Tech + AI + Science NewsTech + AI + Science News
14 item(s)
Tech + AI + Science News
Sea's View on the Future of Agentic
OpenAI News
Sea's View on the Future of Agentic Software Development with Codex new
OpenAI News · 2026-05-14
Sea Limited's CPO explains why the company is deploying Codex across engineering teams to accelerate AI-native software development in Asia.
Tech + AI + Science News
Helping ChatGPT better recognize context in sensitive
OpenAI News
Helping ChatGPT better recognize context in sensitive conversations
OpenAI News · 2026-05-14
Learn how new ChatGPT safety updates improve context awareness in sensitive conversations, helping detect risk over time and respond more safely.
Tech + AI + Science News
Building a safe, effective sandbox to enable
OpenAI News
Building a safe, effective sandbox to enable Codex on Windows
OpenAI News · 2026-05-13
Learn how OpenAI built a secure sandbox for Codex on Windows, enabling safe, efficient coding agents with controlled file access and network restrictions.
Tech + AI + Science News
Our response to the TanStack npm supply
OpenAI News
Our response to the TanStack npm supply chain attack
OpenAI News · 2026-05-13
OpenAI details its response to the TanStack “Mini Shai-Hulud” supply chain attack, outlines protections taken to secure systems and signing certificates, and explains why macOS users must update OpenAI apps by June 12, 2026. Learn what happened, what was affected, and how OpenAI is strengthening defenses against evolving software supply chain threats.
Tech + AI + Science News
New AI Benchmarking Reveals Leading AI Chatbots––Including
Brave News
New AI Benchmarking Reveals Leading AI Chatbots––Including
Brave News
Currently, no other standard exists ... establishing a remarkable benchmark that current and future models can be audited against.” – · Kara Emery, PhD, Director of Data Science, AI Hub, McSilver Institute for Poverty Policy and Research, New York University...
Tech + AI + Science News
Network outages, power failures strain data center
Brave News
Network outages, power failures strain data center resiliency | Network World new
Brave News
Power failures are to blame for the most impactful data center outages, while network issues are the most frequent culprits for IT service disruptions, according to Uptime Institute's latest analysis.
Tech + AI + Science News
Obsidian isn't actually open source—here's the markdown
Brave News
Obsidian isn't actually open source—here's the markdown editor that is new
Brave News
Tolaria is what Obsidian should have been—fully open source and AI-ready
Tech + AI + Science News
How should schools and teachers approach using
Brave News
How should schools and teachers approach using screens in schools? | EdSource new
Brave News
The Kern County district superintendent ... development and ability to learn. That conversation took center stage Wednesday during an EdSource roundtable on education technology. The panelists – a student, parent, teacher, superintendent and researcher – discussed how to balance ...
Tech + AI + Science News
How Claude Code works in large codebases
Hacker News
How Claude Code works in large codebases new
Hacker News · 2026-05-15
Comments
Tech + AI + Science News
Solar-based sleep patterns compared to modern norms
Hacker News
Solar-based sleep patterns compared to modern norms new
Hacker News · 2026-05-15
Comments
Tech + AI + Science News
Coldkey – Post-quantum age key generation and
Hacker News
Coldkey – Post-quantum age key generation and paper backup tool new
Hacker News · 2026-05-15
Comments
Tech + AI + Science News
Details of the Daring Airdrop at Tristan
Hacker News
Details of the Daring Airdrop at Tristan Da Cunha new
Hacker News · 2026-05-15
Comments
Tech + AI + Science News
New quantum algorithm solves “impossible” materials problem
ScienceDaily — Artificial Intelligence
New quantum algorithm solves “impossible” materials problem in seconds
ScienceDaily — Artificial Intelligence · 2026-05-13
A new quantum-inspired algorithm has cracked a problem so massive that conventional supercomputers struggle to even approach it. Researchers used the method to simulate extraordinarily complex quantum materials known as quasicrystals, opening the door to powerful new quantum devices and ultra-efficient electronics. The work could help scientists design advanced topological qubits and materials for future quantum computers.
Tech + AI + Science News
Your “um” and pauses could reveal early
ScienceDaily — Artificial Intelligence
Your “um” and pauses could reveal early dementia risk
ScienceDaily — Artificial Intelligence · 2026-05-13
The little pauses, “ums,” and moments when you struggle to find the right word may reveal far more about your brain than anyone realized. Researchers discovered that everyday speech patterns are closely tied to executive function — the mental system that powers memory, planning, focus, and flexible thinking. By using AI to analyze natural conversations, the team found they could predict cognitive performance with surprising accuracy, potentially opening the door to simple speech-based tools that could detect early signs of dementia long before traditional testing does.
Research (arXiv)Research (arXiv)
10 item(s)
Research (arXiv)
WARDEN: Endangered Indigenous Language Transcription and Transl…
arXiv
WARDEN: Endangered Indigenous Language Transcription and Translation with 6 Hours of Training Data
arXiv · 2026-05-13
This paper introduces WARDEN, an early language model system capable of transcribing and translating Wardaman, an endangered Australian indigenous language into English. The significant challenge we face is the lack of large-scale training data: in fact, we only have 6 hours of annotated audio. Therefore, while it is common practice to train a single model for transcription and translation using large datasets (like English to French), this practice is no longer viable in the Wardaman to English context. To tackle the low-resource challenge, we design WARDEN to have separate transcription and translation models: WARDEN first turns a Wardaman audio input into phonemic transcription, and then the transcription into English translation. Further, we propose two useful techniques to enhance performance. For transcription, we initialize the Wardaman token from Sundanese, a language that shares
Research (arXiv)
EVA-Bench: A New End-to-end Framework for Evaluating
arXiv
EVA-Bench: A New End-to-end Framework for Evaluating Voice Agents
arXiv · 2026-05-13
Voice agents, artificial intelligence systems that conduct spoken conversations to complete tasks, are increasingly deployed across enterprise applications. However, no existing benchmark jointly addresses two core evaluation challenges: generating realistic simulated conversations, and measuring quality across the full scope of voice-specific failure modes. We present EVA-Bench, an end-to-end evaluation framework that addresses both. On the simulation side, EVA-Bench orchestrates bot-to-bot audio conversations over dynamic multi-turn dialogues, with automatic simulation validation that detects user simulator error and appropriately regenerates conversations before scoring. On the measurement side, EVA-Bench introduces two composite metrics: EVA-A (Accuracy), capturing task completion, faithfulness, and audio-level speech fidelity; and EVA-X (Experience), capturing conversation progressi
Research (arXiv)
What is Learnable in Valiant's Theory of
arXiv
What is Learnable in Valiant's Theory of the Learnable?
arXiv · 2026-05-13
Valiant's 1984 paper is widely credited with introducing the PAC learning model, but it, in fact, introduced a different model: unlike PAC learning, the learner receives only positives, may issue membership queries, and must output a hypothesis with no false positives. Prior work characterized variants, including the case without queries. We revisit Valiant's original model and ask: *Which classes are learnable in it?* For every finite domain, including Valiant's Boolean-hypercube setting, we show that a class is learnable if and only if every realizable positive sample can be certified by a poly-size adaptive query-compression scheme. This is a new variant of sample compression where the learner certifies samples via a short interaction with the membership oracle. Our characterization shows that learnability in Valiant's model is strictly sandwiched between learnability in the PAC model
Research (arXiv)
Good Agentic Friends Do Not Just Give
arXiv
Good Agentic Friends Do Not Just Give Verbal Advice: They Can Update Your Weights
arXiv · 2026-05-13
Multi-agent LLM systems usually collaborate by exchanging natural-language messages. This interface is simple and interpretable, but it forces each sender's intermediate computation to be serialized into tokens and then reprocessed by the receiver, thereby increasing the generated-token cost, prefill overhead, and KV-cache memory. We study an alternative communication interface: instead of appending a sender's message to the receiver's context, compile the sender's hidden states into a transient, receiver-specific weight perturbation. We introduce TFlow (Thought Flow), a weight-space communication framework for a known and fixed receiver architecture. For each query, frozen role-prompted sender agents process the input, and a learned parameter generator maps their internal activations into low-rank LoRA perturbations targeting the receiver's modules. These perturbations are fused and app
Research (arXiv)
R-DMesh: Video-Guided 3D Animation via Rectified Dynamic
arXiv
R-DMesh: Video-Guided 3D Animation via Rectified Dynamic Mesh Flow
arXiv · 2026-05-13
Video-guided 3D animation holds immense potential for content creation, offering intuitive and precise control over dynamic assets. However, practical deployment faces a critical yet frequently overlooked hurdle: the pose misalignment dilemma. In real-world scenarios, the initial pose of a user-provided static mesh rarely aligns with the starting frame of a reference video. Naively forcing a mesh to follow a mismatched trajectory inevitably leads to severe geometric distortion or animation failure. To address this, we present Rectified Dynamic Mesh (R-DMesh), a unified framework designed to generate high-fidelity 4D meshes that are ``rectified'' to align with video context. Unlike standard motion transfer approaches, our method introduces a novel VAE that explicitly disentangles the input into a conditional base mesh, relative motion trajectories, and a crucial rectification jump offset.
Research (arXiv)
Nagaoka supermetal in the particle-doped triangular Hubbard
arXiv
Nagaoka supermetal in the particle-doped triangular Hubbard model
arXiv · 2026-05-13
While the interplay of correlations and geometric frustration in doped Mott insulators provides a fertile ground for exotic quantum phases, the nature of the metallic state emerging upon particle doping remains poorly understood. In this work, we investigate the triangular-lattice Hubbard model with particle doping and provide compelling evidence for an intrinsic, interaction-driven quantum state, which we term the Nagaoka supermetal. This state is characterized by a sublinear temperature dependence in the DC resistivity, along with singular behaviors in the charge compressibility and zero-frequency spectral weight. To understand the origin of these singular properties, we derive an effective low-energy model and demonstrate that a higher-order Van Hove singularity emerges from the reconstructed dispersion. This singularity gives rise to a power-law divergence in the density of states, c
Research (arXiv)
Reachable-Set Decomposition for Real-Time Aggregation of Multi-…
arXiv
Reachable-Set Decomposition for Real-Time Aggregation of Multi-Zone HVAC Fleets
arXiv · 2026-05-13
Aggregating building heating, ventilation, and air-conditioning (HVAC) fleets provides substantial real-time flexibility to power system operations. However, real-time aggregation of multi-zone HVAC fleets faces two key challenges: (i) strong coupling across zones and time makes flexibility characterization high-dimensional and computationally demanding, and (ii) the sequential revelation of temperature states and exogenous conditions requires that decisions made at each period preserve feasibility over the remaining horizon using only currently realized information. To address these challenges, this paper proposes a reachable-set decomposition framework comprising an offline decomposition stage and a real-time policy. In the offline stage, backward reachable sets are formulated to encode remaining-horizon feasibility into per-period state constraints, so that any state within the curren
Research (arXiv)
Topology-Preserving Neural Operator Learning via Hodge Decompos…
arXiv
Topology-Preserving Neural Operator Learning via Hodge Decomposition
arXiv · 2026-05-13
In this paper, we study solution operators of physical field equations on geometric meshes from a function-space perspective. We reveal that Hodge orthogonality fundamentally resolves spectral interference by isolating unlearnable topological degrees of freedom from learnable geometric dynamics, enabling an additive approximation confined to structure-preserving subspaces. Building on Hodge theory and operator splitting, we derive a principled operator-level decomposition. The result is a Hybrid Eulerian-Lagrangian architecture with an algebraic-level inductive bias we call Hodge Spectral Duality (HSD). In our framework, we use discrete differential forms to capture topology-dominated components and an orthogonal auxiliary ambient space to represent complex local dynamics. Our method achieves superior accuracy and efficiency on geometric graphs with enhanced fidelity to physical invarian
Research (arXiv)
Unlocking Patch-Level Features for CLIP-Based Class-Incremental…
arXiv
Unlocking Patch-Level Features for CLIP-Based Class-Incremental Learning
arXiv · 2026-05-13
Class-Incremental Learning (CIL) enables models to continuously integrate new knowledge while mitigating catastrophic forgetting. Driven by the remarkable generalization of CLIP, leveraging pre-trained vision-language models has become a dominant paradigm in CIL. However, current work primarily focuses on aligning global image embeddings (i.e., [CLS] token) with their corresponding text prompts (i.e., [EOS] token). Despite their good performance, we find that they discard the rich patch-level semantic information inherent in CLIP's encoders. For instance, when recognizing a rabbit, local patches may encode its distinctive cues, such as long ears and a fluffy tail, which can provide complementary evidence for recognition. Based on the above observation, we propose SPA (Semantic-guided Patch-level Alignment) for CLIP-based CIL, which aims to awaken long-neglected local representations with
Research (arXiv)
QLAM: A Quantum Long-Attention Memory Approach to
arXiv
QLAM: A Quantum Long-Attention Memory Approach to Long-Sequence Token Modeling
arXiv · 2026-05-13
Modeling long-range dependencies in sequential data remains a central challenge in machine learning. Transformers address this challenge through attention mechanisms, but their quadratic complexity with respect to sequence length limits scalability to long contexts. State-space models (SSMs) provide an efficient alternative with linear-time computation by evolving a latent state through recurrent updates, but their memory is typically formed via additive or linear transitions, which can limit their ability to capture complex global interactions across tokens. In this work, we introduce one of the first studies to leverage the superposition property of quantum systems to enhance state-based sequence modeling. In particular, we propose Quantum Long-Attention Memory (QLAM), a hybrid quantum-classical memory mechanism that can be viewed as a quantum extension of state-space models. Instead o
Security (NVD + CISA KEV)Security (NVD + CISA KEV)
14 item(s)
Security (NVD + CISA KEV)
CVE-2017-3324· CVSS 10.0 CRITICAL
NVD
CVE-2017-3324· CVSS 10.0 CRITICAL
NVD · 2017-01-28
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Primavera Products Suite (subcomponent: Web Access). Supported versions that are affected are 8.2, 8.3, 8.4, 15.1, 15.2, 16.1 and 16.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. While the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized access to critical data or complete access to all Primavera P6 Enterprise Project Portfolio Management accessible data and unauthorized ability
Security (NVD + CISA KEV)
CVE-2016-3152· CVSS 9.8 CRITICAL
NVD
CVE-2016-3152· CVSS 9.8 CRITICAL
NVD · 2017-01-13
Barco ClickShare CSC-1 devices with firmware before 01.09.03 allow remote attackers to obtain the root password by downloading and extracting the firmware image.
Security (NVD + CISA KEV)
CVE-2016-9299· CVSS 9.8 CRITICAL
NVD
CVE-2016-9299· CVSS 9.8 CRITICAL
NVD · 2017-01-13
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
Security (NVD + CISA KEV)
CVE-2016-10141· CVSS 9.8 CRITICAL
NVD
CVE-2016-10141· CVSS 9.8 CRITICAL
NVD · 2017-01-13
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.
Security (NVD + CISA KEV)
CVE-2015-3188· CVSS 9.8 CRITICAL
NVD
CVE-2015-3188· CVSS 9.8 CRITICAL
NVD · 2017-01-13
The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors.
Security (NVD + CISA KEV)
CVE-2016-2090· CVSS 9.8 CRITICAL
NVD
CVE-2016-2090· CVSS 9.8 CRITICAL
NVD · 2017-01-13
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2 allows attackers to have unspecified impact via unknown vectors, which trigger a heap-based buffer overflow.
Security (NVD + CISA KEV)
CVE-2016-8204· CVSS 9.8 CRITICAL
NVD
CVE-2016-8204· CVSS 9.8 CRITICAL
NVD · 2017-01-15
A Directory Traversal vulnerability in FileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.
Security (NVD + CISA KEV)
CVE-2016-8205· CVSS 9.8 CRITICAL
NVD
CVE-2016-8205· CVSS 9.8 CRITICAL
NVD · 2017-01-15
A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.
Security (NVD + CISA KEV)
CVE-2017-5517· CVSS 9.8 CRITICAL
NVD
CVE-2017-5517· CVSS 9.8 CRITICAL
NVD · 2017-01-17
SQL injection vulnerability in author.control.php in GeniXCMS through 0.0.8 allows remote attackers to execute arbitrary SQL commands via the type parameter.
Security (NVD + CISA KEV)
CVE-2017-5519· CVSS 9.8 CRITICAL
NVD
CVE-2017-5519· CVSS 9.8 CRITICAL
NVD · 2017-01-17
SQL injection vulnerability in Posts.class.php in GeniXCMS through 0.0.8 allows remote attackers to execute arbitrary SQL commands via the id parameter.
Security (NVD + CISA KEV)
CVE-2016-7996· CVSS 9.8 CRITICAL
NVD
CVE-2016-7996· CVSS 9.8 CRITICAL
NVD · 2017-01-18
Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.
Security (NVD + CISA KEV)
CVE-2016-9676· CVSS 9.8 CRITICAL
NVD
CVE-2016-9676· CVSS 9.8 CRITICAL
NVD · 2017-01-19
Buffer overflow in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.
Security (NVD + CISA KEV)
CVE-2016-9678· CVSS 9.8 CRITICAL
NVD
CVE-2016-9678· CVSS 9.8 CRITICAL
NVD · 2017-01-19
Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.
Security (NVD + CISA KEV)
CVE-2016-9679· CVSS 9.8 CRITICAL
NVD
CVE-2016-9679· CVSS 9.8 CRITICAL
NVD · 2017-01-19
Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code by overwriting a function pointer.
Projects + Resources (Discovery)Projects + Resources (Discovery)
10 item(s)
Projects + Resources (Discovery)
CMUSphinx Open Source Speech Recognition
Brave Search
CMUSphinx Open Source Speech Recognition new
Brave Search
OPEN SOURCE SPEECH RECOGNITION TOOLKIT · May 6, 2026 · PocketSphinx 5.1.0 is now released.
Projects + Resources (Discovery)
GitHub - mozilla/DeepSpeech: DeepSpeech is an open
Brave Search
GitHub - mozilla/DeepSpeech: DeepSpeech is an open source embedded (offline, on-device) speech-to-text engine which can run in real time on devices ranging from a Raspberry Pi 4 to high power GPU servers. · GitHub new
Brave Search
<strong>DeepSpeech is an open-source Speech-To-Text engine</strong>, using a model trained by machine learning techniques based on Baidu's Deep Speech research paper.
Projects + Resources (Discovery)
Top 15 Open Source Speech Recognition/TTS/STT/ Systems
Brave Search
Top 15 Open Source Speech Recognition/TTS/STT/ Systems new
Brave Search
This is changing, today there are a lot of open source speech tools and libraries that you can use right now. They even boomed much more than before, thanks to the trend of AI and generative models. ... It is the software engine responsible for transforming voice to text or vice versa, and It is not meant to be used by end users. Developers will first have to adopt these libraries and use them to create computer programs that can enable speech recognition for users.
Projects + Resources (Discovery)
GitHub - linorobot/linorobot2: Autonomous mobile robots (2WD,
Brave Search
GitHub - linorobot/linorobot2: Autonomous mobile robots (2WD, 4WD, Mecanum Drive) · GitHub new
Brave Search
<strong>Build ROS2 applications</strong>. The simulation stack provides a consistent, reproducible environment for developing and testing autonomy code including path planners, state machines, and perception pipelines, without needing physical hardware on hand.
Projects + Resources (Discovery)
Open Source Autopilot for Drones - PX4
Brave Search
Open Source Autopilot for Drones - PX4 Autopilot new
Brave Search
These tutorials and resources provide a walkthrough of the basics of PX4. ... Learn how your organization can support the <strong>PX4 Autopilot</strong> project, and it’s ecosystem by becoming a Dronecode member today.
Projects + Resources (Discovery)
8 open source drone projects | Opensource.com
Brave Search
8 open source drone projects | Opensource.com new
Brave Search
<strong>The Dronecode project</strong> is a Linux Foundation-sponsored project working to build a common open source platform for UAV development. It's been through a lot of changes in the last few years, but today it serves as the governance structure for the ...
Projects + Resources (Discovery)
ArduPilot - Versatile, Trusted, Open
Brave Search
ArduPilot - Versatile, Trusted, Open new
Brave Search
As an open source project, it is constantly evolving based on rapid feedback from a large community of users. The Development Team works with the community and commercial partners to add functionality to ArduPilot that benefits everyone. Although ArduPilot does not manufacture any hardware, ArduPilot firmware works on a wide variety of different hardware to control unmanned vehicles of all types.
Projects + Resources (Discovery)
ESP32 with FreeRTOS (Arduino IDE) - Create
Brave Search
ESP32 with FreeRTOS (Arduino IDE) - Create Tasks | Random Nerd Tutorials new
Brave Search
Before proceeding, you should have the ESP32 Arduino core installed in your Arduino IDE. Follow the next tutorial to install the ESP32 on the Arduino IDE, if you haven’t already. Installing the ESP32 Board in Arduino IDE (Windows, Mac OS X, and Linux instructions) FreeRTOS is a lightweight, open-source real-time operating system (RTOS).
Projects + Resources (Discovery)
FreeRTOS Overview - ESP32 - — ESP-IDF
Brave Search
FreeRTOS Overview - ESP32 - — ESP-IDF Programming Guide v6.0.1 documentation new
Brave Search
<strong>system/freertos/basic_freertos_smp_usage</strong> demonstrates how to use basic FreeRTOS APIs for task creation, communication, synchronization, and batch processing within an SMP architecture on ESP32.
Projects + Resources (Discovery)
Online VHDL Training - FirstEDA
Brave Search
Online VHDL Training - FirstEDA new
Brave Search
Our Advanced in-person and online VHDL training course teaches the latest VHDL Verification techniques and methodologies for FPGAs and ASICs, including the <strong>Open Source VHDL Verification Methodology (OSVVM).</strong>