- Mar 2022
-
bdtechtalks.com bdtechtalks.com
-
On the other hand, current AI systems are very sensitive to edge cases, situations that they haven’t encountered during training.
Limit of AI
-
The division of labor between System 1 and System 2 is nature’s solution to creating a balance between speed and accuracy, learning and execution.
Good division of tasks.
-
System 2, on the other hand, is the slow and meticulous type of decision-making that requires logic, rational thinking, and concentration, such as solving complex mathematical equations, playing chess, or walking on a narrow ledge.
-
System 1 is fast, implicit, intuitive, and imprecise.
Tags
Annotators
URL
-
-
www.semrush.com www.semrush.com
-
specific
-
relied on real experience
-
what is vital is offering content that makes it easier for people to decide what product to buy.
-
gives this little blurb a ton of context
-
The page’s placement on the SERP highlights the demand for content that helps the user know how to go about buying something and what to look for. It’s the kind of intent that we’ve seen Google call for on review pages
-
a page that guides you through home theater systems, specifically wireless ones. Along the way, there are product recommendations and ultimately, offers for a series of systems they also recommend that you buy.
-
only half of the page is entirely relevant to query.
-
Intent.
-
that speaks more closely to the user’s intent might be even better
-
you get the sense that the author has listened to the speaker personally and is basing the assessment off of real use.
-
Having all of the right elements on the page, from comparative charts to boxes listing pros and cons, is not beneficial unless the content within those elements is substantial and helpful.
-
it was one massive comprehensive blog post-like piece of content built on other massively informative and expertly created pieces of content.
-
Google knows when you add page elements for the sake of some SEO checklist vs for the sake of the reader.
-
What is gaining momentum in Google search in 2022?
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
he numerous grievances Russia’s l
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
It all comes down to human choices.
-
A brief attempt at independence was quickly crushed by the Red Army that re-established Russian rule.
to check this part of history
-
Maybe the law of the jungle is a choice rather than an inevitability?
-
The first and most obvious result of a return to the law of the jungle would be a sharp increase in military spending at the expense of everything else.
-
the fact that it stems from human choice also means that it is reversible.
-
It resulted from humans making better choices. It is arguably the greatest political and moral achievement of modern civilisation.
-
In recent decades governments around the world have felt safe enough to spend an average of only about 6.5% of their budgets on their armed forces, while spending far more on education, health care and welfare.
-
meant only “the temporary absence of war”.
-
in the first two decades of the 21st century human violence has killed fewer people than suicide, car accidents or obesity-related diseases. Gunpowder has become less lethal than sugar.
-
In the past few generations, however, for the first time in history the world became dominated by elites who see war as both evil and avoidable.
true
-
wheat fields and oil wells, today the main source of wealth is knowledge.
I am not sure it will remain this way. Knowledge will loose relevance as we get closer to our 'animalistic nature' of survival. Physical things will regain relevance. It will be interesting dynamics to follow.
-
the so-called law of the jungle isn’t a natural law at all.
Rousseau
-
One school
Hobbs
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
ven fought a brief border war. By contrast, Mr Putin has enlisted Beijing in the effort to oppose NATO enlargement.
-
offered one another s
-
He likes to demonstrate
-
-
www.diplomatie.gouv.fr www.diplomatie.gouv.fr
-
Embody a European digital sovereignty, that is to say a real strategic autonomy based on a capacity for action and choice:
Finally some definition of digital sovereignty and a strategic autonomy - key is 'capacity for action and choice'.
-
Build a digital regulatory framework based on multilateral and multi-stakeholder dialogue
-
to become a Common
-
to transform their practices and values into de facto standards
-
-
www.eda.admin.ch www.eda.admin.ch
-
The Foreign Policy Strategy 2020–23 defines the basic principles for digital foreign policy and sets out the vision of a free, open and secure digital space.
Importance of open Internet.
-
-
digitalpublicgoods.net digitalpublicgoods.net
-
Below are the 9 indicators and requirements that determine if nominated software, data, AI models, standards and/or content can be considered a DPG.
As I was reading requirements for this approval, I was wondering who can provide all of these. Open source projects are very demainding in terms of people and resources (documentation, annotated code, etc.)
||sorina||||MariliaM||||Katarina_An||
-
open-source software, open data, open AI models, open standards, and open content that adhere to privacy and other applicable best practices
all 'open' aspects to use for open event/initiative
||sorina||||Katarina_An||
-
- Feb 2022
-
www.solwininfotech.com www.solwininfotech.com
-
This is WP Timeline Designer
-
-
www.news.com.au www.news.com.au
-
Elon Musk responds to Russia’s International Space Station threat
||sorina||||nikolabATdiplomacy.edu|| Could we have update on this risk. We can also include it in the Ukraine page
||VladaR||||AndrijanaG||
-
-
-
The fact that Putin has invaded Ukraine emphasises the limitations of cyber weapons.
-
Microsoft’s Digital Defense Report, published last October, attributed 58 per cent of all known nation state cyber attacks to Russia over the previous year.
||VladaR|| da li si znas za ovaj Microsoft Report
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Elliptic’s Robinson, however, noted creative uses of crypto countries under sanction. He said Iran has been able to put its oil reserves to use by repurposing it to mine energy-intensive crypto, potentially salvaging hundreds of millions of dollars. “Cryptocurrency mining provides a way for Russia to monetize its oil and gas reserves on the global market even if it isn’t able to physically export them,” he said.
-
Some Russian figures are also urging more internal oversight of cryptocurrency. In a televised meeting with Putin on Thursday, Alexander Shokhin, the head of the business group the Russian Union of Industrialists and Entrepreneurs, made the case to the Russian leader that for the sake of “minimization of external financial risks,” the government should “institute effective regulation of digital financial assets and cryptocurrency."
-
The Biden administration has been leaning on the crypto industry to take its own steps to block and report sanctioned entities. The Treasury Department in October published guidance reminding crypto companies that they are responsible for policing their own platforms and that slip-ups could lead to “enforcement actions … and negative impacts on a company’s reputation and business.”
-
And U.S. authorities have demonstrated a growing sophistication in tracking and seizing illicit crypto funds, a fact that could further deter Russian interests looking for ways to evade the wave of new sanctions.
-
Crowdfunding for global causes is not new, but crypto makes it easier to transfer the funds, which are not subject to the same hurdles as traditional bank transfers.
-
Chainalysis ranks Ukraine as the top European adopter of cryptocurrency and the fourth biggest in the world.
-
“Because there is no central controller who can impose their morals on its user, crypto can be used to crowdfund for the Ukrainian army or help Russia evade sanctions,”
-
-
www.newyorker.com www.newyorker.com
-
But the world in which such a war is possible has been forged jointly by Russia and the United States, starting twenty-three years ago.
-
International law allows military action under two scenarios: if a nation or nations are acting in self-defense, or if they have the sanction of the U.N. Security Council. Yet some scholars have argued that the Kosovo air war was legal. A paper published in Parameters, the quarterly publication of the U.S. Army War College, in 2000 proposed a sort of “natural law” justification for the war; a memo submitted to the British Parliament by a law professor at the London School of Economics argued, in effect, that the war was legitimate even in the absence of Security Council approval. “You will still find a substantial number of legal scholars who will say, ‘We should recognize that international law is not a straitjacket,’ ” Douglas told me. “But if the law is only a recommendation, then it’s not law. ‘Laws apply to them but not to us’ is not the way a legal regime works. The air war in Kosovo made international law look like a farce. It applies only to the weak.”
It is a good summary of the end of international public law in 1999.
-
“There was no way Carla Del Ponte was going to bring charges against the very nations that were funding the I.C.T.Y.,” Douglas said. “If she did, the U.S. and Great Britain could have just pulled the plug on the tribunal.”
-
‘War of humanitarian intervention’ is such a bizarre term that it can be used to justify any kind of aggression,” he said.)
-
Primakov had his plane turned around over the Atlantic and returned to Moscow.
this was symbolic end of cooperation between USA and Russia.
-
“It’s impossible to imagine air raids in Kyiv.” Before I could catch myself, I blurted out, “Like it was once impossible to imagine air raids of Belgrade.”
-
it’s always hard to imagine war.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The test of policy is how it ends, not how it begins.
it also applies for wars. Here is Putin's trouble ahead. I do not see easy and clear 'exit' strategy for him. In the past, it happened with USA, including the latest saga in Kabul.
Politicians rarely learn from history. Kissinger is one of rare policy maker who anchored his practical work in deep understanding of the history (his PhD was on the balance of power in 19th century).
-
Understanding U.S. values and psychology are not his strong suits. Nor has understanding Russian history and psychology been a strong point of U.S. policymakers.
-
They represent the two wings of Ukraine and have not been willing to share power. A wise U.S. policy toward Ukraine would seek a way for the two parts of the country to cooperate with each other. We should seek reconciliation, not the domination of a faction.
-
Even such famed dissidents as Aleksandr Solzhenitsyn and Joseph Brodsky insisted that Ukraine was an integral part of Russian history and, indeed, of Russia.
-
But if Ukraine is to survive and thrive, it must not be either side’s outpost against the other — it should function as a bridge between them.
-
-
interactivegeomaps.com interactivegeomaps.com
-
[Pro] Automatically populate map from tags or categories
||minam||||Jovan|| da li preko ove opcije mozemo da uvlacimo podatke o kategorijama?
-
-
interactivegeomaps.com interactivegeomaps.com
-
Lines connecting markers
||minam||||Jovan|| Mina i Miso, ovo je zanimljiv feature u map softveru.
-
-
circleid.com circleid.com
-
if you can’t throw rules at a problem, then try throwing money at it!
-
where significant parts of its internal digital infrastructure and being operated by foreign-owned and controlled enterprises.
-
The reason why ISPs run DNS resolvers is perhaps because this is what ISPs have always done.
-
with the .CZ registry, CZ.NIC, who has funded the development of the KNOT resolver (and server)
-
Perhaps the EU folk have been looking at CIRA’s Canadian Shield DNS resolver (https://www.cira.ca/cybersecurity-services/canadian-shield) where the .CA registry has launched an open DNS resolver service.
-
the reference to potential cybersecurity benefits
-
to provide a DNS resolution service that is able to comply with the various content regulations in the EU by blocking the resolution of certain DNS names.
-
to address the consolidation of DNS resolution in the hands of a few companies,
-
DNS4EU is the name of a European Union initiative intended to exert more control over the DNS within Europe, aimed specifically at the current level of use of open resolvers in the EU
-
OpenDNS is used extensively in Cyprus and Malta.
-
There is a strong preference to use the ISP’s provided DNS resolution service in Belgium, Estonia, Italy, and Slovenia, where more than 90% of the samples show that the local resolver is being used.
-
The use of open DNS resolvers in the EU is slightly less than the internet-wide average.
-
It is also worth noting that the open resolver metrics have a visible weekday/weekend variance.
-
Some 20% of the Internet’s user population use an open resolver to resolve names, which is an unexpectedly high number.
-
If the DNS lookup could be transformed into a search engine, then this would represent a direct threat to their business, and in performing NXDOMAIN substitution, this was exactly what some ISPs were doing.
-
it also should be observed that Google had a strong commercial motive to enter this space.
-
he idea is that the open resolver may not be operating in the same regulatory or legal framework as the client and the client’s ISP and may be able to resolve DNS names that would otherwise be proscribed.
-
Perhaps the Swiss domicile of Quad9 made Quad9 a more appealing target for German legal action.
-
IPR interests associated with Sony Music Germany bought a suit against the open DNS resolver provider Quad9 in a German court. The court ruled that Quad9 must block the resolution of a domain name of a website in Ukraine that itself does not hold copyright infringing material, but instead contains pointers to another website that is reported to hold alleged copyright infringements.
To see more about this case.
-
The motives for these blocking lists are varied and include attempting to curtail the propagation of malware, disrupt the command-and-control channels of co-opted zombie attack bot armies, censor offensive content and protect rights holders from efforts to infringe their intellectual property rights.
Reason for censorship via DNS
-
The DNS has become fodder for various national regimes to both observe their citizens and to impose controls on their online activities.
-
the DNS resolvers’ query logs had considerable value, despite the somewhat disturbing privacy issues.
-
operators of these recursive resolvers were privy to large volumes of useful and timely information about user behavior, and in an Internet economy that is increasingly defined by surveillance capitalism, this is extremely valuable information.
-
the role of operating these recursive resolvers to the local Internet Service Provider (ISP).
-
We distinguished between the DNS servers that handled queries for applications running in end hosts, so called stub resolvers at the edge of the network, and recursive resolvers, which are DNS servers that assist a collection of stub resolvers by acting as their agent and performing the distributed database queries for them.
Important tech distinction in DNS system
-
the DNS as an essential facilitator in every network transaction, the DNS really is the most critical component of the Internet’s infrastructure these days.
-
Few services currently operate independently of the Internet, and perhaps more significantly, most services are critically reliant on the Internet.
-
as if Europe is over on the exploited side of the techno-colonial landscape, rather than being one of the exploiters.
-
many nations may have already adopted the position that they are too small to take on today’s digital behemoths and declare independence and self-sufficiency (in the sense of eliminating their dependence on them).
It is message that I have been sending for some time. EU may clannege them, but it is more-or-less all (maybe India?).
-
It appears that the DNS is the only remaining part left of the “glue” that holds the Internet together and is now the defining medium of what is “the Internet.”
||VladaR|| It is important for getting web 3 right in the context of (de)centralisaton narratives which are often very manipulative. Currently the only tech-centralisaton element is DNS. But, does it make the Internet distributive. No, you have de facto centraliation on the usability level (concentration of data).
-
Some Thoughts on DNS4EU – the European Commission’s Intention to Support the Development of a New European DNS Resolver
||VladaR||||StephanieBP||||AndrijanaG||||sorina|| Geoff is one of the best pen/mind in IG community. I started annotating this interesting article that provides explanation about the recent 'screaming' of ISOC and tech communities agains new EU attempt to have EU DNS Resolver. It is very interesting story.
||StephanieBP|| Once we sort out our thinking, we may involve EPFL people in discussion or event one event.
I am also considering running 'just-in-time' course on this and other trend issue. More will follow.
-
The internet was not constructed as an amalgam of various national networks but was conceived and constructed as a single artifact that had never integrated such geopolitical concepts into its internal architecture.
-
to mitigate this level of foreign dependence in our digital infrastructure to some very small extent.
-
This topic raises a whole set of uncomfortable questions about the level of interdependence within the digital landscape and the vulnerabilities presented by this.
-
The last time European-domiciled enterprises were included in this top ten list was in late 2015, when the Swiss Pharmaceutical corporation, Novartis, and the Swiss food and drink enterprise Nestlé were both listed in this top 10.
-
The European industrial giants of the old telephone world, such as the former stalwarts Alcatel, Siemens, Philips, Ericsson and Nokia, have found it extraordinarily difficult to translate their former dominant positions in the telco world into the Internet world.
-
-
ec.europa.eu ec.europa.eu
-
21 guidelines for the long-term sustainability of outer space activities.
What are 21 guidelines for COPUOS.
||sorina||||nikolabATdiplomacy.edu|| We need to include this into our page.
-
LEO, the area of outer space around Earth that includes all orbits below 2,000km, andis the home of the International Space Station and of thousands of other satellites,is rapidly becoming a hazardous area due tospace debris and inoperable spacecraft orbiting at very high speeds.
What is Low Earth Orbit? Low Earth Orbit (LEO) includes all orbits below 2.000 km, where most satellites are located including the International Space Station. In LEO there is high risk of collisions due to space debris.
-
to agree on and implement norms of responsible behaviour in outer space by state and non-state actors.
-
“new space”4
What is definition of new space? New space is about private companies, SMEs and start-ups that develop novel space technologies and applications.
-
STM
Here are elements of STM
-
STM as themeansand rules to access, conduct activities in, and return from outer space safely, sustainably and securely.
Definition of Space Traffic Management (STM)
-
The EU already promotes a multilateral approach to ensure the preservation of the long-term safety and sustainability of activities in outer space, with the objective of reducing threats and risks for all space systems
-
a globally shared resource
-
Space Traffic Management (STM)
this is new term to be used.
Terminology.
-
Should for instance the provision of EU global Positioning, Navigation, Timing(PNT)and Earth Observation data and services be interrupted or severely compromised, this would have a direct impact upon the security, safety, economy, and well-being of European citizens, therefore limiting our freedom of action
Relevance for economy and society.
-
more common in Low Earth Orbit (LEO) as the number of satellites increases due to the proliferation of mega-constellations.
-
: if we do not find ways to manage space traffic, our past and present space activities will jeopardise the safety, security and sustainability of outer space and, as a result, our future ability to rely on space as enabler of key services in benefit of humankind.
-
An EU Approach for Space Traffic Management An EU contribution addressing a global challenge
Steph alerted me about this initiative. In EU style they will try to fill the regulatory gap. Sorina and Nikola, let us follow-up on it.
||StephanieBP|| ||nikolabATdiplomacy.edu|| ||sorina||
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
h tested its longest-range ballistic missile since 2017, when it twice flew intermediate-range ballistic missiles over Japan and, separately, three interconti
-
-
www.giplatform.org www.giplatform.org
-
Greater access to data and improved data flows can also warrant greater supply chain transparency, traceability, and ultimately, a more resilient trade of goods and services.
I am not sure this is correct. My experience is that there is no so direct link between two concepts
-
-
www.scribd.com www.scribd.com
-
without clearly defined rules of the road for such interactions.
Second generation of SpaceX constellations increases risk for satellite collision. In the letter to the US Federal Communication Commission NASA and NSF outline risks and call for 'defined rules of the road' for space traffic.
||sorina||||nikolabATdiplomacy.edu||
-
without clearly defined rules of the road for such interactions.
-
the safety of the International Space Station (ISS)
-
~25,000 total objects
Total number of objects in orbit.
||Jovan||
-
-
-
How to make WP timeline
Tags
Annotators
URL
-
-
www.unocha.org www.unocha.orgFunding1
-
Flexible Funding
||TerezaHorejsova||||PatrickB|| In our discussion with EDA and Malta, we should focus more on (un)earmarked funding and flexibility for development.
Do we have any unearmarked funding (including SDC)?
-
-
developer.semrush.com developer.semrush.com
-
Keyword Difficulty
how to integrate keyword cifficult via Semrush API
-
-
backlinko.com backlinko.com
-
Keyword Difficulty
Kyyword difficulty
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The analysis is triggered by the EU's new Chips Act that we shoudl analyse. In brief the article autliens strenghts of EU in microchips supply chain such as Dutch company ASML.
Europe will invest heavily in mega fabs (spaces for production of microchips). It will also try to bring to Europe TSMC, Intel and other manufacturers. It remains to be seen how it will work.
||VladaR||
-
of “mega fabs”
-
the European Commission wants to relax state-aid rules to let member states subsidise such fabs “up to 100% of a proven funding gap” if they are “first-of-a-kind” or would “otherwise not exist in Europe”.
-
Europe’s firms also make many of the machines that make fabs tick. ASML, a Dutch firm with a market value of €230bn, is the sole global supplier of the lithographic equipment without which fabs cannot etch the most advanced processors. Only Nvidia, an American chip-designer, and Taiwan Semiconductor Manufacturing Company (TSMC), the world’s biggest contract manufacturer of chips, are worth more. An array of smaller European outfits enjoy dominant positions in the complex chipmaking supply chain. Carl Zeiss SMT makes lenses for ASML’s lithography machines (and is co-owned by it). Siltronic manufactures silicon wafers onto which chips are etched. Aixtron manufactures specialised gear to deposit layers of chemicals onto those wafers to make circuits.
These are strenghts of Eurpean Chips industry
-
One of the industry’s main brain trusts, the Interuniversity Microelectronics Centre (better known as IMEC), is based in Belgium.
-
but as a global ecosystem of thousands of companies.
||VladaR|| It is important to stress and explore always.
-
the EU’s new Chips Act, unveiled on February 8th,
to follow it.
-
The aim was to double the share of microchips made in Europe to 20% of the global total by 2020. Nearly a decade later it remains stubbornly stuck at 10%.
Always good to check numbers and predictions.
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
A state-linked newspaper called him the party’s “number one adviser”.
-
that China practises true democracy, that America’s is a sham and that American power is fading.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
There are about 41,000 nuns in America, down from 160,000 half a century ago.
Huge drop in the number of nuns.
-
They have more than 155,000 followers on TikTok, a social-media app.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
the chief digital and artificial intelligence officer, or CDAO, is charged with making sure DOD supports such an enterprise. John Sherman, DOD chief information officer,
change of langauge from Chief information officer (CIO) to Chief digital and artificial intelligence officer.
||VladaR||||aleksandarsATdiplomacy.edu||||ljupcogATdiplomacy.edu||||JovanNj||
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
||VladaR|| This is interesting for encryption.
They are preparing encryption for post-quantum era. Thus, we may use this advance encryption algorithms even before quantum computing emerges. There is some intersting langauge to be followed such as
Q-day (moment of arrival of quantum computing) Quantum Internet
-
If all goes to plan, the Internet will be well into its post-quantum era by the time computing enters its quantum era. This post-quantum Internet could some day be followed, confusingly, by a quantum Internet — meaning a network that uses the principles of quantum physics to make information exchange hacker-proof.
-
will be hybrid, using post-quantum technology for added security on top of existing systems. Vadim Lyubashevsky, a computer scientist at IBM in Zurich, Switzerland,
-
“Everybody is pretty confident that once NIST and IETF specify new standards, we’ll be able to roll them out pretty quickly.”
-
Both Cloudflare and Google — often in cooperation — have started running real-life tests of some post-quantum algorithms by including them in some beta versions of the Chrome browser and in server software. Testing is crucial because, for Internet communications to go smoothly, it is not enough to have perfectly compatible servers and browsers. To connect them, data must also run through network devices that might block traffic that they flag as unusual because of its unfamiliar encryption protocols. (These systems can be used to prevent hacking or stop users accessing prohibited content.) Antivirus software could cause similar problems. The issues also exist “on a broader, Internet-wide scale, in some countries that keep track of what users are doing”, says Sullivan. Network-security workers refer to these issues as ‘protocol ossification’, he says; it has already complicated the transition from RSA, and might disrupt the roll-out of quantum-secure algorithms, too.
-
Shor, then at AT&T Bell Laboratories in Murray Hill, New Jersey, laid the groundwork for those algorithms’ demise
-
In 2018, the Internet Engineering Task Force (IETF), a consensus-based virtual organization that steers the adoption of security standards on a global scale, endorsed another public-key system to replace it. That system is called elliptic-curve cryptography, because its mathematics grew out of a branch of nineteenth-century geometry that studies objects called elliptic curves.
||VladaR|| Nisam znao da su odustali od RSA. Zanimljivo
-
RSA,
-
Someone who wants to receive confidential messages can announce their public key to the world, say, by printing it in a newspaper. Anyone can use the public key to scramble their message and share it openly. Only the receiver knows the private key, enabling them to unscramble the information and read it.
-
quantum-resistant crypto,
-
then publish official versions of those algorithms.
Again 'open source'
-
Q-day
Q-day is new lingo
-
If they reach their full scale, quantum computers would crack current encryption algorithms exponentially faster than even the best non-quantum machines can. “A real quantum computer would be extremely dangerous,” s
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Web3—the latest Silicon Valley buzzword
||VladaR|| Odslusaj ovaj podcast, mada sam provalio sta oni rade. Napisu prethodne nedelje tekst koji objave u novinama i onda naprave podcast sledece nedelje. Tako da je uglavnom ponavljanje iz prethodnog clanka
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Geomagnetic storm can affect sattelites and create space-waste. Here is an example about the SpaceX satellites.
||nikolabATdiplomacy.edu|| possible box to be used on the website or info for course.
-
It is the same kind of mechanism that creates aurorae like the Northern Lights, but it can have dangerous effects too.
-
but can be used in places where wired connections cannot.
-
a geomagnetic storm
What is a geomagnetic storm?
Tags
Annotators
URL
-
-
ninjaoutreach.com ninjaoutreach.com
-
Ninja outreach;
A good idea for outreach strategy.
Tags
Annotators
URL
-
-
www.eda.admin.ch www.eda.admin.ch
-
The term cyber is mostly used at an international level when discussing issues related to security and confidence-building, while digital has a broader social, economic and political dimension
Useful clarification on the use of prefixes in diplomatic context. https://www.diplomacy.edu/blog/different-prefixes-same-meaning-cyber-digital-net-online-virtual-e/
-
Promoting digital governance will play a key role. This represents an important area of digital foreign policy and will allow for the creation of common rules in the digital space and strengthen both institutions and cooperation mecha-nisms.
Useful clarity: Digital governance is about creating common rules for governing digital space (privacy, security).
Digital foreign policy is a way to develop digital governance.
-
more a continuation of Switzerland’s proven approach to protecting its interests and promoting its values in a new ‘space’.
adding digital layer to existing foreign policy
-
The global COVID-19 crisis has highlighted that while new digital technologies can help us better understand and contain the spread of a pandemic, for example through the use of digital contact tracing, and while they underscore the importance of issues relating to technical standardisation and cross-border cooperation, these technologies also raise a number of questions, for example about application security and data protection.
Balancing formulation: possibilities/chances vs risks/dangerous
It is more on side of possibilities
!check-balances
-
GESDA is currently in its 36-month pilot phase and is focusing on the development of an academic and a diplomatic forum that should ensure mutual exchanges between the different subject areas
This is important issue
-
the UNDP is a partner within the framework of the Core Government Functions programme (promotion of e-governance as a means of achieving better governance) as well as the fintech dialogue programme.
-
Fintech dialogue platform (Geneva)
-
Fintech dialogue platform (Geneva)
-
A gender gap is emerging particularly in the least developed countries but also in middle-income nations: compared to men, 43% fewer women in the least developed countries have access to the internet.
-
promoting the use of technology in the economy (in order to bridge the gender-specific digital divide, it primarily supports female entrepreneurs)
-
There are two aspects to the role of digitalisation in government. At one level it is a work tool and a means of simplifying processes, for example in consular services or IT applications. But digitalisation is now also a foreign policy matter, raising a number of important questions.
-
Digital data and applications are driving development-related and humanitarian innovation across the globe. This focuses on the benefits for people and their needs in order to achieve the goals set out in the IC Strategy 2021–24 and the 2030 Agenda. The FDFA’s commitment to exploiting the full potential of new technologies in combating poverty is brought together in its Tech4Good approach.
-
digitalisation described the technical process for converting analogue information into digital formats. This is now referred to as digitisation. Continual technological devel-opments have resulted in structural changes, new applications and systems, for example the creation of networks or the use of AI. Nowadays, the term digitalisation spans all of these developments, including opportunities for use as well as their social, economic and political impact, for example.
This framework definition requires more specific elements.
-
Switzerland intends to further raise its profile by facilitating the creation of secure, reliable data storage and through the Humani-tarian Data and Trust Initiative aimed at data responsibility in humanitarian action.
Protection of data raised in relevance with the latest breach of ICRC data. Next step is to protect data from technical and legal perspectives.
-
Cross-border data flows and digital trade
Data is central for negotiations of e-commerce rules at WTO. One can expect tensions between various uses and regulations of data from public to commercial and personal data.
-
Harmonised international rules, for example on cross-border data flows, play a key role in ensuring that these supply chains operate smoothly and that goods and services are traded with as little discrimination as possible.
-
-
www.eda.admin.ch www.eda.admin.ch
-
Cross-sectoral approaches
-
Technological innovation, digitalisation and automation bring unprecedented opportunities. However, if the right framework conditions are not in place, they also present significant risks: surveillance that violates civil and political rights, manipulation of public opinion, cyberattacks, dependence on foreign tech monopolies, deindustrialisation, unemployment and growing inequality.
-
-
www.eda.admin.ch www.eda.admin.ch
-
inability to ensure the security of the population and provide basic public services, alongside its failure to establish mutually constructive relations with the country’s citizens.
-
-
doc-08-14-apps-viewer.googleusercontent.com doc-08-14-apps-viewer.googleusercontent.com
-
Cyber hygiene
-
Affordability measures the cost of connectivity relative to local income.
-
uch as open radio access networks (open RAN)
-
internet bandwidth, network coverage, and telecom market dynamics
-
The term “emerging technology’’ encompasses artificial intelligence (AI), Internet of Things (IoT), blockchain, 5G and other new technologies.
-
s gender, race, ethnicity, disability, economic status, geography, sexual orientation, language, refugee status, and age
Annotators
URL
-
-
www.shareweb.ch www.shareweb.ch
-
detailed data and metadata on past and on-going projects, initiatives, stakeholders, outcomes, standards, lessons learnt, and knowledge in digital health are only captured in a fragmented manner.
it is cross-cutting problem in many fields. There are three practical steps that should increase interoperability and use of data:
- taxonomies which will create knowledge cohesion across different systems and databases by using shared terminology (keywords and concepts).
- technical standards for sharing data across different platforms and datasets (to focus on the work of international standardisation organisations in Geneva - ISO, ITU, IEC).
- privacy enhancing technology for using sensitive data for public good research (pilot project with the UN Statistics).
-
an open-source software that seeks to provide a comprehensive sys-tem linking patient, provider and payer data.
Open source is gaining renewed relevance due to digital geopolitics: https://circleid.com/posts/20220126-why-aopena-may-become-the-keyword-of-the-digital-world-in-2022
SDC can renew efforts for strengthening 'open' approach in their development activities.
-
into actionable insights to enhance effective governance and coordination.
It is one platform that provides actionable insights from data https://datasandbox.diplomacy.edu/
-
the SDC commissioned a study, with a view to mapping and assessing Swiss and in-ternational initiatives on technologies for health and health system strengthening.
Is this study available?
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
“That first airplane didn’t have any transportation advantages,” says Ahn, “but it eventually changed the world.”
-
Quantum computers manage data in the form of qubits. Coupled together using the quantum physics phenomenon called entanglement, qubits can influence each other at a distance.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
funds from European lenders would be extended on commercial terms
-
a new approach based on ‘soft’ assets, very much stepping on the EU’s toes and their €300 billion worldwide connectivity strategy,”
Digital will be in the gist of China-EU competition in Africa.
-
“One can be cautiously optimistic,” Moore said, but pointed out that recently described the EU’s Global Gateway as largely “a mixture of existing commitments, loan guarantees and heroic assumptions about the ability of the club to ‘crowd in’ private investment rather than actual new spending”.
-
Chinese lenders have become more cautious – especially over mega infrastructure projects.
-
He said Spain wanted to see more projects in North Africa, the Germans doubted that all the projects were carefully thought through, while Hungary, Finland and Portugal pointed out that they first had to budget for the additional development projects.
Divergent position on the support for Africa.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Māori might be the ‘luckiest’ Indigenous people – but that’s not down to New Zealand exceptionalism
On Maori and New Zealand.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
This is a solid and comprehensive analysis of German 'value-based foreign policy' and positioning towards China, USA, and EU.
I also learned a lot about complexity of German government.
||kat_hone|| ||Pavlina||||TerezaHorejsova|| For our work with Germany and KAS it would be interesting to see how these priorities will be translated into
- Geneva environment (focus on rule-based international order)
- Digital diplomacy
||sorina||||VladaR||
-
essential for the shared goal of maintaining the international rules-based order.
-
Transatlantic coordination on China (another declared goal of the new German government) adds an additional layer of complexity
-
Greece and Lithuania are both members of the EU and they follow a very different approach toward the PRC
-
In the area of targeted sanctions over human rights violations, more transatlantic cooperation appears highly realistic
-