New Search

If you are not happy with the results below please do another search

154 search results for: digital uses

102

Researching technological disruptions to prepare for the future

Fundamental and applied research are often simplistically portrayed as being opposite each other. The Carnot program, run by the Ministry of Higher Education, Research and Innovation, and by the National Research Agency (ANR), challenges this vision. Though its primary objective is to develop virtuous partnerships between public research institutions and companies in order to stimulate […]

103

What is photomechanics?

How can we measure the deformation of a stratospheric balloon composed only of an envelope a few micrometers thick? It is impossible to attach a sensor to it because this would distort the envelope’s behavior… Photomechanics, which refers to measurement methods using images and computer analysis, makes it possible to measure this deformation or a […]

104

Is anonymized data of any value?

Anonymization is still sometimes criticized as a practice that supposedly makes data worthless, as it deletes important information. The CNIL decided to prove the contrary through the Cabanon project conducted in 2017. It received assistance from the IMT big data platform, TeraLab, for anonymizing the data of New York taxis and showing the possibility of […]

105

e-Health companies face challenges in developing business models

The development of technological tools has opened the way for many innovations in the e-health sector. These products and services allow doctors to remotely monitor their patients and help empower dependent persons. Yet the companies that develop and market these solutions find it very difficult to establish viable and sustainable business models. As part of […]

106

Facial morphology analysis algorithms for choosing glasses

Everyone who wears glasses knows: finding the best pair for your face can be a daunting task… The VESPA project, led by researchers at IMT Lille Douai and hosted by the Teralab platform, is working with Cape Trylive to develop machine learning algorithms that can determine users’ facial characteristics during virtual online fittings and recommend […]

107

24 words for understanding cybersecurity

Starting with Algorithm and ending with Virus, this list features terms like Phishing and Firewall… As the symposium entitled “Are we entering a new era of cybersecurity?” is getting underway at IMT, here are 24 words to help you understand the concepts, technologies and systems used to protect people, materials and organizations from cyberattacks. This […]

108

Passwords: security, vulnerability and constraints

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, banking. […]

109

Learning to deal with offensive environmental odors

What is an offensive environmental odor? How can it be defined, and how should its consequences be managed? This is what students will learn in the serious game “Les ECSPER à Smellville”, part of the Air Quality MOOC. This educational tool was developed at IMT Lille Douai, and will be available in 2018. Players will […]

110

A third ERC grant in 3 years at EURECOM

Getting a grant from the European Research Council is not an easy task but this is what Davide Balzarotti, Professor in the Security Department, has just accomplished. He is the third EURECOM professor to obtain an ERC grant in the past 3 years.   Davide, you just got an ERC Consolidator grant, one of the […]