Smartphones ushered in a wave of mobile computing that has swept over every industry and just about every business in the economy. And with smartphone market penetration among individual users in the US reaching 90% it is clearly a platform that will endure for years. But where will this trend take us next? This special report captures the most critical insights on the near future of mobile computing relevant to your strategic planning.
Analysis of enterprise data is a dynamic endeavor. As new tools and applications are found to handle business use cases, new data arises that in many cases produces new opportunities, but these may require new approaches to analysis and selection of new tools. This report seeks to provide some planning assumptions in this dynamic world in a way that can serve your decision-making today.
OODA Members are highly informed on the state of Artificial Intelligence, with most already applying some component to business operations and all benefiting from the use of AI in their personal lives via popular applications from Google, Amazon, Microsoft, Facebook, Apple and others. The fact that AI is here to stay is clear. But where is it going in the near future? This special report was produced to shed insight into this critically important megatrend.
Cloud Computing has been a key part of most interesting business strategies over the last decade. It has also been critical in bringing high end compute power to individuals around the world (Cloud services enable most highly recognizable services and apps, from Uber to Zoom and most everything in between). But what will come next? This special report offers a glimpse into the future of this trend meant to inform your business strategy.
Join OODA CEO Matt Devost and CTO Bob Gourley on 19 March 2020 at 2pm Eastern for an interactive discussion on managing through the COVID-19 Crisis. This online zoom based discussion is for OODA members as well as any who registered for our OODAcon Future Proof. If you did not
Every year during the RSA season OODA provides an updated list of what we see as the tech firms with the greatest potential to disrupt the cybersecurity market and improve an organization’s ability to manage cyber risk. We base the firms we track in this list off of our own continuous market research and then use the activities around RSA to interview company leaders and other industry professionals to select the firms we believe warrant special focus by the community.
The resulting list can serve multiple stakeholders. Investors can find firms that have demonstrated good product-market fit and are good candidates for follow-on funding. CISOs can find companies that have demonstrated real disruptive technology potential and at least enough traction to prove they are worth considering. And larger tech firms can find interesting businesses worth tracking for potential partnering and, perhaps later in the firm’s lifecycle, for potential M&A.
AI World is a yearly gathering of professionals applying advanced AI solutions to solve enterprise challenges. They gather to exchange lessons learned and best practices as well as to track the latest technology which can aid them in their quest to improve the application of thinking machines to real world
Cybersecurity’s role in the M&A market. This analysis and more by Mike Tanji in this week’s Cyber Threat Analysis Report.
In addition to considering an unprecedented $228 million fine for British Airways over the data breach the company experienced in the summer of 2018, the UK Information Commissioner’s Office (ICO) plans to fine Marriott International Inc £99,200,396 ($123,705,869) over its failure to protect customer data under the EU’s General Data
Distilling over 25 years working in the fields of cybersecurity and cyberconflict across a multitude of domains including government, corporate, think tank, and academic this article serves as a foundational distillation of observations that can be applied in any organization. In Part Two of the series, we will look at lessons learned and actions that can be executed by management teams to help manage cyber risk.