New Search

If you are not happy with the results below please do another search

163 search results for: digital uses

111

Researching technological disruptions to prepare for the future

Fundamental and applied research are often simplistically portrayed as being opposite each other. The Carnot program, run by the Ministry of Higher Education, Research and Innovation, and by the National Research Agency (ANR), challenges this vision. Though its primary objective is to develop virtuous partnerships between public research institutions and companies in order to stimulate […]

112

What is photomechanics?

How can we measure the deformation of a stratospheric balloon composed only of an envelope a few micrometers thick? It is impossible to attach a sensor to it because this would distort the envelope’s behavior… Photomechanics, which refers to measurement methods using images and computer analysis, makes it possible to measure this deformation or a […]

113

Is anonymized data of any value?

Anonymization is still sometimes criticized as a practice that supposedly makes data worthless, as it deletes important information. The CNIL decided to prove the contrary through the Cabanon project conducted in 2017. It received assistance from the IMT big data platform, TeraLab, for anonymizing the data of New York taxis and showing the possibility of […]

114

e-Health companies face challenges in developing business models

The development of technological tools has opened the way for many innovations in the e-health sector. These products and services allow doctors to remotely monitor their patients and help empower dependent persons. Yet the companies that develop and market these solutions find it very difficult to establish viable and sustainable business models. As part of […]

115

Facial morphology analysis algorithms for choosing glasses

Everyone who wears glasses knows: finding the best pair for your face can be a daunting task… The VESPA project, led by researchers at IMT Lille Douai and hosted by the Teralab platform, is working with Cape Trylive to develop machine learning algorithms that can determine users’ facial characteristics during virtual online fittings and recommend […]

116

24 words for understanding cybersecurity

Starting with Algorithm and ending with Virus, this list features terms like Phishing and Firewall… As the symposium entitled “Are we entering a new era of cybersecurity?” is getting underway at IMT, here are 24 words to help you understand the concepts, technologies and systems used to protect people, materials and organizations from cyberattacks. This […]

117

Passwords: security, vulnerability and constraints

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, banking. […]

119

A third ERC grant in 3 years at EURECOM

Getting a grant from the European Research Council is not an easy task but this is what Davide Balzarotti, Professor in the Security Department, has just accomplished. He is the third EURECOM professor to obtain an ERC grant in the past 3 years.   Davide, you just got an ERC Consolidator grant, one of the […]

120

Will health apps soon be covered by health insurance?

Charlotte Krychowski, Télécom École de Management – Institut Mines-Télécom ; Meyer Haggège, Grenoble École de Management (GEM) and Myriam Le Goff-Pronost, IMT Atlantique – Institut Mines-Télécom [divider style=”normal” top=”20″ bottom=”20″] [dropcap]“A[/dropcap]pproval”. It has now been a year since the French National Authority for Health (HAS) reached a positive conclusion on whether the Diabeo application could be reimbursed by national health insurance. […]