1. Apr 2023
    1. India promises to use its chair of the g20 this year to be the “voice of the global south”.
    2. India
    3. Lula will soon visit Africa to revive Brazil’s influence there.
    4. Brazil is also classed by America as a “major non-nato ally”, a legal status entitling enhanced co-operation with America’s armed forces.
    5. what Mauro Vieira, foreign minister, calls “automatic alignments”.
    6. New research by the imf notes that since 2018 geopolitical alignment, measured by similarity in un voting patterns, has become ever more important in determining the location of foreign direct investment.
    7. ore than a third of Chile’s is with China, a higher share than any other t25 country (but 40% of its trade involves the West).
    8. 77% of Mexico’s total trade occurs with the West; over 60% of Israel’s and Algeria’s trade also does.
    9. In Saudi Arabia gdp per person is more than $27,000, on a par with some European countries, while in Pakistan it still lingers around just $1,600.
    10. the world’s largest democracies, India and Indonesia, alongside Vietnam, Saudi Arabia and Egypt, which are all run by autocrats of various flavours.
    11. “Europe has to grow out of the mindset that Europe’s problems are the world’s problems, but the world’s problems are not Europe’s problems,”
    12. Some $170bn in aid was pledged to Ukraine in the first year of the war—equivalent to about 90% of all the aid spent globally in 2021 by the oecd’s Development Assistance Committee, a group of 31 Western donors.
    13. Some call it “minilateralism” (as opposed to multilateralism)—the use of discrete alliances or groupings to achieve results in dedicated areas, rather than lumping your lot in with one bloc.
    14. These middle powers are pragmatic and opportunistic.
    15. A formal institution, the Non-Aligned Movement, was joined by nearly every African, Asian and Latin American state. With the end of the cold war it became, in the words of an Indian academic, “a moribund organisation in need of a decent burial”.
    16. Today they represent 45% of the world’s population and their share of global gdp has risen from 11% in 1992 to 18% in 2023, more than the eu’s.
    17. the transactional 25 (t25)
    18. the 25 biggest economies that have sat on the fence on the Ukraine war, or wish to remain non-aligned in the Sino-American confrontation, or both.
    19. Although 52 countries comprising 15% of the global population—the West and its friends—lambast and punish Russia’s actions, and just 12 countries laud Russia, some 127 states are categorised as being firmly in neither camp (see map).
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This makes the GSB the perfect place to glimpse the future of management.

      ||Pavlina|| This sentence is releated to your research on ...

    2. a certain “selfless ambition”
    3. How do you lay someone off? How do you decline unsolicited and unhelpful advice from a big investor? How do you respond to a nosy journalist?
    4. Only when you know your weaknesses can you act to mitigate them
    5. Students are instructed to observe each other’s behaviour, from emotional expressiveness to problem-solving skills.
    6. assess whether the way they come across to others is the way they want to be perceived.
    7. to hold “multiple overlapping roles” within an organisation, as an assigned reading recommends: it is harder to be defenestrated if multiple teams report to you.
    8. to avoid grooming successors
    9. “insufficient sensitivity to, and skill in, coping with power dynamics” have cost many talented people promotions and even their jobs.
    10. ll three require virtually no number-crunching. Instead they aim to cultivate in students a capacity for hardheadedness, introspection and diplomacy, respectively.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Unless their destruction offers a definite military advantage, data cables intended for civilian data traffic should be protected as civilian objects under humanitarian law.57
    2. Marseille is the central hub for data traffic to the MENA region and Asia, with twelve active or planned systems.34
    3. Cable repair and maintenance is handled by an industry that is separate from the operating and owning companies. Operators and owners enter into ‘contracts with marine maintenance companies that have cable and equipment storage depots and cable ships strategically positioned throughout the world, available on a 24/7 standby basis to repair cable faults.’86
    4. The largest part of the submarine cables is located within the high seas, where there is almost no legal protection provided – besides Art. 113-115 of UNCLOS
    5. Y. Yincan, J. Xinmin, P. Guofu, and J. Wei (Eds.), ‘Safety of Submarine Optical Cable’, Submarine Optical Cable Engineering, 2018, pp. 235–257
    6. Distributed Acoustic Sensing is a ‘technology that enables continuous, real-time measurements along the entire length of a fibre optic cable.’85This technology utilizes the entire optical fibre as the sensing element. These systems allow acoustic signals to be detected over large distances and in harsh environments. They can be used to detect movements and vibrations in the vicinity of the cable, for instance, from shipping activities.
    7. Positions are marked on navigational charts to ensure awareness of marine users.
    8. With an average ocean depth of 3682m51, the 1.3 million km52 of submarine cable infrastructure is installed in a challenging environment.
    9. Countries have full jurisdiction over the cable in their territorial waters, i.e. up to 12 nautical miles (or about 22 kilometres) from the baseline of their coastline. States also have particular law enforcement duties and obligations in the contiguous zone (24nm). States do not have jurisdiction over cables outside those zones. Indeed, on the high seas (the areas outside of national jurisdiction) as well as the Exclusive Economic Zones of states (200 nm), the legal status of cables and rights and responsibility for their protection is ambiguous.82
    10. On average, non-island EU Member States have 4.5 internal cross-border cable systems available.65
    11. a transnational landing station ‘spotting community’ exists that aims to take photographs of landing stations and post their precise location on the internet fora.8
    12. the currently longest cable system SEA-ME-WE-3.
    13. Second, Gozo, the second-largest island of the Maltese Archipelago with 31 000 inhabitants, is connected by only one submarine cable to the local Maltese network.72
    14. extensive power outages that affect both cable landing stations result in loss of connectivity.
    15. ata Centres and Internet Exchange Points (IXPs).
    16. new cable landings of high-capacity projects at the French and Danish West coasts, as well as Bilbao, indicate a change of mindset in the landing location planning.
    17. n the EU, the Netherlands have the most IXP (106), followed by Germany (83), France (35), and Italy (34).
    18. The hotspots of data centre locations within the EU are Frankfurt (54 centres), Amsterdam (41), and Paris (31). Massive clusters of data centres exist in Stockholm (29), Milan (22), Dublin (19), Sofia (20), Madrid (19), Bucharest (19), Copenhagen (17), Riga (17) and Helsinki (17).3
    19. While the information on cable owners is widely available,41 there is little information on the operators and buyers of the capacities
    20. With the recent EllaLink project and the older systems of Atlantis 2 and COLUMBUS III, there are only three direct links between the European Union and Latin America.3
    21. Various critical infrastructures are increasingly dependent on a stable internet connection. Examples of these services can be found in the finance sector (internet-based ATMs), transport sector (coordination systems for to-the-minute supply chains), water and food sectors (digitalised water supply systems and smart agriculture).
    22. CER Directive)
    23. 94 % of EU’s businesses have a fixed broadband connection, and 78 % have a website. 41 % of all European enterprises use tools like cloud services that require a permanent internet connection, andfor large enterprises, this share grows to 71 %.19
    24. Article 21(c), 1982.11 United Nations Convention on the Law of the Sea, Article 113, 1982
    25. The United Nations Convention on the Law of the Sea (UNCLOS)
    26. Alcatel Submarine Networks and Nexans (France), Prysmian Group (Italy), NKT A/S (Denmark), SubCom (United States), NEC (Japan), and Huawei Marine Networks (China).
    27. his is also reflected at the EU level, where a broad range of agencies, including the European Maritime Safety Agency, the European Fishery Control Agency, the European Union Agency for Cybersecurity, and several Directorates of the European Commission, e.g. DG Connect, DG MOVE, or DG MARE,
    28. here is a tendency to pay little attention to what happens at sea more generally —a phenomenon that has been described as collective sea blindness.6
    29. The potential for sabotaging undersea cables during times of conflict, as part of grey zone or hybrid warfare operations or by transnational terrorism and organised crime exists, but such incidents have not been confirmed yet.
    30. Information was collected through extensive desk research and review of key strategies, policy documents, incident reports and studies published on the issue, and thematic interviews and written inputs from practitioners and advisers from a range of backgrounds.
    31. 40 % of cable disruptions arise from bottom-tending commercial fishing equipment and related dredging. Another 15 % of damage is caused by anchoring incidents, such as improperly stored anchors, anchoring outside approved areas, sea conditions affecting anchor positioning, and the emergency dropping of an anchor.
    32. hese include the Danish Subsea Cable Protection Committee, the European Fishery Control Agency, the European Maritime Safety Agency, the European Subsea Cable Association, the European Union Agency for Cybersecurity, and cybersecurity and maritime security experts
    33. en cable systems
    34. Equiano, 2 Africa, PEACE, Africa 1
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “The risk is real,” DeBacker said. “It has materialized in the past, and what we're trying to do is prevent it from materializing in the future.”
    2. That cable, known as the Southeast Asia-Japan 2 cable, was planned to run from Singapore through Southeast Asia and touch down in Hong Kong and mainland China before going on to South Korea and Japan. China has delayed giving a license for the cable to pass through the South China Sea, citing concerns about the potential for the cable manufacturer – Japan’s NEC – to insert spy equipment on the line, the consultants said.
    3. HMN Tech supplied 18% of the subsea cables to have come online in the last four years, but the Chinese firm is only due to build 7% of cables currently under development worldwide, according to TeleGeography. These figures are based on the total length of cable laid, not the number of projects.
    4. Similarly, the Bay to Bay Express Cable System, developed by Amazon, Meta and China Mobile, will not run as planned from Singapore to Hong Kong to California. As part of a deal struck between Amazon, Meta and Team Telecom, China Mobile left the consortium and the cable was rebranded as CAP-1, with a new route from Grover Beach, California, to the Philippines, three people involved said.
    5. The first, a project owned by Google and Meta known as the Pacific Light Cable Network, will now only transmit data from the United States to Taiwan and the Philippines, after Team Telecom recommended that the FCC reject the Hong Kong leg. The section of the cable going to Hong Kong, spanning hundreds of miles, is currently lying abandoned on the ocean floor, two people involved in the deal said.
    6. Washington’s decision to nix any Hong Kong terminus for the four planned subsea cable deals upended the plans of Google, Meta and Amazon.
    7. To that end, the team makes cable licensing recommendations to the U.S. telecom regulator, the Federal Communications Commission (FCC). Since 2020, the team has been instrumental in the cancellation of four cables whose backers had wanted to link the United States with Hong Kong, Devin DeBacker, a DOJ official and senior member of Team Telecom, told Reuters in an interview.
    8. The U.S.-China backroom brawling over undersea cables is threatening to overwhelm the subsea cable industry, which has always relied on careful diplomatic collaboration to survive, said Paul McCann, a Sydney-based subsea cable consultant.
    9. Two new investors – Telekom Malaysia Berhad and PT Telekomunikasi Indonesia International (Telin) – joined the deal, and some of the original members raised their stakes to make up the shortfall, the people said.
    10. HMN Tech could be subject to U.S. sanctions in the near future. That in turn would make it difficult for the telecoms to sell bandwidth because their biggest likely customers – U.S. tech firms – wouldn’t be allowed to use the cable.
    11. HMN Tech expanded its ambitions with the PEACE cable, which came online last year and connects Asia, Africa and Europe. The firm was poised to make another great leap with the Singapore-to-France project before SubCom snatched it away.
    12. Fast-forward 15 years and the firm, now known as HMN Tech, has become the world’s fastest-growing manufacturer and layer of subsea cables, according to TeleGeography data.
    13. America’s SubCom, Japan’s NEC Corporation and France’s Alcatel Submarine Networks, Inc.
    14. France’s Alcatel Submarine Networks is building the cable
    15. Over the last year, the Biden administration has pushed through a landmark bill to provide $52.7 billion in subsidies for U.S. semiconductor production and research. The Commerce Department in December added dozens of Chinese firms producing technology such as drones and artificial intelligence chips to its so-called Entity List, which severely restricts their access to U.S. technology.
    16. Though the cable won’t come ashore in Chinese territory, the U.S. government believed HMN Tech could insert remote surveillance equipment inside the cable, the official said without providing evidence.
    17. The U.S. cable effort has been anchored by a three-year-old interagency task force informally known as Team Telecom.
    18. Undersea cables are central to U.S.-China technology competition.
    19. It’s one of at least six private undersea cable deals in the Asia-Pacific region over the past four years where the U.S. government either intervened to keep HMN Tech from winning that business, or forced the rerouting or abandonment of cables that would have directly linked U.S. and Chinese territories.
    20. HMN Tech, whose predecessor company was majority-owned by Chinese telecom giant Huawei Technologies Co Ltd,  was selected in early 2020 to manufacture and lay the cable, the people said, due in part to hefty subsidies from Beijing that lowered the cost. HMN Tech’s bid of $500 million was roughly a third cheaper than the initial proposal submitted to the cable consortium by New Jersey-based SubCom, the people said.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “It seems we are headed down a road where there will be a U.S.-led internet and a Chinese-led internet ecosystem,” Heath told Reuters. “The more the U.S. and Chinese disengage from each other in the information technology domain, the more difficult it becomes to carry out global commerce and basic functions.”
    2. The construction of parallel U.S.- and Chinese-backed cables between Asia and Europe is unprecedented,
    3. “It’s like each side is arming itself with bandwidth,” one telecom executive working on the deal said.
    4. it would create a super-fast new connection between Hong Kong, China and much of the rest of the world, something Washington wants to avoid. Secondly, it gives China’s state-backed telecom carriers greater reach and protection in the event they are excluded from U.S.-backed cables in the future.
    5. at least three years to move from conception to delivery.
    6. Countries should prioritize security and privacy by “fully excluding untrustworthy vendors” from wireless networks, terrestrial and undersea cables, satellites, cloud services and data centers, the spokesperson said, without mentioning HMN Tech or China.
    7. undermined the project's viability by making it impossible for owners of an HMN-built cable to sell bandwidth to U.S. tech firms, usually their biggest customers.
    8. slapped sanctions on HMN Tech in December 2021
    9. initially picked HMN Tech to build that cable. But a successful U.S. government pressure campaign flipped the contract to SubCom last year, Reuters reported in March.
    10. The China-led EMA project is intended to directly rival another cable currently being constructed by U.S. firm SubCom LLC, called SeaMeWe-6 (Southeast Asia-Middle East-Western Europe-6), which will also connect Singapore to France, via Pakistan, Saudi Arabia, Egypt, and half a dozen other countries along the route.
    11. China’s HMN Technologies Co Ltd
    12. $500 million
    13. EMA (Europe-Middle East-Asia)
    14. China Telecommunications Corporation (China Telecom), China Mobile Limited and China United Network Communications Group Co Ltd(China Unicom)
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The first is what sort of targets are chosen
    2. A third test is how well cyber forces protect their arsenals.
    3. Officials and experts have spent years debating how international law, including the laws of armed conflict, apply to cyberspace. The Tallinn Manual, associated with nato, is one such guide.
    4. Another is how well attacks are calibrated. Are they precise in their effects and mindful of escalation?
    5. The ncf’s new paper is important because it spells out a realistic and circumscribed view of cyber power. It says that its main purpose is not so much kinetic—a digital substitute for air strikes—as cognitive.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In a speech on March 30th, she said Europe wanted to “de-risk” rather than “decouple” its relations with China.
    2. “a just peace that respects Ukraine’s sovereignty and territorial integrity.”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: A North Korean government-backed APT actor targets organisations in South Korea and the U.S

      CONTENT: A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea and the U.S.

      Google's Threat Analysis Group (TAG) is tracking the cluster under the name ARCHIPELAGO, which it said is a subset of another threat group tracked by Mandiant under the name APT43.

      The tech giant said it began monitoring the hacking crew in 2012, adding it has "observed the group target individuals with expertise in North Korea policy issues such as sanctions, human rights, and non-proliferation issues."

      EXCERPT: A North Korean government-backed APT actor targeting government and military personnel in South Korea and the U.S

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: 5 April, 2023

      COUNTRY: North Korea, South Korea, the U.S.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Britain uses cyber capabilities to counter enemies online

      CONTENT: The UK National Cyber Force (NCF) – a partnership between the country’s armed forces and Government Communications Headquarters (GCHQ) – for the first time disclosed details about its approach to “responsible cyber operations to counter state threats, support military operations, and disrupt terrorists and serious criminals”.

      The document outlines that central to NCF’s approach is the ‘doctrine of cognitive effect’ – using techniques that have the potential to sow distrust, decrease morale, and weaken adversary ability to plan and conduct their activities effectively with the goal of changing their behaviour. This can include preventing terrorist groups from publishing pieces of extremist media online or making it harder for states to use the internet to spread disinformation. NCF’s operations are covert, and the intent is sometimes that adversaries do not realise that the effects they are experiencing are the result of a cyber operation.

      "In an increasingly volatile and interconnected world, to be a truly responsible cyber power, nations must be able to contest and compete with adversaries in cyberspace," GCHQ director Jeremy Fleming said. The statement was published alongside a 28-page paper designed "to illustrate aspects of how the UK is being a responsible cyber power". It did not elaborate on the specifics of those operations.

      EXCERPT: British government hackers have launched operations against militants, state-backed disinformation campaigns and attempts to interfere in elections, the GCHQ said.

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: 4 April, 2023

      COUNTRY: UK

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China’s YMTC set for chip comeback despite US export controls

      TITLE: Chinese YMTC to resume chip production amid US restrictions

      CONTENT: Yangtze Memory Technologies Co. (YMTC), a Chinese semiconductor manufacturer, is reportedly planning to begin production at a new chip plant in the second half of 2024. The plant is expected to help boost China's efforts towards self-sufficiency in the production of semiconductors, which have become increasingly important in modern technology.

      YMTC, which is owned by the state-backed Tsinghua Unigroup, is reportedly relying on more domestic suppliers for the new plant, as China looks to reduce its reliance on foreign technology amid increasing tensions with the US. By opening a new fab the company will be able to improve its competitiveness against its main rivals, Korean Samsung and American Micron.

      The country has been investing heavily in its semiconductor industry in recent years, with the aim of becoming a major player in the global market. YMTC has received $7bn in funding since the implementation of new export controls, as Beijing views the company as important for developing its domestic chips industry. Funding came from government-led investment vehicles, such as the National Integrated Circuit Industry Investment Fund (also known as the "Big Fund").

      EXCERPT: Yangtze Memory Technologies Co. (YMTC), a Chinese semiconductor manufacturer, is reportedly planning to begin production at a new chip plant in the second half of 2024. The plant is expected to help boost China's efforts towards self-sufficiency in the production of semiconductors

      LINK: https://www.ft.com/content/9ad41255-dfa9-419f-9e30-0ab537ab54fd?utm_source=piano&utm_medium=email&utm_campaign=22038&pnespid=u7pmBCVKLqNGhaDdoDKwSpTctRegXsd8MvmznPB6tBlmiH9LD7x8hWMnPpLoWULC1uEUk6foiQ

      TECHNOLOGY: Semiconductors

      DATE: March, 2023

      COUNTRY: China, USA

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This language on the “technical infrastructure essential to the general availability or integrity of the Internet” stems from proposals by the Netherlands relevant to the public core of the Internet, which in turns draws from the work of Dutch scholar Dennis Broeders on the topic, later taken up by the Global Commission on the Stability of Cyberspace in its proposal for a norm to protect the public core of the Internet. For the relevant United Nations reports, see footnote 122 above. For the Broeders publication, see Dennis Broeders (2016), The Public Core of the Internet: An International Agenda for Internet Governance, Netherlands Scientific Council for Government Policy, https://library.oapen.org/bitstream/handle/20.500.12657/32439/610631.pdf. For the report of the Global Commission on the Stability of Cyberspace and its advocacy for a norm of non-interference with the ‘public core of the Internet’, defined as including “such critical elements of the infrastructure of the Internet as packet routing and forwarding, naming and numbering systems, the cryptographic mechanisms of security and identity, transmission media [including terrestrial and undersea cables and the landing stations, data centres, and other physical facilities which support them], software, and data centers” (pp. 30–31), see Global Commission on the Stability of Cyberspace (2019), “Advancing Cyberstability: Final Report”, https://hcss.nl/wp-content/uploads/2019/11/GCSC-Final-Report-November-2019.pdf
    2. According to Subcom, an undersea cable repair can cost in excess of US$ 1 million and typically takes 2 weeks to return the cable to service—or more, depending on permitting requirements, weather, and other factors.
    3. Until just over a decade ago, intensity modulated direct detection was the optical transmission technology most commonly used in subsea cables. This method transmits information over subsea and terrestrial optical fibres by using laser pulses to encode digital data. Since then, further advances in coherent optical transmission have allowed single-channel data rates to increase more than a hundred fold.18 In addition, wavelength division multiplexing has increased the number of channels carried per fibre.19 Cable capacities vary depending on the cable system, but advances such as spatial division multiplexing will allow newer systems to carry as much as 500 terabytes per second.20 In systems longer than a few hundred kilometres, optical amplifiers (housed in watertight containers known as repeaters) boost the signals along the length of the cable roughly every 100 km.
    4. n shallow water (usually defined as less than 1000 m), the cable may also be buried under the seabed to provide further protection from, for instance, ships’ anchors and fishing operations.
    5. eleGeography’s 2022 Submarine Cable Map depicting 486 cable systems and 1,306 landings currently active of under construction; seehttps://submarine-cable-map-2022.telegeography.com/.
    6. DataCenterDynamics (2022), ‘World’s Longest Subsea Cable Lands in Djibouti, East Africa’, https://www.datacenterdynamics.com/en/news/worlds-longest-subsea-cable-lands-in-djibouti-east-africa; Reuters (2022), “MTN Lands Subsea Cable in South Africa to Boost Africa’s Connectivity”, https://www.reuters.com/world/africa/mtn-lands-subsea-cable-south-africa-boost-africas-connectivity-2022-12-13/.
    7. In 2022, following significant consultations, the International Cable Protection Committee published its Government Best Practices for Protecting and Promoting Resilience of Submarine Telecommunications Cables to “assist governments in developing laws, policies, and practices to foster the development and protection of submarine telecommunications cables, the infrastructure of the Internet”; see https://www.iscpc.org/publications/icpc-best-practices/.
    8. a more in-depth conversation on subsea communications cables, on the adequateness of the existing cable governance regime, and what might be done to strengthen it. Such conversations are already commencing at regional and national levels
    9. science and technology, engineering, maritime security, public international law, environmental protection, governance and security studies, history, and archaeology to name but a few
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. East Europe governments urge tech firms to fight disinformation

      TITLE: Central and East European governments urge tech firms to fight disinformation

      CONTENT: Prime ministers of Central and East European countries have signed an open letter urging tech companies to take concrete steps to promote accuracy over engagement on their platforms. The letter is a call to action against foreign information manipulation and interference, given that social media have been used as platforms to spread disinformation campaigns in these countries. The letter was signed by the prime ministers of Ukraine, Moldova, Poland, Czech Republic, Slovakia, Estonia, Latvia and Lithuania, and released by Czech Prime Minister Petr Fiala's office.

      EXCERPT: Prime ministers of Central and East European countries have signed an open letter urging tech companies to take concrete steps to promote accuracy over engagement on their platforms.

      LINK: https://www.reuters.com/technology/east-europe-governments-urge-tech-firms-fight-disinformation-2023-03-29/

      TREND: Fake news

      DATE: 03/04/2023

      COUNTRY: TITLE: (for updates, add a title of your own, different from the original)

      CONTENT: Content of your update/resource/event

      EXCERPT: Excerpt (a brief, tweet-like summary of your update); excerpts should be no longer than 300 characters

      LINK: Link to the original article

      TOPIC: Related topic(s)

      TREND: Related trend(s)

      PROCESS: Related process(es)

      DATE:

      COUNTRY:

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Russia publishes new foreign policy concept

      CONTENT: A new version of Russia’s foreign policy concept, approved by President Vladimir Putin, was published on Friday. This document defines the priority areas, goals and objectives of the country's international activities, and will serve as a road map for the Foreign Ministry and other ministries and agencies.

      The 42-page document consists of six sections and a total of 76 paragraphs. The document also focuses on international information security aspects and, in particular, mentions the right to take asymmetric and symmetric measures in case of risks to the country's sovereignty and territorial integrity, including with the use of modern ICTs (para 26).

      The previous version of the concept was adopted in November 2016. The work to update it has lasted for the past few years. In January 2022, the edited document was submitted for discussion with the permanent members of the Security Council. However, as a result of the meeting, the president sent it back for revision. Last December, the head of state considered the draft of the updated concept again at a meeting with the Security Council.

      EXCERPT: Russia publishes a new foreign policy concept to outline its national interests in the foreign policy domain,strategic goals, key tasks as well as priority guidelines of its foreign policy.

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: 31 March, 2023

      COUNTRY: Russia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Mar 2023
    1. After deepfakes go viral, AI image generator Midjourney stops free trials citing ‘abuse’

      TITLE: (for updates, add a title of your own, different from the original)

      CONTENT: AI image generator Midjourney has interrupted free trials of its service after some of its generations went viral online, misleading people to mistake AI generated images for real photographs. The problem was that many of those images generated using Midjourney were politically sensitive, including fabricated pictures of Trump being arrested or the pope wearing a designer jacket.

      EXCERPT: AI image generator Midjourney has interrupted free trials of its service after some of its generations went viral online, misleading people to mistake AI generated images for real photographs.

      LINK: https://www.theverge.com/2023/3/30/23662940/deepfake-viral-ai-misinformation-midjourney-stops-free-trials

      TOPIC: Fake News

      DATE: 30/03/2023

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Google Search is adding new ‘Perspectives’ and ‘About this author’ features to help users verify info

      TITLE: Google Search is adding new features to help users verify information

      CONTENT: Google announced that they will introduce new features to help users verify information on their search engine. The new functionalities include a "Perspectives" button and "About this author" as well as expanding on the currently existing "About this result". The idea behind the "Perspectives" feature is to give users a variety of noteworthy voices on a news topic to broaden their understanding of the subject matter. The “About this author” feature, allows users to learn more about the authors behind the content they are reading.

      EXCERPT: Google announced that they will introduce new features to help users verify information on their search engine

      LINK: https://techcrunch.com/2023/03/28/google-search-is-adding-new-perspectives-and-about-this-author-features-to-help-users-verify-info/

      TOPIC: Content Policy

      DATE: 30/03/2023

      COUNTRY: United States

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. permissionless organization
    2. That means silos and layers can give way to small teams, equipped with all the competencies needed to see a project through from beginning to end.
    3. to adopt structures that are flatter and more reconfigurable than those they’ve traditionally used.
    4. are pushing decision-making ability to the edges of the organization, allowing businesses to adopt structures that are flatter and more reconfigurable than those they have traditionally used.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In a bid to strengthen their trade partnership, Ukraine and the United Kingdom have signed a digital trade agreement. Notably, Ukraine becomes only the second country after Singapore to enter such an agreement with the UK.

      The digital trade deal supplements the Political, Free Trade, and Strategic Partnership Agreement signed by the two nations and will become effective after all interstate procedures are completed.

      As per reports by Ukrainian media, the latest agreement aims to prevent any possible trade barriers from arising in the future while guaranteeing Ukrainian IT companies continued and unrestricted access to markets, which is vital to their growth and expansion.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Opet

      TEST TEST 12345 xxx zzz

      Editovanje ||dusandATdiplomacy.edu|| xxx

      opet edit ||dusan||

    2. podešavanjem
    3. Iako korisnici

      test posle deploymenta

    4. korisnika

      Dusan nova random anotacija

    5. sam

      xxx zzz aaa

    6. počela

      novi test test 12345 7890 xxxx

    7. počela

      novi test novi test 123

    8. apletima

      TEST novi updateeeeeeeeee

    9. blogu

      xxx

    10. Godina

      TEST TESTss

    11. i su Java apletima obećavali jednostavnu distribuciju malih programčića koji dozvoljavaju pristup kriptografskim uređajima (pametnim karticama i tokenima) koji će raditi u s

      Dusan testira update eeeeee dusan opet test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It is also unclear how successful the group's attacks were and what damage they caused. SentinelOne did not respond Thursday morning to The Record's request for comment. The research report said that organizations directly or indirectly involved in the war should be vigilant against the group’s cyberattacks.

      TITLE: A new espionage campaign by a hacking group with suspected ties to Russia spotted targeting Ukraine, Europe, India

      CONTENT: The group, known as Winter Vivern, is “highly creative” and operates with limited resources, carefully selecting targets for attacks, according to an analysis by cybersecurity company SentinelOne. The hackers’ activities appear to support the interests of the Russian and Belarusian governments, especially in relation to the ongoing war in Ukraine, the report says.

      Winter Vivern recently targeted various government agencies and private businesses, including telecom companies supporting Ukraine, SentinelOne said. The list includes Polish government agencies, the foreign ministries of Ukraine and Italy, and individuals in the Indian government.

      It is unclear how successful the group's attacks were and what damage they caused. SentinelOne did not respond Thursday morning to The Record's request for comment.

      The research report said that organizations directly or indirectly involved in the war should be vigilant against the group’s cyberattacks.

      EXCERPT: Russia-aligned ‘Winter Vivern’ APT group spotted targeting Ukraine, Europe, India

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: 16 March, 2023

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Australia’s law, passed in 2021, prodded tech firms to make payments to Australian media reportedly worth about A$200m ($135m) in the scheme’s first year.
    2. News organisations, which in the past two decades have seen most of their advertising revenue disappear online, accuse search engines and social networks of profiting from content that is not theirs.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 18th G20 Heads of State and Government Summit will take place on 9th-10th September 2023 in New Delhi. The Summit will be a culmination of all the G20 processes and meetings held throughout the year among ministers, senior officials, and civil societies. A G20 Leaders’ Declaration will be adopted at the conclusion of the New Delhi Summit, stating Leaders’ commitment towards the priorities discussed and agreed upon during the respective ministerial and working group meetings. 

      The 18th G20 Heads of State and Government Summit is scheduled on 9th-10th September 2023 in New Delhi, India.

      The Summit will culminate all the G20 processes and meetings held throughout the year among ministers, senior officials, and civil societies. A G20 Leaders’ Declaration will be adopted after the New Delhi Summit, stating Leaders’ commitment towards the priorities discussed and agreed upon during the respective ministerial and working group meetings.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Freedom not Fear is being supported by a broad alliance including political parties, professional associations, trade unions and freedom activists and more than 150 organisations that share a common goal.

      The Freedom not Fear 2023 conference is scheduled for 1-4 September 2023 in Brussels, Belgium.

      Freedom not Fear (fnf) is an annual self-organised privacy and digital rights conference. People from all across Europe meet and work towards more freedom in the digitalised world, and plan actions against increasing surveillance and other attacks on civil rights. Freedom not Fear is being supported by a broad alliance, including political parties, professional associations, trade unions, freedom activists, and more than 150 organisations that share a common goal.

      In addition, the event will offer an opportunity to visit the European Parliament and engage in discussions with policymakers at the EU level.

      Please visit the dedicated page for more information about the event.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 18th annual International Workshop on Security (IWSEC 2023) will be held hybrid at the Institute of Information Security, Yokohama, Japan and Online on 29-31 August 2023.

      IWSEC 2023 is organized by ISEC in ESS of IEICE (Technical Committee on Information Security in Engineering Sciences Society of the Institute of Electronics, Information and Communication Engineers).

      Original papers on the research and development of various security topics, case studies, and implementation experiences are solicited for submission to IWSEC 2023.

      Please visit the dedicated page for more information about the event.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The St. Regis Aspen Resort

      The Aspen forum organised by Technology Policy Institute is scheduled on 20-22 August 2023 in Aspen, the USA. TPI Aspen Forum provides a platform for discussing pressing matters, complex policy and economic challenges, and other topics that concern individuals invested in technology policy. Every August, eminent figures from government, industry, and academia convene to deliberate on the lessons learned in the past year and the areas that require attention in the upcoming year. This event caters to individuals passionate about technology policy and troubled by the issues that keep them awake at night.

      Please visit the dedicated page for more information about the forum.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This year, ICCCM is hosted by

      The 11th International Conference on Computer and Communications Management (ICCCM) is scheduled for 4-6 August 2023 in Nagoya, Japan. This year, ICCCM is hosted by the Nagoya Institute of Technology, Japan.

      ICCCM is a forum for engineers and researchers in Computer and Communications Management, providing an opportunity for all to network, share ideas and present their research to a worldwide community. Discussion on the latest innovations, trends, practical concerns and challenges faced in these fields is also encouraged. Featured with invited speeches, oral presentations, poster presentations and social networking event

      Please visit the dedicated page for more information about the agenda and speakers.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. provides a forum for qualified decision-makers, CIOs, CISOs, and CTOs from the government, banking, financial services, healthcare, oil and gas, and other industries to meet and discuss the latest cybersecurity challenges and solutions, as well as learn how to grow their businesses and protect them from potential cyberattacks.

      The 4th annual East African Cybersecurity Congress is scheduled to take place from 24 July to 25 July 2023 in Kampala, Uganda.

      East African Cybersecurity Congress provides a forum for qualified decision-makers, CIOs, CISOs, and CTOs from the government, banking, financial services, healthcare, oil and gas, and other industries to meet and discuss the latest cybersecurity challenges and solutions, as well as learn how to grow their businesses and protect them from potential cyberattacks.

      Please visit the dedicated page for more information about the agenda and speakers.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. IETF Hackathon and IETF Codesprint 

      The annual Internet Engineering Task Force meeting, IETF 116, will be held from 22 until 28 July 2023 in San Francisco, the USA and online.

      The IETF is an Internet standards body that develops open standards through open processes. As a large open international community of network designers, operators, vendors, and researchers, the IETF is concerned with the evolution of the Internet architecture and the smooth operation of the global Internet. The technical work of the IETF is done in working groups, organised by topic into several areas. The IETF holds meetings three times a year.

      The IETF Hackathon and IETF Codesprint will occur on 22 – 23 July 2023. New Participants’ training and technical tutorials take place on 26 March.

      The meeting’s agenda has yet to be released and will be available soon. For more details, please visit the dedicated page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 17th European Summer School on Internet Governance (EuroSSIG) will take place on 16 – 22 July 2023 in Meissen, Germany.

      EuroSSIG aims to help interested individuals (students, academics, representatives of the business sector, and public entities) better understand the global Internet governance ecosystem and get comprehensive and structured knowledge on the various aspects of Internet governance. The academic course covers the political, legal, economic, socio-cultural, technological, and other dimensions of Internet governance.

      The curriculum includes academic lectures, case presentations, and breakout sessions for interactive discussions, as well as a multistakeholder practicum on the following topics: History of Internet governance Internet governance ecosystem Multistakeholder model - how it works Technical regulation and management of the Internet Cyber security and human rights The business dimension of Internet governance Future challenges, perspectives and diplomacy

      Application for a fellowship (full or partly) is possible for fellows from countries of emerging economies until 31st March 2023. Applications from self-paying fellows will be accepted until 31st May 2023.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 9th International Conference on Connected Smart Cities will be held in Porto, Portugal, from July 16-18, 2023.

      The conference will bring together scholars from various disciplines to discuss issues related to the ecosystem of future smart cities, including M2M infrastructure, cloud platforms, big data analytics, mobile applications, citizen needs, user engagement, and new business and economic models. The conference will also focus on smart city applications and services' social, behavioural, technical, economic, and environmental impacts. All types of research, including interdisciplinary studies, are encouraged.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. About Conference Conference series welcome all the participants globally to the upcoming conference “11th Global Summit on Artificial Intelligence and Neural Networks” scheduled on August 17-18, 2023 which will take place in Dublin, Ireland. This conference mainly focuses on the theme “The Next Evolution in Digital Transformation”. Join us at “Neural Networks 2023” with reasonable packages together with each registration and accommodation for 2 days conference includes oral shows, poster shows, workshops, symposiums and special keynote sessions conducted by eminent and illustrious speakers World Health Organization surpass within the field of AI and Neural Networks, register for this conference with the acceptable choices mentioned within the registration page. Target Audience: Researchers and Scientists Professors, Engineers and Students Smart Innovators Architectures Software Developers Data labelling professionals Robotic Technologist Computer vision engineers Defence Research Professionals Artificial Intelligence hardware specialists Data protection specialists Automation Industry Leaders Gaming Professionals Managers & Business Intelligence Experts Advertising and Promotion Agency Executives Why to attend the conference? Artificial Intelligence (AI) guarantees to revolutionize our lives diagnose our health issues, drive our cars and lead United States of America into a replacement future wherever thinking machines do things that we’re nevertheless to imagine. Fields like Neural Networks, Machine Learning, Robotics, organic process Computation, Vision, Speech process, knowledgeable Systems, designing and language process. The conference organizers aim is to collect the researchers, academician’s associate degreed scientists from the sector of Neural Networks and computer science community to form an approach towards a worldwide exchange of knowledge on technological advances, new scientific innovations, and also the effectiveness of varied regulative programs towards computer science.

      The 11th Global Summit on Artificial Intelligence and Neural Networks is scheduled to take place on August 17-18, 2023, in Dublin, Ireland. The conference, under the central theme 'The Next Evolution in Digital Transformation', will explore AI as a cross-cutting topic in other areas, such as AI and Ethics, AI for cybersecurity, and deep learning.

      The conference will include keynote sessions, oral and poster presentations, workshops, and symposiums. The target audience includes researchers, scientists, engineers, students, innovators, architects, software developers, data labelling professionals, robotic technologists, computer vision engineers, and more. The conference aims to bring together experts in the field of AI and Neural Networks to exchange knowledge and discuss technological advances, scientific innovations, and regulatory programs.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tackling online misogyny against politically active women

      TITLE: European Parliament event: Tackling online misogyny against politically active women

      CONTENT: Upcoming event in the European Parliament on technology-facilitated violence against female politicians. It will be live-streamed and is open to the public with previous registration.

      EXCERPT: Upcoming event in the European Parliament on technology-facilitated violence against female politicians

      LINK:https://europeanparliament.webex.com/ec3300/eventcenter/mobile/eventInfoMobile.do?siteurl=europeanparliament&confID=251811284177036414&meetingKey=27409941848&backUrl=%2Fmw3300%2Fwireless%2Fmeetinglist.do%3Fsiteurl%3Deuropeanparliament&t=a&MTID=e9beb898fc496bbba232ecf956e12daf0&rnd=0.3879212664317607&isIPADAsMobile=null&fromModernViewMobile=null

      TOPIC: Content Policy

      DATE: 15/03/2023

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||JovanNj|| ||Katarina_An|| ||anjadjATdiplomacy.edu|| ||VladaR|| This is an intereresting story about style of communication.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 8th IEEE European Symposium on Security and Privacy will be held on July 3-7, 2023, in Delft, Netherlands and is organised by the TU Delft Cybersecurity group.

      The IEEE Symposium on Security and Privacy, established in 1980, has been recognised as the leading platform for sharing advancements in computer security and electronic privacy, as well as for connecting experts and professionals in the industry. Building on top of it, IEEE launched the European Symposium on Security and Privacy (EuroS&P), an annual event held in various European cities.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Geneva , Switzerland

      Intergovernmental Group of Experts on Consumer Protection Law and Policy, the seventh session is scheduled to take place on 03 - 04 July 2023 in Geneva, Switzerland.

      This intergovernmental group was established under the United Nations Guidelines for Consumer Protection to monitor the application and implementation of the guidelines, provide a forum for consultations, produce research and studies, provide technical assistance, undertake voluntary peer reviews, and periodically update the guidelines.

      Deliberations at the seventh session of the Intergovernmental Group of Experts will focus on the following topics: Report on the implementation of the United Nations guidelines for consumer protection by member States and relevant stakeholders. Latest developments in legal and institutional frameworks: UNCTAD world consumer protection map. Reports of the working groups on: Consumer product Consumer protection in electronic Consumer protection Building trust in digital markets through enhanced consumer protection on online Consumer protection and the transition to clean Voluntary peer review of consumer protection law and policy: Review of capacity-building in and technical assistance on consumer protection law and For more information, visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. SERVICES 2023 is solely sponsored by the IEEE Computer Society under the auspice of the Technical Community on Services Computing (TCSVC). The scope of SERVICES 2023 covers all aspects of services computing and applications, current or emerging. Centered around services computing, SERVICES 2023 covers various systems and networking research pertaining to cloud, edge and Internet-of Things (IoT), as well as technologies for intelligent computing, learning, Big Data and blockchain applications, addressing critical issues such as knowledge network, high performance, security, privacy, dependability, trustworthiness, and cost-effectiveness.

      The annual International Conference on Cloud Computing (CLOUD 2023), organised by the Institute of Electrical and Electronics Engineers (IEEE), will be held 2-7 June 2023 in Chicago, USA.

      The event will bring together researchers and industry practitioners to exchange information and experiences on the latest advances in the field of cloud computing, identify emerging research topics, and define the future of cloud computing.

      The event is a part of SERVICES 2023 and is solely sponsored by the IEEE Computer Society under the auspice of the Technical Community on Services Computing (TCSVC). Centred around services computing, SERVICES 2023 covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, Big Data and blockchain applications, addressing critical issues such as knowledge network, high performance, security, privacy, dependability, trustworthiness, and cost-effectiveness.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 35th annual Forum of Incident Response and Security Teams (FIRST) conference will be held on 4-9 June 2023 in Montreal, Canada.

      FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programmes. Annual FIRST conferences promote worldwide coordination and cooperation among Computer Security Incident Response Teams (CSIRTs). The 2023 conference will provide a forum for sharing goals, ideas and information on improving global computer security.

      For more information, please refer to the official web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. EPO and European Commission sign agreement on Unitary Patent

      António Campinos, the President of the European Patent Office, and Thierry Breton, the European Commissioner for Internal Market, have signed a working arrangement in accordance with EU Regulation 1257/2012, Article 14, on European patents with unitary effect.

      The arrangement is designed to foster cooperation and exchange of views between the two institutions, with the aim of maximizing the benefits of the Unitary Patent system and promoting its widespread use.

      The arrangement includes a provision for the EPO and European Commission to share relevant data and information, including insights from surveys and case studies concerning the promotion and use of the Unitary Patent, and to conduct regular meetings to facilitate and support their cooperation activities.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Chicago, Illinois USA

      IEEE WORLD CONGRESS ON SERVICES (SERVICES 2023) is scheduled to take place from 2 to 8 June in Chicago, the USA and online.

      SERVICES 2023 is sponsored by the IEEE Computer Society, focused on services computing and applications. It covers various systems and networking research related to cloud, edge, IoT, intelligent computing, learning, Big Data, and blockchain applications, with an emphasis on critical issues such as security, privacy, trustworthiness, and cost-effectiveness. The event will include papers on the impact of COVID-19 on services and infrastructure, as well as symposia and workshops discussing emerging topics. Additionally, there will be industry presentations and panels.

      For more information, refer to the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 6th edition of The EU-Africa Business Summit is scheduled to take place on 22 June 2023 in Brussels, Belgium and online.

      This year's theme, 'Africa-Europe: Re-energising a Common Future', mindful of the critical role of sustainability and the green transition, will create the opportunity to follow up on the discussions and pursue the mission of promoting and facilitating the dialogue between the EU and African stakeholders.

      European Business Summits organise the event to promote the voices of enterprises in Europe and Africa. In recent years, the Summit has expanded into a leading annual platform where prominent figures from the business world meet high-level policymakers to discuss the current global trends and challenges affecting the EU and Africa.

      For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian court fines Wikipedia over military 'misinformation'

      TITLE: Russian court fines Wikipedia over spreading misinformation

      CONTENT: After Russia invaded Ukraine last year, they introduced new laws restricting what people can report about the conflict. Since then, they have fined or blocked websites that publish information conflicting with the Kremlin's official narrative. The Wikimedia Foundation was fined 2 million roubles ($27,000) by a Russian court after the authorities accused it of failing to delete alleged misinformation about the Russian military from Wikipedia. Wikimedia Foundation was already fined on the same grounds, after it failed to delete two articles related to the war. The organisation may appeal the ruling.

      EXCERPT: The Wikimedia Foundation was fined 2 million roubles ($27,000) by a Russian court after the authorities accused it of failing to delete alleged misinformation about the Russian military from Wikipedia.

      LINK: https://www.reuters.com/technology/russian-court-fines-wikipedia-over-military-misinformation-2023-02-28/

      TOPIC: Fake news

      DATE: 14/03/2023

      COUNTRY:Russia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Luxembourg's annual ICT Spring event is scheduled to take place on June 28th and 29th, 2023.

      The primary aim of ICT Spring is to foster competition and collaboration among European business leaders, startup founders, innovation managers, venture capitalists, and researchers. The event serves as a platform for showcasing startups, emerging companies with disruptive ideas, global technology leaders, and international pavilions.

      This year's main theme is 'Time for Change', while other topics will include: Growing sustainability to catalyse transformation Redefining money in a digital world Hunting down emerging & future cyber threats Pulling the tech levers to sustain digital transformation Reaching new heights by empowering customers Turning Web3 hype into a new reality Embracing AI for a future-proof business Shaping the evolution of healthcare systems through new technologies For more information, please visit the dedicated web page.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Lithuanian Internet providers ordered to block IP addresses that help access Russian TV channels

      Lithuania's Radio and Television Commission has ordered internet providers to block access to IP addresses used to watch Russian TV channels, which have been targeted by European Union (EU) sanctions. The decision was made on 8 March after discussions with internet provider representatives, and following confirmation of their technical ability to comply. Lithuania banned the rebroadcasting and online dissemination of TV and radio channels owned or financed by Russia and Belarus following amendments to the law on public information in 2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. South Korea launches ‘Metaverse Fund’ to expedite domestic initiatives

      South Korea establishes a fund to expand its metaverse sector

      South Korea's Ministry of Science and ICT has announced a new fund, called the Metaverse Fund, to drive metaverse initiatives in the country. The South Korean government has invested 24 billion Korean won ($18.1 million) to create a fund of more than 40 billion Korean won ($30.2 million) towards metaverse development. The fund will support mergers and acquisitions of various firms in the metaverse ecosystem and help domestic metaverse-related companies compete with global players. South Korea sees the metaverse as a new economic growth engine and is actively supporting it. However, the country is also keeping checks and balances on cross-border threats in the physical world, such as cryptocurrency thefts and cyberattacks against specific North Korean groups and individuals.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. multimodal learning i
    2. we want people to ask better questions. We want students to really to dive into their inquiries. We want teachers to deepen their inquiries. And I think only good things can come from people asking better questions, more questions. And I think that's what, both from an ethical perspective in terms of who has access,
    3. about media literacy and critical literacy that scholars and teachers have been doing for a long time.
    4. should we be citing AI generated text?
    5. All the teachers that I spoke with also felt panic initially, but eventually became strong advocates of not ignoring this tool's presence, but rather using it as a jumping off point to their students to engage in a critical dialogue about technology and academic integrity, the role of writing in their own lives,
    6. ChatGPT doesn't have context.
    7. we want to build this classifier to be specific for education and trained on student essays instead of a general classifier.
    8. these classifiers
    9. so burstiness is measured in variance in writing
    10. the initial version uses these ideas of variance in human writing, that in human writing we have creativity, we have short term memory, which spurs bursts in creativity versus this machine writing is pretty constant over time.
    11. The second thing is that there are many, many ways to have an experience with a piece of text and to demonstrate learning about of a piece of text.
    12. "Bring the end of writing as a gatekeeper, a metric for intelligence and a teachable skill."
    13. who suggested using ChatGPT to generate essays that students can then critique and edit themselves. And that way they can practice the skill of editing, which requires an awareness of what good writing, is in a non-judgmental space.
    14. But an AI chat bot won't judge you for making mistakes
    15. suggested chat AI helped that person get started on writing assignments that were so difficult due to the procrastination that so often accompanies that diagnosis.
    16. they're not worried about producing this product on the receiving end.
    17. "As the computers get smarter, people get increasingly stupid."
    18. I really liked Matt's term of unhackable

      ||Jovan|| How to make our exams unhackable?

    19. using ChatGPT as an invitation to maybe think bigger about what assessment should look like.
    20. And he observes that in his years teaching, there's been so much more of an emphasis on testing and testing and testing students. And instead of having a more expansive idea of what education is, it dialogue based? Should it be rooted in students' personal experiences? Should it be more interpersonal?
    21. a lot of data and research that shows that sort of writing, spontaneous, expressive, reflective writing, can actually be really beneficial for students' wellbeing
    22. And Pia said, maybe ChatGPT is letting teachers know that they're asking the wrong questions.
    23. not only does it call into question what kinds of assignments, what are we asking students to perform and produce in schools, but how are we supporting teachers to ask different types of questions themselves?
    24. Is ChatGPT an author? Is it a sounding board? Is it an editor? Is it a conversation partner?
    25. to recognize and validate the experiences and feelings of teachers and professors right now, especially coming out of the tumult that was emergency remote learning in 2020
    26. While some schools have banned the tech outright, others are embracing it as a tool to teach students how to tell the difference between reality and science fiction.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Though experts quelled fears of a wider contagion, the bank’s collapse could have significant ramifications on the startup and tech sectors.

      test w

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It was the Cold-War era spy plane that took the high-resolution photographs – not to mention its pilot’s selfie – that reportedly convinced Washington the Chinese balloon was gathering intelligence and not, as Beijing continues to insist, studying the weather.

      test 2

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A commission politician said the instruction to delete the app was made as a precautionary measure, adding there was no immediate threat to commission staff. But the move indicated a sharp change in tone from the continent.

      this is a test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. An update on our work to tackle human exploitation

      TITLE: TikTok announced a policy update to tackle community safety.

      CONTENT: TikTok announced an update on how they will tackle community safety. Leading social media companies have been accused of enabling criminal networks to misuse online platforms to promote human smuggling or trafficking, and to take advantage of vulnerable people trying to escape conflict and poverty. In this context, Tiktok has put forward proactive steps intended to improve community safety. This means they will adopt a zero-tolerance policy with content that violates human rights. The company said they are working closely with law enforcement agencies to overcome the difficulties that may arise when it comes to putting this policy in practice.

      EXCERPT: Tiktok has put forward proactive steps intended to improve community safety. This means they will adopt a zero-tolerance policy with content that violates human rights.

      LINK: https://newsroom.tiktok.com/en-gb/an-update-on-our-work-to-tackle-human-exploitation

      TOPIC: Content policy

      DATE: 10/03/2023

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. When artificial intelligence software like ChatGPT writes, it considers many options for each word, taking into account the response it has written so far and the question being asked.It assigns a score to each optio

      ||JovanK|| dobra vizuelizacija kako radi algoritam :)

    2. In the end, about 70 percent of the words in the generated text were on the special list — far more than would have been in text written by a person. A detection tool that knew which words were on the special list would be able to tell the difference between generated text and text written by a person.

      ||JovanK|| Kada bismo imali listu specijalnih reci koje algorithm vise forsira, a korisnik ne zna koje su to reci - ne bi znao sta da menja da zavara detektore :)

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL