1. Jan 2022
    1. Last year Amazon Web Services (AWS), the online giant’s cloud-computing arm, introduced Amazon SageMaker Canvas, a set of tools that lets people deploy machine-learning models without writing code.
    2. low code/no code (LC/NC) tools
    3. Power Apps platform
    4. Just 25m people around the world are fluent in standard programming languages
    5. They allow anyone to write software using drag-and-drop visual interfaces alone (no code) or with a bit of code creeping in (low code).
    6. “the future of coding is no coding at all”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Now its neighbours’ instability looks like a risk to the solemnly invoked peace that underpins the whole European project.
    2. By contrast, France’s President Emmanuel Macron relentlessly pushes the idea that Europe must develop its own “strategic autonomy”.
    3. Bits of eastern Europe see NATO, and specifically America, as the bedrock of their security.
    4. The way Europe deals with its neighbourhood is an extension of how it was built.

      Should it apply to 'digital'.

    5. Europe sends money, and recently vaccines, as part of its “neighbourhood policy”, which extends to bits of the Middle East. But the task is low on its list of priorities.
    6. In the western Balkans, pound-shop demagogues rant and loot. Across the Mediterranean, a mere people-smuggling dinghy ride from the EU, North Africa now mixes a drift away from democracy (Tunisia) with civil war (Libya).
    7. But peace stops at the EU’s borders.
    8. the crucial thing about the European project is that it has delivered peace.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China has long nurtured ambitions—invigorated by American sanctions but so far unsuccessful—to build a fully fledged chip industry.
    2. It aspires to double Europe’s share of chipmaking, currently around 10%.
    3. The shortages, and America’s tech-flavoured trade war with China, have reminded politicians how vital chips are to the modern economy—and how over-reliant their supply is on a few giant firms.
    4. TSMC’s boss, C.C. Wei, said this month that a correction could be “less volatile” for his firm thanks to its position at the technological cutting-edge.
    5. The chip business has swung between over- and undercapacity since it emerged in the 1950s, observes Malcolm Penn of Future Horizons, a firm of analysts (see chart). If history is a guide, then, a glut is in on the way. The only question is when.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. on January 20th both Meta and Twitter integrated NFTs into their platforms.

      How?

    2. the creator economy

      another buzz concept to be followed

    3. web3 will not dislodge web2.
    4. the future may belong to a mix of the two, with web3 occupying certain niches.
    5. One is that the ownership of the computing power that keeps many blockchains up to date is often very concentrated, which gives these “miners”, as they are called, undue influence.
    6. at recently launched web3 projects, between 30% and 40% is owned by the people who launched them.
    7. Despite being a relatively recent phenomenon, web3 is exhibiting signs of centralisation. Because of the complexity of the technology, most people cannot interact directly with blockchains—or find it too tedious. Rather they rely on middlemen, such as OpenSea for consumers and Alchemy for developers.

      Parallel with TCP/IP. promise of decentralised communication has not realised because of practical usability.

    8. “If something is truly decentralised, it becomes very difficult to change, and often remains stuck in time,” he writes. That creates opportunities: “A sure recipe for success has been to take a 1990’s protocol that was stuck in time, centralise it, and iterate quickly.”
    9. Lock-in, reckons Mr Marlinspike, tends to emerge almost automatically.
    10. That was the problem of early web3 offerings (then called “peer-to-peer” or “the decentralised web”).

      Previous Web 3.0 attempts

    11. Unlike Google and Meta they do not control their users’ data. OpenSea (in which a16z also has a stake) and Alchemy are just pipes to the blockchain. If their customers are unhappy, they can move to a competing service.
    12. Syndicate helps investment clubs organise themselves into “decentralised autonomous organisations” governed by “smart contracts”, which are rules encoded in software and baked into a blockchain.
    13. This is possible thanks to blockchains, which turn the centralised databases to which big tech owes its power into a common good that can be used by anybody without permission. Blockchains are a special type of ledger that is not maintained centrally by a single entity (as a bank controls all its customers accounts) but collectively by its users. Blockchains have outgrown cryptocurrencies, their earliest application, and spread into NFTs and other sorts of “decentralised finance” (DeFi). Now they are increasingly underpinning non-financial services.

      about evolution of blockchain

    14. Web3, in Mr Dixon’s telling, “combines the decentralised, community-governed ethos of web1 with the advanced, modern functionality of web2”.
    15. More recently, open-source software, which users can download for nothing and adapt to their needs, took over from proprietary programs in parts of the industry—only to be reappropriated by the tech giants to run their mobile operating systems (as Google does with Android) or cloud-computing data centres (including those owned by Amazon, Microsoft and Google).
    16. since November some $1trn of the value of cryptocurrencies, the most mature province of web3, has gone up in flames.
    17. “You don’t own ‘web3’. VCs and their [limited partners] do,”
    18. Pitted against them are the sceptics.
    19. On one side sit techno-Utopians, firms offering assorted web3 services and their VC backers.
    20. His token showed that NFTs are not as non-fungible as advertised. And OpenSea’s reaction illustrated that the supposedly decentralised web3 has its own gatekeepers.
    21. NFTs are the most visible instantiation of “web3”—an idea that its advocates and their venture-capital (VC) backers hail as a better, more decentralised version of the internet, built atop distributed ledgers known as blockchains.
    22. NFTs are the most visible instantiation of “web3”—an idea that its advocates and their venture-capital (VC) backers hail as a better, more decentralised version of the internet,
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The remedy for the failures of competition policy is not to abandon the consumer welfare standard but to bring it up to date.
    2. The large and fluid tech ecosystems offered by Alphabet, Amazon, Apple and others show the complexity of the task: they are in an innovative phase with new services being created that are highly popular and they increasingly compete with each other. It would be easy to erode the quality of their products with ill-judged rules.
    3. Regulators and governments, especially in Europe, must be realistic about their ability to anticipate consumers’ needs and should not pursue firms purely because they have grown big by being useful
    4. Before the consumer welfare standard emerged in legal judgments in the 1970s and 1980s, America’s trustbusting was capricious.
    5. a bill that would ban tech giants from using their platforms to favour their own services.
    6. Since the 1990s the EU has tended to put consumers’ interests first, but now its commissioner wants to apply a “broader notion” of harm.
    7. One school, named after Louis Brandeis, a judge, holds that big companies must be tamed because they corrupt politics and damage customers, competitors and staff. The other says the goal of antitrust is to protect the welfare of consumers, which can be enhanced by big, efficient firms. For decades the consumer approach has been ascendant, but now the consensus has frayed and trustbusters are heading in a Brandeisian direction.

      Two schools of thought in competition policy.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Interoperability often requires a level of commercial and technical finesse rarely seen in the management of government contracts.
    2. In 2017 thousands of Google employees signed a letter outlining their unhappiness with the company’s role in the Maven project. Microsoft’s bid for the JEDI contract faced internal opposition on similar grounds. Many others will also have concerns about data fusion on such a scale, for military or any other purposes.
    3. to build “a continuous pipeline of all-source intelligence analysis” into “continually learning analytic engines”.
    4. “data fusion”—combining different pieces of information to reveal things that one source cannot capture, including things no human would think to look for.

      Data fusion - a new concept that we may use in our 'lingo' (to sound 'cool')

      ||JovanNj||||anjadjATdiplomacy.edu||

    5. In 2019 the Pentagon awarded Microsoft a $10bn contract for its Joint Enterprise Defence Infrastructure (JEDI). Last year Amazon, which has been supplying the CIA with such services since 2013, got the contract annulled. A new tender issued in November will probably see the work shared among a number of firms. There will be more than enough to go around.
    6. an increasing amount of processing be done “on the edge”—that is, on the platform carrying the sensor.

      Chance also for human-driven AI systems.

    7. an narrow down a huge range of potential targets and pass information about them freely to where it is most needed.
    8. But radar’s capabilities had to be built into systems that made use of them.
    9. you need ways to combine their data into information that can be acted on at speed.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. For Diplo-team I will provide access to data with statistics. There are a few reasons why this display is useful for us:

      1. Infographics and presentation: it presents data in an effective way ||JovanNj|| ||anjadjATdiplomacy.edu||

      2. For our language and diplomacy courses, this text provides useful analysis ||Andrej|| ||Dragana||

      3. It is a good update for our DW on multilingaulism ||AndrijanaG||

      4. ||MarcoLotti|| It could be a good input for Francophonie course to see how French language is featuring in these changes identified by spotify. It can bring an intersesting language angle to the course (with impact on governance, e-comemrce, etc.). ||MariliaM|| ||Cecile||

    2. We labelled each of the roughly 1,700 songs with the lyrics language using an automated technique.
    3. Many of the K-pop bands popular in South Korea manage to achieve global success by mixing in some English.
    4. we plotted the most-streamed song for countries in each group weekly for the full five-year period, revealing precisely when and where these leaps happen.
    5. the hegemony of English is in decline.
    6. The Economist trawled through the top 100 tracks in 70 countries according to Spotify.

      Is this research by Spotify available?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. that price will be paid from the wallet rather than through physical suffering.
    2. the amount of gas held in storage.
    3. he thinks extra LNG could fill 15% of the shortfall that would result from a complete Russian cut-off.
    4. to retire coal-fired power stations and its rash decision, taken in the wake of Japan’s Fukushima disaster, to shut down its nuclear plants, it remains more reliant on natural gas than it need be.
    5. Germany is the most vulnerable.
    6. This would be felt most acutely in Slovakia, Austria and parts of Italy (see chart), reckons David Victor of the University of California, San Diego
    7. Without a war, JPMorgan Chase, a bank, forecasts that higher prices will lead to Gazprom making over $90bn in gross operating profit this year, up from $20bn in 2019.

      Interesting survey of gas-dependence

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Does the USA policy towards China on microchips suply chains work? Most likely not, according to the Economist latest coverage.

      But 'chip diplomacy' is taking top of many diplomatic meetings worldwide as the US tries to keep focus on this important strategic issue.

      Biden administration has been shifting from Trump's approach of banning export microchips to Chinese companies such as Huawei towards more multilateral solutions that will 'secure supply chains' as it is terminologically framed.

      The USA, according to the Economist, faces the following dilema:

      America is caught between choosing a softer set of controls which may work better in the long run, or a harsher set that could hurt Chinese technology more in the short run but might harm American industry overall.

      In search for opitmal approach for the US interest, it has to take into consideraiton the following elements:

      • unilateral control does not work since there are ways to bypass export bans. In short run, some companies may be hurt as it was the case with Huawei, but in medium and long term it will fail.
      • Asian and European countries are not willing to go with harsh sanctions towards China. They also prefer multilateral solution why USA prefers fast solution among group of 'like-minded countries'.

      In the search for a compromise solution, they are experimenting with the development of, what the Economist, calls 'The Organisation of the Semiconductor Exporting Countries' (analogous to OPEC for Petroleum). But, more immediate solution are searched, including the cooperation in the context of the EU-US Trade and Technology Council, QUAD cooperation, etc.

      You can access the Economist article here.

      The GIP Digital Watch will follow these developments closely.

      ||VladaR||

    2. may yet agree on how to contain China’s semiconductor ambitions. But it may prove impossible for one state to control such a complex industry.
    3. despite Mr Trump’s campaign to snuff out China’s indigenous industries and Mr Biden’s more multilateral attempts to achieve the same end.
    4. American semiconductor companies and those in friendly countries could sell their most advanced chipmaking services to the Chinese market, yet still be able to prevent Chinese firms from developing the most sophisticated manufacturing capacity themselves.
    5. should focus on protecting trade secrets.
    6. controlling exports of specific machines and components is unwise anyway, because no net of controls can be drawn tightly enough to stop a determined,
    7. a compromise by cutting off Chinese access to chips and chipmaking tools above a certain level of sophistication.
    8. America is caught between choosing a softer set of controls which may work better in the long run, or a harsher set that could hurt Chinese technology more in the short run but might harm American industry overall.

      Key dilemma

    9. Without America’s friends on board America’s hard line on exports threatens to weaken its own companies.
    10. The Europeans and the Japanese both want a more formal multilateral approach. But America reckons its ability to react fast to a Chinese threat would inevitably be curbed.
    11. narrower coalition-of-the-willing approach to diplomacy.
    12. the leading countries in the chip supply chain—America, Japan and the Netherlands

      Where is Taiwan?

    13. the Semiconductor Industry Association
    14. of meetings to discuss sanctions that might be put on Russia
    15. the Quad, a club of countries that embraces America, Australia, India and Japan.
    16. global chip diplomacy is still weak.
    17. to co-operate in “rebalancing” global chip supply chains. That was diplomatic language for keeping them away from China.
    18. he EU-US Trade and Technology Council,
    19. Officials pay lip service to the idea of updating Wassenaar so that it might help control the trade in semiconductors.
    20. the Organisation of the Semiconductor Exporting Countries: OSEC.
    21. he has never seen semiconductors so consistently top the diplomatic agenda.
    22. must build a consensus with friendly countries.
    23. lose its grip over the chip supply chain.
    24. to develop their own versions of chip technologies they had previously imported along supply chains linked to firms in America.
    25. beyond the reach of American law.
    26. to evade America’s Export Administration Regulations, qualifying them as “ EAR-free”
    27. Last year Huawei’s revenues shrank for the first time in a decade, by almost a third.

      It is direct impact of sanctions and banning of Huawei.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Digitalization is the use of digital technologies to change a business model and provide new revenue and value-producing opportunities; it is the process of moving to a digital business.

      focus on business model

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tereza sent me an interesting link on Canvas experiment with using spreadsheet. Our AI team will follow-up on it in order to see if we can use anything from it.

      I found one aspect intereting. Most business solutons, including Tableaux, are too complex. They also start form assumption that users are not intelligent.

      We used spreadsheet intensively in www.diplomacy.edu and dig.watch transition and found it close to basic logic in organising data for which you do not need specialised knowledge.

      Behind our data sandbox is also idea of spreadsheet in displaying and arranging data.

      There is more to be explored in this experiment on the following aspects:

      • what is basic human cognition in terms of identifying mainly causations - e.g. Is it alrady captured in the logic of spreadsheet (X/Y axis)?
      • how to transfer this basic cognition into usable systems used by Diplo and GIP?
    2. “Fundamentally, this resulted in a breakdown of trust between the business and the data sides of the house. That inspired us to leave Flexport and really try to understand its problem and solve it.”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Space and aviation technology requires high level of fault-tolerance. It is interesting that European space/aviation industry is shifting towards RISC-V open source approach. This text summarises De-RISC project on this topic.

      ||VladaR||

    2. with heritage in design of fault-tolerant systems.
    3. with no dependence on external technology or licenses,
    4. To some extent, RISC-V is at hardware (HW) level what Linux was in its origins at Operating System level, offering a competitive open source platform able to compete with Windows-based products.
    5. requires improved computing performance, and methods to ensure safe and reliable software (SW) execution
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. open standard, it is designed to be adopted by any software, device, or online platform as well as by regulatory bodies and government agencies to establish standards for digital provenance
    2. C2PA specification will provide platforms with a method to define what information is associated with each type of asset (e.g., images, videos, audio, or documents), how that information is presented and stored, and how evidence of tampering can be identified
    3. establishing the provenance of media is critical to ensure transparency, understanding, and trust
    4. empowers content creators and editors worldwide to create tamper-evident media, by enabling them to selectively disclose information about who created or changed digital content and how it was altered
    5. released version 1.0 of its technical specification for digital provenance

      New industry standard for digital provenance of content. Can help address deepfakes.

    6. the Coalition for Content Provenance and Authenticity (C2PA)

      Another industry consortia working on standards and specifications: C2PA focused on content provenance and authenticity.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. concrete hope toward making these qubits compute
    2. the MIT team’s new qubit appears to be extremely robust, able to maintain a superposition between two vibrational states, even in the midst of environmental noise, for up to 10 seconds.

      robustness as a key characteristic of the new qubit

    3. many types of qubits, some of which are engineered and others that exist naturally
    4. Where a classical bit in today’s computers carries out a series of logical operations starting from one of either two states, 0 or 1, a qubit can exist in a superposition of both states. While in this delicate in-between state, a qubit should be able to simultaneously communicate with many other qubits and process multiple streams of information at a time, to quickly solve problems that would take classical computers years to process.

      clear explanation of superposition

    5. such wobbly qubits could be a promising foundation for future quantum computers
    6. when pairs of fermions are chilled and trapped in an optical lattice, the particles can exist simultaneously in two states — a weird quantum phenomenon known as superposition.
    7. MIT physicists have discovered a new quantum bit, or “qubit,” in the form of vibrating pairs of atoms known as fermions.

      New qubit in vibrating pairs of atoms - fermions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. PRINCIPLES FOR DIGITAL DEVELOPMENT

      Inclusion is not explictely outlined. Inclusion 'include' technical aspect (access), policy, skills, gender, etc.

    2. Design for scale:Widespread distribution of digital projects requires more than a pilot project, but also sustainable models and funding and partners who are also able to implement the initiatives in other regions.4) Build for sustainability: To achieve long-term impact, it is important to support users and stakeholders equally – with sustainable programmes, platforms and digital tools

      These two principles have certain overlap since scalling requires sustainable solutions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Vožnja električnim automobilom skuplja nego "dizelašem"

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Twist takes a big step towards making quantum programming easier by guaranteeing that the quantum bits in a pure piece of code cannot be altered by bits not in that cod
    2. The scientists designed Twist to be expressive enough to write out programs for well-known quantum algorithms and identify bugs in their implementations.
    3. understanding the meaning of a quantum program requires understanding the entanglement present in its data
    4. Twist paves the way to languages that make the unique challenges of quantum computing more accessible to programmers
    5. “Our language Twist allows a developer to write safer quantum programs by explicitly stating when a qubit must not be entangled with another,”
    6. Twist can describe and verify which pieces of data are entangled in a quantum program, through a language a classical programmer can understand.
    7. discarding one qubit without being mindful of its entanglement with another qubit can destroy the data stored in the other, jeopardizing the correctness of the program.
    8. Twist is an MIT-developed programming language
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This article provides a solid and balanced analysis of Putin's claim that NATO's expansion towards East has been breach of deal which was made between USA and Soviet Union in1990s.

      This text provides necessary context for understanding 1990s and the end of the cold war.

      Legally speaking it misses on a few points like most of commentators in the recent crisis:

      • international agreements do not need to be signed. Agreed text in the form of treaty provides clarity as it would in this case. It is unclear if there was 'agreement' or tactical probing during the re-unification of Germany.
      • even if agreements are signed there are two - sometimes - contradicting principles of international law: pacta sunt servanda and rebus sic stantibus. The first one stipulates that you must observe agreement as it is written. Second one stipulates that agreement could be interpreted and implemented in accordance to changing context.

      Article also misses deeper historical context. Namely, in Russian 'collective consciousness' there a deep fear from invasion that dates back to Mongoles and more recently with Napoleon and Hitler. It dates back to invasions from the East by Mongoles Ginggis Cthere is a very deep fear in Russia from invasion. It is shaped by huge territory of plains wihtout any major barrier towards West. For example, one of rare issues with consensus in Russia is fear of invasion following strong historical memory of Napoleon and Hitler. There is saying that 'Russian liberalism ends at the border with Ukraine.” which is proven by Navalny's views on 'state issues' in Russia.

      Here is a crucial dynamics of the current crisis. While Putin exploites this deep fear in dealing with Ukraina, there is a risk that Navalny or anyone else may be even more radical in order to prove 'his/her statehood credentials'.

      All in all, this crisis has to be managed on different levels. The first step would be to safe Ukrainians from becoming victim of something which was and is currently beyond their influence and overall reach.

      History, as always, must be handled with utmost care!

    2. By calling on NATO to pull military infrastructure out of Eastern Europe, and on the U.S. to offer written guarantees that it will never support Ukraine’s accession to NATO, Sarotte told me, “he wants a do-over of 1997.”
    3. “Just as a glacier sweeps across a landscape slowly, yet alters broad swathes of terrain profoundly, so too did NATO’s expansion eastward force elements of the post-Cold War political landscape to shift and settle, leaving behind landmarks for the twenty-first century.”
    4. At a summit in Helsinki, Clinton promised to give Yeltsin four billion dollars in investment in 1997, as much as the U.S. had provided in the five years prior, while also dangling W.T.O. membership and other economic inducements.
    5. Washington “must be very careful not to be seen as running after the Russians, offering them concessions,” Clinton’s Secretary of State at the time, Warren Christopher, said.
    6. Putin’s current demand—clearly provocative and unrealistic—is for NATO to remove its military infrastructure from states that joined after the 1997 agreement.
    7. a Russia-NATO agreement signed by his predecessor Boris Yeltsin in May, 1997
    8. (Moscow, short on cash and presiding over a collapsing empire, was in desperate need of the fifteen billion Deutsche marks that it received in order to withdraw Soviet forces from East Germany); Western confidence and ambition (“To hell with that,” Bush had told Kohl at Camp David, dismissing the Soviets’ efforts to dictate Germany’s future relationship with NATO. “We prevailed and they didn’t”); and bungling negotiating on the part of Gorbachev (“This carelessness will take its revenge on us,” Valentin Falin, a top Soviet official and expert on Germany, remarked).
    9. In September, 1990, Gorbachev signed off on the Treaty on the Final Settlement with Respect to Germany
    10. as a sign that the secretary had only been test-driving one potential option of many.”
    11. Soviet leaders would rather see Germany anchored in a multilateral alliance than left on its own.
    12. the West should lock in as many gains as it could before the political climate shifted yet again and Moscow’s position became more entrenched
    13. “An extension of NATO’s territory to the east, that is, nearer to the borders of the Soviet Union, will not happen,” he said in one address, as Sarotte recounts.
    14. the context of the moment
    15. the truth looks to be somewhere in between.”
    16. Did the West, led by the U.S., promise to limit NATO expansion eastward?
    17. The phrase “not one inch” is a reference to a statement made by U.S. Secretary of State James Baker, in 1990
    18. “ ‘Not one inch to the East,’ they told us in the nineties. So what? They cheated, just brazenly tricked us!”
    19. have different interpretations of history
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Why Washington Can’t Learn

      An interesting text on incapability to learn. Author considers Vietnam and Afganistan war as long war (one war) which was driven ideologically by American exceptionalism and executed via military might.

    2. Only if Americans abandon their fealty to the idea of American Exceptionalism and the militarism that has sustained it, might it be possible to conclude that the wars in Vietnam and Afghanistan served some faintly useful purpose.
    3. Almost certainly, the North Vietnamese would have succeeded in uniting their divided country with much less bloodshed. And Taliban control of Afghanistan would in all likelihood have continued without interruption in the years following 2001, with the Afghan people left to sort out their own destiny. Yet, despite immense sacrifices by U.S. troops, a vast expenditure of treasure, and quite literally millions of dead in Southeast Asia and Afghanistan, that’s exactly how things turned out anyway.
    4. too few Americans are willing to confront the disaster that has befallen the United States as a consequence of our serial misuse of military power.
    5. Reliance on conscription to raise the force that fought in Vietnam spurred widespread popular opposition to that war. Reliance on a so-called volunteer military to carry the burden of waging the Afghan War allowed ordinary Americans to ignore what was being done in their name, especially when field commanders devised methods for keeping a lid on U.S. casualties.
    6. It’s time to substitute a narrative describing an American military enterprise that began when the first U.S. combat troops came ashore in South Vietnam and persisted until the last American soldier departed Kabul in defeat some 56 years later.
    7. Subsuming them, however, was the concept of American exceptionalism.
    8. While these events unleashed a torrent of self-congratulation in the U.S., the passing of the Cold War did not substantively modify the aspirations or expectations of the American people. For decades, the United States had exerted itself to uphold and enhance the advantageous position it gained in 1945. Its tacit goal was not only to hold the communist world in check but to achieve ideological, economic, political, and military primacy on a global scale, with all but the most cynical American leaders genuinely persuaded that U.S. supremacy served the interests of humankind.
    9. Among the things it left fully intact was a stubborn resistance to learning in Washington that poses a greater threat to the wellbeing of the American people than communism or terrorism ever did.
    10. That war was destined to continue for 20 years. By the time it ended, many observers had long since begun to compare it to Vietnam. The similarities were impossible to miss. Both were wars of doubtful strategic necessity. Both dragged on endlessly. Both concluded in mortifying failure. To capture the essence of the war in Afghanistan, it didn’t take long for critics to revive a term that had been widely used to describe Vietnam: each was a quagmire. Here was all you needed to know.
    11. The Global War on Terror now became the organizing principle for American statecraft, serving a function comparable to the Cold War during the second half of the prior century.
    12. When President Richard Nixon visited “Red” China in 1972, the Cold War morphed into something quite different. With the nation’s most prominent anticommunist taking obvious delight in shaking hands with Chairman Mao Zedong in Beijing, the war effort in Vietnam became utterly inexplicable — and so it has remained ever since.
    13. In history, context is everything.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. "Entanglement forging essentially enables you to cut up a larger circuit into smaller circuits that we can execute on smaller hardware
    2. Entanglement forging could markedly expand the computational power of quantum systems

      advantage of entanglement forging: expand the computational power of quantum systems (and using less qubits)

    3. Entanglement forging, it turns out, involves the use of a classical computer to capture quantum correlations and effectively split the problem in half, making it possible to separate the 10 spin-orbitals of the into two groups of five that could be processed separately. This doubles the size of the system that can be simulated on quantum hardware.

      "entanglement forging" - combining quantum and classical "resources"

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. would speed technological innovation
    2. bring even more vendors into the wireless industry, by allowing companies to hyperspecialize.
    3. In its most ambitious version, Open RAN would split the RAN into smaller components beyond the radio and the baseband unit.
    4. “Ericsson is probably in the party that's fighting back the most against Open RAN, because they will probably have the most to lose."
    5. disaggregation
    6. The surest way to avoid such a disaster is to stick with the same vendor from one end of the network to the other, thus avoiding any possibility of mismatched interfaces.
    7. companies that can provide cutting-edge end-to-end networks. It's now just three: Ericsson, Nokia, and Huawei.
    8. the tweaks primarily take the form of vendors defining radio parameters that were intentionally left blank in 3GPP standards for future development.
    9. there is nothing preventing a vendor from “complementing" a standardized interface with additional proprietary techniques.

      explains the point above on interoperability

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Unfortunately, the long and short of it is usually: the more qubits you have the more errors you get. The new research hopes to alleviate that by creating a new way to handle qubit operations, thus allowing gate-based quantum computer systems to scale.

      what all this means

    2. each team was able to build a distinct, silicon-based, two-qubit quantum computing system capable of operating with greater than 99% accuracy

      silicon-based, two-qubit quantum computing system able to operate with >99% accuracy

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. e are not seeing to splinter the internet
    2. defected
    3. defectio
    4. incorporating diverse stakeholder views
    5. While the initial call to action and the ultimate Alliance would consist of governments, ultimately the Alliance would also include a substantial multi-stakeholder component,
    6. exceptions such as blocking illegal content and/or specified national security exemption
    7. pen and interoperable access for software and apps
    8. nondiscrimination among Alliance members in domestic regulation in the internet secto
    9. a commitment to use only trustworthy providers for core information and communications technologies network infrastructure.
    10. echnical and non-technical security standards
    11. a plan to develop a charter of operational principles and commitments over the course of 2022 and 202
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. his year, Chinese researchers have produced more AI-related papers than any other nation, with the country having 27.68% of the global share of research papers in the field of AI and becoming the global lead in our Research in AI papers indicator, boosting its score in the Human Capital dimension.
    2. Indonesia and Vietnam have both released na-tional AI strategies in the time since our 2020 index was compiled

      Add to our mapping. ||sorina||

    3. This reflects the country’s Vision dimension score (it has a National AI Strategy), its commitment to addressing ethics in AI as shown in its Artificial Intelligence Governance Framework,

      Make sure these are in our mapping. ||sorina||

    4. he country recently published its National AI Strategy with strategic priorities for the period 2021-2025.

      Add to our mapping. ||sorina||

    5. In 2020, the Ethiopian Council of Min-isters established an artificial intelligence (AI) re-search and development centre.
    6. Kenya has de-veloped an AI taskforce (consisting of 11 experts from relevant government agencies, the private sector, academia and other stakeholders)
    7. Mauritius has developed an official National AI Strategy, which sets out a plan from 2018-2022 to guide progress in this area. Although South Africa is yet to launch a national AI strategy, it has established a Presidential Commission on Fourth Industrial Revolution.

      Add to our mapping. ||sorina||

    8. Qatar and Saudi Arabia unveiled their National AI Strat-egies. Qatar’s National Artificial Intelligence Strat-egy focuses on six main pillars: education, data access, employment, business, research, and ethics. Additionally, the strategy aligns with the overarching Qatar National Vision 2030, which identifies artificial intelligence as a central compo-nent in the country’s transition from an oil-based economy to a knowledge-based economy. Simi-larly, Saudi Arabia released its National Data and Artificial Intelligence Strategy, with six goals

      Add to our mapping. ||sorina||

    9. the largest range of scores
    10. Ukraine, in fact, released its national AI strategy in Decem-ber 2021,

      Add to our mapping. ||sorina||

    11. four new national AI strategies in Eastern Europe: Bulgaria, Slovenia, Hungary, Latvia.

      Make sure these are in our mapping. ||sorina||

    12. he number of AI and non-AI technology unicorns rise from 43 to 62 in the region
    13. those countries in Western Europe who are not developing national AI strategies (Iceland and Switzerland) are not EU member states.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL