looking beyond borders

foreign policy and global economy

Archive for the tag “technology”

The Problem Of Siloed Cyber Warriors

Cyber capabilities cannot be detached from other domains of warfare, such as electromagnetic, air, land, sea, and space. The future holds two potential battlefields that overlap: one fought between high-tech adversary militaries, and another, between highly specialised military units and insurgent forces in population-dense urban environments. In both situations, cyber capabilities must be integrated into all other domains of warfare.

Read Here – The Cipher Brief

Advertisements

China’s Evolving Economic Statecraft

Chinese enterprises are going global, venturing overseas to acquire foreign companies, know-how, and technologies. While most of these activities reflect simple business decisions, others carefully and deliberately advance China’s strategic interests, perhaps against the interests of its trading partners.

Read Here – The Diplomat

Trump Is Scaring Indian Americans Into Finding Their Political Voice

Especially with the recent violent attacks against a Sikh man in Washington, an Indian immigrant in South Carolina, and two Indian engineers in Kansas, Indian Americans have found themselves jolted out of this comfortable liminal space.

Read Here – The Atlantic

Saudis Thinking Beyond Oil In Asia Courtship

China’s role and influence in global markets is a big lure to Saudi Arabia. It is the world’s largest energy consumer and the second-biggest importer of crude, after the U.S. Just like the Japanese, China is driven by its need to secure sources of energy. That gives Saudi Arabia an opportunity to solidify its market presence in Asia amid rising competition from Russia.

Read Here – Bloomberg

China Poised To Challenge The US In Tech Revolution

The acronym of the moment in Beijing is BAT: Baidu (the search engine), Alibaba (Jack Ma’s answer to Amazon), and Tencent (which is the nearest thing to Facebook). These companies are much more than clones of their US counterparts; each has shown itself to be innovative in its own right.

Read Here – Boston Globe

The Soviet Web: The Tale Of How The USSR Almost Invented The internet

When brilliant Soviet cyberneticist Viktor Glushkov designed a blueprint for a computerised planning system, the Soviet Union looked on track to become web pioneers. In the end, however, there was to be no digital network.

Read Here – The Calvert Journal

The Next Big Blue-Collar Job Is Coding

Politicians routinely bemoan the loss of good blue-collar jobs. Work like that is correctly seen as a pillar of civil middle-class society. And it may yet be again. What if the next big blue-collar job category is already here—and it’s programming?

Read Here – Wired

Big Brother Is Winning

The clamour for security, accountability and transparency is leading to unfettered increase in the power of states. We are enacting law after law, introducing technology after technology, to render citizens transparent to the state. But at the same time, we are weakening protections and consenting to technologies in a way that makes the state less transparent to us.

Read Here – The Indian Express

How Silicon Valley Utopianism Brought The Dystopian Trump Presidency

That socioeconomic despair was profitably channeled to elect a president who—beyond his politics—represents a threat to most of the values the technocracy holds dear: transparency; multiculturalism; expertise; social progress. And, in the greatest of ironies, he used the tools and language of the technocracy to do it.

Read Here – Wired

The UK’s New Surveillance Law: Security Necessity Or Snoopers’ Charter?

On January 1st, the United Kingdom began the implementation of the Investigatory Powers Act, widely considered the most comprehensive—and intrusive—surveillance law in the Western world. The Act authorizes government access to bulk datasets such as travel logs, financial transactions, biometrics, the interception of digital communications data, the hacking of devices, and requires the retention of browsing history by Internet service providers.

Read Here – The Cipher Brief

Post Navigation

%d bloggers like this: