1. Feb 2022
    1. Greater access to data and improved data flows can also warrant greater supply chain transparency, traceability, and ultimately, a more resilient trade of goods and services.

      I am not sure this is correct. My experience is that there is no so direct link between two concepts

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. without clearly defined rules of the road for such interactions.

      Second generation of SpaceX constellations increases risk for satellite collision. In the letter to the US Federal Communication Commission NASA and NSF outline risks and call for 'defined rules of the road' for space traffic.

      ||sorina||||nikolabATdiplomacy.edu||

    2. without clearly defined rules of the road for such interactions.
    3. the safety of the International Space Station (ISS)
    4. ~25,000 total objects

      Total number of objects in orbit.

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Flexible Funding

      ||TerezaHorejsova||||PatrickB|| In our discussion with EDA and Malta, we should focus more on (un)earmarked funding and flexibility for development.

      Do we have any unearmarked funding (including SDC)?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Keyword Difficulty

      how to integrate keyword cifficult via Semrush API

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The analysis is triggered by the EU's new Chips Act that we shoudl analyse. In brief the article autliens strenghts of EU in microchips supply chain such as Dutch company ASML.

      Europe will invest heavily in mega fabs (spaces for production of microchips). It will also try to bring to Europe TSMC, Intel and other manufacturers. It remains to be seen how it will work.

      ||VladaR||

    2. of “mega fabs”
    3. the European Commission wants to relax state-aid rules to let member states subsidise such fabs “up to 100% of a proven funding gap” if they are “first-of-a-kind” or would “otherwise not exist in Europe”.
    4. Europe’s firms also make many of the machines that make fabs tick. ASML, a Dutch firm with a market value of €230bn, is the sole global supplier of the lithographic equipment without which fabs cannot etch the most advanced processors. Only Nvidia, an American chip-designer, and Taiwan Semiconductor Manufacturing Company (TSMC), the world’s biggest contract manufacturer of chips, are worth more. An array of smaller European outfits enjoy dominant positions in the complex chipmaking supply chain. Carl Zeiss SMT makes lenses for ASML’s lithography machines (and is co-owned by it). Siltronic manufactures silicon wafers onto which chips are etched. Aixtron manufactures specialised gear to deposit layers of chemicals onto those wafers to make circuits.

      These are strenghts of Eurpean Chips industry

    5. One of the industry’s main brain trusts, the Interuniversity Microelectronics Centre (better known as IMEC), is based in Belgium.
    6. but as a global ecosystem of thousands of companies.

      ||VladaR|| It is important to stress and explore always.

    7. the EU’s new Chips Act, unveiled on February 8th,

      to follow it.

    8. The aim was to double the share of microchips made in Europe to 20% of the global total by 2020. Nearly a decade later it remains stubbornly stuck at 10%.

      Always good to check numbers and predictions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A state-linked newspaper called him the party’s “number one adviser”.
    2. that China practises true democracy, that America’s is a sham and that American power is fading.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. There are about 41,000 nuns in America, down from 160,000 half a century ago.

      Huge drop in the number of nuns.

    2. They have more than 155,000 followers on TikTok, a social-media app.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the chief digital and artificial intelligence officer, or CDAO, is charged with making sure DOD supports such an enterprise. John Sherman, DOD chief information officer,

      change of langauge from Chief information officer (CIO) to Chief digital and artificial intelligence officer.

      ||VladaR||||aleksandarsATdiplomacy.edu||||ljupcogATdiplomacy.edu||||JovanNj||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||VladaR|| This is interesting for encryption.

      They are preparing encryption for post-quantum era. Thus, we may use this advance encryption algorithms even before quantum computing emerges. There is some intersting langauge to be followed such as

      Q-day (moment of arrival of quantum computing) Quantum Internet

    2. If all goes to plan, the Internet will be well into its post-quantum era by the time computing enters its quantum era. This post-quantum Internet could some day be followed, confusingly, by a quantum Internet — meaning a network that uses the principles of quantum physics to make information exchange hacker-proof.
    3. will be hybrid, using post-quantum technology for added security on top of existing systems. Vadim Lyubashevsky, a computer scientist at IBM in Zurich, Switzerland,
    4. “Everybody is pretty confident that once NIST and IETF specify new standards, we’ll be able to roll them out pretty quickly.”
    5. Both Cloudflare and Google — often in cooperation — have started running real-life tests of some post-quantum algorithms by including them in some beta versions of the Chrome browser and in server software. Testing is crucial because, for Internet communications to go smoothly, it is not enough to have perfectly compatible servers and browsers. To connect them, data must also run through network devices that might block traffic that they flag as unusual because of its unfamiliar encryption protocols. (These systems can be used to prevent hacking or stop users accessing prohibited content.) Antivirus software could cause similar problems. The issues also exist “on a broader, Internet-wide scale, in some countries that keep track of what users are doing”, says Sullivan. Network-security workers refer to these issues as ‘protocol ossification’, he says; it has already complicated the transition from RSA, and might disrupt the roll-out of quantum-secure algorithms, too.
    6. Shor, then at AT&T Bell Laboratories in Murray Hill, New Jersey, laid the groundwork for those algorithms’ demise
    7. In 2018, the Internet Engineering Task Force (IETF), a consensus-based virtual organization that steers the adoption of security standards on a global scale, endorsed another public-key system to replace it. That system is called elliptic-curve cryptography, because its mathematics grew out of a branch of nineteenth-century geometry that studies objects called elliptic curves.

      ||VladaR|| Nisam znao da su odustali od RSA. Zanimljivo

    8. RSA,
    9. Someone who wants to receive confidential messages can announce their public key to the world, say, by printing it in a newspaper. Anyone can use the public key to scramble their message and share it openly. Only the receiver knows the private key, enabling them to unscramble the information and read it.
    10. quantum-resistant crypto,
    11. then publish official versions of those algorithms.

      Again 'open source'

    12. Q-day

      Q-day is new lingo

    13. If they reach their full scale, quantum computers would crack current encryption algorithms exponentially faster than even the best non-quantum machines can. “A real quantum computer would be extremely dangerous,” s
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Web3—the latest Silicon Valley buzzword

      ||VladaR|| Odslusaj ovaj podcast, mada sam provalio sta oni rade. Napisu prethodne nedelje tekst koji objave u novinama i onda naprave podcast sledece nedelje. Tako da je uglavnom ponavljanje iz prethodnog clanka

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Geomagnetic storm can affect sattelites and create space-waste. Here is an example about the SpaceX satellites.

      ||nikolabATdiplomacy.edu|| possible box to be used on the website or info for course.

    2. It is the same kind of mechanism that creates aurorae like the Northern Lights, but it can have dangerous effects too.
    3. but can be used in places where wired connections cannot.
    4. a geomagnetic storm

      What is a geomagnetic storm?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Early inter

      These line breaks are very ugly and only appear in this section. With apologies, I am going to try to remove them.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Figure 3. IG paradigm

      priority change of image

    2. it has been argued

      link doesn't work. check.

    3. hypertext

      changing to textus, and testing annotations. Question for Andrej: What exactly does 'public' mean here? do we need to (maybe Nadja and Dragana do in the orientation docs, I cannot remember) is it 'public to the internet' or 'public to the classroom'? It's wonderful to have both options, because it means I can make private 'notes to self'. But we have to make sure this is clear (if it is not already). Also checking/confirming that I can delete an annotation.

      I have confirmed that I can edit or delete the annotation, and that it is clear to the user how to do it. I just never looked before. I absolutely LOVE the Preview option and the formatting assist, which I always wished we had on our LMS.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The term cyber is mostly used at an international level when discussing issues related to security and confidence-building, while digital has a broader social, economic and political dimension

      Useful clarification on the use of prefixes in diplomatic context. https://www.diplomacy.edu/blog/different-prefixes-same-meaning-cyber-digital-net-online-virtual-e/

    2. Promoting digital governance will play a key role. This represents an important area of digital foreign policy and will allow for the creation of common rules in the digital space and strengthen both institutions and cooperation mecha-nisms.

      Useful clarity: Digital governance is about creating common rules for governing digital space (privacy, security).

      Digital foreign policy is a way to develop digital governance.

    3. more a continuation of Switzerland’s proven approach to protecting its interests and promoting its values in a new ‘space’.

      adding digital layer to existing foreign policy

    4. The global COVID-19 crisis has highlighted that while new digital technologies can help us better understand and contain the spread of a pandemic, for example through the use of digital contact tracing, and while they underscore the importance of issues relating to technical standardisation and cross-border cooperation, these technologies also raise a number of questions, for example about application security and data protection.

      Balancing formulation: possibilities/chances vs risks/dangerous

      It is more on side of possibilities

      !check-balances

    5. GESDA is currently in its 36-month pilot phase and is focusing on the development of an academic and a diplomatic forum that should ensure mutual exchanges between the different subject areas

      This is important issue

    6. the UNDP is a partner within the framework of the Core Government Functions programme (promotion of e-governance as a means of achieving better governance) as well as the fintech dialogue programme.
    7. Fintech dialogue platform (Geneva)
    8. Fintech dialogue platform (Geneva)
    9. A gender gap is emerging particularly in the least developed countries but also in middle-income nations: compared to men, 43% fewer women in the least developed countries have access to the internet.
    10. promoting the use of technology in the economy (in order to bridge the gender-specific digital divide, it primarily supports female entrepreneurs)
    11. There are two aspects to the role of digitalisation in government. At one level it is a work tool and a means of simplifying processes, for example in consular services or IT applications. But digitalisation is now also a foreign policy matter, raising a number of important questions.
    12. Digital data and applications are driving development-related and humanitarian innovation across the globe. This focuses on the benefits for people and their needs in order to achieve the goals set out in the IC Strategy 2021–24 and the 2030 Agenda. The FDFA’s commitment to exploiting the full potential of new technologies in combating poverty is brought together in its Tech4Good approach.
    13. digitalisation described the technical process for converting analogue information into digital formats. This is now referred to as digitisation. Continual technological devel-opments have resulted in structural changes, new applications and systems, for example the creation of networks or the use of AI. Nowadays, the term digitalisation spans all of these developments, including opportunities for use as well as their social, economic and political impact, for example.

      This framework definition requires more specific elements.

    14. Switzerland intends to further raise its profile by facilitating the creation of secure, reliable data storage and through the Humani-tarian Data and Trust Initiative aimed at data responsibility in humanitarian action.

      Protection of data raised in relevance with the latest breach of ICRC data. Next step is to protect data from technical and legal perspectives.

    15. Cross-border data flows and digital trade

      Data is central for negotiations of e-commerce rules at WTO. One can expect tensions between various uses and regulations of data from public to commercial and personal data.

    16. Harmonised international rules, for example on cross-border data flows, play a key role in ensuring that these supply chains operate smoothly and that goods and services are traded with as little discrimination as possible.
    1. Cross-sectoral approaches
    2. Technological innovation, digitalisation and automation bring unprecedented opportunities. However, if the right framework conditions are not in place, they also present significant risks: surveillance that violates civil and political rights, manipulation of public opinion, cyberattacks, dependence on foreign tech monopolies, deindustrialisation, unemployment and growing inequality.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. inability to ensure the security of the population and provide basic public services, alongside its failure to establish mutually constructive relations with the country’s citizens.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyber hygiene
    2. Affordability measures the cost of connectivity relative to local income.
    3. uch as open radio access networks (open RAN)
    4. internet bandwidth, network coverage, and telecom market dynamics
    5. The term “emerging technology’’ encompasses artificial intelligence (AI), Internet of Things (IoT), blockchain, 5G and other new technologies.
    6. s gender, race, ethnicity, disability, economic status, geography, sexual orientation, language, refugee status, and age
    1. detailed data and metadata on past and on-going projects, initiatives, stakeholders, outcomes, standards, lessons learnt, and knowledge in digital health are only captured in a fragmented manner.

      it is cross-cutting problem in many fields. There are three practical steps that should increase interoperability and use of data:

      • taxonomies which will create knowledge cohesion across different systems and databases by using shared terminology (keywords and concepts).
      • technical standards for sharing data across different platforms and datasets (to focus on the work of international standardisation organisations in Geneva - ISO, ITU, IEC).
      • privacy enhancing technology for using sensitive data for public good research (pilot project with the UN Statistics).
    2. an open-source software that seeks to provide a comprehensive sys-tem linking patient, provider and payer data.

      Open source is gaining renewed relevance due to digital geopolitics: https://circleid.com/posts/20220126-why-aopena-may-become-the-keyword-of-the-digital-world-in-2022

      SDC can renew efforts for strengthening 'open' approach in their development activities.

    3. into actionable insights to enhance effective governance and coordination.

      It is one platform that provides actionable insights from data https://datasandbox.diplomacy.edu/

    4. the SDC commissioned a study, with a view to mapping and assessing Swiss and in-ternational initiatives on technologies for health and health system strengthening.

      Is this study available?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. I'm somewhat puzzled about the author's use of the term "Maori" as a catch-all term for a highly complex community with different identities and interests.

      The Maoris in the towns are not the same as those in the rural iwis. The Maoris in the Southern island differ from those in the North. And during the Musket Wars in the XIXth century, a large sector of the Maori population remained neutral or favored n accommodating line.

      Interestingly, the article fails to mention to latest kerkuffle over Matauranga Maori. Traditional Maori knowledge is to be taught as "science," which of course is not. This goes beyond land and land use issues and to the core of what a society is.

      So, I'm rather at a loss as to what to make of the text.

    2. Māori might be the ‘luckiest’ Indigenous people – but that’s not down to New Zealand exceptionalism

      On Maori and New Zealand.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “That first airplane didn’t have any transportation advantages,” says Ahn, “but it eventually changed the world.”
    2. Quantum computers manage data in the form of qubits. Coupled together using the quantum physics phenomenon called entanglement, qubits can influence each other at a distance.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. funds from European lenders would be extended on commercial terms
    2. a new approach based on ‘soft’ assets, very much stepping on the EU’s toes and their €300 billion worldwide connectivity strategy,”

      Digital will be in the gist of China-EU competition in Africa.

    3. “One can be cautiously optimistic,” Moore said, but pointed out that recently described the EU’s Global Gateway as largely “a mixture of existing commitments, loan guarantees and heroic assumptions about the ability of the club to ‘crowd in’ private investment rather than actual new spending”.
    4. Chinese lenders have become more cautious – especially over mega infrastructure projects.
    5. He said Spain wanted to see more projects in North Africa, the Germans doubted that all the projects were carefully thought through, while Hungary, Finland and Portugal pointed out that they first had to budget for the additional development projects.

      Divergent position on the support for Africa.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This is a solid and comprehensive analysis of German 'value-based foreign policy' and positioning towards China, USA, and EU.

      I also learned a lot about complexity of German government.

      ||kat_hone|| ||Pavlina||||TerezaHorejsova|| For our work with Germany and KAS it would be interesting to see how these priorities will be translated into

      • Geneva environment (focus on rule-based international order)
      • Digital diplomacy

      ||sorina||||VladaR||

    2. essential for the shared goal of maintaining the international rules-based order.
    3. Transatlantic coordination on China (another declared goal of the new German government) adds an additional layer of complexity
    4. Greece and Lithuania are both members of the EU and they follow a very different approach toward the PRC
    5. In the area of targeted sanctions over human rights violations, more transatlantic cooperation appears highly realistic
    6. In the United States, the rise of China seems to be perceived as an existential threat to the Western way of life. From a European perspective, China is rather discussed as a substantial challenge for the future structure of the international order.

      An interesting difference in perceiving 'China threat' in USA and Europe

      ||kat_hone||

    7. will most likely apply value-based foreign policy by putting more emphasis on upholding international norms, multilateral cooperation, and defending the rule of law within those international institutions.
    8. a “value-based foreign policy”

      What does 'value-based foreign policy' means for Germany?

      It will be interesting to see what it will mean in digital realm.

      ||kat_hone||

    9. the Foreign Office would need to transform into a facilitating platform and assume the role of strategic mediator between the various ministries.

      This will be increasingly the role of many diplomatic services.

      ||kat_hone||

    10. the Federal Ministry of Economics and Climate Action has a more cooperative approach toward the PRC than the Ministry of Interior, which views China increasingly through the lens of a hybrid threat.

      ||sorina||||TerezaHorejsova|| This provides an explanation why this ministry was initially 'worried' about our study as they thought that it was 'China bashing'

    11. If the minister of foreign affairs aspires to play a central role in German China policy, in-depth reform of the Federal Foreign Office would need to be implemented first. For instance, steps to make the Federal Foreign Office fit for dealing with China could include the following: First, generating and nurturing China specialists, including appointing external special advisers (in a long-term, not only ad-hoc, capacity). Currently, the Federal Foreign Office primarily relies on generalists and a lot of knowledge gets lost due to the rotation principle. Second, the ministry would need to expand financial and personal resources. The workload for German diplomats has increased significantly over the past years, while the necessary means to face those challenges remain limited. The ministry could also, third, introduce a more strategic outlook for the Federal Foreign Office altogether and, fourth, create a special representative for China who coordinates all China-related activities in the federal government and directly reports to the foreign minister.

      How can German diplomacy develop Chinese plicy?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A new report by The Scientific Technical Center of Roskomnadzor, Russian digital regulator, warns about misuses of emerging metaverse technologies.

      The balance of the report is more on 'threat' than opportunities provided by metaverse.

      ||AndrijanaG|| It would be interesting to get ore details about this report (e.g. summary or version in English). ||VladaR||

    2. an overview of its possibilities, including the growth of new marketplaces, such as an increased demand for video games and online forms of entertainment.
    3. “The transformation of perception on account of being located in the metaverse will have a meaningful cultural effect on society and will change social behavior, including reducing the importance of moral and ethical norms due to the use of a virtual avatar.” They warn that this could particularly affect children, “the most vulnerable group in the new metaverse.”
    4. could lend itself to illegal transactions conducted in cryptocurrency, including trade between people of different nationalities that could violate border regulations.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. India is a veritable lighthouse of knowledge and ideas, which can and will make a difference.
    2. The upcoming collaboration between the Observer Research Foundation and India’s Foreign Service Institute to design and run a programme on new economic diplomacy signals the growing importance of this emerging discipline. Over the years, it is expected to build significant capacity amongst young Indian and foreign diplomats to engage effectively with these issues in the context of both bilateral and multilateral platforms.

      No CUTS involvement?

    3. If data is the new oil, clear and transparent domestic laws and institutions must be developed to inspire confidence in India as a safe destination for data processing.
    4. Protectionist trends are on the rise, and there is a preference for bilateral over multilateral trade arrangements.
    5. The original ITEC programme was expanded to provide 12,000 fully funded training slots in courses ranging from cybersecurity and climate change to entrepreneurship and education.
    6. India’s aid programmes did not translate into any distinct economic benefits for the country.
    7. the Indian Technical and Economic Cooperation Programme (ITEC).
    8. promoting national trade, investment and technology interests
    9. Foreign assistance programmes were added as an afterthought to the principal objective of pursuing commercial goals.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “In the history of the Mongol diplomacy, Mongolia now has the highest number of female ambassadors, six out of 31 ambassadors.”

      Mongolia has been culturally and historically male-dominated society. It started changing in public sphere.

      Even in military field, Mongolia has more and more women including parts of U.N. peacekeeping missions.

      There are more and more women in diplomacy. With the latest appointments 6 or 31 Mongolian ambassadors are women.

      Mongolian government declared gender equality as high national priority.

    2. “In the history of the Mongol diplomacy, Mongolia now has the highest number of female ambassadors, six out of 31 ambassadors.”
    3. Gerelmaa Davaasuren was appointed as the ambassador to Switzerland.
    4. As a result, women began to take initiatives to boost their presence in government service, such as holding diplomatic positions, serving in U.N. peacekeeping missions, entering the military, being elected as parliamentary members – all with significant contributions to strengthening Mongolia’s diplomacy as a whole.
    5. Women have regained space and opportunities to participate in politics and foreign affairs once again, with gender equality efforts part of the policymaking.
    6. an abundance of literature on male Mongol leaders, dating back to the 13th century and Chinggis Khan.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Elon Mask's SpaceX network with 2000 Starlink satellites cause the following threats"

      1. Satellite collisions According to Space.com 50% close encounters between two satellites in 2021 involved Starlink satellites. Triggered by this risk, China initiated the process with the UN Office for Outer Space Affairs.

      2. Environment damage Such concentration of satellites creates various types of pollutions: light pollution, space junk, chemicals in the atmosphere, etc.

      3. Changing night sky and interfering with astronomy One in 15 sources of lights are satellites. Such 'light pollution' will make much more difficult for astronomers to spot asteroids and do their research.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This article provides a solid analysis of an interplay in strategic triangle between USA - China - Russia.

      It is game of chess or go, where different 'geometries' are appearing:

      • China is interested to support Russia in confrontation with USA in Europe in order to reduce USA and NATO presence in Indo-Pacific.
      • Trump played more on 'Russian card' against China. Biden administration slightly engaged with Russia in Geneva in order to free 'hands' for Indo-Pacific. But, it is not certain if it will work due to Ukraina crisis.
    2. The onset of a multipolar world order means that the U.S. would need to prioritize a favorable balance of power in the Indo-Pacific over its rivalry with Russia in Eastern Europe.
    3. As long as Russia can keep NATO’s capabilities invested in Europe, it will create a favorable strategic environment for China in the Indo-Pacific.
    4. the structural balance of power constraint posed by the U.S. keeps them together in their advance toward a multipolar world.
    5. According to the World Bank, in 1992, China’s nominal GDP was $427 billion, slightly less than Russia’s $460 billion; nonetheless, by 2021, China’s GDP of $16.8 trillion was more than 10 times that of Russia’s $1.6 trillion.

      fascinating growth!

    6. asymmetrical.
    7. evolved into the Shanghai Cooperation Organization (SCO).

      It is not clear how strong and functional is SCO.

    8. By 1996, Russia and China formed a strategic partnership, which led to the “Joint Declaration on Multipolarity and the Formation of a New Global Order” during the 1997 Moscow Summit.
    9. The American inability to accept the multipolarity of the 21st century leads it to conceptualize a bipolar framework of great power rivalry between the U.S. and China, as evident in the concept of the “G-2.” On the other hand, the success of Russian and Chinese foreign policy has been possible due to the groundwork they prepared to maneuver in a multipolar world of the future.

      This is worth further analysis. Article argues that US establishment is not ready for multilateral engagement. They are more set for G-2 while Russia and China have more diplomatic flexibility to navigate uncertainty of multilateral space. I am sceptical about this argument especially with Biden administration which is much more 'multilateral friendly' than Tramp's. The real question is if it is 'multilateral friendly' genuinly (support multilateralism even when it does not work in the favour of the USA) or tactically (use multilateralism to promote US foreign policy interests).

    10. This suggests that the Kremlin believes that it is only by highlighting its red lines that it can restore its prestige as a great power in world politics. In the Russian calculation, it is a great power whose red lines cannot be violated, as opposed to a middle power whose concerns matter but not that much. In the context of the emerging multipolar world order, these calculations are becoming accurate.

      it is interesting to follow dynamics of Russia's moves. Is it related to concerns of their security community over Ukraina or great-power positioning as this article argues. It is also possible that two dynamics are reinforcing each other.

    11. Russia’s latest A-SAT test, which generated thousands of pieces of dangerous debris threatening both U.S. and Chinese space assets, occurred on the same date as the meeting between Chinese leader Xi Jinping and Joe Biden. A plausible argument could be made that Russia’s A-SAT test was inspired by a need to demonstrate its status as a great power in the hierarchy of nations, as Moscow will not quietly accept its demotion to a lesser adversary to the United States. Interestingly, Russia upped the ante on the Ukrainian front following the Biden-Xi meeting. As the headlines became saturated with fears about a Russian invasion of Ukraine, Russia succeeded in dominating the global geostrategic discourse.

      It is an interesting timing of Russia's moves linked to the start of the USA-China dialogue

    12. Campbell and Sullivan contended that “coexistence means accepting competition as a condition to be managed rather than a problem to be solved” and added that both nations “will need to be prepared to live with the other as a major power.”
    13. guardrails

      ||Andrej|| 'guardrailes' are used more and more in global and diplomatic lingo.

    14. With the Biden-Putin summit in June 2021 and the resumption of the Strategic Stability Dialogue, talks of restoration of Russia’s great power status started.
    15. China had become the primary strategic adversary by the time Joe Biden came to power in January 2021.
    16. the rise of China as a peer competitor to the U.S. in the Indo-Pacific has relegated Russia to a middle power in the American strategic calculus.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Current list of the market share for semi-conductors USA (50%) EU Japan China (9%) Taiwan

      Article covers India's plans to become more important player in semi-conductor industry.

    2. about 50 percent of global market share,
    3. India appears to be making a major push to increase its presence in the semiconductor manufacturing sector.
    4. to “develop secure and resilient semiconductor supply chains for industrial growth, digital sovereignty, and technological leadership.”
    5. The ministry expects that by 2030, India’s semiconductor market will be driven by wireless communications, consumer electronics, and automotive electronics with 24 percent, 23 percent, and 20 percent of the market share, respectively.
    6. China has surpassed Taiwan for two years in a row, and is only behind Europe and Japan, each of which had a market share of 10 percent in 2020.
    7. In 2015, China had a meager share of 3.8 percent of the global chip sales, amounting to $13 billion, but by 2020 China had improved its score, marking an annual growth rate of 30.6 percent, capturing a 9 percent market share and about $40 billion in annual sales.

      Fast growth of China's semi-conductor industry.

    8. Semiconductors are one of the top five U.S. exports, with more than 80 percent of the U.S. sales to overseas customers.
    9. to recognize the importance of global supply chains and the vulnerabilities in the absence of any concrete action to diversify supply chain partners.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||ArvinKamberi||||Pavlina||n Some interesting dynamics in the USA to follow

    2. This would allow the use of the digital token for the payment of public charges, taxes, debt and other purposes.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. I’m intrigued by new business models pioneered by the likes of F1000, Research Square and Qeios, which tweak the preprint publishing approach in various ways. On Qeios, which is based in London, researchers or their institutions don’t pay per article, but they do pay a monthly fee to post an unlimited number of articles. The articles go up right away, as on a preprint server such as medRxiv, but are later peer-reviewed, as in a journal.

      ||kat_hone|| Shall we experiment with some fo these platforms?

    2. What more could be done? In a November article for The Scientist, Dr. Mullins proposes that preprints “have a limited shelf life with a link that expires within 12 months” so that bad research doesn’t linger. If it’s good work, it should have found a publisher by then, he argues. Every page should have a digital watermark identifying it as not peer-reviewed, he says. And preprints should be digitally linked to the peer-reviewed articles they become to “motivate authors to complete the peer-review process,” he writes.

      REasonable approach

    3. created arXiv, pronounced “archive,” while working at Los Alamos National Laboratory in 1991.

      Interesting initiative

    4. in the form of preprints

      ||kat_hone||||andresATdiplomacy.edu|| What are options for pre-print which could be an option for Diplo's flexibile approach.

      Typically, our flexibility provides with fast entry. But, we are not particularly good with 'publishing marathons'

    5. peer review can fail. Retraction Watch, a website, maintains a list of more than 100 Covid-19 research papers that were peer reviewed, published and then had to be retracted.
    6. Peer review is both the greatest strength and the greatest weakness of the scientific research system.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||VladaR||||Pavlina||||AndrijanaG|| This is reasonable balanced and informed article on USA - Russia cyber dynamics around Ukraina.

    2. I recommend tuning out divisive rhetoric and cultivating common ground with Americans whom you might not agree with.
    3. I believe Russia is more likely to prefer a path of insidious political polarization to weaken U.S. geopolitical influence.
    4. On Jan. 14, 2022, Russia arrested members of the Russian-based cyber gang REvil who were responsible for the 2021 ransomware attacks against meat supplier JBS Foods, headquartered in Greeley, Colorado, and the Colonial Pipeline, headquartered in Alpharetta, Georgia. The unusual move caused cybersecurity analysts to wonder about Russia’s motive, including speculation about making it easier for the government to deny a connection to the cyberattacks.

      What were motives behind Revil?

    5. Democracies are especially vulnerable to these techniques, given the open exchange of ideas and lack of centralized control over sources of information.
    6. The maneuvers, which include dismissing and distorting information and undermining opinion leaders, are carried out in the press and on social media.
    7. confidence in elections, undermine economic stability, damage the energy grid, and even disrupt health care systems.

      target areas for attack

    8. The SolarWinds attack, uncovered in December 2020, gave the perpetrators access to the computer systems of many U.S. government agencies and private businesses.

      ||VladaR|| What has happened with Solar Wind? Have they managed to reverse it?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||minam|| ||AndrijanaG|| Mina, please remove Libra and Diem from actors in our actor list.

      ||ArvinKamberi||

    2. This article provides a good survey of the failure of Facebook's 'monetary' experiments starting with Libra and followed by Diem.

      Facebook dropped the 'digital currency' project. Probably, they thought that this part of 'regulatory battle' could weaken them in other 'battles' around anti-trust, data, consumer protection.

      In particular, it could weaken their chances for the success of Metaverse project which is Facebook's ultimate battle for survival.

      Libra development was historical moment in Internet governance and digital policy since it was the first major occasion when tech platforms were not allowed to use 'ex post' approach (develop and regulate later on). This time regulators stopped them 'ex ante'.

    3. “I see this as the most pivotal battle in the crypto space over the next few years, stablecoins versus central bank-created digital currencies,”

      ||ArvinKamberi|| this is key battle to follow.

    4. He said strong private-sector efforts like the one from Facebook are key to balancing the power of governments that are considering making their own state-backed stablecoins.
    5. Governments are highly skeptical of digital currencies, and the United States is still debating how to legislate them.
    6. One person speculated that it could have been more of a headache to Zuckerberg than it was worth.
    7. But Marcus wanted the project to stay more independent.
    8. ould undermine the stability of the financial system,

      Not clear hot it can happen if it is pegged to traditional currency.

    9. Unlike cryptocurrencies such as bitcoin, the value of which is not tied to anything external, stablecoins are pegged to major currencies already in circulation, which is why proponents say they are more stable.

      I thought that it was enough for survival of this initiative since it could have solved 'monetary challenge'. But, they antagonised too many people to manage to succede.

    10. Facebook also redesigned the effort around “stablecoins,” a suite of emerging products that use cryptocurrency’s underlying blockchain technology but are pegged to a major currency, such as the U.S. dollar.
    11. Regulators came away from an initial meeting with Facebook stunned that the company wasn’t more prepared to address concerns about money laundering, consumer protection and other potential financial risks

      Nobody mentiones potential risks for monetary policy of Central Banks which was, in my view, the main issue with Libra. Other issues could have been resolved easier.

      There was also 'regulatory arrogance' of Facebook which used to think of regulation post factum as afterthought. This time, it was different when they tried to challenge global financial system.

    12. But on the first day Facebook announced its plans, the project was criticized by the French finance minister, Bruno Le Maire, who called on central bank governors around the world to scrutinize the project.
    13. Facebook has been trying to escape its baggage by pushing into emerging technologies, including virtual reality hardware, smart glasses and a smartwatch that could be used for health tracking. It changed its name to Meta last year — one week after a whistleblower had come forward with thousands of internal documents showing its role in promoting societal polarization and harming teens’ mental health.
    14. Marcus, a well-liked executive who was formerly president of PayPal, announced his resignation in November — just two months after he had traveled to Washington to pitch the recently rebranded project to journalists and regulators.
    15. with Google hiring a team of engineers to work on blockchain technology, which underpins cryptocurrency.

      to check this blockchain technology

    16. concerns about money laundering, consumer protection and other potential financial risks.

      Crucial problems for cybercurriencies.

    17. But the decision to fold the project called Diem is the first that appears to relate directly to regulatory pushback, suggesting that bringing future products to market in heavily regulated spaces will be an uphill battle, the people said.
    18. It took Facebook less than three years to fail in its high-profile cryptocurrency project.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. We Met in Virtual Reality never really probes the psychological implications of whole emotional lives lived out online, or the possibilities for harassment and bullying in virtual spaces. And it never touches on what happens to communities like VRChat when companies like Meta bring people into the metaverse en masse. Hunting spends a lot of time showing there’s a culture worth preserving; if only he’d shown if anyone is trying to do it.

      We Met in Virtual Reality is a documentary that explains some good uses of virtual reality, especially during pandemics. Virtual reality became just reality.

      However, Wired coverage indicates that there is much more than this glimpse of positive. There are

      the psychological implications of whole emotional lives lived out online, or the possibilities for harassment and bullying in virtual spaces. And it never touches on what happens to communities like VRChat when companies like Meta bring people into the metaverse en masse.

      ||VladaR||||AndrijanaG||

    2. We Met in Virtual Reality never really probes the psychological implications of whole emotional lives lived out online, or the possibilities for harassment and bullying in virtual spaces.
    3. If ever there was an argument for virtual reality still being reality, this is it.
    4. Hunting’s goal, then, was to show “what being present in VR is truly like.” And that he does.
    5. it’s about showcasing the people in the small progressive communities that have built social VR into what it is. There’s Jenny, an American Sign Language teacher who is working to create a space for deaf and hard-of-hearing people in VR. There are nonbinary folks discussing the possibilities of exploring identity in virtual space. And there are two couples who, as the title suggests, met in VRChat. Their stories are similar, but not overlapping, and they provide a snapshot of the metaverse—and I’m using that term in its broadest possible definition here—as it stands on the precipice of transforming from an online outsider space to whatever it will be next.
    6. We Met in Virtual Reality,
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This text reconfirms our experience that sound is critical for effective online meetings.

      They provide useful steps that we can introduce into the next ConfTech issue.

      A new element, esepcially for our students, is Speedtest by Ookla

      ||jovanamATdiplomacy.edu||||ArvinKamberi||||Katarina_An||

    2. That’s especially important because most Internet connections are much better at downloading things than uploading them. To see if that’s true for you, check out Speedtest by Ookla and compare your download speed to your upload speed.

      We may introduce this test for our courses. ||Andrej||||Dragana||

    3. If for some reason your Internet connection is shaky, which could happen for a number of reasons, consider leaving video off entirely.
    4. The best way to see if your approach works in Zoom is to open Settings, click on Audio, and start talking. At a normal speaking volume, the blue bar next to Input Level should peak right in the middle.

      Useful to test.

    5. try your best to keep your mouth between six inches and one feet away from it.

      distance between microphone and mouth.

    6. it’s time to make sure you and everyone else on those calls are wearing a pair of headphones or ear buds.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||TerezaHorejsova||||PatrickB||||MilicaVK||

      Something that would be useful for our 'audit' is policy how to sit in the chair. It impacts our life. I may draft some 'policy guidelines'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In online games, racism and mistreatment of children are punishable as they should. But, one can ask, why murder is not punished in virtual space.

      This text from Wired opens an interesting debate arguing that as 'virtual' is becoming more and more 'real' with Metaverse and other initiatives, we have to revisit 'virtual ethics', including murder in online games.

      Article introduces a few concepts including

      • virtual realism (what happens online can have 'real consequences').
      • 'The Gamer's Dilemma' on what is allowed and not in online games.
      • virtual ethics - should it be different from classical ethics?

      ||sorina||||AndrijanaG||||VladaR||||ArvinKamberi||||Jovan||||aleksandarsATdiplomacy.edu||||MilicaVK||

    2. we will need to treat virtual realities as genuine realities.
    3. Actions in virtual worlds will potentially be as meaningful as actions in the physical world
    4. virtual worlds will move far beyond games to become part of our everyday lives.
    5. but with anonymous users this may be hard to arrange. As virtual worlds become more central to our lives, and virtual crimes take on increasing seriousness, we may well find that it becomes difficult to find punishments that fit the crime.
    6. Virtual penalties and virtual imprisonment likewise may have some effect, but the effects will be limited when users can easily take on new bodies.
    7. Those are all morally serious actions, even if they’re not as serious as murder in the ordinary world.
    8. Killing an avatar might be more akin to murder followed by reincarnation, at least if reincarnation produces full-​grown people with memories intact.
    9. the nearest thing to murder is “killing” an avatar.
    10. Virtual realism, which holds that virtual objects are real objects, gives a much more natural explanation.
    11. Nathan Wildman and Neil McDonnell

      I have to check it.

    12. the puzzle of virtual theft.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL