Collective and participative experiences in real-world and online communitiesictseserv
What is a collection and what is participation on the Internet? How does this affect traditional industries involved in the production and supply of information? How can new business models anchor value to reality? What are the socio-economic challenges ahead?
Overview of the history, evolution and future of the Internet, presented to Central Texas World Future Society (in an earlier version) and IEEE Central Texas Consultants' Network (this version).
Talk at 31st Chaos Communication Congress at Hamburg 2014.
see: https://events.ccc.de/congress/2014/Fahrplan/events/6170.html
Our talk will highlight the current debates surrounding net neutrality in Europe, the United States and other parts of the world. We will look at the results of the SaveTheInternet.eu campaign which was lunched a year ago on 30c3. We will discuss various legal protections for net neutrality, look closer at the experience of the Netherlands and we will give an overview of all important open ends of the debate.
Since two years net neutrality is on the agenda of politicians world wide. These are important debates, as net neutrality became one of the central questions about our freedom on the internet. With different faces around the globe we see a trend towards more violations of the neutrality principle which the internet was founded upon. The efforts of telecommunication companies to find new ways to monetize their networks and us users within them are countered in some countries with legislation preventing this new business models.
In 2010, after two years of preparation and a fierce battle, the Dutch
parliament accepted a change to the Telecommunications Act which made net neutrality a principle that was protected by law. In this talk we will take stock after two years of legal protection of net neutrality in The Netherlands. Did it work and do the Dutch now have undiscriminated access to all services on the internet? Has the doomsday scenario of the providers, that subscriptions would become outrageously expensive, become reality? In which cases was the Dutch law enforced?
Are there any loopholes in the Dutch implementation? If others are to
fight for net neutrality, what are the pitfalls to avoid? And, on a more
meta-level, is it enough? Will net neutrality protect your freedom to
access websites and services, or do we need a broader type neutrality?
Collective and participative experiences in real-world and online communitiesictseserv
What is a collection and what is participation on the Internet? How does this affect traditional industries involved in the production and supply of information? How can new business models anchor value to reality? What are the socio-economic challenges ahead?
Overview of the history, evolution and future of the Internet, presented to Central Texas World Future Society (in an earlier version) and IEEE Central Texas Consultants' Network (this version).
Talk at 31st Chaos Communication Congress at Hamburg 2014.
see: https://events.ccc.de/congress/2014/Fahrplan/events/6170.html
Our talk will highlight the current debates surrounding net neutrality in Europe, the United States and other parts of the world. We will look at the results of the SaveTheInternet.eu campaign which was lunched a year ago on 30c3. We will discuss various legal protections for net neutrality, look closer at the experience of the Netherlands and we will give an overview of all important open ends of the debate.
Since two years net neutrality is on the agenda of politicians world wide. These are important debates, as net neutrality became one of the central questions about our freedom on the internet. With different faces around the globe we see a trend towards more violations of the neutrality principle which the internet was founded upon. The efforts of telecommunication companies to find new ways to monetize their networks and us users within them are countered in some countries with legislation preventing this new business models.
In 2010, after two years of preparation and a fierce battle, the Dutch
parliament accepted a change to the Telecommunications Act which made net neutrality a principle that was protected by law. In this talk we will take stock after two years of legal protection of net neutrality in The Netherlands. Did it work and do the Dutch now have undiscriminated access to all services on the internet? Has the doomsday scenario of the providers, that subscriptions would become outrageously expensive, become reality? In which cases was the Dutch law enforced?
Are there any loopholes in the Dutch implementation? If others are to
fight for net neutrality, what are the pitfalls to avoid? And, on a more
meta-level, is it enough? Will net neutrality protect your freedom to
access websites and services, or do we need a broader type neutrality?
This ppt is to make those people aware who are unknown of the idea of net neutrality......
And please do hit the like icon if you liked the presentation and if not, do leave your compliments so that i can make it better....
A presentation given in the Finnish institute in London in "Digital Approaches to widening civic participation - cases Open Knwoledge and Digital Humanities"
Net Neutrality and the Future of the InternetMercatus Center
Net neutrality regulations would mandate that essentially all data on the Internet be treated the same by Internet service providers (ISPs), with many supporters calling on the FCC to prohibit “Internet fast lanes.” But are there situations in which different treatment of broadband traffic is good? What role should the government play in ever-changing broadband markets?
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Swathi Young
We are all aware that the initial focus of the new presidency under Biden will be economic recovery from the pandemic and all things healthcare: immunizations, drug pricing, coverage reform, health equity, sustainability and industry behavior. However, the new government is also preparing to focus on infrastructure such highways, bridges, roads, public transit, housing, public schools, broadband internet access, 5G , regulation around content moderation of social media platforms, climate change and green tech and COVID-19 stimulus bills.
Net Neutrality PPT presentation in MIS 3305 on Oct. 13, 2015. Explanation is needed for various slides. However, this slide show presents an overview of what net neutrality is, how the internet works, how ISPs have throttled content providers data traveling through their networks, and the FCC's ruling over the issue.
Created for an independent study on Media & the Digital Divide, this presentation discusses the latest developments in Municipal Wireless Internet and how they could be leveraged to lessen the divide in urban communities throughout America.
Just heard about something called NetNeutrality? Want to know more? This presentation includes everything you need including some of interesting facts & contributions done by our volunteers.
This ppt is to make those people aware who are unknown of the idea of net neutrality......
And please do hit the like icon if you liked the presentation and if not, do leave your compliments so that i can make it better....
A presentation given in the Finnish institute in London in "Digital Approaches to widening civic participation - cases Open Knwoledge and Digital Humanities"
Net Neutrality and the Future of the InternetMercatus Center
Net neutrality regulations would mandate that essentially all data on the Internet be treated the same by Internet service providers (ISPs), with many supporters calling on the FCC to prohibit “Internet fast lanes.” But are there situations in which different treatment of broadband traffic is good? What role should the government play in ever-changing broadband markets?
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Swathi Young
We are all aware that the initial focus of the new presidency under Biden will be economic recovery from the pandemic and all things healthcare: immunizations, drug pricing, coverage reform, health equity, sustainability and industry behavior. However, the new government is also preparing to focus on infrastructure such highways, bridges, roads, public transit, housing, public schools, broadband internet access, 5G , regulation around content moderation of social media platforms, climate change and green tech and COVID-19 stimulus bills.
Net Neutrality PPT presentation in MIS 3305 on Oct. 13, 2015. Explanation is needed for various slides. However, this slide show presents an overview of what net neutrality is, how the internet works, how ISPs have throttled content providers data traveling through their networks, and the FCC's ruling over the issue.
Created for an independent study on Media & the Digital Divide, this presentation discusses the latest developments in Municipal Wireless Internet and how they could be leveraged to lessen the divide in urban communities throughout America.
Just heard about something called NetNeutrality? Want to know more? This presentation includes everything you need including some of interesting facts & contributions done by our volunteers.
Presentations from Oxford Internet Institute, the Internet Archive, and Hanzo Archives Ltd presenting the results of a JISC-NEH funded transatlantic digitisation project.
Does the Internet harm children's health? A critical review of the evidenceMonica Bulger
Presentation delivered at MeCCSA 2013 by Dr. Vera Slavtcheva-Petkova, highlighting findings of a paper co-authored with Dr. Monica Bulger and Dr. Victoria Nash of the Oxford Internet Institute
Abstract: Moral panics about the Internet’s “harmful effects” have been ongoing in current years, recently exacerbated by a UK parliamentary inquiry into online child protection. Is there scientific evidence supporting these fears? Does the Internet harm children and especially their health? This paper will present the findings from a narrative review of more than 300 journal articles discussing the scale and scope of online harms that young people experience. We will first present the three main types of harms identified in the literature: health-related harms, sex-related harms and cyber-bullying. Then the paper will focus in more detail on the evidence about health-related harms incurred as a result of online risks. We not only identify the kinds of health harms discussed in the literature – mainly related to pro-eating disorder websites, self-injury websites and problematic Internet use – but we also investigate whether and how the researchers operationalize harm. We also scrutinize the research methods used in the studies, which tend to differ significantly among the disciplines studied.
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...Monica Bulger
A recent UK parliamentary inquiry into online child protection prompted a resurgence of moral panics about children and adolescents’ Internet use, despite the fact that little empirical evidence of actual harm is brought to bear in public and policy discourses. This article makes a key contribution to the field by reviewing the available evidence about the scale and scope of online harms from across a range of disciplines and identifying key obstacles in this research area. The findings are based on a review of 271 empirical studies. We identified three main types of harms: health-related harms as a result of using pro-eating disorders, self-harm or pro-suicide websites, sex-related harms such as Internet-initiated sexual abuse of minors, and cyber-bullying.
Presented at the International Communication Association Annual Meeting, 2013, London.
ALA PLA Design Thinking Workshop June 2015mfrisque
The challenges facing librarians are real, complex and varied. As such, they require new perspectives, new tools, and new approaches. With support from the Bill and Melinda Gates Foundation and in partnership with Chicago Public Library and Aarhus Public Library, IDEO created a toolkit for using design thinking to better understand library patrons. These are the slides that were used in the ALA/PLA pre-conference titled Designing the Future: A Design Thinking Toolkit that was held on June 26, 2015. The complete toolkit that was used in the workshop can be found here http://designthinkingforlibraries.com.
First steps into Futuring @daniel_eggerDaniel Egger
This presentation provides a short introduction into futuring and futures that are divided in: the future of the past, the future of the present, the future of the future (After Next).
Broad-stroke view of framework developed to communicate agency's POV on impact of converged media and power of mobile to bring point of engagement and point of transaction closer.
The study we present aims to explore several factors pertaining to Consumer Acceptance of business technology as it related to Blockchain. Identifying and developing the relevant measures is of importance to business technology managers and software development managers today. We ask the important question of “what measures best represent the established constructs of the technology acceptance model?” In order to address this issue, it is important to identify the key measurements that help us to understand the proposed constructs as they relate to blockchain technology as well as confirm their validity in isolation and in combination with each other. In this study, the factors we explore are perceived reputation, risk, and usefulness and transaction intentions. A survey was used whereby the methodology adapted previous measurements from related works and new measurements pertaining to usefulness and risk were developed in order to adhere to blockchain’s consumer acceptance framework. 268 students completed the questionnaire and an exploratory factor analysis was used in order to analyze the constructs and their measurements. Through the results we were able to identify and validate the relevant measurements as well as the proposed constructs.
E-governance, meaning ‘electronic governance’ is using information and communication technologies (ICTs) (such as Wide Area Networks, the Internet, and mobile computing) at various levels of the government and the public sector and beyond, for the purpose of enhancing governance. The application of ICT to transform the efficiency, effectiveness, transparency and accountability of exchange of information and transaction:
between Governments,
between Government agencies,
between Government and Citizens, and
between Government and businesses
Government Process Re-engineering using IT to simplify and make the government processes more efficient is critical for transformation to make the delivery of government services more effective across various government domains and therefore needs to be implemented by all Ministries/ Departments.
NATIONAL E-GOVERNANCE PLAN (NEGP)
negpThe National e-Governance Plan (NeGP), takes a holistic view of e-Governance initiatives across the country, integrating them into a collective vision, a shared cause. Around this idea, a massive countrywide infrastructure reaching down to the remotest of villages is evolving, and large-scale digitization of records is taking place to enable easy, reliable access over the internet. The ultimate objective is to bring public services closer home to citizens, as articulated in the Vision Statement of NeGP.
“Make all Government services accessible to the common man in his locality, through common service delivery outlets,and ensure efficiency, transparency, and reliability of such services at affordable costs to realise the basic needs of the common man”
The Government approved the National e-Governance Plan (NeGP), comprising of 31 Mission Mode Projects (MMPs) and 8 components, on May 18, 2006.
Click the link to view the Official website for the National E-Governance Plan (NeGP)
E-GOVERNANCE INFRASTRUCTURE
Digital India
State Wide Area Network (SWAN): Under this Scheme, technical and financial assistance are being provided to the States/UTs for establishing SWANs to connect all State/UT Headquarters up to the Block level via District/ sub-Divisional Headquarters, in a vertical hierarchical structure with a minimum bandwidth capacity of 2 Mbps per link. Each of the State / UT can enhance the bandwidth up to 34 Mbps between SHQ and DHQ and upto 8 Mbps between DHQ and BHQ depending upon the utilization. Steps have been initiated to integrate all SWANs using the National Knowledge Network (NKN).State Service Delivery Gateway (SSDG): State Service Delivery Gateway (SSDG), is one of the core infrastructure pillars of the NeGP which would establish Electronic Service Delivery in all 35 States / UTs. This project aims to enhance the services provided to the citizens through Common Service Centers (CSCs) by carrying out the Implementation of the State Portal, State Service Delivery Gateway (SSDG) & Electronic Form application. It is envisaged that the common infrastructure (SWAN, SDC
Similar to Towards a Future Internet workshop (20)
Should the European Union require the largest social networking services (like Facebook, Instagram and Twitter) to be interoperable with competitors? I explain why and how they should. Originally presented to the European Parliament’s Digital Markets Act working group of MEPs and staff in Brussels, on 24/5/23
Transatlantic data flows following the Schrems II judgmentblogzilla
Brief summary of Ian Brown and Douwe Korff’s study for the European Parliament Civil Liberties Committee, presented at a committee hearing on 9 November 2021
Lessons for interoperability remedies from UK Open Bankingblogzilla
The UK’s Open Banking programme is a world-leading experiment in requiring banks to open up customer accounts (with their explicit consent) to third-party providers. What lessons can be learnt from this case for legislation that would require dominant platforms to provide similar functionality?
Introduction to Cybersecurity for Electionsblogzilla
Slides for a 15-minute introduction to Cybersecurity for Elections: A Commonwealth Guide on Best Practice, by Ian Brown, Chris Marsden, James Lee and Michael Veale, published 5 Mar 2020
A basic cybersecurity introduction for managers, explaining how they and their organisation can guard against common types of attacks, based on the UK National Cyber Security Centre’s Cyber Essentials programme
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Study background Carried out for European Commission DG Information Society under SMART programme Runs Feb. 2009 – Nov. 2010 Study team: Colin Blackman,Ian Brown, Jonathan Cave, Simon Forge,Karmen Guevara,Lara Srivastava,Motohiro Tsuchiya & MalteZiewitz Advisory panel: Rudolf van der Berg, Erik Bohlin, Jon Crowcroft, Xavier Dalloz, William Drake, Chris Marsden, Ian Miles & Jun Murai
3. Goals of the study To explore what a future Internet should be - by researching the possible social, psychological, technological and economic options for its development and their likely socio- economic impacts: Explore the past - examine prior studies - analyse how the current Internet evolved to date, its main drivers and effects Define possible future scenarios and assess likely socio-economic impacts - investigate the interrelations between technological, social, psychological and economic trends and developments related to a future Internet, verified using Delphi surveys Produce a single preferred vision for Europe of a Future Internet, in terms of each of the 4 forces 3
4. Scenarios not predictions of the future, but internally consistent stimulants for discussion that take into account the likely social, technical and economic trends identified by environment scan, over 200 expert respondents to our online Delphi survey and our first workshop in Brussels
5. Smooth Trip - the knowledge-based Internet economy Internet pervasive across public and private life; a major engine of social progress and economic growth Online education and retraining critical to a high-value-add European economy with ageing workforce Work and relationships increasingly conducted remotely. Many services (e.g. healthcare) provided partially online, through collaboration between SMEs Digital divides narrowed due to focus on usability, lower cost and greater demand-driven innovation
6. Smooth Trip - the knowledge-based Internet economy Internet development incremental, in response to commercial and public needs. Clients are mobile with augmented reality, projected UIs and fluid interaction with “things” and environmental sensors Strong govt. emphasis on consumer protection and privacy increases user trust and online interaction Some govts. impose restrictions on access in line with legal and cultural norms; some businesses use increased controls to capture greater revenue share. Online user resistance to both strengthens
7. Going Green - the green Internet economy Internet is foundation of a sustainable society and an emerging green economy based around monitoring, controlling, adjustment, management, automation and substitution of carbon-intensive activities ICTs become much more energy-efficient. Virtualised server farms migrate seamlessly between under-utilised renewable energy sources Mobile platforms (inc. LEO comms), computational linguistics, geospatial technologies and visual analytics become key to disaster response
8. Going Green - the green Internet economy Home working becomes norm; telepresence replaces much business travel and some tourism Social networking tools reduce social divisions within and between nations, and used to build political support for collective action to cope with environmental disasters Remote regions and developing countries highly connected as the basis for outsourcing of much information work
9. Commercial Big Brother Internet replaces broadcast TV, as a largely commercial channel for entertainment, retailing and advertising High-speed access is built to the home only with govt. subsidy and removal of regulatory constraints, strengthening large ISP dominance Immersive, interactive video content consumes most user time and 95% of bandwidth. Access is mainly through DRM-heavy proprietary hardware Merged ISPs/search engines/social networking sites offer walled gardens featuring high-quality access to video content and interactive services. They slowly merge with major entertainment conglomerates, with close links to retailers
10. Commercial Big Brother Tacit cooperation between governments and the providers of the new “opiate of the masses”, who block access to politically controversial content. Internet becomes increasingly fragmented and nationalised Users are intensively profiled to support targeted advertising, with no effective global privacy regulation Security concerns used to justify lock-down of network, with e-ID requirements severely restricting anonymous speech and data retention laws squeezing user privacy
11. Emergence of the e-Demos Power migrates to the people in a user-built ‘Connected Society’. “Prosumers” have a wide choice of net access, easily-programmable devices and tools to build shared secure environments for work and leisure Strong political demand for “user rights” such as privacy, free expression, transparency, trust, fraud-resistance, consumer protection and fair, honest governance Much stronger participation in online communities, which build social cohesion and political power of formerly disconnected minority groups
12. Emergence of the e-Demos Heavy demand in developing world for low-cost access devices leads to a global market of 10bn+ clients and peer production of many services Low barriers to entry lead to a global online marketplace of billions of micro-enterprises. Infrastructure operators are regulated as public utilities Security mechanisms are collaborative rather than controlling A messy, inefficient and highly diverse society populates the “managed chaos” of the Internet
13. Goals for today Compare the different scenarios, in terms of their social and economic impact: which elements from each are the most desirable for a more sustainable (or otherwise better) world? How will current technological, social and economic trends lead to the different scenarios proposed? What is the impact of different architectural choices (NGN, clean-slate approaches, non-IP, end-to-end principle, openness, embedded security) in enabling the different scenarios? How will policy options (e.g. network neutrality) impact on the emergence of the different scenarios? What should be the future priorities for ICT research in Internet architectures and infrastructures?