Artificial intelligence systems based on neural networks—such as ChatGPT, Claude, DeepSeek or Gemini—are extraordinarily powerful, yet their internal workings remain largely a “black box.” To better understand how these systems produce their responses, a group of physicists at Harvard University has developed a simplified mathematical model of learning in neural networks that can be analyzed mathematically using the tools of statistical physics.Artificial intelligence systems based on neural networks—such as ChatGPT, Claude, DeepSeek or Gemini—are extraordinarily powerful, yet their internal workings remain largely a “black box.” To better understand how these systems produce their responses, a group of physicists at Harvard University has developed a simplified mathematical model of learning in neural networks that can be analyzed mathematically using the tools of statistical physics.Computer Sciences[#item_full_content]
In a novel attempt to improve how large language models learn and make them more capable and energy-efficient, Stevens Institute of Technology researchers have devised an algorithm that improves AI data sharing, boosts performance and reduces power consumption.In a novel attempt to improve how large language models learn and make them more capable and energy-efficient, Stevens Institute of Technology researchers have devised an algorithm that improves AI data sharing, boosts performance and reduces power consumption.Machine learning & AI[#item_full_content]
A research team led by Virginia Tech cybersecurity expert Bimal Viswanath has found a critical blind spot in today’s image protection techniques designed to prevent bad actors from stealing online content for unauthorized artificial intelligence training, style mimicry, and deepfake manipulations. The study is published on the arXiv preprint server.A research team led by Virginia Tech cybersecurity expert Bimal Viswanath has found a critical blind spot in today’s image protection techniques designed to prevent bad actors from stealing online content for unauthorized artificial intelligence training, style mimicry, and deepfake manipulations. The study is published on the arXiv preprint server.Security[#item_full_content]
Ultra-personalized artificial intelligence for assisted communication risks muting aspects of the user’s identity and occasionally breaches privacy, according to a new study from a Cornell Tech doctoral student who trained the technology on himself.Ultra-personalized artificial intelligence for assisted communication risks muting aspects of the user’s identity and occasionally breaches privacy, according to a new study from a Cornell Tech doctoral student who trained the technology on himself.Consumer & Gadgets[#item_full_content]
The cybersecurity community went on alert when Anthropic announced on April 7, 2026, that its latest and most capable general-purpose large language model, Claude Mythos Preview, had demonstrated remarkable—and unintended—capabilities. The artificial intelligence system was able to find and exploit software vulnerabilities—the most serious type of software bugs—at a rate not seen before.The cybersecurity community went on alert when Anthropic announced on April 7, 2026, that its latest and most capable general-purpose large language model, Claude Mythos Preview, had demonstrated remarkable—and unintended—capabilities. The artificial intelligence system was able to find and exploit software vulnerabilities—the most serious type of software bugs—at a rate not seen before.Security[#item_full_content]
The boom in data center construction is taking up much of the supply of high-tech components, especially processor and memory chips. This demand is squeezing consumer device makers, which are having trouble acquiring enough chips.The boom in data center construction is taking up much of the supply of high-tech components, especially processor and memory chips. This demand is squeezing consumer device makers, which are having trouble acquiring enough chips.Electronics & Semiconductors[#item_full_content]
Wind turbines supply a particularly large amount of electricity in winter—precisely when demand is high. Nevertheless, expansion is stagnating in many regions of Europe. One of the main reasons is that wind turbines can clash with the local scenic landscape and are therefore met with local opposition.Wind turbines supply a particularly large amount of electricity in winter—precisely when demand is high. Nevertheless, expansion is stagnating in many regions of Europe. One of the main reasons is that wind turbines can clash with the local scenic landscape and are therefore met with local opposition.Energy & Green Tech[#item_full_content]
Today, artificial intelligence can describe images, recognize objects, and explain complex relationships. The pace of development is remarkable: So-called vision-language models (VLMs) combine text and image understanding in impressive ways. Yet, of all things, they struggle with a seemingly simple task—counting. Researchers at the Institute for Information Systems (iisys) at Hof University of Applied Sciences are now working to address this issue, with a paper posted to the arXiv preprint server.Today, artificial intelligence can describe images, recognize objects, and explain complex relationships. The pace of development is remarkable: So-called vision-language models (VLMs) combine text and image understanding in impressive ways. Yet, of all things, they struggle with a seemingly simple task—counting. Researchers at the Institute for Information Systems (iisys) at Hof University of Applied Sciences are now working to address this issue, with a paper posted to the arXiv preprint server.Computer Sciences[#item_full_content]
A new study has uncovered a significant and largely invisible privacy risk in the online advertising ecosystem: the ads you see may be enough to reveal sensitive personal information.A new study has uncovered a significant and largely invisible privacy risk in the online advertising ecosystem: the ads you see may be enough to reveal sensitive personal information.Security[#item_full_content]
Nuclear reactors generate reliable, low-carbon electricity by using heat from nuclear fission to turn turbines. These steady energy producers are a crucial component of clean power generation. Nuclear engineers are responsible not only for understanding reactor dynamics, ensuring proper maintenance and recognizing unusual behavior, but also for determining appropriate corrective actions when necessary.Nuclear reactors generate reliable, low-carbon electricity by using heat from nuclear fission to turn turbines. These steady energy producers are a crucial component of clean power generation. Nuclear engineers are responsible not only for understanding reactor dynamics, ensuring proper maintenance and recognizing unusual behavior, but also for determining appropriate corrective actions when necessary.Energy & Green Tech[#item_full_content]