1. Feb 2022
    1. How can you “steal” an object that doesn’t exist?

      Objects exist in human utility and perception. They even exist objectively as electronics.

    2. In 2012, the Dutch Supreme Court upheld the conviction of two teenagers for stealing a virtual amulet from another teenager in the online game Runescape. The court declared that the amulet had real value in virtue of the time and effort invested in obtaining it.

      ||Jovan|| Need to check it.

    3. in long-​term games, and all the more in nongame environments, possessions can be important to a user, and the harm can be correspondingly significant.
    4. Most of us would agree that objects owned in a game matter less than possessions in the nonvirtual world.
    5. Once one sees virtual worlds as genuine realities, however, then the ethics of virtual worlds becomes in principle as serious as ethics in general.
    6. If these virtual worlds were merely games or fictions, then the ethics of virtual worlds would be limited to the ethics of games or fictions.
    7. we don’t think that “ordinary” virtual murder is indicative of a moral flaw, so we regard it as unproblematic. Still, the ethical issues here are subtle.
    8. virtue ethics,

      Can ethics be 'virtual'?

    9. In his 2009 article “The Gamer’s Dilemma,” the philosopher Morgan Luck observes that while most people think that virtual murder (killing nonplayer characters) is morally permissible, they think that virtual pedophilia is not.

      Why killing person is ok, while pedophilia is not ok online.

    10. LambdaMOO was now a democracy of sorts. The wizards retained a degree of power, however, and after a while they decided that democracy wasn’t working and they took some decision-​making power back. Their decree was ratified by a democratic vote after the fact, but they had made it clear that the shift would be made regardless. The world of LambdaMOO moved fairly seamlessly through these different forms of government.
    11. Curtis designed LambdaMOO to mimic the shape of his house, and initially it was a sort of dictatorship.
    12. As the experience of our virtual bodies grows richer still, violations of our virtual bodies may at some point become as serious as violations of our physical bodies.
    13. this “avatar attachment” is morally significant.

      ||Jovan|| It is useful for overall discusison on embodiment.

    14. we may identify with our virtual bodies much more than in a short-​term textual environment.
    15. the harm is correspondingly less.
    16. to virtual realism—the view that virtual reality is genuine reality, and that what happens in virtual worlds can be as meaningful as what happens in the physical world.

      a very important concept

    17. MUDs, or multi-user domains.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Content controversies move to Spotify and audio platforms after Neil Young and Joni Mitchell decided to withdraw their recordings from Spotify in the protest of Joe Rogan's anti-vaccine podcasts.

      Spotify did not remove Rogan's podcasts arguing that he did not break neither legal rules nor company's content policy.

      On content policy, Spotify will face what Facebook and others have been facing for long time.

      Will Spotify be in position to strike right balance between remaining open for various content while dealing with misinformation.

      The Economist argues that 'content policy' formula can be achieved by:

      • full transparency of tech platforms' content policies;
      • predictable content policy rules with possibility for public scrutiny;
      • procedural mechanisms for legal recourse.
    2. As platforms like Spotify open their gates to more user-generated content, the same free-speech battles are coming to audio.
    3. may choose not to risk debating the efficacy of vaccines,
    4. imperfect rules that are open to public scrutiny can be improved over time.
    5. predictable rules can protect speech as much as containing it. Rules determine not just what is banned, but also help defend what is allowed.

      Two key points for content moderation

      • predictable rules
      • possibility for complain and legal action
    6. Apple, the next-biggest streamer, has content guidelines for podcasts but a rough style guide for music. Amazon, the third-largest, has published even less in the way of rules. And whereas Facebook and co release regular reports on what content they have taken down and why, the audio streamers are opaque.

      Different policies on content moderation

    7. The starting point is transparency
    8. Some good podcasts will stoke controversy. Free speech must be the default.
    9. On the other hand, few want tech executives to become censors.
    10. the content mix on audio platforms is starting to look less like the curated library of Netflix and more like the infinite hotch-potch of YouTube.
    11. Mr Rogan is a bigmouth who is wrong about covid-19 and probably much else. Yet he has broken no laws, nor even, Spotify seems to believe, the company’s content rules.
    12. Mr Rogan is a bigmouth who is wrong about covid-19 and probably much else. Yet he has broken no laws, nor even, Spotify seems to believe, the company’s content rules.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In December America and Britain announced they plan, this spring, to launch a “grand challenge” prize around PET systems.

      Can UN make private and confidential data safe for public use? On 25 January, UN PET Lab was established with the aim to ‘anonymise’ health, private, commercial and other sensitive data to be used for public good purposes. Data will be anonymised and protected via use of so-called privacy-enhancing technologies (PETs). This approach can solve one of the main problems of data era of lack of access to data, in particular on health, for getting insight of interest for citizens, countries and companies worldwide.

      In the pre-launch phase UN Pet Lab experimented with two approaches

      First one is called secure multiparty computation (SMPC) in which data is kept at secure place where they are started anyway. Somebody who needs analysis of this data - e.g. private health data - sends request that is processed on the sidte where data is stored. Results of analysis are sent with the us eof special techniques, in particular, to avoid reverse-engineer that could discover private data.

      Second approach relies on so called “trusted execution environments” consisted of ‘data enclaves’ where confidential data will be executed with utmost privacy and security protection.

      UN Pet Lab will start experiments with trade data which are less controversial. also called “enclaves”, as a form of input privacy. The UN Pet Lab will run a ‘grand challenge’ prize aimed to develop new uses of PET systems.

      ||JovanNj||||aleksandarsATdiplomacy.edu||||anjadjATdiplomacy.edu||||VladaR|| Here are a few interesting developments which we will need to follow on 'data' aspect of our work. For time being I will annotate these types of inputs.

      ||Jovan||

    2. America and Britain announced they plan, this spring, to launch a “grand challenge”
    3. into trade data
    4. The use of PETs offers not only a means of bringing together data sets that cannot currently interact because of worries about privacy, but also a way for all sorts of organisations to collaborate securely across borders.
    5. For extra security, cryptographic hashes and digital signatures are applied, to prove that only authorised operations have taken place.
    6. to test “trusted execution environments”, also called “enclaves”, as a form of input privacy.
    7. They put several kinds of PETs through their paces. In one trial, OpenMined, a charity based in Oxford, tested a technique called secure multiparty computation (SMPC). This approach involves the data to be analysed being encrypted by their keeper and staying on the premises. The organisation running the analysis (in this case OpenMined) sends its algorithm to the keeper, who runs it on the encrypted data.
    8. The UN PETs Lab
    9. These so-called privacy-enhancing technologies (PETs) are still in the early stages of development.
    10. Reasons of confidentiality mean that many medical, financial, educational and other personal records, from the analysis of which much public good could be derived, are in practice unavailable.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Israel also cannot afford to alienate Russia, which can severely curb its air operations in Syria and beyond, and whose at least partial cooperation on the nuclear issue remains essential.
    2. If, as expected, Russia launches a major cyber campaign against Ukraine prior to an actual invasion, to soften it up, or as part of the invasion itself, Israel will have much to learn for its own future cyber capabilities, both offensive and defensive. Russia has repeatedly launched cyber attacks against Ukraine, using it as a testing ground for its cyber capabilities.
    3. A resentful Russia, smarting from the imposition of heavy additional U.S. sanctions, will be even less inclined to pressure Iran to reach a nuclear compromise.
    4. by signing long-term agreements for air and naval bases there and made Israel’s efforts to thwart Iranian entrenchment in Syria dependent on its goodwill.
    5. Russia’s rapid resurgence, however, may be more than China bargained for, a fully tripolar global system, rather than the primarily bipolar one they had anticipated, with Russia playing a supporting junior role.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Open Data Barometer

      Open data barometer

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the adoption of open standards for FOSS.
    2. he following questions may help with preparing open innovation processes:
    3. Open innovation describes a decentralised and participatory notion of how ideas are generated and implemented in organisations. It involves moving from ‘closed’ to ‘open’ innovations; in other words, finding ideas outside the boundaries of one’s own organisation.

      Open innovation

    4. WHY OPEN CONTENT?
    5. For more information, go to:

      Open data resoruces

    6. Open Knowledge International
    7. WHAT ARE OPEN DATA

      Open data

    8. Checklist for using open-source software solution
    9. Technology centres called ‘makerspaces’ and ‘fablabs’ (open fabrication laboratories) are increasingly making 3D printing available around the world.
    10. Using data to fight droughts, Namibia

      Water and data in Namibia

    11. Use open standards, open data, open source and open innovation: An ‘open’ approach allows for collaboration in digital DC and avoids duplication. Open source also supports scaling (Principle 3) and sustainability (Principle 4).

      How open supports scaling (principle 3) and sustainability (principle 4)

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. An input for ConfTech Newsletter ||Katarina_An||||jovanamATdiplomacy.edu||||ArvinKamberi||

    2. Another is to do a “Zoom loom”, placing yourself so close to the camera that you will give everyone nightmares.
    3. these participants have no way of knowing that you are gazing specifically at them.
    4. And if there is one thing for which online interactions are not suited, it is body language.
    5. so much of it is blindingly obvious.
    6. receiving more eye contact from a bigwig led to greater participation in group interactions.
    7. They nod; they touch others but not themselves; they gesture; they furrow their brows; they hold themselves erect; their facial expressions are more animated.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cryptocurrencies and decentralised economy can have unintended consequences for those who have promoted them.

      ||ArvinKamberi||

    2. “One of the dreams of the far right is not just a blockchain cryptocurrency, but a decentralised future where they don’t have to rely on mainstream structures,” says Mr Squirrell. “They want blockchain blogging websites, blockchain streaming websites” to escape deplatforming.
    3. which distances people and their money from “elites and banksters”.
    4. This idea appeals to libertarians or those who distrust the traditional banking system.
    5. with an anti-establishment spirit
    6. Technological advances in crypto have since made privacy tokens like Monero, which hide transactions, possible. These groups have probably flocked to them.
    7. They advertise their wallets on their websites and social media, asking for donations. And they get them. Stefan Molyneux, a far-right podcaster who was ousted from YouTube, has received over $1.67m in bitcoin. Mr Anglin has reportedly received over 100 bitcoins ($3.8m).
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. While there have been other DNS resolver projects around the world with government support or involvement (for instance, in the UK and Canada), there was a sense that DNS4EU represents a new kind and degree of government intervention in the space.

      Is this really 'new'. What is 'new' in EU's proposal?

    2. the concerns driving this initiative relate to consolidation of DNS resolution services in the hands of a few (non-EU) companies (i.e. the emergence of public DNS resolver services hosted by Google and Cloudflare), privacy and data protection in the processing of DNS data, and the perceived need for EU investment in the field to better identify and filter EU-specific “cyber-threats”.

      Here are the main reasons for new European DNS system.

      ||sorina||||VladaR|| It will be important to follow it since it will trigger some controversies.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. a tripolar arrangement,

      It will be interesting to see what is the shape of this triangle. Keen to read more.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Sports diplomacy started with the very first Olympics in 776 B.C.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This article provides a good survey of (dis)advantages of Chinese and USA approach to AI as summarised in the following paragraph

      the combined resources, scientific contributions, and technological superiority shared by US academic and corporate institutions in the field of AI is more than enough to overcome the advantages given China by its policy of socialized data.

      ||kat_hone||||VladaR||||sorina||||anjadjATdiplomacy.edu||||JovanNj||

    2. the combined resources, scientific contributions, and technological superiority shared by US academic and corporate institutions in the field of AI is more than enough to overcome the advantages given China by its policy of socialized data.
    3. But the PRC is non-competitive when it comes to luring outside talent.
    4. This leaves US soil fertile for the development of monolithic business empires with a GDP eclipsing many modernized countries.
    5. “China has a massive data advantage when it comes to medical AI research,”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. NSO's pegasus software is more than the most powerful Internet spying tool. It is also Israel's important diplomatic asset.

      New York Times provides comprehensive story around Pegasus, including history of development, how it works and how it is exported from Israel in close coordination with government.

      This article argues that Israel managed to gain diplomatic concessions from a few countries as a part of deal for selling Pegasus. For Panama, Hungary, Mexico, Bahrein India, and U.A.E. purchase of Pegasus coincided with pro-Israeli diplomatic moves of these countries including voting in the UN and strengthening bilateral relations.

      However, the NSO's international future became uncertain in November as the U.S. the Department of Commerce added NSO added to its black list for activities “contrary to the national security or foreign policy interests of the United States.” It will have far-reaching consequences for business partners and potential buyers of Pegasus and other NSO platforms and tools.

      ||VladaR||||AndrijanaG||||Pavlina||||StephanieBP||

    2. In December 2021, just weeks after NSO landed on the American blacklist,
    3. What Facebook didn’t appear to know was that the attack on a U.S. phone number, far from being an assault by a foreign power, was part of the NSO demonstrations to the F.B.I. of Phantom — the system NSO designed for American law-enforcement agencies to turn the nation’s smartphones into an “intelligence gold mine.”
    4. The capability to hack WhatsApp, according to the presentation, “doesn’t currently exist” in the United States government, and the intelligence community was interested in acquiring that capability.
    5. its presence on an American blacklist will probably scare away prospective clients — and employees.

      ||VladaR|| This is an interesting development to follow on Pegauss.

    6. the decision about NSO has everything to do with reining in a dangerous company and nothing to do with America’s relationship with Israel.
    7. behind the scenes of the peace deal was a Middle East weapons bazaar.
    8. In September 2020, Netanyahu, Donald Trump and the foreign ministers of the United Arab Emirates and Bahrain signed the Abraham Accords, and all the signatories heralded it as a new era of peace for the region.
    9. In 2017, Israeli authorities decided to approve the sale of Pegasus to the kingdom, and in particular to a Saudi security agency under the supervision of Prince Mohammed.
    10. Israel and the U.A.E. had, in fact, been growing closer together for years.
    11. In May of that year, European Union foreign ministers tried to reach unanimity when calling for a cease-fire between Israel and the Palestinian Islamic group Hamas, as well as for increased humanitarian aid for Gaza. Hungary declined to join the other 26 countries.
    12. After the installation of NSO systems in Panama City in 2012, Martinelli’s government voted in Israel’s favor on numerous occasions, including to oppose the United Nations decision to upgrade the status of the Palestinian delegation — 138 countries voted in favor of the resolution, with just Israel, Panama and seven other countries opposing it.
    13. In early 2010, Panama was one of only six countries at the U.N. General Assembly to back Israel against a resolution to keep the Goldstone Commission report on war crimes committed during the 2008-9 Israeli assault on Gaza on the international agenda.
    14. After a long tradition of voting against Israel at United Nations conferences, Mexico slowly began to shift “no” votes to abstentions.
    15. “With our Defense Ministry sitting at the controls of how these systems move around,” he said, “we will be able to exploit them and reap diplomatic profits.”
    16. NSO would not operate the system itself. It would sell only to governments, not to individuals or companies. It would be selective about which governments it allowed to use the software. And it would cooperate with Israel’s Defense Export Controls Agency, or DECA, to license every sale.
    17. to find “zero days,” i.e., new vulnerabilities in phone software that could be exploited to install Pegasus.
    18. The company’s most valuable employees are all graduates of elite training courses, including a secretive and prestigious Unit 8200 program called ARAM that accepts only a handful of the most brilliant recruits and trains them in the most advanced methods of cyberweapons programming
    19. Nearly every member of NSO’s research team is a veteran of the intelligence services; most of them served with AMAN, the Israeli Military Intelligence Directorate, the largest agency in the Israeli espionage community — and many of them in AMAN’s Unit 8200.
    20. If they could control the device itself, though, they could collect the data before it was encrypted. CommuniTake had already figured out how to control the devices. All the partners needed was a way to do so without permission.
    21. to obtain export licenses from Israel’s Ministry of Defense to sell their tools abroad, providing a crucial lever for the government to influence the firms and, in some cases, the countries that buy from them.
    22. Veterans of Unit 8200 — Israel’s equivalent of the National Security Agency — poured into secretive start-ups in the private sector, giving rise to a multibillion-dollar cybersecurity industry.
    23. an estimated one in 10 of the nation’s workers employed by the industry in some way.
    24. For Israel, the weapons trade has always been central to the country’s sense of national survival. It was a major driver of economic growth, which in turn funded further military research and development.
    25. Cyberweapons have changed international relations more profoundly than any advance since the advent of the atomic bomb.
    26. Times reporting also reveals how sales of Pegasus played an unseen but critical role in securing the support of Arab nations in Israel’s campaign against Iran and even in negotiating the Abraham Accords, the 2020 diplomatic agreements that normalized relations between Israel and some of its longtime Arab adversaries.
    27. shows how Israel’s ability to approve or deny access to NSO’s cyberweapons has become entangled with its diplomacy
    28. Israel, through its internal export-licensing process, has ultimate say over who NSO can sell its spyware to.
    29. no cooperation from AT&T, Verizon, Apple or Google.
    30. the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. Israel had granted a special license to NSO, one that permitted its Phantom system to attack U.S. numbers. The license allowed for only one type of client: U.S. government agencies
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. he danger is that these methods will be copied by other countries or strong, malevolent non-state actors. New ideas and tools are needed to deal with this. Such is the purpose of this paper.

      It is major problem. The roots are much deeper than just current practice of Russia. Relativity of truth, misuse of human rights agenda for economic gains, etc. made global population very sceptical and cynical about 'official truth'. Thus, relativisation of truth created space in which actors like Russia can trive. Now, West is trying to introduce almost Orwelian 'ministry of truth' by censoring even former president (Trump). Unfortunately, I think that the battle for core principle is almost lost. For me , it was lost when Trump was banned from social media for life-time. It was very Orwelian. I do not to say how much I disagree with him. But, this act was for me 'Sarajevo 1914' for Western democracy. It is wider context which is very dangerous and risky. It remains to see if Western societies will find stamina and energy to come back.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The proportion of global chips sold by China is rising (see chart 1)

      Tech development of developing countries is crucial for China - export demands there are increasing

    2. America’s own semiconductor toolmakers still count China as one of their biggest markets

      This is the key: US markets want China in!

    3. focus on protecting trade secrets

      Is that not even less possible today? Innovation and production is not only in the IPR, but also in human capacities and labour - and this is where the West (still) dominates

    4. “Many are sceptical because they’re not sure whether or not Biden will be around,” says Richard Thurston, once the top lawyer at the Taiwan Semiconductor Manufacturing Company (TSMC)

      Taiwan is in an interesting situation. Probably the only thing that ties the US support to it is semiconductors. If they give it away to US or others, they have no safeguards any more; at the same time, they are forced to give bits away by developing TSMC factories in US (though not the key technology), to avoid Intel and others catching up... It is a be or not to be for Taiwan.

    5. Likewise SMIC can get older chipmaking tools but not the latest versions that can be used for chips that go into iPhones and self-driving cars

      This depends on manufacturing equipment, where US, Japan and NL dominate

    6. access to chips and chipmaking tools above a certain level of sophistication

      This is the key, but not just for China - there is a global bottleneck with only Samsung and TSMC being able to produce them

    7. prospect of American-Chinese chip trade ever reviving

      I think this Rubicon has been crossed already, and not just in US-China relations: states understand they can't rely on the global supply chain any more (due to both China and the US). Is there a way back for this trust anyhow? ||JovanK|| ||MariliaM||

    8. The Europeans and the Japanese both want a more formal multilateral approach

      Could this be the next rift in the western positions - on where chip export rules should be drafted? ||JovanK|| ||MariliaM||

    9. had been poised to sell its most sophisticated tools to SMIC, China’s biggest and beefiest chipmaker. Japanese and American officials rounded on the Dutch government, which duly refused to give ASML a licence to export its cutting-edge machines to SMIC

      What is the NL and EU position on this?! ASML is Dutch ||JovanK||

    10. Quad, a club of countries that embraces America, Australia, India and Japan

      Yet Quad has no producers of high-end semiconductors - Taiwan or S Korea

    11. EU-US Trade and Technology Council,
    12. Wassenaar so that it might help control the trade in semiconductors. But few expect it to play that role, not least because Russia is a member

      Understanding chips as 'dual use technology' may be an overstretch. It is rather a commodity, though scarce (and not for natural reasons like oil, but for purely political and investment reasons related to know-how and production)

    13. Organisation of the Semiconductor Exporting Countries: OSEC
    14. policy over the trade in chips and the equipment and material

      Does this trade and export of semiconductors generally fall under the existing WTO rules? If so, were WTO rules broken by the US policy? ||JovanK|| ||MariliaM||

    15. in 25 years he has never seen semiconductors so consistently top the diplomatic agenda

      Is it only in US, or the EU and others have it high on the agenda? While EU is making steps for independence on this grounds as well, is it actually still hoping (and pushing) for a global supply chain and the end of US export policy/foreign affairs push?

    16. hinese firms, spurred on by billions of dollars of investment by the state, have redoubled their efforts to develop their own versions of chip technologies they had previously imported along supply chains linked to firms in America
    17. Japanese firms, among others, have started quietly marketing their products in such a way as to evade America’s Export Administration Regulations, qualifying them as “ EAR-free”
    18. neutral territory from which they might continue to export supplies. Singapore and Malaysia led the way
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It might be a smart gamble—a new variant, the climate crisis, or a nuclear apocalypse might force us all indoors again—but it is, to put it dramatically, a bet against humankind

      Nicely put: metaverse as 'a bet against humankind'.

    2. The question is whether we—the intended users—will go along with it.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Digital Geneva Footp

      ||JovanNj||||anjadjATdiplomacy.edu|| Promenite nazive i ovde i compare two actors u

      Digital Footprint of International Geneva

      (kao na naslovnoj strani). Thanks!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The prolonged pandemic has forced the government, including the Foreign Ministry, to readjust its targets and goals. But these difficulties are not an excuse to allow progress to be arrested. It is natural for the public to ask more of the government during trying times, and the RCEP is incomplete without Indonesia’s ratification.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Jan 2022
    1. Digital Geneva Footprint ofInternational Geneva

      Ide samo Digital Footprint of International Geneva

      Ne treba Digital Geneva Footprint

      ||JovanNj||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China has yet to grant regulatory approval for the sale of cultivated meat (so far, Singapore is the only country in the world that has), but that could soon change as pressure mounts to achieve the five-year plan. Market approval would see increased private investment in local cultivated meat start-ups, like Joes Future Food, which has already raised nearly $11 million to start lab-grown pork production. Meanwhile, the sheer size of China’s potential market could spark additional investment in global brands that are already scaling up
    2. By promoting cultivated meat alternatives, China could reduce greenhouse gas emissions from raising livestock (or importing meat), while ensuring that it maintains food security
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A graph hypernetwork starts with any architecture that needs optimizing (let’s call it the candidate). It then does its best to predict the ideal parameters for the candidate. The team then sets the parameters of an actual neural network to the predicted values and tests it on a given task.
    2. Given a new, untrained deep neural network designed for some task, the hypernetwork predicts the parameters for the new network in fractions of a second, and in theory could make training unnecessary. Because the hypernetwork learns the extremely complex patterns in the designs of deep neural networks
    3. Boris Knyazev of the University of Guelph in Ontario and his colleagues have designed and trained a “hypernetwork” — a kind of overlord of other neural networks — that could speed up the training process.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New Zealand, Singapore, and Chile have signed the Digital Economy Partnership Agreement, which represents a new type of trade agreement to promote the digital economy.
    2. Wellington’s participation in international and regional organizations, the diversification of its foreign relations, and its subtle adjustments to its policy toward China, particularly concerning some political and international issues such as the South China Sea.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. , digital diplomacy should primarily be understood as the use of digital information, communication and technologies to achieve diplomatic objectives. In this case, we mainly focus on the usage of digital diplomacy to help pursue foreign policy goals.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It shows Chiinese dominance of AR and VR, which are underlying technology behind metaverse.

      It also shows importance of IPR - mainly patents but also trademarks on metaverse

    2. rejecting various metaverse-related trademark applications
    3. Alibaba, which owns the , plans to launch new AR glasses for users to conduct virtual meetings over DingTalk, the company’s enterprise communication and collaboration platform, in its latest move to stake out a claim in the metaverse.
    4. helping them gain first-mover advantage in the metaverse arena
    5. VR immerses a user in an imagined world, like in a film or video game, with the aid of an opaque headset such as those from Oculus, a division of Facebook parent Meta Platforms. AR provides an overlay of digital imagery onto the real world with the use of a clear headset, like Microsoft’s HoloLens, or with newer smartphones and tablets.

      Simple definition of two technologies.

    6. Chinese Big Tech companies, led by internet giants Tencent Holdings and Baidu, comprised more than half of the world’s top 10 filers of patent applications for virtual reality (VR) and augmented reality (AR) technologies over the past two years, showing a strong effort to establish a foothold in the emerging metaverse market.

      Behind Metaverse is virtual and augmented reality technology where Chine leads.

      ||AndrijanaG||||VladaR||||ArvinKamberi||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. South African President Cyril Ramaphosa, who has accused the EU of ‘vaccine apartheid’, is expected to only attend online, while other countries may want to make a stand by boycotting the summit.
    2. the EU’s handling of the Omicron variant will be raised by the African side as an example of how trust can be undermined if the EU does not consult before measures are taken.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. America’s militarized approach is struggling to compete with extensive Chinese economic and infrastructure assistance.
    2. trade engagements with Africa center around extractive industries such as oil and minerals; and selling high-priced technologies such as aircraft.
    3. Africom epitomizes the militarization of US policy towards Africa.
    4. personal connections that key people in the Biden foreign policy and national security establishment have with Tigrian leaders who ruled Ethiopia for almost three decades.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. to use both global resources to solve local problems and turn local experiences and expertise into shareable global resources.
    2. global advocacy and a myriad of activities that help to maintain the city’s global identity.
    3. Sister-cities flourished following the Second World War as a way to improve people-to-people relationships across country borders in order to make war less likely.
    4. as Kitakyushu’s Initiative for a Clean Environment, Sendai’s Framework for Disaster Risk Reduction, and Minamata’s Convention on Mercury.
    5. peace tourism, research on nuclear abolition
    6. the Mayors for Peace organisation
    7. moral authority on nuclear abolition and non-proliferation.
    8. Japan’s Nagasaki is an important example of a city engaged in global activism and activity.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||AndrijanaG|| We can include these summits in our calendar.

    2. promoting digital transformations
    3. an evaluation of Secretary-General Guterres’s Our Common Agenda report,
    4. cyberspace
    5. Diplomacy Reset: Ten Global Summits to Watch in 2022

      Less focus on cyber/digital in summits in 2022 according to this summary.

    6. expanding commitments to climate mitigation, strengthening multilateralism, and increasing the resiliency of democracies.
    7. in the form of plurilateral agreements in areas such as e-commerce, investment facilitation, and services regulation.
    8. to waive intellectual property rights for COVID-19 vaccines and treatments—and on fisheries subsidies by the end of February 2022.

      ||MariliaM|| Priorities for the WTO Ministerial meeting.

    9. Ministerials generally occur every two years, but by March it will have been five years since the last conference, leaving Director General Ngozi Okonjo-Iweala’s first ministerial with a long list of agenda items.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The sharing of data—and their use—may now be getting easier.
    2. The use of PETs offers not only a means of bringing together data sets that cannot currently interact because of worries about privacy, but also a way for all sorts of organisations to collaborate securely across borders.
    3. although American and Canadian records of the value of wood pulp traded between the two countries were basically the same, their data on the value of the clock trade differed by 80%.
    4. The output is likewise statistically blurred, using differential privacy, before being sent back to the original inquirer.
    5. For extra security, cryptographic hashes and digital signatures are applied, to prove that only authorised operations have taken place
    6. a so-called “privacy budget”,
    7. they cannot be reverse-engineered to reveal individual records
    8. differential privacy.
    9. That inquirer thus receives its answers, but never has access to the information on which those answers are based.
    10. secure multiparty computation (SMPC)
    11. The UN PETs Lab, which opened for business officially on January 25th, enables national statistics offices, academic researchers and companies to collaborate to carry out projects which will test various PETs, permitting technical and administrative hiccups to be identified and overcome.
    12. privacy-enhancing technologies (PETs)

      New terminology.

    13. Reasons of confidentiality mean that many medical, financial, educational and other personal records, from the analysis of which much public good could be derived, are in practice unavailable.
    14. DATA ARE valuable. But not all of them are as valuable as they could be.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “Pioneers” are the people on a mission to change the world; “artisans” are interested in mastering a specific skill; “operators” derive a sense of meaning from life outside work; “strivers” are more focused on pay and status; “givers” want to do work that directly improves the lives of others; and “explorers” seek out new experiences.

      How to combine the following type of characters in one team: “Pioneers” are the people on a mission to change the world; “artisans” are interested in mastering a specific skill; “operators” derive a sense of meaning from life outside work; “strivers” are more focused on pay and status; “givers” want to do work that directly improves the lives of others; and “explorers” seek out new experiences.

      The success of one team is to have right blend of different characters.

    2. And teams are likelier to perform well if they blend types of employees: visionaries to inspire, specialists to deliver and all those people who want to do a job well but not think about it at weekends. Like mayonnaise, the secret is in the mixture.
    3. they felt their roles had less meaning when they no longer had direct responsibility for the well-being of passengers.
    4. Having a purpose does not necessarily mean a desire to found a startup, head up the career ladder or log into virtual Davos. Some people are fired up by the prospect of learning new skills or of deepening their expertise.
    5. “Pioneers” are the people on a mission to change the world; “artisans” are interested in mastering a specific skill; “operators” derive a sense of meaning from life outside work; “strivers” are more focused on pay and status; “givers” want to do work that directly improves the lives of others; and “explorers” seek out new experiences.

      Archetypes of people.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL