The survey summarizes feedback from 1,241 APNIC members and stakeholders. It finds that overall satisfaction with APNIC remains high, though network security is the top challenge cited. When asked about APNIC's role, respondents expressed interest in more security training and information sharing between technical organizations. While IPv4 scarcity presents difficulties, members see deploying IPv6 as the main challenge and want APNIC to focus on reclaiming unused address space and sharing best practices on resource transfers.
CompTIA's Trends in Help Desk survey explores the areas businesses are focusing on as they manage their help desk function, including IT priorities, required skills, and emerging technologies.
CompTIA's IT Operations and Emerging Tech tracker monitors the investments companies are making across the four pillars of IT and the adoption of emerging technology.
CompTIA’s annual Industry Outlook report examines 10 trends that businesses will use as they rebuild from a challenging year, along with focused sections on expectations for IT professionals and for IT channel firms.
The document summarizes the results of a cybersecurity survey conducted in Luxembourg. It finds that 78% of companies reported managing at least one cybersecurity incident in the past year. The most common incidents were social engineering attacks (84%) and human errors (48%). While most companies have incident response procedures, only 33% have tested them in a real crisis or simulation. Respondents indicated that their top priorities over the next 12 months are containing attacks, preventing recurrence of incidents, and reducing recovery time to preserve business activities. There are still obstacles to adopting efficient incident management strategies, such as a lack of management support, skills, and time.
This document summarizes the results of the 2019 National Retail Security Survey (NRSS). Some key findings include:
- Shrink rates have remained relatively flat over the past 5 years
- Acts of violence in stores have generally stayed the same over the past year
- Apprehensions of dishonest employees have declined significantly over the past 4 years, likely due to improved loss prevention controls and systems
- Adoption of emerging security technologies like POS analytics and video analytics is increasing
- There is overlap between loss prevention and cybersecurity priorities, but relationships between the functions could be improved in many organizations
Survey: IT is Everywhere (End Users’ Perspective, North America)SolarWinds
The survey summarizes the results of a poll of 875 employed end users in North America about their use of personal devices and cloud applications for work purposes. It found that most users connect multiple devices like laptops, phones and tablets to their work networks and access cloud applications. Many expect their IT departments to provide the same level of support and performance for these personal devices and cloud services as for traditional work technologies. Overall it indicates that the scope of IT management is expanding beyond traditional on-premise systems to include widespread use of personal mobile devices and cloud services for work.
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)SolarWinds
The survey polled 789 employed end users in Hong Kong about their use of devices connected to their employer's network. It found that most users connect smartphones and laptops daily, and over 75% use cloud applications at work. Users expect consistent access and performance for personal devices on the work network and for cloud applications, and over 70% blame IT if cloud applications are unavailable. Compared to 10 years ago, most users connect more devices, especially personally owned devices, to their work network.
CompTIA's Trends in Help Desk survey explores the areas businesses are focusing on as they manage their help desk function, including IT priorities, required skills, and emerging technologies.
CompTIA's IT Operations and Emerging Tech tracker monitors the investments companies are making across the four pillars of IT and the adoption of emerging technology.
CompTIA’s annual Industry Outlook report examines 10 trends that businesses will use as they rebuild from a challenging year, along with focused sections on expectations for IT professionals and for IT channel firms.
The document summarizes the results of a cybersecurity survey conducted in Luxembourg. It finds that 78% of companies reported managing at least one cybersecurity incident in the past year. The most common incidents were social engineering attacks (84%) and human errors (48%). While most companies have incident response procedures, only 33% have tested them in a real crisis or simulation. Respondents indicated that their top priorities over the next 12 months are containing attacks, preventing recurrence of incidents, and reducing recovery time to preserve business activities. There are still obstacles to adopting efficient incident management strategies, such as a lack of management support, skills, and time.
This document summarizes the results of the 2019 National Retail Security Survey (NRSS). Some key findings include:
- Shrink rates have remained relatively flat over the past 5 years
- Acts of violence in stores have generally stayed the same over the past year
- Apprehensions of dishonest employees have declined significantly over the past 4 years, likely due to improved loss prevention controls and systems
- Adoption of emerging security technologies like POS analytics and video analytics is increasing
- There is overlap between loss prevention and cybersecurity priorities, but relationships between the functions could be improved in many organizations
Survey: IT is Everywhere (End Users’ Perspective, North America)SolarWinds
The survey summarizes the results of a poll of 875 employed end users in North America about their use of personal devices and cloud applications for work purposes. It found that most users connect multiple devices like laptops, phones and tablets to their work networks and access cloud applications. Many expect their IT departments to provide the same level of support and performance for these personal devices and cloud services as for traditional work technologies. Overall it indicates that the scope of IT management is expanding beyond traditional on-premise systems to include widespread use of personal mobile devices and cloud services for work.
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)SolarWinds
The survey polled 789 employed end users in Hong Kong about their use of devices connected to their employer's network. It found that most users connect smartphones and laptops daily, and over 75% use cloud applications at work. Users expect consistent access and performance for personal devices on the work network and for cloud applications, and over 70% blame IT if cloud applications are unavailable. Compared to 10 years ago, most users connect more devices, especially personally owned devices, to their work network.
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
The document summarizes key findings from the 2015 Global Information Security Workforce Study. It found that the security skills gap is estimated to reach 1.5 million professionals within 5 years. Organizations report being forced to react to threats rather than prevent them due to growing complexity from technology and solution sprawl. The shortage of security professionals is leading organizations to outsource security tasks and push some responsibilities to overburdened IT staff.
Survey: IT is Everywhere (End Users’ Perspective, UK)SolarWinds
The survey found that:
- Over half of employees connect smartphones and laptops to their work network, while a quarter connect tablets.
- 58% use cloud applications at work.
- Most employees expect consistent access and support for personal devices on their work network and cloud applications for work, even outside the office.
- On average, employees connect 1-2 more devices to their work network today than 10 years ago, showing the expansion of IT management needs beyond traditional borders.
Survey: IT is Everywhere (End Users’ Perspective, Brazil)SolarWinds
A survey of 474 employed end users in Brazil was conducted to understand how IT is expanding beyond traditional borders. The survey found that most users connect personal devices like smartphones and laptops to their work network and use cloud applications. Users expect their employer's IT department to ensure the same level of availability, performance and support for these personal devices and cloud applications, both inside and outside of work. Compared to 10 years ago, most users connect significantly more devices to their work network, with smartphones and tablets being the most common additional devices.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
Survey: IT is Everywhere (End Users’ Perspective, Australia)SolarWinds
The survey found that:
1) Over half of employees connect their laptop and over 40% connect their smartphone to their employer's network while at work.
2) Nearly half of employees use cloud-based applications while at work.
3) Most employees expect their IT department to ensure consistent availability and performance of devices and applications they use for work inside and outside the office.
Forty percent of Canadians have participated in at least one power sport activity. The greatest opportunity for expansion appears to be in 4X4, off-road motorcycling and side-by-side ROVs. While over half view the power sports industry favorably, two-thirds think safety promotion could be improved. Most participate on private land, crown land or managed trails, though some admit to unauthorized access, contributing to perceptions of the industry being unregulated.
This document provides a summary of a survey conducted by iGov Survey in collaboration with Druva regarding data security and encryption strategies across the NHS. Some key findings include:
- Over half of respondents were confident in securing sensitive data, but less than a quarter were confident in end-user compliance.
- Around 40% of staff had access to mobile devices, but only 69% had mobile device management solutions.
- Three-quarters were unaware of cloud application usage and most couldn't monitor sensitive data access through them.
- Only 25% were fully aware of upcoming EU GDPR data laws, though over half recognized a need to better understand compliance risks.
Technisource Women in IT Careers Survey - Monster.comMonster
Despite years of criticism on the subject, there are still large disparities in the way men and women view employment within the technology field, according to the 2010 Technisource Women in Information Technology Report (conducted by Monster.com®). Most notably, differences in viewpoints were concentrated in compensation, mentors and role models, and challenges faced.
The new study demonstrates that while some lagging societal issues remain unchanged across the board, such as equal compensation, some perceived differences may be the result of specific choices and priorities between genders.
Among the key findings:
Career Satisfaction
Seventy-eight percent of women do not believe that compensation is equal between men and women – nearly half of the male respondents do perceive equality.
When asked about most important factors to men and women for career satisfaction, the greatest differences were men chose compensation and women chose being challenged and flexibility.
Career Progression
Fifty-two percent of women working in IT believe there is a "glass ceiling" that restricts their employment growth (28% of women are neutral).
When asked what the most important factors for career success were over the next five years, both men and women responded with technology experience and skills.
Mentorship/Role Models
When asked if respondents have had or do have a mentor, women responded the highest with 33 percent to 28 percent of men.
Seventy-three percent of women do not believe there are enough role models for women (versus 52 percent of men).
Future of Women in IT
Both men (56 percent) and women (70 percent) believe that greater promotion of IT as a career choice for women is the top encouraging factor for young women to enter the field.
Twenty-seven percent of men believe that women have an advantage over men working in the IT field.
Only 26 percent of men and 24 percent of women believe that society encourages young women to study math and science.
According to respondents, 74 percent of women believe female workers face a different set of career challenges than their male counterparts (compared to 48 percent of men).
"Our Women in Information Technology Report shows that there appear to be differences beyond how both women and men view their compensation and career progression within the IT field," said Alisia Genzler, vice president of the Northeast Region of Technisource. "Employers should take heed of these differing mindsets to better understand the unique priorities and challenges each of these groups face. Failing to do so will affect employee satisfaction, work performance, and in turn create a workforce that will jump at the opportunity to work for an employer that recognizes and acknowledges what really matters to them."
The document summarizes the results of a survey of 319 IT professionals about the state of IT security. Key findings include:
- 85% were confident in their organization's security program, though 41% reported a security breach in the past.
- Top security investments were internal staffing, network firewalls, virus protection and malware protection.
- Growing complexity of regulations and insufficient security staffing were the top security challenges.
- Top priorities for the coming year were security and cloud computing.
Measuring customer effort with Top Tasks - Gerry McGovernuxbri
The document contains several lists of tasks from different organizations and surveys. The top tasks across different regions and organizations generally include tasks related to accessing and comparing statistical country data and reports, browsing publications, and accessing basic facts and summaries from the OECD. Completion times for tasks across user studies tended to range from 30 seconds to over 5 minutes, with average success rates around 50%. Over time, success rates for tasks generally improved with iterations and modifications based on user research findings.
Ray Poynter - Finding the story in the Data - ESOMAR APAC 2018Ray Poynter
This document provides an overview of a masterclass session on finding the story in data. It discusses the importance of using frameworks to structure data analysis and produce useful insights and stories. Specific frameworks elements discussed include defining the problem, establishing existing context, and assembling evidence from various sources. The document also covers what constitutes an insight, finding the main story and relevant exceptions in the data, techniques for data reduction, and using various visualizations and methods to craft narratives from the data. As an example, it analyzes survey mode usage data across several Asia-Pacific countries to identify trends and differences between countries.
Adobe Campaign released findings from its third annual consumer email survey, focused on consumers' habits and behavior related to personal and work email. The report surveyed more than 1,000 white-collar workers in Germany
The document summarizes key findings from the Harvey Nash Cyber Security Survey 2014/15. The survey received 161 responses from organizations across different sectors. Key findings include:
- About 80% of respondents could clearly identify cyber risk owners and had security testing processes, but 18% did not know what assets to protect.
- A third suffered a cyber incident in the past year, but this did not correlate with security posture.
- Budget limitations and lack of security culture hindered implementation.
- Supply chain security risks were not fully addressed.
- There were gaps in understanding of cyber risk, especially among HR functions.
The document summarizes the results of the 2015 IT Sector Census. Some key findings include:
- 945 companies from 30 countries participated, with 555 responses analyzed
- Most responses came from Latin America (87.6%), followed by Europe (7.4%) and Africa (5%)
- Brazil had the most participants (55.1%) followed by Argentina (8.5%) and other Latin American countries
- The census database with over 188,000 individual answers from 2013-2015 is available for further in-depth analysis by associations, universities, and governments to better understand IT sector trends.
Higher ed recruitment has gotten more complex. Most admissions teams are being asked to do more with less, and prospects themselves are coming in with big expectations. The keys lie in three areas: planning, team development and metrics/reporting.
Enterprise Social Use and Perceptions by MicrosoftAref Jdey
The document summarizes the findings of a Microsoft survey on enterprise social media use. Some key findings include:
- Respondents in Mexico, Turkey, and China were most likely to use social tools to share and review documents, while those in Japan, Switzerland, Austria, and Germany were least likely.
- Women tended to use social tools more for communication, while men used them more for networking and research.
- Productivity loss was cited as the top restriction reason in 9 countries, while security concerns were cited in the remaining 23 countries.
- Increased productivity from social tools was most prevalent in China, India, Turkey, Mexico, and Russia.
COVID-19: How Businesses Are Handling the CrisisSarah Jackson
More than half of respondents said COVID-19 has had a moderate or major impact on their business operations and 83% are moderately or extremely concerned about the potential impact of the virus. Business leaders see communication functions as essential for responding to COVID-19, with communicating to employees being a high priority. While most businesses tried to prepare for crises, almost half said their plans did not address infectious disease outbreaks specifically. The most trusted sources of information about COVID-19 were the CDC, WHO, and other international health organizations.
Social Tools in the Workplace InfographicMicrosoft
A global survey of over 9,000 information workers from 32 countries found that:
- Nearly half said their productivity has increased due to social tools, though many feel management underestimates their value.
- Younger workers aged 18-24 feel more constrained by lack of support for social tools compared to older groups.
- Top uses of social tools are communicating with colleagues, sharing documents, and communicating with clients/customers.
- Security concerns and loss of productivity are most often cited as reasons social tools are restricted in workplaces.
This document summarizes APNIC's activities and key metrics from 2018-2019. It highlights that:
1) APNIC membership and resources delegated, such as IPv4 addresses, IPv6 addresses, and autonomous system numbers, continued growing significantly in 2018-2019 according to projections.
2) Network security was identified as the top challenge by APNIC members based on a survey, with specific issues like phishing, spam, and DDoS attacks noted.
3) Scarcity of IPv4 addresses remains a major issue, with deploying IPv6 and the high costs of IPv4 addresses and NAT being the top challenges for members.
This document provides an overview of APNIC, the Regional Internet Registry for the Asia Pacific region. It summarizes that APNIC manages internet number resources like IPv4 and IPv6 addresses, supports regional internet development, and is a neutral, independent, not-for-profit organization established in 1993. The document also notes that APNIC has over 15,500 members, holds over 110 events per year, and launched an online training academy in 2018 with over 750 enrolled students. It concludes by explaining that APNIC conducts biennial surveys to understand members' challenges, priorities, and satisfaction levels to guide its future planning and activities.
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
The document summarizes key findings from the 2015 Global Information Security Workforce Study. It found that the security skills gap is estimated to reach 1.5 million professionals within 5 years. Organizations report being forced to react to threats rather than prevent them due to growing complexity from technology and solution sprawl. The shortage of security professionals is leading organizations to outsource security tasks and push some responsibilities to overburdened IT staff.
Survey: IT is Everywhere (End Users’ Perspective, UK)SolarWinds
The survey found that:
- Over half of employees connect smartphones and laptops to their work network, while a quarter connect tablets.
- 58% use cloud applications at work.
- Most employees expect consistent access and support for personal devices on their work network and cloud applications for work, even outside the office.
- On average, employees connect 1-2 more devices to their work network today than 10 years ago, showing the expansion of IT management needs beyond traditional borders.
Survey: IT is Everywhere (End Users’ Perspective, Brazil)SolarWinds
A survey of 474 employed end users in Brazil was conducted to understand how IT is expanding beyond traditional borders. The survey found that most users connect personal devices like smartphones and laptops to their work network and use cloud applications. Users expect their employer's IT department to ensure the same level of availability, performance and support for these personal devices and cloud applications, both inside and outside of work. Compared to 10 years ago, most users connect significantly more devices to their work network, with smartphones and tablets being the most common additional devices.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
Survey: IT is Everywhere (End Users’ Perspective, Australia)SolarWinds
The survey found that:
1) Over half of employees connect their laptop and over 40% connect their smartphone to their employer's network while at work.
2) Nearly half of employees use cloud-based applications while at work.
3) Most employees expect their IT department to ensure consistent availability and performance of devices and applications they use for work inside and outside the office.
Forty percent of Canadians have participated in at least one power sport activity. The greatest opportunity for expansion appears to be in 4X4, off-road motorcycling and side-by-side ROVs. While over half view the power sports industry favorably, two-thirds think safety promotion could be improved. Most participate on private land, crown land or managed trails, though some admit to unauthorized access, contributing to perceptions of the industry being unregulated.
This document provides a summary of a survey conducted by iGov Survey in collaboration with Druva regarding data security and encryption strategies across the NHS. Some key findings include:
- Over half of respondents were confident in securing sensitive data, but less than a quarter were confident in end-user compliance.
- Around 40% of staff had access to mobile devices, but only 69% had mobile device management solutions.
- Three-quarters were unaware of cloud application usage and most couldn't monitor sensitive data access through them.
- Only 25% were fully aware of upcoming EU GDPR data laws, though over half recognized a need to better understand compliance risks.
Technisource Women in IT Careers Survey - Monster.comMonster
Despite years of criticism on the subject, there are still large disparities in the way men and women view employment within the technology field, according to the 2010 Technisource Women in Information Technology Report (conducted by Monster.com®). Most notably, differences in viewpoints were concentrated in compensation, mentors and role models, and challenges faced.
The new study demonstrates that while some lagging societal issues remain unchanged across the board, such as equal compensation, some perceived differences may be the result of specific choices and priorities between genders.
Among the key findings:
Career Satisfaction
Seventy-eight percent of women do not believe that compensation is equal between men and women – nearly half of the male respondents do perceive equality.
When asked about most important factors to men and women for career satisfaction, the greatest differences were men chose compensation and women chose being challenged and flexibility.
Career Progression
Fifty-two percent of women working in IT believe there is a "glass ceiling" that restricts their employment growth (28% of women are neutral).
When asked what the most important factors for career success were over the next five years, both men and women responded with technology experience and skills.
Mentorship/Role Models
When asked if respondents have had or do have a mentor, women responded the highest with 33 percent to 28 percent of men.
Seventy-three percent of women do not believe there are enough role models for women (versus 52 percent of men).
Future of Women in IT
Both men (56 percent) and women (70 percent) believe that greater promotion of IT as a career choice for women is the top encouraging factor for young women to enter the field.
Twenty-seven percent of men believe that women have an advantage over men working in the IT field.
Only 26 percent of men and 24 percent of women believe that society encourages young women to study math and science.
According to respondents, 74 percent of women believe female workers face a different set of career challenges than their male counterparts (compared to 48 percent of men).
"Our Women in Information Technology Report shows that there appear to be differences beyond how both women and men view their compensation and career progression within the IT field," said Alisia Genzler, vice president of the Northeast Region of Technisource. "Employers should take heed of these differing mindsets to better understand the unique priorities and challenges each of these groups face. Failing to do so will affect employee satisfaction, work performance, and in turn create a workforce that will jump at the opportunity to work for an employer that recognizes and acknowledges what really matters to them."
The document summarizes the results of a survey of 319 IT professionals about the state of IT security. Key findings include:
- 85% were confident in their organization's security program, though 41% reported a security breach in the past.
- Top security investments were internal staffing, network firewalls, virus protection and malware protection.
- Growing complexity of regulations and insufficient security staffing were the top security challenges.
- Top priorities for the coming year were security and cloud computing.
Measuring customer effort with Top Tasks - Gerry McGovernuxbri
The document contains several lists of tasks from different organizations and surveys. The top tasks across different regions and organizations generally include tasks related to accessing and comparing statistical country data and reports, browsing publications, and accessing basic facts and summaries from the OECD. Completion times for tasks across user studies tended to range from 30 seconds to over 5 minutes, with average success rates around 50%. Over time, success rates for tasks generally improved with iterations and modifications based on user research findings.
Ray Poynter - Finding the story in the Data - ESOMAR APAC 2018Ray Poynter
This document provides an overview of a masterclass session on finding the story in data. It discusses the importance of using frameworks to structure data analysis and produce useful insights and stories. Specific frameworks elements discussed include defining the problem, establishing existing context, and assembling evidence from various sources. The document also covers what constitutes an insight, finding the main story and relevant exceptions in the data, techniques for data reduction, and using various visualizations and methods to craft narratives from the data. As an example, it analyzes survey mode usage data across several Asia-Pacific countries to identify trends and differences between countries.
Adobe Campaign released findings from its third annual consumer email survey, focused on consumers' habits and behavior related to personal and work email. The report surveyed more than 1,000 white-collar workers in Germany
The document summarizes key findings from the Harvey Nash Cyber Security Survey 2014/15. The survey received 161 responses from organizations across different sectors. Key findings include:
- About 80% of respondents could clearly identify cyber risk owners and had security testing processes, but 18% did not know what assets to protect.
- A third suffered a cyber incident in the past year, but this did not correlate with security posture.
- Budget limitations and lack of security culture hindered implementation.
- Supply chain security risks were not fully addressed.
- There were gaps in understanding of cyber risk, especially among HR functions.
The document summarizes the results of the 2015 IT Sector Census. Some key findings include:
- 945 companies from 30 countries participated, with 555 responses analyzed
- Most responses came from Latin America (87.6%), followed by Europe (7.4%) and Africa (5%)
- Brazil had the most participants (55.1%) followed by Argentina (8.5%) and other Latin American countries
- The census database with over 188,000 individual answers from 2013-2015 is available for further in-depth analysis by associations, universities, and governments to better understand IT sector trends.
Higher ed recruitment has gotten more complex. Most admissions teams are being asked to do more with less, and prospects themselves are coming in with big expectations. The keys lie in three areas: planning, team development and metrics/reporting.
Enterprise Social Use and Perceptions by MicrosoftAref Jdey
The document summarizes the findings of a Microsoft survey on enterprise social media use. Some key findings include:
- Respondents in Mexico, Turkey, and China were most likely to use social tools to share and review documents, while those in Japan, Switzerland, Austria, and Germany were least likely.
- Women tended to use social tools more for communication, while men used them more for networking and research.
- Productivity loss was cited as the top restriction reason in 9 countries, while security concerns were cited in the remaining 23 countries.
- Increased productivity from social tools was most prevalent in China, India, Turkey, Mexico, and Russia.
COVID-19: How Businesses Are Handling the CrisisSarah Jackson
More than half of respondents said COVID-19 has had a moderate or major impact on their business operations and 83% are moderately or extremely concerned about the potential impact of the virus. Business leaders see communication functions as essential for responding to COVID-19, with communicating to employees being a high priority. While most businesses tried to prepare for crises, almost half said their plans did not address infectious disease outbreaks specifically. The most trusted sources of information about COVID-19 were the CDC, WHO, and other international health organizations.
Social Tools in the Workplace InfographicMicrosoft
A global survey of over 9,000 information workers from 32 countries found that:
- Nearly half said their productivity has increased due to social tools, though many feel management underestimates their value.
- Younger workers aged 18-24 feel more constrained by lack of support for social tools compared to older groups.
- Top uses of social tools are communicating with colleagues, sharing documents, and communicating with clients/customers.
- Security concerns and loss of productivity are most often cited as reasons social tools are restricted in workplaces.
This document summarizes APNIC's activities and key metrics from 2018-2019. It highlights that:
1) APNIC membership and resources delegated, such as IPv4 addresses, IPv6 addresses, and autonomous system numbers, continued growing significantly in 2018-2019 according to projections.
2) Network security was identified as the top challenge by APNIC members based on a survey, with specific issues like phishing, spam, and DDoS attacks noted.
3) Scarcity of IPv4 addresses remains a major issue, with deploying IPv6 and the high costs of IPv4 addresses and NAT being the top challenges for members.
This document provides an overview of APNIC, the Regional Internet Registry for the Asia Pacific region. It summarizes that APNIC manages internet number resources like IPv4 and IPv6 addresses, supports regional internet development, and is a neutral, independent, not-for-profit organization established in 1993. The document also notes that APNIC has over 15,500 members, holds over 110 events per year, and launched an online training academy in 2018 with over 750 enrolled students. It concludes by explaining that APNIC conducts biennial surveys to understand members' challenges, priorities, and satisfaction levels to guide its future planning and activities.
Strategic Engagement Director Pablo Hinojosa gives an update on APNIC's activities and new service initiatives at AFRINIC 29 in Hammamet, Tunisia from 26 to 30 November 2018.
Application-Driven Network Performance Strategies, Pulse Report by Gatepoint ...CA Technologies
In early 2014, CA Technologies commissioned Gatepoint Research to conduct a survey on the topic of application-driven network performance strategies. More than 200 executives participated. The survey was focused on polling respondents from large enterprises who were responsible for network administration. 78% of respondents were from organizations that had annual revenues of greater than $1.5 billion and 90% of respondents were network engineers and managers.
Learn more about Application-driven Network Performance Management from CA Technologies at http://www.ca.com/anpm
This document summarizes the results of a survey of 186 IT leaders about their technology priorities and budgets for 2018. It found that security-related projects, like business continuity and disaster recovery, were the most important initiatives. Most respondents expected their overall IT budgets to increase in the next year. Emerging technologies like analytics, cloud computing, and IoT were areas where organizations were most open to partnering with newer vendors. The document provides details on the survey methodology and breakdown of responses by industry, job role, and technology category.
The document summarizes survey results about trends in automation from organizations. It finds that most organizations take a balanced approach to technology that monitors emerging trends while prioritizing current operations. The top strategic business goals for using automation are improving efficiency and maintaining customer accounts. Over 40% of organizations feel extremely or highly confident in applying technology to their goals. Common barriers to automation include unsure benefits, lack of technical skills, and insufficient budget. The top automation initiatives are administrative tasks, detecting cybersecurity incidents, and configuring virtual machines.
The key findings of the survey of 314 big data professionals are:
- 87% said 'bad data' pollutes their data stores and 74% said 'bad data' is currently in their stores. Ensuring data quality was the top challenge cited.
- 72% build data flows through hand coding while 53% change pipelines several times per month.
- Only 12% rated their ability to detect issues like stopped pipelines or degraded performance as 'good' or 'excellent'.
- There are significant gaps between the real-time visibility needed and what current tools provide across metrics like error rates, divergent data, and privacy detection.
- 81% said upgrading big data components has significant operational impact.
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA
This document summarizes key findings from CompTIA's research on green IT practices. Some of the main points include:
- Over three-quarters of US organizations have formulated a partial green IT strategy, up from 60% last year.
- Green factors are considered for most IT purchases, especially printers, monitors, desktop PCs and laptops. Organizations seek technologies with lower power consumption and recyclability.
- Drivers for green IT initiatives include cost savings, reduced energy usage, and positive environmental impact. Many see green IT as a competitive advantage.
- Cloud computing, monitors, desktop PCs and laptops are seen as top green IT investments with the best ROI. However, measuring
Disruptive outsourcing leaps to the front. Our 2018 survey of more than 500 executives from leading organizations indicates that disruptive outsourcing solutions—led by cloud and automation—are fundamentally transforming traditional outsourcing. https://deloi.tt/2x7zxb8
Primary Data VMworld 2015 VVOLs Survey Key Findings PrimaryData
The survey found that:
- Nearly half of enterprises have virtualized over 80% of their infrastructure, and 73% have virtualized over 60%.
- There is much interest in VMware Virtual Volumes (VVOLs), but adoption is still early - while 60% are involved with VVOLs, only 7% have completed installation.
- The top challenges holding back VVOL implementation are lack of expertise, performance issues, migration issues, and incomplete vendor support.
Gerry McGovern: Top tasks an event apart 2015Gerry McGovern
This document discusses prioritizing tasks through continuous improvement. It provides data on the top and bottom 20 tasks identified by customers of the OECD website. The top tasks received 7-3% of the total votes while the bottom tasks received 0-0.5% of votes. It also shows similar data for the bottom tasks of other organizations like hospitals, Scottish Enterprise, and Innovation Norway. The document advocates identifying, measuring, and improving tasks to better meet customer needs through an ongoing process of continuous improvement.
This presentation reviews key trends in the IT industry, including shifts in customer buying preferences, cloud computing, mobility, data, security and managed services
This document summarizes the results of the 2014 ASEAN Business Outlook Survey conducted in cooperation with the U.S. Chamber of Commerce and AmCham Singapore. The survey polled over 500 companies across 11 countries and territories in ASEAN regarding business conditions, opportunities, challenges and outlook. Key findings include that a majority of companies see ASEAN markets as more important and expect profits to increase in 2014. Top opportunities for business expansion were seen in Indonesia, Vietnam and Thailand, while monetary and resource constraints were the biggest barriers to business. Regional integration was viewed as important with hopes that the ASEAN Economic Community will enable seamless operations across ASEAN.
The document summarizes the findings of a survey of IT administrators on how they manage their networks. It finds that nearly a third lack confidence in their network's ability to meet business needs. While network configurations change frequently, over a quarter never or rarely back up configurations and a third never update documentation. Less than half know their exact network configuration. Most time is spent on reactive monitoring and troubleshooting rather than planning. Upgrading networks and improving monitoring are top priorities but lack of time and budget prevent this.
Riding sharing market is still attractive to players after Uber leave South East Asian market. Many ride sharing apps (local and foreign) are launched for filling in Uber space and competing to Grab in Vietnam market. This survey is conducted to evaluate the awareness of certain Ride hailing apps among Vietnamese and show the comparison of Grab and other apps.
The survey was conducted to over 300 male and female among 20 – 39 years old in HCM and Hanoi, who use ride sharing apps.
ARC's Ralph Rio's Lean MES at ARC's 2008 Industry Forum ARC Advisory Group
This document discusses research by ARC Advisory Group on the intersection of Lean and Manufacturing Execution Systems (MES). The research included a survey of 106 manufacturers. Key findings were that leaders in applying Lean and MES involve people throughout their organizations, embed business processes in IT systems like MES, and calculate and access metrics like First Pass Yield more frequently using automation. The presentation recommends manufacturers fully involve people, automate business processes, and empower workers with real-time visibility and metrics to continuously improve.
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
In this webinar, exclusively for BPOs and Outsourced Service Providers, we share with you the results of our recent survey from the leaders of capture projects. Find out how Parascript works with its partners to ensure that customers improve and update their capture platform and processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/capture-leaders-and-their-projects-2019
The 2015 Black & Veatch Strategic Directions: Smart Utility report explores how advances in telecommunications, automation and data analytics are changing the relationship between utilities and their customers. The report provides an analysis of important planning, investment, and security challenges and opportunities along with insights on how utilities and cities can achieve their service, resiliency and, ultimately, smart city goals.
Learn more: http://bv.com/reports/smart-utility
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
3. • Face to face focus groups held in ten (10) economies, plus five (5) online focus groups
• Online survey questions based on outputs from focus groups
• Distributed in June 2018 and open for four (4) weeks)
• 1,241 completed responses received – an increase of 5% on the 2016 Survey
• Sample size provides 95% confidence that results are within +/- 3% of presented figures
METHODOLOGY
29%South Asia
East Asia
South East Asia
Oceania
Non-APNIC Regions
27%
21%
20%
3%
Regions
Economies
24%
LDEs
54%
Developing
19%
73%
Members
27%
Stakeholders
Organisation Relationship
Developed
3
5. OVERALL SATISFACTION
Q 8 –Thinking about APNIC overall, how would you rate: (Asked of Members)
7%
9%
15%
11%
41%
45%
36%
35%
2016
2018
Very poor Poor Below Average Neutral Above average Good Excellent
8%
8%
14%
10%
40%
43%
37%
38%
2016
2018
Very poor Poor Below Average Neutral Above average Good Excellent
Quality of Services
Value of Services
12%
10%
16%
10%
35%
39%
35%
39%
2016
2018
Very poor Poor Below Average Neutral Above average Good Excellent
Value of Membership
Q 9. Overall, how would you rate your experience dealing with APNIC? (Asked of Stakeholders )
7%
13%
15%
11%
41%
43%
36%
31%
2016
2018
Very poor Poor Below Average Neutral Above average Good Excellent
5
Q 8 –Thinking about APNIC overall, how would you rate: (Asked of Members)
Q 8 –Thinking about APNIC overall, how would you rate: (Asked of Members)
Overall experience
91% 88%
91% 85%
6. SERVICE USAGE
Q 5 - APNIC Services used by respondents over the last 2 years
1%
3%
6%
9%
10%
13%
13%
18%
20%
21%
25%
27%
38%
41%
44%
45%
56%
62%
76%
Other
None of these
Policy Development
Participate SIGs/Meetings
Used RPKI services
Transferred IPv4 addresses
Technical assistance
Attended presentation
Used reverse DNS
Personally met with APNIC
Attend conference/event
Attended training
Contacted the helpdesk
Applied for IP addresses
Read the blog
Received IP addresses
Used the Whois Database
Used MyAPNIC
Visited the website
6
7. SERVICE SATISFACTION
Q 6 – Thinking about the APNIC services and activities you have used or undertaken, how would you rate your experience?
89%
90%
90%
90%
91%
91%
92%
93%
94%
94%
95%
97%
97%
97%
98%
Received IP addresses
Applied for IP addresses
Read the blog
Visited the website
Used reverse DNS
Used the Whois Database
Used MyAPNIC
Contacted the helpdesk
Technical assistance
Attended training
Policy Development
Participate SIGs/Meetings
Attended presentation
Personally met with APNIC
Attend conference/event
Top 3 Box Score - % Above average, Good, Excellent
7
8. ENDORSEMENT
5%
7%
47%
31%
10%
3% 3%
39%
44%
12%
Critical without being
asked
Tend to be critical if
asked
I am neutral Tend to speak highly if
asked
Speak highly without
being asked
2016 2018
Q 38 – Which of these phrases best describes the way you speak about APNIC to others?
Members Stakeholders East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample Size 903 338 337 251 259 356 294 672 237
Critical without being asked 2% 5% 7% 0% 2% 2% 2% 4% 0%
Tend to be critical if asked 3% 2% 2% 2% 4% 2% 3% 3% 3%
I am neutral 36% 47% 50% 32% 48% 26% 27% 40% 49%
Tend to speak highly if asked 48% 32% 33% 49% 39% 53% 51% 40% 43%
Speak highly without being asked 12% 14% 9% 16% 7% 17% 18% 13% 5%
Mean Score 3.64 3.49 3.35 3.77 3.46 3.82 3.80 3.54 3.52
Segment mean significantly higher / lower than total mean score
8
10. HIGHEST RATING CHALLENGES
Consistent with focus group
feedback, network security is the
number one challenge facing the
community in 2018
Q9. Thinking about your Internet-related services, products or activities, what are the MAIN operational challenges facing your organisation?
10
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Network security 28% 34% 22% 26% 28% 25% 31%
Scarcity of IPv4 addresses 13% 9% 14% 14% 11% 13% 12%
Cost of network operations 10% 14% 17% 11% 13% 13% 11%
Hiring and / or keeping skilled employees 12% 12% 13% 10% 8% 11% 16%
Deployment of IPv6 9% 8% 8% 17% 16% 10% 7%
Management of bandwidth and network capacity 9% 9% 9% 8% 7% 9% 8%
Keeping up with the pace of technology changes 10% 5% 7% 6% 5% 9% 4%
Regulatory requirements involving the Internet 4% 6% 4% 3% 4% 4% 5%
Benchmarking and understanding best practice in network operations 4% 2% 3% 3% 3% 4% 3%
Access to reliable and credible Internet industry data 3% 1% 4% 3% 4% 2% 2%
Other 0% 1% 0% 0% 0% 0% 1%
0%
3%
3%
4%
7%
8%
11%
12%
12%
13%
27%
Other
Benchmarking and understanding best practice in network operations
Access to reliable and credible Internet industry data
Regulatory requirements involvingthe Internet
Keepingup with the pace of technology changes
Management of bandwidth and network capacity
Deployment of IPv6
Cost of network operations
Hiring and /or keeping skilled employees
Scarcity of IPv4 addresses
Network security
11. NETWORK SECURITY
64%
61%
47%
45%
38%
32%
29%
28%
23%
22%
Phishing, spam, malware, ransomware
DDoS attacks
Intrusion and other breaches
Staff lack awareness of security issues
Blacklisting of IP addresses
Routing security
Lack of application security
Inadequate security policies
No cyber security focus from government(s)
Lack of security for IoT applications
Q10. Thinking about network security, what are the MAIN challenges facing your organisation?
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample size 337 251 259 356 294 672 237
Phishing, spam, malware, ransomware 58% 63% 74% 64% 66% 63% 65%
DDoS attacks 65% 45% 70% 61% 58% 64% 54%
Intrusion and other breaches 58% 55% 46% 30% 31% 51% 54%
Staff lack awareness of security issues 40% 50% 49% 46% 50% 44% 43%
Blacklisting of our IP addresses 30% 27% 47% 47% 49% 38% 24%
Routing security 36% 26% 29% 33% 32% 33% 27%
Lack of application security 23% 31% 29% 32% 35% 27% 27%
Inadequate security policies 25% 35% 22% 32% 39% 25% 25%
No cyber security focus from governments 14% 20% 21% 35% 41% 20% 8%
Lack of security for IoT applications 21% 23% 17% 24% 22% 21% 22%
Significantly higher / lower than total
“Security is the
greatest threat at all
levels and is getting
worse. How to tackle
this is a big issue for
the industry”
11
12. NETWORK SECURITY – APNIC ASSISTANCE
30%
35%
39%
41%
53%
59%
64%
Establish an APNIC-CERT for information sharing
Encourage CERT development and information sharing between…
Engage with Governments in the region about the issue of cyber…
Integrate more security content in APNIC conferences
Share security insights on the APNIC Blog and website
Collaborate with technical security organisations to share…
Specific security training courses
Q11. How might APNIC best assist you or others with network security challenges?
Members Stakeholders East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample size 884 328 330 243 257 347 290 656 231
Specific security training courses 64% 63% 59% 52% 75% 72% 73% 70% 42%
Collaborate with technical security organisations to share
information and best practice
59% 59% 56% 61% 61% 60% 60% 60% 57%
Share security insights on the APNIC Blog and website 55% 49% 44% 50% 60% 59% 57% 53% 49%
Integrate more security content in APNIC conferences 42% 38% 42% 22% 45% 52% 56% 44% 17%
Engage with Governments about cyber security 37% 45% 35% 40% 33% 48% 47% 38% 35%
Information sharing between CERTs and the APNIC
community
33% 39% 34% 37% 37% 30% 32% 36% 33%
Establish an APNIC-CERT for information sharing 30% 30% 28% 30% 31% 34% 34% 32% 24%
“I would like to have more
training on network security and
best practice to implement in
the network to protect against
the network attacked.”
“The need for collaboration is
growing. This involves a
proactive APNIC”
12
Significantly higher / lower than total
13. IPv4 SCARCITY
49%
38%
34%
33%
21%
21%
19%
Deploying IPv6
Cost of buying IPv4 addresses
Cost & complexity of NATs
IPv4 transfer policies
Working with brokers selling /leasingIPv4 addresses
It is not an issue
“Health” of IPv4 addresses being transferred
Q13. Thinking about the scarcity of IPv4 addresses, what are the MAIN challenges facing your organisation?
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample size 199 206 207 268 238 455 187
Deploying IPv6 54% 33% 55% 54% 55% 52% 35%
The cost of buying IPv4 addresses 44% 26% 42% 41% 40% 41% 29%
Cost and complexity of NATs 34% 22% 43% 37% 40% 36% 20%
IPv4 address transfer policies 40% 17% 38% 38% 41% 36% 18%
Working with brokers selling / leasing IPv4 addresses 22% 12% 24% 26% 29% 21% 12%
It is not an issue 13% 37% 17% 19% 19% 18% 33%
“Health” of addresses being transferred 28% 12% 26% 15% 15% 25% 11%
Significantly higher / lower than total
Deploying IPv6 is the main challenge
occurring from the shortage of IPv4
addresses except in Developed
economies where a lack of IPv4 is largely
seen as “not an issue”.
13
14. IPv4 SCARCITY – APNIC ASSISTANCE
Q14. Thinking about the scarcity of IPv4 addresses, which, if any, of the following IPv4 activities do you think APNIC should undertake?
3%
5%
25%
39%
52%
54%
57%
Other
Take noaction
Purchase addresses for distribution
Share informationand best practice on resource transfers
Provide incentives for the return of address space
Monitoring andreporting usage
Reclaiming/recovering unused address space
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample size 199 206 207 268 238 455 187
Reclaiming/recovering unused address space 59% 55% 58% 57% 53% 60% 56%
Monitoring and reporting usage 52% 43% 56% 63% 63% 56% 39%
Provide incentives for the return of address space 55% 58% 45% 51% 52% 52% 54%
Share information and best practice on resource transfers 41% 30% 46% 42% 46% 43% 24%
Purchase addresses for distribution 28% 17% 26% 28% 29% 25% 19%
Take no action 4% 8% 3% 5% 3% 4% 10%
Other 3% 6% 2% 2% 2% 2% 6%
Significantly higher / lower than total
“There is so much wasted space
out there being sat on - get it back
and make it usable.”
“Checking on use from legacy
allocations, e.g. in NZ a number of
ISP's received multiple /16 address
blocks which quite likely they
shouldn't have - they should have
been returned to the pool for re-
allocation”
14
15. IPv6 DEPLOYMENT CHALLENGES
Significantly higher / lower than total
Q 17 – What are or were the MAIN challenges affecting your organisation’s deployment of IPv6?
5%
6%
13%
16%
17%
22%
33%
35%
35%
46%
48%
55%
None of the above
Other
The risks of deploying IPv6 are too high
Cost ofIPv6 deployment is toohigh
Our upstream providers do not support IPv6
My organisation’s legacy systems do not support IPv6
Lack ofavailable training
Lack ofapplications that canrun onIPv6
Noclear business / technical advantages or reasons to
adopt IPv6
Lack ofskills and expertise within our organisation
There is no demand for IPv6 from customers
Our customers are not ready for IPv6
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample size 199 206 207 268 238 455 187
Our customers are not ready for IPv6 53% 41% 58% 66% 67% 57% 36%
There is no demand for IPv6 from customers 34% 54% 46% 56% 56% 43% 51%
Lack of skills and expertise within our organisation 40% 43% 53% 49% 59% 43% 39%
No clear advantages or reasons to adopt IPv6 37% 39% 38% 28% 31% 36% 39%
Lack of applications that can run on IPv6 41% 19% 40% 42% 38% 41% 20%
Lack of available training 29% 17% 37% 47% 49% 35% 12%
My organisation’s legacy systems do not support IPv6 23% 21% 24% 19% 18% 23% 22%
Our upstream providers do not support IPv6 20% 17% 13% 19% 21% 16% 15%
Cost of IPv6 deployment is too high 22% 11% 15% 16% 18% 16% 14%
The risks of deploying IPv6 are too high 12% 10% 18% 13% 14% 15% 10%
Other 6% 13% 4% 2% 2% 5% 12%
None of the above 6% 8% 3% 4% 3% 5% 8%
Significantly higher / lower than total
15
16. IPv6 DEPLOYMENT – APNIC ASSISTANCE
Significantly higher / lower than total
Q 18 – Which of the following APNIC activities do you believe are the most important to encouraging IPv6 adoption in the APNIC region?
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample size 199 206 207 268 238 455 187
Providing training in IPv6 51% 57% 65% 72% 71% 62% 53%
Sharing case studies and best current practices about IPv6 60% 56% 65% 63% 64% 64% 53%
Promoting IPv6 to hardware, software and/or content providers 59% 41% 51% 50% 49% 54% 43%
Knowledge sharing on IPv6 deployment experiences 50% 44% 50% 53% 54% 51% 40%
Promoting IPv6 to management / decision makers 44% 41% 47% 45% 46% 46% 36%
Promoting IPv6 to government organisations 46% 34% 42% 49% 54% 42% 32%
APNIC should take no action 1% 2% 3% 2% 2% 2% 2%
Other 1% 2% 1% 1% 2% 1% 2%
2%
2%
42%
44%
49%
50%
62%
62%
APNIC should take no action
Other
Promoting IPv6 to government organisations
Promoting IPv6 to management / decision makers
Knowledge sharing on IPv6 deployment experiences
Promoting IPv6 to hardware, software and/or content providers
Providing training in IPv6
Sharing case studies and best current practices about IPv6
“There are few engineers out there
who understand IPv6, despite all
the training … This is a big
problem”
“Actively promote upstream
operators to deploy IPv6 networks.
… even if operators have deployed
IPv6, operators' sales and technical
personnel still do not know that
IPv6 access can be provided.”
16
18. TRANSPARENCY
Q 35. APNIC is sufficiently open and transparent in its activities
21%
10%
22%
11%
28%
53%
24%
23%
2016
2018
Strongly disagree Disagree Slightly disagree Neither agree nor disagree Slightly agree Agree Strongly agree
87%
East Asia Oceania SE Asia
South
Asia
LDEs Developing Developed
Sample Size 199 206 207 268 290 403 187
Top 3 83% 81% 87% 94% 94% 89% 74%
Significantly higher / lower than total
18
19. RESPECTED IN THE INTERNET COMMUNITY
Q 35. APNIC is respected in the Internet community
12%
6%
13%
6%
31%
46%
39%
41%
2016
2018
Strongly disagree Disagree Slightly disagree Neither agree nor disagree Slightly agree Agree Strongly agree
93%
East Asia Oceania SE Asia South Asia LDEs Developing Developed
Sample Size 199 206 207 268 290 403 187
Top 3 87% 93% 95% 97% 95% 94% 88%
Significantly higher / lower than total
19