WHAT STUDENTS
SAY

Epitech innovation hub

  • Innovation is dreamt of and created, not declared.

Welcome to the world of the Epitech Innovation Hub!

  • Our mission/objectives: Help students start their own projects.
  • How does it work:
    • A unique place to share technical abilities.
    • A door to innovation cells, far from companies.
    • Mentors and dedicated students share their expertise to challenge and help other students in various technical areas: big data, cloud, embedded, security, virtuality, mobility, gamedev, web, etc. There are Innovation Hubs at each Epitech campus. Regular interactions with the students are led by the local pedagogical staff, professionals or invited instructors and can take different forms: conferences, debates, methodological discussions, technical or creative workshops, feedbacks. Students benefit from all technical and human resources that are offered by the Hub. Projects are initiated by the students or suggested by partner companies which will dedicate all necessary time to guide the students through their realization. The Epitech Innovation Hub promotes opening to ideas, sharing, collaboration and is targeting to promote all types of innovation (not exclusively technological one).

Learn more

  • Since the conception of computing, data has always been considered only in terms of the software for which it is intended.
    This is the dawn of a new era. Now data has captured our collective attention and has generated many new questions.
    Originating from social networks, sensors, observation cameras and from a multitude of other sources, this information can
    generate new knowledge allowing for the evolution of new tools and services.
  • Big Data unites all techniques to retrieve, store, analyze and use enormous quantities of data in order to create new tools.
    Numerous challenges await students joining this sector of the Hub. From scientific research such as genetics, astrophysics,
    or biology to industry while passing through new uses including health, social networks, and even video games, Big Data inspires imagination.
    In this way, students can learn to understand, to master, and to innovate by finding solutions for Big Data as well in other areas of computer science.

 

  • Students will explore this new region, understand it, and learn to master it whether from
    an administrative point of view, an architecture perspective, or a developmental angle.
  • Participants scope of experimentation will span from the fabrication of a cloud to its utilization,
    including system and network administration, virtualization, infrastructures as a service (IaaS), platforms as a service (PaaS),
    management of a private cloud, exploitation of a public cloud and all internet technologies in general.
  • Students will learn how and why to implement migration to cloud technologies using best practices
    to obtain the most efficient architectures while extracting the maximum benefit from them.

 

  • Embedded systems correspond to all computer systems of reduced size and power, often portable devices
    whose functions react to physical systems including sensors, actuators, robots, and machines or in the mobile sector such as telephones and tablets.
    Concerned economic sectors range from automobiles and aeronautics all the way to development on the cutting edge of mobile devices.
  • Developing portable and efficient code is the main problem in this region – similar to cellular telephones-
    because anything unnecessary impacts the autonomy of the device.
  • This domain of the Hub works on computers of very low
    consumption and from a variety of architectures, for instance AVR (Arduino)
    or ARM (Raspberry, OMAP) to name just a few. Computer sciences and physical
    science are equally exploited system modeling, filtering, control engineering.

 

  • Issues of security in terms of authentication such as biometry, NFC, or smartcards
    are addressed in this field of the Hub whether they are used in networks, on the internet, or in applied security.
  • Making students sensitive to vulnerabilities and aware of best practices is the principle priority allowing students to develop software that is both robust and stable.
  • The context, where both information and availability are equally important, requires that students learn the issues and then provide answers adapted appropriately.
  • Collaboration between the different fields of study within the Hub will give students the chance to implement divergent thinking to create a new vision of computer security
    which is not limited to penetration tests or norms. Embedded systems invade our daily existence ranging from connected objects, intelligent automobiles, smartphones,
    viruses to other malware offering plenty of possibilities and new problems to solve.

 

    • Virtual Environments role in the Hub put humans back in the center of projects in order to interact in the virtual world in much the same way that humans interact in the physical one.
    • Video games, health care and even education also provide opportunities to improve daily existence and to continue to invent new ways for virtual manipulation.
    • Two guiding questions focus activities in this part of the Hub:

How to best exploit existing tools?
How to understand and use concrete innovations?

    • By utilizing a plethora of tools, from the classic mouse-and-keyboard duo,
      to the more modern virtual reality helmets, Virtual Environments strives to make
      tomorrow’s world equally accessible and ergonomic. Immersion dominates the spotlight.