How can policymakers credibly reveal and assess intentions in the field of artificial intelligence? Policymakers can send credible signals of their intent by making pledges or committing to undertaking certain actions for which they will pay a price—political, reputational, or monetary—if they back down or fail to make good on their initial promise or threat. Talk is cheap, but inadvertent escalation is costly to all sides.
This explainer overviews techniques to produce smaller and more efficient language models that require fewer resources to develop and operate. Importantly, information on how to leverage these techniques, and many of the subsequent small models, are openly available online for anyone to use. The combination of both small (i.e., easy to use) and open (i.e., easy to access) could have significant implications for artificial intelligence development.
The August 9 Executive Order aims to restrict certain U.S. investments in key technology areas. In a previous post, we proposed an end-user approach to crafting an AI investment prohibition. In this follow-on post, we rely on existing and hypothetical transactions to test scenarios where U.S. investments in China’s AI ecosystem would or would not be covered under the proposed program, and highlight outstanding challenges.
In collaboration with colleagues from CNAS and the Atlantic Council, CSET Researchers Ngor Luong and Emily Weinstein provided this comment in request to Treasury's Advanced Notice of Rule-making request for public comment (TREAS-DO-2023-0009-0001).
Highlighted in a TIME commentary piece is the impact of a CSET report, co-authored by Emily S. Weinstein and Ngor Luong. The piece discusses President Joe Biden's recent visit to India and Vietnam, which underscores the U.S. administration's efforts to "de-risk" economically and technologically from China.
Margarita Konaev's insights in a TIME article shed light on the evolving U.S. security assistance to Ukraine amidst the Russia-Ukraine conflict. The article highlights the potential impact of providing Ukraine with ATACMS and the ongoing Biden administration deliberations.
In an op-ed published in War on the Rocks, CSET’s Lauren Kahn discusses the U.S. Department of Defense's Replicator initiative, which aims to rapidly scale military capabilities in response to strategic competition with China.
This report summarizes more than 20 CSET reports, translations, and data analyses to provide insight into the steps China has taken to increase its technological competitiveness beyond its own borders.
This report summarizes more than 20 CSET reports, translations, and data analyses to provide insight into China’s internal actions to advance and implement its technology-related policy goals
Scout is ETO's discovery tool for Chinese-language writing on science and technology. Scout compiles, tags, and summarizes news and commentary from selected Chinese sources, helping English-speaking users easily keep up to date, skim the latest news, and discover new perspectives. Use the Scout web interface to browse and filter articles, or get customized updates delivered to your inbox through the Scout email service.
This website uses cookies.
To learn more, please review this policy. By continuing to browse the site, you agree to these terms.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.