1. Mar 2022
    1. rage clicks and thrashing mice?

      Imiportant terminology

    2. Mouseflow does funnels. This shows you a visitor’s journey from page to page.

      what is the journey of user at our website?

    3. It displays things like a visitor’s mouse movements, where they click, and how far down the page they scroll.

      What does heatmpa software do?

      • mouse movemnet
      • clicks
      • scrolling
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Dependence on Russian oil, gas and other raw materials weighs heavily geopolitically.

      What is dependence on Russian oil?

    2. we can play the role of mediator.
    3. mobilize ourselves alongside the actors of global security policy in order to find solutions to this terrible conflict
    4. Russia has massively violated the prohibition on the use of force, a principle anchored in international law.
    5. Neutrality does not mean indifference.
    6. s not a dogma, it is a flexible instrument of our foreign policy and our security policy.
    7. The Federal Council therefore adopted the EU sanctions in their entirety.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian threats to hit NATO military aid convoys to Ukraine could drag in the neighbours and lead to major escalation involving Western forces.
    2. the White House is digging in for a long-term conflict to weaken and destabilise Russia, regardless of how ambitious or limited its war objectives.
    3. By demonising Putin as a “war criminal”, Washington made it clear that it will accept no compromise as long as the Russian leader rules over the Kremlin, and is ready to continue the fight against Russia until the last Ukrainian standing, alas.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. that Putin now sees as “akin to a declaration of war”.
    2. Mr Putin may have misjudged Russia’s military capabilities, the effectiveness of the Ukrainian resistance and the scope and speed of the Western response, but one should never underestimate how ruthless great powers can be when they believe they are in dire straits.
    3. Russia demanded a written guarantee that Ukraine would never become a part of NATO and that the alliance remove the military assets it had deployed in eastern Europe since 1997.
    4. the “US-Ukraine Charter on Strategic Partnership”

      to check this document

    5. its root causes
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. If the Communist Party’s objective was to take Chinese tech down a peg and neutralise a perceived rival power centre, it has succeeded in spades.
    2. if Mr Liu’s conciliatory message was intended to signal displeasure with the cac’s recent heavy-handedness, or instead to praise the agency for having done a good job.
    3. The agency declared that the “rectification” of large Chinese technology companies would soon come to a close.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. either an information seeking intent from a user or a fallback intent, perform question answering on a large scale database of documents and then compose a well informed answer. Of course, we are going to keep it open source. That's why we'll be using Haystack and Rasa.
    2. It's hard to anticipate all possible "intents" a future user might have.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. by the United Nations Trust Fund for Human Security,

      What is happening with this Trust Fund?

    2. Human security does not entail the threat or the use of force or coercive measures. Human security does not replace State security;
    3. recognizes the interlinkages between peace, development and human rights, and equally considers civil, political, economic, social and cultural rights;
    4. 3. Agrees that human security is an approach to assist Member States in identifying and addressing widespread and cross-cutting challenges to the survival, livelihood and dignity of their people. Based on this, a common understanding on the notion of human security includes the following: (a) The right of people to live in freedom and dignity, free from poverty and despair. All individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want, with an equal opportunity to enjoy all their rights and fully develop their human potential;

      Definition of human security

           3.         Agrees  that  human  security  is  an  approach  to  assist  Member  States  in  identifying  and  addressing  widespread  and  cross-cutting  challenges  to  the  survival,  livelihood  and  dignity  of  their  people.  Based  on  this,  a  common  understanding  on  the notion of human security includes the following:   (a)    The right of people to live in freedom and dignity, free from poverty and despair. All individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want, with an equal opportunity to enjoy all their rights and fully develop their human potential;
      
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. World Trade Organization

      In the sense that a secure e-commercial environment is important for international e-trade to happen, the JSI on e-commerce can give an important impetus for governments to apply minimal rules when it come to give these assurances to e-shoppers be it regarding consumer protection, privacy protection or others.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. e private sector and technical communities, with their expertise and de facto ownership and control over the majority of infrastructure, services

      Indeed, the private sector makes up for the lack in specialised resources some governments might lack and might supplement government efforts or signal attacks. However, ideally, such efforts would be done by public institutions.

    2. Judicial institutions and law enforcement authorities

      Because of the highly technical nature of cyber attacks and the fact that many of them are perpetrated from abroad, law enforcement agencies and judicial authorities might lack the personnel and resources to effectively prosecute perpetrators. In this sense, a feeling of lawlessness might prevail, especially if cyber attacks are government sponsored.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New Zealand, Hong Kong, Ireland, Luxembourg, and Sweden are the countries or regions with the highest growth in AI hiring from 2016 to 2021
    2. In 2021, China continued to lead the world in the number of AI journal, conference, and repository publications
    3. Despite rising geopolitical tensions, the United States and China had the greatest number of cross-country collaborations in AI publications from 2010 to 2021
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The pandemic further exposed the gender digital divide, showing that women and girls are at a dis-advantage in digital skills,
    2. Inequalities in access to digital technologies have widened inequalities in education during the Covid-19 pandemic, as the reliance on digital technologies for education has grown.
    3. both the potential benefits and potential threats of technol-ogy for children, but the effects are unequal.
    4. Some digital technologies can facilitate illicit eco-nomic transactions and tax evasion, as they allow for anonymity and untraceable transactions.
    5. Examples of these institutional arrangements are open-source platforms for software applications (such as Apache Hadoop, Nginx and Github), accessi-ble by digital and nondigital firms at zero cost. Many firms and developers use Github, an open-source re-pository of tools, software and application programs.

      Importance of open source platform

    6. Digital labour platforms have given rise to an infor-mal labour force, in developed and developing coun-tries, creating new forms of insecurity in the world of work
    7. web-based platforms
    8. Digital labour management is transforming the world of work
    9. in digital social networks can diminish people’s wellbeing.
    10. quantum com-puters have considerable computing power and can revolutionize whole fields that require such power. But they could also be used to crack encryption al-gorithms of internet sites

      Using word 'but' always with technologies.

    11. Digital technologies are altering the dynamics of conflict.
    12. new technolo-gies may serve as digital public goods,
    13. cited technological risks—such as digital inequality, cy-berattacks, data fraud and theft, and concentrated digital power—among the most imminent threats.

      We should include these elements into our risk analysis.

      ||VladaR||||kristinahATdiplomacy.edu||

    14. can also affect agency directly

      here is an interesting aspect of 'agency'

      ||kristinahATdiplomacy.edu||

    15. horizontal inequalities.

      what are horizontal inequalities?

      ||kristinahATdiplomacy.edu||

    16. But efforts remain largely compartmentalized, dealing separately with climate change, biodiversity loss, conflicts, migration, refugees, pandemics and data protection.

      Need to overcome silos.

      ||kristinahATdiplomacy.edu||

    17. Title: “New threats to human security in the Anthropocene: Demanding greater solidarity” | 2022 Special Report on Human security by the UNDP.

      Description:Despite people on average living longer, healthier, and wealthier lives, these advances have not succeeded in increasing people’s sense of security. This is true for countries right across the development spectrum, with perceptions of insecurity worsening most in several high-income countries, even before the Covid-19 pandemic. The report links new threats with the disconnect between people and planet in pursuit of development, arguing that they are deeply entwined with increasing planetary pressure. The report examines a cluster of threats that have shifted to become more prominent in recent years including those from digital technologies, inequalities, conflicts, and the ability of healthcare systems to tackle new challenges like the COVID-19 pandemic.

      Type of Resource: Reports Date:

    18. Figure 1.4 Where human security is higher, trust tends to be higher, regardless of satisfaction with one’s financial situation

      Link between human security and trust.

    19. fewer than 1 in 7 people at the global level feel secure or relatively secure.
    20. not only by meeting basic metabolic needs but also by individual aspi-rations and relative assessments of what people in a community are expected to achieve.
    21. but also from stigma.
    22. Dignity.

      Section on dignity

    23. beliefs are important elements influ-encing people’s choices, values and commitments.
    24. fear, want and dig-nity
    25. a consensus that human security would be considered, “The right of people to live in freedom and dignity, free from poverty and despair. All individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want, with an equal opportunity to enjoy all their rights and fully develop their human potential.”7

      Definition of human security by the United Nations.

    26. Human security is about living free from want, free from fear and free from indignity.
    27. The chapter identifies the neglect of agency as a major blind spot and suggests making agency a central focus of atten-tion for decisionmakers.
    28. gency (the ability to hold values and make commitments, regardless of whether they advance one’s wellbeing, and to act ac-cordingly in making one’s own choices or in partici-pating in collective decisionmaking) lies at the core of this framework (figure 4)
    29. to systematically consider the interdependence across all people and between people and the planet.
    30. Digital technologies can help meet many of the Anthropocene challenges,
    31. It highlighted the close connection among security, de-velopment and the protection and empowerment of individuals and communities.
    32. has neglected our embedded-ness in nature
    33. we confront biodiversity losses and threats to key ecosystems, from tropical forests to the oceans
    34. have produced stark and grow-ing inequalities and destabilizing and dangerous planetary change.
    35. And the HDI, adjusted for Covid-19, had yet to recover about five years of progress, according to new simulations (figure 2
    36. unprecedented heights on the Human Development Index (HDI).
    37. the Anthropocene—a term pro-posed to describe the era in which humans have become central drivers of planetary change, radically altering the earth’s biosphere—people have good reason to feel inse-cure.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Description: The United Nations Development Programme (UNDP) launched last month a Special Report on Human Security. The report, entitled, “New threats to human security in the Anthropocene: Demanding greater solidarity” finds a development conundrum. Despite people on average living longer, healthier, and wealthier lives, these advances have not succeeded in increasing people’s sense of security.

      Date: 17 March 2022 at 14.00 pm Venue: GCSP- Geneva Organisers: GCSP, UNDP

      ||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. UN

      Important but not decisive. Members should draft a binding document as soon as possible but in the end, nations states have the last word.

    2. Single Market

      Does this digital single market includes big data sharing between EU members?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. strategy on the military use of AI

      Is it public? I would love to get a hold on it!

    2. keen to be seen

      I would say that beyond the image, it is also a matter of national interest and even of national security.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. CSIRTs)

      It's worth noting that several countries in the region, particularly those in the Caribbean, have yet to establish and implement national Cyber Security Incident Response Teams (CSIRTs).

    2. GFCE

      The AU GFCE Collaboration project in my view is one notable one that will benefit many Africa nations and drive continental collaboration and information sharing as well as cooperation. I recall last year they were nominated as one of the key projects to be show-cased during the Paris Peace Forum in Nov 2021. More details on this project here:

      https://thegfce.org/auc-gfce-collaboration-enabling-african-countries-to-identify-and-address-their-cyber-capacity-needs/

      It is also interesting to note the many partners GFCE is working with that also have a focus on cyber cooperation and information sharing as well as capacity building such as Bill&Melinda Gates Foundation; CREST; GCA

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russia works on 'Polar Express' project as the shortest link across Euro-Asian land mass. The fiber optic cable will pass 12.650 km around Russian Artic sea coast.

      'Polar Express' aim to support a few priorities of Russia:

      • military activities in Artic space
      • connecting oil/gas industry
      • making the shortest link for time-sensitive communication (e.g. stock-exchagnes).

      Previous Finish project 'Megafon' failed in laying Internet cables across Artic region.

      ||JovanK||

    2. The $1 billion "Arctic Connect" project for a cable linking Helsinki to Tokyo across Russia's north remains on hold.
    3. The cable link, due to be completed in 2026, will pass 12,650 kilometres (7,860 miles) over Russia's long northern coast from the village of Teriberka, on the Barents Sea, to the far eastern port of Vladivostok.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. partnerships among stakeholder

      Cyber crime does not respect borders, so the only way to tackle this threat is through cooperation and collaborative partnerships be it public-private; private-private or public-public partnerships.

      This paper here by ENISA has good content on cyber partnerships and information sharing and analysis centres:<br> https://www.enisa.europa.eu/publications/public-private-partnerships-ppp-cooperative-models/@@download/fullReport

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Figure 2. Terminology in the field of cybersecurity

      Looking at this diagram, it is the first time I am realising how US and Euro-Atlantic approach differ from Russian- China approach.

      As a cybersec professional, ISACA and other cybersecurity bodies and association interestingly describe cyber security risk as a subset of information risk rather than taking the US and Euro-Atlantic Approach.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. multistakeholder deliberation u

      I still have a hard time imagining how this MSH mechanism would function...

    2. appropriate scope of sanctions

      'appropriate' by whose standards?

    3. Annex: Technical Discussion of Internet Governance Sanction Measures

      This is the best part of this document. Very good explanation and reasoning.

    4. disallowance of sanctioned personnel from participation in Internet governance, policymaking, or standardization proceedings.

      This is very interesting. For example, the CoE suspended Russia. However, the difference is that what russia is doing goes against the core mandate of CoE. I wonder how a discussion on suspending Russia/Russia sanctioned personel from the ITU or ISO would go. ||sorina||

    5. HagueMultistakeholder

      I propose to unpack this proposal a little bit.

      There are two parts to this proposal: 1. Whether a website or service should be blocked, and 2. if yes, how to do it.

      1. Whether or not. We need to distinguish between legal obligations imposed by the EU, and other voluntary measures taken by private sector. For instance, in blocking access to RT and Sputnik, companies are not doing this out of the goodness of their hearts, but are fulfilling a legal obligation imposed by the EU. What the proposal is saying is that beyond legal obligation, there needs to be a set of voluntary norms the private sector should follow. Fair enough.

      2. How. The proposal makes the case for non-tech 'sanction', that is, for blocklisting. Simple as that.

    6. open

      What is open is not necessarily participatory as we know well.

    7. minimal,

      Sounds like a very exclusive club :)

    8. new

      Not hooked to the UN?

    9. call us to action in defense of society,

      Which society? The society under attack? The society of humankind (in a Kantian sense) which does not exist yet? The society of states? The society composed by the actors that are part of this so called "Internet commuinity'?

    10. self-interest of our community’s own direct constituents;

      Is this a message to ICANN?

    11. eliberate and make decisions in the face of humanitarian crises

      Facilitate or make decisions? Is it the role of the Internet community to also decide that a crisis characterises a humanitarian crisis? Would they have the capacity to act ad hoc, or when provoked by other actors with the capacity to acknowledge a crisis as humanitarian?

    12. nternet community

      Who or what is this?

    13. has not yet established a process dedicated to this task.

      Let's name one multistakeholder decision-making process in a global scale. Net Mundial? ICANN (privately controled) multistakeholder model? If we do not have one active process to decide on simpler things in a MS way, how can we expect to create one to deal with such controversial and politically sensitive issues?

    14. ransition from national to multistakeholder governance.

      I could contest the narrative of this transition. It seems to me that Internet governance is making its way back. The first IG norms were not created by states. States adopted a hands-off approach. After years of enthusiam with multistakeholderism, there is a view that the state needs to play a much bigger role, not only on regulation (ex. platforms) but also asserting its sovereignty.

    15. facilitate

      Would the mechanism faciliatte (in the sense of providing advice) or actually decide?

    16. anctions

      It really bothers me to associate 'multistakeholder' and 'sanctions'. I know that the word has been used largely lately, but originally sanctions imply authority. What is the source of authority? I am not yet even going on the mine field of asking what the legitimacy is...

    17. a new, minimal, multistakeholder mechanism,

      It is important to start this process/mechanisms as consultation process. However, one should be clear about very serious limitations due to geo-political nature of most of sanction issues.

      Tech community should provide an input especially on the questions of risks for interoperable and integrated Internet. 'Sliding' into geo-politics would be extremely risky for the future of the Internet.

    18. The Hague

      It would be interesting to know if an organization sponsored this initiative, bringing this actors together. Who had the convening power? Is this a spin-off from the GCSC? Certainly, the signatures would indicate so.

    19. the moral imperatives

      It is always risky when we introduce 'moral considerations'. Apart from a few ones such as protection of human life and dignity, many other 'moral imperatives' could be (mis)interpreted diffierently.

      I would be very prudent here and rely on international law which should be - anyway - 'minimum of morality' (UN Charter, Human rights instrumetns).

    20. unintended consequences or collateral damage.

      A very noble and important principle which is difficult to achieve in reality. The reason is that it is difficult to have 'precision sanctions' in highly inter-twined society.

      Most of sanctions work by increasing pressure on society that lead towards 'change of social contract' (population changing elite that cannot deliver on economy and societal stability.

    21. in the face of humanitarian crises.

      It is not only humanitarian crisis. It is security and geo-political crisis with huge ramifications for the future of humanity.

    22. Place for discussion on the multistakeholder internet sanctions proposal ||MariliaM|| ||JovanK|| ||AndrijanaG|| ||sorina|| ||StephanieBP||

    23. whether the IP addresses and domain names of the Russian military and its propaganda organs should be sanctioned

      It is important to clarify if this proposal is only about IP and domains? If so, than the 'norms' for blacklisting exist already for security; problem is propaganda - but one can't set the norms on this so easily (it is about the content, not the IP addresses)

    24. consensus-driven process

      Again this may be well suited for years-long governance processes. When sanctions are imposed, this is done in severe war cases where decisions need to be taken almost instantly.

      One way is to pre-define rules, and be prompt with applications - almost like an alghoritm (smart contracts?). Problem is that each war/conflict has its own context, and assessment of violation of some norms (what norms?) is not streightforward.

      While this entire proposal is legit, it seems irrational/not implementable.

      Maybe a better way /next step is to

      • develop some guidelines in MS fashion
      • develop proposals for assessment and bringing decisions
      • impact governments to, in future, consult with those mechanisms and MS community (while not expecting that MS community will decide) As long as MS community has clearer arguments, govs may be more inclined to listen (at least in the West)
    25. assess violations of international norms

      This is a very hard task: the entire OEWG debate is now about how to assess violations of norms. In this case, we don't talk about only cyber-norms but various political norms, international law, etc as an argument for sanctions - this is not a technical decision (though it could well be multistakeholder)

    26. organization that chooses to subscribe to the principles and their outcome

      Left to the choice of organisations to subscribe and implement - voluntary

    27. anctioned IP addresses and domain nam

      Again, who decides on what is sanctioned? The proposal is not clear on this. That is not a technical issue - implementation may be technical.

    28. imilar in scale to NSP-Sec or Outages,

      These are a very engineering fora. The concept of engineering approach makes sense in implementation (eg. when combating spam and IP blacklists) - but the main question is who decides what blacklists are, and how?

      In security/technology, it is rather clear (you can quantify certain attacks or spam or packets coming from an IP or ASN), but here it is a human and political filter.

      • How do you quantify and measure the malicious impact?
      • Who gets to decide?
    29. responsibility of the global Internet governance community to weigh the costs and risks of sanctions

      This goes well in line with strategic positions of the West. But, will the West (governments) now say 'this goes to far'?

    30. Internet governance community may wish to consider in its deliberative processes

      This sounds legit, but is hardly possible - MS governance takes years to build any mechanisms and decisions; during wars, decisions have to be taken on hourly basis...

    31. It is inappropriate and counterproductive for governments to attempt to compel Internet governance mechanisms to impose sanctions outside of the community’s multistakeholder decision-making process

      Here it explains - and it explains it well, I would say

    32. currently does not easily lend itself to the imposition of sanctions in national conflicts

      Interesting wording 'does not land itself'. Or multistakeholder governance doesn't allow unilateral decisions? or?

    33. Military and propaganda agencies and their information infrastructure are potential targets of sanctions

      Legitimate targets of operations. But, it gets very tricky in digital times to say what is military (as we see cyberattacks for instance running from civilian servers; or sanctions being evaded through other channels) and certainly what is propaganda (it's not just specific broadcasters - and not everything done by those broadcastrs is propaganda (eg some might be fundamental information), but also social media, etc). How to distinguish?

    34. The effectiveness of sanctions should be evaluated relative to predefined goals

      This is a general concern, to what extent sanctions are useful at all in various circumstances. As with every other 'weapon', economic sanctions should follow proportionality and necessity.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The field_value_factor lets us use the value of an indexed field in the document to impact the document's relevance score. For example, if we had blog articles where we tracked the number of "likes" each received, we could use the value of the "likes" field to increase the score of the most popular articles.
    2. Function scoring is Elasticsearch's toolbox of functions that allows us to manipulate relevance scores beyond what we've already looked at. There are many functions, but let's look at a couple of the most useful for dialing in our top 10 list. Note that you can even write your own custom function if none of the predefined ones work for your situation!
    3. constant_score lets you negate the built-in scoring mechanisms (such as those described in our article on scoring in Elasticsearch) for whatever query or filter it wraps. This lets you match documents with particular characteristics, but be able to manually set the score received for matches by using a boost. If you do not add a boost or you use a boost of 1, then documents that match the characteristics will not have their scores affected by the match. If you set a boost higher than 1, then the document's relevance score will be raised accordingly.
    4. The boosting query type lets us use a negative boost to downgrade documents where certain terms are matched that we believe will cause the document to less relevant. For example, someone searching for "pumps" in a catalog might mean the tool, not the women's shoe. We could use a boosting query to retrieve all documents where there was a match for "pumps", but then give a negative boost to the ones containing terms like "shoes" or "heels".
    5. When using a query type that is looking for matches in more than one field, you can boost the weight of matches found in specific fields. For example, you can specify a field boost of 2 for the "title" field to indicate that matches found in the title are always twice as relevant as matches from other fields.
    6. Beyond the built-in mechanisms, there are tools we can choose to apply at query time to affect a document's relevance score.
    7. boolean query types take the hierarchical structure of the query and the number of conditionals into consideration when calculating the relevance score for matched documents. For the dismax query type, additionally the combination of term-field matches will impact the relevancy score. So, depending on the query type you choose and how you structure it, the Practical Scoring Function will be applied somewhat differently
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. How do you combat the sharding effect? There are a couple different ways. Document routing: You can use document routing to make sure documents from a single index all go to the same shard by using the value of a specified field. This assumes that your searches will be performed against a single index or on multiple indexes that live on the same shard. You'll want to use the routing field in your search request as well as at index time. Search type: Search type lets you specify an order of events you want the search to perform. For this situation the "dfs_query_then_fetch" will solve our problem. It will query all the shards to get the frequencies distributed across them, then perform the calculations on the matching documents.
    2. Compose Elasticsearch deployments include 5 shards automatically. When we indexed our documents, we didn't make any specification about how sharding should be applied so the documents got doled out evenly across each of the shards - 50 documents on each of our 5 shards = 250 documents.
    3. All else being equal, a document found on a shard with more total documents would be scored lower than a document on a shard with less total documents. A document found on a shard with more additional matching documents would be scored lower than one found on a shard with lower or no additional matching documents. Not so good.
    4. We actually have two sets of details - one for the query weight and one for the field weight
    5. Note that term frequency, inverse document frequency, and field-length normalization are stored for each document at index time.
    6. It can also be used to boost a particular index if you're searching across multiple indexes and want one to have more importance
    7. Query boosting allows us to indicate that some part(s) of the query should be more important than other parts.

      Deluje vazno!

    8. Query boost: This is a percentage or absolute number that can be used to boost any query clause at query time.
    9. Index boost: This is a percentage or absolute number used to boost any field at index time.
    10. Query normalization is used so that different queries can be compared. For any individual query, however, it uses the same score for every document (effectively negating its impact within an individual query)

      ne utice na scoring unutar querija

      Sluzi da bi skorovi razlicitih querija bili uporedivi

    11. Query normalization (queryNorm): This is typically the sum of squared weights for the terms in the query.
    12. For field length normailization, a term match found in a field with a low number of total terms is going to be more important than a match found in a field with a large number of terms.
    13. Field length normalization (norm): This is the inverse square root of the number of terms in the field:
    14. Like term frequency, coordination can be turned off, but that is typically only done when the terms are synonymous with each other (and therefore, having more than one of them does not increase relevancy). A better way to handle that situation, though, is to populate a synonym file to handle synonyms automatically.
    15. Coordination (coord): Counts the number of terms from the query that appear in the document.
    16. Inverse document frequency (idf): This is one plus the natural log (as in "logarithm", not "log file") of the documents in the index divided by the number of documents that contain the term
    17. Term frequency clearly assumes that the more times a term appears in a document, the higher its relevancy should be.
    18. Term frequency (tf): This is the square root of the number of times the term appears in the field of a document:
    19. it uses Lucene's Practical Scoring Function. This is a similarity model based on Term Frequency (tf) and Inverse Document Frequency (idf) that also uses the Vector Space Model (vsm) for multi-term queries.
    20. For example, a user searching on "apple" could mean the company or the fruit, but matches may occur on documents for both the company and for the fruit.

      ES ne hvata kontekst. Weaviate bi trebalo da hvata i kontekst ||anjadjATdiplomacy.edu||

    21. Before Elasticsearch starts scoring documents, it first reduces the candidate documents down by applying a boolean test - does the document match the query?
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Local loop
    2. What are the most important points surrounding 5G?

      Reflecting on this, one of the critical points in my view would be: improved speed; better latency performance; increased potential for IoT; economic transformation where there is increased adoption of 5G. On the flip side, 5G technology may prove expensive for developing countries and may pose a potential dependency risk on private entities that provide the capability. In addition, security risk is likely to increase as a result of interconnectedness and possible impact of a single point of failure within the chain. There is likely to be a push by different regions to identify and propose even through regulation list of trusted partners based on fears or concerns at a national or regional level informed by geo political tensions among others.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. shift of government sites to RusNet.

      The RusNet is not a new concept and from the reading on the internet, seems the conversation began in 2015. The actions taken against Russia if perceived to be cutting them off the Internet may very well accelerate growth and prioritisation of Rusnet.

      Russia actually wouldn't be the first country to have their own internet - China does. In such times, it is very possible for countries to make a call to have their own internet in anticipation of actions that would cut them off the internet and to avoid dependence on a few providers who may not necessarily demonstrate neutrality when there are political tensions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. There's an expression: "You can fool people some of the time, but not all the people all of the time!"

      In this sense PD is a long term effort while propaganda can be useful but it´s not the base for a long term relationship, and it can also harm this possibility

    2. hiding real interests

      and manipulating others for a short term purpose. PD, as part of diplomacy, is on my view about building strong and sustainable relationships, which by definition entail understading and respecting each others points of vews and trying to find /build common ground based on mutual trust. In contrast, I understand propaganda as towards obtaining a specific result/ action from the other, not necessarily based on mutual trust and understanding but on imposing a certain interpretation/view as the correct and only one.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. principle of net neutrality

      If no one really “owns the internet” and is an open platform for transmission of information, there is no right or wrong to monetisation efforts.

      This speaks to a fundamental question of “perspective”

    2. The proposed model is expected to be subject to a multistakeholder review and eventually adopted through community-driven consensus.
    3. Is net neutrality an issue in your region?

      Definitely. In the EU, the Open Internet Regulation (Regulation (EU) 2015/2120) addresses these topics. ISPs are prohibited from blocking or slowing down of internet traffic, except with some specific exceptions.

    4. no written rules are in place for how the RSS is governed

      This is interesting for I would think they are subject to local regulations from the countries where the root servers are physically placed.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. telecommunications infrastructure (bottom) or the physical layer through which internet traffic flows.

      This is the key IG issue that is source of much geopolitics

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. What is an algorithm?

      It is a structured language for a specific purpose which feeds on mathematical knowledge.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It is the way we are developing human super intelligence, capable of creating super artificial intelligence.

    2. Some authors make reference to a potential third type of AI, an artificial super intelligence, which will not mimic human skills, but present ‘an intellect that is much smarter than the best human brains in practically every field, including scientific creativity, general wisdom and social skills’ (Bostrom, 2008). Some of the concerns about the future of humanity in relation to AI, such as those voiced by Tesla founder Elon Musk, are based on the idea of artificial super intelligence. Nevertheless, there is a lot of disagreement about how likely it is that current human intelligence can be surpassed or even matched.
    3. I completely differ from Vint Cerf, there can not be an artificial idiot, it would be erratic to mention it that way, because the creation of artificial intelligence is derived from human intelligence which designs and models algorithms with specific functions, being human intelligence who develops it, it can not be artificial idiot, otherwise humans would be from origin.

    4. What do you think about Cerf’s statement? Would you like to adopt the phrase ‘artificial idiot’ to describe AI?
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Is there a definition of AI that you prefer? Are you aware of any definitions used by individuals or organisations that are very different from the ones we have mentioned?

      Artificial intelligence is a tool made up of a structured mathematical language that is fed by constant processes and analysis to predict actions.

      Ph.D. Hugo Isaak

    2. Whichever definition you adopt, it is important to keep three things in mind. AI is (a) a moving target, (b) a suitcase or umbrella term for various aspects of computer science, and (c) a general-purpose technology.

      I would also add a methodology for habitat with strategic urban planning.

    3. AI is ‘the scientific study of the computational principles behind thought and intelligent behaviour’ (Skilton & Hovsepian, 2018, p. 80).

      It is neither the beginning nor the end, it is the beginning of the revolution of life.

    4. It is necessary to point out that the concept of artificial intelligence comes from the first civilizations, from my knowledge and analysis, AI has accompanied us all the time, because every invention, every tool developed to solve needs and problems is part of the applied artificial intelligence, today we coin it to the digital era and the algorithms that are designed for certain purposes, therefore, the concept should be, artificial intelligence is the set of tools that have evolved with the human being through time and that today are adapted to the digital era.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. in standards-intensive areas such as for AI, cybersecurity, data, portability and IoT.”
    2. “A new High-Level Forum

      Hi Sorina. Shall we focus on this Forum.

      ||sorina||

    3. Breton pointed to the example of Galileo, the EU-sponsored navigation system that applied to the European Telecommunications Standards Institute (ETSI) to access smartphone applications. However, the application was rejected “due to influence from other players.”
    4. identifying strategic areas for the EU agenda on the green and digital transitions, with chips certification and data standards explicitly mentioned as cases in point.
    5. that position has been challenged by American and Chinese companies, which have taken over the majority of votes even inside European standardisation organisations.
    6. Global Digital Foundation

      What is this foundation ||minam||

    7. to put standards at the heart of European economic success and societal progress,”
    8. can entail prohibitive costs, regulators worldwide have increasingly looked at the strategic nature of the standard-setting process.
    9. Industry standards allow companies to reduce the compliance costs with legislative requirements, for example, Wi-Fi frequencies, and enable the interoperability of products and services, such as the USB ports for laptops and charges.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. policy controversies occur among ITU member states

      What are the general lines of arguments of the ITU's member states in these policy controversies?

    2. liberalising telecommunications

      It is interesting that this liberalization has taken different forms in different parts of the world. In Europe it is interesting that it lead to a fractionalization of the market (i.e. looking at the number of mobile phone operators in Europe vs. the number of phone operators in the U.S.).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. our time

      Keynes predicted in the 1930s that we'd cut down our hours to 15 hours a week to spend more time on leisure but I think our standards and philosophies have changed to one that centralises work. Having a good job, contributing to your family, etc. So i think many will still seek for forms of work to feel valued in their environments. However, to be replaced by machinery may hurt our pride, sense of purpose and confidence and affect our ability to reskill

    2. news outlet
    3. media

      I find it difficult to assess since I'm interested in the topic and more knowledgeable about how I can find it (both in terms of platform and content), so I'm more drawn to the places where they would talk about it, so i would argue on my part that in the EU there is talk about AI, especially in regards to the AI Act.

    4. affect the lives

      I think that currently there has been a strong presence when it comes to search engines and social media that directly impact the way we have been engaging in democracy, but we can also see it featured in cars which can park themselves. While we many not always realise it is lead by AI, it has started becoming a component in our daily lives that change the way we interact with our surroundings

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. divisive figure

      Philippine President Rodrigo Duterte is an interesting case, as despite having a negative image abroad due to his statements on drug killings, rape, and the like, he still maintains significant domestic popularity.

    2. whole-of-government activity

      The challenge is how do you sustain a strategy once a new government, with different priorities and agenda, comes in. This is why PD, despite ideally being a government led approach, should involve non-state actors in order to create a cohesive strategy and be realistic to the approaches to be considered. Ideally, a country's approach to PD should be grounded on reality and common identity, versus a particular policy action in order to have an effective PD strategy.

    3. geared towards Indian citizens

      This is also the challenge with Philippine public diplomacy, as social media use is mostly geared towards the diaspora. This can be attributed to the large presence of Filipinos vs the audience in foreign countries on social media.

    4. relationship building

      It's important that strong foundations are built in order to advance public diplomacy and communications objectives. First impressions and perceptions make a lasting impact and can either positively or negatively affect the reputation that you're trying to either build or reinforce.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. There were many views as to how long the transition from IPv4 to IPv6 would take, from an optimistic six-month rapid cutover to a hopelessly pessimistic view of a protracted ten-year transition.

      ||VladaR|| Here is an interesting system.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A.Knowledge reuse and retention

      Here is an important reveiw of the UN knowledge and reuse and retention policy.

      ||JovanK||

    2. Figure1-Data, information, knowledge: conceptual differences

      How to manage this hierarchy of data-information-knowledge

    3. establish norms and procedures for the retention and transfer of knowledge
    4. knowledge management skills and knowledge-sharingabilities in their respective staff performance appraisal systems

      It is important action.

    5. should develop knowledge management strategiesand policies
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. watching for

      An interesting development, not necessarily related to the infrastructure as such, is the development of human resources management.

      With could based services and new service solutions, it is harder and harder to approach the developments inside companies on an exclusive "IT team" basis. The tasks (both on developer and user sides) become more complex and demand engineers, developers and experts work together in order to make sure the service addresses the needs of the users (either in-house solution or a solution the company is selling).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Severing ties with Russian network operators could still degrade data-intensive video services. Cogent generates a large share of its revenue by moving data for streaming-video customers like Netflix Inc.