Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Global organized crime networks have newfound, democratized access to exponential technologies like AI and quantum – while quantum computing could break today’s cryptography by 2035. The UK and EU are urging immediate action.
Recent reporting has revealed that China appears interested in exploiting recent cuts made by the Department of Government Efficiency (DOGE) to the U.S. federal workforce by targeting individuals that have been let go with promises of employment in the hopes of obtaining classified information. According to a researcher from a Washington, D.C.-based think tank, Chinese intelligence has allegedly…
The AI business landscape is shifting from a focus solely on innovation capacity to an emphasis on diffusion capacity, recognizing that the ability to scale AI applications is more valuable than standalone technological breakthroughs. Many companies invest heavily in research but struggle with widespread adoption, leading to underutilized advancements.
This New York Deep Tech Week 2025 panel will discuss how emerging technologies, such as AI-powered cyber warfare, quantum-secured communications, and autonomous battle networks, redefine national security. OODA and the OODA Network are your hosts for this discussion.
The national security mission could use some help. The nation has a huge need for advanced technologies that can improve defense and intelligence capabilities.
As AI becomes more deeply embedded in national security, enterprise infrastructure, and everyday tools, the debate over open-source vs. closed-source models is no longer academic—it’s geopolitical. In a recent OODA Network discussion, Mike Sexton of Third Way outlined why open-source AI must be treated as a strategic priority for the United States.
The recent U.S. AI policy reversals aside: the AI technology diffusion model should remain central to your AI business strategy (i.e. customer development, vendor relationships, strategic partnerships, business model generation, value proposition design, and platform economics).
Selling to government agencies requires navigating a labyrinth of regulations, compliance requirements, and acquisition processes, all while aligning your solution with both shifting political priorities and mission objectives.
This week’s member only OODA network dispatch provides insights into some of the dramatic changes underway in US and Chinese robotics and AI capabilities as well as an update on the geopolitical dynamics set off by the trade war. We held our March member meeting video call today. Topic was federal government spending on AI. We…
Researchers at the Center for Security and Emerging Technology (CSET) continue to build on their March 2024 “Argument for Hybrid AI Incident Reporting” with a mandatory AI incident reporting framework designed to systematically capture harms from artificial intelligence systems.
In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…
Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…
Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…
Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…
Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…
Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…
In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…
Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…
This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades. Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…
In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose…
Copyright © 2025 — All Rights Reserved.
Notifications