ClusterOS Regional Diagnostic

Cardiff Capital Region

Cardiff, United Kingdom Supercluster 7 clusters

7 clusters diagnosed across Cardiff Capital Region, drawing on 655 evidence items cross-referenced at entity level. The Coordination-Intermediary-Activity configuration fires confidently in 7 of 7 clusters.

7
Clusters diagnosed
655
Evidence items
11
Distinct stacks
ClusterRegimeDominant stallsEvidence
CCR Cyber Permission-Validation Stabilising Around Incumbents, Coordinating Instead of Deciding, Mediating Instead of Coupling 67
CCR Creative Permission-Validation Coordinating Instead of Deciding, Stabilising Around Incumbents, Waiting for Permission 76
CCR Compound Semiconductors Intermediary-Narrative Re-proving Instead of Narrowing, Coordinating Instead of Deciding, Mediating Instead of Coupling 83
Cardiff Capital Region Innovation Ecosystem Permission-Validation Stabilising Around Incumbents, Coordinating Instead of Deciding, Extracting Without Reinvesting 191
CCR Advanced Manufacturing Extraction-Intermediary Re-proving Instead of Narrowing, Extracting Without Reinvesting, Stabilising Around Incumbents 83
CCR MedTech Process-Permission Stabilising Around Incumbents, Coordinating Instead of Deciding, Extracting Without Reinvesting 79
CCR FinTech Permission-Validation Stabilising Around Incumbents, Re-proving Instead of Narrowing, Coordinating Instead of Deciding 76

No aggregate stall data yet.

Coordination-Intermediary-Activity S2 · S5 · S8 high confidence 7 clusters
Extraction-Intermediary S4 · S5 · S6 high confidence 7 clusters

Incumbents extract value via intermediary relationships; intermediaries protect incumbent access; incumbent stability suppresses the disruption that would reduce extraction.

Governance Capture S2 · S6 high confidence 6 clusters
Volume-Tolerance S1 · S3 · S8 medium confidence 7 clusters

Activity volume generates demand for more re-proving; re-proving keeps all programmes alive; forgiving keeps non-performers in the portfolio; all three pressure types absorbed.

"If one research institution or anchor (e.g., Cardiff University, Thales) were to launch a defined cyber security product/service without City Deal approval, UKRI validation, or network coordination, it might expose whether the permission–validation loop is structurally necessary or locally constructed."

Permission-Validation CCR Cyber 6-12 months medium confidence high testability

"If one anchor institution (e.g., Bad Wolf Studios, BBC Wales) were to validate a new programme/partnership by committing resources without prior coordination or external permission, it might reduce the system's ability to absorb demand signals through re-proving cycles."

Permission-Validation CCR Creative 6-12 months medium confidence high testability

"A probe could test whether documenting one case where two cluster actors (e.g., a university research group and a manufacturing firm) formed a direct partnership without CSA Catapult or CSC intermediation, and publishing a case study showing partnership formation process, timeline, and outcomes, might shift the burden of proof by demonstrating that direct coupling is feasible and whether this reduces subsequent intermediary utilisation for similar partnerships."

Intermediary-Narrative CCR Compound Semiconductors 6-12 months medium confidence high testability