{"id":198,"date":"2017-09-28T15:10:28","date_gmt":"2017-09-28T15:10:28","guid":{"rendered":"http:\/\/www.uvolante.org\/wordpress\/?page_id=198"},"modified":"2020-02-23T08:52:03","modified_gmt":"2020-02-23T08:52:03","slug":"technologies-de-linformation","status":"publish","type":"page","link":"https:\/\/www.uvolante.org\/index.php\/cours\/technologies-de-linformation\/","title":{"rendered":"Technologies de l&#8217;information"},"content":{"rendered":"<h3>Support de cours<\/h3>\n<p><span style=\"font-family: arial,helvetica,sans-serif;\">Transparents sur l&#8217;<a href=\"https:\/\/cloud.uvolante.org\/index.php\/s\/jWGgm7ZNDkaYtat\/download\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">architecture d&#8217;Internet<\/a>. <\/span><\/p>\n<h3>Expos\u00e9s<\/h3>\n<p><span style=\"font-family: arial,helvetica,sans-serif;\"><em>Propositions<\/em> de sujets d&#8217;<a href=\"https:\/\/portal.uvolante.org\/sh\/X5X\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">expos\u00e9s<\/a> : <\/span><\/p>\n<ol>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Co\u00fbt \u00e9cologique des TIC<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Crypto-monnaies : BitCoin <em>vs.<\/em> Ethereum (<em>vs.<\/em> Hypergraph ?)<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Anonymat et pseudonymat<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Censure sur Internet<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Intelligence artificielle (et b\u00eatise naturelle)<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Que sait mon t\u00e9l\u00e9phone \u00e0 mon sujet ? <\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">D\u00e9pendance \u00e9conomique d&#8217;Internet \u00e0 la publicit\u00e9 <\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Neutralit\u00e9 du Net<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">R\u00e9seaux sociaux et z\u00e9ros sociaux (harc\u00e8lement, <em>fake news<\/em>)<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Architectures : centralis\u00e9e <em>vs.<\/em> distribu\u00e9e<\/span><\/li>\n<li>La 5G et le cas de la ville de Bruxelles<\/li>\n<\/ol>\n<h3>Bibliographie<\/h3>\n<ul>\n<li>Dominique Cardon, <a href=\"http:\/\/www.seuil.com\/ouvrage\/a-quoi-revent-les-algorithmes-dominique-cardon\/9782021279962\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">\u00c0 Quoi R\u00eavent les Algorithmes ?<\/a>, Seuil, 2015, ISBN <a href=\"http:\/\/corail.sudoc.abes.fr\/DB=2.1\/CMD?ACT=SRCHA&amp;IKT=7&amp;SRT=RLV&amp;TRM=978-2021279962\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">978-2021279962<\/a><\/li>\n<li>Guillaume Pitron, <a href=\"http:\/\/www.editionslesliensquiliberent.fr\/livre-La_guerre_des_m%C3%A9taux_rares-9791020905741-1-1-0-1.html\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">La Guerre des M\u00e9taux Rares<\/a>, Les Liens qui Lib\u00e8rent, 2018, ISBN <a href=\"http:\/\/corail.sudoc.abes.fr\/DB=2.1\/CMD?ACT=SRCHA&amp;IKT=7&amp;SRT=RLV&amp;TRM=979-10-209-0574-1\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">979-10-209-0574-1<\/a><\/li>\n<li>Aude Seigne, <a href=\"http:\/\/www.editionszoe.ch\/livre\/une-toile-large-comme-le-monde\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Une Toile Large Comme le Monde<\/a>, \u00c9ditions Zo\u00e9, 2017, ISBN <a href=\"http:\/\/corail.sudoc.abes.fr\/DB=2.1\/CMD?ACT=SRCHA&amp;IKT=7&amp;SRT=RLV&amp;TRM=978-2-88927-458-1\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">978-2-88927-458-1<\/a><\/li>\n<li>Elaine Shannon, <a href=\"https:\/\/www.harpercollins.fr\/livre\/12296\/harpercollins\/paul-leroux-l-entrepreneur-du-crime-2-0\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Paul LeRoux \u2013 L&#8217;Entrepreneur du Crime 2.0<\/a>, HarperCollins France, 2019, ISBN 979-10-339-0446-5<\/li>\n<\/ul>\n<p>Voir \u00e9galement celle de l&#8217;<a href=\"https:\/\/www.april.org\/bibliographie-du-logiciel-libre\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">APRIL<\/a>.<\/p>\n<h3>Vid\u00e9ographie<\/h3>\n<ul>\n<li>Gerhard Widmer et Michael Wolff, <a href=\"https:\/\/www.youtube.com\/watch?v=1HcfIAat2xQ\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">20000 C\u00e2bles sous les Mers<\/a>, 2016<\/li>\n<li>Sam Esmail, <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Mr._Robot_(s%C3%A9rie_t%C3%A9l%C3%A9vis%C3%A9e)\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Mr. Robot<\/a>, USA Network, 2015\u20132019<\/li>\n<li><a href=\"https:\/\/www.fdn.fr\/actions\/confs\/\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Conf\u00e9rences<\/a> du <a href=\"https:\/\/www.fdn.fr\/\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\"><em>French Data Network<\/em><\/a> (par <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Benjamin_Bayart\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Benjamin Bayart<\/a>)<\/li>\n<\/ul>\n<h3>Produits locaux de la Cuvette<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.gresille.org\/\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Gr\u00e9sille<\/a> (<a href=\"https:\/\/framalibre.org\/\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">services libres<\/a>)<\/li>\n<li><a href=\"https:\/\/www.rezine.org\/\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">R\u00e9zine<\/a> (FAI associatif)<\/li>\n<li><a href=\"https:\/\/www.logre.eu\/\" class=\"external external_icon\" rel=\"nofollow\" target=\"_blank\">Laboratoire Ouvert Grenoblois<\/a> (<em>hackerspace<\/em>)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Support de cours Transparents sur l&#8217;architecture d&#8217;Internet. Expos\u00e9s Propositions de sujets d&#8217;expos\u00e9s : Co\u00fbt \u00e9cologique des TIC Crypto-monnaies : BitCoin vs. Ethereum (vs. Hypergraph ?) Anonymat et pseudonymat Censure sur Internet Intelligence artificielle (et b\u00eatise naturelle) Que sait mon t\u00e9l\u00e9phone<span class=\"ellipsis\">&hellip;<\/span><\/p>\n<div class=\"read-more\"><a href=\"https:\/\/www.uvolante.org\/index.php\/cours\/technologies-de-linformation\/\">Read more <span class=\"screen-reader-text\">Technologies de l&#8217;information<\/span><span class=\"meta-nav\"> &#8250;<\/span><\/a><\/div>\n<p><!-- end of .read-more --><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":57,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-198","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/198"}],"collection":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":22,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/198\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/198\/revisions\/430"}],"up":[{"embeddable":true,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/57"}],"wp:attachment":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/media?parent=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}