This document describes the IPv6 Matrix Project, which tracks IPv6 connectivity worldwide. It crawls major websites and tests their DNS, web servers, email, and NTP servers for IPv6 support. This data is stored and analyzed to determine penetration rates for IPv6 infrastructure and content over time. Maps and data on European IPv6 adoption rates are presented as examples. The goal is to promote IPv6 adoption by providing transparency into connectivity and identifying areas still relying primarily on IPv4.
1) The document contains statistics from the CHPD (Community Police Department) including calls for service by source, priority, response time, thresholds, projections, time of day, offenses known, and incidents by district for September through February.
2) The majority of calls came from on-view (officer-initiated) incidents, followed by phone calls and 911 calls. Most calls were for lower priority incidents. Average response time was between 9-13 minutes.
3) Projections estimate a yearly total of 21,528-22,668 calls for service. Most calls and offenses occurred during daytime and evening hours. Common offenses were theft, assault, and domestic violence. Most incidents occurred in District 4.
interoperatbility between IPv4 and IPv6Nitin Gehlot
This document discusses interoperability between IPv4 and IPv6. It outlines challenges with the transition from IPv4 to IPv6 including ensuring minimal downtime and maintaining network reachability and security. It proposes using tunneling techniques like Generic Routing Encapsulation (GRE) to transport IPv6 packets over an IPv4 infrastructure and allow dual stack implementations. The project aims to address scalability between IPv4 and IPv6 using the OSPF routing protocol and virtualizing physical links with Cisco IOS to enable IPv6 multicast routing.
Slide deck used in my presentation at the Second Ukrainian Internet Governance Forum in Kiev on 2nd September 2011.
This provides a good introduction about ICANN's bottom-up multi-stakeholder governance process, looking especially at the At-Large Advisory Committee (ALAC) process for bottom-up policy input.
This presentation relates the results of the IPv6 Matrix crawler 6 months after the world IPv6 Launch publicised on http://www.worldipv6launch.org/
While content providers in some countries clearly took advantage of this event to launch IPv6 service, others completely missed the buzz.
Check out http://www.ipv6matrix.org/ for more information.
The following document contains a personal interpretation by the author of the events that led
to and took place at the World Conference on International Telecommunications (“WCIT”) in
Dubai, United Arab Emirates in December 2012. All views expressed in this document are
my own, although I admit that they have been biased by years of belief in multistakeholderism.
The reader is therefore encouraged to read accounts from other independent
sources to reduce bias.
There are two parts to this document. The first part provides a recollection of the events at
WCIT. The Second part provides suggestions for avenues that the Internet community and the
ICANN At-Large Advisory Committee in particular should explore with ICANN’s support to
take proactive steps to promote the Multi-Stakeholder Internet Governance Model and
improve its reach to the edges. The suggestions stem from deep needs that were made
apparent during WCIT – including but not limited to outreach, education, capacity building
and proactive engagement.
This document provides an overview and results from the IPv6 Matrix Project, which tracks global IPv6 connectivity. It shows data on IPv6 penetration rates for infrastructure (DNS, web, email, NTP) and web servers alone in different regions from December 2012 to June 2013. Europe saw steady increases overall, with Estonia having the biggest growth. Slovakia and Portugal continued leading in dual-stack websites. Germany had the most dual-stack sites. Asia results showed Singapore and Hong Kong increasing slightly while others fluctuated.
This presentation relates the results of the IPv6 Matrix crawler just over a month after the world IPv6 Launch publicised on http://www.worldipv6launch.org/
While content providers in some countries clearly took advantage of this event to launch IPv6 service, others completely missed the buzz.
1) The document contains statistics from the CHPD (Community Police Department) including calls for service by source, priority, response time, thresholds, projections, time of day, offenses known, and incidents by district for September through February.
2) The majority of calls came from on-view (officer-initiated) incidents, followed by phone calls and 911 calls. Most calls were for lower priority incidents. Average response time was between 9-13 minutes.
3) Projections estimate a yearly total of 21,528-22,668 calls for service. Most calls and offenses occurred during daytime and evening hours. Common offenses were theft, assault, and domestic violence. Most incidents occurred in District 4.
interoperatbility between IPv4 and IPv6Nitin Gehlot
This document discusses interoperability between IPv4 and IPv6. It outlines challenges with the transition from IPv4 to IPv6 including ensuring minimal downtime and maintaining network reachability and security. It proposes using tunneling techniques like Generic Routing Encapsulation (GRE) to transport IPv6 packets over an IPv4 infrastructure and allow dual stack implementations. The project aims to address scalability between IPv4 and IPv6 using the OSPF routing protocol and virtualizing physical links with Cisco IOS to enable IPv6 multicast routing.
Slide deck used in my presentation at the Second Ukrainian Internet Governance Forum in Kiev on 2nd September 2011.
This provides a good introduction about ICANN's bottom-up multi-stakeholder governance process, looking especially at the At-Large Advisory Committee (ALAC) process for bottom-up policy input.
This presentation relates the results of the IPv6 Matrix crawler 6 months after the world IPv6 Launch publicised on http://www.worldipv6launch.org/
While content providers in some countries clearly took advantage of this event to launch IPv6 service, others completely missed the buzz.
Check out http://www.ipv6matrix.org/ for more information.
The following document contains a personal interpretation by the author of the events that led
to and took place at the World Conference on International Telecommunications (“WCIT”) in
Dubai, United Arab Emirates in December 2012. All views expressed in this document are
my own, although I admit that they have been biased by years of belief in multistakeholderism.
The reader is therefore encouraged to read accounts from other independent
sources to reduce bias.
There are two parts to this document. The first part provides a recollection of the events at
WCIT. The Second part provides suggestions for avenues that the Internet community and the
ICANN At-Large Advisory Committee in particular should explore with ICANN’s support to
take proactive steps to promote the Multi-Stakeholder Internet Governance Model and
improve its reach to the edges. The suggestions stem from deep needs that were made
apparent during WCIT – including but not limited to outreach, education, capacity building
and proactive engagement.
This document provides an overview and results from the IPv6 Matrix Project, which tracks global IPv6 connectivity. It shows data on IPv6 penetration rates for infrastructure (DNS, web, email, NTP) and web servers alone in different regions from December 2012 to June 2013. Europe saw steady increases overall, with Estonia having the biggest growth. Slovakia and Portugal continued leading in dual-stack websites. Germany had the most dual-stack sites. Asia results showed Singapore and Hong Kong increasing slightly while others fluctuated.
This presentation relates the results of the IPv6 Matrix crawler just over a month after the world IPv6 Launch publicised on http://www.worldipv6launch.org/
While content providers in some countries clearly took advantage of this event to launch IPv6 service, others completely missed the buzz.
This presentation is the full original presentation of the IPv6Matrix project.
It contains details of the hardware used, as well as the type of data that's archived.
It also contains very useful instructions and tips on how to surf the IPv6Matrix Web site for more data.
The document describes the IPv6 Matrix Project, which tracks IPv6 connectivity worldwide. The project involves running an IPv6 crawler on servers in London to test IPv6 connectivity of popular websites and services. The crawler gathers data that is stored in files and integrated into a database on a web server. This allows the results to be viewed worldwide on the project website at http://www.ipv6matrix.org. The project aims to measure adoption of IPv6 as IP addresses run out.
HTML 5 Development for Windows Phone and DesktopDoris Chen
In this session Ben Riga and Doris Chen from Microsoft will join us. Ben and Doris will give us an overview of Microsoft’s overall HTML 5 strategy overview including Internet Explorer on the desktop. They will also show us Windows Phone and Internet Explorer for Windows Phone. And finally they’ll provide a quick overview of the recently announced PhoneGap for Windows Phone.
This document discusses the role of the creative technologist. It defines the creative technologist as a key member of the digital creative team who helps lead projects from concept to delivery. The creative technologist both writes code to build software and platforms, and also leads strategic thinking. Some of the main responsibilities outlined include managing emerging technologies, building prototypes, enabling agile workflows, and sparking creative thinking through research and experimentation. The role of creative technologist has grown in importance as technology has increasingly disrupted advertising.
The document outlines the agenda for the Kranky Geek conference on AI in real-time communications (RTC). The schedule includes sessions on speech analytics, voicebots, computer vision, and RTC optimization. Speakers will discuss topics like using AI for call center monitoring and transcription, building voicebot architectures for contact centers, and applying machine learning to optimize RTC networks. The event will explore how emerging AI technologies can enhance functions like noise suppression, error correction, and route optimization in real-time communications.
Image-ine That: Image Optimization for Conversion MaximizationYottaa
This document discusses the growing importance of mobile web performance and optimization. It notes that mobile traffic and commerce are increasing rapidly, but mobile networks and devices are often slower than desktop. Users expect fast page loads and have low tolerance for slow sites on mobile. The document provides tips and strategies for optimizing images, code size, and delivery through techniques like compression, sprites, responsive design, and third-party integration. It also discusses tools for testing and monitoring mobile performance across different networks and devices.
This document discusses smart devices and cross-platform development. It notes that there are many mobile operating systems and app stores which makes development difficult. It also discusses the advantages of hybrid apps which allow developing once to target both mobile and desktop using web technologies like HTML, CSS, and JavaScript while still having access to device features. The document recommends that the right approach is to develop hybrid apps.
Traffic Analyzer for GPRS UMTS Networks (TAN)Muhannad Aulama
The document describes a Traffic Analyzer for GPRS UMTS (TAN) network tool. TAN decodes charging data records to create a database for querying and analyzing network traffic and user behavior. It features a fast decoder, database interface, ready queries, query designer, chart viewer, and GUI. TAN provides traffic analysis like volume by hour, APN, cell, and other metrics. It helps uncover user behavior and identifies top users, busy cells, traffic types, and more.
This document is a submission report from Submitedge.com, an article submission service. It lists 500 websites that the service has submitted articles to on behalf of the user. The report includes the user's username, password, and email used to access the submission service and make submissions to the various websites.
LATIF LADID PRESIDENT IPV6 FORUM, CHAIR, EU IPV6 TASK FORCE, EMERITUS TRUSTEE, INTERNET
SOCIETY, LUXEMBURG
- President, IPv6 FORUM (www.ipv6forum.com)
- Chair, European IPv6 Task Force (www.ipv6.eu )
- Emeritus Trustee, Internet Society - ISOC (www.isoc.org)
- IPv6 Ready Logo Program Board (www.ipv6ready.org)
- Senior Researcher @ SnT - University of Luxembourg on multiple European
Commission Next Generation Technologies IST Projects:
· 6INIT: www.6init.org - First Pioneer IPv6 Research Project
· 6WINIT: http://www.cs.ucl.ac.uk/research/6winit/ · Euro6IX:
www.euro6ix.org . NGNi, http://www.ngni.org · Eurov6 :
www.eurov6.org
. IPv6 Security & Privacy project - Security Expert Initiative (SEINIT
http://www.isoc.org/seinit/portal/index.php?option=com_frontpage&Itemid=1
. European Security Task Force project - SecurIST:
http://www.tssg.org/archives/2007/09/securist_2.html
. u-2010 Emergency & Disaster and Crisis Management
www.u-2010.eu .
. Public Safety Communication Forum
http://www.publicsafetycommunication.eu
. EFIPSANS project www.efipsans.org
. Secricom Safety & Security Project www.secricom.eu
. ceFIMS www.cefims.eu
. OUTSMART http://www.fi-ppp-outsmart.eu
- Member of 3GPP PCG (www.3gpp.org)
- Member of 3GPP2 PCG (www.3gpp2.org)
- Vice Chair, IEEE ComSoc EntNET
(http://committees.comsoc.org/entnet/committee.html)
- Member of UN Strategy Council GAID
- Member of the Future Internet Forum for Member States
http://ec.europa.eu/information_society/activities/foi/lead/fif/index_en.htm
- Board member of WSA http://www.wsis-award.org/index.wbp
This document summarizes digital media usage across Asia based on research conducted by Michael Netzley. It begins by noting the diversity within Asia and issues with viewing it through a Western lens. It then provides statistics on internet penetration rates in various Asian countries, showing China and South Korea as leaders. National social networks, search engines, and communication tools are also described as varying by country. Survey results from Singapore are presented showing differences in online behaviors by age. Reasons for going online and issues like internet blocking are also briefly discussed.
Russian internet market and yandex overview iss london.18 may 2011Preston Carey
- Yandex is the dominant search engine in Russia, capturing around 65% of the search market share as of January 2011. Google is a distant second with around 22% market share.
- The Russian internet market is growing rapidly due to increasing internet penetration rates in the country. Russia now has over 60 million internet users, the 7th largest number globally.
- Most major internet sites in Russia are local companies, with Yandex and Mail.Ru being the top two. The search engine industry is dominated by Yandex, which has maintained over 50% market share since 2008 despite upgrades by competitors like Google.
The document contains multiple charts and tables showing metrics for the Absolute Radio Network from October 2010 to September 2011. It shows data on worldwide live streamed hours, mobile streamed hours, podcast downloads, YouTube views, on-demand streaming and downloads, social media followers, and national brand awareness and reach according to RAJAR data from the UK. Overall the data indicates growing audiences and consumption across both online and mobile platforms internationally for the Absolute Radio Network over the period shown.
This document discusses how online communities can strengthen and grow by increasing connections between members. Strong communities are characterized by regular interactions beyond the core purpose, a positive flow of ideas, and connections that transition from weak to strong ties. One way to facilitate this is through a dynamic profile matching system that identifies common interests between members based on their online behaviors, simply displays potential matches, and encourages quick interactions to form new connections. This strengthens the social network and helps the community grow.
This document discusses the mobile browser landscape. It notes there are many browsers, mostly based on WebKit, but they all have their own implementations which impacts performance and capabilities. Global statistics show Safari, Android, and Nokia browsers are most common, though the landscape varies by country. The document recommends building responsive mobile-first websites using progressive enhancement to ensure wide browser compatibility.
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
This document discusses asymmetric warfare and interception techniques revealed on the internet. It includes presentations by Fabio Ghioni and Roberto Preatoni on topics like parametric and injected interception, trojans, and their potential uses in investigative procedures and sensored networks. Cyber attacks related to geopolitical issues are also abstracted based on Zone-H's experience monitoring the internet.
The document discusses the evolution of mobile platforms and operating systems over time. It covers the history and key features of platforms like Symbian, Windows Mobile, iPhone, Android, Java ME, and mobile web. It also summarizes the architecture and components of iOS and Android platforms, including their software stacks, APIs, and the differences between their app stores. Finally, it touches on HTML5 and the capabilities it brings to developing mobile web applications.
Matt Wood is the Technology Evangelist for Amazon Web Services. In his role Matt educates customers on the technical and business aspects of cloud computing, mentor start-ups and coaches developers throughout Europe. Matt will introduce the Cloud platform offered by Amazon, and discuss how organizations can make use of Amazon's massive scale and operational experience to achieve efficiency and business agility in the cloud, elastic, utility computing models and security at every level.
Présentation des derniers résultats de la tortue IPv6. Cette version est en Français. Les résultats sont les mêmes que ceux présentés lors du Webinar IPv6 ISOC du 6 Juin 2012, du même auteur.
Date des résultats - 4 Juin 2012, c'est à dire 2 jours avant le "World IPv6 Launch".
Cette présentation a été faite lors du colloque de Déploiement IPv6 en Tunisie, le 19 Juin 2012. Ce colloque a été mis en place par la Fédération Méditerranéenne des Associations d'Internet (FMAI).
http://www.fmai.org/
Presentation made at Karunya University, Karunya Nagar, Coimbatore, India on 3 Feb 2012.
This presentation provides a summary of IPv6's main uses and main technical features.
It also includes a primer on how the Internet is changing the world - taking the music industry as an example.
This presentation is the full original presentation of the IPv6Matrix project.
It contains details of the hardware used, as well as the type of data that's archived.
It also contains very useful instructions and tips on how to surf the IPv6Matrix Web site for more data.
The document describes the IPv6 Matrix Project, which tracks IPv6 connectivity worldwide. The project involves running an IPv6 crawler on servers in London to test IPv6 connectivity of popular websites and services. The crawler gathers data that is stored in files and integrated into a database on a web server. This allows the results to be viewed worldwide on the project website at http://www.ipv6matrix.org. The project aims to measure adoption of IPv6 as IP addresses run out.
HTML 5 Development for Windows Phone and DesktopDoris Chen
In this session Ben Riga and Doris Chen from Microsoft will join us. Ben and Doris will give us an overview of Microsoft’s overall HTML 5 strategy overview including Internet Explorer on the desktop. They will also show us Windows Phone and Internet Explorer for Windows Phone. And finally they’ll provide a quick overview of the recently announced PhoneGap for Windows Phone.
This document discusses the role of the creative technologist. It defines the creative technologist as a key member of the digital creative team who helps lead projects from concept to delivery. The creative technologist both writes code to build software and platforms, and also leads strategic thinking. Some of the main responsibilities outlined include managing emerging technologies, building prototypes, enabling agile workflows, and sparking creative thinking through research and experimentation. The role of creative technologist has grown in importance as technology has increasingly disrupted advertising.
The document outlines the agenda for the Kranky Geek conference on AI in real-time communications (RTC). The schedule includes sessions on speech analytics, voicebots, computer vision, and RTC optimization. Speakers will discuss topics like using AI for call center monitoring and transcription, building voicebot architectures for contact centers, and applying machine learning to optimize RTC networks. The event will explore how emerging AI technologies can enhance functions like noise suppression, error correction, and route optimization in real-time communications.
Image-ine That: Image Optimization for Conversion MaximizationYottaa
This document discusses the growing importance of mobile web performance and optimization. It notes that mobile traffic and commerce are increasing rapidly, but mobile networks and devices are often slower than desktop. Users expect fast page loads and have low tolerance for slow sites on mobile. The document provides tips and strategies for optimizing images, code size, and delivery through techniques like compression, sprites, responsive design, and third-party integration. It also discusses tools for testing and monitoring mobile performance across different networks and devices.
This document discusses smart devices and cross-platform development. It notes that there are many mobile operating systems and app stores which makes development difficult. It also discusses the advantages of hybrid apps which allow developing once to target both mobile and desktop using web technologies like HTML, CSS, and JavaScript while still having access to device features. The document recommends that the right approach is to develop hybrid apps.
Traffic Analyzer for GPRS UMTS Networks (TAN)Muhannad Aulama
The document describes a Traffic Analyzer for GPRS UMTS (TAN) network tool. TAN decodes charging data records to create a database for querying and analyzing network traffic and user behavior. It features a fast decoder, database interface, ready queries, query designer, chart viewer, and GUI. TAN provides traffic analysis like volume by hour, APN, cell, and other metrics. It helps uncover user behavior and identifies top users, busy cells, traffic types, and more.
This document is a submission report from Submitedge.com, an article submission service. It lists 500 websites that the service has submitted articles to on behalf of the user. The report includes the user's username, password, and email used to access the submission service and make submissions to the various websites.
LATIF LADID PRESIDENT IPV6 FORUM, CHAIR, EU IPV6 TASK FORCE, EMERITUS TRUSTEE, INTERNET
SOCIETY, LUXEMBURG
- President, IPv6 FORUM (www.ipv6forum.com)
- Chair, European IPv6 Task Force (www.ipv6.eu )
- Emeritus Trustee, Internet Society - ISOC (www.isoc.org)
- IPv6 Ready Logo Program Board (www.ipv6ready.org)
- Senior Researcher @ SnT - University of Luxembourg on multiple European
Commission Next Generation Technologies IST Projects:
· 6INIT: www.6init.org - First Pioneer IPv6 Research Project
· 6WINIT: http://www.cs.ucl.ac.uk/research/6winit/ · Euro6IX:
www.euro6ix.org . NGNi, http://www.ngni.org · Eurov6 :
www.eurov6.org
. IPv6 Security & Privacy project - Security Expert Initiative (SEINIT
http://www.isoc.org/seinit/portal/index.php?option=com_frontpage&Itemid=1
. European Security Task Force project - SecurIST:
http://www.tssg.org/archives/2007/09/securist_2.html
. u-2010 Emergency & Disaster and Crisis Management
www.u-2010.eu .
. Public Safety Communication Forum
http://www.publicsafetycommunication.eu
. EFIPSANS project www.efipsans.org
. Secricom Safety & Security Project www.secricom.eu
. ceFIMS www.cefims.eu
. OUTSMART http://www.fi-ppp-outsmart.eu
- Member of 3GPP PCG (www.3gpp.org)
- Member of 3GPP2 PCG (www.3gpp2.org)
- Vice Chair, IEEE ComSoc EntNET
(http://committees.comsoc.org/entnet/committee.html)
- Member of UN Strategy Council GAID
- Member of the Future Internet Forum for Member States
http://ec.europa.eu/information_society/activities/foi/lead/fif/index_en.htm
- Board member of WSA http://www.wsis-award.org/index.wbp
This document summarizes digital media usage across Asia based on research conducted by Michael Netzley. It begins by noting the diversity within Asia and issues with viewing it through a Western lens. It then provides statistics on internet penetration rates in various Asian countries, showing China and South Korea as leaders. National social networks, search engines, and communication tools are also described as varying by country. Survey results from Singapore are presented showing differences in online behaviors by age. Reasons for going online and issues like internet blocking are also briefly discussed.
Russian internet market and yandex overview iss london.18 may 2011Preston Carey
- Yandex is the dominant search engine in Russia, capturing around 65% of the search market share as of January 2011. Google is a distant second with around 22% market share.
- The Russian internet market is growing rapidly due to increasing internet penetration rates in the country. Russia now has over 60 million internet users, the 7th largest number globally.
- Most major internet sites in Russia are local companies, with Yandex and Mail.Ru being the top two. The search engine industry is dominated by Yandex, which has maintained over 50% market share since 2008 despite upgrades by competitors like Google.
The document contains multiple charts and tables showing metrics for the Absolute Radio Network from October 2010 to September 2011. It shows data on worldwide live streamed hours, mobile streamed hours, podcast downloads, YouTube views, on-demand streaming and downloads, social media followers, and national brand awareness and reach according to RAJAR data from the UK. Overall the data indicates growing audiences and consumption across both online and mobile platforms internationally for the Absolute Radio Network over the period shown.
This document discusses how online communities can strengthen and grow by increasing connections between members. Strong communities are characterized by regular interactions beyond the core purpose, a positive flow of ideas, and connections that transition from weak to strong ties. One way to facilitate this is through a dynamic profile matching system that identifies common interests between members based on their online behaviors, simply displays potential matches, and encourages quick interactions to form new connections. This strengthens the social network and helps the community grow.
This document discusses the mobile browser landscape. It notes there are many browsers, mostly based on WebKit, but they all have their own implementations which impacts performance and capabilities. Global statistics show Safari, Android, and Nokia browsers are most common, though the landscape varies by country. The document recommends building responsive mobile-first websites using progressive enhancement to ensure wide browser compatibility.
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
This document discusses asymmetric warfare and interception techniques revealed on the internet. It includes presentations by Fabio Ghioni and Roberto Preatoni on topics like parametric and injected interception, trojans, and their potential uses in investigative procedures and sensored networks. Cyber attacks related to geopolitical issues are also abstracted based on Zone-H's experience monitoring the internet.
The document discusses the evolution of mobile platforms and operating systems over time. It covers the history and key features of platforms like Symbian, Windows Mobile, iPhone, Android, Java ME, and mobile web. It also summarizes the architecture and components of iOS and Android platforms, including their software stacks, APIs, and the differences between their app stores. Finally, it touches on HTML5 and the capabilities it brings to developing mobile web applications.
Matt Wood is the Technology Evangelist for Amazon Web Services. In his role Matt educates customers on the technical and business aspects of cloud computing, mentor start-ups and coaches developers throughout Europe. Matt will introduce the Cloud platform offered by Amazon, and discuss how organizations can make use of Amazon's massive scale and operational experience to achieve efficiency and business agility in the cloud, elastic, utility computing models and security at every level.
Similar to IPv6 Matrix Project - ISOC Chennai (20)
Présentation des derniers résultats de la tortue IPv6. Cette version est en Français. Les résultats sont les mêmes que ceux présentés lors du Webinar IPv6 ISOC du 6 Juin 2012, du même auteur.
Date des résultats - 4 Juin 2012, c'est à dire 2 jours avant le "World IPv6 Launch".
Cette présentation a été faite lors du colloque de Déploiement IPv6 en Tunisie, le 19 Juin 2012. Ce colloque a été mis en place par la Fédération Méditerranéenne des Associations d'Internet (FMAI).
http://www.fmai.org/
Presentation made at Karunya University, Karunya Nagar, Coimbatore, India on 3 Feb 2012.
This presentation provides a summary of IPv6's main uses and main technical features.
It also includes a primer on how the Internet is changing the world - taking the music industry as an example.
Presentation at the Bharathi Dasan Institute of Management (BIM), Tiruchirappalli, 2 February 2012.
This slide deck provides a sense of the multi-stakeholder processes that have made the Internet what it is today. The presentation speaks of the support of the multi-stakeholder model, as well as user-centric Internet.
It also mentions that the Internet is a social catalyst to changing the world.
Shortly after this presentation, I was interviewed by the Hindu Newspaper for an article published on 3 February 2012.
Short presentation made at attempting to demonstrate the fast growth of the Internet.
Includes pictures of early ArpaNet diagrams, reproduced without permission but found openly on the Internet.
Most of the other material (host files as well as screen captures of early browser activity) is mine.
This presentation looks at many of the main features of IPv6 and how IPv6 differs with IPv4. It is a good starter for people not knowing about IPv6 and was presented at ICCA 2012 in Pondicherry, India on 31st January 2012.
Many thanks to Dr. Alaa Al Din Al Radhi for many of the visuals used in this slide deck.
Presentation distributed for World IPv6 Day, on 8 June 2011.
This contains results for IPv6 dual stack Web sites in April 2011 and compares them with results collected in September 2010.
April 2011 Update of the IPv6 Matrix Project results, specifically focused on the situation in Europe.
This presentation was given at the EuroDIG Conference in Belgrade, Serbia, on Tuesday 31 May 2011. It contains a comparison of results from September 2010 to April 2011.
Presentation made at the Internet and Democracy Conference in Kiev, Ukraine, 18 February 2011.
My talk focuses on:
- what is a multi-stakeholder governance process?
- what is the Internet model?
- what is ICANN?
- how is it structured?
- how is it multi-stakeholder bottom-up?
- Structure of GNSO
- Structure of At-Large
- The End-User principle (no filtering)
- The Internet is changing the world of business
- The Internet is changing the world
- The Internet economic weight on GDP
- how do you create a business climate which will take advantage of the Internet?
- Join multi-stakeholder governance processes at ICANN
- An Internet Kill Switch is a Kill Switch for your economy
Full version of IPv6 Matrix project presentation, in French, as given at INET Tunis.
Includes a section focusing on the last IPv4 address blocks available, and another section on African IPv6 connectivity - with a parallel to the spread on Internet in Africa between 1994-1997, thanks to my archives on International Connectivity.
La version intégrale de la présentation du projet IPv6 Matrix, en français, comme présentée au congrès INET Tunis.
Comprend une section consacrée au dernier blocs d'adresses IPv4 disponibles, et une autre section sur la connectivité IPv6 en Afrique - avec un parallèle de propagation Internet en Afrique entre 1994-1997, grâce à mes archives sur la connectivité internationale.
Presentation given at the Internet Society's INET conference in London on 29 September 2010.
It contains real results of IPv6 compatible content obtained from a Crawler testing the domains of the 1 Million most popular Internet Web sites. Tests WWW, SMTP, NameServers, and NTP.
September 2010 figures for Europe and Asia are given.
This is a copy of a presentation I gave at IGF Ukraine in Kiev on 4 September 2010.
It provides a few leads to participants on where we're heading as far as the Future of the Internet is concerned.
This is a presentation containing slides which I borrowed from several other presentations, and which I found very useful in explaining how ISOC and ICANN work.
I gave this talk at IGF Ukraine in Kiev, on 4 September 2010, speaking on my own behalf, and making sure it is understood that ICANN and ISOC are two organisations I am a member of, in the same way someone is a member of a tennis club and a football club.
This long paper started out as a small experiment which was supposed to last an afternoon - a play-around with softwares NetDraw and yEd.
It ended up being a huge paper - too long to publish in a printed publication.
Results are not that significant, in that in the IETF (Internet Engineering Task Force) community, it appears that people really mingle a lot with each other, but the matter of interest is to discover the power of the analysis which can be performed using the software used.
I really believe that Social Network Analysis using Netdraw, yEd, and other SNA and visualisation software, should be mandatory for any bottom-up organisation. I also think that corporations and organisations would really benefit from:
1. having their internal social networks analysis in the same manner.
2. using this type of analysis on their external professional social networks
This pinpoints who are the movers and shakers in the organization. This also pinpoints areas/departments where information flow might not be optimal, thus having a lesser contribution to the organization as a whole.
Feedback/discussion very welcome.
A staged approach to rolling out IPv6/IPv4 dual stack is proposed, starting with easier services like DNS and email that are already IPv6 compatible, and testing the dual stack backbone. This allows costs to be spread out over time while gaining experience with IPv6. The suggested approach aims to make the transition to IPv6 seamless if started immediately.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsScyllaDB
ScyllaDB monitoring provides a lot of useful information. But sometimes it’s not easy to find the root of the problem if something is wrong or even estimate the remaining capacity by the load on the cluster. This talk shares our team's practical tips on: 1) How to find the root of the problem by metrics if ScyllaDB is slow 2) How to interpret the load and plan capacity for the future 3) Compaction strategies and how to choose the right one 4) Important metrics which aren’t available in the default monitoring setup.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...AlexanderRichford
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation Functions to Prevent Interaction with Malicious QR Codes.
Aim of the Study: The goal of this research was to develop a robust hybrid approach for identifying malicious and insecure URLs derived from QR codes, ensuring safe interactions.
This is achieved through:
Machine Learning Model: Predicts the likelihood of a URL being malicious.
Security Validation Functions: Ensures the derived URL has a valid certificate and proper URL format.
This innovative blend of technology aims to enhance cybersecurity measures and protect users from potential threats hidden within QR codes 🖥 🔒
This study was my first introduction to using ML which has shown me the immense potential of ML in creating more secure digital environments!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
IPv6 Matrix Project - ISOC Chennai
1. IPv6 Matrix Project
Tracking IPv6 connectivity Worldwide
http://www.ipv6matrix.org
Dr. Olivier MJ Crépin-Leblond – ocl@gih.com
APRIL 2011 Update / ISOC Chennai Version / 26 June 2011
Page 1 IPv6 Matrix Project - http://www.ipv6matrix.org
2. We are running out of IP addresses
World Connectivity vs Population
“Internet Protocol”
Population Size
6 767 805 208 6.7 Billion people on earth
Population Size 1.7 Billion Internet users
N°Internet Users N°Internet Users
1 733 993 741
Middle East Connectivity vs Population
Population Size
202 687 005
More ways to access the Internet
Population Size
N°Internet Users
N°Internet Users
57 425 046
Page 2 IPv6 Matrix Project - http://www.ipv6matrix.org
3. What is an IPv4 Address?
Domain Names are identifiers
that you type in your Web
Domain Name: www.isoc.org Browser, your E-mail etc.
www.google.com
www.yahoo.com
DNS Servers translate this
DNS Server Domain Name into an
address that is made up of
translation
numbers
Every device that is
IPv4 Address: 212.110.167.157 connected to the Internet
needs its Internet Protocol
(IP) address
Page 3 IPv6 Matrix Project - http://www.ipv6matrix.org
4. We are running out of IP addresses
today
http://www.potaroo.net/tools/ipv4/index.html
When we reach this point, it will be too late since
there will be no more “free” IPv4 addresses!
Real time data collected 1 Mar 2010
Page 4 IPv6 Matrix Project - http://www.ipv6matrix.org
5. We are running out of IP addresses
In the future, communication will go everywhere
Page 5 IPv6 Matrix Project - http://www.ipv6matrix.org
8. IPv6 Space
IPv4: 4,294,967,296 addresses
IPv6: 340,282,366,920,938,463,463,374,607,431,770,000,000 possible addresses
50,000,000,000,000,000,000,000,000,000 addresses per human
Page 8 IPv6 Matrix Project - http://www.ipv6matrix.org
9. IPv6 Matrix Project
ISOC England was awarded a Community
Grants Programme award in November
2009
Design and implementation of an “IPv6
Crawler,” software on a computer that
crawls through the DNS at regular intervals
in order to detect and test:
IPv6 DNS servers
IPv6 compliant Web servers
IPv6 compliant SMTP mailers
IPv6 compliant NTP servers.
Page 9 IPv6 Matrix Project - http://www.ipv6matrix.org
10. Project Rationale
Today, more than 95% of Internet traffic is generated
by a small number of data sources – i.e. the world’s
busiest Web Sites
Without IPv6 accessible content, IPv6 has no chance
of being used - ever.
Take the 1 Million most popular Web site list from
alexa.com as a starting point for the domains to be
tested. Add more domains later.
Test them for IPv6 connectivity
This is equivalent to testing about 6.3 million hosts
worldwide
Use GeoIP database to estimate real host location
Page 10 IPv6 Matrix Project - http://www.ipv6matrix.org
11. Project Teams
London, UK:
Project Management and support
Hardware supply and installation
Data Centre and IPv6 connectivity
Nile University, Egypt:
Software Programming
Page 11 IPv6 Matrix Project - http://www.ipv6matrix.org
13. What are we tracking?
Host IPv6 penetration
Using IPv4 Geo-location coordinates
Includes generic TLD (gTLDs, .com, .net, .org) and
country code ccTLDs
Two types of information:
Infrastructure: DNS + Web + E-mail + Time server
(NTP)
This tracks all of the infrastructure required to run
IPv6 Web services
Web sites only (actual content)
This tracks the Web services themselves. Usually this
percentage is lower than the figure for the
infrastructure
Page 13 IPv6 Matrix Project - http://www.ipv6matrix.org
14. What are we archiving?
Everything that we are tracking on the previous page,
plus:
Testing of connectivity to the above services in case
IPv6 addresses are advertised but no service runs on
them
Tracing of route from London Docklands to each one
of these hosts both using IPv4 and IPv6 – and
archiving all of this information in text format
A lot more data, accessible from the Web site archive
In April 2011, the size of this database in text format is
approx 60Gb and continually increasing (the testing
software runs 24/7)
Page 14 IPv6 Matrix Project - http://www.ipv6matrix.org
17. Country DNS+WEB+E-mail+NTP % change
sept-10 apr-11
Moldova (*) 13.42% 18.91% 5.49%
France 2.39% 13.91% 11.52%
Switzerland 10.74% 11.95% 1.21%
Denmark 6.68% 9.00% 2.32%
Slovakia 6.57% 8.38% 1.81%
Finland 2.03% 8.33% 6.30%
Netherlands 4.39% 7.91% 3.52%
Bosnia and Herzegovina (*) 7.73% 7.73%
Slovenia 6.52% 6.52%
Czech Republic 3.48% 6.36% 2.88%
Croatia 6.36% 6.36%
Austria 2.32% 5.25% 2.93%
IPv6 Host Penetration Norway 3.20% 4.88% 1.68%
Lithuania 4.34% 4.05% -0.29%
Belarus 3.40% 3.94% 0.54%
Estonia 4.29% 3.91% -0.38%
Portugal 4.23% 3.77% -0.46%
Infrastructure Sweden
Greece
1.47%
1.34%
3.56%
3.01%
2.09%
1.67%
- DNS or Republic of Macedonia (*) 2.92% 2.92%
Italy 2.80% 2.84% 0.04%
- Web or Serbia (*) 2.61% 2.61%
United Kingdom 1.34% 2.59% 1.25%
- E-mail or Hungary 1.74% 2.01% 0.27%
Ukraine 0.63% 1.81% 1.18%
- NTP Russia 0.20% 1.69% 1.49%
Poland 1.12% 1.65% 0.53%
Belgium 1.49% 1.47% -0.02%
Ireland 1.91% 1.39% -0.52%
(*) Low Sample Germany 0.74% 1.38% 0.64%
Low accuracy Iceland
Spain
2.20%
0.67%
1.29%
0.93%
-0.91%
0.26%
Romania 0.56% 0.69% 0.13%
Latvia 0.41% 0.59% 0.18%
Bulgaria 0.10% 0.46% 0.36%
Page 17 IPv6 Matrix Project - http://www.ipv6matrix.org
18. Country WEB % change
sept-10 apr-2011
Moldova (*) 16.38% 24.68% 8.30%
Slovakia 10.10% 11.53% 1.43%
Switzerland 4.01% 4.13% 0.12%
Belarus 2.79% 3.21% 0.42%
Czech Republic 1.73% 3.15% 1.42%
Norway 0.84% 2.25% 1.41%
Republic of Macedonia (*) 2.11% 2.11%
Finland 0.47% 1.69% 1.22%
Croatia 1.53% 1.53%
Netherlands 0.99% 1.46% 0.47%
Portugal 2.29% 1.37% -0.92%
Italy 1.55% 1.33% -0.22%
Slovenia 1.28% 1.28%
Greece 0.55% 1.28% 0.73%
Sweden 0.80% 0.98% 0.18%
IPv6 Host Penetration France 0.41% 0.74% 0.33%
Austria 0.43% 0.64% 0.21%
Estonia 0.64% 0.62% -0.02%
Belgium 0.64% 0.59% -0.05%
Hungary 0.30% 0.48% 0.18%
Web only Iceland 0.00% 0.48% 0.48%
Spain 0.42% 0.42% 0.00%
Lithuania 0.12% 0.41% 0.29%
Romania 0.11% 0.39% 0.28%
Ireland 0.24% 0.30% 0.06%
Germany 0.74% 0.27% -0.47%
(*) Low Sample Bulgaria 0.10% 0.26% 0.16%
Poland 0.11% 0.23% 0.12%
Low accuracy Denmark 0.26% 0.21% -0.05%
United Kingdom 0.14% 0.20% 0.06%
Ukraine 0.10% 0.16% 0.06%
Latvia 0.09% 0.14% 0.05%
Russia 0.06% 0.08% 0.02%
Bosnia and Herzegovina (*) 0.00% 0.00%
Serbia (*) 0.00% 0.00%
Page 18 IPv6 Matrix Project - http://www.ipv6matrix.org
19. Europe Trends
France with large rise in infrastructure
Likely to be caused by a main hosting
provider, ovh.net, installing dual-stack
Name-servers
Slovakia and Switzerland leading with
dual-stack Web sites
Page 19 IPv6 Matrix Project - http://www.ipv6matrix.org
22. Country DNS+WEB+E-mail+NTP % change
sept-11 apr-11
Singapore 0.00% 32.24% 32.24%
Armenia (*) 7.38% 10.64% 3.26%
Sri Lanka (*) 8.59% 8.54% -0.05%
Indonesia 3.16% 5.40% 2.24%
Malaysia 1.89% 3.50% 1.61%
Philippines (*) 2.78% 3.42% 0.64%
New Zealand 2.52% 3.24% 0.72%
Oman (*) 3.03% 2.94% -0.09%
Australia 1.52% 2.81% 1.29%
Hong Kong n/a 2.37%
IPv6 Host Penetration Taiwan 1.18% 2.16% 0.98%
Qatar (*) 0.89% 1.95% 1.06%
Russia 0.20% 1.69% 1.49%
Infrastructure Japan 1.31% 1.49% 0.18%
Saudi Arabia (*) 1.50% 1.39% -0.11%
- DNS or
Thailand 1.46% 1.36% -0.10%
- Web or United Arab Emirates (*) 0.65% 0.65% 0.00%
- E-mail or Pakistan 0.56% 0.56% 0.00%
- NTP Iran 0.39% 0.42% 0.03%
South Korea 0.25% 0.24% -0.01%
India 0.20% 0.24% 0.04%
(*) Low Sample China 0.09% 0.11% 0.02%
Low accuracy Vietnam (*) 0.09% 0.09% 0.00%
Kuwait (*) 1.01% 0.00% -1.01%
Page 22 IPv6 Matrix Project - http://www.ipv6matrix.org
23. Country WEB % change
sept-10 apr-11
Vietnam (*) 0.00% 5.26% 5.26%
Philippines (*) 3.09% 3.88% 0.79%
Qatar (*) 0.00% 3.70% 3.70%
Oman (*) 3.03% 2.94% -0.09%
Sri Lanka (*) 1.94% 1.89% -0.05%
Taiwan 1.03% 1.39% 0.36%
Saudi Arabia (*) 1.58% 1.23% -0.35%
Thailand 0.87% 1.01% 0.14%
New Zealand 0.42% 0.77% 0.35%
United Arab Emirates (*) 0.14% 0.68% 0.54%
IPv6 Host Penetration Hong Kong n/a 0.67%
Indonesia 0.52% 0.61% 0.09%
Pakistan 0.56% 0.56% 0.00%
Malaysia 0.51% 0.55% 0.04%
Web only Iran 0.48% 0.38% -0.10%
India 0.18% 0.29% 0.11%
Australia 0.11% 0.18% 0.07%
Japan 0.15% 0.17% 0.02%
(*) Low Sample China 0.11% 0.12% 0.01%
Low accuracy Russia 0.06% 0.08% 0.02%
South Korea 0.09% 0.03% -0.06%
Singapore 0.00% 0.00% 0.00%
Armenia (*) 0.00% 0.00% 0.00%
Kuwait (*) 0.00% 0.00% 0.00%
Page 23 IPv6 Matrix Project - http://www.ipv6matrix.org
24. Asia Trends
Singapore leading by far in
infrastructure but trailing in dual-stack
Web Site content
China results abnormally very low –
content not dual stacked or IPv6
behind firewall?
Less reliability of results due to
smaller sample size in many countries
of the region
Page 24 IPv6 Matrix Project - http://www.ipv6matrix.org
25. Africa Data snapshot
IPv6 Host Penetration 36.63%
35.62%
Infrastructure
- DNS or
- Web or
- E-mail or
- NTP
8.82%
8.82% 5.56%
7.87%
Low Sample
8.33%
Low accuracy 8.51%
Sept 2010
April 2011
0.79%
0.81%
Page 25 IPv6 Matrix Project - http://www.ipv6matrix.org
26. Africa Data snapshot
IPv6 Host Penetration 0.00%
0.00%
Web only
0.00%
0.00% 1.85%
2.44%
Low Sample
14.29%
Low accuracy 14.29%
Sept 2010
April 2011
0.34%
0.29%
Page 26 IPv6 Matrix Project - http://www.ipv6matrix.org
27. Country DNS+WEB+E-mail+NTP % change
sept-10 apr-11
IPv6 Host Penetration
Tunisia (*) 36.63% 35.62% -1.01%
Senegal (*) 8.82% 8.82% 0.00%
Tanzania (*) 8.33% 8.51% 0.18%
Infrastructure Kenya (*) 5.56% 7.87% 2.31%
- DNS or South Africa 0.79% 0.81% 0.02%
- Web or
- E-mail or
- NTP The small number of hosts tested make the results
for most of Africa appear higher than they really are
(*) Low Sample
Low accuracy
Page 27 IPv6 Matrix Project - http://www.ipv6matrix.org
28. Country WEB % change
sept-10 apr-11
IPv6 Host Penetration Tanzania (*) 14.29% 14.29% 0.00%
Kenya (*) 1.85% 2.44% 0.59%
South Africa 0.34% 0.29% -0.05%
Tunisia (*) 0.00% 0.00% 0.00%
Senegal (*) 0.00% 0.00% 0.00%
Web only
(*) Low Sample The small number of hosts tested make the results
Low accuracy for most of Africa appear higher than they really are
Page 28 IPv6 Matrix Project - http://www.ipv6matrix.org
29. Africa Trends
Very few countries with IPv6
connectivity
Dual Stack Islands starting to appear
Can be compared with the growth of
Internet connectivity in the nineties
Page 29 IPv6 Matrix Project - http://www.ipv6matrix.org
30. Compare Historical data on
African Internet Connectivity
June 1994 May 1997
Source: Internetology - http://www.nsrc.org/codes/bymap/ntlgy/ntlgy.htm
Page 30 IPv6 Matrix Project - http://www.ipv6matrix.org
31. North/South America
0.98%
IPv6 Host Penetration
Infrastructure 1.40%
2.81%
- DNS or
PR: 3.51%
- Web or
- E-mail or 0.37% 6.09%
- NTP
6.00%
Low Sample 1.52%
0.23%
Low accuracy
1.95%
0.29%
8.30%
April 2011 0.32%
Page 31 IPv6 Matrix Project - http://www.ipv6matrix.org
32. North/South America
0.21%
IPv6 Host Penetration
Web only
0.24%
PR: 6.67%
0.61% 2.26%
3.23%
Low Sample 1.31%
0.23%
Low accuracy
1.80%
25%
April 2011 0.28%
Page 32 IPv6 Matrix Project - http://www.ipv6matrix.org
33. Country DNS+WEB+E-mail+NTP % change
sept-10 apr-11
Uruguay (*) 8.30% 8.30%
Venezuela (*) 6.09% 6.09%
Guatemala (*) 6.00% 6.00%
Puerto Rico (*) 3.51% 3.51%
IPv6 Host Penetration
Cuba (*) 2.81% 2.81%
Ecuador (*) 1.95% 1.95%
Brasil 1.52% 1.52%
Infrastructure United States 1.40% 1.40%
Canada 0.98% 0.98%
- DNS or
Mexico 0.37% 0.37%
- Web or Chile 0.32% 0.32%
- E-mail or Colombia (*) 0.29% 0.29%
- NTP Costa Rica (*) 0.23% 0.23%
(*) Low Sample
Low accuracy For (*) the small number of hosts tested make the results
in many countries appear higher than they really are
Page 33 IPv6 Matrix Project - http://www.ipv6matrix.org
34. Country WEB % change
sept-10 apr-11
Uruguay (*) 25.00% 25.00%
Puerto Rico (*) 6.67% 6.67%
Guatemala (*) 3.23% 3.23%
Venezuela (*) 2.26% 2.26%
IPv6 Host Penetration
Ecuador (*) 1.80% 1.80%
Brasil 1.31% 1.31%
Mexico 0.61% 0.61%
Chile 0.28% 0.28%
Web only United States 0.24% 0.24%
Costa Rica (*) 0.23% 0.23%
Canada 0.21% 0.21%
Cuba (*) 0.00% 0.00%
(*) Low Sample Colombia (*) 0.00% 0.00%
Low accuracy
For (*) the small number of hosts tested make the results
in many countries appear higher than they really are
Page 34 IPv6 Matrix Project - http://www.ipv6matrix.org
35. America Trends
North America trailing behind Europe
Elsewhere, data based on low number
of Web sites, needs to be taken in
moderation (the restricted number of
hosting providers can make figures
jump several percentage points)
Page 35 IPv6 Matrix Project - http://www.ipv6matrix.org
36. Worldwide Trends
We are seeing a slow growth in dual stack IPv4-IPv6
implementation
The figures are still very small
There is a small decrease in percentage in some
countries, which would point to unstable peering
agreements (the IPv6 network is less closely meshed
than the IPv4 network)
Bearing in mind the Asia Pacific Regional Internet
Registry has run out of IPv4 addresses, it is alarming
to see so few Web sites up and running IPv6 in that
region.
Page 36 IPv6 Matrix Project - http://www.ipv6matrix.org
37. Future work / funding required
Add more domains to be tested
Add more features to be tested
Current front end Web Pages are only an
example of possible analysis
Develop new data visualisation
Perform further analysis
Perform historical/time analysis from archives
Develop an engine to write automated reports
Duplicate Crawler to other regions
Page 37 IPv6 Matrix Project - http://www.ipv6matrix.org
38. Thank you
Contact: ISOC England – contact@isoc-e.org
CTM
International
Page 38 IPv6 Matrix Project - http://www.ipv6matrix.org