New Search

If you are not happy with the results below please do another search

56 search results for: smart home

51

Artificial Intelligence: the complex question of ethics

The development of artificial intelligence raises many societal issues. How do we define ethics in this area? Armen Khatchatourov, a philosopher at Télécom École de Management and member of the IMT chair “Values and Policies of Personal Information”, observes and carefully analyzes the proposed answers to this question. One of his main concerns is the […]

52

Remote electronic voting – a scientific challenge

Although electronic voting machines have begun to appear at polling stations, many technological barriers still hinder the development of these platforms that could enable us to vote remotely via the Internet. The scientific journal, Annals of Telecommunications, dedicated its July-August 2016 issue to this subject. Paul Gibson, a researcher at Télécom SudParis, and guest editor […]

53

Laurent Toutain

IMT Atlantique | #smartgrids #IoT #HomeNetworks [toggle title=”Learn more” state=”open”] A standardized protocol to respond to the challenges of the IoT [/toggle]  

54

Mounir Mokhtari

Institut Mines-Télécom | #lifequality #ehealth #dependentperson #smarthome [toggle title=”Learn more” state=”open”] City4age, the elderly-friendly H2020 project [/toggle]

55

From epertise in telecommunications networks to the performance of electricity grids

From networks to everyday objects, the internet has radically changed our environment. From the main arteries to the smallest vessels, it is embedded in such a large number of the most banal objects that it puts a strain on the energy bill. Yet now communicating objects can exchange information to optimize their electricity consumption. After […]

56

The security challenges of open IT systems

In today’s society, IT security systems are seriously put to the test: cloud data storage, the omnipresence of micro chips, social networking… Not only does constant communication via networks expose cryptographic systems to multitudes of threatening connections, but security mechanisms must also now function on devices with weak computing capacity, such as mobile phones. The […]