Solved

Some Internet Statistics...

Posted on 1998-10-19
7
147 Views
Last Modified: 2010-04-26
Hello I am looking for some internet statistics for a review on electronic conferences I am writing.

I realize only rough estimates can be made of these figures, but can someone give the URL of a document that gives how many estimated email addresses there are, how many internet users there are and how many computers there are connected to the internet, and how these figured have grown in the last 10 years.

Thanks in advance,
Nicholas Waltham

P.S. If you think there is a better place to ask than here, please let me know!
0
Comment
Question by:nwaltham
  • 3
  • 3
7 Comments
 
LVL 1

Expert Comment

by:derosa
ID: 1011592
0
 

Author Comment

by:nwaltham
ID: 1011593
I am sorry, but I couldn't find that information on the web site you mentioned. Could you be a bit more specific with the URL.
0
 

Author Comment

by:nwaltham
ID: 1011594
I should also add that I don't want to have to pay for the information, because I am not being payed for the review I am writing!!!
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 9

Expert Comment

by:david_levine
ID: 1011595
0
 
LVL 9

Expert Comment

by:david_levine
ID: 1011596
0
 

Author Comment

by:nwaltham
ID: 1011597
David,
 Thanks - thats just what I need. Lots of lovely graphs and things. Could you add an answer instead of a comment so I can give you the points.

Nicholas Waltham
0
 
LVL 9

Accepted Solution

by:
david_levine earned 50 total points
ID: 1011598
Glad I could help... see previous comment for the links.

Good luck.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
This tutorial walks through the best practices in adding a local business to Google Maps including how to properly search for duplicates, marker placement, and inputing business details. Login to your Google Account, then search for "Google Mapmaker…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now