Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
I built UnrestrictedIntelligence.com as a proof of concept. I wanted to learn and also wanted to enable more from the OODA network to experiment with some capabilities of the large language models which can be accessed via connections to OpenAI. The core functionality of the site was established while on a flight. By using code…
The Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly announced the appointment of additional members to the CISA Cybersecurity Advisory Committee (CSAC), bringing onboard additional experts from the public and private sectors who will advise the Director on policies and initiatives to enhance the nation’s cyber defense.
The recent AI Open Letter was both an opportunity to discuss the risk attached to the training of AI systems more powerful than GPT-4 as characterized by the letter and introduce the OODA Loop readership to the work of Tristan Harris – a signatory to the letter – and the work of the Center for…
If you plan on being in San Francisco during RSA week we would love to see you there. Here are two opportunities to catch up with others from the OODA Network including OODA principals Bob Gourley and Matt Devost: For planning purposes, here are some other events we are tracking:
This research caught our eye based on our recent analysis of the Weaponized IT Supply Chain, the Leviathan’s Attacks and Kinetic Naval Intervention in the South China Sea. The Norwegian University of Science and Technology (NTNU) and the Cyber-SHIP Lab at the University of Plymouth collaborated on simulations and scenarios of cyberattacks at the high…
In response to the United States’ passing of its Creating Helpful Incentives to Produce Semiconductors (CHIPS) and Science Act , China announced it intended to conduct a cybersecurity probe into Micron Technology, one of the United States’ largest memory chip makers. In accordance to China’s National Security Law and Cybersecurity Law, the Cyberspace Administration of China (CAC), Beijing’s central internet regulator,…
A new Wilson Center policy brief “offers an overview of key policy considerations in securing a reliable, sustainable, and affordable supply of some of the most important commodities of the 21st century: critical minerals.”
Trond Undheim is a futurist, investor, consultant, executive, speaker, entrepreneur and podcaster. He produces widely impactful podcasts: Futurized, which tracks the underlying forces of disruption in tech, policy, business models, social dynamics and the environment, and Augmented, which reveals stories behind the new era of industrial operations.
Jeremy King is a trusted advisor to corporate boards and some of the nation’s most elite business leaders. He is also a serial connector helping move business information on opportunities at the intersection of talent, capital, entrepreneurs and business development. Jeremy is an entrepreneur himself, creating successful executive search firms and also a game-changing non-profit…
Lisa J. Porter has successfully lead some of the world’s largest and most critical technology efforts. Her career started with a focus on academic rigor in pursuit of some of the toughest degrees, a B.S. in Nuclear Engineering from MIT and a PhD in Applied Physics from Stanford. She would later lecture at MIT and…