New Search

If you are not happy with the results below please do another search

5 search results for: RFID

1

Will buildings soon achieve self-awareness?

The SUST(AI)N project aims to create connected and aware buildings with a focus on human needs. The technological blocks for this system include ubiquitous and invisible sensors powered by radio frequency signals. A Telecom SudParis team has been working on this new development for over a year.

2

Étienne Perret, IMT-Académie des sciences Young Scientist prize

What if barcodes disappeared from our supermarket items? Étienne Perret, a researcher in radio-frequency electronics at Grenoble INP, works on identification technologies. His work over recent years has focused on the development of RFID without electronic components, commonly known as chipless RFID. The technology aims to offer some of the advantages of classical RFID but […]

3

20 terms for understanding the environmental impact of digital technology

While digital technology plays an essential role in our daily lives, it also a big consumer of resources. To explore the compatibility between the digital and environmental transitions, Institut Mines-Télécom and Fondation Mines-Télécom are publishing their 12th annual brochure entitled Numérique : Enjeux industriels et impératifs écologiques (Digital Technology: Industrial Challenges and Environmental Imperatives). This […]

4

Emergency logistics for field hospitals

European field hospitals, or temporary medical care stations, are standing by and ready to be deployed throughout the world in the event of a major disaster. The HOPICAMP project, of which IMT Mines Alès is one of the partners, works to improve the logistics of these temporary medical centers and develop telemedicine tools and training […]

5

The security challenges of open IT systems

In today’s society, IT security systems are seriously put to the test: cloud data storage, the omnipresence of micro chips, social networking… Not only does constant communication via networks expose cryptographic systems to multitudes of threatening connections, but security mechanisms must also now function on devices with weak computing capacity, such as mobile phones. The […]