Tech + AI + Science NewsTech + AI + Science News
14 item(s)

Tech + AI + Science News
'Millions' of pounds saved by replacing Palantir
Hacker News
'Millions' of pounds saved by replacing Palantir tech in refugee system new
Hacker News · 2026-05-14
Comments
Tech + AI + Science News
A few words on DS4
Hacker News
A few words on DS4 new
Hacker News · 2026-05-14
Comments
Tech + AI + Science News
OVMS: Open source electric vehicle remote monitoring,
Hacker News
OVMS: Open source electric vehicle remote monitoring, diagnosis and control new
Hacker News · 2026-05-14
Comments
Tech + AI + Science News
Infracost (YC W21) Is Hiring Sr Dev
Hacker News
Infracost (YC W21) Is Hiring Sr Dev Advocate to make agents cloud cost-aware new
Hacker News · 2026-05-14
Comments
Tech + AI + Science News
Helping ChatGPT better recognize context in sensitive
OpenAI News
Helping ChatGPT better recognize context in sensitive conversations new
OpenAI News · 2026-05-14
Learn how new ChatGPT safety updates improve context awareness in sensitive conversations, helping detect risk over time and respond more safely.

Tech + AI + Science News
Building a safe, effective sandbox to enable
OpenAI News
Building a safe, effective sandbox to enable Codex on Windows
OpenAI News · 2026-05-13
Learn how OpenAI built a secure sandbox for Codex on Windows, enabling safe, efficient coding agents with controlled file access and network restrictions.

Tech + AI + Science News
Our response to the TanStack npm supply
OpenAI News
Our response to the TanStack npm supply chain attack new
OpenAI News · 2026-05-13
OpenAI details its response to the TanStack “Mini Shai-Hulud” supply chain attack, outlines protections taken to secure systems and signing certificates, and explains why macOS users must update OpenAI apps by June 12, 2026. Learn what happened, what was affected, and how OpenAI is strengthening defenses against evolving software supply chain threats.

Tech + AI + Science News
How finance teams use Codex
OpenAI News
How finance teams use Codex
OpenAI News · 2026-05-12
See how finance teams can use Codex to build MBRs, reporting packs, variance bridges, model checks, and planning scenarios from real work inputs.
Tech + AI + Science News
Microsoft May 2026 Patch Tuesday fixes 120
Brave News
Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days new
Brave News
Today is Microsoft's May 2026 Patch Tuesday, with security updates for 120 flaws and no zero-days disclosed this month.
Tech + AI + Science News
White House Considers AI Vetting, Sparks Tech
Brave News
White House Considers AI Vetting, Sparks Tech Industry Panic new
Brave News
The White House is scrambling to find its footing on AI policy, as the development of new, more powerful models forces the Trump administration to rethink its strategy on AI safety. From the outset of President Trump’s second term, the White House has promoted a pro-innovation, light-touch ...
Tech + AI + Science News
$200 'socketed' Nvidia AI GPU for servers
Brave News
$200 'socketed' Nvidia AI GPU for servers hacked into a PCIe card with custom PCB and 3D-printed cooling — modded Tesla V100 SMX data center GPU runs AI LLMs and is more efficient than many modern midrange offerings in A new
Brave News
Exclusive hardware roadmaps: Peer into the future of the hardware industry. ... Daily news analysis: Dive deep into the biggest stories. Subscribe to our annual plan for just $29 ... GPUs AMD announces MI350P PCIe AI accelerator card with 144GB of HBM3E — roughly 40% faster in FP16 and FP8 ...
Tech + AI + Science News
New AI Benchmarking Reveals Leading AI Chatbots––Including
Brave News
New AI Benchmarking Reveals Leading AI Chatbots––Including
Brave News
Currently, no other standard exists ... establishing a remarkable benchmark that current and future models can be audited against.” – · Kara Emery, PhD, Director of Data Science, AI Hub, McSilver Institute for Poverty Policy and Research, New York University...
Tech + AI + Science News
New quantum algorithm solves “impossible” materials problem
ScienceDaily — Artificial Intelligence
New quantum algorithm solves “impossible” materials problem in seconds
ScienceDaily — Artificial Intelligence · 2026-05-13
A new quantum-inspired algorithm has cracked a problem so massive that conventional supercomputers struggle to even approach it. Researchers used the method to simulate extraordinarily complex quantum materials known as quasicrystals, opening the door to powerful new quantum devices and ultra-efficient electronics. The work could help scientists design advanced topological qubits and materials for future quantum computers.
Tech + AI + Science News
Your “um” and pauses could reveal early
ScienceDaily — Artificial Intelligence
Your “um” and pauses could reveal early dementia risk
ScienceDaily — Artificial Intelligence · 2026-05-13
The little pauses, “ums,” and moments when you struggle to find the right word may reveal far more about your brain than anyone realized. Researchers discovered that everyday speech patterns are closely tied to executive function — the mental system that powers memory, planning, focus, and flexible thinking. By using AI to analyze natural conversations, the team found they could predict cognitive performance with surprising accuracy, potentially opening the door to simple speech-based tools that could detect early signs of dementia long before traditional testing does.
Research (arXiv)Research (arXiv)
10 item(s)

Research (arXiv)
WARDEN: Endangered Indigenous Language Transcription and Transl…
arXiv
WARDEN: Endangered Indigenous Language Transcription and Translation with 6 Hours of Training Data new
arXiv · 2026-05-13
This paper introduces WARDEN, an early language model system capable of transcribing and translating Wardaman, an endangered Australian indigenous language into English. The significant challenge we face is the lack of large-scale training data: in fact, we only have 6 hours of annotated audio. Therefore, while it is common practice to train a single model for transcription and translation using large datasets (like English to French), this practice is no longer viable in the Wardaman to English context. To tackle the low-resource challenge, we design WARDEN to have separate transcription and translation models: WARDEN first turns a Wardaman audio input into phonemic transcription, and then the transcription into English translation. Further, we propose two useful techniques to enhance performance. For transcription, we initialize the Wardaman token from Sundanese, a language that shares

Research (arXiv)
EVA-Bench: A New End-to-end Framework for Evaluating
arXiv
EVA-Bench: A New End-to-end Framework for Evaluating Voice Agents new
arXiv · 2026-05-13
Voice agents, artificial intelligence systems that conduct spoken conversations to complete tasks, are increasingly deployed across enterprise applications. However, no existing benchmark jointly addresses two core evaluation challenges: generating realistic simulated conversations, and measuring quality across the full scope of voice-specific failure modes. We present EVA-Bench, an end-to-end evaluation framework that addresses both. On the simulation side, EVA-Bench orchestrates bot-to-bot audio conversations over dynamic multi-turn dialogues, with automatic simulation validation that detects user simulator error and appropriately regenerates conversations before scoring. On the measurement side, EVA-Bench introduces two composite metrics: EVA-A (Accuracy), capturing task completion, faithfulness, and audio-level speech fidelity; and EVA-X (Experience), capturing conversation progressi

Research (arXiv)
What is Learnable in Valiant's Theory of
arXiv
What is Learnable in Valiant's Theory of the Learnable? new
arXiv · 2026-05-13
Valiant's 1984 paper is widely credited with introducing the PAC learning model, but it, in fact, introduced a different model: unlike PAC learning, the learner receives only positives, may issue membership queries, and must output a hypothesis with no false positives. Prior work characterized variants, including the case without queries. We revisit Valiant's original model and ask: *Which classes are learnable in it?* For every finite domain, including Valiant's Boolean-hypercube setting, we show that a class is learnable if and only if every realizable positive sample can be certified by a poly-size adaptive query-compression scheme. This is a new variant of sample compression where the learner certifies samples via a short interaction with the membership oracle. Our characterization shows that learnability in Valiant's model is strictly sandwiched between learnability in the PAC model

Research (arXiv)
Good Agentic Friends Do Not Just Give
arXiv
Good Agentic Friends Do Not Just Give Verbal Advice: They Can Update Your Weights new
arXiv · 2026-05-13
Multi-agent LLM systems usually collaborate by exchanging natural-language messages. This interface is simple and interpretable, but it forces each sender's intermediate computation to be serialized into tokens and then reprocessed by the receiver, thereby increasing the generated-token cost, prefill overhead, and KV-cache memory. We study an alternative communication interface: instead of appending a sender's message to the receiver's context, compile the sender's hidden states into a transient, receiver-specific weight perturbation. We introduce TFlow (Thought Flow), a weight-space communication framework for a known and fixed receiver architecture. For each query, frozen role-prompted sender agents process the input, and a learned parameter generator maps their internal activations into low-rank LoRA perturbations targeting the receiver's modules. These perturbations are fused and app

Research (arXiv)
R-DMesh: Video-Guided 3D Animation via Rectified Dynamic
arXiv
R-DMesh: Video-Guided 3D Animation via Rectified Dynamic Mesh Flow new
arXiv · 2026-05-13
Video-guided 3D animation holds immense potential for content creation, offering intuitive and precise control over dynamic assets. However, practical deployment faces a critical yet frequently overlooked hurdle: the pose misalignment dilemma. In real-world scenarios, the initial pose of a user-provided static mesh rarely aligns with the starting frame of a reference video. Naively forcing a mesh to follow a mismatched trajectory inevitably leads to severe geometric distortion or animation failure. To address this, we present Rectified Dynamic Mesh (R-DMesh), a unified framework designed to generate high-fidelity 4D meshes that are ``rectified'' to align with video context. Unlike standard motion transfer approaches, our method introduces a novel VAE that explicitly disentangles the input into a conditional base mesh, relative motion trajectories, and a crucial rectification jump offset.

Research (arXiv)
Nagaoka supermetal in the particle-doped triangular Hubbard
arXiv
Nagaoka supermetal in the particle-doped triangular Hubbard model new
arXiv · 2026-05-13
While the interplay of correlations and geometric frustration in doped Mott insulators provides a fertile ground for exotic quantum phases, the nature of the metallic state emerging upon particle doping remains poorly understood. In this work, we investigate the triangular-lattice Hubbard model with particle doping and provide compelling evidence for an intrinsic, interaction-driven quantum state, which we term the Nagaoka supermetal. This state is characterized by a sublinear temperature dependence in the DC resistivity, along with singular behaviors in the charge compressibility and zero-frequency spectral weight. To understand the origin of these singular properties, we derive an effective low-energy model and demonstrate that a higher-order Van Hove singularity emerges from the reconstructed dispersion. This singularity gives rise to a power-law divergence in the density of states, c

Research (arXiv)
Reachable-Set Decomposition for Real-Time Aggregation of Multi-…
arXiv
Reachable-Set Decomposition for Real-Time Aggregation of Multi-Zone HVAC Fleets new
arXiv · 2026-05-13
Aggregating building heating, ventilation, and air-conditioning (HVAC) fleets provides substantial real-time flexibility to power system operations. However, real-time aggregation of multi-zone HVAC fleets faces two key challenges: (i) strong coupling across zones and time makes flexibility characterization high-dimensional and computationally demanding, and (ii) the sequential revelation of temperature states and exogenous conditions requires that decisions made at each period preserve feasibility over the remaining horizon using only currently realized information. To address these challenges, this paper proposes a reachable-set decomposition framework comprising an offline decomposition stage and a real-time policy. In the offline stage, backward reachable sets are formulated to encode remaining-horizon feasibility into per-period state constraints, so that any state within the curren

Research (arXiv)
Topology-Preserving Neural Operator Learning via Hodge Decompos…
arXiv
Topology-Preserving Neural Operator Learning via Hodge Decomposition new
arXiv · 2026-05-13
In this paper, we study solution operators of physical field equations on geometric meshes from a function-space perspective. We reveal that Hodge orthogonality fundamentally resolves spectral interference by isolating unlearnable topological degrees of freedom from learnable geometric dynamics, enabling an additive approximation confined to structure-preserving subspaces. Building on Hodge theory and operator splitting, we derive a principled operator-level decomposition. The result is a Hybrid Eulerian-Lagrangian architecture with an algebraic-level inductive bias we call Hodge Spectral Duality (HSD). In our framework, we use discrete differential forms to capture topology-dominated components and an orthogonal auxiliary ambient space to represent complex local dynamics. Our method achieves superior accuracy and efficiency on geometric graphs with enhanced fidelity to physical invarian

Research (arXiv)
Unlocking Patch-Level Features for CLIP-Based Class-Incremental…
arXiv
Unlocking Patch-Level Features for CLIP-Based Class-Incremental Learning new
arXiv · 2026-05-13
Class-Incremental Learning (CIL) enables models to continuously integrate new knowledge while mitigating catastrophic forgetting. Driven by the remarkable generalization of CLIP, leveraging pre-trained vision-language models has become a dominant paradigm in CIL. However, current work primarily focuses on aligning global image embeddings (i.e., [CLS] token) with their corresponding text prompts (i.e., [EOS] token). Despite their good performance, we find that they discard the rich patch-level semantic information inherent in CLIP's encoders. For instance, when recognizing a rabbit, local patches may encode its distinctive cues, such as long ears and a fluffy tail, which can provide complementary evidence for recognition. Based on the above observation, we propose SPA (Semantic-guided Patch-level Alignment) for CLIP-based CIL, which aims to awaken long-neglected local representations with

Research (arXiv)
QLAM: A Quantum Long-Attention Memory Approach to
arXiv
QLAM: A Quantum Long-Attention Memory Approach to Long-Sequence Token Modeling new
arXiv · 2026-05-13
Modeling long-range dependencies in sequential data remains a central challenge in machine learning. Transformers address this challenge through attention mechanisms, but their quadratic complexity with respect to sequence length limits scalability to long contexts. State-space models (SSMs) provide an efficient alternative with linear-time computation by evolving a latent state through recurrent updates, but their memory is typically formed via additive or linear transitions, which can limit their ability to capture complex global interactions across tokens. In this work, we introduce one of the first studies to leverage the superposition property of quantum systems to enhance state-based sequence modeling. In particular, we propose Quantum Long-Attention Memory (QLAM), a hybrid quantum-classical memory mechanism that can be viewed as a quantum extension of state-space models. Instead o
Security (NVD + CISA KEV)Security (NVD + CISA KEV)
14 item(s)

Security (NVD + CISA KEV)
CVE-2017-3324· CVSS 10.0 CRITICAL
NVD
CVE-2017-3324· CVSS 10.0 CRITICAL
NVD · 2017-01-28
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Primavera Products Suite (subcomponent: Web Access). Supported versions that are affected are 8.2, 8.3, 8.4, 15.1, 15.2, 16.1 and 16.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. While the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized access to critical data or complete access to all Primavera P6 Enterprise Project Portfolio Management accessible data and unauthorized ability

Security (NVD + CISA KEV)
CVE-2016-3152· CVSS 9.8 CRITICAL
NVD
CVE-2016-3152· CVSS 9.8 CRITICAL
NVD · 2017-01-13
Barco ClickShare CSC-1 devices with firmware before 01.09.03 allow remote attackers to obtain the root password by downloading and extracting the firmware image.

Security (NVD + CISA KEV)
CVE-2016-9299· CVSS 9.8 CRITICAL
NVD
CVE-2016-9299· CVSS 9.8 CRITICAL
NVD · 2017-01-13
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.

Security (NVD + CISA KEV)
CVE-2016-10141· CVSS 9.8 CRITICAL
NVD
CVE-2016-10141· CVSS 9.8 CRITICAL
NVD · 2017-01-13
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.

Security (NVD + CISA KEV)
CVE-2015-3188· CVSS 9.8 CRITICAL
NVD
CVE-2015-3188· CVSS 9.8 CRITICAL
NVD · 2017-01-13
The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors.

Security (NVD + CISA KEV)
CVE-2016-2090· CVSS 9.8 CRITICAL
NVD
CVE-2016-2090· CVSS 9.8 CRITICAL
NVD · 2017-01-13
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2 allows attackers to have unspecified impact via unknown vectors, which trigger a heap-based buffer overflow.

Security (NVD + CISA KEV)
CVE-2016-8204· CVSS 9.8 CRITICAL
NVD
CVE-2016-8204· CVSS 9.8 CRITICAL
NVD · 2017-01-15
A Directory Traversal vulnerability in FileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.

Security (NVD + CISA KEV)
CVE-2016-8205· CVSS 9.8 CRITICAL
NVD
CVE-2016-8205· CVSS 9.8 CRITICAL
NVD · 2017-01-15
A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.

Security (NVD + CISA KEV)
CVE-2017-5517· CVSS 9.8 CRITICAL
NVD
CVE-2017-5517· CVSS 9.8 CRITICAL
NVD · 2017-01-17
SQL injection vulnerability in author.control.php in GeniXCMS through 0.0.8 allows remote attackers to execute arbitrary SQL commands via the type parameter.

Security (NVD + CISA KEV)
CVE-2017-5519· CVSS 9.8 CRITICAL
NVD
CVE-2017-5519· CVSS 9.8 CRITICAL
NVD · 2017-01-17
SQL injection vulnerability in Posts.class.php in GeniXCMS through 0.0.8 allows remote attackers to execute arbitrary SQL commands via the id parameter.

Security (NVD + CISA KEV)
CVE-2016-7996· CVSS 9.8 CRITICAL
NVD
CVE-2016-7996· CVSS 9.8 CRITICAL
NVD · 2017-01-18
Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.

Security (NVD + CISA KEV)
CVE-2016-9676· CVSS 9.8 CRITICAL
NVD
CVE-2016-9676· CVSS 9.8 CRITICAL
NVD · 2017-01-19
Buffer overflow in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.

Security (NVD + CISA KEV)
CVE-2016-9678· CVSS 9.8 CRITICAL
NVD
CVE-2016-9678· CVSS 9.8 CRITICAL
NVD · 2017-01-19
Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.

Security (NVD + CISA KEV)
CVE-2016-9679· CVSS 9.8 CRITICAL
NVD
CVE-2016-9679· CVSS 9.8 CRITICAL
NVD · 2017-01-19
Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code by overwriting a function pointer.
Projects + Resources (Discovery)Projects + Resources (Discovery)
10 item(s)
Projects + Resources (Discovery)
Autocad Tutorials - Full Beginners course -
Brave Search
Autocad Tutorials - Full Beginners course - YouTube new
Brave Search
Share your videos with friends, family, and the world
Projects + Resources (Discovery)
AutoCAD Basic Tutorial for Beginners - Part
Brave Search
AutoCAD Basic Tutorial for Beginners - Part 1 of 3 - YouTube new
Brave Search
In this AutoCAD Tutorial for beginner video series, you will learn about AutoCAD from scratch. Learn AutoCAD with full-length video courses on SourceCAD, sta...
Projects + Resources (Discovery)
ESP32 | DroneBot Workshop
Brave Search
ESP32 | DroneBot Workshop new
Brave Search
We'll pair an inexpensive game controller with an ESP32 and control LEDs, motors and a lot more.Read More » · ChatGPT is an amazing AI chatbot that can also generate code in just about any programming language! Today we will see how to write both C++ and MicroPython code for Arduino and ESP32 using ChatGPT.

Projects + Resources (Discovery)
Introduction to ESP32 – Getting Started –
Brave Search
Introduction to ESP32 – Getting Started – 2020 Videos – DroneBot Workshop Forums new
Brave Search
DroneBot Workshop V... ... Introduction to ESP... ... Today we will get started with the ESP32, a low-cost and extremely versatile microcontroller with integrated WiFi and Bluetooth. I’ll show you how to set up your Arduino IDE for the ESP32 and then we’ll try out several example sketches.
Projects + Resources (Discovery)
Tutorials | DroneBot Workshop
Brave Search
Tutorials | DroneBot Workshop new
Brave Search
Table of Contents1 Introduction2 ... I²C Multiple Bus Demo Hookup4.2Read More » · <strong>A complete guide to using DC servo motors with microcontrollers like Arduino and ESP32.</strong>...
Projects + Resources (Discovery)
Drone Programming
Brave Search
Drone Programming new
Brave Search
In this course, you are going to learn the following: <strong>Ability to setup and run Ardupilot autopilot simulation environment</strong>. Developing Python programming language scripts that communicate with Ardupilot software system using Dronekit library.
Projects + Resources (Discovery)
How to learn Drone programming as a
Brave Search
How to learn Drone programming as a beginner? - General - ArduPilot Discourse new
Brave Search
Hi guys, I am new to Ardupilot and this forum. I've been reading about ardupilot and px4 and 3dr and everything else and my mind is blown, the separation of ardupilot and Dronecode and the fall of 3DR has made me super s…
Projects + Resources (Discovery)
Applied Edge AI: Deep Learning Outside of
Brave Search
Applied Edge AI: Deep Learning Outside of the Cloud | openHPI new
Brave Search
In this week, we will have a look at further advanced concepts behind Edge AI, we will also investigate specific Edge AI hardware and application scenarios. In the practical session, you will experiment with a collaborative inference task, where edge devices and cloud devices work together. ... After the course is finished, we would like to gather your feedback in an optional survey. The course is free. Just register for an account on openHPI and take the course!

Projects + Resources (Discovery)
200+ Edge AI Online Courses for 2026
Brave Search
200+ Edge AI Online Courses for 2026 | Explore Free Courses & Certifications | Class Central new
Brave Search
<strong>Learn edge computing fundamentals using Intel OpenVINO, Arm processors, and TensorFlow Lite through courses on YouTube, edX, and Udacity</strong>, focusing on optimization techniques and hardware ...
Projects + Resources (Discovery)
GitHub - microsoft/edgeai-for-beginners: This course is designed
Brave Search
GitHub - microsoft/edgeai-for-beginners: This course is designed to guide beginners through the exciting world of Edge AI, covering fundamental concepts, popular models, inference techniques, device-specific applications new
Brave Search
This course is <strong>designed to guide beginners through the exciting world of Edge AI</strong>, covering fundamental concepts, popular models, inference techniques, device-specific applications, model optimization, and the development of intelligent Edge ...