[
  {
    "start": 0.06,
    "end": 8.24,
    "text": "This episode is provided by Thomas Allgaier and Frennis, based on the most relevant LinkedIn posts about ICT and tech insights from CW five-and-six."
  },
  {
    "start": 8.96,
    "end": 17.18,
    "text": "Frennes supports ICT enterprises with market and competitive intelligence decoding emerging technologies customer insights regulatory shifts And competitor strategies."
  },
  {
    "start": 17.62,
    "end": 21.76,
    "text": "so product teams and strategy leaders don't just react but shape The future."
  },
  {
    "start": 22.5,
    "end": 23.16,
    "text": "It's good to be back."
  },
  {
    "start": 23.52,
    "end": 26.04,
    "text": "So we're diving into weeks five and six of twenty twenty six."
  },
  {
    "start": 26.64,
    "end": 28.5,
    "text": "You can really feel a shift in the conversation."
  },
  {
    "start": 28.58,
    "end": 29.08,
    "text": "Can she were just?"
  },
  {
    "start": 29.54,
    "end": 30.84,
    "text": "We're not talking about what if anymore."
  },
  {
    "start": 31.02,
    "end": 31.76,
    "text": "No, not at all."
  },
  {
    "start": 32.02,
    "end": 37.78,
    "text": "looking through the sources it feels like The playground phase is officially over."
  },
  {
    "start": 37.88,
    "end": 41.54,
    "text": "we are seeing some very heavy Very concrete architecture being discussed now"
  },
  {
    "start": 41.78,
    "end": 42.12,
    "text": "exactly."
  },
  {
    "start": 42.28,
    "end": 46.82,
    "text": "I mean If you had to summarize the vibe It's that the hype is finally settling into actual industrialization?"
  },
  {
    "start": 47.24,
    "end": 50.06,
    "text": "We're seeing a definite move from You know AI as a helper."
  },
  {
    "start": 50.2,
    "end": 52.3,
    "text": "two AIs an operator were seen."
  },
  {
    "start": 52.36,
    "end": 62.6,
    "text": "quantum computing moved from being a physics experiment To actually breaking real world encryption, and then sort of wrapping around all that is this massive focus on digital sovereignty and trust."
  },
  {
    "start": 62.64,
    "end": 63.58,
    "text": "It's getting serious!"
  },
  {
    "start": 64.5,
    "end": 66.62,
    "text": "Okay so let's start with the first big shift."
  },
  {
    "start": 66.7,
    "end": 68.62,
    "text": "you mentioned AI in automation."
  },
  {
    "start": 69.36,
    "end": 71.8,
    "text": "for so long the conversation was about chatbots right?"
  },
  {
    "start": 72.28,
    "end": 74.46,
    "text": "Using AI to write an email a bit faster."
  },
  {
    "start": 74.6,
    "end": 75.22,
    "text": "yeah it's over"
  },
  {
    "start": 75.9,
    "end": 80.62,
    "text": "but The posts from these last couple weeks are pointing towards these agentic architectures."
  },
  {
    "start": 82.18,
    "end": 86.18,
    "text": "I mean, Vicky Makija had a really sharp insight on this."
  },
  {
    "start": 86.6,
    "end": 91.68,
    "text": "He basically points out that AI agents are becoming the new cloud operations team"
  },
  {
    "start": 91.88,
    "end": 93.0,
    "text": "The New Ops Team."
  },
  {
    "start": 93.14,
    "end": 93.4,
    "text": "Yes!"
  },
  {
    "start": 93.98,
    "end": 97.2,
    "text": "We're not just talking about scripts running when human press is a button anymore."
  },
  {
    "start": 97.26,
    "end": 105.78,
    "text": "we talk about autonomous agents handling real-time provisioning incident response even cost optimization all of their"
  },
  {
    "start": 105.88,
    "end": 108.46,
    "text": "own and autonomous is the key word there."
  },
  {
    "start": 108.84,
    "end": 116.14,
    "text": "Vicki mentioned that this completely shifts the model from manual toil to autonomous action, but you know if you have software making live decisions about your infrastructure?"
  },
  {
    "start": 116.76,
    "end": 118.58,
    "text": "That changes the risk profile completely."
  },
  {
    "start": 119.18,
    "end": 119.58,
    "text": "Oh it does!"
  },
  {
    "start": 119.98,
    "end": 121.8,
    "text": "It requires totally new guardrails."
  },
  {
    "start": 122.2,
    "end": 128.5,
    "text": "You can't just let an Autonomous agent loosen your environment without a serious fundamental rethink of your governance."
  },
  {
    "start": 129.0,
    "end": 134.04,
    "text": "Its really difference between tool you hold in hand And robot release into wild"
  },
  {
    "start": 134.84,
    "end": 140.92,
    "text": "And according to Iraqi laborious, our current infrastructure might not even be ready for that robot."
  },
  {
    "start": 141.28,
    "end": 142.9,
    "text": "He made a pretty provocative statement."
  },
  {
    "start": 142.96,
    "end": 144.76,
    "text": "he said cloud native is over."
  },
  {
    "start": 145.12,
    "end": 146.26,
    "text": "AI Native has started."
  },
  {
    "start": 146.58,
    "end": 149.32,
    "text": "That's a headline designed to make a few engineers spill their coffee."
  },
  {
    "start": 149.4,
    "end": 152.4,
    "text": "For sure yeah But he backs it up."
  },
  {
    "start": 152.78,
    "end": 154.36,
    "text": "his argument Is the current stack."
  },
  {
    "start": 154.48,
    "end": 156.54,
    "text": "you know things like standard Kubernetes scheduling?"
  },
  {
    "start": 157.26,
    "end": 159.88,
    "text": "It just wasn't built for the reality of generative AI."
  },
  {
    "start": 160.28,
    "end": 165.96,
    "text": "we're dealing with constant inference really scarce GPUs and latency that users can actually feel."
  },
  {
    "start": 166.14,
    "end": 172.8,
    "text": "Right, because a standard cloud app is mostly CPU bound in pretty predictable AI workloads are whole different."
  },
  {
    "start": 172.84,
    "end": 175.1,
    "text": "beast he says we need AI aware platforms"
  },
  {
    "start": 175.6,
    "end": 181.96,
    "text": "exactly platforms that actually understand things like model memory requirements and latency constraints not just generic pods."
  },
  {
    "start": 182.78,
    "end": 190.4,
    "text": "if you're running these incredibly expensive GPU's You cannot have them sitting idle cuz your scheduler is well dumb."
  },
  {
    "start": 190.76,
    "end": 195.28,
    "text": "So you need things like dynamic accelerator slicing and model wear routing."
  },
  {
    "start": 195.34,
    "end": 205.84,
    "text": "It's a completely different architectural challenge it is, but if we have these autonomous agents running on this new AI native infrastructure I mean that sounds Like A security nightmare waiting to happen."
  },
  {
    "start": 205.9,
    "end": 209.32,
    "text": "If the software Is smarter than The firewall What do You Do?"
  },
  {
    "start": 210.02,
    "end": 212.0,
    "text": "Well That brings us right To the convergence point."
  },
  {
    "start": 212.64,
    "end": 217.86,
    "text": "Francis Odom shared a prediction that by the second half of twenty-twenty six Which is coming up fast."
  },
  {
    "start": 218.58,
    "end": 220.7,
    "text": "We're going to see a massive convergence in security."
  },
  {
    "start": 221.04,
    "end": 226.5,
    "text": "the whole paradigm is shifting from securing models, to securing agents across their entire life cycle."
  },
  {
    "start": 226.8,
    "end": 230.84,
    "text": "So you are almost treating an agent like remote employee with its own permissions?"
  },
  {
    "start": 231.2,
    "end": 232.04,
    "text": "In way yes!"
  },
  {
    "start": 233.2,
    "end": 238.92,
    "text": "Odom describes it as new control plane where identity security cloud security and data security."
  },
  {
    "start": 239.12,
    "end": 246.58,
    "text": "all have to merge what it's allowed to touch and have the ability to shut it down instantly if he tries to exaltrate data."
  },
  {
    "start": 246.8,
    "end": 249.02,
    "text": "And that who-the-agent is part, really tricky?"
  },
  {
    "start": 249.4,
    "end": 250.22,
    "text": "When was sick Dr."
  },
  {
    "start": 250.32,
    "end": 252.12,
    "text": "Sue hammered this point on identity?"
  },
  {
    "start": 252.78,
    "end": 261.2,
    "text": "He warned many architectures are dangerously unprepared because these agents are operating without unique verifiable identities..."
  },
  {
    "start": 261.36,
    "end": 265.54,
    "text": "He calls for zero trust from machines which a fascinating concept I mean."
  },
  {
    "start": 265.62,
    "end": 266.06,
    "text": "think about it."
  },
  {
    "start": 266.26,
    "end": 273.24,
    "text": "If one AI agent can spawn other agents a simple static API key just isn't going to cut it anymore."
  },
  {
    "start": 273.32,
    "end": 273.42,
    "text": "Not"
  },
  {
    "start": 273.48,
    "end": 274.04,
    "text": "even close!"
  },
  {
    "start": 274.22,
    "end": 282.9,
    "text": "You need continuous behavioral authorization, you need to verify that this specific instance of the agent is authorized to do THIS specific task right now."
  },
  {
    "start": 283.1,
    "end": 288.14,
    "text": "Because if an agent goes rogue or gets jailbroken... ...you have to be able revoke its access instantly."
  },
  {
    "start": 288.3,
    "end": 290.22,
    "text": "You can't just hope for the best."
  },
  {
    "start": 290.54,
    "end": 294.5,
    "text": "Precisely And G-toot Patel from Cisco weighed in on this too."
  },
  {
    "start": 295.06,
    "end": 303.76,
    "text": "He noted, we are at an inflection point where agents don't just suggest work they execute it and that distinction execution is critical."
  },
  {
    "start": 304.2,
    "end": 314.48,
    "text": "if an agent's actually executing work deleting files spinning up servers moving money you need a fundamental rethink of your entire infrastructure to protect against the agent doing something destructive."
  },
  {
    "start": 314.8,
    "end": 316.48,
    "text": "It's a brave new world for sure."
  },
  {
    "start": 317.26,
    "end": 317.4,
    "text": "Okay!"
  },
  {
    "start": 317.56,
    "end": 323.14,
    "text": "Moving On This idea of control segues perfectly into our second theme digital sovereignty."
  },
  {
    "start": 324.14,
    "end": 329.38,
    "text": "But based on the posts from weeks five and six Sovereignty doesn't just mean data localization anymore."
  },
  {
    "start": 329.42,
    "end": 331.24,
    "text": "It's not just about keeping your data inside."
  },
  {
    "start": 331.28,
    "end": 333.64,
    "text": "The borders have say Germany or France"
  },
  {
    "start": 333.72,
    "end": 335.6,
    "text": "know that definition has gotten much broader."
  },
  {
    "start": 335.7,
    "end": 338.58,
    "text": "Yeah, Sandy Patel from IBM really pushed this forward."
  },
  {
    "start": 339.12,
    "end": 342.1,
    "text": "He argues that sovereignty now has to include who governs?"
  },
  {
    "start": 342.14,
    "end": 343.84,
    "text": "The platforms in the models themselves."
  },
  {
    "start": 343.92,
    "end": 346.54,
    "text": "he introduced his concept of the IBM sovereign core."
  },
  {
    "start": 346.68,
    "end": 346.92,
    "text": "right"
  },
  {
    "start": 347.32,
    "end": 351.0,
    "text": "yes And the focus is on what he calls operational sovereignty."
  },
  {
    "start": 351.68,
    "end": 355.94,
    "text": "It's about ensuring resilience and continuity, especially in regulated sectors."
  },
  {
    "start": 356.76,
    "end": 362.98,
    "text": "You need to be able to prove you have control over the entire life cycle from data... ...to model or inference itself."
  },
  {
    "start": 363.42,
    "end": 366.02,
    "text": "So it's not enough to just say, oh the server isn't Frankfurt."
  },
  {
    "start": 366.22,
    "end": 366.66,
    "text": "Exactly!"
  },
  {
    "start": 366.82,
    "end": 371.08,
    "text": "Not if the model running on is a black box controlled by a company in California."
  },
  {
    "start": 371.36,
    "end": 371.48,
    "text": "And"
  },
  {
    "start": 371.58,
    "end": 376.96,
    "text": "Mostafa Zaefer took that even further specifically for the MEA The Middle East and Africa region."
  },
  {
    "start": 377.44,
    "end": 382.64,
    "text": "He's predicting that by twenty-twenty six sovereign AI frameworks will be strategic imperative there..."
  },
  {
    "start": 383.14,
    "end": 387.04,
    "text": "...and he made an interesting point It about provable ownership of control plane."
  },
  {
    "start": 387.96,
    "end": 389.82,
    "text": "He also noted shift accountability."
  },
  {
    "start": 390.62,
    "end": 392.54,
    "text": "This isn't just a CIO problem anymore."
  },
  {
    "start": 392.68,
    "end": 394.92,
    "text": "Yeah, AI is moving up to become a CEO problem."
  },
  {
    "start": 395.6,
    "end": 397.12,
    "text": "When national sovereignty as at stake."
  },
  {
    "start": 397.26,
    "end": 399.46,
    "text": "this becomes a board level issue fast."
  },
  {
    "start": 399.8,
    "end": 402.76,
    "text": "There's also a hardware component to this that I found really interesting."
  },
  {
    "start": 402.82,
    "end": 407.78,
    "text": "We always talk about the software but Georgine D highlighted what media tech is doing with sovereign AI chips?"
  },
  {
    "start": 408.22,
    "end": 410.9,
    "text": "This is such a great example of the practical side of sovereignty."
  },
  {
    "start": 411.72,
    "end": 416.94,
    "text": "They're working on The Breeze LLM which has trained specifically on traditional Chinese"
  },
  {
    "start": 417.16,
    "end": 419.98,
    "text": "and the benefit Isn't Just we own it Right?"
  },
  {
    "start": 420.04,
    "end": 422.08,
    "text": "There's a real technical efficiency gain"
  },
  {
    "start": 422.14,
    "end": 422.34,
    "text": "there."
  },
  {
    "start": 422.42,
    "end": 423.12,
    "text": "A huge one!"
  },
  {
    "start": 424.12,
    "end": 431.36,
    "text": "Because the model understands cultural nuances and language structure natively, it actually uses fewer tokens to say more."
  },
  {
    "start": 432.42,
    "end": 434.5,
    "text": "That slashes latency in cost."
  },
  {
    "start": 435.02,
    "end": 440.14,
    "text": "It shows that sovereignty isn't just about compliance or politics... ...it can drive better performance."
  },
  {
    "start": 440.78,
    "end": 444.98,
    "text": "And we can't talk about sovereignty without talking about the actual physical pipes connecting us."
  },
  {
    "start": 445.56,
    "end": 449.58,
    "text": "Nicholas Babin shared some insights on The European Commission's strategy for submarine"
  },
  {
    "start": 455.64,
    "end": 469.04,
    "text": "cables, It"
  },
  {
    "start": 470.16,
    "end": 476.5,
    "text": "really emphasizes that digital sovereignty is a full-stag game, from the undersea cable to the chip."
  },
  {
    "start": 476.64,
    "end": 479.38,
    "text": "To the model all the way up to the governance framework."
  },
  {
    "start": 479.62,
    "end": 480.1,
    "text": "absolutely"
  },
  {
    "start": 480.24,
    "end": 488.84,
    "text": "and that whole foundation relies entirely on trust which uh leads us right into our third theme cyber security and trust."
  },
  {
    "start": 488.98,
    "end": 495.86,
    "text": "And this was a heavy couple of weeks for Cyber Insights, one thing that really stood out is the emphasis on implementation over just buying"
  },
  {
    "start": 495.94,
    "end": 496.56,
    "text": "more tools."
  },
  {
    "start": 497.34,
    "end": 502.1,
    "text": "Steven Schmidt from Amazon shared his story about their midway authentication system."
  },
  {
    "start": 502.3,
    "end": 503.58,
    "text": "That's powerful case study."
  },
  {
    "start": 504.12,
    "end": 506.4,
    "text": "they protect one-and-a half million employee accounts."
  },
  {
    "start": 509.54,
    "end": 510.3,
    "text": "No exceptions."
  },
  {
    "start": 510.52,
    "end": 512.0,
    "text": "that's the hard part isn't it usually?"
  },
  {
    "start": 512.059,
    "end": 515.14,
    "text": "The CEO gets an exception because the security key is annoying."
  },
  {
    "start": 515.299,
    "end": 522.44,
    "text": "It Is yeah, he pointed out this massive gap between knowing you need strong authentication and actually implementing it consistently."
  },
  {
    "start": 522.78,
    "end": 525.52,
    "text": "It's always the exceptions to kill you the legacy system."
  },
  {
    "start": 525.58,
    "end": 528.12,
    "text": "You didn't upgrade the executive who didn't want a friction."
  },
  {
    "start": 528.82,
    "end": 534.64,
    "text": "Amazon proved that no exceptions policy is actually possible at scale, but it takes enormous cultural will."
  },
  {
    "start": 534.86,
    "end": 535.22,
    "text": "Christopher"
  },
  {
    "start": 535.3,
    "end": 538.88,
    "text": "Cook from Microsoft connected this to the broader zero trust concept."
  },
  {
    "start": 539.26,
    "end": 540.74,
    "text": "he was talking about conditional"
  },
  {
    "start": 540.86,
    "end": 541.28,
    "text": "access."
  },
  {
    "start": 542.3,
    "end": 543.86,
    "text": "This is where security gets really smart."
  },
  {
    "start": 544.42,
    "end": 547.52,
    "text": "static rules like allow everyone from this IP address."
  },
  {
    "start": 548.16,
    "end": 549.7,
    "text": "They just don't stop modern attacks."
  },
  {
    "start": 550.22,
    "end": 552.86,
    "text": "you need engines that evaluate risk in real time."
  },
  {
    "start": 552.98,
    "end": 553.86,
    "text": "so its dynamic"
  },
  {
    "start": 554.06,
    "end": 554.54,
    "text": "completely."
  },
  {
    "start": 555.26,
    "end": 556.44,
    "text": "What is the device posture?"
  },
  {
    "start": 556.84,
    "end": 559.52,
    "text": "Is it a managed device, where's user logging in from."
  },
  {
    "start": 560.04,
    "end": 563.36,
    "text": "If anything creates red flag you block access or demand MFA"
  },
  {
    "start": 563.66,
    "end": 564.1,
    "text": "instantly.\"."
  },
  {
    "start": 564.94,
    "end": 567.82,
    "text": "But even with best tools seems like always comes back to people."
  },
  {
    "start": 568.08,
    "end": 573.04,
    "text": "Jane Franklin posted about how cyber attacks test organizational culture not just your tech"
  },
  {
    "start": 573.1,
    "end": 573.36,
    "text": "stack."
  },
  {
    "start": 573.82,
    "end": 574.76,
    "text": "She's absolutely right."
  },
  {
    "start": 574.9,
    "end": 579.5,
    "text": "And Florian Freese added a very human dimension to this, especially about the talent gap in Europe."
  },
  {
    "start": 579.96,
    "end": 583.2,
    "text": "He suggests that a toxic blame culture is just burning out experts."
  },
  {
    "start": 583.3,
    "end": 583.3,
    "text": "I"
  },
  {
    "start": 583.54,
    "end": 589.1,
    "text": "saw companies are chasing these unicorn profiles people who know everything instead of building sustainable teams"
  },
  {
    "start": 589.3,
    "end": 592.94,
    "text": "and it's frightening To think burnout could be major security vulnerability."
  },
  {
    "start": 593.52,
    "end": 595.92,
    "text": "If your defenders are exhausted, you're wide open to attack."
  },
  {
    "start": 596.18,
    "end": 596.4,
    "text": "And"
  },
  {
    "start": 596.72,
    "end": 602.58,
    "text": "speaking of attacks, Nizar Timashik from Sirtiway gave us a major reality check from the front lines in Ukraine."
  },
  {
    "start": 602.74,
    "end": 603.9,
    "text": "Yeah that was his sobering read."
  },
  {
    "start": 604.5,
    "end": 607.84,
    "text": "He's been analyzing three years of Russian cyber operations"
  },
  {
    "start": 608.54,
    "end": 609.44,
    "text": "and his conclusion"
  },
  {
    "start": 609.8,
    "end": 617.94,
    "text": "His conclusion is despite all modern tools The tactics map directly back into the art deception, disruption psychological pressure."
  },
  {
    "start": 618.06,
    "end": 622.9,
    "text": "He warned that Europe is still unprepared for this coordination of kinetic and cyber threats."
  },
  {
    "start": 623.18,
    "end": 629.1,
    "text": "We tend to think a cyber as the separate digital thing but he's seeing it coordinated with actual physical attacks."
  },
  {
    "start": 629.62,
    "end": 634.78,
    "text": "It's a holistic threat that requires a holistic defense, you can't just have the IT guys handle it in a basin"
  },
  {
    "start": 634.86,
    "end": 635.18,
    "text": "somewhere.\"."
  },
  {
    "start": 635.34,
    "end": 643.86,
    "text": "And on the regulatory side Davide Maniscalco broke down The New EU Cyber Resilience Act—the CRA —it sounds like complete reset for security standards."
  },
  {
    "start": 647.2,
    "end": 653.9,
    "text": "If you sell any product with digital elements in the EU, You have to meet essential security requirements throughout its entire life cycle."
  },
  {
    "start": 654.22,
    "end": 655.66,
    "text": "You can't just ship it and forget it."
  },
  {
    "start": 656.02,
    "end": 658.82,
    "text": "It forces accountability back onto the manufacturer."
  },
  {
    "start": 659.14,
    "end": 663.18,
    "text": "Okay To wrap this section Rob Ikerchik brought up the concept of IT for IT."
  },
  {
    "start": 663.92,
    "end": 665.56,
    "text": "He thinks we're managing things all wrong."
  },
  {
    "start": 666.0,
    "end": 668.52,
    "text": "His argument is that The bottleneck isn't a lack of tools."
  },
  {
    "start": 668.58,
    "end": 669.44,
    "text": "We've plenty of tools."
  },
  {
    "start": 669.56,
    "end": 671.36,
    "text": "Its' the lack an end-to-end system."
  },
  {
    "start": 672.06,
    "end": 675.06,
    "text": "We manage these islands of tools, a silo for security."
  },
  {
    "start": 675.26,
    "end": 676.4,
    "text": "A Silo For DevOps."
  },
  {
    "start": 677.06,
    "end": 681.86,
    "text": "He's calling us to manage the entire IT value network as single connected system."
  },
  {
    "start": 682.4,
    "end": 684.54,
    "text": "It is about visibility from idea to production."
  },
  {
    "start": 684.98,
    "end": 692.4,
    "text": "That visibility will be crucial especially when we enter our final theme Quantum computing and innovation ecosystems."
  },
  {
    "start": 692.86,
    "end": 694.3,
    "text": "And this isn't science fiction anymore?"
  },
  {
    "start": 694.8,
    "end": 695.2,
    "text": "Not at all!"
  },
  {
    "start": 696.1,
    "end": 701.84,
    "text": "If there was one mic drop moment it would have been Enrico Giacomelli at Numerial Group."
  },
  {
    "start": 702.28,
    "end": 705.92,
    "text": "They successfully demonstrated quantum computing applied to digital security, right?"
  },
  {
    "start": 706.12,
    "end": 710.98,
    "text": "Yes they factorized an RSA key on an operational quantum computer."
  },
  {
    "start": 711.42,
    "end": 712.96,
    "text": "Whoa okay let's unpack that!"
  },
  {
    "start": 713.2,
    "end": 717.78,
    "text": "RSA is the encryption standard that protects well pretty much everything online right now."
  },
  {
    "start": 718.22,
    "end": 724.98,
    "text": "Everything... The security of RSA relies on the fact that classical computers are just terrible in factorizing enormous numbers."
  },
  {
    "start": 729.22,
    "end": 732.98,
    "text": "It signals that post-quantum security isn't something to worry about in ten years."
  },
  {
    "start": 733.42,
    "end": 735.38,
    "text": "it's an immediate need now"
  },
  {
    "start": 735.92,
    "end": 743.1,
    "text": "and That aligns perfectly with what Steve Suarez who is Google's quantum AI lead was warning About the whole store."
  },
  {
    "start": 743.24,
    "end": 744.9,
    "text": "Now decrypt later threat,"
  },
  {
    "start": 745.16,
    "end": 746.34,
    "text": "that's The really scary part."
  },
  {
    "start": 746.6,
    "end": 748.9,
    "text": "bad actors can steal your encrypted data today."
  },
  {
    "start": 749.0,
    "end": 756.26,
    "text": "They Can't read yet But if they just store it And wait for a quantum hardware To mature which we Just saw as Happening they could Decryp it Later."
  },
  {
    "start": 756.8,
    "end": 763.38,
    "text": "So if you have sensitive data with a long shelf life and you wait to adopt post-quantum cryptography It's already too late."
  },
  {
    "start": 763.64,
    "end": 765.48,
    "text": "Your old data is already compromised."
  },
  {
    "start": 765.56,
    "end": 770.06,
    "text": "the timeline has massively accelerated And we're seeing the infrastructure emerge to support this."
  },
  {
    "start": 770.34,
    "end": 780.2,
    "text": "Tanja Scheller toured IBM first quantum data center in Europe over an ending end, and she emphasized that This is about accessible compliant Quantum computing."
  },
  {
    "start": 780.46,
    "end": 781.88,
    "text": "it's not just in a lab anymore."
  },
  {
    "start": 782.0,
    "end": 783.38,
    "text": "It's in a proper data Center."
  },
  {
    "start": 784.26,
    "end": 787.88,
    "text": "Christian B. also reported that functional quantum systems are now a reality."
  },
  {
    "start": 788.42,
    "end": 789.3,
    "text": "He basically declared it."
  },
  {
    "start": 789.5,
    "end": 791.62,
    "text": "someday has become Now,"
  },
  {
    "start": 791.98,
    "end": 794.04,
    "text": "It's just amazing how fast this is moving."
  },
  {
    "start": 794.3,
    "end": 796.94,
    "text": "but innovation isn't Just about the raw computing power?"
  },
  {
    "start": 797.1,
    "end": 798.64,
    "text": "It's About How you apply it."
  },
  {
    "start": 798.76,
    "end": 802.96,
    "text": "we saw A ton of activity around Innovation hubs Particularly in Munich."
  },
  {
    "start": 803.16,
    "end": 807.58,
    "text": "yes The t-Systems Innovation Center In munich seems to be A major focal point right now."
  },
  {
    "start": 808.12,
    "end": 809.58,
    "text": "Elkanderl Dr."
  },
  {
    "start": 809.66,
    "end": 812.98,
    "text": "Ferry, Abel Hassan and Philip Sourtaig all posted about it"
  },
  {
    "start": 813.22,
    "end": 815.34,
    "text": "And its located right next to an AI factory isn't there?"
  },
  {
    "start": 815.38,
    "end": 815.42,
    "text": "It"
  },
  {
    "start": 815.52,
    "end": 815.66,
    "text": "is!"
  },
  {
    "start": 816.12,
    "end": 820.28,
    "text": "The whole focus on making Its not a showroom for PowerPoint slides."
  },
  {
    "start": 820.62,
    "end": 824.28,
    "text": "They're actively working on robotics digital twins industrial ai clouds."
  },
  {
    "start": 824.68,
    "end": 826.26,
    "text": "About co-creation with customers."
  },
  {
    "start": 826.46,
    "end": 830.38,
    "text": "That's how you bridge the gap between cool tech and actual business value."
  },
  {
    "start": 830.5,
    "end": 830.58,
    "text": "Well"
  },
  {
    "start": 830.64,
    "end": 834.6,
    "text": "speaking of Business Value I want close this theme with Jan Gilg's post about ExxonMobil."
  },
  {
    "start": 834.7,
    "end": 836.98,
    "text": "they underwent massive transformation with SAP."
  },
  {
    "start": 837.58,
    "end": 840.0,
    "text": "This was such a great counterpoint to all the new tech hype."
  },
  {
    "start": 840.58,
    "end": 844.4,
    "text": "Their transformation resulted in ninety-seven percent fewer profit centers."
  },
  {
    "start": 844.52,
    "end": 846.84,
    "text": "Ninety seven percent, that is just insane!"
  },
  {
    "start": 846.92,
    "end": 846.98,
    "text": "It"
  },
  {
    "start": 847.06,
    "end": 849.04,
    "text": "is but it proves a vital point."
  },
  {
    "start": 849.18,
    "end": 854.46,
    "text": "their transformation wasn't just about plugging in AI...it was about simplification discipline."
  },
  {
    "start": 854.86,
    "end": 860.04,
    "text": "you cannot effectively apply AI on top of a messy overly complex organization."
  },
  {
    "start": 860.76,
    "end": 866.46,
    "text": "ExxonMobil proved that clarity is the absolute foundation for applying any of these advanced technologies."
  },
  {
    "start": 866.64,
    "end": 874.64,
    "text": "That's such a crucial takeaway, we talk about agents and quantum and sovereignty but ultimately if your own house isn't in order none it will work!"
  },
  {
    "start": 874.78,
    "end": 877.7,
    "text": "Exactly you have to have discipline to simplify before you can automate."
  },
  {
    "start": 878.1,
    "end": 886.68,
    "text": "So bringing all together then CW-Five & Six of twenty twenty six painted picture world where this technology just maturing at an incredible rate."
  },
  {
    "start": 886.88,
    "end": 888.22,
    "text": "AI becoming operator."
  },
  {
    "start": 888.66,
    "end": 891.02,
    "text": "Quantum is breaking current encryption standards."
  },
  {
    "start": 891.48,
    "end": 894.18,
    "text": "Sovereignty is redefining our entire infrastructure and"
  },
  {
    "start": 894.3,
    "end": 898.36,
    "text": "I think for you the listener, The message is pretty clear You can't just be an observer anymore?"
  },
  {
    "start": 898.72,
    "end": 908.82,
    "text": "You have to be actively preparing your architecture For agents upgrading Your security for the post quantum era And ensuring your governance Can actually handle autonomous machines."
  },
  {
    "start": 909.6,
    "end": 911.84,
    "text": "as we always say check your foundations."
  },
  {
    "start": 911.98,
    "end": 912.9,
    "text": "don't automate a mess."
  },
  {
    "start": 913.36,
    "end": 914.46,
    "text": "Couldn't have said it better myself."
  },
  {
    "start": 915.02,
    "end": 917.9,
    "text": "If you enjoyed this episode, new episodes drop every two weeks."
  },
  {
    "start": 918.3,
    "end": 927.72,
    "text": "also check out our other editions on cloud defense tech digital products and services artificial intelligence sustainability in green ICT Defense Tech and HealthTech."
  },
  {
    "start": 927.84,
    "end": 928.54,
    "text": "Thank You for listening."
  },
  {
    "start": 928.7,
    "end": 931.38,
    "text": "make sure to subscribe so you don't miss the next deep dive."
  },
  {
    "start": 931.78,
    "end": 932.54,
    "text": "see ya then."
  }
]