►
Description
Internet Society Board of Trustees Meeting 134
10-11 November 2016, Hyderabad, India
Agenda available here: https://www.internetsociety.org/board-of-trustees/meetings/134/
A
A
A
We
have
a
you
know
mailing
list
where
people
can
contact
us,
but
this
is
a
very
good
forum
so
that
we
are
face
to
face
or
virtually-
and
we
can
you
know,
ask
questions
on
the
fly
in
addition
to
being
an
open
session
and
public
is
being
webcast
is
going
to
be
recorded,
so
you
will
be
able
to
join
and
follow
these
even
afterwards.
So
so
we
will
actually
post
a
link
on
the
on
the
agenda
as
usual.
Let
me
go
over
the
ground
rules.
A
As
usual,
we're
gonna
get
a
comment
from
the
floor
here
and
remotely
so
I
will
be
running
in
floor
control.
I
will
have
a
cue
combined
with
remote
participants
and
people
here
in
the
room.
People
here
in
the
room
should
be
able
to
queue
at
a
mic.
Do
we
have
a
mic
or
okay
yeah?
We
have
a
mic
actually.
So
so,
if
you
are
here
in
the
room,
please
as
for
the
mic-
and
you
will
be
able
to
to
to
do
that,
excellent
perfect.
A
So
right
now,
so
the
question
is:
if
I
will
actually
give
priority
to
remote
people
over
local
people.
No,
not
at
all
I
mean
just
requested
floor
and
we
will
basically
give
it
to
you
this
time.
We
have
something
different
from
from
previous
sessions,
which
is
like.
We
actually
had
a
couple
of
a
predefined
topics
just
to
trigger
discussions
and
see
the
bit.
You
know
what
things
that
you
know.
We
think
they
are
important.
We
can
talk
about
and
obviously
they
relate
to
our
strategic
target
or
goals.
A
B
Thank
you
can
solo
and
welcome
everyone,
since
you
lay
down
already
all
the
housekeeping
rules.
I
think
we
will
just
follow
the
agenda
and
try
to
get
as
many
questions
from
people
online
and
in
the
room
connected
to
our
strategic
objective
to
be,
which
is
enabling
safer
and
trusted
internet.
So
it
would
be
good
to
keep
yer
to
take.
I
will
be
taking
type
of
all
the
questions
and
then
inviting
all
the
trustees
to
comment
on
them
and
then
also
taking
more
questions
from
the
room.
B
B
We
have
about
17
viewers,
okay,
great,
then,
let's
start
an
open
open
up
the
floor
to
questions
as
you
know
that
one
of
the
strategic
objectives
is
to
increase
trust
on
the
Internet
among
users
and
among
all
the
other
stakeholders,
and
to
try
to
strengthen
the
internet
society
to
become
more
effective
voice
in
in
the
world
around
this
topic.
So
we
are
really
looking
for
your
questions
and
your
input
as
to
what
might
be
missing
that
we
are
not
doing
and
the
action
plan
we
approved
is
online
and
I
hope
you're
familiar
with
it.
B
B
If
we
don't
have
any
questions
coming
up
so
with
that,
the
the
second
topic
will
be
again
a
presentation
from
a
staff
member
giving
an
update
how
I
soak
engages
with
its
membership
and
the
community
and
we'll
take
the
questions
after
the
presentation.
In
the
first
case,
we
have
no
presentation
so
we'll
just
go
straight
into
that
and
may
I
ask
Kevin
to
read
out
any
questions
if
they
come
up.
First
in
the
chat
room.
A
B
B
B
C
Mean
have
you
take
that
up,
I
think,
there's
a
couple
of
things
that
are
important
to
keep
in
mind
here.
I
think
one
of
them
is
that
the
Internet
of
Things
is
still
the
internet.
It's
using
the
same
technologies,
it's
the
same
general
platforms
that
we
know
and
love
and
we've
lived
with
for
decades.
Now
it's
just
that
people
are
building
them
in
integrating
them
in
different
ways,
and
it's
different
processes
coming
around
here
now
that
are
being
used
to
build
these
things.
C
There's
an
interesting
ecosystem
effect
here
in
that
a
lot
of
companies.
Now
our
internet
companies
that
never
thought
they
would
be
internet
companies.
I
used
to
be
a
car
company,
I
used
to
be
an
appliance
company
now
you're
a
software
vendor
you're,
a
vendor
of
Internet
technology
and
it's
a
hard
transition
for
people
to
make
it's
a
whole
new
discipline
of
engineering
and
so
I
think
we
need
to
help
a
lot
of
these
different
companies
make
that
transition.
C
Now
it's
a
good
question
for
how
I
I
saw
it
contributes
to
that
effort.
I
think
it's
a
whole
industry
challenge
a
lot
of
us
in
our
individual
day.
Jobs
outside
society
as
well
are
going
to
have
to
be
involved
in
that
effort
to
the
extent
as
I
started
off
that
the
IOT
is
the
Internet
I
think
all
of
the
trust
efforts
that
I
sock
is
engaged
in
and
all
the
advocacy
efforts
in
that
vein
definitely
apply
directly
over
to
the
IOT
I.
Think
the
other
major
effort
that's
going
on.
C
It's
it's
kind
of
affiliated
I,
so
I
was
in
the
IETF.
One
of
the
things
that
came
out
after
if
to
the
recent
dee
da
stuff
is
that
a
lot
of
the
the
hacking
it
was
going
on
was
actually
pretty
low
grade
stuff.
These
iOS
he
exploits
were
again
things
you
would
have
seen
in
the
1990s
in
community
commodity
bin,
yo,
normal
internet,
non
io,
non
things,
sorts
of
platforms,
and
so
I
think
we
have
the
knowledge
and
the
technical
committee
in
the
internet,
technical
community.
C
We
just
need
to
condense
that
down
and
there's
already
some
work
started
in
the
IETF
to
gather,
go
around
and
shake
the
engineer,
trees
and
get
the
knowledge
we've
got
and
get
it
consolidated
into
some
documents.
So
we
can
then
take
it
out
into
the
broader
community,
all
those
people
here
just
now
becoming
Internet
technology
developers
and
help
them
ramp
up
that
learning
curve
a
lot
faster,
so
they
don't
have
to
go
through
all
the
travails
that
we
did
back
in
the
90s
I.
E
At
that
so
yeah
sort
of
+1
to
it,
which
it
just
said
there
is
a
the
internet.
It's
just
the
internet
and
a
number
we've
been
talking
about
the
Internet
of
Things
in
the
context
of
collaborative
security,
quite
often,
and
mainly
as
a
pointer
to
that.
That
is
an
area
where
the
people
who
deploy
and
produce
and
maintain
these
devices
need
to
have
an
outward
perspective
need
to
be
aware
of
that.
E
What
they
do
will
impact
the
internet
and
if
they
do
this
in
a
wrong
way,
the
trust
of
the
internet
and
hence
their
business
opportunities,
will
be
effective
in
our
internet
of
Internet
of
Things
white
paper
that
we
published
last
year.
I
believe
for
earlier
this
year
them
when
we
published
it,
but
anyway
we
already
set
out
a,
I
would
say,
an
agenda
around
this
and
in
our
speaking
engagement,
we
have
been
using
this
agenda.
This
is
not
origin.
I
think
it's
the
agenda
of
the
world.
E
First,
of
course,
the
produce
and
follow
these
best
current
practices,
these
things
that
the
industry
needs
to
know
technical
community
ITF
as
a
role
there,
but
I
also
think
that
trade
organizations
like
the
inline
trust
an
alliance
of
a
role
there
and
which
they
actually
take.
I
think
there
is
a
role
for
responsible
disclosure.
With
more
of
these
devices,
we
have
to
make
sure
that
people
who
think
ur
with
these
devices
have
the
ability
to
to
with
to
have
a
path
to
the
company's
back
to
report.
E
These
things
field,
upgradeability,
big
problem,
the
I
you
through
the
Internet
of
Things
spatch
workshop
of
the
IAB
address
this.
The
ntia
multi-stakeholder
process
that
kicked
of
a
few
weeks
ago
addresses
this.
So
this
is
also
an
agenda
item
that
I
think
is
ISM
is
important:
a
device
lifetime
sustainability.
E
How
do
we
upgrade
phones
that
are
two
years
old
and
a
lot
of
like
if
you
can
be
concise,
I'm
going
to
put
the
last
one
data
collection,
honoring
in
honoring
way,
not
necessarily
a
security
related,
but
trust
related,
of
course,
penalizing
the
years
irresponsible
behavior?
Those
are
things
that
I
think
are
on
the
agenda
that
we,
as
Isaac
will
hammer
on
where
I
think
that
chapters
can
have
local
discussions
around
these
issues.
So
this
is
on
my
radar
and
fits
into
our
frameworks.
B
Thank
you
all
of
we.
We
do
have
a
follow-up
question
from
jolly
McAfee
in
the
chat
room.
He
actually
has
a
comment
which
I'll
read
out
and
needs
a
question
as
well.
He
said
that
Vince
serve
has
suggested
that
the
IGF
dynamic
coalition,
encore
internet
values
take
this
up
specifically
authentication
principles
and
protocols,
although
one
might
think
that
the
ITF
would
be
the
more
appropriate
venue.
Is
such
an
approach
feasible.
Does
Internet
of
Things
get
us
into
the
same
weeds
as
the
digital
object
architecture.
F
I'll
keep
this
quick
for
IOT
authentication
mechanism.
I
know
the
ITF
actually
has
a
working
group
that
is
specifically
looking
at
that
it
has
been
looking
at
it
for
a
while.
So
I
guess
they
can
gather
input,
but
I
think
there
there's
some
people
working
on
that,
whether
it
gets
deployed
properly
and
implemented
correctly,
don't
know,
but
I
mean
they're
actually
definitely
working
on
scanners,
there
already
Thank
You
Shan.
G
To
address
Tooting,
so
one
is
the
insecurity
of
IOT.
The
other
issue
is
a
privacy
which
is
odd
lack
of
privacy,
which
is
built
in
too
many
of
these
systems,
so
I
think
that's
another
area
we
should.
We
should
address
also
I
believe
this
is
a
area
where
I
shop
can
not
only
do
things
but
be
seen
to
be
done.
Things
seem
to
be
doing
things
so
because
everyone
now
has
problems
with
lack
of
security,
I
or
2n.
G
It's
going
to
be
a
skip
worse,
I
mean
someone
from
this
house
is
going
to
propane
to
someone
prominence.
I
is
going
to
be
taken
over
something
like
that.
It's
going
to
happen
to
not
it
and
I
think
this
area,
where
I
saw
can
show
that
it
is
doing
something
I
mean
when
something
is
good.
What
about
that,
but
showing
the
fair
doing?
Something
is
also
important.
G
H
I'm
silver
Subramanyam
from
internet
society,
India
Jen
a
chapter,
the
policy
inputs
that
arises
from
I
saw,
can
dice
of
board
of
trustees
I'm
from
a
chapter
and
I,
don't
seem
to
get
enough
time,
advance
notice
to
respond
even
puts
and
provide
inputs
so
that
the
process
becomes
bottom
up.
I
also
see
a
continued
disconnect
between
I,
sock
and
chapters.
H
So,
though
there
are
some
efforts
beginning
to
take
place,
we
are
not
being
consulted
and
the
policy
does
not
erase
bottom
up,
and
there
is
a
very
big
disconnect
between
chapters
and
I
mean
constants
and
Roger
took
the
people.
I
am
very
very
impressed
with
them.
They
do
quite
a
lot
of
work
in
the
road
work
that
Raj
does
in
India
is
tremendous
and
it
has
its
impact
it's
calculated,
but
we
don't
know
what
what
is
going
on
so
some
of
the
activities,
even
during
the
last
two
weeks,
you're
behaved
as
a
chap.
H
The
chapters
in
India
don't
exist.
Why
I
mean,
if
you're
having,
if
you're
talking
to
the
Indian
government?
Why
not
take
the
chapters
along
and
what
kind
of
impression
does
it
convey
to
the
Indian
government?
If
you
completely
ignore
chapters
I'm,
sorry
I'm,
this
is
a
little
strong,
but
the
point
relates
to
the
disconnect
between
chapters
and
I
sock.
Okay,.
H
B
I
This
is
good
this
case
Raju,
okay,
on
security
side,
no
way
we
can
have
a
where
I
sock
chapters
can
play
a
major
role
in
implementing
the
what
you
call
some
frameworks,
which
helps
on
technical
side
is
11
framework
which
helps
the
government's
and
the
technical
staff
in
companies
globally.
To
follow
that
one.
There
is
one
area.
The
second
thing
is
ordinary
Internet
users,
especially
in
India
and
all
most
of
them.
They
are
not
uneducated.
Meth
of
this
even
is
peace
and
the
series
forwards
telcos.
They
won't
forgive
anything.
I
We
had
a
big
cyber
attack
on
in
Lhasa
beam
in
banks,
and
it
came
from
within
the
region
or
what
I
have
today
is
one
is
so
I
don't
want
tell
the
corner
tell
the
some
countries
and
all
and
the
Government
of
India,
also
suppress
the
lots
of
money
was
lost,
but
in
that
case
no
there
is
no
proper
policy
in
overall
process
within
the
government.
Within
the
policy
makers
in
developing
countries,
I'm
thinking,
I
assoc
can
play
a
major
role
all
these
years.
I
A
You
very
much
Hiroshima
yeah.
J
Actually,
the
you
know,
global
cooperative
security
action
are
is
important.
Stuff
is
always
more
than
one
or
two
years
the
aiesec
has
been
recognized
and
also
just
today.
We
confirm
that
we
have
the
strategy
action
in
the
IGF
neck
next
month.
Actually,
regarding
the
you
know,
a
communication
channel
is
important
between
the
global
and
the
local
communities
and
also
the
we
already
discuss
in
this
particular
IOT
security.
More
than
one
or
two
years,
although
our
you
know
outreach
is
has
not
enough,
probably
because
of
the
people
didn't
recognize
real.
J
You
know
security
risk
going
to
happen,
though
a
recent
tweet
that's
going
to
happen
now,
so
we
have
a
lot
of
contact
from
the
government
as
well
as
people
how
we
should
do
so.
We
have
some
frameworks,
I'm
already
document.
What
should
we
do?
So?
It
is
a
good
opportunity
to
send
a
message
to
them
who
are
really
concerned
now
the
issue
of
the
IOT
security
thing,
so
that
is
it
that's
very
important
to
talk
with
you
know
local
chapters,
as
well
as
the
other
stakeholders
who
are
not
a
native
internet
industry.
J
A
Thank
you
hero
she
before
going,
we
have
another
here
yeah,
you
have
the
float.
Yes,.
K
Thank
you.
This
is
Mitch
stoats
I'm,
an
attorney
at
the
Electronic
Frontier
Foundation,
and
a
member
of
the
San
Francisco
Bay
Area
chapter
speaking
about
security,
there's
a
threat
to
the
security
of
internet
standards
and
their
implementations,
which
is
pretty
serious,
which
I
think
this
body
and
and
others
can
really
take
strong
steps
to
address
and
that's
the
threats,
threats,
pretty
researchers
using
so-called
anti-circumvention
laws
that
cover
technological
protection
measures
are
also
called
drm
to
the
extent
that
internet
standards
include
or
envelop
technological
protection
measures.
These
laws
come
into
play.
They
exist
in
many
countries.
K
I
understand
the
board
is
going
to
be
discussing
this
tomorrow
in
closed
session,
but
I
wanted
to
offer
answer
your
questions
about
that.
I
can
provide
specific
examples
of
abuse
and
I
wanted
to
specifically
mention
that
promoting
this
solution
is
in
no
way
interfering
with
national
legal
systems,
legal
processes.
It's
always
the
case-
and
this
has
been
the
case
for
many
years
with
regard
to
patents-
that
any
participant
can
commit
themselves
not
to
abuse
their
legal
rights
in
a
particular
way
for
the
greater
good
of
secure
standards
and
open
standards.
A
You
hurries.
L
Thank
you
for
that.
I.
Sorry,
I
didn't
get
your
name
Mitch
Mitch
our
image,
a
couple
of
points
there.
There
is
in
the
case
of
anti-circumvention
issues
and
I'm
quite
familiar
with
this
part,
because
in
the
in
Singapore
I'm
from
Singapore
in
the
Singapore
law,
you
actually
are
not
liable.
For
second
mention,
because
we
encourage
the
meat
to
be
able
to
figure
out
what
is
going
wrong.
What's
going
on
with
a
piece
of
closed
proprietary
too,
so
we
we
have
that
as
a
specific
okay
as
it
were
in
the
law.
L
So
you
know
I
at
some
point.
It
makes
some
sense
to
do
these
kinds
of
work
in
Singapore.
So
that's
a
separate
conversation
there.
You
know,
instead
of
instead
of
doing
it
in
the
United,
States
or
anywhere
else,
or
do
it
in
Singapore.
The
other
one
that
I
want
to
mention
is
when
you
talk
about
the
patent
policy
issue.
L
They
can
invoke
the
oin
pool
against
the
person
who
initially
initiated
that
assault
as
it
were.
So
that's
one
place
that
we
could
probably
see.
So
there
may
be
some
ideas
in
that
that
we
can
potentially
apply
for
the
kind
of
things
that
you
are
looking
at
doing
as
well.
Anyone
from
an
IT
perspective,
I'm,
not
sure
you
need
to
discuss
this
further,
but
that's
something
I
would
like
you
to
think
about.
Thank.
K
K
So
it's
there's
potentially
less
of
it
as
a
sort
of
a
mutual
defense
sort
of
sort
of
scenario
in
that
way,
but
nonetheless,
if
to
make
make
a
sort
of
make
conditions
or
approve
of
conditions
as
a
requisite
for
participating
in
open
standards,
I
think
would
send
a
very
strong
message
that
that
security,
research,
independent
security
research
should
be
promoted
and
not
threatened
by
legal
of
legal
claims.
So.
A
B
So
therefore
thank
you
ghazala
we
will
go
with
the
late
and
first
and
then,
if
richard
has
his
comments
or
he
can
do
it
offline
and
we'll
go
back
to
the
questions
in
the
in
the
chat
room.
M
Thank
you.
This
is
waleed
I'd
like
to
emphasize
that
the
board
is
in
total
agreement
and
consensus
that
we
have
chapters
are
ver
as
a
very
valuable
part
of
the
organization.
We
believe
that
our
some
support
to
chapters
will
reflect
back
and
we'd
like
to
emphasize
that
chapters
are
truly
one.
I
have
to
be
consulted
on
various
issues,
and
maybe
this
will
tie
in.
To
the
first
point,
I
mean
the
engagement
part.
With
chapters
is
truly
concerned.
M
Consensual
everyone
agrees
on
it,
but
then
the
question
becomes
how
to
do
that
and
that's
where
we'd
like
to
develop
new
ideas,
for
example
the
point
about
security
and
the
attacks
that
happen.
You
may
realize
our
many
have
heard
that
many
of
the
zombie
webcams
and
dvrs,
and
these
devices
that
are
hooked
to
the
internet
were
jeopardized
because
of
the
default
password
and
login
that
has
been
used,
and
so
the
idea
may
not.
The
solution
may
not
necessarily
be
technical.
M
In
this
way
we
have
to
reach
out
through
perhaps
these
chapters
to
inform
the
authorities,
the
businesses,
the
communities,
the
consumers
within
these
sectors
about
the
this
vulnerability,
and
this
cannot
happen
top-down.
It
will
happen,
happen,
bottom-up
and
that's
one
way
through
which
the
internet
society
can
promote
and
solutions
to
these
problems
and
prevent
it
from
in
the
future.
So
this
is
simply
an
example
of
what
can
happen
if
we
have
some
sort
of
collaboration.
That's
why
I
like
to
emphasize
that
the
direction
is
more
bottom
up.
M
B
Thank
you
for
that
feedback.
I.
Think
that
also
feeds
a
lot
into
what
hero
she
was
saying
about.
An
IG
f
is
a
platform
to
engage
in
addition
to
working
on
that,
I
will
now
just
ask
nirelle
who's
been
patiently
waiting
in
the
room.
Would
you
like
to
speak
up,
or
maybe
I'll
just
read
your
question
out
since
I
haven't
heard
back
from
her.
B
N
A
N
Good
to
see
and
hear
you
will
it's
been
a
while
I
hope.
You've
had
a
great
man,
fruitful
meeting.
So
the
question
that
I'm
putting
to
everybody
for
discussion
is
that
I
am
currently
hearing.
You
know
the
my
day.
Job
is
in
consumer
representation
and
I'm
hearing
in
many
forms
at
the
moment
in
regulatory
circles,
and
you
know
product
consumer
protection
circles
that
the
products
consumers
are
buying
from
their
telcos
and
not
fit
for
service.
What
from
the
ISPs
Internet
service
providers?
These
products
are
not
fit
for
service.
N
We
are
not
being
sold
internet
services
that
are
appropriately
secured
that
meet
a
reasonable
standard
of
security
from
many
cases,
and
so
under
Australian
Consumer
Law.
We
should
all
be
getting
our
money
back
and
higher
levels
of
regulation
are
actually
being
actively
contemplated
at
this
point
in
time.
So,
if
I
make
it
that
little
bit
clearer
in
our
system,
we
would
go
through
a
process
of
probably
making
codes
which
could
then
become
mandated
codes
which
would
apply
standard,
such
as
manners
or
others.
B
A
Me
see
red
all
up,
I
think
one
flood
risk
yeah.
E
I
think
the
if
you
look
at
five
piece
agenda,
the
last
point
of
that
was
penalised.
The
bad
behavior
be
transparent
about
it
and
penalize
the
bad
actors,
not
a
question.
Is
you
know
what
level
does
bad
acting
begin?
What
are
the
actual
norms
and
I
think
what
is
happening
in
Australia
is
is
happening
all
over
the
place
and
the
discussions
around
this
are
happening
on
the
local
level.
What
we
need
to
make
sure
is
that
the
right
people
are
in
the
room,
the
people
who
care
about
the
general
internet.
E
We
need
to
make
sure
that
consumers
are
at
the
table.
You
should
make
sure
that
producers
are
at
the
table
and
hands
find
the
balance,
but
this
is
core
of
collaborative
security,
external
facing
internet
values,
making
sure
that,
at
the
level
where
you
can
address
the
problem
in
Australia
consumer
base,
you
actually
deal
with
it
so
I'm.
This
sounds
like
music
in
my
ears,
Noel.
N
O
Yeah
I'm
hi
Noel
im
mean
this.
This
topic
has
come
up
all
over
the
US
as
well,
because
we
know
what
with
giant
ddos
attacks
from
from
hacked
cameras
and
in
fact,
in
russia,
Neyers
blog.
Today
there
is
a
proof
of
concept
of
a
light
bulb
virus
that
they
figured.
It
could
infect
every
every
smart
light
bulb
in
Paris,
which
there
are
like
50,000
yeah,
and
we.
It
is
quite
clear
that
these
devices
need
some
sort
of
external
regulation,
because
they
have
horrible
externalities
mean
the
person
who
buys
that
the.
O
So
what
we've
been
looking
more
at
is
are
there
are
ways
to
do
certification
in,
like
in
the
US
there's
an
underwriters
lab
seal
that
you
put
on
electrical
devices,
which
is
which
is
voluntary,
but
if
you
have
the,
if
you
have
the
UL
seal
on
that
gives
you
sort
of
a
presumption
that
your
device
is
safe.
You
know,
if
the
house
burns
down
you.
O
Tend
to
exempt
UL
listed
devices
when
you're
looking
for
you're
looking
for
the
the
culprit
and
in
the
same
way
I
mean
I,
think
we
could
look
for
sort
of
certification
for
devices
that
they
have
sort
of
minimum
minimum
levels
of
security
standard.
You
know
and
when
we
say
minimum
we
need
you
know
pretty
minimal,
like
no
default
passwords
and
some
reasonably
quickly.
You
know
some
they
can
be
updated
in
a
cryptographically,
secure
way.
You
know,
and
and
and
stuff
like
that,
so
I
think
it's
reasonable
to
look
at
that.
O
P
Hi
nirelle,
Kathy,
I'm,
so
bag
and
just
climb
on
this
bandwagon.
I
think
this
is
a
consumer
protection
issue
and
I
love
that
nirelle
as
a
consumer
Hector's
there.
What
we
want
to
be
careful
of
is
that
that
the
network
regulators,
all
of
a
sudden
step
into
this
morass,
in
we're
going
to
it's
going
to
cause
other
there
will
be
unintentional
consequences
of
that
and
I
would
direct
you
to
the
built
Commission
report
that
we
were
involved
in
you'll.
B
B
So
with
that,
we
can
continue
this
probably
online,
and
we
should
go
now
to
our
second
topic,
which
we
have
partially
started,
and
that
is
how
I
sock
engages
with
its
membership
and
with
that
we
do
have
I
would
like
it
Constance
baumler
to
maybe
kick
off
this
discussion
to
give
just
an
overview,
quick
overview
of
how
this
works
and,
if
she's
not
ready.
Since
you
are
here,
if
that's
okay,
I
sure
was
yeah
raising
her
hand
earlier.
So
you
might
be
Aisha
yeah.
A
F
Q
The
key
is
what
we
have
learnt
from
the
assessment
and
research
and
the
internal
work
is
we
have
different
people
in
our
community
who
actually
want
to
be
engaged
with
us
in
different
ways.
So
next
slide
please
key
is
to,
and
you
can
move
on
next
one
we're
looking
at.
How
do
we
segment
our
community
in
a
way
that
we
can
actually
be
responsive?
And
this
is
a
joint
across
team
effort?
I
have
Fernando's
Aurore
from
my
team
stakeholder
relations
on
the
line.
Q
He's
listening
to
this
we're
trying
to
look
at
what
people
really
expect
from
us
and
what
makes
them
happy
to
be
a
part
of
what
we're
doing
when
we
look
at
this
we're
also
looking
at
the
donor
component,
but
for
the
most
part,
what
we're
really
here
to
talk
about
today
is
what
do
people
expect
us
to
do,
and
your
comments
on
how
you
would
like
us
to
engage
would
be
very
helpful.
You
can
go
to
the
next
level.
Q
We
have
identified
that
there
are
people
who
support
us.
There
are
people
who
are
members
were
invested
in
a
different
way
and
there
others,
who
lead
and
part
of
our
goal
here
is
to
understand.
You
know
how
we
get
our
messages
out
on
our
priority
issues
and
how
our
community
helps
us
to
promote
those
messages
and
be
active
at
the
local,
regional
and
global
levels.
Q
A
A
You
want
to
address
the
question
that
we
had
before
or
okay
yeah,
so
you
are
first
in
the
queue,
but
first,
let's
address
the
question
that
was
asked.
First,
they
saw
the
gentleman
over
there
if
you
can
call
his
attention.
I'm.
A
P
P
I
think
that
I
want
to
repeat
what
well
he
just
said,
and
that
is
that
are
our
dedication.
Commitment
to
the
input
from
our
chapters,
I
think,
is
good.
It's
deepening
is
one
that.
What
is
why
we're
here?
It's
why
we
spend
time
with
our
chapters
here
in
India
when
and
where
we
do
things
together.
I
think
is
part
of
a
collaborative
process
that
we
entering
together.
So,
for
instance,
Sally
just
talked
about
having
members
of
the
chapter,
for
instance
at
w.t.f
a,
and
that
was
a
very
intentional
kind
of
thing.
P
Sometimes
that's
the
right
thing
to
do
other
times
like
this
time
was
quite
a
hello.
How
are
you
we're
all
at
I
can
kind
of
meeting
with
some
of
the
folks
who
are
part
of
the
the
government
of
india.
There
was
no
great
agenda
that
we
were
trying
to
move
forward,
and
it
was
quite
common
that
we
might
do
this.
As
I
said,
there
are
other
times
when
we
really
are
having
a
stakeholder
multi
stakeholder
meeting.
We
are
trying
to
actually
get
into
dig
into
hard
issues
that,
of
course,
we
would
have
our
chapters
there.
P
So
I
think
this
is
part
of
a
developing
relationship
with
all
of
us
in
between
all
of
us,
and
I
think
we
work
on
it.
I
would
say
on
this
particular
issue
was
quite
a
quite
a
hospitable
thing.
I
think
we
did,
and
it
really
was
not
part
of
g.
We've
got
a
real
big
problem.
We
gotta
sit
and
wrestle
with
that
course.
We
would
have
the
chapter
present
I
want.
H
It's
either
either
a
dinner
or
a
formatted
programmed
the
topic
area
segregated
the
meeting,
and
that
is
not
that
is
far
from
a
free
inflection
with
chapters
and
I
sock,
and
particularly,
I
want
time
given
two
chapters
to
respond
to
policy
calls.
I
mean
this
should
participate
and
it
should
come
to
the
two
different.
So.
A
So
I
think
to
address
that.
Actually,
as
you
know,
I
mean
we
have
formed
a
chapter
advisory
group
and
we
are
getting
already.
We
already
got
three
requests
from
them.
I
think
that's
like
the
perfect
vehicle
for
you
to
basically
channel
these
requests.
As
a
matter
of
fact,
we
already
talking
about
you
know
clarifying
your
engagement,
which
is
exactly
one
of
the
request
we
are
addressing.
So
in
that
sense
is
really
perfect.
I
mean
your
question
because
he
that
it
relates
directly
to
one
of
them.
A
P
I
just
take
one
minute
to
address
so
here's
this
I
socket
I
can
issue,
so
we've
got
all
around
this
I
just
want
you
to
know.
There's
folks
who
want
it
to
be
a
you
know,
sit
down.
Let's
talk
things
out
kind
of
thing.
There
are
folks
who
want
it
to
be
a
social
occasion
which
you're
seeing
that
happen
more
because
they
just
want
to
network
your
people
who
want
to
have
it
as
a
hybrid.
To
be
fair,
you
must
admit
that
we
had
a
very
special
meeting
with
the
five
chapters
here
in
in
India.
P
A
L
H
Distinctly
two
things
one:
when
you
come
up
with
the
policy
position,
the
policy
position
inputs
have
to
come
from
chapters.
It's
not
like
you're,
going
to
release
a
policy
statement
and
48
hours
before
you
ask
for
cummins
or
infamous
the
inputs
has
to
come
from
chapters,
and
it
should
be
bottom
up
and
the
positions
have
to
arise
from
chapters,
because
the
legitimacy
of
I
sock
derives
from
chapters
and
global
members.
That
is
one
point
and
when
it
comes
to
engagement,
think
of
a
format
which
maximizes
interaction
among
chapters
and
chapters
are
free
to
raise
issues.
H
I
This
is
last
20
years
now,
I've
seen
the
house
I
shock
was
evolved.
Now,
20
years
of
revolution
is
oh,
no,
no
x,
20
revolution
is
there
for
all
of
us
to
raise
next
2.4
billion
people
I
have
want
to
have
overall.
From
of
this
thing,
let
us
say
for
one
goal:
what
I
am
doing
is
not
I,
don't
know,
but
this
one
here
let
us
have
5000
I
istock
members
like
that
there
is
one
goal.
The
second
goal
is
now
we
have
supporters,
donors
and
other
people
will
also
add
two
more
groups.
I
One
is
a
innovators
and
as
well
as
the
collaborators
where
they
cruelly
work
together,
much
and
create
a
new
innovation
to
is
the
mass
people's
as
also
else
them.
Although
I
soft
members
to
have
some
valuation
says
that
they
can
reach
the
market,
that
is
one
thing
and
the
one
more
is
startups.
My
startup
is
entrepreneurship,
entrepreneurship,
division,
which
also
helps
it,
because
what
can
I
tell
is
I
am
looking
for
haunted,
start
for
a
new
company
and
all
I
look
for
20
to
40
people,
very
good
people.
I
I
can
I
want
to
resolve
the
stash.
Your
Swiss
chapters,
all
over
there
guys
join
me.
Let
us
be
part
of
the
goal
that
is,
secondly,
entrepreneurship
and
third,
is
the?
What
you
call
it
is
will
become
I,
don't
go
to
be
frank
with
you
in
globally
global
open
human
knowledge.
Commerce
is
the
reality,
and
we
all
of
us
should
work
together,
how
weak
lowly
work
with
IETF
in
all
of
us
to
make
fun.
Thank.
B
A
Let's
yeah
to
close
the
session,
just
just
a
few
closing
remarks
thanks
everyone
for
your
you're,
basically
support
and
input.
As
you
know,
it
is,
you
know,
I
think
the
second
or
the
third
open
forum
that
we
run.
So
we
are
still
kind
of
using
trial
and
error
to
find
the
best
format,
and
this
was
clearly
good
to
have
preset
topics,
because
we
had
a
lot
more
discussion.
A
Also
the
length
of
the
session
we
had
scheduled
half
an
hour
I
think
we
have
gone
like
45,
but
anyway,
it's
very
difficult
to
predict
beforehand,
so
we're
gonna
work
also
on
ways
to
actually
get
questions
beforehand
and
also
to
follow
up,
because
it's
clear
that
we're
not
going
to
be
able
to
address
in
any
meaningful
way
some
of
the
questions
that
they
come
up
here.
So
I
would
take
those
as
the
action
points
that
I
take
out
of
this
meeting.
A
We
can
discuss
if,
if
this
more-
and
we
will,
of
course,
maybe
getting
feedback
from
you
know
who
ever
was,
was
there
on
the
chat
room
but
I
think
it
was
a
great
experiment.
Actually,
credit
goes
to
this
area.
For
the
you
know,
idea
of
having
the
predefined
topics
I
think
that
worked
very
well
and
well,
we'll
we'll
take
it
from
there.
So
thanks
everyone
and
yeah
the
session
is
adjourned.
You.