ITU Telecom World 2009 In Review 2009 Geneva 5-9 October From a carrier’s perspective, they are not seeing any growth in revenues, de-spite a quadrupling of traffic in some places. By 2015, 94% of mobile traffic will be data. The total cost of ownership of mobile data is $46 per month – 13% of GDP per capita is being spent by these consumers in over 78 countries (with 5%-7% in the low income segment). ICTs have created more jobs globally than any other industry over the last 5 years. Wireless business represents a $12 billion annual contribution to GDP in Canada. Every additional 10% increase in mobile subscription generates a 1.6%-1.8% extra growth to GDP. India is tapping into 13-15 million new connections a month with some 450 million existing connections.. Less than 10% of broadband connectivity is via fixed networks. In India, high quality digital services are offered at 1ct/min – the key is to reduce costs and sell on a large scale. The private sector is not expecting the government to put public money into infrastructure investment despite there being numerous off-grid rural areas. However, if taxes could be relieved, private telecom companies would become more capital efficient – it is likely for them to commit 5% of revenues to the universal service obligation. Any broadband investment needs to be effectively thought out to allow optimal efficiency. Scale based pricing has a booming effect on mobile connectivity penetration rate. Better productivity growth needs to be coupled with sus-tainability considerations – e.g. selling low energy consuming equipment. A European operator managed to remove 9’500 tons of CO2 emissions which equates to taking 1’800 vehicles off the road. Using renewable energies would benefit both end user and the environment. If flatter network architectures are to become the standard to allow for increas-ingly growing data traffic, what is the best way to deal with security issues? The responsibility is to be shared by all entities involved in the value chain from equipment manufacturers, through to operators and end users. The capability of mobile devices to destroy data when stolen and restore it elsewhere is part of an end-to-end approach that delivers maximum security including securing 56 Forum Summary Report