New Search

If you are not happy with the results below please do another search

82 search results for: home network

41

How has digital technology changed migrants’ lives?

Over the past few decades, migrants have become increasingly connected, as have societies in both their home and host countries. The use of new technologies allows them to maintain ties with their home countries while helping them integrate in their new countries. They also play an important role in the process of migration itself. Dana […]

42

Left out of the digital revolution?

Dominique Pasquier, Télécom ParisTech, Institut Mines-Télécom (IMT) This text is published as part of the “Digital Society” column written by researchers from the Economic and Social Sciences department at Télécom ParisTech, members of the Interdisciplinary Institute for Innovation (CNRS). [divider style=”dotted” top=”20″ bottom=”20″] [dropcap]S[/dropcap]ome revolutions are silent ones. Internet integration in working-class areas is one […]

43

AI to assist the elderly

Caring and expressive artificial intelligence? This concept that seems to come straight from a man-machine romance like the movie “Her”, is in fact at the heart of a Horizon 2020 project called EMPATHIC. The project aims to develop software for a virtual and customizable coach for assisting the elderly. To learn more, we interviewed the […]

44

Sociology and philosophy combine to offer a better understanding of the digital metamorphosis

Intellectual, professional, political, personal, private: every aspect of our lives is affected by technological developments that are transforming our society in a profound way. These changes raise specific challenges that require a connection between the empirical approaches of sociology and philosophical questioning. Pierre-Antoine Chardel, a philosopher, social science researcher and specialist in ethics at Institut […]

45

Cybersecurity: new times, new challenges

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false and dated image. But due […]

46

Fraud on the line

An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. [divider style=”normal” top=”20″ bottom=”20″] This article is […]

47

Hardware attacks, a lingering threat for connected objects

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team […]

48

GDPR: managing consent with the blockchain?

Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent to personal data processing.   The GDPR has come into force at last! Six years have […]

49

Artificial Intelligence hiding behind your computer screen!

Far from the dazzle of intelligent humanoid robots and highly effective chatbots, artificial intelligence is now used in many ordinary products and services. In the software and websites consumers use on a daily basis, AI is being used to improve the use of digital technology. This new dynamic is perfectly illustrated by two startups incubated […]