<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 14 Apr 2026 22:18:43 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Tech Transforms”</title>
    <link>https://techtransforms.fireside.fm/tags/tech%20transforms</link>
    <pubDate>Fri, 27 Feb 2026 09:30:00 -0500</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 117: 2026 Predictions.  What's Now. What's Next. What's Urgent.</title>
  <link>https://techtransforms.fireside.fm/117</link>
  <guid isPermaLink="false">0d0c1022-0966-4f5b-95b9-5a2414246f50</guid>
  <pubDate>Fri, 27 Feb 2026 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/0d0c1022-0966-4f5b-95b9-5a2414246f50.mp3" length="69081976" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford and the Owl Cyber Defense team unpack the signals already reshaping cybersecurity, AI, and defense. From the collapse of content trust to AI containment and hardware-enforced security, they explore why software alone won’t be enough in the year ahead. The message is clear: in 2026, leaders won’t lose because they lacked tools—they’ll lose because they trusted the wrong ones.</itunes:subtitle>
  <itunes:duration>57:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/0/0d0c1022-0966-4f5b-95b9-5a2414246f50/cover.jpg?v=1"/>
  <description>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.
This isn’t speculation. It’s trajectory.
The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.
The episode also explores:
* The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster
* Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust
* How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits
* The limits of Zero Trust when complexity, cost, and talent gaps collide
* Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world
Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.
The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.
This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.
Stay curious. The future isn’t waiting.
Shownotes
Scott Orton: LinkedIn (https://www.linkedin.com/in/scottorton/) | Email: sorton@owlcyberdefense.com
Brian Carter: LinkedIn (https://www.linkedin.com/in/brian-carter-4aba4a55/) | Email:bcarter@owlcyberdefense.com
Ralph Spada: LinkedIn (https://www.linkedin.com/in/ralphspada/) | Email: rspada@owlcyberdefense.com
Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: mblake@owlcyberdefense.com
Owl Cyber Defense: owlcyberdefense.com
Download the 2026 Predictions Report:  https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/
Story - Power Ranger Hacker: https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked
</description>
  <itunes:keywords>zero trust, owl cyber defense, tech transforms, cross-domain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 114: Trust by Design: Why AI Needs a New Digital Foundation</title>
  <link>https://techtransforms.fireside.fm/114</link>
  <guid isPermaLink="false">1e96fd71-5340-4dc7-b2fc-dcb32942aee2</guid>
  <pubDate>Tue, 06 Jan 2026 11:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/1e96fd71-5340-4dc7-b2fc-dcb32942aee2.mp3" length="59861352" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>What if AI can’t scale because the Internet was never designed to support it? In this episode of Tech Transforms, Carolyn Ford speaks with Will Roper, CEO of Istari, about why infrastructure, not algorithms, is the real barrier to AI, and how federated, zero-trust data models could reshape defense, aerospace, and regulated industries.</itunes:subtitle>
  <itunes:duration>49:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/1/1e96fd71-5340-4dc7-b2fc-dcb32942aee2/cover.jpg?v=1"/>
  <description>In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it?
Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure.
The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance.
Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist.
The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring.
This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently.
Show Notes:
Email: roper@istaridigital.com
LinkedIn: https://www.linkedin.com/in/williamroper/
Summary  "There is No Spoon" Talk: https://www.youtube.com/watch?v=dEcPlqImjWc 
Dr. Roper’s Paper:  There Is No Spoon - The New Digital Acquisition Reality https://www.af.mil/Portals/1/documents/2020SAF/ThereIsNoSpoonDigitalAcquisition7Oct2020digitalversion.pdf
Official Bio: https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/
Istari
https://www.istaridigital.com/ 
Flyer One: https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted 
</description>
  <itunes:keywords>digital, owlcyberdefense, istaridigital, sovereign data, zerotrust, techtransforms</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it?</p>

<p>Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure.</p>

<p>The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance.</p>

<p>Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist.</p>

<p>The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring.</p>

<p>This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently.</p>

<p>Show Notes:<br>
Email: <a href="mailto:roper@istaridigital.com" rel="nofollow">roper@istaridigital.com</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/williamroper/" rel="nofollow">https://www.linkedin.com/in/williamroper/</a><br>
Summary  &quot;There is No Spoon&quot; Talk: <a href="https://www.youtube.com/watch?v=dEcPlqImjWc" rel="nofollow">https://www.youtube.com/watch?v=dEcPlqImjWc</a> <br>
Dr. Roper’s Paper:  There Is No Spoon - The New Digital Acquisition Reality <a href="https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf" rel="nofollow">https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf</a><br>
Official Bio: <a href="https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/" rel="nofollow">https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/</a></p>

<p>Istari<br>
<a href="https://www.istaridigital.com/" rel="nofollow">https://www.istaridigital.com/</a> <br>
Flyer One: <a href="https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted" rel="nofollow">https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted</a> </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it?</p>

<p>Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure.</p>

<p>The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance.</p>

<p>Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist.</p>

<p>The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring.</p>

<p>This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently.</p>

<p>Show Notes:<br>
Email: <a href="mailto:roper@istaridigital.com" rel="nofollow">roper@istaridigital.com</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/williamroper/" rel="nofollow">https://www.linkedin.com/in/williamroper/</a><br>
Summary  &quot;There is No Spoon&quot; Talk: <a href="https://www.youtube.com/watch?v=dEcPlqImjWc" rel="nofollow">https://www.youtube.com/watch?v=dEcPlqImjWc</a> <br>
Dr. Roper’s Paper:  There Is No Spoon - The New Digital Acquisition Reality <a href="https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf" rel="nofollow">https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf</a><br>
Official Bio: <a href="https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/" rel="nofollow">https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/</a></p>

<p>Istari<br>
<a href="https://www.istaridigital.com/" rel="nofollow">https://www.istaridigital.com/</a> <br>
Flyer One: <a href="https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted" rel="nofollow">https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted</a> </p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
