Nous sommes particulièrement fiers de présenter, sous votre sapin de Noël, un programme particulièrement riche pour lancer 2026 : 🤩du Zotero bien sûr (avec ou sans IA), de la veille, des "Regex", du Wikipédia/data et Openrefine, du Python et encore du Python (pour les SHS) et toujours du Python (avec les LLM?), des cartes mentales, de la découvrabilité, de l'automatisation avec N8N, du Obsidian, du Html, de la sobriété numérique, des modèles ontologiques, de l'analyse de réseaux bibliographiques, du TXM, de la TEI, de la Dataviz et de la prise de parole en public, pour finir avec, n'en jetez plus, une "install party" Linux ! Amis de l'ESR, courez vite vous inscrire, les places vont être chères (quoique gratuites) !

#openscience #urfist #ist #python #wikipedia #linux #obsidian #txm #dataviz #etc

https://sygefor.reseau-urfist.fr/#/program/lyon 🤩

SYGEFOR - SYstème de GEstion de FORmation

Les URFIST (Unité Régionale de Formation à l'Information Scientifique et Technique) ont pour missions la recherche et la formation des usagers universitaires sur les outils, les pratiques et les évolutions de l'information scientifique.

🚀🐑 Apple's security gibberish—SPTM, #TXM, and Exclaves—because who needs clear communication when you can have an alphabet soup? 🤪 Dive deep into buzzwords and acronyms, and emerge none the wiser! 📚🔍
https://arxiv.org/abs/2510.09272 #AppleSecurity #SPTM #Exclaves #BuzzwordSoup #HackerNews #ngated
Modern iOS Security Features -- A Deep Dive into SPTM, TXM, and Exclaves

The XNU kernel is the basis of Apple's operating systems. Although labeled as a hybrid kernel, it is found to generally operate in a monolithic manner by defining a single privileged trust zone in which all system functionality resides. This has security implications, as a kernel compromise has immediate and significant effects on the entire system. Over the past few years, Apple has taken steps towards a more compartmentalized kernel architecture and a more microkernel-like design. To date, there has been no scientific discussion of SPTM and related security mechanisms. Therefore, the understanding of the system and the underlying security mechanisms is minimal. In this paper, we provide a comprehensive analysis of new security mechanisms and their interplay, and create the first conclusive writeup considering all current mitigations. SPTM acts as the sole authority regarding memory retyping. Our analysis reveals that, through SPTM domains based on frame retyping and memory mapping rule sets, SPTM introduces domains of trust into the system, effectively gapping different functionalities from one another. Gapped functionality includes the TXM, responsible for code signing and entitlement verification. We further demonstrate how this introduction lays the groundwork for the most recent security feature of Exclaves, and conduct an in-depth analysis of its communication mechanisms. We discover multifold ways of communication, most notably xnuproxy as a secure world request handler, and the Tightbeam IPC framework. The architecture changes are found to increase system security, with key and sensitive components being moved out of XNU's direct reach. This also provides additional security guarantees in the event of a kernel compromise, which is no longer an immediate threat at the highest trust level.

arXiv.org

Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves

https://arxiv.org/abs/2510.09272

#HackerNews #ModerniOSSecurity #DeepDive #SPTM #TXM #Exclaves

Modern iOS Security Features -- A Deep Dive into SPTM, TXM, and Exclaves

The XNU kernel is the basis of Apple's operating systems. Although labeled as a hybrid kernel, it is found to generally operate in a monolithic manner by defining a single privileged trust zone in which all system functionality resides. This has security implications, as a kernel compromise has immediate and significant effects on the entire system. Over the past few years, Apple has taken steps towards a more compartmentalized kernel architecture and a more microkernel-like design. To date, there has been no scientific discussion of SPTM and related security mechanisms. Therefore, the understanding of the system and the underlying security mechanisms is minimal. In this paper, we provide a comprehensive analysis of new security mechanisms and their interplay, and create the first conclusive writeup considering all current mitigations. SPTM acts as the sole authority regarding memory retyping. Our analysis reveals that, through SPTM domains based on frame retyping and memory mapping rule sets, SPTM introduces domains of trust into the system, effectively gapping different functionalities from one another. Gapped functionality includes the TXM, responsible for code signing and entitlement verification. We further demonstrate how this introduction lays the groundwork for the most recent security feature of Exclaves, and conduct an in-depth analysis of its communication mechanisms. We discover multifold ways of communication, most notably xnuproxy as a secure world request handler, and the Tightbeam IPC framework. The architecture changes are found to increase system security, with key and sensitive components being moved out of XNU's direct reach. This also provides additional security guarantees in the event of a kernel compromise, which is no longer an immediate threat at the highest trust level.

arXiv.org

Journée d'étude : Fabliaux – Inauguration du corpus principal

🗓️ 25 juin 2025 - 14h-17h

📍 MSH Lyon Saint-Etienne | Salle Marc-Bloch | 14, av. Berthelot, Lyon 7e

https://projet.biblissima.fr/fr/actualites/journee-fabliaux-25-juin-2025

#txm #bfm #fabliaux

Journée Fabliaux du 25 juin 2025 | Biblissima

Le 25 juin 2025 aura lieu la Journée Fabliaux, à l'occasion de l'ouverture au public de la base de données contenant l'ensemble des fabliaux français du Moyen Âge, soit environ cent-quatre-vingt-dix textes.

[SOLVED] Please help, dear corpus and computational L friends! Is there a #multilingual #model for #TreeTagger, even with a very basic tagset?

I would like to annotate lemma + POS in a #corpus of short #texts in 3-4 European #languages (mainly #German, #English, #French) within #TXM, a process that requires using TreeTagger.

I know I could do that with #spaCy, selecting the right model for each text. But then I need to get those #annotations into shape for import into TXM.

#EasyWayOut?

In a nutshell, I think Bénédicte's talk could be summarized as a "défense et illustration" of the Fisher-Yates-Exact (FYE) test used in the spécificité measure for keyness, followed by a "défense et illustration" of #TXM for investigating specificity results in detail. 😀

Reading of #VoyantTools recently (👋🏻 @felwert ), would you prefer to have a corpus with un-normalized historical spelling variants or rather one with only the lemmatized tokens? We have a mechanism for lemmatizing, but not for "just" normalizing, so this option is not viable for us in the salamanca.school project.

Perhaps @dta_cthomas can you share some experiences with offering both?

Second question: do you know of alternative "distant reading" visualization tools/libraries/platforms to integrate into a (headless) corpus/collection website? (Without trying, I suppose this excludes some visualization-capable corpus analysis apps like #TXM or #CorpusExplorer, but I'd be happy to be proven wrong.)