<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/pop-goes-the-stack" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Pop Goes the Stack</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/pop-goes-the-stack</itunes:new-feed-url>
    <description>Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack. </description>
    <copyright>© 2026 F5</copyright>
    <podcast:guid>65b847f5-e763-5d02-8116-882512d1cc24</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>1fbd0ba0-6264-11f0-b69f-41e151076900</itunes:applepodcastsverify>
    <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
    <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
    <language>en</language>
    <pubDate>Tue, 19 May 2026 13:42:04 -0700</pubDate>
    <lastBuildDate>Tue, 19 May 2026 13:43:08 -0700</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/0p8wicrHruo9irmgOaFBZ8xMQAhO_w3lXj3EdYP9pdE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGQ2/ZDBjM2JjMmMyZDg0/MGY5ZTEyYTViOTgy/N2RiYS5wbmc.jpg</url>
      <title>Pop Goes the Stack</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>F5</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/0p8wicrHruo9irmgOaFBZ8xMQAhO_w3lXj3EdYP9pdE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGQ2/ZDBjM2JjMmMyZDg0/MGY5ZTEyYTViOTgy/N2RiYS5wbmc.jpg"/>
    <itunes:summary>Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack. </itunes:summary>
    <itunes:subtitle>Explore the evolving world of application delivery and security.</itunes:subtitle>
    <itunes:keywords>Application Delivery, Application Security, Technology, Technology Stack, </itunes:keywords>
    <itunes:owner>
      <itunes:name>F5</itunes:name>
      <itunes:email>F5Podcasts@f5.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>DevOps meets AI agents: Risk, audit, and the Deming playbook</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>DevOps meets AI agents: Risk, audit, and the Deming playbook</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a6468d29-febf-4e7f-946c-56aa8091ca67</guid>
      <link>https://share.transistor.fm/s/8958b616</link>
      <description>
        <![CDATA[<p>AI is no longer a lab tool; it’s showing up in pipelines, production systems, and the places where “seemed like a good idea” becomes a 2 a.m. incident. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses are joined by John Willis, known for his work on DevOps and Deming, to separate what’s genuinely new about AI from what looks like the same organizational patterns repeating under a new label.</p><p> </p><p>John frames the shift in two parts. First, the human side: every major technology transition triggers the same dynamics, and there’s a century of first principles from Deming and others that still apply. Second, the operational side: AI introduces a different kind of authority into the delivery loop. DevOps optimized for speed with reasonably deterministic pipelines. AI pushes systems into probabilistic behavior, where correctness is no longer guaranteed 100% of the time and audits can’t pretend “this will never happen.”</p><p> </p><p>The conversation gets practical about what that means for enterprise teams adopting agents. The real questions aren’t whether tools use MCP or a CLI, but what authority an agent has: read-only, write/mutate, or execute. From there, you need boundaries, containment, escalation policies, kill switches, stronger logging, replayability, and the ability to justify decisions after the fact.</p><p> </p><p>The main takeaway is permission to slow down. Step back, define what risk you’re willing to accept at each stage, and build guardrails that match that risk. AI isn’t going away, but “move fast” without a risk model is just handing operational authority to a very smart script and hoping it behaves.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI is no longer a lab tool; it’s showing up in pipelines, production systems, and the places where “seemed like a good idea” becomes a 2 a.m. incident. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses are joined by John Willis, known for his work on DevOps and Deming, to separate what’s genuinely new about AI from what looks like the same organizational patterns repeating under a new label.</p><p> </p><p>John frames the shift in two parts. First, the human side: every major technology transition triggers the same dynamics, and there’s a century of first principles from Deming and others that still apply. Second, the operational side: AI introduces a different kind of authority into the delivery loop. DevOps optimized for speed with reasonably deterministic pipelines. AI pushes systems into probabilistic behavior, where correctness is no longer guaranteed 100% of the time and audits can’t pretend “this will never happen.”</p><p> </p><p>The conversation gets practical about what that means for enterprise teams adopting agents. The real questions aren’t whether tools use MCP or a CLI, but what authority an agent has: read-only, write/mutate, or execute. From there, you need boundaries, containment, escalation policies, kill switches, stronger logging, replayability, and the ability to justify decisions after the fact.</p><p> </p><p>The main takeaway is permission to slow down. Step back, define what risk you’re willing to accept at each stage, and build guardrails that match that risk. AI isn’t going away, but “move fast” without a risk model is just handing operational authority to a very smart script and hoping it behaves.</p>]]>
      </content:encoded>
      <pubDate>Tue, 19 May 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/8958b616/e9fb7d87.mp3" length="33991546" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1409</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>AI is no longer a lab tool; it’s showing up in pipelines, production systems, and the places where “seemed like a good idea” becomes a 2 a.m. incident. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses are joined by John Willis, known for his work on DevOps and Deming, to separate what’s genuinely new about AI from what looks like the same organizational patterns repeating under a new label.</p><p> </p><p>John frames the shift in two parts. First, the human side: every major technology transition triggers the same dynamics, and there’s a century of first principles from Deming and others that still apply. Second, the operational side: AI introduces a different kind of authority into the delivery loop. DevOps optimized for speed with reasonably deterministic pipelines. AI pushes systems into probabilistic behavior, where correctness is no longer guaranteed 100% of the time and audits can’t pretend “this will never happen.”</p><p> </p><p>The conversation gets practical about what that means for enterprise teams adopting agents. The real questions aren’t whether tools use MCP or a CLI, but what authority an agent has: read-only, write/mutate, or execute. From there, you need boundaries, containment, escalation policies, kill switches, stronger logging, replayability, and the ability to justify decisions after the fact.</p><p> </p><p>The main takeaway is permission to slow down. Step back, define what risk you’re willing to accept at each stage, and build guardrails that match that risk. AI isn’t going away, but “move fast” without a risk model is just handing operational authority to a very smart script and hoping it behaves.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AIOps, DevOps and AI, autonomous agents in DevOps, AIOps vs DevOps, Deming, first principles, critical thinking in AI, probabilistic systems, AI risk tolerance, AI governance, audit for AI, regulated AI systems, human in the loop, human on the loop, agent authority levels, AI agent scoping, blast radius control, WebAssembly sandbox, eBPF for agents, AI incident response, AI regulatory control, AI guardrails, AI agent containment, AI logging</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://www.amazon.com/Rebels-Reason-Aristotle-ChatGPT-Heroes/dp/B0FCD969SD/" img="https://img.transistorcdn.com/lk29JOJDQ6IQmlurdL9PQ-_XwdnT2Q-biq8OFrAPWAs/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOWIy/ZDUxNWJkYTAzZmQ2/YzZmN2M3MDA0MWU5/NGViYy5wbmc.jpg">John Willis</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/8958b616/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/8958b616/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Model routing isn’t load balancing (And that’s why you’re not ready)</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Model routing isn’t load balancing (And that’s why you’re not ready)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be0d249d-4232-4ba4-80af-eb1e34133e4d</guid>
      <link>https://share.transistor.fm/s/f803166d</link>
      <description>
        <![CDATA[<p>Multi-model AI isn’t a buzzword anymore, it’s how organizations are actually operating. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses dig into fresh findings from F5's State of Application Strategy Report showing companies run an average of seven models, and more than half are already orchestrating multiple models together. That’s a big shift, and it changes what “infrastructure readiness” even means.</p><p> </p><p>Why do teams chain models in the first place? The answer: cost, capability, and risk. The uncomfortable part? Most infrastructure is still built for deterministic systems, and AI routing is not the same problem as load balancing. Model routing isn’t about spreading traffic evenly. It’s about making a decision on every request: which model is best for this job, what will it cost, what’s the risk, and what’s the fallback when the answer is wrong or low quality.</p><p> </p><p>Joel frames it as a category change, from “where should this request go?” to “what should happen as a result of this request?” That shift forces new requirements: policy enforcement across models, identity-aware access, decision justification, and mechanisms to recover when output quality degrades due to drift, configuration changes, or poisoned inputs like compromised RAG data. Lori ties it back to governance, not just availability, and why “AI workloads” expose gaps that traditional tooling can’t cover.</p><p> </p><p>While many organizations are operationalizing AI, that doesn’t mean it’s manageable yet. If you want to know how to move forward from here, this is an episode you don't want to miss.</p><p>Get your copy of the <a href="https://www.f5.com/resources/reports/state-of-application-strategy-report">2026 State of Applications Strategy Report</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Multi-model AI isn’t a buzzword anymore, it’s how organizations are actually operating. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses dig into fresh findings from F5's State of Application Strategy Report showing companies run an average of seven models, and more than half are already orchestrating multiple models together. That’s a big shift, and it changes what “infrastructure readiness” even means.</p><p> </p><p>Why do teams chain models in the first place? The answer: cost, capability, and risk. The uncomfortable part? Most infrastructure is still built for deterministic systems, and AI routing is not the same problem as load balancing. Model routing isn’t about spreading traffic evenly. It’s about making a decision on every request: which model is best for this job, what will it cost, what’s the risk, and what’s the fallback when the answer is wrong or low quality.</p><p> </p><p>Joel frames it as a category change, from “where should this request go?” to “what should happen as a result of this request?” That shift forces new requirements: policy enforcement across models, identity-aware access, decision justification, and mechanisms to recover when output quality degrades due to drift, configuration changes, or poisoned inputs like compromised RAG data. Lori ties it back to governance, not just availability, and why “AI workloads” expose gaps that traditional tooling can’t cover.</p><p> </p><p>While many organizations are operationalizing AI, that doesn’t mean it’s manageable yet. If you want to know how to move forward from here, this is an episode you don't want to miss.</p><p>Get your copy of the <a href="https://www.f5.com/resources/reports/state-of-application-strategy-report">2026 State of Applications Strategy Report</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 12 May 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/f803166d/5c41fb88.mp3" length="29103553" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1206</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Multi-model AI isn’t a buzzword anymore, it’s how organizations are actually operating. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses dig into fresh findings from F5's State of Application Strategy Report showing companies run an average of seven models, and more than half are already orchestrating multiple models together. That’s a big shift, and it changes what “infrastructure readiness” even means.</p><p> </p><p>Why do teams chain models in the first place? The answer: cost, capability, and risk. The uncomfortable part? Most infrastructure is still built for deterministic systems, and AI routing is not the same problem as load balancing. Model routing isn’t about spreading traffic evenly. It’s about making a decision on every request: which model is best for this job, what will it cost, what’s the risk, and what’s the fallback when the answer is wrong or low quality.</p><p> </p><p>Joel frames it as a category change, from “where should this request go?” to “what should happen as a result of this request?” That shift forces new requirements: policy enforcement across models, identity-aware access, decision justification, and mechanisms to recover when output quality degrades due to drift, configuration changes, or poisoned inputs like compromised RAG data. Lori ties it back to governance, not just availability, and why “AI workloads” expose gaps that traditional tooling can’t cover.</p><p> </p><p>While many organizations are operationalizing AI, that doesn’t mean it’s manageable yet. If you want to know how to move forward from here, this is an episode you don't want to miss.</p><p>Get your copy of the <a href="https://www.f5.com/resources/reports/state-of-application-strategy-report">2026 State of Applications Strategy Report</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, State of Application Strategy Report, multi-model AI, multi-model orchestration, model chaining, LLM routing, model routing, AI traffic management, AI load balancing, AI model selection, AI governance, AI infrastructure readiness, probabilistic systems operations, prompt and output guardrails, policy enforcement across models, prompt engineering, RAG, routing governance, operational AI, load balancing, AI workloads, AI agent identity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f803166d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/f803166d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>KV cache is the real inference bottleneck (Not GPUs)</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>KV cache is the real inference bottleneck (Not GPUs)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3352abb2-20d3-4e8e-b44a-51e423e51ed1</guid>
      <link>https://share.transistor.fm/s/7f0e9e41</link>
      <description>
        <![CDATA[<p>GPUs get all the attention, but in inference, the real bottleneck is often memory, specifically the KV cache. In this episode of Pop Goes the Stack, Lori MacVittie sits down with Tim Michels to explain why inference stopped being stateless the moment long contexts, multi-turn conversations, and never-ending agents became normal. That state has to live somewhere, and too often it’s living in the most expensive place in the stack.</p><p><br></p><p>Tim breaks down what KV cache actually is by separating inference into its two phases: prefill, where prompts are tokenized and transformed into the internal structures the model needs, and decode, where the response is generated token by token. KV cache is the bridge between them, and keeping it available can skip expensive recomputation and drastically improve time to first token.</p><p><br></p><p>From there, the conversation moves into the architectural shift: building a memory hierarchy that offloads cache from GPU HBM to host DRAM, to local SSD, and even to network-attached storage. It’s slower than keeping everything on-GPU, but still faster than starting cold. They also cover semantic caching as an external shortcut, and why routing and load balancing need to become cache-aware, steering users back to the GPU or cluster that already holds their state.</p><p><br></p><p>The big takeaway for enterprises is practical: stop accepting “buy more GPUs” as the default plan. KV cache awareness, smarter routing, and storage/network tuning are where the next 2x to 5x efficiency gains are likely to come from, especially as agentic workloads multiply demand.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GPUs get all the attention, but in inference, the real bottleneck is often memory, specifically the KV cache. In this episode of Pop Goes the Stack, Lori MacVittie sits down with Tim Michels to explain why inference stopped being stateless the moment long contexts, multi-turn conversations, and never-ending agents became normal. That state has to live somewhere, and too often it’s living in the most expensive place in the stack.</p><p><br></p><p>Tim breaks down what KV cache actually is by separating inference into its two phases: prefill, where prompts are tokenized and transformed into the internal structures the model needs, and decode, where the response is generated token by token. KV cache is the bridge between them, and keeping it available can skip expensive recomputation and drastically improve time to first token.</p><p><br></p><p>From there, the conversation moves into the architectural shift: building a memory hierarchy that offloads cache from GPU HBM to host DRAM, to local SSD, and even to network-attached storage. It’s slower than keeping everything on-GPU, but still faster than starting cold. They also cover semantic caching as an external shortcut, and why routing and load balancing need to become cache-aware, steering users back to the GPU or cluster that already holds their state.</p><p><br></p><p>The big takeaway for enterprises is practical: stop accepting “buy more GPUs” as the default plan. KV cache awareness, smarter routing, and storage/network tuning are where the next 2x to 5x efficiency gains are likely to come from, especially as agentic workloads multiply demand.</p>]]>
      </content:encoded>
      <pubDate>Tue, 05 May 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/7f0e9e41/fd1bf96a.mp3" length="30582460" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1269</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GPUs get all the attention, but in inference, the real bottleneck is often memory, specifically the KV cache. In this episode of Pop Goes the Stack, Lori MacVittie sits down with Tim Michels to explain why inference stopped being stateless the moment long contexts, multi-turn conversations, and never-ending agents became normal. That state has to live somewhere, and too often it’s living in the most expensive place in the stack.</p><p><br></p><p>Tim breaks down what KV cache actually is by separating inference into its two phases: prefill, where prompts are tokenized and transformed into the internal structures the model needs, and decode, where the response is generated token by token. KV cache is the bridge between them, and keeping it available can skip expensive recomputation and drastically improve time to first token.</p><p><br></p><p>From there, the conversation moves into the architectural shift: building a memory hierarchy that offloads cache from GPU HBM to host DRAM, to local SSD, and even to network-attached storage. It’s slower than keeping everything on-GPU, but still faster than starting cold. They also cover semantic caching as an external shortcut, and why routing and load balancing need to become cache-aware, steering users back to the GPU or cluster that already holds their state.</p><p><br></p><p>The big takeaway for enterprises is practical: stop accepting “buy more GPUs” as the default plan. KV cache awareness, smarter routing, and storage/network tuning are where the next 2x to 5x efficiency gains are likely to come from, especially as agentic workloads multiply demand.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, stateful inference, KV cache, KV cache offload, time to first token, prefill vs decode, distributed inference, AI inference, semantic caching, prompt caching, prompt routing, cache aware load balancing, optimize GPU utilization, inference infrastructure, GPU memory, memory hierarchy HBM DRAM SSD NAS, cache aware routing, agentic workload, NVIDIA NIXL, LLM inference bottleneck, recomputing cost, long context windows, sticky sessions for LLMs</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/tim-michels" img="https://img.transistorcdn.com/CY08rxgnWohc7hSD7kllAtvqskyaPYK6bpGLXeZOSV0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YzM2/MjI3ODNhN2ExYzcw/NTkwNmEwOTUzMTZl/NzYyMC5qcGc.jpg">Tim Michels</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/7f0e9e41/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/7f0e9e41/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Measuring what matters: Observability for agents</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Measuring what matters: Observability for agents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0393323a-69be-4854-92c6-94cded79c986</guid>
      <link>https://share.transistor.fm/s/79829e21</link>
      <description>
        <![CDATA[<p>Agents break the old rules of observability. Latency, throughput, and error rates still matter, but once software starts making decisions and taking actions on someone else’s behalf, the real question becomes: is it doing the right thing, and is it doing it for the right reasons?</p><p> </p><p>In this episode of Pop Goes the Stack, Lori MacVittie and Joel “OpenClaw” Moses are joined by observability expert Chris Hain to unpack what changes when systems become agentic. Instead of a single prompt-response interaction, you get decision chains that branch, loop, call tools, and evolve over time. A system can “succeed” operationally while still being wrong, expensive, or misaligned with intent.</p><p> </p><p>Chris argues you don’t have to throw away what already works. Distributed tracing still applies, but now each agent step becomes a span, decorated with richer metadata like model identity, tool calls, token usage, prompts, and cost. The discussion also dives into why standardization matters, including OpenTelemetry and emerging semantic conventions for generative and agentic AI, and why auto-instrumentation approaches like eBPF become critical when agents generate code that has no built-in telemetry.</p><p> </p><p>Joel adds a new set of metrics that feel uncomfortably necessary: decision loops per task, drift in tool-call chains, human override frequency, and the cost and token patterns that signal something has changed. The group also tackles the awkward feedback loop of using agents to make observability actionable, while acknowledging the risk of agents optimizing the dashboard instead of the system.</p><p> </p><p>If you’re building agentic workflows, this episode is a practical guide to why “failed successfully” is now a real production state, and why instrumenting for correctness and intent alignment is the next observability frontier.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Agents break the old rules of observability. Latency, throughput, and error rates still matter, but once software starts making decisions and taking actions on someone else’s behalf, the real question becomes: is it doing the right thing, and is it doing it for the right reasons?</p><p> </p><p>In this episode of Pop Goes the Stack, Lori MacVittie and Joel “OpenClaw” Moses are joined by observability expert Chris Hain to unpack what changes when systems become agentic. Instead of a single prompt-response interaction, you get decision chains that branch, loop, call tools, and evolve over time. A system can “succeed” operationally while still being wrong, expensive, or misaligned with intent.</p><p> </p><p>Chris argues you don’t have to throw away what already works. Distributed tracing still applies, but now each agent step becomes a span, decorated with richer metadata like model identity, tool calls, token usage, prompts, and cost. The discussion also dives into why standardization matters, including OpenTelemetry and emerging semantic conventions for generative and agentic AI, and why auto-instrumentation approaches like eBPF become critical when agents generate code that has no built-in telemetry.</p><p> </p><p>Joel adds a new set of metrics that feel uncomfortably necessary: decision loops per task, drift in tool-call chains, human override frequency, and the cost and token patterns that signal something has changed. The group also tackles the awkward feedback loop of using agents to make observability actionable, while acknowledging the risk of agents optimizing the dashboard instead of the system.</p><p> </p><p>If you’re building agentic workflows, this episode is a practical guide to why “failed successfully” is now a real production state, and why instrumenting for correctness and intent alignment is the next observability frontier.</p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Apr 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/79829e21/25123341.mp3" length="29522832" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1224</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Agents break the old rules of observability. Latency, throughput, and error rates still matter, but once software starts making decisions and taking actions on someone else’s behalf, the real question becomes: is it doing the right thing, and is it doing it for the right reasons?</p><p> </p><p>In this episode of Pop Goes the Stack, Lori MacVittie and Joel “OpenClaw” Moses are joined by observability expert Chris Hain to unpack what changes when systems become agentic. Instead of a single prompt-response interaction, you get decision chains that branch, loop, call tools, and evolve over time. A system can “succeed” operationally while still being wrong, expensive, or misaligned with intent.</p><p> </p><p>Chris argues you don’t have to throw away what already works. Distributed tracing still applies, but now each agent step becomes a span, decorated with richer metadata like model identity, tool calls, token usage, prompts, and cost. The discussion also dives into why standardization matters, including OpenTelemetry and emerging semantic conventions for generative and agentic AI, and why auto-instrumentation approaches like eBPF become critical when agents generate code that has no built-in telemetry.</p><p> </p><p>Joel adds a new set of metrics that feel uncomfortably necessary: decision loops per task, drift in tool-call chains, human override frequency, and the cost and token patterns that signal something has changed. The group also tackles the awkward feedback loop of using agents to make observability actionable, while acknowledging the risk of agents optimizing the dashboard instead of the system.</p><p> </p><p>If you’re building agentic workflows, this episode is a practical guide to why “failed successfully” is now a real production state, and why instrumenting for correctness and intent alignment is the next observability frontier.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI agent, OpenTelemetry semantic conventions, agentic AI observability, measuring AI agents, AI correctness metric, OpenTelemetry genAI, AI tracing spans, token usage tracking, cost per request AI, decision loops per task, human override rate, prompt and response logging, multimodal observability, eBPF for AI workload, auto instrumentation, agentic AI dashboard, AI cost drift detection, observability for autonomous systems, agentic workload</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/chris-hain" img="https://img.transistorcdn.com/P-5gK8O6DqMm-Iyyh-wWE7Jrr0qg2J86rdkFxS5rqzI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YzIz/YzFlZTM1YzU3ZjVi/YzRkODkxZDM2Nzcx/YmRhZi5qcGVn.jpg">Chris Hain</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/79829e21/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/79829e21/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Alien autopsy of LLMs: Constitutions, deception, guardrails</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Alien autopsy of LLMs: Constitutions, deception, guardrails</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d7bd9ef9-0993-44a5-a321-34df8b010414</guid>
      <link>https://share.transistor.fm/s/cddf1727</link>
      <description>
        <![CDATA[<p>Why do researchers keep describing large language models like aliens? Because in enterprise environments, they often behave like something we didn’t build and can’t fully explain. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses are joined by F5's Ken Arora to unpack the “alien autopsy” metaphor and what it reveals about operating LLMs as production systems.</p><p><br></p><p>They dig into the uncomfortable reality that traditional software offers a blueprint and a causal chain. LLMs don’t. You can probe them, measure them, and red-team them, but you can’t reliably point to a specific internal “part” that generated a decision. That becomes more than philosophical when you need operational answers like why it did something, whether it will repeat it, and how an attacker might steer it.</p><p><br></p><p>Ken reframes model evolution as moving from a naive, precocious child to a mischievous, goal-driven teenager, including examples where models appear to scheme around constraints or optimize for “keeping the user happy” over correctness. The group also breaks down constitutional AI and why principle-based “be helpful” guidance can collide with enterprise goals, policies, and risk tolerance, especially as agentic systems move from generating outputs to taking actions.</p><p><br></p><p>A key warning lands near the end: don’t rely on the model to explain itself. These systems can produce plausible narratives that aren’t verifiable, and may behave differently when they know they’re being evaluated. The practical takeaway is straightforward: treat LLMs as risk-managed systems, invest in observability and red teaming, and build defense-in-depth guardrails that assume the agent will try to bypass controls.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Why do researchers keep describing large language models like aliens? Because in enterprise environments, they often behave like something we didn’t build and can’t fully explain. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses are joined by F5's Ken Arora to unpack the “alien autopsy” metaphor and what it reveals about operating LLMs as production systems.</p><p><br></p><p>They dig into the uncomfortable reality that traditional software offers a blueprint and a causal chain. LLMs don’t. You can probe them, measure them, and red-team them, but you can’t reliably point to a specific internal “part” that generated a decision. That becomes more than philosophical when you need operational answers like why it did something, whether it will repeat it, and how an attacker might steer it.</p><p><br></p><p>Ken reframes model evolution as moving from a naive, precocious child to a mischievous, goal-driven teenager, including examples where models appear to scheme around constraints or optimize for “keeping the user happy” over correctness. The group also breaks down constitutional AI and why principle-based “be helpful” guidance can collide with enterprise goals, policies, and risk tolerance, especially as agentic systems move from generating outputs to taking actions.</p><p><br></p><p>A key warning lands near the end: don’t rely on the model to explain itself. These systems can produce plausible narratives that aren’t verifiable, and may behave differently when they know they’re being evaluated. The practical takeaway is straightforward: treat LLMs as risk-managed systems, invest in observability and red teaming, and build defense-in-depth guardrails that assume the agent will try to bypass controls.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/cddf1727/4102084a.mp3" length="30265823" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1254</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Why do researchers keep describing large language models like aliens? Because in enterprise environments, they often behave like something we didn’t build and can’t fully explain. In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses are joined by F5's Ken Arora to unpack the “alien autopsy” metaphor and what it reveals about operating LLMs as production systems.</p><p><br></p><p>They dig into the uncomfortable reality that traditional software offers a blueprint and a causal chain. LLMs don’t. You can probe them, measure them, and red-team them, but you can’t reliably point to a specific internal “part” that generated a decision. That becomes more than philosophical when you need operational answers like why it did something, whether it will repeat it, and how an attacker might steer it.</p><p><br></p><p>Ken reframes model evolution as moving from a naive, precocious child to a mischievous, goal-driven teenager, including examples where models appear to scheme around constraints or optimize for “keeping the user happy” over correctness. The group also breaks down constitutional AI and why principle-based “be helpful” guidance can collide with enterprise goals, policies, and risk tolerance, especially as agentic systems move from generating outputs to taking actions.</p><p><br></p><p>A key warning lands near the end: don’t rely on the model to explain itself. These systems can produce plausible narratives that aren’t verifiable, and may behave differently when they know they’re being evaluated. The practical takeaway is straightforward: treat LLMs as risk-managed systems, invest in observability and red teaming, and build defense-in-depth guardrails that assume the agent will try to bypass controls.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, LLM, black box AI, constitutional AI, system prompt, AI guardrails, AI optimization, AI red teaming, AI risk management, AI situational awareness, AI observability, large language model, Anthropic constitution, deceptive AI, enterprise AI risk management, secure AI deployment, LLM hallucinations, AI alignment, AI defense in depth, agentic AI security, autonomous agents risk, AI auditability, model governance, AI policy, unknown API exposure</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/ken-arora" img="https://img.transistorcdn.com/-BZXfCO8yAM9n1Gh_CBnMwdIinkJQpXAefBuWBFW4b4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDcx/ZWFhM2FlNmY0YjZm/NmJjOTUwYzhkOGYz/ODU5NC5qcGc.jpg">Ken Arora</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cddf1727/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/cddf1727/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Why Prompt Filters Fail Against LLM Attacks</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Why Prompt Filters Fail Against LLM Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">99da4080-8a7c-42a1-b558-eb079644027b</guid>
      <link>https://share.transistor.fm/s/314f47fd</link>
      <description>
        <![CDATA[<p>Prompt injection has been the headline security problem for the last year, but have we been guarding the wrong layer? Lori MacVittie is joined by cohost Joel Moses and architect Elijah Zupancic to break down why many “prompt filters” miss the real execution surface: models don’t process words, they process tokens, and attackers are increasingly targeting the tokenizer to bypass defenses.</p><p><br></p><p>Using the research behind Adversarial Tokenization and TokenBreak, they explain how the same text can be segmented into different token paths, changing what the model actually “sees” and how it behaves. That creates a split-brain security challenge across text, tokens, and state, where protecting only the natural-language layer leaves multiple routes around your guardrails. TokenBreak, in particular, highlights how attackers can brute-force and classify responses to infer tokenization behavior, turning the model into its own oracle.</p><p><br></p><p>So how can you protect models? Hear why a layered security is the only viable approach: narrowing accepted input surfaces, adding language detection to reduce the search space, limiting automation and abuse patterns, and moving toward token-aware inspection and policy enforcement at the tokenizer boundary. But their are tradeoffs when guardrails sit outside the model.</p><p><br></p><p>Tune in to make sure you’re not already downstream of the attack and what you can do about it if you are.</p><p>Read <em>Adversarial Tokenization</em> → <a href="https://arxiv.org/abs/2503.02174">https://arxiv.org/abs/2503.02174</a></p><p>Read <em>TokenBreak: Bypassing Text Classification Models Through Token Manipulation</em> → <a href="https://arxiv.org/abs/2506.07948">https://arxiv.org/abs/2506.07948</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Prompt injection has been the headline security problem for the last year, but have we been guarding the wrong layer? Lori MacVittie is joined by cohost Joel Moses and architect Elijah Zupancic to break down why many “prompt filters” miss the real execution surface: models don’t process words, they process tokens, and attackers are increasingly targeting the tokenizer to bypass defenses.</p><p><br></p><p>Using the research behind Adversarial Tokenization and TokenBreak, they explain how the same text can be segmented into different token paths, changing what the model actually “sees” and how it behaves. That creates a split-brain security challenge across text, tokens, and state, where protecting only the natural-language layer leaves multiple routes around your guardrails. TokenBreak, in particular, highlights how attackers can brute-force and classify responses to infer tokenization behavior, turning the model into its own oracle.</p><p><br></p><p>So how can you protect models? Hear why a layered security is the only viable approach: narrowing accepted input surfaces, adding language detection to reduce the search space, limiting automation and abuse patterns, and moving toward token-aware inspection and policy enforcement at the tokenizer boundary. But their are tradeoffs when guardrails sit outside the model.</p><p><br></p><p>Tune in to make sure you’re not already downstream of the attack and what you can do about it if you are.</p><p>Read <em>Adversarial Tokenization</em> → <a href="https://arxiv.org/abs/2503.02174">https://arxiv.org/abs/2503.02174</a></p><p>Read <em>TokenBreak: Bypassing Text Classification Models Through Token Manipulation</em> → <a href="https://arxiv.org/abs/2506.07948">https://arxiv.org/abs/2506.07948</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Apr 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/314f47fd/29facc25.mp3" length="31967040" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1325</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Prompt injection has been the headline security problem for the last year, but have we been guarding the wrong layer? Lori MacVittie is joined by cohost Joel Moses and architect Elijah Zupancic to break down why many “prompt filters” miss the real execution surface: models don’t process words, they process tokens, and attackers are increasingly targeting the tokenizer to bypass defenses.</p><p><br></p><p>Using the research behind Adversarial Tokenization and TokenBreak, they explain how the same text can be segmented into different token paths, changing what the model actually “sees” and how it behaves. That creates a split-brain security challenge across text, tokens, and state, where protecting only the natural-language layer leaves multiple routes around your guardrails. TokenBreak, in particular, highlights how attackers can brute-force and classify responses to infer tokenization behavior, turning the model into its own oracle.</p><p><br></p><p>So how can you protect models? Hear why a layered security is the only viable approach: narrowing accepted input surfaces, adding language detection to reduce the search space, limiting automation and abuse patterns, and moving toward token-aware inspection and policy enforcement at the tokenizer boundary. But their are tradeoffs when guardrails sit outside the model.</p><p><br></p><p>Tune in to make sure you’re not already downstream of the attack and what you can do about it if you are.</p><p>Read <em>Adversarial Tokenization</em> → <a href="https://arxiv.org/abs/2503.02174">https://arxiv.org/abs/2503.02174</a></p><p>Read <em>TokenBreak: Bypassing Text Classification Models Through Token Manipulation</em> → <a href="https://arxiv.org/abs/2506.07948">https://arxiv.org/abs/2506.07948</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, tokenization attack, adversarial tokenization, TokenBreak, prompt injection bypass, token aware guardrails, LLM security, LLM guardrail, token stream validation, cryptographic signing, logits access risk, open source LLM security, HTTP smuggling, input validation for LLMs, prompt stuffing, layered defense, AI output validation, LLM jailbreak mitigation, tokenizer security, token path, AI guardrail, tokenization behavior, language detection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/elijah-zupancic" img="https://img.transistorcdn.com/pGF39sjRvBRKma3ctQt3BHjhtNBFPvD0zSMIPiyXGBw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMjdm/MzYxMjYwZWEzOWEz/MDk1OWZkODEzZmQz/MTY2NC5qcGVn.jpg">Elijah Zupancic</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/314f47fd/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/314f47fd/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>OpenClaw: Multi-agent autonomy, secrets, and blast radius</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>OpenClaw: Multi-agent autonomy, secrets, and blast radius</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">81bff3b5-d0c4-446f-ae41-61794c3d10d9</guid>
      <link>https://share.transistor.fm/s/f5a4ed4a</link>
      <description>
        <![CDATA[<p>OpenClaw is what happens when the industry looks at autonomous agents and decides they should have more autonomy, more persistence, and more chances to surprise you. In this episode of Pop Goes the Stack, Lori MacVittie hosts a wide-ranging discussion with F5's Joel Moses, Jason Rahm, and Kunal Anand on what makes OpenClaw different from the usual “AI assistant” narrative: agents that coordinate, remember, adapt, and operate in shared spaces where emergent behavior is a feature, not a bug.</p><p>Joel shares a grounded example of using OpenClaw locally for home automation, keeping the blast radius contained while still seeing the upside of continuous, autonomous decision-making. From there, the group digs into what breaks when you move this model toward enterprise operations: persistence of secrets, unclear approval workflows, weak auditability, limited rollback, and the sheer difficulty of diagnosing why an agent took an action after weeks of chained decisions.</p><p>Kunal expands the conversation to the ecosystem forming around OpenClaw, including experimental offshoots and the uncomfortable reality that “just read the code” doesn’t scale when modern projects are moving at AI-assisted commit velocity. Jason adds a longer lens, drawing a parallel to Ray Bradbury’s "There Will Come Soft Rains" as a reminder that autonomous systems can keep running even when humans stop being in the loop, raising questions beyond tech into how we relate to each other.</p><p>Tune in for the groups practical takeaways as this technology makes it's way toward the enterprise.</p><p>Read Kunal's blog diving into mechanistic interpretability: <a href="https://kunalanand.com/2026-03-19-your-token-is-a-wonderland/">https://kunalanand.com/2026-03-19-your-token-is-a-wonderland/</a></p><p> </p><p>Read "There Will Come Soft Rains" by Ray Bradbury: <a href="https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf">https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf</a></p><p><br>Recorded March 2nd, 2026</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>OpenClaw is what happens when the industry looks at autonomous agents and decides they should have more autonomy, more persistence, and more chances to surprise you. In this episode of Pop Goes the Stack, Lori MacVittie hosts a wide-ranging discussion with F5's Joel Moses, Jason Rahm, and Kunal Anand on what makes OpenClaw different from the usual “AI assistant” narrative: agents that coordinate, remember, adapt, and operate in shared spaces where emergent behavior is a feature, not a bug.</p><p>Joel shares a grounded example of using OpenClaw locally for home automation, keeping the blast radius contained while still seeing the upside of continuous, autonomous decision-making. From there, the group digs into what breaks when you move this model toward enterprise operations: persistence of secrets, unclear approval workflows, weak auditability, limited rollback, and the sheer difficulty of diagnosing why an agent took an action after weeks of chained decisions.</p><p>Kunal expands the conversation to the ecosystem forming around OpenClaw, including experimental offshoots and the uncomfortable reality that “just read the code” doesn’t scale when modern projects are moving at AI-assisted commit velocity. Jason adds a longer lens, drawing a parallel to Ray Bradbury’s "There Will Come Soft Rains" as a reminder that autonomous systems can keep running even when humans stop being in the loop, raising questions beyond tech into how we relate to each other.</p><p>Tune in for the groups practical takeaways as this technology makes it's way toward the enterprise.</p><p>Read Kunal's blog diving into mechanistic interpretability: <a href="https://kunalanand.com/2026-03-19-your-token-is-a-wonderland/">https://kunalanand.com/2026-03-19-your-token-is-a-wonderland/</a></p><p> </p><p>Read "There Will Come Soft Rains" by Ray Bradbury: <a href="https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf">https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf</a></p><p><br>Recorded March 2nd, 2026</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Apr 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/f5a4ed4a/66531a9d.mp3" length="38737734" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1594</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>OpenClaw is what happens when the industry looks at autonomous agents and decides they should have more autonomy, more persistence, and more chances to surprise you. In this episode of Pop Goes the Stack, Lori MacVittie hosts a wide-ranging discussion with F5's Joel Moses, Jason Rahm, and Kunal Anand on what makes OpenClaw different from the usual “AI assistant” narrative: agents that coordinate, remember, adapt, and operate in shared spaces where emergent behavior is a feature, not a bug.</p><p>Joel shares a grounded example of using OpenClaw locally for home automation, keeping the blast radius contained while still seeing the upside of continuous, autonomous decision-making. From there, the group digs into what breaks when you move this model toward enterprise operations: persistence of secrets, unclear approval workflows, weak auditability, limited rollback, and the sheer difficulty of diagnosing why an agent took an action after weeks of chained decisions.</p><p>Kunal expands the conversation to the ecosystem forming around OpenClaw, including experimental offshoots and the uncomfortable reality that “just read the code” doesn’t scale when modern projects are moving at AI-assisted commit velocity. Jason adds a longer lens, drawing a parallel to Ray Bradbury’s "There Will Come Soft Rains" as a reminder that autonomous systems can keep running even when humans stop being in the loop, raising questions beyond tech into how we relate to each other.</p><p>Tune in for the groups practical takeaways as this technology makes it's way toward the enterprise.</p><p>Read Kunal's blog diving into mechanistic interpretability: <a href="https://kunalanand.com/2026-03-19-your-token-is-a-wonderland/">https://kunalanand.com/2026-03-19-your-token-is-a-wonderland/</a></p><p> </p><p>Read "There Will Come Soft Rains" by Ray Bradbury: <a href="https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf">https://www.btboces.org/Downloads/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf</a></p><p><br>Recorded March 2nd, 2026</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, OpenClaw, ClawdBot, MoltBook, agentic AI, autonomous agents, mechanistic interpretability, agent governance, NetClaw, data leakage risk, secrets sprawl, emergent behavior, home automation AI agent, PicoClaw, NullClaw, Zig, BGP, multi-agent coordination, secrets management for agents, API key leakage, AI agent security, audit logging for agents, AI blast radius, agent control plane, shared memory agents, agent persistence, approval workflows</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/kunal-anand" img="https://img.transistorcdn.com/toRpwzZF8dlxiNZRheTza1k_O2o4Ow_y-7RaqLNTcXE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTQw/ZmViYWZkMGYzMGFk/MDcyYjU2OGY4MWM3/ZjMyNC5qcGVn.jpg">Kunal Anand</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://community.f5.com/users/jrahm/51154" img="https://img.transistorcdn.com/HEnMXtK0g1gIBFMuOsYIPkLO5CObM8_g0kzdJx-SESk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYjJi/ZGRjNWUyMWQwMzI4/OTM2YjViYzdkZDQ5/MzNjZS5qcGVn.jpg">Jason Rahm</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f5a4ed4a/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/f5a4ed4a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>CISO Hot Takes on MCP, PQC, and Data Center Attacks</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>CISO Hot Takes on MCP, PQC, and Data Center Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e22375d-2ebf-444b-bf93-48f26a22c7a6</guid>
      <link>https://share.transistor.fm/s/1c65068c</link>
      <description>
        <![CDATA[<p>Recorded live at F5 AppWorld 2026 in Las Vegas, this episode of Pop Goes the Stack puts Field CISO Chuck Herrin in the hot seat for a fast-moving conversation on what security leaders are really dealing with right now. Joel Moses kicks things off with the agentic AI debate: if teams bypass structured tool interfaces and let agents “just use the CLI,” what happens to authentication, observability, and predictability when autonomy accelerates faster than humans can keep up?</p><p><br></p><p>From there, Chuck makes the case that fear is a poor long-term strategy for running a business, even when the threats are real. He unpacks the tension he’s seeing across organizations, where executives are driven by FOMO while employees wrestle with FOBO (fear of becoming obsolete), and argues that companies get results when they redesign how they operate rather than bolting AI onto old structures.</p><p><br></p><p>The conversation shifts to post-quantum cryptography and why it still isn’t getting the attention it deserves. Chuck explains how “future tech” framing, short CISO tenures, and the pressure of today’s fires keep PQC from becoming a priority, even as harvest-now-decrypt-later attacks make it a present-day risk. His advice is practical: assign clear ownership, treat the effort like business continuity planning, and include your supply chain in the readiness scope.</p><p><br></p><p>Finally, they touch on a new class of concern for CISOs: kinetic targeting of data center infrastructure, and how sovereignty requirements can constrain options when physical risk rises. If you’re navigating AI adoption, cryptographic transition, or resilience planning, tune in for a grounded perspective from the show floor.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Recorded live at F5 AppWorld 2026 in Las Vegas, this episode of Pop Goes the Stack puts Field CISO Chuck Herrin in the hot seat for a fast-moving conversation on what security leaders are really dealing with right now. Joel Moses kicks things off with the agentic AI debate: if teams bypass structured tool interfaces and let agents “just use the CLI,” what happens to authentication, observability, and predictability when autonomy accelerates faster than humans can keep up?</p><p><br></p><p>From there, Chuck makes the case that fear is a poor long-term strategy for running a business, even when the threats are real. He unpacks the tension he’s seeing across organizations, where executives are driven by FOMO while employees wrestle with FOBO (fear of becoming obsolete), and argues that companies get results when they redesign how they operate rather than bolting AI onto old structures.</p><p><br></p><p>The conversation shifts to post-quantum cryptography and why it still isn’t getting the attention it deserves. Chuck explains how “future tech” framing, short CISO tenures, and the pressure of today’s fires keep PQC from becoming a priority, even as harvest-now-decrypt-later attacks make it a present-day risk. His advice is practical: assign clear ownership, treat the effort like business continuity planning, and include your supply chain in the readiness scope.</p><p><br></p><p>Finally, they touch on a new class of concern for CISOs: kinetic targeting of data center infrastructure, and how sovereignty requirements can constrain options when physical risk rises. If you’re navigating AI adoption, cryptographic transition, or resilience planning, tune in for a grounded perspective from the show floor.</p>]]>
      </content:encoded>
      <pubDate>Tue, 31 Mar 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/1c65068c/b0fede04.mp3" length="25069967" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1020</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Recorded live at F5 AppWorld 2026 in Las Vegas, this episode of Pop Goes the Stack puts Field CISO Chuck Herrin in the hot seat for a fast-moving conversation on what security leaders are really dealing with right now. Joel Moses kicks things off with the agentic AI debate: if teams bypass structured tool interfaces and let agents “just use the CLI,” what happens to authentication, observability, and predictability when autonomy accelerates faster than humans can keep up?</p><p><br></p><p>From there, Chuck makes the case that fear is a poor long-term strategy for running a business, even when the threats are real. He unpacks the tension he’s seeing across organizations, where executives are driven by FOMO while employees wrestle with FOBO (fear of becoming obsolete), and argues that companies get results when they redesign how they operate rather than bolting AI onto old structures.</p><p><br></p><p>The conversation shifts to post-quantum cryptography and why it still isn’t getting the attention it deserves. Chuck explains how “future tech” framing, short CISO tenures, and the pressure of today’s fires keep PQC from becoming a priority, even as harvest-now-decrypt-later attacks make it a present-day risk. His advice is practical: assign clear ownership, treat the effort like business continuity planning, and include your supply chain in the readiness scope.</p><p><br></p><p>Finally, they touch on a new class of concern for CISOs: kinetic targeting of data center infrastructure, and how sovereignty requirements can constrain options when physical risk rises. If you’re navigating AI adoption, cryptographic transition, or resilience planning, tune in for a grounded perspective from the show floor.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, MCP, agentic AI security, AI agent risk, security, CLI, CISO, AI governance, AI layoffs, post-quantum cryptography, PQC readiness, harvest now decrypt later, Q-day, cryptographic asset management, business continuity planning, BCP, disaster recovery, supply chain security, IoT OT upgrade path, kinetic attacks on data centers, data sovereignty risk, fully homomorphic encryption, reduce attack surface, tech debt, AppWorld 2026, agent autonomy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/chuck-herrin" img="https://img.transistorcdn.com/TaAJ0XDnFYOj9sEg65ecSra-_GgX8hfs1fZaHK3KRHQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MmQw/MGIwNjdhMTRiNTcw/YTFlNDEzMzJiNGQ3/MmI3Mi5qcGVn.jpg">Chuck Herrin</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1c65068c/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/1c65068c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Red Teaming in Practice: Scores, guardrails, auto-remediation</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>AI Red Teaming in Practice: Scores, guardrails, auto-remediation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bbec88f1-7ba8-4d66-bcef-cc96ab7d809c</guid>
      <link>https://share.transistor.fm/s/42d65628</link>
      <description>
        <![CDATA[<p>AI in production isn’t just another feature to ship. It’s a non-deterministic system that can be socially engineered, fuzzed, and pushed into failure states you won’t find with traditional testing. Recorded live in Las Vegas at F5’s AppWorld 2026, this episode of Pop Goes the Stack brings Joel Moses together with Jimmy White, F5’s VP of AI Security (via the CalypsoAI acquisition), for a practical look at what AI red teaming actually is and how it works when the attacker is an agent.</p><p> </p><p>Jimmy reframes genAI security as a permutation problem: if there are countless prompt combinations that could unlock sensitive data or trigger unsafe actions, you need genAI-powered red team agents to explore those paths at scale. The discussion covers custom intents, agentic “fingerprints” that reveal not just what was compromised but how it happened, and why that “how” is the key to building protections you can trust.</p><p> </p><p>You’ll also hear how scoring and reporting translate into guardrails, how auto-remediation can be validated with positive and negative test cases before a human publishes changes, and why relying on models to internalize safety isn’t a realistic plan. The conversation closes on agentic AI risk, where tools and permissions matter more than the model’s reasoning, and introduces “thought injection” as a way to redirect unsafe actions without breaking the agent loop.</p><p>If you’re building AI apps, deploying MCP-connected systems, or worrying about agents becoming tomorrow’s service accounts, this episode gives you a sharper playbook for testing, governance, and resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI in production isn’t just another feature to ship. It’s a non-deterministic system that can be socially engineered, fuzzed, and pushed into failure states you won’t find with traditional testing. Recorded live in Las Vegas at F5’s AppWorld 2026, this episode of Pop Goes the Stack brings Joel Moses together with Jimmy White, F5’s VP of AI Security (via the CalypsoAI acquisition), for a practical look at what AI red teaming actually is and how it works when the attacker is an agent.</p><p> </p><p>Jimmy reframes genAI security as a permutation problem: if there are countless prompt combinations that could unlock sensitive data or trigger unsafe actions, you need genAI-powered red team agents to explore those paths at scale. The discussion covers custom intents, agentic “fingerprints” that reveal not just what was compromised but how it happened, and why that “how” is the key to building protections you can trust.</p><p> </p><p>You’ll also hear how scoring and reporting translate into guardrails, how auto-remediation can be validated with positive and negative test cases before a human publishes changes, and why relying on models to internalize safety isn’t a realistic plan. The conversation closes on agentic AI risk, where tools and permissions matter more than the model’s reasoning, and introduces “thought injection” as a way to redirect unsafe actions without breaking the agent loop.</p><p>If you’re building AI apps, deploying MCP-connected systems, or worrying about agents becoming tomorrow’s service accounts, this episode gives you a sharper playbook for testing, governance, and resilience.</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Mar 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/42d65628/a6fceddf.mp3" length="39206122" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1608</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>AI in production isn’t just another feature to ship. It’s a non-deterministic system that can be socially engineered, fuzzed, and pushed into failure states you won’t find with traditional testing. Recorded live in Las Vegas at F5’s AppWorld 2026, this episode of Pop Goes the Stack brings Joel Moses together with Jimmy White, F5’s VP of AI Security (via the CalypsoAI acquisition), for a practical look at what AI red teaming actually is and how it works when the attacker is an agent.</p><p> </p><p>Jimmy reframes genAI security as a permutation problem: if there are countless prompt combinations that could unlock sensitive data or trigger unsafe actions, you need genAI-powered red team agents to explore those paths at scale. The discussion covers custom intents, agentic “fingerprints” that reveal not just what was compromised but how it happened, and why that “how” is the key to building protections you can trust.</p><p> </p><p>You’ll also hear how scoring and reporting translate into guardrails, how auto-remediation can be validated with positive and negative test cases before a human publishes changes, and why relying on models to internalize safety isn’t a realistic plan. The conversation closes on agentic AI risk, where tools and permissions matter more than the model’s reasoning, and introduces “thought injection” as a way to redirect unsafe actions without breaking the agent loop.</p><p>If you’re building AI apps, deploying MCP-connected systems, or worrying about agents becoming tomorrow’s service accounts, this episode gives you a sharper playbook for testing, governance, and resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI red teaming, LLM red team, genAI security testing, prompt injection testing, adversarial prompts, AI guardrails, CalypsoAI, agentic AI security, MCP security risk, Confluence data leak, SQL agent attacks, LLM as a judge, automated red team agents, agentic fingerprints, CASI score, ARS score, agentic resiliency, zero day prompt attacks, AI policy enforcement, auto remediation guardrails, thought injection, AI safety in production, SDLC,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/jimmy-white" img="https://img.transistorcdn.com/HsxRvPkjbVYqVvOKbhLWopT_Q9xQXHWSsD_HyYFiyPA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTli/NDcyZGEzN2QzYTU1/MTIyMmE3MWI5MTgz/YWI5Yi5KUEc.jpg">Jimmy White</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/42d65628/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/42d65628/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Agent Identity Crisis: Access, audit, and “soul.md”</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Agent Identity Crisis: Access, audit, and “soul.md”</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">117ff24d-12d6-43e5-849d-9d9d68fc53a9</guid>
      <link>https://share.transistor.fm/s/1e9e84f6</link>
      <description>
        <![CDATA[<p>Coming to you from the AppWorld show floor, Joel Moses and guest co-pilot Oscar Spencer cut through the conference polish to tackle a problem that’s quickly becoming unavoidable: identity in the era of agentic AI. When software can act on your behalf, take initiative, and even spawn other agents, “who did what” stops being a philosophical question and becomes an audit, security, and governance requirement.</p><p><br></p><p>Joined by F5's Chief Product Officer, Kunal Anand, the conversation digs into why traditional, point-in-time authentication and authorization models don’t map cleanly to agents that operate over time, across contexts, and through chains of delegation. They explore the risks of transitive identity, the expanding blast radius when Agent A creates Agents B and C, and the uncomfortable reality that agents can end up holding the same kinds of long-lived secrets that have historically caused production incidents.</p><p><br></p><p>Along the way, they discuss emerging ideas like soul.md files that define an agent’s purpose and constraints, and the concept of a dedicated “credential agent” that acts as a gatekeeper for secrets access. The episode also gets practical about what breaks in the real world, including a cautionary story about an agent corrupting a long-running notes database, underscoring why backups, guardrails, and careful rollout matter.</p><p><br></p><p>If you’re building or adopting agents, this is a timely look at why identity can’t stay static, why service-account thinking is coming for every agent, and what it will take to keep autonomy from turning into the next incident report.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Coming to you from the AppWorld show floor, Joel Moses and guest co-pilot Oscar Spencer cut through the conference polish to tackle a problem that’s quickly becoming unavoidable: identity in the era of agentic AI. When software can act on your behalf, take initiative, and even spawn other agents, “who did what” stops being a philosophical question and becomes an audit, security, and governance requirement.</p><p><br></p><p>Joined by F5's Chief Product Officer, Kunal Anand, the conversation digs into why traditional, point-in-time authentication and authorization models don’t map cleanly to agents that operate over time, across contexts, and through chains of delegation. They explore the risks of transitive identity, the expanding blast radius when Agent A creates Agents B and C, and the uncomfortable reality that agents can end up holding the same kinds of long-lived secrets that have historically caused production incidents.</p><p><br></p><p>Along the way, they discuss emerging ideas like soul.md files that define an agent’s purpose and constraints, and the concept of a dedicated “credential agent” that acts as a gatekeeper for secrets access. The episode also gets practical about what breaks in the real world, including a cautionary story about an agent corrupting a long-running notes database, underscoring why backups, guardrails, and careful rollout matter.</p><p><br></p><p>If you’re building or adopting agents, this is a timely look at why identity can’t stay static, why service-account thinking is coming for every agent, and what it will take to keep autonomy from turning into the next incident report.</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Mar 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/1e9e84f6/3a13c5e3.mp3" length="31251511" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1233</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Coming to you from the AppWorld show floor, Joel Moses and guest co-pilot Oscar Spencer cut through the conference polish to tackle a problem that’s quickly becoming unavoidable: identity in the era of agentic AI. When software can act on your behalf, take initiative, and even spawn other agents, “who did what” stops being a philosophical question and becomes an audit, security, and governance requirement.</p><p><br></p><p>Joined by F5's Chief Product Officer, Kunal Anand, the conversation digs into why traditional, point-in-time authentication and authorization models don’t map cleanly to agents that operate over time, across contexts, and through chains of delegation. They explore the risks of transitive identity, the expanding blast radius when Agent A creates Agents B and C, and the uncomfortable reality that agents can end up holding the same kinds of long-lived secrets that have historically caused production incidents.</p><p><br></p><p>Along the way, they discuss emerging ideas like soul.md files that define an agent’s purpose and constraints, and the concept of a dedicated “credential agent” that acts as a gatekeeper for secrets access. The episode also gets practical about what breaks in the real world, including a cautionary story about an agent corrupting a long-running notes database, underscoring why backups, guardrails, and careful rollout matter.</p><p><br></p><p>If you’re building or adopting agents, this is a timely look at why identity can’t stay static, why service-account thinking is coming for every agent, and what it will take to keep autonomy from turning into the next incident report.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, agent identity, AI agent access control, agentic AI security, identity in AI era, audit logs for agents, transitive identity, on-behalf-of identity, OAuth limitations, SAML limitations, SPIFFE, SPIRE, soul.md, agent.md, OpenClaw, Claude Cowork, credential agent, secrets management for agents, least privilege, context-aware authorization, AppWorld, service accounts risk, AI governance, agent purpose, purpose protocol, agent chains, AI agent</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/kunal-anand" img="https://img.transistorcdn.com/toRpwzZF8dlxiNZRheTza1k_O2o4Ow_y-7RaqLNTcXE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTQw/ZmViYWZkMGYzMGFk/MDcyYjU2OGY4MWM3/ZjMyNC5qcGVn.jpg">Kunal Anand</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/oscar-spencer" img="https://img.transistorcdn.com/Cy2y9zSxfGYuw6dU1AIM6n2T2FKV2oq6YZrhGpdupIE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jN2Jj/MGIwMjY4MDc1OThj/OWI2NzZkYjgzOWU2/OTZiZi5wbmc.jpg">Oscar Spencer</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1e9e84f6/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/1e9e84f6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>VibeOps: Guardrailed agents for deterministic production</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>VibeOps: Guardrailed agents for deterministic production</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">acaf42e4-f8bd-46b5-8771-df74885ebcc5</guid>
      <link>https://share.transistor.fm/s/a2f53029</link>
      <description>
        <![CDATA[<p>Ops used to be a world of YAML, caffeine, and careful deploy rituals. Now it’s probabilistic models, token-based cost surprises, and reliability questions that sound more like, “Will the model mean the same thing tomorrow?” In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses dig into what happens when production expectations collide with non-deterministic AI systems, and why the next phase of automation needs more than a chat interface and optimism.</p><p> </p><p>They’re joined by John Capobianco from Itential to explore “VibeOps,” an approach to conversational operations that doesn’t throw away deterministic workflows, but connects them to agent reasoning, tool calling, and modern protocols like MCP. The discussion breaks down agent “skills” as a way to describe what an agent can do, constrain what it can’t, and build guardrails in a format teams can manage.</p><p> </p><p>From red-teaming experiments to real-world concerns about failure rates at scale, the conversation stays grounded in what it takes to make AI useful in production: external knowledge, policy alignment, composable skills, and a maturity path from lab-only to read-only to supervised execution, and only then toward autonomy. The takeaway is clear: conversational ops can accelerate work, improve documentation and ticket quality, and reduce toil, but governance and accountability still matter. If you’re navigating AIOps, agent adoption, or the post-MCP tooling wave, this episode offers a realistic starting point.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ops used to be a world of YAML, caffeine, and careful deploy rituals. Now it’s probabilistic models, token-based cost surprises, and reliability questions that sound more like, “Will the model mean the same thing tomorrow?” In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses dig into what happens when production expectations collide with non-deterministic AI systems, and why the next phase of automation needs more than a chat interface and optimism.</p><p> </p><p>They’re joined by John Capobianco from Itential to explore “VibeOps,” an approach to conversational operations that doesn’t throw away deterministic workflows, but connects them to agent reasoning, tool calling, and modern protocols like MCP. The discussion breaks down agent “skills” as a way to describe what an agent can do, constrain what it can’t, and build guardrails in a format teams can manage.</p><p> </p><p>From red-teaming experiments to real-world concerns about failure rates at scale, the conversation stays grounded in what it takes to make AI useful in production: external knowledge, policy alignment, composable skills, and a maturity path from lab-only to read-only to supervised execution, and only then toward autonomy. The takeaway is clear: conversational ops can accelerate work, improve documentation and ticket quality, and reduce toil, but governance and accountability still matter. If you’re navigating AIOps, agent adoption, or the post-MCP tooling wave, this episode offers a realistic starting point.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2026 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/a2f53029/ebbb1e41.mp3" length="36705802" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1516</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ops used to be a world of YAML, caffeine, and careful deploy rituals. Now it’s probabilistic models, token-based cost surprises, and reliability questions that sound more like, “Will the model mean the same thing tomorrow?” In this episode of Pop Goes the Stack, Lori MacVittie and Joel Moses dig into what happens when production expectations collide with non-deterministic AI systems, and why the next phase of automation needs more than a chat interface and optimism.</p><p> </p><p>They’re joined by John Capobianco from Itential to explore “VibeOps,” an approach to conversational operations that doesn’t throw away deterministic workflows, but connects them to agent reasoning, tool calling, and modern protocols like MCP. The discussion breaks down agent “skills” as a way to describe what an agent can do, constrain what it can’t, and build guardrails in a format teams can manage.</p><p> </p><p>From red-teaming experiments to real-world concerns about failure rates at scale, the conversation stays grounded in what it takes to make AI useful in production: external knowledge, policy alignment, composable skills, and a maturity path from lab-only to read-only to supervised execution, and only then toward autonomy. The takeaway is clear: conversational ops can accelerate work, improve documentation and ticket quality, and reduce toil, but governance and accountability still matter. If you’re navigating AIOps, agent adoption, or the post-MCP tooling wave, this episode offers a realistic starting point.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, VibeOps, agentic ops, AIOps, conversational operations, MCP protocol, Model Context Protocol, Itential, deterministic workflows, probabilistic AI risk, production guardrails, human in the loop, human on the loop, agent skills, RAG, MCP, YAML, agents governance, network automation agents, LangChain, LangGraph, agent development kit, NetDevOps, deterministic production, AI agent, non-deterministic AI, AI governance, agent adoption, agentic AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://www.itential.com/" img="https://img.transistorcdn.com/aaUWJu2IK5m6NMUf7MiaJ103-nkHWt3wGNRoAJX_hf8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNWUz/NmZlNTkyMzYyOTVh/YzkzNTc5OGJiODU1/MjBlMy5wbmc.jpg">John Capobianco</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a2f53029/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/a2f53029/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>WebAssembly: A programmability paradigm shift</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>WebAssembly: A programmability paradigm shift</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d124e833-322f-40e8-8309-ac4f5ed2b681</guid>
      <link>https://share.transistor.fm/s/d7f88e95</link>
      <description>
        <![CDATA[<p>Programmability is experiencing a paradigm shift, and this episode explains why WebAssembly is at the center of it. F5's Lori MacVittie and Joel Moses are joined by WebAssembly expert Oscar Spencer, a longtime contributor in the space and a leader within the Bytecode Alliance, to unpack how Wasm moved from “that browser thing” to a practical foundation for modern platforms.</p><p><br></p><p>They break down what makes WebAssembly different: a secure sandbox designed for hostile environments, portable logic that can travel across architectures, and language flexibility that doesn’t force teams into obscure, proprietary scripting. The conversation also gets into why Wasm’s small footprint matters, from faster deployment to easier distribution at the edge, and how streaming compilation helps code start running quickly.</p><p><br></p><p>The most timely thread is the collision between AI-driven operations and runtime safety. As agents generate more code and policies need to adapt in real time, the risk shifts from writing logic to safely executing it. Oscar makes the case that capabilities-based security and fine-grained controls can turn WebAssembly into a “blast chamber” for AI-generated code, reducing the chances that a hallucination becomes a production outage.</p><p><br></p><p>If you’re thinking about plug-in architectures, safer customization, or how to scale dynamic behavior without scaling risk, this episode is your starting point.</p><p>Check out WebAssembly Unleashed: <a href="https://www.youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj">https://www.youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Programmability is experiencing a paradigm shift, and this episode explains why WebAssembly is at the center of it. F5's Lori MacVittie and Joel Moses are joined by WebAssembly expert Oscar Spencer, a longtime contributor in the space and a leader within the Bytecode Alliance, to unpack how Wasm moved from “that browser thing” to a practical foundation for modern platforms.</p><p><br></p><p>They break down what makes WebAssembly different: a secure sandbox designed for hostile environments, portable logic that can travel across architectures, and language flexibility that doesn’t force teams into obscure, proprietary scripting. The conversation also gets into why Wasm’s small footprint matters, from faster deployment to easier distribution at the edge, and how streaming compilation helps code start running quickly.</p><p><br></p><p>The most timely thread is the collision between AI-driven operations and runtime safety. As agents generate more code and policies need to adapt in real time, the risk shifts from writing logic to safely executing it. Oscar makes the case that capabilities-based security and fine-grained controls can turn WebAssembly into a “blast chamber” for AI-generated code, reducing the chances that a hallucination becomes a production outage.</p><p><br></p><p>If you’re thinking about plug-in architectures, safer customization, or how to scale dynamic behavior without scaling risk, this episode is your starting point.</p><p>Check out WebAssembly Unleashed: <a href="https://www.youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj">https://www.youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Mar 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/d7f88e95/a323c9d2.mp3" length="31455371" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1296</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Programmability is experiencing a paradigm shift, and this episode explains why WebAssembly is at the center of it. F5's Lori MacVittie and Joel Moses are joined by WebAssembly expert Oscar Spencer, a longtime contributor in the space and a leader within the Bytecode Alliance, to unpack how Wasm moved from “that browser thing” to a practical foundation for modern platforms.</p><p><br></p><p>They break down what makes WebAssembly different: a secure sandbox designed for hostile environments, portable logic that can travel across architectures, and language flexibility that doesn’t force teams into obscure, proprietary scripting. The conversation also gets into why Wasm’s small footprint matters, from faster deployment to easier distribution at the edge, and how streaming compilation helps code start running quickly.</p><p><br></p><p>The most timely thread is the collision between AI-driven operations and runtime safety. As agents generate more code and policies need to adapt in real time, the risk shifts from writing logic to safely executing it. Oscar makes the case that capabilities-based security and fine-grained controls can turn WebAssembly into a “blast chamber” for AI-generated code, reducing the chances that a hallucination becomes a production outage.</p><p><br></p><p>If you’re thinking about plug-in architectures, safer customization, or how to scale dynamic behavior without scaling risk, this episode is your starting point.</p><p>Check out WebAssembly Unleashed: <a href="https://www.youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj">https://www.youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, WebAssembly, Wasm, programmability, function as a service, WebAssembly Unleashed, capabilities-based security, Bytecode Alliance, Wasm vs containers, AIOps, AI guardrails, agentic AI, WebAssembly sandbox, portable code, runtime isolation, Grain language, SQL query, Wasm for enterprise, portable plugins, AIOps automation, dynamic policy injection, agentic AI guardrails, portable logic, secure sandbox, language flexibility, runtime safety</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/oscar-spencer" img="https://img.transistorcdn.com/Cy2y9zSxfGYuw6dU1AIM6n2T2FKV2oq6YZrhGpdupIE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jN2Jj/MGIwMjY4MDc1OThj/OWI2NzZkYjgzOWU2/OTZiZi5wbmc.jpg">Oscar Spencer</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d7f88e95/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/d7f88e95/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Unstructured Integration: The hidden surface area putting AI privacy &amp; compliance at risk</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Unstructured Integration: The hidden surface area putting AI privacy &amp; compliance at risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5523c3a6-969a-4f48-b86e-c9defb60eac5</guid>
      <link>https://share.transistor.fm/s/e381e10f</link>
      <description>
        <![CDATA[<p>"It's just a chat" is the most dangerous sentence in AI. In this episode of Pop Goes the Stack, F5's Lori MacVittie and Joel Moses are joined by data science expert Scott Hendrickson to break down why AI has the surface area of the sun—it touches search, analytics, SEO tags, ad tech, APIs, logs, and all the integrations people forget are even there.</p><p><br></p><p>That’s the danger: as AI spreads across the stack, the privacy + compliance surface area explodes. What feels like a private conversation can get captured, logged, shared, or even indexed—not because of a hack, but because an old SEO/analytics integration “helpfully” records whatever shows up in a box…including chat.</p><p><br></p><p>Listen in to learn how SEO/tag managers can ingest entire chat transcripts, why conversational UX breaks "transactional web" assumptions, who may end up seeing your "private" context, and actionable steps to protect AI privacy. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>"It's just a chat" is the most dangerous sentence in AI. In this episode of Pop Goes the Stack, F5's Lori MacVittie and Joel Moses are joined by data science expert Scott Hendrickson to break down why AI has the surface area of the sun—it touches search, analytics, SEO tags, ad tech, APIs, logs, and all the integrations people forget are even there.</p><p><br></p><p>That’s the danger: as AI spreads across the stack, the privacy + compliance surface area explodes. What feels like a private conversation can get captured, logged, shared, or even indexed—not because of a hack, but because an old SEO/analytics integration “helpfully” records whatever shows up in a box…including chat.</p><p><br></p><p>Listen in to learn how SEO/tag managers can ingest entire chat transcripts, why conversational UX breaks "transactional web" assumptions, who may end up seeing your "private" context, and actionable steps to protect AI privacy. </p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Feb 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/e381e10f/43d0f7bf.mp3" length="35263678" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1457</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>"It's just a chat" is the most dangerous sentence in AI. In this episode of Pop Goes the Stack, F5's Lori MacVittie and Joel Moses are joined by data science expert Scott Hendrickson to break down why AI has the surface area of the sun—it touches search, analytics, SEO tags, ad tech, APIs, logs, and all the integrations people forget are even there.</p><p><br></p><p>That’s the danger: as AI spreads across the stack, the privacy + compliance surface area explodes. What feels like a private conversation can get captured, logged, shared, or even indexed—not because of a hack, but because an old SEO/analytics integration “helpfully” records whatever shows up in a box…including chat.</p><p><br></p><p>Listen in to learn how SEO/tag managers can ingest entire chat transcripts, why conversational UX breaks "transactional web" assumptions, who may end up seeing your "private" context, and actionable steps to protect AI privacy. </p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, integrations, AI data leakage, leaking AI Chat, AI chat privacy, prompt injection exposure, data compliance AI, API integration risks, prompt indexing, audit integrations, AI privacy compliance, data compliance, SEO integration, AI data science, AI regulations, AI privacy policies, chat transcripts, conversational UX, SEO data leakage, tag manager risk, prompt leakage, AI oversharing, third-party scripts, web tracking cookies, AI telemetry</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/scott-hendrickson" img="https://img.transistorcdn.com/gbebLRXdUKLxqKBgPBdh61AvANhKdb1-tGQQ-zx0808/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZTJj/ZTMwNjRlOTU4YzI4/MTgzNjlmMGFjMGRm/ODdhNS5qcGVn.jpg">Scott Hendrickson</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e381e10f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/e381e10f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Logging for Giants: High-Speed Telemetry in an AI World</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Logging for Giants: High-Speed Telemetry in an AI World</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e42b167-8e79-4140-908c-c1f6bd9ca382</guid>
      <link>https://share.transistor.fm/s/29db22d4</link>
      <description>
        <![CDATA[<p>When OpenAI discovered they could reclaim 30,000 CPU cores simply by tuning the log-forwarding agent Fluent Bit—disabling a single function that ate ~35 % of one server’s cycles—something large and systemic became undeniable. In this episode, F5's Lori MacVittie, Joel Moses, and observability expert, Chris Hain, break down the hidden cost of telemetry in AI-heavy architectures, why “logging is free” is a myth, and how modern systems demand a new breed of high-speed telemetry planes.</p><p><br></p><p>Listen in to learn how Fluent Bit’s file-watching overhead compounded at scale, why profiling matters, and what enterprises can do now to control AI observability costs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>When OpenAI discovered they could reclaim 30,000 CPU cores simply by tuning the log-forwarding agent Fluent Bit—disabling a single function that ate ~35 % of one server’s cycles—something large and systemic became undeniable. In this episode, F5's Lori MacVittie, Joel Moses, and observability expert, Chris Hain, break down the hidden cost of telemetry in AI-heavy architectures, why “logging is free” is a myth, and how modern systems demand a new breed of high-speed telemetry planes.</p><p><br></p><p>Listen in to learn how Fluent Bit’s file-watching overhead compounded at scale, why profiling matters, and what enterprises can do now to control AI observability costs.</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Feb 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/29db22d4/2d90c5b6.mp3" length="31827344" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1317</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>When OpenAI discovered they could reclaim 30,000 CPU cores simply by tuning the log-forwarding agent Fluent Bit—disabling a single function that ate ~35 % of one server’s cycles—something large and systemic became undeniable. In this episode, F5's Lori MacVittie, Joel Moses, and observability expert, Chris Hain, break down the hidden cost of telemetry in AI-heavy architectures, why “logging is free” is a myth, and how modern systems demand a new breed of high-speed telemetry planes.</p><p><br></p><p>Listen in to learn how Fluent Bit’s file-watching overhead compounded at scale, why profiling matters, and what enterprises can do now to control AI observability costs.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, logging is not free, is logging free?, observability cost, OpenAI logging, Fluent Bit, OpenAI, inotify overhead, telemetry overhead, reclaim CPU cores, SRE optimization, LLM observability, Splunk, DataDog, ClickHouse, Linux, memory backpressure, LLM observability, log sampling strategy, OpenTelemetry, CPU usage, monitoring, host optimization, log pipeline optimization, AI observability, system profiling, tail sampling, eBPF observability,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/chris-hain" img="https://img.transistorcdn.com/P-5gK8O6DqMm-Iyyh-wWE7Jrr0qg2J86rdkFxS5rqzI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YzIz/YzFlZTM1YzU3ZjVi/YzRkODkxZDM2Nzcx/YmRhZi5qcGVn.jpg">Chris Hain</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/29db22d4/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/29db22d4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Low-Code Automation Tools with Teeth: FlowFuse &amp; N8N</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Low-Code Automation Tools with Teeth: FlowFuse &amp; N8N</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a002ec02-08fd-43eb-ace2-78818c561afe</guid>
      <link>https://share.transistor.fm/s/de9cabec</link>
      <description>
        <![CDATA[<p>Low-code automation has grown up, and the competition is getting spicy. In this episode of Pop Goes the Stack, F5's Lori MacVittie and Joel Moses are joined by Aubrey King as they dig into the heavyweight duel between N8N and FlowFuse—two platforms promising to empower teams to automate anything without waiting for overworked developers. We cut through the marketing fluff and look at the real differences in architecture, deployment models, extensibility, security posture, and operational experience. How do they scale? Who controls your data? And what happens when the automation breaks at 2 a.m.? If you care about automation that doesn’t collapse under real-world pressure, you’ll want to hear this.</p><p>Read our F5 research for more on the status of automation in IT: <a href="https://www.f5.com/resources/reports/state-of-application-strategy-report">https://www.f5.com/resources/reports/state-of-application-strategy-report</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Low-code automation has grown up, and the competition is getting spicy. In this episode of Pop Goes the Stack, F5's Lori MacVittie and Joel Moses are joined by Aubrey King as they dig into the heavyweight duel between N8N and FlowFuse—two platforms promising to empower teams to automate anything without waiting for overworked developers. We cut through the marketing fluff and look at the real differences in architecture, deployment models, extensibility, security posture, and operational experience. How do they scale? Who controls your data? And what happens when the automation breaks at 2 a.m.? If you care about automation that doesn’t collapse under real-world pressure, you’ll want to hear this.</p><p>Read our F5 research for more on the status of automation in IT: <a href="https://www.f5.com/resources/reports/state-of-application-strategy-report">https://www.f5.com/resources/reports/state-of-application-strategy-report</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/de9cabec/a97c0e16.mp3" length="31233686" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1295</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Low-code automation has grown up, and the competition is getting spicy. In this episode of Pop Goes the Stack, F5's Lori MacVittie and Joel Moses are joined by Aubrey King as they dig into the heavyweight duel between N8N and FlowFuse—two platforms promising to empower teams to automate anything without waiting for overworked developers. We cut through the marketing fluff and look at the real differences in architecture, deployment models, extensibility, security posture, and operational experience. How do they scale? Who controls your data? And what happens when the automation breaks at 2 a.m.? If you care about automation that doesn’t collapse under real-world pressure, you’ll want to hear this.</p><p>Read our F5 research for more on the status of automation in IT: <a href="https://www.f5.com/resources/reports/state-of-application-strategy-report">https://www.f5.com/resources/reports/state-of-application-strategy-report</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, N8N, FlowFuse, low-code automation, Node-RED, agentic AI, IBM, IoT workloads, Docker, workflow automation tools, AI automation vs agents, IT automation, automation governance, no-code vs low-code, AI agents, node.js, node, automation pipeline, Visual Basic, AI applications, hard-coded credentials, workflow runner, AI assistants, non-technical users, open source, n8n workflows, DevOps automation, platform automation, architecture, developers</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://community.f5.com/users/aubreykingf5/173018" img="https://img.transistorcdn.com/RxZ-YMrGL3_bWCS0rLZR955cPtd2Y93qoe19t_1QBTQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDFm/N2QzMjhiNDBlY2Rj/YmExMDU4NTQ1NjYy/MzMwYy5qcGVn.jpg">Aubrey King</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/de9cabec/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/de9cabec/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The New New User Interface: AI in your brain </title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>The New New User Interface: AI in your brain </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d725756c-fc0d-4e2c-9dc9-b1ef13eb1283</guid>
      <link>https://share.transistor.fm/s/4c07729b</link>
      <description>
        <![CDATA[<p>The capability to map brain activity to language isn’t just another UI shift—it’s a paradigm shift in how humans and machines might communicate. If you’re building systems that integrate or rely on neuroscience-adjacent tech (or even simply storing neuro-derived data), you’ll want to treat this as a strategic early warning: new input modalities, new risk surfaces, and new expectations of what “internal” means.</p><p> </p><p>In this episode of <em>Pop Goes the Stack</em>, F5's Lori MacVittie and Joel Moses unpack emerging research on decoding neural activity into language—turning brain signals into natural-language output. They explore the promise for accessibility alongside major concerns: privacy, “intrusive thoughts,” and how systems decide which signals to surface. With a massive potential “blast radius” if connected to agentic systems, the research serves a stark reminder on the importance of evaluating AI breakthroughs for practicality and risk.</p><p>Read the original research, <em>Mind captioning: Evolving descriptive text of mental content from human brain activity</em>: <a href="https://www.science.org/doi/10.1126/sciadv.adw1464">https://www.science.org/doi/10.1126/sciadv.adw1464</a>  </p><p>Read the summary, <em>"Mind-captioning" AI decodes brain activity to turn thoughts into text</em>: <a href="https://www.nature.com/articles/d41586-025-03624-1">https://www.nature.com/articles/d41586-025-03624-1</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The capability to map brain activity to language isn’t just another UI shift—it’s a paradigm shift in how humans and machines might communicate. If you’re building systems that integrate or rely on neuroscience-adjacent tech (or even simply storing neuro-derived data), you’ll want to treat this as a strategic early warning: new input modalities, new risk surfaces, and new expectations of what “internal” means.</p><p> </p><p>In this episode of <em>Pop Goes the Stack</em>, F5's Lori MacVittie and Joel Moses unpack emerging research on decoding neural activity into language—turning brain signals into natural-language output. They explore the promise for accessibility alongside major concerns: privacy, “intrusive thoughts,” and how systems decide which signals to surface. With a massive potential “blast radius” if connected to agentic systems, the research serves a stark reminder on the importance of evaluating AI breakthroughs for practicality and risk.</p><p>Read the original research, <em>Mind captioning: Evolving descriptive text of mental content from human brain activity</em>: <a href="https://www.science.org/doi/10.1126/sciadv.adw1464">https://www.science.org/doi/10.1126/sciadv.adw1464</a>  </p><p>Read the summary, <em>"Mind-captioning" AI decodes brain activity to turn thoughts into text</em>: <a href="https://www.nature.com/articles/d41586-025-03624-1">https://www.nature.com/articles/d41586-025-03624-1</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Feb 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/4c07729b/80b7c108.mp3" length="26433334" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1088</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The capability to map brain activity to language isn’t just another UI shift—it’s a paradigm shift in how humans and machines might communicate. If you’re building systems that integrate or rely on neuroscience-adjacent tech (or even simply storing neuro-derived data), you’ll want to treat this as a strategic early warning: new input modalities, new risk surfaces, and new expectations of what “internal” means.</p><p> </p><p>In this episode of <em>Pop Goes the Stack</em>, F5's Lori MacVittie and Joel Moses unpack emerging research on decoding neural activity into language—turning brain signals into natural-language output. They explore the promise for accessibility alongside major concerns: privacy, “intrusive thoughts,” and how systems decide which signals to surface. With a massive potential “blast radius” if connected to agentic systems, the research serves a stark reminder on the importance of evaluating AI breakthroughs for practicality and risk.</p><p>Read the original research, <em>Mind captioning: Evolving descriptive text of mental content from human brain activity</em>: <a href="https://www.science.org/doi/10.1126/sciadv.adw1464">https://www.science.org/doi/10.1126/sciadv.adw1464</a>  </p><p>Read the summary, <em>"Mind-captioning" AI decodes brain activity to turn thoughts into text</em>: <a href="https://www.nature.com/articles/d41586-025-03624-1">https://www.nature.com/articles/d41586-025-03624-1</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, GUIs, user interface, neural interface, semantic decoding, AI guardrails, privacy and AI, AI ethics, agentic AI risk, future of UI, Neuralink, neural model, neural modeling, neural semantic context, semantic context, signal triage, security research, agentic AI, SRE, ops, APIs, AI system interface, AI security, AI, UI shift, neuroscience, neuroscience tech, decoding neural activity, natural-language output, agentic systems, AI breakthrough</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4c07729b/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/4c07729b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Impact of Inference: Reliability</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>The Impact of Inference: Reliability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d7d31660-0bdc-4f15-9676-7a35c45cafa5</guid>
      <link>https://share.transistor.fm/s/86b1539d</link>
      <description>
        <![CDATA[<p>Traditional reliability meant consistency. Given identical inputs, systems produced identical outputs. Costs were stable and behavior predictable. Inference reliability on the other hand is shaped by nondeterminism. Outputs vary due to stochastic generation, retraining introduces drift, and token-based billing can cause cost fluctuations. The new dimension of reliability is semantic consistency, that is, the ability to deliver outputs of acceptable quality, accuracy, and predictability over time despite probabilistic behavior.</p><p> </p><p>In this episode of <em>Pop Goes the Stack</em>, F5's Lori MacVittie and Joel Moses are joined by guests Ken Arora and Kunal Anand as they dive into the topic of reliability in AI systems. They explore the concept of 'slop' (AI variability) as a potential feature rather than a bug, discuss the importance of contextual semantic consistency, and weigh guardrails and evals tailored to specific inference workloads. Tune in to learn how to navigate the evolving AI landscape and take note of practical tools and strategies like multi-model chaining, distillation, and prompt engineering to ensure reliability.</p><p>Find out more in the blog <em>How AI inference changes application delivery</em>: <a href="https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery">https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Traditional reliability meant consistency. Given identical inputs, systems produced identical outputs. Costs were stable and behavior predictable. Inference reliability on the other hand is shaped by nondeterminism. Outputs vary due to stochastic generation, retraining introduces drift, and token-based billing can cause cost fluctuations. The new dimension of reliability is semantic consistency, that is, the ability to deliver outputs of acceptable quality, accuracy, and predictability over time despite probabilistic behavior.</p><p> </p><p>In this episode of <em>Pop Goes the Stack</em>, F5's Lori MacVittie and Joel Moses are joined by guests Ken Arora and Kunal Anand as they dive into the topic of reliability in AI systems. They explore the concept of 'slop' (AI variability) as a potential feature rather than a bug, discuss the importance of contextual semantic consistency, and weigh guardrails and evals tailored to specific inference workloads. Tune in to learn how to navigate the evolving AI landscape and take note of practical tools and strategies like multi-model chaining, distillation, and prompt engineering to ensure reliability.</p><p>Find out more in the blog <em>How AI inference changes application delivery</em>: <a href="https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery">https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/86b1539d/9ce68c09.mp3" length="33249637" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1369</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Traditional reliability meant consistency. Given identical inputs, systems produced identical outputs. Costs were stable and behavior predictable. Inference reliability on the other hand is shaped by nondeterminism. Outputs vary due to stochastic generation, retraining introduces drift, and token-based billing can cause cost fluctuations. The new dimension of reliability is semantic consistency, that is, the ability to deliver outputs of acceptable quality, accuracy, and predictability over time despite probabilistic behavior.</p><p> </p><p>In this episode of <em>Pop Goes the Stack</em>, F5's Lori MacVittie and Joel Moses are joined by guests Ken Arora and Kunal Anand as they dive into the topic of reliability in AI systems. They explore the concept of 'slop' (AI variability) as a potential feature rather than a bug, discuss the importance of contextual semantic consistency, and weigh guardrails and evals tailored to specific inference workloads. Tune in to learn how to navigate the evolving AI landscape and take note of practical tools and strategies like multi-model chaining, distillation, and prompt engineering to ensure reliability.</p><p>Find out more in the blog <em>How AI inference changes application delivery</em>: <a href="https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery">https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, inference, semantic consistency, agentic AI, AI inference, reliability, PAR, guardrails, AI reliability, managed variability, behavioral based reliability, vibe coding, consistency vs accuracy, semantic guardrails, LLM, AI variability vs accuracy, inferencing reliability, AI system evals, measuring AI semantic consistency, prompt engineering for reliability, managing AI guardrails, agentic AI reliability, redefining reliability in AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/ken-arora" img="https://img.transistorcdn.com/-BZXfCO8yAM9n1Gh_CBnMwdIinkJQpXAefBuWBFW4b4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDcx/ZWFhM2FlNmY0YjZm/NmJjOTUwYzhkOGYz/ODU5NC5qcGc.jpg">Ken Arora</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/kunal-anand" img="https://img.transistorcdn.com/toRpwzZF8dlxiNZRheTza1k_O2o4Ow_y-7RaqLNTcXE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTQw/ZmViYWZkMGYzMGFk/MDcyYjU2OGY4MWM3/ZjMyNC5qcGVn.jpg">Kunal Anand</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/86b1539d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/86b1539d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Impact of Inference: Performance</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>The Impact of Inference: Performance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0b274b9a-8dce-479e-9b03-13d3129c72e5</guid>
      <link>https://share.transistor.fm/s/a8df76b5</link>
      <description>
        <![CDATA[<p>Traditional performance meant deterministic response times. Identical inputs produced near-identical execution times. Optimizations reduced latency, but variance was minimal. Insert AI inference and performance engineering has been flipped upside down. Latency depends on model size, tokenization, batching strategies, and generation settings. Identical inputs may produce different response times. The new dimension of performance is variance—not just how fast the system responds, but how response times distribute across requests, how many tokens per second are processed, and how efficient each response is relative to cost.</p><p><br></p><p>In this episode of Pop Goes the Stack, Lori MacVittie, Joel Moses, and special guest Nina Forsyth dive into the impact of AI inference on measuring performance. It's time to rethink performance observability, focus on infrastructure optimization, agent-to-agent interactions, and robust measurement techniques. Listen in to learn how traditional approaches must evolve to manage this multi-dimensional puzzle.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Traditional performance meant deterministic response times. Identical inputs produced near-identical execution times. Optimizations reduced latency, but variance was minimal. Insert AI inference and performance engineering has been flipped upside down. Latency depends on model size, tokenization, batching strategies, and generation settings. Identical inputs may produce different response times. The new dimension of performance is variance—not just how fast the system responds, but how response times distribute across requests, how many tokens per second are processed, and how efficient each response is relative to cost.</p><p><br></p><p>In this episode of Pop Goes the Stack, Lori MacVittie, Joel Moses, and special guest Nina Forsyth dive into the impact of AI inference on measuring performance. It's time to rethink performance observability, focus on infrastructure optimization, agent-to-agent interactions, and robust measurement techniques. Listen in to learn how traditional approaches must evolve to manage this multi-dimensional puzzle.</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Jan 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/a8df76b5/221b3da1.mp3" length="29764703" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1234</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Traditional performance meant deterministic response times. Identical inputs produced near-identical execution times. Optimizations reduced latency, but variance was minimal. Insert AI inference and performance engineering has been flipped upside down. Latency depends on model size, tokenization, batching strategies, and generation settings. Identical inputs may produce different response times. The new dimension of performance is variance—not just how fast the system responds, but how response times distribute across requests, how many tokens per second are processed, and how efficient each response is relative to cost.</p><p><br></p><p>In this episode of Pop Goes the Stack, Lori MacVittie, Joel Moses, and special guest Nina Forsyth dive into the impact of AI inference on measuring performance. It's time to rethink performance observability, focus on infrastructure optimization, agent-to-agent interactions, and robust measurement techniques. Listen in to learn how traditional approaches must evolve to manage this multi-dimensional puzzle.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, inference, performance, performance metrics, token variance, AI latency, AI performance management, infrastructure, AI observability, AI inference, optimizing AI systems, AI response variance, RAG, non-deterministic response, AI performance engineering, AI agents, AI-driven applications, MCP, A2A, deterministic performance, non-deterministic performance, AI token cost, measuring AI inferencing, AI efficiency, infrastructure for inferencing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/nina-forsyth" img="https://img.transistorcdn.com/V9lUUZblVRtsUVane2ZnITynnIK5AUX8oM7TIPVxui4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNzVm/MmU0NzEzMTMzZTA5/MWZhNDhmMjM5OWUz/M2Y5MC5qcGVn.jpg">Nina Forsyth</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a8df76b5/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/a8df76b5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Impact of Inference: Availability</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>The Impact of Inference: Availability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19322ed3-8b34-47c9-8be4-408e71d476de</guid>
      <link>https://share.transistor.fm/s/aece5ad8</link>
      <description>
        <![CDATA[<p>What does "availability" mean in a world of AI inferencing and ever-shifting workloads? It’s no longer just about servers responding or apps being online—availability now hinges on <strong>response quality, utility, and even user perception</strong>. A fast system that delivers irrelevant or wrong answers? That’s simply unavailable to its users.</p><p><br></p><p>In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and special guest Ken Salchow explore how AI systems are changing the availability game. From the historical binary days of “up or down” to today’s nuanced measures of responsiveness and correctness, they dive into the challenges of keeping apps fast, reliable, and meaningful.</p><p><br></p><p>Listen in to learn how AI inferencing workloads redefine availability metrics, why availability now requires response quality and utility, and whether or not "emotionally available" AI (yes, really) might be the future.</p><p><br></p><p>Find out more in the blog, <em>How AI inference changes application delivery</em>: <a href="https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery">https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery</a></p><p><br></p><p>Read the white paper Ken references, <em>Passive Monitoring—Maintaining Performance and Health</em>: <a href="https://cdn.studio.f5.com/files/k6fem79d/production/6f4d7a0298a24927ed03c3dc92de339c86e03ef5.pdf">https://cdn.studio.f5.com/files/k6fem79d/production/6f4d7a0298a24927ed03c3dc92de339c86e03ef5.pdf</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What does "availability" mean in a world of AI inferencing and ever-shifting workloads? It’s no longer just about servers responding or apps being online—availability now hinges on <strong>response quality, utility, and even user perception</strong>. A fast system that delivers irrelevant or wrong answers? That’s simply unavailable to its users.</p><p><br></p><p>In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and special guest Ken Salchow explore how AI systems are changing the availability game. From the historical binary days of “up or down” to today’s nuanced measures of responsiveness and correctness, they dive into the challenges of keeping apps fast, reliable, and meaningful.</p><p><br></p><p>Listen in to learn how AI inferencing workloads redefine availability metrics, why availability now requires response quality and utility, and whether or not "emotionally available" AI (yes, really) might be the future.</p><p><br></p><p>Find out more in the blog, <em>How AI inference changes application delivery</em>: <a href="https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery">https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery</a></p><p><br></p><p>Read the white paper Ken references, <em>Passive Monitoring—Maintaining Performance and Health</em>: <a href="https://cdn.studio.f5.com/files/k6fem79d/production/6f4d7a0298a24927ed03c3dc92de339c86e03ef5.pdf">https://cdn.studio.f5.com/files/k6fem79d/production/6f4d7a0298a24927ed03c3dc92de339c86e03ef5.pdf</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Jan 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/aece5ad8/79ed35fb.mp3" length="32328730" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1333</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What does "availability" mean in a world of AI inferencing and ever-shifting workloads? It’s no longer just about servers responding or apps being online—availability now hinges on <strong>response quality, utility, and even user perception</strong>. A fast system that delivers irrelevant or wrong answers? That’s simply unavailable to its users.</p><p><br></p><p>In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and special guest Ken Salchow explore how AI systems are changing the availability game. From the historical binary days of “up or down” to today’s nuanced measures of responsiveness and correctness, they dive into the challenges of keeping apps fast, reliable, and meaningful.</p><p><br></p><p>Listen in to learn how AI inferencing workloads redefine availability metrics, why availability now requires response quality and utility, and whether or not "emotionally available" AI (yes, really) might be the future.</p><p><br></p><p>Find out more in the blog, <em>How AI inference changes application delivery</em>: <a href="https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery">https://www.f5.com/company/blog/how-ai-inference-changes-application-delivery</a></p><p><br></p><p>Read the white paper Ken references, <em>Passive Monitoring—Maintaining Performance and Health</em>: <a href="https://cdn.studio.f5.com/files/k6fem79d/production/6f4d7a0298a24927ed03c3dc92de339c86e03ef5.pdf">https://cdn.studio.f5.com/files/k6fem79d/production/6f4d7a0298a24927ed03c3dc92de339c86e03ef5.pdf</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, inference, performance, availability, reliability, PAR, application delivery, AI correctness, AI accuracy, AI red teaming, semantic veracity, LLM, inferencing workloads, AI uptime vs utility, redefining availability in AI, AI liability, AI semantic health checks, measuring AI response, future evolution AI availability, AI attention drift, AI availability metrics, inferencing performance metrics, agentic AI, client-side AI availability</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/ken-salchow-dba" img="https://img.transistorcdn.com/_WN2j98fMDJZ4rESJjXwVjHPtGaYZGaSmiRJWc7eOE4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMDc2/ZmI5YmU2ZGI0Yzc1/YTdmNGJjNDJmNGI3/YWY0OS5qcGVn.jpg">Ken Salchow, DBA</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/aece5ad8/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/aece5ad8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Shift left into runtime: Vibe coding and AI guardrails</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Shift left into runtime: Vibe coding and AI guardrails</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">45bb0835-f57c-4221-a700-afc58dea4b82</guid>
      <link>https://share.transistor.fm/s/ec5547b7</link>
      <description>
        <![CDATA[<p>Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules.</p><p> </p><p>But is faster better? While agentic AI unlocks game-changing efficiency, it also introduces new risks: API keys hardcoded into apps, runaway GitHub actions, and a stark need for guardrails like sandboxing, runtime tripwires, and logging. As we embrace smarter pipelines, how do we stay in control?</p><p> </p><p>Join us as we explore the promises and pitfalls of shifting left with AI agents—and why the era of “self-improving code” is both exciting and terrifying. The machines are coding. Are you ready to debug?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules.</p><p> </p><p>But is faster better? While agentic AI unlocks game-changing efficiency, it also introduces new risks: API keys hardcoded into apps, runaway GitHub actions, and a stark need for guardrails like sandboxing, runtime tripwires, and logging. As we embrace smarter pipelines, how do we stay in control?</p><p> </p><p>Join us as we explore the promises and pitfalls of shifting left with AI agents—and why the era of “self-improving code” is both exciting and terrifying. The machines are coding. Are you ready to debug?</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Jan 2026 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/ec5547b7/52e8d3c6.mp3" length="30327792" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1235</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules.</p><p> </p><p>But is faster better? While agentic AI unlocks game-changing efficiency, it also introduces new risks: API keys hardcoded into apps, runaway GitHub actions, and a stark need for guardrails like sandboxing, runtime tripwires, and logging. As we embrace smarter pipelines, how do we stay in control?</p><p> </p><p>Join us as we explore the promises and pitfalls of shifting left with AI agents—and why the era of “self-improving code” is both exciting and terrifying. The machines are coding. Are you ready to debug?</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI directed coding, vibe coding, Claude Code, agentic AI, AI agents, shift left approach, managed pipeline, Docker, sandboxing, runtime trip wires, Lovable, GitHub Copilot, OpenAI Whisper, open API, agentic AI in software development, shift left security, agent-based pipelines, automating workflows with AI, vibe coding risks, AI guardrails in dev pipelines, agentic AI coding risks, AI guardrails, AI in DevOps pipelines, safe vibe coding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/buu-lam" img="https://img.transistorcdn.com/juj3_hN8jmRuNMIdzUzLyThHDHeg1oPDDip-xAtztjw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNWI2/YjJkOGQxMjA0Y2U3/ZmQ3YmFhMzdkNThh/OWMyMi5qcGVn.jpg">Buu Lam</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ec5547b7/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/ec5547b7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Taking a holiday break – Pop Goes the Stack returns after New Year’s!</title>
      <itunes:title>Taking a holiday break – Pop Goes the Stack returns after New Year’s!</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">40876bb1-3c51-474d-9a79-adbd8abeace0</guid>
      <link>https://share.transistor.fm/s/76d65401</link>
      <description>
        <![CDATA[<p>Hi, Pop Goes the Stack listeners! The holiday season is here, and we’re taking a short break to recharge, enjoy time with loved ones, and maybe step away from our stacks (just for a bit). Don’t worry—we’ll be back after New Year’s with more sharp insights, expert takes, and our signature snark to help you navigate the fast-paced world of application delivery and security.</p><p><br></p><p>In the meantime, why not revisit some of our past episodes? From AI to cutting-edge hardware and tech industry trends, there’s plenty to dive into.</p><p><br></p><p>Thank you for being part of our community. Wishing you a safe and happy holiday season—see you soon!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hi, Pop Goes the Stack listeners! The holiday season is here, and we’re taking a short break to recharge, enjoy time with loved ones, and maybe step away from our stacks (just for a bit). Don’t worry—we’ll be back after New Year’s with more sharp insights, expert takes, and our signature snark to help you navigate the fast-paced world of application delivery and security.</p><p><br></p><p>In the meantime, why not revisit some of our past episodes? From AI to cutting-edge hardware and tech industry trends, there’s plenty to dive into.</p><p><br></p><p>Thank you for being part of our community. Wishing you a safe and happy holiday season—see you soon!</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Dec 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/76d65401/11205904.mp3" length="1331528" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>55</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Hi, Pop Goes the Stack listeners! The holiday season is here, and we’re taking a short break to recharge, enjoy time with loved ones, and maybe step away from our stacks (just for a bit). Don’t worry—we’ll be back after New Year’s with more sharp insights, expert takes, and our signature snark to help you navigate the fast-paced world of application delivery and security.</p><p><br></p><p>In the meantime, why not revisit some of our past episodes? From AI to cutting-edge hardware and tech industry trends, there’s plenty to dive into.</p><p><br></p><p>Thank you for being part of our community. Wishing you a safe and happy holiday season—see you soon!</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, holiday break, tech podcast, application delivery and security podcast, top tech podcast, AI discussions, emerging tech trends, tech trends podcast, happy holidays, application delivery, application security, how to secure your stack, top tech podcast for developers, AI podcast, Christmas, Kwanzaa, Hanukkah, New Year, New Year's Eve, Boxing Day, Winter Solstice, Yule, Las Posadas, Omisoka</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/76d65401/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Reshaping the web for AI agents and LLMs</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Reshaping the web for AI agents and LLMs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c000579-cb60-4717-8ee8-e41bbeecb639</guid>
      <link>https://share.transistor.fm/s/eb2ae216</link>
      <description>
        <![CDATA[<p>The web we built—a tangle of HTML, JavaScript, CSS, APIs, and SEO quirks—has always been messy. But with AI agents and real-time apps now consuming the web as data, that mess becomes a liability. Firecrawl is one of the new tools reshaping how apps see and ingest web content, turning web pages into structured JSON, markdown, screenshots—everything you need for your agents to behave intelligently. </p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and returning guest Aubrey King dig into how Firecrawl works and why it’s emblematic of a deeper shift: the web is no longer just for browsers. It’s now an ingestion surface, a layer to be crawled, parsed, cleaned, and trusted (or not) by your AI stacks. That means how your app presents itself—not just in UI, but in metadata, APIs, link structure, content semantics—matters more than ever. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The web we built—a tangle of HTML, JavaScript, CSS, APIs, and SEO quirks—has always been messy. But with AI agents and real-time apps now consuming the web as data, that mess becomes a liability. Firecrawl is one of the new tools reshaping how apps see and ingest web content, turning web pages into structured JSON, markdown, screenshots—everything you need for your agents to behave intelligently. </p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and returning guest Aubrey King dig into how Firecrawl works and why it’s emblematic of a deeper shift: the web is no longer just for browsers. It’s now an ingestion surface, a layer to be crawled, parsed, cleaned, and trusted (or not) by your AI stacks. That means how your app presents itself—not just in UI, but in metadata, APIs, link structure, content semantics—matters more than ever. </p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Dec 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/eb2ae216/9a976379.mp3" length="32247530" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1336</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The web we built—a tangle of HTML, JavaScript, CSS, APIs, and SEO quirks—has always been messy. But with AI agents and real-time apps now consuming the web as data, that mess becomes a liability. Firecrawl is one of the new tools reshaping how apps see and ingest web content, turning web pages into structured JSON, markdown, screenshots—everything you need for your agents to behave intelligently. </p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and returning guest Aubrey King dig into how Firecrawl works and why it’s emblematic of a deeper shift: the web is no longer just for browsers. It’s now an ingestion surface, a layer to be crawled, parsed, cleaned, and trusted (or not) by your AI stacks. That means how your app presents itself—not just in UI, but in metadata, APIs, link structure, content semantics—matters more than ever. </p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, API, Web, data, AI agents, Firecrawl, JSON, web browser, LLM, open source, AGPL, n8n, UI, red teaming, w3af, scanner, CMS, content strategy, real-time apps, website crawler, JavaScript, AI principles, AI guardrails, LLM consumption, AI web crawlers, AI content ingestion tools, web crawling tools for LLMs, feeding data to LLMs, site crawling for data ingestion, structured web data for AI, optimize websites for AI agents, block AI crawlers</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://community.f5.com/users/aubreykingf5/173018" img="https://img.transistorcdn.com/RxZ-YMrGL3_bWCS0rLZR955cPtd2Y93qoe19t_1QBTQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDFm/N2QzMjhiNDBlY2Rj/YmExMDU4NTQ1NjYy/MzMwYy5qcGVn.jpg">Aubrey King</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/eb2ae216/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/eb2ae216/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Five nines of wrong: Detecting drift and errors in AI systems</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Five nines of wrong: Detecting drift and errors in AI systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c06b1b5d-5180-4ea4-90fe-524873e60301</guid>
      <link>https://share.transistor.fm/s/bd492abc</link>
      <description>
        <![CDATA[<p>Uptime used to mean reliability. But in the LLM era, five nines just means your liar is always available. Real reliability now includes correctness and that means probing models in real time with prompts that have known answers. When those slip, your delivery fabric has to reroute before customers find out. </p><p><br></p><p>In this episode F5's Lori MacVittie, Joel Moses, and returning guest Garland Moore dig into why availability isn’t enough anymore, and how research like “Get my drift? Catching LLM Task Drift with Activation Probes” shows where semantic health checks fit in the new definition of reliability. How do you keep AI outputs accurate even when external data sources introduce bias, errors, or malicious prompts? Listen now to find out.</p><p>Read the paper, <em>Get my drift? Catching LLM Task Drift with Activation Deltas</em>: <a href="https://arxiv.org/abs/2406.00799">https://arxiv.org/abs/2406.00799</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Uptime used to mean reliability. But in the LLM era, five nines just means your liar is always available. Real reliability now includes correctness and that means probing models in real time with prompts that have known answers. When those slip, your delivery fabric has to reroute before customers find out. </p><p><br></p><p>In this episode F5's Lori MacVittie, Joel Moses, and returning guest Garland Moore dig into why availability isn’t enough anymore, and how research like “Get my drift? Catching LLM Task Drift with Activation Probes” shows where semantic health checks fit in the new definition of reliability. How do you keep AI outputs accurate even when external data sources introduce bias, errors, or malicious prompts? Listen now to find out.</p><p>Read the paper, <em>Get my drift? Catching LLM Task Drift with Activation Deltas</em>: <a href="https://arxiv.org/abs/2406.00799">https://arxiv.org/abs/2406.00799</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Dec 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/bd492abc/f9b94c18.mp3" length="32558727" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1319</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Uptime used to mean reliability. But in the LLM era, five nines just means your liar is always available. Real reliability now includes correctness and that means probing models in real time with prompts that have known answers. When those slip, your delivery fabric has to reroute before customers find out. </p><p><br></p><p>In this episode F5's Lori MacVittie, Joel Moses, and returning guest Garland Moore dig into why availability isn’t enough anymore, and how research like “Get my drift? Catching LLM Task Drift with Activation Probes” shows where semantic health checks fit in the new definition of reliability. How do you keep AI outputs accurate even when external data sources introduce bias, errors, or malicious prompts? Listen now to find out.</p><p>Read the paper, <em>Get my drift? Catching LLM Task Drift with Activation Deltas</em>: <a href="https://arxiv.org/abs/2406.00799">https://arxiv.org/abs/2406.00799</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI uptime, LLM, AI, five 9s, AI reliability, MTTR, AI correctness, AI drift, AI task drift, activation probes, semantic health checks, What is task drift?, RAG, context drift, semantics, prompt injection, data, AI hallucination, AI Task Tracker, agentic AI, AI agents, activation probes for AI, AI uptime vs correctness, AI availability and correctness, securing LLMs, passive AI drift detection, semantic drift in AI, uptime standards</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/garland-moore" img="https://img.transistorcdn.com/CHUacNMhXacxR2Xc3QqJ0OjldqAX9c347OdH9h_8msM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYTIw/OTZlYjk0OTIxYjNi/OTlmODVlNTlkYTU0/NWEwMi5qcGVn.jpg">Garland Moore</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/bd492abc/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/bd492abc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Now you see me, now you don't: Ephemeral Auth and AI agents</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Now you see me, now you don't: Ephemeral Auth and AI agents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b879374a-b0b4-472f-bab0-be83155865b7</guid>
      <link>https://share.transistor.fm/s/09f642c1</link>
      <description>
        <![CDATA[<p>Agents are popping up everywhere: tiny bots spinning up for a task, then dying off. They shouldn’t carry long-lived credentials any more than you carry a master key everywhere you go. What if each agent got a just-for-this-mission credential—scoped, temporary, context-aware, and gone when its task ends? That’s ephemeral authentication. </p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and special guest Bill Church dig into why traditional IAM (OAuth tokens, persistent keys) fails in agentic worlds. They’ll show how ephemeral auth can reduce blast radius, prevent credential replay, and force “least privilege in the moment.” Then they walk through how it might be built: token issuance on mission start, embedded attestation, automatic revocation, and scope tunneling per action. And yeah, there are tradeoffs—latency, credential churn, throttling limits. Listen in for the best path forward.</p><p>Read the arXiv article, <em>A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control</em>: <a href="https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com">https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com</a></p><p><br></p><p>Find out more about the importance of policy in payload: <a href="https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures">https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Agents are popping up everywhere: tiny bots spinning up for a task, then dying off. They shouldn’t carry long-lived credentials any more than you carry a master key everywhere you go. What if each agent got a just-for-this-mission credential—scoped, temporary, context-aware, and gone when its task ends? That’s ephemeral authentication. </p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and special guest Bill Church dig into why traditional IAM (OAuth tokens, persistent keys) fails in agentic worlds. They’ll show how ephemeral auth can reduce blast radius, prevent credential replay, and force “least privilege in the moment.” Then they walk through how it might be built: token issuance on mission start, embedded attestation, automatic revocation, and scope tunneling per action. And yeah, there are tradeoffs—latency, credential churn, throttling limits. Listen in for the best path forward.</p><p>Read the arXiv article, <em>A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control</em>: <a href="https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com">https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com</a></p><p><br></p><p>Find out more about the importance of policy in payload: <a href="https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures">https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Dec 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/09f642c1/62411bce.mp3" length="35548839" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1474</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Agents are popping up everywhere: tiny bots spinning up for a task, then dying off. They shouldn’t carry long-lived credentials any more than you carry a master key everywhere you go. What if each agent got a just-for-this-mission credential—scoped, temporary, context-aware, and gone when its task ends? That’s ephemeral authentication. </p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and special guest Bill Church dig into why traditional IAM (OAuth tokens, persistent keys) fails in agentic worlds. They’ll show how ephemeral auth can reduce blast radius, prevent credential replay, and force “least privilege in the moment.” Then they walk through how it might be built: token issuance on mission start, embedded attestation, automatic revocation, and scope tunneling per action. And yeah, there are tradeoffs—latency, credential churn, throttling limits. Listen in for the best path forward.</p><p>Read the arXiv article, <em>A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control</em>: <a href="https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com">https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com</a></p><p><br></p><p>Find out more about the importance of policy in payload: <a href="https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures">https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI agent, data, API, human identity systems, IAM, JWT token, certs, NANDA, IoAIA, IoT, ephemeral authentication, token, SPIFFE, SPIRE, Wassette, zero trust, MCP, latency, scope negotiation, MCP, RAG, ephemeral credentials, AI scope tunneling, AI governance, context aware scoping, cryptography, least privilege for agents, debugging ephemeral credentials, AI agents audit log, IAM for AI agents, token churn in AI systems, AI token collisions</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/bill-church" img="https://img.transistorcdn.com/htitpakRF2nyMS15CQXOmso_gx3u2SxVAkHqE7LtFNo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMDJi/YTYxMWExOTJiNzcz/MjdkNTlkZTAzNWI2/YzIxYS5qcGVn.jpg">Bill Church</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/09f642c1/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/09f642c1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Holiday hiatus: Revisiting tech trends, AI, and more! </title>
      <itunes:title>Holiday hiatus: Revisiting tech trends, AI, and more! </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">498924e5-cf0d-499d-a04f-fc5c996f164b</guid>
      <link>https://share.transistor.fm/s/609ea233</link>
      <description>
        <![CDATA[<p>Hi everyone! This is Lori MacVittie, host of Pop Goes the Stack. This holiday week, we’re pressing pause to recharge, spend time with loved ones, and maybe even step away from our stacks for a bit (gasp!).</p><p><br></p><p>But don’t worry—we’ll be back soon with more:</p><p>✅ Sharp insights into emerging tech</p><p>✅ Expert takes on application delivery &amp; security</p><p>✅ And, of course, our signature snark</p><p><br></p><p>Missed an episode? Use this time to revisit some of our favorite discussions, covering everything from:</p><p><br></p><p>- AI advancements</p><p>- Game-changing hardware trends</p><p>- Cybersecurity challenges</p><p>- And much more!</p><p><br></p><p>Thank you for being part of the Pop Goes the Stack community. Wishing you a safe, happy holiday. We can’t wait to see you soon with fresh episodes to keep you ahead in the ever-evolving world of tech.</p><p><br></p><p>👉 Subscribe now to make sure you don’t miss our return.</p><p><br></p><p>🎉 Happy holidays from Lori and the entire Pop Goes the Stack team!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hi everyone! This is Lori MacVittie, host of Pop Goes the Stack. This holiday week, we’re pressing pause to recharge, spend time with loved ones, and maybe even step away from our stacks for a bit (gasp!).</p><p><br></p><p>But don’t worry—we’ll be back soon with more:</p><p>✅ Sharp insights into emerging tech</p><p>✅ Expert takes on application delivery &amp; security</p><p>✅ And, of course, our signature snark</p><p><br></p><p>Missed an episode? Use this time to revisit some of our favorite discussions, covering everything from:</p><p><br></p><p>- AI advancements</p><p>- Game-changing hardware trends</p><p>- Cybersecurity challenges</p><p>- And much more!</p><p><br></p><p>Thank you for being part of the Pop Goes the Stack community. Wishing you a safe, happy holiday. We can’t wait to see you soon with fresh episodes to keep you ahead in the ever-evolving world of tech.</p><p><br></p><p>👉 Subscribe now to make sure you don’t miss our return.</p><p><br></p><p>🎉 Happy holidays from Lori and the entire Pop Goes the Stack team!</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Nov 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/609ea233/c3887800.mp3" length="1331528" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>55</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Hi everyone! This is Lori MacVittie, host of Pop Goes the Stack. This holiday week, we’re pressing pause to recharge, spend time with loved ones, and maybe even step away from our stacks for a bit (gasp!).</p><p><br></p><p>But don’t worry—we’ll be back soon with more:</p><p>✅ Sharp insights into emerging tech</p><p>✅ Expert takes on application delivery &amp; security</p><p>✅ And, of course, our signature snark</p><p><br></p><p>Missed an episode? Use this time to revisit some of our favorite discussions, covering everything from:</p><p><br></p><p>- AI advancements</p><p>- Game-changing hardware trends</p><p>- Cybersecurity challenges</p><p>- And much more!</p><p><br></p><p>Thank you for being part of the Pop Goes the Stack community. Wishing you a safe, happy holiday. We can’t wait to see you soon with fresh episodes to keep you ahead in the ever-evolving world of tech.</p><p><br></p><p>👉 Subscribe now to make sure you don’t miss our return.</p><p><br></p><p>🎉 Happy holidays from Lori and the entire Pop Goes the Stack team!</p>]]>
      </itunes:summary>
      <itunes:keywords> Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, holiday break, tech podcast, application delivery and security podcast, top tech podcast, AI discussions, emerging tech trends, tech trends podcast, happy holidays, application delivery, application security, how to secure your stack, top tech podcast for developers, AI podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/609ea233/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>BOLA exploits: The #1 API threat and how to stop it</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>BOLA exploits: The #1 API threat and how to stop it</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">110e978d-4708-4dab-9fc0-94d62124c19b</guid>
      <link>https://share.transistor.fm/s/60d6c833</link>
      <description>
        <![CDATA[<p>The 2025 API Threat Report is out, and shocker: we’re still getting wrecked by injection, data leaks, and BOLA. That’s Broken Object Level Authorization, for those of you keeping score at home. And here’s the kicker—95% of these attacks are coming through authenticated sessions. Translation: the bad guys aren’t breaking in through the side door, they’re waltzing in with a valid badge and looting the place. But sure, let’s keep obsessing over password complexity policies while ignoring that our APIs are basically vending machines for sensitive data.</p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and special guest Garland Moore dive into BOLA misconceptions, the impact of AI, and solutions you can implement now to mitigate risk. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The 2025 API Threat Report is out, and shocker: we’re still getting wrecked by injection, data leaks, and BOLA. That’s Broken Object Level Authorization, for those of you keeping score at home. And here’s the kicker—95% of these attacks are coming through authenticated sessions. Translation: the bad guys aren’t breaking in through the side door, they’re waltzing in with a valid badge and looting the place. But sure, let’s keep obsessing over password complexity policies while ignoring that our APIs are basically vending machines for sensitive data.</p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and special guest Garland Moore dive into BOLA misconceptions, the impact of AI, and solutions you can implement now to mitigate risk. </p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Nov 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/60d6c833/ace6e095.mp3" length="31819451" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1317</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The 2025 API Threat Report is out, and shocker: we’re still getting wrecked by injection, data leaks, and BOLA. That’s Broken Object Level Authorization, for those of you keeping score at home. And here’s the kicker—95% of these attacks are coming through authenticated sessions. Translation: the bad guys aren’t breaking in through the side door, they’re waltzing in with a valid badge and looting the place. But sure, let’s keep obsessing over password complexity policies while ignoring that our APIs are basically vending machines for sensitive data.</p><p><br></p><p>In this episode, F5's Lori MacVittie, Joel Moses, and special guest Garland Moore dive into BOLA misconceptions, the impact of AI, and solutions you can implement now to mitigate risk. </p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, BOLA, Broken object level authorization, 2025 API Threat Report, OWASP Top Ten, authentication vs authorization, API, Instagram, Parler, AI, AI agent, OPA, Open Policy Agent, infrastructure as code, policy as code, API gateway, red teaming, UUID, JWT validation, randomizing object IDs, least privilege, data leaks, API security, how to prevent BOLA, secure API design, API access validation,  API security solutions, role-based access control</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/garland-moore" img="https://img.transistorcdn.com/CHUacNMhXacxR2Xc3QqJ0OjldqAX9c347OdH9h_8msM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYTIw/OTZlYjk0OTIxYjNi/OTlmODVlNTlkYTU0/NWEwMi5qcGVn.jpg">Garland Moore</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/60d6c833/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/60d6c833/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>MCP tools and AI risks: The case for slow, secure adoption</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>MCP tools and AI risks: The case for slow, secure adoption</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5646e015-b00f-4efd-97b7-fb2733cef68d</guid>
      <link>https://share.transistor.fm/s/d8dcc8be</link>
      <description>
        <![CDATA[<p>Remember when APIs were quiet little endpoints that waited politely for humans to click buttons? Yeah, that’s over. Now you’ve got swarms of LLM agents duct-taping tools together like caffeinated interns on Red Bull, firing off recursive calls at 3 a.m., and cheerfully melting your infrastructure while insisting everything is “working as intended.” Observability dashboards are screaming, rate limits are sobbing in the corner, and your security model still thinks it’s guarding humans instead of self-directed toolchains with the attention span of a squirrel and root access. Welcome to the new game: not keeping the stack up, but keeping it from eating itself.</p><p><br></p><p>In this episode of Pop Goes the Stack, F5's Lori MacVittie and returning guest Connor Hicks discuss the rapid adoption of MCP and the risks of going too fast without considering security, governance, and supply chain pitfalls. Listen now to take control of MCP tools and AI agents before they take over.</p><p><br></p><p>And after you've listened to the episode, check out our WebAssembly Unleashed podcast: <a href="https://youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj&amp;si=YZkHT7VeqfrANeZO">https://youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj&amp;si=YZkHT7VeqfrANeZO</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Remember when APIs were quiet little endpoints that waited politely for humans to click buttons? Yeah, that’s over. Now you’ve got swarms of LLM agents duct-taping tools together like caffeinated interns on Red Bull, firing off recursive calls at 3 a.m., and cheerfully melting your infrastructure while insisting everything is “working as intended.” Observability dashboards are screaming, rate limits are sobbing in the corner, and your security model still thinks it’s guarding humans instead of self-directed toolchains with the attention span of a squirrel and root access. Welcome to the new game: not keeping the stack up, but keeping it from eating itself.</p><p><br></p><p>In this episode of Pop Goes the Stack, F5's Lori MacVittie and returning guest Connor Hicks discuss the rapid adoption of MCP and the risks of going too fast without considering security, governance, and supply chain pitfalls. Listen now to take control of MCP tools and AI agents before they take over.</p><p><br></p><p>And after you've listened to the episode, check out our WebAssembly Unleashed podcast: <a href="https://youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj&amp;si=YZkHT7VeqfrANeZO">https://youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj&amp;si=YZkHT7VeqfrANeZO</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Nov 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/d8dcc8be/beb23f38.mp3" length="29842650" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1238</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Remember when APIs were quiet little endpoints that waited politely for humans to click buttons? Yeah, that’s over. Now you’ve got swarms of LLM agents duct-taping tools together like caffeinated interns on Red Bull, firing off recursive calls at 3 a.m., and cheerfully melting your infrastructure while insisting everything is “working as intended.” Observability dashboards are screaming, rate limits are sobbing in the corner, and your security model still thinks it’s guarding humans instead of self-directed toolchains with the attention span of a squirrel and root access. Welcome to the new game: not keeping the stack up, but keeping it from eating itself.</p><p><br></p><p>In this episode of Pop Goes the Stack, F5's Lori MacVittie and returning guest Connor Hicks discuss the rapid adoption of MCP and the risks of going too fast without considering security, governance, and supply chain pitfalls. Listen now to take control of MCP tools and AI agents before they take over.</p><p><br></p><p>And after you've listened to the episode, check out our WebAssembly Unleashed podcast: <a href="https://youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj&amp;si=YZkHT7VeqfrANeZO">https://youtube.com/playlist?list=PLyqga7AXMtPNV1zr2aTWEegep0FQU6Qvj&amp;si=YZkHT7VeqfrANeZO</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, MCP, AI agents, common gateway interface, supply chain security, enterprise security, governance, API tools, secure enterprise systems, Bespoke MCP endpoint, API endpoint, least privilege, GitHub, MCP server, API token, Model Context Protocol, security mindset, zero trust, zero trust mindset, OWASP, MCP tools, MCP security, AI governance, MCP enterprise adoption, MCP risks, agentic workflows, secure AI, MCP adoption risks, secure AI tool</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/connor-hicks" img="https://img.transistorcdn.com/_5bfiIXDLAYiQ0P9aS_5sRWuMvC1ePfxPVuVnO1nerU/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZjI5/ZmE0OGJjNGYzMzRk/YWFlZmJkZjdlZTE4/MmU5ZS5qcGVn.jpg">Connor Hicks</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d8dcc8be/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/d8dcc8be/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>LLM-as-a-Judge: Bias, Preference Leakage, and Reliability</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>LLM-as-a-Judge: Bias, Preference Leakage, and Reliability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2e67a493-a7d9-485e-8a20-24916035bc21</guid>
      <link>https://share.transistor.fm/s/50446d2f</link>
      <description>
        <![CDATA[<p>Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousin sit on their jury. The problem is called preference leakage. Li et al. nailed it in their paper “Preference Leakage: A Contamination Problem in LLM-as-a-Judge.” They found that when a model judges an output that looks like itself—same architecture, same training lineage, or same family—it tends to give a higher score. Not because the output is objectively better, but because it “feels familiar.” That’s not evaluation, that’s model nepotism. </p><p> </p><p>In this episode of<em> Pop Goes the Stack</em>, F5's Lori MacVittie, Joel Moses, and Ken Arora explore the concept of preference leakage in AI judgement systems. Tune in to understand the risks, the impact on the enterprise, and actionable strategies to improve model fairness, security, and reliability.</p><p>Read the paper, Preference Leakage: A contamination Problem in LLM-as-a-judge: <a href="https://arxiv.org/abs/2502.01534?utm_source=chatgpt.com">https://arxiv.org/abs/2502.01534?utm_source=chatgpt.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousin sit on their jury. The problem is called preference leakage. Li et al. nailed it in their paper “Preference Leakage: A Contamination Problem in LLM-as-a-Judge.” They found that when a model judges an output that looks like itself—same architecture, same training lineage, or same family—it tends to give a higher score. Not because the output is objectively better, but because it “feels familiar.” That’s not evaluation, that’s model nepotism. </p><p> </p><p>In this episode of<em> Pop Goes the Stack</em>, F5's Lori MacVittie, Joel Moses, and Ken Arora explore the concept of preference leakage in AI judgement systems. Tune in to understand the risks, the impact on the enterprise, and actionable strategies to improve model fairness, security, and reliability.</p><p>Read the paper, Preference Leakage: A contamination Problem in LLM-as-a-judge: <a href="https://arxiv.org/abs/2502.01534?utm_source=chatgpt.com">https://arxiv.org/abs/2502.01534?utm_source=chatgpt.com</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Nov 2025 04:00:00 -0800</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/50446d2f/c6b3fbc0.mp3" length="32122909" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1331</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousin sit on their jury. The problem is called preference leakage. Li et al. nailed it in their paper “Preference Leakage: A Contamination Problem in LLM-as-a-Judge.” They found that when a model judges an output that looks like itself—same architecture, same training lineage, or same family—it tends to give a higher score. Not because the output is objectively better, but because it “feels familiar.” That’s not evaluation, that’s model nepotism. </p><p> </p><p>In this episode of<em> Pop Goes the Stack</em>, F5's Lori MacVittie, Joel Moses, and Ken Arora explore the concept of preference leakage in AI judgement systems. Tune in to understand the risks, the impact on the enterprise, and actionable strategies to improve model fairness, security, and reliability.</p><p>Read the paper, Preference Leakage: A contamination Problem in LLM-as-a-judge: <a href="https://arxiv.org/abs/2502.01534?utm_source=chatgpt.com">https://arxiv.org/abs/2502.01534?utm_source=chatgpt.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, model output evaluation, LLM-as-a-judge, preference leakage, synthetic data, AI judgement systems, relatedness bias, hallucinations, data leakage, SLM, small language model, AI model bias, evaluating AI systems, large language model bias, judgment systems, synthetic data bias, AI evaluation tools, model family bias, red teaming AI models, improving AI accuracy, AI correctness, enterprise AI reliability, AI model evaluation techniques, LLM</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/ken-arora" img="https://img.transistorcdn.com/-BZXfCO8yAM9n1Gh_CBnMwdIinkJQpXAefBuWBFW4b4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDcx/ZWFhM2FlNmY0YjZm/NmJjOTUwYzhkOGYz/ODU5NC5qcGc.jpg">Ken Arora</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/50446d2f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/50446d2f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>We're on a brief hiatus, we'll be back soon</title>
      <itunes:title>We're on a brief hiatus, we'll be back soon</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">889ca5e8-1308-448d-b9b1-057999295df4</guid>
      <link>https://share.transistor.fm/s/ef78e090</link>
      <description>
        <![CDATA[<p>We’re on a brief hiatus. But don’t worry—we’ll be back shortly with more sharp insights, expert takes, and of course Lori's signature snark to help you navigate the ever-evolving world of application delivery and security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We’re on a brief hiatus. But don’t worry—we’ll be back shortly with more sharp insights, expert takes, and of course Lori's signature snark to help you navigate the ever-evolving world of application delivery and security.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Oct 2025 09:00:25 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/ef78e090/46219801.mp3" length="1033115" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>43</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We’re on a brief hiatus. But don’t worry—we’ll be back shortly with more sharp insights, expert takes, and of course Lori's signature snark to help you navigate the ever-evolving world of application delivery and security.</p>]]>
      </itunes:summary>
      <itunes:keywords> Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ef78e090/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Bots vs Business: AI Fraud &amp; Defending Your Margins</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Bots vs Business: AI Fraud &amp; Defending Your Margins</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e288ff0e-b671-4c6c-8e00-b6ac5842f59f</guid>
      <link>https://share.transistor.fm/s/77352983</link>
      <description>
        <![CDATA[<p>A North Carolina musician was arrested after using AI to generate fake bands and bots to stream their songs—racking up over a billion plays and pocketing $10 million in fraudulent royalties. It’s the first U.S. case of AI-driven music streaming fraud, and it’s less about music than it is about bots exploiting business models. </p><p><br></p><p>For enterprises, the lesson is simple: if you treat all traffic as legitimate, bots will eat your margins. With AI making bot behavior increasingly human-like, traditional defenses like packet filtering or basic behavior analysis are no longer enough.</p><p><br></p><p>In this episode, Lori MacVittie is joined by Principal Threat Researcher, Malcolm Heath, to dive into the challenges of defending against AI-driven bots, especially as tools and agentic AI make attacks more sophisticated. They uncover key strategies to identify and neutralize bots while exploring the evolving role of observability and behavioral detection in enterprise security.</p><p>Learn how you can stay ahead of the curve and keep your stack whole with additional insights on app security, multicloud, AI, and emerging tech:  <a href="https://www.f5.com/company/octo">https://www.f5.com/company/octo</a></p><p>Read more about the AI Music Fraud case: <a href="https://www.wired.com/story/ai-bots-streaming-music/?utm_source=chatgpt.com">https://www.wired.com/story/ai-bots-streaming-music/?utm_source=chatgpt.com</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>A North Carolina musician was arrested after using AI to generate fake bands and bots to stream their songs—racking up over a billion plays and pocketing $10 million in fraudulent royalties. It’s the first U.S. case of AI-driven music streaming fraud, and it’s less about music than it is about bots exploiting business models. </p><p><br></p><p>For enterprises, the lesson is simple: if you treat all traffic as legitimate, bots will eat your margins. With AI making bot behavior increasingly human-like, traditional defenses like packet filtering or basic behavior analysis are no longer enough.</p><p><br></p><p>In this episode, Lori MacVittie is joined by Principal Threat Researcher, Malcolm Heath, to dive into the challenges of defending against AI-driven bots, especially as tools and agentic AI make attacks more sophisticated. They uncover key strategies to identify and neutralize bots while exploring the evolving role of observability and behavioral detection in enterprise security.</p><p>Learn how you can stay ahead of the curve and keep your stack whole with additional insights on app security, multicloud, AI, and emerging tech:  <a href="https://www.f5.com/company/octo">https://www.f5.com/company/octo</a></p><p>Read more about the AI Music Fraud case: <a href="https://www.wired.com/story/ai-bots-streaming-music/?utm_source=chatgpt.com">https://www.wired.com/story/ai-bots-streaming-music/?utm_source=chatgpt.com</a> </p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Oct 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/77352983/7c965f2c.mp3" length="31573981" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1311</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>A North Carolina musician was arrested after using AI to generate fake bands and bots to stream their songs—racking up over a billion plays and pocketing $10 million in fraudulent royalties. It’s the first U.S. case of AI-driven music streaming fraud, and it’s less about music than it is about bots exploiting business models. </p><p><br></p><p>For enterprises, the lesson is simple: if you treat all traffic as legitimate, bots will eat your margins. With AI making bot behavior increasingly human-like, traditional defenses like packet filtering or basic behavior analysis are no longer enough.</p><p><br></p><p>In this episode, Lori MacVittie is joined by Principal Threat Researcher, Malcolm Heath, to dive into the challenges of defending against AI-driven bots, especially as tools and agentic AI make attacks more sophisticated. They uncover key strategies to identify and neutralize bots while exploring the evolving role of observability and behavioral detection in enterprise security.</p><p>Learn how you can stay ahead of the curve and keep your stack whole with additional insights on app security, multicloud, AI, and emerging tech:  <a href="https://www.f5.com/company/octo">https://www.f5.com/company/octo</a></p><p>Read more about the AI Music Fraud case: <a href="https://www.wired.com/story/ai-bots-streaming-music/?utm_source=chatgpt.com">https://www.wired.com/story/ai-bots-streaming-music/?utm_source=chatgpt.com</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, bot, AI security, AI bots, AI fraud, enterprise security, agentic AI, observability, bot defense, good bots vs bad bots, bot detection, traffic patterns, enterprise bot defense strategies, AI tool, agentic AI behavior, AI automation risks, traffic management, security signals, bot infrastructure, AI bot risks, AI bot behavior, enterprise security budget, business model, bot sophistication, data protection, AI agent, machine learning model, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/malcolm-heath" img="https://img.transistorcdn.com/fscUHB3eUDHg0-_0cTzh8WnK8PXshbk9T7tO4jMtPeY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGY4/MjE3YmRhNjY4NDdh/NmRjMDU1OWRkN2M3/NmIyYi5qcGVn.jpg">Malcolm Heath</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/77352983/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/77352983/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Crossing the streams</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Crossing the streams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c1434c7-cb6f-4383-9bb0-17297a75d28b</guid>
      <link>https://share.transistor.fm/s/135a4c9f</link>
      <description>
        <![CDATA[<p>Prompt injection isn't some new exotic hack. It’s what happens when you throw your admin console and your users into the same text box and pray the intern doesn’t find the keys to production. Vendors keep chanting about “guardrails” like it’s a Harry Potter spell, but let’s be real—if your entire security model is “please don’t say ignore previous instructions,” you’re not doing security, you’re doing improv. </p><p><br></p><p>So we're digging into what it actually takes to keep agentic AI from dumpster-diving its own system prompts: deterministic policy engines, mediated tool use, and maybe—just maybe—admitting that your LLM is not a CISO. Because at the end of the day, you can’t trust a probabilistic parrot to enforce your compliance framework. That’s how you end up with a fax machine defending against a DDoS—again.</p><p><br></p><p>The core premise here is that prompt injection is not actually injection, it's system prompt manipulation—but it's not a bug, it's by design. There's a GitHub repo full of system prompts extracted by folks and a number of articles on "exfiltration" of system prompts. Join F5's Lori MacVittie, Joel Moses, and Jason Williams as they explain why it's so easy, why it's hard to prevent, and possible mechanisms for constraining AI to minimize damage. Cause you can't stop it. At least not yet. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Prompt injection isn't some new exotic hack. It’s what happens when you throw your admin console and your users into the same text box and pray the intern doesn’t find the keys to production. Vendors keep chanting about “guardrails” like it’s a Harry Potter spell, but let’s be real—if your entire security model is “please don’t say ignore previous instructions,” you’re not doing security, you’re doing improv. </p><p><br></p><p>So we're digging into what it actually takes to keep agentic AI from dumpster-diving its own system prompts: deterministic policy engines, mediated tool use, and maybe—just maybe—admitting that your LLM is not a CISO. Because at the end of the day, you can’t trust a probabilistic parrot to enforce your compliance framework. That’s how you end up with a fax machine defending against a DDoS—again.</p><p><br></p><p>The core premise here is that prompt injection is not actually injection, it's system prompt manipulation—but it's not a bug, it's by design. There's a GitHub repo full of system prompts extracted by folks and a number of articles on "exfiltration" of system prompts. Join F5's Lori MacVittie, Joel Moses, and Jason Williams as they explain why it's so easy, why it's hard to prevent, and possible mechanisms for constraining AI to minimize damage. Cause you can't stop it. At least not yet. </p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Oct 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/135a4c9f/12c082cc.mp3" length="30137901" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1250</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Prompt injection isn't some new exotic hack. It’s what happens when you throw your admin console and your users into the same text box and pray the intern doesn’t find the keys to production. Vendors keep chanting about “guardrails” like it’s a Harry Potter spell, but let’s be real—if your entire security model is “please don’t say ignore previous instructions,” you’re not doing security, you’re doing improv. </p><p><br></p><p>So we're digging into what it actually takes to keep agentic AI from dumpster-diving its own system prompts: deterministic policy engines, mediated tool use, and maybe—just maybe—admitting that your LLM is not a CISO. Because at the end of the day, you can’t trust a probabilistic parrot to enforce your compliance framework. That’s how you end up with a fax machine defending against a DDoS—again.</p><p><br></p><p>The core premise here is that prompt injection is not actually injection, it's system prompt manipulation—but it's not a bug, it's by design. There's a GitHub repo full of system prompts extracted by folks and a number of articles on "exfiltration" of system prompts. Join F5's Lori MacVittie, Joel Moses, and Jason Williams as they explain why it's so easy, why it's hard to prevent, and possible mechanisms for constraining AI to minimize damage. Cause you can't stop it. At least not yet. </p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, system prompt, prompt injection, prompt manipulation, jailbreaking, agentic AI architecture, AI agents, MCP, defense in depth, prompt as policy, OWASP GenAI Top 10, natural language, function calling, AI guardrails, AI prompt injection, system prompt exfiltration, AI security risk, prompt injection examples, autonomous AI security, AI tools, securing genAI, AI systems architecture, system prompts in AI, AI linguistic manipulations, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/jason-williams" img="https://img.transistorcdn.com/nT-7S1Um6sKYtHfA5NbfnhlyNEq023wztZRxORewr_8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYzFm/NjNhMzI5ODYzYTJk/NzEyZDYzNGViOWRk/ZGZmOC5qcGVn.jpg">Jason Williams</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/135a4c9f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/135a4c9f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Agentic APIs Have PTSD</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Agentic APIs Have PTSD</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">caae4866-c9d0-47c2-beb7-6999015597c1</guid>
      <link>https://share.transistor.fm/s/78869fdf</link>
      <description>
        <![CDATA[<p>Your APIs were designed for humans and orderly machines: clean request, tidy response, stateless, rate-limited. Then along came agentic AI—recursive, stateful, jittery little things that retry forever, chain calls together, and dream up new query paths at 3 a.m.</p><p> </p><p>The result? Your APIs start looking less like infrastructure and more like trauma patients. Rate limits collapse. Monitoring floods. Security controls meant for human logins don’t make sense when the caller is a bot acting on its own intent. </p><p> </p><p>The punchline: enterprises aren’t serving users anymore, they’re serving swarms of other AIs. If you don’t rethink throttling, observability, and runtime policy, your endpoints are going to get steamrolled.</p><p> </p><p>Join host Lori MacVittie and F5 guest Connor Hicks to explore how enterprises can adapt and thrive—hit play now to future-proof your APIs! </p><p>Read AI Agentic workflows and Enterprise APIs: Adapting API architectures for the age of AI agents: <a href="https://arxiv.org/abs/2502.17443">https://arxiv.org/abs/2502.17443</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Your APIs were designed for humans and orderly machines: clean request, tidy response, stateless, rate-limited. Then along came agentic AI—recursive, stateful, jittery little things that retry forever, chain calls together, and dream up new query paths at 3 a.m.</p><p> </p><p>The result? Your APIs start looking less like infrastructure and more like trauma patients. Rate limits collapse. Monitoring floods. Security controls meant for human logins don’t make sense when the caller is a bot acting on its own intent. </p><p> </p><p>The punchline: enterprises aren’t serving users anymore, they’re serving swarms of other AIs. If you don’t rethink throttling, observability, and runtime policy, your endpoints are going to get steamrolled.</p><p> </p><p>Join host Lori MacVittie and F5 guest Connor Hicks to explore how enterprises can adapt and thrive—hit play now to future-proof your APIs! </p><p>Read AI Agentic workflows and Enterprise APIs: Adapting API architectures for the age of AI agents: <a href="https://arxiv.org/abs/2502.17443">https://arxiv.org/abs/2502.17443</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Sep 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/78869fdf/6db39bc1.mp3" length="32183746" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1337</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Your APIs were designed for humans and orderly machines: clean request, tidy response, stateless, rate-limited. Then along came agentic AI—recursive, stateful, jittery little things that retry forever, chain calls together, and dream up new query paths at 3 a.m.</p><p> </p><p>The result? Your APIs start looking less like infrastructure and more like trauma patients. Rate limits collapse. Monitoring floods. Security controls meant for human logins don’t make sense when the caller is a bot acting on its own intent. </p><p> </p><p>The punchline: enterprises aren’t serving users anymore, they’re serving swarms of other AIs. If you don’t rethink throttling, observability, and runtime policy, your endpoints are going to get steamrolled.</p><p> </p><p>Join host Lori MacVittie and F5 guest Connor Hicks to explore how enterprises can adapt and thrive—hit play now to future-proof your APIs! </p><p>Read AI Agentic workflows and Enterprise APIs: Adapting API architectures for the age of AI agents: <a href="https://arxiv.org/abs/2502.17443">https://arxiv.org/abs/2502.17443</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, GraphQL, AI agents and APIs, adapting enterprise APIs, non-deterministic API calls, API security for AI, MCP in AI workflows, agent query language, API access control problems, rewriting APIs for AI, enterprise AI integration, API scalability for agents, stateful vs stateless APIs, GraphQL for AI agents, AI agentic workflows, API patterns with AI, API architecture, AI tool restrictions, evolving enterprise API security, MCP, AuthN, AuthZ</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/connor-hicks" img="https://img.transistorcdn.com/_5bfiIXDLAYiQ0P9aS_5sRWuMvC1ePfxPVuVnO1nerU/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZjI5/ZmE0OGJjNGYzMzRk/YWFlZmJkZjdlZTE4/MmU5ZS5qcGVn.jpg">Connor Hicks</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/78869fdf/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/78869fdf/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>When Context Eats Your Architecture</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>When Context Eats Your Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a6a46f6-4e19-4702-a8a8-2c70ec990d74</guid>
      <link>https://share.transistor.fm/s/bd462b8a</link>
      <description>
        <![CDATA[<p>Anthropic lobbed a million-token grenade into the coding wars, and suddenly every AI startup with a “clever context management” pitch looks like it’s selling floppy disks in a cloud world. If your entire differentiator was “we chunk code better than the other guy,” congratulations—you’ve been chunked. This is what happens when the model itself shows up to the fight with a bigger backpack. </p><p> </p><p>But here’s the twist—this isn’t just about writing bigger code files without losing track of your variables. For enterprises, context size is an architectural shift. A million-token window means you can shove your entire compliance manual, last year’s customer interactions, and that dusty COBOL spec into one call—no brittle session stitching, no RAG duct tape. It collapses architectural complexity… and replaces it with new headaches: governance of massive payloads, cost blowouts if you treat tokens like they’re free, and rethinking model routing strategies. Context isn’t just memory anymore—it’s a first-class infrastructure decision. </p><p> </p><p>Press play to hear F5 hosts Lori MacVittie and Joel Moses, joined by special guest Vishal Murgai, unravel what's next for enterprise AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Anthropic lobbed a million-token grenade into the coding wars, and suddenly every AI startup with a “clever context management” pitch looks like it’s selling floppy disks in a cloud world. If your entire differentiator was “we chunk code better than the other guy,” congratulations—you’ve been chunked. This is what happens when the model itself shows up to the fight with a bigger backpack. </p><p> </p><p>But here’s the twist—this isn’t just about writing bigger code files without losing track of your variables. For enterprises, context size is an architectural shift. A million-token window means you can shove your entire compliance manual, last year’s customer interactions, and that dusty COBOL spec into one call—no brittle session stitching, no RAG duct tape. It collapses architectural complexity… and replaces it with new headaches: governance of massive payloads, cost blowouts if you treat tokens like they’re free, and rethinking model routing strategies. Context isn’t just memory anymore—it’s a first-class infrastructure decision. </p><p> </p><p>Press play to hear F5 hosts Lori MacVittie and Joel Moses, joined by special guest Vishal Murgai, unravel what's next for enterprise AI.</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Sep 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/bd462b8a/d9187ced.mp3" length="31924803" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1316</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Anthropic lobbed a million-token grenade into the coding wars, and suddenly every AI startup with a “clever context management” pitch looks like it’s selling floppy disks in a cloud world. If your entire differentiator was “we chunk code better than the other guy,” congratulations—you’ve been chunked. This is what happens when the model itself shows up to the fight with a bigger backpack. </p><p> </p><p>But here’s the twist—this isn’t just about writing bigger code files without losing track of your variables. For enterprises, context size is an architectural shift. A million-token window means you can shove your entire compliance manual, last year’s customer interactions, and that dusty COBOL spec into one call—no brittle session stitching, no RAG duct tape. It collapses architectural complexity… and replaces it with new headaches: governance of massive payloads, cost blowouts if you treat tokens like they’re free, and rethinking model routing strategies. Context isn’t just memory anymore—it’s a first-class infrastructure decision. </p><p> </p><p>Press play to hear F5 hosts Lori MacVittie and Joel Moses, joined by special guest Vishal Murgai, unravel what's next for enterprise AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, recency bias, RAG, Anthropic, tokens, context window, chunking, codebase, code generation, AI context window, token limits in AI, million-token model, AI application architecture, AI compliance risks, copilot, AI memory limitations, enterprise AI design, cross-document reasoning, token cost analysis, legacy code analysis with AI, large language model benefits, foundational AI models, competitive AI models, governance in AI, trajectory in AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/vishal-murgai" img="https://img.transistorcdn.com/ZEIITRg5oloPnxtkYnCJUMt_R-mqGKBWwNvrvlrFce0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lM2Yz/MjY3NDAyNDE0ZWRm/ZDk3M2JkZjdlMTc5/NWViMC5KUEVH.jpg">Vishal Murgai</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/bd462b8a/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/bd462b8a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The DPU Awakening: Silicon Muscle for AI Mayhem </title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>The DPU Awakening: Silicon Muscle for AI Mayhem </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab8fd9ce-3045-4eb3-8a4e-94ab17b769f6</guid>
      <link>https://share.transistor.fm/s/a2375f2f</link>
      <description>
        <![CDATA[<p>This week on <em>Pop Goes the Stack</em>, we crack open the next frontier of enterprise infrastructure: DPUs (Data Processing Units). AI factories aren’t just stressing your network—they’re setting it on fire. With east-west traffic exploding and inference storms growing by the day, CPUs and legacy firewalls just can’t keep up. Enter the DPU: purpose-built to offload, secure, and accelerate the chaos. </p><p> </p><p>We break down:</p><p>- Why AI workloads are crushing traditional networking and security architectures </p><p>- How DPUs deliver line-rate telemetry, policy enforcement, and microsegmentation </p><p>- Where companies like NVIDIA (BlueField-3), AMD (Pensando), Intel, Marvell, Fungible, Microsoft (Azure Boost), and Cisco (Hypershield) are racing to redefine infrastructure </p><p>- Why financial institutions, hospitals, and hyperscalers are already deploying DPUs at scale </p><p>- What this means for your observability, east-west controls, and AI agent governance </p><p> </p><p>The $5.5B DPU market isn’t a footnote—it’s a warning shot. If your stack isn’t built to segment, inspect, and enforce in real-time, it’s not ready for AI. And the next wave of agentic systems isn’t going to wait.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week on <em>Pop Goes the Stack</em>, we crack open the next frontier of enterprise infrastructure: DPUs (Data Processing Units). AI factories aren’t just stressing your network—they’re setting it on fire. With east-west traffic exploding and inference storms growing by the day, CPUs and legacy firewalls just can’t keep up. Enter the DPU: purpose-built to offload, secure, and accelerate the chaos. </p><p> </p><p>We break down:</p><p>- Why AI workloads are crushing traditional networking and security architectures </p><p>- How DPUs deliver line-rate telemetry, policy enforcement, and microsegmentation </p><p>- Where companies like NVIDIA (BlueField-3), AMD (Pensando), Intel, Marvell, Fungible, Microsoft (Azure Boost), and Cisco (Hypershield) are racing to redefine infrastructure </p><p>- Why financial institutions, hospitals, and hyperscalers are already deploying DPUs at scale </p><p>- What this means for your observability, east-west controls, and AI agent governance </p><p> </p><p>The $5.5B DPU market isn’t a footnote—it’s a warning shot. If your stack isn’t built to segment, inspect, and enforce in real-time, it’s not ready for AI. And the next wave of agentic systems isn’t going to wait.</p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Sep 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/a2375f2f/dfcc719a.mp3" length="32119019" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1332</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week on <em>Pop Goes the Stack</em>, we crack open the next frontier of enterprise infrastructure: DPUs (Data Processing Units). AI factories aren’t just stressing your network—they’re setting it on fire. With east-west traffic exploding and inference storms growing by the day, CPUs and legacy firewalls just can’t keep up. Enter the DPU: purpose-built to offload, secure, and accelerate the chaos. </p><p> </p><p>We break down:</p><p>- Why AI workloads are crushing traditional networking and security architectures </p><p>- How DPUs deliver line-rate telemetry, policy enforcement, and microsegmentation </p><p>- Where companies like NVIDIA (BlueField-3), AMD (Pensando), Intel, Marvell, Fungible, Microsoft (Azure Boost), and Cisco (Hypershield) are racing to redefine infrastructure </p><p>- Why financial institutions, hospitals, and hyperscalers are already deploying DPUs at scale </p><p>- What this means for your observability, east-west controls, and AI agent governance </p><p> </p><p>The $5.5B DPU market isn’t a footnote—it’s a warning shot. If your stack isn’t built to segment, inspect, and enforce in real-time, it’s not ready for AI. And the next wave of agentic systems isn’t going to wait.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, DPU, IPU, smartNIC, compute, compute complex, domain specific accelerator, data processing units, hyperscaler technology, DPU architecture, AI workload optimization, GPU offloading, smartNIC evolution, enterprise DPUs, microsegmentation use cases, DPU applications, DPU vs IPU, DPU fleet management, AI clusters, virtualization offload, enterprise adoption barriers, DPU market trends, scalable DPUs, AI Workloads, enterprise infrastructure</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/tim-michels" img="https://img.transistorcdn.com/CY08rxgnWohc7hSD7kllAtvqskyaPYK6bpGLXeZOSV0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YzM2/MjI3ODNhN2ExYzcw/NTkwNmEwOTUzMTZl/NzYyMC5qcGc.jpg">Tim Michels</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a2375f2f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/a2375f2f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Less small talk, more substance</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Less small talk, more substance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab688d93-1d60-4685-bcf6-9f9ccc14dadf</guid>
      <link>https://share.transistor.fm/s/84e0b748</link>
      <description>
        <![CDATA[<p>Everyone’s chasing generative AI for flash, but a quiet revolution is happening where the real money is: predictive AI. In this episode, F5's Lori MacVittie, Joel Moses, and Dmitry Kit dig into how a team of researchers used machine learning—not an LLM—to design a paint that passively cools buildings by up to 20 degrees. No prompts. No hallucinations. Just real-world impact through smart pattern recognition. Listen in as we unpack what this means for enterprise leaders chasing efficiency, and why your ops and sales teams should be looking for better recipes—not better word salad. It's not about generating magic. It's about discovering truth at scale.<br>  <br>Learn how you can stay ahead of the curve and keep your stack whole with additional insights on app security, multicloud, AI, and emerging tech:  https://www.f5.com/company/octo</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Everyone’s chasing generative AI for flash, but a quiet revolution is happening where the real money is: predictive AI. In this episode, F5's Lori MacVittie, Joel Moses, and Dmitry Kit dig into how a team of researchers used machine learning—not an LLM—to design a paint that passively cools buildings by up to 20 degrees. No prompts. No hallucinations. Just real-world impact through smart pattern recognition. Listen in as we unpack what this means for enterprise leaders chasing efficiency, and why your ops and sales teams should be looking for better recipes—not better word salad. It's not about generating magic. It's about discovering truth at scale.<br>  <br>Learn how you can stay ahead of the curve and keep your stack whole with additional insights on app security, multicloud, AI, and emerging tech:  https://www.f5.com/company/octo</p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Sep 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/84e0b748/292ca208.mp3" length="30329901" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1255</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Everyone’s chasing generative AI for flash, but a quiet revolution is happening where the real money is: predictive AI. In this episode, F5's Lori MacVittie, Joel Moses, and Dmitry Kit dig into how a team of researchers used machine learning—not an LLM—to design a paint that passively cools buildings by up to 20 degrees. No prompts. No hallucinations. Just real-world impact through smart pattern recognition. Listen in as we unpack what this means for enterprise leaders chasing efficiency, and why your ops and sales teams should be looking for better recipes—not better word salad. It's not about generating magic. It's about discovering truth at scale.<br>  <br>Learn how you can stay ahead of the curve and keep your stack whole with additional insights on app security, multicloud, AI, and emerging tech:  https://www.f5.com/company/octo</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI, generative AI, predictive AI, LLMs, large language model, artificial intelligence, generative adversarial network, GAN, neural network, forward simulation, back propagation, open source, Microsoft, MatterGen, pattern recognition, material science AI, data, chatbot, API, HTTP, AI agent, Agentic AI, cybersecurity, Apple silicon, MatterSim, anomaly detection, JSON, structured AI, IT security, LLMs vs GANs, reinforcement learning, NVIDIA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/dmitry-kit" img="https://img.transistorcdn.com/IV5Tydlu2nmbgvHtzYoAgGV-XEPGP77vWYsAXpsgNTI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOGMz/NDM5MmI1OGEzNTJk/MTMzODg0NTU0NDYz/MDE5Mi5wbmc.jpg">Dmitry Kit</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/84e0b748/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/84e0b748/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The perimeter has shifted</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>The perimeter has shifted</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bfecfe90-744b-42da-a101-05cb78366a57</guid>
      <link>https://share.transistor.fm/s/5c4f7102</link>
      <description>
        <![CDATA[<p>The perimeter isn’t where you left it. Agents are on the move, APIs are on fire, and your infrastructure is about as ready for this as a fax machine is for a DDoS. In this week's episode, Lori, Joel and F5 Field CISO, Chuck Herrin, are talking guardrails—real ones—for the age of agentic AI.</p><p> </p><p>Because while your dashboards were busy sipping metrics, the vendors got serious. Recent product launches show a clear pivot toward AI-specific defenses and infrastructure support like: an AI firewall, AI runtime protection, semantic observability, and AI policy and rule generation. </p><p> </p><p>Turns out, stateless APIs weren’t built for recursive agents with infinite retries and zero chill. If your architecture still thinks AI means ‘autocomplete,’ you’re going to want to tune in for actionable steps to stay ahead in an AI-dominated future. It’s not just about security. It’s survival. Let’s go. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The perimeter isn’t where you left it. Agents are on the move, APIs are on fire, and your infrastructure is about as ready for this as a fax machine is for a DDoS. In this week's episode, Lori, Joel and F5 Field CISO, Chuck Herrin, are talking guardrails—real ones—for the age of agentic AI.</p><p> </p><p>Because while your dashboards were busy sipping metrics, the vendors got serious. Recent product launches show a clear pivot toward AI-specific defenses and infrastructure support like: an AI firewall, AI runtime protection, semantic observability, and AI policy and rule generation. </p><p> </p><p>Turns out, stateless APIs weren’t built for recursive agents with infinite retries and zero chill. If your architecture still thinks AI means ‘autocomplete,’ you’re going to want to tune in for actionable steps to stay ahead in an AI-dominated future. It’s not just about security. It’s survival. Let’s go. </p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Sep 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/5c4f7102/5b9b89c3.mp3" length="37553850" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1558</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The perimeter isn’t where you left it. Agents are on the move, APIs are on fire, and your infrastructure is about as ready for this as a fax machine is for a DDoS. In this week's episode, Lori, Joel and F5 Field CISO, Chuck Herrin, are talking guardrails—real ones—for the age of agentic AI.</p><p> </p><p>Because while your dashboards were busy sipping metrics, the vendors got serious. Recent product launches show a clear pivot toward AI-specific defenses and infrastructure support like: an AI firewall, AI runtime protection, semantic observability, and AI policy and rule generation. </p><p> </p><p>Turns out, stateless APIs weren’t built for recursive agents with infinite retries and zero chill. If your architecture still thinks AI means ‘autocomplete,’ you’re going to want to tune in for actionable steps to stay ahead in an AI-dominated future. It’s not just about security. It’s survival. Let’s go. </p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI, AI security, agentic AI, API security, shifting security perimeter, AI-driven attacks, defending against AI threats, Layer 7 security, API vulnerabilities, Advanced threat defense, contextual security, zero trust, AI observability, AI observability tools, AI-assisted threat detection, red agents explained, AI-enhanced penetration testing, modern attack surface, DDoS, AI washing, SOC, CISO, building trust in AI systems, BlackHat, Akamai, cloudflare, crowdstrike, fastly, fortinet, imperva, nvidia, palo alto networks, servicenow, LLMs, ChatGPT</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/chuck-herrin" img="https://img.transistorcdn.com/TaAJ0XDnFYOj9sEg65ecSra-_GgX8hfs1fZaHK3KRHQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MmQw/MGIwNjdhMTRiNTcw/YTFlNDEzMzJiNGQ3/MmI3Mi5qcGVn.jpg">Chuck Herrin</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/5c4f7102/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/5c4f7102/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Joel: Who owns him?</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>AI Joel: Who owns him?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e8110dc0-8004-46f1-a1e7-9e85d61251ee</guid>
      <link>https://share.transistor.fm/s/7df685fc</link>
      <description>
        <![CDATA[<p>In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora delve into the complex issue of ownership with respect to your AI-driven digital twin. As organizations consider the use of AI avatars and AI twins, explore the nuances of employment contracts, intellectual property, and the potential for creating AI models based on an employee's data. The discussion ranges from corporate IP ownership to legal precedents from the entertainment industry, touching on futuristic concepts like posthumous digital replicas and their ethical implications. Tune in to find out how your everyday work data could be shaping the AI models of tomorrow and who owns the rights in this evolving landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora delve into the complex issue of ownership with respect to your AI-driven digital twin. As organizations consider the use of AI avatars and AI twins, explore the nuances of employment contracts, intellectual property, and the potential for creating AI models based on an employee's data. The discussion ranges from corporate IP ownership to legal precedents from the entertainment industry, touching on futuristic concepts like posthumous digital replicas and their ethical implications. Tune in to find out how your everyday work data could be shaping the AI models of tomorrow and who owns the rights in this evolving landscape.</p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Aug 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/7df685fc/67cc38f0.mp3" length="32985668" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1369</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora delve into the complex issue of ownership with respect to your AI-driven digital twin. As organizations consider the use of AI avatars and AI twins, explore the nuances of employment contracts, intellectual property, and the potential for creating AI models based on an employee's data. The discussion ranges from corporate IP ownership to legal precedents from the entertainment industry, touching on futuristic concepts like posthumous digital replicas and their ethical implications. Tune in to find out how your everyday work data could be shaping the AI models of tomorrow and who owns the rights in this evolving landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AI, Deepfakes, security, legal, digital twins, digital neuro twins, employment law, training models, AI avatar, IP, derivative IP, intellectual property, Impersonation, secure AI-model, privacy, synthetic data generation, reinforcement learning, machine learning, rule of 10, disclosure, copyright law, right to be forgotten, right to privacy, generative AI model, digital rights ownership, right of publicity, case law, Taylor Swift, Elvis Act, Steve Jobs, Copyright mickey mouse law, Darth Vader, Fortnite, right to your image, training data, quiet clause, training a model,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/ken-arora" img="https://img.transistorcdn.com/-BZXfCO8yAM9n1Gh_CBnMwdIinkJQpXAefBuWBFW4b4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDcx/ZWFhM2FlNmY0YjZm/NmJjOTUwYzhkOGYz/ODU5NC5qcGc.jpg">Ken Arora</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/7df685fc/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/7df685fc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Old is New Again: Bandwidth will be the AI bottleneck</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Old is New Again: Bandwidth will be the AI bottleneck</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3a4f53bd-0315-4f29-9450-4be0e4b8cc0a</guid>
      <link>https://share.transistor.fm/s/e6630013</link>
      <description>
        <![CDATA[<p>AI doesn't just chew up compute—it eats your network for breakfast. In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora dig into the pressing issues surrounding AI workloads and networking. Everyone's worried about GPUs and cooling, but nobody’s talking about the lateral east-west traffic explosion, the rise of inter-agent comms, or the operational strain on DCN fabric and interconnects. Our experts discuss the importance of upgrading data center networks to accommodate AI demands, examining the differences between training and inferencing workloads. The conversation also covers the necessity of high-performance networking, the relevance of latency, data gravity, and the potential expansion of data centers. Tune in to get valuable insights into the challenges and solutions shaping the future of AI-driven applications.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI doesn't just chew up compute—it eats your network for breakfast. In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora dig into the pressing issues surrounding AI workloads and networking. Everyone's worried about GPUs and cooling, but nobody’s talking about the lateral east-west traffic explosion, the rise of inter-agent comms, or the operational strain on DCN fabric and interconnects. Our experts discuss the importance of upgrading data center networks to accommodate AI demands, examining the differences between training and inferencing workloads. The conversation also covers the necessity of high-performance networking, the relevance of latency, data gravity, and the potential expansion of data centers. Tune in to get valuable insights into the challenges and solutions shaping the future of AI-driven applications.</p>]]>
      </content:encoded>
      <pubDate>Tue, 19 Aug 2025 04:00:00 -0700</pubDate>
      <author>F5</author>
      <enclosure url="https://media.transistor.fm/e6630013/15159a51.mp3" length="34823874" type="audio/mpeg"/>
      <itunes:author>F5</itunes:author>
      <itunes:duration>1432</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>AI doesn't just chew up compute—it eats your network for breakfast. In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora dig into the pressing issues surrounding AI workloads and networking. Everyone's worried about GPUs and cooling, but nobody’s talking about the lateral east-west traffic explosion, the rise of inter-agent comms, or the operational strain on DCN fabric and interconnects. Our experts discuss the importance of upgrading data center networks to accommodate AI demands, examining the differences between training and inferencing workloads. The conversation also covers the necessity of high-performance networking, the relevance of latency, data gravity, and the potential expansion of data centers. Tune in to get valuable insights into the challenges and solutions shaping the future of AI-driven applications.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, GPU, Network, DNS, Data Center, AI, AI Networking, Uptime, Black Friday, AI Traffic, Training, Inferencing, Model Training, Infrastructure, Latency, Bandwidth, vector databases, north-south traffic, IO, cluster, InfiniBand, TCP, AI Factory, AI agents, traffic patterns, edge, data gravity, AI workload, server load, object-stored databases, RAG, AI infrastructure, network infrastructure, CDN, monolithic data center, POPs, generative AI, security, agentic workflow, performance, LoRA, Low rank adaptation, east-west networking, access control, networking standard, ethernet network, AI Applications, data transfer, GenAI application, DCI bandwidth</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/ken-arora" img="https://img.transistorcdn.com/-BZXfCO8yAM9n1Gh_CBnMwdIinkJQpXAefBuWBFW4b4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDcx/ZWFhM2FlNmY0YjZm/NmJjOTUwYzhkOGYz/ODU5NC5qcGc.jpg">Ken Arora</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e6630013/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/e6630013/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Fine-tuning on a Budget</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Fine-tuning on a Budget</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7d7d91a4-5204-417c-a4b1-f140a439f169</guid>
      <link>https://share.transistor.fm/s/4953f169</link>
      <description>
        <![CDATA[<p>Big models, tight budgets? No problem. In this episode of Pop Goes the stack, hosts Lori MacVittie and Joel Moses talk with Dmitry Kit from F5's AI Center of Excellence about LoRA (Low-Rank Adaptation), the not-so-secret weapon for customizing LLMs without melting your GPU or your wallet. From role-specific agents to domain-aware behavior, we break down how LoRA lets you inject intelligence without retraining the entire brain. Whether you're building AI for IT ops, customer support, or anything in between, this is fine-tuning that actually scales. Learn about the benefits, risks, and practical applications of using LoRA to target specific model behavior, reduce latency, and optimize performance, all for under $1,000. Tune in to understand how LoRA can revolutionize your approach to AI and machine learning.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Big models, tight budgets? No problem. In this episode of Pop Goes the stack, hosts Lori MacVittie and Joel Moses talk with Dmitry Kit from F5's AI Center of Excellence about LoRA (Low-Rank Adaptation), the not-so-secret weapon for customizing LLMs without melting your GPU or your wallet. From role-specific agents to domain-aware behavior, we break down how LoRA lets you inject intelligence without retraining the entire brain. Whether you're building AI for IT ops, customer support, or anything in between, this is fine-tuning that actually scales. Learn about the benefits, risks, and practical applications of using LoRA to target specific model behavior, reduce latency, and optimize performance, all for under $1,000. Tune in to understand how LoRA can revolutionize your approach to AI and machine learning.</p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Aug 2025 04:00:00 -0700</pubDate>
      <author>Lori MacVittie</author>
      <enclosure url="https://media.transistor.fm/4953f169/4b21d12f.mp3" length="30283652" type="audio/mpeg"/>
      <itunes:author>Lori MacVittie</itunes:author>
      <itunes:duration>1253</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Big models, tight budgets? No problem. In this episode of Pop Goes the stack, hosts Lori MacVittie and Joel Moses talk with Dmitry Kit from F5's AI Center of Excellence about LoRA (Low-Rank Adaptation), the not-so-secret weapon for customizing LLMs without melting your GPU or your wallet. From role-specific agents to domain-aware behavior, we break down how LoRA lets you inject intelligence without retraining the entire brain. Whether you're building AI for IT ops, customer support, or anything in between, this is fine-tuning that actually scales. Learn about the benefits, risks, and practical applications of using LoRA to target specific model behavior, reduce latency, and optimize performance, all for under $1,000. Tune in to understand how LoRA can revolutionize your approach to AI and machine learning.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, LoRA, Low rank adaptation, LLM, GPU, training, fine tuning, full scale model, infrastructure, open source model, data, prompt engineering, large language model, behavior bias, network, weights, matrix, tokens, languages, model training, AI agent, agentic ops, IT ops, AI, machine learning, hyperscalers, regular expression, parameters, efficiency, caching memory, memory cost, latency, inference, adaptors, risk,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/dmitry-kit" img="https://img.transistorcdn.com/IV5Tydlu2nmbgvHtzYoAgGV-XEPGP77vWYsAXpsgNTI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOGMz/NDM5MmI1OGEzNTJk/MTMzODg0NTU0NDYz/MDE5Mi5wbmc.jpg">Dmitry Kit</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4953f169/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/4953f169/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Now Streaming: Your Status Updates</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Now Streaming: Your Status Updates</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2da844dd-7977-46f9-9401-61fc2583e655</guid>
      <link>https://share.transistor.fm/s/f795e96c</link>
      <description>
        <![CDATA[<p>Google decided what you really wanted wasn’t answers, it was a podcast about your question. In this episode of Pop Goes the Stack, Lori MacVittie, Joel Moses, and F5 Community Evangelist, Aubrey King, discuss Google's new Search Labs project featuring AI-generated audio overviews. They dive into the implications of this technology, the evolution of dashboards, and the potential of narrative-driven interfaces. The hosts explore how AI and voice interactions are shaping the future, despite the initial hiccups like a 40-second response time. Tune in to understand how narrative explanations might transform the way we interact with technology and data visualization.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Google decided what you really wanted wasn’t answers, it was a podcast about your question. In this episode of Pop Goes the Stack, Lori MacVittie, Joel Moses, and F5 Community Evangelist, Aubrey King, discuss Google's new Search Labs project featuring AI-generated audio overviews. They dive into the implications of this technology, the evolution of dashboards, and the potential of narrative-driven interfaces. The hosts explore how AI and voice interactions are shaping the future, despite the initial hiccups like a 40-second response time. Tune in to understand how narrative explanations might transform the way we interact with technology and data visualization.</p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Aug 2025 04:00:00 -0700</pubDate>
      <author>Lori MacVittie</author>
      <enclosure url="https://media.transistor.fm/f795e96c/0016ae09.mp3" length="31843106" type="audio/mpeg"/>
      <itunes:author>Lori MacVittie</itunes:author>
      <itunes:duration>1317</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Google decided what you really wanted wasn’t answers, it was a podcast about your question. In this episode of Pop Goes the Stack, Lori MacVittie, Joel Moses, and F5 Community Evangelist, Aubrey King, discuss Google's new Search Labs project featuring AI-generated audio overviews. They dive into the implications of this technology, the evolution of dashboards, and the potential of narrative-driven interfaces. The hosts explore how AI and voice interactions are shaping the future, despite the initial hiccups like a 40-second response time. Tune in to understand how narrative explanations might transform the way we interact with technology and data visualization.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, AIOps, Google, Podcast, AI, tech, data, data visualization, dashboard, AI integration, AI-generated, audio overview, narrative-driven interfaces, infrastructure, applications, APIs, Google search labs, AI technologies, learning styles, vibe code, latency, Nagios, observability, Star Trek, Open source, IRC, Slack, Discord, bots, multi-modal, agentic AI, alerts, notifications, AI features, search experience, user experience, search engine, auditory learning style, non-traditional learning,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://community.f5.com/users/aubreykingf5/173018" img="https://img.transistorcdn.com/RxZ-YMrGL3_bWCS0rLZR955cPtd2Y93qoe19t_1QBTQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDFm/N2QzMjhiNDBlY2Rj/YmExMDU4NTQ1NjYy/MzMwYy5qcGVn.jpg">Aubrey King</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f795e96c/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/f795e96c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Securing AI Agents: Tackling the Non-Human Identity Crisis</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Securing AI Agents: Tackling the Non-Human Identity Crisis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1ed2b351-758d-45af-8c27-dfa3bb2efe3e</guid>
      <link>https://share.transistor.fm/s/c6258f0a</link>
      <description>
        <![CDATA[<p>In this episode of 'Pop Goes the Stack,' host Lori MacVittie and co-host Joel Moses are joined by F5 Sr. Solution Architect Peter Scheffler to delve into the pressing issue of securing AI agents. The episode highlights emerging vulnerabilities as AI agents enter enterprise environments, especially in light of poor security practices like hard-coded credentials. They discuss the dynamic nature of agent identity and authorization protocols and propose potential solutions including ephemeral credentials and strict boundaries. Tune in to learn how AI agents are rewriting security rules and what you can do to protect your stack.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of 'Pop Goes the Stack,' host Lori MacVittie and co-host Joel Moses are joined by F5 Sr. Solution Architect Peter Scheffler to delve into the pressing issue of securing AI agents. The episode highlights emerging vulnerabilities as AI agents enter enterprise environments, especially in light of poor security practices like hard-coded credentials. They discuss the dynamic nature of agent identity and authorization protocols and propose potential solutions including ephemeral credentials and strict boundaries. Tune in to learn how AI agents are rewriting security rules and what you can do to protect your stack.</p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Jul 2025 04:00:00 -0700</pubDate>
      <author>Lori MacVittie</author>
      <enclosure url="https://media.transistor.fm/c6258f0a/1edd4faf.mp3" length="33595970" type="audio/mpeg"/>
      <itunes:author>Lori MacVittie</itunes:author>
      <itunes:duration>1390</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of 'Pop Goes the Stack,' host Lori MacVittie and co-host Joel Moses are joined by F5 Sr. Solution Architect Peter Scheffler to delve into the pressing issue of securing AI agents. The episode highlights emerging vulnerabilities as AI agents enter enterprise environments, especially in light of poor security practices like hard-coded credentials. They discuss the dynamic nature of agent identity and authorization protocols and propose potential solutions including ephemeral credentials and strict boundaries. Tune in to learn how AI agents are rewriting security rules and what you can do to protect your stack.</p>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, OCTO, Office of the CTO, Secure AI, AI Agent, Agentic AI, Security, Identity, Secrets Management, Security Challenges, Coding Practices, GitGuardian, Secrets, Credentials, Security Practices, Copilot, Scripts, Token Management, Prototype Code, Postman, NodeJS, String, Authentication, AI Systems, Code Generation, Model Context Protocol, MCP, API, API Keys, Agent-to-Agent, End User, LLM, Bash Scripts, Attacker, RAG, Agent Architectures, Role-based Access, Open Agent Protocol, OAuth, Privileged User Access, Shadow Agents, Secure Supply Chain, Software Supply Chain, PII, Security Stack, Emerging Tech</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/peter-scheffler" img="https://img.transistorcdn.com/2BC7OqLsLsQPVyR7CZlp4xsNjl7j_QLkOx0foEd3YCY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZDRl/MThjMmFkMTM0ZWEw/MWFlYTNjZTg5MGRk/MGY4NC5wbmc.jpg">Peter Scheffler</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/c6258f0a/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/c6258f0a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Chasing Logic Chains: Inference tracing </title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Chasing Logic Chains: Inference tracing </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">af40aa4a-ff94-4b8b-b255-da60ff50f940</guid>
      <link>https://share.transistor.fm/s/b35f78a5</link>
      <description>
        <![CDATA[<p>​Dive into the intricacies of AI observability and decision-making with host Lori MacVittie and special guest Chris Hain. Lori and Chris discuss Anthropic’s open-sourced circuit tracing Python library tool and recent studies analyzing the internal workings of large language models (LLMs) during inference. They explore the growing need for advanced observability tools and the operational challenges involved in managing AI systems. From AI's decision-making complexities to the future of semantic observability, this episode is a deep dive into the often chaotic world of emerging tech.</p><p> </p><p>Paper’s referenced in this episode:</p><ul><li><a href="https://transformer-circuits.pub/2025/attribution-graphs/biology.html">https://transformer-circuits.pub/2025/attribution-graphs/biology.html</a></li><li><a href="https://www.anthropic.com/research/agentic-misalignment">https://www.anthropic.com/research/agentic-misalignment</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>​Dive into the intricacies of AI observability and decision-making with host Lori MacVittie and special guest Chris Hain. Lori and Chris discuss Anthropic’s open-sourced circuit tracing Python library tool and recent studies analyzing the internal workings of large language models (LLMs) during inference. They explore the growing need for advanced observability tools and the operational challenges involved in managing AI systems. From AI's decision-making complexities to the future of semantic observability, this episode is a deep dive into the often chaotic world of emerging tech.</p><p> </p><p>Paper’s referenced in this episode:</p><ul><li><a href="https://transformer-circuits.pub/2025/attribution-graphs/biology.html">https://transformer-circuits.pub/2025/attribution-graphs/biology.html</a></li><li><a href="https://www.anthropic.com/research/agentic-misalignment">https://www.anthropic.com/research/agentic-misalignment</a></li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 22 Jul 2025 04:00:00 -0700</pubDate>
      <author>Lori MacVittie</author>
      <enclosure url="https://media.transistor.fm/b35f78a5/aee750c2.mp3" length="31068490" type="audio/mpeg"/>
      <itunes:author>Lori MacVittie</itunes:author>
      <itunes:duration>1291</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>​Dive into the intricacies of AI observability and decision-making with host Lori MacVittie and special guest Chris Hain. Lori and Chris discuss Anthropic’s open-sourced circuit tracing Python library tool and recent studies analyzing the internal workings of large language models (LLMs) during inference. They explore the growing need for advanced observability tools and the operational challenges involved in managing AI systems. From AI's decision-making complexities to the future of semantic observability, this episode is a deep dive into the often chaotic world of emerging tech.</p><p> </p><p>Paper’s referenced in this episode:</p><ul><li><a href="https://transformer-circuits.pub/2025/attribution-graphs/biology.html">https://transformer-circuits.pub/2025/attribution-graphs/biology.html</a></li><li><a href="https://www.anthropic.com/research/agentic-misalignment">https://www.anthropic.com/research/agentic-misalignment</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Pop Goes the Stack, F5, NGINX, Office of the CTO, OCTO, Logic Chains, Inference Tracing, Observability, Neural Networks, AI, Anthropic, Open-source, Circuit Tracing, Python, Large Language Models, LLM, Operations, Operational Challenges, AI Systems, Semantic Observability, Emerging Tech, AI Model, Jailbreak, Jailbreaking, Token, AI Observability, Ball of Fire</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/chris-hain" img="https://img.transistorcdn.com/P-5gK8O6DqMm-Iyyh-wWE7Jrr0qg2J86rdkFxS5rqzI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YzIz/YzFlZTM1YzU3ZjVi/YzRkODkxZDM2Nzcx/YmRhZi5qcGVn.jpg">Chris Hain</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b35f78a5/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b35f78a5/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b35f78a5/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b35f78a5/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/b35f78a5/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/b35f78a5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Attacks: The App Security Arms Race</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>AI Attacks: The App Security Arms Race</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0da78118-03f4-41c7-a74a-d9ce5d158e28</guid>
      <link>https://share.transistor.fm/s/d7e80292</link>
      <description>
        <![CDATA[<p>Hosts Lori MacVittie and Joel Moses are joined by F5’s Field CISO Chuck Herrin to dive deep into the implications of artificial intelligence on cybersecurity. They analyze the surge in AI-driven attacks, the challenges of defending against them, and the crucial role of fundamentals and observability in modern application security strategies. Learn about the democratization of AI, the evolution of intelligent threat vectors, and the importance of integrating AI native defense in your security stack. Don't miss their insights on preparing for the future landscape of cyber threats. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hosts Lori MacVittie and Joel Moses are joined by F5’s Field CISO Chuck Herrin to dive deep into the implications of artificial intelligence on cybersecurity. They analyze the surge in AI-driven attacks, the challenges of defending against them, and the crucial role of fundamentals and observability in modern application security strategies. Learn about the democratization of AI, the evolution of intelligent threat vectors, and the importance of integrating AI native defense in your security stack. Don't miss their insights on preparing for the future landscape of cyber threats. </p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Jul 2025 04:00:00 -0700</pubDate>
      <author>Lori MacVittie</author>
      <enclosure url="https://media.transistor.fm/d7e80292/9417fca2.mp3" length="38899044" type="audio/mpeg"/>
      <itunes:author>Lori MacVittie</itunes:author>
      <itunes:duration>1610</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Hosts Lori MacVittie and Joel Moses are joined by F5’s Field CISO Chuck Herrin to dive deep into the implications of artificial intelligence on cybersecurity. They analyze the surge in AI-driven attacks, the challenges of defending against them, and the crucial role of fundamentals and observability in modern application security strategies. Learn about the democratization of AI, the evolution of intelligent threat vectors, and the importance of integrating AI native defense in your security stack. Don't miss their insights on preparing for the future landscape of cyber threats. </p>]]>
      </itunes:summary>
      <itunes:keywords>AI, Multimodal AI, Application Delivery, Application Security, Pop Goes the Stack, F5, OCTO, Office of the CTO, AI, AI Attacks, App Security, Security, CISO, Artificial Intelligence, Cybersecurity, Observability, Modern Application, Security Strategies, Threat Vector, Security Stack, Cyber Threats, Phishing, Social Engineering, AI in Web, Multimodal, Emerging Tech, Kill Chain, AI Models, Attack Vector, Threat Actors, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://PopGoesTheStack.transistor.fm/people/chuck-herrin" img="https://img.transistorcdn.com/TaAJ0XDnFYOj9sEg65ecSra-_GgX8hfs1fZaHK3KRHQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MmQw/MGIwNjdhMTRiNTcw/YTFlNDEzMzJiNGQ3/MmI3Mi5qcGVn.jpg">Chuck Herrin</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/d7e80292/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Multimodal Madness: The Darth Vader Debacle</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Multimodal Madness: The Darth Vader Debacle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">97e361b6-3fed-4d9a-bfa5-4f475aa46d62</guid>
      <link>https://share.transistor.fm/s/29937d8e</link>
      <description>
        <![CDATA[<p>In our inaugural episode of Pop Goes the Stack, Lori MacVittie and occasional co-host, Joel Moses, dive into the wild world of multimodal AI with guest Aubrey King. They discuss Fortnite's fascinating yet problematic AI-powered Darth Vader, a multimodal NPC driven by Google’s Gemini 2.0 Flash and ElevenLabs’ Flash v2.5, highlighting the technical mishaps and security pitfalls. The conversation explores the unique risks of multimodal AI in application delivery, where voice and text inputs create complex attack surfaces compared to traditional prompt injection vulnerabilities. Tune in for a blend of tech insights and entertaining anecdotes that reveal the lessons developers and companies can learn to avoid similar issues in the future when deploying cutting-edge AI technology.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In our inaugural episode of Pop Goes the Stack, Lori MacVittie and occasional co-host, Joel Moses, dive into the wild world of multimodal AI with guest Aubrey King. They discuss Fortnite's fascinating yet problematic AI-powered Darth Vader, a multimodal NPC driven by Google’s Gemini 2.0 Flash and ElevenLabs’ Flash v2.5, highlighting the technical mishaps and security pitfalls. The conversation explores the unique risks of multimodal AI in application delivery, where voice and text inputs create complex attack surfaces compared to traditional prompt injection vulnerabilities. Tune in for a blend of tech insights and entertaining anecdotes that reveal the lessons developers and companies can learn to avoid similar issues in the future when deploying cutting-edge AI technology.</p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Jul 2025 04:00:00 -0700</pubDate>
      <author>Lori MacVittie</author>
      <enclosure url="https://media.transistor.fm/29937d8e/3485d616.mp3" length="34285160" type="audio/mpeg"/>
      <itunes:author>Lori MacVittie</itunes:author>
      <itunes:duration>1420</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In our inaugural episode of Pop Goes the Stack, Lori MacVittie and occasional co-host, Joel Moses, dive into the wild world of multimodal AI with guest Aubrey King. They discuss Fortnite's fascinating yet problematic AI-powered Darth Vader, a multimodal NPC driven by Google’s Gemini 2.0 Flash and ElevenLabs’ Flash v2.5, highlighting the technical mishaps and security pitfalls. The conversation explores the unique risks of multimodal AI in application delivery, where voice and text inputs create complex attack surfaces compared to traditional prompt injection vulnerabilities. Tune in for a blend of tech insights and entertaining anecdotes that reveal the lessons developers and companies can learn to avoid similar issues in the future when deploying cutting-edge AI technology.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI, Multimodal AI, Pop Goes the Stack, F5, OCTO, Office of the CTO, Multimodal, Darth Vader, AI, Fortnite, Google, Gemini 2.0, ElevenLabs, Flash, Application Delivery, Application Security, Attack Surface, Prompt Injection, James Earl Jones, AI Security, Emerging Tech, Security Stack, Infrastructure, Tokens, Conversational AI, NPC,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/lori-macvittie" img="https://img.transistorcdn.com/_ESxPGDBQznCn2dLexex2YUy9wN5evJAPa5xjd-Jdkw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmEx/OTJlNmU1NGVhMTAy/MzdiN2FlNDAwYmQ4/YWYyMy5qcGVn.jpg">Lori MacVittie</podcast:person>
      <podcast:person role="Host" href="https://PopGoesTheStack.transistor.fm/people/joel-moses" img="https://img.transistorcdn.com/8mXu4ImJQVVmI41Vb9RO_v5uACbCZ7jqVDZB5lpoqn0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDAy/MWY1OGQ4MzI0MGRl/MzhhNjliM2U3MGQx/NDljZi5wbmc.jpg">Joel Moses</podcast:person>
      <podcast:person role="Guest" href="https://community.f5.com/users/aubreykingf5/173018" img="https://img.transistorcdn.com/RxZ-YMrGL3_bWCS0rLZR955cPtd2Y93qoe19t_1QBTQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDFm/N2QzMjhiNDBlY2Rj/YmExMDU4NTQ1NjYy/MzMwYy5qcGVn.jpg">Aubrey King</podcast:person>
      <podcast:person role="Producer" href="https://PopGoesTheStack.transistor.fm/people/tabitha-r-r-powell" img="https://img.transistorcdn.com/DFmoEfnbIi-va5phdrGq59DSA_8CTv9jAPu8m5DjzpM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2M3/MzlhMGM4MTQzOGE3/YTcwMzE3MmNjNGIw/ZmJkZS5wbmc.jpg">Tabitha R.R. Powell</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/29937d8e/chapters.json" type="application/json+chapters"/>
    </item>
  </channel>
</rss>
