RAND experts have often been among the pioneers of key scientific research, including computer analysis, satellite development, military technology, and the foundations of the Internet. RAND's research has also resulted in the development of new methodologies and ways of analyzing policy issues, from the Delphi method to Robust Decision Making.

  • Horizon over the water, photo by Evan Leeson/CC BY-NC-SA 2.0


    Foresight and Optimisation in Horizon 2020

    Jan 12, 2015

    As digital technology becomes more relevant in diverse aspects of our economy and society, it is important to anticipate changes in technology and how we use it. This understanding is particularly important for Horizon 2020, the EU’s 7-year research and innovation funding programme.

  • iStock_000046060894_Large


    Managing Technology in an Unmanageable World

    Feb 19, 2015

    The need for purposeful and focused R&D in the U.S. has never been greater, but technology is advancing so quickly that the structures available to manage it have not kept pace. A comprehensive examination of the technological landscape is needed to help the government take a more holistic approach to investing in and regulating technologies.

Explore Science and Technology

  • Nuclear power station


    RAND Is Accepting Applications for Stanton Nuclear Security Fellowships

    RAND is accepting applications for up to three Stanton Nuclear Security Fellows. The application deadline is February 8, 2016. The Stanton Nuclear Security Fellows Program was created to stimulate the development of the next generation of thought leaders on nuclear security.

    Nov 23, 2015

  • Mother and son using a touch pad tablet on a plane


    Step Aside, 'Screen Time.' Make Room for 'Screen Purpose.'

    Technology is simply another way to communicate, learn, and play. It shouldn't automatically be regarded as a threat. Whether technology helps or harms children largely depends on how it is used.

    Nov 17, 2015

  • Two chemists working in a laboratory

    News Release

    People Are Central to High-Performing Research Units at UK Universities

    Researchers identified five key themes associated with high-performance research units in UK higher education institutions: people; culture, values, and leadership; strategy and funding; collaboration and networks; and institutional and departmental practice.

    Nov 17, 2015

  • Two chemists working in a laboratory


    Characteristics of High Performing Research Units in UK Higher Education Institutions (HEIs)

    The Higher Education Funding Council for England (HEFCE) commissioned the Policy Institute at King’s and RAND Europe to conduct a preliminary analysis of the characteristics of high performing research units within UK Higher Education Institutions (HEIs).

    Nov 17, 2015

  • A U.S. Air Force airman works at the 561st Network Operations Squadron, which executes defensive cyber operations


    The Two Sides of Cybersecurity

    Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America's networks with appropriate resources dedicated to combatting criminal, terrorist, and other threats in cyberspace.

    Nov 13, 2015

  • Egypt's Prime Minister Sherif Ismail (right) listens to rescue workers as he looks at the remains of a Russian airliner after it crashed in central Sinai, north Egypt, October 31, 2015


    Passing Judgment on Russian Plane Crash Before the Facts Are In

    A bright flash and catastrophic event suggest an explosion, but do not necessarily exclude the possibility of a mechanical failure. This would not, in fact, be the first time evidence pointed to a terrorist attack when none existed.

    Nov 12, 2015

  • USS Lassen conducts exercises with Korean and Turkish navy ships


    How Will China Respond to Future U.S. Freedom of Navigation Ops?

    On October 27, the USS Lassen carried out the first freedom of navigation patrol to challenge China's territorial claims in the South China Sea. In assessing China's potential response to follow-on operations, the extremes of either complete inaction or a military attack can be ruled out.

    Oct 29, 2015

  • Volkswagen CEO Matthias Mueller gives a tour of the VW factory in Wolfsburg, Germany, October 21, 2015


    When Public Trust in Corporations Is Shaken

    The Volkswagen scandal comes at a time when the public's trust in both the automotive industry and tech companies is at risk. The level of public trust in an individual organization could end up burnishing — or infecting — an entire industry or new technology.

    Oct 28, 2015

  • The humanoid robot AILA (artificial intelligence lightweight android) operates a switchboard during a demonstration at the CeBit computer fair in Hanover, Germany, March, 5, 2013


    How to Overcome the Risks of Artificial Intelligence

    The warnings and promises of artificial intelligence aren't new, but advances in technology make them more pressing.

    Oct 22, 2015

  • Malware phishing data concept


    Social Engineering Explained: The Human Element in Cyberattacks

    The human element is the most unpredictable factor in cybersecurity. A social engineer aims to make people do what they want or give the social engineer information, often without the person considering the negative consequences.

    Oct 20, 2015

  • Staff raise Pakistan's flag in front of the Great Hall of the People ahead of a welcome ceremony for Pakistan's Prime Minister Nawaz Sharif in Beijing, July 5, 2013


    Pakistan and China's Almost Alliance

    Policymakers in the United States and throughout Asia should take note of why the Sino-Pakistani relationship has endured for so long, what each partner gets from the other, and what inherent limitations prevent the union from developing into a true alliance.

    Oct 16, 2015

  • Men search for survivors at a site hit by shelling in Damascus, Syria, June 16, 2015


    A No-Fly Zone Over Syria: Q&A with Karl Mueller

    Some are advocating a no-fly zone in Syria to protect civilians from both ISIS and forces loyal to Assad. What constraints complicate establishing a no-fly zone and realizing its expected benefits? And how might Assad supporters, such as Russia, respond?

    Oct 15, 2015

  • A person looking at top secret files with a magnifying glass


    Defining a New Paradigm for Government Secrecy

    Technology has afforded the U.S. national security apparatus incredible capabilities, along with equally monumental challenges and risks. The government has the option to choose whether to adjust by taking a proactive approach or to allow external forces to determine the future of its secrets.

    Oct 13, 2015

  • An Airbus A321 being assembled at the new Airbus U.S. Manufacturing Facility in Mobile, Alabama, September 13, 2015


    The Prospective Impact of Airbus Industries on Mobile

    Austal USA's operations in Mobile, Alabama have benefited the broader region. Similarly, Airbus's hiring should have a net favorable impact on the region's economy, since the area does not appear to be at or near full employment.

    Oct 10, 2015

  • U.S. President Barack Obama and Chinese President Xi Jinping shake hands following a joint news conference in the Rose Garden at the White House in Washington September 25, 2015


    Define Acceptable Cyberspace Behavior

    While a U.S.-China cyberspace agreement is a welcome step, it also underscores the greater issues facing the United States and the international community in this largely ungoverned space. A precondition for securing U.S. networks should be the development of an overarching cyber doctrine that defines acceptable behavior and allows the U.S. to defend its networks against threats.

    Sep 27, 2015

  • RR1284


    Developing a Framework for Measuring Digital Catapult's Impact on Productivity

    Background Data-driven innovation is expected to be one of the most important technological advances in the recent years, with some estimates showing that it has the potential to create more than $300bn of economic value in the next decade. Productivity is a key driver of economic growth. Therefore, it is important ...

    Sep 22, 2015

  • The KC-46A Pegasus aerial refueling aircraft takes off on its maiden flight from Paine Field in Everett, Washington, December 28, 2014


    Lessons from the Past for the Future of the KC-46A

    Analysis suggests that fixed-price contracts have not successfully reduced costs to the DoD associated with developing complex weapon systems. This has implications for the Air Force, given the importance of the ongoing KC-46A program.

    Sep 16, 2015

  • News Release

    China's Military Modernization Increasingly Challenges U.S. Defense Capabilities in Asia

    Although China continues to lag behind the United States in terms of aggregate military hardware and operational skills, it has improved its capabilities relative to those of the U.S. in many critical areas. Moreover, China does not need to catch up fully in order to challenge U.S. ability to conduct effective military operations near the Chinese mainland.

    Sep 14, 2015

  • congressional-podcast-teaser-highres


    Lessons from a Hacker: Cyber Concepts for Policymakers

    In this September 14th congressional briefing, Lillian Ablon discusses the basics of cyber and information security and provides insights into some of the complexities of cybersecurity policymaking. Topics include why software vulnerabilities are significant, the components of cyber risk beyond the threat, motivations of various cyber threats actors, and what they exploit.

    Sep 14, 2015

  • Report

    Cyber Practices: What Can the U.S. Air Force Learn from the Commercial Sector?

    This report describes common commercial practices for cyber workforce management and organizational issues that are applicable to the U.S. Air Force as it endeavors to improve the management of its cyber forces.

    Sep 9, 2015