Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • For the Cybersecurity Community: A Call to Action for Memory-safe Strategies and “Better Diagnostics that Measure Cybersecurity Quality”

    In late February, “the National Cyber Director (ONCD) released a report calling on the technical community to proactively reduce the attack surface in cyberspace. ONCD makes the case that technology manufacturers can prevent entire classes of vulnerabilities from entering the digital ecosystem by adopting memory-safe programming languages. ONCD is also encouraging the research community to…

  • The Drone Swarm Architecture Will Transform U.S. Warfighting Capacity

    Lieutenant General (ret.) Clint Hinote, U.S. Air Force and Major General (ret.) Mick Ryan, Australian Army – Special Advisors to the Special Competitive Studies Project (SCSP) – have co-authored a paper on “Uncrewed systems—which are now undergoing a form of Cambrian Explosion in capability, quality, and quantity…these systems are disrupting how combatants are considering risk,…

  • Exponential Technology Stack Convergence: Generative AI-enabled Blockchain Networks

    Throughout 2024, we expect disproportionate disruption when the exponential tech stack starts to converge.   One of the most promising of these exponential technological intersections will be Generative AI-enabled Blockchain Networks – of which applications and use cases have started to emerge.

  • An End-to-End Neural Network is in Full Control of my Car: What does it mean for society?

    Tesla just delivered a software update to my car that is so dramatically different that it is like having a new car. This post provides a bit more on why and extrapolates some lessons relevant to the future of robotics across multiple sectors. The bottom line up front: The best robots give physical form to…

  • Hypersonic Vehicles are a Technological Tie that Binds U.S.-Sino Researchers

    A report from the Frontier Assessments Unit is a deep dive into hypersonic vehicle research with a very specific framing:  that of the collaborative efforts between U.S. universities and their research affiliations with universities and research organizations in China:  “These vehicles hold the promise of revolutionizing rapid response capabilities, reconnaissance, and even commercial air travel…the…

  •  A Chip Alliance is Proposed by the U.S. as ASML Explores Foreign Expansion and New Market Rival Canon, Inc.

    Europe’s most valuable technology company, ASML Holdings, is responsible for the manufacturing of semiconductor machinery.  The chip-machinery maker is a shocking stovepipe in the future of the IT supply chain, ranking with the world’s dependence on Taiwanese chip maker TSMC as a troubling risk variable – two potential points of failure (with no redundancies in…

  • We Have a Privacy Executive Order!  Time to See It in Action

    In late February 2024, the Biden Administration issued its long-awaited Executive Order to protect the personal data of Americans from foreign threats by restricting access to Americans’ bulk data by “countries of concern,”  when such acquisition would “pose an unacceptable risk to the national security of the United States.”

  • A ChatGPT Use Case for the Board of Directors: Corporate Disclosure and Policy Assessments

    Researchers from the National Bureau of Economic Research (NBER)  offer some foundational thinking on how ChatGPT can be applied to corporate disclosures and policies.  According to the authors, this “study provides a first look at the potential of ChatGPT to extract managerial expectations and corporate policies. We believe that our findings have important implications for…

  • RAND Researchers Explore Scenarios for a U.S. Victory in a War with the PRC

    Policy researchers from the Rand Corp. ponder the question: “How can the United States prevail in a limited war with the People’s Republic of China (PRC) while avoiding catastrophic escalation?”  Find their analysis and  scenarios here.  

  • An Overview of the NIST Cybersecurity Framework 2.0

    The NIST Cybersecurity Framework (CSF) 2.0, an evolution of its predecessor, is a comprehensive guide designed to assist organizations across various sectors in managing and mitigating cybersecurity risks effectively. This framework, while not prescribing specific actions, offers a taxonomy of high-level cybersecurity outcomes, enabling organizations, regardless of their size, sector, or maturity, to better understand,…


OODAcasts

OODAcons