An intro to how AI can trick you
Guaranteed by Mr. Maverick
If you only have ten minutes to understand what is happening globally, read this.
What happens when a scientific topic dies?
Becoming the biggest player in history
By Angeliki Martinou In 1918, the world faced a pandemic, the ‘Spanish flu’, of origin geographically still unidentifiable. A century later, SARS-CoV-2, originating from China, became a worldwide health emergency. In March 2020, the WHO officially declared Covid-19 a pandemic, urging countries all over the world to take a “whole of government, whole of society … Continue reading The Sociopolitical Pathogen
We can gather from many developments around the world that tension manifests itself with many forms in the international spectrum. Wars of different kind and scale, conflicts based on various reasons all reflect an underlying systemic change. This geopolitical condition, as Graham Allison states, is associated in theory with the phenomenon of ‘transitional friction’ and … Continue reading US-China Trade Deal: a Big Step for Global Economy, a Rather Small Step for Global Stability
The approval of Turkey’s code-named Operation Peace Spring in north-eastern Syria by the United States, highlighted a strident contention of numerous Foreign Policy analysts on the basis of which the United States has ceased to be the preponderant force in the Middle East. The overemphasized passivity of the United States towards Turkey’s aggression and overall … Continue reading Is There Really a Power Void in the Middle East?
By George Monopatis It is common knowledge in international fora that China is the number 2 power in the international system. However, the tricky part consists of identifying the means of achieving the status of a world order challenger. Perhaps the straightforward answer to this question derives from the country’s geography. In a geopolitical sense … Continue reading China: The Challenger
The recent measures constraining Huawei’s activity in the Transatlantic provokes old questions of economic interdependence and new puzzles concerning cybersecurity