SlideShare uma empresa Scribd logo
1 de 37
Findings of the AFNIC’s  “Technology Backdrop” Survey Mohsen Souissi  1 Feb 2011 AFNIC - R&D
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subject, Context & Objectives of the Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Structure of the Survey and Covered Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of the Sample of Respondents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of the Respondents: Geographic distribution ,[object Object],[object Object],[object Object]
Characteristics of the Respondents: Type of organization ,[object Object]
Characteristics of the Respondents: Profession ,[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backdrop Construction Methodology  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backdrop Construction Methodology (cont’)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Consensus on part A  (“Global Internet Architecture”) 8% 19% 73% 4.   Mobile phone services will be based on IP 10% 17% 73% 27.   Denial of Service (DoS) attacks against Internet infrastructure and applications will increase 9% 9% 82% 24.   Open standards will remain dominant for Internet applications 9% 7% 85% 2.   The Internet will remain the dominant infrastructure for worldwide data exchange Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
Results: Consensus on part A (cont’)  (“Global Internet Architecture”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 11% 24% 65% 5.   IPv6 will be more widely used than IPv4 on the Internet 12% 23% 65% 15.   Many new customer services will be based on sensor networks and RFID 15% 20% 65% 1.   The number of regular users of the Internet will exceed 4 billion 13% 21% 66% 31.   IP mobility services (&quot;Mobile IP&quot; or some alternative solution) will be widely deployed 13% 18% 69% 19.   Pervasive environmental concerns will push Internet architects and equipment vendors to seek and adopt &quot;green&quot; solutions both for hardware components and for communication protocols Threshold: <= 15% Threshold: >= 60% (9 consensus)
Results: Consensus on part B (“Internet naming, identifiers and identities”) 12% 19% 69% 45.   The DNS will be more secure than it is today 12% 16% 72% 33.   Internet naming will continue to be based on the current hierarchical and distributed structure 12% 15% 73% 46.   The domain name will remain the basis of the majority of identification systems used by Internet applications (for example: URL, URN, URI...) 14% 8% 78% 54.   The Internet user will use multiple digital identities Threshold: <= 15% Threshold: >= 60% (9 consensus) 9% 17% 74% 36.   The DNS, as an infrastructure, will be considered even more critical than it is today Threshold: <= 10% Threshold: >= 70% (1 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
Results: Consensus on part B (cont’) (“Internet naming, identifiers and identities”) 12% 26% 62% 43.   The root and the majority of DNS zones will be signed with DNSSEC  11% 27% 62% 37.   Besides its well-known role, the DNS will increasingly be used as a &quot;mapping&quot; system by new Internet infrastructure protocols(routing, multi-homing...) 10% 26% 64% 34.   The DNS resolution mechanism currently based on &quot;Client-Server&quot; architecture and requiring a DNS tree traversal will remain dominant 15% 16% 69% 56.   Privacy and &quot;User's choice&quot; will be at the center of Society's debate on the evolution of digital-identity technologies  Threshold: <= 15% Threshold: >= 60% (9 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
Results: Consensus on part C (“User trends”) Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 7% 18% 76% 67. The need for traceability of goods will spread to all economic sectors 9% 7% 84% 61. Geolocation-based services will be integrated in a wide variety of mass consumer products 9% 5% 86% 66. Cars, trains, planes and ships will provide to travelers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) 8% 2% 90% 59. A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public
Results: Consensus on part C (cont’) (“User trends”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 15% 12% 73% 60. Home automation services will reach maturity and will be affordable by all (at least in developed countries) 13% 15% 73% 58. The number of mobile phone (all generations included) subscribers will exceed 6 billion Threshold: <= 15% Threshold: >= 60% (6 consensus)
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Divergence on part A   (“Global Internet Architecture”) 0.76 10% 25% 40% 35% NV 9.  A new type of architecture for Internet applications will be discovered and will be dominant 0.76 10% 35% 40% 25% NV 8.  The majority of Internet applications will be based on peer-to-peer (P2P) architecture 2.06 6% 43% 20% 37% 2S 20.  Energy consumption will be the main limitation on development of network *infrastructure* Threshold: > 2 (2S) Threshold:   < 20% Threshold: > 33% (NV) (3 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
Results: Divergence on part A (cont’)   (“Global Internet Architecture”) 1.66 1% 39% 23% 38% 2S 21.  Attention to energy saving will be the main driving force for development of network *infrastructure* 1.55 1% 37% 24% 38% 2S 18.  Proprietary standards, competing with the Internet ones, will emerge in order to facilitate development of the Internet of Things 1.55 5% 35% 24% 40% 2S 11.  The &quot;end-to-end&quot; principle will be re-established and will underpin again Internet communications to the detriment of gateways (such as NAT) which will gradually disappear Threshold: > 1.5 (2S) (6 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
Results: Divergence on part B   (“Internet naming, identifiers and identities”) Threshold: > 2 (2S) Threshold:   < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 1.95 8% 36% 20% 44% 2S 49. In telephony networks, the phone number will remain the most used identifier by both end-user and intermediate systems Threshold: > 1.5 (2S) (3 divergences) 0.66 10% 23% 43% 34% NV 52. The Semantic Web will govern information exchange between people 2.76 10% 47% 15% 37% 2S 55. Concerns about privacy will be eroded due to widespread uptake of services based on digital identities
Results: Divergence on part C   (“User trends”) Threshold: > 2 (2S) Threshold:   < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 2.0 3% 41% 20% 39% Deux écoles Most of face-to-face meetings/conferences will be replaced by (network) remote-meetings/remote-conferences Threshold: > 1.5 (2S) (3 divergences) 0.43 6% 20% 54% 26% NV 70. A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant 0.75 11% 36% 40% 24% NV 69. The majority of Internet applications (as seen by users) will follow a peer-to-peer model
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Consensus within professional categories Conss “in favor” Conss if  thr  of  pr  PoV=60% Conss if  thr  minority PoV=15% 27.  Denial of Service (DoS) attacks against Internet infrastructure and applications will increase Conss “in favor” Conss if  thr  of  pr  PoV=60% Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 36.  The DNS, as an infrastructure, will be considered even more critical than it is today Conss “in favor” Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 24.  Open standards will remain dominant for Internet applications Conss “in favor” Conss if  thr  of  pr  PoV=60% 4.  Mobile phone services will be based on IP Conss “in favor” Conss if  thr  minority PoV=15% 2.  The Internet will remain the dominant infrastructure for worldwide data exchange Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object]
Results: Consensus within professional categories (cont’) Conss “in favor” 67.  The need for traceability of goods will spread to all economic sectors Conss “in favor” Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 66.  Cars, trains, planes and ships will provide to travellers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) Conss. “in favor” Conss if  thr  minority PoV=15% 61.  Geolocation-based services will be integrated in a wide variety of mass consumer products Conss. “in favor” Conss if  thr  minority PoV=15% 59.  A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object]
Results: Consensus within organization categories Conss. “ i n favor” Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 36.  The DNS, as an infrastructure, will be considered even more critical than it is today Conss. “ i n favor” 27.  Denial of Service (DoS) attacks against Internet infrastructure and applications will increase Conss. “ i n favor” Conss if  thr  minority PoV=15% 24.  Open standards will remain dominant for Internet applications Conss. “ i n favor” Conss if  thr  of  pr  PoV=60% 4.  Mobile phone services will be based on IP Conss. “ i n favor” Unanimous 2.  The Internet will remain the dominant infrastructure for worldwide data exchange Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp. / lab. (29) Gover. agency (10) ,[object Object],[object Object],[object Object]
Results: Consensus within organization categories (cont’) Conss. “ i n favor” 67.  The need for traceability of goods will spread to all economic sectors Conss. “ i n favor” Unanimous Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 66.  Cars, trains, planes and ships will provide to travellers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) Conss. “ i n favor” Unanimous Conss if  thr  minority PoV=15% 61.  Geolocation-based services will be integrated in a wide variety of mass consumer products Conss. “ i n favor” Unanimous Conss if  thr  minority PoV=15% 59.  A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp. / lab. (29) Gover. agency (10) ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Divergence within professional categories NV No concl. ( thr  not reached) 52.  The Semantic Web will govern information exchange between people 2S “ 2S” if r=1.5  “ 2S” if r=1.5  No concl. ( thr  not reached) 20.  Energy consumption will be the main limitation on development of network *infrastructure* NV No concl. ( thr  not reached) “ 2S” (instead of “NV”) 9.  A new type of architecture for Internet applications will be discovered and will be dominant NV No concl. ( thr  not reached) No concl. ( thr  not reached) 8.  The majority of Internet applications will be based on peer-to-peer (P2P) architecture Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object],[object Object]
Results: Divergence within professional categories (cont’) NV No concl. ( thr  not reached) No concl. ( thr  not reached) 70.  A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant NV No concl. ( thr  not reached) No concl. ( thr  not reached) No concl. ( thr  not reached) 69.  The majority of Internet applications (as seen by users) will follow a peer-to-peer model 2S No concl. ( thr  not reached) “ 2S” if r=1.5  No concl. ( thr  not reached) 55.  Concerns about privacy will be eroded due to widespread uptake of services based on digital identities Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object],[object Object]
Results: Divergence within “organization” categories NV No concl. ( thr  not reached) 52.  The Semantic Web will govern information exchange between people 2S No concl. ( thr  not reached) “ 2S” if r=1.5  NV (instead of 2S) 20.  Energy consumption will be the main limitation on development of network *infrastructure* NV No concl. ( thr  not reached) No concl. ( thr  not reached) 9.  A new type of architecture for Internet applications will be discovered and will be dominant NV No concl. ( thr  not reached) 8.  The majority of Internet applications will be based on peer-to-peer (P2P) architecture Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp  / lab. (29) Govern. agency (10) ,[object Object],[object Object],[object Object],[object Object]
Results: Divergence within “organization” categories (cont’) NV No concl. ( thr  not reached) No concl. ( thr  not reached) 70.  A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant NV No concl. ( thr  not reached) 69.  The majority of Internet applications (as seen by users) will follow a peer-to-peer model 2S Conss “opposed” with thr 60% / 20% Conss ”in favor” with thr  70% / 20% 55.  Concerns about privacy will be eroded due to widespread uptake of services based on digital identities Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp  / lab. (29) Govern. agency (10) ,[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object]
Further work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Findings of the AFNIC's "Technology Backdrop" Survey

Information technology research trends: The future vision
Information technology research trends: The future vision Information technology research trends: The future vision
Information technology research trends: The future vision Aboul Ella Hassanien
 
Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...Eduserv
 
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...Educational Technology
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland Tata Consultancy Services
 
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุดเก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุดSoftware Park Thailand
 
Open source telecom software project survey results 2019
Open source telecom software project survey results 2019Open source telecom software project survey results 2019
Open source telecom software project survey results 2019Alan Quayle
 
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...BCS Data Management Specialist Group
 
The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...PRQA
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentationprasanthreddy
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentationprasanthreddy
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentationguesta9b6cb
 
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)Masud Rahman
 
REDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its StakeholdersREDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its StakeholdersAEGIS-ACCESSIBLE Projects
 
DESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPDESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPIRJET Journal
 
Steps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical ResearchSteps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical ResearchVeeva Systems
 

Semelhante a Findings of the AFNIC's "Technology Backdrop" Survey (20)

Information technology research trends: The future vision
Information technology research trends: The future vision Information technology research trends: The future vision
Information technology research trends: The future vision
 
Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...
 
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland
 
NTAP & LSC Tech Survey Highlights
NTAP & LSC Tech Survey HighlightsNTAP & LSC Tech Survey Highlights
NTAP & LSC Tech Survey Highlights
 
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุดเก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
 
dss
dssdss
dss
 
Open source telecom software project survey results 2019
Open source telecom software project survey results 2019Open source telecom software project survey results 2019
Open source telecom software project survey results 2019
 
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
 
TCS Global Cloud Study – North America
TCS Global Cloud Study – North AmericaTCS Global Cloud Study – North America
TCS Global Cloud Study – North America
 
The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentation
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentation
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentation
 
TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings
 
Pragmatic Devops
Pragmatic DevopsPragmatic Devops
Pragmatic Devops
 
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
 
REDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its StakeholdersREDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
 
DESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPDESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APP
 
Steps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical ResearchSteps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical Research
 

Mais de Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetAfnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 

Mais de Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Findings of the AFNIC's "Technology Backdrop" Survey

  • 1. Findings of the AFNIC’s “Technology Backdrop” Survey Mohsen Souissi 1 Feb 2011 AFNIC - R&D
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Results: Consensus on part A (“Global Internet Architecture”) 8% 19% 73% 4. Mobile phone services will be based on IP 10% 17% 73% 27. Denial of Service (DoS) attacks against Internet infrastructure and applications will increase 9% 9% 82% 24. Open standards will remain dominant for Internet applications 9% 7% 85% 2. The Internet will remain the dominant infrastructure for worldwide data exchange Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
  • 15. Results: Consensus on part A (cont’) (“Global Internet Architecture”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 11% 24% 65% 5. IPv6 will be more widely used than IPv4 on the Internet 12% 23% 65% 15. Many new customer services will be based on sensor networks and RFID 15% 20% 65% 1. The number of regular users of the Internet will exceed 4 billion 13% 21% 66% 31. IP mobility services (&quot;Mobile IP&quot; or some alternative solution) will be widely deployed 13% 18% 69% 19. Pervasive environmental concerns will push Internet architects and equipment vendors to seek and adopt &quot;green&quot; solutions both for hardware components and for communication protocols Threshold: <= 15% Threshold: >= 60% (9 consensus)
  • 16. Results: Consensus on part B (“Internet naming, identifiers and identities”) 12% 19% 69% 45. The DNS will be more secure than it is today 12% 16% 72% 33. Internet naming will continue to be based on the current hierarchical and distributed structure 12% 15% 73% 46. The domain name will remain the basis of the majority of identification systems used by Internet applications (for example: URL, URN, URI...) 14% 8% 78% 54. The Internet user will use multiple digital identities Threshold: <= 15% Threshold: >= 60% (9 consensus) 9% 17% 74% 36. The DNS, as an infrastructure, will be considered even more critical than it is today Threshold: <= 10% Threshold: >= 70% (1 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
  • 17. Results: Consensus on part B (cont’) (“Internet naming, identifiers and identities”) 12% 26% 62% 43. The root and the majority of DNS zones will be signed with DNSSEC 11% 27% 62% 37. Besides its well-known role, the DNS will increasingly be used as a &quot;mapping&quot; system by new Internet infrastructure protocols(routing, multi-homing...) 10% 26% 64% 34. The DNS resolution mechanism currently based on &quot;Client-Server&quot; architecture and requiring a DNS tree traversal will remain dominant 15% 16% 69% 56. Privacy and &quot;User's choice&quot; will be at the center of Society's debate on the evolution of digital-identity technologies Threshold: <= 15% Threshold: >= 60% (9 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
  • 18. Results: Consensus on part C (“User trends”) Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 7% 18% 76% 67. The need for traceability of goods will spread to all economic sectors 9% 7% 84% 61. Geolocation-based services will be integrated in a wide variety of mass consumer products 9% 5% 86% 66. Cars, trains, planes and ships will provide to travelers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) 8% 2% 90% 59. A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public
  • 19. Results: Consensus on part C (cont’) (“User trends”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 15% 12% 73% 60. Home automation services will reach maturity and will be affordable by all (at least in developed countries) 13% 15% 73% 58. The number of mobile phone (all generations included) subscribers will exceed 6 billion Threshold: <= 15% Threshold: >= 60% (6 consensus)
  • 20.
  • 21. Results: Divergence on part A (“Global Internet Architecture”) 0.76 10% 25% 40% 35% NV 9. A new type of architecture for Internet applications will be discovered and will be dominant 0.76 10% 35% 40% 25% NV 8. The majority of Internet applications will be based on peer-to-peer (P2P) architecture 2.06 6% 43% 20% 37% 2S 20. Energy consumption will be the main limitation on development of network *infrastructure* Threshold: > 2 (2S) Threshold: < 20% Threshold: > 33% (NV) (3 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
  • 22. Results: Divergence on part A (cont’) (“Global Internet Architecture”) 1.66 1% 39% 23% 38% 2S 21. Attention to energy saving will be the main driving force for development of network *infrastructure* 1.55 1% 37% 24% 38% 2S 18. Proprietary standards, competing with the Internet ones, will emerge in order to facilitate development of the Internet of Things 1.55 5% 35% 24% 40% 2S 11. The &quot;end-to-end&quot; principle will be re-established and will underpin again Internet communications to the detriment of gateways (such as NAT) which will gradually disappear Threshold: > 1.5 (2S) (6 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
  • 23. Results: Divergence on part B (“Internet naming, identifiers and identities”) Threshold: > 2 (2S) Threshold: < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 1.95 8% 36% 20% 44% 2S 49. In telephony networks, the phone number will remain the most used identifier by both end-user and intermediate systems Threshold: > 1.5 (2S) (3 divergences) 0.66 10% 23% 43% 34% NV 52. The Semantic Web will govern information exchange between people 2.76 10% 47% 15% 37% 2S 55. Concerns about privacy will be eroded due to widespread uptake of services based on digital identities
  • 24. Results: Divergence on part C (“User trends”) Threshold: > 2 (2S) Threshold: < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 2.0 3% 41% 20% 39% Deux écoles Most of face-to-face meetings/conferences will be replaced by (network) remote-meetings/remote-conferences Threshold: > 1.5 (2S) (3 divergences) 0.43 6% 20% 54% 26% NV 70. A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant 0.75 11% 36% 40% 24% NV 69. The majority of Internet applications (as seen by users) will follow a peer-to-peer model
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.