Search results for: home network

Left out of the digital revolution?

internet

Dominique Pasquier, Télécom ParisTech, Institut Mines-Télécom (IMT) This text is published as part of the “Digital Society” column written by researchers from the Economic and Social Sciences department at Télécom ParisTech, members of the Interdisciplinary Institute for Innovation (CNRS). Some revolutions are silent ones. Internet integration in working-class areas is …

+

AI to assist the elderly

Empathic

Caring and expressive artificial intelligence? This concept that seems to come straight from a man-machine romance like the movie “Her”, is in fact at the heart of a Horizon 2020 project called EMPATHIC. The project aims to develop software for a virtual and customizable coach for assisting the elderly. To …

+

Sociology and philosophy combine to offer a better understanding of the digital metamorphosis

digital metamorphosis

Intellectual, professional, political, personal, private: every aspect of our lives is affected by technological developments that are transforming our society in a profound way. These changes raise specific challenges that require a connection between the empirical approaches of sociology and philosophical questioning. Pierre-Antoine Chardel, a philosopher, social science researcher and …

+

Cybersecurity: new times, new challenges

cybersecurity

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false …

+

Fraud on the line

fraud

An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. This article …

+

Hardware attacks, a lingering threat for connected objects

hardware attacks

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against …

+

GDPR: managing consent with the blockchain?

consent, consentement

Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent to personal data processing.   The GDPR has come into force …

+

Artificial Intelligence hiding behind your computer screen!

Aizimov BEYABLE startup artificial intelligence

Far from the dazzle of intelligent humanoid robots and highly effective chatbots, artificial intelligence is now used in many ordinary products and services. In the software and websites consumers use on a daily basis, AI is being used to improve the use of digital technology. This new dynamic is perfectly …

+

HyBlockArch: hybridizing the blockchain for the industry of the future

HyBlockArch

Within the framework of the German-French Academy for the Industry of the Future, a partnership between IMT and Technische Universität München (TUM), the HyBlockArch project examines the future of the blockchain. This project aims to adapt this technology to an industrial scale to create a powerful tool for companies. To …

+

What is artificial intelligence?

Artificial intelligence

Artificial intelligence (AI) is a hot topic. In late March, the French government organized a series of events dedicated to this theme, the most notable of which was the publication of the report “For a Meaningful Artificial Intelligence,” written by Cédric Villani, a mathematician and member of the French parliament. …

+