This page serves as a dynamic resource for OODA Network members looking for insights into the current and future technologies. We focus on the technology developments you need to track to inform your decision-making. This collection of resources includes content produced exclusively for OODA members as well as a continually updated list of insights from our daily pulse report. Also see our deeper dives into Cybersecurity, Quantum Computing and Artificial Intelligence.
OODA Loop Analysis on Advanced Technology
Enterprise technologists use the term “Zero Trust” to describe an evolving set of cybersecurity approaches that move defenses from static attempts to block adversaries to more comprehensive measures that improve enterprise performance while improving security. When the approaches of Zero Trust are applied to an enterprise infrastructure and workflows, the cost of security can be better managed and the delivery of functionality to end users increased. Security resources are matched to risk. Functionality, security and productivity all go up.
Bitcoin is the most famous crypto currency, with good reason. It was the first to leverage the new concept of a blockchain to enable a distributed, but trusted ledger, which for the first time in history allowed a cryptocurrency where double spending was impossible. Since its founding on 3 January 2009 the system has worked and proven it can scale with extreme accuracy. But what might this new store of value and distributed means of safe and secure transactions mean for your business? The models listed here can fuel your decision-making in that domain.
During MicroStrategy World, Michael Saylor lead a focused discussion on the mega trends of finance he believes make the transition to Bitcoin as a global store of value inevitable. One of the most informative sessions was a discussion with a leading Bitcoin expert, Ross Stevens. Ross is CEO and founder of the New York Digital Investment Group (NYDIG), which enables institutional clients like Microstrategy to smartly buy and hold Bitcoin.
NYDIG expects to hold $25B in Bitcoin for institutional clients by year end. So Ross speaks with authority and experience.
Here is some of the context Saylor extracted from Stevens
Junaid Islam has 30 years of experience in secure communications. His protocols, algorithms and architectures have been incorporated into a broad range of commercial and national security systems. In the 90s he developed the first implementation of Multi-Level Precedence and Preemption (MLPP) for US Department of Defense C2 applications. He developed the first working Mobile IPv6 client to enable fast hand-off as well as IPv6 address scrambling for high side networks for the DoD’s Netcentric Warfare program. He developed the first network-based Zero Trust Architecture using Software Defined Perimeter (SDP) which was adopted by NIST for their Zero Trust specification 800-207.
In this video Junaid highlights some of the most important use cases for 5G and also discusses what CEOs, business leaders and government experts should know about the security and functionality of 5G.
This panel of experts at OODAcon lead a thoughtful discussion on industrial policy that resulted in insights that can inform broad action in improving American innovation while protecting it for the use of open societies. Topics discussed will also be informative to any technology company seeking to do business with the US government.
What The Business Strategist Should Know About Congress’s Latest Report On Future Threats and Defense
The House Armed Services Committee (HASC) chartered a special task force to assess what the nation should know about the dynamic national security environment and produce a report to guide future action. The report was just issued. It evaluates strategic priorities of the US DoD to seek better matches of national resources to next-generation threats and sets goals for the entire national security community to achieve to ensure success in the coming decades.
The report was not meant to inform action in corporate America, but there are some considerations that may be of critical importance to strategic planning. This report provides our cut on what this report means for business strategists and suggestions on what actions to consider because of the shifting national security environment discussed in this report.
The Intelligence Workstation of the Future
The Intelligence Workstation of the Future will empower analysts in new ways, combining the most modern analytical and visualization tools with enterprise security and governance technologies. This post explores this workstation, leading to actionable recommendations that organizations can put in place now to bring this concept to reality sooner vice later. See: The Intelligence Workstation of the Future
The OODA Future of Enterprise Tech Series
We track the megatrends of enterprise IT and assess the near future of tech with a goal of informing decisions you need to make today. The series include reporting on:
- The Future of Enterprise Mobile Computing
- The Future of Enterprise Big Data Analytics
- The Future of Enterprise Artificial Intelligence
- The Future of Enterprise Cloud Computing
The series continues, stay tuned for more. And reach out if you have any guidance for us on tech trends you would like to see examined in more detail.
The Executive’s Guide to 5G: Here is what you need to know for your strategic planning
With all major US carriers launching 5G cellular initiatives business leaders should now consider how this new technology can impact both current and future business operations. This guide provides succinct inputs that can kickstart your strategic planning to ensure you are ready to dominate during and after this strategic shift. For more see: The Executive’s Guide to 5G: Here is what you need to know for your strategic planning. Also see: The 5G Supply Chain Blind Spot
Wi-Fi 6 Is Coming And Will Impact Your Business:
Wi-Fi is as ubiquitous as a technology can get. It is widely used and widely understood. In part because of its widespread acceptance, the standards that make Wi-Fi work are slow to change. But a new change is coming and it will make dramatic improvements to how our devices communicate with each other. For more see: Wi-Fi 6 Is Coming And Will Impact Your Business
The Executive’s Guide to Space:
The rapid pace of innovation in space is producing real capabilities which can be leveraged for businesses in every sector of the economy. There is a growing excitement over the many developments in the space industry, giving rise to many questions about how these developments will impact markets overall. This guide is meant to assist strategic planners in assessing developments in the space sector. For more see: The Executive’s Guide To Commercial Use of Space
Security In Space and Security of Space:
The last decade has seen an incredible increase in the commercial use of space. Businesses and individual consumers now leverage space solutions that are so integrated into our systems that they seem invisible. Some of these services include: Communications, including very high-speed low latency communications to distant and mobile users. Learn more at: OODA Research Report: What Business Needs To Know About Security In Space Also see: Is Space Critical Infrastructure, and the special report on Cyber Threats to Project Artemis, and Mitigating Threats To Commercial Space Satellites
The Revolution in Bio-Science:
This post provides an overview of key thrusts of the transformation underway in biology and offers seven topics business leaders should consider when updating business strategy to optimize opportunity because of these changes. For more see: The Executive’s Guide To The Revolution in Biology
Data As A Weapon System:
Are you making the most of your data holdings? If you want to leverage your data to the better of your business you need to treat it like a weapon and use it to gain advantage over others. This is not just about your technical architecture, this is about your attitude and the approach you take to being proactive. For our best practices on how to do so see the OODA Guide to Using Your Data As A Weapon.