1. Last 7 days
    1. Facebook has warned that it may pull out of Europe if the Irish data protection commissioner enforces a ban on sharing data with the US,

      WE have to analyse this sentence since it is the key aspect of digital policy. Could you follow-up

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The keys to the hype house

      The title of this Economist article is 'How to deal with free speech on social media', yet this phrase 'the keys to the hype house' might tell the real story. Is this about the US election? US partisan polarisation? Or the Internet user's own ambivalence about social media? Above this article says: 10% of Americans think SM are beneficial, but 2/3 think its harmful--what? Then who is using SM?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A very interesting perspective that applies AI logic on social and political processes ||Jovan|| ||JovanNj|| ||NatasaPerucica|| ||djordjej|| ||kat_hone||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Facebook released a new open source translator which translates directly between language. It bypasses English as previously used 'bridge language' for translations from - for example - Chinese to French.

      ||JovanNj||||Cecile||||StephanieBP||||AndrijanaG||

    1. Taking inspiration from yesterday's call... coincidentally, Google has launched new tools for reporters, altogether called Journalist Studio. Not sure if our developers are aware? ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. is director of the Chair for Diplomacy and Cyberspace

      ||kat_hone|| This sounds strange. I guess, he is director and chair.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||VladaR|| It is clear that standards are picking-up. Let us prepare for follow-up on it.

    2. US National Security Agency (NSA) established the Center for Cybersecurity Standards in order to deal with increasing dependence on commercial products to secure National Security Systems.

      The NSA Center for Cybersecurity Standards will focus on:

      • 5G Security
      • Cybersecurity Automation
      • Platform Resilience
      • Cryptographic Algorithms
      • Security Protocols

      Cybersecurity standards will play increasing relevance in digital realm.

      ||VladaR||||AndrijanaG||

      Actors: 3GPP; ATIS; IEEE; IETF; ISO; IEC; OASIS; IETF; TCG; NIST; ANSI

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The U.S. Justice Department and 11 states filed an antitrust lawsuit against Alphabet Inc’s Google on Tuesday for allegedly breaking the law in using its market power to fend off rivals.

      FYI ||StephanieBP|| It's in DW already

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The network will give astronauts voice and video communications capabilities, and allow telemetry and biometric data exchange, as well as the deployment and remote control of lunar rovers and other robotic devices, according to the company.

      Building mobile networks, settlements and deploying robotics on the Moon will raise questions around the UN Outer Space Treaty and questions of jurisdiction. It may be beneficial to add space to dig.watch (also as referenced in the critical and emerging technologies doc). ||Jovan|| ||VladaR||||StephanieBP||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Japan will join forces with the United States and Europe to take on any market abuses by the four Big Tech companies, the new head of its antitrust watchdog

      Japan is getting more actively involved - also in Google Fitbit merger. Australia has an antitrust initiative against GAFA too, including Google - Fitbit merger, but did not join EU and US (yet) ||StephanieBP||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Zoom is launching Zapps, where apps developers can build within the video conferencing experience, and a new event marketplace called OnZoom aimed at a wide range of content creators with monetization for ticket sales.

      ||ArvinKamberi|| ||Jovan|| Have we been testing this? It is addressing the various integration issues that we've talked about earlier.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Read me!@keyframes animation_7_1 { 0%, 42.85714285714286% {transform: matrix(1,0,0,1,0,0); opacity: 0; animation-timing-function: ease-out} 100% {transform: matrix(1,0,0,1,0,0); opacity: 1; } } Part 1Define and conquer@keyframes animation_8_1 { 0%, 42.85714285714286% {transform: matrix(1,0,0,1,0,0); opacity: 0; animation-timing-function: ease-out} 100% {transform: matrix(1,0,0,1,0,0); opacity: 1; } } Part 2what makes on-Screenreadability special@keyframes animation_9_1 { 0%, 42.85714285714286% {transform: matrix(1,0,0,1,0,0); opacity: 0; animation-timing-function: ease-out} 100% {transform: matrix(1,0,0,1,0,0); opacity: 1; } } Part 3EVOLUTION OF LAYOUTSAND TYPESETTINg ON THE WEB@keyframes animation_10_1 { 0%, 42.85714285714286% {transform: matrix(1,0,0,1,0,0); opacity: 0; animation-timing-function: ease-out} 100% {transform: matrix(1,0,0,1,0,0); opacity: 1; } } Part 4FONTS THAT ADDRESSSPECIAL ISSUES@keyframes animation_11_1 { 0%, 42.85714285714286% {transform: matrix(1,0,0,1,0,0); opacity: 0; animation-timing-function: ease-out} 100% {transform: matrix(1,0,0,1,0,0); opacity: 1; } } 9 tips onCreating a readableweb text

      In contrast to what it is about, I find this text a bit difficult to follow :) ||Jovan||

    2. simple rules we use ourselves when developing engaging texts and layouts.

      Rules for creating a readable web text, some of them being bacis, but important to keep in mind ||Jovan||

    3. In the early web there were no people well-versed in typesetting.

      Interesting text on the evolution of layouts and typesetting on the web ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Diplo's coverage of critical and emerging technologies https://docs.google.com/document/d/10H8Pat1GnRNGdCS21pjafqYGQwhYNPkCcBufAqhPCCA/edit?usp=sharing

      ||Jovan|| ||VladaR||||AndrijanaG||||StephanieBP||

    2. National Strategy for Critical and Emerging Technologies, issued by the President of the USA in October 2020, addresses two main areas: 1) Promoting national security innovation base: incentivise science and technology develpoment, lead the development of worldwide standards and norms that reflect democratic values, develop multistakeholder National Security Innovation Base, build technology partnerships with like-minded partners

      2) Protect technology advantage: prevent IP theft and enhance research security, require security in design, strenthen export laws and regimes for technology, engage private sector to understand future strategic vulnerabilities, secure supply chain.

      The Strategy identifies two main S&T competitors: China and Russia and their activities that may undermine the USA's interests. One of the challenges for the USA is power of the whole-of-government approach to S&T developments in China and Russia.

      On international level, the Strategy argues for adopting rules and policies reflecting the US interests as well as cooperation among like-minded countries.

      The Strategy outlines 20 critical and emerging technologies. The major breakthroughs will be happening in intersections among these technologies. Thus, the Strategy argues for the holistic approach to development of critical and science technologies.

      Other concepts promoted in the Strategy are:

      • forecasting of tech developments,
      • technology risk management,
      • research security in academic and research institutions.
      • use of export law regulations

      ||VladaR||||Jovan||

    3. UNITED STATESGOVERNMENT CRITICAL AND EMERGING TECHNOLOGIESLIST

      Monitor these areas.

    4. Our market-oriented approach will allow us to prevail against state-directed models that produce waste and disincentivize innovation, but we willalso protect ourselves from unfair competitionand prevent the use of our technology for authoritarian activities

      who is thee engine of growth?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It is useful document for developing meta-data.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Oct 2020
    1. Finally, a Programme of Action has no ending date:

      Important: PoA has no ending date

    2. First, it offers a process that is inclusive and open to all UN member states, unlike the UNGGE. While the OEWG is more inclusive, it is slower to deliver substantial results, notably due to the diversity of capacities and maturities among the participating states. A PoA, by contrast, allows for concrete discussions and progress within working groups devoted to specific issues. In that sense, a PoA on Cyber could actually combine the best of two words.

      WG as mechanism may be helpful

    3. Usually, a Programme of Action comprises two sets of provisions: objectives and recommendations and rules for monitoring their implementation.

      Mechanism for monitoring of implementation is particularly important part of the PoA

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Submissionby

      Notably missing: US, China, Russia, Brazil, India, but also Australia and Canada (so far)

    2. open, secure, stable, accessible and peaceful cyberspace

      Not the same wording as China and others use, though

    3. relevant multi-stakeholder initiatives

      Opening space for contributions by other fora like Paris Call

    4. could consider if additional norms could be developed over time

      Creating space for possibly developing new norms in future

    5. implementation is currentlyone of our biggest challenges

      Though not all parties would agree on this

    6. The OEWG and 6thGGE could work toagree the modalities of aProgramme of Action,

      I think the proposal comes too late in the work of the current GGE and OEWG to allow those to discuss modalities - even if all parties would agree for the PoA, which is not likely.

    7. acquis

      Acquis - a term increasingly used by the Europeans (probably borrowed from the EU acquis) to denote the current set of norms, CBMs and CB measures agreed thus far. GGE Chair also used the term to emphasise that the acquis is the base, that shouldn't be re-opened. Another word to add to our Speech Generator, for France and EU partners at least

      ||Pavlina||||AndrijanaG||||MariliaM||

    8. recognize the full applicability of International Law to cyberspace.

      Thus, the signatories in a way recognise the full applicability of IL - we can reflect this in our mapping ||Pavlina||||AndrijanaG||

    9. Programme of Action for advancing responsible State behaviour in cyberspace

      France with 40 other countries (Western Alliance mainly still) publishes the proposal for a Programme of Action, which would replace GGE and OEWG after their mandate.

      Good coverage of what this could mean is at https://directionsblog.eu/a-new-un-path-to-cyber-stability/

      ||Jovan||||Pavlina||||MariliaM||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 6 Microsoft teams features Zoom doesn't have.

      ||StephanieBP||||ArvinKamberi||||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US and some other countries to politicize the issue of data security

      Re. TikTok. Interestingly, now China is (nominally) becoming in favour of free flow of data, while US and EU are calling for data sovereignty? Link with WTO? ||Jovan||||MariliaM||

    2. China supports the work of the UN OEWG and UN GGE and hope that these processes will make further progress

      China supports GGE and OEWG, yet no clear connection between those and the rule-making on data security is made: is this a suggested follow-up, a parallel process, part of the two?

    3. China also supports continued in-depth discussions on Lethal Autonomous Weapons Systems (LAWS) within the framework of Convention on Certain Conventional Weapons (CCW)

      Is this the same as the GGE LAWS, or a separate process? ||Jovan||

    4. data security

      China frames cybersecurity debates as 'data security' also in the UN 1st Committee now, after their Global Initiative on Data Security (which has no reference to any UN process whatsoever)

      We may update our Speech Generator database with these new Chinese lingo and positions

      ||Jovan||||AndrijanaG||||Pavlina||||MariliaM||

    5. develop a set of international rules on data security

      China calls to 'develop new rules', on data security. Indeed, none of the existing rules are about 'data security'!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Amazon clashes with the trade unions in the UK. Major trade unions complain about Amazon's practice including gruelling conditions, unrealistic productivity targets, surveillance, bogus self-eemployement and a refusal to recognise or engage with unions unless forced.

      They propose:

      • Better union access to workplaces.
      • The banning of zero hours contracts.
      • Stronger laws to protect supply chain workers.
      • Ending “bogus” self-employment.
    2. They said workers have described gruelling conditions, unrealistic productivity targets, surveillance, bogus self-employment and a refusal to recognise or engage with unions unless forced.

      Problems in relations Amazon - workers

    3. In a joint statement with the GMB union, the TUC called on the government to improve workers’ conditions through an upcoming employment bill but also to force Amazon’s hand by using its powers as a client of the company.

      Trade unions are putting pressure on governmetns as both law maker and major contractor of Amazon

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Global Governance through Multi-stakeholder Deliberation as a Driver of Inequality

      Different view: article arguing that multi-stakeholder deliberation is a driver of inequality

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. what about creating something similar for digital policy or cybersecurity (based on Speech Generator)?

      ||Jovan||||VladaR||||JovanNj||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Natural human biases in decision making, including confirmation, availability, and anchoring biases, often cause us to shut down the range of solutions too early.

      Need to avoid these biases.

    2. “Why is this so?”

      We need to regain capacity to ask this simple quesiton 'Why is this so?'

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The next he was in discussions about a Serbian telecoms deal.

      Serbian telecoms deals ware discussed in VIP bordels. BTW, it is an excellent coverage of VIP prostitute industry worldwide.

      ||Jovan|| ||VladaR||||MilicaVK||||ArvinKamberi||||NatasaPerucica||||djordjej||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The big guns of Silicon Valley, Google and Facebook, are in the race to bring high-speed broadband to Africa via submarine cables.

      Cable scramble for Africa.

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Insight

      For our communication we can use more this 'I' trinity

      Insight (insights from Diplo5 AI and data system) Impact (impact worldwide on diplomacy and governance) Inclusion (involve countries, communities and citizens who are missing in current debates).

      We can also play with I from Diplo logo.

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It is becoming clear that our Diplo5 focus is moving into right directions: a) focus on consolidating our data (Textus) b) integrating data value-add into our procedures (Textus) c) focusing on delivery of useful products (SpeechGen and Dta Sandbox).

      New possibilities will start opening with integration in this system of our LMS.

      ||Jovan||

    2. held back by Swiss data protection and cloud security laws

      why are people held back by Swiss data protection and cloud security laws?

      ||StephanieBP||||Pavlina||

    3. to sift, make sense of, and leverage data to discover insights are key market differentiators

      to use in our PR lingo on our systems.

    4. It is what Diplo has been doing with Textus and, soon, new storage system.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Amazon is recruiting 'spies' to follow union-leaders, terrorists, and politicians (listed in the same sentence).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The US has seized 92 web domains used by Iran, including four which purported to be genuine English language news sites, the Justice Department announced Wednesday.

      The US authorities seized 92 domains used by Iran, including English language news website.

      The seizure shifts content removal from tech platforms (Facebook, Twitter) to the domains which are part of the core functioning of the Internet.

      This practice could shift ICANN and domain name industry into new policy realm of content policy which they have been avoiding for long time.

      In addition, justification of seizure considers domain name as property which ICANN and domain name community also avoided for long time.

      ||Pavlina|| it seems that seizure is not based on sanctions regime but on regular criminal code. Could you double check?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Hindu text provides balanced analysis of the reaction of Facebook on the movie 'The Social Media'. On the policy side, this movie opens the question of privacy, anti-trust regulation, and mental health.

      Facebook follows its standard rhetorics by shifting discussion in the past - 'the efforts already taken' - and the future - 'we are working to change this'.

    2. the Facebook Pixel

      ||djordjej|| Could it be of any use for oru website?

    1. selling ads allows us to offer everyone else the ability to connect for free.

      business model.

    2. The film’s creators do not include insights from those currently working at the companies or any experts that take a different view to the narrative put forward by the film.

      true

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. because enforcers in other countries have been held back by American timidity

      Have they?! Has the EU been timid? I don't think so. Unless he's referring to some other place...

    2. Chicago School

      This is so deeply embedded in how US jurists look at antitrust, that it is one of the major obstacles to reforming antitrust law

    3. Senate Commerce Committee subpoena’d the CEOs of Google, Facebook, and Twitter, with a unanimous vote, and the press barely noticed

      indeed!

    4. This pro-monopoly conventional wisdom is impossible to remember because it’s so embarrassing

      NOW it's embarrassing. But back then, the laissez-faire approach was also a way for US tech to grow, and to win the global tech race.

    5. We the people changed our minds

      Changed our minds about what? A bit too simplistic. We changed our minds, as companies grew bigger and more powerful, threatening even governments

    6. follow-on enforcement action at the agencies,

      This is supposed to be the next step... DOJ filing a case against Google

    7. imposing a presumptive ban on future acquisitions by large platforms, imposing a presumption that vertical mergers by large platforms are unlawful

      Would it be a blanket ban? Acquisition of small companies is one thing (some start-ups are created with the aim of being sold off to a Big Tech company if they are successful); acquisition of large undertakings (ex Google and Fitbit) is quite another. [Re google/fitbit, we're following separately]

    8. mergers can go through and when they can’t

      The rules are there. Making clearer rules, perhaps? Reviewing when authorities should not give the final nod?

    9. Cicilline suggests writing statutes to overrule a host of Supreme Court precedents that have unreasonably crippled antitrust laws on things like pricing below cost or abusing one’s dominant position as a platform

      He makes a good point, and with strong bipartisan support and agreement, this is not a farfetched proposition

    10. (1) a legislative break-up and restructuring of big tech platforms to restore competition online (2) a strengthening of laws against monopolies and mergers, (3) institutional reforms to fix and fund the Federal Trade Commission and DOJ Antitrust Division, and (4) restoring the ability of ordinary citizens to take monopolists to court on their own.

      This summarises the report's recommendations. On 1, this is probably the best route. On 2, weak enforcement makes the law useless, no matter how strong it is. On 3, first they are criticised, then they are sugarcoated with the promise of funds. What DOJ needs is to get on with it, ie, what AG Barr is pushing for. On 4, is there a Max Schrems equivalent in the US? Doubt it.

    11. whether they simply treat lawbreaking as a cost of business

      This is part of the problem of being too big (or too rich). Fines and penalties are often insignificant. It's why the EU does not hesitate to impose hefty fines

    12. attacks the way that these corporations finance think tanks and academics

      The fact that the Congressman describes how the Big Tech have been financing think tanks and shaping policy does not make the document more political...

    13. Federal Trade Commission and Antitrust Division for refusing to enforce monopolization laws and failing to stop mergers, even when they had evidence that such mergers were anti-competitive

      Ouch indeed. Basically, the Congressman is attacking the FTC, and the Justice Department - the same department which is about to launch an antitrust case against Google ("this week or next week")

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. reflect on the huge attention generated by GPT-3 and what it heralds for the future research

      I haven't listened to this yet, but I'm curious how they reflect on GPT-3. Is the podcast just another way to feed the hype? ||MariliaM||||sorina.teleanu||||Jovan||||JovanNj||||djordjej||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Although these four corporations differ in important ways, studying their business practices has revealed common problems. First, each platform now serves as a gatekeeper over a key channel of distribution. By controlling access to markets, these giants can pick winners and losers throughout our economy. They not only wield tremendous power, but they also abuse it by charging exorbitant fees, imposing oppressive contract terms, and extracting valuable data from the people and businesses that rely on them. Second, each platform uses its gatekeeper position to maintain its market power. By controlling the infrastructure of the digital age, they have surveilled other businesses to identify potential rivals, and have ultimately bought out, copied, or cut off their competitive threats. And, finally, these firms have abused their role as intermediaries to further entrench and expand their dominance. Whether through self-preferencing, predatory pricing, or exclusionary conduct, the dominant platforms have exploited their power in order to become even more dominant

      Anticompetitive practices of GAFA in three points ||Jovan||||StephanieBP||

    2. To address this underlying conflict of interest, Subcommittee staff recommends that Congress consider legislation that draws on two mainstay tools of the antimonopoly toolkit: structural separation and line of business restrictions.

      This is a long read - here Congress Judicial committee recommends breaking up Amazon, Apple, Facebook and Google + overhaul of antitrust legislation ||Jovan||||StephanieBP|| Also relevant for our ISOC project ||MariliaM||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Facebook Says Government Breakup of Instagram, WhatsApp Would Be ‘Complete Nonstarter’

      FB is arguing that the acquisitions of Instagram and WhatsApp were approved by the FTC leading to massive investments and tech integration and now are so intertwined that it is impossible to unwind the deals. ||StephanieBP||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. However, a reportby the United KingdomIntelligence and Security Committee titled Foreign Involvement in the Critical National Infrastructure; The implications for national securityobserved that “[a]ny policy which seeks to block all Chinese companies from any future contracts relating to [Critical National Infrastructure] projects is not only impractical but, crucially, given the predominance of Chinese-manufactured and -developed equipment, is unlikely to result in the national security protection envisaged.

      Interesting conclusion.

    2. During the same period, Apple reportedly refusedChina’s requests for its source code.35Meanwhile, companies including IBM, Hewlett-Packard, McAfee, Cisco, and the German company SAP agreedto use intermediary companies to allow the source code for their products to be inspected under requirements imposed by Russia’s Federal Security Service

      E-commerce course update.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Fascinating text on the work of interpreters at the UN with many funny anecdotes. We may use it for our language and diplomacy course.

      ||Andrej|| ||Dragana||

    2. We never do something, we implement. We don’t repeat, we reiterate and underscore. We are never happy, we are gratified or satisfied. You are never doing a great job: you are performing your duties in the outstanding manner in which you have always discharged them. There is no theft or embezzlement, but rather failure to ensure compliance with proper accounting and auditing procedures in the handling of financial resources. This is a language the interpreter must master very early on.

      great input for our 'UN language'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Interesting text on the shift from a maturity-based to a risk-based cybersecurity. It discusses how this shift should translate into concrete measures within companies. Some elements could be interesting for course updates, including the security module on the AI course. Perhaps also interesting for cybersecurity ||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. DrupalCon Barcelona 2020

      DrupalCon lorem ipsum.... DUSAN I MARKO TESTIRAJU

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The main elements in the text:

      • China starts digital yuan. It is FIAT currency (not cryptocurrency)
      • the main question if dominance of USD as global transactional currency will be challenged (currently 3/4 of global transactions)
      • what will be future of global digital currencies: will there will be digital Euro or digital Yen or Digital international money (via IMF).
      • will digital fiat currencies make bitcoins obsoletee?

      ||ArvinKamberi||

    2. The issue of a crypto currency by a central bank reduces to zero the number one problem of such monetary instruments – the problem of trust, including on the part of government agencies and monetary policy regulators.

      key challenge.

    3.  “digitalization” of Special loan drawing rights of the IMF

      International digital currency.

    4. “digital euro”

      will EU act?

    5. a movement towards a “bipolar” system of digital currencies, the dollar and the yuan, with an important but mainly regional role of digital euro and Japanese yen.

      Major shift.

    6. the dollar accounts for more than four fifths of all currency exchange transactions worldwide.

      statistics

    7. “Beijing’s main objective is not to internationalize yuan, but to establish a total control of people’s and companies’ payments, fight against shadow economy and corruption”

      Main aims

    8. this makes blockchain technology, which is normally key for private crypto currencies, superfluous.

      true.

    9. At the end of April 2020 a spokesperson for People’s Bank of China confirmed that digital yuan tests were under way in several cities of China:  Shenzhen, Suzhou, Chengdu, Xiong’an, and “on the sites of 2022 Winter Olympics” in Beijing.

      This is typical Chinese way of introducing innovations.

    10. Every CBDC unit acts as an equivalent to a paper banknote.

      no different from traditional money.