skip to main content
Article Podcast Report Summary Quick Look Quick Look Video Newsfeed triangle plus sign dropdown arrow Case Study All Search Facebook LinkedIn YouTube Bluesky Threads Instagram Right Arrow Press Release External Report Open Quote Storymap

Search Results

Your search for Ken Gause,2025 found 135 results.

North Korea A Case Study of Asymmetric Relations
/analyses/2021/10/north-korea-a-case-study-of-asymmetric-relations
Examining North Korea as a case study for asymmetric relations and the issue of its nuclear weapons development as the threat to status quo in the international order.
of a larger regional strategy tied to great power competition. Ken E. Gause /reports/2021/10/COP-2021-U-030765-Final.pdf /reports/2021/10/NK-Asymmetric-Relations-Cover.png /reports/2021/10
North Korea Asymmetric Advantage in Yellow Sea
/analyses/2021/10/north-korea-asymmetric-advantage-in-yellow-sea
Examining the potential for North Korea to initiate a limited military conflict in the Yellow Sea.
, issuing stern warnings to cease combat operations and leave the area. Beijing made no further moves to use force, but Pyongyang, Seoul , and Washington took notice. Markus V. Garlauskas Ken E. Gause /reports/2022/01/North-Koreas-Arena-of-Asymmetric-Advantage-Why-We-Should-Prepare-for-a-Crisis-in-the-Yellow-Sea.pdf /reports/2022/01/Nork%20Korea.jpg /images/GenericReportImage.jpg Countering
ai and autonomy in russia: Issue 38, May 16, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-38
Ministry of Health. The three organizations recently signed a memorandum of cooperation for the digitalization of healthcare in Uzbekistan, as part of the country’s eHealth 2025 implementation strategy. The project will create a unified medical database and a complex of integrated medical information systems in Uzbekistan by 2025. In addition to developing solutions for telemedicine consultations ... the output of silicon wafers from the current 3,000 to 6,000 by 2025, although it can only make 180–90-nm semiconductors. RUSSIAN IT COMPANIES LOOKING FOR JOINT VENTURE OPPORTUNITIES IN INDIA
ai and autonomy in russia: Issue 44, August 25, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-44
by 2025. ” Petrov continues, “By the same time, the share of Windows products in enterprises will drop significantly.” The article identifies the development ecosystem of Russian domestic IT services ... that the transition will inevitably be painful and result in a fracturing of the operating system environment for many years: It is possible to speak about the preferential rejection of the American OS by 2025
ai and autonomy in russia: Issue 41, June 27, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-41-a
flight in 2025 According to sources in Russia’s defense sector who spoke to the TASS News Agency, an advanced deck-based unmanned aerial vehicle is scheduled to make the first test flight in 2025
ai and autonomy in russia: Issue 40, June 15, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-40
in the field of IT. Instruction will begin in September 2022. Eighty thousand students are expected to be trained in these digital departments per year, and by the end of 2025, more than 385,000 students ... of the country and starting in 2025 the use of foreign means of information protection will be prohibited. CII objects included in this order include critical networks and information systems of state
china ai and autonomy report: Issue 3, November 18, 2021
/our-media/newsletters/china-ai-and-autonomy-report/issue-3
The China AI and Autonomy Report, issue 3, is a biweekly newsletter published by CNA, on artificial intelligence and autonomy in China.
’s “Made in China 2025” initiative. MIIT seeks to establish around 40 national manufacturing innovation centers by 2025 (see MIIT website for more information on its national manufacturing centers
Jeffrey Becker Honored for Analysis of China at CNA Awards
/our-media/press-releases/2025/7-17
or in combat zones. This year’s recipients are Lauren Claus and Isaac Schmidt. Dr. Lauren Claus deployed with Carrier Strike Group Three aboard USS Abraham Lincoln from May 2024 until January 2025. While ... Strike Group One aboard the carrier USS Carl Vinson from November 2024 until May 2025. Schmidt served as the second data scientist from CNA to lead the Data Science @ Sea project. Schmidt led a project
cna talks: North Korea-U.S. Summit
/our-media/podcasts/cna-talks/2018/north-korea-u.s.-summit
In an excellent primer on the current state of affairs between North Korea and the United States, CNA experts  Ken Gause ,  Sarah Vogler  and  Christopher Steinitz  discuss the June 12 summit and how the regime's objectives changed in the years and months leading up to it. They believe that Kim Jong Un's 2018 New Year’s Day speech indicated a shift from a brinkmanship to an engagement posture, as well as a shift in focus from the nuclear program to economic progress. They explain how Kim’s strategic calculus differs from his father's, what is at stake for the regime and its legitimacy, and North Korea's uneasy relationships with South Korea, China, and the United States.
North Korea-U.S. Summit In an excellent primer on the current state of affairs between North Korea and the United States, CNA experts  Ken Gause ,  Sarah Vogler  and  Christopher Steinitz  discuss the June 12 summit and how the regime's objectives changed in the years and months leading up to it. They believe that Kim Jong Un's 2018 New Year’s Day speech indicated a shift from a brinkmanship ... with the Arab world and the Greater Middle East and has contributed to numerous CNA studies of the strategic, political-military and social affairs of the region. Ken Gause   is the director
Leading the Cybersecurity Strategy in the Public Sector
/quick-looks/2022/our-leadership-on-cybersecurity-and-featured-projects
CNA is a widely recognized leader in researching and applying industry trends, developing sound policies, conducting futures planning, and designing systems strategically. CN supports our clients and partners in strategic planning for cybersecurity, identity and access management (IAM), information exchange, and advanced technology capabilities in emerging technologies.
approach to explore today's national security agenda and cyber security challenges that will emerge in the future. For example, through a series of cybersecurity scenarios, the Cybersecurity Futures 2025