11,161 Matching Annotations
  1. Feb 2022
    1. may choose not to risk debating the efficacy of vaccines,
    2. imperfect rules that are open to public scrutiny can be improved over time.
    3. predictable rules can protect speech as much as containing it. Rules determine not just what is banned, but also help defend what is allowed.

      Two key points for content moderation

      • predictable rules
      • possibility for complain and legal action
    4. Apple, the next-biggest streamer, has content guidelines for podcasts but a rough style guide for music. Amazon, the third-largest, has published even less in the way of rules. And whereas Facebook and co release regular reports on what content they have taken down and why, the audio streamers are opaque.

      Different policies on content moderation

    5. The starting point is transparency
    6. Some good podcasts will stoke controversy. Free speech must be the default.
    7. On the other hand, few want tech executives to become censors.
    8. the content mix on audio platforms is starting to look less like the curated library of Netflix and more like the infinite hotch-potch of YouTube.
    9. Mr Rogan is a bigmouth who is wrong about covid-19 and probably much else. Yet he has broken no laws, nor even, Spotify seems to believe, the company’s content rules.
    10. Mr Rogan is a bigmouth who is wrong about covid-19 and probably much else. Yet he has broken no laws, nor even, Spotify seems to believe, the company’s content rules.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In December America and Britain announced they plan, this spring, to launch a “grand challenge” prize around PET systems.

      Can UN make private and confidential data safe for public use? On 25 January, UN PET Lab was established with the aim to ‘anonymise’ health, private, commercial and other sensitive data to be used for public good purposes. Data will be anonymised and protected via use of so-called privacy-enhancing technologies (PETs). This approach can solve one of the main problems of data era of lack of access to data, in particular on health, for getting insight of interest for citizens, countries and companies worldwide.

      In the pre-launch phase UN Pet Lab experimented with two approaches

      First one is called secure multiparty computation (SMPC) in which data is kept at secure place where they are started anyway. Somebody who needs analysis of this data - e.g. private health data - sends request that is processed on the sidte where data is stored. Results of analysis are sent with the us eof special techniques, in particular, to avoid reverse-engineer that could discover private data.

      Second approach relies on so called “trusted execution environments” consisted of ‘data enclaves’ where confidential data will be executed with utmost privacy and security protection.

      UN Pet Lab will start experiments with trade data which are less controversial. also called “enclaves”, as a form of input privacy. The UN Pet Lab will run a ‘grand challenge’ prize aimed to develop new uses of PET systems.

      ||JovanNj||||aleksandarsATdiplomacy.edu||||anjadjATdiplomacy.edu||||VladaR|| Here are a few interesting developments which we will need to follow on 'data' aspect of our work. For time being I will annotate these types of inputs.

      ||Jovan||

    2. America and Britain announced they plan, this spring, to launch a “grand challenge”
    3. into trade data
    4. The use of PETs offers not only a means of bringing together data sets that cannot currently interact because of worries about privacy, but also a way for all sorts of organisations to collaborate securely across borders.
    5. For extra security, cryptographic hashes and digital signatures are applied, to prove that only authorised operations have taken place.
    6. to test “trusted execution environments”, also called “enclaves”, as a form of input privacy.
    7. They put several kinds of PETs through their paces. In one trial, OpenMined, a charity based in Oxford, tested a technique called secure multiparty computation (SMPC). This approach involves the data to be analysed being encrypted by their keeper and staying on the premises. The organisation running the analysis (in this case OpenMined) sends its algorithm to the keeper, who runs it on the encrypted data.
    8. The UN PETs Lab
    9. These so-called privacy-enhancing technologies (PETs) are still in the early stages of development.
    10. Reasons of confidentiality mean that many medical, financial, educational and other personal records, from the analysis of which much public good could be derived, are in practice unavailable.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Israel also cannot afford to alienate Russia, which can severely curb its air operations in Syria and beyond, and whose at least partial cooperation on the nuclear issue remains essential.
    2. If, as expected, Russia launches a major cyber campaign against Ukraine prior to an actual invasion, to soften it up, or as part of the invasion itself, Israel will have much to learn for its own future cyber capabilities, both offensive and defensive. Russia has repeatedly launched cyber attacks against Ukraine, using it as a testing ground for its cyber capabilities.
    3. A resentful Russia, smarting from the imposition of heavy additional U.S. sanctions, will be even less inclined to pressure Iran to reach a nuclear compromise.
    4. by signing long-term agreements for air and naval bases there and made Israel’s efforts to thwart Iranian entrenchment in Syria dependent on its goodwill.
    5. Russia’s rapid resurgence, however, may be more than China bargained for, a fully tripolar global system, rather than the primarily bipolar one they had anticipated, with Russia playing a supporting junior role.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Open Data Barometer

      Open data barometer

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the adoption of open standards for FOSS.
    2. he following questions may help with preparing open innovation processes:
    3. Open innovation describes a decentralised and participatory notion of how ideas are generated and implemented in organisations. It involves moving from ‘closed’ to ‘open’ innovations; in other words, finding ideas outside the boundaries of one’s own organisation.

      Open innovation

    4. WHY OPEN CONTENT?
    5. For more information, go to:

      Open data resoruces

    6. Open Knowledge International
    7. WHAT ARE OPEN DATA

      Open data

    8. Checklist for using open-source software solution
    9. Technology centres called ‘makerspaces’ and ‘fablabs’ (open fabrication laboratories) are increasingly making 3D printing available around the world.
    10. Using data to fight droughts, Namibia

      Water and data in Namibia

    11. Use open standards, open data, open source and open innovation: An ‘open’ approach allows for collaboration in digital DC and avoids duplication. Open source also supports scaling (Principle 3) and sustainability (Principle 4).

      How open supports scaling (principle 3) and sustainability (principle 4)

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. An input for ConfTech Newsletter ||Katarina_An||||jovanamATdiplomacy.edu||||ArvinKamberi||

    2. Another is to do a “Zoom loom”, placing yourself so close to the camera that you will give everyone nightmares.
    3. these participants have no way of knowing that you are gazing specifically at them.
    4. And if there is one thing for which online interactions are not suited, it is body language.
    5. so much of it is blindingly obvious.
    6. receiving more eye contact from a bigwig led to greater participation in group interactions.
    7. They nod; they touch others but not themselves; they gesture; they furrow their brows; they hold themselves erect; their facial expressions are more animated.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cryptocurrencies and decentralised economy can have unintended consequences for those who have promoted them.

      ||ArvinKamberi||

    2. “One of the dreams of the far right is not just a blockchain cryptocurrency, but a decentralised future where they don’t have to rely on mainstream structures,” says Mr Squirrell. “They want blockchain blogging websites, blockchain streaming websites” to escape deplatforming.
    3. which distances people and their money from “elites and banksters”.
    4. This idea appeals to libertarians or those who distrust the traditional banking system.
    5. with an anti-establishment spirit
    6. Technological advances in crypto have since made privacy tokens like Monero, which hide transactions, possible. These groups have probably flocked to them.
    7. They advertise their wallets on their websites and social media, asking for donations. And they get them. Stefan Molyneux, a far-right podcaster who was ousted from YouTube, has received over $1.67m in bitcoin. Mr Anglin has reportedly received over 100 bitcoins ($3.8m).
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. While there have been other DNS resolver projects around the world with government support or involvement (for instance, in the UK and Canada), there was a sense that DNS4EU represents a new kind and degree of government intervention in the space.

      Is this really 'new'. What is 'new' in EU's proposal?

    2. the concerns driving this initiative relate to consolidation of DNS resolution services in the hands of a few (non-EU) companies (i.e. the emergence of public DNS resolver services hosted by Google and Cloudflare), privacy and data protection in the processing of DNS data, and the perceived need for EU investment in the field to better identify and filter EU-specific “cyber-threats”.

      Here are the main reasons for new European DNS system.

      ||sorina||||VladaR|| It will be important to follow it since it will trigger some controversies.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. a tripolar arrangement,

      It will be interesting to see what is the shape of this triangle. Keen to read more.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Sports diplomacy started with the very first Olympics in 776 B.C.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This article provides a good survey of (dis)advantages of Chinese and USA approach to AI as summarised in the following paragraph

      the combined resources, scientific contributions, and technological superiority shared by US academic and corporate institutions in the field of AI is more than enough to overcome the advantages given China by its policy of socialized data.

      ||kat_hone||||VladaR||||sorina||||anjadjATdiplomacy.edu||||JovanNj||

    2. the combined resources, scientific contributions, and technological superiority shared by US academic and corporate institutions in the field of AI is more than enough to overcome the advantages given China by its policy of socialized data.
    3. But the PRC is non-competitive when it comes to luring outside talent.
    4. This leaves US soil fertile for the development of monolithic business empires with a GDP eclipsing many modernized countries.
    5. “China has a massive data advantage when it comes to medical AI research,”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. NSO's pegasus software is more than the most powerful Internet spying tool. It is also Israel's important diplomatic asset.

      New York Times provides comprehensive story around Pegasus, including history of development, how it works and how it is exported from Israel in close coordination with government.

      This article argues that Israel managed to gain diplomatic concessions from a few countries as a part of deal for selling Pegasus. For Panama, Hungary, Mexico, Bahrein India, and U.A.E. purchase of Pegasus coincided with pro-Israeli diplomatic moves of these countries including voting in the UN and strengthening bilateral relations.

      However, the NSO's international future became uncertain in November as the U.S. the Department of Commerce added NSO added to its black list for activities “contrary to the national security or foreign policy interests of the United States.” It will have far-reaching consequences for business partners and potential buyers of Pegasus and other NSO platforms and tools.

      ||VladaR||||AndrijanaG||||Pavlina||||StephanieBP||

    2. In December 2021, just weeks after NSO landed on the American blacklist,
    3. What Facebook didn’t appear to know was that the attack on a U.S. phone number, far from being an assault by a foreign power, was part of the NSO demonstrations to the F.B.I. of Phantom — the system NSO designed for American law-enforcement agencies to turn the nation’s smartphones into an “intelligence gold mine.”
    4. The capability to hack WhatsApp, according to the presentation, “doesn’t currently exist” in the United States government, and the intelligence community was interested in acquiring that capability.
    5. its presence on an American blacklist will probably scare away prospective clients — and employees.

      ||VladaR|| This is an interesting development to follow on Pegauss.

    6. the decision about NSO has everything to do with reining in a dangerous company and nothing to do with America’s relationship with Israel.
    7. behind the scenes of the peace deal was a Middle East weapons bazaar.
    8. In September 2020, Netanyahu, Donald Trump and the foreign ministers of the United Arab Emirates and Bahrain signed the Abraham Accords, and all the signatories heralded it as a new era of peace for the region.
    9. In 2017, Israeli authorities decided to approve the sale of Pegasus to the kingdom, and in particular to a Saudi security agency under the supervision of Prince Mohammed.
    10. Israel and the U.A.E. had, in fact, been growing closer together for years.
    11. In May of that year, European Union foreign ministers tried to reach unanimity when calling for a cease-fire between Israel and the Palestinian Islamic group Hamas, as well as for increased humanitarian aid for Gaza. Hungary declined to join the other 26 countries.
    12. After the installation of NSO systems in Panama City in 2012, Martinelli’s government voted in Israel’s favor on numerous occasions, including to oppose the United Nations decision to upgrade the status of the Palestinian delegation — 138 countries voted in favor of the resolution, with just Israel, Panama and seven other countries opposing it.
    13. In early 2010, Panama was one of only six countries at the U.N. General Assembly to back Israel against a resolution to keep the Goldstone Commission report on war crimes committed during the 2008-9 Israeli assault on Gaza on the international agenda.
    14. After a long tradition of voting against Israel at United Nations conferences, Mexico slowly began to shift “no” votes to abstentions.
    15. “With our Defense Ministry sitting at the controls of how these systems move around,” he said, “we will be able to exploit them and reap diplomatic profits.”
    16. NSO would not operate the system itself. It would sell only to governments, not to individuals or companies. It would be selective about which governments it allowed to use the software. And it would cooperate with Israel’s Defense Export Controls Agency, or DECA, to license every sale.
    17. to find “zero days,” i.e., new vulnerabilities in phone software that could be exploited to install Pegasus.
    18. The company’s most valuable employees are all graduates of elite training courses, including a secretive and prestigious Unit 8200 program called ARAM that accepts only a handful of the most brilliant recruits and trains them in the most advanced methods of cyberweapons programming
    19. Nearly every member of NSO’s research team is a veteran of the intelligence services; most of them served with AMAN, the Israeli Military Intelligence Directorate, the largest agency in the Israeli espionage community — and many of them in AMAN’s Unit 8200.
    20. If they could control the device itself, though, they could collect the data before it was encrypted. CommuniTake had already figured out how to control the devices. All the partners needed was a way to do so without permission.
    21. to obtain export licenses from Israel’s Ministry of Defense to sell their tools abroad, providing a crucial lever for the government to influence the firms and, in some cases, the countries that buy from them.
    22. Veterans of Unit 8200 — Israel’s equivalent of the National Security Agency — poured into secretive start-ups in the private sector, giving rise to a multibillion-dollar cybersecurity industry.
    23. an estimated one in 10 of the nation’s workers employed by the industry in some way.
    24. For Israel, the weapons trade has always been central to the country’s sense of national survival. It was a major driver of economic growth, which in turn funded further military research and development.
    25. Cyberweapons have changed international relations more profoundly than any advance since the advent of the atomic bomb.
    26. Times reporting also reveals how sales of Pegasus played an unseen but critical role in securing the support of Arab nations in Israel’s campaign against Iran and even in negotiating the Abraham Accords, the 2020 diplomatic agreements that normalized relations between Israel and some of its longtime Arab adversaries.
    27. shows how Israel’s ability to approve or deny access to NSO’s cyberweapons has become entangled with its diplomacy
    28. Israel, through its internal export-licensing process, has ultimate say over who NSO can sell its spyware to.
    29. no cooperation from AT&T, Verizon, Apple or Google.
    30. the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. Israel had granted a special license to NSO, one that permitted its Phantom system to attack U.S. numbers. The license allowed for only one type of client: U.S. government agencies
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. he danger is that these methods will be copied by other countries or strong, malevolent non-state actors. New ideas and tools are needed to deal with this. Such is the purpose of this paper.

      It is major problem. The roots are much deeper than just current practice of Russia. Relativity of truth, misuse of human rights agenda for economic gains, etc. made global population very sceptical and cynical about 'official truth'. Thus, relativisation of truth created space in which actors like Russia can trive. Now, West is trying to introduce almost Orwelian 'ministry of truth' by censoring even former president (Trump). Unfortunately, I think that the battle for core principle is almost lost. For me , it was lost when Trump was banned from social media for life-time. It was very Orwelian. I do not to say how much I disagree with him. But, this act was for me 'Sarajevo 1914' for Western democracy. It is wider context which is very dangerous and risky. It remains to see if Western societies will find stamina and energy to come back.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Digital Geneva Footp

      ||JovanNj||||anjadjATdiplomacy.edu|| Promenite nazive i ovde i compare two actors u

      Digital Footprint of International Geneva

      (kao na naslovnoj strani). Thanks!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The prolonged pandemic has forced the government, including the Foreign Ministry, to readjust its targets and goals. But these difficulties are not an excuse to allow progress to be arrested. It is natural for the public to ask more of the government during trying times, and the RCEP is incomplete without Indonesia’s ratification.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Jan 2022
    1. Digital Geneva Footprint ofInternational Geneva

      Ide samo Digital Footprint of International Geneva

      Ne treba Digital Geneva Footprint

      ||JovanNj||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New Zealand, Singapore, and Chile have signed the Digital Economy Partnership Agreement, which represents a new type of trade agreement to promote the digital economy.
    2. Wellington’s participation in international and regional organizations, the diversification of its foreign relations, and its subtle adjustments to its policy toward China, particularly concerning some political and international issues such as the South China Sea.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. , digital diplomacy should primarily be understood as the use of digital information, communication and technologies to achieve diplomatic objectives. In this case, we mainly focus on the usage of digital diplomacy to help pursue foreign policy goals.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It shows Chiinese dominance of AR and VR, which are underlying technology behind metaverse.

      It also shows importance of IPR - mainly patents but also trademarks on metaverse

    2. rejecting various metaverse-related trademark applications
    3. Alibaba, which owns the , plans to launch new AR glasses for users to conduct virtual meetings over DingTalk, the company’s enterprise communication and collaboration platform, in its latest move to stake out a claim in the metaverse.
    4. helping them gain first-mover advantage in the metaverse arena
    5. VR immerses a user in an imagined world, like in a film or video game, with the aid of an opaque headset such as those from Oculus, a division of Facebook parent Meta Platforms. AR provides an overlay of digital imagery onto the real world with the use of a clear headset, like Microsoft’s HoloLens, or with newer smartphones and tablets.

      Simple definition of two technologies.

    6. Chinese Big Tech companies, led by internet giants Tencent Holdings and Baidu, comprised more than half of the world’s top 10 filers of patent applications for virtual reality (VR) and augmented reality (AR) technologies over the past two years, showing a strong effort to establish a foothold in the emerging metaverse market.

      Behind Metaverse is virtual and augmented reality technology where Chine leads.

      ||AndrijanaG||||VladaR||||ArvinKamberi||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. South African President Cyril Ramaphosa, who has accused the EU of ‘vaccine apartheid’, is expected to only attend online, while other countries may want to make a stand by boycotting the summit.
    2. the EU’s handling of the Omicron variant will be raised by the African side as an example of how trust can be undermined if the EU does not consult before measures are taken.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. America’s militarized approach is struggling to compete with extensive Chinese economic and infrastructure assistance.
    2. trade engagements with Africa center around extractive industries such as oil and minerals; and selling high-priced technologies such as aircraft.
    3. Africom epitomizes the militarization of US policy towards Africa.
    4. personal connections that key people in the Biden foreign policy and national security establishment have with Tigrian leaders who ruled Ethiopia for almost three decades.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. to use both global resources to solve local problems and turn local experiences and expertise into shareable global resources.
    2. global advocacy and a myriad of activities that help to maintain the city’s global identity.
    3. Sister-cities flourished following the Second World War as a way to improve people-to-people relationships across country borders in order to make war less likely.
    4. as Kitakyushu’s Initiative for a Clean Environment, Sendai’s Framework for Disaster Risk Reduction, and Minamata’s Convention on Mercury.
    5. peace tourism, research on nuclear abolition
    6. the Mayors for Peace organisation
    7. moral authority on nuclear abolition and non-proliferation.
    8. Japan’s Nagasaki is an important example of a city engaged in global activism and activity.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||AndrijanaG|| We can include these summits in our calendar.

    2. promoting digital transformations
    3. an evaluation of Secretary-General Guterres’s Our Common Agenda report,
    4. cyberspace
    5. Diplomacy Reset: Ten Global Summits to Watch in 2022

      Less focus on cyber/digital in summits in 2022 according to this summary.

    6. expanding commitments to climate mitigation, strengthening multilateralism, and increasing the resiliency of democracies.
    7. in the form of plurilateral agreements in areas such as e-commerce, investment facilitation, and services regulation.
    8. to waive intellectual property rights for COVID-19 vaccines and treatments—and on fisheries subsidies by the end of February 2022.

      ||MariliaM|| Priorities for the WTO Ministerial meeting.

    9. Ministerials generally occur every two years, but by March it will have been five years since the last conference, leaving Director General Ngozi Okonjo-Iweala’s first ministerial with a long list of agenda items.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The sharing of data—and their use—may now be getting easier.
    2. The use of PETs offers not only a means of bringing together data sets that cannot currently interact because of worries about privacy, but also a way for all sorts of organisations to collaborate securely across borders.
    3. although American and Canadian records of the value of wood pulp traded between the two countries were basically the same, their data on the value of the clock trade differed by 80%.
    4. The output is likewise statistically blurred, using differential privacy, before being sent back to the original inquirer.
    5. For extra security, cryptographic hashes and digital signatures are applied, to prove that only authorised operations have taken place
    6. a so-called “privacy budget”,
    7. they cannot be reverse-engineered to reveal individual records
    8. differential privacy.
    9. That inquirer thus receives its answers, but never has access to the information on which those answers are based.
    10. secure multiparty computation (SMPC)
    11. The UN PETs Lab, which opened for business officially on January 25th, enables national statistics offices, academic researchers and companies to collaborate to carry out projects which will test various PETs, permitting technical and administrative hiccups to be identified and overcome.
    12. privacy-enhancing technologies (PETs)

      New terminology.

    13. Reasons of confidentiality mean that many medical, financial, educational and other personal records, from the analysis of which much public good could be derived, are in practice unavailable.
    14. DATA ARE valuable. But not all of them are as valuable as they could be.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “Pioneers” are the people on a mission to change the world; “artisans” are interested in mastering a specific skill; “operators” derive a sense of meaning from life outside work; “strivers” are more focused on pay and status; “givers” want to do work that directly improves the lives of others; and “explorers” seek out new experiences.

      How to combine the following type of characters in one team: “Pioneers” are the people on a mission to change the world; “artisans” are interested in mastering a specific skill; “operators” derive a sense of meaning from life outside work; “strivers” are more focused on pay and status; “givers” want to do work that directly improves the lives of others; and “explorers” seek out new experiences.

      The success of one team is to have right blend of different characters.

    2. And teams are likelier to perform well if they blend types of employees: visionaries to inspire, specialists to deliver and all those people who want to do a job well but not think about it at weekends. Like mayonnaise, the secret is in the mixture.
    3. they felt their roles had less meaning when they no longer had direct responsibility for the well-being of passengers.
    4. Having a purpose does not necessarily mean a desire to found a startup, head up the career ladder or log into virtual Davos. Some people are fired up by the prospect of learning new skills or of deepening their expertise.
    5. “Pioneers” are the people on a mission to change the world; “artisans” are interested in mastering a specific skill; “operators” derive a sense of meaning from life outside work; “strivers” are more focused on pay and status; “givers” want to do work that directly improves the lives of others; and “explorers” seek out new experiences.

      Archetypes of people.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Last year Amazon Web Services (AWS), the online giant’s cloud-computing arm, introduced Amazon SageMaker Canvas, a set of tools that lets people deploy machine-learning models without writing code.
    2. low code/no code (LC/NC) tools
    3. Power Apps platform
    4. Just 25m people around the world are fluent in standard programming languages
    5. They allow anyone to write software using drag-and-drop visual interfaces alone (no code) or with a bit of code creeping in (low code).
    6. “the future of coding is no coding at all”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Now its neighbours’ instability looks like a risk to the solemnly invoked peace that underpins the whole European project.
    2. By contrast, France’s President Emmanuel Macron relentlessly pushes the idea that Europe must develop its own “strategic autonomy”.
    3. Bits of eastern Europe see NATO, and specifically America, as the bedrock of their security.
    4. The way Europe deals with its neighbourhood is an extension of how it was built.

      Should it apply to 'digital'.

    5. Europe sends money, and recently vaccines, as part of its “neighbourhood policy”, which extends to bits of the Middle East. But the task is low on its list of priorities.
    6. In the western Balkans, pound-shop demagogues rant and loot. Across the Mediterranean, a mere people-smuggling dinghy ride from the EU, North Africa now mixes a drift away from democracy (Tunisia) with civil war (Libya).
    7. But peace stops at the EU’s borders.
    8. the crucial thing about the European project is that it has delivered peace.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China has long nurtured ambitions—invigorated by American sanctions but so far unsuccessful—to build a fully fledged chip industry.
    2. It aspires to double Europe’s share of chipmaking, currently around 10%.
    3. The shortages, and America’s tech-flavoured trade war with China, have reminded politicians how vital chips are to the modern economy—and how over-reliant their supply is on a few giant firms.
    4. TSMC’s boss, C.C. Wei, said this month that a correction could be “less volatile” for his firm thanks to its position at the technological cutting-edge.
    5. The chip business has swung between over- and undercapacity since it emerged in the 1950s, observes Malcolm Penn of Future Horizons, a firm of analysts (see chart). If history is a guide, then, a glut is in on the way. The only question is when.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. on January 20th both Meta and Twitter integrated NFTs into their platforms.

      How?

    2. the creator economy

      another buzz concept to be followed

    3. web3 will not dislodge web2.
    4. the future may belong to a mix of the two, with web3 occupying certain niches.
    5. One is that the ownership of the computing power that keeps many blockchains up to date is often very concentrated, which gives these “miners”, as they are called, undue influence.
    6. at recently launched web3 projects, between 30% and 40% is owned by the people who launched them.
    7. Despite being a relatively recent phenomenon, web3 is exhibiting signs of centralisation. Because of the complexity of the technology, most people cannot interact directly with blockchains—or find it too tedious. Rather they rely on middlemen, such as OpenSea for consumers and Alchemy for developers.

      Parallel with TCP/IP. promise of decentralised communication has not realised because of practical usability.

    8. “If something is truly decentralised, it becomes very difficult to change, and often remains stuck in time,” he writes. That creates opportunities: “A sure recipe for success has been to take a 1990’s protocol that was stuck in time, centralise it, and iterate quickly.”
    9. Lock-in, reckons Mr Marlinspike, tends to emerge almost automatically.
    10. That was the problem of early web3 offerings (then called “peer-to-peer” or “the decentralised web”).

      Previous Web 3.0 attempts

    11. Unlike Google and Meta they do not control their users’ data. OpenSea (in which a16z also has a stake) and Alchemy are just pipes to the blockchain. If their customers are unhappy, they can move to a competing service.
    12. Syndicate helps investment clubs organise themselves into “decentralised autonomous organisations” governed by “smart contracts”, which are rules encoded in software and baked into a blockchain.
    13. This is possible thanks to blockchains, which turn the centralised databases to which big tech owes its power into a common good that can be used by anybody without permission. Blockchains are a special type of ledger that is not maintained centrally by a single entity (as a bank controls all its customers accounts) but collectively by its users. Blockchains have outgrown cryptocurrencies, their earliest application, and spread into NFTs and other sorts of “decentralised finance” (DeFi). Now they are increasingly underpinning non-financial services.

      about evolution of blockchain

    14. Web3, in Mr Dixon’s telling, “combines the decentralised, community-governed ethos of web1 with the advanced, modern functionality of web2”.
    15. More recently, open-source software, which users can download for nothing and adapt to their needs, took over from proprietary programs in parts of the industry—only to be reappropriated by the tech giants to run their mobile operating systems (as Google does with Android) or cloud-computing data centres (including those owned by Amazon, Microsoft and Google).
    16. since November some $1trn of the value of cryptocurrencies, the most mature province of web3, has gone up in flames.
    17. “You don’t own ‘web3’. VCs and their [limited partners] do,”
    18. Pitted against them are the sceptics.
    19. On one side sit techno-Utopians, firms offering assorted web3 services and their VC backers.
    20. His token showed that NFTs are not as non-fungible as advertised. And OpenSea’s reaction illustrated that the supposedly decentralised web3 has its own gatekeepers.
    21. NFTs are the most visible instantiation of “web3”—an idea that its advocates and their venture-capital (VC) backers hail as a better, more decentralised version of the internet, built atop distributed ledgers known as blockchains.
    22. NFTs are the most visible instantiation of “web3”—an idea that its advocates and their venture-capital (VC) backers hail as a better, more decentralised version of the internet,
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The remedy for the failures of competition policy is not to abandon the consumer welfare standard but to bring it up to date.
    2. The large and fluid tech ecosystems offered by Alphabet, Amazon, Apple and others show the complexity of the task: they are in an innovative phase with new services being created that are highly popular and they increasingly compete with each other. It would be easy to erode the quality of their products with ill-judged rules.
    3. Regulators and governments, especially in Europe, must be realistic about their ability to anticipate consumers’ needs and should not pursue firms purely because they have grown big by being useful
    4. Before the consumer welfare standard emerged in legal judgments in the 1970s and 1980s, America’s trustbusting was capricious.
    5. a bill that would ban tech giants from using their platforms to favour their own services.
    6. Since the 1990s the EU has tended to put consumers’ interests first, but now its commissioner wants to apply a “broader notion” of harm.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL