images

A tech upgrade for India-China relations

Chinese technology companies are now world leaders in areas such as artificial intelligence, e-commerce and fintech. After investing heavily in South East Asia, they are rapidly establishing themselves in India, with venture capital firms following suit. This can have a transformative effect on the Indian technology scenario over time and catalyse an Operating System (OS)[…]

15070710118089

Lead Leapfrogger: Chinese O2O Commerce and The Nature Of Cultural Innovation

I. The Remarkable Story of Everyday O2O Commerce in China Let’s say you were planning to visit China ten years ago. You would have your visa and flights booked, perhaps even a hotel. But the preparations wouldn’t end there. You’d have withdrawn plenty of RMB in cash, which you’d need for just about everything, except[…]

Pleniere

The Data Protection Convention that We All Need

Once upon a time, in a faraway land (Europe), some countries decided that it would be worth setting in stone (in an international treaty) the protection of persons when information on them were being used (automatically processed by computer). The Convention of the Council of Europe for the Protection of Individuals with regard to Automatic[…]

3295487447_6e33b95a2b_m

Data Privacy about more than Privacy

It is often forgotten that laws concerning data privacy serve purposes other than protecting privacy alone. Research conducted by this writer in New Zealand over the last decade has conclusively established in the first place that the vast majority (around 80% in one study) of litigation brought under the Privacy Act 1993 (the Act) was[…]

3123942310_82191296fb_m

Data protection: How are attitudes to disclosure changing? 

As more of our personal data is held in centralized, remote storage, it has become a tempting target for law enforcement and intelligence agencies.  Through various investigatory powers, these government agencies can demand that social media companies, e-mail providers, ISPs, and other intermediaries turn over sensitive records and message content.  Are governments abusing their investigatory[…]

Screen Shot 2016-12-02 at 7.24.00 pm

AI in Australian vehicles – how is privacy faring so far?

Automated technologies using artificial intelligence are increasingly being applied in daily life, and Australia is no exception. Transportation has emerged as a prominent area in which AI and automation are being deployed among the general population, prominently unmanned aerial vehicles (UAVs – better known as drones) and autonomous vehicles (better known as ‘driverless cars’). While[…]

Dave Sutherland_Flickr

Is Artificial Intelligence a Weapon of Mass Disruption?

Earlier this year, the defeat of Go world champion Lee Sedol by Google’s AlphaGo underscored the coming-of-age of artificial intelligence (or AI for short). Since 1956, when the term AI was first coined, billions of dollars of investment have flowed into the development and commercialization of AI – a term referring to computer systems that[…]

IMG_5683

Encounters with Other Intelligences: Reflections from Digital Asia Hub’s AI in Asia Conference

By definition, the project of artificial intelligence has largely been concerned with replicating human capability for logic and thought. The engineering history of AI reads like a narrative conflict of man versus himself, driven to model the next great feat of thought, capability for strategy, and even humor and punning. Those engineering benchmarks met, we[…]

Clive Darra:Flickr

Is China ‘Buying the World’ again? Is Alibaba the poster child for global expansion?

Chinese e-commerce giant Alibaba Group – the company that had caught the attention of the global media with its historical IPO of $25 billion in 2014 – once again grabbed the headlines recently due to a standout $1 billion deal in April for a controlling stake of Lazada, an e-commerce company that operates across six[…]