Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
The May 2025 OODA Network meeting delivered a comprehensive analysis of the cyber and national security technology landscape, drawing from recent network member attendance at major conferences including RSA, the In-Q-Tel CEO Summit, and SOF Week. OODA Network members on the monthly call surfaced major trends in AI, cybersecurity, defense tech, and geopolitical influence.
Melissa Flagg argues that America’s innovation system, still guided by the frameworks established by Vannevar Bush in 1945, is failing to address the most pressing challenges of the 21st century. She calls for a fundamental reassessment of the research funding landscape, focusing not on nostalgia for past successes but on forging new connections between research,…
Experts on AI and Chinese technology policy, writing for Just Security recently, pulled the string on the AI Diffusion framework we have laid out here at OODA Loop in recent posts. Their discussion points are compelling and worth a review. We provide a summary and analysis here.
The global AI boom has triggered an unprecedented investment wave—nearly $7 trillion by 2030—to scale data centers that fuel artificial intelligence, sparking intense competition, uncertainty, and strategic risk across industries. An April 2025 report from McKinsey quantifies the monumental stakes and capital requirements to meet surging AI compute demands. The insights from the report are…
As reported by the Financial Times, the convergence of trade wars, geopolitical instability, and disruptive technologies is straining traditional scenario planning methods, forcing organizations to rethink their models for an increasingly volatile and ambiguous future. OODA Loop has been grappling with these issues for a while, which we capture in a compilation of our recent…
US chip and IT supply chains face a new era of embedded risk and legislative scrutiny, with the Chip Security Act seeking to secure on-chip supply chains against adversarial threats.
We have been on this beat for a while: as the convergence of AI chip security, zero-trust architectures, and supply chain resilience began to reshape national security imperatives, demanding a shift toward hardware-native, verifiable security models. The following post is a compilation of our tracking and analysis to date.
Late last year, the Center for a New American Security (CNAS) released the Drone Proliferation Dataset, offering a comprehensive overview of military-grade drone transfers from 1995 to September 2023. This dataset highlights a significant shift in global drone dynamics, with emerging players like Turkey, China, and Iran challenging the longstanding dominance of the U.S. and…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.
Copyright © 2025 — All Rights Reserved.
Notifications