Presentation held by Mr.Tomco Georgiev as a part of the Digital Divide Session at the 8th SEEITA and 7th MASIT Open Days Conference, 14th-15th October, 2010
6G INTERNET - "Connecting Communities"
6G is an internet service provider positioned at the forefront of the digital revolution.
Using new, future-proof technologies, we supply superfast broadband services to the UK’s commercial and residential consumer markets.
Governed by Ofcom and adhering to the broadband industry’s code of practice, 6G’s unique network is constructed of wired and radio telecommunications that permit greater access, scalability and the rapid deployment of internet solutions from the single residential user to1000 + enterprise level users.
Fuelling innovation, we invest one third of our profits back into our R&D programme to ensure that our products and services remain ever-evolving within the telecommunications playing field.
Working with local councils, chambers of commerce and social housing providers, 6G Business is an active supporter of the government’s digital inclusion strategy and is an accredited partner of the Super Connected Cities voucher scheme for businesses.
Website: https://6gdsi.co.uk/
Read on to find out how 6G is committed to delivering digital inclusion in the real world
OTT (Over-The-Top) refers to the content or services provided over an infrastructure that’s not under the control of the service provider or infrastructure operator.
OTT refers to a form of service delivered via the Internet, bypassing the traditional network service provider
Regulatory Issues
Un-level playing field between OTT vs. Telco operators
Potential distortion to competition
Weakening economic values of networks
Slowing down the pace of network roll-out and deployment
Uncertainty of network investment
Personal data protection and privacy issues
Security concerns
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...Nzeih Chukwuemeka
The presentation xrays Nigeria's Data Protection Regulation and its benefits and the state of data protection in Nigeria prior to the enactment of the law.
Presentation held by Mr.Tomco Georgiev as a part of the Digital Divide Session at the 8th SEEITA and 7th MASIT Open Days Conference, 14th-15th October, 2010
6G INTERNET - "Connecting Communities"
6G is an internet service provider positioned at the forefront of the digital revolution.
Using new, future-proof technologies, we supply superfast broadband services to the UK’s commercial and residential consumer markets.
Governed by Ofcom and adhering to the broadband industry’s code of practice, 6G’s unique network is constructed of wired and radio telecommunications that permit greater access, scalability and the rapid deployment of internet solutions from the single residential user to1000 + enterprise level users.
Fuelling innovation, we invest one third of our profits back into our R&D programme to ensure that our products and services remain ever-evolving within the telecommunications playing field.
Working with local councils, chambers of commerce and social housing providers, 6G Business is an active supporter of the government’s digital inclusion strategy and is an accredited partner of the Super Connected Cities voucher scheme for businesses.
Website: https://6gdsi.co.uk/
Read on to find out how 6G is committed to delivering digital inclusion in the real world
OTT (Over-The-Top) refers to the content or services provided over an infrastructure that’s not under the control of the service provider or infrastructure operator.
OTT refers to a form of service delivered via the Internet, bypassing the traditional network service provider
Regulatory Issues
Un-level playing field between OTT vs. Telco operators
Potential distortion to competition
Weakening economic values of networks
Slowing down the pace of network roll-out and deployment
Uncertainty of network investment
Personal data protection and privacy issues
Security concerns
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...Nzeih Chukwuemeka
The presentation xrays Nigeria's Data Protection Regulation and its benefits and the state of data protection in Nigeria prior to the enactment of the law.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
GSMA - 5G implementation and Rollout challenges in NigeriaNzeih Chukwuemeka
This presentation discusses the imperative for 5G Adoption and Implementation in Nigeria and the constraints and challenges that needs to be addressed for its effective roll-out and deployment
Identify the pillar that the Greek market is ready to adopt, discover what Greek Operators believe and prepare a Strategy Plan that Nokia should follow in order to cover customer’s demands and become leader in the Greek Market
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo Internet Dan It Sebagai...Saiful Hidayat
Adalah materi sharing saya pada acara CSR (Corporate Social Resposibility) TELKOM-Republika yang dilaksanakan pada tanggal 24 Maret 2010 di Pondok Modern GONTOR - PONOROGO
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
As the public, private and consumer sectors rush to the cloud, the main hurdles are not feasibility or sensor/network price.
They are -Complexity of deployment due to inadequate IOT standards, inability to guarantee performance, and a growing fear of the liabilities generated by holding and processing data with privacy aspects.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
GSMA - 5G implementation and Rollout challenges in NigeriaNzeih Chukwuemeka
This presentation discusses the imperative for 5G Adoption and Implementation in Nigeria and the constraints and challenges that needs to be addressed for its effective roll-out and deployment
Identify the pillar that the Greek market is ready to adopt, discover what Greek Operators believe and prepare a Strategy Plan that Nokia should follow in order to cover customer’s demands and become leader in the Greek Market
Saiful Hidayat Santri Indigo Pondok Gontor Ponorogo Internet Dan It Sebagai...Saiful Hidayat
Adalah materi sharing saya pada acara CSR (Corporate Social Resposibility) TELKOM-Republika yang dilaksanakan pada tanggal 24 Maret 2010 di Pondok Modern GONTOR - PONOROGO
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
As the public, private and consumer sectors rush to the cloud, the main hurdles are not feasibility or sensor/network price.
They are -Complexity of deployment due to inadequate IOT standards, inability to guarantee performance, and a growing fear of the liabilities generated by holding and processing data with privacy aspects.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
In a world of mobile communications, the best solution for 4G and 5G systems is creating your own private network to secure all communications and sensitive information send and received by a mobile phone. EGLA CORP can assist you with that paradigm and our virtualization system based on MOBILECAD.
Our deep learning partnership with BLUEHEXAGON brings unique opportunities for 4G and 5G systems.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIMData Driven Innovation
Infrastructures for Data "Roundtable: 5G and Enabling Infrastructures". May 18th 2018. Data Driven Innovation 2018. Engineering Department, University of Roma Tre
Abdulrahman Alzaid
Cell: 424-230-4189
[email protected]
OBJECTIVE: To use my knowledge in computer skills and software programming to improve efficiency and hence maximize productivity.
EDUCATION
Loyola Marymount university- Los Angeles- CA
Current
Bachelor of Arts, computer science
· Recipient of Saudi Cultural Mission Scholarship
· Coursework in Web Design And Development
· Coursework in Computer Science And Information Technology
· Coursework in Business, Management And Marketing
Certifications
· Udemy Completion of the Swift - Apple's new programming language, 2014.
· Coursera (University of Maryland) Completion with Distinction of Developing Innovative Ideas for new Companies: The First Step in Entrepreneurship 2014.
WORK EXPERIENCE
Web Developer
05/2014- 10/2014
ELM– Saudi Arabia
· Coded three websites using JavaScript, HTML, and CSS.
· Strengthened developmental methodologies by introducing a code quality document.
· Wrote on Xcode for iOS development using Swift.
· Worked effectively with design teams to ensure software solutions elevated client side experience.
· Consulted with engineering staff to evaluate interface between hardware and software.
· Interfaced with business analysts, developers and technical support to determine the best requirement specifications
COMPUTER SKILLS
· Advanced knowledge of JavaScript, Java, HTML, and CSS
· Moderate knowledge of C, Swift, Python, C++, and GO
· Front-end web development
· Mobile development
· Knowledge in AngularJS, Backbone, and MarioneĴeJS
· Troubleshooting and debugging
· Agile
· Git
OTHER CAPABILITIES
· Fast learner
· Group work
12 INTECH MARCH/APRIL 2014 WWW.ISA.ORG
Industrial automation industry exploring and
implementing IoT
By Bill Lydon
T
he idea of the Internet of Things (IoT)
has been creating a great deal of ex-
citement in the computing and com-
munications industry for some time.
Currently, the industrial automation
industry is starting to explore and
implement IoT concepts and technology. Other
terms related to these concepts are machine to
machine (M2M), Internet of Everything, Inter-
net of Things, and IP (Internet protocol) to the
Edge. Kevin Ashton, a British technology pio-
neer, is generally attributed with inventing the
term “the Internet of Things” in 1999; although
the concept has been discussed in literature
since at least 1991 (www.en.wikipedia.org/
wiki/Kevin_Ashton). Commercially, in 2008
IBM launched its Smart Planet initiative. The
same year, the nonproft IP for Smart Objects
(IPSO) Alliance was started with more than 50
members from technology, communications,
and energy companies to promote the IP for
“smart object” communications.
The IoT vision is of a massively instrumented
world of intelligent sensors (analog and digi-
tal) and actuators (analog and digital) com-
municating using IP to improve performance
and effciency. Internet protocol is the primary
pr.
The industrial revolution has changed many aspects of society. It brought about technology that vastly improved the manufacturing process, and it provided new jobs like assembly line work. However, with the rise of robotic automation, some jobs have gone obsolete. This is why some people are calling for a fifth industrial revolution, in which artificial intelligence will takeover some low-skill manual labor tasks.
A survey on security and privacy issues in IoV IJECEIAES
As an up-and-coming branch of the Internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the Internet of Things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.
From Revolution to Reform: Recommendations for Spectrum Policy in Transitiona...Moez Chakchouk
The papers were the product of a conference hosted by the Columbia University School of International and Public Affairs (SIPA) in 2012. The day-long event, “Spectrum for Democracy: Securing the Gains from the Arab Spring,” was co-sponsored by OTI, Free Press, and Access, with two main goals: to explain how spectrum can be used to better support democracy, and to bring together policymakers and thinkers from transitional MENA states with U.S. experts to discuss specific strategies for reforming spectrum policy in the region as part of the overall transition. All three papers are available as part of a special issue of the JIP, which is a peer-reviewed, open access journal.
Post-event evaluation of the Freedom Online ConferenceMoez Chakchouk
Post Event Evaluation of the third freedom online conference organized in Tunis June 16 to 18, 2013.
Author: Dhouha Ben Youssef
Tunisia chaired the Org committee composed of civil society representatives and managed by Mr. Chakchouk.
Find more about the event on: www.freedomonline.tn
M. Chakchouk Keynote at the 3rd Arab Bloggers MeetingMoez Chakchouk
Towards the Development of internet in Tunisia: highlights on the importance of acting according to a clear strategy that needs to be adopted in the future for the development of Internet and broadband in Tunisia.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
ITU & TT Workshop on Regulatory Issues for the Development of Cloud Computing in Tunisia
1. ITU Workshop on “Cloud Computing”
Regulatory Issues for the Development of
Cloud Computing in Tunisia
Tunis, Tunisia, 18 – 19 June 2012
2. Internet in Tunisia
International bandwidth Capacity: 65.5 Gbps.
Maximum Bandwidth used: 50 Gbps.
Ingoing international traffic is increasing yearly by 35% but it’s still almost
5 times less than the Outgoing one.
Local traffic is increasing but it’s just 6% of the international one.
2 ITU Workshop on “Cloud Computing”, June 18 – 19, 2012
3. Before the revolution #14Jan
“No opportunities for Cloud Computing Development in Tunisia!”
Regulatory framework: completely obsolete for Internet.
Governance: inadequate mono-stakeholder model centralized on ATI –
Unique Internet Model with a lot of barriers,
Competition: weak and requires urgent actions especially regarding the
wholesale market,
Broadband infrastructure: Relatively good compared to our neighbors
especially international connectivity,
Services and contents: poor hosting capabilities, lack of innovation,
severe control by the Ben Ali regime, etc.
Freedom: Inappropriate censorship “Ammar404”,
Privacy: In practice not guaranteed for Internet users.
3 ITU Workshop on “Cloud Computing”, June 18 – 19, 2012
4. Actual policy and regulation model #Complex
“A new model is required involving a convergent & independent regulator”
Ministry of Information and
Communication Technologies
National Authority for Independent High
National
the Protection of Authority of
Telecommunications
Personal Data Audiovisual
Commission (INT)
(INPDCP) Communication
National Frequencies
Agency (ANF) (HAICA)
National Digital
Certification Agency
(ANCE)
National Agency for Center of Telecom Studies National
Computer Security and Research (CERT) Broadcasting Corp.
(ANSI) (ONT)
Data and Digital Confidence Telecommunications Media Broadcasting
4 ITU Workshop on “Cloud Computing”, June 18 – 19, 2012
5. Transforming the ATI: #TunIXP
ATI, not a regulator for Internet,
Towards a transparent IXP: A89%+8.D68.&#B688%ED'/9=#96#93%#A89%+8%9#
Connect to ATI not as a regulatory obligation
for security reasons,
Guarantee an open access to a shared platform !"#
$%&'()*+%#
!"#
0.12.3#
for IP transit and interconnection, !"#
5-8AF4#
,-.+)/.#
Wholesale IP service provision based on a cost
oriented model. 4,4# 4,4#
$%&'()*+%# 0.12.3#
Fostering partnerships with Internet 4,4#
,-.+)/.#
intermediaries, especially Tunisian
innovative SMEs, as a IaaS provider. 5678%9:55# ;%<.2=9%#
,+.8>%#
5-8/1/%#
5-8%9:
5-8/1/.8.#
!&62.&?%9# @5A:B?A:C#
An opportunity for nascent Data Centers
to access to Internet.
5 ITU Workshop on “Cloud Computing”, June 18 – 19, 2012
6. Regulatory fundamental #principles
“It’s a also a matter of trust, and respect to human rights”
#Netneutrality #Netfreedom
“No inappropriate
stewardship”
#Privacy #Transparency
A new approach is required: “Smart” Internet Regulation model based
on an inclusive, transparent and open multi-stakeholder process.
Supporting a Global Internet Regulation model won’t be a solution but
could be a threat to freedom of expression and privacy.
6 ITU Workshop on “Cloud Computing”, June 18 – 19, 2012
7. ITU Workshop on “Cloud Computing”
“By leading in ICTs, which are essential to any competitive economy,
Tunisia can continue to be a leader in the region!”
Eileen Murray, World Bank Country Manager for Tunisia
Toronto, 19 March 2012
Ph.D Moez Chakchouk,
Chairman & CEO
Email: moez.chakchouk@a,.tn
Twitter: @mchakchouk
Thank you.
www.ati.tn com@ati_tn follow us @ati_tn
7