Beyond hype and hatred, this article focuses on the way Artificial Intelligence (AI) – actually Deep Learning – is integrated in reality, through sensor and actuator.* Operationalisation demands to develop a different way to look at AI. The resulting understanding allows highlighting the importance of sensor and actuator, the twin interface between AI and its… Read More
Alors que nous entrons dans la «quatrième révolution industrielle», dans l’ère de la transformation numérique, dans un nouvel «IA-monde» et dans la «seconde révolution quantique», la sécurité nationale et internationale doit s’adapter. Elle doit le faire en anticipant ce monde futur, en évitant les surprises et les menaces tant nouvelles qu’anciennes, tout en saisissant les… Read More
As we enter the “fourth industrial revolution”, the age of the digital transformation, a new emerging “AI-world”, and the “second quantum revolution”, national and international security must adapt. It must do so by anticipating this future world, avoiding surprises related to new – but also old – threats and dangers, while seizing the immense opportunities offered by what is no less than a change of paradigm (For the labels, respectively, Klaus Schwab, World Economic Forum, Helene Lavoix, The Future Artificial Intelligence – Powered World series, The Red (Team) Analysis Society, Jonathan P. Dowling, Gerard J. Milburn, “Quantum Technology: The Second Quantum Revolution”, 13 Jun 2002, arXiv:quant-ph/0206091v1).
Accès à la version française
The strategy related to cyber space and cyber security varies according to countries – and actors. It is handled in various ways by different types of agencies. After having briefly presented the main French, British and American state actors for cyber security, we shall focus on the French outlook and present the ANSSI, its goals and finally new outreach initiative, Agora 41.
This article focuses on the political and geopolitical consequences of the feedback relationship linking Artificial Intelligence (AI) in its Deep Learning component and computing power – hardware – or rather high performance computing power (HPC). It builds on a first part where we explained and detailed this connection. Related Artificial Intelligence, Computing Power and Geopolitics… Read More
This article explains further what a cryptocurrency is, with the examples of Bitcoin, Ethereum and Ripple, focusing on the most common underlying technology, the blockchain and its implementation. It underlines commonalities and differences between the three cryptocurrencies, starting highlighting their potential advantages and dangers compared with classical international currencies. It notably singles out one of the main challenges characterizing the Bitcoin phenomenon: energy sustainability.
“Airpocalypse” turns the air of the great Chinese cities into a kind of chronic and massive chemical attack. Meanwhile, ecological issues are gaining a new and strong political traction. In the meantime, China is also becoming a world leader of the digital transformation. In other words, two major dynamics run through China in the same… Read More
The Chinese presence in cyberspace is gathering speed, scope and mass. This was especially obvious during the “One Belt, One Road” Forum for International Cooperation that took place in Beijing on 14 15 May 2017. There, the Chinese government and companies and their counterparts from more than 69 Asian, African, American and European countries signed… Read More