<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Ansible]]></title><description><![CDATA[A publication from the Foundation for American Innovation aiming to help make the future happen sooner. ]]></description><link>https://www.ansible.pub</link><image><url>https://substackcdn.com/image/fetch/$s_!XyeD!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8e5460a-3ab3-471e-ad07-9d022d8c2644_1280x1280.png</url><title>The Ansible</title><link>https://www.ansible.pub</link></image><generator>Substack</generator><lastBuildDate>Thu, 09 Apr 2026 19:46:17 GMT</lastBuildDate><atom:link href="https://www.ansible.pub/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Ansible]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[theansiblefai@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[theansiblefai@substack.com]]></itunes:email><itunes:name><![CDATA[The Ansible]]></itunes:name></itunes:owner><itunes:author><![CDATA[The Ansible]]></itunes:author><googleplay:owner><![CDATA[theansiblefai@substack.com]]></googleplay:owner><googleplay:email><![CDATA[theansiblefai@substack.com]]></googleplay:email><googleplay:author><![CDATA[The Ansible]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Quantum Advancements Necessitate D.C.'s Attention]]></title><description><![CDATA[A Call for Quantum Policy Proposals]]></description><link>https://www.ansible.pub/p/quantum-advancements-necessitate</link><guid isPermaLink="false">https://www.ansible.pub/p/quantum-advancements-necessitate</guid><dc:creator><![CDATA[Joshua Levine]]></dc:creator><pubDate>Thu, 09 Apr 2026 14:01:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dxZt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dxZt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dxZt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 424w, https://substackcdn.com/image/fetch/$s_!dxZt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 848w, https://substackcdn.com/image/fetch/$s_!dxZt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 1272w, https://substackcdn.com/image/fetch/$s_!dxZt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dxZt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png" width="1024" height="434" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84d05700-f788-4654-880b-beb64e4aa323_1024x434.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:434,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:782787,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ansible.pub/i/193688319?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dxZt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 424w, https://substackcdn.com/image/fetch/$s_!dxZt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 848w, https://substackcdn.com/image/fetch/$s_!dxZt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 1272w, https://substackcdn.com/image/fetch/$s_!dxZt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84d05700-f788-4654-880b-beb64e4aa323_1024x434.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, colleagues of mine at FAI spoke on <em><a href="https://www.frontier.thefai.org/p/shors-thing-with-prineha-narang">The Frontier</a></em> about some of the latest breakthroughs in quantum computing and their implications. The advancements of quantum technologies are rapidly transitioning from long-term research projects into deployable applications that impact our economic and strategic environment.</p><p>I believe this to be true, which is why last year I co-authored a four-part series with my FAI colleague, Dr. Prineha Narang, which you can read <a href="https://warontherocks.com/author/joshua1430001/">here</a>. But there are a few recent events that illustrate the rapidity of improvements in quantum technologies, which should elicit the attention of researchers, investors, and policymakers to ensure U.S. quantum leadership.</p><p>The first examples of this phenomenon is how widely-used cryptography may be under threat far sooner than anticipated. Since February, there have been three announcements from quantum researchers worth examining.</p><p>Last week, Google Quantum AI <a href="https://scirate.com/arxiv/2603.28846">published</a> a whitepaper demonstrating that an optimized implementation of Shor&#8217;s algorithm could break the 256-bit Elliptic Curve Discrete Logarithm Problem. Practically, the operation described could enable a machine to penetrate the cryptographic backbone of Bitcoin, Ethereum, and virtually every major blockchain using fewer than 1,200 logical qubits and under 500,000 physical qubits, roughly a tenfold reduction from previous estimates. Under certain conditions, the attack could execute in approximately nine minutes, within Bitcoin&#8217;s average block confirmation window, the time it takes to add a new block to the chain, allowing an attacker to intercept a transaction in progress.</p><p>Complementing these findings, researchers from CalTech <a href="https://arxiv.org/abs/2603.28627">published</a> a similar result, finding that advances in quantum algorithms and circuit design introduce significant efficiencies and computational improvements that could enable a break of widely used encryption with as few as 10,000 to 26,000 physical qubits. This would represent a step-change from prior estimates in the hundreds of thousands. Researchers working in tandem with the startup Oratomic demonstrated that ultra-efficient error correction using neutral-atom qubits could reduce overhead by more than a hundredfold. Simply, this means creating a fault-tolerant machine capable of running Shor&#8217;s algorithm could be operational by the end of the decade.</p><p>And earlier this year, Iceberg Quantum <a href="https://arxiv.org/pdf/2602.11457">unveiled</a> Pinnacle, a fault-tolerant architecture that reduces error-correction overhead by an order of magnitude, demonstrating that breaking RSA-2048 could be achieved with fewer than one hundred thousand physical qubits, not the millions previously assumed. Iceberg is already partnering with PsiQuantum, Diraq, and IonQ, each of which projects building systems at that scale within three to five years. Taken together, the Iceberg, Google, and Caltech results are challenging the assumption that the promises of quantum technologies were still decades away.</p><p>The second example are the recent <a href="https://nypost.com/2026/04/07/us-news/ghost-murmur-a-never-used-secret-tool-deployed-to-find-lost-airman-in-iran-in-daring-mission/">reports</a> that the CIA deployed a classified quantum sensing system known as &#8220;Ghost Murmur&#8221; to locate a downed American F-15E airman in the mountains of southern Iran. The system, reportedly developed by Lockheed Martin&#8217;s Skunk Works, uses advanced quantum sensors to detect the faint electromagnetic signal of a human heartbeat from tens of miles away, then pairs that data with AI software to isolate it from background noise. The pilot&#8217;s heartbeat essentially became a transponder  in the desert.</p><p>These developments share a common lesson: quantum technology is advancing faster than previously assumed. In one case, the technology threatens the cryptographic foundations of the digital economy. In the other, it underlies a life-saving tool on the battlefield. The Genesis Mission, investments from the Department of Commerce, DARPA&#8217;s Quantum Benchmarking Initiative, and the National Quantum Initiative re-authorization signal that Washington recognizes the stakes of this technological advancement. But executive orders and benchmarking programs alone are insufficient without a sustained, granular policy architecture to back them up.</p><p>FAI&#8217;s Quantum Policy Playbook seeks to fill that gap. Submissions will translate strategic ambition into concrete, actionable policy proposals that accelerate American quantum research, harden domestic supply chains, expand the technical workforce, and ensure that the United States doesn&#8217;t only invent this technology but manufactures, deploys, and leads with it.</p><p>If interested, please submit a proposal no later than April 30, <a href="https://docs.google.com/forms/d/e/1FAIpQLScvE4T-OToqQmw0SsVc9ys45kfCdUwxg4QgfYVmWv6D3Vsm5Q/viewform">here</a>.</p>]]></content:encoded></item><item><title><![CDATA[Building the U.S. Data Accelerator]]></title><description><![CDATA[Strengthening the Data Commons to Advance American AI]]></description><link>https://www.ansible.pub/p/building-the-us-data-accelerator</link><guid isPermaLink="false">https://www.ansible.pub/p/building-the-us-data-accelerator</guid><dc:creator><![CDATA[Joshua Levine]]></dc:creator><pubDate>Thu, 02 Apr 2026 13:03:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!A8de!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A8de!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A8de!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!A8de!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!A8de!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!A8de!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A8de!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9350884,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ansible.pub/i/192953324?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A8de!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!A8de!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!A8de!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!A8de!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7c50368-ee14-4900-8fc8-9533b6116265_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In order to learn a new skill or develop expertise in a particular area, one must be exposed to certain types of data. In the context of developing artificial intelligence models, training data is the foundational layer of information which it relies on. The more high quality data that is available and used throughout training, the more capable and adaptable the model is across a suite of tasks.</p><p>Last week, FAI published <a href="https://www.thefai.org/posts/the-data-crunch-accelerating-american-ai-through-government-data-access">The Data Crunch: Accelerating American AI through Government Data Access</a>. The paper describes the importance of strengthening the data commons, a term that describes freely available and accessible data that can be used to train and improve AI models, specifically by making U.S. government data more accessible.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>For the past few years, policymakers in Washington have focused most of their attention on policies that impact access to compute. Examples include but are not limited to the <a href="https://www.congress.gov/bill/117th-congress/house-bill/4346">CHIPS and Science Act</a>, the Biden Administration&#8217;s <a href="https://www.federalregister.gov/documents/2025/01/15/2025-00636/framework-for-artificial-intelligence-diffusion">diffusion rule</a> (<a href="https://www.bis.gov/press-release/department-commerce-announces-rescission-biden-era-artificial-intelligence-diffusion-rule-strengthens">now rescinded</a>), <a href="https://www.state.gov/pax-silica">Pax Silica</a>, and the <a href="https://www.congress.gov/bill/119th-congress/house-bill/3447/text">Chip Security Act</a>. The focus on this particular input makes sense, because without this cutting-edge hardware, US firms would not be able to build and deploy AI.</p><p>But this does not mean that policymakers should neglect other key inputs, particularly data. The moment to enable more access to data is now for two key reasons.</p><p>First, the availability of unused, high quality data available on the open web is increasingly <a href="https://dl.acm.org/?__cf_chl_rt_tk=9ftHwUYGFxbT90tpZB6e.ufUzA8XEhfoVLXfCu5CT38-1775130442-1.0.1.1-8PHRi2tYRZkofl3ASchVnYoAOKI1kWBcNDA0stcI8CY">scarce</a>. After a few years of training runs and model improvements, data that could provide a step-change in performance is unlikely to be surfaced by re-scraping the available web. There is plenty of data &#8220;out there&#8221;, but there are barriers to accessing such data, whether that be it is not digitized, it is unstructured, or there is another friction that raises the cost of acquisition.</p><p>Second, the <a href="https://chatgptiseatingtheworld.com/2026/02/25/latest-world-map-of-copyright-suits-v-ai-cos-total-112-feb-25-2026/">deluge</a> of copyright and intellectual property litigation by rightsholders against model developers continues to raise the risks of using copyrighted data under the presumption that such use qualifies as fair use. While a few decisions point to less-than-apocalyptic outcomes for model developers, more than seventy cases are still outstanding. <a href="https://www.hollywoodreporter.com/business/digital/openai-shutting-down-sora-ai-video-app-1236546187/">Adding</a> to the uncertainty, just last week Disney and OpenAI severed ties, dissolving the largest deal between an incumbent IP holder and frontier lab over the use of its products to support image and video generation capabilities. The divide between developers and the content industry seems to be widening by the day.</p><p>To address these twin problems, our paper proposes leveraging the significant troves of public data and existing federal authority to create the U.S. Data Accelerator. We identify four types of data that would be ideal starting points for the accelerator. They are:</p><ol><li><p>Geological &amp; Geospatial Data</p></li><li><p>Economic Development and Industrial Capacity Data</p></li><li><p>Regulatory Cost Data</p></li><li><p>Medical Device and Drug Trial Data</p></li></ol><p>The types of data we identify have two things in common.</p><ol><li><p>The data is already being collected by a federal agency and is made available in some form.</p></li><li><p>These types of data complement current capabilities of generative AI models and therefore could enable greater model utility and customization.</p></li></ol><p>The Accelerator is key to unlocking this data because existing platforms for accessing such data are outdated and fit for a different time. Currently, <a href="http://data.gov">Data.gov</a> is home to more than 360,000 datasets, but due to the fragmentation of different agencies&#8217; data, lack of regular updates, and heterogeneity in metadata and structure its usability for model development is limited. These deficiencies introduce frictions that limit the utility and usability of this data for model developers. Ideally, by establishing a clear, standardized schema and cadence for making such data available the Accelerator can ensure that this data can be used to the fullest extent.</p><p>Luckily, there is existing law and policy on the books that legislators and executive branch officials can rely on to advance this idea. The <a href="https://www.congress.gov/bill/115th-congress/house-bill/4174/text">Foundations for Evidence-Based Policymaking Act of 2018</a> sought to improve federal data access and standardization. Simply put, this law requires agencies to make government data &#8220;open by default&#8221;, and includes specific expectations for government data assets. This creates the statutory foundation for federal data collection and dissemination to the public. The Office of Management and Budget could issue a memorandum under the powers this legislation vests in it to establish guidance for federal agencies to make publicly available data AI-ready. The Department of Commerce published a <a href="https://www.commerce.gov/news/blog/2025/01/generative-artificial-intelligence-and-open-data-guidelines-and-best-practices">report</a> in 2025 on steps taken to ensure publicly available data can support generative AI development and deployment. The insights found within this report could serve as a starting point for future guidance.</p><p>Even if there are gaps in this approach, there are willing partners within the legislature and the executive branch who stand ready to help.</p><p>On the congressional side, Senator Ted Budd (R-NC) and Senator Andy Kim (D-NJ) have introduced <a href="https://www.budd.senate.gov/2026/03/17/budd-kim-introduce-bipartisan-bill-opening-government-data-sets-to-better-train-american-ai-models/">legislation</a> to ensure that federal data can be accessible and useful for AI model development. Their legislation would direct the National Institute of Standards and Technology to collaborate with other relevant agencies and stakeholders to develop standardized schema to maximize the accessibility and utility of public data.</p><p>Turning to the executive branch, President Trump&#8217;s recently-released<a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/03.20.26-National-Policy-Framework-for-Artificial-Intelligence-Legislative-Recommendations.pdf"> National Policy Framework for Artificial Intelligence</a> recognizes the value of government data for model development. In Section V, the framework directs Congress to &#8220;provide resources to make federal datasets accessible to industry and academia in AI-ready formats for use in training AI models and systems.&#8221; Such language is unambiguous: federal datasets can and should be made accessible to accelerate American AI development.</p><p>The U.S. Data Accelerator is about enabling &#8220;American Innovation,&#8221; but it is also about &#8220;Innovating America.&#8221; Making more high-quality data available for model developers can support further scaling of existing model architectures and firms, while also creating opportunities for new firms or developers. Strengthening the data commons will help firms of all sizes, but particularly startups and new entrants. Such a project can fuel America&#8217;s entrepreneurial engine. But this project can also demonstrate the government&#8217;s ability to be an enabler of innovation by provisioning a public benefit. With the legal frameworks and raw resources clearly identified, the next step is building the capacity and will to execute.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Lessons from the Cloud(s)]]></title><description><![CDATA[Cloud Procurement and the Department of War]]></description><link>https://www.ansible.pub/p/lessons-from-clouds</link><guid isPermaLink="false">https://www.ansible.pub/p/lessons-from-clouds</guid><dc:creator><![CDATA[The Ansible]]></dc:creator><pubDate>Thu, 19 Mar 2026 12:01:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fN7L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fN7L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fN7L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!fN7L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!fN7L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!fN7L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fN7L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8104549,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ansible.pub/i/191406031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fN7L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!fN7L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!fN7L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!fN7L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a63ab0-0e54-41d6-8b75-a0524bde98c5_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While the Department of War&#8217;s (DoW) fallout with Anthropic <a href="https://www.wired.com/story/department-of-defense-responds-to-anthropic-lawsuit/?utm_source=nl&amp;utm_brand=wired&amp;utm_mailing=WIR_Daily_031826_PAID&amp;utm_campaign=aud-dev&amp;utm_medium=email&amp;utm_content=WIR_Daily_031826_PAID&amp;bxid=6914feaf5cb949d26102a0b7&amp;cndid=91365221&amp;hasha=7459234121fd8081e8415162876a62c0&amp;hashc=a0ccf07ce37de05a0ca3629e8f89f95f51a39a71c7fc9b5f519f0f5ae56805d2&amp;esrc=MARTECH_ORDERFORM&amp;utm_term=WIR_DAILY_PAID">dominates headlines</a>, in the annals of the Pentagon, a far less sexy and far more symbiotic relationship with tech companies hums along. IT modernization may not sound consequential or impressive, but migrating to and managing systems in the cloud is no small feat. Enter the Joint Warfighting Cloud Capability (JWCC) program, a part-voluntary, part-mandated cloud acquisition facilitator for the armed services, combatant commands, and sundry DoW agencies.</p><p>In 2022, JWCC improved upon its politicized, years-behind-expectation predecessor by opening up its $9 billion in contracts to four vendors instead of just one. Drawing inspiration from a similar platform that the CIA stood up in 2020 for the intelligence community, JWCC allows each cloud service provider (CSP) to bid on each contract, rather than a single winner-take-all mega-contract. JWCC doesn&#8217;t just centralize cloud contracts, though, it also offers a more centralized strategy for managing, moving, and using data.</p><p>A key component of that strategy involves cloud interoperability and portability. That is, JWCC&#8217;s overseeing office aims to have data flow across providers without unreasonable latency (i.e. lag), to have applications translate well across cloud environments, and to structure data and applications so they can permanently migrate off their current cloud. Cloud interoperability and portability have proven to be a bit of a white whale: for the last few years, <a href="https://blogs.microsoft.com/eupolicy/2017/12/15/interoperability-portability-cloud-computing/">regulators</a> and <a href="https://cloud.carnegieendowment.org/cloud-governance-issues/portability-and-interoperability/#skeletabsPanel10">industry watchers</a> have routinely pushed CSPs to seamlessly harmonize their cloud architectures. While <a href="https://aws.amazon.com/about-aws/whats-new/2025/11/preview-aws-interconnect-multicloud/">some progress</a> has been made, complete interoperability is next to impossible. Given that, JWCC stands out. And it&#8217;s not just its approach to interoperability that&#8217;s notable. If the saga with Anthropic is a masterclass in <a href="https://www.bloomberg.com/news/newsletters/2026-03-12/tech-insiders-fear-chilling-effect-after-anthropic-s-pentagon-clash">what not to do</a> as an agency, then JWCC offers lessons in multi-cloud provision, in government procurement, and in government efficiency.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.ansible.pub/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Lesson #1: Multi-Cloud Interoperability Demands Personal Responsibility</strong></h3><p>American bureaucracy is not where one expects to learn a lesson in personal responsibility. But this is exactly what distinguishes JWCC&#8217;s approach to multi-cloud provision. The architects of JWCC understood that interoperability is the customer&#8217;s responsibility as much as it is the cloud providers&#8217; and that no amount of regulation or standardization can save a cloud customer from poorly navigating a path-dependent market.</p><p>JWCC has been tasked with some tall orders. To start, it must coordinate a tangled morass of multi-cloud platforms among the armed services. While an increasing number of those contracts are funneled through JWCC and branches <a href="https://govciomedia.com/the-armed-services-wish-list-for-hybrid-cloud-security/">signal interest</a> in collaborating, combating territorialism among military branches is always an uphill battle. JWCC also has the seemingly impossible task of establishing edge computing in austere environments, managing what may well be the most global IT system in the world, and establishing <a href="https://defensescoop.com/2024/10/22/proliferated-leo-hybrid-cloud-capabilities-enable-forces-operate-disconnected/">all-domain warfare capabilities</a> that demand data-sharing across branches, allies, and clouds.</p><p>Previously, thousands of contracts scattered across the vast sprawl of the military debilitated purchasing power and thoughtful cloud management. That&#8217;s why JWCC&#8217;s governing body, known as the Defense Information Systems Agency (DISA), doesn&#8217;t just help secure the best contract for offices and services within DoW. DISA also serves as a sherpa for agencies in their cloud journey, advising customers on which products have best served others with similar needs in the past and developing custom IT tools that enable efficient cloud adoption.</p><p>Likewise, the DoW&#8217;s continuous Authorization to Operate, which began around the same time as JWCC and <a href="https://govciomedia.com/software-factories-say-policy-vital-to-implementing-devsecops-across-dod/">relies</a> on its centralization, speeds software deployment by shifting from one-time approvals to continuous risk monitoring. This streamlines clearing the necessary extra hurdles for handling sensitive data&#8212;a win for efficiency and security.</p><p>Little of that success translates to private sector cloud operations. Even so, industry, and indeed regulators, have something to learn from JWCC&#8217;s clear-eyed approach to massive, indefinite multi-cloud provision.</p><p>First, the cloud is a living being, not an invisible building. Too often, enterprises treat the cloud as a static data container. DISA understands that each cloud provider, and public cloud itself, has a time and a place. For example, public cloud is not very valuable when you have a great deal of highly consistent traffic that needs to travel thousands of miles with low latency (think livestreams of military installations or continuous streams of classified reports). In such instances, it may be wise to switch to private cloud or to move data away from cloud&#8217;s compute-and-storage-rental model back to in-house hardware, a model known as on-premises. This is why, in addition to creating a private cloud, DISA has modernized on-premises outfits, has <a href="https://federalnewsnetwork.com/defense-main/2023/03/dod-cloud-exchange-2023-disas-sharon-woods-on-jwccs-launch-customer-centric-focus/">accelerated development</a> and <a href="https://federalnewsnetwork.com/defense-main/2024/08/disa-to-deliver-minimum-viable-product-for-olympus-in-september/">simplified cloud management</a> regardless of CSP, and is building a <a href="https://defensescoop.com/2025/05/08/dod-cio-software-modernization-implementation-plan-2025-2026/">cloud mesh</a> to bypass idiosyncrasies and improve cross-system data sharing.</p><p>Accommodating DoW&#8217;s wide variety of agencies and services forces DISA to build more agilely, lending flexibility when a customer&#8217;s cloud needs change. Especially for large enterprises that, like the DoW, have varied and indefinite cloud needs, this strategy makes awarding cloud contracts more like renewing a lease and less like restructuring your mortgage.</p><p>Second, contracting out essential IT services is always a calculated risk. Vendor lock-in is the downside of best-in-class tools, some of which are proprietary to a single CSP. If interoperability is to be a worthy goal, it cannot mean relying only on uncustomized, open-source tools. The least common denominator is the least cutting-edge offering. If we think of interoperability and portability as essentially supply chain optionality&#8212;how many vendors can provision a tool and how well it will work with tools elsewhere in the stack&#8212;it becomes clear how idolizing these concepts stifles innovation. Just think of where critical infrastructure would be if we demanded every component have a dozen potential suppliers.</p><p>So then, desirable interoperability must mean weighing the benefit of a proprietary tool with the reality of being locked in to a vendor. As the <a href="https://federalnewsnetwork.com/cloud-computing/2024/03/dod-cloud-exchange-2024-disas-korie-seville-on-crafting-cloud-products-that-easily-adapt-to-user-need/">deputy CTO</a> in charge of JWCC put it, the expectation that you can pick &#8220;this piece of a cloud and this piece of another and then jam them together is&#8230;a fallacy.&#8221; The ability to be cloud agnostic, to be in one cloud on Monday, another on Tuesday, or simultaneously in both by Wednesday, relies on DoW&#8217;s ability to modernize apps such that they are as portable as possible.</p><p>Perfect cloud agnosticism just doesn&#8217;t exist. If complete off-the-shelf interoperability is possible (which it likely isn&#8217;t), we are years away from it, regardless of the regulatory state or industry standards. Relying on an outside contractor to provide a critical service requires doing the heavy lifting beforehand to ensure apps and data can migrate elsewhere should the time come. It also requires recognizing that life in the cloud isn&#8217;t frictionless, a lesson that rings all the truer in classified environments where some of the greatest obstacles to interoperability&#8212;identity and access management and security&#8212;are all the harder.</p><p>Many seem to presume the burden of interoperability falls solely on cloud providers, who avoid it in an anti-competitive attempt to entrench themselves in the IT infrastructure of their customers. While standards may facilitate interoperability, we cannot forget the role that personal responsibility plays in setting yourself up for success.</p><h3><strong>Lesson #2: In Government Procurement, Purchasing Power and Continuous Contracts Encourage Competitive Cooperation</strong></h3><p>A thoughtful approach to multi-cloud procurement isn&#8217;t the only thing working in JWCC&#8217;s favor. Its massive purchasing power also contributes to its relative agility. In the first 18 months of contract awarding, JWCC inked $1 billion in contracts, instantly ranking it on par with cloud vendors&#8217; biggest customers. In the 12 months that followed, it awarded $2 billion more. <a href="https://substack.com/home/post/p-190716321">Egress fees</a> are a good example of this purchasing power leverage at work. JWCC negotiated baseline discounts ranging from 35 to 100 percent for data egress, upon which further discounts can be offered for particular task orders.</p><p>JWCC&#8217;s steady stream of lucrative contracts encourages CSPs to create interoperable solutions. This may seem counterintuitive, as CSPs participate in a prisoner&#8217;s dilemma-type game where interoperability makes winning future contracts easier regardless of existing infrastructure, but each CSP benefits from locking in customers to their cloud by using proprietary tech and mutually unintelligible semantics. However, this is an <a href="https://www.youtube.com/watch?v=CO3-796fGv8&amp;list=PLKI1h_nAkaQoDzI4xDIXzx6U2ergFmedo&amp;index=56">infinitely repetitive prisoner&#8217;s dilemma</a>, in which there are near infinite rounds of contracts. In this scenario, game theory suggests that CSPs will cooperate with each other, making their systems as interoperable with one another as possible so that everyone plays nice in the sandbox. (Cue John Nash telling his buddies not to all go after the blonde in <em><a href="https://www.youtube.com/watch?v=2d_dtTZQyUM">A Beautiful Mind</a></em>). All the while, third-party providers, which JWCC looks to increase in its next version of the program, are incentivized to create seamless migration across CSPs for a particular app or program.</p><p>This cooperative strategy assumes some things about the way the repeated contract bid game is set up. First, it assumes that for any given contract, CSPs can either cooperate by making their service as interoperable as technically feasible, or they can defect by purposefully making the service less than optimally interoperable. For instance, if a customer seeks a contract for a customized tool that would function best using proprietary technology, the winning CSP is not &#8220;defecting&#8221; if technical hurdles prevent seamless interoperability with other CSPs. Rather, the provider only defects if it <em>purposefully </em>obstructs interoperability.</p><p>This leads to the second assumption: all losing providers must be able to detect whether the winning CSP has cooperated or defected, and all losers will calibrate their strategy the next round based on the winner&#8217;s strategy this round. Lastly, it assumes the payoff for the current contract round is not so astronomically high compared to the payoff of future task orders that it nullifies the incentive to continue cooperating. If CSPs expect this round&#8217;s contract to be worth more than the present value of all future contracts, the cooperative strategy no longer makes sense.</p><p>In truth, these assumptions don&#8217;t perfectly reflect hyperscalers&#8217; cloud provision for JWCC customers, but they hold sufficiently to encourage greater cooperation. The first assumption obviously holds. In fact, the defect strategy of making services purposefully less interoperable is the strategy regulators <a href="https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2023/11/cloud-computing-rfi-what-we-heard-learned">presume</a> hyperscalers adopt in the broader market. The second assumption is trickier. JWCC contracts are negotiated, not open. At most, the government only has to reveal how much the total award amount is and explain why the losers lost. Even if later interactions with the winner&#8217;s systems make obvious a previous defection, the time lag doesn&#8217;t allow for direct retaliation against the defecting winner; it only harbors regret that you yourself are not defecting more often.</p><p>Unlike in traditional prisoner&#8217;s dilemma games, however, this one has a game master. If a CSP defects, the probability of winning future contracts diminishes. Its unnecessarily poor interoperability may &#8220;lock in&#8221; future contracts that touch specific systems, but it has tarnished its broader reputation. JWCC negotiators act as third- party <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC11251755/pdf/rspb.2024.0861.pdf">arbitrators</a> or <a href="https://www.quantamagazine.org/in-game-theory-no-clear-path-to-equilibrium-20170718/?mc_cid=8d23f68806">mediators</a>, both of which lead to greater cooperation. As for the last assumption, a rational actor has no reason to believe that future contracts won&#8217;t be just as lucrative as the present one. Winning big now in a way that locks in large future contracts is still shortsighted in light of the potentially bigger contracts from which you&#8217;ve now practically disqualified yourself.</p><p>Realistically, JWCC is not a perfect game master. As its financial operations metrics improve, it will be better positioned to sniff out the runaway costs that vendor lock-in can cause, but for now its ability to detect defection probably leaves something to be desired. What&#8217;s more, JWCC contract officers may have short memories or turn a blind eye to defection if the service quality is otherwise exceptional. On the whole, however, JWCC&#8217;s pooled purchasing power and iterative multi-vendor contract awarding encourage hyperscalers to cooperate so that they can maintain a good reputation for future contracts and benefit from the cooperation of others. Government agencies have something to learn here&#8212;in procurement, sometimes, it pays to keep paying.</p><h3><strong>Lesson #3: There&#8217;s a Right Way to Think about Efficiency</strong></h3><p>To say JWCC is successful is to imply it is more &#8220;efficient&#8221; than the system it replaced. That word has gotten a lot of attention from policy wonks lately. Between DOGE&#8217;s bureaucratic warpath and the breakout success of the <em><a href="https://www.simonandschuster.com/books/Abundance/Ezra-Klein/9781668023488">Abundance</a></em> movement, 2025 was the year when both the right and the left began reimagining what our government could do, if only it were more efficient. At the crux of this imaginative project is how exactly to define efficiency. JWCC is a good example of what American bureaucratic efficiency should look like precisely because it <em>doesn&#8217;t</em> aim to be as efficient as possible.</p><p>First, in the pursuit of resilience, JWCC accepts redundancy. One could argue that the entire military operating off a single cloud provider would be the most efficient in that it is the only way to ensure complete interoperability, but this is one of many reasons its predecessor program failed. Procuring from a single vendor may streamline things, but it also fosters mediocrity and vulnerability, whereas real efficiency is durable and versatile.</p><p>Imagine a race car capable of hitting 275 mph, significantly faster than the top speed on most NASCAR tracks. If hitting 275 causes it to overheat or break down, it would come in dead last every time. Similarly, if you build such a vehicle as cheaply as possible, its versatility is limited. There&#8217;s a reason an F1 car is <a href="https://onestopracing.com/f1-cars-vs-nascar-cars-whats-the-difference/">wildly more expensive</a> than a NASCAR stock model&#8212;the latter can only handle oval tracks with banked turns, the former can turn on a dime. The car best suited to its aim is the most efficient, even if it takes longer to build or costs more.</p><p>Second, JWCC entices, rather than manipulates, private companies&#8217; participation. JWCC invites companies to compete in a way that serves the public interest without attaching political prerequisites or changing the conditions to participate partway through the process. When unelected officials&#8217; administrative capacity is so great that it can pursue its own political ends, we&#8217;re in trouble. Perhaps this is what prominent mid-20th century liberal Senator Eugene McCarthy meant when <a href="https://time.com/archive/6854084/people-feb-12-1979/">he said</a>, &#8220;An efficient bureaucracy is the greatest threat to liberty.&#8221;</p><p>Not only is this type of efficiency anathema to our democratic republic, it also isn&#8217;t efficient in the long run. If bureaucratic directives at the behest of the sitting executive are a hyper-efficient way to enact a political agenda, they are also imminently reversible.</p><p>In the modern whirlwind of extra-congressional action, bureaucrats marshaled by the last three presidents have changed everything from <a href="https://climate.law.columbia.edu/content/president-issues-executive-order-revoking-federal-sustainability-plan-0">environmental goals</a> to <a href="https://www.cbsnews.com/news/biden-immigration-executive-orders-daca-reverse-trump-policies/">immigration policy</a> to <a href="https://www.newsfromthestates.com/article/trump-administration-aims-officially-scrap-biden-era-student-loan-forgiveness-program">student loan forgiveness</a> programs, only to have them changed back again roughly four years later. Those of us who have closely watched the disbursement of money (or lack thereof) under the BEAD Act are intimately familiar with the inefficiency of executive tampering. In 2024, a landmark Supreme Court decision overturned a longstanding precedent known as <em>Chevron</em> deference. In effect, this deference encouraged agencies to interpret their mandate according to their own political preferences and the sitting executive&#8217;s agenda. Its overturning all but guarantees bureaucratic delays as Congress further clarifies and updates statutes. Yet the Court&#8217;s decision also exhorts Congress, rather than unelected federal agencies, to steward the programs it has enacted and the taxpayer money with which it has been entrusted. This improves long-term efficiency: careening the ship side to side prevents it from moving forward. Efficiency demands having a clear mandate and sticking to it.</p><p>JWCC, then, is a successful government program not because it worships efficiency at the expense of innovation or resilience, nor because it uses its lucrative contracts to entangle companies in ongoing political fights. It is successful because it is clear eyed enough to know it can&#8217;t outsource project stewardship to contractors, it&#8217;s big enough not to <a href="https://www.washingtonexaminer.com/restoring-america/courage-strength-optimism/4409950/congress-fix-federal-it-technology-modernization-fund/">get bullied by major corporations</a>, and it is insulated enough from political meddling both within the Pentagon and at the White House.</p><p>Waging war in Iran and at domestic tech companies leaves little time for introspection, but the DoW would be well served by reflecting on its own success as it prepares to announce a JWCC Next, JWCC&#8217;s successor. It would seem many of the lessons JWCC offers have yet to fully sink in, even within the Pentagon.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[In Defense of Egress Fees]]></title><description><![CDATA[Switching Costs in the Cloud]]></description><link>https://www.ansible.pub/p/in-defense-of-egress-fees</link><guid isPermaLink="false">https://www.ansible.pub/p/in-defense-of-egress-fees</guid><dc:creator><![CDATA[Sophia Bulla]]></dc:creator><pubDate>Thu, 12 Mar 2026 12:31:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hn32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hn32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hn32!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!hn32!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!hn32!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!hn32!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hn32!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7589981,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ansible.pub/i/190716321?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hn32!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!hn32!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!hn32!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!hn32!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccf3de42-e658-446c-9a66-e94f7c2c7d92_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If online chatter is any indication, egress fees are the boogeyman of compute, the bane of competition. These fees have come under scrutiny from regulators the world over, not least of which because there&#8217;s often a charge to move data to a competitor or back into your own on-premises IT infrastructure. While providers <a href="https://www.unitrends.com/blog/data-egress/">vary</a> in their data transfer pricing, egress <a href="https://www.youtube.com/watch?v=rrWIovnaf58">occurs</a> any time data is sent around the world, transferred to different parts of the cloud, pulled to an external location, or summoned by an external IP address. Egress fees, to the lament of <a href="https://www.ofcom.org.uk/siteassets/resources/documents/consultations/category-3-4-weeks/244808-cloud-services-market-study/associated-documents/cloud-services-market-study-final-report.pdf?v=330228">regulators</a>, are multiples more expensive among the largest three cloud service providers (CSP), the hyperscalers of AWS, Microsoft Azure, and Google Cloud Platform. </p><p>But the panic makes a mountain out of a molehill. Egress fees distract from more earnest and harder to resolve industry issues, like interoperability, hyperscalers&#8217; cross-market advantages, and <a href="https://cloud.google.com/blog/topics/inside-google-cloud/filing-eu-complaint-against-microsoft-licensing">inflated license</a> fees for SaaS offerings on other providers&#8217; platforms. Here, we outline a reproach of common regulatory proposals against egress fees, particularly those offered by the EU Data Act and the various European market studies that informed it. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Not All Egress Fees Are Made Equal: The Case Against the Outright Ban</h3><p>Though invisible, data is heavy, at least when pushing massive amounts of it around. Egress fees are a way to make the businesses that take up the most bandwidth internalize the cost to the overall system. Should egress fees be outright banned, that cost would be redistributed among all customers, including small businesses whose infrequent data transferring is <a href="https://www.ciodive.com/news/microsoft-azure-eliminates-cloud-data-egress-fees/710367/">covered</a> under hyperscalers&#8217; &#8220;free tier.&#8221; In fact, over 90% of AWS customers pay <a href="https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/">nothing</a> in egress fees. Yes, the egress bill of a video streaming company is <a href="https://www.regulations.gov/comment/FTC-2023-0028-0048">expensive and confusing</a>, but that&#8217;s the tradeoff for quality scalability. </p><p>Egress fees are also a way for some CSPs to signal that their comparative advantage lies in compute and storage rather than data transfer. In fact, one might reasonably argue that they <em>advance</em> <a href="https://newsletter.partnerinsight.io/p/the-rise-of-cloud-hyperscalers-as?just_subscribed=true">competition</a> by allowing smaller competitors and adjacent industries to capitalize on more efficient, less energy-intensive ways to move data. If an enterprise does not like its egress costs, it can use companies like Alluxio or Snowflake to compress files or cache the most commonly used data locally, drastically reducing egress costs while expanding the cloud industry ecosystem. Or an enterprise can choose to bypass the internet when transferring data, thereby taking advantage of the public cloud without draining shared resources by constantly retrieving data stored on the internet. In either case, egress fees encourage the biggest cloud customers to better steward their data in a way that keeps cost lower for the majority. </p><h3>The Practical Difficulties of Exempting Fees When Switching to a Competitor</h3><p>But what if an enterprise wants to leave its current provider by returning to on-premises or by opting for a smaller CSP that displaces egress costs elsewhere in its pricing structure? Making the bandwidth hogs internalize costs is one thing, but holding companies&#8217; data hostage when they try to exit your service is practically the definition of anti-competitive. While this line of thinking produces more targeted regulation, it&#8217;s misguided. A <a href="https://op.europa.eu/en/publication-detail/-/publication/799e50ff-6480-11e8-ab9c-01aa75ed71a1/language-en">study</a> prepared for the European Commission found that the egress costs for fictitious customers to transfer out of all their data over the public internet amounted to <em><strong>less than half a percent</strong></em> of their annual cloud services cost. Even if eliminating egress fees did lower total switching costs, there remains the difficulty of distinguishing when a customer is switching to a competitor rather than transferring data as a normal course of business. </p><p>To comply with the EU Data Act, the <a href="https://blog.consoleconnect.com/the-truth-about-cloud-data-egress-fees">hyperscalers</a> now allow customers to apply for fee waivers on one-time data transfers to other providers or on-premises systems, so long as the customer removes all data and workloads. <a href="https://cloud.google.com/exit-cloud">Google</a> also suggests European customers &#8220;may be eligible&#8221; for <a href="https://cloud.google.com/data-transfer-essentials/docs/overview">free transfers</a> to proven multi-cloud partners. </p><p>The 60 (<a href="https://cloud.google.com/data-transfer-essentials/docs/overview">Google</a> and <a href="https://www.ciodive.com/news/microsoft-azure-eliminates-cloud-data-egress-fees/710367/">Microsoft</a>) to 90 day (<a href="https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/">AWS</a>) <a href="https://blog.consoleconnect.com/the-truth-about-cloud-data-egress-fees">complete</a> removal required for the waiver is not only a tight turnaround that could compromise security during <a href="https://www.youtube.com/watch?v=tWNDM9y7IkA">migration</a>, but is also completely out of touch with the market. Eighty to ninety <a href="https://www.flexera.com/about-us/press-center/flexera-2023-state-of-the-cloud-report">percent</a> of public cloud users <a href="https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025">operate</a> on two or more providers. Assuming Google sets a standard in discerning when data transfers are phased exits from Google&#8217;s service and when they are egress typical of multi-cloud architecture, this still distracts from a larger concern.</p><p>The more scrupulous CSPs are in determining which data transfers qualify, the more valueless these fee waivers are and the more complaints regulators will get that they&#8217;ve not gone far enough in preventing vendor lock-in. The more generous CSPs are in granting waivers, the more these exemptions resemble an outright elimination of egress fees, with all the market inefficiencies and harm to smaller cloud customers that brings.</p><h3>Offering Data Transfer at Cost Hurts Innovation</h3><p>The EU Data Act mandates egress charges associated with multi-cloud use not exceed the cost incurred by CSPs. It further stipulates one-time data transfers be offered at cost for the next three years as a transition before eliminating all provider-switching related egress fees. Insofar as this attempts to appear more measured than a full ban, it is all the more nonsensical. The average company saves over 200% by using Infrastructure as a Service from cloud providers. This <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4573326">savings</a> is closer to 270% for start ups and smaller companies, who have long been noted as the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4573326">primary beneficiaries</a> of the cloud&#8217;s <a href="http://ttps://explore.hginsights.com/aws-ecosystem-in-2025?utm_source=blog&amp;utm_campaign=aws-ecosystem-in-2025&amp;utm_medium=organic&amp;utm_term=ug">offerings</a>. The cloud is not without downsides, but its services greatly benefit customers. Free market societies encourage innovation by allowing service providers to compete and to profit from that competition. We eliminate all incentive for providers to differentiate products and improve services when we prevent profit. There is only an arbitrary difference in making CSPs offer data transfer at cost and asking them to offer compute or storage at cost. In fact, if the aim is to improve consumer welfare, there is no point in stopping at egress fees when, for even the most data-intensive cloud customers, they constitute just 6% of total cloud spending.</p><p>What&#8217;s more, AWS has passed on over 100% of the drop in egress costs over the last several years, meaning it has lowered prices slightly more than the cost of transferring data has decreased. Sure, it up-charges egress costs more than its competitors, but it is, after all, a business. Businesses that overcharge lose market share, which <a href="https://www.srgresearch.com/articles/cloud-market-share-trends-big-three-together-hold-63-while-oracle-and-the-neoclouds-inch-higher">AWS has</a>, albeit slowly, over the last few years. </p><h3>Sticky But Not Stuck</h3><p>The inconvenient truth for regulators is that even in an idealized, highly competitive cloud market, cloud provision is sticky, meaning that the very nature of the service being offered makes customers unlikely to switch often. Cloud providers are more like landlords than they are like cereal brands. You&#8217;ll probably swap Rice Krispies for Cheerios if the price of the former shoots up, but you may choose not to move even if your rent rises. It&#8217;s just too darn annoying. As one economic study found, 90% of cloud customers did not adopt a cheaper, exact replica product offered by the same provider even though it would have saved customers 22% of their <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4573326">total cloud spending</a>. If customers refuse to switch to perfect substitutes offered by the same provider, where interoperability and data portability are nonissues, this tells us the market is simply inelastic. Before regulating allegedly anti-competitive practices, we need to consider how the nature of the market shapes customer preferences. Granted, a demand-inelastic market does naturally allow for greater abuse on the part of cloud providers. Luckily, the cloud is a commercial product, not a public service.</p><h3>Public Cloud, Not Public Service</h3><p>Cloud service providers are profit-maximizing companies whose main customers are other profit-maximizing companies. Everyday consumers interact with the cloud either through their workplace or indirectly when, say, watching a Netflix show or ordering GrubHub, without realizing their systems run on AWS. You may have many subscription services, but renting compute and storage is likely not one of them. This makes the cloud different from other digital services coming under scrutiny, like Apple&#8217;s <a href="https://m.youtube.com/watch?v=_nRU9XUbnpM">walled garden</a> or Google&#8217;s <a href="https://www.theverge.com/2023/10/27/23934961/google-antitrust-trial-defaults-search-deal-26-3-billion">advertising empire</a>, in that neither individual consumers nor small businesses are adversely affected by the practices of digital service giants. Anti-competitive practices don&#8217;t have to target the little guy in order to be sub-optimal, but don&#8217;t let regulators tug at your heartstrings on this one: in this arena, there is no David, only Goliaths. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How Bluesky Can Become More than Just Lib Twitter]]></title><description><![CDATA[On December 11, 2019, Twitter CEO Jack Dorsey announced a bold new effort to develop an open and decentralized standard for social media.]]></description><link>https://www.ansible.pub/p/how-bluesky-can-become-more-than</link><guid isPermaLink="false">https://www.ansible.pub/p/how-bluesky-can-become-more-than</guid><dc:creator><![CDATA[The Ansible]]></dc:creator><pubDate>Thu, 05 Mar 2026 13:02:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IPYD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IPYD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IPYD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!IPYD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!IPYD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!IPYD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IPYD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7327800,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ansible.pub/i/189914279?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IPYD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!IPYD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!IPYD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!IPYD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb546386d-254d-42d4-b335-1ddc5474f909_2752x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On December 11, 2019, Twitter CEO Jack Dorsey <a href="https://x.com/jack/status/1204766078468911106">announced</a> a bold new effort to develop an open and decentralized standard for social media. It would be incubated within Twitter, but the ultimate goal of the project would be to &#8220;allow [Twitter] to access and contribute to a much larger corpus of public conversation, focus our efforts on building open recommendation algorithms which promote healthy conversation, and [force Twitter] to be far more innovative than in the past.&#8221; He named it Bluesky.</p><p>After Elon Musk bought Twitter in 2022, Bluesky was spun off and eventually launched an app of the same name. Early growth was healthy but manageable, driven largely by invitations. Friends invited friends; nerdy techies made up a large percentage of the early commentariat. Many were Twitter expatriots fed up with Musk&#8217;s management of their beloved social media platform&#8212;an echo of earlier decampments on the right, when those unhappy with the Dorsey regime fled to Parler and Gab. The sharp politicization of X during the 2024 election, however, led to a tipping point: whereas the right-wing networks had peaked around 2 to 4 million active users, Bluesky exploded to over 42 million. Suddenly, social media had balkanized: X was for right-wingers, and Bluesky had become Lib Twitter.</p><p>Now, many are starting to ask questions about Bluesky. Is the platform really an idealized version of X for the liberal intelligentsia, where <a href="https://www.theguardian.com/technology/2025/sep/01/science-research-gets-more-engagement-on-bluesky-than-x-study-finds">science and facts</a> get their due? Is the balkanization of social media actually a good thing for democracy? With Trump Derangement Syndrome running rampant, is Bluesky trapped in a doom loop of its own making?</p><p>But all these questions miss the forest for the trees. Its real significance lies in its architecture and ethos of openness. By building a platform where control is distributed&#8212;across users, algorithms, and servers&#8212;Bluesky offers a vision of social media that isn&#8217;t beholden to any single corporation or ideology. It has the potential to deliver something rare in today&#8217;s tech arena: user empowerment. But to get there, the platform will need to expand its network, welcome a broader public, and encourage outside innovation. If Bluesky succeeds, it won&#8217;t just be another Twitter clone; it could redefine how we connect and communicate on the internet.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.ansible.pub/subscribe?"><span>Subscribe now</span></a></p><p><strong>The X-odus</strong></p><p>Bluesky&#8217;s genesis can be traced directly to Dorsey&#8217;s acknowledgement of Twitter&#8217;s failures: he saw that Twitter <a href="https://x.com/jack/status/1204766081404956674">had become</a> too centralized and vulnerable to corporate and government control. To get Twitter back to its roots as an open, decentralized system, Dorsey founded Bluesky. The idea was bold: instead of letting a single company control the public conversation, build a federated, user-controlled network; recreate Twitter as a protocol&#8212;a set of open standards that anyone can use and build off of&#8212;rather than as a closed platform.</p><p>In 2021, Twitter&#8217;s leadership brought on Jay Graber as CEO to spearhead the effort. The small but scrappy Bluesky team worked on building what would eventually become the Authenticated Transfer (AT) Protocol: the underlying architecture designed to enable a federated social web.</p><p>At its core, the AT Protocol establishes a standard format for identity, follows, and social data, allowing different apps and servers to interoperate&#8203;. In practical terms, this means a user could move their account from one server to another without losing their followers or content&#8203;. It also means no single provider owns your social identity. &#8220;There&#8217;s no one company that can decide what gets published; instead there is a marketplace of companies deciding what to carry to their audiences,&#8221; Bluesky <a href="https://x.com/bluesky/status/1521940677424078849">explained</a>. In other words, the network is meant to be decentralized by design: many independently operated communities connected by a common protocol, much like email. Users, not corporations, ultimately hold the reins.</p><p>All of this was going on behind the scenes at Twitter, with the goal of eventually integrating Twitter into the AT Protocol as its first client. Then Elon happened.</p><p>Musk&#8217;s acquisition of Twitter in late 2022 marked a dramatic shift for the platform, as he sought to reduce excessive content moderation and restore what he saw as a commitment to free speech. His changes&#8212;including reinstating some banned accounts, overhauling Twitter&#8217;s verification system, altering content moderation and curation policies, and restructuring the company&#8217;s workforce&#8212;were intended to make the platform more open and financially sustainable. Twitter also jettisoned the Bluesky team.</p><p>As fate would have it, the chaos happening in San Francisco turned out to be a blessing. The Bluesky team kept working on achieving its mission of creating a decentralized social media protocol as an independent organization. In its early days, the platform was tiny and exclusive&#8212;essentially a techie salon for those with invite codes. This closed beta phase beginning in early 2023 helped refine the technology, but it also shaped public perception: from the outside, Bluesky looked like an elitist clubhouse of techy cognoscenti. As one commentator <a href="https://www.theatlantic.com/technology/archive/2023/05/social-media-status-twitter-blue-checks-bluesky/673987/#:~:text=tabs%3A%20In%20one%20is%20Twitter%2C,online%20communities%20respond%20to%20upheaval">quipped</a>, Bluesky was little more than an &#8220;invite-only clone of Twitter&#8221; that was more &#8220;like a country club &#8230; where you can go and be with your [techie] peers.&#8221; <br><br>Bluesky opened to the public in February 2024 and grew to a few million users over the next few months. Then, in the immediate aftermath of the 2024 election, daily usage saw hockey stick growth as the app went from approximately 3 million to 30 million users overnight. People fleeing Musk&#8217;s X&#8212;primarily people with a progressive-liberal bent revolted by Elon Musk&#8217;s close relationship with President Trump&#8212;flocked to Bluesky in what has become known as the &#8220;X-odus.&#8221;</p><p>Celebrities, politicians, and the chronically online rushed to claim their usernames on Bluesky, lending the new social network an aura of being the next big thing. Given that most of these new users&#8217; only commonality was a hatred of Donald Trump and Elon Musk, it was natural that the Bluesky discourse trended heavily toward anti-MAGA politics, shaping public perceptions of it as a progressive sanctuary rather than the more ideologically diverse network it aimed to become. High-profile progressive users including Alexandria Ocasio-Cortez, George Takei, Kara Swisher, and Bryan Tyler Cowen were influential in defining the discourse. It is no coincidence that The Lincoln Project, a vehemently anti-Trump political group, is one of the most followed Bluesky accounts.</p><p>This was partly by design: Bluesky&#8217;s content moderation approach is far more proactive than Musk&#8217;s laissez-faire ethos on X. The Bluesky app launched with robust tools to help users curate their experience with features like community block lists, content labels, and customizable feed algorithms&#8203;. Users could even subscribe to shared block lists to automatically mute entire groups (one popular block list targets accounts labeled as &#8220;MAGA supporters&#8221; <em>en masse</em>)&#8203;. However, this also reinforced the Lib Twitter label. The federated model was not yet fully in effect&#8212;most users were all in one big community&#8212;so if that community leaned liberal, there was no easy on-boarding of right-leaning or nonpolitical groups elsewhere.</p><p>Amid this hype, Bluesky&#8217;s deeper mission has been obscured. Fundamentally, the project has always been about building an open, federated social media ecosystem where users control their data and communities set their own rules. Indicative of this mission is Bluesky&#8217;s unofficial motto, <em>mundus sine caesaribus</em>, which roughly translates to &#8220;a world without emperors.&#8221;</p><p>But high-profile incidents have distracted from this mission. Nowhere is this more evident than in the Jesse Singal Incident.</p><p>When Jesse Singal, a self-described liberal journalist known for his opposition to youth gender transition, joined Bluesky, the backlash was immediate. Singal quickly became the most-blocked account on the platform, and a petition circulated urging Bluesky&#8217;s leadership to ban him in spite of the fact that he had not broken any platform policies. Deplatforming Singal rapidly turned into a progressive cause c&#233;l&#232;bre. Ultimately, Bluesky leadership declined to take action, adhering to its principle of user-controlled moderation rather than top-down enforcement. But the incident underscored an important tension. While Bluesky was designed as an open and decentralized network, its early user base was ideologically skewed, and incidents like this demonstrated that it was an inhospitable space for certain viewpoints. In sum, a perfect storm of user migration, moderation philosophy, and early adopter demographics earned Bluesky its reputation as Lib Twitter.</p><p><strong>Looking Under the Hood</strong></p><p>Despite its politically homogeneous start as Lib Twitter, Bluesky&#8217;s architecture holds the promise of far greater pluralism. The very goal of federation is to enable many communities with different norms and viewpoints to coexist, each operating its own server under the shared network. In theory, Bluesky could host a constellation of diverse forums&#8212;conservatives, liberals, centrists, Twilight stans, Catholics, furries, Joe Rogan fans, sadomasochists, etc.&#8212;all interoperating through the AT Protocol. Instead of one company&#8217;s rules setting the tone (as with Twitter or Facebook), each community can set its own moderation standards. Most importantly, each community is subject to the others&#8217; rules when entering each other&#8217;s spaces; no spamming your political enemies.</p><p>The key innovation Bluesky is pursuing is algorithmic choice. Unlike traditional social platforms that impose one opaque algorithm on everyone, Bluesky is building a system where users can select (or even build) their own feed algorithms. &#8220;We want a future where you control what you see on social media,&#8221; CEO Jay Graber <a href="https://bsky.social/about/blog/3-30-2023-algorithmic-choice">wrote</a>. The goal is to enable a &#8220;marketplace of algorithms.&#8221;&#8203; In practical terms, a Bluesky user might swipe between a purely chronological timeline, a community-curated feed, or an algorithm that downranks &#8220;hateful&#8221; content. Users&#8217; choice over how their feeds work can be even more granular, switching from their puppy-pictures feed to their hyper-political news feed to their sports-news-only feed and back again in seconds, depending on their preference&#8203;.</p><p>By giving people this power, Bluesky aims to break the cycle of engagement-driven outrage. If you can opt out of the algorithm that amplifies the loudest and most inflammatory posts, the whole tenor of the online conversation can change. This user-centric approach to curation could foster healthier discourse and more cross-pollination of ideas than the enraging shouting match that characterized the Twitter experience.</p><p>Crucially, Bluesky&#8217;s decentralized architecture may offer a better path forward than earlier federated projects like Mastodon. Mastodon and the broader Fediverse&#8212;shorthand for the &#8220;federated universe&#8221; of independently hosted, interconnected social platforms and services that communicate via shared protocols&#8212;proved that decentralization can work at scale, but they also exposed pitfalls. The Fediverse experience is uneven and confusing for newcomers. For example, Mastodon&#8217;s email-like federation often leads to fragmented conversations: two users on different servers might see completely different reply threads on the same post, because each server only shows the replies it knows about&#8203;. Bluesky is trying to avoid those pitfalls by designing a more unified network structure on top of federation.</p><p>The AT Protocol includes a &#8220;Big Graph&#8221; service&#8212;essentially a network-wide index&#8212;to ensure a global view of content and consistent identity across servers&#8203;. That means a user on a small community server can still seamlessly follow, reply to, or search posts from the main Bluesky server (or any other server) with the system handling the synchronization behind the scenes. If successful, this model would combine the diversity of decentralization with the convenience of a centralized service. In short, Bluesky is decentralized without feeling disjointed. This could make it a far more compelling alternative to centralized platforms than earlier attempts.</p><p>More than merely cloning Twitter&#8217;s microblogging, Bluesky&#8217;s technology opens up new possibilities for social media innovation. The AT Protocol is open source and intended as a foundation that developers can build on&#8203;. From alternative Bluesky clients, to browser extensions that verify identities via domain names&#8203;, third-party apps and services have already started to appear built on top of the AT Protocol.</p><p>In the future, entirely new social experiences could be constructed atop the network. Imagine an Instagram or YouTube in which content flows through the same decentralized backend, meaning your followers, content, and identity travel with you. Startups could build novel social networking apps that could immediately be part of a larger interoperable social web. Some enthusiasts even talk about integrating Bluesky with other decentralized tech: using cryptocurrency wallets for identity verification or payments or linking Bluesky content with open publishing tools like WordPress. This extensibility hints at Bluesky&#8217;s broader significance: it is not a platform, but an ecosystem.</p><p>The full potential of an open social protocol will likely be discovered by outsiders tinkering with it in the same spirit that the early open web spawned unexpected innovations. Bluesky&#8217;s decentralization isn&#8217;t an end in itself; it&#8217;s a means to unleash creativity, competition, and diversity in social media.</p><p><strong>Getting From X to B</strong></p><p>For Bluesky to evolve from Lib Twitter into the open social revolution its founders and early adherents envision, several steps will be crucial. First, it must expand federation in practice and onboard a far more ideologically and globally diverse user base. This means rolling out support for independent servers and making it easy for all kinds of communities to set up their own spaces. Bluesky will need to actively encourage a wider range of groups to join, including moderates, conservatives, international users, and others who didn&#8217;t rush in during the X-odus. If federation remains limited, or if most users stay corralled on the one big bsky.social server, Bluesky risks remaining an insular bubble.</p><p>The team&#8217;s greatest challenge is to balance growth with its values. In practical terms, that could involve developing tools for inter-server moderation so that servers with lax policies don&#8217;t overwhelm others with spam. The goal should be to let a thousand communities bloom while maintaining some connective tissue and shared standards across the network for dealing with illegal content.</p><p>Second, Bluesky and others need to nurture a developer and enterprise ecosystem around the AT Protocol. Its success will hinge on others embracing it as an open standard. The project has made its code open source and has already seen independent developers craft custom feeds and apps&#8203;. This is a promising start, but the momentum must continue. When entrepreneurs have their pick of dozens of social media protocols, the value proposition of building on the AT Protocol must be crystal clear.</p><p>Bluesky should facilitate third-party innovation by providing stable APIs, documentation, and perhaps funding or hackathons for building on the protocol. From novel algorithmic feed providers to specialized community servers or moderation tools, independent tools will only enrich the overall network. If companies see opportunity in the AT Protocol, they might build social features into their own products that hook into Bluesky&#8217;s network, much like how different email clients and providers all interoperate on the email protocol. Imagine news organizations, universities, or interest groups running their own Bluesky servers for their members, or software companies adopting the protocol for internal social feeds.</p><p>Such buy-in won&#8217;t happen overnight, but rolling out a welcome mat for outside innovation is essential. This also means Bluesky should prepare for standards governance. Cultivating this kind of open ecosystem will help Bluesky fulfill its role as a public commons rather than just another app.</p><p>Finally, Bluesky must figure out a sustainable business model that preserves the platform&#8217;s independence and user-centric ethos. As a public benefit corporation, Bluesky has explicitly committed to prioritizing an open and decentralized social web over profit&#8203;. That noble stance doesn&#8217;t pay the server bills or developer salaries by itself. Thus far, Bluesky has been supported by investor funding and the goodwill of its backers. Long-term, it plans to avoid the advertising model used by traditional social media since locking in user data would contradict the whole premise of user ownership&#8203;. The team&#8217;s initial revenue experiments have instead focused on paid services that enhance the user experience. For example, Bluesky introduced a paid domain name service that allows users to purchase custom domain handles (e.g., yourname.com) more easily&#8203;.</p><p>Thousands of users have shown interest in using personal domains as their identity, which both generates revenue and advances the idea of user-controlled identity. This is a start, but additional revenue streams will be needed. Possibilities include premium features, subscription plans for power users, or offering hosting and support for communities that run their own servers (Bluesky-as-a-Service anyone?). Ironically, a good example on how to do that is Elon Musk&#8217;s re-commercialization of Twitter in this area.</p><p>A Bluesky that fulfills its promise could empower communities of all stripes to take charge of their online experience. It could spawn new social apps we can&#8217;t yet imagine, all interoperable and user-first by design. And it could demonstrate that decentralization online isn&#8217;t just a pipe dream or a playground for geeks, but a viable alternative to the status quo. In an era of disillusionment with social media, Bluesky&#8217;s open-at-the-core approach is a refreshing experiment in what the next chapter of the internet might look like&#8203;.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[A Science-Fictional Way of Thinking]]></title><description><![CDATA[Welcome to The Ansible]]></description><link>https://www.ansible.pub/p/a-science-fictional-way-of-thinking</link><guid isPermaLink="false">https://www.ansible.pub/p/a-science-fictional-way-of-thinking</guid><dc:creator><![CDATA[The Ansible]]></dc:creator><pubDate>Thu, 26 Feb 2026 13:02:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!x6pw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x6pw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x6pw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!x6pw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!x6pw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!x6pw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x6pw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8847533,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ansible.pub/i/188628770?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x6pw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!x6pw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!x6pw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!x6pw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83da1a24-25ba-4708-b94b-0c3f12517813_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>It is change, continuing change, inevitable change, that is the dominant factor in society today. No sensible decision can be made any longer without taking into account not only the world as it is, but the world as it will be&#8212;and naturally this means that there must be an accurate perception of the world as it will be. This, in turn, means that our statesmen, our businessmen, our everyman must take on a science fictional way of thinking, whether he likes it or not, or even whether he knows it or not. Only so can the deadly problems of today be solved.</p></blockquote><p> &#8212;<a href="https://archive.org/details/asimovonsciencef0000asim/mode/2up">Isaac Asimov, </a><em><a href="https://archive.org/details/asimovonsciencef0000asim/mode/2up">My Own View, </a></em><a href="https://archive.org/details/asimovonsciencef0000asim/mode/2up">1978</a></p><p><strong>Our Goal</strong></p><p>When Isaac Asimov published his first piece of science fiction in 1939, he wrote for an analog world; a world without transistors or tupperware. There were no atomic bombs or automatic transmissions. We had yet to discover DNA or duct tape. Throughout his life, Asimov bore witness to many of the fictions he and others envisioned becoming reality. But he also knew that we were only getting started.</p><p>We live in an era of progress and incomprehensible change. The course of the last couple of centuries demonstrated that innovation can radically reconfigure geopolitics, economics, and daily life in ways that are not always under our control. Needless to say, as progress continues to escalate, technology presents us with enormous promise but also potential perils. The challenge before us is to continue ever upward without losing our humanity.</p><p>Toward this end, Asimov&#8217;s call for a &#8220;science fictional way of thinking&#8221; is not a flight of fancy. It is, in part, a recognition that we cannot approach questions of technology and society solely with the present in mind. A mindset that fails to anticipate technological trajectories risks becoming obsolete before any idea can be implemented. Consider the dilemma posed by the internet: early pioneers of cyberspace saw it as a pure conduit of freedom, liberty, and equality. In the words of <a href="https://www.eff.org/cyberspace-independence">John Perry Barlow</a>, the internet was a place &#8220;more humane and fair than the world your governments have made before.&#8221; The reality has proven far more complex as the internet has proven a source of liberation for some and a source of oppression for others.</p><p>Asimov was right. Change is the dominant factor in society and yesterday&#8217;s perception of today almost always proves to be inadequate. At the Foundation for American Innovation, we operationalize that insight by treating science-fictional thinking as a discipline rather than a vibe. To us, science fictional thinking is not daydreaming of alien worlds or lightsabers. It is a process of backcasting from multiple plausible futures to shape today&#8217;s policy options. We consider different scenarios to stress-test our assumptions and continuously scan emerging technologies for second-order effects. In short, we take Asimov&#8217;s charge to &#8220;see the world as it will be&#8221; and translate it into concrete strategy so our decisions are resilient to tomorrow&#8217;s shocks and expand the frontier for American innovation.</p><p>But looking to the future is not sufficient. As Asimov highlights in <em>My Own View</em> and other essays, science fictional thinking requires not only foresight but also hindsight. To him, science fiction is the product of observing the advancement of science and technology and in order to imagine a plethora of futures, as Asimov did, one must have a firm grounding in the past. Technology policy is no different. As a colleague, Robert Bellafiore, has <a href="https://www.thenewatlantis.com/publications/accelerating-to-where">written before</a>, &#8220;it is precisely by looking backward that we prepare to move forward, by &#8216;remembering what had come before&#8217; that we become capable of imagining what may come next.&#8221;</p><p>Just as the ancient Roman god Janus&#8217; two faces looked both forwards and backwards in order to oversee beginnings, endings, and transitions, we aim to look to both the past and the future. It is only by doing so that we can hope to glean the foresight, imagination, and prudence to meet the challenges of inevitable change.</p><p>Our goal, then, is this: to do everything we can to make the future happen sooner.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.ansible.pub/subscribe?"><span>Subscribe now</span></a></p><p></p><p><strong>Our Work</strong></p><p>What we do is to try and approach issues of public policy in a science fictional way of thinking. Much of the DC intelligentsia surrounding technology and telecommunications approaches issues beginning with economics, sociology, or common law. These are all useful lenses from which to approach issues of public policy and many of our colleagues and competitors do incredible work from such a vantage point. Where we differ is that we choose to approach issues of public policy through the lens of technology.</p><p>It is for this reason that we spend an inordinate amount of our time learning about technology. We are fortunate enough to have built an extensive network of techies and we are not shy about leaning on their expertise. Whether it is educating ourselves about the organization and development of <a href="https://www.nationalaffairs.com/publications/detail/net-neutrality-and-information-inequality">ancient Roman road systems</a> or conducting cutting edge research on the <a href="https://travislscholten.substack.com/">future of quantum computing</a>, our team starts with the tech.</p><p>In analyzing technology, we take the approach that tech and telecomm&#8212;which are often thought of in policy circles as distinct from one another&#8212;are, in fact, inextricably linked. We consider the full tech stack as one. Platforms, cloud hosts, DNS servers, wireless transmitters, cable lines, and submarine cables all work together to bring us into the digital world and policies that are targeted at one piece of this stack have ripple effects throughout the rest. Therefore, it is a crucial part of our work to think beyond just the piece of tech being discussed but to also consider how that piece interacts with all the rest.</p><p>While we start with tech, we don&#8217;t stop there. Economics, philosophy, common law, and many other fields are crucial to our work. But in starting with tech, we have the advantage of being able to apply social science and law to tech rather than the other way around. But it would be foolish to not use all the tools at our disposal. If you&#8217;re curious about where we&#8217;re coming from, just take a glance at <a href="https://bookshop.org/shop/FAI">our Bookshop</a>.</p><p><strong>Our Future</strong></p><p>The pace of change is not slowing, and the stakes of getting it wrong are rising. In the years ahead, the frontier will be defined as much by software as by the oftentimes invisible infrastructure of compute, connectivity, chips, and standards that determine what is possible, what is profitable, and what is permissible. Those who treat technology as an exogenous force&#8212;something that &#8220;happens&#8221; and then must be managed after the fact&#8212;will find themselves forever reacting to the last disruption. Our bet is that the next era of American strength will belong to the institutions that can see the world as it will be and act early.</p><p>That is why this Substack exists. It will be our workshop in public. Some posts will be speculative, structured, evidence-based imagining anchored in what engineers are building now. Others will be more historical, because durable policy is rarely born from amnesia.</p><p>The throughline for our work is that innovation is not fate. Technological progress can widen the space of human freedom and national flourishing, but only if it is paired with the imagination to anticipate second-order effects and the prudence to build guardrails without smothering the frontier. We are uninterested in navel-gazing nostalgia and equally uninterested in na&#239;ve techno-utopianism. We care about the hard middle. We care about institutional design that lets free societies capture the upside of change while keeping the center of gravity human.</p><p>The future will be built by people who can see several moves ahead, who can learn from what came before, and who refuse to outsource tomorrow to accident. </p><p><strong>What&#8217;s in a Name?</strong></p><p>The name of this publication, <em>The Ansible,</em> describes the work we are trying to do: communicate quickly across distance&#8212;between disciplines, institutions, and futures&#8212;without ignoring the fact that distance exists. The word comes to us from the science fiction of Ursula K. Le Guin. In her novels she first introduced the ansible as a device that allows information to be transmitted instantaneously across space. But the ansible is more than just a gadget, it is a philosophy of connection: the right information sent to the right place at the right time to shape what happens next.</p><p>Le Guin never treated the ansible as a trick to make plot problems disappear. In her <em>Hainish Cycle</em> novels, she made it the backbone of an interstellar social architecture. Her cosmos is full of worlds too far apart for physical connection, even at lightspeed. Yet these varying worlds are capable of coordination because information can arrive when it is needed. The ansible enables the Ekumen, a federation that persuades instead of conquering. Communication has become a tool for reciprocity. That intuition&#8212;connection without domination&#8212;animates our work on technology and public policy. We aim to connect the people who build systems with the people who govern them, bring evidence into rooms where decisions are made, and enable pluralism.</p><p>The name also clarifies what we mean by taking on Asimov&#8217;s call to a &#8220;science-fictional way of thinking.&#8221; Science fiction at its best is neither prophecy nor mere entertainment; it is a laboratory for stress-testing assumptions. It allows us to ask how today&#8217;s architecture behaves under tomorrow&#8217;s loads. That is the method we try to bring to questions of networks, platforms, devices, and public policy.</p><p><strong>Extending the Metaphor</strong></p><p>The ansible metaphor disciplines our practice in several ways. It reminds us that information can move faster than institutions. Statutes do not change overnight, but ideas and incentives can propagate quickly and change behavior long before the ink dries on a bill. Our job is to compress the distance between insight and implementation. Speed does not excuse sloppiness; it demands clarity, because analysis that arrives late or muddled is indistinguishable from silence.</p><p>It also warns us against centralization by convenience. Le Guin&#8217;s ansible allows governments and technologists to coordinate without homogenizing. That is a design principle we try to honor in technology policy. When we champion interoperability, open standards, and contestable markets, we are not romanticizing chaos; we are acknowledging that a complex, innovative society stays resilient when no single chokepoint can dictate outcomes. Experimentation at the edge, coupled with accountability for power at the core, is how we ought to govern technology without smothering it.</p><p>A third lesson concerns tradeoffs. Even an instantaneous link has limits: bandwidth, context, interpretation. Likewise, modern networks are miracles bounded by physics and incentives. Undersea cables can be cut; satellites can be jammed; software can be hacked; supply chains can be poisoned. If policy pretends that constraints do not exist, it will push systems into failure modes. Starting with engineering humility is not technocracy; it is prudence. From that base we can apply economics and align incentives; we can apply law to protect rights and enforce responsibility; we can apply political theory to keep public institutions sovereign.</p><p><strong>The Ansible in Practice</strong></p><p>What does this metaphor mean for this publication? First, it is a promise about translation. The ansible in Le Guin&#8217;s work connects worlds that would otherwise ignore or talk past one another. Our aim is to do the same across the tech stack and the policy stack. We convene builders and policymakers, operators and scholars, civil society and regulators. We try to get deeply technical without losing legibility, and to get philosophically serious without losing purchase on implementation.</p><p>Second, it is a promise about scope. The ansible is a communications device, but in Le Guin&#8217;s hands its implications span from physics to diplomacy. So, too, our beat ranges from radio access networks to First Amendment doctrine, from datacenter interconnects to export controls, from privacy engineering to administrative law. Posts will vary in form. Some will be deep dives and some will be short opinions. All will seek to synthesize the complexities of technology and public policy into useful and actionable information.</p><p>Third, it is a promise about time. The ansible makes it possible for distant actors to coordinate while coordination still matters. In policy, timing decides whether analysis changes outcomes or becomes a tidy footnote. We aim to publish while Congress, agencies, courts, companies, and cities can still use what we write. When the facts change, we will revisit our priors.</p><p>The name guards us, too, against a common failure mode in Washington: mistaking rhetoric for reach. Faster-than-light communication does not abolish politics. It gives capable institutions the chance to coordinate and act with less friction and more foresight. That is enough. Our work is to help those institutions&#8212;public and private&#8212;see around corners, understand constraints, and choose well.</p><p><strong>What to Expect</strong></p><p>What you can expect here, then, is writing with the builders in mind and the public in view. We will begin with the technology. We will integrate economics, law, and philosophy as tools rather than talismans. We will try to be timely without being faddish, principled without being doctrinaire, and ambitious without being na&#239;ve. We will take seriously the way choices at one layer of the stack ripple across the others. We will pay attention to incentive gradients, institutional competence, and constitutional limits. Most of all, we will never pretend that complexity is an excuse for paralysis.</p><p>The last reason we chose this moniker is that the ansible refuses the fantasy of omnipotence that sometimes clings to technology. Instant communication in Le Guin&#8217;s books never makes disagreement disappear. It never erases culture or preempts moral risk. It simply gives communities a better chance to meet their responsibilities with eyes wide open. That vision keeps us oriented toward the work that matters in tech policy right now: expanding capacity without stifling competition, securing critical infrastructure without freezing innovation, moderating at scale without deputizing private censors, globalizing supply chains while hedging against authoritarian leverage.</p><p>Calling this Substack <em>The Ansible</em> is our way of committing to that balance. We want to move the right ideas quickly to the people who can use them. We want to knit together the technical and the civic, the near-term constraint and the long-term horizon. If we do our job, this publication will not just talk about the future; it will help bring the best versions of it into being sooner.</p><p>Welcome to <em>The Ansible</em>. Be sure to subscribe to get all of our latest research, opinions, and musings. Help us make the future happen sooner by sharing this with at least one other person today.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ansible.pub/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>