SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Findings of the AFNIC’s  “Technology Backdrop” Survey Mohsen Souissi  1 Feb 2011 AFNIC - R&D
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subject, Context & Objectives of the Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Structure of the Survey and Covered Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of the Sample of Respondents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of the Respondents: Geographic distribution ,[object Object],[object Object],[object Object]
Characteristics of the Respondents: Type of organization ,[object Object]
Characteristics of the Respondents: Profession ,[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backdrop Construction Methodology  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backdrop Construction Methodology (cont’)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Consensus on part A  (“Global Internet Architecture”) 8% 19% 73% 4.   Mobile phone services will be based on IP 10% 17% 73% 27.   Denial of Service (DoS) attacks against Internet infrastructure and applications will increase 9% 9% 82% 24.   Open standards will remain dominant for Internet applications 9% 7% 85% 2.   The Internet will remain the dominant infrastructure for worldwide data exchange Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
Results: Consensus on part A (cont’)  (“Global Internet Architecture”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 11% 24% 65% 5.   IPv6 will be more widely used than IPv4 on the Internet 12% 23% 65% 15.   Many new customer services will be based on sensor networks and RFID 15% 20% 65% 1.   The number of regular users of the Internet will exceed 4 billion 13% 21% 66% 31.   IP mobility services (&quot;Mobile IP&quot; or some alternative solution) will be widely deployed 13% 18% 69% 19.   Pervasive environmental concerns will push Internet architects and equipment vendors to seek and adopt &quot;green&quot; solutions both for hardware components and for communication protocols Threshold: <= 15% Threshold: >= 60% (9 consensus)
Results: Consensus on part B (“Internet naming, identifiers and identities”) 12% 19% 69% 45.   The DNS will be more secure than it is today 12% 16% 72% 33.   Internet naming will continue to be based on the current hierarchical and distributed structure 12% 15% 73% 46.   The domain name will remain the basis of the majority of identification systems used by Internet applications (for example: URL, URN, URI...) 14% 8% 78% 54.   The Internet user will use multiple digital identities Threshold: <= 15% Threshold: >= 60% (9 consensus) 9% 17% 74% 36.   The DNS, as an infrastructure, will be considered even more critical than it is today Threshold: <= 10% Threshold: >= 70% (1 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
Results: Consensus on part B (cont’) (“Internet naming, identifiers and identities”) 12% 26% 62% 43.   The root and the majority of DNS zones will be signed with DNSSEC  11% 27% 62% 37.   Besides its well-known role, the DNS will increasingly be used as a &quot;mapping&quot; system by new Internet infrastructure protocols(routing, multi-homing...) 10% 26% 64% 34.   The DNS resolution mechanism currently based on &quot;Client-Server&quot; architecture and requiring a DNS tree traversal will remain dominant 15% 16% 69% 56.   Privacy and &quot;User's choice&quot; will be at the center of Society's debate on the evolution of digital-identity technologies  Threshold: <= 15% Threshold: >= 60% (9 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
Results: Consensus on part C (“User trends”) Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 7% 18% 76% 67. The need for traceability of goods will spread to all economic sectors 9% 7% 84% 61. Geolocation-based services will be integrated in a wide variety of mass consumer products 9% 5% 86% 66. Cars, trains, planes and ships will provide to travelers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) 8% 2% 90% 59. A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public
Results: Consensus on part C (cont’) (“User trends”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 15% 12% 73% 60. Home automation services will reach maturity and will be affordable by all (at least in developed countries) 13% 15% 73% 58. The number of mobile phone (all generations included) subscribers will exceed 6 billion Threshold: <= 15% Threshold: >= 60% (6 consensus)
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Divergence on part A   (“Global Internet Architecture”) 0.76 10% 25% 40% 35% NV 9.  A new type of architecture for Internet applications will be discovered and will be dominant 0.76 10% 35% 40% 25% NV 8.  The majority of Internet applications will be based on peer-to-peer (P2P) architecture 2.06 6% 43% 20% 37% 2S 20.  Energy consumption will be the main limitation on development of network *infrastructure* Threshold: > 2 (2S) Threshold:   < 20% Threshold: > 33% (NV) (3 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
Results: Divergence on part A (cont’)   (“Global Internet Architecture”) 1.66 1% 39% 23% 38% 2S 21.  Attention to energy saving will be the main driving force for development of network *infrastructure* 1.55 1% 37% 24% 38% 2S 18.  Proprietary standards, competing with the Internet ones, will emerge in order to facilitate development of the Internet of Things 1.55 5% 35% 24% 40% 2S 11.  The &quot;end-to-end&quot; principle will be re-established and will underpin again Internet communications to the detriment of gateways (such as NAT) which will gradually disappear Threshold: > 1.5 (2S) (6 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
Results: Divergence on part B   (“Internet naming, identifiers and identities”) Threshold: > 2 (2S) Threshold:   < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 1.95 8% 36% 20% 44% 2S 49. In telephony networks, the phone number will remain the most used identifier by both end-user and intermediate systems Threshold: > 1.5 (2S) (3 divergences) 0.66 10% 23% 43% 34% NV 52. The Semantic Web will govern information exchange between people 2.76 10% 47% 15% 37% 2S 55. Concerns about privacy will be eroded due to widespread uptake of services based on digital identities
Results: Divergence on part C   (“User trends”) Threshold: > 2 (2S) Threshold:   < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 2.0 3% 41% 20% 39% Deux écoles Most of face-to-face meetings/conferences will be replaced by (network) remote-meetings/remote-conferences Threshold: > 1.5 (2S) (3 divergences) 0.43 6% 20% 54% 26% NV 70. A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant 0.75 11% 36% 40% 24% NV 69. The majority of Internet applications (as seen by users) will follow a peer-to-peer model
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Consensus within professional categories Conss “in favor” Conss if  thr  of  pr  PoV=60% Conss if  thr  minority PoV=15% 27.  Denial of Service (DoS) attacks against Internet infrastructure and applications will increase Conss “in favor” Conss if  thr  of  pr  PoV=60% Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 36.  The DNS, as an infrastructure, will be considered even more critical than it is today Conss “in favor” Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 24.  Open standards will remain dominant for Internet applications Conss “in favor” Conss if  thr  of  pr  PoV=60% 4.  Mobile phone services will be based on IP Conss “in favor” Conss if  thr  minority PoV=15% 2.  The Internet will remain the dominant infrastructure for worldwide data exchange Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object]
Results: Consensus within professional categories (cont’) Conss “in favor” 67.  The need for traceability of goods will spread to all economic sectors Conss “in favor” Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 66.  Cars, trains, planes and ships will provide to travellers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) Conss. “in favor” Conss if  thr  minority PoV=15% 61.  Geolocation-based services will be integrated in a wide variety of mass consumer products Conss. “in favor” Conss if  thr  minority PoV=15% 59.  A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object]
Results: Consensus within organization categories Conss. “ i n favor” Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 36.  The DNS, as an infrastructure, will be considered even more critical than it is today Conss. “ i n favor” 27.  Denial of Service (DoS) attacks against Internet infrastructure and applications will increase Conss. “ i n favor” Conss if  thr  minority PoV=15% 24.  Open standards will remain dominant for Internet applications Conss. “ i n favor” Conss if  thr  of  pr  PoV=60% 4.  Mobile phone services will be based on IP Conss. “ i n favor” Unanimous 2.  The Internet will remain the dominant infrastructure for worldwide data exchange Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp. / lab. (29) Gover. agency (10) ,[object Object],[object Object],[object Object]
Results: Consensus within organization categories (cont’) Conss. “ i n favor” 67.  The need for traceability of goods will spread to all economic sectors Conss. “ i n favor” Unanimous Conss if  thr  minority PoV=15% Conss if  thr  minority PoV=15% 66.  Cars, trains, planes and ships will provide to travellers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) Conss. “ i n favor” Unanimous Conss if  thr  minority PoV=15% 61.  Geolocation-based services will be integrated in a wide variety of mass consumer products Conss. “ i n favor” Unanimous Conss if  thr  minority PoV=15% 59.  A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp. / lab. (29) Gover. agency (10) ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results: Divergence within professional categories NV No concl. ( thr  not reached) 52.  The Semantic Web will govern information exchange between people 2S “ 2S” if r=1.5  “ 2S” if r=1.5  No concl. ( thr  not reached) 20.  Energy consumption will be the main limitation on development of network *infrastructure* NV No concl. ( thr  not reached) “ 2S” (instead of “NV”) 9.  A new type of architecture for Internet applications will be discovered and will be dominant NV No concl. ( thr  not reached) No concl. ( thr  not reached) 8.  The majority of Internet applications will be based on peer-to-peer (P2P) architecture Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object],[object Object]
Results: Divergence within professional categories (cont’) NV No concl. ( thr  not reached) No concl. ( thr  not reached) 70.  A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant NV No concl. ( thr  not reached) No concl. ( thr  not reached) No concl. ( thr  not reached) 69.  The majority of Internet applications (as seen by users) will follow a peer-to-peer model 2S No concl. ( thr  not reached) “ 2S” if r=1.5  No concl. ( thr  not reached) 55.  Concerns about privacy will be eroded due to widespread uptake of services based on digital identities Global population (reminder) (131) Other (15) Engineer (52) Professor-researcher (14) Technology advisor (28) Decision-maker (22) ,[object Object],[object Object],[object Object],[object Object]
Results: Divergence within “organization” categories NV No concl. ( thr  not reached) 52.  The Semantic Web will govern information exchange between people 2S No concl. ( thr  not reached) “ 2S” if r=1.5  NV (instead of 2S) 20.  Energy consumption will be the main limitation on development of network *infrastructure* NV No concl. ( thr  not reached) No concl. ( thr  not reached) 9.  A new type of architecture for Internet applications will be discovered and will be dominant NV No concl. ( thr  not reached) 8.  The majority of Internet applications will be based on peer-to-peer (P2P) architecture Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp  / lab. (29) Govern. agency (10) ,[object Object],[object Object],[object Object],[object Object]
Results: Divergence within “organization” categories (cont’) NV No concl. ( thr  not reached) No concl. ( thr  not reached) 70.  A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant NV No concl. ( thr  not reached) 69.  The majority of Internet applications (as seen by users) will follow a peer-to-peer model 2S Conss “opposed” with thr 60% / 20% Conss ”in favor” with thr  70% / 20% 55.  Concerns about privacy will be eroded due to widespread uptake of services based on digital identities Global population (reminder) (131) Other (15) Freelance (7) Prvt. enterp. / lab. (45) Non-profit org.  (27) Pub. enterp  / lab. (29) Govern. agency (10) ,[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object]
Further work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie AFNIC Technology Backdrop Survey Findings

Information technology research trends: The future vision
Information technology research trends: The future vision Information technology research trends: The future vision
Information technology research trends: The future vision Aboul Ella Hassanien
 
Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...Eduserv
 
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...Educational Technology
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland Tata Consultancy Services
 
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุดเก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุดSoftware Park Thailand
 
Open source telecom software project survey results 2019
Open source telecom software project survey results 2019Open source telecom software project survey results 2019
Open source telecom software project survey results 2019Alan Quayle
 
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...BCS Data Management Specialist Group
 
The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...PRQA
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentationprasanthreddy
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentationprasanthreddy
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentationguesta9b6cb
 
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)Masud Rahman
 
REDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its StakeholdersREDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its StakeholdersAEGIS-ACCESSIBLE Projects
 
DESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPDESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPIRJET Journal
 
Steps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical ResearchSteps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical ResearchVeeva Systems
 

Ähnlich wie AFNIC Technology Backdrop Survey Findings (20)

Information technology research trends: The future vision
Information technology research trends: The future vision Information technology research trends: The future vision
Information technology research trends: The future vision
 
Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...Investigation into the management of web content in Higher Education Institut...
Investigation into the management of web content in Higher Education Institut...
 
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
Quantitative Digital Backchannel: Developing a Web-Based Audience Response Sy...
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland
 
NTAP & LSC Tech Survey Highlights
NTAP & LSC Tech Survey HighlightsNTAP & LSC Tech Survey Highlights
NTAP & LSC Tech Survey Highlights
 
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุดเก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
เก็บ Requirement อย่างไรให้มีประสิทธิภาพมากที่สุด
 
dss
dssdss
dss
 
Open source telecom software project survey results 2019
Open source telecom software project survey results 2019Open source telecom software project survey results 2019
Open source telecom software project survey results 2019
 
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
Adopting a Situated Learning framework for (Big) Data Projects - Martin Dougl...
 
TCS Global Cloud Study – North America
TCS Global Cloud Study – North AmericaTCS Global Cloud Study – North America
TCS Global Cloud Study – North America
 
The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...The Increasing Value and Complexity of Software Call for the Reevaluation of ...
The Increasing Value and Complexity of Software Call for the Reevaluation of ...
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentation
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentation
 
Boardroom presentation
Boardroom presentationBoardroom presentation
Boardroom presentation
 
TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings
 
Pragmatic Devops
Pragmatic DevopsPragmatic Devops
Pragmatic Devops
 
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
SurfClipse-- An IDE based context-aware Meta Search Engine (ERA Track)
 
REDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its StakeholdersREDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
REDEFINING ASSUMPTIONS Accessibility and Its Stakeholders
 
DESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPDESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APP
 
Steps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical ResearchSteps to Overcome Information Overload in Clinical Research
Steps to Overcome Information Overload in Clinical Research
 

Mehr von Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetAfnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 

Mehr von Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 

Kürzlich hochgeladen

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Kürzlich hochgeladen (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

AFNIC Technology Backdrop Survey Findings

  • 1. Findings of the AFNIC’s “Technology Backdrop” Survey Mohsen Souissi 1 Feb 2011 AFNIC - R&D
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Results: Consensus on part A (“Global Internet Architecture”) 8% 19% 73% 4. Mobile phone services will be based on IP 10% 17% 73% 27. Denial of Service (DoS) attacks against Internet infrastructure and applications will increase 9% 9% 82% 24. Open standards will remain dominant for Internet applications 9% 7% 85% 2. The Internet will remain the dominant infrastructure for worldwide data exchange Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
  • 15. Results: Consensus on part A (cont’) (“Global Internet Architecture”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 11% 24% 65% 5. IPv6 will be more widely used than IPv4 on the Internet 12% 23% 65% 15. Many new customer services will be based on sensor networks and RFID 15% 20% 65% 1. The number of regular users of the Internet will exceed 4 billion 13% 21% 66% 31. IP mobility services (&quot;Mobile IP&quot; or some alternative solution) will be widely deployed 13% 18% 69% 19. Pervasive environmental concerns will push Internet architects and equipment vendors to seek and adopt &quot;green&quot; solutions both for hardware components and for communication protocols Threshold: <= 15% Threshold: >= 60% (9 consensus)
  • 16. Results: Consensus on part B (“Internet naming, identifiers and identities”) 12% 19% 69% 45. The DNS will be more secure than it is today 12% 16% 72% 33. Internet naming will continue to be based on the current hierarchical and distributed structure 12% 15% 73% 46. The domain name will remain the basis of the majority of identification systems used by Internet applications (for example: URL, URN, URI...) 14% 8% 78% 54. The Internet user will use multiple digital identities Threshold: <= 15% Threshold: >= 60% (9 consensus) 9% 17% 74% 36. The DNS, as an infrastructure, will be considered even more critical than it is today Threshold: <= 10% Threshold: >= 70% (1 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
  • 17. Results: Consensus on part B (cont’) (“Internet naming, identifiers and identities”) 12% 26% 62% 43. The root and the majority of DNS zones will be signed with DNSSEC 11% 27% 62% 37. Besides its well-known role, the DNS will increasingly be used as a &quot;mapping&quot; system by new Internet infrastructure protocols(routing, multi-homing...) 10% 26% 64% 34. The DNS resolution mechanism currently based on &quot;Client-Server&quot; architecture and requiring a DNS tree traversal will remain dominant 15% 16% 69% 56. Privacy and &quot;User's choice&quot; will be at the center of Society's debate on the evolution of digital-identity technologies Threshold: <= 15% Threshold: >= 60% (9 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question
  • 18. Results: Consensus on part C (“User trends”) Threshold: <= 10% Threshold: >= 70% (4 consensus) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 7% 18% 76% 67. The need for traceability of goods will spread to all economic sectors 9% 7% 84% 61. Geolocation-based services will be integrated in a wide variety of mass consumer products 9% 5% 86% 66. Cars, trains, planes and ships will provide to travelers the same electronic services (including Internet access) as at the office or at home, in an almost transparent way (without taking the quality of service into account) 8% 2% 90% 59. A computer, a phone, a personal digital assistant (PDA) as well as new (forthcoming) types of equipment will support a wide set of common features for the general public
  • 19. Results: Consensus on part C (cont’) (“User trends”) minority PoV (%) Uncertainty (%) prevailing PoV (%) Question 15% 12% 73% 60. Home automation services will reach maturity and will be affordable by all (at least in developed countries) 13% 15% 73% 58. The number of mobile phone (all generations included) subscribers will exceed 6 billion Threshold: <= 15% Threshold: >= 60% (6 consensus)
  • 20.
  • 21. Results: Divergence on part A (“Global Internet Architecture”) 0.76 10% 25% 40% 35% NV 9. A new type of architecture for Internet applications will be discovered and will be dominant 0.76 10% 35% 40% 25% NV 8. The majority of Internet applications will be based on peer-to-peer (P2P) architecture 2.06 6% 43% 20% 37% 2S 20. Energy consumption will be the main limitation on development of network *infrastructure* Threshold: > 2 (2S) Threshold: < 20% Threshold: > 33% (NV) (3 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
  • 22. Results: Divergence on part A (cont’) (“Global Internet Architecture”) 1.66 1% 39% 23% 38% 2S 21. Attention to energy saving will be the main driving force for development of network *infrastructure* 1.55 1% 37% 24% 38% 2S 18. Proprietary standards, competing with the Internet ones, will emerge in order to facilitate development of the Internet of Things 1.55 5% 35% 24% 40% 2S 11. The &quot;end-to-end&quot; principle will be re-established and will underpin again Internet communications to the detriment of gateways (such as NAT) which will gradually disappear Threshold: > 1.5 (2S) (6 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question
  • 23. Results: Divergence on part B (“Internet naming, identifiers and identities”) Threshold: > 2 (2S) Threshold: < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 1.95 8% 36% 20% 44% 2S 49. In telephony networks, the phone number will remain the most used identifier by both end-user and intermediate systems Threshold: > 1.5 (2S) (3 divergences) 0.66 10% 23% 43% 34% NV 52. The Semantic Web will govern information exchange between people 2.76 10% 47% 15% 37% 2S 55. Concerns about privacy will be eroded due to widespread uptake of services based on digital identities
  • 24. Results: Divergence on part C (“User trends”) Threshold: > 2 (2S) Threshold: < 20% Threshold: > 33% (NV) (2 divergences) r ad Opposed (%) uncertainty (%) In favor (%) PoV Divergence Type Question 2.0 3% 41% 20% 39% Deux écoles Most of face-to-face meetings/conferences will be replaced by (network) remote-meetings/remote-conferences Threshold: > 1.5 (2S) (3 divergences) 0.43 6% 20% 54% 26% NV 70. A new model for Internet applications (as seen by users) will emerge and will subsequently become dominant 0.75 11% 36% 40% 24% NV 69. The majority of Internet applications (as seen by users) will follow a peer-to-peer model
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.