Found 181 repositories(showing 30)
khoj-ai
Your AI second brain. Self-hostable. Get answers from the web or your docs. Build custom agents, schedule automations, do deep research. Turn any online or local LLM into your personal, autonomous AI (gpt, claude, gemini, llama, qwen, mistral). Get started - free.
langchain-ai
Fully local web research and report writing assistant
LearningCircuit
Local Deep Research achieves ~95% on SimpleQA benchmark (tested with GPT-4.1-mini). Supports local and cloud LLMs (Ollama, Google, Anthropic, ...). Searches 10+ sources - arXiv, PubMed, web, and your private documents. Everything Local & Encrypted.
Oqura-ai
Deep research tool for local knowledge base.
aaronjmars
Deep Research for crypto - free & fully local
kaymen99
Local RAG researcher agent built using Langgraph, DeepSeek R1 and Ollama
Fully local web research and report writing assistant. This repo is a Typescript edition of the Ollama Deep Researcher.
anilsharmay
Deploying full-stack on-prem deep research agent that can be run entirely on a local machine for $0!
Intrafere
MOTO - Autonomous ASI Deep Research Harness by Intrafere - creative novelty-seeking mathematics researcher for S.T.E.M. users, run for days at a time once pressing start - no interaction needed! MOTO uses simultaneous agents working in parallel from either local host LM studio, OpenRouter, or both. No internet required! Star us, more to come soon!
k-kolomeitsev
Local browser toolkit for AI agents: deep research and browser use automation with local Chrome (CDP) + Playwright. Flexible, extensible scripts for web navigation, extraction and workflow automatization - built for reproducible research and agent-driven browsing.
dgloves
A Framework for developing Deep Reinforcement Learning environments using OpenDSS and Gymnasium for electric power distribution systems research optimization and control. We include common grid service examples (emergency restoration, local PV system Volt-VAR, etc.) with codes, and provide template files with a detailed tutorial for users.
dwain-barnes
DRIA (Deep Research and Intelligence Agent) is a fully local voice assistant that can hold real-time conversations while performing deep research in the background — powered by Firecrawl, Mistral AI, Perplexica, and LiveKit.
Mario-Kart-Felix
2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, it pulled another fast one on us: the SolarWinds hack, one of the biggest cybersecurity breaches of the 21st century. The SolarWinds hack was a major event not because a single company was breached, but because it triggered a much larger supply chain incident that affected thousands of organizations, including the U.S. government. What is SolarWinds? SolarWinds is a major software company based in Tulsa, Okla., which provides system management tools for network and infrastructure monitoring, and other technical services to hundreds of thousands of organizations around the world. Among the company's products is an IT performance monitoring system called Orion. As an IT monitoring system, SolarWinds Orion has privileged access to IT systems to obtain log and system performance data. It is that privileged position and its wide deployment that made SolarWinds a lucrative and attractive target. What is the SolarWinds hack? The SolarWinds hack is the commonly used term to refer to the supply chain breach that involved the SolarWinds Orion system. In this hack, suspected nation-state hackers that have been identified as a group known as Nobelium by Microsoft -- and often simply referred to as the SolarWinds Hackers by other researchers -- gained access to the networks, systems and data of thousands of SolarWinds customers. The breadth of the hack is unprecedented and one of the largest, if not the largest, of its kind ever recorded. More than 30,000 public and private organizations -- including local, state and federal agencies -- use the Orion network management system to manage their IT resources. As a result, the hack compromised the data, networks and systems of thousands when SolarWinds inadvertently delivered the backdoor malware as an update to the Orion software. SolarWinds customers weren't the only ones affected. Because the hack exposed the inner workings of Orion users, the hackers could potentially gain access to the data and networks of their customers and partners as well -- enabling affected victims to grow exponentially from there. Orion Platform hack compromised networks of thousands of SolarWinds customers Hackers compromised a digitally signed SolarWinds Orion network monitoring component, opening a backdoor into the networks of thousands of SolarWinds government and enterprise customers. How did the SolarWinds hack happen? The hackers used a method known as a supply chain attack to insert malicious code into the Orion system. A supply chain attack works by targeting a third party with access to an organization's systems rather than trying to hack the networks directly. The third-party software, in this case the SolarWinds Orion Platform, creates a backdoor through which hackers can access and impersonate users and accounts of victim organizations. The malware could also access system files and blend in with legitimate SolarWinds activity without detection, even by antivirus software. SolarWinds was a perfect target for this kind of supply chain attack. Because their Orion software is used by many multinational companies and government agencies, all the hackers had to do was install the malicious code into a new batch of software distributed by SolarWinds as an update or patch. The SolarWinds hack timeline Here is a timeline of the SolarWinds hack: September 2019. Threat actors gain unauthorized access to SolarWinds network October 2019. Threat actors test initial code injection into Orion Feb. 20, 2020. Malicious code known as Sunburst injected into Orion March 26, 2020. SolarWinds unknowingly starts sending out Orion software updates with hacked code According to a U.S. Department of Homeland Security advisory, the affected versions of SolarWinds Orion are versions are 2019.4 through 2020.2.1 HF1. More than 18,000 SolarWinds customers installed the malicious updates, with the malware spreading undetected. Through this code, hackers accessed SolarWinds's customer information technology systems, which they could then use to install even more malware to spy on other companies and organizations. Who was affected? According to reports, the malware affected many companies and organizations. Even government departments such as Homeland Security, State, Commerce and Treasury were affected, as there was evidence that emails were missing from their systems. Private companies such as FireEye, Microsoft, Intel, Cisco and Deloitte also suffered from this attack. The breach was first detected by cybersecurity company FireEye. The company confirmed they had been infected with the malware when they saw the infection in customer systems. FireEye labeled the SolarWinds hack "UNC2452" and identified the backdoor used to gain access to its systems through SolarWinds as "Sunburst." Microsoft also confirmed that it found signs of the malware in its systems, as the breach was affecting its customers as well. Reports indicated Microsoft's own systems were being used to further the hacking attack, but Microsoft denied this claim to news agencies. Later, the company worked with FireEye and GoDaddy to block and isolate versions of Orion known to contain the malware to cut off hackers from customers' systems. They did so by turning the domain used by the backdoor malware used in Orion as part of the SolarWinds hack into a kill switch. The kill switch here served as a mechanism to prevent Sunburst from operating further. Nonetheless, even with the kill switch in place, the hack is still ongoing. Investigators have a lot of data to look through, as many companies using the Orion software aren't yet sure if they are free from the backdoor malware. It will take a long time before the full impact of the hack is known. Why did it take so long to detect the SolarWinds attack? With attackers having first gained access to the SolarWinds systems in September 2019 and the attack not being publicly discovered or reported until December 2020, attackers may well have had 14 or more months of unfettered access. The time it takes between when an attacker is able to gain access and the time an attack is actually discovered is often referred to as dwell time. According to a report released in January 2020 by security firm CrowdStrike, the average dwell time in 2019 was 95 days. Given that it took well over a year from the time the attackers first entered the SolarWinds network until the breach was discovered, the dwell time in the attack exceeded the average. The question of why it took so long to detect the SolarWinds attack has a lot to do with the sophistication of the Sunburst code and the hackers that executed the attack. "Analysis suggests that by managing the intrusion through multiple servers based in the United States and mimicking legitimate network traffic, the attackers were able to circumvent threat detection techniques employed by both SolarWinds, other private companies, and the federal government," SolarWinds said in its analysis of the attack. FireEye, which was the first firm to publicly report the attack, conducted its own analysis of the SolarWinds attack. In its report, FireEye described in detail the complex series of action that the attackers took to mask their tracks. Even before Sunburst attempts to connect out to its command-and-control server, the malware executes a number of checks to make sure no antimalware or forensic analysis tools are running. What was the purpose of the hack? The purpose of the hack remains largely unknown. Still, there are many reasons hackers would want to get into an organization's system, including having access to future product plans or employee and customer information held for ransom. It is also not yet clear what information, if any, hackers stole from government agencies. But the level of access appears to be deep and broad. There are speculations that many enterprises might be collateral damage, as the main focus of the attack was government agencies that make use of the SolarWinds IT management systems. Who was responsible for the hack? Federal investigators and cybersecurity agents believe a Russian espionage operation -- mostly likely Russia's Foreign Intelligence Service -- is behind the SolarWinds attack. The Russian government has denied any involvement in the attack, releasing a statement that said, "Malicious activities in the information space contradicts the principles of the Russian foreign policy, national interests and understanding of interstate relations." They also added that "Russia does not conduct offensive operations in the cyber domain." Contrary to experts in his administration, then-President Donald Trump hinted at around the time of the discovery of the SolarWinds hack that Chinese hackers might be behind the cybersecurity attack. However, he did not present any evidence to back up his claim. Shortly after his inauguration, President Joe Biden vowed that his administration intended to hold Russia accountable, through the launch of a full-scale intelligence assessment and review of the SolarWinds attack and those behind it. The president also created the position of deputy national security adviser for cybersecurity as part of the National Security Council. The role, held by veteran intelligence operative Anne Neuberger, is part of an overall bid by the Biden administration to refresh the federal government's approach to cybersecurity and better respond to nation-state actors. Naming the attack: What is Solorigate, Sunburst and Nobelium? The SolarWinds attack has a number of different names associated with it. While the attack is often referred to simply as the SolarWinds attack, that isn't the only name to know. Sunburst. This is the name of the actual malicious code injection that was planted by hackers into the SolarWinds Orion IT monitoring system code. Both SolarWinds and CrowdStrike generally refer to the attack as Sunburst. Solorigate. Microsoft initially dubbed the actual threat actor group behind the SolarWinds attack as Solorigate. It's a name that stuck and was adopted by other researchers as well as media. Nobelium. In March 2021, Microsoft decided that the primary designation for the threat actor behind the SolarWinds attack should actually be Nobelium -- the idea being that the group is active against multiple victims -- not just SolarWinds -- and uses more malware than just Sunburst. The China connection to the SolarWinds attack While it is suspected that the initial Sunburst code and the attack against SolarWinds and its users came from a threat actor based in Russia, other nation-state threat actors have also used SolarWinds in attacks. According to a Reuters report, suspected nation-state hackers based in China exploited SolarWinds during the same period of time the Sunburst attack occurred. The suspected China-based threat actors targeted the National Finance Center, which is a payroll agency within the U.S. Department of Agriculture. It is suspected that the China-based attackers did not use Sunburst, but rather a different malware that SolarWinds identifies as Supernova. Why is the SolarWinds hack important? The SolarWinds supply chain attack is a global hack, as threat actors turned the Orion software into a weapon gaining access to several government systems and thousands of private systems around the world. Due to the nature of the software -- and by extension the Sunburst malware -- having access to entire networks, many government and enterprise networks and systems face the risk of significant breaches. The hack could also be the catalyst for rapid, broad change in the cybersecurity industry. Many companies and government agencies are now in the process of devising new methods to react to these types of attacks before they happen. Governments and organizations are learning that it is not enough to build a firewall and hope it protects them. They have to actively seek out vulnerabilities in their systems, and either shore them up or turn them into traps against these types of attacks. Since the hack was discovered, SolarWinds has recommended customers update their existing Orion platform. The company has released patches for the malware and other potential vulnerabilities discovered since the initial Orion attack. SolarWinds also recommended customers not able to update Orion isolate SolarWinds servers and/or change passwords for accounts that have access to those servers. The greater White House cybersecurity focus will be crucial, some industry experts have said. But organizations should consider adopting modern software-as-a-service tools for monitoring and collaboration. While the cybersecurity industry has significantly advanced in the last decade, these kinds of attacks show that there is still a long way to go to get really secure systems. The Nobelium group continues to attack targets The suspected threat actor group behind the SolarWinds attack has remained active in 2021 and hasn't stopped at just targeting SolarWinds. On May 27, 2021, Microsoft reported that Nobelium, the group allegedly behind the SolarWinds attack, infiltrated software from email marketing service Constant Contact. According to Microsoft, Nobelium targeted approximately 3,000 email accounts at more than 150 different organizations. The initial attack vector appears to be an account used by USAID. From that initial foothold, Nobelium was able to send out phishing emails in an attempt to get victims to click on a link that would deploy a backdoor Trojan designed to steal user information.
Aryamirsepasi
An open source deep research clone. AI Agent (Local LLM or Gemini) that reasons large amounts of web data extracted with SwiftSoup.
Alex2Yang97
A full-stack local deep research application built with LangGraph, supporting multiple LLM providers and search APIs. Powered by FastAPI + LangGraph backend and Next.js 15 + React 19 frontend, delivering a modern UI and comprehensive local research solution.
gyunggyung
An autonomous research and synthesis agent powered by Google Gemini. Features intelligent deep research, query decomposition, and safe local system control via a native Python loop
sriprav
Blockchain technology has been linked with Internet of Things for a long time now. There are many issues that are hinder the implementation of IoT applications at a large scale. Surveys and studies from multiple sources reveal that security threats and data privacy are still the primary concerns. These problems are well known and solutions exist for these problems in the IT industry. However, traditional IT security solutions cannot be applied to IoT for various reasons spanning from type of devices to sheer volume of devices. Unfortunately, like in any other industry, security is often disregarded in the IoT domain as well, and most of the resources are allocated to application development and device hardware. So, the search for a silver bullet to overcome these inhibitors has been going on for a while. After Bitcoin became prominent, people started to realize the potential of the underlying distributed ledger (blockchain) technology and considered it as a true innovation. Rather than facilitating a peer-to-peer digital payment system involving a cryptocurrency, the blockchain technology is viewed as a mechanism that provides device identity, secure data transfer, and immutable data storage. All these features can be implemented without any centralized authority and a completely transparent system with auditable cryptographic proofs. Our aim through this research project is to get a deep level understanding of the blockchain technology and study some of the widely used blockchain frameworks including Ethereum, Eris, and IOTA. We will further examine the exclusive features offered by each of these frameworks and define their target use cases. While researching about each framework, we plan to deploy a blockchain in the local network i.e., private blockchain and operate on it from different devices running on various operating systems. In each deployment, we will observe the functional issues and benchmark system requirements for running different types of nodes. Also, we will study different algorithms involved in each framework, compare them with each other, and derive their suitability for IoT. Ultimately, our aim is to determine the most suitable blockchain architecture for the IoT ecosystem. A high-level comparison of the researched architectures will be provided so that managers and developers can quickly decide on a suitable framework for their application or use case depending upon the requirements. For each architecture, a set of sample use cases and on-going projects will be discussed to get an idea of the usage of that architecture in the real world.
Violet-sword
A Python project that deploys a Local RAG chatbot using Ollama API. Refines answers with Deep Research from external websites, and uses both Embedding and LLM models.
cuga-project
CugaViz is a comprehensive local development tool designed to help researchers and developers visualize, analyze, and manage AI agent experiments. Built specifically for CUGA, this tool provides deep insights into agent behavior, decision-making processes, and performance metrics through intuitive visualizations and interactive interfaces.
Syed007Hassan
🔍 Fully local deep web research assistant powered by Ollama LLMs. Conducts iterative research cycles with intelligent query generation, web search, and comprehensive summarization using LangGraph.
unnatisilks12
Just a few years ago, a company formed by three individuals decided that it would be making skateboards and sunglasses from recycled nylon. They were basing their efforts upon “trash” floating in the ocean, that they were determined should get cleaned up if they set the ball rolling and others joined them in the effort. “When we researched ocean waste, we learned that there’s a constant stream of nylon fishing nets being dumped into the ocean every year, nets that are just going to sit there for generations. This stuff doesn’t break down.” Today, the company pays fishermen in Chile to collect old nylon fishing nets, which are then recycled into skateboards and sunglasses. What is the material called Nylon? Nylon is a type of synthetic fiber fabric like polyester, made from petroleum products. Nylon was the first fabric made entirely in a laboratory and its invention represents the dawn of the age of synthetics. Nylon had started appearing in stores in 1939 in the form of women’s tights, but it was really the Second World War that opened up the market for Nylon. Nylon became widely available to the general public around the time of World War II. In fact during the war it extensively found of use in the making of parachutes and other military equipment. Prior to 1945, cotton and wool dominated the market; by the end of the war, synthetic fibers particularly nylon had eaten up a significant 25% of the market share. It is today commonly used to make clothing, backpacks and bags, stockings or tights, outdoor gear such as tents, rope, carpet, underwear and hosiery, nylon can also be found in the bristles of our toothbrushes, umbrellas, knits, and swimwear and active wear and many other items we use every day. The advantages of Nylon as a material First developed in the 1930s as an alternative to silk, there are lots of great qualities about the fabric. It is lightweight yet strong, and it is often touted for its quick-drying capabilities. Clothing manufacturers like it because it holds dye well. It is also less expensive to produce than silk and does not get damaged as easily. The making of nylon for fabric use Nylons are a family of materials called polyamides, made from reacting carbon-based chemicals found in coal and petroleum in a high-pressure, heated environment. This chemical reaction, known as condensation polymerization, forms a large polymer – in the form of a sheet of nylon. To make nylon fabric for apparel, this nylon sheet is then broken into chips, melted and drawn through a mechanical spinneret to produce individual fibres that are woven into fabric. This plastic is then put through an intensive chemical process, resulting in the strong, stretchy fibres that make it so useful as a fabric. So what is the idea about recycling Nylon? Since Nylon is made of petroleum products it will not biodegrade. Nylon doesn’t break down easily and accounts for about 10% of the debris in the ocean. According to the World Society for the Protection of Animals, more than 600,000 tons of fishing gear is dumped into oceans every year, including nylon nets. Fishermen often discard the nets because the alternative is much costlier – paying someone to dispose of them properly. For some reason locked deep in polymer chemistry, nylon is more difficult to recycle than polyester. After years of research, development, and testing, some recycled nylon fibers that are suitable for apparel and can pass the rigorous tests of manufacturability and product quality, is what the company found out. “Although we’ve been substituting non-recycled polyester for recycled versions for 20 years, only in the last five have we begun swapping out non-recycled nylon for its recycled replacement. Some of the recycled nylon we use comes from post-industrial waste fiber, yarn collected from a spinning factory, and waste from the weaving mills that can be processed into reusable nylon fiber. Another recycled nylon fiber we are experimenting with is re-created from discarded industrial fishing nets. Though a lot of experiments were conducted and extensive research on how nylon could be converted to its recycled biodegradable form was carried out, it was only in 2013 onwards that it actually produced desired results. In any case, incorporating as much recycled nylon as we can lessens our dependence on petroleum as a raw material source. It curbs discards, thereby prolonging landfill life and reducing toxic emissions from incinerators. It helps promote new recycling streams for nylon products that are no longer usable. And it causes less air, water, and soil contamination compared to using non-recycled nylon. Recycling of Nylon – a challenge in itself The economics of recycling nylon are not very appealing, however. An associate professor in plastic engineering at the University of Massachusetts Lowell, ran a research program on recycled fishing nets for the company. Nylon, he says, is not an easy or cheap material to recycle. Plus polymers, or plastics, are cheap to buy new which may be why many companies choose to use polyethylene terephthalate (PET) – the most common type of plastic found in soda and water bottles – instead . Contamination is another concern. Unlike metals and glass, which are melted at high temperatures, nylon is melted at a lower temperature, meaning some contaminants – non-recyclable materials and microbes or bacteria – can survive. This is why all nylons have to be cleaned thoroughly before the recycling process. “When you’ve dragged a fishing net through a boat, on the ocean floor, and wherever else, it’s a lot harder to clean before you can recycle it,” Johnston says. That’s why Johnston is supportive of circular economy business models, in which businesses keep resources in use for as long as possible, extract their maximum value and then recycle and reuse products and materials. “What would change the recycling scene is if we were charged per pound for all waste. Or if companies had to take back part of what they produced.” The company has an idea already: the company’s sunglasses come with a lifetime warranty. In fact it will fix any pair of glasses free of charge, or provide customers with new frames if their product is beyond repair. Old frames are recycled. And another Italian manufacturer Aquafil has nylon fibers in its carpets. After nearly 40 years of producing carpet yarn, a growing awareness of the environmental harm caused by synthetic materials made it want to turn towards a more environmentally friendly business model. In 2007, Aquafil began developing a machine that can churn through most kinds of nylons, producing new threads ready to be repurposed. Aquafil now sells these threads, called Econyl, to American brands such as Outerknown, an LA-based outerwear company started by pro surfer Kelly Slater, and swimwear giant Speedo. LA-based Masami Shigematsu works on product development for Speedo. She says that she had been actively searching for recycled nylon for years before she found Econyl. “It has to perform well. It can’t just be a sustainable material. Our products are being used by athletes who need it to function as good as new material.” In 2014, Shigematsu met with Aquafil and started experimenting with the fabric. Last year, Speedo rolled out two products with Econyl and has since expanded to include more than 50 products made with the material. Has corporate social responsibility become the modern gold rush? California-based Patagonia has also been adding more recycled nylon to its lineup. Currently, the company has more than 50 products that contain recycled nylon in various percentages. The Torrent shell jackets, for instance, have an outer layer textile made with 100% chemically recycled nylon. It took Patagonia nearly 15 years to develop the technology to recycle polyester to a point where it was as good as virgin polyester. Patagonia wants to go further than just use recycled nylon in its products. How to they Recycle Nylon Just about everyone has nylon around their home. It is in the backpacks our kids take to school, the pantyhose women wear to work and the cheap, reusable shopping bags everyone is handing out these days. There are very few places that accept nylon for recycling. It is unlikely that you can recycle it through your curbside program, and equally so that your local recycling center will have a handy bin that says, “Put your unwanted nylon here!” Your ability to recycle nylon depends largely on the form it takes; for example, nylon pantyhose are easier to recycle than nylon backpacks. But remember: If you cannot recycle an item made of nylon, you may be able to reuse it rather than putting it in the trash. The problem with nylon is that, like many fabrics, it is difficult to recycle, especially once it has been used. Second-hand fabrics typically need to be cleaned before they can be recycled, and it is often not cost-effective for companies to do that. However, there are a few nylon recycling options out there. How to recycle or reuse nylon bags Nylon bags are challenging to recycle unless you purchase one from a company that offers a take back program. San Francisco-based Timbuk2 is one such company. Once your nylon messenger or camera bag is worn out, simply stick it in a box and mail it to the company at the address provided on its website. Timbuk2 will reuse or recycle as many of the materials as possible. There is no charge for the company’s recycling services (other than the cost of postage), and customers that send in products to be recycled will receive a 20% discount on a future purchase. There may also be creative ways to reuse unwanted nylon bags. If you have a backpack that is in good shape that you no longer want, consider donating it to a thrift shop or a program that helps children get school supplies. If you have a large shopping bag with a hole it in, cut it apart and use the good nylon to make a smaller storage bag. How to recycle or reuse nylon fabric Leftover nylon fabric from a sewing project is a great material to reuse. See if your community has an organization that provides fabric and supplies to artists and schools. Materials for the Arts in New York City and The Scrap Exchange in Durham, NC, are a few examples. If you have nylon clothing you want to recycle, and you purchased that clothing from popular outdoor gear manufacturer Patagonia, you can return it to the company for recycling. Get more information about Patagonia’s recycling program on its website. How to recycle and reuse nylons or tights No Nonsense, which makes nylons, tights and other types of leggings, offers a recycling program for consumers. The first step is visit their pantyhose recycling page and print a prepaid mailing label. Next, place all your unwanted nylon leggings in a box and put on the shipping label. Drop it at your nearest post office or other mailing location, and your old nylons are on their way to a recycling facility. No Nonsense sends the material to a plant that recycles it into things like playground equipment, toys and vehicle insulation. There are lots of ways to reuse old nylons as well. Put a bar of soap in the toe of a clean nylon (make sure there is no run in that section). Tie off the open end and hang the sock by the sink. When you go to wash your hands, get them plenty wet then roll the sock between your hands. This works really well in potting sheds, barns or other places where a soap dish might not be practical. Use nylons to tie up tomatoes or other plants that need support as they grow. Fill a clean nylon with potpourri or lavender. Use it as a sachet in your drawers, car or any other area you want to smell fresh. But then what is to be Nylon’s impact on the planet? Different kinds of nylon have different properties, but the common threads between each are strength, durability and ability to be moulded into shape. The flip side is that no form of nylon is biodegradable; so once you no longer have a need for your torn stockings or old toothbrush, it sits in a landfill for at least 30 years. Nylon is in part derived from coal and petroleum. In producing nylon there is creation of Greenhouse gases: producing nylon creates nitrous oxide, a greenhouse gas that is 300 times more potent than carbon dioxide. Water: manufacturing nylon is a very thirsty process; large amounts of water are used for cooling the fibres, which can be a source of environmental contamination and pollution. Energy: manufacturing nylon is a very energy-hungry process, which contributes to environmental degradation and global warming. But, definitely there is the good side to it. Nylon is a plastic that can be recycled. There are several brands and accreditations that can help consumers find more sustainable nylon products. Econyl has developed an eco-friendly nylon made from recycled plastics in a closed loop system, drastically reducing waste and emissions. Nylon may certainly not be great for the environment, but there are plenty of brands working hard to turn that around!
ceasonen
Open-source AI Deep Research Engine On Local Device
PrabhaAnde
Local Deep Research Agent with qwen3 or gpt-oss
Jimmyjonny1028
Local Deep Research & RAG engine powered by Ollama. Hybrid inference, GPU queue management, and 100% privacy.
crazystuffxyz
A hyper-functional, sleek, and fully local web-based AI interface built with Node.js and powered by Ollama. It offers intelligent research modes, customizable AI behaviors, and Markdown conversion—perfect for deep exploration or quick answers, all with zero tracking or API keys required.
CivilKen
Based on previous research, ground motion can be amplified in certain direction and show with significant anisotropy. The causes still remain unclear, and different researchers have attributed this phenomenon to several factors, including topographic effect, local geological heterogeneities, wave polarization, wave trapped in fault zone and etc. This phenomenon might have severe impacts on buildings that cause damages, especially in the near-fault area. However, the current seismic design code focus on the perpendicular direction of fault strike only, which is not suitable enough for real situation. The objective of this study will focus on seismic wave directivity in near-fault zone. A total of 104 earthquake events with basic geological data were collected. Causative factors were selected based on previous research. There are three main causes considered of free field stations, included wave polarization, anisotropic stiffness and forward directivity. Data of influence factors were collected accordingly, and Arias Intensity is used to describe the directivity of seismic wave. The deep learning technique was applied to predict Arias Intensity distribution with the given parameters. This research used TensorFlow as the main deep learning tool.
VikasaurusRex
A Deep Research Agent is a completely local system designed to perform comprehensive, multi-layered research tasks with nothing more than a functioning wifi connection and a decent graphics card.
skanga
Run a custom Deep Research report directly on your Desktop. Use any local or remotely hosted models (via ollama or other popular hosted models)
isaccanedo
🍳 Your AI second brain. Self-hostable. Get answers from the web or your docs. Build custom agents, schedule automations, do deep research. Turn any online or local LLM into your personal, autonomous AI (gpt, claude, gemini, llama, qwen, mistral). Get started - free
digitalinfopercept
Infopercept offers state-of-the-art mobile app penetration testing services, providing a comprehensive risk assessment for your mobile application. With industry-leading researchers and security engineers in both iPhone and Android, we're providing deep dive testing on local, on-device security issues, back-end web services, and the APIs that connect them.The key issue of a well-organized phishing operation is that it is frequently used as a starting step for broader attacks by attackers. Similarly, Infopercept expertly customises each phishing appraisal of the employees of the company and investigates the full potential of a good compromise in unprecedented depth, concluding with a comprehensive social engineering analysis. Visit Now: https://www.infopercept.com/email-phishing-assessment