Search results

1 – 10 of 103
Expert briefing
Publication date: 10 April 2024

China is working hard to boost its domestic AI chip industry in response to US restrictions. The support significantly impacts the development of its entire AI sector, the…

Expert briefing
Publication date: 18 April 2024

Parallel imports have played a crucial role in securing the supply of goods for the Russian economy. The creation and management of parallel import channels is now an important…

Executive summary
Publication date: 6 October 2023

INT: Cybersecurity report underlines basic security

Details

DOI: 10.1108/OXAN-ES282491

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 9 November 2023

CHINA: More multinationals will withdraw

Expert briefing
Publication date: 13 November 2023

However, the new measures’ efficacy still depends on US regulators’ capacity to monitor and enforce the controls, which are generating significant pushback from foreign and…

Details

DOI: 10.1108/OXAN-DB283324

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 28 September 2023

US/JAPAN: Chinese cyberespionage will test firms

Details

DOI: 10.1108/OXAN-ES282280

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 1 November 2023

To that end, in early October, the Ministry of Industry and Information Technology (MIIT), together with five other ministry-level government bodies, published an Action Plan for…

Executive summary
Publication date: 21 July 2023

JAPAN/INDIA: Semiconductor cooperation gets lift

Details

DOI: 10.1108/OXAN-ES280688

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 30 June 2023

The trip underscored the importance that Delhi and Washington give to their partnership, with the two sides announcing various deals covering a range of areas.

Expert briefing
Publication date: 14 September 2022

Currently a theoretical threat, it could materialise in the future with wide-ranging implications. Quantum computers could be used to undermine cryptographic protection of…

1 – 10 of 103