<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style></head>
<body class='hmmessage'><div dir='ltr'><i>Hi all!</i><br><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><i><br>This week, cyberpolitics is dominated by cybersecurity issues with US and CHINA considering diplomatic solutions to address cyber relationship troubles. A for events, we notice Commonwealth Telecommunication Organisation Forum in Nairobi, RIPE NCC Regional meeting and CTS/FGV and ICANN event in Rio de Janeiro. Below, some articles in those events as well as informations on IANA Transition, ICANN Accoutability, WSIS+10, Big data, Net neutrality, internet of things.<br><br>Great week end to all!</i><br><i><u><br>ENGLISH (french below</u>)</i><br><br><strong><u>CYBERPOLITICS</u><br><font style="font-size:10pt;" size="2"><br></font><u><font style="font-size:10pt;" size="2">US - CHINA CYBER RELATIONSHIP</font></u></strong><br><br>US-China: High-tech diplomacy<br><a href="http://www.ft.com/cms/s/0/e5969b8a-5869-11e5-a28b-50226830d644.html" target="_blank">http://www.ft.com/cms/s/0/e5969b8a-5869-11e5-a28b-50226830d644.html</a><br><br>U.S., China: Diplomatic Solutions to Cyber Security Problems <br><a href="https://www.stratfor.com/analysis/us-china-diplomatic-solutions-cyber-security-problems" target="_blank">https://www.stratfor.com/analysis/us-china-diplomatic-solutions-cyber-security-problems</a><br><br>US, Chinese officials meet on cyber security issues<br><a href="http://www.dispatchtimes.com/us-chinese-officials-meet-on-cyber-security-issues/92271/" target="_blank">http://www.dispatchtimes.com/us-chinese-officials-meet-on-cyber-security-issues/92271/</a><br><br>Chinese official: Beijing willing to work with US on cybersecurity<br><a href="http://thehill.com/policy/cybersecurity/254003-china-will-work-with-us-on-cybersecurity-but-protect-its-own-interests" target="_blank">http://thehill.com/policy/cybersecurity/254003-china-will-work-with-us-on-cybersecurity-but-protect-its-own-interests</a><br><br>Cybersecurity to put strains on ties with China: Barack Obama<br><a href="http://economictimes.indiatimes.com/news/defence/cybersecurity-to-put-strains-on-ties-with-china-barack-obama/articleshow/48993574.cms" target="_blank">http://economictimes.indiatimes.com/news/defence/cybersecurity-to-put-strains-on-ties-with-china-barack-obama/articleshow/48993574.cms</a><span><br><br>China</span> <span>Offers</span> <span>Cybersecurity</span> <span>Cooperation</span> <span>With</span> <span>US</span> <span>to</span> <span>Resolve</span> <span>Disputes</span><br><a href="http://sputniknews.com/science/20150917/1027125231.html" target="_blank">http://sputniknews.com/science/20150917/1027125231.html</a><br><br>Jeb Hits Obama on Cyber Security Failures, Hillary Email Server<br><a href="http://freebeacon.com/politics/jeb-hits-obama-on-cyber-security-failures-hillary-email-server/" target="_blank" class="ecxc_nobdr ecxt_prs">http://freebeacon.com/politics/jeb-hits-obama-on-cyber-security-failures-hillary-email-server/</a><br><u><b><font style="font-size:10pt;" size="2"><br></font></b><b><font style="font-size:10pt;" size="2">RUSSIA - EU - US CYBER RELATIONSHIP</font></b></u><br><br>Russia: 7-year cyberwar against Nato, EU and US by Kremlin-sponsored hackers The Dukes exposed<br><a href="http://www.ibtimes.co.uk/russia-7-year-cyberwar-against-nato-eu-us-by-kremlin-sponsored-hackers-dukes-exposed-1520065" target="_blank">http://www.ibtimes.co.uk/russia-7-year-cyberwar-against-nato-eu-us-by-kremlin-sponsored-hackers-dukes-exposed-1520065</a><br><br>Kremlin-backed hackers spying on Europe, Asia, US: cybersecurity firm<br><a href="http://phys.org/news/2015-09-kremlin-backed-hackers-spying-europe-asia.html" target="_blank">http://phys.org/news/2015-09-kremlin-backed-hackers-spying-europe-asia.html</a><br><br>Legal Analysis: Russia's Right To Be Forgotten<br><a href="https://www.article19.org/resources.php/resource/38099/en/legal-analysis:-russia%27s-right-to-be-forgotten" target="_blank">https://www.article19.org/resources.php/resource/38099/en/legal-analysis:-russia's-right-to-be-forgotten</a><br><br>Dekoder - German language Internet site for top notch Russian journalism<br><a class="ecxc_nobdr ecxt_prs" href="http://www.dw.com/en/dekoder-german-language-internet-site-for-top-notch-russian-journalism/a-18716434" target="_blank">http://www.dw.com/en/dekoder-german-language-internet-site-for-top-notch-russian-journalism/a-18716434</a><br><br><u><b><font style="font-size:10pt;" size="2">MORE NEWS ON CYBERPOLITICS - CYBERSECURITY</font></b></u><br><br>To Fix Cybersecurity Law, Ask More Questions<br><a href="http://techcrunch.com/2015/09/15/to-fix-cybersecurity-law-ask-more-questions/?ncid=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+Techcrunch+%28TechCrunch%29&sr_share=twitter#.qtn0gh:kgx8" target="_blank">http://techcrunch.com/2015/09/15/to-fix-cybersecurity-law-ask-more-questions/?ncid=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&sr_share=twitter#.qtn0gh:kgx8</a><br><br>ASEAN and China to step up crackdown on cyber crime<br><a href="http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20150915000102" target="_blank">http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20150915000102</a><br><br>Prospects for the Cuban Internet After the Normalization of U.S.-Cuba Relations<br><a href="http://blogs.cfr.org/cyber/2015/09/10/prospects-for-the-cuban-internet-after-the-normalization-of-u-s-cuba-relations/" target="_blank">http://blogs.cfr.org/cyber/2015/09/10/prospects-for-the-cuban-internet-after-the-normalization-of-u-s-cuba-relations/</a><br><br>Drawing out the dark side <br><a href="https://www.indexoncensorship.org/2015/09/magazine-drawing-out-the-dark-side/" target="_blank">https://www.indexoncensorship.org/2015/09/magazine-drawing-out-the-dark-side/</a><br><br>When Cybersecurity And Geopolitics Collide<br><a href="http://www.techweekeurope.co.uk/security/when-cybersecurity-and-geopolitics-collide-176745" target="_blank">http://www.techweekeurope.co.uk/security/when-cybersecurity-and-geopolitics-collide-176745</a><br><br>Is Wall Street ready for the next cyberattack?<br><a href="http://www.cnbc.com/2015/09/16/is-wall-street-ready-for-the-next-cyberattack.html" target="_blank">http://www.cnbc.com/2015/09/16/is-wall-street-ready-for-the-next-cyberattack.html</a><br><br>The coming private cyber 'war'<div class="ecxcol-24 ecxpage-heading"><a href="http://fcw.com/articles/2015/09/11/private-cyber-war.aspx" target="_blank">http://fcw.com/articles/2015/09/11/private-cyber-war.aspx</a><br><br>Dems: New Geneva Conventions needed for cyber war<div><a href="http://thehill.com/policy/cybersecurity/253231-dems-new-geneva-conventions-needed-for-cyber-war" target="_blank">http://thehill.com/policy/cybersecurity/253231-dems-new-geneva-conventions-needed-for-cyber-war</a><br><a href="http://www.dw.com/en/dekoder-german-language-internet-site-for-top-notch-russian-journalism/a-18716434" target="_blank"></a><br></div></div>Empowerment of non-governmental actors from outside the United States in multistakeholder Internet governance<br><strong><a href="http://fr.scribd.com/doc/280563813/Empowerment-of-non-governmental-actors-from-outside-the-United-States-in-multistakeholder-Internet-governance" target="_blank">http://fr.scribd.com/doc/280563813/Empowerment-of-non-governmental-actors-from-outside-the-United-States-in-multistakeholder-Internet-governance</a><br></strong><br>If you love technology, you should hate the nation state<br><a href="http://thenextweb.com/opinion/2015/09/15/i-live-in-the-internet/" target="_blank">http://thenextweb.com/opinion/2015/09/15/i-live-in-the-internet/</a><strong><br><br></strong>Let's talk about the geopolitics of technology<br><a href="http://www.rdm.co.za/technology/2015/09/11/let-s-talk-about-the-geopolitics-of-technology" target="_blank">http://www.rdm.co.za/technology/2015/09/11/let-s-talk-about-the-geopolitics-of-technology</a><br><span><br>OPINION: If jobs are replaced by technology, what replaces jobs?</span><br><a href="http://ewn.co.za/2015/09/14/OPINION-John-Lloyd-If-jobs-are-replaced-by-technology-what-replaces-jobs" target="_blank">http://ewn.co.za/2015/09/14/OPINION-John-Lloyd-If-jobs-are-replaced-by-technology-what-replaces-jobs</a><br><br>EU Issues Overview – 29 August - 04 September 2015<br><a href="http://www.internetsociety.org/doc/eu-issues-overview-%E2%80%93-29-august-04-september-2015" target="_blank">http://www.internetsociety.org/doc/eu-issues-overview-%E2%80%93-29-august-04-september-2015</a><br><br>The WikiLeaks Files review: the truth will set you free – or put you to sleep<br><a href="http://www.irishtimes.com/culture/books/the-wikileaks-files-review-the-truth-will-set-you-free-or-put-you-to-sleep-1.2348670" target="_blank">http://www.irishtimes.com/culture/books/the-wikileaks-files-review-the-truth-will-set-you-free-or-put-you-to-sleep-1.2348670</a><br><br>Internet insecurity may cost the world trillions by 2030<br><a href="http://fortune.com/2015/09/15/internet-insecurity-cost/" target="_blank">http://fortune.com/2015/09/15/internet-insecurity-cost/</a><br><br>Attacks show fiber optic Internet cables vulnerable<br><u><a href="http://www.usatoday.com/story/news/2015/09/16/attacks-show-fiber-optic-internet-cables-vulnerable/32502785/" target="_blank"></a><a href="http://www.usatoday.com/story/news/2015/09/16/attacks-show-fiber-optic-internet-cables-vulnerable/32502785/" target="_blank">http://www.usatoday.com/story/news/2015/09/16/attacks-show-fiber-optic-internet-cables-vulnerable/32502785/</a><b><br><br></b></u><u><b><u><b>COMMONWEALTH TELECOMMUNICATION ORGANISATION MEETING</b></u><br><br></b>Towards a connected commonwealth<br><a href="http://www.cto.int/events/upcoming-events/cto-forum-2015/#prclt-NMR1QZlf" target="_blank">http://www.cto.int/events/upcoming-events/cto-forum-2015/#prclt-NMR1QZlf</a><br><br>Secretary General of CTO a Key Speaker At Cto Forum 2015 in Nairobi<br><a href="http://allafrica.com/stories/201509141660.html" target="_blank">http://allafrica.com/stories/201509141660.html</a><br><br>CTO forum opens with a large turnout as secretary general elect Shola Taylor takes of office<br><a href="http://www.cto.int/news/cto-forum-opens-with-a-large-turnout-as-secretary-general-elect-shola-taylor-takes-o" target="_blank">http://www.cto.int/news/cto-forum-opens-with-a-large-turnout-as-secretary-general-elect-shola-taylor-takes-o</a><br><br>Commonwealth to spearhead fight against cybercrime<br><a href="http://www.coastweek.com/3837-Commonwealth-to-spearhead-fight-against-cyber-crime.htm" target="_blank">http://www.coastweek.com/3837-Commonwealth-to-spearhead-fight-against-cyber-crime.htm</a><b><br><br><u><b>RIPE NCC REGIONAL MEETING<br></b></u><br>Yerevan hosts RIPE NCC regional conference for the first time<br></b></u><div style="top:-1999px;left:-1988px;" id="ecxstcpDiv">Yerevan
hosts RIPE NCC regional conference for first time - See more at:
http://telecom.arka.am/en/news/internet/yerevan_hosts_ripe_ncc_regional_conference_for_first_time_/#sthash.eoj3R3qb.dpuf</div><u><b><a href="http://telecom.arka.am/en/news/internet/yerevan_hosts_ripe_ncc_regional_conference_for_first_time_/" target="_blank">http://telecom.arka.am/en/news/internet/yerevan_hosts_ripe_ncc_regional_conference_for_first_time_/</a><br></b></u><br>RIPE Academic Cooperation Initiative (RACI)<br><a href="https://www.ripe.net/participate/ripe/raci" target="_blank">https://www.ripe.net/participate/ripe/raci</a><br><br>Getting started RIPE NCC regional meeting<br><a class="ecxc_nobdr ecxt_prs" href="http://armenpress.am/eng/multimedia/slideshows/55668/?utm_source=dlvr.it&utm_medium=twitter" target="_blank">http://armenpress.am/eng/multimedia/slideshows/55668/?utm_source=dlvr.it&utm_medium=twitter</a><br><br>RIPE NCC IPv4 Available Pool - Graph
<br><a href="https://www.ripe.net/publications/ipv6-info-centre/about-ipv6/ipv4-exhaustion/ipv4-available-pool-graph" target="_blank">https://www.ripe.net/publications/ipv6-info-centre/about-ipv6/ipv4-exhaustion/ipv4-available-pool-graph</a><br><span id="ecxparent-fieldname-title-dce6971b451c4e629b74d165031290eb"><br>RIPE Resource Transfer Policies
</span><br><a href="https://www.ripe.net/participate/policies/proposals/2015-04" target="_blank">https://www.ripe.net/participate/policies/proposals/2015-04</a><br><u><b><br>IANA TRANSITION - ICANN ACCOUNTABILITY<br></b></u><br>The IANA Transition and the Role of Governments in Internet Governance by Milton Mueller<br><u><b><a href="http://www.ipjustice.org/internet-governance/ip-justice-journal-the-iana-transition-and-the-role-of-governments-in-internet-governance-by-milton-mueller/" target="_blank">http://www.ipjustice.org/internet-governance/ip-justice-journal-the-iana-transition-and-the-role-of-governments-in-internet-governance-by-milton-mueller/</a><br><br></b></u><a href="http://www.internetgovernance.org/2015/09/06/icann-accountability-a-three-hour-call-trashes-a-year-of-work/" title="Permalink to ICANN Accountability: A three hour call trashes a year of work" target="_blank">ICANN Accountability: A three hour call trashes a year of work </a><br><a href="http://www.internetgovernance.org/" target="_blank">http://www.internetgovernance.org/</a><br><br><a href="http://www.circleid.com/posts/20150914_one_step_closer_to_an_accountable_icann/" class="ecxblue" target="_blank">One Step Closer to an Accountable ICANN</a><br><a href="http://www.circleid.com/posts/20150914_one_step_closer_to_an_accountable_icann/" target="_blank">http://www.circleid.com/posts/20150914_one_step_closer_to_an_accountable_icann/</a><br><br>"No Legal Basis for IANA Transition": A Post-Mortem Analysis of Senate Committee Hearing<br><a href="https://www.linkedin.com/pulse/legal-basis-iana-transition-post-mortem-analysis-senate-sophia-bekele?trk=pulse-det-nav_art" target="_blank">https://www.linkedin.com/pulse/legal-basis-iana-transition-post-mortem-analysis-senate-sophia-bekele?trk=pulse-det-nav_art</a><br><br>U.S. extension of IANA contract with ICANN is no surprise
<br><a href="http://www.lexology.com/library/detail.aspx?g=45838930-1da1-412f-91e2-d2b52f63fc02" target="_blank">http://www.lexology.com/library/detail.aspx?g=45838930-1da1-412f-91e2-d2b52f63fc02</a><br><br><u><b>WSIS+10</b></u><br><br>Asia Regional Consultation on the WSIS+10 Review<br><a href="http://blog.apnic.net/2015/09/15/asia-regional-consultation-on-the-wsis10-review/" target="_blank">http://blog.apnic.net/2015/09/15/asia-regional-consultation-on-the-wsis10-review/</a><br><br>Welcome to the next generation of sustainable development<br><a href="http://www.greenbiz.com/article/welcome-next-generation-sustainable-development" target="_blank">http://www.greenbiz.com/article/welcome-next-generation-sustainable-development</a><br><br><u><b>10th IGF<br><br></b></u>55 Days Remain Until the 10th Internet Governance Forum in Joao Pessoa, Brazil <br><a href="https://ipv6.net/news/55-days-remain-until-the-10th-internet-governance-forum-in-joao-pessoa-brazil-2/" target="_blank">https://ipv6.net/news/55-days-remain-until-the-10th-internet-governance-forum-in-joao-pessoa-brazil-2/</a><br><br><u><b>CTS/FGV and ICANN EVENT IN RIO DE JANEIRO</b></u><br><br>CTS/FGV and ICANN organise event in RIO DE JANEIRO 14th sept 14h : 18h 30<u><b> </b></u><br><a href="https://www.linkedin.com/pulse/ctsfgv-icann-organize-event-rio-de-janeiro-14th-sep-1400-1830-maciel" target="_blank">https://www.linkedin.com/pulse/ctsfgv-icann-organize-event-rio-de-janeiro-14th-sep-1400-1830-maciel</a><br><br><u><b>ISOC BOARD MEETING</b></u><br><br>Board Meeting Agenda No. 124<br><a href="http://www.internetsociety.org/board-meeting-agenda-no-124" target="_blank"></a><a href="http://www.internetsociety.org/board-meeting-agenda-no-124" target="_blank"></a><a href="http://www.internetsociety.org/board-meeting-agenda-no-124" target="_blank">http://www.internetsociety.org/board-meeting-agenda-no-124</a><br><u><b><br></b></u><u><b>UNESCO WORKSHOP ON INFORMATION SOCIETY</b></u><br><br>UNESCO to host ethical dimensions of internet privacy workshop<br><a href="http://antiguaobserver.com/unesco-to-host-ethical-dimensions-of-internet-privacy-workshop/" target="_blank">http://antiguaobserver.com/unesco-to-host-ethical-dimensions-of-internet-privacy-workshop/</a><br><br><u><b>EUROPE ONLINE BRANDING EVENT : Sept 15, 2015</b></u><br><br>Growth through Online Innovation - What role for European online branding? <br><a href="http://agenda.euractiv.com/events/growth-through-online-innovation-what-role-european-online-branding-130284" target="_blank">http://agenda.euractiv.com/events/growth-through-online-innovation-what-role-european-online-branding-130284</a><br><br><u><b>ICANN<br></b></u><br>ICANN Publishes “An Analysis of New gTLD Universal Acceptance” Finding They Are Not<br><u><b><a href="http://www.thedomains.com/2015/09/15/icann-publishes-an-analysis-of-new-gtld-universal-acceptance-finding-they-are-not/" target="_blank">http://www.thedomains.com/2015/09/15/icann-publishes-an-analysis-of-new-gtld-universal-acceptance-finding-they-are-not/</a><br></b></u><br><a href="http://www.circleid.com/posts/20150916_icann_announces_results_of_new_gtld_universal_acceptance_analysis/" class="ecxblue" target="_blank">ICANN Announces Results of New gTLD Universal Acceptance Analysis</a><u><b><a href="http://www.circleid.com/posts/20150916_icann_announces_results_of_new_gtld_universal_acceptance_analysis/" target="_blank">http://www.circleid.com/posts/20150916_icann_announces_results_of_new_gtld_universal_acceptance_analysis/</a><br></b></u><br>Is This a Hack or an Attack?<br><u><b><a href="https://www.icann.org/news/blog/is-this-a-hack-or-an-attack" target="_blank">https://www.icann.org/news/blog/is-this-a-hack-or-an-attack</a><br></b></u><br><u><b>DOMAIN NAME<br></b></u><br><a href="http://www.circleid.com/posts/20150917_global_domain_registrations_edge_closer_to_300m_verisign/" class="ecxblue" target="_blank">Global Domain Registrations Edge Closer to 300M: Verisign</a><br><u><b><a href="http://www.circleid.com/posts/20150917_global_domain_registrations_edge_closer_to_300m_verisign/" target="_blank">http://www.circleid.com/posts/20150917_global_domain_registrations_edge_closer_to_300m_verisign/</a><br><br></b></u>City Must Use .NYC to Create a Real Civic Commons<br><u><b><a href="http://citylimits.org/2015/09/14/city-must-use-nyc-to-create-a-real-civic-commons/" target="_blank">http://citylimits.org/2015/09/14/city-must-use-nyc-to-create-a-real-civic-commons/</a><br></b></u><br>The Dark Web is No More “Dark”, .Onion Websites Get Official Recognition<br><a href="http://fossbytes.com/the-dark-web-is-no-more-dark-onion-websites-get-official-recognition/" target="_blank">http://fossbytes.com/the-dark-web-is-no-more-dark-onion-websites-get-official-recognition/</a><br><br>Web Address Explosion is Bonanza for Cyber-Criminals: Study<br><a href="http://www.nbcnews.com/tech/tech-news/web-address-explosion-bonanza-cyber-criminals-study-n419361" target="_blank"></a><a href="http://www.nbcnews.com/tech/tech-news/web-address-explosion-bonanza-cyber-criminals-study-n419361" target="_blank">http://www.nbcnews.com/tech/tech-news/web-address-explosion-bonanza-cyber-criminals-study-n419361</a><br><br>Dot dot dot... Observations from the first two years of ICANN's new gTLD programme
<br><a href="http://www.lexology.com/library/detail.aspx?g=9f3e0d90-ec96-41ee-9d34-0241ad38f3f0" target="_blank">http://www.lexology.com/library/detail.aspx?g=9f3e0d90-ec96-41ee-9d34-0241ad38f3f0</a><br><br>CentralNic reports doubled profits in the first half of 2015<br><a href="http://domainnewsafrica.com/centralnic-reports-doubled-profits-in-the-first-half-of-2015/" target="_blank">http://domainnewsafrica.com/centralnic-reports-doubled-profits-in-the-first-half-of-2015/</a><br><br>EFF asks ICANN working group to make user privacy a central tenet of WHOIS system<br><a href="http://domainnewsafrica.com/eff-asks-icann-working-group-to-make-user-privacy-a-central-tenet-of-whois-system/" target="_blank">http://domainnewsafrica.com/eff-asks-icann-working-group-to-make-user-privacy-a-central-tenet-of-whois-system/</a><br><br><u><b>E-COMMERCE</b></u><br><br>E-commerce technology: Lots of growth and consolidation<br><a href="https://www.internetretailer.com/2015/09/11/e-commerce-technology-lots-growth-and-consolidation" target="_blank">https://www.internetretailer.com/2015/09/11/e-commerce-technology-lots-growth-and-consolidation</a><br><br>Chinese e-commerce startups attract U.S. investors<br><a href="https://www.internetretailer.com/2015/08/25/chinese-e-commerce-startups-attract-us-investors" target="_blank">https://www.internetretailer.com/2015/08/25/chinese-e-commerce-startups-attract-us-investors</a><br><br>‘85 per cent of Indian e-commerce
companies were overvalued, including Snapdeal and Flipkart’ says Vinod
Khosla <br><a href="http://yourstory.com/2015/09/vinod-khosla-india-2015/" target="_blank">http://yourstory.com/2015/09/vinod-khosla-india-2015/</a><br><br><br><u><b>INTERNET OF THINGS<br><br></b></u>Alliance organisations for the Internet of Things<br><a href="https://www.linkedin.com/pulse/alliance-organizations-internet-things-iot-george-tyler?trk=pulse-det-nav_art" target="_blank">https://www.linkedin.com/pulse/alliance-organizations-internet-things-iot-george-tyler?trk=pulse-det-nav_art</a><br><br>How can privacy survive in the era of the internet of things?
<br><a href="http://www.theguardian.com/technology/2015/apr/07/how-can-privacy-survive-the-internet-of-things?CMP=share_btn_tw" target="_blank">http://www.theguardian.com/technology/2015/apr/07/how-can-privacy-survive-the-internet-of-things?CMP=share_btn_tw</a><br><br>Securing the Internet of Things [Q&A]<br><a href="http://betanews.com/2015/09/17/securing-the-internet-of-things-qa/" target="_blank">http://betanews.com/2015/09/17/securing-the-internet-of-things-qa/</a><br><br><b><u>BIG DATA</u></b><br><br>Is Internet Privacy a Contradiction in Terms?<br><a href="http://www.dmnews.com/direct-line-blog/is-internet-privacy-a-contradiction-in-terms/article/437641/" target="_blank">http://www.dmnews.com/direct-line-blog/is-internet-privacy-a-contradiction-in-terms/article/437641/</a><br><br>How Asean organisations are untangling big data storage challenge<br><a href="http://www.computerweekly.com/feature/How-Asean-organisations-are-untangling-big-data-storage-challenge" target="_blank">http://www.computerweekly.com/feature/How-Asean-organisations-are-untangling-big-data-storage-challenge</a><br><br>History As Big Data: 500 Years Of Book Images And Mapping Millions Of Books<br><a href="http://www.forbes.com/sites/kalevleetaru/2015/09/16/history-as-big-data-500-years-of-book-images-and-mapping-millions-of-books/" target="_blank">http://www.forbes.com/sites/kalevleetaru/2015/09/16/history-as-big-data-500-years-of-book-images-and-mapping-millions-of-books/</a><br><br>EU, US reach data protection deal allowing Europeans to sue over privacy breaches
<br><a href="https://au.news.yahoo.com/world/a/29471127/eu-us-reach-data-protection-deal-allowing-europeans-to-sue-over-privacy-breaches/" target="_blank">https://au.news.yahoo.com/world/a/29471127/eu-us-reach-data-protection-deal-allowing-europeans-to-sue-over-privacy-breaches/</a><br><br><u><b>NET NEUTRALITY</b></u><br><br>Here's the FCC's full legal defense of its net neutrality rules<br><a href="http://www.dailydot.com/politics/fcc-net-neutrality-legal-defense/" target="_blank">http://www.dailydot.com/politics/fcc-net-neutrality-legal-defense/</a><br><br>Fight for net neutrality far from over<br><a href="http://www.courier-journal.com/story/opinion/contributors/2015/09/11/fight-net-neutrality-far-over/72069694/" target="_blank">http://www.courier-journal.com/story/opinion/contributors/2015/09/11/fight-net-neutrality-far-over/72069694/</a><br><br>FCC defends net neutrality, says ISPs don’t have the right to edit the Internet<br><a href="http://arstechnica.co.uk/tech-policy/2015/09/isps-dont-have-1st-amendment-right-to-edit-internet-fcc-tells-court/" target="_blank">http://arstechnica.co.uk/tech-policy/2015/09/isps-dont-have-1st-amendment-right-to-edit-internet-fcc-tells-court/</a><br><br><u><b>AFRICAN INTERNET NEWS</b></u><br><br>High-speed mobile puts Africa and India on fast track<br><a href="http://www.bbc.com/news/business-34243917" target="_blank">http://www.bbc.com/news/business-34243917</a><br><br>Africa: Sub-Saharan Africa Net Connections Fastest Fastestarchers<br><a href="http://allafrica.com/stories/201509141408.html" target="_blank">http://allafrica.com/stories/201509141408.html</a><br><br>Data remains an expensive luxury in Africa but free internet may not come free<br><a href="http://www.timeslive.co.za/scitech/2015/09/16/Data-remains-an-expensive-luxury-in-Africa-but-free-internet-may-not-come-free" target="_blank"></a><a href="http://www.timeslive.co.za/scitech/2015/09/16/Data-remains-an-expensive-luxury-in-Africa-but-free-internet-may-not-come-free" target="_blank">http://www.timeslive.co.za/scitech/2015/09/16/Data-remains-an-expensive-luxury-in-Africa-but-free-internet-may-not-come-free</a><br><br><u><i><b>FRANCAIS</b></i></u><br><br><b><u>CYBERSECURITE : CHINE - USA</u></b><br><br>Un accord sur la cybersécurité entre la Chine et les USA ?<br><a href="http://www.lemondeinformatique.fr/actualites/lire-un-accord-sur-la-cybersecurite-entre-la-chine-et-les-usa-62358.html" target="_blank">http://www.lemondeinformatique.fr/actualites/lire-un-accord-sur-la-cybersecurite-entre-la-chine-et-les-usa-62358.html</a><br><br><span id="ecxbltitle">La cybersécurité devrait devenir le point d'orgue de la coopération sino-américaine</span><br><a href="http://french.xinhuanet.com/2015-09/15/c_134627069.htm" target="_blank">http://french.xinhuanet.com/2015-09/15/c_134627069.htm</a><span><br><br>Obama:</span> <span>les</span> <span>USA</span> <span>sont</span> <span>le</span> <span>problème</span> <span>des</span> <span>USA</span><br><a class="ecxc_nobdr ecxt_prs" href="http://fr.sputniknews.com/international/20150917/1018226126.html" target="_blank">http://fr.sputniknews.com/international/20150917/1018226126.html</a><span id="ecxbltitle"><br><br>Chine : les Etats-Unis doivent arrêter leurs "accusations sans fondement" sur les cyber-attaques</span><br><a href="http://french.xinhuanet.com/2015-09/11/c_134616092.htm" target="_blank">http://french.xinhuanet.com/2015-09/11/c_134616092.htm</a><br><br>Le gratin de la cybersécurité réuni à Mons pour proposer des produits à l'OTAN
<br><a href="http://www.rtbf.be/info/regions/detail_le-gratin-de-la-cybersecurite-reuni-a-mons-pour-l-otan?id=9081535" target="_blank">http://www.rtbf.be/info/regions/detail_le-gratin-de-la-cybersecurite-reuni-a-mons-pour-l-otan?id=9081535</a><br><br><u><b>UE - INTERNET</b></u><br><br>L’UE lance une consultation sur la qualité de service Internet<br><a class="ecxc_nobdr ecxt_prs" href="http://www.zdnet.fr/actualites/l-ue-lance-une-consultation-sur-la-qualite-de-service-internet-39824912.htm" target="_blank">http://www.zdnet.fr/actualites/l-ue-lance-une-consultation-sur-la-qualite-de-service-internet-39824912.htm</a><br><br>L'Europe doit elle repenser son droit d'auteur<br><a href="http://www.inaglobal.fr/idees/article/l-europe-doit-elle-repenser-son-droit-d-auteur-8525" target="_blank">http://www.inaglobal.fr/idees/article/l-europe-doit-elle-repenser-son-droit-d-auteur-8525</a><br><br>Incidents télécoms en Europe : défaillances et attaques en hausse<br><a href="http://www.silicon.fr/1-incident-telecom-10-a-attaque-informatique-europe-126480.html" target="_blank">http://www.silicon.fr/1-incident-telecom-10-a-attaque-informatique-europe-126480.html</a><br><br>Free Mobile : après l'Europe, le roaming est inclus depuis les USA !<br><a href="http://www.zdnet.fr/actualites/free-mobile-apres-l-europe-le-roaming-est-inclus-depuis-les-etats-unis-39824888.htm" target="_blank" class="ecxc_nobdr ecxt_prs">http://www.zdnet.fr/actualites/free-mobile-apres-l-europe-le-roaming-est-inclus-depuis-les-etats-unis-39824888.htm</a><br><br><u><b>ICANN</b></u><br><br><a href="https://safebrands.fr/calendrier-et-evenements/candidature-ceo-icann-who-is-next-20150911/" rel="bookmark" title="Lien permanent : Candidature CEO Icann : who’s next ?" target="_blank">Candidature CEO Icann : who’s next ? </a><br><a href="https://safebrands.fr/calendrier-et-evenements/candidature-ceo-icann-who-is-next-20150911/" target="_blank">https://safebrands.fr/calendrier-et-evenements/candidature-ceo-icann-who-is-next-20150911/</a><br><br>L'ICANN publie une mise à jour de son rapport sur les Rights Protection Mechanisms<br><a class="ecxc_nobdr ecxt_prs" href="http://www.iptwins.com/posts/view/697?utm_source=twitterfeed&utm_medium=twitter" target="_blank">http://www.iptwins.com/posts/view/697?utm_source=twitterfeed&utm_medium=twitter</a><br><br>Le plan de l’ICANN pour s’émanciper des États-Unis<br><a href="http://www.nextinpact.com/news/96074-le-plan-l-icann-pour-s-emanciper-etats-unis.htm" target="_blank">http://www.nextinpact.com/news/96074-le-plan-l-icann-pour-s-emanciper-etats-unis.htm</a><br><br>Ouverture de l'appel à candidatures pour le programme de bourses et le programme NextGen pour la 55e réunion de l'<abbr title="Internet Corporation for Assigned Names and Numbers">ICANN</abbr><br><a href="https://www.icann.org/news/announcement-2015-09-04-fr" target="_blank">https://www.icann.org/news/announcement-2015-09-04-fr</a><br><br>Conformité contractuelle<br><a href="https://www.icann.org/resources/pages/compliance-2015-09-03-fr" target="_blank">https://www.icann.org/resources/pages/compliance-2015-09-03-fr</a><br><br>Qu'est-ce qu'une réclamation pour non-conformité contractuelle ?<br><a href="https://www.icann.org/resources/files/1193141-2015-09-03-fr" target="_blank">https://www.icann.org/resources/files/1193141-2015-09-03-fr</a><br><br>Version bêta du tableau de bord d'indicateurs clé de performance (KPI)<br><a href="https://www.icann.org/news/blog/version-beta-du-tableau-de-bord-d-indicateurs-cle-de-performance-kpi" target="_blank">https://www.icann.org/news/blog/version-beta-du-tableau-de-bord-d-indicateurs-cle-de-performance-kpi</a><br><br>Bulletin d'information ICANN - région EMEA<br><a class="ecxc_nobdr ecxt_prs" href="http://myemail.constantcontact.com/Read-the-5th-Issue-of-the-ICANN-EMEA-Newsletter---with-a-new-look-.html?soid=1118638566701&aid=os0ta_Q2AFQ" target="_blank">http://myemail.constantcontact.com/Read-the-5th-Issue-of-the-ICANN-EMEA-Newsletter---with-a-new-look-.html?soid=1118638566701&aid=os0ta_Q2AFQ</a><br><br><u><b>MEGADONNEES</b></u><br><br>Le libre-service et la gouvernance des données pour une plus grande autonomie des utilisateurs métiers <br><a href="http://www.journaldunet.com/solutions/expert/62144/le-libre-service-et-la-gouvernance-des-donnees-pour-une-plus-grande-autonomie-des-utilisateurs-metiers.shtml" target="_blank">http://www.journaldunet.com/solutions/expert/62144/le-libre-service-et-la-gouvernance-des-donnees-pour-une-plus-grande-autonomie-des-utilisateurs-metiers.shtml</a><br><br>Incertitude sur le rendement du capital investi en mégadonnées<br><a href="http://www.directioninformatique.com/incertitude-sur-le-rendement-du-capital-investi-en-megadonnees/37967" target="_blank">http://www.directioninformatique.com/incertitude-sur-le-rendement-du-capital-investi-en-megadonnees/37967</a><br><br><u><b>INTERNET DES OBJETS</b></u><br><br>Les entreprises sceptiques face à l'internet des objets<br><a href="http://www.silicon.fr/entreprises-sceptiques-face-a-linternet-objets-126455.html" target="_blank">http://www.silicon.fr/entreprises-sceptiques-face-a-linternet-objets-126455.html</a><br><br><div class="ecxcopy-paste-block">Internet des objets : Sigfox part à la conquête de l’Amérique<span></span><br></div><a href="http://www.silicon.fr/internet-objets-sigfox-conquete-amerique-126665.html" target="_blank">http://www.silicon.fr/internet-objets-sigfox-conquete-amerique-126665.html</a><br><br><u><b>DONNEES PERSONNELLES</b></u><br><br>Quel cadre légal pour le traitement des données personnelles des mineurs sur internet ?<br><a href="http://www.journaldunet.com/ebusiness/expert/62186/quel-cadre-legal-pour-le-traitement-des-donnees-personnelles-des-mineurs-sur-internet.shtml" target="_blank">http://www.journaldunet.com/ebusiness/expert/62186/quel-cadre-legal-pour-le-traitement-des-donnees-personnelles-des-mineurs-sur-internet.shtml</a><br><span id="ecxbltitle"><u><b><br>NOMS DE DOMAINE<br><br></b></u></span>Document de discussion sur la mise aux enchères des nouveaux <abbr title="generic Top Level Domain">gTLD</abbr><br><a href="https://www.icann.org/news/announcement-2015-09-08-fr" target="_blank">https://www.icann.org/news/announcement-2015-09-08-fr</a><br><br>Noms de pays et de territoires autorisés dans les <abbr title="Top Level Domain">TLD</abbr> BROTHER, .GEA, .ACO, .SECURITY, .PROTECTION, .THEATRE et .RENT<br><a href="https://www.icann.org/news/announcement-2-2015-09-01-fr" target="_blank">https://www.icann.org/news/announcement-2-2015-09-01-fr</a><br><br>Rapport thématique préliminaire sur les procédures à prévoir en matière de nouveaux <abbr title="generic Top Level Domain">gTLD</abbr><br><a class="ecxc_nobdr ecxt_prs" href="https://www.icann.org/news/announcement-2015-08-31-fr" target="_blank">https://www.icann.org/news/announcement-2015-08-31-fr</a><br><br>Le classement des .VILLES
<br><a href="http://www.ndd.buzz/2015/09/le-classement-des-villes_16.html" target="_blank">http://www.ndd.buzz/2015/09/le-classement-des-villes_16.html</a><br><br><a href="https://safebrands.fr/cahier-juridique/marque-nom-de-domaine-la-contrefacon-existe-20150914/" rel="bookmark" title="Lien permanent : Marque & nom de domaine : la contrefaçon existe." target="_blank">Marque & nom de domaine : la contrefaçon existe. </a><br><a href="https://safebrands.fr/cahier-juridique/marque-nom-de-domaine-la-contrefacon-existe-20150914/" target="_blank">https://safebrands.fr/cahier-juridique/marque-nom-de-domaine-la-contrefacon-existe-20150914/</a><br><br>Tor : le .onion est un nom de domaine spécial<br><a href="http://www.generation-nt.com/tor-onion-nom-domaine-special-ssl-tls-chiffrement-dark-web-actualite-1919328.html" target="_blank">http://www.generation-nt.com/tor-onion-nom-domaine-special-ssl-tls-chiffrement-dark-web-actualite-1919328.html</a><br><br><br><br><br><br><br><br><br><br></div>
</div>
</div>
</div>
</div>
</div></div> </div></body>
</html>