WHAT DOES INFRASTRUCTURE MEAN?
|
|
- Colleen Hill
- 6 years ago
- Views:
Transcription
1 WHAT DOES INFRASTRUCTURE MEAN? Lars-Johan Liman Sr. Systems Specialist Netnod Internet Exchange, Stockholm, Sweden, v1.6
2 Infrastructure The installations that form the basis for any operation or system. Qualified:... required for the operations of a society. 2
3 3
4 4
5 5
6 6
7 7
8 Classic Infrastructure, e.g.: Life support: Water provisioning, fuel, electric power, district heating Trade: Ports, roads, railroads, airports Communication: Physical: ports, roads railroads, airports Logical: mail, telegraphy, telephony (land and mobile), Internet. 8
9 Internet? Is the Internet infrastructure? Yes, without any doubt. So... how does it compare to traditional infrastructure? 9
10 Typical Properties Anybody can use it. Different cultures and languages. Multi-purpose. Flat fee (tax?). Enables business and trade. Dependable and predictable support in crises. Invisible part of everyday life. Large, expensive, longterm investment. Regulated. Cross-dependencies... The value is bigger than the sum of the costs. Event, plats, YYYY-MM-DD, Föredragshållare, Ev. annan info 10
11 Communication using infrastructure End-to-end Integrity Conformance 11
12 Everyone? Is the Internet for everyone? Yes, of course it is! (This is silly!) 12
13 Really everyone? Grandmother? 2-year-old? The farmer in Zimbabwe? The politician in Gaza? Watch out for the digital divide! Education, learning curve, generations. New problem? No. 13
14 Multi-purpose Check! The amount of applications on the Internet is mind boggling! The end-to-end model has enabled great freedom of innovation.... and business! 14
15 More properties... Enables business and trade. [Check!] Encouraged by flat fee? Dependable and predictable support in crises. [Check!] New soft forms of crises. Invisible part of everyday life. [Almost there...] Large, expensive, long-term investment. [Yup!] Regulated. [Depends...] Cross-dependencies... [Sure!] 15
16 But how come it works? Infrastructure only works if we cooperate, share, and respect each other. 16
17 Soft infrastructure? Laws, regulations, and conventions. These tell us how to behave, and what to expect from others = "protocol". Make society thrive. Process for creating law. Law enforcement. Governance / government. 17
18 On the net? ICANN Multistakeholder model RIPE / RIPE NCC National regulatory bodies Classic law enforcement. 18
19 Protocol? Technical: IETF, W3C, and others Openness innovation business. Protocols need to be robust. Human: netiquette No protocol no function. A few mavericks can be handled. 19
20 Services There is no money to be made in transport. The Internet is useless without services. The services are part of the infrastructure. Will they work during crises? Natural disaster crises? Technical crises? Business crises? Political crises? Need to find the balance in providing services without hindering others from providing other services. 20
21 More soft infrastructure Maps Addresses Time tables Time itself! News 21
22 Information! Is information itself infrastructure? Access to information. Meta-information (e.g., directories) Whom are you talking to? Authentication? Expensive! Authority? 22
23 Cross dependencies Physical environment (power, air-cond, ) Address information Topological information Intermediate systems and services Time Operational skills and the the service itself (direct dependency). 23
24 Obstacles Moving away from the end-to-end model! Control shifts from end user to intermediaries. Cripples the users ability to determine authenticity and authority. Usage model also changes Web server, store and forward. Note well: store... For how long? For what purpose? Says who? BUT... makes it easier to enforce protocol. 24
25 Constraints ISP control: we re here to make your life easy. Centralized application: you only need a web browser or download our app!. Law enforcement: we re here to protect you!. And they are! Difficult. Address depletion. IPv6 designed to help, but... Stop-gap solutions aggravate current situation. Networks upon networks of deception. 25
26 Who s in control? The ISP private company? The centralized application private company? The law enforcement govt. agency Democratic values? Freedom of speech? Anonymity? 26
27 Restricted? Control means ability to restrict, censor, and infiltrate (e.g., DNS and SMTP blocking/hijacking with limited capabilities). Big sledgehammer often used instead of appropriate methods. = Man-in-the-middle attack? Restrict access to infrastructure? Hamstring on innovation. Who speaks for Joe User? There is no right way to do censorship. Even the best version of a bad idea remains a bad idea. 27
28 Where do you fit in the picture? You are the Internet navvies, the station masters, the bridge engineers! You design and operate this! 28
29 You contribute! to providing connections between the end user and the other end user. to making sure grandma's security alarm can reach the emergency centre. to making it possible for that 3-year-old to talk and wave to daddy 3,000 miles away. to making sure the expert doctors at the hospital can receive the X-ray pictures from the far away treatment centre to assist in surgery. 29
30 You contribute! to providing means to help lost refugees find their relatives. to enabling new business to thrive on new inventions. to building community trust in our infrastructure. 30
31 You're it! You are not building computer networks, you are building infrastructure! and you're part of it yourself! But bear in mind that people have very high expectations on infrastructure. You are expected to meet them or exceed them. Including during crises. Build for long term future communication, innovation, and business! Build and provide services, but don't hinder others from building other services. 31
32 THE INTERNET WILL THRIVE ONLY AS LONG AS PEOPLE CAN USE IT LIKE INFRASTRUCTURE! All photos are taken by Lars-Johan Liman, and used with permission in this presentation. Other use is restricted., v1.6
Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)
ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master
More informationIPv6 & Internet Governance Developments. CANTO Nate Davis, Chief Operating Officer
IPv6 & Internet Governance Developments CANTO Nate Davis, Chief Operating Officer 13 August 2014 2 History of the Internet Protocol Internet Protocol version 4 (IPv4) Developed for the original Internet
More informationIT POLICY AND PROJECTS THAILAND
IT POLICY AND PROJECTS THAILAND Mr. Kitti Sriboonyagorn Acting Director Digital Technology Infrastructure Bureau Ministry of Digital Economy and Society Thailand 4.0 is a model aims to eliminate the middle
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationThe Regional Internet Registries
The Regional Internet Registries Managing Internet Number Resources www.afrinic.net www.apnic.net www.arin.net www.lacnic.net www.ripe.net www.nro.net Global Coordination A Fair and Stable Platform Whether
More informationImpact of Infrastructure Modernization and Selection of Appropriate Technical Solutions to Enhance IPO Business Services
Impact of Infrastructure Modernization and Selection of Appropriate Technical Solutions to Enhance IPO Business Services Evaluating and deciding on the appropriate technology according to the needs and
More informationIPv4 Depletion and IPv6 Adoption Today. Richard Jimmerson
IPv4 Depletion and IPv6 Adoption Today Richard Jimmerson 2 History of the Internet Protocol Internet Protocol version 4 (IPv4) Developed for the original Internet (ARPANET) in 1978 4 billion addresses
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationWith certain types of prepaid account, you can do just about everything a traditional bank account allows you to do, including using your prepaid
With certain types of prepaid account, you can do just about everything a traditional bank account allows you to do, including using your prepaid card to shop in store and online. But the key is you cannot
More informationCross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011
Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Issue Benefits of the Internet & Cloud Computing Aspen Institute IDEA (9/12/11 draft) An unfettered flow of
More information6 th European Energy Forum
1 UNLOCKING SMART CAPABILITIES FOR LOCAL AUTHORITIES Jan Kowalczyk, CEO, Banner Group, Warsaw, Poland 6 th European Energy Forum Unlocking smart capabilities for local authorities Paris, 22-23 May 2017
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationCHAPTER 13 ELECTRONIC COMMERCE
CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationThe Number Registry System
The Number Registry System RIPE, the RIPE NCC and Global Internet Governance Chris Buckridge 19 April 2017 RIPE NCC Roundtable Meeting RIPE NCC A not-for-profit membership association under Dutch law Founded
More informationAdvanced Metering Infrastructure. Joris van Rooij Göteborg Energi
Advanced Metering Infrastructure Joris van Rooij Göteborg Energi Contents Company information Advanced Metering Infrastructure? AiMiR Challenges Our ecological footprint is growing bigger all the time
More informationMore than 5,100. Today & Tomorrow: How Technology Is Changing the Future. AT&T employees working in Ohio as of December 31, /8/2018.
Friday, February 2, 2018 Today & Tomorrow: How Technology Is Changing the Future AT&T Ohio 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are
More informationThinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing
Thinking cities Khalil Laaboudi Smart & Sustainable Cities Global Marketing Thinking Cities -- Agenda I. Ericsson in the World and in Hong Kong II. III. IV. Networked Society and other global trends New
More informationSMARTPTT PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS
SMARTPTT PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS OVERVIEW PREMIUM CONTROL ROOM SOLUTION FEATURE-RICH, ROBUST
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationINFORMATION SECURITY NO MORE THE CINDERELLA?
INFORMATION SECURITY NO MORE THE CINDERELLA? Lord Toby Harris THE VIEW FROM THE KITCHEN Information security the Cinderella of technology Information security the Cinderella of security Who are the Ugly
More informationTRBONET PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS
TRBONET PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS OVERVIEW PREMIUM CONTROL ROOM SOLUTION FEATURE-RICH, ROBUST AND
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationGSR-14 Internet Governance: an overview of the situation
GSR-14 Internet Governance: an overview of the situation Jeferson Fued Nacif Head, International Affarirs Office, Anatel, Brazil 2014 Agenda 1. Internet Governance 2. Why it is important Regulator s perspective
More informationMartin Mueller Director of Information Technology Reno-Tahoe International Airport
Cyber Security Cautionary tales for airport attorneys concerning cyber security measures to protect the airport from breaches and how to respond if there is a breach Martin Mueller Director of Information
More informationASREN Arab States Research and Education Network
ASREN Arab States Research and Education Network IPv6 & NREN Internet2 Middle East Regional Interest Group Meeting Amman Jordan 13 Dec. 2011 Alaa AL-Din Al-Radhi IPv6, Cyber Security & Emerging Technologies:
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationPKI (digital ID security services) extension of RESPONSE ON CONSULTATION DOCUMENT ON THE FINAL REPORT OF THE EXPERT GROUP ON E-INVOICING
Datum: 2010-03-08 1(6). Commission européenne Internal Market and Services DG BE-1049 Bruxelles markt-e-invoicing@ec.europa.eu entr-einvoicing@ec.europa.eu PKI (digital ID security services) extension
More informationITU and IPv6. ARIN October, Los Angeles by Richard Hill
ITU and IPv6 ARIN 26-28 October, Los Angeles by Richard Hill Telecommunication Standardization Bureau () International Telecommunication Union, Geneva Place des Nations - CH-1211 Geneva 20 Switzerland
More informationInterception Technology
Interception Technology The Good, The Bad, and The Ugly! Massachusetts Institute of Technology Page 1 What is Interception Ability to list/view/record information as it travels between some number of parties,
More informationInternet Interconnection An Internet Society Public Policy Briefing
Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationSecuring our Nation Emergency Management and Disasters
Securing our Nation Emergency Management and Disasters Mike Shapland MBE D irector, Interoperability and Innovation Photo: QPS Facebook Photo: QPS Facebook Photo: QPS Facebook Photo: Ergon Energy Photo:
More informationLiberia ICT Policy
Liberia ICT Policy 2017-2021 Initial Stakeholders Consultation Eleanor Sarpong Head of Policy and Advocacy November 23, 2016 a4ai.org Goals of consultation To convene under the auspices of the GoL (MoPT
More informationETHERNITY DECENTRALIZED CLOUD COMPUTING
ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY
More informationInteroperability Platform and Standardization Efforts
Interoperability Platform and Standardization Efforts FP7-SEC-2013-1 Funded by European Commission Project ID 607768 ETSI Workshop Sophia Antipolis, 10 May 2016 REDIRNET - The static and streamed data
More informationStrategy for information security in Sweden
Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information
More informationESRIF & Working Group Innovation WG 9. Alois J. Sieber Chairman ESRIF WG # 9
ESRIF & Working Group Innovation WG 9 Alois J. Sieber Chairman ESRIF WG # 9 Content of this presentation Background ESRIF Security a definition WG INNOVATION Structure Findings (examples) Challenges Evolution
More informationInformation Sharing and Cooperation
Information Sharing and Cooperation Building Partnerships Between Private and Public Actors SANS 2008 European Community SCADA and Process Control Summit, 8-11 September, Amsterdam Dr. Åke J. Holmgren
More informationInternet Management - Past, Present, Future
Internet Management - Past, Present, Future U-Connect 2006 12-13 September 2006, Kazakhstan, Almaty Nurani Nimpuno APNIC 1 What is the Internet? A Network of Networks Independent networks can join a single
More informationG8 Lyon-Roma Group High Tech Crime Subgroup
G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies
More informationStarting from the basics: cybersecurity awareness campaigns in the electricity and energy sector
Session: Digital security risks to the energy infrastructure: electricity Starting from the basics: cybersecurity awareness campaigns in the electricity and energy sector Stefano Bracco Stefano.BRACCO@acer.europa.eu
More informationRWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges
5 th SG 13 Regional Workshop for Africa on "ITU-T Standardization Work on Future Networks: Towards a Better Future for Africa" (Cairo, Egypt, 2-3 April 2017) RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES,
More informationB C. N Ajuntament de Barcelona. BARCELONA Building Resilience Strategies MANUEL VALDÉS DEPUTY MANAGER OF INFRASTRUCTURE AND URBAN COORDINATION
B C BARCELONA Building Resilience Strategies N MANUEL VALDÉS DEPUTY MANAGER OF INFRASTRUCTURE AND URBAN COORDINATION Resilience Department Structure and main Working Lines 1. CONTROL ROOM 1. RESILIENCE
More informationSession 7: Plenary Session. E-Strategy Paper
PERSIDANGAN KEBANGSAAN MENGENAI MASYARAKAT BERMAKLUMAT NATIONAL SUMMIT ON INFORMATION SOCIETY (NASIS) 7 8 SEPTEMBER 2005 INTERNATIONAL CONVENTION CENTER, BRUNEI DARUSSALAM Date of issue: 7 th September
More informationNetwork Neutrality. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Network Neutrality Disclosure: Elements of this presentation are adapted from the Digital Empowerment Foundation s submission on Network Neutrality to the Telecom Regulatory Authority of India This work
More informationWhat's the big deal about IPv6? A plain-english guidebook for non-technical managers
What's the big deal about IPv6? A plain-english guidebook for non-technical managers Why should I care about IPv6? 2. We're all going to IPv6 Your network administrators will tell you that IPv6 is the
More informationThe Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science
The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.
More informationHow To Construct A Keyword Strategy?
Introduction The moment you think about marketing these days the first thing that pops up in your mind is to go online. Why is there a heck about marketing your business online? Why is it so drastically
More informationContents. The Workshop IPv6 Collaborations in ASEAN Framework..8. The Results of IPv6 Collaborations in ASEAN..19. Conclusion and Recommendation 20
Page 1 Contents i. Project Overview Executive Summary 2 a. Introduction i. Background...3 ii. Objective.3 iii. Scope of Work.3 iv. Budget.. 6 v. Action Plan for Expected Results 7 ii. iii. iv. The Workshop
More informationInternet of Things (IOT) What It Is and How It Will Impact State Pools
NLC Mutual Insurance Company 660 Capitol Street NW Suite 450 Washington, DC 20001 Internet of Things (IOT) What It Is and How It Will Impact State Pools MAY 19, 2017 RYAN DRAUGHN, DIRECTOR OF INFORMATION
More informationNational 4-H Curriculum BU For Clubs, Communities and Afterschool Projects - Ages 12 and Up. Building and 1 Repairing Computers. Name.
National 4-H Curriculum BU-08347 Computer Power Unlimited For Clubs, Communities and Afterschool Projects - Ages 12 and Up Building and 1 Repairing Computers Name County For more on computers, look for
More informationDigital Security Risks to Transport Infrastructure: Automated Vehicles February, 2018
OECD Workshop on Digital Security and Resilience in Critical Infrastructure and Essential Services Digital Security Risks to Transport Infrastructure: Automated Vehicles 15-16 February, 2018 Eva Molnar
More informationIntroduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 46 April 10, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC and other Internet technologies: Case Studies Tutorials
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationWLAN Security Overview
WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless
More informationIntroduction to The Internet
Introduction to The Internet ITU/APNIC/MOIC IPv6 Workshop 19 th 21 st June 2017 Thimphu These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationAn overview of the CERT/CC and CSIRT Community
An overview of the CERT/CC and CSIRT Community Jason A. Rafail October 2007 2007 Carnegie Mellon University Overview CERT/CC CSIRTs with National Responsibility Partnerships and Trust Training Conclusion
More informationWhat s in Installing and Configuring Windows Server 2012 (70-410):
What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.
More informationOnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization
The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention.
More informationPatrik Fältström. Head of Engineering, Research & Development. Netnod. Market-driven Challenges to Open Internet Standards
Patrik Fältström Head of Engineering, Research & Development Netnod PAPER SERIES: NO. 33 MAY 2016 Market-driven Challenges to Open Internet Standards Patrik Fältström 1 Patrik Fältström - paf@netnod.se
More informationOffice 365 Business The Microsoft Office you know, powered by the cloud.
Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible
More informationNETNOD MEETING Spring March 2016 Stockholm, Sweden Netnod Meeting, Spring 2016, Nurani Nimpuno
NETNOD MEETING Spring 2016 16-17 March 2016 Stockholm, Sweden WELCOME! Wifi password: IXmeetsDNS Twitter: #netnodmeeting Agenda Day 1 Welcome Netnod update - Stefan Lindeberg, Netnod Netnod NTP - Patrik
More informationUNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG
Document WSIS-II/PC-3/CONTR/035-E 17 August 2005 Original: English UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Y:\APP\PDF_SERVER\ALL-USER\IN\COORDUNIT\WGIG-COVER.DOC 17.08.05 17.08.05 www.itu.int/wsis
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationDeveloping an integrated e-health system in Estonia
Developing an integrated e-health system in Estonia Box 1 What problems did the initiative seek to address? Fragmented flow of information between health providers. Poor management of the growing number
More informationWhy create your own website?
Why create your own website? Small, medium or a big company, having your own website is important. It s difficult enough having your own business and that s without competing with others out there for
More informationIPv6 and the Future of the Internet Economy from a public policy perspective. Global IPv6 Summit, Beijing, China, 15 April 2009
IPv6 and the Future of the Internet Economy from a public policy perspective. Global IPv6 Summit, Beijing, China, 15 April 2009 1 What is the OECD? Forum for governments to together address economic and
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationDigital Enablement bridging the digital divide
Digital Enablement bridging the digital divide Ahmar Waryas ahmar.waryas@huawei.com China Internet plus policy will transform industries New Economic Growth Engine: From Made in China to Create in China
More informationSecurity Master Planning to Protect Water Resources Lara Kammereck John Saunders May 1, 2015
Security Master Planning to Protect Water Resources Lara Kammereck John Saunders May 1, 2015 Who is Cascade Water Alliance? Joined together in 1999 350,000 residents 20,000 businesses City of Bellevue
More informationDIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM. Transport and ICT Global Practice World Bank
DIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM Rajendra Singh, Senior Regulatory Specialist ICT Sector Unit November 1 2, 2017 Sixth session of the Asia Pacific Information Superhighway (AP IS) Steering
More informationCyber Security is a Team Sport
Cyber Security is a Team Sport UISGCON13 Kauto Huopio Chief Specialist Finnish Communications Regulatory Authority (FICORA) / National Cyber Security Centre (NCSC-FI) What this talk is and isn't about..
More informationSome DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007
Some DNSSEC thoughts DNSOPS.JP BOF Interop Japan 2007 Geoff Huston Chief Scientist, APNIC June 2007 The DNS is a miracle! You send out a question into the net And an answer comes back! Somehow But WHO
More informationICT and Disaster Risk Reduction Division ESCAP
1 ICT and Disaster Risk Reduction Division ESCAP http://www.unescap.org/publications/artificial-intelligence-and-broadband-divide-state-ict-connectivity-asia-and-pacific Landscape 2 3 Trends Potentials
More informationCOUNTRY PROFILE. Ireland
COUNTRY PROFILE Ireland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 18 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Estonia
COUNTRY PROFILE Estonia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationDavid Werth IDEAS Design & Grayout Aerosports Albuquerque, q NM & Indianapolis, IN
1 David Werth IDEAS Design & Grayout Aerosports Albuquerque, q NM & Indianapolis, IN Dave@IDEASDesigninc.com Dave@GrayOut.com Moderator: (Jacquie Warda) (Jacquie B Airshows) 2 Founder and CEO of IDEAS
More informationGarry Mukelabai Communications Authority Zambia
Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationONLINE REGISTRATION: A STEP-BY-STEP GUIDE
ONLINE REGISTRATION: A STEP-BY-STEP GUIDE We encourage all of our Walkers to register online at diabetes.org/stepout. It s quick. It s easy. And, you ll have the opportunity to take advantage of our online
More informationIncident response in the energy
Incident response in the energy sector Margrete Raaum, Statnett SF and FIRST, Forum of Incident Response and Security Teams 4SICS, October 23. 2014 Incident response IR is more than just a characterization
More informationDISASTER MANAGEMENT A VIEW FROM THE POWER SECTOR MARK KENYON 6 SEP 2017
DISASTER MANAGEMENT A VIEW FROM THE POWER SECTOR MARK KENYON 6 SEP 2017 DISASTER MANAGEMENT Defined as The organisation and management of resources and responsibilities for dealing with all humanitarian
More informationNext Stage in Korea's e-government
Page 1 of 5 Next Stage in Korea's e-government 1. Changes & Challenges Society Government IT - Internal] Rapid aggravation of socio-structural challenges resulting from widening gap between different income
More information2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS
2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS SURVEY OVERVIEW The 2016 Motorola Commercial Survey offers revealing insights into team communication trends in a variety of industries across the
More informationCOUNTRY PROFILE. Qatar
COUNTRY PROFILE Qatar Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationBuilding Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action
Building Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action Adopted at the Third World Congress on Disaster Management Visakhapatnam, Andhra Pradesh, India
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationCOUNTRY PROFILE. Bulgaria
COUNTRY PROFILE Bulgaria Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationAccessing CharityMaster data from another location
Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto
More informationCOUNTRY PROFILE. Iceland
COUNTRY PROFILE Iceland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationStandards for V2X Communication and Implications for OEMs and ITS
Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected
More informationInteroperability, critical element for an ehealth Strategy
Interoperability, critical element for an ehealth Strategy Forum e-zdrowia / ehealth Forum Gdansk - September 14-15, 2017 Charles Parisot, IHE-Services Chair IHE International Board Member, GE Healthcare
More informationCreating your own Website
Park Street Camera Club Creating your own Website What is a web site A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as
More informationSense of Place Council & the The MI Place Partnership Initiative
Sense of Place Council & the The MI Place Partnership Initiative www.miplace.org A survey to establish a baseline of data information on Placemaking, Form Based Codes and Charretting in Michigan Communities
More informationRelated to the Internet
International Public Policy Issues Related to the Internet and the Role of the Governments Regional Follow-up to the Outcome of the World Summit on the Information Society Marco Obiso ICT Applications
More information