News & Updates

News & Insight

Blogs

The IAES Nawala: Student mental health

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala of the Institute of Advanced Engineering and...

Challenges of cloud computing and IoT devices

Cloud computing is an advancement in information technology as a method of delivering various services over the internet and remotely in the...

The IAES’s Nawala: NOMA

Greetings, fellow Newsletters! May you always be in good health. This is the IAES’s Nawala of the Institute of Advanced Engineering and...

Very large scale integration (VLSI)

Very large scale integration (VLSI) is the process of making an integrated circuit (IC) by combining thousands of transistors into one chip...
1 13 14 15 16 17 21

Announcements

GREAT Scholarships-British Council

For the 2023-24 academic year, postgraduate scholarships are available at the following institutions. Please visit the university page below for more information...

IJRES is Accepted for Scopus

We are pleased to inform you that International Journal of Reconfigurable and Embedded Systems has been accepted for Scopus. The Scopus Content...

IJ-AI is Now Q2 in SJR

IAES International Journal of Artificial Intelligence (IJ-AI) is now an SJR Q2 journal! IJ-AI is indexed by Scopus/Scimago JR, with an SJR...

Graduate Scholarship Program for Excellent Foreign Students (EFS)

Sirindhorn International Institute of Technology, Thammasat University Scholarships by Sirindhom Technology Scholarship Fund are available for excellent students from reputable universities of...
1 13 14 15 16

News

Cybercriminals are employing the Citrix Bleed vulnerability to target government networks on a global scale

Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such...

Prolific Puma, An Obscure Link-Shortening Service, Has Been Revealed As A Hub For Cybercriminal Activities Through An Analysis Of DNS Data

A figure known as Prolific Puma, identified by security experts, has been offering cybercriminals the service of shortening links for over four...

Google Chrome automatically switches to secure connections for all its users

Google has implemented a substantial improvement in Chrome’s online security by automatically converting insecure HTTP requests into HTTPS requests for all users....

Meta Explores Mind-Reading AI for Visualizing Thoughts

Meta has introduced a revolutionary AI system that can rapidly interpret visual information from the human brain. This system records thousands of...
1 13 14 15 16 17 31