<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 07 May 2026 16:24:22 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Ai”</title>
    <link>https://techtransforms.fireside.fm/tags/ai</link>
    <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 119: 5 Steps to Zero Trust</title>
  <link>https://techtransforms.fireside.fm/119</link>
  <guid isPermaLink="false">5c5b615a-5393-47ff-9be4-f8efe6f8897b</guid>
  <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/5c5b615a-5393-47ff-9be4-f8efe6f8897b.mp3" length="33764794" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this follow-up episode of Tech Transforms, Carolyn Ford and Michael Blake of Owl Cyber Defense explore what it actually takes to begin implementing Zero Trust. From discovering shadow IT and legacy systems to microsegmentation and access control, the conversation focuses on the practical steps organizations must take to limit the blast radius of a breach. The episode also examines how leaders can prioritize critical assets and build the teams needed to sustain a Zero Trust strategy over time.</itunes:subtitle>
  <itunes:duration>27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/5c5b615a-5393-47ff-9be4-f8efe6f8897b/cover.jpg?v=3"/>
  <description>&lt;p&gt;In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.&lt;/p&gt;

&lt;p&gt;From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.&lt;/p&gt;

&lt;p&gt;The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Michael Blake: &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt; | Email: &lt;a href="mailto:mblake@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;mblake@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
DoW  resources &lt;a href="https://dowcio.war.gov/Library/:" target="_blank" rel="nofollow noopener"&gt;https://dowcio.war.gov/Library/:&lt;/a&gt; security controls, checklist, self assessment, Penn test guidelines etc&lt;br&gt;
Zero Trust | &lt;a href="http://www.dau.edu" target="_blank" rel="nofollow noopener"&gt;www.dau.edu&lt;/a&gt;&lt;br&gt;
Dell Technologies Project Fort Zero to Transform Security | Dell USA&lt;br&gt;
MITRE papers on evolving  threats of giving AI access to network - &lt;a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" target="_blank" rel="nofollow noopener"&gt;https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/&lt;/a&gt;&lt;br&gt;
Owl ZT resources: &lt;a href="https://owlcyberdefense.com/zero-trust-cds/" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com/zero-trust-cds/&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: &lt;a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" target="_blank" rel="nofollow noopener"&gt;https://theblufpodcast.podbean.com/e/thebluf_episode12/&lt;/a&gt; &lt;a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" target="_blank" rel="nofollow noopener"&gt;https://theblufpodcast.podbean.com/e/thebluf_episode13/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, micro segmentation, Legacy systems, partnerships</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 117: 2026 Predictions.  What's Now. What's Next. What's Urgent.</title>
  <link>https://techtransforms.fireside.fm/117</link>
  <guid isPermaLink="false">0d0c1022-0966-4f5b-95b9-5a2414246f50</guid>
  <pubDate>Fri, 27 Feb 2026 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/0d0c1022-0966-4f5b-95b9-5a2414246f50.mp3" length="69081976" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford and the Owl Cyber Defense team unpack the signals already reshaping cybersecurity, AI, and defense. From the collapse of content trust to AI containment and hardware-enforced security, they explore why software alone won’t be enough in the year ahead. The message is clear: in 2026, leaders won’t lose because they lacked tools—they’ll lose because they trusted the wrong ones.</itunes:subtitle>
  <itunes:duration>57:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/0/0d0c1022-0966-4f5b-95b9-5a2414246f50/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.&lt;/p&gt;

&lt;p&gt;This isn’t speculation. It’s trajectory.&lt;/p&gt;

&lt;p&gt;The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.&lt;br&gt;
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.&lt;/p&gt;

&lt;p&gt;The episode also explores:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster&lt;/li&gt;
&lt;li&gt;Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust&lt;/li&gt;
&lt;li&gt;How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits&lt;/li&gt;
&lt;li&gt;The limits of Zero Trust when complexity, cost, and talent gaps collide&lt;/li&gt;
&lt;li&gt;Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.&lt;/p&gt;

&lt;p&gt;The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.&lt;/p&gt;

&lt;p&gt;This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.&lt;/p&gt;

&lt;p&gt;Stay curious. The future isn’t waiting.&lt;/p&gt;

&lt;p&gt;Shownotes&lt;br&gt;
Scott Orton: &lt;a href="https://www.linkedin.com/in/scottorton/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email: &lt;a href="mailto:sorton@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;sorton@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Brian Carter: &lt;a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email:&lt;a href="mailto:bcarter@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;bcarter@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Ralph Spada: &lt;a href="https://www.linkedin.com/in/ralphspada/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email: &lt;a href="mailto:rspada@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;rspada@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Michael Blake: &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt; | Email: &lt;a href="mailto:mblake@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;mblake@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Owl Cyber Defense: owlcyberdefense.com&lt;br&gt;
Download the 2026 Predictions Report:  &lt;a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/&lt;/a&gt;&lt;br&gt;
Story - Power Ranger Hacker: &lt;a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" target="_blank" rel="nofollow noopener"&gt;https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, owl cyber defense, tech transforms, cross-domain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 116: So What Returns.....Can the Pentagon Really Boil the Ocean?</title>
  <link>https://techtransforms.fireside.fm/116</link>
  <guid isPermaLink="false">9ea4f6bf-1da6-447e-9306-369116ad2876</guid>
  <pubDate>Tue, 17 Feb 2026 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/9ea4f6bf-1da6-447e-9306-369116ad2876.mp3" length="56251592" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>The Pentagon is consolidating R&amp;D, AI, and data under a single CTO and it could reshape how defense innovation moves from research to real-world deployment. In this episode of Tech Transforms, Carolyn Ford and Tracy Bannon break down what this shift actually means beyond the org chart. They explore secure GenAI rollout, data ownership challenges, and the cultural friction that could determine success. If you’re watching the future of AI in national security, this conversation is worth a listen.</itunes:subtitle>
  <itunes:duration>46:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/9/9ea4f6bf-1da6-447e-9306-369116ad2876/cover.jpg?v=1"/>
  <description>&lt;p&gt;n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&amp;amp;D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.&lt;/p&gt;

&lt;p&gt;Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.&lt;/p&gt;

&lt;p&gt;Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”&lt;br&gt;
They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.&lt;/p&gt;

&lt;p&gt;Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.&lt;/p&gt;

&lt;p&gt;This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/Tracyylbannon/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/Tracyylbannon/&lt;/a&gt;&lt;br&gt;
E-mail:  &lt;a href="mailto:Trac@Tracybannon.tech" target="_blank" rel="nofollow noopener"&gt;Trac@Tracybannon.tech&lt;/a&gt; &lt;br&gt;
Website:  &lt;a href="https://Tracybannon.tech/" target="_blank" rel="nofollow noopener"&gt;https://Tracybannon.tech/&lt;/a&gt;&lt;br&gt;
Breaking Defense: Pentagon Reforms R&amp;amp;D and AI- &lt;a href="https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/" target="_blank" rel="nofollow noopener"&gt;https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/&lt;/a&gt;&lt;br&gt;
Tracy Bannon Blog: &lt;a href="https://straighttalk4gov.org/" target="_blank" rel="nofollow noopener"&gt;https://straighttalk4gov.org/&lt;/a&gt; &lt;br&gt;
GenAI.mil Info: &lt;a href="https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/" target="_blank" rel="nofollow noopener"&gt;https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/&lt;/a&gt;&lt;br&gt;
Advana background: &lt;a href="https://www.ai.mil/Initiatives/Analytic-Tools/" target="_blank" rel="nofollow noopener"&gt;https://www.ai.mil/Initiatives/Analytic-Tools/&lt;/a&gt;&lt;br&gt;
Moltbook:  &lt;a href="https://www.moltbook.com/" target="_blank" rel="nofollow noopener"&gt;https://www.moltbook.com/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>pentagon, R&amp;D, AI, Defense, research, battle field deployment</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&amp;D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.</p>

<p>Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.</p>

<p>Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”<br>
They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.</p>

<p>Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.</p>

<p>This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.</p>

<p>Show Notes:<br>
LinkedIn: <a href="https://www.linkedin.com/in/Tracyylbannon/" rel="nofollow">https://www.linkedin.com/in/Tracyylbannon/</a><br>
E-mail:  <a href="mailto:Trac@Tracybannon.tech" rel="nofollow">Trac@Tracybannon.tech</a> <br>
Website:  <a href="https://Tracybannon.tech/" rel="nofollow">https://Tracybannon.tech/</a><br>
Breaking Defense: Pentagon Reforms R&amp;D and AI- <a href="https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/" rel="nofollow">https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/</a><br>
Tracy Bannon Blog: <a href="https://straighttalk4gov.org/" rel="nofollow">https://straighttalk4gov.org/</a> <br>
GenAI.mil Info: <a href="https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/" rel="nofollow">https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/</a><br>
Advana background: <a href="https://www.ai.mil/Initiatives/Analytic-Tools/" rel="nofollow">https://www.ai.mil/Initiatives/Analytic-Tools/</a><br>
Moltbook:  <a href="https://www.moltbook.com/" rel="nofollow">https://www.moltbook.com/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&amp;D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.</p>

<p>Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.</p>

<p>Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”<br>
They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.</p>

<p>Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.</p>

<p>This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.</p>

<p>Show Notes:<br>
LinkedIn: <a href="https://www.linkedin.com/in/Tracyylbannon/" rel="nofollow">https://www.linkedin.com/in/Tracyylbannon/</a><br>
E-mail:  <a href="mailto:Trac@Tracybannon.tech" rel="nofollow">Trac@Tracybannon.tech</a> <br>
Website:  <a href="https://Tracybannon.tech/" rel="nofollow">https://Tracybannon.tech/</a><br>
Breaking Defense: Pentagon Reforms R&amp;D and AI- <a href="https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/" rel="nofollow">https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/</a><br>
Tracy Bannon Blog: <a href="https://straighttalk4gov.org/" rel="nofollow">https://straighttalk4gov.org/</a> <br>
GenAI.mil Info: <a href="https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/" rel="nofollow">https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/</a><br>
Advana background: <a href="https://www.ai.mil/Initiatives/Analytic-Tools/" rel="nofollow">https://www.ai.mil/Initiatives/Analytic-Tools/</a><br>
Moltbook:  <a href="https://www.moltbook.com/" rel="nofollow">https://www.moltbook.com/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 112: Tech Transforms – Live from the Owl Evolution Summit</title>
  <link>https://techtransforms.fireside.fm/112</link>
  <guid isPermaLink="false">507649cd-f89f-409e-99d2-982d12106868</guid>
  <pubDate>Fri, 26 Dec 2025 11:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/507649cd-f89f-409e-99d2-982d12106868.mp3" length="37582180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>26:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
  <description>&lt;p&gt;Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package).&lt;/p&gt;

&lt;p&gt;The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume.&lt;/p&gt;

&lt;p&gt;A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” &lt;/p&gt;

&lt;p&gt;The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief. &lt;/p&gt;
</description>
  <itunes:keywords>techtransforms, decision advantage, evolution summit, OODA Loop</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package).</p>

<p>The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume.</p>

<p>A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” </p>

<p>The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package).</p>

<p>The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume.</p>

<p>A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” </p>

<p>The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 107: The Curious Case of AI  - Part 1 (The Chills)</title>
  <link>https://techtransforms.fireside.fm/107</link>
  <guid isPermaLink="false">347de276-8530-4e39-b23c-fc3fe9dd8b25</guid>
  <pubDate>Tue, 07 Oct 2025 09:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/347de276-8530-4e39-b23c-fc3fe9dd8b25.mp3" length="42367496" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this Tech Transforms Halloween special, host Carolyn Ford and futurist Joseph Bradley explore the unsettling side of AI. From identic AI that mirrors human identity to the risks of bias and the rise of cognitive cities, they discuss why trust, ethics, and purpose must guide how we design and deploy artificial intelligence. This episode asks the critical question: will our AI future look more like The Borg… or The Federation?</itunes:subtitle>
  <itunes:duration>35:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/3/347de276-8530-4e39-b23c-fc3fe9dd8b25/cover.jpg?v=1"/>
  <description>&lt;p&gt;The Curious Case of AI - A Two-Part Special (“The Chills”)&lt;br&gt;
In this Tech Transforms Halloween “Chills” episode, host Carolyn Ford and futurist Joseph Bradley explore the eerie, but essential, questions AI raises. Using Star Trek as their guide, they look at how “identic AI”, technology that mirrors identity, preferences, and even purpose can feel both thrilling and unsettling.&lt;br&gt;
Bradley, a strong believer in AI’s potential, points out that every powerful tool comes with risks if it’s misused. Together, he and Carolyn discuss what happens when efficiency is valued over happiness, how bias can creep in if we aren’t intentional, and why cognitive cities must be built with trust and ethics at the core. Think less “the end is near” and more “what safeguards do we need to make sure this future works for people?”&lt;br&gt;
This episode sets the stage for leaders, innovators, and everyday users to think critically about how AI shapes identity, relationships, and society, while remembering that the choices we make now will decide whether the future feels like The Borg… or The Federation.&lt;/p&gt;

&lt;p&gt;Mentioned in this episode:&lt;br&gt;
Joseph Bradley’s book U to the Power of 2 (Pre-order: josephmbradley.com | ​​&lt;a href="https://shop.u-x2.ai/" target="_blank" rel="nofollow noopener"&gt;https://shop.u-x2.ai/&lt;/a&gt;)&lt;br&gt;
Paperclip dilemma thought experiment - &lt;a href="https://nickbostrom.com/ethics/ai" target="_blank" rel="nofollow noopener"&gt;https://nickbostrom.com/ethics/ai&lt;/a&gt;&lt;br&gt;
Smart vs. Cognitive Cities &lt;a href="https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf" target="_blank" rel="nofollow noopener"&gt;https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf&lt;/a&gt;&lt;br&gt;
Questioneering: The New Model for Innovative Leaders in the Digital Age &lt;/p&gt;
</description>
  <itunes:keywords>Identic AI, Agentic AI, AI and happiness, Smart cities, cognitive cities</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The Curious Case of AI - A Two-Part Special (“The Chills”)<br>
In this Tech Transforms Halloween “Chills” episode, host Carolyn Ford and futurist Joseph Bradley explore the eerie, but essential, questions AI raises. Using Star Trek as their guide, they look at how “identic AI”, technology that mirrors identity, preferences, and even purpose can feel both thrilling and unsettling.<br>
Bradley, a strong believer in AI’s potential, points out that every powerful tool comes with risks if it’s misused. Together, he and Carolyn discuss what happens when efficiency is valued over happiness, how bias can creep in if we aren’t intentional, and why cognitive cities must be built with trust and ethics at the core. Think less “the end is near” and more “what safeguards do we need to make sure this future works for people?”<br>
This episode sets the stage for leaders, innovators, and everyday users to think critically about how AI shapes identity, relationships, and society, while remembering that the choices we make now will decide whether the future feels like The Borg… or The Federation.</p>

<p>Mentioned in this episode:<br>
Joseph Bradley’s book U to the Power of 2 (Pre-order: josephmbradley.com | ​​<a href="https://shop.u-x2.ai/" rel="nofollow">https://shop.u-x2.ai/</a>)<br>
Paperclip dilemma thought experiment - <a href="https://nickbostrom.com/ethics/ai" rel="nofollow">https://nickbostrom.com/ethics/ai</a><br>
Smart vs. Cognitive Cities <a href="https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf" rel="nofollow">https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf</a><br>
Questioneering: The New Model for Innovative Leaders in the Digital Age </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The Curious Case of AI - A Two-Part Special (“The Chills”)<br>
In this Tech Transforms Halloween “Chills” episode, host Carolyn Ford and futurist Joseph Bradley explore the eerie, but essential, questions AI raises. Using Star Trek as their guide, they look at how “identic AI”, technology that mirrors identity, preferences, and even purpose can feel both thrilling and unsettling.<br>
Bradley, a strong believer in AI’s potential, points out that every powerful tool comes with risks if it’s misused. Together, he and Carolyn discuss what happens when efficiency is valued over happiness, how bias can creep in if we aren’t intentional, and why cognitive cities must be built with trust and ethics at the core. Think less “the end is near” and more “what safeguards do we need to make sure this future works for people?”<br>
This episode sets the stage for leaders, innovators, and everyday users to think critically about how AI shapes identity, relationships, and society, while remembering that the choices we make now will decide whether the future feels like The Borg… or The Federation.</p>

<p>Mentioned in this episode:<br>
Joseph Bradley’s book U to the Power of 2 (Pre-order: josephmbradley.com | ​​<a href="https://shop.u-x2.ai/" rel="nofollow">https://shop.u-x2.ai/</a>)<br>
Paperclip dilemma thought experiment - <a href="https://nickbostrom.com/ethics/ai" rel="nofollow">https://nickbostrom.com/ethics/ai</a><br>
Smart vs. Cognitive Cities <a href="https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf" rel="nofollow">https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf</a><br>
Questioneering: The New Model for Innovative Leaders in the Digital Age </p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 100: Trusting AI and Warfighting Technologies</title>
  <link>https://techtransforms.fireside.fm/100</link>
  <guid isPermaLink="false">c334be8e-9ddc-4201-83e3-605b840a08d7</guid>
  <pubDate>Tue, 01 Jul 2025 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/c334be8e-9ddc-4201-83e3-605b840a08d7.mp3" length="64734028" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In our 100th episode, Lt. General Susan Lawrence, President &amp; CEO of AFCEA International and former CIO of the U.S. Army, joins Tech Transforms to talk trusted AI, cyber readiness, and how the human element must remain central in defense innovation. From battlefield examples to the future of cross-sector collaboration, this conversation is a powerful look at what it really takes to secure tomorrow.</itunes:subtitle>
  <itunes:duration>44:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/c/c334be8e-9ddc-4201-83e3-605b840a08d7/cover.jpg?v=1"/>
  <description>&lt;p&gt;What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?&lt;/p&gt;

&lt;p&gt;In our milestone 100th episode, Lt. General Susan Lawrence, President &amp;amp; CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why cybersecurity and data integrity must be the foundation of AI adoption&lt;/li&gt;
&lt;li&gt;How real-world conflicts like Ukraine are reshaping battlefield technologies&lt;/li&gt;
&lt;li&gt;What ethical AI deployment looks like across the military, government, and industry&lt;/li&gt;
&lt;li&gt;Why collaboration, not competition, is key to staying ahead of adversaries&lt;/li&gt;
&lt;li&gt;How to prepare today’s workforce for tomorrow’s digital fight&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you're in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience. &lt;/p&gt;
</description>
  <itunes:keywords>Cybersecurity, Defense, Innovation, AFCEA, EmergingTech, AI Ethics, Data Integrity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?</p>

<p>In our milestone 100th episode, Lt. General Susan Lawrence, President &amp; CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:</p>

<ul>
<li>Why cybersecurity and data integrity must be the foundation of AI adoption</li>
<li>How real-world conflicts like Ukraine are reshaping battlefield technologies</li>
<li>What ethical AI deployment looks like across the military, government, and industry</li>
<li>Why collaboration, not competition, is key to staying ahead of adversaries</li>
<li>How to prepare today’s workforce for tomorrow’s digital fight</li>
</ul>

<p>Whether you&#39;re in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?</p>

<p>In our milestone 100th episode, Lt. General Susan Lawrence, President &amp; CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:</p>

<ul>
<li>Why cybersecurity and data integrity must be the foundation of AI adoption</li>
<li>How real-world conflicts like Ukraine are reshaping battlefield technologies</li>
<li>What ethical AI deployment looks like across the military, government, and industry</li>
<li>Why collaboration, not competition, is key to staying ahead of adversaries</li>
<li>How to prepare today’s workforce for tomorrow’s digital fight</li>
</ul>

<p>Whether you&#39;re in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Prompting the Future: AI, Leadership, and the Military Mindset with Capt. M. Scott Austin, USCG </title>
  <link>https://techtransforms.fireside.fm/97</link>
  <guid isPermaLink="false">867d9379-048f-4d5b-87a7-d62144ddec46</guid>
  <pubDate>Tue, 20 May 2025 11:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/867d9379-048f-4d5b-87a7-d62144ddec46.mp3" length="61365704" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>When Capt. Scott Austin hears the phrase "prompt engineering," he thinks about leadership, not syntax. On this episode of Tech Transforms, Carolyn and Scott unpack how military leaders can integrate AI in ways that actually work—starting with empathy, problem definition, and a little R2-D2 wisdom. </itunes:subtitle>
  <itunes:duration>41:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/8/867d9379-048f-4d5b-87a7-d62144ddec46/cover.jpg?v=2"/>
  <description>&lt;p&gt;When military leaders say, “Get me some of that AI,” what are they really asking for? In this episode of &lt;em&gt;Tech Transforms&lt;/em&gt;, host Carolyn Ford is joined by Capt. M. Scott Austin, a Fellow at the Carnegie Mellon Institute for Strategy and Technology and a U.S. Coast Guard veteran. Together, they unpack what “prompt engineering” really means—not just for AI users, but for mission-driven leaders.&lt;/p&gt;

&lt;p&gt;Capt. Austin challenges the hype, emphasizing the need for clear problem definition, strategic alignment, and human-centered design when applying AI in defense and beyond. They explore how AI can “buy back time,” why empathy is a critical leadership skill in tech adoption, and whether C-3PO or R2-D2 is the better model for agentic warfare.&lt;/p&gt;

&lt;p&gt;You’ll hear:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why the best prompt engineering starts with leadership, not code&lt;/li&gt;
&lt;li&gt;What military organizations can teach us about AI adoption and design thinking&lt;/li&gt;
&lt;li&gt;The difference between generative and agentic AI—and why it matters&lt;/li&gt;
&lt;li&gt;A surprising take on AI’s boot camp curriculum (spoiler: not swimming)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you're building policy, coding tools, or just trying to avoid another expense report, this episode will expand your thinking about AI’s role in high-stakes environments.&lt;/p&gt;
</description>
  <itunes:keywords>prompt engineering, AI, agentic warfare</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>When military leaders say, “Get me some of that AI,” what are they really asking for? In this episode of <em>Tech Transforms</em>, host Carolyn Ford is joined by Capt. M. Scott Austin, a Fellow at the Carnegie Mellon Institute for Strategy and Technology and a U.S. Coast Guard veteran. Together, they unpack what “prompt engineering” really means—not just for AI users, but for mission-driven leaders.</p>

<p>Capt. Austin challenges the hype, emphasizing the need for clear problem definition, strategic alignment, and human-centered design when applying AI in defense and beyond. They explore how AI can “buy back time,” why empathy is a critical leadership skill in tech adoption, and whether C-3PO or R2-D2 is the better model for agentic warfare.</p>

<p>You’ll hear:</p>

<ul>
<li>Why the best prompt engineering starts with leadership, not code</li>
<li>What military organizations can teach us about AI adoption and design thinking</li>
<li>The difference between generative and agentic AI—and why it matters</li>
<li>A surprising take on AI’s boot camp curriculum (spoiler: not swimming)</li>
</ul>

<p>Whether you&#39;re building policy, coding tools, or just trying to avoid another expense report, this episode will expand your thinking about AI’s role in high-stakes environments.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>When military leaders say, “Get me some of that AI,” what are they really asking for? In this episode of <em>Tech Transforms</em>, host Carolyn Ford is joined by Capt. M. Scott Austin, a Fellow at the Carnegie Mellon Institute for Strategy and Technology and a U.S. Coast Guard veteran. Together, they unpack what “prompt engineering” really means—not just for AI users, but for mission-driven leaders.</p>

<p>Capt. Austin challenges the hype, emphasizing the need for clear problem definition, strategic alignment, and human-centered design when applying AI in defense and beyond. They explore how AI can “buy back time,” why empathy is a critical leadership skill in tech adoption, and whether C-3PO or R2-D2 is the better model for agentic warfare.</p>

<p>You’ll hear:</p>

<ul>
<li>Why the best prompt engineering starts with leadership, not code</li>
<li>What military organizations can teach us about AI adoption and design thinking</li>
<li>The difference between generative and agentic AI—and why it matters</li>
<li>A surprising take on AI’s boot camp curriculum (spoiler: not swimming)</li>
</ul>

<p>Whether you&#39;re building policy, coding tools, or just trying to avoid another expense report, this episode will expand your thinking about AI’s role in high-stakes environments.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 96: Tech Transforms + ATARC: AI, Oceans, and Innovation with NOAA’s Frank Indiviglio</title>
  <link>https://techtransforms.fireside.fm/96</link>
  <guid isPermaLink="false">98de7466-e44b-4f25-90ba-08930b50a145</guid>
  <pubDate>Tue, 06 May 2025 13:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/98de7466-e44b-4f25-90ba-08930b50a145.mp3" length="3609884" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this special crossover episode with ATARC, I sit down with Frank Indiviglio, Chief Technology Officer at NOAA, to explore how cutting-edge technology is revolutionizing our understanding of the planet. From hurricane forecasting to coral reef monitoring, Frank unpacks how AI, data science, and high-performance computing transform vast raw data into real-world impact. We dive into everything from boosting data processing efficiency to balancing open data with cybersecurity—all while showing how cross-sector collaboration drives innovation at NOAA. Don’t miss this fascinating ATARC-powered conversation!</itunes:subtitle>
  <itunes:duration>30:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/9/98de7466-e44b-4f25-90ba-08930b50a145/cover.jpg?v=1"/>
  <description>&lt;p&gt;Show Notes:&lt;/p&gt;

&lt;p&gt;In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.&lt;/p&gt;

&lt;p&gt;Resources &amp;amp; Links:&lt;br&gt;
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai&lt;br&gt;
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio&lt;/p&gt;

&lt;p&gt;Tune in for insights on the future of AI, oceans, and innovation! &lt;/p&gt;
</description>
  <itunes:keywords>#AIatScale #GovernmentInnovation #ClimateTechnology #NOAA #ATARC</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Show Notes:</p>

<p>In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.</p>

<p>Resources &amp; Links:<br>
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai<br>
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio</p>

<p>Tune in for insights on the future of AI, oceans, and innovation!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Show Notes:</p>

<p>In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.</p>

<p>Resources &amp; Links:<br>
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai<br>
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio</p>

<p>Tune in for insights on the future of AI, oceans, and innovation!</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Zero Trust at the Edge: Securing Data, Devices, and Decisions</title>
  <link>https://techtransforms.fireside.fm/95</link>
  <guid isPermaLink="false">7c0dc3cc-0072-464b-9128-02e00c6ed9e5</guid>
  <pubDate>Tue, 29 Apr 2025 16:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/7c0dc3cc-0072-464b-9128-02e00c6ed9e5.mp3" length="54360953" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Randy Clark, cybersecurity strategist and contributor to SIGNAL Magazine, joins Carolyn Ford to explain why the future of secure data lies at the edge. From smart cities to AI-driven infrastructure, Randy breaks down how zero trust data works — and why labeling, encrypting, and governing data from the moment it’s created can change everything. They talk edge AI, data sovereignty, and why trusting your thermostat might be harder than it looks. Plus: why the 1980s weren’t ready for this tech, and how protecting data—not just networks—could reshape public safety and defense.</itunes:subtitle>
  <itunes:duration>45:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/7/7c0dc3cc-0072-464b-9128-02e00c6ed9e5/cover.jpg?v=1"/>
  <description>&lt;p&gt;What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of &lt;em&gt;Tech Transforms&lt;/em&gt;, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust. &lt;/p&gt;
</description>
  <itunes:keywords>zero trust, IoT, AI, data, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of <em>Tech Transforms</em>, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of <em>Tech Transforms</em>, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>5 AI Predictions for 2025 &amp; How to Build Intelligent Agents with Dave Egts</title>
  <link>https://techtransforms.fireside.fm/92</link>
  <guid isPermaLink="false">c31e32b4-2c14-451e-a48f-d6e0562ff037</guid>
  <pubDate>Mon, 31 Mar 2025 18:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/c31e32b4-2c14-451e-a48f-d6e0562ff037.mp3" length="110270548" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Field CTO at MuleSoft (a Salesforce company), Dave Egts returns to Tech Transforms with Carolyn Ford to unpack his “5 AI Predictions for 2025.” In this action-packed episode, Dave dives deep into the rise of intelligent AI agents—and what separates real value from hype. From large action models to personal assistants that actually get stuff done, Dave shares real-world examples (and a few Battlestar Galactica references) that reveal how agencies and enterprises can start using AI to reduce drudgery, improve outcomes, and scale with confidence.

Whether you're an IT leader or just AI-curious, this episode is your tactical guide to agentic AI, small language models, and what to expect next.</itunes:subtitle>
  <itunes:duration>45:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/c/c31e32b4-2c14-451e-a48f-d6e0562ff037/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, Carolyn welcomes back Dave Egts, Field CTO at MuleSoft, to explore the transformative power of AI in 2025. They dive into Dave’s top five AI predictions, with a special focus on the rise of agentic AI—AI that doesn’t just suggest, but acts. Dave explains the difference between generative AI and intelligent agents, why integration via APIs is the key to agent success, and how government agencies can prepare now.&lt;/p&gt;

&lt;p&gt;Listeners will learn:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What “large action models” (LAMs) are, and how they differ from large language models&lt;/li&gt;
&lt;li&gt;How AI agents are already reducing friction in Salesforce and Slack&lt;/li&gt;
&lt;li&gt;Why AI success depends on access to high-quality, actionable data&lt;/li&gt;
&lt;li&gt;What’s driving the shift toward small language models and what that means for secure, on-device AI&lt;/li&gt;
&lt;li&gt;Why “agent-washing” is the new “AI-washing”—and how to spot it&lt;/li&gt;
&lt;li&gt;What makes a truly impactful agent vs. a glorified chatbot&lt;/li&gt;
&lt;li&gt;Dave’s favorite sci-fi robot, a monkey’s paw superpower wish, and what tech breakthrough he thinks is coming next&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;📌 Show Notes:&lt;/p&gt;

&lt;p&gt;Guest: Dave Egts, Field CTO at MuleSoft, a Salesforce company&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/davidegts/" target="_blank" rel="nofollow noopener"&gt;🔗 Follow Dave on LinkedIn&lt;br&gt;
&lt;/a&gt;&lt;br&gt;
🎧&lt;a href="https://dgshow.org/'" target="_blank" rel="nofollow noopener"&gt; Listen to the Dave &amp;amp; Gunnar Show&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Key Topics:&lt;/p&gt;

&lt;p&gt;[00:00] Intro &amp;amp; Dave’s blog: “5 AI Predictions for 2025”&lt;/p&gt;

&lt;p&gt;[03:00] What’s an AI agent? Why they’re different from GenAI&lt;/p&gt;

&lt;p&gt;[07:30] Real-world examples from Salesforce: Agentforce in action&lt;/p&gt;

&lt;p&gt;[14:00] The importance of APIs for agent success&lt;/p&gt;

&lt;p&gt;[15:45] Government use cases &amp;amp; security considerations&lt;/p&gt;

&lt;p&gt;[18:00] Internal AI agents that reduce toil (meeting schedulers, IT help, expense reports)&lt;/p&gt;

&lt;p&gt;[22:00] Cylon references &amp;amp; the power of digital labor in public sector&lt;/p&gt;

&lt;p&gt;[29:00] Small Language Models: Why smaller might be better&lt;/p&gt;

&lt;p&gt;[36:00] LLM Routers explained&lt;/p&gt;

&lt;p&gt;[38:00] Fun Tech Talk Q&amp;amp;A (Superpowers, overhyped trends, sci-fi names)&lt;/p&gt;

&lt;p&gt;Resources Mentioned:&lt;br&gt;
&lt;a href="https://blogs.mulesoft.com/digital-transformation/ai-predictions/" target="_blank" rel="nofollow noopener"&gt;📖 Dave's Blog: 5 AI Predictions for 2025: Opportunities Tech Leaders Must Seize This Year &lt;br&gt;
&lt;/a&gt;&lt;br&gt;
&lt;a href="https://trailhead.salesforce.com/" target="_blank" rel="nofollow noopener"&gt;💡 Trailhead Learning Platform from Salesforce: Learn to build your own agent&lt;br&gt;
&lt;/a&gt;&lt;br&gt;
&lt;a href="https://help.salesforce.com/s/?language=en_US" target="_blank" rel="nofollow noopener"&gt;🤖 Help.Salesforce.com – Try Agentforce&lt;br&gt;
&lt;/a&gt;&lt;br&gt;
&lt;a href="https://en.wikipedia.org/wiki/Forbidden_Planet" target="_blank" rel="nofollow noopener"&gt;📺 Forbidden Planet (Robby the Robot)&lt;br&gt;
&lt;/a&gt;&lt;br&gt;
&lt;a href="https://en.wikipedia.org/wiki/The_Monkey%27s_Paw" target="_blank" rel="nofollow noopener"&gt;🐒 Monkey’s Paw story reference&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>AI, Salesforce, Chatbots, LLM</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, Carolyn welcomes back Dave Egts, Field CTO at MuleSoft, to explore the transformative power of AI in 2025. They dive into Dave’s top five AI predictions, with a special focus on the rise of agentic AI—AI that doesn’t just suggest, but acts. Dave explains the difference between generative AI and intelligent agents, why integration via APIs is the key to agent success, and how government agencies can prepare now.</p>

<p>Listeners will learn:</p>

<ul>
<li>What “large action models” (LAMs) are, and how they differ from large language models</li>
<li>How AI agents are already reducing friction in Salesforce and Slack</li>
<li>Why AI success depends on access to high-quality, actionable data</li>
<li>What’s driving the shift toward small language models and what that means for secure, on-device AI</li>
<li>Why “agent-washing” is the new “AI-washing”—and how to spot it</li>
<li>What makes a truly impactful agent vs. a glorified chatbot</li>
<li>Dave’s favorite sci-fi robot, a monkey’s paw superpower wish, and what tech breakthrough he thinks is coming next</li>
</ul>

<p>📌 Show Notes:</p>

<p>Guest: Dave Egts, Field CTO at MuleSoft, a Salesforce company<br>
<a href="https://www.linkedin.com/in/davidegts/" rel="nofollow">🔗 Follow Dave on LinkedIn<br>
</a><br>
🎧<a href="https://dgshow.org/&#x27;" rel="nofollow"> Listen to the Dave &amp; Gunnar Show</a></p>

<p>Key Topics:</p>

<p>[00:00] Intro &amp; Dave’s blog: “5 AI Predictions for 2025”</p>

<p>[03:00] What’s an AI agent? Why they’re different from GenAI</p>

<p>[07:30] Real-world examples from Salesforce: Agentforce in action</p>

<p>[14:00] The importance of APIs for agent success</p>

<p>[15:45] Government use cases &amp; security considerations</p>

<p>[18:00] Internal AI agents that reduce toil (meeting schedulers, IT help, expense reports)</p>

<p>[22:00] Cylon references &amp; the power of digital labor in public sector</p>

<p>[29:00] Small Language Models: Why smaller might be better</p>

<p>[36:00] LLM Routers explained</p>

<p>[38:00] Fun Tech Talk Q&amp;A (Superpowers, overhyped trends, sci-fi names)</p>

<p>Resources Mentioned:<br>
<a href="https://blogs.mulesoft.com/digital-transformation/ai-predictions/" rel="nofollow">📖 Dave&#39;s Blog: 5 AI Predictions for 2025: Opportunities Tech Leaders Must Seize This Year <br>
</a><br>
<a href="https://trailhead.salesforce.com/" rel="nofollow">💡 Trailhead Learning Platform from Salesforce: Learn to build your own agent<br>
</a><br>
<a href="https://help.salesforce.com/s/?language=en_US" rel="nofollow">🤖 Help.Salesforce.com – Try Agentforce<br>
</a><br>
<a href="https://en.wikipedia.org/wiki/Forbidden_Planet" rel="nofollow">📺 Forbidden Planet (Robby the Robot)<br>
</a><br>
<a href="https://en.wikipedia.org/wiki/The_Monkey%27s_Paw" rel="nofollow">🐒 Monkey’s Paw story reference</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, Carolyn welcomes back Dave Egts, Field CTO at MuleSoft, to explore the transformative power of AI in 2025. They dive into Dave’s top five AI predictions, with a special focus on the rise of agentic AI—AI that doesn’t just suggest, but acts. Dave explains the difference between generative AI and intelligent agents, why integration via APIs is the key to agent success, and how government agencies can prepare now.</p>

<p>Listeners will learn:</p>

<ul>
<li>What “large action models” (LAMs) are, and how they differ from large language models</li>
<li>How AI agents are already reducing friction in Salesforce and Slack</li>
<li>Why AI success depends on access to high-quality, actionable data</li>
<li>What’s driving the shift toward small language models and what that means for secure, on-device AI</li>
<li>Why “agent-washing” is the new “AI-washing”—and how to spot it</li>
<li>What makes a truly impactful agent vs. a glorified chatbot</li>
<li>Dave’s favorite sci-fi robot, a monkey’s paw superpower wish, and what tech breakthrough he thinks is coming next</li>
</ul>

<p>📌 Show Notes:</p>

<p>Guest: Dave Egts, Field CTO at MuleSoft, a Salesforce company<br>
<a href="https://www.linkedin.com/in/davidegts/" rel="nofollow">🔗 Follow Dave on LinkedIn<br>
</a><br>
🎧<a href="https://dgshow.org/&#x27;" rel="nofollow"> Listen to the Dave &amp; Gunnar Show</a></p>

<p>Key Topics:</p>

<p>[00:00] Intro &amp; Dave’s blog: “5 AI Predictions for 2025”</p>

<p>[03:00] What’s an AI agent? Why they’re different from GenAI</p>

<p>[07:30] Real-world examples from Salesforce: Agentforce in action</p>

<p>[14:00] The importance of APIs for agent success</p>

<p>[15:45] Government use cases &amp; security considerations</p>

<p>[18:00] Internal AI agents that reduce toil (meeting schedulers, IT help, expense reports)</p>

<p>[22:00] Cylon references &amp; the power of digital labor in public sector</p>

<p>[29:00] Small Language Models: Why smaller might be better</p>

<p>[36:00] LLM Routers explained</p>

<p>[38:00] Fun Tech Talk Q&amp;A (Superpowers, overhyped trends, sci-fi names)</p>

<p>Resources Mentioned:<br>
<a href="https://blogs.mulesoft.com/digital-transformation/ai-predictions/" rel="nofollow">📖 Dave&#39;s Blog: 5 AI Predictions for 2025: Opportunities Tech Leaders Must Seize This Year <br>
</a><br>
<a href="https://trailhead.salesforce.com/" rel="nofollow">💡 Trailhead Learning Platform from Salesforce: Learn to build your own agent<br>
</a><br>
<a href="https://help.salesforce.com/s/?language=en_US" rel="nofollow">🤖 Help.Salesforce.com – Try Agentforce<br>
</a><br>
<a href="https://en.wikipedia.org/wiki/Forbidden_Planet" rel="nofollow">📺 Forbidden Planet (Robby the Robot)<br>
</a><br>
<a href="https://en.wikipedia.org/wiki/The_Monkey%27s_Paw" rel="nofollow">🐒 Monkey’s Paw story reference</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Open Source for Classified Environments</title>
  <link>https://techtransforms.fireside.fm/90</link>
  <guid isPermaLink="false">edf6d919-406f-49f7-9394-46cf8c2d5dca</guid>
  <pubDate>Thu, 13 Feb 2025 14:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/edf6d919-406f-49f7-9394-46cf8c2d5dca.mp3" length="127304788" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode of Tech Transforms, host Carolyn Ford dives into the world of secure software development with guests Scott Orton and Mike Mehlberg. They explore the critical challenges of implementing Software Bills of Materials (SBOMs), securing open-source software, and using Rust programming language for safer, memory-secure coding. The conversation also covers AI's growing role in code development, the evolving landscape of cross-domain solutions, and the race between cybersecurity advancements and ever-evolving threats.

From real-world implementation challenges to insights on automating security measures in classified environments, Scott and Mike break down the risks and opportunities in today's software ecosystem. Whether you're a developer, cybersecurity professional, or just curious about how technology is shaping secure systems, this episode is packed with expert insights and actionable takeaways.</itunes:subtitle>
  <itunes:duration>53:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/e/edf6d919-406f-49f7-9394-46cf8c2d5dca/cover.jpg?v=1"/>
  <description>&lt;p&gt;🔒 How do we secure software in an era of open-source dominance and AI-driven threats?&lt;/p&gt;

&lt;p&gt;On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:&lt;/p&gt;

&lt;p&gt;✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)&lt;br&gt;
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it&lt;br&gt;
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment&lt;br&gt;
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen&lt;br&gt;
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments&lt;/p&gt;

&lt;p&gt;They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).&lt;/p&gt;

&lt;p&gt;🔹 If you're in software development, cybersecurity, or tech leadership, this episode is a must-listen!&lt;/p&gt;

&lt;p&gt;📲 Connect with Scott and Mike on LinkedIn for more insights.&lt;/p&gt;

&lt;p&gt;🎧 Listen now and stay ahead in the world of secure software and cyber defense! &lt;/p&gt;
</description>
  <itunes:keywords>open source, software development, risk, tech, security, cybersecurity, AI, software</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>🔒 How do we secure software in an era of open-source dominance and AI-driven threats?</p>

<p>On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:</p>

<p>✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)<br>
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it<br>
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment<br>
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen<br>
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments</p>

<p>They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).</p>

<p>🔹 If you&#39;re in software development, cybersecurity, or tech leadership, this episode is a must-listen!</p>

<p>📲 Connect with Scott and Mike on LinkedIn for more insights.</p>

<p>🎧 Listen now and stay ahead in the world of secure software and cyber defense!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>🔒 How do we secure software in an era of open-source dominance and AI-driven threats?</p>

<p>On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:</p>

<p>✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)<br>
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it<br>
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment<br>
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen<br>
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments</p>

<p>They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).</p>

<p>🔹 If you&#39;re in software development, cybersecurity, or tech leadership, this episode is a must-listen!</p>

<p>📲 Connect with Scott and Mike on LinkedIn for more insights.</p>

<p>🎧 Listen now and stay ahead in the world of secure software and cyber defense!</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 86: Navigating AI in Sensitive Environments:  What You Need to Know</title>
  <link>https://techtransforms.fireside.fm/86</link>
  <guid isPermaLink="false">5b5569f4-6ca0-4a48-880a-cf1bbe56a44e</guid>
  <pubDate>Fri, 22 Nov 2024 13:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/5b5569f4-6ca0-4a48-880a-cf1bbe56a44e.mp3" length="104430868" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode of Tech Transforms, Carolyn Ford speaks with Tracy Bannon, Software Architect and Researcher at MITRE, about the transformative role of generative AI in the Software Development Lifecycle (SDLC). Tracy shares insights on how AI can enhance workflows, automate testing, and even act as a collaborative team member, while addressing challenges like trust, security, and human factors. Tune in to explore the potential of AI to reshape software development and learn how to use these tools responsibly.

Sponsored by OWL Cyber Defense, leaders in secure data transfer solutions for critical networks.</itunes:subtitle>
  <itunes:duration>43:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/5b5569f4-6ca0-4a48-880a-cf1bbe56a44e/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Tracy Bannon, a software architect and researcher at MITRE, dives into the exciting potential and challenges of using generative AI in the Software Development Lifecycle (SDLC). Tracy explores how AI can revolutionize workflows, enhance testing, and even act as a collaborative team member. From addressing human trust issues with AI to building decision-making tools, Tracy shares her journey in navigating the evolving role of generative AI. Tune in for actionable insights and learn how careful integration of AI can unlock innovation while maintaining security and trust.&lt;/p&gt;

&lt;p&gt;Key Topics Covered:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Integrating generative AI into the SDLC&lt;/li&gt;
&lt;li&gt;Trust and human factors in using AI tools&lt;/li&gt;
&lt;li&gt;Promising applications of AI in software development&lt;/li&gt;
&lt;li&gt;Security considerations and risks of AI-generated code&lt;/li&gt;
&lt;li&gt;Shaping the future of AI in a responsible way&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Sponsor:&lt;br&gt;
This episode is brought to you by OWL Cyber Defense, leaders in secure data transfer solutions for critical networks. &lt;/p&gt;
</description>
  <itunes:keywords>AI, Generative AI, SDLC, Innovation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Tracy Bannon, a software architect and researcher at MITRE, dives into the exciting potential and challenges of using generative AI in the Software Development Lifecycle (SDLC). Tracy explores how AI can revolutionize workflows, enhance testing, and even act as a collaborative team member. From addressing human trust issues with AI to building decision-making tools, Tracy shares her journey in navigating the evolving role of generative AI. Tune in for actionable insights and learn how careful integration of AI can unlock innovation while maintaining security and trust.</p>

<p>Key Topics Covered:</p>

<ul>
<li>Integrating generative AI into the SDLC</li>
<li>Trust and human factors in using AI tools</li>
<li>Promising applications of AI in software development</li>
<li>Security considerations and risks of AI-generated code</li>
<li>Shaping the future of AI in a responsible way</li>
</ul>

<p>Sponsor:<br>
This episode is brought to you by OWL Cyber Defense, leaders in secure data transfer solutions for critical networks.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Tracy Bannon, a software architect and researcher at MITRE, dives into the exciting potential and challenges of using generative AI in the Software Development Lifecycle (SDLC). Tracy explores how AI can revolutionize workflows, enhance testing, and even act as a collaborative team member. From addressing human trust issues with AI to building decision-making tools, Tracy shares her journey in navigating the evolving role of generative AI. Tune in for actionable insights and learn how careful integration of AI can unlock innovation while maintaining security and trust.</p>

<p>Key Topics Covered:</p>

<ul>
<li>Integrating generative AI into the SDLC</li>
<li>Trust and human factors in using AI tools</li>
<li>Promising applications of AI in software development</li>
<li>Security considerations and risks of AI-generated code</li>
<li>Shaping the future of AI in a responsible way</li>
</ul>

<p>Sponsor:<br>
This episode is brought to you by OWL Cyber Defense, leaders in secure data transfer solutions for critical networks.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>New: Building a Stronger Team: How Data is Transforming Workforce Development in the Public Sector</title>
  <link>https://techtransforms.fireside.fm/new</link>
  <guid isPermaLink="false">d15c20ff-e5c1-4086-b5c2-8e6726d10150</guid>
  <pubDate>Tue, 29 Oct 2024 16:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/d15c20ff-e5c1-4086-b5c2-8e6726d10150.mp3" length="117194117" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode, host Carolyn Ford sits down with Kris Saling, Director of Talent Analytics and Data Strategy for the U.S. Army, to dive into her new book, Data-Driven Talent Management. Kris shares how data is changing the game when it comes to recruitment, retention, and employee engagement. We discuss practical ways leaders can use analytics to build stronger teams and keep top talent motivated. If you're looking for actionable insights on how data can transform the way we work, you won’t want to miss this conversation!
</itunes:subtitle>
  <itunes:duration>48:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/d/d15c20ff-e5c1-4086-b5c2-8e6726d10150/cover.jpg?v=2"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, host Carolyn Ford welcomes back Kris Saling, the Director of Talent Analytics and Data Strategy for the U.S. Army, to discuss her new book, Data-Driven Talent Management. Kris shares how analytics is reshaping recruitment, retention, and employee engagement across both the public sector and private industry, providing leaders with powerful tools to build stronger, more motivated teams. From the value of non-monetary incentives to the evolving role of AI in hiring, Kris reveals practical ways data can transform talent management. Whether you're in marketing, cybersecurity, or beyond, this episode is packed with actionable insights on creating a people-first workplace. Join us for a deep dive into the future of workforce management!&lt;/p&gt;
</description>
  <itunes:keywords>workforce management, talent management, public sector, AI, US Army, marketing, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes back Kris Saling, the Director of Talent Analytics and Data Strategy for the U.S. Army, to discuss her new book, Data-Driven Talent Management. Kris shares how analytics is reshaping recruitment, retention, and employee engagement across both the public sector and private industry, providing leaders with powerful tools to build stronger, more motivated teams. From the value of non-monetary incentives to the evolving role of AI in hiring, Kris reveals practical ways data can transform talent management. Whether you&#39;re in marketing, cybersecurity, or beyond, this episode is packed with actionable insights on creating a people-first workplace. Join us for a deep dive into the future of workforce management!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes back Kris Saling, the Director of Talent Analytics and Data Strategy for the U.S. Army, to discuss her new book, Data-Driven Talent Management. Kris shares how analytics is reshaping recruitment, retention, and employee engagement across both the public sector and private industry, providing leaders with powerful tools to build stronger, more motivated teams. From the value of non-monetary incentives to the evolving role of AI in hiring, Kris reveals practical ways data can transform talent management. Whether you&#39;re in marketing, cybersecurity, or beyond, this episode is packed with actionable insights on creating a people-first workplace. Join us for a deep dive into the future of workforce management!</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
