1. Last 7 days
    1. Is SchemaApp solution that can convert our page into Schmea-compatible or we need to do it by adjusting our custom post fields to shcema.org (manually).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “Semantics without the ability to connect to other data is almost as valueless as no semantics…[S]emantic data [is] only valuable in my opinion when it can be bridged to other data.”

      The main ultimate challenge for us will be to provide value to links. For example, when we connect two piecies of informatoin we should give value why we connect them - to explain, to provide counter-information, etc...

    2. Thanks to Schema.org’s vocabulary, strings of text could be understood as things containing unique properties and relationships with other things on the web.

      ||JovanNj|| We are advancing with logical structure of websites. We will use scheme.org which both provides semantics for SEO and creates 'bridge' towards knowledge graph that you work on. Could you explore this linkage between scheme and knowledge graph.

    3. As Google themselves stated: “At its core, Search is about understanding language.” Following this statement, it only makes sense that the biggest challenge facing SEO today is one of semantics. At its most basic, semantics is a term for the study of language, how it expresses meaning, and the rules it must abide by in order to convey this meaning. It comes as no surprise that semantics have had a significant impact on search function and SEO strategy.

      The key of SEO is about semantics and language.

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A Survey of Knowledge-Enhanced Text Generation

      Excellent survey on text generation enhanced by external knowledge

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. EventSeries has been defined as a kind of Event to make it easy for publishers to use it in an Event context without worrying about which kinds of series are really event-like enough to call an Event. In general an EventSeries may seem more Event-like when the period of time is compact and when aspects such as location are fixed, but it may also sometimes prove useful to describe a longer-term series as an Event.

      This could be a solution for covering events such as IGF where you have one entry for Event Series (IGF) and events (specific workshops).

      ||AndrijanaG|| Could you check the following aspects for dealing with series events - events? It is logical issue. Any logical solution could be implemented technically. First step would be to link these fields to our event fields (where is the latest version of fields).

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Schema Ap

      Here is a good knowledge base of Schema, including basics, tools, etc.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Jul 2021
    1. If there was one central target that its author wanted satirically to destroy, it was the hope of his age, a hope that centered around science, love, technical progress and reason.

      Early warning about technology.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Today, you’ve heard from the Secretary of Defense, you’ve heard from the Secretary of Commerce, the National Security Advisor, the director of the White House Office of Science and Technology Policy.

      ||Pavlina|| Could we find these speeches somewhere? Is there conference website for this event?

    2. the State Department will be releasing our first ever data strategy to help us use data more effectively and more creatively for diplomacy. 

      ||kat_hone|| to follow-up

    3. cyber and tech diplomacy

      new terminology

    4. And I think we’ve already gotten some good work under our belts.  We’ve been developing shared principles at the G7.  I think you saw some of that emerge just a few weeks ago with President Biden.  We’ve created a new U.S.-EU Trade and Technology Council that’s going to be an important vehicle for advancing this agenda.  We’re starting a new science and technology partnership with the UK.  We’re launching cooperative agreements with Korea and Japan on emerging technologies.  We created a Critical and Emerging Tech Working Group with the Quad countries – with Japan, Australia, India.  We’re working with G7 partners through Build Back Better World to mobilize private capital and government finance to build digital infrastructure in low- and middle-income countries.

      Survey of a few US initiatives in digital realm. It is important to follow-up on them as processes in digital cooperation.

    5. “surveillance due diligence guidance”

      ||Pavlina|| ||MarcoLotti|| Do we have this document?

    6. That’s what we did at the UN International Telecommunications Union just a few months ago.  Some countries proposed norms that would allow the use, for example, of facial recognition technology in ways that could threaten human rights.  We brought governments and businesses together to stop it.

      to analyse more

    7. setting technical standards and creating norms for emerging technologies.

      ||sorina||||VladaR||||NatasaPerucica||||Pavlina||||Katarina_An|| Standard setting is one of the pillars of the US digital foreign policy.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Jun 2021
    1. Towards a renewed Transatlantic partnership

      Important for wide range of digital issues

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Brussels 14 June 2021

      Important cybersecurity event

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Active Apps Notifier

      Active Apps Notifier

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Protect our planet

      no mention of e-waste despite Mount Recylemore

    2. G7 commitments since the start of the pandemic provide for a total of over two billion vaccine doses

      Mostly for themselves...data shows that the US only exported around 3 million vaccines which is around 1% of their total production. EU exported around 28% of its vaccines mostly to rich countries like the UK, Canada, Japan, Saudi Arabia, etc..

    3. As such we endorse the G7 Compact on Research Collaboration and its commitment to: support policies, legal frameworks and programmes to promote research collaboration; promote sharing of research data; explore enhancements to research assessment and rewards for collaboration and knowledge sharing; and develop a common set of principles which will help protect research and innovation ecosystem across the G7 to open and reciprocal research collaboration.

      Science diplomacy framework.

      ||kat_hone||||Pavlina||

    4. G7 Presidency’s common understanding on ‘Competition and the Digital Economy’,

      To include this document

    5. a common understanding of how existing international law applies to cyberspace and welcome the work of our Foreign Ministers to promote this approach at the UN and other international fora.

      ||VladaR||||AndrijanaG||Support for OEWG approach

    6. Digital Ministers’ Roadmap for Cooperation on Data Free Flow with Trust.

      Do we have this document?

      ||NatasaPerucica||||Katarina_An||

    7. the Framework for G7 Collaboration on Digital Technical Standards.

      ||sorina|| to follow-up on this development

    8. with regards to engagement with and appointments to Standard Developing Organisations, where appropriate.

      Direct call for appointements.

      ||sorina||

    9. the GPAI Summit in Paris in November 2021.

      Another important event for the autumn. It seems that they are replacing Peace Week with GPAI Summit.

    10. a ‘Future Tech Forum’ in September 2021

      to put it on the calendar for follow-up

      ||StephanieBP||||VladaR||

    11. for industry-led inclusive multi-stakeholder approaches to standard setting, in line with our values and principles which underpin these standards

      ||sorina||||Pavlina||

    12. support for the implementation and development of global norms and standards to ensure that the use and evolution of new technologies reflects our shared democratic values and commitment to open and competitive markets, strong safeguards including for human rights and fundamental freedoms.

      Link to values and human rights.

    13. FRONTIERS

      Use terminology from early days of Gueterres mandate - frontier technologies.

    14. We recognise that this will need a set of common standards for travel including interoperability and mutual recognition of digital applications,  testing requirements, recognition of vaccination status including exemptions and comparable criteria for when responsive measures may be required.

      Standardisation process in post-COVID issues.

      ||sorina||

    15. an ambitious global minimum tax of at least 15 per cent on a country-by-country basis, through the G20/OECD inclusive framework and look forward to reaching an agreement at the July meeting of G20 Finance Ministers and Central Bank Governors

      ||StephanieBP|| Next steps on the new taxation system.

    16. We thank the UK’s Chief Scientific Adviser and his G7 counterparts, the international organisations, industry representatives and expert advisers involved in the partnership on pandemic preparedness convened by the UK Presidency and note their practical proposals.

      Science diplomacy cooperation ||TerezaHorejsova||||Pavlina||||Katarina_An||

    17. Emphasising the need for equitable access to COVID-19 vaccines, we will support manufacturing in low income countries and, noting the importance of intellectual property in this regard, we will engage constructively with discussions at the WTO on the role of intellectual property, including by working consistently within the TRIPS agreement and the 2001 Doha Declaration on the TRIPS agreement and Public Health. We note the positive impact that voluntary licensing and technology transfer on mutually agreed terms have already made to increasing global supply. We note the positive impact that voluntary licensing and technology transfer on mutually agreed terms have already made to increasing global supply.

      It seems that on this point EU prevailed because it soften USA call to waive IPR protection in the WTO.

    18. free open societies and democracies, and by our commitment to multilateralism

      key guiding principles

    19. Here is analysis of cyber-aspects of Carbis Bay G7 Communique.

    1. Promoterespectforinternationallyacceptednormsthatdriveinclusivityandprotectdigitalcivic-space,includingthroughcapacitybuilding,andensurethatthedesignandapplicationofnewtechnologiesreflectoursharedvalues,respecthumanrightsandinternational law, promote diversity and embed principlesof public safety

      ||VladaR|| This is from statement between G7, India, S.Korea, and S. Africa.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. continuation of the inclusive and transparent negotiation process

      This, along with subsequent paragraphs, signal abandoning the GGE format, and replacing it with PoA (which may be focused on implementation of norms and capacity building, but also on shaping new measures).

    2. categorize CERTs/CSIRTs as part of their critical infrastructure

      Interesting 'suggestion' to categorise CERTs as critical infrastructure

    3. curb their commercial distribution as a means to protect against any misuse that may pose a risk to international peace and security or human rights

      This is a very important 'upgrade'. Vulnerabilities are being part of (legal) commercial services and products used by criminals as well as governments and security services to penetrate into systems. Overall, this reduces safety and security, and often endangers human rights (as security services use these tools to snoop on activists and journalists).

      This measure clearly asks for curbing such (legal) practices. This may be used also by human right groups to put pressure on States where such businesses reside (businesses that produce offensive tools - including tools then used to attack activists).

    4. systematize the reporting of ICT vulnerabilities and requests for assistance between countries and emergency response teams

      CVD is linked with requests for assistance between countries, which were outlined above.

    5. he exploitation of vulnerabilities in ICT products

      Direct call to control on a national level the exploitation of vulnerabilities (eg. vulnerabilities equities process - VEP, and in general transparency about how vulnerabilities are exploited).

      Further work on such transparency and VEP measures, and even prohibiting exploitation of vulnerabilities is needed.

    6. security of ICT products

      Par. 56-59 are a very important elaboration of the supply chain security measures, and the accountability of the private sector for security by design: through regulators' measures (such as certification schemes), interoperable standards, as well as vendor's good practices on security-by-design approach.

      Very relevant for initiatives like the Geneva Dialogue on Responsible Behaviour in Cyberspace, Paris Call (Working group 6), and other.

    7. measures to ensure the safety and security of ICT products throughout their lifecycle

      Placing this under the part on critical infrastructure signals the growing importance of the topic (security of digital products)

    8. mass surveillance

      Explicit reference to "mass surveillance" (as part of the compromise on other elements?)

    9. An affected State should notify the State from which the activity is emanating. The notified Stateshould acknowledge receipt of the notificatio

      Clearly setting an expectation of direct communication between parties (and 'proofs' - receipt) before any other action is undertaken

    10. can include the incident’s technical attributes; its scope, scale and impact; the wider context, including the incident’s bearing on international peace and security; and the results of consultations between the States concerned

      The report sets expectations for what an attribution might/should consist of. It is particularly interesting that it suggests 'evidence' of a bilateral exchange - thus encouraging direct cooperation and exchange before attribution is done.

    11. The measures recommended by previous GGEs and the OEWG represent an initial framework for responsible State behaviour in the use of ICT

      In a way, the GGE report re-confirms that the framework for responsible behaviour is based on GGE and OEWG agreements. No other resolutions are mentioned here.

    12. Here is annotated analysis of the UN GGE Report (2021)

      ||VladaR||||AndrijanaG||||StephanieBP||||Pavlina||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A very interesting summary of India's position in digital realm with a few highlights:

      • stressing risk of relying on critical infrastructure owned and controlled by other actors
      • introducing 'data-centered' sovereignty along the lines of the GDPR-approach
      • high importance of digital supply chain for INdia
      • try to negotiate international framework for cyberspace by 2025.
      • hinting a possibility of joining WTO negotiations (not completely clear).

      ||VladaR|| ||StephanieBP||||TerezaHorejsova||

    2. including in the WTO,

      Is India signalling joining of the Joint Statement Initiative?

    3. the territorial jurisdiction of a country would be on the data which is owned by its citizens irrespective of the place where the data physically is located located”.

      India is moving here close to GDPR.

    4. This aspect highlights the risks associated with India’s dependence for the operations and services on the critical cyber infrastructure located elsewhere.

      It is important aspect: high digital dependency of India. What can India (and other countries) do to address this dependency of - let say - submarine cables?

    5. supported the primary role of the governments in securing cyberspace while also acknowledging an important supporting role of other stakeholders.

      Is primary role of governments related only to cybersecurity?

    6. in support of the development objectives building on the 2015 Digital India platform with the world’s largest biometric database, Aadhar, at its centre.

      It makes an interesting approach of having a specific tech platform in the center of the overall development approach.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. "We have an agreement with the private sector on the transmission grid. There are basic standards, cyber standards that they adhere to, cyber standards that are developed by the Department of Commerce, and we need that same sort of regime with pipelines. And that does not exist at the moment," Granholm said on NBC.

      Need to develop standards for cyber and pipelines.

      ||VladaR||||sorina||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. transportation like our water systems, like a lot of our power systems, you know, quite a bit of it is in private hands or local hands. And part of our vulnerability on cybersecurity is you're only as strong as your weakest link. And so we've got to make sure there are good cyber practices all the way down to the smallest player, any individual company. Because what Colonial showed us was a cyber-attack on a private company had national implications.

      Amnother interview on cyber matters

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. May 2021
  5. Apr 2021
    1. This is your brain on Zoom

      Information we mostly know, but good to tackle stress and address issues such as gender. Useful to corroborate some of our practices (breaks, "relaxed" networking opportunities).

      ||JovanK||, ||Katarina_An|| ||ArvinKamberi||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Much of the other work involves setting standards for datasets that are not uniform between different entities and provinces. This would allow them to be more easily used on new data exchanges such as the one recently launched in Beijing that aims to allow companies to trade anonymous proprietary data -- effectively a pilot for a national data trading system

      Rules for the governance of data is a key motivation of the Chinese government crackdown on companies. While proposals to nationalise companies' datasets have met criticism, an idea that is gaining traction is the possibility to establish a trading system for data between companies. ||JovanK||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Besonders offensichtlich wird die Schwierigkeit einer guten Kategorisierung beim Verbot von Manipulation

      how do you categorise 'manipulation'?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. to achieve a sustainable peace with the digital world.

      so, there is a war? also the war metaphor at the beginning of the para? ...

    2. There's no manuals, there's no best practices,” Rauchbauer says. “You have to invent everything on the go and have to think it out yourself.” In the face of rapidly expanding tech empires, governments must use every tool at their disposal to contend with them.

      useful quotes

    3. Microsoft, for example, opened offices to the United Nations and the European Union in 2020, creating space for diplomatic, not just commercial, engagements

      where does diplomacy end and lobbying begin?

    4. “This idea that you're a diplomat that is not geographically located and focused ... is a challenge for foreign ministries. And the antibodies in foreign ministries against things that don't look like they're from these categories are strong.”

      good point. Foreign ministries are too a great extend geographically structured. Plus some themes (but again, very traditional fp themes ...)

    5. "The freight train is coming ... so it’s not the IT office that needs to deal with technology; it’s mainstream foreign and security policy. Too few countries get that."

      great quote though digital foreign policy

    6. net states

      misleading frame

    7. They may recognize that Big Tech has country-like powers, but they can’t seem to figure out how to deal with their very un-country-like structures.

      the essence of digital diplomacy?

      But is it even a good frame? States make laws, a key distinction.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Priznaju se normirani troškovi

      Test 2.0

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The firing of top Google AI ethics researchers has created a significant backlash

      maybe interesting for ||sorina|| and ||MariliaM||||sorina.teleanu||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the digital equivalent of bussing in a fake crowd for a speech.

      is it?

    2. acted quickly

      acting quick in some countries not so much in others

    3. Facebook has repeatedly allowed world leaders and politicians to use its platform to deceive the public or harass opponents despite being alerted to evidence of the wrongdoing.

      very strong claim. Worth following up? for dig.watch ||Katarina_An|| ||AndrijanaG|| Also content policy / socio-ecoomic basket ||GingerP||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mobileye is developing two completely independent self-driving systems—one driven by cameras and the other by a combination of lidar and radar. Once each of these systems has achieved a high level of performance separately, Mobileye will combine them into a single system. Mobileye believes this extra layer of redundancy will give the company higher confidence in the safety of its systems

      new approach to developing self-driving tech

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the Stanford Encyclopedia of Philosophy

      Excellent resource!!!

    2. there were between fifty and seventy types of argumentation that could be applied to just about every possible debate question.

      Can we find more resources about it? This could be interesting for Speech Generator and way how countries frame cybersecurity argument.

      ||VladaR||||AndrijanaG||||JovanNj||

    3. The young machine learned by scanning the electronic library of LexisNexis Academic, composed of news stories and academic journal articles—a vast account of the details of human experience.

      Shall we rely more on Lexis Nexis for input of articles via JovanNJ search

      ||NatasaPerucica|| Could you check subscription info

      ||Katarina_An||||JovanNj||

    4. Debate is a game, like trivia or chess, in that it has specific rules and structures, which can be codified and taught to a machine.

      it is interesting how far rules can be applied to dealing with complex problems such as debating?

    5. Tel Aviv

      It is in Haifa

    6. ||Jovan|| I think this article is interesting for you because it deals with AI and politics

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Yet doom-mongers struggle to point to actual evidence of accelerating automation.

      Little evidence that there is an accelerated automation of work (including in the pandemic context).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  6. Mar 2021
  7. <