Post-SaaS Paradox in AI Strategies

Mirko PetersPodcasts1 hour ago18 Views


1
00:00:00,000 –> 00:00:03,600
Most organizations think they’re rolling out co-pilot.

2
00:00:03,600 –> 00:00:05,880
They’re not, they’re switching from deterministic SaaS,

3
00:00:05,880 –> 00:00:07,560
where you can diagram cause an effect

4
00:00:07,560 –> 00:00:09,360
to probabilistic orchestration,

5
00:00:09,360 –> 00:00:12,160
where behavior emerges at runtime and drifts quietly.

6
00:00:12,160 –> 00:00:14,320
This episode gives you a post-sass mental model,

7
00:00:14,320 –> 00:00:16,800
three Microsoft scenarios you’ll recognize immediately,

8
00:00:16,800 –> 00:00:20,280
and one metric that exposes the real risk, mean time to explain.

9
00:00:20,280 –> 00:00:23,240
If you’re responsible for Microsoft 365, Power Platform,

10
00:00:23,240 –> 00:00:24,600
or Azure AI subscribe,

11
00:00:24,600 –> 00:00:27,320
because agent sprawl isn’t coming, it’s already here.

12
00:00:27,320 –> 00:00:30,160
Now, the foundational misunderstanding,

13
00:00:30,160 –> 00:00:33,480
the foundational misunderstanding, AI as a feature,

14
00:00:33,480 –> 00:00:34,880
not an operating model.

15
00:00:34,880 –> 00:00:37,560
The most comforting story in enterprise IT right now

16
00:00:37,560 –> 00:00:40,160
is that AI is a feature, a checkbox,

17
00:00:40,160 –> 00:00:43,680
a license, a rollout plan, a change advisory board item,

18
00:00:43,680 –> 00:00:46,720
something you enable the same way you enabled exchange online,

19
00:00:46,720 –> 00:00:48,760
teams, or e5 security.

20
00:00:48,760 –> 00:00:51,800
People wanted to fit inside the existing SaaS operating model

21
00:00:51,800 –> 00:00:53,320
because that model is familiar,

22
00:00:53,320 –> 00:00:57,320
you provision accounts, assigned permissions, configure policies,

23
00:00:57,320 –> 00:00:59,760
publish guidance, and then the system mostly behaves

24
00:00:59,760 –> 00:01:02,640
the same way tomorrow as it behaves today.

25
00:01:02,640 –> 00:01:05,280
That model worked because SaaS for all its floors

26
00:01:05,280 –> 00:01:07,080
is still largely deterministic.

27
00:01:07,080 –> 00:01:09,480
Deterministic doesn’t mean perfect, it means legible,

28
00:01:09,480 –> 00:01:12,080
it means state transitions are predictable enough

29
00:01:12,080 –> 00:01:16,120
that architects can draw boundaries, auditors can map controls,

30
00:01:16,120 –> 00:01:17,720
and operators can build runbooks

31
00:01:17,720 –> 00:01:19,520
that assume the platform will execute

32
00:01:19,520 –> 00:01:21,480
what it was configured to execute.

33
00:01:21,480 –> 00:01:23,840
When SaaS fails, it tends to fail like a machine,

34
00:01:23,840 –> 00:01:26,040
outages, throttling, expired certificates,

35
00:01:26,040 –> 00:01:30,120
broken dependencies, bad deployments, ugly, but explainable.

36
00:01:30,120 –> 00:01:32,360
AI doesn’t land as a feature inside that world,

37
00:01:32,360 –> 00:01:34,080
it lands as a new execution layer

38
00:01:34,080 –> 00:01:36,760
that sits inside every workload you already run.

39
00:01:36,760 –> 00:01:38,760
And the moment that execution layer makes decisions

40
00:01:38,760 –> 00:01:40,880
at runtime, your old assumptions start decaying,

41
00:01:40,880 –> 00:01:42,960
not because Microsoft broke something,

42
00:01:42,960 –> 00:01:45,440
because you moved from configuration-driven execution

43
00:01:45,440 –> 00:01:47,360
to interpretation-driven execution,

44
00:01:47,360 –> 00:01:49,160
that distinction matters.

45
00:01:49,160 –> 00:01:51,320
In deterministic SaaS, the workflow is defined

46
00:01:51,320 –> 00:01:52,440
at design time.

47
00:01:52,440 –> 00:01:55,200
Someone models a process, writes a flow, builds a form,

48
00:01:55,200 –> 00:01:57,040
configures a connector, assigns a role.

49
00:01:57,040 –> 00:01:58,320
When a user clicks the button,

50
00:01:58,320 –> 00:02:01,080
the system executes the path you already defined.

51
00:02:01,080 –> 00:02:03,080
You can be wrong, but you’re wrong in a stable way.

52
00:02:03,080 –> 00:02:06,360
In agentic systems, the workflow is assembled at runtime.

53
00:02:06,360 –> 00:02:07,720
The system doesn’t just execute,

54
00:02:07,720 –> 00:02:10,640
it decides what to execute based on intent, context,

55
00:02:10,640 –> 00:02:13,160
tool availability, and whatever memory you’re grounding,

56
00:02:13,160 –> 00:02:14,320
you’ve allowed it to access.

57
00:02:14,320 –> 00:02:17,320
It chooses a path, it chooses a tool, it chooses a source.

58
00:02:17,320 –> 00:02:19,320
And if you think that choice is just the model,

59
00:02:19,320 –> 00:02:20,400
you miss the point.

60
00:02:20,400 –> 00:02:22,520
The choice is the product of an orchestration stack,

61
00:02:22,520 –> 00:02:25,440
prompts, policies, plug-ins, connectors, permissions,

62
00:02:25,440 –> 00:02:27,840
retrieval, ranking, and the user’s environment.

63
00:02:27,840 –> 00:02:29,480
That stack becomes your new runtime.

64
00:02:29,480 –> 00:02:31,920
So when leaders ask for the co-pilot rollout plan,

65
00:02:31,920 –> 00:02:34,480
what they’re actually asking without realizing it is,

66
00:02:34,480 –> 00:02:36,880
how do we deploy a distributed decision engine

67
00:02:36,880 –> 00:02:38,720
into our organization without changing

68
00:02:38,720 –> 00:02:40,560
how we control decisions?

69
00:02:40,560 –> 00:02:42,960
They’re asking for a plan that preserves the old contract,

70
00:02:42,960 –> 00:02:43,920
user to app.

71
00:02:43,920 –> 00:02:45,960
User to app is the SaaS era contract.

72
00:02:45,960 –> 00:02:47,960
The user initiates the app executes.

73
00:02:47,960 –> 00:02:50,600
Identity and access management is built around that.

74
00:02:50,600 –> 00:02:53,000
A human principle signs in, gets a token,

75
00:02:53,000 –> 00:02:55,120
performs an action inside a bounded app surface.

76
00:02:55,120 –> 00:02:57,440
The blast radius is mostly the app plus the permissions

77
00:02:57,440 –> 00:02:58,240
you granted.

78
00:02:58,240 –> 00:03:00,080
Post-SaaS breaks that contract.

79
00:03:00,080 –> 00:03:02,480
The new contract is intent to orchestration.

80
00:03:02,480 –> 00:03:04,800
The user expresses intent, the orchestration layer

81
00:03:04,800 –> 00:03:07,800
interprets it and then delegates execution across tools,

82
00:03:07,800 –> 00:03:09,960
sometimes across multiple tools.

83
00:03:09,960 –> 00:03:11,840
Using authorities that are often broader

84
00:03:11,840 –> 00:03:13,480
than the user understands.

85
00:03:13,480 –> 00:03:15,560
The user doesn’t use SharePoint.

86
00:03:15,560 –> 00:03:18,280
The user expresses, find the doc, summarize it,

87
00:03:18,280 –> 00:03:20,920
send the action items, and the orchestration layer

88
00:03:20,920 –> 00:03:23,440
touches SharePoint Outlook teams.

89
00:03:23,440 –> 00:03:25,760
Maybe a power automate flow, maybe a connector,

90
00:03:25,760 –> 00:03:27,000
maybe an external system.

91
00:03:27,000 –> 00:03:28,080
That’s not user to app.

92
00:03:28,080 –> 00:03:31,000
That’s intent to tool chain, and it’s not optional.

93
00:03:31,000 –> 00:03:32,320
This is the uncomfortable truth.

94
00:03:32,320 –> 00:03:34,840
Once you introduce agents, you are no longer running

95
00:03:34,840 –> 00:03:36,600
a set of SaaS services.

96
00:03:36,600 –> 00:03:38,480
You are running an orchestration fabric.

97
00:03:38,480 –> 00:03:41,480
The SaaS services become tool endpoints inside that fabric.

98
00:03:41,480 –> 00:03:43,760
The UI becomes a conversational interface,

99
00:03:43,760 –> 00:03:46,080
and the workflow becomes a probabilistic plan

100
00:03:46,080 –> 00:03:47,240
assembled on demand.

101
00:03:47,240 –> 00:03:49,000
This is why so many organizations feel

102
00:03:49,000 –> 00:03:51,520
like they’re making progress, but their architecture feels

103
00:03:51,520 –> 00:03:52,880
less stable every quarter.

104
00:03:52,880 –> 00:03:55,560
They treat AI like an ad on, but it behaves like

105
00:03:55,560 –> 00:03:57,120
an operating model shift.

106
00:03:57,120 –> 00:03:59,120
They stand up adoption training and call it done,

107
00:03:59,120 –> 00:04:01,800
but the system changes where decisions get made.

108
00:04:01,800 –> 00:04:03,520
They add a few guardrails, but guardrails

109
00:04:03,520 –> 00:04:04,880
don’t define contracts.

110
00:04:04,880 –> 00:04:07,920
They create approved prompts, but prompts are not controls.

111
00:04:07,920 –> 00:04:11,440
They are suggestions to a reasoning system that is optimized

112
00:04:11,440 –> 00:04:13,360
to be helpful, not obedient.

113
00:04:13,360 –> 00:04:14,640
Here’s what most people miss.

114
00:04:14,640 –> 00:04:17,200
The real scaling event isn’t that more people will use

115
00:04:17,200 –> 00:04:18,000
co-pilot.

116
00:04:18,000 –> 00:04:20,040
The real scaling event is that you’re introducing

117
00:04:20,040 –> 00:04:22,880
non-human actors, agents that will perform actions,

118
00:04:22,880 –> 00:04:24,600
chain actions, and delegate actions,

119
00:04:24,600 –> 00:04:27,040
and those actions will be shaped by a constantly changing

120
00:04:27,040 –> 00:04:27,880
environment.

121
00:04:27,880 –> 00:04:30,480
New connectors, updated models, revised prompts,

122
00:04:30,480 –> 00:04:32,880
shifting data quality, changing permissions,

123
00:04:32,880 –> 00:04:34,800
and drift in the information estate.

124
00:04:34,800 –> 00:04:37,280
That means your system can have the same configuration

125
00:04:37,280 –> 00:04:39,560
and still produce different outcomes week to week.

126
00:04:39,560 –> 00:04:40,600
That’s not a bug.

127
00:04:40,600 –> 00:04:42,480
That’s probabilistic execution.

128
00:04:42,480 –> 00:04:44,680
So the foundational misunderstanding is simple.

129
00:04:44,680 –> 00:04:46,720
If you approach AI as a feature,

130
00:04:46,720 –> 00:04:50,480
you’ll keep applying SAS era controls to a post-SAS runtime.

131
00:04:50,480 –> 00:04:52,280
You’ll measure adoption, not behavior.

132
00:04:52,280 –> 00:04:54,720
You’ll inventory licenses, not decision pathways.

133
00:04:54,720 –> 00:04:56,280
You’ll ask, is it enabled?

134
00:04:56,280 –> 00:04:57,600
Not is it legible?

135
00:04:57,600 –> 00:04:58,920
And the consequence is predictable.

136
00:04:58,920 –> 00:05:00,400
You won’t get simplification.

137
00:05:00,400 –> 00:05:02,680
You’ll get acceleration, and the architecture

138
00:05:02,680 –> 00:05:04,040
won’t visibly collapse.

139
00:05:04,040 –> 00:05:05,600
It’ll just stop matching reality.

140
00:05:05,600 –> 00:05:07,880
Now define what post-SAS actually means

141
00:05:07,880 –> 00:05:10,240
without the futurist nonsense.

142
00:05:10,240 –> 00:05:13,280
What post-SAS actually means in enterprise architecture.

143
00:05:13,280 –> 00:05:15,360
Post-SAS doesn’t mean SAS is dead.

144
00:05:15,360 –> 00:05:18,480
It means SAS stopped being the place where work completes.

145
00:05:18,480 –> 00:05:20,720
In the SAS era, enterprise architecture

146
00:05:20,720 –> 00:05:23,760
leaned on a stable contract, a user interface,

147
00:05:23,760 –> 00:05:27,280
an API surface, and predictable state transitions.

148
00:05:27,280 –> 00:05:29,960
You could argue about quality, uptime, licensing,

149
00:05:29,960 –> 00:05:32,600
or integration pain, but the shape of the system

150
00:05:32,600 –> 00:05:33,440
was consistent.

151
00:05:33,440 –> 00:05:36,800
A request came in, the platform executed a defined operation,

152
00:05:36,800 –> 00:05:38,640
and a record-changed state operators

153
00:05:38,640 –> 00:05:40,480
could observe it, architects could bound it,

154
00:05:40,480 –> 00:05:41,560
auditors could test it.

155
00:05:41,560 –> 00:05:43,960
That contract is what made service ownership work.

156
00:05:43,960 –> 00:05:47,920
Teams owned exchange, SharePoint, Teams, Dynamics, whatever.

157
00:05:47,920 –> 00:05:49,720
Because the workload boundary roughly matched

158
00:05:49,720 –> 00:05:51,000
where execution happened.

159
00:05:51,000 –> 00:05:52,960
When something went wrong, you knew where to look.

160
00:05:52,960 –> 00:05:54,960
It might take time, but the system

161
00:05:54,960 –> 00:05:57,880
gave you a finite set of places to interrogate.

162
00:05:57,880 –> 00:06:01,360
Logs, policies, permissions, connectors, runbooks.

163
00:06:01,360 –> 00:06:04,520
Post-SAS is what happens when you add a probabilistic overlay

164
00:06:04,520 –> 00:06:06,080
that sits above those contracts

165
00:06:06,080 –> 00:06:09,800
and starts interpreting intent instead of executing commands.

166
00:06:09,800 –> 00:06:12,760
That overlay has four parts that matter architecturally.

167
00:06:12,760 –> 00:06:15,680
Prompts, tools, memory, and delegation.

168
00:06:15,680 –> 00:06:17,320
Prompts are not user input.

169
00:06:17,320 –> 00:06:18,480
They’re runtime policy.

170
00:06:18,480 –> 00:06:19,360
They shape behavior.

171
00:06:19,360 –> 00:06:21,240
They constrain scope, and they change faster

172
00:06:21,240 –> 00:06:23,240
than change management can track.

173
00:06:23,240 –> 00:06:24,960
Tools are not integrations.

174
00:06:24,960 –> 00:06:26,880
They’re executable capabilities.

175
00:06:26,880 –> 00:06:30,480
Connectors, plugins, graph calls, flows, APIs.

176
00:06:30,480 –> 00:06:32,040
Memory isn’t just chat history.

177
00:06:32,040 –> 00:06:35,040
It’s what the system can remember, retrieve, and treat

178
00:06:35,040 –> 00:06:38,800
as context across sessions, across users, across time.

179
00:06:38,800 –> 00:06:40,880
Delegation is the quiet multiplier.

180
00:06:40,880 –> 00:06:43,880
One agent hands work to another agent, which calls another tool,

181
00:06:43,880 –> 00:06:45,280
which triggers another workflow.

182
00:06:45,280 –> 00:06:48,840
So the system, you thought, was Microsoft 365 plus some

183
00:06:48,840 –> 00:06:51,600
automations becomes a distributed orchestration

184
00:06:51,600 –> 00:06:54,360
fabric that assembles execution parts on demand.

185
00:06:54,360 –> 00:06:55,640
Here’s where the contract breaks.

186
00:06:55,640 –> 00:06:57,760
In SAS, the boundary lives at the API.

187
00:06:57,760 –> 00:06:59,840
If the API call happened, you can trace it.

188
00:06:59,840 –> 00:07:02,200
If a permission allowed it, you can justify it.

189
00:07:02,200 –> 00:07:04,360
If an audit log recorded it, you can defend it.

190
00:07:04,360 –> 00:07:06,160
The system is still deterministic enough

191
00:07:06,160 –> 00:07:08,640
that what happened and why it happened are linked.

192
00:07:08,640 –> 00:07:11,280
In post-SARS, interpretation replaces execution

193
00:07:11,280 –> 00:07:12,960
as the dominant mechanism.

194
00:07:12,960 –> 00:07:14,800
The agent doesn’t just call create event.

195
00:07:14,800 –> 00:07:18,040
It decides whether the user meant schedule, draft,

196
00:07:18,040 –> 00:07:21,760
delegate, or summarize, then chooses which tools to invoke

197
00:07:21,760 –> 00:07:25,120
in what order, with what parameters, based on context,

198
00:07:25,120 –> 00:07:27,320
that is not visible to the user, and often not

199
00:07:27,320 –> 00:07:28,960
visible to the operator.

200
00:07:28,960 –> 00:07:30,720
The output looks like a single experience.

201
00:07:30,720 –> 00:07:32,240
The reality is a tool chain.

202
00:07:32,240 –> 00:07:34,680
That distinction matters because architecture

203
00:07:34,680 –> 00:07:37,040
is fundamentally about controlling side effects.

204
00:07:37,040 –> 00:07:40,360
In deterministic systems, side effects come from explicit calls.

205
00:07:40,360 –> 00:07:42,160
In probabilistic systems, side effects

206
00:07:42,160 –> 00:07:43,400
come from implicit plans.

207
00:07:43,400 –> 00:07:46,360
And you don’t control implicit plans with documentation.

208
00:07:46,360 –> 00:07:48,520
You control them with contracts and boundaries.

209
00:07:48,520 –> 00:07:50,720
The orchestration layer can’t casually step over.

210
00:07:50,720 –> 00:07:53,400
This is why more automation is the wrong frame.

211
00:07:53,400 –> 00:07:56,000
Automation assumes you’re codifying a known sequence.

212
00:07:56,000 –> 00:07:58,120
You design it, you test it, you deploy it.

213
00:07:58,120 –> 00:08:00,960
If it breaks, it breaks in the same place until you fix it.

214
00:08:00,960 –> 00:08:03,120
Post-sass systems don’t just run sequences.

215
00:08:03,120 –> 00:08:04,120
They synthesize them.

216
00:08:04,120 –> 00:08:06,040
Two users ask the same thing.

217
00:08:06,040 –> 00:08:07,960
And the system takes two different paths

218
00:08:07,960 –> 00:08:10,000
because context differs, tool availability

219
00:08:10,000 –> 00:08:13,240
differs, permissions differ, or the model selection differs.

220
00:08:13,240 –> 00:08:14,840
You get different execution, not because you

221
00:08:14,840 –> 00:08:16,960
change configuration, but because the runtime

222
00:08:16,960 –> 00:08:18,560
interpreted the intent differently.

223
00:08:18,560 –> 00:08:20,440
So Post-sass is a new control surface.

224
00:08:20,440 –> 00:08:23,080
The control plane is no longer only policies, roles,

225
00:08:23,080 –> 00:08:25,480
and settings inside each SAS workload.

226
00:08:25,480 –> 00:08:26,960
It becomes the orchestration layer.

227
00:08:26,960 –> 00:08:28,080
What tools exist?

228
00:08:28,080 –> 00:08:31,280
Who can use them? How identity is represented to tools?

229
00:08:31,280 –> 00:08:33,840
What context is allowed? How memory persists?

230
00:08:33,840 –> 00:08:35,680
How delegation is constrained?

231
00:08:35,680 –> 00:08:38,360
And what gets logged in a way humans can reconstruct?

232
00:08:38,360 –> 00:08:39,320
And it’s not theoretical.

233
00:08:39,320 –> 00:08:41,160
Microsoft is building toward this with agent

234
00:08:41,160 –> 00:08:44,680
runtimes across M365, agent building in Copilot Studio,

235
00:08:44,680 –> 00:08:47,120
and orchestration stacks in Azure AI Foundry.

236
00:08:47,120 –> 00:08:48,040
The details change.

237
00:08:48,040 –> 00:08:49,840
The architectural behavior does not.

238
00:08:49,840 –> 00:08:53,080
Once an enterprise allows intent to orchestration at scale,

239
00:08:53,080 –> 00:08:56,000
the architecture stops being a diagram of apps and services.

240
00:08:56,000 –> 00:08:57,960
It becomes a graph of decision pathways

241
00:08:57,960 –> 00:09:00,280
and if you don’t model that graph explicitly,

242
00:09:00,280 –> 00:09:02,120
you don’t have a Post-sass strategy.

243
00:09:02,120 –> 00:09:04,040
You have a collection of probabilistic behaviors

244
00:09:04,040 –> 00:09:06,840
that only look coherent because the UI hides the wiring.

245
00:09:06,840 –> 00:09:08,880
Now the paradox, the more intelligence you add,

246
00:09:08,880 –> 00:09:11,040
the faster that wiring fragments.

247
00:09:11,040 –> 00:09:12,400
The Post-sass paradox.

248
00:09:12,400 –> 00:09:14,720
Intelligence accelerates fragmentation.

249
00:09:14,720 –> 00:09:16,880
The promise of agents is consolidation.

250
00:09:16,880 –> 00:09:19,440
One interface, one copilot, one place to ask,

251
00:09:19,440 –> 00:09:20,800
handle this and have the platform

252
00:09:20,800 –> 00:09:23,240
stitch the work together across SharePoint teams,

253
00:09:23,240 –> 00:09:26,240
Outlook, Power Platform, and whatever else you connected.

254
00:09:26,240 –> 00:09:28,880
Leadership hears that and thinks, fewer apps,

255
00:09:28,880 –> 00:09:30,720
fewer processes, fewer tickets,

256
00:09:30,720 –> 00:09:33,000
fewer people needed to babysit the mess.

257
00:09:33,000 –> 00:09:34,440
They’re not wrong about the intent.

258
00:09:34,440 –> 00:09:36,400
They’re wrong about the system behavior

259
00:09:36,400 –> 00:09:38,440
because intelligence doesn’t remove complexity.

260
00:09:38,440 –> 00:09:41,000
It redistributes it and when you redistribute complexity

261
00:09:41,000 –> 00:09:44,040
into runtime decisions, fragmentation stops being an accident.

262
00:09:44,040 –> 00:09:45,680
It becomes the default outcome.

263
00:09:45,680 –> 00:09:47,240
Here’s what most people miss.

264
00:09:47,240 –> 00:09:49,640
SAS era fragmentation was mostly structural.

265
00:09:49,640 –> 00:09:51,960
Too many apps, too many sites, too many teams,

266
00:09:51,960 –> 00:09:52,760
too many connectors.

267
00:09:52,760 –> 00:09:54,600
You could see it, you could inventory it.

268
00:09:54,600 –> 00:09:56,240
You could produce a depressing spreadsheet

269
00:09:56,240 –> 00:09:58,200
and pretend that was control.

270
00:09:58,200 –> 00:10:00,640
Agent-era fragmentation is behavioral.

271
00:10:00,640 –> 00:10:03,480
And behavior fragments faster than configuration ever did.

272
00:10:03,480 –> 00:10:04,320
Why?

273
00:10:04,320 –> 00:10:05,600
Because every team optimizes locally.

274
00:10:05,600 –> 00:10:06,280
Always.

275
00:10:06,280 –> 00:10:09,120
Sales tunes copilot prompts for pipeline updates.

276
00:10:09,120 –> 00:10:11,040
Legal tunes it for contract analysis.

277
00:10:11,040 –> 00:10:12,840
Finance tunes it for reconciliation.

278
00:10:12,840 –> 00:10:14,720
HR tunes it for onboarding.

279
00:10:14,720 –> 00:10:16,560
Each group adds just one more plug-in,

280
00:10:16,560 –> 00:10:18,760
just one more connector, just one more exception,

281
00:10:18,760 –> 00:10:21,840
until the orchestration layer stops representing an enterprise

282
00:10:21,840 –> 00:10:25,960
and starts representing a set of departments with incompatible assumptions.

283
00:10:25,960 –> 00:10:28,440
Local optimization creates global incoherence.

284
00:10:28,440 –> 00:10:29,320
That’s the paradox.

285
00:10:29,320 –> 00:10:32,080
The more useful the agent becomes for each team,

286
00:10:32,080 –> 00:10:34,560
the less consistent the overall system becomes.

287
00:10:34,560 –> 00:10:36,640
And it doesn’t look like fragmentation in the UI.

288
00:10:36,640 –> 00:10:38,160
It looks like copilot working.

289
00:10:38,160 –> 00:10:40,520
Until someone crosses a boundary and discovers the agent

290
00:10:40,520 –> 00:10:42,160
they thought was a shared capability,

291
00:10:42,160 –> 00:10:45,360
is actually a dozen different runtimes with a dozen different toolchains.

292
00:10:45,360 –> 00:10:48,160
This is where standardization becomes an endless chase.

293
00:10:48,160 –> 00:10:50,160
Organizations respond the same way they always do.

294
00:10:50,160 –> 00:10:51,080
They write guidance.

295
00:10:51,080 –> 00:10:52,400
They publish a prompt library.

296
00:10:52,400 –> 00:10:54,240
They declare approved plug-ins.

297
00:10:54,240 –> 00:10:55,680
They create a governance page.

298
00:10:55,680 –> 00:10:57,040
They schedule a quarterly review.

299
00:10:57,040 –> 00:10:58,840
And then the system keeps drifting anyway

300
00:10:58,840 –> 00:11:01,600
because the drift isn’t coming from a missing policy document.

301
00:11:01,600 –> 00:11:03,240
It’s coming from the runtime itself.

302
00:11:03,240 –> 00:11:06,160
A model update changes tool selection patterns.

303
00:11:06,160 –> 00:11:09,240
A connector update changes what data is reachable.

304
00:11:09,240 –> 00:11:12,000
A new team’s feature changes the context surface.

305
00:11:12,000 –> 00:11:15,040
A user discovers a better phrasing and shares it in a chat.

306
00:11:15,040 –> 00:11:17,440
A maker copies a flow and tweaks one step.

307
00:11:17,440 –> 00:11:19,880
Nothing big changed, but outcomes diverged.

308
00:11:19,880 –> 00:11:21,560
That’s not configuration drift.

309
00:11:21,560 –> 00:11:23,000
That’s behavior drift.

310
00:11:23,000 –> 00:11:25,440
And behavior drift beats configuration drift

311
00:11:25,440 –> 00:11:27,880
because you can’t differ the way you diff settings.

312
00:11:27,880 –> 00:11:30,320
You can’t audit it the way you audit roles.

313
00:11:30,320 –> 00:11:33,280
You can’t test it once and assume stability for six months.

314
00:11:33,280 –> 00:11:35,920
The system makes new decisions every time it runs.

315
00:11:35,920 –> 00:11:38,040
So the paradox becomes operationally visible

316
00:11:38,040 –> 00:11:39,480
in a very specific way.

317
00:11:39,480 –> 00:11:42,880
Incidents shift from the system is down to the system behaved wrong.

318
00:11:42,880 –> 00:11:44,160
Nobody gets an outage banner.

319
00:11:44,160 –> 00:11:45,000
Nothing is throttled.

320
00:11:45,000 –> 00:11:46,840
The service health page is green.

321
00:11:46,840 –> 00:11:49,320
But a team swears copilot used to

322
00:11:49,320 –> 00:11:52,280
find the right policy doc and now it cites the wrong one.

323
00:11:52,280 –> 00:11:55,040
Or an agent used to summarize a meeting accurately

324
00:11:55,040 –> 00:11:57,520
and now it pulls in irrelevant context.

325
00:11:57,520 –> 00:11:59,280
Or a flow used to create one record

326
00:11:59,280 –> 00:12:00,880
and now it creates duplicates.

327
00:12:00,880 –> 00:12:03,800
Or the agent helpfully emailed a draft

328
00:12:03,800 –> 00:12:05,200
to the wrong distribution list

329
00:12:05,200 –> 00:12:07,400
because the runtime chose a different toolpath

330
00:12:07,400 –> 00:12:08,080
than last week.

331
00:12:08,080 –> 00:12:09,480
That’s a different class of failure.

332
00:12:09,480 –> 00:12:11,640
And it’s worse for leaders because it turns control

333
00:12:11,640 –> 00:12:12,560
into probability.

334
00:12:12,560 –> 00:12:13,880
The platform isn’t broken.

335
00:12:13,880 –> 00:12:15,960
Your assumptions are.

336
00:12:15,960 –> 00:12:17,920
This might seem backwards, but the more intelligence

337
00:12:17,920 –> 00:12:20,520
you add, the more you multiply the number of possible execution

338
00:12:20,520 –> 00:12:21,320
paths.

339
00:12:21,320 –> 00:12:23,880
Every tool you attach is another branch in the decision graph.

340
00:12:23,880 –> 00:12:25,640
Every memory source is another influence.

341
00:12:25,640 –> 00:12:28,560
Every delegated agent is another interpreter.

342
00:12:28,560 –> 00:12:32,120
The system becomes a branching tree of could do options.

343
00:12:32,120 –> 00:12:34,880
And you no longer control which branch gets taken

344
00:12:34,880 –> 00:12:36,680
by setting a policy in one admin center.

345
00:12:36,680 –> 00:12:38,200
You control it by designing boundaries

346
00:12:38,200 –> 00:12:39,560
the runtime can’t violate.

347
00:12:39,560 –> 00:12:42,920
Without those boundaries, standardization becomes theater.

348
00:12:42,920 –> 00:12:44,720
You will be rolling out copilot forever

349
00:12:44,720 –> 00:12:47,480
because every new use case creates a new local optimum.

350
00:12:47,480 –> 00:12:50,280
Every local optimum becomes another divergence.

351
00:12:50,280 –> 00:12:52,920
And over time, the enterprise stops having an architecture.

352
00:12:52,920 –> 00:12:55,200
It has a collection of probabilistic behaviors

353
00:12:55,200 –> 00:12:56,360
that sometimes align.

354
00:12:56,360 –> 00:12:58,640
The real enemy isn’t that teams move too fast.

355
00:12:58,640 –> 00:13:00,520
The real enemy is that nobody defined

356
00:13:00,520 –> 00:13:02,480
what must remain deterministic.

357
00:13:02,480 –> 00:13:04,400
So intelligence accelerates fragmentation

358
00:13:04,400 –> 00:13:06,720
because it turns execution into choice.

359
00:13:06,720 –> 00:13:09,680
And choice always follows incentives, not diagrams.

360
00:13:09,680 –> 00:13:12,720
And incentives are local.

361
00:13:12,720 –> 00:13:14,360
Now name the thing that’s actually happening.

362
00:13:14,360 –> 00:13:17,680
Not disorder, not sprawl, not governance gaps.

363
00:13:17,680 –> 00:13:18,600
Entropy.

364
00:13:18,600 –> 00:13:22,280
Architectural entropy, not disorder, but unmanaged decision pathways.

365
00:13:22,280 –> 00:13:26,160
Entropy gets used like an insult, like it means messy, uncontrolled.

366
00:13:26,160 –> 00:13:27,800
People aren’t following the process.

367
00:13:27,800 –> 00:13:28,800
That’s not what’s happening.

368
00:13:28,800 –> 00:13:30,600
Architectural entropy is not disorder.

369
00:13:30,600 –> 00:13:33,480
It’s the accumulation of unmanaged decision pathways

370
00:13:33,480 –> 00:13:35,360
that produce side effects you didn’t model,

371
00:13:35,360 –> 00:13:38,400
didn’t approve and can’t reliably trace after the fact.

372
00:13:38,400 –> 00:13:41,400
In the SAS era, the dominant pathways were predictable.

373
00:13:41,400 –> 00:13:42,720
A user clicked in the UI.

374
00:13:42,720 –> 00:13:43,920
An API call executed.

375
00:13:43,920 –> 00:13:46,920
A record change state, you could argue about who should have had access

376
00:13:46,920 –> 00:13:48,680
or whether the process was designed well,

377
00:13:48,680 –> 00:13:50,480
but the pathway itself was visible.

378
00:13:50,480 –> 00:13:52,840
It left a trail you could follow because the system ran

379
00:13:52,840 –> 00:13:54,000
what you configured.

380
00:13:54,000 –> 00:13:57,160
In post-SARS, systems, pathways multiply at runtime.

381
00:13:57,160 –> 00:14:00,200
An agent interprets intent, selects tools, pulls context,

382
00:14:00,200 –> 00:14:02,880
chooses an action sequence, and sometimes delegates.

383
00:14:02,880 –> 00:14:06,360
That creates a decision graph that is wider than your documentation

384
00:14:06,360 –> 00:14:08,040
and faster than your review cycles.

385
00:14:08,040 –> 00:14:10,400
And every time you add one more connector, one more plug-in,

386
00:14:10,400 –> 00:14:11,640
one more helpful automation,

387
00:14:11,640 –> 00:14:13,400
you add branches to that graph.

388
00:14:13,400 –> 00:14:16,840
That’s entropy, more branches, more side effects, less certainty.

389
00:14:16,840 –> 00:14:18,200
Here’s the uncomfortable truth.

390
00:14:18,200 –> 00:14:20,600
Most organizations are still trying to manage entropy

391
00:14:20,600 –> 00:14:22,000
like its configuration drift.

392
00:14:22,000 –> 00:14:23,600
They look for the settings that changed.

393
00:14:23,600 –> 00:14:25,080
They hunt for the toggle that flipped.

394
00:14:25,080 –> 00:14:26,840
They ask who modified the policy.

395
00:14:26,840 –> 00:14:28,120
And sometimes that’s valid.

396
00:14:28,120 –> 00:14:30,480
But the new failure mode isn’t a setting changing.

397
00:14:30,480 –> 00:14:32,080
It’s a pathway becoming possible.

398
00:14:32,080 –> 00:14:34,680
Once a pathway exists, it will eventually be used,

399
00:14:34,680 –> 00:14:36,640
not maliciously, not even intentionally,

400
00:14:36,640 –> 00:14:39,200
just because the system optimizes for completion

401
00:14:39,200 –> 00:14:41,920
and humans optimize for it worked once.

402
00:14:41,920 –> 00:14:42,920
So ship it.

403
00:14:42,920 –> 00:14:44,520
Those pathways accumulate.

404
00:14:44,520 –> 00:14:46,600
And they don’t show up in your architecture diagrams

405
00:14:46,600 –> 00:14:48,720
because diagrams describe designed flows.

406
00:14:48,720 –> 00:14:50,360
Agents create executed flows.

407
00:14:50,360 –> 00:14:51,880
That distinction matters.

408
00:14:51,880 –> 00:14:54,200
Deterministic systems fail like machines.

409
00:14:54,200 –> 00:14:56,560
They fail loudly, outages, errors, timeouts,

410
00:14:56,560 –> 00:14:57,560
authentication breaks.

411
00:14:57,560 –> 00:14:59,800
You get MTTR because you can point at a component

412
00:14:59,800 –> 00:15:01,440
and say this thing failed.

413
00:15:01,440 –> 00:15:03,520
Probabilistic systems fail like organizations.

414
00:15:03,520 –> 00:15:05,120
They fail ambiguously.

415
00:15:05,120 –> 00:15:07,200
Nothing is down, but the outcome is wrong.

416
00:15:07,200 –> 00:15:08,360
The system did something.

417
00:15:08,360 –> 00:15:10,360
And now you’re arguing about whether it was a bug,

418
00:15:10,360 –> 00:15:12,000
a misinterpretation of permissions edge,

419
00:15:12,000 –> 00:15:13,880
a context issue, or a prompt drift problem.

420
00:15:13,880 –> 00:15:15,720
That’s not MTTR. That’s a debate.

421
00:15:15,720 –> 00:15:16,920
And the debate is the cost.

422
00:15:16,920 –> 00:15:19,960
This is why exceptions are entropy generators.

423
00:15:19,960 –> 00:15:22,640
In the SAS era, exceptions were already dangerous,

424
00:15:22,640 –> 00:15:24,200
but they were usually bounded.

425
00:15:24,200 –> 00:15:26,920
A specific mailbox gets a transport rule exception.

426
00:15:26,920 –> 00:15:29,360
A specific group gets an access exception.

427
00:15:29,360 –> 00:15:32,040
A specific site gets an external sharing exception.

428
00:15:32,040 –> 00:15:34,000
It’s bad, but at least it’s a stable bad.

429
00:15:34,000 –> 00:15:36,640
In the agent era, exceptions don’t stay local.

430
00:15:36,640 –> 00:15:38,720
A, just this one’s connector approval

431
00:15:38,720 –> 00:15:40,360
becomes a reusable capability.

432
00:15:40,360 –> 00:15:43,000
A temporary graph permission becomes a new normal.

433
00:15:43,000 –> 00:15:45,000
A prompt tweak becomes a copy template.

434
00:15:45,000 –> 00:15:46,560
A flow fork becomes a pattern.

435
00:15:46,560 –> 00:15:48,280
An environment created for testing

436
00:15:48,280 –> 00:15:51,200
becomes the place where production runs because it worked.

437
00:15:51,200 –> 00:15:52,320
These aren’t accidents.

438
00:15:52,320 –> 00:15:55,480
They’re how systems behave when intent is not enforced by design.

439
00:15:55,480 –> 00:15:57,440
So entropy isn’t the absence of governance.

440
00:15:57,440 –> 00:16:00,920
It’s the absence of boundaries that make your assumptions true.

441
00:16:00,920 –> 00:16:04,320
And the cost shows up in three places, leaders actually feel.

442
00:16:04,320 –> 00:16:06,960
First, change slows down.

443
00:16:06,960 –> 00:16:09,120
Not because teams are lazy, because nobody

444
00:16:09,120 –> 00:16:10,800
knows what a change will break anymore.

445
00:16:10,800 –> 00:16:13,640
When execution is probabilistic and tool chains are implicit,

446
00:16:13,640 –> 00:16:16,520
every change becomes a risk to pathways you didn’t know existed.

447
00:16:16,520 –> 00:16:19,000
So teams add reviews, then add more reviews,

448
00:16:19,000 –> 00:16:22,240
then add manual approvals, and eventually velocity collapses–

449
00:16:22,240 –> 00:16:24,200
entropy taxes, speed.

450
00:16:24,200 –> 00:16:26,720
Second, incident ambiguity explodes.

451
00:16:26,720 –> 00:16:28,360
Your best engineers spend their time

452
00:16:28,360 –> 00:16:30,720
reconstructing what the system saw, what it decided,

453
00:16:30,720 –> 00:16:31,520
and what it did.

454
00:16:31,520 –> 00:16:34,000
The work turns into forensic analysis of tool calls,

455
00:16:34,000 –> 00:16:36,720
context selection, memory retrieval, and delegation chains.

456
00:16:36,720 –> 00:16:38,320
You’re not fixing a broken server.

457
00:16:38,320 –> 00:16:39,640
You’re reconstructing a decision.

458
00:16:39,640 –> 00:16:42,040
Third, invisible dependencies multiply.

459
00:16:42,040 –> 00:16:45,520
In deterministic SAS, dependencies are mostly explicit.

460
00:16:45,520 –> 00:16:48,720
This app calls that API, this workflow triggers that service.

461
00:16:48,720 –> 00:16:50,960
In post-SAS, dependencies become conditional.

462
00:16:50,960 –> 00:16:54,280
The agent might call this tool if it interprets the request that way,

463
00:16:54,280 –> 00:16:55,000
but it might not.

464
00:16:55,000 –> 00:16:57,720
So you can’t map dependencies as a static graph.

465
00:16:57,720 –> 00:16:59,240
You inherit a probabilistic one.

466
00:16:59,240 –> 00:17:01,880
And that is exactly how architectural erosion happens,

467
00:17:01,880 –> 00:17:03,600
not with a single catastrophic failure,

468
00:17:03,600 –> 00:17:05,960
with a thousand small pathways nobody owned.

469
00:17:05,960 –> 00:17:08,080
So when people say AI is making things messy,

470
00:17:08,080 –> 00:17:09,480
the correction is simple.

471
00:17:09,480 –> 00:17:11,600
AI is making decision pathways cheap,

472
00:17:11,600 –> 00:17:13,320
and anything cheap gets overproduced.

473
00:17:13,320 –> 00:17:15,400
The fix doesn’t start with a new admin center.

474
00:17:15,400 –> 00:17:17,280
It starts with making those pathways measurable

475
00:17:17,280 –> 00:17:19,160
because what can’t be measured will be explained away

476
00:17:19,160 –> 00:17:22,560
as user error until it becomes systemic.

477
00:17:22,560 –> 00:17:25,320
The next section is the metric leaders keep ignoring.

478
00:17:25,320 –> 00:17:27,040
Mean time to explain.

479
00:17:27,040 –> 00:17:28,360
The metric leaders ignore.

480
00:17:28,360 –> 00:17:32,720
Mean time to explain MTTR is the metric everyone knows

481
00:17:32,720 –> 00:17:35,840
because MTTR fits deterministic failure, something breaks,

482
00:17:35,840 –> 00:17:38,000
you identify the component, you restore service,

483
00:17:38,000 –> 00:17:39,040
you close the ticket.

484
00:17:39,040 –> 00:17:42,200
MTTR assumes the question is how fast can we fix it?

485
00:17:42,200 –> 00:17:44,720
Because the system already told you what it is.

486
00:17:44,720 –> 00:17:46,480
Post-SAS breaks that assumption.

487
00:17:46,480 –> 00:17:48,960
The new bottleneck is not fixing, it’s explaining.

488
00:17:48,960 –> 00:17:52,600
Mean time to explain.

489
00:17:52,600 –> 00:17:54,640
Is the time it takes your best people to answer

490
00:17:54,640 –> 00:17:56,640
a single, humiliating question?

491
00:17:56,640 –> 00:17:58,000
Why did the system do that?

492
00:17:58,000 –> 00:17:59,120
Not why did it fail?

493
00:17:59,120 –> 00:18:00,520
Why did it behave that way?

494
00:18:00,520 –> 00:18:03,400
MTTR shows up the moment your incident narrative stops being

495
00:18:03,400 –> 00:18:05,200
technical and becomes interpretive.

496
00:18:05,200 –> 00:18:07,600
The service health page is green, authentication works,

497
00:18:07,600 –> 00:18:10,000
no CPU spikes, no obvious outage,

498
00:18:10,000 –> 00:18:12,400
but the output is wrong or inconsistent or risky

499
00:18:12,400 –> 00:18:13,360
or just different.

500
00:18:13,360 –> 00:18:14,800
And now you’re not restoring service.

501
00:18:14,800 –> 00:18:17,480
You’re reconstructing intent, context, and delegation

502
00:18:17,480 –> 00:18:19,800
across a toolchain that nobody can see in one place.

503
00:18:19,800 –> 00:18:21,600
This is the part executives underestimate

504
00:18:21,600 –> 00:18:24,200
because it looks like software, it isn’t.

505
00:18:24,200 –> 00:18:27,440
MTTR is the cost of operating a distributed decision

506
00:18:27,440 –> 00:18:29,400
engine without deterministic boundaries.

507
00:18:29,400 –> 00:18:32,120
And it grows with every new tool, every new connector,

508
00:18:32,120 –> 00:18:35,400
every new prompt variant, and every new small automation

509
00:18:35,400 –> 00:18:37,240
that becomes part of the runtime.

510
00:18:37,240 –> 00:18:38,840
Here’s what drives MTT in practice.

511
00:18:38,840 –> 00:18:40,400
First, tool calls.

512
00:18:40,400 –> 00:18:43,520
An agent doesn’t just answer, it calls tools, graph,

513
00:18:43,520 –> 00:18:46,360
connectors, flows, external APIs,

514
00:18:46,360 –> 00:18:48,640
sometimes multiple tools in a chain.

515
00:18:48,640 –> 00:18:50,120
If you can’t see the tool sequence

516
00:18:50,120 –> 00:18:52,480
and the parameters used, you can’t explain the outcome.

517
00:18:52,480 –> 00:18:53,640
You can only guess.

518
00:18:53,640 –> 00:18:55,720
Guessing is not an incident response strategy.

519
00:18:55,720 –> 00:18:56,760
It’s a career hazard.

520
00:18:56,760 –> 00:18:58,920
Second, delegated actions.

521
00:18:58,920 –> 00:19:00,800
An agent that delegates to another agent

522
00:19:00,800 –> 00:19:02,640
creates a second decision boundary.

523
00:19:02,640 –> 00:19:04,560
The parent agent made a choice to delegate.

524
00:19:04,560 –> 00:19:06,920
The child agent made a choice about execution.

525
00:19:06,920 –> 00:19:09,120
And now you have at least two sets of instructions,

526
00:19:09,120 –> 00:19:11,520
two context windows, and potentially two different tool

527
00:19:11,520 –> 00:19:12,080
catalogs.

528
00:19:12,080 –> 00:19:14,080
That delegation chain is an entropy multiplier

529
00:19:14,080 –> 00:19:16,000
because it fragments accountability.

530
00:19:16,000 –> 00:19:18,760
Everyone will claim their piece worked as designed

531
00:19:18,760 –> 00:19:21,000
because nobody owns the behavior of the whole.

532
00:19:21,000 –> 00:19:22,960
Third, hidden grounding.

533
00:19:22,960 –> 00:19:26,760
In M365 land, grounding is often whatever the system could see,

534
00:19:26,760 –> 00:19:28,280
which sounds safe until you remember.

535
00:19:28,280 –> 00:19:29,880
Visibility is not intent.

536
00:19:29,880 –> 00:19:32,280
If copilot pulled in a document, a chat thread,

537
00:19:32,280 –> 00:19:34,920
or a meeting transcript, the user didn’t expect,

538
00:19:34,920 –> 00:19:37,720
the output can drift without any configuration change.

539
00:19:37,720 –> 00:19:40,040
And when you investigate, you realize your logs can tell

540
00:19:40,040 –> 00:19:42,120
you something accessed SharePoint,

541
00:19:42,120 –> 00:19:44,240
but not what the model selected as relevant

542
00:19:44,240 –> 00:19:46,440
or why it ranked one source above another.

543
00:19:46,440 –> 00:19:47,640
That gap is MTT.

544
00:19:47,640 –> 00:19:49,720
Fourth, prompt and version drift.

545
00:19:49,720 –> 00:19:52,320
In the SAS era, you tracked configuration versions

546
00:19:52,320 –> 00:19:53,640
and release notes.

547
00:19:53,640 –> 00:19:55,720
In the agent era, prompts are runtime logic

548
00:19:55,720 –> 00:19:57,120
and they drift like folk knowledge.

549
00:19:57,120 –> 00:19:58,280
A better prompt gets shared.

550
00:19:58,280 –> 00:20:00,720
Someone forks an agent, a maker tweaks instructions,

551
00:20:00,720 –> 00:20:03,560
a model update shifts how the same prompt is interpreted.

552
00:20:03,560 –> 00:20:05,960
Now, the organization has multiple behavioral versions

553
00:20:05,960 –> 00:20:08,360
of what everyone thinks is the same copilot.

554
00:20:08,360 –> 00:20:10,560
And when something goes wrong, the hardest part

555
00:20:10,560 –> 00:20:12,840
is just finding which version of the instructions

556
00:20:12,840 –> 00:20:13,840
produce the output.

557
00:20:13,840 –> 00:20:17,160
So MTT is not a new KPI for the sake of novelty.

558
00:20:17,160 –> 00:20:20,360
It’s the board-relevant risk metric for agentic systems.

559
00:20:20,360 –> 00:20:22,640
Because audits don’t care that you have logging.

560
00:20:22,640 –> 00:20:25,080
Audits care that you can explain a decision path.

561
00:20:25,080 –> 00:20:27,120
If your best answer is the model decided,

562
00:20:27,120 –> 00:20:28,520
you don’t have auditability.

563
00:20:28,520 –> 00:20:30,720
You have theater with timestamps.

564
00:20:30,720 –> 00:20:34,120
An MTT connects directly to velocity, variety and volume.

565
00:20:34,120 –> 00:20:36,480
The forces that harbored points at, but most leaders treat

566
00:20:36,480 –> 00:20:37,960
like adoption trivia.

567
00:20:37,960 –> 00:20:39,760
Velocity compresses change cycles

568
00:20:39,760 –> 00:20:42,480
until your explanations lag behind reality.

569
00:20:42,480 –> 00:20:45,080
Variety multiplies the number of possible runtimes

570
00:20:45,080 –> 00:20:46,960
that could have produced the behavior.

571
00:20:46,960 –> 00:20:49,920
Volume increases the count of autonomous decisions per day

572
00:20:49,920 –> 00:20:52,120
until we’ll look into it becomes the default state

573
00:20:52,120 –> 00:20:52,880
of operations.

574
00:20:52,880 –> 00:20:55,120
This is why MTT matters more than MTTR.

575
00:20:55,120 –> 00:20:58,200
MTTR tells you how fast you can recover a system you understand.

576
00:20:58,200 –> 00:21:01,240
MTT tells you how often you operate a system you don’t.

577
00:21:01,240 –> 00:21:03,920
And once MTT crosses a threshold, your architecture

578
00:21:03,920 –> 00:21:05,000
stops scaling.

579
00:21:05,000 –> 00:21:07,880
Not because compute is expensive, but because explanation is.

580
00:21:07,880 –> 00:21:10,040
At that point, you can still deploy more agents.

581
00:21:10,040 –> 00:21:11,160
The platform will let you.

582
00:21:11,160 –> 00:21:13,000
You just won’t be able to defend what they did

583
00:21:13,000 –> 00:21:15,400
or prove why they did it or predict what they’ll do next.

584
00:21:15,400 –> 00:21:17,280
And that’s the moment the enterprise realizes

585
00:21:17,280 –> 00:21:18,480
it didn’t buy automation.

586
00:21:18,480 –> 00:21:20,040
It bought ambiguity at scale.

587
00:21:20,040 –> 00:21:21,920
Now take that metric and apply it to the first

588
00:21:21,920 –> 00:21:24,920
accelerant velocity because AI compresses change cycles

589
00:21:24,920 –> 00:21:27,120
until governance, review, and even architecture

590
00:21:27,120 –> 00:21:28,240
language can’t keep up.

591
00:21:28,240 –> 00:21:31,120
Velocity, AI compresses change cycles until governance

592
00:21:31,120 –> 00:21:32,320
becomes irrelevant.

593
00:21:32,320 –> 00:21:34,320
Velocity is the first accelerant because it attacks

594
00:21:34,320 –> 00:21:37,160
the one thing enterprise IT relies on to stay sane time.

595
00:21:37,160 –> 00:21:38,920
In the SAS era, change had friction.

596
00:21:38,920 –> 00:21:40,600
Product teams shipped monthly.

597
00:21:40,600 –> 00:21:42,400
Enterprises reviewed quarterly.

598
00:21:42,400 –> 00:21:47,000
Security did annual attestations and called it continuous improvement.

599
00:21:47,000 –> 00:21:49,840
Nobody loved that cadence, but it matched reality.

600
00:21:49,840 –> 00:21:52,280
Configuration changed slower than people’s ability

601
00:21:52,280 –> 00:21:53,240
to understand it.

602
00:21:53,240 –> 00:21:55,520
AI breaks that, not because it ships faster,

603
00:21:55,520 –> 00:21:56,840
because it behaves faster.

604
00:21:56,840 –> 00:21:59,720
Harbridge frames velocity as the pace of technology change,

605
00:21:59,720 –> 00:22:00,320
and he’s right.

606
00:22:00,320 –> 00:22:03,520
But most leaders still translate that into feature velocity,

607
00:22:03,520 –> 00:22:05,960
new buttons in teams, a new co-pilot pain,

608
00:22:05,960 –> 00:22:07,360
a new admin setting.

609
00:22:07,360 –> 00:22:08,120
That’s manageable.

610
00:22:08,120 –> 00:22:10,160
Annoying but manageable, agent velocity

611
00:22:10,160 –> 00:22:11,600
is behavioral velocity.

612
00:22:11,600 –> 00:22:14,360
It’s how quickly the system’s decision patterns shift,

613
00:22:14,360 –> 00:22:16,480
even when you didn’t approve a change.

614
00:22:16,480 –> 00:22:19,560
A model update changes how intent is classified.

615
00:22:19,560 –> 00:22:21,840
A retrieval change changes what gets grounded.

616
00:22:21,840 –> 00:22:24,280
A connector change changes what tools are available.

617
00:22:24,280 –> 00:22:27,520
A new prompt pattern goes viral inside one department

618
00:22:27,520 –> 00:22:30,120
and becomes de facto runtime policy by lunchtime.

619
00:22:30,120 –> 00:22:32,280
The system is not waiting for your change window.

620
00:22:32,280 –> 00:22:35,120
It’s evolving while you’re still writing the risk assessment.

621
00:22:35,120 –> 00:22:36,480
This is the uncomfortable truth.

622
00:22:36,480 –> 00:22:39,240
Your control plane lags behind your execution plane.

623
00:22:39,240 –> 00:22:40,840
And the gap is where entropy grows.

624
00:22:40,840 –> 00:22:43,920
Look at what happens in Microsoft ecosystem specifically.

625
00:22:43,920 –> 00:22:46,480
A co-pilot experience lands in one workload than another.

626
00:22:46,480 –> 00:22:47,560
A preview becomes GA.

627
00:22:47,560 –> 00:22:48,880
A plug-in gets introduced.

628
00:22:48,880 –> 00:22:50,840
A co-pilot studio expands capability.

629
00:22:50,840 –> 00:22:53,320
As your eye foundry adds orchestration features

630
00:22:53,320 –> 00:22:55,920
like connected agents or workflow patterns.

631
00:22:55,920 –> 00:22:58,680
Meanwhile teams are iterating prompts and automations daily

632
00:22:58,680 –> 00:23:00,880
because the cost of iteration is basically zero.

633
00:23:00,880 –> 00:23:03,240
So policy review cadences stop being governance.

634
00:23:03,240 –> 00:23:05,280
They become archeology.

635
00:23:05,280 –> 00:23:07,840
By the time a committee meets to decide whether a connector

636
00:23:07,840 –> 00:23:09,600
is approved, someone already used it,

637
00:23:09,600 –> 00:23:11,920
wrapped it in a flow, embedded it in an agent,

638
00:23:11,920 –> 00:23:14,360
and shipped it as just a productivity helper.

639
00:23:14,360 –> 00:23:15,880
The decision got made at runtime.

640
00:23:15,880 –> 00:23:17,480
After the fact you can argue about it,

641
00:23:17,480 –> 00:23:19,160
the system already executed it.

642
00:23:19,160 –> 00:23:21,120
This is why we’ll govern after the pilot

643
00:23:21,120 –> 00:23:23,200
is such a reliable failure pattern.

644
00:23:23,200 –> 00:23:25,800
In deterministic systems, pilots are bounded.

645
00:23:25,800 –> 00:23:28,520
A subset of users, a subset of capabilities,

646
00:23:28,520 –> 00:23:30,080
a stable set of controls.

647
00:23:30,080 –> 00:23:31,920
In agentex systems, pilots leak.

648
00:23:31,920 –> 00:23:33,960
People copy what works, templates spread.

649
00:23:33,960 –> 00:23:35,800
A single agent becomes 24x.

650
00:23:35,800 –> 00:23:38,320
A single good prompt becomes a library of variations.

651
00:23:38,320 –> 00:23:40,680
And because the experience is conversational,

652
00:23:40,680 –> 00:23:42,520
people don’t treat it like code.

653
00:23:42,520 –> 00:23:43,600
They treat it like advice.

654
00:23:43,600 –> 00:23:44,720
But it runs like code.

655
00:23:44,720 –> 00:23:47,640
That mismatch is exactly where velocity turns into risk.

656
00:23:47,640 –> 00:23:49,360
And here’s the part leaders hate hearing.

657
00:23:49,360 –> 00:23:51,080
Citizen builders are not the problem.

658
00:23:51,080 –> 00:23:52,640
They are the delivery mechanism.

659
00:23:52,640 –> 00:23:55,400
Power platform, co-pilot studio, and reusable templates

660
00:23:55,400 –> 00:23:57,160
are accelerants that compress the time

661
00:23:57,160 –> 00:23:58,720
between intent and execution.

662
00:23:58,720 –> 00:23:59,440
That’s the point.

663
00:23:59,440 –> 00:24:01,760
The platform is designed to reduce friction.

664
00:24:01,760 –> 00:24:03,800
And friction is what used to protect the enterprise

665
00:24:03,800 –> 00:24:04,480
from itself.

666
00:24:04,480 –> 00:24:06,280
So when velocity spikes, the enterprise

667
00:24:06,280 –> 00:24:07,400
doesn’t just ship more.

668
00:24:07,400 –> 00:24:08,960
It revises reality more often.

669
00:24:08,960 –> 00:24:11,280
And when reality revises faster than architecture

670
00:24:11,280 –> 00:24:14,200
can be explained, M-T-T-E explodes.

671
00:24:14,200 –> 00:24:16,000
Your operators spend their time answering,

672
00:24:16,000 –> 00:24:17,680
why did it do that?

673
00:24:17,680 –> 00:24:21,240
Instead of improving the system, because that keeps changing.

674
00:24:21,240 –> 00:24:23,440
This also changes how security debt behaves.

675
00:24:23,440 –> 00:24:25,920
In the SAS era, security debt was mostly dormant

676
00:24:25,920 –> 00:24:29,360
until something poked it and audit a breach, a migration.

677
00:24:29,360 –> 00:24:32,800
In the agent era, security debt becomes active fuel.

678
00:24:32,800 –> 00:24:35,520
Old oversharing in SharePoint isn’t just an ugly legacy

679
00:24:35,520 –> 00:24:36,160
problem.

680
00:24:36,160 –> 00:24:37,920
It becomes immediate model context.

681
00:24:37,920 –> 00:24:39,680
Old guest access isn’t just a risk.

682
00:24:39,680 –> 00:24:41,160
It becomes an action pathway.

683
00:24:41,160 –> 00:24:43,040
Old often groups aren’t just clutter.

684
00:24:43,040 –> 00:24:45,440
They become permissioned edges an agent can traverse

685
00:24:45,440 –> 00:24:46,520
if it’s allowed to.

686
00:24:46,520 –> 00:24:48,000
Velocity doesn’t create the debt.

687
00:24:48,000 –> 00:24:49,320
It monetizes it.

688
00:24:49,320 –> 00:24:51,600
And because velocity compresses the feedback loop,

689
00:24:51,600 –> 00:24:54,120
organizations start responding with the wrong tool.

690
00:24:54,120 –> 00:24:56,240
More meetings, more approvals, more checklists,

691
00:24:56,240 –> 00:24:57,280
more governance.

692
00:24:57,280 –> 00:24:58,720
That doesn’t slow the runtime.

693
00:24:58,720 –> 00:24:59,800
It just slows the humans.

694
00:24:59,800 –> 00:25:01,200
The system keeps executing.

695
00:25:01,200 –> 00:25:03,560
The organization becomes the bottleneck.

696
00:25:03,560 –> 00:25:06,440
So the practical definition of velocity in post-SAS

697
00:25:06,440 –> 00:25:07,400
is simple.

698
00:25:07,400 –> 00:25:09,280
It’s the rate at which behavior changes

699
00:25:09,280 –> 00:25:11,160
relative to your ability to explain it.

700
00:25:11,160 –> 00:25:13,240
Once that ratio breaks, governance becomes

701
00:25:13,240 –> 00:25:15,520
irrelevant in the literal sense, not important,

702
00:25:15,520 –> 00:25:18,360
but unable to influence outcomes before they occur.

703
00:25:18,360 –> 00:25:20,480
And that’s why velocity never arrives alone.

704
00:25:20,480 –> 00:25:23,320
It immediately collides with the second accelerant, variety.

705
00:25:23,320 –> 00:25:25,280
Because once the platform can change this fast,

706
00:25:25,280 –> 00:25:27,720
it also changes in more ways than your architecture language

707
00:25:27,720 –> 00:25:29,000
can keep up with.

708
00:25:29,000 –> 00:25:30,000
Variety.

709
00:25:30,000 –> 00:25:32,440
Agent experiences multiply faster than your architecture

710
00:25:32,440 –> 00:25:33,160
language.

711
00:25:33,160 –> 00:25:35,080
Variety is where leaders lose the plot because it

712
00:25:35,080 –> 00:25:36,080
doesn’t look like risk.

713
00:25:36,080 –> 00:25:38,840
It looks like options, one copilot experience in teams,

714
00:25:38,840 –> 00:25:40,840
another in outlook, a copilot painting

715
00:25:40,840 –> 00:25:42,920
SharePoint, a declarative agent someone

716
00:25:42,920 –> 00:25:44,680
made in five minutes, a custom engine

717
00:25:44,680 –> 00:25:47,560
agent built by a dev team, a power automate flow

718
00:25:47,560 –> 00:25:51,440
that just calls AI once, a plug-in, a connector, a tool,

719
00:25:51,440 –> 00:25:54,480
a memory store, a retrieval system, a model switch,

720
00:25:54,480 –> 00:25:56,960
all of that feels like the ecosystem getting richer.

721
00:25:56,960 –> 00:26:00,160
Architecturally, it’s the ecosystem getting less coherent.

722
00:26:00,160 –> 00:26:02,600
Because variety isn’t just more ways to build.

723
00:26:02,600 –> 00:26:05,960
It’s more runtimes, more context surfaces, more tool catalogs,

724
00:26:05,960 –> 00:26:08,440
more execution semantics, and every runtime

725
00:26:08,440 –> 00:26:10,120
behaves slightly differently.

726
00:26:10,120 –> 00:26:12,400
Even when the branding is identical and the user thinks

727
00:26:12,400 –> 00:26:16,480
they’re talking to copilot, that distinction matters.

728
00:26:16,480 –> 00:26:19,040
In the SAS era, you could build an architecture language

729
00:26:19,040 –> 00:26:20,320
around workloads.

730
00:26:20,320 –> 00:26:21,960
Exchange behaves like exchange.

731
00:26:21,960 –> 00:26:23,600
SharePoint behaves like SharePoint.

732
00:26:23,600 –> 00:26:24,920
Teams behaves like teams.

733
00:26:24,920 –> 00:26:27,000
You could argue about integration, but you could still

734
00:26:27,000 –> 00:26:29,360
model boundaries because the execution semantics

735
00:26:29,360 –> 00:26:30,280
were stable enough.

736
00:26:30,280 –> 00:26:32,400
In the agent era, those boundaries blur

737
00:26:32,400 –> 00:26:34,400
because the work stops happening inside the app

738
00:26:34,400 –> 00:26:36,280
and starts happening across a tool chain.

739
00:26:36,280 –> 00:26:40,120
Now, the same user intent, summarize this, draft that,

740
00:26:40,120 –> 00:26:42,680
find the policy, notify the group,

741
00:26:42,680 –> 00:26:44,600
can land in different orchestration stacks

742
00:26:44,600 –> 00:26:46,720
depending on where the user asked.

743
00:26:46,720 –> 00:26:48,400
Teams has one context surface.

744
00:26:48,400 –> 00:26:52,080
Chats, channels, meetings, transcripts, Outlook has another.

745
00:26:52,080 –> 00:26:55,040
Mail threads, calendars, attachments, mailboxes.

746
00:26:55,040 –> 00:26:57,960
SharePoint has another, sites, pages, libraries, permissions,

747
00:26:57,960 –> 00:26:58,960
metadata.

748
00:26:58,960 –> 00:27:01,200
Even if the model is shared, the retrieval and grounding

749
00:27:01,200 –> 00:27:02,320
pathways aren’t.

750
00:27:02,320 –> 00:27:04,720
So the enterprise ends up with one copilot that behaves

751
00:27:04,720 –> 00:27:05,800
like 3, 5, or 10.

752
00:27:05,800 –> 00:27:06,920
This is the hidden variety.

753
00:27:06,920 –> 00:27:07,760
It isn’t the UX.

754
00:27:07,760 –> 00:27:09,360
It’s the tool chain and the reasoning pattern

755
00:27:09,360 –> 00:27:10,520
behind the UX.

756
00:27:10,520 –> 00:27:12,160
And it multiplies in two ways at once.

757
00:27:12,160 –> 00:27:15,160
First, the visible variety, which Microsoft will happily ship,

758
00:27:15,160 –> 00:27:17,800
copilot UX in multiple apps, the Clarity of agents

759
00:27:17,800 –> 00:27:19,000
in copilot studio.

760
00:27:19,000 –> 00:27:21,520
Custom engine agents via Pro Code Toolkits.

761
00:27:21,520 –> 00:27:23,560
Azure AI Foundry orchestration patterns

762
00:27:23,560 –> 00:27:26,240
like connected agents and multi agent workflows,

763
00:27:26,240 –> 00:27:29,400
MCP servers exposing tools, agent to agent delegation,

764
00:27:29,400 –> 00:27:32,280
different model options, different grounding approaches.

765
00:27:32,280 –> 00:27:33,680
None of this is inherently bad.

766
00:27:33,680 –> 00:27:35,520
The system is behaving like a platform.

767
00:27:35,520 –> 00:27:38,080
But a platform doesn’t give you one standard way to operate.

768
00:27:38,080 –> 00:27:39,040
It gives you a menu.

769
00:27:39,040 –> 00:27:40,800
And enterprises are terrible at menus.

770
00:27:40,800 –> 00:27:42,960
They select based on local pain, local skills,

771
00:27:42,960 –> 00:27:44,120
and local deadlines.

772
00:27:44,120 –> 00:27:45,680
Then they call it strategy.

773
00:27:45,680 –> 00:27:49,000
Second, the invisible variety, which enterprises

774
00:27:49,000 –> 00:27:50,600
create for themselves.

775
00:27:50,600 –> 00:27:52,440
Different teams build different tool chains.

776
00:27:52,440 –> 00:27:54,560
One group relies on SharePoint as a knowledge base.

777
00:27:54,560 –> 00:27:55,880
Another relies on one note.

778
00:27:55,880 –> 00:27:57,480
Another relies on teams’ messages.

779
00:27:57,480 –> 00:28:00,160
Another relies on PDFs in random libraries.

780
00:28:00,160 –> 00:28:02,360
One team builds a flow that writes to dataverse.

781
00:28:02,360 –> 00:28:03,920
Another team writes to a spreadsheet.

782
00:28:03,920 –> 00:28:05,320
Another team sends an email.

783
00:28:05,320 –> 00:28:07,320
Another team posts into a team’s channel,

784
00:28:07,320 –> 00:28:08,720
same business intent.

785
00:28:08,720 –> 00:28:10,440
Four different execution parts.

786
00:28:10,440 –> 00:28:12,080
Four different side effects.

787
00:28:12,080 –> 00:28:13,520
Four different failure modes.

788
00:28:13,520 –> 00:28:16,360
And now the same policy doesn’t create the same posture.

789
00:28:16,360 –> 00:28:18,280
This is where security teams get blindsided.

790
00:28:18,280 –> 00:28:20,000
They assume that if conditional access,

791
00:28:20,000 –> 00:28:22,560
DLP labels and access reviews are central,

792
00:28:22,560 –> 00:28:25,240
then the agent experience is centrally controlled.

793
00:28:25,240 –> 00:28:26,920
That was true when the application boundary

794
00:28:26,920 –> 00:28:28,600
was the control surface.

795
00:28:28,600 –> 00:28:31,520
In posts, the control surface is the orchestration layer.

796
00:28:31,520 –> 00:28:34,280
What tools are reachable, what context is selectable,

797
00:28:34,280 –> 00:28:37,040
what memory is persistent, what delegation is allowed,

798
00:28:37,040 –> 00:28:39,480
and what identity is presented to the tools.

799
00:28:39,480 –> 00:28:40,880
So even with central policies,

800
00:28:40,880 –> 00:28:43,360
variety creates inconsistent outcomes.

801
00:28:43,360 –> 00:28:45,680
One agent uses a connector with delegated permissions

802
00:28:45,680 –> 00:28:48,640
that quietly exceeds what the user thinks they authorized.

803
00:28:48,640 –> 00:28:50,680
Another agent uses a different connector

804
00:28:50,680 –> 00:28:54,000
that fails and falls back to a different data source.

805
00:28:54,000 –> 00:28:55,880
One runtime strips citations.

806
00:28:55,880 –> 00:28:57,160
Another keeps them.

807
00:28:57,160 –> 00:28:58,200
One runtime can act.

808
00:28:58,200 –> 00:28:59,480
Another can only suggest.

809
00:28:59,480 –> 00:29:02,520
One runtime logs tool calls in a way you can trace.

810
00:29:02,520 –> 00:29:04,920
Another leaves you with conversational smoke.

811
00:29:04,920 –> 00:29:07,760
Same organization, same intent, different behavior.

812
00:29:07,760 –> 00:29:09,960
And because the variety is distributed across tools,

813
00:29:09,960 –> 00:29:12,680
builders and teams, your architecture language can’t keep up.

814
00:29:12,680 –> 00:29:14,920
Your diagram still shows apps and services.

815
00:29:14,920 –> 00:29:17,800
The system is actually a shifting set of agent runtimes

816
00:29:17,800 –> 00:29:18,840
and toolchains.

817
00:29:18,840 –> 00:29:20,520
You’re describing a deterministic world

818
00:29:20,520 –> 00:29:22,560
while operating a probabilistic one.

819
00:29:22,560 –> 00:29:25,320
That mismatch is why incidents feel surreal.

820
00:29:25,320 –> 00:29:27,720
Operators aren’t asking which service failed.

821
00:29:27,720 –> 00:29:29,760
They’re asking which runtime did this user hit

822
00:29:29,760 –> 00:29:31,720
with which context, with which tool catalog

823
00:29:31,720 –> 00:29:34,560
with which prompt version and which permission edge.

824
00:29:34,560 –> 00:29:36,680
That’s M-T-T-E getting paid in full.

825
00:29:36,680 –> 00:29:39,200
And variety is also the bridge to the final accelerant

826
00:29:39,200 –> 00:29:41,040
because once you have many runtimes,

827
00:29:41,040 –> 00:29:42,800
you inevitably get many instances.

828
00:29:42,800 –> 00:29:45,680
Variety becomes volume the moment those experiences scale

829
00:29:45,680 –> 00:29:46,920
beyond the handful of pilots

830
00:29:46,920 –> 00:29:49,320
and become the default way work gets done.

831
00:29:49,320 –> 00:29:50,160
Volume.

832
00:29:50,160 –> 00:29:53,000
The agent to human ratio quietly explodes.

833
00:29:53,000 –> 00:29:54,800
Volume is the part leaders think they understand

834
00:29:54,800 –> 00:29:57,200
because they’ve lived through volume for 20 years.

835
00:29:57,200 –> 00:30:00,080
More mailboxes, more teams, more sharepoint sites,

836
00:30:00,080 –> 00:30:02,800
more documents, more groups, more apps, more logs,

837
00:30:02,800 –> 00:30:04,280
more tickets.

838
00:30:04,280 –> 00:30:06,520
Volume felt like a storage and operations problem.

839
00:30:06,520 –> 00:30:09,720
So enterprises build inventory thinking, count the things,

840
00:30:09,720 –> 00:30:12,360
classify the things, put policies on the things,

841
00:30:12,360 –> 00:30:15,720
then try to slow the rate at which new things appear.

842
00:30:15,720 –> 00:30:17,480
That logic collapses in the agent era

843
00:30:17,480 –> 00:30:19,680
because volume isn’t primarily artifacts.

844
00:30:19,680 –> 00:30:20,800
It’s decisions.

845
00:30:20,800 –> 00:30:23,920
The real scaling event is not that you’ll have a lot of agents.

846
00:30:23,920 –> 00:30:26,200
It’s that you’ll have a lot of autonomous decision points

847
00:30:26,200 –> 00:30:28,760
firing all day across thousands of users

848
00:30:28,760 –> 00:30:30,720
and those decisions will create side effects

849
00:30:30,720 –> 00:30:32,040
in systems of record.

850
00:30:32,040 –> 00:30:34,600
Calendar entries, emails, records in dataverse,

851
00:30:34,600 –> 00:30:36,920
permissions changes, tickets, notifications,

852
00:30:36,920 –> 00:30:39,200
file copies, labels, shares, links,

853
00:30:39,200 –> 00:30:40,760
and unlike SaaS era volume,

854
00:30:40,760 –> 00:30:43,320
you don’t get one decision per click, you get chains.

855
00:30:43,320 –> 00:30:47,720
A single user intent becomes multiple tool calls

856
00:30:47,720 –> 00:30:50,000
and each tool call becomes a potential fork.

857
00:30:50,000 –> 00:30:52,560
Retries, fallbacks, alternate sources,

858
00:30:52,560 –> 00:30:55,320
delegated sub agents and compensating actions

859
00:30:55,320 –> 00:30:57,160
when something partially succeeds.

860
00:30:57,160 –> 00:31:00,280
That means the number that matters isn’t agents per tenant.

861
00:31:00,280 –> 00:31:02,240
It’s autonomous actions per day.

862
00:31:02,240 –> 00:31:03,880
This is why the agent to human ratio

863
00:31:03,880 –> 00:31:05,560
is such a useful mental model.

864
00:31:05,560 –> 00:31:06,880
The ratio is never stable.

865
00:31:06,880 –> 00:31:08,760
It always grows because once an organization

866
00:31:08,760 –> 00:31:10,320
has one working agent pattern,

867
00:31:10,320 –> 00:31:13,240
it gets copied, templated, and embedded into workflows

868
00:31:13,240 –> 00:31:16,640
until the default expectation becomes the agent handles it.

869
00:31:16,640 –> 00:31:18,200
Humans only review the exceptions.

870
00:31:18,200 –> 00:31:18,960
That’s fine.

871
00:31:18,960 –> 00:31:22,120
Right up until you realize the ratio also drives blast radius.

872
00:31:22,120 –> 00:31:25,000
Every additional agent doesn’t just add another capability.

873
00:31:25,000 –> 00:31:28,400
It adds another execution pathway that can touch data,

874
00:31:28,400 –> 00:31:30,560
trigger workflows, and create side effects.

875
00:31:30,560 –> 00:31:32,680
And those pathways don’t exist in isolation.

876
00:31:32,680 –> 00:31:34,920
They share tool catalogs, they share connectors,

877
00:31:34,920 –> 00:31:37,120
they share permissions, they share data stores.

878
00:31:37,120 –> 00:31:39,200
So the marginal risk of one more agent

879
00:31:39,200 –> 00:31:40,720
isn’t one more thing to manage.

880
00:31:40,720 –> 00:31:42,400
It’s more load on the same brittle graph.

881
00:31:42,400 –> 00:31:44,080
Here’s where inventory thinking fails.

882
00:31:44,080 –> 00:31:46,720
Counting agents doesn’t tell you anything about their authority.

883
00:31:46,720 –> 00:31:48,840
A declarative agent that can only retrieve

884
00:31:48,840 –> 00:31:52,440
and summarize content behaves like a read-only reporting surface.

885
00:31:52,440 –> 00:31:55,600
It can still leak information, but it can’t mutate systems.

886
00:31:55,600 –> 00:31:58,240
A task agent that can send mail, create records,

887
00:31:58,240 –> 00:32:01,040
or trigger flows is a different class of risk.

888
00:32:01,040 –> 00:32:04,120
A decision agent that can choose actions without human review

889
00:32:04,120 –> 00:32:05,560
is a different class again.

890
00:32:05,560 –> 00:32:08,200
So if leadership asks how many agents do we have,

891
00:32:08,200 –> 00:32:10,440
the only accurate answer is that’s the wrong question.

892
00:32:10,440 –> 00:32:13,040
The right question is how many autonomous decisions

893
00:32:13,040 –> 00:32:15,760
can execute side effects and where are those decisions

894
00:32:15,760 –> 00:32:16,560
allowed to land?

895
00:32:16,560 –> 00:32:18,760
Volume also creates a specific sprawl pattern

896
00:32:18,760 –> 00:32:21,160
that looks harmless until it becomes permanent.

897
00:32:21,160 –> 00:32:24,640
Duplicated agents, forked prompts, often flows,

898
00:32:24,640 –> 00:32:26,960
environment drift, someone copies an agent

899
00:32:26,960 –> 00:32:29,080
because it’s faster than requesting access,

900
00:32:29,080 –> 00:32:31,160
someone forks a prompt because it’s just wording.

901
00:32:31,160 –> 00:32:32,960
Someone creates a new connector

902
00:32:32,960 –> 00:32:34,680
because the approved one is slow.

903
00:32:34,680 –> 00:32:36,720
Someone builds a flow in a personal environment

904
00:32:36,720 –> 00:32:39,360
because they’re testing, then the test becomes production

905
00:32:39,360 –> 00:32:40,200
because it works.

906
00:32:40,200 –> 00:32:41,160
Those are not exceptions.

907
00:32:41,160 –> 00:32:43,080
Those are entropy factories.

908
00:32:43,080 –> 00:32:45,760
And volume turns them into normal operations.

909
00:32:45,760 –> 00:32:48,360
This is where MTT becomes a certainty, not a risk.

910
00:32:48,360 –> 00:32:50,160
Because the more autonomous decisions you have,

911
00:32:50,160 –> 00:32:52,240
the more often you’ll need to explain one.

912
00:32:52,240 –> 00:32:55,360
And the explanation burden doesn’t scale linearly.

913
00:32:55,360 –> 00:32:57,720
It scales with the number of possible pathways,

914
00:32:57,720 –> 00:32:59,160
the number of runtime versions,

915
00:32:59,160 –> 00:33:01,440
and the number of implicit dependencies.

916
00:33:01,440 –> 00:33:03,560
So the enterprise does what it always does.

917
00:33:03,560 –> 00:33:05,960
It tries to centralize visibility after the fact,

918
00:33:05,960 –> 00:33:08,400
a registry, a dashboard, a report, a monthly review

919
00:33:08,400 –> 00:33:10,040
of top agents that can help,

920
00:33:10,040 –> 00:33:12,080
but only if it’s tied to contracts.

921
00:33:12,080 –> 00:33:14,040
Otherwise, it becomes another spreadsheet of comfort

922
00:33:14,040 –> 00:33:17,160
because volume isn’t the enemy, unbounded volume is.

923
00:33:17,160 –> 00:33:18,600
An unbounded volume is what happens

924
00:33:18,600 –> 00:33:21,400
when organizations treat agents as helpers instead of products.

925
00:33:21,400 –> 00:33:23,560
Products have owners, products have versions,

926
00:33:23,560 –> 00:33:26,560
products have deprecation, products have telemetry

927
00:33:26,560 –> 00:33:28,240
that answers uncomfortable questions,

928
00:33:28,240 –> 00:33:30,840
helpers have enthusiasm, templates, and no life cycle.

929
00:33:30,840 –> 00:33:33,680
Over time, the agent workforce becomes the dominant workforce,

930
00:33:33,680 –> 00:33:36,200
not in headcount, but in executed actions.

931
00:33:36,200 –> 00:33:38,680
And once that happens, every weakness in identity,

932
00:33:38,680 –> 00:33:40,880
permissions, data quality, and observability

933
00:33:40,880 –> 00:33:42,360
gets amplified by automation.

934
00:33:42,360 –> 00:33:44,040
The system doesn’t just scale outcomes.

935
00:33:44,040 –> 00:33:46,320
It scales mistakes.

936
00:33:46,320 –> 00:33:48,760
That’s the point where leaders finally feel the paradox

937
00:33:48,760 –> 00:33:49,600
in their calendar.

938
00:33:49,600 –> 00:33:53,200
Nothing is down, but everything takes longer to trust.

939
00:33:53,200 –> 00:33:55,200
Now shift from theory to the first scenario

940
00:33:55,200 –> 00:33:56,720
everyone recognizes.

941
00:33:56,720 –> 00:33:58,440
We rolled out co-pilot.

942
00:33:58,440 –> 00:33:59,920
Scenario one setup.

943
00:33:59,920 –> 00:34:01,400
We rolled out co-pilot.

944
00:34:01,400 –> 00:34:03,760
This is the story every Microsoft leader tells right now

945
00:34:03,760 –> 00:34:05,600
because it sounds responsible.

946
00:34:05,600 –> 00:34:06,920
We rolled out co-pilot.

947
00:34:06,920 –> 00:34:09,120
Translation, procurement, bought the licenses,

948
00:34:09,120 –> 00:34:10,320
someone flipped the toggles.

949
00:34:10,320 –> 00:34:12,640
There was a readiness checklist, a couple of pilot teams,

950
00:34:12,640 –> 00:34:15,000
some prompt training, maybe a security review,

951
00:34:15,000 –> 00:34:17,240
and then a launch email with a SharePoint page

952
00:34:17,240 –> 00:34:18,760
full of cheerful guidance.

953
00:34:18,760 –> 00:34:21,280
If they’re more mature, they also turned on some reporting

954
00:34:21,280 –> 00:34:24,360
and created a channel where users can share great prompts.

955
00:34:24,360 –> 00:34:26,240
And then leadership expects the return.

956
00:34:26,240 –> 00:34:27,800
Fewer hours lost in email.

957
00:34:27,800 –> 00:34:28,880
Better meeting follow-ups.

958
00:34:28,880 –> 00:34:30,800
Less time searching for documents.

959
00:34:30,800 –> 00:34:33,520
Faster drafting, faster analysis, less friction.

960
00:34:33,520 –> 00:34:35,360
The usual narrative of productivity gain

961
00:34:35,360 –> 00:34:37,280
and to be clear, some of that is real.

962
00:34:37,280 –> 00:34:38,800
But the rollout framing is the trap

963
00:34:38,800 –> 00:34:40,800
because co-pilot is not an app you deployed

964
00:34:40,800 –> 00:34:41,880
into a clean environment.

965
00:34:41,880 –> 00:34:43,320
It’s an orchestrator you deployed

966
00:34:43,320 –> 00:34:45,600
on top of your existing information estate.

967
00:34:45,600 –> 00:34:46,960
And that estate is not tidy.

968
00:34:46,960 –> 00:34:47,640
It never was.

969
00:34:47,640 –> 00:34:49,160
It’s a decade of SharePoint permissions

970
00:34:49,160 –> 00:34:50,880
that drifted teams that proliferated,

971
00:34:50,880 –> 00:34:54,400
sites nobody owns anymore, documents with unclear lineage,

972
00:34:54,400 –> 00:34:56,960
retention policies that got applied unevenly,

973
00:34:56,960 –> 00:34:59,640
and a pile of temporary access that became permanent

974
00:34:59,640 –> 00:35:02,760
during the pandemic and was never revisited.

975
00:35:02,760 –> 00:35:04,200
Co-pilot doesn’t create that mess.

976
00:35:04,200 –> 00:35:05,640
It simply makes it executable.

977
00:35:05,640 –> 00:35:08,120
Here’s what most organizations miss in the first 90 days.

978
00:35:08,120 –> 00:35:10,600
The first order effect isn’t users got faster.

979
00:35:10,600 –> 00:35:12,360
The first order effect is that teams learn

980
00:35:12,360 –> 00:35:15,560
which contact surfaces co-pilot can see, which it can’t,

981
00:35:15,560 –> 00:35:18,160
and which it can be coaxed into seeing through workarounds.

982
00:35:18,160 –> 00:35:21,280
They learn which prompts reliably produce useful outputs.

983
00:35:21,280 –> 00:35:22,840
They learn which plugins or connectors

984
00:35:22,840 –> 00:35:24,400
unlock the missing capability.

985
00:35:24,400 –> 00:35:26,240
They learn which data sources are too noisy,

986
00:35:26,240 –> 00:35:27,240
so they root around them.

987
00:35:27,240 –> 00:35:28,600
That learning becomes behavior

988
00:35:28,600 –> 00:35:30,240
and behavior becomes a local standard.

989
00:35:30,240 –> 00:35:32,520
So the first thing that diverges is enablement,

990
00:35:32,520 –> 00:35:34,640
not the formal enablement, the real one.

991
00:35:34,640 –> 00:35:37,800
One business unit runs internal prompt clinics.

992
00:35:37,800 –> 00:35:39,920
Another shares prompts in a team’s chat.

993
00:35:39,920 –> 00:35:42,320
Another builds a private prompt library in one note,

994
00:35:42,320 –> 00:35:45,320
another hires a consultant who hands them a pack of templates,

995
00:35:45,320 –> 00:35:47,920
another quietly decides co-pilot is unreliable

996
00:35:47,920 –> 00:35:50,840
and stops using it, except for drafting emails

997
00:35:50,840 –> 00:35:52,280
because that’s safe.

998
00:35:52,280 –> 00:35:54,040
Now you don’t have one co-pilot rollout.

999
00:35:54,040 –> 00:35:55,640
You have multiple co-pilot cultures,

1000
00:35:55,640 –> 00:35:58,080
and that cultural drift turns into technical drift faster

1001
00:35:58,080 –> 00:35:59,480
than most architects expect

1002
00:35:59,480 –> 00:36:01,440
because co-pilot’s value rises with reach.

1003
00:36:01,440 –> 00:36:02,800
The moment a team hits the limit

1004
00:36:02,800 –> 00:36:04,320
of what basic co-pilot can do,

1005
00:36:04,320 –> 00:36:06,560
they don’t file a request for a new application.

1006
00:36:06,560 –> 00:36:08,880
They attach a capability, a plug-in,

1007
00:36:08,880 –> 00:36:10,760
a connector, a graph permission,

1008
00:36:10,760 –> 00:36:13,360
a co-pilot studio action, a power automate flow

1009
00:36:13,360 –> 00:36:16,360
that just helps co-pilot by doing the last mile,

1010
00:36:16,360 –> 00:36:18,320
a shortcut that creates a side effect

1011
00:36:18,320 –> 00:36:20,320
without making the side effect visible

1012
00:36:20,320 –> 00:36:22,320
and those attachments don’t happen centrally,

1013
00:36:22,320 –> 00:36:24,880
they happen where pain exists locally.

1014
00:36:24,880 –> 00:36:27,400
Under time pressure with good intentions.

1015
00:36:27,400 –> 00:36:30,840
This is where we rolled out co-pilot becomes structurally false

1016
00:36:30,840 –> 00:36:32,640
because you didn’t roll out a single thing.

1017
00:36:32,640 –> 00:36:34,280
You rolled out an orchestration layer

1018
00:36:34,280 –> 00:36:36,240
that behaves differently depending on the workload

1019
00:36:36,240 –> 00:36:37,080
and the team.

1020
00:36:37,080 –> 00:36:38,360
Teams becomes one runtime.

1021
00:36:38,360 –> 00:36:41,120
It has meetings, transcripts, chats, channels,

1022
00:36:41,120 –> 00:36:43,720
and a social graph that changes by the hour.

1023
00:36:43,720 –> 00:36:45,440
Outlook becomes another runtime,

1024
00:36:45,440 –> 00:36:48,280
mail threads, calendar context, attachments

1025
00:36:48,280 –> 00:36:49,840
and delegated mailboxes.

1026
00:36:49,840 –> 00:36:51,840
SharePoint becomes another runtime,

1027
00:36:51,840 –> 00:36:54,600
site permissions, library structures, metadata,

1028
00:36:54,600 –> 00:36:57,440
link sharing patterns, and an information architecture

1029
00:36:57,440 –> 00:37:01,040
that mostly exists in someone’s head from 2019.

1030
00:37:01,040 –> 00:37:04,080
So when an exec says co-pilot couldn’t find the policy,

1031
00:37:04,080 –> 00:37:05,400
that sentence is meaningless,

1032
00:37:05,400 –> 00:37:06,520
which co-pilot’s surface,

1033
00:37:06,520 –> 00:37:08,360
in which app grounded on which sources,

1034
00:37:08,360 –> 00:37:10,680
under which permissions, with which connectors enabled,

1035
00:37:10,680 –> 00:37:13,120
with what chat history, in which tenant configuration,

1036
00:37:13,120 –> 00:37:14,960
after which recent model update,

1037
00:37:14,960 –> 00:37:16,200
the platform isn’t one thing.

1038
00:37:16,200 –> 00:37:18,640
It’s a set of agent runtimes with a shared brand

1039
00:37:18,640 –> 00:37:20,760
and then the sprawl starts to look helpful.

1040
00:37:20,760 –> 00:37:21,920
It always does it first.

1041
00:37:21,920 –> 00:37:24,360
A department creates an approved prompt list.

1042
00:37:24,360 –> 00:37:26,400
Someone builds an HR co-pilot helper

1043
00:37:26,400 –> 00:37:27,600
that points at their SharePoint.

1044
00:37:27,600 –> 00:37:29,720
Someone builds a sales follow-up agent

1045
00:37:29,720 –> 00:37:32,520
that drafts emails and updates a CRM through a connector.

1046
00:37:32,520 –> 00:37:33,680
Someone creates a team’s tab

1047
00:37:33,680 –> 00:37:35,480
with a custom co-pilot experience.

1048
00:37:35,480 –> 00:37:36,960
It’s all incremental.

1049
00:37:36,960 –> 00:37:38,400
Nothing feels like architecture

1050
00:37:38,400 –> 00:37:40,640
until you try to explain why the same question

1051
00:37:40,640 –> 00:37:42,920
yields different answers for different users.

1052
00:37:42,920 –> 00:37:44,960
Or why co-pilot cited a document,

1053
00:37:44,960 –> 00:37:47,120
someone insists they don’t have access to,

1054
00:37:47,120 –> 00:37:48,760
because the permission edge is real,

1055
00:37:48,760 –> 00:37:50,960
even if nobody remembers granting it.

1056
00:37:50,960 –> 00:37:54,640
Or why a summary changed week to week, even though nothing changed,

1057
00:37:54,640 –> 00:37:56,480
because the context surface did.

1058
00:37:56,480 –> 00:37:59,080
This is the setup co-pilot didn’t simplify your tenant.

1059
00:37:59,080 –> 00:38:00,800
It turned your tenant into the runtime

1060
00:38:00,800 –> 00:38:03,000
and the moment the tenant becomes the runtime,

1061
00:38:03,000 –> 00:38:05,080
you are no longer managing a product rollout.

1062
00:38:05,080 –> 00:38:08,400
You are managing an emerging behavior system with side effects.

1063
00:38:08,400 –> 00:38:09,960
Scenario one entropy signals,

1064
00:38:09,960 –> 00:38:13,560
co-pilot across M365 becomes micro agent divergence.

1065
00:38:13,560 –> 00:38:15,640
Entropy signals in co-pilot aren’t dramatic.

1066
00:38:15,640 –> 00:38:16,640
They’re boring.

1067
00:38:16,640 –> 00:38:20,040
That’s why they get ignored until they stack into operational pain.

1068
00:38:20,040 –> 00:38:22,720
The first signal is that SharePoint, Teams, and Outlook

1069
00:38:22,720 –> 00:38:24,640
are not three front ends.

1070
00:38:24,640 –> 00:38:26,400
They are three different agent runtimes

1071
00:38:26,400 –> 00:38:27,960
with three different context surfaces

1072
00:38:27,960 –> 00:38:30,560
and three different default assumptions about what matters.

1073
00:38:30,560 –> 00:38:32,240
Teams is conversation first.

1074
00:38:32,240 –> 00:38:33,680
Outlook is thread first.

1075
00:38:33,680 –> 00:38:35,360
SharePoint is content first.

1076
00:38:35,360 –> 00:38:37,400
The same prompt lands on different grounding,

1077
00:38:37,400 –> 00:38:40,000
different retrieval, and different relevance ranking

1078
00:38:40,000 –> 00:38:41,800
depending on where the user asked.

1079
00:38:41,800 –> 00:38:44,600
So co-pilot gave a different answer, isn’t user error.

1080
00:38:44,600 –> 00:38:46,120
It’s runtime variance.

1081
00:38:46,120 –> 00:38:49,080
And once leadership hears variance, they do what they always do.

1082
00:38:49,080 –> 00:38:49,920
They standardize.

1083
00:38:49,920 –> 00:38:51,880
So the second signal is the prompt library.

1084
00:38:51,880 –> 00:38:53,560
Every organization ends up creating one.

1085
00:38:53,560 –> 00:38:54,680
Sometimes it’s official.

1086
00:38:54,680 –> 00:38:55,840
Sometimes it’s folklore.

1087
00:38:55,840 –> 00:38:58,160
Sometimes it’s a Teams channel with screenshots.

1088
00:38:58,160 –> 00:39:00,200
Either way, it becomes a comforting artifact

1089
00:39:00,200 –> 00:39:02,960
because it feels like policy, but prompts aren’t controls.

1090
00:39:02,960 –> 00:39:04,440
They don’t enforce boundaries.

1091
00:39:04,440 –> 00:39:06,280
They’re input to a reasoning system

1092
00:39:06,280 –> 00:39:09,200
that can interpret, skip, or reframe them based on context.

1093
00:39:09,200 –> 00:39:11,400
What this actually looks like in the wild is simple.

1094
00:39:11,400 –> 00:39:13,680
Someone says, use the approved prompt

1095
00:39:13,680 –> 00:39:18,760
and the response improves for that user in that app

1096
00:39:18,760 –> 00:39:20,720
for that data set this week.

1097
00:39:20,720 –> 00:39:22,760
Then another team copies it, tweaks three words,

1098
00:39:22,760 –> 00:39:26,080
adds beacon size, adds actors A, and now you have prompt drift.

1099
00:39:26,080 –> 00:39:27,600
Not because people are reckless

1100
00:39:27,600 –> 00:39:30,080
because prompts are the easiest thing in the stack to edit

1101
00:39:30,080 –> 00:39:31,840
and editing feels harmless.

1102
00:39:31,840 –> 00:39:34,000
But prompt edits are runtime logic changes.

1103
00:39:34,000 –> 00:39:36,960
You’re changing the decision surface, not the documentation.

1104
00:39:36,960 –> 00:39:38,800
The third signal is permission edges,

1105
00:39:38,800 –> 00:39:40,880
copilot rides, Microsoft Graph.

1106
00:39:40,880 –> 00:39:42,720
And Graph is not a single permission boundary.

1107
00:39:42,720 –> 00:39:45,840
It’s an authorization graph that’s shaped by groups, sites,

1108
00:39:45,840 –> 00:39:48,560
sharing links, delegated mailboxes, sensitivity labels,

1109
00:39:48,560 –> 00:39:51,080
and all the historical decisions nobody revisited.

1110
00:39:51,080 –> 00:39:53,720
So you get the same intent producing different access outcomes.

1111
00:39:53,720 –> 00:39:56,440
One user gets the right answer because they’re in the right group.

1112
00:39:56,440 –> 00:39:59,000
Another user gets a weaker answer because they’re not.

1113
00:39:59,000 –> 00:40:01,520
And a third user gets a dangerously confident answer

1114
00:40:01,520 –> 00:40:03,960
because they have access through a link-based permission

1115
00:40:03,960 –> 00:40:05,680
that no one remembers granting.

1116
00:40:05,680 –> 00:40:07,720
That’s the core, post-sass issue.

1117
00:40:07,720 –> 00:40:09,440
Authorization is still deterministic,

1118
00:40:09,440 –> 00:40:11,680
but the user experience becomes probabilistic.

1119
00:40:11,680 –> 00:40:13,280
So you get the weird incident class

1120
00:40:13,280 –> 00:40:16,600
where nobody can tell if the problem is copilot, permissions,

1121
00:40:16,600 –> 00:40:19,520
or content hygiene because all three are now coupled

1122
00:40:19,520 –> 00:40:20,440
in the output.

1123
00:40:20,440 –> 00:40:23,440
The fourth signal is connector and plug-in divergence.

1124
00:40:23,440 –> 00:40:26,320
Even when the enterprise thinks it enabled copilot,

1125
00:40:26,320 –> 00:40:28,320
the real copilot experience becomes defined

1126
00:40:28,320 –> 00:40:30,280
by what extra capabilities teams attach.

1127
00:40:30,280 –> 00:40:32,440
Some teams allow more plug-ins, some block them,

1128
00:40:32,440 –> 00:40:34,240
some discover third-party connectors,

1129
00:40:34,240 –> 00:40:36,080
some build copilot studio actions.

1130
00:40:36,080 –> 00:40:38,600
Each choice expands the tool catalog

1131
00:40:38,600 –> 00:40:41,400
and expanding the tool catalog expands the decision pathways.

1132
00:40:41,400 –> 00:40:42,640
That’s not a governance point.

1133
00:40:42,640 –> 00:40:43,600
It’s mechanical.

1134
00:40:43,600 –> 00:40:45,240
More tools means more branches.

1135
00:40:45,240 –> 00:40:48,480
Over time, copilot stops being a single capability.

1136
00:40:48,480 –> 00:40:50,920
It becomes a family of microagents.

1137
00:40:50,920 –> 00:40:52,960
One inside teams with meeting context,

1138
00:40:52,960 –> 00:40:55,400
one inside outlook with mailbox context,

1139
00:40:55,400 –> 00:40:57,840
one inside SharePoint with library context,

1140
00:40:57,840 –> 00:41:00,840
plus a handful of departmental agents with custom tools

1141
00:41:00,840 –> 00:41:03,160
and instructions, plus whatever people built

1142
00:41:03,160 –> 00:41:05,640
in copilot studio to patch gaps.

1143
00:41:05,640 –> 00:41:07,840
Leadership keeps calling it one rollout,

1144
00:41:07,840 –> 00:41:09,880
operators start seeing it as multiple systems.

1145
00:41:09,880 –> 00:41:11,760
The fifth signal is output quality drift

1146
00:41:11,760 –> 00:41:13,320
that correlates with nothing obvious.

1147
00:41:13,320 –> 00:41:15,680
Week one, summaries are solid, week six,

1148
00:41:15,680 –> 00:41:18,920
the same meeting format yields inconsistent action items.

1149
00:41:18,920 –> 00:41:22,440
Week 10, citations shift, week 14, users complain

1150
00:41:22,440 –> 00:41:23,760
that it’s not as good anymore

1151
00:41:23,760 –> 00:41:25,440
and nobody can tie it to a change ticket

1152
00:41:25,440 –> 00:41:27,000
because the change wasn’t a single thing.

1153
00:41:27,000 –> 00:41:30,160
It was an accumulation, a model update, a team’s feature change,

1154
00:41:30,160 –> 00:41:32,480
new content in SharePoint, a permission cleanup

1155
00:41:32,480 –> 00:41:34,560
that removed something, a new channel created,

1156
00:41:34,560 –> 00:41:37,680
a different meeting organizer, a different transcript quality,

1157
00:41:37,680 –> 00:41:39,320
a different retrieval ranking.

1158
00:41:39,320 –> 00:41:41,680
In deterministic sass, you’d isolate variables.

1159
00:41:41,680 –> 00:41:44,080
In post sass, variables are the runtime.

1160
00:41:44,080 –> 00:41:45,920
And that’s where MTTE becomes real

1161
00:41:45,920 –> 00:41:48,000
because the practical debugging question is not

1162
00:41:48,000 –> 00:41:49,360
is copilot up.

1163
00:41:49,360 –> 00:41:50,840
It’s what did copilot see?

1164
00:41:50,840 –> 00:41:52,600
Not what it could see, what it did see.

1165
00:41:52,600 –> 00:41:54,560
What context it selected, what it ignored

1166
00:41:54,560 –> 00:41:56,040
and which tool calls it executed

1167
00:41:56,040 –> 00:41:57,920
without that you can’t explain behavior,

1168
00:41:57,920 –> 00:41:59,360
you can only argue about it.

1169
00:41:59,360 –> 00:42:01,360
And the final entropy signal in copilot

1170
00:42:01,360 –> 00:42:03,760
is the slow collapse of shared assumptions.

1171
00:42:03,760 –> 00:42:06,160
The organization thinks it has one assistant.

1172
00:42:06,160 –> 00:42:08,640
In reality, it has multiple execution parts

1173
00:42:08,640 –> 00:42:10,480
and multiple behavioral versions.

1174
00:42:10,480 –> 00:42:12,680
Different teams start trusting different patterns,

1175
00:42:12,680 –> 00:42:14,280
building different workarounds

1176
00:42:14,280 –> 00:42:16,800
and relying on different known good prompts

1177
00:42:16,800 –> 00:42:19,080
that only work inside their slice of the tenant.

1178
00:42:19,080 –> 00:42:21,320
That’s micro agent divergence, the same brand,

1179
00:42:21,320 –> 00:42:22,960
the same license, the same platform,

1180
00:42:22,960 –> 00:42:24,480
different behavior, different risks,

1181
00:42:24,480 –> 00:42:26,360
different incident narratives.

1182
00:42:26,360 –> 00:42:28,240
And once that divergence becomes normal,

1183
00:42:28,240 –> 00:42:30,240
the next move is predictable.

1184
00:42:30,240 –> 00:42:31,720
Make a step into fix it.

1185
00:42:31,720 –> 00:42:34,400
Scenario two set up, power platform agents at scale,

1186
00:42:34,400 –> 00:42:36,880
and that’s when the maker step into fix it.

1187
00:42:36,880 –> 00:42:39,440
Not because they’re reckless, because they’re useful.

1188
00:42:39,440 –> 00:42:41,360
Power platform exists to turn local pain

1189
00:42:41,360 –> 00:42:42,760
into local solutions.

1190
00:42:42,760 –> 00:42:45,160
And in the sass era, that was mostly fine.

1191
00:42:45,160 –> 00:42:46,800
A flow that copies an attachment,

1192
00:42:46,800 –> 00:42:48,480
a form that standardizes intake,

1193
00:42:48,480 –> 00:42:50,320
a little app that replaces a spreadsheet,

1194
00:42:50,320 –> 00:42:53,000
you could call it sprawl, but it was legible sprawl.

1195
00:42:53,000 –> 00:42:55,400
Apps and flows you could list, owners you could ping,

1196
00:42:55,400 –> 00:42:57,200
environments you could lock down,

1197
00:42:57,200 –> 00:42:59,080
when someone finally complained.

1198
00:42:59,080 –> 00:43:01,760
Agenetic power platform changes the shape of that sprawl,

1199
00:43:01,760 –> 00:43:05,120
because the power platform isn’t just low code automation anymore.

1200
00:43:05,120 –> 00:43:07,440
It’s a distribution channel for decision logic.

1201
00:43:07,440 –> 00:43:09,080
Copilot Studio and power automate

1202
00:43:09,080 –> 00:43:10,680
don’t just help someone build a workflow.

1203
00:43:10,680 –> 00:43:12,760
They help someone package reasoning, retrieval,

1204
00:43:12,760 –> 00:43:14,800
and actions into a reusable capability

1205
00:43:14,800 –> 00:43:17,520
that other humans will treat as the system.

1206
00:43:17,520 –> 00:43:19,160
And the cost of doing that is low enough

1207
00:43:19,160 –> 00:43:20,720
that it will happen everywhere.

1208
00:43:20,720 –> 00:43:22,200
This is the uncomfortable truth.

1209
00:43:22,200 –> 00:43:24,400
If you want to understand how fast an organization

1210
00:43:24,400 –> 00:43:27,320
will scale agents, don’t look at Azure, look at power platform.

1211
00:43:27,320 –> 00:43:29,320
Azure is where teams build carefully.

1212
00:43:29,320 –> 00:43:31,640
Power platform is where teams build constantly.

1213
00:43:31,640 –> 00:43:32,560
And the reason is simple,

1214
00:43:32,560 –> 00:43:34,520
it sits at the intersection of three things

1215
00:43:34,520 –> 00:43:36,880
enterprises can’t control with policy docs,

1216
00:43:36,880 –> 00:43:38,880
business urgency, permission convenience,

1217
00:43:38,880 –> 00:43:40,320
and template gravity.

1218
00:43:40,320 –> 00:43:43,320
Business urgency means the moment a team has a recurring annoyance,

1219
00:43:43,320 –> 00:43:45,320
they don’t open a project, they open a float,

1220
00:43:45,320 –> 00:43:46,840
they don’t ask for a system change,

1221
00:43:46,840 –> 00:43:49,040
they ask copilot to draft something,

1222
00:43:49,040 –> 00:43:51,840
route something, create something, notify someone,

1223
00:43:51,840 –> 00:43:53,800
and when that something works once,

1224
00:43:53,800 –> 00:43:56,280
the next move is predictable, schedule it, trigger it,

1225
00:43:56,280 –> 00:43:57,800
wrap it, turn it into an agent.

1226
00:43:57,800 –> 00:44:00,160
Now it’s no longer assistance, it’s execution.

1227
00:44:00,160 –> 00:44:02,160
Permission convenience is the part nobody likes

1228
00:44:02,160 –> 00:44:03,680
talking about in architecture meetings.

1229
00:44:03,680 –> 00:44:06,040
Connectors are power, delegated connectors are borrowed

1230
00:44:06,040 –> 00:44:06,880
authority.

1231
00:44:06,880 –> 00:44:09,080
And the platform is designed to make connecting easy

1232
00:44:09,080 –> 00:44:10,960
because friction kills adoption.

1233
00:44:10,960 –> 00:44:13,800
So a maker connects to SharePoint, Outlook, Teams,

1234
00:44:13,800 –> 00:44:16,880
Dataverse, maybe an ERP, maybe a ticketing system,

1235
00:44:16,880 –> 00:44:19,280
and now the flow has reached across systems

1236
00:44:19,280 –> 00:44:21,760
that were previously separated by human effort.

1237
00:44:21,760 –> 00:44:23,360
The flow becomes a cross domain actor.

1238
00:44:23,360 –> 00:44:25,400
Template gravity is why this scales

1239
00:44:25,400 –> 00:44:27,040
without anyone intending it to.

1240
00:44:27,040 –> 00:44:29,360
Power platform is full of examples, starter kits,

1241
00:44:29,360 –> 00:44:31,400
copy this and tweak it patterns.

1242
00:44:31,400 –> 00:44:33,440
Copilot makes that even worse in a useful way

1243
00:44:33,440 –> 00:44:35,960
because it reduces the work of copying to basically nothing.

1244
00:44:35,960 –> 00:44:37,640
A team sees a working agent, forks it,

1245
00:44:37,640 –> 00:44:39,720
changes a couple of prompts, swaps a connector,

1246
00:44:39,720 –> 00:44:41,120
and now they have their own version.

1247
00:44:41,120 –> 00:44:42,200
It looks like innovation.

1248
00:44:42,200 –> 00:44:44,560
Architecturally, it’s divergence with a smile,

1249
00:44:44,560 –> 00:44:47,920
so scenario two starts the same way every time.

1250
00:44:47,920 –> 00:44:50,080
A business unit gets excited about copilot,

1251
00:44:50,080 –> 00:44:52,560
hits a limitation, and then discovers they can build

1252
00:44:52,560 –> 00:44:54,640
their own agent-like behavior in power,

1253
00:44:54,640 –> 00:44:56,800
automate, and copilot studio.

1254
00:44:56,800 –> 00:45:00,320
It starts as just a helper, something that drafts a response,

1255
00:45:00,320 –> 00:45:03,120
summarizes a request, or triages in email,

1256
00:45:03,120 –> 00:45:05,080
then it becomes just a workflow,

1257
00:45:05,080 –> 00:45:07,640
something that roots approvals, updates, records,

1258
00:45:07,640 –> 00:45:10,600
creates tasks, posts, notifications.

1259
00:45:10,600 –> 00:45:12,520
And then quietly it becomes business logic

1260
00:45:12,520 –> 00:45:15,280
because once the system can take an unstructured input,

1261
00:45:15,280 –> 00:45:18,600
an email, a form, a chat message, interpret it,

1262
00:45:18,600 –> 00:45:21,680
choose a path and execute actions across systems,

1263
00:45:21,680 –> 00:45:23,120
you’ve moved past automation,

1264
00:45:23,120 –> 00:45:25,760
you’ve embedded decision pathways into the organization.

1265
00:45:25,760 –> 00:45:27,480
This is where the ownership model breaks

1266
00:45:27,480 –> 00:45:29,640
in a very specific way, team’s own outcomes,

1267
00:45:29,640 –> 00:45:31,280
nobody owns life cycles.

1268
00:45:31,280 –> 00:45:34,720
A maker owns the flow, a manager owns the process,

1269
00:45:34,720 –> 00:45:37,800
the eye owns the platform, security owns the policy,

1270
00:45:37,800 –> 00:45:40,800
compliance owns the audit, and the agent-like behavior

1271
00:45:40,800 –> 00:45:43,080
sits across all of them, prompt instructions

1272
00:45:43,080 –> 00:45:46,360
in copilot studio, branching logic in power automate,

1273
00:45:46,360 –> 00:45:49,720
data in data-vers, a youth in connectors, context in SharePoint,

1274
00:45:49,720 –> 00:45:51,440
notifications in teams.

1275
00:45:51,440 –> 00:45:53,200
So when it works, everyone claims value,

1276
00:45:53,200 –> 00:45:55,240
when it fails, nobody owns the behavior.

1277
00:45:55,240 –> 00:45:56,360
That’s not a tooling flaw.

1278
00:45:56,360 –> 00:45:58,200
That’s the operating model mismatch

1279
00:45:58,200 –> 00:46:00,400
showing up in the place where scale is easiest.

1280
00:46:00,400 –> 00:46:01,720
And it produces a failure mode

1281
00:46:01,720 –> 00:46:03,960
that looks different from copilot variants.

1282
00:46:03,960 –> 00:46:07,640
With copilot, people argue about output quality and citations.

1283
00:46:07,640 –> 00:46:09,000
With Power Platform agents,

1284
00:46:09,000 –> 00:46:10,920
the system starts doing things in the background.

1285
00:46:10,920 –> 00:46:12,720
It creates records, it sends emails,

1286
00:46:12,720 –> 00:46:14,320
it triggers downstream processes,

1287
00:46:14,320 –> 00:46:15,680
it touches systems of records.

1288
00:46:15,680 –> 00:46:18,760
So the consequences aren’t just copilot answered weird.

1289
00:46:18,760 –> 00:46:21,880
The consequences are side effects, duplicates in data-verse,

1290
00:46:21,880 –> 00:46:25,280
premature notifications, silent routing to the wrong queue,

1291
00:46:25,280 –> 00:46:27,240
a connector that was authorized for convenience

1292
00:46:27,240 –> 00:46:29,520
and now acts as an escalation path,

1293
00:46:29,520 –> 00:46:32,880
an environment that got cloned and now runs the same flow

1294
00:46:32,880 –> 00:46:35,440
with different secrets, a prompt tweak

1295
00:46:35,440 –> 00:46:37,000
that changes which branch fires

1296
00:46:37,000 –> 00:46:39,480
and nobody realizes until three weeks later.

1297
00:46:39,480 –> 00:46:41,280
And because the platform makes building easy,

1298
00:46:41,280 –> 00:46:43,720
the organization will build faster than it can observe.

1299
00:46:43,720 –> 00:46:45,880
That’s the entire setup for scenario two.

1300
00:46:45,880 –> 00:46:48,200
Low friction creation of agent-like behavior

1301
00:46:48,200 –> 00:46:51,200
in the one place enterprises already struggle to keep legible.

1302
00:46:51,200 –> 00:46:53,040
What follows is the real entropy signal.

1303
00:46:53,040 –> 00:46:55,680
It isn’t shadow IT, it’s shadow cognition.

1304
00:46:55,680 –> 00:46:57,800
Scenario two, entropy signals.

1305
00:46:57,800 –> 00:47:00,120
From shadow IT to shadow cognition,

1306
00:47:00,120 –> 00:47:02,280
shadow IT was annoying, but it was visible.

1307
00:47:02,280 –> 00:47:04,120
Someone spun up an unsanctioned app.

1308
00:47:04,120 –> 00:47:05,640
Someone moved files into Dropbox,

1309
00:47:05,640 –> 00:47:07,680
someone paid for a tool with a credit card,

1310
00:47:07,680 –> 00:47:10,120
you could discover it, block it, or at least name it.

1311
00:47:10,120 –> 00:47:13,120
Shadow cognition is worse because it doesn’t look like a thing.

1312
00:47:13,120 –> 00:47:14,720
It looks like a reasonable workflow

1313
00:47:14,720 –> 00:47:16,360
that happens to contain decision logic

1314
00:47:16,360 –> 00:47:18,680
nobody can fully see, version, or test.

1315
00:47:18,680 –> 00:47:21,640
The first entropy signal is where the logic actually lives.

1316
00:47:21,640 –> 00:47:23,400
In Power Platform agent scenarios,

1317
00:47:23,400 –> 00:47:26,040
the business logic is no longer just in a flow definition

1318
00:47:26,040 –> 00:47:27,640
you can export and review.

1319
00:47:27,640 –> 00:47:29,360
It’s split across four layers.

1320
00:47:29,360 –> 00:47:32,440
Natural language instructions, connector configuration,

1321
00:47:32,440 –> 00:47:34,520
data shape and branching behavior.

1322
00:47:34,520 –> 00:47:37,680
The instructions in Copilot Studio become the decision policy,

1323
00:47:37,680 –> 00:47:39,560
the connector becomes the authority boundary,

1324
00:47:39,560 –> 00:47:41,520
data verse becomes the memory and state

1325
00:47:41,520 –> 00:47:43,680
and the flow becomes the execution engine

1326
00:47:43,680 –> 00:47:45,640
that turns a judgment into side effects.

1327
00:47:45,640 –> 00:47:48,520
That fragmentation matters because you can’t review the agent

1328
00:47:48,520 –> 00:47:49,880
as a single artifact anymore.

1329
00:47:49,880 –> 00:47:52,360
You can review a flow, you can review a DLP policy,

1330
00:47:52,360 –> 00:47:53,520
you can review a connector.

1331
00:47:53,520 –> 00:47:54,960
But the behavior is the composite

1332
00:47:54,960 –> 00:47:57,640
and composites are where audit narratives go to die.

1333
00:47:57,640 –> 00:47:59,360
The second signal is drift vectors

1334
00:47:59,360 –> 00:48:02,720
that have nothing to do with someone changing the process.

1335
00:48:02,720 –> 00:48:05,480
Connector auth changes, someone reauthenticates

1336
00:48:05,480 –> 00:48:08,160
with a different account because the original owner left

1337
00:48:08,160 –> 00:48:09,760
a token scope changes.

1338
00:48:09,760 –> 00:48:11,800
A conditional access rule gets tightened.

1339
00:48:11,800 –> 00:48:14,440
A premium connector gets swapped for a non-premium one

1340
00:48:14,440 –> 00:48:16,160
to avoid licensing friction.

1341
00:48:16,160 –> 00:48:18,880
Suddenly, the same agent takes a different path.

1342
00:48:18,880 –> 00:48:20,280
Not because logic changed,

1343
00:48:20,280 –> 00:48:22,520
but because reachable capabilities changed.

1344
00:48:22,520 –> 00:48:24,840
Environment moves are another drift vector.

1345
00:48:24,840 –> 00:48:27,800
Make us clone environments, copy solutions, migrate flows

1346
00:48:27,800 –> 00:48:30,560
and bring along just enough configuration to make it run.

1347
00:48:30,560 –> 00:48:32,160
The flow still says production,

1348
00:48:32,160 –> 00:48:35,520
but the secrets, endpoints or connection references aren’t the same.

1349
00:48:35,520 –> 00:48:38,400
So behavior diverges while the artifact looks identical.

1350
00:48:38,400 –> 00:48:40,120
Schema drift is the quiet killer.

1351
00:48:40,120 –> 00:48:41,240
A column gets renamed.

1352
00:48:41,240 –> 00:48:42,200
A choice value changes.

1353
00:48:42,200 –> 00:48:43,400
A table gets extended.

1354
00:48:43,400 –> 00:48:44,800
A view gets filtered differently.

1355
00:48:44,800 –> 00:48:47,560
The agent still works, but it now grounds decisions

1356
00:48:47,560 –> 00:48:49,440
on slightly different data.

1357
00:48:49,440 –> 00:48:51,480
And because the decision layer is probabilistic,

1358
00:48:51,480 –> 00:48:52,680
you don’t get a clean error.

1359
00:48:52,680 –> 00:48:54,280
You get subtly wrong outcomes

1360
00:48:54,280 –> 00:48:57,240
that only show up weeks later as operational friction.

1361
00:48:57,240 –> 00:48:58,800
And then there’s prompt drift,

1362
00:48:58,800 –> 00:49:01,280
which is basically configuration drift with better PR.

1363
00:49:01,280 –> 00:49:05,200
A maker tweaks instructions because the agent fell to verbose.

1364
00:49:05,200 –> 00:49:06,720
Someone adds a guardrail sentence,

1365
00:49:06,720 –> 00:49:09,480
someone copies the agent and customizes it for their team.

1366
00:49:09,480 –> 00:49:11,840
Now the organization has multiple cognitive variants

1367
00:49:11,840 –> 00:49:15,080
of the same workflow, same name, same intent, different reasoning.

1368
00:49:15,080 –> 00:49:16,080
You have forked brains.

1369
00:49:16,080 –> 00:49:17,680
The third signal is the audit gap.

1370
00:49:17,680 –> 00:49:19,800
Most organizations can see that a flow ran.

1371
00:49:19,800 –> 00:49:21,240
They can see inputs and outputs.

1372
00:49:21,240 –> 00:49:23,040
They can see which connector call happened.

1373
00:49:23,040 –> 00:49:26,360
That sounds sufficient until the incident question becomes,

1374
00:49:26,360 –> 00:49:28,000
why did it choose that branch?

1375
00:49:28,000 –> 00:49:30,160
Why did it mark this request as urgent?

1376
00:49:30,160 –> 00:49:31,480
Why did it notify that group?

1377
00:49:31,480 –> 00:49:34,080
Why did it open a ticket instead of asking for clarification?

1378
00:49:34,080 –> 00:49:36,040
Why did it write to data verse before approval?

1379
00:49:36,040 –> 00:49:37,720
The flow log can show what happened.

1380
00:49:37,720 –> 00:49:40,480
It cannot show the internal decision path that produced,

1381
00:49:40,480 –> 00:49:42,600
therefore, due X because that decision path

1382
00:49:42,600 –> 00:49:44,320
is embedded in a probabilistic layer

1383
00:49:44,320 –> 00:49:46,840
with context selection and instruction interpretation.

1384
00:49:46,840 –> 00:49:48,680
So you can prove that the system executed.

1385
00:49:48,680 –> 00:49:50,600
You can’t prove why it executed that way.

1386
00:49:50,600 –> 00:49:51,800
That’s shadow cognition.

1387
00:49:51,800 –> 00:49:53,920
Decision making that affects systems of record

1388
00:49:53,920 –> 00:49:55,840
but can’t be reconstructed in human terms

1389
00:49:55,840 –> 00:49:57,200
fast enough to be safe.

1390
00:49:57,200 –> 00:49:59,360
The fourth signal is behavioral side effects

1391
00:49:59,360 –> 00:50:01,440
that look like data quality issues,

1392
00:50:01,440 –> 00:50:03,360
but are actually decision pathway issues.

1393
00:50:03,360 –> 00:50:05,200
Duplicate records are the classic one.

1394
00:50:05,200 –> 00:50:07,120
The agent interprets two similar emails

1395
00:50:07,120 –> 00:50:10,200
as two distinct requests triggers the same flow twice,

1396
00:50:10,200 –> 00:50:13,840
creates two cases, and now humans spend hours reconciling.

1397
00:50:13,840 –> 00:50:15,440
Primature notifications are another.

1398
00:50:15,440 –> 00:50:17,440
The agent decides it has enough context

1399
00:50:17,440 –> 00:50:19,520
to alert stakeholders, but it’s wrong.

1400
00:50:19,520 –> 00:50:22,040
And now the organization burns credibility.

1401
00:50:22,040 –> 00:50:25,120
Silent permission escalation is the most uncomfortable.

1402
00:50:25,120 –> 00:50:27,640
Delegated connectors run under a service identity

1403
00:50:27,640 –> 00:50:30,520
that has broader reach than the initiating user understands,

1404
00:50:30,520 –> 00:50:33,000
so the agent can move data or trigger actions

1405
00:50:33,000 –> 00:50:34,640
that feel like privilege creep,

1406
00:50:34,640 –> 00:50:36,920
even if nothing malicious happened.

1407
00:50:36,920 –> 00:50:39,320
The fifth signal is MTT spiking into permanence.

1408
00:50:39,320 –> 00:50:42,240
Debugging stops being engineering and becomes archaeology.

1409
00:50:42,240 –> 00:50:43,560
You’re not tracing one system.

1410
00:50:43,560 –> 00:50:45,400
You’re correlating copilot studio instructions,

1411
00:50:45,400 –> 00:50:47,360
flow history, connector, or context,

1412
00:50:47,360 –> 00:50:50,240
environment configuration, dataverse state,

1413
00:50:50,240 –> 00:50:52,400
and whatever prompt changes someone made last month

1414
00:50:52,400 –> 00:50:54,640
because it worked better.

1415
00:50:54,640 –> 00:50:56,800
You ask who owns it and you get three names.

1416
00:50:56,800 –> 00:50:59,200
You ask who can change it and you get six.

1417
00:50:59,200 –> 00:51:01,920
You ask what version is running and you get silence.

1418
00:51:01,920 –> 00:51:04,280
And then the most predictable outcome happens.

1419
00:51:04,280 –> 00:51:05,320
The business doesn’t stop.

1420
00:51:05,320 –> 00:51:06,720
They can’t, so they patch again.

1421
00:51:06,720 –> 00:51:10,680
Another flow, another exception, another connector, another tweak.

1422
00:51:10,680 –> 00:51:11,880
That’s the loop.

1423
00:51:11,880 –> 00:51:13,800
Shadow it created unapproved tools.

1424
00:51:13,800 –> 00:51:16,000
Shadow cognition creates unowned decisions.

1425
00:51:16,000 –> 00:51:18,720
And once unowned decisions can execute side effects,

1426
00:51:18,720 –> 00:51:20,640
you’re no longer scaling productivity,

1427
00:51:20,640 –> 00:51:22,400
you’re scaling ambiguity.

1428
00:51:22,400 –> 00:51:24,000
Scenario three, set up.

1429
00:51:24,000 –> 00:51:26,840
As your AI orchestration without a control plane,

1430
00:51:26,840 –> 00:51:28,280
shadow cognition is what happens

1431
00:51:28,280 –> 00:51:30,640
when makers distribute decision logic faster

1432
00:51:30,640 –> 00:51:32,080
than anyone can see it.

1433
00:51:32,080 –> 00:51:33,320
Scenario three is what happens

1434
00:51:33,320 –> 00:51:34,560
when engineers do the same thing

1435
00:51:34,560 –> 00:51:36,800
but with better tooling and higher blast radius.

1436
00:51:36,800 –> 00:51:38,840
This is where Azure shows up in the story

1437
00:51:38,840 –> 00:51:40,800
and the comforting myth returns.

1438
00:51:40,800 –> 00:51:42,880
At least the Pro Code teams will do it properly.

1439
00:51:42,880 –> 00:51:44,600
They won’t. They’ll do it efficiently.

1440
00:51:44,600 –> 00:51:45,640
They’ll do it under pressure.

1441
00:51:45,640 –> 00:51:46,960
They’ll do it in fragments.

1442
00:51:46,960 –> 00:51:49,560
And then they’ll move on to the next backlog item

1443
00:51:49,560 –> 00:51:52,400
while the fragments stay behind as permanent infrastructure

1444
00:51:52,400 –> 00:51:54,880
because Azure AI orchestration isn’t one product.

1445
00:51:54,880 –> 00:51:57,840
It’s an assembly line, a model endpoint, a tool layer,

1446
00:51:57,840 –> 00:52:01,040
some retrieval, a queue, a worker, a database for state,

1447
00:52:01,040 –> 00:52:03,080
a memory store, a set of retries,

1448
00:52:03,080 –> 00:52:05,800
some temporary glue to connect a system of record,

1449
00:52:05,800 –> 00:52:08,400
a dashboard maybe, a tracing setup hopefully.

1450
00:52:08,400 –> 00:52:10,480
And a dozen small decisions about identity,

1451
00:52:10,480 –> 00:52:12,200
secrets, networking and logging

1452
00:52:12,200 –> 00:52:14,560
that determine whether this thing is an engineered system

1453
00:52:14,560 –> 00:52:16,840
or a probabilistic pile of side effects.

1454
00:52:16,840 –> 00:52:19,600
Most organizations start Scenario three the same way.

1455
00:52:19,600 –> 00:52:21,360
A team gets asked to build an agent

1456
00:52:21,360 –> 00:52:24,040
that does something real, not summarize documents,

1457
00:52:24,040 –> 00:52:27,440
something with consequences, create tickets, update records,

1458
00:52:27,440 –> 00:52:29,280
trigger approvals, triage incidents,

1459
00:52:29,280 –> 00:52:31,920
draft customer responses and push them into a CRM.

1460
00:52:31,920 –> 00:52:33,480
The exact use case doesn’t matter.

1461
00:52:33,480 –> 00:52:34,360
The pattern does.

1462
00:52:34,360 –> 00:52:37,480
It starts as an experiment because everything starts as an experiment.

1463
00:52:37,480 –> 00:52:40,040
So they spin up an Azure open AI deployment

1464
00:52:40,040 –> 00:52:43,080
or use Foundry or whatever their internal standard is this quarter.

1465
00:52:43,080 –> 00:52:44,080
They add a little rag.

1466
00:52:44,080 –> 00:52:45,360
They wire up a few tools.

1467
00:52:45,360 –> 00:52:47,000
They test it with happy path prompts.

1468
00:52:47,000 –> 00:52:48,280
It looks good in a demo.

1469
00:52:48,280 –> 00:52:50,880
Leadership sees the demo and thinks the hard part is done.

1470
00:52:50,880 –> 00:52:53,560
The hard part hasn’t started because the system that demo as well

1471
00:52:53,560 –> 00:52:56,520
is almost never the system that survives production reality.

1472
00:52:56,520 –> 00:52:58,720
Partial failures, inconsistent inputs,

1473
00:52:58,720 –> 00:53:02,200
permission edges, rate limits, downstream API quirks,

1474
00:53:02,200 –> 00:53:04,600
and the simple fact that human workflows are messy

1475
00:53:04,600 –> 00:53:06,640
and rarely match the data model.

1476
00:53:06,640 –> 00:53:08,320
So the team adds orchestration,

1477
00:53:08,320 –> 00:53:09,840
not because they love architecture,

1478
00:53:09,840 –> 00:53:13,040
because they need the agent to do multiple steps reliably.

1479
00:53:13,040 –> 00:53:15,040
And this is where the entropy begins.

1480
00:53:15,040 –> 00:53:17,600
Each project invents orchestration from scratch.

1481
00:53:17,600 –> 00:53:19,720
One team builds a state machine in code.

1482
00:53:19,720 –> 00:53:21,240
Another uses durable functions.

1483
00:53:21,240 –> 00:53:24,880
Another uses logic apps for steps and a custom worker for reasoning.

1484
00:53:24,880 –> 00:53:27,960
Another uses cues and retries and calls it event driven.

1485
00:53:27,960 –> 00:53:31,640
Another uses a framework and assumes the framework is the architecture.

1486
00:53:31,640 –> 00:53:34,840
Another uses a notebook that becomes a scheduled job

1487
00:53:34,840 –> 00:53:36,440
that becomes a production dependency,

1488
00:53:36,440 –> 00:53:38,200
because nobody had time to rewrite it.

1489
00:53:38,200 –> 00:53:41,240
Same outcome, bespoke state, bespoke memory, bespoke logging.

1490
00:53:41,240 –> 00:53:43,480
It’s not malicious, it’s normal.

1491
00:53:43,480 –> 00:53:45,640
And because every team has slightly different skills

1492
00:53:45,640 –> 00:53:47,000
and slightly different constraints,

1493
00:53:47,000 –> 00:53:48,680
they pick different building blocks,

1494
00:53:48,680 –> 00:53:51,720
different storage, different telemetry, different auth strategies,

1495
00:53:51,720 –> 00:53:53,400
different ways to do tool calling,

1496
00:53:53,400 –> 00:53:55,160
different ways to handle human in the loop,

1497
00:53:55,160 –> 00:53:56,760
different ways to package prompts,

1498
00:53:56,760 –> 00:53:58,520
different ways to version anything at all.

1499
00:53:58,520 –> 00:54:01,160
So the enterprise doesn’t get an agent platform.

1500
00:54:01,160 –> 00:54:04,200
It gets multiple orchestration dialects that can’t explain each other.

1501
00:54:04,200 –> 00:54:07,240
This is the part nobody says out loud in architecture reviews.

1502
00:54:07,240 –> 00:54:10,040
Orchestration logic becomes the new integration layer.

1503
00:54:10,040 –> 00:54:13,800
And integration layers are where enterprises accumulate their worst legacy.

1504
00:54:13,800 –> 00:54:15,480
Not because the code is old,

1505
00:54:15,480 –> 00:54:18,120
because the dependency density becomes untouchable.

1506
00:54:18,120 –> 00:54:20,120
Then the second predictable thing happens.

1507
00:54:20,120 –> 00:54:21,480
Prototype gravity.

1508
00:54:21,480 –> 00:54:24,120
A proof of concept gets used just for a pilot.

1509
00:54:24,120 –> 00:54:26,680
Then the pilot gets used just for this one team.

1510
00:54:26,680 –> 00:54:29,160
Then the team depends on it for a quarterly process,

1511
00:54:29,160 –> 00:54:30,760
then monthly, then daily.

1512
00:54:30,760 –> 00:54:33,160
And now the agent is part of the operating model.

1513
00:54:33,160 –> 00:54:35,320
But it still runs on POC assumptions.

1514
00:54:35,320 –> 00:54:38,440
Week versioning informal ownership, missing kill switches,

1515
00:54:38,440 –> 00:54:39,640
inconsistent tracing,

1516
00:54:39,640 –> 00:54:41,480
and an identity model that looks fine

1517
00:54:41,480 –> 00:54:43,800
until it has to touch a system of record at scale.

1518
00:54:43,800 –> 00:54:46,200
At this point, the architecture diagram

1519
00:54:46,200 –> 00:54:47,720
stops representing reality.

1520
00:54:47,720 –> 00:54:49,880
Because the diagram shows components and arrows,

1521
00:54:49,880 –> 00:54:52,120
the runtime is decisions and side effects.

1522
00:54:52,120 –> 00:54:54,360
And when a probabilistic system executes,

1523
00:54:54,360 –> 00:54:57,240
the most important details are the ones diagrams don’t capture,

1524
00:54:57,240 –> 00:54:58,600
which tool was selected,

1525
00:54:58,600 –> 00:55:00,200
what context was retrieved,

1526
00:55:00,200 –> 00:55:01,560
which retries happened,

1527
00:55:01,560 –> 00:55:03,160
what partial execution occurred,

1528
00:55:03,160 –> 00:55:04,680
which compensations ran,

1529
00:55:04,680 –> 00:55:07,240
and what authority the agent carried when it acted.

1530
00:55:07,240 –> 00:55:08,680
Without a control plane,

1531
00:55:08,680 –> 00:55:10,600
none of that is consistently captured.

1532
00:55:10,600 –> 00:55:12,440
So every incident becomes bespoke,

1533
00:55:12,440 –> 00:55:14,120
every post-mortem becomes a debate

1534
00:55:14,120 –> 00:55:16,040
about whether the agent did something wrong

1535
00:55:16,040 –> 00:55:18,600
or whether the downstream system behaved strangely

1536
00:55:18,600 –> 00:55:20,440
or whether the input was ambiguous

1537
00:55:20,440 –> 00:55:23,000
or whether the model update changed behavior.

1538
00:55:23,000 –> 00:55:24,200
All of those can be true.

1539
00:55:24,200 –> 00:55:24,840
That’s the point.

1540
00:55:24,840 –> 00:55:28,120
In scenario three, as your doesn’t just amplify the agent problem,

1541
00:55:28,120 –> 00:55:29,640
it industrializes it.

1542
00:55:29,640 –> 00:55:32,200
Because now the organization can build agents

1543
00:55:32,200 –> 00:55:35,240
that run continuously at scale across many systems

1544
00:55:35,240 –> 00:55:37,320
with autonomous retries and delegation chains

1545
00:55:37,320 –> 00:55:41,400
and tool catalogs that evolve faster than any centralized document can track.

1546
00:55:41,400 –> 00:55:42,760
And if there’s no control plane,

1547
00:55:42,760 –> 00:55:45,480
no enforced identity, no consistent telemetry,

1548
00:55:45,480 –> 00:55:46,760
no life cycle ownership,

1549
00:55:46,760 –> 00:55:49,000
no single place where tool authorization

1550
00:55:49,000 –> 00:55:51,000
and version responsibility are anchored,

1551
00:55:51,000 –> 00:55:52,520
you don’t have an agent estate.

1552
00:55:52,520 –> 00:55:54,600
You have a fleet of unsupervised workflows

1553
00:55:54,600 –> 00:55:56,200
pretending to be software.

1554
00:55:56,200 –> 00:55:57,960
Next comes the uncomfortable part.

1555
00:55:57,960 –> 00:56:00,040
When orchestration becomes the new legacy,

1556
00:56:00,040 –> 00:56:01,720
it fails in a very specific way.

1557
00:56:01,720 –> 00:56:04,120
It doesn’t crash, it leaves side effects.

1558
00:56:04,120 –> 00:56:05,960
Scenario three entropy signals.

1559
00:56:05,960 –> 00:56:08,280
Orchestration logic becomes the new legacy.

1560
00:56:08,280 –> 00:56:10,200
The entropy signals in Azure orchestration

1561
00:56:10,200 –> 00:56:11,720
don’t show up as AI problems,

1562
00:56:11,720 –> 00:56:13,320
then they show up as software problems

1563
00:56:13,320 –> 00:56:15,000
that don’t behave like software anymore.

1564
00:56:15,000 –> 00:56:16,600
The first signal is that orchestration

1565
00:56:16,600 –> 00:56:17,960
becomes the hidden monolith,

1566
00:56:17,960 –> 00:56:19,560
not because the code base is huge,

1567
00:56:19,560 –> 00:56:22,760
because the dependency density is one agent now depends on,

1568
00:56:22,760 –> 00:56:25,880
model deployments, prompt variants,

1569
00:56:25,880 –> 00:56:28,040
tool schemers, secrets,

1570
00:56:28,040 –> 00:56:30,920
queues, state stores, retrieval indexes,

1571
00:56:30,920 –> 00:56:32,520
downstream APIs,

1572
00:56:32,520 –> 00:56:36,040
and whatever retry policy someone chose at 2AM during the pilot.

1573
00:56:36,040 –> 00:56:38,280
Each dependency is reasonable on its own.

1574
00:56:38,280 –> 00:56:40,920
Together, they form a system no one can safely change

1575
00:56:40,920 –> 00:56:42,760
without breaking something they can’t see.

1576
00:56:42,760 –> 00:56:44,920
So the system keeps running and it keeps a greeting.

1577
00:56:46,120 –> 00:56:48,120
That’s how legacy is born in the cloud,

1578
00:56:48,120 –> 00:56:51,320
not by age, but by accumulated reluctance to touch it.

1579
00:56:51,320 –> 00:56:54,360
The second signal is the partial execution failure mode.

1580
00:56:54,360 –> 00:56:56,600
Deterministic workflows usually fail cleanly.

1581
00:56:56,600 –> 00:56:58,600
The transaction rolls back, the drop errors out,

1582
00:56:58,600 –> 00:57:01,080
the process stops, you get a single failure point.

1583
00:57:01,080 –> 00:57:01,960
You know where to look.

1584
00:57:01,960 –> 00:57:05,240
Agent orchestration fails like a distributed set of side effects.

1585
00:57:05,240 –> 00:57:06,920
A tool called succeeds,

1586
00:57:06,920 –> 00:57:08,520
the next one times out,

1587
00:57:08,520 –> 00:57:09,640
retries fire,

1588
00:57:09,640 –> 00:57:11,320
compensations don’t,

1589
00:57:11,320 –> 00:57:13,160
and now the system has done some of the work

1590
00:57:13,160 –> 00:57:15,640
with no coherent boundary around what’s complete.

1591
00:57:15,640 –> 00:57:17,400
It created a ticket but didn’t notify.

1592
00:57:17,400 –> 00:57:19,480
It sent the email but didn’t update the record.

1593
00:57:19,480 –> 00:57:22,040
It updated the record twice because the retry logic

1594
00:57:22,040 –> 00:57:23,720
didn’t understand the importance.

1595
00:57:23,720 –> 00:57:24,680
Nothing is down,

1596
00:57:24,680 –> 00:57:26,120
but the business state is wrong,

1597
00:57:26,120 –> 00:57:28,520
and because it’s wrong in small ways, it doesn’t trip alarms.

1598
00:57:28,520 –> 00:57:29,720
It trips humans.

1599
00:57:29,720 –> 00:57:31,640
That’s where MTE gets paid again,

1600
00:57:31,640 –> 00:57:33,160
not explaining an outage,

1601
00:57:33,160 –> 00:57:35,000
explaining a trail of half-actions.

1602
00:57:35,000 –> 00:57:37,640
The third signal is that retries become policy decisions.

1603
00:57:37,640 –> 00:57:38,680
In classic systems,

1604
00:57:38,680 –> 00:57:40,360
retry logic is mostly technical,

1605
00:57:40,360 –> 00:57:41,480
exponential back-off,

1606
00:57:41,480 –> 00:57:43,480
circuit breakers, dead-letter cues.

1607
00:57:43,480 –> 00:57:44,920
Boring, fine.

1608
00:57:44,920 –> 00:57:46,040
In orchestration systems,

1609
00:57:46,040 –> 00:57:47,720
retries become behavioral governance,

1610
00:57:47,720 –> 00:57:48,920
whether you admit it or not.

1611
00:57:48,920 –> 00:57:50,760
Do you retry an action that sends an email?

1612
00:57:50,760 –> 00:57:52,520
Do you retry something that creates a record?

1613
00:57:52,520 –> 00:57:54,520
Do you retry something that triggers a payment

1614
00:57:54,520 –> 00:57:56,840
or changes a permission or posts into a channel

1615
00:57:56,840 –> 00:57:57,640
that people act on?

1616
00:57:57,640 –> 00:57:59,960
Every retry risks duplicating a side effect.

1617
00:57:59,960 –> 00:58:03,720
Every, don’t retry risks abandoning a workflow mid-flight.

1618
00:58:03,720 –> 00:58:06,120
So engineers end up encoding business policy

1619
00:58:06,120 –> 00:58:07,240
into technical defaults

1620
00:58:07,240 –> 00:58:08,600
because there is no separate layer

1621
00:58:08,600 –> 00:58:10,040
where those decisions live.

1622
00:58:10,040 –> 00:58:11,800
That’s entropy when policy migrates

1623
00:58:11,800 –> 00:58:13,720
into the least-reviewed code path.

1624
00:58:13,720 –> 00:58:16,040
The fourth signal is tool-call reliability

1625
00:58:16,040 –> 00:58:17,480
turning into a lottery.

1626
00:58:17,480 –> 00:58:19,800
Every tool is available until it isn’t.

1627
00:58:19,800 –> 00:58:21,880
Graph throttles.

1628
00:58:21,880 –> 00:58:22,920
API’s change.

1629
00:58:22,920 –> 00:58:24,520
A connector version shifts.

1630
00:58:24,520 –> 00:58:27,320
A downstream system enforces a new validation rule.

1631
00:58:27,320 –> 00:58:29,320
A key rotates, a permission gets removed.

1632
00:58:29,320 –> 00:58:31,560
The orchestrator still plans as if the tool exists

1633
00:58:31,560 –> 00:58:33,160
because the catalog says it does.

1634
00:58:33,160 –> 00:58:35,000
But runtime reality disagrees.

1635
00:58:35,000 –> 00:58:36,360
So the system adapts.

1636
00:58:36,360 –> 00:58:38,120
And adapts is the dangerous word here

1637
00:58:38,120 –> 00:58:39,800
because adaptation without constraints

1638
00:58:39,800 –> 00:58:42,120
is just improvisation with production data.

1639
00:58:42,120 –> 00:58:44,040
One agent falls back to a different source.

1640
00:58:44,040 –> 00:58:45,960
Another changes the order of operations.

1641
00:58:45,960 –> 00:58:48,920
Another asks the user for input in one channel

1642
00:58:48,920 –> 00:58:50,680
and proceeds without input in another.

1643
00:58:50,680 –> 00:58:53,560
Over time, the behavior becomes a statistical distribution,

1644
00:58:53,560 –> 00:58:54,680
not a design flow.

1645
00:58:54,680 –> 00:58:57,080
Again, nothing is down, but outcomes drift.

1646
00:58:57,080 –> 00:59:01,000
The fifth signal is delegation chain blast radius.

1647
00:59:01,000 –> 00:59:02,520
Teams love multi-agent patterns

1648
00:59:02,520 –> 00:59:04,120
because they look clean on paper.

1649
00:59:04,120 –> 00:59:06,280
Specialize the agents, delegate the tasks,

1650
00:59:06,280 –> 00:59:08,920
keep prompt small, keep responsibilities clear.

1651
00:59:08,920 –> 00:59:11,560
In production, delegation chains

1652
00:59:11,560 –> 00:59:13,240
are how you lose accountability.

1653
00:59:13,240 –> 00:59:15,400
A parent agent delegates to a retrieval agent

1654
00:59:15,400 –> 00:59:18,280
which delegates to a data agent which calls an MCP server

1655
00:59:18,280 –> 00:59:20,040
which calls an internal API,

1656
00:59:20,040 –> 00:59:21,960
which triggers an event that wakes a worker

1657
00:59:21,960 –> 00:59:23,640
that runs another tool call.

1658
00:59:23,640 –> 00:59:26,440
At the end of that chain, a side effect lands

1659
00:59:26,440 –> 00:59:27,800
in a system of record.

1660
00:59:27,800 –> 00:59:30,440
And the only useful question is whose authority was that?

1661
00:59:30,440 –> 00:59:32,120
Most stacks can’t answer it cleanly.

1662
00:59:32,120 –> 00:59:34,760
They can tell you which service principle executed the call.

1663
00:59:34,760 –> 00:59:37,400
They can’t tell you which decision pathway authorized it,

1664
00:59:37,400 –> 00:59:38,920
which context justified it

1665
00:59:38,920 –> 00:59:40,600
and which human intended traces back to

1666
00:59:40,600 –> 00:59:42,280
because the chain is assembled dynamically.

1667
00:59:42,280 –> 00:59:44,520
So you end up with a system that is order table

1668
00:59:44,520 –> 00:59:46,440
in the shallow sense, logs exist,

1669
00:59:46,440 –> 00:59:48,360
but illegible in the operational sense,

1670
00:59:48,360 –> 00:59:51,160
meaning can’t be reconstructed quickly enough to matter.

1671
00:59:51,160 –> 00:59:53,560
The sixth signal is telemetry that exists

1672
00:59:53,560 –> 00:59:55,400
but doesn’t compile into explanation.

1673
00:59:55,400 –> 00:59:57,560
Teams will instrument, they’ll add open telemetry,

1674
00:59:57,560 –> 00:59:59,320
they’ll capture traces, they’ll log prompts,

1675
00:59:59,320 –> 01:00:01,320
they’ll store outputs, they’ll have dashboards.

1676
01:00:01,320 –> 01:00:03,480
And still, in the incident,

1677
01:00:03,480 –> 01:00:05,560
someone asks the question that matters.

1678
01:00:05,560 –> 01:00:08,040
Why did it choose that tool in that order

1679
01:00:08,040 –> 01:00:10,200
with that authority given that context?

1680
01:00:10,200 –> 01:00:13,080
And the traces don’t answer it because tracing tells you what happened.

1681
01:00:13,080 –> 01:00:15,880
It doesn’t tell you what the system believed when it happened.

1682
01:00:15,880 –> 01:00:18,280
Or what it ignored, or what it couldn’t see.

1683
01:00:18,280 –> 01:00:21,400
Or which version of the reasoning instructions it was operating under.

1684
01:00:21,400 –> 01:00:24,040
That’s the real entropy signal in scenario three.

1685
01:00:24,040 –> 01:00:26,200
Orchestration logic becomes the new legacy

1686
01:00:26,200 –> 01:00:29,080
because it accumulates decisions faster than your organization

1687
01:00:29,080 –> 01:00:30,120
can keep them legible.

1688
01:00:30,120 –> 01:00:31,560
It doesn’t crash, it corrods.

1689
01:00:31,560 –> 01:00:33,960
And once it corrods, the enterprise does what it always does.

1690
01:00:33,960 –> 01:00:35,080
It blames the platform.

1691
01:00:35,080 –> 01:00:37,400
But the platform did exactly what it was designed to do.

1692
01:00:37,400 –> 01:00:39,080
It executed the reveal.

1693
01:00:39,080 –> 01:00:42,440
Entropy is an operating model failure, not a platform failure.

1694
01:00:42,440 –> 01:00:43,960
Here’s what always happens next.

1695
01:00:43,960 –> 01:00:45,560
The organization blames the platform.

1696
01:00:45,560 –> 01:00:47,400
Copilot is unreliable.

1697
01:00:47,400 –> 01:00:49,560
Power platform is the wild west.

1698
01:00:49,560 –> 01:00:51,160
Azure is too flexible.

1699
01:00:51,160 –> 01:00:53,240
MCP is another thing to govern.

1700
01:00:53,240 –> 01:00:55,160
Foundry is moving too fast.

1701
01:00:55,160 –> 01:00:56,520
The vendor narrative is tempting

1702
01:00:56,520 –> 01:00:58,840
because it gives leadership a clean scapegoat.

1703
01:00:58,840 –> 01:01:00,520
The tooling created the chaos.

1704
01:01:00,520 –> 01:01:02,360
Therefore, better tooling will remove it.

1705
01:01:02,360 –> 01:01:03,480
It won’t.

1706
01:01:03,480 –> 01:01:05,480
Because the platform didn’t create the entropy,

1707
01:01:05,480 –> 01:01:06,440
the organization did,

1708
01:01:06,440 –> 01:01:09,480
by deploying probabilistic execution into an operating model

1709
01:01:09,480 –> 01:01:11,080
designed for deterministic systems.

1710
01:01:11,080 –> 01:01:12,760
That distinction matters.

1711
01:01:12,760 –> 01:01:14,920
Microsoft platforms behave predictably,

1712
01:01:14,920 –> 01:01:16,840
not in the nothing changes sense.

1713
01:01:16,840 –> 01:01:17,880
In the system sense.

1714
01:01:17,880 –> 01:01:19,720
They do exactly what they are designed to do.

1715
01:01:19,720 –> 01:01:21,960
They expose capability, they reduce friction,

1716
01:01:21,960 –> 01:01:23,240
they enable delegation,

1717
01:01:23,240 –> 01:01:25,400
they let teams compose solutions locally

1718
01:01:25,400 –> 01:01:27,800
and they keep running even when no one is watching.

1719
01:01:27,800 –> 01:01:28,600
That isn’t the flaw.

1720
01:01:28,600 –> 01:01:29,400
That’s the product.

1721
01:01:29,400 –> 01:01:31,960
The failure is that enterprises

1722
01:01:31,960 –> 01:01:34,920
keep treating agent systems like feature rollouts

1723
01:01:34,920 –> 01:01:36,920
when they are actually operating model changes.

1724
01:01:36,920 –> 01:01:38,760
A new execution layer doesn’t fit inside

1725
01:01:38,760 –> 01:01:40,120
the older accountability model.

1726
01:01:40,120 –> 01:01:40,840
It breaks it.

1727
01:01:40,840 –> 01:01:41,960
In deterministic SaaS,

1728
01:01:41,960 –> 01:01:43,720
responsibility is easy to assign.

1729
01:01:43,720 –> 01:01:45,240
IT owns the service configuration,

1730
01:01:45,240 –> 01:01:46,520
security owns policy,

1731
01:01:46,520 –> 01:01:47,720
the business owns process,

1732
01:01:47,720 –> 01:01:49,240
support owns incidents,

1733
01:01:49,240 –> 01:01:50,600
vendors own uptime.

1734
01:01:50,600 –> 01:01:52,520
And most of the time, that mapping works.

1735
01:01:52,520 –> 01:01:53,880
Because execution is bounded.

1736
01:01:53,880 –> 01:01:55,240
Users click systems run,

1737
01:01:55,240 –> 01:01:56,600
logs tell a coherent story.

1738
01:01:56,600 –> 01:01:57,400
In post-SaaS,

1739
01:01:57,400 –> 01:01:59,480
execution is not bounded by the UI.

1740
01:01:59,480 –> 01:02:01,720
Execution is bounded by whatever tools are reachable,

1741
01:02:01,720 –> 01:02:03,320
whatever context is selectable,

1742
01:02:03,320 –> 01:02:06,200
and whatever authority the agent can present when it acts.

1743
01:02:06,200 –> 01:02:07,560
Those are not settings.

1744
01:02:07,560 –> 01:02:08,840
They are decision rights.

1745
01:02:08,840 –> 01:02:11,800
And most enterprises have never explicitly designed decision rights

1746
01:02:11,800 –> 01:02:13,160
for non-human actors.

1747
01:02:13,160 –> 01:02:15,080
So you get the predictable failure mode.

1748
01:02:15,080 –> 01:02:17,320
Everyone owns a slice, nobody owns the behavior.

1749
01:02:17,320 –> 01:02:18,440
The business unit says,

1750
01:02:18,440 –> 01:02:19,400
we own the outcome.

1751
01:02:19,400 –> 01:02:21,240
As I’d says, we own the platform.

1752
01:02:21,240 –> 01:02:23,000
Security says, we set the policies.

1753
01:02:23,000 –> 01:02:24,760
That you make us say, we build the flow.

1754
01:02:24,760 –> 01:02:26,760
Developers say, we ship the API.

1755
01:02:26,760 –> 01:02:28,600
And the agent sits across all of them,

1756
01:02:28,600 –> 01:02:30,920
making runtime choices that no single team

1757
01:02:30,920 –> 01:02:32,760
is accountable for explaining end-to-end.

1758
01:02:32,760 –> 01:02:33,880
That’s not a tooling gap.

1759
01:02:33,880 –> 01:02:35,960
That’s an operating model with a missing role.

1760
01:02:35,960 –> 01:02:38,520
Someone has to own behavior, not just resources.

1761
01:02:38,520 –> 01:02:41,240
Now, mostly this respond with the word governance.

1762
01:02:41,240 –> 01:02:43,560
And then they do the thing enterprises always do

1763
01:02:43,560 –> 01:02:45,160
when reality gets messy.

1764
01:02:45,160 –> 01:02:46,520
They schedule meetings.

1765
01:02:46,520 –> 01:02:49,720
Committees, review boards, intake forms, approval workflows,

1766
01:02:49,720 –> 01:02:51,640
centers of excellence, quarterly check-ins,

1767
01:02:51,640 –> 01:02:54,360
a big spreadsheet where someone tries to list every agent,

1768
01:02:54,360 –> 01:02:55,800
every flow, every connector,

1769
01:02:55,800 –> 01:02:58,760
every prompt library, every plug-in, every experiment.

1770
01:02:58,760 –> 01:03:00,680
That approach fails for a simple reason.

1771
01:03:00,680 –> 01:03:02,200
Decisions happen at runtime.

1772
01:03:02,200 –> 01:03:06,120
A meeting cannot govern a decision the system already executed.

1773
01:03:06,120 –> 01:03:08,600
A policy doc cannot constrain a tool call the agent

1774
01:03:08,600 –> 01:03:09,800
can still reach.

1775
01:03:09,800 –> 01:03:11,960
A review board cannot keep up with prompt drift

1776
01:03:11,960 –> 01:03:14,120
that spreads in a team’s chat in an afternoon.

1777
01:03:14,120 –> 01:03:15,160
So the reveal is blunt.

1778
01:03:15,160 –> 01:03:17,240
The organization thinks it has a governance problem.

1779
01:03:17,240 –> 01:03:19,160
It actually has a contract problem.

1780
01:03:19,160 –> 01:03:21,240
Agentex systems need explicit contracts.

1781
01:03:21,240 –> 01:03:22,840
What the agent is allowed to decide,

1782
01:03:22,840 –> 01:03:24,440
what it is not allowed to decide,

1783
01:03:24,440 –> 01:03:25,640
what tools it can call,

1784
01:03:25,640 –> 01:03:26,920
what data it can ground on,

1785
01:03:26,920 –> 01:03:28,520
what identity it must use,

1786
01:03:28,520 –> 01:03:29,960
what telemetry it must emit,

1787
01:03:29,960 –> 01:03:32,360
and what constitutes a recoverable failure

1788
01:03:32,360 –> 01:03:34,680
versus a business impacting side effect.

1789
01:03:34,680 –> 01:03:37,320
Without those contracts, you don’t have AI adoption.

1790
01:03:37,320 –> 01:03:39,000
You have conditional chaos.

1791
01:03:39,000 –> 01:03:40,760
And the most uncomfortable part is this.

1792
01:03:40,760 –> 01:03:42,440
The platform can’t solve that for you

1793
01:03:42,440 –> 01:03:44,040
because it’s not a product decision.

1794
01:03:44,040 –> 01:03:45,320
It’s an organizational decision.

1795
01:03:45,320 –> 01:03:47,400
It’s the definition of intent enforced by design.

1796
01:03:47,400 –> 01:03:49,880
The platform will happily give you more capability.

1797
01:03:49,880 –> 01:03:51,640
More connectors, more models,

1798
01:03:51,640 –> 01:03:52,920
more orchestration patterns,

1799
01:03:52,920 –> 01:03:54,200
more automation surfaces,

1800
01:03:54,200 –> 01:03:55,240
that’s not the problem.

1801
01:03:55,240 –> 01:03:57,560
The problem is that your scaling execution

1802
01:03:57,560 –> 01:04:00,440
without scaling accountability for decision pathways,

1803
01:04:00,440 –> 01:04:02,760
you’re giving the enterprises second workforce.

1804
01:04:02,760 –> 01:04:04,280
An agent workforce,

1805
01:04:04,280 –> 01:04:07,320
without redefining how work gets authorized,

1806
01:04:07,320 –> 01:04:08,680
observed, and retired.

1807
01:04:08,680 –> 01:04:09,800
So when leaders ask,

1808
01:04:09,800 –> 01:04:11,400
why is entropy increasing?

1809
01:04:11,400 –> 01:04:12,280
The answer is simple,

1810
01:04:12,280 –> 01:04:14,760
because you tried to run probabilistic systems

1811
01:04:14,760 –> 01:04:16,920
with a deterministic operating model.

1812
01:04:16,920 –> 01:04:19,000
You kept ownership at the resource layer

1813
01:04:19,000 –> 01:04:21,000
and you left behavior unowned.

1814
01:04:21,000 –> 01:04:22,520
And that’s why entropy keeps winning.

1815
01:04:22,520 –> 01:04:24,120
It has no counterforce.

1816
01:04:24,120 –> 01:04:25,400
The way out is not more tooling.

1817
01:04:25,400 –> 01:04:26,520
It’s a design discipline.

1818
01:04:27,160 –> 01:04:28,840
Agent First Architecture,

1819
01:04:28,840 –> 01:04:31,400
explicit boundaries for probabilistic systems,

1820
01:04:31,400 –> 01:04:33,160
where reasoning stays conditional,

1821
01:04:33,160 –> 01:04:35,240
but execution stays deterministic,

1822
01:04:35,240 –> 01:04:36,280
legible, and owned.

1823
01:04:36,280 –> 01:04:38,360
Agent First Architecture,

1824
01:04:38,360 –> 01:04:40,760
explicit boundaries for probabilistic systems.

1825
01:04:40,760 –> 01:04:43,480
Agent First Architecture is not a new diagram style.

1826
01:04:43,480 –> 01:04:45,800
It’s a discipline for keeping probabilistic reasoning

1827
01:04:45,800 –> 01:04:47,880
from infecting deterministic execution.

1828
01:04:47,880 –> 01:04:49,960
Most organizations inverted by accident.

1829
01:04:49,960 –> 01:04:51,640
They let the agent reason,

1830
01:04:51,640 –> 01:04:53,800
choose tools, execute actions,

1831
01:04:53,800 –> 01:04:56,280
and then they ask humans to review

1832
01:04:56,280 –> 01:04:59,080
outcomes after the fact that is not human in the loop.

1833
01:04:59,080 –> 01:05:00,280
That’s human as auditor.

1834
01:05:00,280 –> 01:05:02,360
And auditors don’t prevent side effects.

1835
01:05:02,360 –> 01:05:04,120
And they just write reports about them.

1836
01:05:04,120 –> 01:05:05,640
The core principle is simple.

1837
01:05:05,640 –> 01:05:07,400
Probabilistic reasoning must wrap

1838
01:05:07,400 –> 01:05:09,080
deterministic execution.

1839
01:05:09,080 –> 01:05:10,120
Never the reverse.

1840
01:05:10,120 –> 01:05:11,880
Reesoning can propose, reasoning can rank,

1841
01:05:11,880 –> 01:05:13,640
reasoning can draft, reasoning can

1842
01:05:13,640 –> 01:05:14,920
ask for missing context.

1843
01:05:14,920 –> 01:05:16,360
Execution must be constrained.

1844
01:05:16,360 –> 01:05:17,800
Execution must have contracts.

1845
01:05:17,800 –> 01:05:19,400
Execution must be legible.

1846
01:05:19,400 –> 01:05:22,040
If an agent can trigger an external side effect,

1847
01:05:22,040 –> 01:05:24,600
then the system must force that side effect

1848
01:05:24,600 –> 01:05:28,040
through a deterministic boundary that enforces assumptions.

1849
01:05:28,040 –> 01:05:29,880
Identity, authorization,

1850
01:05:29,880 –> 01:05:32,680
identity, approvals, and telemetry.

1851
01:05:32,680 –> 01:05:35,480
That boundary is where the enterprise stops improvisation.

1852
01:05:35,480 –> 01:05:37,080
This is where most people misunderstand

1853
01:05:37,080 –> 01:05:38,200
what agents are doing.

1854
01:05:38,200 –> 01:05:39,720
They think the agent is the worker.

1855
01:05:39,720 –> 01:05:41,640
Architecturally, the agent is the planner.

1856
01:05:41,640 –> 01:05:44,360
The worker is your existing automation layer.

1857
01:05:44,360 –> 01:05:47,240
APIs, workflows, cues, transactional systems,

1858
01:05:47,240 –> 01:05:48,360
and the parts of the platform

1859
01:05:48,360 –> 01:05:50,120
that already know how to do reliable work.

1860
01:05:50,120 –> 01:05:51,720
The agent should not replace those.

1861
01:05:51,720 –> 01:05:53,720
It should call them through a controlled interface

1862
01:05:53,720 –> 01:05:55,080
with narrow capabilities.

1863
01:05:55,080 –> 01:05:58,280
So the first design move is separation of agent types.

1864
01:05:58,280 –> 01:06:00,360
Task agents versus decision agents.

1865
01:06:00,360 –> 01:06:03,480
Task agents operate inside a deterministic envelope.

1866
01:06:03,480 –> 01:06:05,560
Collect these inputs, fill this template,

1867
01:06:05,560 –> 01:06:08,760
open this ticket, post the summary, schedule this meeting.

1868
01:06:08,760 –> 01:06:10,040
Their decisions are bounded

1869
01:06:10,040 –> 01:06:11,560
and their actions are reversible

1870
01:06:11,560 –> 01:06:13,160
or at least compensatable.

1871
01:06:13,160 –> 01:06:14,520
Decision agents are different.

1872
01:06:14,520 –> 01:06:15,720
They decide what should happen,

1873
01:06:15,720 –> 01:06:17,080
not just how to do it.

1874
01:06:17,080 –> 01:06:18,360
They classify urgency.

1875
01:06:18,360 –> 01:06:19,800
They choose who gets notified.

1876
01:06:19,800 –> 01:06:21,160
They decide when to escalate.

1877
01:06:21,160 –> 01:06:23,000
They choose between competing workflows.

1878
01:06:23,000 –> 01:06:24,760
They are a policy surface.

1879
01:06:24,760 –> 01:06:26,840
And that means you can’t casually mix them.

1880
01:06:26,840 –> 01:06:28,760
If the same agent both decides and acts,

1881
01:06:28,760 –> 01:06:31,400
it will eventually act on a decision you can’t defend.

1882
01:06:31,400 –> 01:06:32,600
Not because it’s evil,

1883
01:06:32,600 –> 01:06:34,680
because it’s operating on incomplete context,

1884
01:06:34,680 –> 01:06:37,160
changing context, and shifting tool availability.

1885
01:06:37,160 –> 01:06:39,480
Over time, it becomes a probabilistic policy engine

1886
01:06:39,480 –> 01:06:40,920
with production permissions.

1887
01:06:40,920 –> 01:06:42,440
So agent first architecture

1888
01:06:42,440 –> 01:06:44,680
forbids a common anti-pattern.

1889
01:06:44,680 –> 01:06:46,920
One smart agent that does the whole thing.

1890
01:06:46,920 –> 01:06:49,480
Instead, it forces explicit handoffs.

1891
01:06:49,480 –> 01:06:51,480
A decision agent can propose an action plan

1892
01:06:51,480 –> 01:06:53,320
with confidence scores and rationale.

1893
01:06:53,320 –> 01:06:55,320
A task agent can execute steps only

1894
01:06:55,320 –> 01:06:58,360
when given a signed, deterministic instruction set.

1895
01:06:58,360 –> 01:07:00,120
A separate policy boundary can enforce

1896
01:07:00,120 –> 01:07:01,720
whether the plan is allowed at all.

1897
01:07:01,720 –> 01:07:03,480
That separation sounds bureaucratic

1898
01:07:03,480 –> 01:07:05,720
until you’ve lived through a side-effect incident

1899
01:07:05,720 –> 01:07:07,720
where nobody can answer the only question

1900
01:07:07,720 –> 01:07:08,760
that matters.

1901
01:07:08,760 –> 01:07:10,440
Who authorised this?

1902
01:07:10,440 –> 01:07:12,840
The second design move is treating human in the loop

1903
01:07:12,840 –> 01:07:14,680
as a boundary condition, not a checkbox.

1904
01:07:14,680 –> 01:07:15,880
Human in the loop is not,

1905
01:07:15,880 –> 01:07:17,400
someone can stop it if they notice.

1906
01:07:17,400 –> 01:07:18,680
It is an architectural gate

1907
01:07:18,680 –> 01:07:20,120
where the system must pause,

1908
01:07:20,120 –> 01:07:21,560
present the decision context,

1909
01:07:21,560 –> 01:07:23,960
and require an explicit authorization to proceed.

1910
01:07:23,960 –> 01:07:26,120
That gate should trigger on risk, not on vibes,

1911
01:07:26,120 –> 01:07:28,120
sensitive data access, external sharing,

1912
01:07:28,120 –> 01:07:29,800
financial transactions, permission changes,

1913
01:07:29,800 –> 01:07:31,320
customer facing communications,

1914
01:07:31,320 –> 01:07:33,640
or any action that can’t be undone cheaply.

1915
01:07:33,640 –> 01:07:34,680
And when a human approves,

1916
01:07:34,680 –> 01:07:37,400
that approvals becomes part of the execution record.

1917
01:07:37,400 –> 01:07:39,320
Not a team’s message, not a meeting note,

1918
01:07:39,320 –> 01:07:42,280
a first class artifact tied to the agent identity

1919
01:07:42,280 –> 01:07:43,320
and the tool call.

1920
01:07:43,320 –> 01:07:45,080
The third design move is legibility

1921
01:07:45,080 –> 01:07:46,600
as a non-negotiable requirement.

1922
01:07:46,600 –> 01:07:48,120
Most leaders treat explainability

1923
01:07:48,120 –> 01:07:49,640
like a compliance slogan.

1924
01:07:49,640 –> 01:07:52,680
Agent first architecture treats it as a scaling constraint.

1925
01:07:52,680 –> 01:07:54,840
If the organization cannot reconstruct

1926
01:07:54,840 –> 01:07:56,360
the decision path quickly,

1927
01:07:56,360 –> 01:07:58,520
inputs, selected context,

1928
01:07:58,520 –> 01:08:01,000
selected tools, prompt a version,

1929
01:08:01,000 –> 01:08:03,880
identity used, and resulting side effects.

1930
01:08:03,880 –> 01:08:05,240
Then the organization is not allowed

1931
01:08:05,240 –> 01:08:07,800
to scale that agent beyond a small blast radius.

1932
01:08:07,800 –> 01:08:09,800
It is not legibility is not a nice to have.

1933
01:08:09,800 –> 01:08:11,640
It is the only antidote to MTT,

1934
01:08:11,640 –> 01:08:13,560
and this is where the post-sass paradox

1935
01:08:13,560 –> 01:08:14,760
finally gets a counterforce.

1936
01:08:14,760 –> 01:08:16,680
Entropy grows when decision pathways

1937
01:08:16,680 –> 01:08:18,200
multiply faster than explanation.

1938
01:08:18,200 –> 01:08:19,800
So you design for explanation first.

1939
01:08:19,800 –> 01:08:22,040
You don’t ask, can we build this agent?

1940
01:08:22,040 –> 01:08:24,760
You ask, can we explain this agent under pressure

1941
01:08:24,760 –> 01:08:26,840
during an incident to security to audit

1942
01:08:26,840 –> 01:08:28,920
and to the business owner who just got burned?

1943
01:08:28,920 –> 01:08:30,840
If the answer is no, then it’s not an agent.

1944
01:08:30,840 –> 01:08:32,600
It’s a liability with a chat interface.

1945
01:08:32,600 –> 01:08:35,160
The final design move is to formalize boundaries

1946
01:08:35,160 –> 01:08:36,360
as contracts.

1947
01:08:36,360 –> 01:08:37,400
Tool contracts.

1948
01:08:37,400 –> 01:08:40,360
What is callable with what parameters with what scopes?

1949
01:08:40,360 –> 01:08:42,280
Data contracts, what sources are allowed,

1950
01:08:42,280 –> 01:08:43,480
what labels are required,

1951
01:08:43,480 –> 01:08:45,320
what grounding rules apply.

1952
01:08:45,320 –> 01:08:46,680
Behavior contracts.

1953
01:08:46,680 –> 01:08:48,840
What the agent is allowed to decide

1954
01:08:48,840 –> 01:08:50,120
and what it must escalate.

1955
01:08:50,120 –> 01:08:52,680
Life cycle contracts.

1956
01:08:52,680 –> 01:08:54,200
Who owns versions?

1957
01:08:54,200 –> 01:08:55,400
Who owns deprecation?

1958
01:08:55,400 –> 01:08:56,840
Who owns the kill switch?

1959
01:08:56,840 –> 01:08:59,400
This is how agent first architecture turns

1960
01:08:59,400 –> 01:09:01,480
AI strategy back into architecture.

1961
01:09:01,480 –> 01:09:03,000
Not by slowing down intelligence,

1962
01:09:03,000 –> 01:09:05,400
by forcing intelligence to operate inside boundaries

1963
01:09:05,400 –> 01:09:07,880
that remain deterministic, enforceable,

1964
01:09:07,880 –> 01:09:09,000
and legible at scale.

1965
01:09:09,000 –> 01:09:10,360
And once those boundaries exist,

1966
01:09:10,360 –> 01:09:11,720
then you can talk about the thing,

1967
01:09:11,720 –> 01:09:13,080
most organizations skip.

1968
01:09:13,080 –> 01:09:14,680
The control plane that enforces them.

1969
01:09:15,480 –> 01:09:17,240
The agent control plane.

1970
01:09:17,240 –> 01:09:19,080
Identity, telemetry,

1971
01:09:19,080 –> 01:09:21,160
life cycle, and kill switches.

1972
01:09:21,160 –> 01:09:23,320
At this point, most leaders hear control plane

1973
01:09:23,320 –> 01:09:25,400
and their brain jumps to an admin portal.

1974
01:09:25,400 –> 01:09:26,360
That’s not what this is.

1975
01:09:26,360 –> 01:09:27,880
A control plane is not a UI.

1976
01:09:27,880 –> 01:09:29,880
It’s an enforcement layer for assumptions.

1977
01:09:29,880 –> 01:09:33,240
Identity, authorization, observability, and life cycle.

1978
01:09:33,240 –> 01:09:35,000
The system either has that layer

1979
01:09:35,000 –> 01:09:37,160
or it slowly devolves into conditional chaos

1980
01:09:37,160 –> 01:09:38,600
with nicer branding.

1981
01:09:38,600 –> 01:09:39,720
In deterministic sass,

1982
01:09:39,720 –> 01:09:42,120
the control plane lived in the service itself.

1983
01:09:42,120 –> 01:09:43,960
Exchange online had admin boundaries,

1984
01:09:43,960 –> 01:09:45,320
SharePoint had admin boundaries.

1985
01:09:45,320 –> 01:09:47,800
The workload owned its own behavior surface

1986
01:09:47,800 –> 01:09:49,320
and your job was to configure it.

1987
01:09:49,320 –> 01:09:51,720
In post-sass behavior sits above workloads.

1988
01:09:51,720 –> 01:09:53,160
It sits in orchestration.

1989
01:09:53,160 –> 01:09:55,320
Agent selecting tools, selecting context,

1990
01:09:55,320 –> 01:09:57,640
delegating tasks, and executing side effects.

1991
01:09:57,640 –> 01:09:59,560
So the control plane has to move upstack too.

1992
01:09:59,560 –> 01:10:01,080
And it has to be boring on purpose.

1993
01:10:01,080 –> 01:10:03,000
The first requirement is agent identity,

1994
01:10:03,000 –> 01:10:04,520
not the maker who built it.

1995
01:10:04,520 –> 01:10:06,120
Not the user who clicked it.

1996
01:10:06,120 –> 01:10:07,640
The agent itself.

1997
01:10:07,640 –> 01:10:08,840
If an agent can act,

1998
01:10:08,840 –> 01:10:10,360
it needs a first class principle

1999
01:10:10,360 –> 01:10:12,920
with a stable identity that survives org charts,

2000
01:10:12,920 –> 01:10:15,400
team reorganizations, and the inevitable,

2001
01:10:15,400 –> 01:10:16,680
this started as a pilot.

2002
01:10:16,680 –> 01:10:19,800
That identity needs ownership metadata

2003
01:10:19,800 –> 01:10:22,440
who is accountable what business process it supports,

2004
01:10:22,440 –> 01:10:24,520
what environments it’s allowed to run in

2005
01:10:24,520 –> 01:10:26,840
and what category of authority it holds.

2006
01:10:26,840 –> 01:10:28,760
Without that, you can’t do least privilege.

2007
01:10:28,760 –> 01:10:30,040
You can only do optimism

2008
01:10:30,040 –> 01:10:32,120
because least privilege is not a philosophical stance.

2009
01:10:32,120 –> 01:10:33,480
It’s an authorization graph.

2010
01:10:33,480 –> 01:10:35,160
If you can’t point to an agent as an actor,

2011
01:10:35,160 –> 01:10:36,200
you can’t draw the graph.

2012
01:10:36,200 –> 01:10:37,080
You can’t review it.

2013
01:10:37,080 –> 01:10:38,360
You can’t revoke it cleanly.

2014
01:10:38,360 –> 01:10:39,800
You can’t even explain what happened

2015
01:10:39,800 –> 01:10:41,080
when it does something expensive.

2016
01:10:41,080 –> 01:10:43,320
The second requirement is tool authorization

2017
01:10:43,320 –> 01:10:45,320
as a contract, not a convenience.

2018
01:10:45,320 –> 01:10:48,600
Most organizations let tool reach ability emerge organically.

2019
01:10:48,600 –> 01:10:50,840
Connectors added, plugins enabled,

2020
01:10:50,840 –> 01:10:52,040
graph permissions granted,

2021
01:10:52,040 –> 01:10:54,360
and then everything gets called integration.

2022
01:10:54,360 –> 01:10:56,360
That’s how you build an accidental super user.

2023
01:10:56,360 –> 01:10:58,920
The control plane needs a capability catalog.

2024
01:10:58,920 –> 01:11:00,760
These are the tools this agent can call.

2025
01:11:00,760 –> 01:11:02,280
These are the operations exposed.

2026
01:11:02,280 –> 01:11:03,160
These are the scopes.

2027
01:11:03,160 –> 01:11:05,400
These are the data classifications allowed.

2028
01:11:05,400 –> 01:11:07,800
And these are the conditions under which the call is permitted.

2029
01:11:07,800 –> 01:11:10,760
If you can’t express that in a machine enforceable way,

2030
01:11:10,760 –> 01:11:13,000
then the agent is not integrated.

2031
01:11:13,000 –> 01:11:13,880
It’s armed.

2032
01:11:13,880 –> 01:11:15,560
The third requirement is telemetry

2033
01:11:15,560 –> 01:11:17,720
that answers the questions people actually asked

2034
01:11:17,720 –> 01:11:19,640
during incidents, not did it run.

2035
01:11:19,640 –> 01:11:21,240
Who acted on what?

2036
01:11:21,240 –> 01:11:22,520
Using which identity?

2037
01:11:22,520 –> 01:11:23,880
With which authority?

2038
01:11:23,880 –> 01:11:25,400
Based on what retrieved context,

2039
01:11:25,400 –> 01:11:26,760
through which tool calls?

2040
01:11:26,760 –> 01:11:27,800
In what sequence?

2041
01:11:27,800 –> 01:11:29,000
With what fallbacks?

2042
01:11:29,000 –> 01:11:31,480
And what side effects landed in which systems of record?

2043
01:11:31,480 –> 01:11:32,280
That’s the minimum.

2044
01:11:32,280 –> 01:11:34,520
Anything less is performative observability.

2045
01:11:34,520 –> 01:11:36,840
This is also where the industry keeps lying to itself

2046
01:11:36,840 –> 01:11:37,640
with dashboards.

2047
01:11:37,640 –> 01:11:38,840
Dashboards are summaries.

2048
01:11:38,840 –> 01:11:40,280
Incidents are specifics.

2049
01:11:40,280 –> 01:11:42,360
You need event-grade traces that can be stitched

2050
01:11:42,360 –> 01:11:43,720
into a narrative at human speed.

2051
01:11:43,720 –> 01:11:46,280
If the only thing you can produce is a chat transcript,

2052
01:11:46,280 –> 01:11:47,560
you don’t have observability.

2053
01:11:47,560 –> 01:11:49,320
You have theater.

2054
01:11:49,320 –> 01:11:51,320
The fourth requirement is lifecycle management

2055
01:11:51,320 –> 01:11:54,040
because entropy loves abandoned artifacts.

2056
01:11:54,040 –> 01:11:56,280
Agents are not set and forget.

2057
01:11:56,280 –> 01:11:57,480
Prompts drift.

2058
01:11:57,480 –> 01:11:58,440
Tools change.

2059
01:11:58,440 –> 01:11:59,720
Connectors rotate.

2060
01:11:59,720 –> 01:12:00,920
Models update.

2061
01:12:00,920 –> 01:12:02,600
Data sources get cleaned up.

2062
01:12:02,600 –> 01:12:03,480
People leave.

2063
01:12:03,480 –> 01:12:05,240
The agent keeps executing anyway

2064
01:12:05,240 –> 01:12:07,720
because the system does not care about your org structure.

2065
01:12:07,720 –> 01:12:10,760
So the control plane needs explicit version ownership

2066
01:12:10,760 –> 01:12:11,800
and decommissioning.

2067
01:12:11,800 –> 01:12:15,080
Every agent needs a named owner, a versioning scheme,

2068
01:12:15,080 –> 01:12:17,320
a change log, and a retirement path.

2069
01:12:17,320 –> 01:12:20,760
And owner can’t mean the last person who touched it.

2070
01:12:20,760 –> 01:12:23,960
It has to mean accountable for behavior and side effects.

2071
01:12:23,960 –> 01:12:26,360
Otherwise, your agent estate becomes a museum

2072
01:12:26,360 –> 01:12:27,880
of half-owned automation.

2073
01:12:27,880 –> 01:12:29,560
And then finally, kill switches.

2074
01:12:29,560 –> 01:12:31,560
Not as a last resort security fantasy

2075
01:12:31,560 –> 01:12:33,080
as an architectural primitive.

2076
01:12:33,080 –> 01:12:34,760
If an agent can execute side effects,

2077
01:12:34,760 –> 01:12:37,320
you must be able to pause it, revoke its tool access

2078
01:12:37,320 –> 01:12:38,760
or force it into a safe mode

2079
01:12:38,760 –> 01:12:40,920
without redeploying half your environment.

2080
01:12:40,920 –> 01:12:42,200
And you need escalation paths

2081
01:12:42,200 –> 01:12:43,880
that are defined before the incident,

2082
01:12:43,880 –> 01:12:45,240
not negotiated during it.

2083
01:12:45,240 –> 01:12:47,480
Because the incident you’re trying to prevent

2084
01:12:47,480 –> 01:12:48,520
is not an outage.

2085
01:12:48,520 –> 01:12:50,520
It’s an agent doing the wrong thing quickly,

2086
01:12:50,520 –> 01:12:52,760
repeatedly across multiple systems

2087
01:12:52,760 –> 01:12:55,960
while everyone argues about whether it was expected behavior.

2088
01:12:55,960 –> 01:12:58,440
A real control plane makes that argument irrelevant.

2089
01:12:58,440 –> 01:13:00,120
It enforces intent at runtime.

2090
01:13:00,120 –> 01:13:01,400
And here’s the uncomfortable truth.

2091
01:13:01,400 –> 01:13:03,720
Once you have identity, tool contracts,

2092
01:13:03,720 –> 01:13:05,640
telemetry, life cycle, and kill switches,

2093
01:13:05,640 –> 01:13:08,680
you’ve built the thing most AI strategies quietly avoid.

2094
01:13:08,680 –> 01:13:10,920
You’ve made agents operationally legible,

2095
01:13:10,920 –> 01:13:12,520
which means you can finally scale them

2096
01:13:12,520 –> 01:13:14,120
without scaling ambiguity.

2097
01:13:14,120 –> 01:13:15,720
Now, the next question becomes obvious.

2098
01:13:15,720 –> 01:13:18,280
If tools brawl is one of the fastest entropy surfaces,

2099
01:13:18,280 –> 01:13:22,040
what happens when MCP makes tool integration dramatically easier?

2100
01:13:22,040 –> 01:13:23,560
MCP’s integration relief

2101
01:13:23,560 –> 01:13:25,720
and a new entropy surface if unmanaged.

2102
01:13:25,720 –> 01:13:27,720
MCP is going to sound like the part of this story

2103
01:13:27,720 –> 01:13:30,440
where the clouds part and the architecture gets easier.

2104
01:13:30,440 –> 01:13:32,280
Because mechanically, it does.

2105
01:13:33,160 –> 01:13:36,600
The integration problem in the agent era is brutal.

2106
01:13:36,600 –> 01:13:38,360
Every agent wants to call tools.

2107
01:13:38,360 –> 01:13:41,400
Every tool has an API, every API has an else model,

2108
01:13:41,400 –> 01:13:43,080
and every team wires it differently.

2109
01:13:43,080 –> 01:13:44,760
That creates the classic MXN mess.

2110
01:13:44,760 –> 01:13:47,480
You end up with bespoke connectors, brittle adapters,

2111
01:13:47,480 –> 01:13:49,640
duplicated wrappers, and a constant tax

2112
01:13:49,640 –> 01:13:51,240
every time anything changes.

2113
01:13:51,240 –> 01:13:54,280
MCP’s promise is to collapse that mess into something more linear.

2114
01:13:54,280 –> 01:13:57,240
One side speaks agent, the other side speaks tool.

2115
01:13:57,240 –> 01:13:59,320
The protocol becomes the contract discovery,

2116
01:13:59,320 –> 01:14:02,040
schemers, and a standard way to call capabilities.

2117
01:14:02,040 –> 01:14:04,600
So instead of building 10 different custom integrations

2118
01:14:04,600 –> 01:14:06,200
for 10 different co-pilots,

2119
01:14:06,200 –> 01:14:08,600
you build or adopt an MCP server once

2120
01:14:08,600 –> 01:14:10,520
and any MCP capable agent can use it.

2121
01:14:10,520 –> 01:14:11,320
That’s real relief.

2122
01:14:11,320 –> 01:14:14,280
It reduces the integration surface area you have to handcraft.

2123
01:14:14,280 –> 01:14:16,680
It reduces the number of places where tool calling

2124
01:14:16,680 –> 01:14:18,280
gets implemented poorly.

2125
01:14:18,280 –> 01:14:20,280
And it makes tool reuse realistic,

2126
01:14:20,280 –> 01:14:22,280
which is the difference between an agent program

2127
01:14:22,280 –> 01:14:23,400
and a thousand snowflakes.

2128
01:14:23,400 –> 01:14:24,920
But here’s what most people miss.

2129
01:14:24,920 –> 01:14:26,680
MCP doesn’t remove complexity.

2130
01:14:26,680 –> 01:14:29,320
It relocates it into the one place

2131
01:14:29,320 –> 01:14:32,280
enterprises are already failing to control capabilities, brawl.

2132
01:14:32,280 –> 01:14:35,320
MCP turns tool exposure into something that can scale

2133
01:14:35,320 –> 01:14:37,080
as fast as copying a config file.

2134
01:14:37,080 –> 01:14:38,120
That’s the upside.

2135
01:14:38,120 –> 01:14:39,560
It’s also the failure mode,

2136
01:14:39,560 –> 01:14:41,880
because once integration becomes easy,

2137
01:14:41,880 –> 01:14:44,280
the default organizational behavior becomes

2138
01:14:44,280 –> 01:14:46,680
expose one more tool at one more server,

2139
01:14:46,680 –> 01:14:48,040
publish one more capability,

2140
01:14:48,040 –> 01:14:49,720
let one more agent use it.

2141
01:14:49,720 –> 01:14:51,560
We can always tighten it later when you want.

2142
01:14:51,560 –> 01:14:52,760
That distinction matters.

2143
01:14:52,760 –> 01:14:54,120
In architectural terms,

2144
01:14:54,120 –> 01:14:56,360
MCP is not an integration convenience.

2145
01:14:56,360 –> 01:14:57,800
It is a tool distribution system

2146
01:14:57,800 –> 01:15:00,520
and every distribution system becomes an entropy accelerator

2147
01:15:00,520 –> 01:15:03,400
unless you force contracts around what gets distributed,

2148
01:15:03,400 –> 01:15:04,680
who can publish it,

2149
01:15:04,680 –> 01:15:07,080
and what safe to consume actually means.

2150
01:15:07,080 –> 01:15:09,480
So MCP introduces a new entropy surface,

2151
01:15:09,480 –> 01:15:10,920
standardized tool sprawl.

2152
01:15:10,920 –> 01:15:13,080
Before MCP tool sprawl was slowed by friction.

2153
01:15:13,080 –> 01:15:14,680
Every integration required effort,

2154
01:15:14,680 –> 01:15:16,280
which acted like a crude control.

2155
01:15:16,280 –> 01:15:17,720
With MCP, the friction drops,

2156
01:15:17,720 –> 01:15:20,920
so the sprawl becomes limited only by imagination and urgency.

2157
01:15:20,920 –> 01:15:22,120
That’s not a moral critique.

2158
01:15:22,120 –> 01:15:23,320
It’s system behavior.

2159
01:15:23,320 –> 01:15:26,040
The first risk is server registration

2160
01:15:26,040 –> 01:15:28,040
becoming an accidental marketplace.

2161
01:15:28,040 –> 01:15:31,480
Teams stand up MCP servers for their own needs,

2162
01:15:31,480 –> 01:15:32,520
a Giro server,

2163
01:15:32,520 –> 01:15:33,960
a service now server,

2164
01:15:33,960 –> 01:15:35,320
a CRM server,

2165
01:15:35,320 –> 01:15:37,080
an internal data server.

2166
01:15:37,080 –> 01:15:39,400
Each one exposes a slightly different schema,

2167
01:15:39,400 –> 01:15:41,080
different naming, different guardrails,

2168
01:15:41,080 –> 01:15:43,560
and different assumptions about authentication.

2169
01:15:43,560 –> 01:15:44,920
Then agents discover them,

2170
01:15:44,920 –> 01:15:47,400
and now the enterprise has created an internal app store

2171
01:15:47,400 –> 01:15:48,600
for capabilities.

2172
01:15:48,600 –> 01:15:51,400
Without the review rigor that app stores evolve to require.

2173
01:15:51,400 –> 01:15:53,880
The second risk is capability catalogs drifting away

2174
01:15:53,880 –> 01:15:56,040
from least privileged tools are never neutral.

2175
01:15:56,040 –> 01:15:58,360
A tool is authority packaged as an API.

2176
01:15:58,360 –> 01:15:59,880
If a tool can create a ticket,

2177
01:15:59,880 –> 01:16:02,680
send an email, update a record, or change access,

2178
01:16:02,680 –> 01:16:05,400
then exposing that tool through MCP isn’t integration.

2179
01:16:05,400 –> 01:16:06,440
It’s delegation.

2180
01:16:06,440 –> 01:16:07,400
So the question isn’t,

2181
01:16:07,400 –> 01:16:09,240
can the agent call the tool?

2182
01:16:09,240 –> 01:16:10,920
It’s under what identity?

2183
01:16:10,920 –> 01:16:11,960
With what scopes?

2184
01:16:11,960 –> 01:16:13,080
With what constraints?

2185
01:16:13,080 –> 01:16:14,840
And with what audit narrative?

2186
01:16:14,840 –> 01:16:16,920
If MCP makes it easy to call tools,

2187
01:16:16,920 –> 01:16:19,160
it also makes it easy to call the wrong tools

2188
01:16:19,160 –> 01:16:20,280
with the wrong authority,

2189
01:16:20,280 –> 01:16:22,040
especially when teams treat servers

2190
01:16:22,040 –> 01:16:25,000
as shared utilities instead of controlled boundaries.

2191
01:16:25,000 –> 01:16:26,840
The third risk is change management

2192
01:16:26,840 –> 01:16:28,440
collapsing into surprise.

2193
01:16:28,440 –> 01:16:30,520
MCP supports dynamic discovery.

2194
01:16:30,520 –> 01:16:31,560
That’s the feature.

2195
01:16:31,560 –> 01:16:34,040
agents can learn what tools exist without hard coding.

2196
01:16:34,040 –> 01:16:36,920
But dynamic discovery, without change control,

2197
01:16:36,920 –> 01:16:39,560
is how you turn production behavior into a moving target.

2198
01:16:39,560 –> 01:16:41,320
A server adds a new capability.

2199
01:16:41,320 –> 01:16:43,480
A schema changes, a parameter meaning shifts,

2200
01:16:43,480 –> 01:16:44,840
and all the requirement changes.

2201
01:16:44,840 –> 01:16:46,680
The agent doesn’t break in a neat way.

2202
01:16:46,680 –> 01:16:48,360
It adapts, it selects different actions.

2203
01:16:48,360 –> 01:16:49,480
It fails over.

2204
01:16:49,480 –> 01:16:51,320
It produces different side effects.

2205
01:16:51,320 –> 01:16:53,960
And your MTT spikes because the execution path

2206
01:16:53,960 –> 01:16:56,440
changed without a deployment event you can point to.

2207
01:16:56,440 –> 01:16:57,480
That’s the paradox.

2208
01:16:57,480 –> 01:17:00,920
Again, interoperability increases the need for contracts, not less.

2209
01:17:00,920 –> 01:17:04,040
So if an organization adopts MCP as integration relief,

2210
01:17:04,040 –> 01:17:06,840
but doesn’t treat MCP servers as first class production

2211
01:17:06,840 –> 01:17:10,200
surfaces, versioned, owned, restricted, observable,

2212
01:17:10,200 –> 01:17:12,280
then MCP becomes the fastest way

2213
01:17:12,280 –> 01:17:14,200
to industrialize conditional chaos.

2214
01:17:14,200 –> 01:17:16,600
This is why the agent control plane matters even more

2215
01:17:16,600 –> 01:17:17,880
once MCP shows up.

2216
01:17:17,880 –> 01:17:20,360
You need enforced server registration rules.

2217
01:17:20,360 –> 01:17:22,760
What qualifies as publishable, who approves,

2218
01:17:22,760 –> 01:17:24,520
and what metadata must exist?

2219
01:17:24,520 –> 01:17:26,360
You need capability classification.

2220
01:17:26,360 –> 01:17:30,040
Read only tools versus side effect tools versus privilege tools.

2221
01:17:30,040 –> 01:17:33,240
You need identity boundaries, which agents can call which servers,

2222
01:17:33,240 –> 01:17:35,880
and whether those calls are on behalf of a user

2223
01:17:35,880 –> 01:17:37,320
or under a service principle.

2224
01:17:37,320 –> 01:17:39,080
And you need change discipline.

2225
01:17:39,080 –> 01:17:42,280
Versioning, deprecation, and explicit compatibility promises

2226
01:17:42,280 –> 01:17:43,960
because otherwise every small improvement

2227
01:17:43,960 –> 01:17:45,880
is a behavioral drift event.

2228
01:17:45,880 –> 01:17:48,440
MCP can absolutely reduce integration dead,

2229
01:17:48,440 –> 01:17:51,000
but it will also let you scale bad integration faster

2230
01:17:51,000 –> 01:17:52,120
than you ever could before.

2231
01:17:52,120 –> 01:17:53,640
The protocol isn’t your safety net.

2232
01:17:53,640 –> 01:17:55,080
It’s your multiplier.

2233
01:17:55,080 –> 01:17:57,480
And once you accept that, the next move is obvious.

2234
01:17:57,480 –> 01:17:59,240
Don’t scale agents first.

2235
01:17:59,240 –> 01:18:00,840
Scale legibility first.

2236
01:18:00,840 –> 01:18:03,400
Which is why the only sane way forward is a controlled pilot

2237
01:18:03,400 –> 01:18:06,200
that proves you can explain behavior before you amplify it.

2238
01:18:06,200 –> 01:18:07,880
The 90-day agent first pilot,

2239
01:18:07,880 –> 01:18:09,800
prove legibility before scale.

2240
01:18:09,800 –> 01:18:11,400
The worst way to respond to all of this

2241
01:18:11,400 –> 01:18:13,000
is to announce an agent program

2242
01:18:13,000 –> 01:18:16,040
and then let every team build whatever they want faster

2243
01:18:16,040 –> 01:18:17,640
because the board is excited

2244
01:18:17,640 –> 01:18:19,480
that just turns entropy into a KPI.

2245
01:18:19,480 –> 01:18:21,960
The only sane move is a 90-day pilot

2246
01:18:21,960 –> 01:18:24,440
that proves one thing before you scale anything.

2247
01:18:24,440 –> 01:18:27,480
The organization can explain agent behavior under pressure.

2248
01:18:27,480 –> 01:18:28,280
Not in a demo.

2249
01:18:28,280 –> 01:18:31,160
In a messy week, with real inputs, with real side effects,

2250
01:18:31,160 –> 01:18:34,360
with real stakeholders who get angry when the system improvises,

2251
01:18:34,360 –> 01:18:37,240
so pick one cross-functional process with consequences,

2252
01:18:37,240 –> 01:18:40,360
not drafting content, not summarized meetings.

2253
01:18:40,360 –> 01:18:42,360
Pick something that touches a system of record

2254
01:18:42,360 –> 01:18:44,040
and triggers downstream work.

2255
01:18:44,040 –> 01:18:46,200
Onboarding, access requests,

2256
01:18:46,200 –> 01:18:48,680
supplier onboarding, service triage,

2257
01:18:48,680 –> 01:18:50,200
invoice exceptions.

2258
01:18:50,200 –> 01:18:53,000
Something where the organization already knows what wrong looks like.

2259
01:18:53,000 –> 01:18:55,240
Then design the agents like products, not helpers.

2260
01:18:55,240 –> 01:18:58,280
That means you name an owner who owns behavior, not just the repo.

2261
01:18:58,280 –> 01:19:00,840
You give it a backlog, versions, a deprecation plan,

2262
01:19:00,840 –> 01:19:02,440
and a defined blast radius.

2263
01:19:02,440 –> 01:19:04,680
You decide what production means for this agent,

2264
01:19:04,680 –> 01:19:06,040
you decide who can change it.

2265
01:19:06,040 –> 01:19:08,200
And you decide how change gets reviewed

2266
01:19:08,200 –> 01:19:10,200
because prompt edits are still logic edits

2267
01:19:10,200 –> 01:19:11,480
even when they look like English.

2268
01:19:11,480 –> 01:19:14,760
Now you establish the boundaries the pilot exists to validate.

2269
01:19:14,760 –> 01:19:16,760
The deterministic core comes first.

2270
01:19:16,760 –> 01:19:18,920
The workflow steps that must be correct,

2271
01:19:18,920 –> 01:19:20,600
auditable, and idempotent.

2272
01:19:20,600 –> 01:19:23,080
The things that create records, update fields,

2273
01:19:23,080 –> 01:19:25,640
send external messages or change access.

2274
01:19:25,640 –> 01:19:29,160
Then you wrap that deterministic core with probabilistic reasoning.

2275
01:19:29,160 –> 01:19:31,880
Classification, extraction from messy inputs,

2276
01:19:31,880 –> 01:19:35,560
drafting, summarization, prioritization, and recommendations.

2277
01:19:35,560 –> 01:19:37,000
Reasoning can propose actions.

2278
01:19:37,000 –> 01:19:39,160
It can’t execute side effects directly.

2279
01:19:39,160 –> 01:19:41,000
It must call the deterministic layer

2280
01:19:41,000 –> 01:19:42,840
through explicit tool contracts

2281
01:19:42,840 –> 01:19:44,600
and you don’t let the pilot cheat.

2282
01:19:44,600 –> 01:19:47,080
If the agent needs a tool, you register the tool.

2283
01:19:47,080 –> 01:19:49,800
If it needs data, you define which sources are allowed.

2284
01:19:49,800 –> 01:19:53,000
If it needs authority, you assign an identity and scope it.

2285
01:19:53,000 –> 01:19:55,320
If it needs to escalate, you define a human gate

2286
01:19:55,320 –> 01:19:57,880
with a named approver and a clear stop condition.

2287
01:19:57,880 –> 01:20:01,160
This is also where you design for failure as a first class feature.

2288
01:20:01,160 –> 01:20:02,920
Agents will hit ambiguous inputs.

2289
01:20:02,920 –> 01:20:04,440
Downstream APIs will throttle.

2290
01:20:04,440 –> 01:20:05,800
A connector will fail.

2291
01:20:05,800 –> 01:20:07,720
A human will ignore an approver request.

2292
01:20:07,720 –> 01:20:09,720
A model update will change behavior slightly.

2293
01:20:09,720 –> 01:20:10,840
None of that is surprising.

2294
01:20:10,840 –> 01:20:13,640
What matters is whether the system fails legibly.

2295
01:20:13,640 –> 01:20:15,640
So your pilot needs two kill switches.

2296
01:20:15,640 –> 01:20:17,000
One to pause the agent

2297
01:20:17,000 –> 01:20:21,000
and one to force safe mode where it can only draft and recommend, not act.

2298
01:20:21,000 –> 01:20:23,080
And those switches can’t be buried in a runbook.

2299
01:20:23,080 –> 01:20:24,840
They have to be operational muscle memory.

2300
01:20:24,840 –> 01:20:26,040
Now, measure it.

2301
01:20:26,040 –> 01:20:28,840
Not vanity metrics like prompts per user.

2302
01:20:28,840 –> 01:20:31,960
Measure the entropy signals this episode is built on before and after.

2303
01:20:31,960 –> 01:20:34,360
Mean time to explain is the headline metric.

2304
01:20:34,360 –> 01:20:36,760
How long it takes to answer why did it do that

2305
01:20:36,760 –> 01:20:38,920
with a coherent narrative and evidence?

2306
01:20:38,920 –> 01:20:41,960
If MTT drops, you’re building a system you can scale.

2307
01:20:41,960 –> 01:20:45,000
If MTT stays high, you’re building a mystery generator.

2308
01:20:45,000 –> 01:20:46,840
Track incident ambiguity.

2309
01:20:46,840 –> 01:20:50,520
How many incidents involve behavior drift instead of outages?

2310
01:20:50,520 –> 01:20:52,200
Track drift frequency?

2311
01:20:52,200 –> 01:20:54,680
How often prompts, tools or connectors change

2312
01:20:54,680 –> 01:20:57,800
without a corresponding change record tied to the agent product?

2313
01:20:57,800 –> 01:21:00,200
Track agent to human ratio inside the pilot,

2314
01:21:00,200 –> 01:21:03,000
not as a brag, as a budget conversation.

2315
01:21:03,000 –> 01:21:05,560
If one agent produces a thousand decisions a day,

2316
01:21:05,560 –> 01:21:07,880
then you just created a new operational workload

2317
01:21:07,880 –> 01:21:09,240
whether you planned it or not

2318
01:21:09,240 –> 01:21:11,240
and then do the part most pilots avoid.

2319
01:21:11,240 –> 01:21:12,360
Proof decommissioning.

2320
01:21:12,360 –> 01:21:15,400
At day 90, you either promote it with stronger boundaries

2321
01:21:15,400 –> 01:21:16,520
or you retire it.

2322
01:21:16,520 –> 01:21:18,440
That retirement must revoke identity,

2323
01:21:18,440 –> 01:21:20,280
disconnect tools, archive traces,

2324
01:21:20,280 –> 01:21:22,280
and remove it from discoverability.

2325
01:21:22,280 –> 01:21:24,360
If the organization can’t cleanly kill an agent,

2326
01:21:24,360 –> 01:21:26,200
it can’t claim it controls agents.

2327
01:21:26,200 –> 01:21:27,320
It just accumulates them.

2328
01:21:27,320 –> 01:21:29,720
The output of this pilot isn’t a slide deck.

2329
01:21:29,720 –> 01:21:31,960
It’s a repeatable pattern, a reference architecture,

2330
01:21:31,960 –> 01:21:33,240
a decision rights model,

2331
01:21:33,240 –> 01:21:35,800
and a telemetry story that compiles into explanation.

2332
01:21:35,800 –> 01:21:37,720
That’s what scale actually requires.

2333
01:21:37,720 –> 01:21:38,600
Conclusion.

2334
01:21:38,600 –> 01:21:41,080
AI doesn’t reduce complexity.

2335
01:21:41,080 –> 01:21:43,800
It converts visible systems into invisible behavior,

2336
01:21:43,800 –> 01:21:46,920
and invisible behavior is where architectural entropy multiplies.

2337
01:21:46,920 –> 01:21:48,680
If this matched what you’re seeing,

2338
01:21:48,680 –> 01:21:52,760
leave a quick review with the worst mean time to explain story you’ve lived through

2339
01:21:52,760 –> 01:21:54,760
and connect with myocopieters on LinkedIn,

2340
01:21:54,760 –> 01:21:57,960
send examples to the next episode, “Disex Real Failures.”





Source link

0 Votes: 0 Upvotes, 0 Downvotes (0 Points)

Leave a reply

Follow
Search
Popular Now
Loading

Signing-in 3 seconds...

Signing-up 3 seconds...

Discover more from 365 Community Online

Subscribe now to keep reading and get access to the full archive.

Continue reading