chin

Chinese Grand Prix - Free Practice Two




chin

Creating Subnational Climate Institutions in China

This discussion paper (available in English and Chinese) describes the evolution of decentralization over the reform period that began in China in 1978, different theories of institutional change in China, and how the empirical and theoretical literatures help scholars and policymakers understand the development of institutions for governing GHG-emitting activities.




chin

Hong Kong, a Democratic Voice in China

Hong Kong is unique. While the writer Han Suyin’s description—“a borrowed place, on borrowed time” —seemed redundant upon the return of the territory to China on July 1, 1997, the former British colony appears to be perpetually exposed to uncertainty over its future. Despite long months of sociopolitical crisis and violence, Hong Kong has once again shown that it has lost none of its personality. Amidst the climate of upheaval and faced with a Chinese regime determined to obstruct any hopes of democracy, the people of Hong Kong have managed to attract international and media attention, marking them out from any other Chinese territory—including those that enjoy special status: Tibet, Inner Mongolia, Macao, and even Xinjiang, where nearly a million people from the minority Uyghur ethnic group are confined to “re-education” camps. No other Chinese region has been able to attract such attention.




chin

Beyond Trade: The Confrontation Between the U.S. and China

Could China and the US be stumbling down the path Germany and the United Kingdom took at the beginning of the last century? The possibility will strike many readers as inconceivable. But we should remember that when we say something is “inconceivable,” this is a claim not about what is possible in the world, but rather about what our limited minds can imagine.

My answer to the question of whether we are sleepwalking toward war is “yes.” 




chin

The U.S.-China Relationship is at a Crossroads

Joseph Nye writes that some decoupling of interdependence is likely, particularly in areas related to technology that directly affect national security. But will Washington and Beijing go too far?




chin

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.




chin

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




chin

Hong Kong, a Democratic Voice in China

Hong Kong is unique. While the writer Han Suyin’s description—“a borrowed place, on borrowed time” —seemed redundant upon the return of the territory to China on July 1, 1997, the former British colony appears to be perpetually exposed to uncertainty over its future. Despite long months of sociopolitical crisis and violence, Hong Kong has once again shown that it has lost none of its personality. Amidst the climate of upheaval and faced with a Chinese regime determined to obstruct any hopes of democracy, the people of Hong Kong have managed to attract international and media attention, marking them out from any other Chinese territory—including those that enjoy special status: Tibet, Inner Mongolia, Macao, and even Xinjiang, where nearly a million people from the minority Uyghur ethnic group are confined to “re-education” camps. No other Chinese region has been able to attract such attention.




chin

Beyond Trade: The Confrontation Between the U.S. and China

Could China and the US be stumbling down the path Germany and the United Kingdom took at the beginning of the last century? The possibility will strike many readers as inconceivable. But we should remember that when we say something is “inconceivable,” this is a claim not about what is possible in the world, but rather about what our limited minds can imagine.

My answer to the question of whether we are sleepwalking toward war is “yes.” 




chin

The U.S.-China Relationship is at a Crossroads

Joseph Nye writes that some decoupling of interdependence is likely, particularly in areas related to technology that directly affect national security. But will Washington and Beijing go too far?




chin

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.




chin

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




chin

Button: We're catching midfield teams

Jenson Button says McLaren should be encouraged by its race pace compared to the midfield despite a double DNF in Malaysia




chin

The U.S.-China Relationship is at a Crossroads

Joseph Nye writes that some decoupling of interdependence is likely, particularly in areas related to technology that directly affect national security. But will Washington and Beijing go too far?




chin

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.




chin

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




chin

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




chin

Romney's Reckless China Rhetoric Risks New Cold War

Rachel Esplin Odell argues for a wiser and more conservative strategy that resists the temptation to exaggerate the challenge posed by China.




chin

Creating Subnational Climate Institutions in China

This discussion paper (available in English and Chinese) describes the evolution of decentralization over the reform period that began in China in 1978, different theories of institutional change in China, and how the empirical and theoretical literatures help scholars and policymakers understand the development of institutions for governing GHG-emitting activities.




chin

Hong Kong, a Democratic Voice in China

Hong Kong is unique. While the writer Han Suyin’s description—“a borrowed place, on borrowed time” —seemed redundant upon the return of the territory to China on July 1, 1997, the former British colony appears to be perpetually exposed to uncertainty over its future. Despite long months of sociopolitical crisis and violence, Hong Kong has once again shown that it has lost none of its personality. Amidst the climate of upheaval and faced with a Chinese regime determined to obstruct any hopes of democracy, the people of Hong Kong have managed to attract international and media attention, marking them out from any other Chinese territory—including those that enjoy special status: Tibet, Inner Mongolia, Macao, and even Xinjiang, where nearly a million people from the minority Uyghur ethnic group are confined to “re-education” camps. No other Chinese region has been able to attract such attention.




chin

Beyond Trade: The Confrontation Between the U.S. and China

Could China and the US be stumbling down the path Germany and the United Kingdom took at the beginning of the last century? The possibility will strike many readers as inconceivable. But we should remember that when we say something is “inconceivable,” this is a claim not about what is possible in the world, but rather about what our limited minds can imagine.

My answer to the question of whether we are sleepwalking toward war is “yes.” 




chin

Hutchins Roundup: Consumer spending, salary history bans, and more.

Studies in this week’s Hutchins Roundup find that consumer spending has fallen sharply because of COVID-19, salary history bans have increased women’s earnings relative to men’s, and more. Want to receive the Hutchins Roundup as an email? Sign up here to get it in your inbox every Thursday. Consumer spending falls sharply because of COVID-19…

       




chin

Hutchins Roundup: Stimulus checks, team players, and more.

Studies in this week’s Hutchins Roundup find that households with low liquidity are more likely to spend their stimulus checks, social skills predict group performance as well as IQ, and more. Want to receive the Hutchins Roundup as an email? Sign up here to get it in your inbox every Thursday. Households with low liquidity…

       




chin

No, COVID-19 Isn’t Turning Europe Pro-China (Yet)

Ever since the World Health Organization declared Europe the new epicenter of the coronavirus pandemic on March 13, China has seized the opportunity to provide relief to some of the worst-hit European countries as part of a concerted PR offensive aiming at polishing up the Communist Party’s image internationally and — above all — domestically. Although China’s aid offers have generally been welcomed by those leaders struggling to contain the outbreak, it is still far too early to conclude that Beijing is actually winning over any European hearts and minds




chin

The U.S.-China Relationship is at a Crossroads

Joseph Nye writes that some decoupling of interdependence is likely, particularly in areas related to technology that directly affect national security. But will Washington and Beijing go too far?




chin

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.




chin

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




chin

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




chin

Romney's Reckless China Rhetoric Risks New Cold War

Rachel Esplin Odell argues for a wiser and more conservative strategy that resists the temptation to exaggerate the challenge posed by China.




chin

The Terms They Are A-Changin'...: Watching Cloud Computing Contracts Take Shape


EXECUTIVE SUMMARY

Many web services are examples of cloud computing, from storage and backup sites such as Flickr and Dropbox to online business productivity services such as Google Docs and Salesforce.com. Cloud computing offers a potentially attractive solution to customers keen to acquire computing infrastructure without large up-front investment, particularly in cases where their demand may be variable and unpredictable, as a means of achieving financial savings, productivity improvements and the wider flexibility that accompanies Internet-hosting of data and applications.

The greater flexibility of a cloud computing service as compared with a traditional outsourcing contract may be offset by reduced certainty for the customer in terms of the location of data placed into the cloud and the legal foundations of any contract with the provider. There may be unforeseen costs and risks hidden in the terms and conditions of such services.

This document reports on a detailed survey and analysis of the terms and conditions offered by cloud computing providers.

The survey formed part of the Cloud Legal Project at the Centre for Commercial Law Studies (CCLS), within the School of Law at Queen Mary, University of London, UK. Funded by a donation from Microsoft, but academically independent, the project is examining a wide range of legal and regulatory issues arising from cloud computing. The project's survey of 31 cloud computing contracts from 27 different providers, based on their standard terms of service as offered to customers in the E.U. and U.K., found that many include clauses that could have a significant impact, often negative, on the rights and interests of customers. The ease and convenience with which cloud computing arrangements can be set up may lull customers into overlooking the significant issues that can arise when key data and processes are entrusted to cloud service providers. The main lesson to be drawn from the Cloud Legal Project’s survey is that customers should review the terms and conditions of a cloud service carefully before signing up to it.

The survey found that some contracts, for instance, have clauses disclaiming responsibility for keeping the user’s data secure or intact. Others reserve the right to terminate accounts for apparent lack of use (potentially important if they are used for occasional backup or disaster recovery purposes), for violation of the provider’s Acceptable Use Policy, or indeed for any or no reason at all. Furthermore, whilst some providers promise only to hand over customer data if served with a court order, others state that they will do so on much wider grounds, including it simply being in their own business interests to disclose the data. Cloud providers also often exclude liability for loss of data, or strictly limit the damages that can be claimed against them – damages that might otherwise be substantial if a failure brought down an e-commerce web site.

Although in some U.S. states, in E.U. countries and in various other jurisdictions the validity of such terms may be challenged under consumer protection laws, users of cloud services may face practical obstacles to bringing a claim for data loss or privacy breach against a provider that seems local online but is, in fact, based in another continent. Indeed, service providers usually claim that their contracts are subject to the laws of the place where they have their main place of business. In many cases this is a US state, with a stipulation that any dispute must be heard in the provider’s local courts, regardless of the customer’s location.

Perhaps the most disconcerting discovery of the Cloud Legal Project’s survey was that many providers claimed to be able to amend their contracts unilaterally, simply by posting an updated version on the web. In effect, customers are put on notice to download lengthy and complex contracts, on a regular basis, and to compare them against their own copies of earlier versions to look for changes.

The cloud computing market is still developing rapidly, and potential cloud customers should be aware that there may be a mismatch between their expectations and the reality of cloud providers' service terms, and be alive to the possibility of unexpected changes to the terms.

Downloads

Authors

  • Simon Bradshaw
  • Christopher Millard
  • Ian Walden
Image Source: Natalie Racioppa
     
 
 




chin

Getting IT Right? How State Governments are Approaching Cloud Computing


Cloud computing is becoming omnipresent in the private sector as companies latch on to this innovation as a way to manage scalability, improve flexibility, and reduce cost. Analysts at IDC predict that, over the next six years, nearly 90 percent of new spending on Internet and communications technology will be on cloud-based platforms. Apple, Google, Amazon, Microsoft, and hundreds of smaller companies are positioning themselves to dominate the estimated $5 trillion worldwide market. While few companies will provide numbers, it is estimated that Amazon and Google may run as many as 10 million servers while Microsoft runs close to one million. In short, it is an innovation that makes a mockery out of Moore’s law.

But, like all innovations, cloud computing has potential pitfalls. Public sector organizations in particular have had difficulty taking advantage of new technologies. The Heritage Foundation keeps a list over 50 examples of government ineptitude including $34 billion in fraudulent Homeland Security contracts, National Institutes of Health renting a lab that it neither needs nor can use for $1.3 million per month, and the Department of Agriculture wasting $2.5 billion in stimulus money on broadband internet. Technological ineptitude received special attention with the failed launch of the Healthcare.gov, the release of classified data from Edward Snowden, and the costly FBI virtual case file debacle.

Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing.

The Approach

We have gathered and started to do a content analysis of the IT strategic plans for each state. For each plan, we performed a content analysis, which is looking for certain phrases or text within the IT strategic plan in order to have a structured way to understand the data. Details for our approach can be seen in our previous blog post.

How States Are Implementing the Cloud

We were not surprised to see a number of states preparing to study or embark on cloud computing.

While some states don’t mention it (e.g. Alabama), most states are eagerly exploring it. For example, North Dakota’s plan talks about cloud computing as an integral part of the future and seven of its thirteen major IT initiatives are centered on preparation for transitioning to the cloud “where and when it makes sense”.

Vermont puts itself squarely in the studying period. The plan describes that, “While the risks of enterprise-wide and cloud-based IT must be carefully managed, trends continue to just larger-scale operations.” Wisconsin also clearly lays out its view on cloud computing, writing that, “Flexibility and responsiveness (also) guide Wisconsin’s approach toward adoption of cloud services” and suggests that its version of a private cloud “…offers advanced security and service availability tailored for business needs.” West Virginia provides an equally balanced approach by requiring that only services with an acceptably low risk and cost-effective footprint will be moved to the cloud.

In short, all of the states that are considering cloud computing are taking a thoughtful and balanced approach.

The Good

One of the most critical aspects of cloud computing is security and, without question, states understand the importance of good security. A good example of this is Colorado who designates security as one of its four “wildly important goals” and sets the target of “10 percent reduction in information security risk for Colorado agencies by close of FY15”.

South Carolina echoed the same theme by asserting that security and confidentiality are “overriding priorities at every stage of development and deployment.” Connecticut’s plans explain the need to “continuously improve the security and safeguards over agency data and information technology assets”.

The Bad

Despite the interest in cloud computing, we were only able to find a single state (Georgia) that explicitly links governance to security and, to us, by extension to cloud computing. In Georgia’s plan, they start with the idea that “strong security programs start with strong governance” and then explicitly describe necessary changes in governance to improve security.

We were, however, impressed with the seriousness that New York, North Carolina and Massachusetts took governance but it was difficult to find many other states that did.

The Ugly

Unfortunately the results on sourcing were dismal. While a few states (e.g. Kansas, Ohio, and Massachusetts) specifically discuss partnerships, most states seemed to ignore the sourcing aspect of cloud computing. The most ominous note comes from Alabama where they make a statement that innovation in the state is being stifled by a lack of strong personnel.

While we have great enthusiasm for government to address cloud computing, some of the non-technical issues are lagging in the discussion. Good government requires that these items be addressed in order to realize the promise of cloud computing.

Authors

Image Source: © Fabrizio Bensch / Reuters
      
 
 




chin

The Hutchins Center Explains: Budgeting for aging America


For decades, we have been hearing that the baby-boom generation was like a pig moving through a python–bigger than the generations before and after.

That’s true. But that’s also a very misleading metaphor for understanding the demographic forces that are driving up federal spending: They aren’t temporary. The generation born between 1946 and 1964 is the beginning of a demographic transition that will persist for decades after the baby boomers die, the consequence of lengthening lifespans and declining fertility. Putting the federal budget on a sustainable course requires long-lasting fixes, not short-lived tweaks.  

First, a few demographic facts.

As the chart below illustrates, there was a surge in births in the U.S. at the end of World War II, a subsequent decline, and then an uptick as baby boomers began having children.

Although the population has been rising, the number of births in the U.S. the past few years has been below the peak baby-boom levels, possibly because many couples chose not to have children during bad economic times. More significant, fertility rates–roughly the number of babies born per woman during her lifetime–have fallen well below pre-baby-boom levels.

Meanwhile, Americans are living longer. In 1950, a man who made it to age 65 could expect to live until 78 and a woman until 81. Social Security’s actuaries project that a man who lived to age 65 in 2010 will reach 84 and a woman age 86.

Put all this together, and it’s clear that a growing fraction of the U.S. population will be 65 or older.   

The combination of longer life spans and lower fertility rates means the ratio of elderly (over 65) to working-age population (ages 20 to 64) is rising. As the chart below illustrates, the ratio will rise steadily as more baby boomers reach retirement age–and then it levels off.  

Simply put, this doesn’t look like a pig in a python.  

So what do these demographic facts portend for the federal budget?  In simple dollars and cents, the federal government spends more on the old than the young. More older Americans means more federal spending on Social Security and Medicare, the health insurance program for the elderly. On top of that, health care spending per person is likely to continue to grow faster than the overall economy.

The net result: 85 percent of the increase in federal spending that the Congressional Budget Office projects for the next 10 years, based on current policies, will go toward Social Security, Medicare and other major federal health programs, and interest on the national debt.

Restraining future deficits and the size of the federal debt mean restraining spending on these programs or raising taxes–and probably both. One-time savings or minor tweaks won’t suffice. Nor will limiting the belt-tightening to annually appropriated spending.

The fundamental fiscal problem is not coping with the retirement of the baby boomers and then going back to budgets that resemble those of the past. The fundamental fiscal problem is that retirement of the baby boomers marks a major demographic transition for the nation, one that will require long-lived changes to benefit programs and taxes.


Editor's Note: This post originally appeared on The Wall Street Journal's Washington Wire on December 18, 2015.
     
 
 




chin

Taiwan’s January 2020 elections: Prospects and implications for China and the United States

EXECutive Summary Taiwan will hold its presidential and legislative elections on January 11, 2020. The incumbent president, Tsai Ing-wen of the Democratic Progressive Party (DPP), appears increasingly likely to prevail over her main challenger, Han Kuo-yu of the Kuomintang (KMT). In the legislative campaign, the DPP now has better than even odds to retain its…

       




chin

China steps up its information war in Taiwan

       




chin

What does Taiwan’s presidential election mean for relations with China?

The landslide reelection of Taiwan's President Tsai Ing-wen was in many ways a referendum on how Taiwan manages its relationship with China. Brookings Senior Fellow Richard Bush explains why Taiwan's electorate preferred President Tsai's cautious approach, how other domestic political and economic factors weighed in her favor, and possible lessons from this election on combating…

       




chin

This US-China downturn may be difficult for Taiwan

Many Taiwan policymakers hold the view that U.S.-China tensions create favorable conditions for closer U.S.-Taiwan relations. As the thinking goes, the less beholden Washington is to maintaining stable relations with Beijing, the more it will be willing to show support for its democratic friends in Taiwan. In the coming months, this proposition may be tested.…

       




chin

12 law order south china sea kuok

      
 
 




chin

What does the South China Sea ruling mean, and what’s next?

The much-awaited rulings of the Permanent Court of Arbitration in the Hague—in response to the Philippines’ 2013 submission over the maritime entitlements and status of features encompassed in China’s expansive South China Sea claims—were released this morning. Taken together, the rulings were clear, crisp, comprehensive, and nothing short of a categorical rejection of Chinese claims.

       
 
 




chin

How will China respond to the South China Sea ruling?

The arbitration panel deemed invalid virtually all of Beijing’s asserted claims to various islands, rocks, reefs, and shoals in the South China Sea, determining that Chinese claims directly violated the provisions of UNCLOS, which China signed in 1982. The biggest looming issues will focus on how China opts to respond. 

       
 
 




chin

The South China Sea ruling and China’s grand strategy

In the wake of the International Tribunal on the Law of the Sea's ruling this week, the question going forward is how China will respond. Will it double down on the aggressive and coercive activities of the past six years, behavior that has put most of its East Asian neighbors on guard? Will it continue to interpret the Law of the Sea in self-serving ways that very few countries accept? Or, might China recognize that its South China Sea strategy has been an utter failure and that its best response is to take a more restrained and neighborly approach?

      
 
 




chin

U.S. South China Sea policy after the ruling: Opportunities and challenges

In spite of the legal complexities of the South China Sea ruling, the verdict was widely seen as a victory of "right" over "might" and a boost for the rules-based international order that the United States has been championing. In reality, the ruling could also pose profound challenges for the future of U.S. South China Sea policy under the Obama administration and beyond.

      
 
 




chin

Taiwan must tread carefully on South China Sea ruling

Taipei’s claims are similar to Beijing’s. How it responds to the tribunal’s decision could put it at odds with its U.S. ally.

      
 
 




chin

The day after: Enforcing The Hague verdict in the South China Sea

The U.N. arbitral tribunal's decision was an unequivocal rebuke of China’s expansive maritime claims and increasingly assertive posturing in adjacent waters. But, as Richard Heydarian argues, despite the Philippines' landmark victory, what is at stake is no less than the future of the regional security architecture.

      
 
 




chin

Hutchins Center Fiscal Impact Measure

The Hutchins Center Fiscal Impact Measure shows how much local, state, and federal tax and spending policy adds to or subtracts from overall economic growth, and provides a near-term forecast of fiscal policies’ effects on economic activity. Editor’s Note: Due to significant uncertainty about the effect of the COVID-19 pandemic on the outlook for GDP…

       




chin

Life after Brexit: What the leave vote means for China’s relations with Europe

On June 23, the United Kingdom voted to leave the European Union, sending shockwaves throughout Europe and the rest of world. The reaction in China, the world’s second largest economy, was difficult to decipher. What Brexit means for China’s economic and political interests in Europe remains unclear.

      
 
 




chin

Can the US sue China for COVID-19 damages? Not really.

       




chin

Webinar: Following the money: China Inc’s growing stake in India-China relations

By Nidhi Varma https://www.youtube.com/watch?v=6BhEaetvl7M On April 30, 2020, Brookings India organised its first Foreign Policy & Security Studies webinar panel discussion to discuss a recent Brookings India report, “Following the money: China Inc’s growing stake in India-China relations” by Ananth Krishnan, former Visiting Fellow at Brookings India. The panel featured Amb. Shivshankar Menon, Distinguished Fellow,…

       




chin

How is the coronavirus outbreak affecting China’s relations with India?

China’s handling of the coronavirus pandemic has reinforced the skeptical perception of the country that prevails in many quarters in India. The Indian state’s rhetoric has been quite measured, reflecting its need to procure medical supplies from China and its desire to keep the relationship stable. Nonetheless, Beijing’s approach has fueled Delhi’s existing strategic and economic concerns. These…

       




chin

Technology competition between the US and a Global China

In this special edition of the Brookings Cafeteria Podcast, Lindsey Ford, a David M. Rubenstein Fellow in Foreign Policy, interviews two scholars on some of the key issues in the U.S.-China technology competition, which is the topic of the most recent release of papers in the Global China series. Tom Stefanick is a visiting fellow…

       




chin

Pandemic politics: Does the coronavirus pandemic signal China’s ascendency to global leadership?

The absence of global leadership and cooperation has hampered the global response to the coronavirus pandemic. This stands in stark contrast to the leadership and cooperation that mitigated the financial crisis of 2008 and that contained the Ebola outbreak of 2014. At a time when the United States has abandoned its leadership role, China is…