New Search

If you are not happy with the results below please do another search

116 search results for: Regulation

111

The major transformations of the 21st century: “the humanities and social sciences are essential”

New materials, artificial intelligences, green energy, virtual reality, 5G… so many new innovations are impacting our society. The transformations they bring about result in changes to organizations, and redefine the role humans play in their environment, in both the professional and private realms. According to Christian Roux, Executive VP for Research and Innovation at IMT, […]

112

Digital transition: the music industry reviews its progress

The music industry – the sector hit hardest by digitization – now seems to have completed the transformation that was initiated by digital technology. With the rise of streaming music, there has been a shift in the balance of power. Producers now look for revenue from sources other than record sales, and algorithms constitute the […]

114

Artificial Intelligence: the complex question of ethics

The development of artificial intelligence raises many societal issues. How do we define ethics in this area? Armen Khatchatourov, a philosopher at Télécom École de Management and member of the IMT chair “Values and Policies of Personal Information”, observes and carefully analyzes the proposed answers to this question. One of his main concerns is the […]

115

The Cybersecurity of Critical Infrastructures Chair welcomes new partner Société Générale

The Institut Mines-Télécom Cybersecurity Chair, launched last year on January 25 as part of the dynamic created by the Center of Cyber Excellence, is aimed at contributing to the international development of research activities and training opportunities in an area that has become a national priority: the cybersecurity of critical infrastructures (energy networks, industrial processes, […]

116

The security challenges of open IT systems

In today’s society, IT security systems are seriously put to the test: cloud data storage, the omnipresence of micro chips, social networking… Not only does constant communication via networks expose cryptographic systems to multitudes of threatening connections, but security mechanisms must also now function on devices with weak computing capacity, such as mobile phones. The […]