Already a member?  Sign in to your account.

Become a member: Join here.

OODA’s research into advanced technologies is informed by decades of experience tracking megatrends and applying them to operational decisions. The result is not just research, but insights that can drive action.

What is the value of an informed decision? At OODA Loop, we seek to surface decision intelligence that provides meaningful perspective for leaders and analysts looking to make the most informed decisions possible. Subscribing will give you access to research reports designed to improve your competitiveness and help you operate in a VUCA world, identify and respond to Gray Rhino risks, and find opportunities from advancements in emerging technology domains. Subscribers also receive access to our special continuously updated OODA C-Suite Report which is designed to provide busy decision-makers with a quick overview of the most critical topics for informed strategic planning.

OODA members can find research existing research and reporting a number of ways, including visiting our OODA Member Resources Page, our Sensemaking Series, or using the search function on our site.

As an OODA Network Member you help support our continued research into topics designed to optimize decision-making and inform your strategy. In return you receive full access to all specialized reports on the site including insights into Cybersecurity, Artificial Intelligence,  COVID-19, SpaceQuantum ComputingGlobal Supply ChainsGlobal Risk and Geopolitics, Advanced Technology, Corporate GovernanceDue Diligence Federal Markets.

This page serves as a dynamic resource for OODA Network members looking for insights into the current and future technologies. We focus on the technology developments you need to track to inform your decision-making. This collection of resources includes content produced exclusively for OODA members as well as a continually updated list of insights from our daily pulse report.

OODA Loop Analysis on Advanced Technology


Zero Trust Will Yield Zero Results Without A Risk Analysis

Over the past four years there has been an avalanche of new Zero Trust products. However during the same period there has been no measurable reduction in cyber breaches. Zero Trust is a concept where an organization has Zero Trust in a specific individual, supplier or technology that is the source of their cyber risk. One needs to have Zero Trust in something and then act to neutralize that risk. Thus buying a Zero Trust product makes no sense unless it is deployed as a countermeasure to specific cyber risk. Buying products should be the last step taken not the first. To help enterprises benefit from Zero Trust concepts here is a modified OODA loop type process to guide your strategy development and execution.


Brain-inspired, Light-enabled, Circuit-fueled: Neuromorphic Computing Innovation, Intel’s Chip Platform and Open-Source Developer Ecosystem

Innovation in “semiconductor computational capability, resources and size, weight, and power consumption (SWaP)” is the centerpiece of the five-year, $1.5 billion DARPA Electronics Resurgence Initiative and the $52 billion 2021 CHIPS Act. Computing architectures drawing inspiration from biological neural systems have been considered for decades. Here is the latest on neuromorphic computing and how the technology fits into the innovation economy.


What To Know And Do About The Coming Metaverse

In the early 1990’s SciFi fans were introduced to a concept called the Metaverse in Neal Stephenson’s book SnowCrash. In the book this described a future virtual reality beyond the universe that was populated by user-controlled avatars as well as AI and bots.

Now decades later the age of the Metaverse is upon us. This post captures insights into this new world in ways meant to help leaders understand what is most relevant to your strategic planning. We provide an operational definition of the Metaverse, a description of the current market of metaverse players, and a list of recommendations for how this information should inform your business strategy. For more see: What To Know And Do About The Coming Metaverse


Jahon Jamali On Bitcoin, Ethereum, and the Coming Metaverse

Jahon Jamali is a leading expert on emerging technologies, global risk management and international relations. He began his career as a U.S. Intelligence Officer with the Defense Intelligence Agency. He also has extensive experience in the high tech community creating and growing startups through to successful exits. All this makes him an even more credible authority when it comes to seeking the trends that are moving technology, business and government operations forward. This discussion examines the role of Bitcoin and Ethereum in finance today and the especially important need for cryptocurrencies to provide a trust layer for the Internet.


Global IT Supply Chain Disruptions Should Bolster Innovation and Cybersecurity with North American Allies

Global IT supply chain disruptions (ransomware, semiconductor shortages) necessitate business leaders and policymakers to take a fresh look at the Information Communications Technology (ICT) and Cybersecurity Strategy for North America. What are the ICT innovation and investment climates in Mexico and Canada?  Is ICT investment part of the solution for the creation of regional economic development initiatives in Central America? ICT and Cybersecurity “trade” agreements need to take center stage in all multilateral policy interactions in the hemisphere in the next few years. Ryan Berg from the Center for Strategic and International Studies (CSIS) has released a timely report on these issues.


Russians and Chinese using human targeting – amongst other tools- to achieve security advantage in key emerging technologies by 2030

In late October, The National Counterintelligence and Security Center (NCSC) issued a report warning of China’s goal to achieve a technological advantage over the U.S. in certain key emerging technologies. Beijing’s long-term goal is a strategic advantage over the U.S. and its security interests by 2030 in areas such as biotechnology, genomic technology, artificial intelligence, and semiconductors. Russia is making strides in this direction as well, but is constrained by resources and has not made the level of commitment as the Chinese. Human targeting is highlighted as a tool used prolifically by the Chinese.


The New Enterprise Architecture Is Zero Trust

Enterprise technologists use the term “Zero Trust” to describe an evolving set of cybersecurity approaches that move defenses from static attempts to block adversaries to more comprehensive measures that improve enterprise performance while improving security. When the approaches of Zero Trust are applied to an enterprise infrastructure and workflows, the cost of security can be better managed and the delivery of functionality to end users increased. Security resources are matched to risk. Functionality, security and productivity all go up.


What CEOs Need To Know About Bitcoin: Including potential new business models to consider

Bitcoin is the most famous crypto currency, with good reason. It was the first to leverage the new concept of a blockchain to enable a distributed, but trusted ledger, which for the first time in history allowed a cryptocurrency where double spending was impossible. Since its founding on 3 January 2009 the system has worked and proven it can scale with extreme accuracy. But what might this new store of value and distributed means of safe and secure transactions mean for your business? The models listed here can fuel your decision-making in that domain.


Michael Saylor Ignites CEO Interest in Bitcoin: Expect an acceleration of the inevitable

During MicroStrategy World, Michael Saylor lead a focused discussion on the mega trends of finance he believes make the transition to Bitcoin as a global store of value inevitable. One of the most informative sessions was a discussion with a leading Bitcoin expert, Ross Stevens. Ross is CEO and founder of the New York Digital Investment Group (NYDIG), which enables institutional clients like Microstrategy to smartly buy and hold Bitcoin.

NYDIG expects to hold $25B in Bitcoin for institutional clients by year end. So Ross speaks with authority and experience.

Here is some of the context Saylor extracted from Stevens


Expert Practitioner Junaid Islam Discusses 5G Security and Functionality at OODAcon

Junaid Islam has 30 years of experience in secure communications. His protocols, algorithms and architectures have been incorporated into a broad range of commercial and national security systems. In the 90s he developed the first implementation of Multi-Level Precedence and Preemption (MLPP) for US Department of Defense C2 applications. He developed the first working Mobile IPv6 client to enable fast hand-off as well as IPv6 address scrambling for high side networks for the DoD’s Netcentric Warfare program. He developed the first network-based Zero Trust Architecture using Software Defined Perimeter (SDP) which was adopted by NIST for their Zero Trust specification 800-207.

In this video Junaid highlights some of the most important use cases for 5G and also discusses what CEOs, business leaders and government experts should know about the security and functionality of 5G.


Four National Security Experts Discuss Critical Technologies at OODAcon

This panel of experts at OODAcon lead a thoughtful discussion on industrial policy that resulted in insights that can inform broad action in improving American innovation while protecting it for the use of open societies. Topics discussed will also be informative to any technology company seeking to do business with the US government.


What The Business Strategist Should Know About Congress’s Latest Report On Future Threats and Defense

The House Armed Services Committee (HASC) chartered a special task force to assess what the nation should know about the dynamic national security environment and produce a report to guide future action. The report was just issued. It evaluates strategic priorities of the US DoD to seek better matches of national resources to next-generation threats and sets goals for the entire national security community to achieve to ensure success in the coming decades.

The report was not meant to inform action in corporate America, but there are some considerations that may be of critical importance to strategic planning. This report provides our cut on what this report means for business strategists and suggestions on what actions to consider because of the shifting national security environment discussed in this report.


The Intelligence Workstation of the Future

The Intelligence Workstation of the Future will empower analysts in new ways, combining the most modern analytical and visualization tools with enterprise security and governance technologies. This post explores this workstation, leading to actionable recommendations that organizations can put in place now to bring this concept to reality sooner vice later. See: The Intelligence Workstation of the Future

 

 


The OODA Future of Enterprise Tech Series

We track the megatrends of enterprise IT and assess the near future of tech with a goal of informing decisions you need to make today. The series include reporting on:

The series continues, stay tuned for more. And reach out if you have any guidance for us on tech trends you would like to see examined in more detail.

 


The Executive’s Guide to 5G: Here is what you need to know for your strategic planning

With all major US carriers launching 5G cellular initiatives business leaders should now consider how this new technology can impact both current and future business operations. This guide provides succinct inputs that can kickstart your strategic planning to ensure you are ready to dominate during and after this strategic shift.  For more see: The Executive’s Guide to 5G: Here is what you need to know for your strategic planning. Also see: The 5G Supply Chain Blind Spot

 


Wi-Fi 6 Is Coming And Will Impact Your Business:

Wi-Fi is as ubiquitous as a technology can get. It is widely used and widely understood. In part because of its widespread acceptance, the standards that make Wi-Fi work are slow to change. But a new change is coming and it will make dramatic improvements to how our devices communicate with each other.  For more see: Wi-Fi 6 Is Coming And Will Impact Your Business

 

 


The Executive’s Guide to Space:

The rapid pace of innovation in space is producing real capabilities which can be leveraged for businesses in every sector of the economy. There is a growing excitement over the many developments in the space industry, giving rise to many questions about how these developments will impact markets overall. This guide is meant to assist strategic planners in assessing developments in the space sector. For more see:  The Executive’s Guide To Commercial Use of Space

 


Security In Space and Security of Space:

The last decade has seen an incredible increase in the commercial use of space. Businesses and individual consumers now leverage space solutions that are so integrated into our systems that they seem invisible. Some of these services include: Communications, including very high-speed low latency communications to distant and mobile users. Learn more at: OODA Research Report: What Business Needs To Know About Security In Space Also see: Is Space Critical Infrastructure, and the special report on Cyber Threats to Project Artemis, and Mitigating Threats To Commercial Space Satellites


The Revolution in Bio-Science:

This post provides an overview of key thrusts of the transformation underway in biology and offers seven topics business leaders should consider when updating business strategy to optimize opportunity because of these changes. For more see:  The Executive’s Guide To The Revolution in Biology

 

 


Data As A Weapon System:

Are you making the most of your data holdings? If you want to leverage your data to the better of your business you need to treat it like a weapon and use it to gain advantage over others. This is not just about your technical architecture, this is about your attitude and the approach you take to being proactive. For our best practices on how to do so see the OODA Guide to Using Your Data As A Weapon.

 

 

Want more insight? Log in for the full report

This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks!

Already a member?  Sign in to your account.