMS new
Brave Search
Tutorial: Microstrip Notch Filter: ... with a open-ended stub to create a simple microwave filter. Tutorial: CRLH Parameter Extraction: Setup a composite-right/left-handed (CRLH) unit cell and extract the equivalent circuit parameter. Tutorial: Coax to Waveguide Adapter: A simple coax to waveguide adapter. Tutorial: Stripline to MSL Transition: A Stripline to MSL transition. Tutorial: Simple Patch Antenna Setup & Simulate a simple patch ...
GitHub - LubomirJagos/OpenEMS-Antenna-Simulations: Complete antenna simulations from rapid design in FreeCAD and simulate using openEMS new
Brave Search
For this reason I focused on FreeCAD which has great scripting capabilities. For now this repository contains just some experimental files which were created on the way how I learned how to simulate basic patch antenna shapes and how to create design in FreeCAD and import it into openEMS.
Introduction — scikit-rf Documentation new
Brave Search
To plot all four s-parameters of the ring_slot in Mag, Phase, and on the Smith Chart. ... The NetworkSet object represents an unordered set of networks and provides methods for calculating statistical quantities and displaying uncertainty bounds. A NetworkSet is created from a list or dict of Networks’s. This can be done quickly with rf.read_all() , which loads all skrf-readable objects in a directory.
Circuits — scikit-rf Documentation new
Brave Search
Unreduced Circuit calculate Network ... Network in 0.0005s Manually reduced circuit has the same s-parameters as the original circuit: True Auto reduced circuit has the same s-parameters as the original circuit: True · [1] Hallbjörner, P., 2003. Method for calculating the scattering matrix of arbitrary microwave networks giving ...
Basic OFDM Tutorial - GNU Radio new
Brave Search
<strong>GNU Radio provides blocks to transmit and receive OFDM-modulated signals</strong>. These blocks are designed in a very generic fashion. As a developer, this means that often, a desired functionality can be achieved by correct parametrization of the available blocks, but in some cases, custom blocks ...
OpenOFDM: Synthesizable, Modular Verilog Implementation of 802.11 OFDM Decoder — OpenOFDM 1.0 documentation new
Brave Search
<strong>OpenOFDM is a open source Verilog implementation of 802.11 OFDM decoder</strong>.