189 episodes

Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology.

Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution.

People
Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform public sector work in an era of rapid disruption, including overcoming the security and scalability challenges of the remote work explosion.

Processes
Building an innovative IT organization in the public sector starts with developing the right processes to evolve your information management capabilities. Find out how to boost your organization to the next level of data-driven innovation.

Technologies
From the data center to the cloud, transforming public sector IT infrastructure depends on having the right technology solutions in place. Sift through confusing messages and conflicting technologies to find the true lasting drivers of value for IT organizations.

Embracing Digital Transformation Darren Pulsipher

    • Technology
    • 5.0 • 10 Ratings

Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology.

Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution.

People
Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform public sector work in an era of rapid disruption, including overcoming the security and scalability challenges of the remote work explosion.

Processes
Building an innovative IT organization in the public sector starts with developing the right processes to evolve your information management capabilities. Find out how to boost your organization to the next level of data-driven innovation.

Technologies
From the data center to the cloud, transforming public sector IT infrastructure depends on having the right technology solutions in place. Sift through confusing messages and conflicting technologies to find the true lasting drivers of value for IT organizations.

    #192 Understanding Identity in Zero Trust

    #192 Understanding Identity in Zero Trust

    In this episode, Darren interviews Jeff Reich, executive director of the Identity Defined Security Alliance, about the role Identity plays in Zero-Trust Architectures and in our digital world.
    In today's digital age, identity is evolving far beyond personal recognition or physical items. Digital identity extends to non-human and inanimate entities like our smartphones, cars, and even the software we use daily. In this post, we'll delve into the complexities of identity in technology, drawing insights from identity specialist Jeff Reich.

     The Intersection of Identity and Technology: A New Perspective 

    Surprisingly, gadgets like smartphones and modern vehicles have identities independent of us, tied to them rather than their user. This becomes apparent when you consider replacing your aging smartphone; the stored identities do not shift to your new device—they remain embedded in the old one. Consider your car, which houses a slew of sensors and performance-monitoring applications. It essentially has an 'identity' that prompts specific actions, such as diagnostic tests, regardless of the vehicle's owner. It becomes evident how identity extends beyond the bounds of living beings, embedding itself into the cores of our daily devices.

     Identity in the Software Realm

    In the world of software development, establishing identity is critical for many reasons. Software identity often manifests as a digital rights management system or signature, which provides context and individuality to the product. This identity is essential for ensuring that the software is genuine, authentic, and has not been tampered with. It contains vital information such as the time of creation, compilation, and packaging, which are crucial to trace the origin and authenticate the software. 

    Moreover, software identity plays a pivotal role in digital security. It is used to protect software from piracy and unauthorized use, ensuring that only authorized users have access to it. It also helps in identifying and tracking malicious software, such as viruses, malware, and spyware, which can harm the system and steal sensitive information. By establishing software identity, companies can ensure the software's integrity, safeguard their intellectual property, and protect their customers from cyber threats.

     The Role of Digital Identity in Emerging Trends 

    The trend of non-fungible tokens (NFTs) is rapidly gaining popularity, as it offers an innovative solution that recognizes the significance of digital identity. NFTs are unique digital tokens that confirm the identity of a particular digital transaction. Each NFT is distinct from other tokens, and it is not interchangeable with any other token. This uniqueness of NFTs is the reason they are called non-fungible tokens. 

    The value proposition of NFTs is the unique digital identity associated with each token. This digital identity is recorded on a blockchain, which is a decentralized and distributed public ledger that records transactions between parties. The blockchain technology reinforces the digital identity of NFTs, making them tamper-proof and secure. In addition, the unique digital identity associated with NFTs is what makes them valuable. The value of a particular NFT depends on its scarcity and the demand for it. In conclusion, the digital identity of NFTs is key to their value proposition and underpins their blockchain technology.

     Beyond Human: Expansion of Identity Recognition

    As we move further into the digital age, our understanding of identity is becoming more complex and multi-faceted. Our personal identities are no longer limited to just physical attributes like our name, date of birth, and address. They now include digital footprints, social media profiles, and other online activity that we engage in. Moreover, the concept of identity is no longer restricted to individuals alone. It also extends to the vast domain of digital and non-human entities that we interact with daily, such

    • 33 min
    #191 Digital Transformation for the C-Suite

    #191 Digital Transformation for the C-Suite

    Welcome to our latest podcast episode where we discuss the importance of embracing digital transformation. Our guest expert, Leilani Bloomquist, shares her insights on how organizations can better manage the process. Join us as we explore the different facets of digital transformation and provide a comprehensive overview of the journey.
     The Integral Role of Leadership

    Adapting to digital transformation requires strong leadership and complete buy-in from the C-suite. Leilani draws from her experience transitioning from a traditional marketing project manager to a digital-focused role. Essentially, it's about applying traditional management skills—tracking timelines, assigning roles, overseeing deliverables—but with an added focus on how technology impacts the organization's workings, which she terms as a crucial facet of digital project management.

    The early buy-in of leaders is invaluable because they shape the technology's role and potential future uses within the organization. By actively participating in the adoption process, they provide a reassuring presence to the team members and help cultivate a culture of technological adaptability within the organization. Just

     Going Beyond Tools

    Digital transformation extends beyond integrating advanced tools into the workplace. Indeed, for Leilani, it also involves meeting customers where they are and providing them with a personalized experience. Successfully marrying people skills with technology goes a long way in helping companies adapt to change and grow seamlessly.

    The most significant hurdle to this change is the company's success, which makes them question the need to alter established procedures and systems. However, companies that proactively invest in transformation during their successful phases tend to stay ahead in the increasingly competitive market.

     Anticipating Change – A Constant in Business

    The critical takeaway from Leilani's discourse is that digital transformation is not merely about adopting innovative technologies. Instead, it is about successfully integrating people, processes, and technology. To keep up with the rapidly evolving digital landscape, businesses need to foster a culture that embraces change and prioritizes clear communication.

    Leilani's experience-rich insight sheds light on how companies can anticipate change as a constant in business. For businesses to thrive amidst constant transformation, they must value flexibility, strong leadership, and strategic planning. These factors, coupled with a focus on operational efficiency and customer engagement, would help them navigate the digital journey successfully.

    • 33 min
    #190 Product Security Assurance

    #190 Product Security Assurance

    In this episode Darren interviews Jerry Bryan Sr. Director of Product Assurance at Intel and fellow podcaster of Chips and Salsa. They discover the Zero Trust aspects of Product assurance for a silicon manufacturer. 
    Product assurance is integral to digital security, especially within the silicon industry. Internationally renowned technology giant Intel is setting the bar high in this domain. Intel has taken a comprehensive approach to product assurance, striking an effective balance between proactive security measures and reactive mitigation strategies.

     Laying the Foundation of Security in Technology

    Product assurance at Intel starts with embedding a security-first mindset across the organization. The objective is to equip Intel's engineers to understand a hacker's outlook and approach. This is achieved through extensive training and events. Simultaneously, the organization applies a diligent security development lifecycle. This proactive measure ensures potential security weaknesses are identified and resolved.

    Equally important is Intel's widespread commitment to product assurance, which goes beyond the product development phase. The firm has established a product security incident response team (PSIRT). The team is tasked with managing vulnerability reports, developing quick mitigations, and facilitating the prompt delivery of security updates to customers when vulnerabilities surface post-product launch.

     Investing in Offensive Security Research

    Supporting its commitment to product assurance, Intel has established an 'offensive security research team' that boasts more than 80 hardware security researchers worldwide. The team proactively identifies potential vulnerabilities in existing and under-development products, thereby setting a robust and forward-facing outlook toward product security at Intel.

     The Power of Crowd-Sourced Security: Intel's Bug Bounty Program

    Intel has also acknowledged the power of crowd-sourced cybersecurity efforts through its Bugs Bounty program. Incentivizing external security researchers to report potential vulnerabilities has been a strategic decision. In 2023 alone, more than 246 researchers have participated in the initiative. 

     Initiative towards Hardware Hacking: Project Circuit Breaker 

    Intel has launched the Project Circuit Breaker initiative to secure its product line further. This project focuses on training researchers on hacking hardware. Taking more scrutiny of their products through these eyes aligns with Intel’s long-term strategic goals in product assurance.

     The Assurance to End User

    Intel aims to provide more than just products to its consumers; it offers assurance of security. This assurance is significantly valuable in today's global environment, which is increasingly dependent on digital solutions. With Intel’s comprehensive approach to product security assurance, users can feel confident that their Intel-powered devices are diligently designed to defend against security threats.

    An independent study by ABI Research substantiates Intel’s claim to leadership in the product security assurance field within the silicon industry. Intel CEO Pat Gelsinger expressed confidence in Intel's product security assurance approach, implying it is valuable for other silicon vendors.

    Intel's exhaustive efforts to protect its digital products offer significant assurance in today's uncertain digital landscape. It provides a robust assertion that Intel's hardware and firmware are designed with meticulous care to repel any security threats, making Intel a trustworthy choice in an environment that grows more reliant on digital solutions every day.

    • 33 min
    #189 Parallel Works AI Workload Automation

    #189 Parallel Works AI Workload Automation

    In a data-driven world where technology is king, a lively discussion unfolding between Darren Pulsipher, host of Embracing Digital Transformation, and Matthew Shaxted, president of Parallel Works, navigated their way through the captivating sphere of High-Performance Computing (HPC) and its monumental role in machine learning and AI. 
    This episode delicately examines this rapidly advancing field, shedding light on its profound influence on our lives. Amid their discourse, two main areas were markedly central - the evolution of HPC, presenting its potential efficiencies and challenges, and the company Parallel Works, born out of a profound need to democratize industry-specific workloads using high-performance computing models.

     The Evolution of High-Performance Computing

    In the last ten years, high-performance computing (HPC) has undergone a significant transformation. Shaxted highlights that current technology allows us to fit almost five times more cores on a single chip than we could a decade ago. Each core represents a distinct processing unit capable of functioning independently of the other cores. This results in a significant surge in performance power, providing an affordable and efficient execution methodology that was previously only possible through high-cost supercomputing.

    Although there have been significant advancements in the field of high-performance computing (HPC), setting up and configuring advanced HPC clusters is still an extremely difficult task. The challenge is not only limited to the hardware aspect, but it also includes the complex process of task setup. This requires a detailed knowledge of parallel computing, which adds to the steep learning curve.

     Democratizing HPC with Parallel Works

    Shaxted and his co-founder, Mike Wild, had a vision to revolutionize the High-Performance Computing (HPC) industry, and they set out to achieve it by creating Parallel Works. The idea behind Parallel Works was to democratize industry-specific workloads and make them accessible on a commercial scale. The primary objective of Parallel Works was to simplify the HPC process and make it more user-friendly. 

    This initiative aims to simplify the computational complexities of High-Performance Computing (HPC) for professionals in different industries. Its goal is to make this technology and its numerous advantages accessible to as many people as possible, regardless of their computing background. By doing so, it will significantly reduce the learning curve and make it easier for more people to benefit from HPC.

     The Future of HPC

    After the conversation between Shaxted and Pulsipher concluded, it was clear that HPC (High-Performance Computing) has a bright future ahead. HPC can significantly improve computational speed, provide access to advanced technologies and support the development of innovative solutions in machine learning and AI.

    Echoing this thought, Shaxted acknowledges the ever-evolving role of HPC and its potential to drive innovation. It remains a crucial component for pioneering solutions, paving the way towards a more efficient and intelligent future.

    Businesses and industries can benefit greatly from the integration of high-performance computing, as they ride the wave of digital transformation. This approach is considered the way forward by Pulsipher and Shaxted, as it provides the necessary computational boost to data-intensive industries, and also democratizes access for all.

    • 35 min
    #188 Surveying Black Swan Events with Digital Transformation

    #188 Surveying Black Swan Events with Digital Transformation

    Darren interviews Dan Berges about his journey through the COVID-19 pandemic to transform the Berges Institute, a Spanish language school in New York City. Despite initial challenges, the shift reshaped work dynamics, broadened their global reach, and highlighted the importance of understanding business processes and coding for successful digital transformation.
    In an era of rapid technological advancements, digital transformation no longer remains a luxury; it's now a necessity to ensure business continuity. A testament to this reality is the story of the Berges Institute, a Spanish language school for adults located in the heart of New York City.

     Swift Pivot to Online Learning

    With the onset of the COVID-19 pandemic, the need for a rapid transition from traditional to online classes became imminent. Leveraging their digital infrastructure, Berges Institute managed to make this shift seamlessly within a time span of two days.

    Influenced by the precautionary measures and social distancing rules, nearly 70% of students had already begun taking online courses. However, the decision to completely close in-person classes in cities like New York and Chicago was both a challenging and game-changing turning point for the establishment. Despite fears of losing students due to the lack of in-person interaction, the majority remained steadfast and loyal to the online program.

     Reshaping Work Dynamics and Broadening Reach 

    One of the positive aspects of this dramatic transition is the reshaping of work dynamics. Berges Institute's education providers were given the flexibility to teach from their homes or even from across the world. This new operational mode was positively embraced by the teaching staff, resulting in an improvement in performance and overall work satisfaction.

    Simultaneously, the shift to online classes introduced Berges Institute to a broader demographic. No longer limited by the geographic bounds of the United States, they now had the opportunity to tap into various English speaking markets globally. They have reached out to students in Europe, Australia, Canada, India, and the Emirates, thereby expanding their influence as a renowned Language institute.

     Understanding Business Processes and Coding

    Despite the successful transition, the road to digital transformation was not devoid of challenges. Operating a code base as a small business was seen as a significant hurdle. The founder and managing director of Berges Institute, Dan Berges, emphasized the need for business owners to possess at least a basic understanding of coding and programming. 

    By investing time to understand the business's processes prior to jumping into the coding phase, businesses can ensure that the code base created is maintainable. Building a strong relationship with developers who profoundly understand your business logic is indispensable during this process.

     Adapting Business Workflows for Digital Structure

    The key takeaway from the Berges Institute's digital transformation story is the importance of adapting existing business workflows to complement your impending digital structure. It's vital to understand that a traditional business model can't always be translated accurately into a digital platform.

    In conclusion, the navigation journey from brick and mortar to online business may initially seem daunting. But with the right tools, mindset, and understanding of your business's core processes, a successful digital transition is certainly achievable. As Berges Institute has demonstrated, embracing digital transformation is more than just a survival strategy — it's a path to growth and expansion in today's digital era.

    • 22 min
    #187 GenAI RAG Details

    #187 GenAI RAG Details

    In part two of his interview with Eduardo Alvarez, Darren explores the use of GenAI LLMs and RAG (Retrieval Augmentation Generation) techniques to help organizations leverage the latest advancements in AI quickly and cost-effectively.
     Leveraging Language Model Chains

    In a landscape where accessible technologies are ubiquitous, operational efficiency sets an application apart. Be that as it may, handling an assortment of tasks with a single language model does not always yield optimal results, bringing us to the Language Model (LM) chains concept. 

    LM chains involve the integration of several models working simultaneously in a pipeline to improve user interaction with an application. Just as every task demands an integrating approach, every segment of your application may perform best with an individualized language model. Indeed, there's no one-size-fits-all policy when it comes to language models. Several real-world implementations are already capitalizing on the strength of multiple LMs working in harmony. 

     System Optimization and Data Veracity

    The holistic optimization of the system is an integral part of leveraging LM chains. Everything from choosing the perfect moment to deploy a large language model to selecting the ideal architecture for computing forms an essential part of this process. The right decisions can dramatically bolster system performance and improve operational efficiency.

    Integrating multiple models also opens novel avenues for research and development, particularly around data veracity within such setups. It poses fascinating challenges and opportunities ripe for exploration and discovery. 

     Maintaining Discreet Access to Data Privacy

    When discussing data privacy, it is essential to understand the balance between utilizing more extensive institutional databases and preserving private user information. Eduardo suggests maintaining discretionary control over database access, ensuring operational superiority and data privacy. 

     Rising Fusion of AI and Real Data Ops

    Predicting future trends, Eduardo anticipates a merger of accurate data and AI ops, which would resemble the blend of operational excellence and tool integration by configuration management engineers in the '90s. This blend translates into distributed heterogeneous computing in AI and shapes the future of AI ops.

     Concluding Thoughts

    Technology should invariably strive to simplify systems without sacrificing performance or efficiency. A thorough understanding of the available tools is a prerequisite to successfully leveraging them. Incorporating the LM chains in AI applications is a step in this direction, paving the way for an enriched user experience. Our conversation with Eduardo Alvarez underscores the importance of these insights in propelling the intriguing landscape of AI.

    • 24 min

Customer Reviews

5.0 out of 5
10 Ratings

10 Ratings

LemonadeFan ,

Insightful on the latest trends

This is a great podcast with interesting guest about new trends in digital transformation. Especially liked Darren's interview with ChatGPT. Very cool.

howardtnyc ,

Filled with insights!

If you're looking to slowly adopt digital transformation, but you're not sure how to yet, then this is the podcast for you! Darren and his amazing lineup of guests dive into in-depth discussions on digital trends that every industry leader should hear about.

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Conviction | Pod People
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times

You Might Also Like

Gartner ThinkCast
Gartner
AWS Podcast
Amazon Web Services
Practical AI: Machine Learning, Data Science
Changelog Media
The TWIML AI Podcast (formerly This Week in Machine Learning & Artificial Intelligence)
Sam Charrington
Inside the Strategy Room
McKinsey & Company
The AI Podcast
NVIDIA