Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops

Category: Business

Exponential innovation is causing exponential disruption

Keyword: China

Exponential innovation is causing exponential disruption

Author: OODA Analyst

Exponential innovation is causing exponential disruption


Analysis

  • An End-to-End Neural Network is in Full Control of my Car: What does it mean for society?

    Tesla just delivered a software update to my car that is so dramatically different that it is like having a new car. This post provides a bit more on why and extrapolates some lessons relevant to the future of robotics across multiple sectors. The bottom line up front: The best robots give physical form to…

  • Hypersonic Vehicles are a Technological Tie that Binds U.S.-Sino Researchers

    A report from the Frontier Assessments Unit is a deep dive into hypersonic vehicle research with a very specific framing:  that of the collaborative efforts between U.S. universities and their research affiliations with universities and research organizations in China:  “These vehicles hold the promise of revolutionizing rapid response capabilities, reconnaissance, and even commercial air travel…the…

  •  A Chip Alliance is Proposed by the U.S. as ASML Explores Foreign Expansion and New Market Rival Canon, Inc.

    Europe’s most valuable technology company, ASML Holdings, is responsible for the manufacturing of semiconductor machinery.  The chip-machinery maker is a shocking stovepipe in the future of the IT supply chain, ranking with the world’s dependence on Taiwanese chip maker TSMC as a troubling risk variable – two potential points of failure (with no redundancies in…

  • We Have a Privacy Executive Order!  Time to See It in Action

    In late February 2024, the Biden Administration issued its long-awaited Executive Order to protect the personal data of Americans from foreign threats by restricting access to Americans’ bulk data by “countries of concern,”  when such acquisition would “pose an unacceptable risk to the national security of the United States.”

  • A ChatGPT Use Case for the Board of Directors: Corporate Disclosure and Policy Assessments

    Researchers from the National Bureau of Economic Research (NBER)  offer some foundational thinking on how ChatGPT can be applied to corporate disclosures and policies.  According to the authors, this “study provides a first look at the potential of ChatGPT to extract managerial expectations and corporate policies. We believe that our findings have important implications for…

  • RAND Researchers Explore Scenarios for a U.S. Victory in a War with the PRC

    Policy researchers from the Rand Corp. ponder the question: “How can the United States prevail in a limited war with the People’s Republic of China (PRC) while avoiding catastrophic escalation?”  Find their analysis and  scenarios here.  

  • An Overview of the NIST Cybersecurity Framework 2.0

    The NIST Cybersecurity Framework (CSF) 2.0, an evolution of its predecessor, is a comprehensive guide designed to assist organizations across various sectors in managing and mitigating cybersecurity risks effectively. This framework, while not prescribing specific actions, offers a taxonomy of high-level cybersecurity outcomes, enabling organizations, regardless of their size, sector, or maturity, to better understand,…

  • The February 2024 OODA Network Member Meeting Discussion of the Current Geopolitical Terrain

    After the annual OODA CEO Matt Devost and OODA Network Members Review the OODA Almanac 2024 – Reorientation  at the February 2024 OODA Network Member Meeting – which was held on Friday, February 16, 2024 –  the network ended the monthly meeting with a discussion of the current geopolitical “free for all” and potential geopolitical…

  • How To Properly Cut Your Cybersecurity Budget

    Cybersecurity is one of those areas where cost cutting must be done with forethought. Cut the wrong things and it can lead to catastrophic results including government fines, criminal penalties and loss of customer confidence. Cut the right things and key risks can still be mitigated and they can be mitigated more efficiently.

  • Implementation Plan 2.0 Faces a Crucial Test

    According to recent reporting, the Office of the National Cyber Director (ONCD) intends to issue an update to the national cybersecurity strategy implementation plan in the coming months. 


OODAcasts

  • Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    In this OODAcast, we talk with Pulitzer Prize nominated journalist Simon Clark about his book the “The Key Man: The True Story of How the Global Elite Was Duped by a Capitalist Fairy Tale “. The book tells the story of Arif Naqvi and his Dubai-based private-equity firm Abraaj and attracted he billions of dollars…

  • Charity Wright on China’s Digital Colonialism
    ,

    Charity Wright on China’s Digital Colonialism

    Charity Wright is a Cyber Threat Intelligence Analyst with over 15 years of experience at the US Army and the National Security Agency, where she translated Mandarin Chinese. Charity now specializes in dark web cyber threat intelligence, counter-disinformation, and strategic intelligence at Recorded Future. Her analysis has provided deep insights into a variety of incidents,…

  • Jan Chipchase on Field Research for Actionable Insights

    Jan Chipchase on Field Research for Actionable Insights

    Jan Chipchase is the founder and director of Studio D Radiodurans, a research, design and innovation consultancy. He specializes in identifying nuanced patterns of human behavior. The insight it generates informs and inspires design, strategy, brand and public policy. Jan describes his work in design anthropology in terms of a satellite launched into space that…

  • Ben Dubow on Detecting and Countering Malign Influence Operations

    Ben Dubow on Detecting and Countering Malign Influence Operations

    Ben Dubow is CTO and founder of Omelas, a firm that provides data and analysis on how nations manipulate the web to achieve their geopolitical goals. He has a background in research on Russian and Chinese online information operations and is a recognized expert, having appeared on international media including Reuters, Bloomberg and Roll Call.…

  • Jahon Jamali On Bitcoin, Ethereum, and the Coming Metaverse

    Jahon Jamali is a leading expert on emerging technologies, global risk management and international relations. He began his career as a U.S. Intelligence Officer with the Defense Intelligence Agency. He also has extensive experience in the high tech community creating and growing startups through to successful exits. All this makes him an even more credible…

  • Maury Rogow: Every Corporation Will Have A Metaverse Strategy

    Maury Rogow: Every Corporation Will Have A Metaverse Strategy

    Maury Rogow builds a solid case that your brand will live or die based on the story you tell in the metaverse. Maury is a pioneer in applying the art of storytelling to convey the value of technology in the Internet age. He built a successful approach to storytelling that made direct contributions to the…

  • Alan Cohen of DCVC on Investing in Deep Tech For Humanity

    Alan Cohen of DCVC on Investing in Deep Tech For Humanity

    Alan Cohen is a partner at DCVC, a highly regarded venture capital firm who pioneered the concept of investing in Deep Tech. He has helped lead and grow some of the most influential enterprise IT companies in the world. We talk tech with Alan, and he is the perfect guy to examine some of the…

  • Digital Self Sovereignty and Avoiding the Long Night with John Robb

    Digital Self Sovereignty and Avoiding the Long Night with John Robb

    John is one of the most disruptive thinkers of our time and is capable of drilling down on critical issues like security, society, and technology with deep authority and insights. In this conversation we cover a lot of topics, including John’s concept of OODA Shear, data and digital self sovereignty, Afghanistan, AI, Bitcoin, and the…

  • Inman’s Rules: The Enduring Principles of Operational Intelligence

    Inman’s Rules: The Enduring Principles of Operational Intelligence

    Admiral Bobby Ray Inman retired from the US Navy in 1982. But his influence endures. His principles, which he codified into a list still exchanged among intelligence community leaders today, is now known as Inman’s Rules. In this OODAcast interview of Admiral Inman we review these rules, seeking insights into how they can be applied to…

  • The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks
    ,

    The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks

    Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all…

OODAcons