ITIF President Rob Atkinson explains how ICT has the potential to revolutionize the lives of people around the world, in developed and developing countries alike.
Reports & Briefings
December 15, 2009
December 2, 2009
Creating Jobs Through Exports and Innovation: 9 Steps Congress Can Take to Foster Sustainable Job Creation
There is renewed interest in a job creation agenda. But many of the proposals put forth to date overlook the importance of exports and innovation.
November 18, 2009
This report benchmarks clean energy competitiveness in four nations: China, Japan, South Korea and the United States.
November 17, 2009
In this report, ITIF identifies the leading nations in mobile payments, explains why the United States lags so far behind, and offers recommendations.
November 11, 2009
Contrary to much of the narrative within Fareed Zakaria’s book The Post-American World, the United States is losing ground in terms of international competition and innovation.
November 5, 2009
If the United States is to achieve the promise of the broadband revolution it will need to ensure that a much larger share of Americans are subscribers.
November 1, 2009
The last two decades have presented unprecedented global economic change. While there is much debate around the changing global economy over the last several decades, all should agree that IT has been at the root of these transformations.
October 19, 2009
Should wireless handset manufacturers like Apple and Palm be forbidden to share innovation risks with network operators? Congress and the FCC have been besieged by advocates seeking a ban on the marketing arrangements that make risk-sharing possible, but the technology mandate necessary to accomplish the goal would impair innovation.
October 19, 2009
ITIF lays out ten key questions it believes are critical to answer accurately before any regulatory decisions are made.
October 14, 2009
A proposal on cybersecurity certification will offer few benefits, introduce burdensome costs to the government and the private sector, and not address the root cause of most cybersecurity vulnerabilities.