Feeds

EU commissioner outlines e-inclusion plans

Zimmer frames for all

Application security programs and practises

The European Information Society Commissioner has outlined plans for three new major initiatives to accelerate a Europe-wide e-inclusion drive.

Addressing the i2010 conference in London,Viviane Reding said the "flagship" projects would give "critical mass to our work in three and important and visible areas where ICT has a positive impact on citizens".

Reding was setting out to government and business leaders the central pillars of the Commission's new i2010 strategy, its ambitious five-year information society programme for growth and employment.

The first flagship, she said, aimed to enable Europe's aging population to grow older with independence and dignity. It will build upon research initiatives on e-health, e-accessibility and assistive living, as well as inform future work priorities.

The second will look at using technologies to develop safer, smarter and cleaner cars.

'Digital libraries' will be the third flagship, drawing together work to bring European culture online.

"My hope", said Reding, "is to make Europe’s rich literary and audiovisual heritage available to all and to give a spur to enterprises that can create value by reusing these vast resources."

Her immediate priority for the i2010 programme is to create the regulatory framework for a common 'European information space' which will stimulate the availability of online content.

In her keynote address, the commissioner said EU member states faced "major challenges" to make i2010 a reality and needed to work together on this shared agenda.

DTI minister Alun Michael warned delegates that Europe could not afford to be complacent about its future in the global knowledge economy.

"The i2010 Strategy is our blueprint to make Europe the most competitive and knowledge-based economy in the world by 2010", he said.

"We need to ensure that the i2010 Strategy truly delivers the economic and social benefits of the digital revolution for the citizens of Europe in the 21st Century.

"Achieving this is not just for the Commission or for governments. It is up to all of us in Europe to take the i2010 Strategy forward."

The UK Government hosted the conference as one of the official events of its current EU Presidency. Another event will be held in London next month focusing on e-accessibility issues, followed by a Ministerial e-Government conference in November.

eGov monitor Weekly is a free e-newsletter covering developments in UK eGovernment and public sector IT over the last seven days. To register go here.

Related links

Transcript of Commissioner Reding's keynote speech
About the i2010 conference

Designing a Defense for Mobile Applications

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.