{"id":6412,"date":"2014-09-17T17:06:24","date_gmt":"2014-09-17T15:06:24","guid":{"rendered":"https:\/\/infopolicy.net\/?p=6412"},"modified":"2014-09-17T17:10:29","modified_gmt":"2014-09-17T15:10:29","slug":"","status":"publish","type":"post","link":"https:\/\/infopolicy.net\/en\/setevaya-nejtralnost-v-mire\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ru_post_content":"\u0410\u0440\u0445\u0438-\u0432\u0430\u0436\u043d\u044b\u0439 \u0432\u043e\u043f\u0440\u043e\u0441 \u0432 \u043c\u0438\u0440\u0435 Net Neutrality. \u041f\u043e\u043a\u0430 \u043f\u0440\u043e\u0441\u0442\u043e \u0441\u043b\u0435\u0434\u0438\u043c \u0437\u0430 \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u044f\u0449\u0438\u043c:\r\n\r\n<a href=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2014\/09\/NN-on-the-move-01.png\">\r\n<img src=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2014\/09\/NN-on-the-move-01.png\" alt=\"NN on the move-01\" width=\"1250\" height=\"1035\" class=\"alignnone size-full wp-image-6413\" \/>\r\n<\/a>\r\n\r\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a:\r\n<a href=\"https:\/\/www.accessnow.org\/blog\/2014\/09\/10\/today-is-the-internet-slowdown\">\r\nhttps:\/\/www.accessnow.org\/blog\/2014\/09\/10\/today-is-the-internet-slowdown<\/a>","_ru_post_name":"setevaya-nejtralnost-v-mire","_ru_post_excerpt":"","_ru_post_title":"\u0421\u0435\u0442\u0435\u0432\u0430\u044f \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0432 \u043c\u0438\u0440\u0435","_en_post_content":"","_en_post_name":"","_en_post_excerpt":"","_en_post_title":"","edit_language":"en","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[28,26,11],"tags":[],"class_list":["post-6412","post","type-post","status-publish","format-standard","","category-internetgovernance","category-policy","category-ict"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pffTZ2-1Fq","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":798,"url":"https:\/\/infopolicy.net\/en\/pew-internet-internet-v-2020-godu\/","url_meta":{"origin":6412,"position":0},"title":"Pew Internet: \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0432 2020 \u0433\u043e\u0434\u0443","author":"infopolicy","date":"28.12.2008","format":false,"excerpt":"\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 The Future of the Internet III 1,196 \u0440\u0435\u0441\u043f\u043e\u043d\u0434\u0435\u043d\u0442\u043e\u0432: \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u043b\u0438\u0434\u0435\u0440\u044b, \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u044b, \u0430\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0438 \u0438 \u0442\u0430\u043a \u0434\u0430\u043b\u0435\u0435. \u041e\u0434\u0438\u043d \u0438\u0437 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0432\u044b\u0432\u043e\u0434\u043e\u0432: \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0431\u0443\u0434\u0443\u0442 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\u043c\u0438 \u0432\u044b\u0445\u043e\u0434\u0430 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0434\u043b\u044f \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0430 \u043b\u044e\u0434\u0435\u0439 \u0432 \u043c\u0438\u0440\u0435. \u041f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u043c\u043d\u0435\u043d\u0438\u044f: The Evolution of Mobile Internet Communications http:\/\/www.elon.edu\/e-web\/predictions\/expertsurveys\/2008survey\/mobile_internet_2020.xhtml \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u043d\u043a\u0438\u0439 \u0432\u043e\u043f\u0440\u043e\u0441: The Internet and the Evolution\u2026","rel":"","context":"In &quot;\u0418\u041a\u0422&quot;","block_context":{"text":"\u0418\u041a\u0422","link":"https:\/\/infopolicy.net\/en\/category\/ict\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9496,"url":"https:\/\/infopolicy.net\/en\/ssylka-dnya-internet-exchange-map\/","url_meta":{"origin":6412,"position":1},"title":"\u0421\u0441\u044b\u043b\u043a\u0430 \u0434\u043d\u044f: Internet Exchange Map","author":"infopolicy","date":"09.05.2017","format":false,"excerpt":"TeleGeography \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u044b\u0439 \u0440\u0435\u0441\u0443\u0440\u0441 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 Internet Exchange Point (IXP) \u0438\u043b\u0438 \u0442\u043e\u0447\u043a\u0438 \u043e\u0431\u043c\u0435\u043d\u0430 \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u0432 \u043c\u0438\u0440\u0435. \u0417\u0430\u043d\u0435\u0441\u0442\u0438 \u0432 \u0437\u0430\u043a\u043b\u0430\u0434\u043a\u0438 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432: http:\/\/www.internetexchangemap.com\/","rel":"","context":"In &quot;\u0418\u041a\u0422&quot;","block_context":{"text":"\u0418\u041a\u0422","link":"https:\/\/infopolicy.net\/en\/category\/ict\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8897,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-internet-tsenzura-v-mi\/","url_meta":{"origin":6412,"position":2},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0446\u0435\u043d\u0437\u0443\u0440\u0430 \u0432 \u043c\u0438\u0440\u0435","author":"infopolicy","date":"07.09.2016","format":false,"excerpt":"\u0414\u0430\u043d\u043d\u044b\u0435 \u0438\u0437 \u043c\u043d\u043e\u0433\u0438\u0445 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 \u0441\u0432\u0435\u0434\u0435\u043d\u044b \u0432 \u043e\u0434\u043d\u0443 \u0438\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0443: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/www.business2community.com\/infographics\/global-state-internet-censorship-infographic-01647839","rel":"","context":"In &quot;Policy&quot;","block_context":{"text":"Policy","link":"https:\/\/infopolicy.net\/en\/category\/policy\/"},"img":{"alt_text":"internet-censorship-1.gif-1","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2016\/09\/internet-censorship-1.gif-1.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2016\/09\/internet-censorship-1.gif-1.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2016\/09\/internet-censorship-1.gif-1.gif?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":6668,"url":"https:\/\/infopolicy.net\/en\/43-milliarda-lyudej-ne-ispolzuyut-intern\/","url_meta":{"origin":6412,"position":3},"title":"4,3 \u043c\u0438\u043b\u043b\u0438\u0430\u0440\u0434\u0430 \u043b\u044e\u0434\u0435\u0439 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442","author":"infopolicy","date":"07.12.2014","format":false,"excerpt":"\u0412\u0430\u0436\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043f\u0440\u043e \u043b\u044e\u0434\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0435\u0442 \u0435\u0449\u0435 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435. \u042d\u0442\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0430\u044f \u0432\u0430\u0436\u043d\u0430\u044f \u0437\u0430\u0434\u0430\u0447\u0430 \u0432 \u043c\u0438\u0440\u0435 \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/www.euractiv.com\/sections\/development-policy\/infographic-closing-internet-gap-310492","rel":"","context":"In &quot;Policy&quot;","block_context":{"text":"Policy","link":"https:\/\/infopolicy.net\/en\/category\/policy\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/12\/closing-the-internet-gap.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/12\/closing-the-internet-gap.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/12\/closing-the-internet-gap.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/12\/closing-the-internet-gap.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/12\/closing-the-internet-gap.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":5742,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-ko-dnyu-internet-freedom\/","url_meta":{"origin":6412,"position":4},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u041a\u043e \u0434\u043d\u044e Internet Freedom","author":"infopolicy","date":"22.01.2014","format":false,"excerpt":"\u0421\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043e\u0439 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0441\u044f \u0445\u0443\u0436\u0435 \u0432\u043e \u0432\u0441\u0435\u043c \u043c\u0438\u0440\u0435, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0421\u0428\u0410, \u0410\u0432\u0441\u0442\u0440\u0430\u043b\u0438\u044e, \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u044e. \u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043a\u043e \u0434\u043d\u044e \u0441\u0432\u043e\u0431\u043e\u0434\u044b \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 - 18 \u044f\u043d\u0432\u0430\u0440\u044f: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/www.pcmag.com\/article2\/0,2817,2429692,00.asp","rel":"","context":"In &quot;\u0411\u0435\u0437 \u0440\u0443\u0431\u0440\u0438\u043a\u0438&quot;","block_context":{"text":"\u0411\u0435\u0437 \u0440\u0443\u0431\u0440\u0438\u043a\u0438","link":"https:\/\/infopolicy.net\/en\/category\/bez-rubriki\/"},"img":{"alt_text":"the-worldwide-struggle-for-internet-freedom","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/01\/the-worldwide-struggle-for-internet-freedom.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/01\/the-worldwide-struggle-for-internet-freedom.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/01\/the-worldwide-struggle-for-internet-freedom.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":12635,"url":"https:\/\/infopolicy.net\/en\/grafik-dnya-rost-chisla-internet-polzo\/","url_meta":{"origin":6412,"position":5},"title":"\u0413\u0440\u0430\u0444\u0438\u043a \u0434\u043d\u044f: \u0420\u043e\u0441\u0442 \u0447\u0438\u0441\u043b\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u043c\u0438\u0440\u0435, 2018-2023","author":"infopolicy","date":"19.03.2020","format":false,"excerpt":"\u0412\u0437\u044f\u0442\u043e \u0438\u0437 Cisco Annual Internet Report, 2018-2023: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html#Trends","rel":"","context":"In &quot;\u0418\u041a\u0422&quot;","block_context":{"text":"\u0418\u041a\u0422","link":"https:\/\/infopolicy.net\/en\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/Cisco2018-2023.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/Cisco2018-2023.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/Cisco2018-2023.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/Cisco2018-2023.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/6412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/comments?post=6412"}],"version-history":[{"count":1,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/6412\/revisions"}],"predecessor-version":[{"id":6414,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/6412\/revisions\/6414"}],"wp:attachment":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media?parent=6412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/categories?post=6412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/tags?post=6412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}