• Cybersecurity
  • Technology & Competition
  • Blogs
  • Resources
    • Suggested Readings
    • Contributors

Chips and Competition with China

by James Lewis | Mar 6, 2025 | Chips & China, Essay, Policy and Strategy, Tech Transfer

The Chip Illusion and Competition with China – “The more the United States abuses its position as the dominant player… the more those on the receiving end will try to find workarounds or alternatives.” Edward Fishman, America’s Economic Warfare Is Sowing Its Own...

Rethinking Chip Technology Transfer (1)

by James Lewis | Mar 6, 2025 | AI, Chips & China, Essay, Tech Transfer

British historian Paul Kennedy wrote in “The Rise and Fall of the Great Powers” that great powers do not decline because they fail to recognize problems, but because they apply old solutions to new problems when those solutions are no longer effective....

GPUs and the Competition to Build Digital infrastructure

by James Lewis | Mar 6, 2025 | Chips & China, Essay, Tech Transfer

The regulations for export controls on artificial intelligence chips left by the Biden Administration have two fundamental flaws. First, they will not stop China from developing AI.  If earlier precedents hold, it will only incentivize China (and DeepSeek is a...

MORE ARTICLES

AI in the UAE …

AI, Blogs

Comments on BIS-2025-0001: Framework for Artificial Intelligence Diffusion 

Chips & China, Essay, Policy and Strategy

Time for CSPs to stop fighting (and start fixing) Know Your Customer

Chips & China, Essay, Policy and Strategy

In Trade Fights, Chips Will Get Countries to the Negotiating Table

Blogs

U.S. Cyber Governance

Cyber Security, DHS & Cyber, Essay, Policy and Strategy

America should embrace weaponized interdependence against China

Chips & China, Essay, Policy and Strategy

The Project was formed with two chief goals in mind: to redraft meaningful and effective AI export control regulations which form a viable alternative regulatory structure to the Biden-era AI Diffusion Rule, and secondly to discuss restructuring the national security apparatus to improve cybersecurity.