[FR] La Confédération s’arme face aux cyberattaques avec un office dédié à ce fléau
Prof. Hubaux, C4DT Academic Director, provides insight on the confederation’s decision to create a federal office for cybersecurity.
Prof. Hubaux, C4DT Academic Director, provides insight on the confederation’s decision to create a federal office for cybersecurity.
C4DT is organizing the 7th edition of the “FICT for Decision Makers” course. The target audience is managers and executives, without any technical prerequisites. The audience will gain in-depth understanding of the digital ecosystem.
The problem Here is a common scenario we have all run into: you need to communicate some piece of secret information, say a password, to another person. Perhaps it’s on-boarding a new colleague, or to allow access for a partner. But you don’t want to compromise this secret by transmitting it over an insecure channel, (…)
Ce samedi ont commencé à l’EPFL les Applied Machine Learning Days (AMLD), cinq jours de conférences sur l’intelligence artificielle. Ses possibilités se sont démultipliées, ce qui pose aussi des problèmes.
The Rule of Law, Democracy and the Future of Europe in the Age of Artificial Intelligence in collaboration with Fondation Jean Monet pour l’Europe and EPFL.
One of the ways public blockchains are touted is that they can replace your bank account. The idea is that you don’t need a central system anymore, but can open any number of accounts, as needed. However, as there is no central place, it is sometimes difficult to know how much money you have left. (…)
Today it’s something about actual hardware, not just software. For Christmas I took a long LED-strip and hooked it up to an Arduino One to create some animations. But not having WiFi was a bit of a shame, because this meant you couldn’t control it from a smartphone. So I dug around and found this: (…)
Le vol de données de plus de 500 000 personnes dans les serveurs du CICR relance l’idée d’une implication technologique de la Suisse pour aider les ONG dont elle abrite le siège. Par exemple avec un cloud lancé en Suisse
In 2022, the #MITCDOIQ will bring the globally renowned Chief Data Officer & Information Quality Symposium (CDOIQ) hosted at MIT to Europe for the first time, in cooperation with the Competence Center Corporate Data Quality (University of Lausanne – UNIL) and the Swiss Data Science Center (ETH Zurich & EPFL). The CDOIQ Symposium has established itself as one of the most important data events to exchange innovative ideas, best practices and to promote the adoption of the CDO role.
En deux ans de pandémie, la Suisse a fait du bon et du moins bon. Les deux épidémiologistes Marcel Salathé et Christian Althaus tirent un premier bilan, et appellent notamment à créer une cellule de crise nationale coordonnant les différents acteurs.
[et_pb_section fb_built=”1″ admin_label=”Hero” _builder_version=”4.7.7″ background_color=”#a0c3d2″ background_color_gradient_direction=”271deg” hover_enabled=”0″ collapsed=”off” sticky_enabled=”0″ custom_padding=”||||false|false”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.7″ background_color=”#0091aa” background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%” max_width=”100%” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_color_all=”rgba(0,0,0,0)” border_style_all=”none” use_custom_width=”on” width_unit=”off” custom_width_percent=”100%” sticky_enabled=”0″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”60px|0px|100px|10%” custom_padding_tablet=”20px|10%|0px|10%” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.7″ text_font=”Merriweather||on||||||” text_text_color=”rgba(255,255,255,0.5)” text_font_size=”26px” text_line_height=”1.8em” header_font=”||||||||” background_layout=”dark” custom_margin=”||||false|false” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”10%” text_line_height_tablet=”1.8em” text_line_height_last_edited=”off|desktop”]February 7-11th, 2022, online[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][/et_pb_column][/et_pb_row][et_pb_row (…)
For the Travel & Connectivity Week at Expo 2020, the Swiss Pavilion is going to look at the mobility sector from the eyes of digitalisation. Matthias Finger, C4DT affiliated Professor, will be moderating the event.
This C4DT partner workshop will take place online and is by invitation only.
For all C4DT partners: Please send us an email if you are interested in participating. This workshop is limited to 20 participants. We still have few “screens” open.
Artificial Intelligence holds great promise for the economy and society. It has also led to the explosion of new ethical challenges, such as biased decision making, filter bubbles, data protection, face recognition, deep fakes and cyber security.
During this week we aim to create awareness of the ethical and privacy dilemmas with AI, explored from 4 different angles – business impact, cultural, technological and regulatory.
For more information, please click below
This work aims at creating a Proof of Concept of storing and managing data on a blockchain. This work answers the following two use-cases: (i) compliant storage, transfer and access management of (personal) sensitive data and (ii) compliant cross-border or cross-jurisdiction data sharing.
DEDIS brings to the table a permissioned blockchain and distributed ledger using a fast catch up mechanism that allows for very fast processing of the requests, while staying secure. It also includes a novel approach to encryption and decryption, where no central point of failure can let the documents be published to outsiders (Calypso). Swiss Re brings to the table interesting use cases which will require DEDIS to extend Calypso to implement data location policies.
In this collaboration (structured in two projects) we develop an automated tool to flag messages sent by planes which are suspicious of using weak encryption mechanisms. We mainly focus on detecting the use of classical ciphers like substitution and transposition ciphers. The tool flags messages and identifies the family of ciphers. We also aim to develop automated decryption techniques for the weakest ciphers.
In this project, we work on providing a privacy-preserving biometric solution for humanitarian aid distribution. The project seeks to understand the requirements of aid distribution in emergency situation and design a solution that enables the use of biometrics without endangering the beneficiaries that need access to aid.