Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Researchers at UC Berkeley unveiled Berkeley Humanoid Lite, a fully open-source, mid-scale humanoid robot platform designed to radically lower the barrier of entry for robotics research, education, and innovation through low-cost, modular 3D-printed design.
Recently, Microsoft and CrowdStrike are collaborating in order to streamline the naming conventions of state and nonstate cyber activity in an effort to clarify current inconsistencies across the cybersecurity industry’s attribution taxonomies. As anyone involved in cybersecurity knows, vendor reporting of hostile campaigns can be confusing as companies use unique identifiers to classify campaigns to differentiate the orchestrators…
At the 2025 SCSP AI Expo, Extropic CEO Guillaume Verdon provided details and updates that build on his presentation from OODAcon 2024 back in November. Verdon continues to provide real-world updates on the traction of his startup operation while broadly evangelizing a vision of the future of thermodynamic computing, which promises orders-of-magnitude improvements in energy…
Generative AI is transforming robotics from code-heavy systems into intuitive tools, enabling non-experts to program complex tasks and unlocking massive gains in automation, productivity, and adaptability.
Former Google CEO and Chairman Eric Schmidt is the Chair of the Special Competitive Studies Project (SCSP), which hosted its annual AI Expo and Ash Carter Exchange last week. Speaking at the event, Schmidt warned that AI is transforming not just knowledge creation, but the very workflows that underpin national power, enterprise innovation, and personal…
This week’s member only OODA Network Dispatch focuses on context you can use to inform your decision-making in an age of disruptive technology.
Recently, Russia signed a joint “International Cooperation in the Field of Information Security” agreement with several authoritarian governments to include but not limited to Belarus, Cuba, Iran, North Korea, and Venezuela. The agreement asserts that the motivation behind this agreement is to sustain “transparent and equitable system of international information security based on the principles…
The Center for Strategic and International Studies (CSIS) Commission on U.S. Quantum Leadership warns that without immediate, large-scale federal investment and policy support, the United States risks falling behind in the race for quantum supremacy, particularly against China. Why This Matters …China’s state-backed surge in funding and infrastructure threatens to outpace American efforts. Quantum technologies—from…
Ukraine has become the proving ground, and increasingly the foundry, for the future of security-related technologies. We need that learning, and we need it more quickly and at greater scale.
In 1932, Rear Admiral Harry E. Yarnell led a naval exercise that should have changed history. Commanding aircraft carriers USS Lexington and USS Saratoga, Yarnell’s planes successfully executed a simulated attack on Pearl Harbor, dropping flour sacks to represent bombs. Despite this clear demonstration of vulnerability, military leadership disqualified the results, deeming them unrealistic. Nine…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.
Copyright © 2025 — All Rights Reserved.
Notifications