Most enterprises think they’re rolling out Copilot. They’re not. They’re shifting—from deterministic SaaS systems you can diagram and audit, to probabilistic agent runtimes where behavior emerges at execution time and quietly drifts. And without realizing it, they’re deploying a distributed decision engine into an operating model that was never designed to control decisions made by non-human actors. In this episode, we introduce a post-SaaS mental model for enterprise architecture, unpack three Microsoft scenarios every leader will recognize, and explain the one metric that exposes real AI risk: Mean Time To Explain (MTTE). If you’re responsible for Microsoft 365, Power Platform, Copilot Studio, Azure AI, or agent governance, this episode explains why agent sprawl isn’t coming—it’s already here. What You’ll Learn in This Episode 1. The Foundational Misunderstanding Why AI is not a feature—it’s an operating-model shift Organizations keep treating AI like another SaaS capability: enable the license, publish guidance, run adoption training. But agents don’t execute workflows—you configure them to interpret intent and assemble workflows at runtime. That breaks the SaaS-era contract of user-to-app and replaces it with intent-to-orchestration. 2. What “Post-SaaS” Actually Means Why work no longer completes inside applications Post-SaaS doesn’t mean SaaS is dead. It means SaaS has become a tool endpoint inside a larger orchestration fabric where agents choose what to call, when, and how—based on context you can’t fully see. Architecture stops being app diagrams and becomes decision graphs. 3. The Post-SaaS Paradox Why more intelligence accelerates fragmentation Agents promise simplification—but intelligence multiplies execution paths.
Each connector, plugin, memory source, or delegated agent adds branches to the runtime decision tree. Local optimization creates global incoherence. 4. Architectural Entropy Explained Why the system feels “messy” even when nothing is broken Entropy isn’t disorder. It’s the accumulation of unmanaged decision pathways that produce side effects you didn’t design, can’t trace, and struggle to explain. Deterministic systems fail loudly.
Agent systems fail ambiguously. 5. The Metric Leaders Ignore: Mean Time To Explain (MTTE) Why explanation—not recovery—is the new bottleneck MTTE measures how long it takes your best people to answer one question:
Why did the system do that? As agents scale, MTTE—not MTTR—becomes the real limit on velocity, trust, and auditability. 6–8. The Three Accelerants of Agent Sprawl
- Velocity – AI compresses change cycles faster than governance can react
- Variety – Copilot, Power Platform, and Azure create multiple runtimes under one brand
- Volume – The agent-to-human ratio quietly explodes as autonomous decisions multiply
Together, they turn productivity gains into architectural risk. 9–11. Scenario 1: “We Rolled Out Copilot” How one Copilot becomes many micro-agents Copilot across Teams, Outlook, and SharePoint isn’t one experience—it’s multiple agent runtimes with different context surfaces, grounding, and behavior. Prompt libraries emerge. Permissions leak. Outputs drift.
Copilot “works”… just not consistently. 12–13. Scenario 2: Power Platform Agents at Scale From shadow IT to shadow cognition Low-code tools don’t just automate tasks anymore—they distribute decision logic.
Reasoning becomes embedded in prompts, connectors, and flows no one owns end-to-end. The result isn’t shadow apps.
It’s unowned decision-making with side effects. 14–15. Scenario 3: Azure AI Orchestration Without a Control Plane How orchestration logic becomes the new legacy Azure agents don’t crash. They corrode. Partial execution, retries as policy, delegation chains, and bespoke orchestration stacks turn “experiments” into permanent infrastructure that no one can safely change—or fully explain. 16–18. The Way Out: Agent-First Architecture How to scale agents without scaling ambiguity Agent-first architecture enforces explicit boundaries:
- Reasoning proposes
- Deterministic systems execute
- Humans authorize risk
- Telemetry enables explanation
- Kill-switches are mandatory
Without contracts, you don’t have agents—you have conditional chaos. 19. The 90-Day Agent-First Pilot Prove legibility before you scale intelligence Instead of scaling agents, scale explanation first.
If you can’t reconstruct behavior under pressure, you’re not ready to deploy it broadly. MTTE is the gate. Key Takeaway AI doesn’t reduce complexity.
It converts visible systems into invisible behavior—and invisible behavior is where architectural entropy multiplies. If this episode mirrors what you’re seeing in your Microsoft environment, you’re not alone. 💬 Join the Conversation Leave a review with the worst “Mean Time To Explain” incident you’ve personally lived through. Connect with Mirko Peters on LinkedIn and share real-world failures—future episodes will dissect them live. Agent sprawl isn’t a future problem.
It’s an operating-model problem.
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365--6704921/support.
If this clashes with how you’ve seen it play out, I’m always curious. I use LinkedIn for the back-and-forth.
1
00:00:00,000 --> 00:00:03,600
Most organizations think they're rolling out co-pilot.
2
00:00:03,600 --> 00:00:05,880
They're not, they're switching from deterministic SaaS,
3
00:00:05,880 --> 00:00:07,560
where you can diagram cause an effect
4
00:00:07,560 --> 00:00:09,360
to probabilistic orchestration,
5
00:00:09,360 --> 00:00:12,160
where behavior emerges at runtime and drifts quietly.
6
00:00:12,160 --> 00:00:14,320
This episode gives you a post-sass mental model,
7
00:00:14,320 --> 00:00:16,800
three Microsoft scenarios you'll recognize immediately,
8
00:00:16,800 --> 00:00:20,280
and one metric that exposes the real risk, mean time to explain.
9
00:00:20,280 --> 00:00:23,240
If you're responsible for Microsoft 365, Power Platform,
10
00:00:23,240 --> 00:00:24,600
or Azure AI subscribe,
11
00:00:24,600 --> 00:00:27,320
because agent sprawl isn't coming, it's already here.
12
00:00:27,320 --> 00:00:30,160
Now, the foundational misunderstanding,
13
00:00:30,160 --> 00:00:33,480
the foundational misunderstanding, AI as a feature,
14
00:00:33,480 --> 00:00:34,880
not an operating model.
15
00:00:34,880 --> 00:00:37,560
The most comforting story in enterprise IT right now
16
00:00:37,560 --> 00:00:40,160
is that AI is a feature, a checkbox,
17
00:00:40,160 --> 00:00:43,680
a license, a rollout plan, a change advisory board item,
18
00:00:43,680 --> 00:00:46,720
something you enable the same way you enabled exchange online,
19
00:00:46,720 --> 00:00:48,760
teams, or e5 security.
20
00:00:48,760 --> 00:00:51,800
People wanted to fit inside the existing SaaS operating model
21
00:00:51,800 --> 00:00:53,320
because that model is familiar,
22
00:00:53,320 --> 00:00:57,320
you provision accounts, assigned permissions, configure policies,
23
00:00:57,320 --> 00:00:59,760
publish guidance, and then the system mostly behaves
24
00:00:59,760 --> 00:01:02,640
the same way tomorrow as it behaves today.
25
00:01:02,640 --> 00:01:05,280
That model worked because SaaS for all its floors
26
00:01:05,280 --> 00:01:07,080
is still largely deterministic.
27
00:01:07,080 --> 00:01:09,480
Deterministic doesn't mean perfect, it means legible,
28
00:01:09,480 --> 00:01:12,080
it means state transitions are predictable enough
29
00:01:12,080 --> 00:01:16,120
that architects can draw boundaries, auditors can map controls,
30
00:01:16,120 --> 00:01:17,720
and operators can build runbooks
31
00:01:17,720 --> 00:01:19,520
that assume the platform will execute
32
00:01:19,520 --> 00:01:21,480
what it was configured to execute.
33
00:01:21,480 --> 00:01:23,840
When SaaS fails, it tends to fail like a machine,
34
00:01:23,840 --> 00:01:26,040
outages, throttling, expired certificates,
35
00:01:26,040 --> 00:01:30,120
broken dependencies, bad deployments, ugly, but explainable.
36
00:01:30,120 --> 00:01:32,360
AI doesn't land as a feature inside that world,
37
00:01:32,360 --> 00:01:34,080
it lands as a new execution layer
38
00:01:34,080 --> 00:01:36,760
that sits inside every workload you already run.
39
00:01:36,760 --> 00:01:38,760
And the moment that execution layer makes decisions
40
00:01:38,760 --> 00:01:40,880
at runtime, your old assumptions start decaying,
41
00:01:40,880 --> 00:01:42,960
not because Microsoft broke something,
42
00:01:42,960 --> 00:01:45,440
because you moved from configuration-driven execution
43
00:01:45,440 --> 00:01:47,360
to interpretation-driven execution,
44
00:01:47,360 --> 00:01:49,160
that distinction matters.
45
00:01:49,160 --> 00:01:51,320
In deterministic SaaS, the workflow is defined
46
00:01:51,320 --> 00:01:52,440
at design time.
47
00:01:52,440 --> 00:01:55,200
Someone models a process, writes a flow, builds a form,
48
00:01:55,200 --> 00:01:57,040
configures a connector, assigns a role.
49
00:01:57,040 --> 00:01:58,320
When a user clicks the button,
50
00:01:58,320 --> 00:02:01,080
the system executes the path you already defined.
51
00:02:01,080 --> 00:02:03,080
You can be wrong, but you're wrong in a stable way.
52
00:02:03,080 --> 00:02:06,360
In agentic systems, the workflow is assembled at runtime.
53
00:02:06,360 --> 00:02:07,720
The system doesn't just execute,
54
00:02:07,720 --> 00:02:10,640
it decides what to execute based on intent, context,
55
00:02:10,640 --> 00:02:13,160
tool availability, and whatever memory you're grounding,
56
00:02:13,160 --> 00:02:14,320
you've allowed it to access.
57
00:02:14,320 --> 00:02:17,320
It chooses a path, it chooses a tool, it chooses a source.
58
00:02:17,320 --> 00:02:19,320
And if you think that choice is just the model,
59
00:02:19,320 --> 00:02:20,400
you miss the point.
60
00:02:20,400 --> 00:02:22,520
The choice is the product of an orchestration stack,
61
00:02:22,520 --> 00:02:25,440
prompts, policies, plug-ins, connectors, permissions,
62
00:02:25,440 --> 00:02:27,840
retrieval, ranking, and the user's environment.
63
00:02:27,840 --> 00:02:29,480
That stack becomes your new runtime.
64
00:02:29,480 --> 00:02:31,920
So when leaders ask for the co-pilot rollout plan,
65
00:02:31,920 --> 00:02:34,480
what they're actually asking without realizing it is,
66
00:02:34,480 --> 00:02:36,880
how do we deploy a distributed decision engine
67
00:02:36,880 --> 00:02:38,720
into our organization without changing
68
00:02:38,720 --> 00:02:40,560
how we control decisions?
69
00:02:40,560 --> 00:02:42,960
They're asking for a plan that preserves the old contract,
70
00:02:42,960 --> 00:02:43,920
user to app.
71
00:02:43,920 --> 00:02:45,960
User to app is the SaaS era contract.
72
00:02:45,960 --> 00:02:47,960
The user initiates the app executes.
73
00:02:47,960 --> 00:02:50,600
Identity and access management is built around that.
74
00:02:50,600 --> 00:02:53,000
A human principle signs in, gets a token,
75
00:02:53,000 --> 00:02:55,120
performs an action inside a bounded app surface.
76
00:02:55,120 --> 00:02:57,440
The blast radius is mostly the app plus the permissions
77
00:02:57,440 --> 00:02:58,240
you granted.
78
00:02:58,240 --> 00:03:00,080
Post-SaaS breaks that contract.
79
00:03:00,080 --> 00:03:02,480
The new contract is intent to orchestration.
80
00:03:02,480 --> 00:03:04,800
The user expresses intent, the orchestration layer
81
00:03:04,800 --> 00:03:07,800
interprets it and then delegates execution across tools,
82
00:03:07,800 --> 00:03:09,960
sometimes across multiple tools.
83
00:03:09,960 --> 00:03:11,840
Using authorities that are often broader
84
00:03:11,840 --> 00:03:13,480
than the user understands.
85
00:03:13,480 --> 00:03:15,560
The user doesn't use SharePoint.
86
00:03:15,560 --> 00:03:18,280
The user expresses, find the doc, summarize it,
87
00:03:18,280 --> 00:03:20,920
send the action items, and the orchestration layer
88
00:03:20,920 --> 00:03:23,440
touches SharePoint Outlook teams.
89
00:03:23,440 --> 00:03:25,760
Maybe a power automate flow, maybe a connector,
90
00:03:25,760 --> 00:03:27,000
maybe an external system.
91
00:03:27,000 --> 00:03:28,080
That's not user to app.
92
00:03:28,080 --> 00:03:31,000
That's intent to tool chain, and it's not optional.
93
00:03:31,000 --> 00:03:32,320
This is the uncomfortable truth.
94
00:03:32,320 --> 00:03:34,840
Once you introduce agents, you are no longer running
95
00:03:34,840 --> 00:03:36,600
a set of SaaS services.
96
00:03:36,600 --> 00:03:38,480
You are running an orchestration fabric.
97
00:03:38,480 --> 00:03:41,480
The SaaS services become tool endpoints inside that fabric.
98
00:03:41,480 --> 00:03:43,760
The UI becomes a conversational interface,
99
00:03:43,760 --> 00:03:46,080
and the workflow becomes a probabilistic plan
100
00:03:46,080 --> 00:03:47,240
assembled on demand.
101
00:03:47,240 --> 00:03:49,000
This is why so many organizations feel
102
00:03:49,000 --> 00:03:51,520
like they're making progress, but their architecture feels
103
00:03:51,520 --> 00:03:52,880
less stable every quarter.
104
00:03:52,880 --> 00:03:55,560
They treat AI like an ad on, but it behaves like
105
00:03:55,560 --> 00:03:57,120
an operating model shift.
106
00:03:57,120 --> 00:03:59,120
They stand up adoption training and call it done,
107
00:03:59,120 --> 00:04:01,800
but the system changes where decisions get made.
108
00:04:01,800 --> 00:04:03,520
They add a few guardrails, but guardrails
109
00:04:03,520 --> 00:04:04,880
don't define contracts.
110
00:04:04,880 --> 00:04:07,920
They create approved prompts, but prompts are not controls.
111
00:04:07,920 --> 00:04:11,440
They are suggestions to a reasoning system that is optimized
112
00:04:11,440 --> 00:04:13,360
to be helpful, not obedient.
113
00:04:13,360 --> 00:04:14,640
Here's what most people miss.
114
00:04:14,640 --> 00:04:17,200
The real scaling event isn't that more people will use
115
00:04:17,200 --> 00:04:18,000
co-pilot.
116
00:04:18,000 --> 00:04:20,040
The real scaling event is that you're introducing
117
00:04:20,040 --> 00:04:22,880
non-human actors, agents that will perform actions,
118
00:04:22,880 --> 00:04:24,600
chain actions, and delegate actions,
119
00:04:24,600 --> 00:04:27,040
and those actions will be shaped by a constantly changing
120
00:04:27,040 --> 00:04:27,880
environment.
121
00:04:27,880 --> 00:04:30,480
New connectors, updated models, revised prompts,
122
00:04:30,480 --> 00:04:32,880
shifting data quality, changing permissions,
123
00:04:32,880 --> 00:04:34,800
and drift in the information estate.
124
00:04:34,800 --> 00:04:37,280
That means your system can have the same configuration
125
00:04:37,280 --> 00:04:39,560
and still produce different outcomes week to week.
126
00:04:39,560 --> 00:04:40,600
That's not a bug.
127
00:04:40,600 --> 00:04:42,480
That's probabilistic execution.
128
00:04:42,480 --> 00:04:44,680
So the foundational misunderstanding is simple.
129
00:04:44,680 --> 00:04:46,720
If you approach AI as a feature,
130
00:04:46,720 --> 00:04:50,480
you'll keep applying SAS era controls to a post-SAS runtime.
131
00:04:50,480 --> 00:04:52,280
You'll measure adoption, not behavior.
132
00:04:52,280 --> 00:04:54,720
You'll inventory licenses, not decision pathways.
133
00:04:54,720 --> 00:04:56,280
You'll ask, is it enabled?
134
00:04:56,280 --> 00:04:57,600
Not is it legible?
135
00:04:57,600 --> 00:04:58,920
And the consequence is predictable.
136
00:04:58,920 --> 00:05:00,400
You won't get simplification.
137
00:05:00,400 --> 00:05:02,680
You'll get acceleration, and the architecture
138
00:05:02,680 --> 00:05:04,040
won't visibly collapse.
139
00:05:04,040 --> 00:05:05,600
It'll just stop matching reality.
140
00:05:05,600 --> 00:05:07,880
Now define what post-SAS actually means
141
00:05:07,880 --> 00:05:10,240
without the futurist nonsense.
142
00:05:10,240 --> 00:05:13,280
What post-SAS actually means in enterprise architecture.
143
00:05:13,280 --> 00:05:15,360
Post-SAS doesn't mean SAS is dead.
144
00:05:15,360 --> 00:05:18,480
It means SAS stopped being the place where work completes.
145
00:05:18,480 --> 00:05:20,720
In the SAS era, enterprise architecture
146
00:05:20,720 --> 00:05:23,760
leaned on a stable contract, a user interface,
147
00:05:23,760 --> 00:05:27,280
an API surface, and predictable state transitions.
148
00:05:27,280 --> 00:05:29,960
You could argue about quality, uptime, licensing,
149
00:05:29,960 --> 00:05:32,600
or integration pain, but the shape of the system
150
00:05:32,600 --> 00:05:33,440
was consistent.
151
00:05:33,440 --> 00:05:36,800
A request came in, the platform executed a defined operation,
152
00:05:36,800 --> 00:05:38,640
and a record-changed state operators
153
00:05:38,640 --> 00:05:40,480
could observe it, architects could bound it,
154
00:05:40,480 --> 00:05:41,560
auditors could test it.
155
00:05:41,560 --> 00:05:43,960
That contract is what made service ownership work.
156
00:05:43,960 --> 00:05:47,920
Teams owned exchange, SharePoint, Teams, Dynamics, whatever.
157
00:05:47,920 --> 00:05:49,720
Because the workload boundary roughly matched
158
00:05:49,720 --> 00:05:51,000
where execution happened.
159
00:05:51,000 --> 00:05:52,960
When something went wrong, you knew where to look.
160
00:05:52,960 --> 00:05:54,960
It might take time, but the system
161
00:05:54,960 --> 00:05:57,880
gave you a finite set of places to interrogate.
162
00:05:57,880 --> 00:06:01,360
Logs, policies, permissions, connectors, runbooks.
163
00:06:01,360 --> 00:06:04,520
Post-SAS is what happens when you add a probabilistic overlay
164
00:06:04,520 --> 00:06:06,080
that sits above those contracts
165
00:06:06,080 --> 00:06:09,800
and starts interpreting intent instead of executing commands.
166
00:06:09,800 --> 00:06:12,760
That overlay has four parts that matter architecturally.
167
00:06:12,760 --> 00:06:15,680
Prompts, tools, memory, and delegation.
168
00:06:15,680 --> 00:06:17,320
Prompts are not user input.
169
00:06:17,320 --> 00:06:18,480
They're runtime policy.
170
00:06:18,480 --> 00:06:19,360
They shape behavior.
171
00:06:19,360 --> 00:06:21,240
They constrain scope, and they change faster
172
00:06:21,240 --> 00:06:23,240
than change management can track.
173
00:06:23,240 --> 00:06:24,960
Tools are not integrations.
174
00:06:24,960 --> 00:06:26,880
They're executable capabilities.
175
00:06:26,880 --> 00:06:30,480
Connectors, plugins, graph calls, flows, APIs.
176
00:06:30,480 --> 00:06:32,040
Memory isn't just chat history.
177
00:06:32,040 --> 00:06:35,040
It's what the system can remember, retrieve, and treat
178
00:06:35,040 --> 00:06:38,800
as context across sessions, across users, across time.
179
00:06:38,800 --> 00:06:40,880
Delegation is the quiet multiplier.
180
00:06:40,880 --> 00:06:43,880
One agent hands work to another agent, which calls another tool,
181
00:06:43,880 --> 00:06:45,280
which triggers another workflow.
182
00:06:45,280 --> 00:06:48,840
So the system, you thought, was Microsoft 365 plus some
183
00:06:48,840 --> 00:06:51,600
automations becomes a distributed orchestration
184
00:06:51,600 --> 00:06:54,360
fabric that assembles execution parts on demand.
185
00:06:54,360 --> 00:06:55,640
Here's where the contract breaks.
186
00:06:55,640 --> 00:06:57,760
In SAS, the boundary lives at the API.
187
00:06:57,760 --> 00:06:59,840
If the API call happened, you can trace it.
188
00:06:59,840 --> 00:07:02,200
If a permission allowed it, you can justify it.
189
00:07:02,200 --> 00:07:04,360
If an audit log recorded it, you can defend it.
190
00:07:04,360 --> 00:07:06,160
The system is still deterministic enough
191
00:07:06,160 --> 00:07:08,640
that what happened and why it happened are linked.
192
00:07:08,640 --> 00:07:11,280
In post-SARS, interpretation replaces execution
193
00:07:11,280 --> 00:07:12,960
as the dominant mechanism.
194
00:07:12,960 --> 00:07:14,800
The agent doesn't just call create event.
195
00:07:14,800 --> 00:07:18,040
It decides whether the user meant schedule, draft,
196
00:07:18,040 --> 00:07:21,760
delegate, or summarize, then chooses which tools to invoke
197
00:07:21,760 --> 00:07:25,120
in what order, with what parameters, based on context,
198
00:07:25,120 --> 00:07:27,320
that is not visible to the user, and often not
199
00:07:27,320 --> 00:07:28,960
visible to the operator.
200
00:07:28,960 --> 00:07:30,720
The output looks like a single experience.
201
00:07:30,720 --> 00:07:32,240
The reality is a tool chain.
202
00:07:32,240 --> 00:07:34,680
That distinction matters because architecture
203
00:07:34,680 --> 00:07:37,040
is fundamentally about controlling side effects.
204
00:07:37,040 --> 00:07:40,360
In deterministic systems, side effects come from explicit calls.
205
00:07:40,360 --> 00:07:42,160
In probabilistic systems, side effects
206
00:07:42,160 --> 00:07:43,400
come from implicit plans.
207
00:07:43,400 --> 00:07:46,360
And you don't control implicit plans with documentation.
208
00:07:46,360 --> 00:07:48,520
You control them with contracts and boundaries.
209
00:07:48,520 --> 00:07:50,720
The orchestration layer can't casually step over.
210
00:07:50,720 --> 00:07:53,400
This is why more automation is the wrong frame.
211
00:07:53,400 --> 00:07:56,000
Automation assumes you're codifying a known sequence.
212
00:07:56,000 --> 00:07:58,120
You design it, you test it, you deploy it.
213
00:07:58,120 --> 00:08:00,960
If it breaks, it breaks in the same place until you fix it.
214
00:08:00,960 --> 00:08:03,120
Post-sass systems don't just run sequences.
215
00:08:03,120 --> 00:08:04,120
They synthesize them.
216
00:08:04,120 --> 00:08:06,040
Two users ask the same thing.
217
00:08:06,040 --> 00:08:07,960
And the system takes two different paths
218
00:08:07,960 --> 00:08:10,000
because context differs, tool availability
219
00:08:10,000 --> 00:08:13,240
differs, permissions differ, or the model selection differs.
220
00:08:13,240 --> 00:08:14,840
You get different execution, not because you
221
00:08:14,840 --> 00:08:16,960
change configuration, but because the runtime
222
00:08:16,960 --> 00:08:18,560
interpreted the intent differently.
223
00:08:18,560 --> 00:08:20,440
So Post-sass is a new control surface.
224
00:08:20,440 --> 00:08:23,080
The control plane is no longer only policies, roles,
225
00:08:23,080 --> 00:08:25,480
and settings inside each SAS workload.
226
00:08:25,480 --> 00:08:26,960
It becomes the orchestration layer.
227
00:08:26,960 --> 00:08:28,080
What tools exist?
228
00:08:28,080 --> 00:08:31,280
Who can use them? How identity is represented to tools?
229
00:08:31,280 --> 00:08:33,840
What context is allowed? How memory persists?
230
00:08:33,840 --> 00:08:35,680
How delegation is constrained?
231
00:08:35,680 --> 00:08:38,360
And what gets logged in a way humans can reconstruct?
232
00:08:38,360 --> 00:08:39,320
And it's not theoretical.
233
00:08:39,320 --> 00:08:41,160
Microsoft is building toward this with agent
234
00:08:41,160 --> 00:08:44,680
runtimes across M365, agent building in Copilot Studio,
235
00:08:44,680 --> 00:08:47,120
and orchestration stacks in Azure AI Foundry.
236
00:08:47,120 --> 00:08:48,040
The details change.
237
00:08:48,040 --> 00:08:49,840
The architectural behavior does not.
238
00:08:49,840 --> 00:08:53,080
Once an enterprise allows intent to orchestration at scale,
239
00:08:53,080 --> 00:08:56,000
the architecture stops being a diagram of apps and services.
240
00:08:56,000 --> 00:08:57,960
It becomes a graph of decision pathways
241
00:08:57,960 --> 00:09:00,280
and if you don't model that graph explicitly,
242
00:09:00,280 --> 00:09:02,120
you don't have a Post-sass strategy.
243
00:09:02,120 --> 00:09:04,040
You have a collection of probabilistic behaviors
244
00:09:04,040 --> 00:09:06,840
that only look coherent because the UI hides the wiring.
245
00:09:06,840 --> 00:09:08,880
Now the paradox, the more intelligence you add,
246
00:09:08,880 --> 00:09:11,040
the faster that wiring fragments.
247
00:09:11,040 --> 00:09:12,400
The Post-sass paradox.
248
00:09:12,400 --> 00:09:14,720
Intelligence accelerates fragmentation.
249
00:09:14,720 --> 00:09:16,880
The promise of agents is consolidation.
250
00:09:16,880 --> 00:09:19,440
One interface, one copilot, one place to ask,
251
00:09:19,440 --> 00:09:20,800
handle this and have the platform
252
00:09:20,800 --> 00:09:23,240
stitch the work together across SharePoint teams,
253
00:09:23,240 --> 00:09:26,240
Outlook, Power Platform, and whatever else you connected.
254
00:09:26,240 --> 00:09:28,880
Leadership hears that and thinks, fewer apps,
255
00:09:28,880 --> 00:09:30,720
fewer processes, fewer tickets,
256
00:09:30,720 --> 00:09:33,000
fewer people needed to babysit the mess.
257
00:09:33,000 --> 00:09:34,440
They're not wrong about the intent.
258
00:09:34,440 --> 00:09:36,400
They're wrong about the system behavior
259
00:09:36,400 --> 00:09:38,440
because intelligence doesn't remove complexity.
260
00:09:38,440 --> 00:09:41,000
It redistributes it and when you redistribute complexity
261
00:09:41,000 --> 00:09:44,040
into runtime decisions, fragmentation stops being an accident.
262
00:09:44,040 --> 00:09:45,680
It becomes the default outcome.
263
00:09:45,680 --> 00:09:47,240
Here's what most people miss.
264
00:09:47,240 --> 00:09:49,640
SAS era fragmentation was mostly structural.
265
00:09:49,640 --> 00:09:51,960
Too many apps, too many sites, too many teams,
266
00:09:51,960 --> 00:09:52,760
too many connectors.
267
00:09:52,760 --> 00:09:54,600
You could see it, you could inventory it.
268
00:09:54,600 --> 00:09:56,240
You could produce a depressing spreadsheet
269
00:09:56,240 --> 00:09:58,200
and pretend that was control.
270
00:09:58,200 --> 00:10:00,640
Agent-era fragmentation is behavioral.
271
00:10:00,640 --> 00:10:03,480
And behavior fragments faster than configuration ever did.
272
00:10:03,480 --> 00:10:04,320
Why?
273
00:10:04,320 --> 00:10:05,600
Because every team optimizes locally.
274
00:10:05,600 --> 00:10:06,280
Always.
275
00:10:06,280 --> 00:10:09,120
Sales tunes copilot prompts for pipeline updates.
276
00:10:09,120 --> 00:10:11,040
Legal tunes it for contract analysis.
277
00:10:11,040 --> 00:10:12,840
Finance tunes it for reconciliation.
278
00:10:12,840 --> 00:10:14,720
HR tunes it for onboarding.
279
00:10:14,720 --> 00:10:16,560
Each group adds just one more plug-in,
280
00:10:16,560 --> 00:10:18,760
just one more connector, just one more exception,
281
00:10:18,760 --> 00:10:21,840
until the orchestration layer stops representing an enterprise
282
00:10:21,840 --> 00:10:25,960
and starts representing a set of departments with incompatible assumptions.
283
00:10:25,960 --> 00:10:28,440
Local optimization creates global incoherence.
284
00:10:28,440 --> 00:10:29,320
That's the paradox.
285
00:10:29,320 --> 00:10:32,080
The more useful the agent becomes for each team,
286
00:10:32,080 --> 00:10:34,560
the less consistent the overall system becomes.
287
00:10:34,560 --> 00:10:36,640
And it doesn't look like fragmentation in the UI.
288
00:10:36,640 --> 00:10:38,160
It looks like copilot working.
289
00:10:38,160 --> 00:10:40,520
Until someone crosses a boundary and discovers the agent
290
00:10:40,520 --> 00:10:42,160
they thought was a shared capability,
291
00:10:42,160 --> 00:10:45,360
is actually a dozen different runtimes with a dozen different toolchains.
292
00:10:45,360 --> 00:10:48,160
This is where standardization becomes an endless chase.
293
00:10:48,160 --> 00:10:50,160
Organizations respond the same way they always do.
294
00:10:50,160 --> 00:10:51,080
They write guidance.
295
00:10:51,080 --> 00:10:52,400
They publish a prompt library.
296
00:10:52,400 --> 00:10:54,240
They declare approved plug-ins.
297
00:10:54,240 --> 00:10:55,680
They create a governance page.
298
00:10:55,680 --> 00:10:57,040
They schedule a quarterly review.
299
00:10:57,040 --> 00:10:58,840
And then the system keeps drifting anyway
300
00:10:58,840 --> 00:11:01,600
because the drift isn't coming from a missing policy document.
301
00:11:01,600 --> 00:11:03,240
It's coming from the runtime itself.
302
00:11:03,240 --> 00:11:06,160
A model update changes tool selection patterns.
303
00:11:06,160 --> 00:11:09,240
A connector update changes what data is reachable.
304
00:11:09,240 --> 00:11:12,000
A new team's feature changes the context surface.
305
00:11:12,000 --> 00:11:15,040
A user discovers a better phrasing and shares it in a chat.
306
00:11:15,040 --> 00:11:17,440
A maker copies a flow and tweaks one step.
307
00:11:17,440 --> 00:11:19,880
Nothing big changed, but outcomes diverged.
308
00:11:19,880 --> 00:11:21,560
That's not configuration drift.
309
00:11:21,560 --> 00:11:23,000
That's behavior drift.
310
00:11:23,000 --> 00:11:25,440
And behavior drift beats configuration drift
311
00:11:25,440 --> 00:11:27,880
because you can't differ the way you diff settings.
312
00:11:27,880 --> 00:11:30,320
You can't audit it the way you audit roles.
313
00:11:30,320 --> 00:11:33,280
You can't test it once and assume stability for six months.
314
00:11:33,280 --> 00:11:35,920
The system makes new decisions every time it runs.
315
00:11:35,920 --> 00:11:38,040
So the paradox becomes operationally visible
316
00:11:38,040 --> 00:11:39,480
in a very specific way.
317
00:11:39,480 --> 00:11:42,880
Incidents shift from the system is down to the system behaved wrong.
318
00:11:42,880 --> 00:11:44,160
Nobody gets an outage banner.
319
00:11:44,160 --> 00:11:45,000
Nothing is throttled.
320
00:11:45,000 --> 00:11:46,840
The service health page is green.
321
00:11:46,840 --> 00:11:49,320
But a team swears copilot used to
322
00:11:49,320 --> 00:11:52,280
find the right policy doc and now it cites the wrong one.
323
00:11:52,280 --> 00:11:55,040
Or an agent used to summarize a meeting accurately
324
00:11:55,040 --> 00:11:57,520
and now it pulls in irrelevant context.
325
00:11:57,520 --> 00:11:59,280
Or a flow used to create one record
326
00:11:59,280 --> 00:12:00,880
and now it creates duplicates.
327
00:12:00,880 --> 00:12:03,800
Or the agent helpfully emailed a draft
328
00:12:03,800 --> 00:12:05,200
to the wrong distribution list
329
00:12:05,200 --> 00:12:07,400
because the runtime chose a different toolpath
330
00:12:07,400 --> 00:12:08,080
than last week.
331
00:12:08,080 --> 00:12:09,480
That's a different class of failure.
332
00:12:09,480 --> 00:12:11,640
And it's worse for leaders because it turns control
333
00:12:11,640 --> 00:12:12,560
into probability.
334
00:12:12,560 --> 00:12:13,880
The platform isn't broken.
335
00:12:13,880 --> 00:12:15,960
Your assumptions are.
336
00:12:15,960 --> 00:12:17,920
This might seem backwards, but the more intelligence
337
00:12:17,920 --> 00:12:20,520
you add, the more you multiply the number of possible execution
338
00:12:20,520 --> 00:12:21,320
paths.
339
00:12:21,320 --> 00:12:23,880
Every tool you attach is another branch in the decision graph.
340
00:12:23,880 --> 00:12:25,640
Every memory source is another influence.
341
00:12:25,640 --> 00:12:28,560
Every delegated agent is another interpreter.
342
00:12:28,560 --> 00:12:32,120
The system becomes a branching tree of could do options.
343
00:12:32,120 --> 00:12:34,880
And you no longer control which branch gets taken
344
00:12:34,880 --> 00:12:36,680
by setting a policy in one admin center.
345
00:12:36,680 --> 00:12:38,200
You control it by designing boundaries
346
00:12:38,200 --> 00:12:39,560
the runtime can't violate.
347
00:12:39,560 --> 00:12:42,920
Without those boundaries, standardization becomes theater.
348
00:12:42,920 --> 00:12:44,720
You will be rolling out copilot forever
349
00:12:44,720 --> 00:12:47,480
because every new use case creates a new local optimum.
350
00:12:47,480 --> 00:12:50,280
Every local optimum becomes another divergence.
351
00:12:50,280 --> 00:12:52,920
And over time, the enterprise stops having an architecture.
352
00:12:52,920 --> 00:12:55,200
It has a collection of probabilistic behaviors
353
00:12:55,200 --> 00:12:56,360
that sometimes align.
354
00:12:56,360 --> 00:12:58,640
The real enemy isn't that teams move too fast.
355
00:12:58,640 --> 00:13:00,520
The real enemy is that nobody defined
356
00:13:00,520 --> 00:13:02,480
what must remain deterministic.
357
00:13:02,480 --> 00:13:04,400
So intelligence accelerates fragmentation
358
00:13:04,400 --> 00:13:06,720
because it turns execution into choice.
359
00:13:06,720 --> 00:13:09,680
And choice always follows incentives, not diagrams.
360
00:13:09,680 --> 00:13:12,720
And incentives are local.
361
00:13:12,720 --> 00:13:14,360
Now name the thing that's actually happening.
362
00:13:14,360 --> 00:13:17,680
Not disorder, not sprawl, not governance gaps.
363
00:13:17,680 --> 00:13:18,600
Entropy.
364
00:13:18,600 --> 00:13:22,280
Architectural entropy, not disorder, but unmanaged decision pathways.
365
00:13:22,280 --> 00:13:26,160
Entropy gets used like an insult, like it means messy, uncontrolled.
366
00:13:26,160 --> 00:13:27,800
People aren't following the process.
367
00:13:27,800 --> 00:13:28,800
That's not what's happening.
368
00:13:28,800 --> 00:13:30,600
Architectural entropy is not disorder.
369
00:13:30,600 --> 00:13:33,480
It's the accumulation of unmanaged decision pathways
370
00:13:33,480 --> 00:13:35,360
that produce side effects you didn't model,
371
00:13:35,360 --> 00:13:38,400
didn't approve and can't reliably trace after the fact.
372
00:13:38,400 --> 00:13:41,400
In the SAS era, the dominant pathways were predictable.
373
00:13:41,400 --> 00:13:42,720
A user clicked in the UI.
374
00:13:42,720 --> 00:13:43,920
An API call executed.
375
00:13:43,920 --> 00:13:46,920
A record change state, you could argue about who should have had access
376
00:13:46,920 --> 00:13:48,680
or whether the process was designed well,
377
00:13:48,680 --> 00:13:50,480
but the pathway itself was visible.
378
00:13:50,480 --> 00:13:52,840
It left a trail you could follow because the system ran
379
00:13:52,840 --> 00:13:54,000
what you configured.
380
00:13:54,000 --> 00:13:57,160
In post-SARS, systems, pathways multiply at runtime.
381
00:13:57,160 --> 00:14:00,200
An agent interprets intent, selects tools, pulls context,
382
00:14:00,200 --> 00:14:02,880
chooses an action sequence, and sometimes delegates.
383
00:14:02,880 --> 00:14:06,360
That creates a decision graph that is wider than your documentation
384
00:14:06,360 --> 00:14:08,040
and faster than your review cycles.
385
00:14:08,040 --> 00:14:10,400
And every time you add one more connector, one more plug-in,
386
00:14:10,400 --> 00:14:11,640
one more helpful automation,
387
00:14:11,640 --> 00:14:13,400
you add branches to that graph.
388
00:14:13,400 --> 00:14:16,840
That's entropy, more branches, more side effects, less certainty.
389
00:14:16,840 --> 00:14:18,200
Here's the uncomfortable truth.
390
00:14:18,200 --> 00:14:20,600
Most organizations are still trying to manage entropy
391
00:14:20,600 --> 00:14:22,000
like its configuration drift.
392
00:14:22,000 --> 00:14:23,600
They look for the settings that changed.
393
00:14:23,600 --> 00:14:25,080
They hunt for the toggle that flipped.
394
00:14:25,080 --> 00:14:26,840
They ask who modified the policy.
395
00:14:26,840 --> 00:14:28,120
And sometimes that's valid.
396
00:14:28,120 --> 00:14:30,480
But the new failure mode isn't a setting changing.
397
00:14:30,480 --> 00:14:32,080
It's a pathway becoming possible.
398
00:14:32,080 --> 00:14:34,680
Once a pathway exists, it will eventually be used,
399
00:14:34,680 --> 00:14:36,640
not maliciously, not even intentionally,
400
00:14:36,640 --> 00:14:39,200
just because the system optimizes for completion
401
00:14:39,200 --> 00:14:41,920
and humans optimize for it worked once.
402
00:14:41,920 --> 00:14:42,920
So ship it.
403
00:14:42,920 --> 00:14:44,520
Those pathways accumulate.
404
00:14:44,520 --> 00:14:46,600
And they don't show up in your architecture diagrams
405
00:14:46,600 --> 00:14:48,720
because diagrams describe designed flows.
406
00:14:48,720 --> 00:14:50,360
Agents create executed flows.
407
00:14:50,360 --> 00:14:51,880
That distinction matters.
408
00:14:51,880 --> 00:14:54,200
Deterministic systems fail like machines.
409
00:14:54,200 --> 00:14:56,560
They fail loudly, outages, errors, timeouts,
410
00:14:56,560 --> 00:14:57,560
authentication breaks.
411
00:14:57,560 --> 00:14:59,800
You get MTTR because you can point at a component
412
00:14:59,800 --> 00:15:01,440
and say this thing failed.
413
00:15:01,440 --> 00:15:03,520
Probabilistic systems fail like organizations.
414
00:15:03,520 --> 00:15:05,120
They fail ambiguously.
415
00:15:05,120 --> 00:15:07,200
Nothing is down, but the outcome is wrong.
416
00:15:07,200 --> 00:15:08,360
The system did something.
417
00:15:08,360 --> 00:15:10,360
And now you're arguing about whether it was a bug,
418
00:15:10,360 --> 00:15:12,000
a misinterpretation of permissions edge,
419
00:15:12,000 --> 00:15:13,880
a context issue, or a prompt drift problem.
420
00:15:13,880 --> 00:15:15,720
That's not MTTR. That's a debate.
421
00:15:15,720 --> 00:15:16,920
And the debate is the cost.
422
00:15:16,920 --> 00:15:19,960
This is why exceptions are entropy generators.
423
00:15:19,960 --> 00:15:22,640
In the SAS era, exceptions were already dangerous,
424
00:15:22,640 --> 00:15:24,200
but they were usually bounded.
425
00:15:24,200 --> 00:15:26,920
A specific mailbox gets a transport rule exception.
426
00:15:26,920 --> 00:15:29,360
A specific group gets an access exception.
427
00:15:29,360 --> 00:15:32,040
A specific site gets an external sharing exception.
428
00:15:32,040 --> 00:15:34,000
It's bad, but at least it's a stable bad.
429
00:15:34,000 --> 00:15:36,640
In the agent era, exceptions don't stay local.
430
00:15:36,640 --> 00:15:38,720
A, just this one's connector approval
431
00:15:38,720 --> 00:15:40,360
becomes a reusable capability.
432
00:15:40,360 --> 00:15:43,000
A temporary graph permission becomes a new normal.
433
00:15:43,000 --> 00:15:45,000
A prompt tweak becomes a copy template.
434
00:15:45,000 --> 00:15:46,560
A flow fork becomes a pattern.
435
00:15:46,560 --> 00:15:48,280
An environment created for testing
436
00:15:48,280 --> 00:15:51,200
becomes the place where production runs because it worked.
437
00:15:51,200 --> 00:15:52,320
These aren't accidents.
438
00:15:52,320 --> 00:15:55,480
They're how systems behave when intent is not enforced by design.
439
00:15:55,480 --> 00:15:57,440
So entropy isn't the absence of governance.
440
00:15:57,440 --> 00:16:00,920
It's the absence of boundaries that make your assumptions true.
441
00:16:00,920 --> 00:16:04,320
And the cost shows up in three places, leaders actually feel.
442
00:16:04,320 --> 00:16:06,960
First, change slows down.
443
00:16:06,960 --> 00:16:09,120
Not because teams are lazy, because nobody
444
00:16:09,120 --> 00:16:10,800
knows what a change will break anymore.
445
00:16:10,800 --> 00:16:13,640
When execution is probabilistic and tool chains are implicit,
446
00:16:13,640 --> 00:16:16,520
every change becomes a risk to pathways you didn't know existed.
447
00:16:16,520 --> 00:16:19,000
So teams add reviews, then add more reviews,
448
00:16:19,000 --> 00:16:22,240
then add manual approvals, and eventually velocity collapses--
449
00:16:22,240 --> 00:16:24,200
entropy taxes, speed.
450
00:16:24,200 --> 00:16:26,720
Second, incident ambiguity explodes.
451
00:16:26,720 --> 00:16:28,360
Your best engineers spend their time
452
00:16:28,360 --> 00:16:30,720
reconstructing what the system saw, what it decided,
453
00:16:30,720 --> 00:16:31,520
and what it did.
454
00:16:31,520 --> 00:16:34,000
The work turns into forensic analysis of tool calls,
455
00:16:34,000 --> 00:16:36,720
context selection, memory retrieval, and delegation chains.
456
00:16:36,720 --> 00:16:38,320
You're not fixing a broken server.
457
00:16:38,320 --> 00:16:39,640
You're reconstructing a decision.
458
00:16:39,640 --> 00:16:42,040
Third, invisible dependencies multiply.
459
00:16:42,040 --> 00:16:45,520
In deterministic SAS, dependencies are mostly explicit.
460
00:16:45,520 --> 00:16:48,720
This app calls that API, this workflow triggers that service.
461
00:16:48,720 --> 00:16:50,960
In post-SAS, dependencies become conditional.
462
00:16:50,960 --> 00:16:54,280
The agent might call this tool if it interprets the request that way,
463
00:16:54,280 --> 00:16:55,000
but it might not.
464
00:16:55,000 --> 00:16:57,720
So you can't map dependencies as a static graph.
465
00:16:57,720 --> 00:16:59,240
You inherit a probabilistic one.
466
00:16:59,240 --> 00:17:01,880
And that is exactly how architectural erosion happens,
467
00:17:01,880 --> 00:17:03,600
not with a single catastrophic failure,
468
00:17:03,600 --> 00:17:05,960
with a thousand small pathways nobody owned.
469
00:17:05,960 --> 00:17:08,080
So when people say AI is making things messy,
470
00:17:08,080 --> 00:17:09,480
the correction is simple.
471
00:17:09,480 --> 00:17:11,600
AI is making decision pathways cheap,
472
00:17:11,600 --> 00:17:13,320
and anything cheap gets overproduced.
473
00:17:13,320 --> 00:17:15,400
The fix doesn't start with a new admin center.
474
00:17:15,400 --> 00:17:17,280
It starts with making those pathways measurable
475
00:17:17,280 --> 00:17:19,160
because what can't be measured will be explained away
476
00:17:19,160 --> 00:17:22,560
as user error until it becomes systemic.
477
00:17:22,560 --> 00:17:25,320
The next section is the metric leaders keep ignoring.
478
00:17:25,320 --> 00:17:27,040
Mean time to explain.
479
00:17:27,040 --> 00:17:28,360
The metric leaders ignore.
480
00:17:28,360 --> 00:17:32,720
Mean time to explain MTTR is the metric everyone knows
481
00:17:32,720 --> 00:17:35,840
because MTTR fits deterministic failure, something breaks,
482
00:17:35,840 --> 00:17:38,000
you identify the component, you restore service,
483
00:17:38,000 --> 00:17:39,040
you close the ticket.
484
00:17:39,040 --> 00:17:42,200
MTTR assumes the question is how fast can we fix it?
485
00:17:42,200 --> 00:17:44,720
Because the system already told you what it is.
486
00:17:44,720 --> 00:17:46,480
Post-SAS breaks that assumption.
487
00:17:46,480 --> 00:17:48,960
The new bottleneck is not fixing, it's explaining.
488
00:17:48,960 --> 00:17:52,600
Mean time to explain.
489
00:17:52,600 --> 00:17:54,640
Is the time it takes your best people to answer
490
00:17:54,640 --> 00:17:56,640
a single, humiliating question?
491
00:17:56,640 --> 00:17:58,000
Why did the system do that?
492
00:17:58,000 --> 00:17:59,120
Not why did it fail?
493
00:17:59,120 --> 00:18:00,520
Why did it behave that way?
494
00:18:00,520 --> 00:18:03,400
MTTR shows up the moment your incident narrative stops being
495
00:18:03,400 --> 00:18:05,200
technical and becomes interpretive.
496
00:18:05,200 --> 00:18:07,600
The service health page is green, authentication works,
497
00:18:07,600 --> 00:18:10,000
no CPU spikes, no obvious outage,
498
00:18:10,000 --> 00:18:12,400
but the output is wrong or inconsistent or risky
499
00:18:12,400 --> 00:18:13,360
or just different.
500
00:18:13,360 --> 00:18:14,800
And now you're not restoring service.
501
00:18:14,800 --> 00:18:17,480
You're reconstructing intent, context, and delegation
502
00:18:17,480 --> 00:18:19,800
across a toolchain that nobody can see in one place.
503
00:18:19,800 --> 00:18:21,600
This is the part executives underestimate
504
00:18:21,600 --> 00:18:24,200
because it looks like software, it isn't.
505
00:18:24,200 --> 00:18:27,440
MTTR is the cost of operating a distributed decision
506
00:18:27,440 --> 00:18:29,400
engine without deterministic boundaries.
507
00:18:29,400 --> 00:18:32,120
And it grows with every new tool, every new connector,
508
00:18:32,120 --> 00:18:35,400
every new prompt variant, and every new small automation
509
00:18:35,400 --> 00:18:37,240
that becomes part of the runtime.
510
00:18:37,240 --> 00:18:38,840
Here's what drives MTT in practice.
511
00:18:38,840 --> 00:18:40,400
First, tool calls.
512
00:18:40,400 --> 00:18:43,520
An agent doesn't just answer, it calls tools, graph,
513
00:18:43,520 --> 00:18:46,360
connectors, flows, external APIs,
514
00:18:46,360 --> 00:18:48,640
sometimes multiple tools in a chain.
515
00:18:48,640 --> 00:18:50,120
If you can't see the tool sequence
516
00:18:50,120 --> 00:18:52,480
and the parameters used, you can't explain the outcome.
517
00:18:52,480 --> 00:18:53,640
You can only guess.
518
00:18:53,640 --> 00:18:55,720
Guessing is not an incident response strategy.
519
00:18:55,720 --> 00:18:56,760
It's a career hazard.
520
00:18:56,760 --> 00:18:58,920
Second, delegated actions.
521
00:18:58,920 --> 00:19:00,800
An agent that delegates to another agent
522
00:19:00,800 --> 00:19:02,640
creates a second decision boundary.
523
00:19:02,640 --> 00:19:04,560
The parent agent made a choice to delegate.
524
00:19:04,560 --> 00:19:06,920
The child agent made a choice about execution.
525
00:19:06,920 --> 00:19:09,120
And now you have at least two sets of instructions,
526
00:19:09,120 --> 00:19:11,520
two context windows, and potentially two different tool
527
00:19:11,520 --> 00:19:12,080
catalogs.
528
00:19:12,080 --> 00:19:14,080
That delegation chain is an entropy multiplier
529
00:19:14,080 --> 00:19:16,000
because it fragments accountability.
530
00:19:16,000 --> 00:19:18,760
Everyone will claim their piece worked as designed
531
00:19:18,760 --> 00:19:21,000
because nobody owns the behavior of the whole.
532
00:19:21,000 --> 00:19:22,960
Third, hidden grounding.
533
00:19:22,960 --> 00:19:26,760
In M365 land, grounding is often whatever the system could see,
534
00:19:26,760 --> 00:19:28,280
which sounds safe until you remember.
535
00:19:28,280 --> 00:19:29,880
Visibility is not intent.
536
00:19:29,880 --> 00:19:32,280
If copilot pulled in a document, a chat thread,
537
00:19:32,280 --> 00:19:34,920
or a meeting transcript, the user didn't expect,
538
00:19:34,920 --> 00:19:37,720
the output can drift without any configuration change.
539
00:19:37,720 --> 00:19:40,040
And when you investigate, you realize your logs can tell
540
00:19:40,040 --> 00:19:42,120
you something accessed SharePoint,
541
00:19:42,120 --> 00:19:44,240
but not what the model selected as relevant
542
00:19:44,240 --> 00:19:46,440
or why it ranked one source above another.
543
00:19:46,440 --> 00:19:47,640
That gap is MTT.
544
00:19:47,640 --> 00:19:49,720
Fourth, prompt and version drift.
545
00:19:49,720 --> 00:19:52,320
In the SAS era, you tracked configuration versions
546
00:19:52,320 --> 00:19:53,640
and release notes.
547
00:19:53,640 --> 00:19:55,720
In the agent era, prompts are runtime logic
548
00:19:55,720 --> 00:19:57,120
and they drift like folk knowledge.
549
00:19:57,120 --> 00:19:58,280
A better prompt gets shared.
550
00:19:58,280 --> 00:20:00,720
Someone forks an agent, a maker tweaks instructions,
551
00:20:00,720 --> 00:20:03,560
a model update shifts how the same prompt is interpreted.
552
00:20:03,560 --> 00:20:05,960
Now, the organization has multiple behavioral versions
553
00:20:05,960 --> 00:20:08,360
of what everyone thinks is the same copilot.
554
00:20:08,360 --> 00:20:10,560
And when something goes wrong, the hardest part
555
00:20:10,560 --> 00:20:12,840
is just finding which version of the instructions
556
00:20:12,840 --> 00:20:13,840
produce the output.
557
00:20:13,840 --> 00:20:17,160
So MTT is not a new KPI for the sake of novelty.
558
00:20:17,160 --> 00:20:20,360
It's the board-relevant risk metric for agentic systems.
559
00:20:20,360 --> 00:20:22,640
Because audits don't care that you have logging.
560
00:20:22,640 --> 00:20:25,080
Audits care that you can explain a decision path.
561
00:20:25,080 --> 00:20:27,120
If your best answer is the model decided,
562
00:20:27,120 --> 00:20:28,520
you don't have auditability.
563
00:20:28,520 --> 00:20:30,720
You have theater with timestamps.
564
00:20:30,720 --> 00:20:34,120
An MTT connects directly to velocity, variety and volume.
565
00:20:34,120 --> 00:20:36,480
The forces that harbored points at, but most leaders treat
566
00:20:36,480 --> 00:20:37,960
like adoption trivia.
567
00:20:37,960 --> 00:20:39,760
Velocity compresses change cycles
568
00:20:39,760 --> 00:20:42,480
until your explanations lag behind reality.
569
00:20:42,480 --> 00:20:45,080
Variety multiplies the number of possible runtimes
570
00:20:45,080 --> 00:20:46,960
that could have produced the behavior.
571
00:20:46,960 --> 00:20:49,920
Volume increases the count of autonomous decisions per day
572
00:20:49,920 --> 00:20:52,120
until we'll look into it becomes the default state
573
00:20:52,120 --> 00:20:52,880
of operations.
574
00:20:52,880 --> 00:20:55,120
This is why MTT matters more than MTTR.
575
00:20:55,120 --> 00:20:58,200
MTTR tells you how fast you can recover a system you understand.
576
00:20:58,200 --> 00:21:01,240
MTT tells you how often you operate a system you don't.
577
00:21:01,240 --> 00:21:03,920
And once MTT crosses a threshold, your architecture
578
00:21:03,920 --> 00:21:05,000
stops scaling.
579
00:21:05,000 --> 00:21:07,880
Not because compute is expensive, but because explanation is.
580
00:21:07,880 --> 00:21:10,040
At that point, you can still deploy more agents.
581
00:21:10,040 --> 00:21:11,160
The platform will let you.
582
00:21:11,160 --> 00:21:13,000
You just won't be able to defend what they did
583
00:21:13,000 --> 00:21:15,400
or prove why they did it or predict what they'll do next.
584
00:21:15,400 --> 00:21:17,280
And that's the moment the enterprise realizes
585
00:21:17,280 --> 00:21:18,480
it didn't buy automation.
586
00:21:18,480 --> 00:21:20,040
It bought ambiguity at scale.
587
00:21:20,040 --> 00:21:21,920
Now take that metric and apply it to the first
588
00:21:21,920 --> 00:21:24,920
accelerant velocity because AI compresses change cycles
589
00:21:24,920 --> 00:21:27,120
until governance, review, and even architecture
590
00:21:27,120 --> 00:21:28,240
language can't keep up.
591
00:21:28,240 --> 00:21:31,120
Velocity, AI compresses change cycles until governance
592
00:21:31,120 --> 00:21:32,320
becomes irrelevant.
593
00:21:32,320 --> 00:21:34,320
Velocity is the first accelerant because it attacks
594
00:21:34,320 --> 00:21:37,160
the one thing enterprise IT relies on to stay sane time.
595
00:21:37,160 --> 00:21:38,920
In the SAS era, change had friction.
596
00:21:38,920 --> 00:21:40,600
Product teams shipped monthly.
597
00:21:40,600 --> 00:21:42,400
Enterprises reviewed quarterly.
598
00:21:42,400 --> 00:21:47,000
Security did annual attestations and called it continuous improvement.
599
00:21:47,000 --> 00:21:49,840
Nobody loved that cadence, but it matched reality.
600
00:21:49,840 --> 00:21:52,280
Configuration changed slower than people's ability
601
00:21:52,280 --> 00:21:53,240
to understand it.
602
00:21:53,240 --> 00:21:55,520
AI breaks that, not because it ships faster,
603
00:21:55,520 --> 00:21:56,840
because it behaves faster.
604
00:21:56,840 --> 00:21:59,720
Harbridge frames velocity as the pace of technology change,
605
00:21:59,720 --> 00:22:00,320
and he's right.
606
00:22:00,320 --> 00:22:03,520
But most leaders still translate that into feature velocity,
607
00:22:03,520 --> 00:22:05,960
new buttons in teams, a new co-pilot pain,
608
00:22:05,960 --> 00:22:07,360
a new admin setting.
609
00:22:07,360 --> 00:22:08,120
That's manageable.
610
00:22:08,120 --> 00:22:10,160
Annoying but manageable, agent velocity
611
00:22:10,160 --> 00:22:11,600
is behavioral velocity.
612
00:22:11,600 --> 00:22:14,360
It's how quickly the system's decision patterns shift,
613
00:22:14,360 --> 00:22:16,480
even when you didn't approve a change.
614
00:22:16,480 --> 00:22:19,560
A model update changes how intent is classified.
615
00:22:19,560 --> 00:22:21,840
A retrieval change changes what gets grounded.
616
00:22:21,840 --> 00:22:24,280
A connector change changes what tools are available.
617
00:22:24,280 --> 00:22:27,520
A new prompt pattern goes viral inside one department
618
00:22:27,520 --> 00:22:30,120
and becomes de facto runtime policy by lunchtime.
619
00:22:30,120 --> 00:22:32,280
The system is not waiting for your change window.
620
00:22:32,280 --> 00:22:35,120
It's evolving while you're still writing the risk assessment.
621
00:22:35,120 --> 00:22:36,480
This is the uncomfortable truth.
622
00:22:36,480 --> 00:22:39,240
Your control plane lags behind your execution plane.
623
00:22:39,240 --> 00:22:40,840
And the gap is where entropy grows.
624
00:22:40,840 --> 00:22:43,920
Look at what happens in Microsoft ecosystem specifically.
625
00:22:43,920 --> 00:22:46,480
A co-pilot experience lands in one workload than another.
626
00:22:46,480 --> 00:22:47,560
A preview becomes GA.
627
00:22:47,560 --> 00:22:48,880
A plug-in gets introduced.
628
00:22:48,880 --> 00:22:50,840
A co-pilot studio expands capability.
629
00:22:50,840 --> 00:22:53,320
As your eye foundry adds orchestration features
630
00:22:53,320 --> 00:22:55,920
like connected agents or workflow patterns.
631
00:22:55,920 --> 00:22:58,680
Meanwhile teams are iterating prompts and automations daily
632
00:22:58,680 --> 00:23:00,880
because the cost of iteration is basically zero.
633
00:23:00,880 --> 00:23:03,240
So policy review cadences stop being governance.
634
00:23:03,240 --> 00:23:05,280
They become archeology.
635
00:23:05,280 --> 00:23:07,840
By the time a committee meets to decide whether a connector
636
00:23:07,840 --> 00:23:09,600
is approved, someone already used it,
637
00:23:09,600 --> 00:23:11,920
wrapped it in a flow, embedded it in an agent,
638
00:23:11,920 --> 00:23:14,360
and shipped it as just a productivity helper.
639
00:23:14,360 --> 00:23:15,880
The decision got made at runtime.
640
00:23:15,880 --> 00:23:17,480
After the fact you can argue about it,
641
00:23:17,480 --> 00:23:19,160
the system already executed it.
642
00:23:19,160 --> 00:23:21,120
This is why we'll govern after the pilot
643
00:23:21,120 --> 00:23:23,200
is such a reliable failure pattern.
644
00:23:23,200 --> 00:23:25,800
In deterministic systems, pilots are bounded.
645
00:23:25,800 --> 00:23:28,520
A subset of users, a subset of capabilities,
646
00:23:28,520 --> 00:23:30,080
a stable set of controls.
647
00:23:30,080 --> 00:23:31,920
In agentex systems, pilots leak.
648
00:23:31,920 --> 00:23:33,960
People copy what works, templates spread.
649
00:23:33,960 --> 00:23:35,800
A single agent becomes 24x.
650
00:23:35,800 --> 00:23:38,320
A single good prompt becomes a library of variations.
651
00:23:38,320 --> 00:23:40,680
And because the experience is conversational,
652
00:23:40,680 --> 00:23:42,520
people don't treat it like code.
653
00:23:42,520 --> 00:23:43,600
They treat it like advice.
654
00:23:43,600 --> 00:23:44,720
But it runs like code.
655
00:23:44,720 --> 00:23:47,640
That mismatch is exactly where velocity turns into risk.
656
00:23:47,640 --> 00:23:49,360
And here's the part leaders hate hearing.
657
00:23:49,360 --> 00:23:51,080
Citizen builders are not the problem.
658
00:23:51,080 --> 00:23:52,640
They are the delivery mechanism.
659
00:23:52,640 --> 00:23:55,400
Power platform, co-pilot studio, and reusable templates
660
00:23:55,400 --> 00:23:57,160
are accelerants that compress the time
661
00:23:57,160 --> 00:23:58,720
between intent and execution.
662
00:23:58,720 --> 00:23:59,440
That's the point.
663
00:23:59,440 --> 00:24:01,760
The platform is designed to reduce friction.
664
00:24:01,760 --> 00:24:03,800
And friction is what used to protect the enterprise
665
00:24:03,800 --> 00:24:04,480
from itself.
666
00:24:04,480 --> 00:24:06,280
So when velocity spikes, the enterprise
667
00:24:06,280 --> 00:24:07,400
doesn't just ship more.
668
00:24:07,400 --> 00:24:08,960
It revises reality more often.
669
00:24:08,960 --> 00:24:11,280
And when reality revises faster than architecture
670
00:24:11,280 --> 00:24:14,200
can be explained, M-T-T-E explodes.
671
00:24:14,200 --> 00:24:16,000
Your operators spend their time answering,
672
00:24:16,000 --> 00:24:17,680
why did it do that?
673
00:24:17,680 --> 00:24:21,240
Instead of improving the system, because that keeps changing.
674
00:24:21,240 --> 00:24:23,440
This also changes how security debt behaves.
675
00:24:23,440 --> 00:24:25,920
In the SAS era, security debt was mostly dormant
676
00:24:25,920 --> 00:24:29,360
until something poked it and audit a breach, a migration.
677
00:24:29,360 --> 00:24:32,800
In the agent era, security debt becomes active fuel.
678
00:24:32,800 --> 00:24:35,520
Old oversharing in SharePoint isn't just an ugly legacy
679
00:24:35,520 --> 00:24:36,160
problem.
680
00:24:36,160 --> 00:24:37,920
It becomes immediate model context.
681
00:24:37,920 --> 00:24:39,680
Old guest access isn't just a risk.
682
00:24:39,680 --> 00:24:41,160
It becomes an action pathway.
683
00:24:41,160 --> 00:24:43,040
Old often groups aren't just clutter.
684
00:24:43,040 --> 00:24:45,440
They become permissioned edges an agent can traverse
685
00:24:45,440 --> 00:24:46,520
if it's allowed to.
686
00:24:46,520 --> 00:24:48,000
Velocity doesn't create the debt.
687
00:24:48,000 --> 00:24:49,320
It monetizes it.
688
00:24:49,320 --> 00:24:51,600
And because velocity compresses the feedback loop,
689
00:24:51,600 --> 00:24:54,120
organizations start responding with the wrong tool.
690
00:24:54,120 --> 00:24:56,240
More meetings, more approvals, more checklists,
691
00:24:56,240 --> 00:24:57,280
more governance.
692
00:24:57,280 --> 00:24:58,720
That doesn't slow the runtime.
693
00:24:58,720 --> 00:24:59,800
It just slows the humans.
694
00:24:59,800 --> 00:25:01,200
The system keeps executing.
695
00:25:01,200 --> 00:25:03,560
The organization becomes the bottleneck.
696
00:25:03,560 --> 00:25:06,440
So the practical definition of velocity in post-SAS
697
00:25:06,440 --> 00:25:07,400
is simple.
698
00:25:07,400 --> 00:25:09,280
It's the rate at which behavior changes
699
00:25:09,280 --> 00:25:11,160
relative to your ability to explain it.
700
00:25:11,160 --> 00:25:13,240
Once that ratio breaks, governance becomes
701
00:25:13,240 --> 00:25:15,520
irrelevant in the literal sense, not important,
702
00:25:15,520 --> 00:25:18,360
but unable to influence outcomes before they occur.
703
00:25:18,360 --> 00:25:20,480
And that's why velocity never arrives alone.
704
00:25:20,480 --> 00:25:23,320
It immediately collides with the second accelerant, variety.
705
00:25:23,320 --> 00:25:25,280
Because once the platform can change this fast,
706
00:25:25,280 --> 00:25:27,720
it also changes in more ways than your architecture language
707
00:25:27,720 --> 00:25:29,000
can keep up with.
708
00:25:29,000 --> 00:25:30,000
Variety.
709
00:25:30,000 --> 00:25:32,440
Agent experiences multiply faster than your architecture
710
00:25:32,440 --> 00:25:33,160
language.
711
00:25:33,160 --> 00:25:35,080
Variety is where leaders lose the plot because it
712
00:25:35,080 --> 00:25:36,080
doesn't look like risk.
713
00:25:36,080 --> 00:25:38,840
It looks like options, one copilot experience in teams,
714
00:25:38,840 --> 00:25:40,840
another in outlook, a copilot painting
715
00:25:40,840 --> 00:25:42,920
SharePoint, a declarative agent someone
716
00:25:42,920 --> 00:25:44,680
made in five minutes, a custom engine
717
00:25:44,680 --> 00:25:47,560
agent built by a dev team, a power automate flow
718
00:25:47,560 --> 00:25:51,440
that just calls AI once, a plug-in, a connector, a tool,
719
00:25:51,440 --> 00:25:54,480
a memory store, a retrieval system, a model switch,
720
00:25:54,480 --> 00:25:56,960
all of that feels like the ecosystem getting richer.
721
00:25:56,960 --> 00:26:00,160
Architecturally, it's the ecosystem getting less coherent.
722
00:26:00,160 --> 00:26:02,600
Because variety isn't just more ways to build.
723
00:26:02,600 --> 00:26:05,960
It's more runtimes, more context surfaces, more tool catalogs,
724
00:26:05,960 --> 00:26:08,440
more execution semantics, and every runtime
725
00:26:08,440 --> 00:26:10,120
behaves slightly differently.
726
00:26:10,120 --> 00:26:12,400
Even when the branding is identical and the user thinks
727
00:26:12,400 --> 00:26:16,480
they're talking to copilot, that distinction matters.
728
00:26:16,480 --> 00:26:19,040
In the SAS era, you could build an architecture language
729
00:26:19,040 --> 00:26:20,320
around workloads.
730
00:26:20,320 --> 00:26:21,960
Exchange behaves like exchange.
731
00:26:21,960 --> 00:26:23,600
SharePoint behaves like SharePoint.
732
00:26:23,600 --> 00:26:24,920
Teams behaves like teams.
733
00:26:24,920 --> 00:26:27,000
You could argue about integration, but you could still
734
00:26:27,000 --> 00:26:29,360
model boundaries because the execution semantics
735
00:26:29,360 --> 00:26:30,280
were stable enough.
736
00:26:30,280 --> 00:26:32,400
In the agent era, those boundaries blur
737
00:26:32,400 --> 00:26:34,400
because the work stops happening inside the app
738
00:26:34,400 --> 00:26:36,280
and starts happening across a tool chain.
739
00:26:36,280 --> 00:26:40,120
Now, the same user intent, summarize this, draft that,
740
00:26:40,120 --> 00:26:42,680
find the policy, notify the group,
741
00:26:42,680 --> 00:26:44,600
can land in different orchestration stacks
742
00:26:44,600 --> 00:26:46,720
depending on where the user asked.
743
00:26:46,720 --> 00:26:48,400
Teams has one context surface.
744
00:26:48,400 --> 00:26:52,080
Chats, channels, meetings, transcripts, Outlook has another.
745
00:26:52,080 --> 00:26:55,040
Mail threads, calendars, attachments, mailboxes.
746
00:26:55,040 --> 00:26:57,960
SharePoint has another, sites, pages, libraries, permissions,
747
00:26:57,960 --> 00:26:58,960
metadata.
748
00:26:58,960 --> 00:27:01,200
Even if the model is shared, the retrieval and grounding
749
00:27:01,200 --> 00:27:02,320
pathways aren't.
750
00:27:02,320 --> 00:27:04,720
So the enterprise ends up with one copilot that behaves
751
00:27:04,720 --> 00:27:05,800
like 3, 5, or 10.
752
00:27:05,800 --> 00:27:06,920
This is the hidden variety.
753
00:27:06,920 --> 00:27:07,760
It isn't the UX.
754
00:27:07,760 --> 00:27:09,360
It's the tool chain and the reasoning pattern
755
00:27:09,360 --> 00:27:10,520
behind the UX.
756
00:27:10,520 --> 00:27:12,160
And it multiplies in two ways at once.
757
00:27:12,160 --> 00:27:15,160
First, the visible variety, which Microsoft will happily ship,
758
00:27:15,160 --> 00:27:17,800
copilot UX in multiple apps, the Clarity of agents
759
00:27:17,800 --> 00:27:19,000
in copilot studio.
760
00:27:19,000 --> 00:27:21,520
Custom engine agents via Pro Code Toolkits.
761
00:27:21,520 --> 00:27:23,560
Azure AI Foundry orchestration patterns
762
00:27:23,560 --> 00:27:26,240
like connected agents and multi agent workflows,
763
00:27:26,240 --> 00:27:29,400
MCP servers exposing tools, agent to agent delegation,
764
00:27:29,400 --> 00:27:32,280
different model options, different grounding approaches.
765
00:27:32,280 --> 00:27:33,680
None of this is inherently bad.
766
00:27:33,680 --> 00:27:35,520
The system is behaving like a platform.
767
00:27:35,520 --> 00:27:38,080
But a platform doesn't give you one standard way to operate.
768
00:27:38,080 --> 00:27:39,040
It gives you a menu.
769
00:27:39,040 --> 00:27:40,800
And enterprises are terrible at menus.
770
00:27:40,800 --> 00:27:42,960
They select based on local pain, local skills,
771
00:27:42,960 --> 00:27:44,120
and local deadlines.
772
00:27:44,120 --> 00:27:45,680
Then they call it strategy.
773
00:27:45,680 --> 00:27:49,000
Second, the invisible variety, which enterprises
774
00:27:49,000 --> 00:27:50,600
create for themselves.
775
00:27:50,600 --> 00:27:52,440
Different teams build different tool chains.
776
00:27:52,440 --> 00:27:54,560
One group relies on SharePoint as a knowledge base.
777
00:27:54,560 --> 00:27:55,880
Another relies on one note.
778
00:27:55,880 --> 00:27:57,480
Another relies on teams' messages.
779
00:27:57,480 --> 00:28:00,160
Another relies on PDFs in random libraries.
780
00:28:00,160 --> 00:28:02,360
One team builds a flow that writes to dataverse.
781
00:28:02,360 --> 00:28:03,920
Another team writes to a spreadsheet.
782
00:28:03,920 --> 00:28:05,320
Another team sends an email.
783
00:28:05,320 --> 00:28:07,320
Another team posts into a team's channel,
784
00:28:07,320 --> 00:28:08,720
same business intent.
785
00:28:08,720 --> 00:28:10,440
Four different execution parts.
786
00:28:10,440 --> 00:28:12,080
Four different side effects.
787
00:28:12,080 --> 00:28:13,520
Four different failure modes.
788
00:28:13,520 --> 00:28:16,360
And now the same policy doesn't create the same posture.
789
00:28:16,360 --> 00:28:18,280
This is where security teams get blindsided.
790
00:28:18,280 --> 00:28:20,000
They assume that if conditional access,
791
00:28:20,000 --> 00:28:22,560
DLP labels and access reviews are central,
792
00:28:22,560 --> 00:28:25,240
then the agent experience is centrally controlled.
793
00:28:25,240 --> 00:28:26,920
That was true when the application boundary
794
00:28:26,920 --> 00:28:28,600
was the control surface.
795
00:28:28,600 --> 00:28:31,520
In posts, the control surface is the orchestration layer.
796
00:28:31,520 --> 00:28:34,280
What tools are reachable, what context is selectable,
797
00:28:34,280 --> 00:28:37,040
what memory is persistent, what delegation is allowed,
798
00:28:37,040 --> 00:28:39,480
and what identity is presented to the tools.
799
00:28:39,480 --> 00:28:40,880
So even with central policies,
800
00:28:40,880 --> 00:28:43,360
variety creates inconsistent outcomes.
801
00:28:43,360 --> 00:28:45,680
One agent uses a connector with delegated permissions
802
00:28:45,680 --> 00:28:48,640
that quietly exceeds what the user thinks they authorized.
803
00:28:48,640 --> 00:28:50,680
Another agent uses a different connector
804
00:28:50,680 --> 00:28:54,000
that fails and falls back to a different data source.
805
00:28:54,000 --> 00:28:55,880
One runtime strips citations.
806
00:28:55,880 --> 00:28:57,160
Another keeps them.
807
00:28:57,160 --> 00:28:58,200
One runtime can act.
808
00:28:58,200 --> 00:28:59,480
Another can only suggest.
809
00:28:59,480 --> 00:29:02,520
One runtime logs tool calls in a way you can trace.
810
00:29:02,520 --> 00:29:04,920
Another leaves you with conversational smoke.
811
00:29:04,920 --> 00:29:07,760
Same organization, same intent, different behavior.
812
00:29:07,760 --> 00:29:09,960
And because the variety is distributed across tools,
813
00:29:09,960 --> 00:29:12,680
builders and teams, your architecture language can't keep up.
814
00:29:12,680 --> 00:29:14,920
Your diagram still shows apps and services.
815
00:29:14,920 --> 00:29:17,800
The system is actually a shifting set of agent runtimes
816
00:29:17,800 --> 00:29:18,840
and toolchains.
817
00:29:18,840 --> 00:29:20,520
You're describing a deterministic world
818
00:29:20,520 --> 00:29:22,560
while operating a probabilistic one.
819
00:29:22,560 --> 00:29:25,320
That mismatch is why incidents feel surreal.
820
00:29:25,320 --> 00:29:27,720
Operators aren't asking which service failed.
821
00:29:27,720 --> 00:29:29,760
They're asking which runtime did this user hit
822
00:29:29,760 --> 00:29:31,720
with which context, with which tool catalog
823
00:29:31,720 --> 00:29:34,560
with which prompt version and which permission edge.
824
00:29:34,560 --> 00:29:36,680
That's M-T-T-E getting paid in full.
825
00:29:36,680 --> 00:29:39,200
And variety is also the bridge to the final accelerant
826
00:29:39,200 --> 00:29:41,040
because once you have many runtimes,
827
00:29:41,040 --> 00:29:42,800
you inevitably get many instances.
828
00:29:42,800 --> 00:29:45,680
Variety becomes volume the moment those experiences scale
829
00:29:45,680 --> 00:29:46,920
beyond the handful of pilots
830
00:29:46,920 --> 00:29:49,320
and become the default way work gets done.
831
00:29:49,320 --> 00:29:50,160
Volume.
832
00:29:50,160 --> 00:29:53,000
The agent to human ratio quietly explodes.
833
00:29:53,000 --> 00:29:54,800
Volume is the part leaders think they understand
834
00:29:54,800 --> 00:29:57,200
because they've lived through volume for 20 years.
835
00:29:57,200 --> 00:30:00,080
More mailboxes, more teams, more sharepoint sites,
836
00:30:00,080 --> 00:30:02,800
more documents, more groups, more apps, more logs,
837
00:30:02,800 --> 00:30:04,280
more tickets.
838
00:30:04,280 --> 00:30:06,520
Volume felt like a storage and operations problem.
839
00:30:06,520 --> 00:30:09,720
So enterprises build inventory thinking, count the things,
840
00:30:09,720 --> 00:30:12,360
classify the things, put policies on the things,
841
00:30:12,360 --> 00:30:15,720
then try to slow the rate at which new things appear.
842
00:30:15,720 --> 00:30:17,480
That logic collapses in the agent era
843
00:30:17,480 --> 00:30:19,680
because volume isn't primarily artifacts.
844
00:30:19,680 --> 00:30:20,800
It's decisions.
845
00:30:20,800 --> 00:30:23,920
The real scaling event is not that you'll have a lot of agents.
846
00:30:23,920 --> 00:30:26,200
It's that you'll have a lot of autonomous decision points
847
00:30:26,200 --> 00:30:28,760
firing all day across thousands of users
848
00:30:28,760 --> 00:30:30,720
and those decisions will create side effects
849
00:30:30,720 --> 00:30:32,040
in systems of record.
850
00:30:32,040 --> 00:30:34,600
Calendar entries, emails, records in dataverse,
851
00:30:34,600 --> 00:30:36,920
permissions changes, tickets, notifications,
852
00:30:36,920 --> 00:30:39,200
file copies, labels, shares, links,
853
00:30:39,200 --> 00:30:40,760
and unlike SaaS era volume,
854
00:30:40,760 --> 00:30:43,320
you don't get one decision per click, you get chains.
855
00:30:43,320 --> 00:30:47,720
A single user intent becomes multiple tool calls
856
00:30:47,720 --> 00:30:50,000
and each tool call becomes a potential fork.
857
00:30:50,000 --> 00:30:52,560
Retries, fallbacks, alternate sources,
858
00:30:52,560 --> 00:30:55,320
delegated sub agents and compensating actions
859
00:30:55,320 --> 00:30:57,160
when something partially succeeds.
860
00:30:57,160 --> 00:31:00,280
That means the number that matters isn't agents per tenant.
861
00:31:00,280 --> 00:31:02,240
It's autonomous actions per day.
862
00:31:02,240 --> 00:31:03,880
This is why the agent to human ratio
863
00:31:03,880 --> 00:31:05,560
is such a useful mental model.
864
00:31:05,560 --> 00:31:06,880
The ratio is never stable.
865
00:31:06,880 --> 00:31:08,760
It always grows because once an organization
866
00:31:08,760 --> 00:31:10,320
has one working agent pattern,
867
00:31:10,320 --> 00:31:13,240
it gets copied, templated, and embedded into workflows
868
00:31:13,240 --> 00:31:16,640
until the default expectation becomes the agent handles it.
869
00:31:16,640 --> 00:31:18,200
Humans only review the exceptions.
870
00:31:18,200 --> 00:31:18,960
That's fine.
871
00:31:18,960 --> 00:31:22,120
Right up until you realize the ratio also drives blast radius.
872
00:31:22,120 --> 00:31:25,000
Every additional agent doesn't just add another capability.
873
00:31:25,000 --> 00:31:28,400
It adds another execution pathway that can touch data,
874
00:31:28,400 --> 00:31:30,560
trigger workflows, and create side effects.
875
00:31:30,560 --> 00:31:32,680
And those pathways don't exist in isolation.
876
00:31:32,680 --> 00:31:34,920
They share tool catalogs, they share connectors,
877
00:31:34,920 --> 00:31:37,120
they share permissions, they share data stores.
878
00:31:37,120 --> 00:31:39,200
So the marginal risk of one more agent
879
00:31:39,200 --> 00:31:40,720
isn't one more thing to manage.
880
00:31:40,720 --> 00:31:42,400
It's more load on the same brittle graph.
881
00:31:42,400 --> 00:31:44,080
Here's where inventory thinking fails.
882
00:31:44,080 --> 00:31:46,720
Counting agents doesn't tell you anything about their authority.
883
00:31:46,720 --> 00:31:48,840
A declarative agent that can only retrieve
884
00:31:48,840 --> 00:31:52,440
and summarize content behaves like a read-only reporting surface.
885
00:31:52,440 --> 00:31:55,600
It can still leak information, but it can't mutate systems.
886
00:31:55,600 --> 00:31:58,240
A task agent that can send mail, create records,
887
00:31:58,240 --> 00:32:01,040
or trigger flows is a different class of risk.
888
00:32:01,040 --> 00:32:04,120
A decision agent that can choose actions without human review
889
00:32:04,120 --> 00:32:05,560
is a different class again.
890
00:32:05,560 --> 00:32:08,200
So if leadership asks how many agents do we have,
891
00:32:08,200 --> 00:32:10,440
the only accurate answer is that's the wrong question.
892
00:32:10,440 --> 00:32:13,040
The right question is how many autonomous decisions
893
00:32:13,040 --> 00:32:15,760
can execute side effects and where are those decisions
894
00:32:15,760 --> 00:32:16,560
allowed to land?
895
00:32:16,560 --> 00:32:18,760
Volume also creates a specific sprawl pattern
896
00:32:18,760 --> 00:32:21,160
that looks harmless until it becomes permanent.
897
00:32:21,160 --> 00:32:24,640
Duplicated agents, forked prompts, often flows,
898
00:32:24,640 --> 00:32:26,960
environment drift, someone copies an agent
899
00:32:26,960 --> 00:32:29,080
because it's faster than requesting access,
900
00:32:29,080 --> 00:32:31,160
someone forks a prompt because it's just wording.
901
00:32:31,160 --> 00:32:32,960
Someone creates a new connector
902
00:32:32,960 --> 00:32:34,680
because the approved one is slow.
903
00:32:34,680 --> 00:32:36,720
Someone builds a flow in a personal environment
904
00:32:36,720 --> 00:32:39,360
because they're testing, then the test becomes production
905
00:32:39,360 --> 00:32:40,200
because it works.
906
00:32:40,200 --> 00:32:41,160
Those are not exceptions.
907
00:32:41,160 --> 00:32:43,080
Those are entropy factories.
908
00:32:43,080 --> 00:32:45,760
And volume turns them into normal operations.
909
00:32:45,760 --> 00:32:48,360
This is where MTT becomes a certainty, not a risk.
910
00:32:48,360 --> 00:32:50,160
Because the more autonomous decisions you have,
911
00:32:50,160 --> 00:32:52,240
the more often you'll need to explain one.
912
00:32:52,240 --> 00:32:55,360
And the explanation burden doesn't scale linearly.
913
00:32:55,360 --> 00:32:57,720
It scales with the number of possible pathways,
914
00:32:57,720 --> 00:32:59,160
the number of runtime versions,
915
00:32:59,160 --> 00:33:01,440
and the number of implicit dependencies.
916
00:33:01,440 --> 00:33:03,560
So the enterprise does what it always does.
917
00:33:03,560 --> 00:33:05,960
It tries to centralize visibility after the fact,
918
00:33:05,960 --> 00:33:08,400
a registry, a dashboard, a report, a monthly review
919
00:33:08,400 --> 00:33:10,040
of top agents that can help,
920
00:33:10,040 --> 00:33:12,080
but only if it's tied to contracts.
921
00:33:12,080 --> 00:33:14,040
Otherwise, it becomes another spreadsheet of comfort
922
00:33:14,040 --> 00:33:17,160
because volume isn't the enemy, unbounded volume is.
923
00:33:17,160 --> 00:33:18,600
An unbounded volume is what happens
924
00:33:18,600 --> 00:33:21,400
when organizations treat agents as helpers instead of products.
925
00:33:21,400 --> 00:33:23,560
Products have owners, products have versions,
926
00:33:23,560 --> 00:33:26,560
products have deprecation, products have telemetry
927
00:33:26,560 --> 00:33:28,240
that answers uncomfortable questions,
928
00:33:28,240 --> 00:33:30,840
helpers have enthusiasm, templates, and no life cycle.
929
00:33:30,840 --> 00:33:33,680
Over time, the agent workforce becomes the dominant workforce,
930
00:33:33,680 --> 00:33:36,200
not in headcount, but in executed actions.
931
00:33:36,200 --> 00:33:38,680
And once that happens, every weakness in identity,
932
00:33:38,680 --> 00:33:40,880
permissions, data quality, and observability
933
00:33:40,880 --> 00:33:42,360
gets amplified by automation.
934
00:33:42,360 --> 00:33:44,040
The system doesn't just scale outcomes.
935
00:33:44,040 --> 00:33:46,320
It scales mistakes.
936
00:33:46,320 --> 00:33:48,760
That's the point where leaders finally feel the paradox
937
00:33:48,760 --> 00:33:49,600
in their calendar.
938
00:33:49,600 --> 00:33:53,200
Nothing is down, but everything takes longer to trust.
939
00:33:53,200 --> 00:33:55,200
Now shift from theory to the first scenario
940
00:33:55,200 --> 00:33:56,720
everyone recognizes.
941
00:33:56,720 --> 00:33:58,440
We rolled out co-pilot.
942
00:33:58,440 --> 00:33:59,920
Scenario one setup.
943
00:33:59,920 --> 00:34:01,400
We rolled out co-pilot.
944
00:34:01,400 --> 00:34:03,760
This is the story every Microsoft leader tells right now
945
00:34:03,760 --> 00:34:05,600
because it sounds responsible.
946
00:34:05,600 --> 00:34:06,920
We rolled out co-pilot.
947
00:34:06,920 --> 00:34:09,120
Translation, procurement, bought the licenses,
948
00:34:09,120 --> 00:34:10,320
someone flipped the toggles.
949
00:34:10,320 --> 00:34:12,640
There was a readiness checklist, a couple of pilot teams,
950
00:34:12,640 --> 00:34:15,000
some prompt training, maybe a security review,
951
00:34:15,000 --> 00:34:17,240
and then a launch email with a SharePoint page
952
00:34:17,240 --> 00:34:18,760
full of cheerful guidance.
953
00:34:18,760 --> 00:34:21,280
If they're more mature, they also turned on some reporting
954
00:34:21,280 --> 00:34:24,360
and created a channel where users can share great prompts.
955
00:34:24,360 --> 00:34:26,240
And then leadership expects the return.
956
00:34:26,240 --> 00:34:27,800
Fewer hours lost in email.
957
00:34:27,800 --> 00:34:28,880
Better meeting follow-ups.
958
00:34:28,880 --> 00:34:30,800
Less time searching for documents.
959
00:34:30,800 --> 00:34:33,520
Faster drafting, faster analysis, less friction.
960
00:34:33,520 --> 00:34:35,360
The usual narrative of productivity gain
961
00:34:35,360 --> 00:34:37,280
and to be clear, some of that is real.
962
00:34:37,280 --> 00:34:38,800
But the rollout framing is the trap
963
00:34:38,800 --> 00:34:40,800
because co-pilot is not an app you deployed
964
00:34:40,800 --> 00:34:41,880
into a clean environment.
965
00:34:41,880 --> 00:34:43,320
It's an orchestrator you deployed
966
00:34:43,320 --> 00:34:45,600
on top of your existing information estate.
967
00:34:45,600 --> 00:34:46,960
And that estate is not tidy.
968
00:34:46,960 --> 00:34:47,640
It never was.
969
00:34:47,640 --> 00:34:49,160
It's a decade of SharePoint permissions
970
00:34:49,160 --> 00:34:50,880
that drifted teams that proliferated,
971
00:34:50,880 --> 00:34:54,400
sites nobody owns anymore, documents with unclear lineage,
972
00:34:54,400 --> 00:34:56,960
retention policies that got applied unevenly,
973
00:34:56,960 --> 00:34:59,640
and a pile of temporary access that became permanent
974
00:34:59,640 --> 00:35:02,760
during the pandemic and was never revisited.
975
00:35:02,760 --> 00:35:04,200
Co-pilot doesn't create that mess.
976
00:35:04,200 --> 00:35:05,640
It simply makes it executable.
977
00:35:05,640 --> 00:35:08,120
Here's what most organizations miss in the first 90 days.
978
00:35:08,120 --> 00:35:10,600
The first order effect isn't users got faster.
979
00:35:10,600 --> 00:35:12,360
The first order effect is that teams learn
980
00:35:12,360 --> 00:35:15,560
which contact surfaces co-pilot can see, which it can't,
981
00:35:15,560 --> 00:35:18,160
and which it can be coaxed into seeing through workarounds.
982
00:35:18,160 --> 00:35:21,280
They learn which prompts reliably produce useful outputs.
983
00:35:21,280 --> 00:35:22,840
They learn which plugins or connectors
984
00:35:22,840 --> 00:35:24,400
unlock the missing capability.
985
00:35:24,400 --> 00:35:26,240
They learn which data sources are too noisy,
986
00:35:26,240 --> 00:35:27,240
so they root around them.
987
00:35:27,240 --> 00:35:28,600
That learning becomes behavior
988
00:35:28,600 --> 00:35:30,240
and behavior becomes a local standard.
989
00:35:30,240 --> 00:35:32,520
So the first thing that diverges is enablement,
990
00:35:32,520 --> 00:35:34,640
not the formal enablement, the real one.
991
00:35:34,640 --> 00:35:37,800
One business unit runs internal prompt clinics.
992
00:35:37,800 --> 00:35:39,920
Another shares prompts in a team's chat.
993
00:35:39,920 --> 00:35:42,320
Another builds a private prompt library in one note,
994
00:35:42,320 --> 00:35:45,320
another hires a consultant who hands them a pack of templates,
995
00:35:45,320 --> 00:35:47,920
another quietly decides co-pilot is unreliable
996
00:35:47,920 --> 00:35:50,840
and stops using it, except for drafting emails
997
00:35:50,840 --> 00:35:52,280
because that's safe.
998
00:35:52,280 --> 00:35:54,040
Now you don't have one co-pilot rollout.
999
00:35:54,040 --> 00:35:55,640
You have multiple co-pilot cultures,
1000
00:35:55,640 --> 00:35:58,080
and that cultural drift turns into technical drift faster
1001
00:35:58,080 --> 00:35:59,480
than most architects expect
1002
00:35:59,480 --> 00:36:01,440
because co-pilot's value rises with reach.
1003
00:36:01,440 --> 00:36:02,800
The moment a team hits the limit
1004
00:36:02,800 --> 00:36:04,320
of what basic co-pilot can do,
1005
00:36:04,320 --> 00:36:06,560
they don't file a request for a new application.
1006
00:36:06,560 --> 00:36:08,880
They attach a capability, a plug-in,
1007
00:36:08,880 --> 00:36:10,760
a connector, a graph permission,
1008
00:36:10,760 --> 00:36:13,360
a co-pilot studio action, a power automate flow
1009
00:36:13,360 --> 00:36:16,360
that just helps co-pilot by doing the last mile,
1010
00:36:16,360 --> 00:36:18,320
a shortcut that creates a side effect
1011
00:36:18,320 --> 00:36:20,320
without making the side effect visible
1012
00:36:20,320 --> 00:36:22,320
and those attachments don't happen centrally,
1013
00:36:22,320 --> 00:36:24,880
they happen where pain exists locally.
1014
00:36:24,880 --> 00:36:27,400
Under time pressure with good intentions.
1015
00:36:27,400 --> 00:36:30,840
This is where we rolled out co-pilot becomes structurally false
1016
00:36:30,840 --> 00:36:32,640
because you didn't roll out a single thing.
1017
00:36:32,640 --> 00:36:34,280
You rolled out an orchestration layer
1018
00:36:34,280 --> 00:36:36,240
that behaves differently depending on the workload
1019
00:36:36,240 --> 00:36:37,080
and the team.
1020
00:36:37,080 --> 00:36:38,360
Teams becomes one runtime.
1021
00:36:38,360 --> 00:36:41,120
It has meetings, transcripts, chats, channels,
1022
00:36:41,120 --> 00:36:43,720
and a social graph that changes by the hour.
1023
00:36:43,720 --> 00:36:45,440
Outlook becomes another runtime,
1024
00:36:45,440 --> 00:36:48,280
mail threads, calendar context, attachments
1025
00:36:48,280 --> 00:36:49,840
and delegated mailboxes.
1026
00:36:49,840 --> 00:36:51,840
SharePoint becomes another runtime,
1027
00:36:51,840 --> 00:36:54,600
site permissions, library structures, metadata,
1028
00:36:54,600 --> 00:36:57,440
link sharing patterns, and an information architecture
1029
00:36:57,440 --> 00:37:01,040
that mostly exists in someone's head from 2019.
1030
00:37:01,040 --> 00:37:04,080
So when an exec says co-pilot couldn't find the policy,
1031
00:37:04,080 --> 00:37:05,400
that sentence is meaningless,
1032
00:37:05,400 --> 00:37:06,520
which co-pilot's surface,
1033
00:37:06,520 --> 00:37:08,360
in which app grounded on which sources,
1034
00:37:08,360 --> 00:37:10,680
under which permissions, with which connectors enabled,
1035
00:37:10,680 --> 00:37:13,120
with what chat history, in which tenant configuration,
1036
00:37:13,120 --> 00:37:14,960
after which recent model update,
1037
00:37:14,960 --> 00:37:16,200
the platform isn't one thing.
1038
00:37:16,200 --> 00:37:18,640
It's a set of agent runtimes with a shared brand
1039
00:37:18,640 --> 00:37:20,760
and then the sprawl starts to look helpful.
1040
00:37:20,760 --> 00:37:21,920
It always does it first.
1041
00:37:21,920 --> 00:37:24,360
A department creates an approved prompt list.
1042
00:37:24,360 --> 00:37:26,400
Someone builds an HR co-pilot helper
1043
00:37:26,400 --> 00:37:27,600
that points at their SharePoint.
1044
00:37:27,600 --> 00:37:29,720
Someone builds a sales follow-up agent
1045
00:37:29,720 --> 00:37:32,520
that drafts emails and updates a CRM through a connector.
1046
00:37:32,520 --> 00:37:33,680
Someone creates a team's tab
1047
00:37:33,680 --> 00:37:35,480
with a custom co-pilot experience.
1048
00:37:35,480 --> 00:37:36,960
It's all incremental.
1049
00:37:36,960 --> 00:37:38,400
Nothing feels like architecture
1050
00:37:38,400 --> 00:37:40,640
until you try to explain why the same question
1051
00:37:40,640 --> 00:37:42,920
yields different answers for different users.
1052
00:37:42,920 --> 00:37:44,960
Or why co-pilot cited a document,
1053
00:37:44,960 --> 00:37:47,120
someone insists they don't have access to,
1054
00:37:47,120 --> 00:37:48,760
because the permission edge is real,
1055
00:37:48,760 --> 00:37:50,960
even if nobody remembers granting it.
1056
00:37:50,960 --> 00:37:54,640
Or why a summary changed week to week, even though nothing changed,
1057
00:37:54,640 --> 00:37:56,480
because the context surface did.
1058
00:37:56,480 --> 00:37:59,080
This is the setup co-pilot didn't simplify your tenant.
1059
00:37:59,080 --> 00:38:00,800
It turned your tenant into the runtime
1060
00:38:00,800 --> 00:38:03,000
and the moment the tenant becomes the runtime,
1061
00:38:03,000 --> 00:38:05,080
you are no longer managing a product rollout.
1062
00:38:05,080 --> 00:38:08,400
You are managing an emerging behavior system with side effects.
1063
00:38:08,400 --> 00:38:09,960
Scenario one entropy signals,
1064
00:38:09,960 --> 00:38:13,560
co-pilot across M365 becomes micro agent divergence.
1065
00:38:13,560 --> 00:38:15,640
Entropy signals in co-pilot aren't dramatic.
1066
00:38:15,640 --> 00:38:16,640
They're boring.
1067
00:38:16,640 --> 00:38:20,040
That's why they get ignored until they stack into operational pain.
1068
00:38:20,040 --> 00:38:22,720
The first signal is that SharePoint, Teams, and Outlook
1069
00:38:22,720 --> 00:38:24,640
are not three front ends.
1070
00:38:24,640 --> 00:38:26,400
They are three different agent runtimes
1071
00:38:26,400 --> 00:38:27,960
with three different context surfaces
1072
00:38:27,960 --> 00:38:30,560
and three different default assumptions about what matters.
1073
00:38:30,560 --> 00:38:32,240
Teams is conversation first.
1074
00:38:32,240 --> 00:38:33,680
Outlook is thread first.
1075
00:38:33,680 --> 00:38:35,360
SharePoint is content first.
1076
00:38:35,360 --> 00:38:37,400
The same prompt lands on different grounding,
1077
00:38:37,400 --> 00:38:40,000
different retrieval, and different relevance ranking
1078
00:38:40,000 --> 00:38:41,800
depending on where the user asked.
1079
00:38:41,800 --> 00:38:44,600
So co-pilot gave a different answer, isn't user error.
1080
00:38:44,600 --> 00:38:46,120
It's runtime variance.
1081
00:38:46,120 --> 00:38:49,080
And once leadership hears variance, they do what they always do.
1082
00:38:49,080 --> 00:38:49,920
They standardize.
1083
00:38:49,920 --> 00:38:51,880
So the second signal is the prompt library.
1084
00:38:51,880 --> 00:38:53,560
Every organization ends up creating one.
1085
00:38:53,560 --> 00:38:54,680
Sometimes it's official.
1086
00:38:54,680 --> 00:38:55,840
Sometimes it's folklore.
1087
00:38:55,840 --> 00:38:58,160
Sometimes it's a Teams channel with screenshots.
1088
00:38:58,160 --> 00:39:00,200
Either way, it becomes a comforting artifact
1089
00:39:00,200 --> 00:39:02,960
because it feels like policy, but prompts aren't controls.
1090
00:39:02,960 --> 00:39:04,440
They don't enforce boundaries.
1091
00:39:04,440 --> 00:39:06,280
They're input to a reasoning system
1092
00:39:06,280 --> 00:39:09,200
that can interpret, skip, or reframe them based on context.
1093
00:39:09,200 --> 00:39:11,400
What this actually looks like in the wild is simple.
1094
00:39:11,400 --> 00:39:13,680
Someone says, use the approved prompt
1095
00:39:13,680 --> 00:39:18,760
and the response improves for that user in that app
1096
00:39:18,760 --> 00:39:20,720
for that data set this week.
1097
00:39:20,720 --> 00:39:22,760
Then another team copies it, tweaks three words,
1098
00:39:22,760 --> 00:39:26,080
adds beacon size, adds actors A, and now you have prompt drift.
1099
00:39:26,080 --> 00:39:27,600
Not because people are reckless
1100
00:39:27,600 --> 00:39:30,080
because prompts are the easiest thing in the stack to edit
1101
00:39:30,080 --> 00:39:31,840
and editing feels harmless.
1102
00:39:31,840 --> 00:39:34,000
But prompt edits are runtime logic changes.
1103
00:39:34,000 --> 00:39:36,960
You're changing the decision surface, not the documentation.
1104
00:39:36,960 --> 00:39:38,800
The third signal is permission edges,
1105
00:39:38,800 --> 00:39:40,880
copilot rides, Microsoft Graph.
1106
00:39:40,880 --> 00:39:42,720
And Graph is not a single permission boundary.
1107
00:39:42,720 --> 00:39:45,840
It's an authorization graph that's shaped by groups, sites,
1108
00:39:45,840 --> 00:39:48,560
sharing links, delegated mailboxes, sensitivity labels,
1109
00:39:48,560 --> 00:39:51,080
and all the historical decisions nobody revisited.
1110
00:39:51,080 --> 00:39:53,720
So you get the same intent producing different access outcomes.
1111
00:39:53,720 --> 00:39:56,440
One user gets the right answer because they're in the right group.
1112
00:39:56,440 --> 00:39:59,000
Another user gets a weaker answer because they're not.
1113
00:39:59,000 --> 00:40:01,520
And a third user gets a dangerously confident answer
1114
00:40:01,520 --> 00:40:03,960
because they have access through a link-based permission
1115
00:40:03,960 --> 00:40:05,680
that no one remembers granting.
1116
00:40:05,680 --> 00:40:07,720
That's the core, post-sass issue.
1117
00:40:07,720 --> 00:40:09,440
Authorization is still deterministic,
1118
00:40:09,440 --> 00:40:11,680
but the user experience becomes probabilistic.
1119
00:40:11,680 --> 00:40:13,280
So you get the weird incident class
1120
00:40:13,280 --> 00:40:16,600
where nobody can tell if the problem is copilot, permissions,
1121
00:40:16,600 --> 00:40:19,520
or content hygiene because all three are now coupled
1122
00:40:19,520 --> 00:40:20,440
in the output.
1123
00:40:20,440 --> 00:40:23,440
The fourth signal is connector and plug-in divergence.
1124
00:40:23,440 --> 00:40:26,320
Even when the enterprise thinks it enabled copilot,
1125
00:40:26,320 --> 00:40:28,320
the real copilot experience becomes defined
1126
00:40:28,320 --> 00:40:30,280
by what extra capabilities teams attach.
1127
00:40:30,280 --> 00:40:32,440
Some teams allow more plug-ins, some block them,
1128
00:40:32,440 --> 00:40:34,240
some discover third-party connectors,
1129
00:40:34,240 --> 00:40:36,080
some build copilot studio actions.
1130
00:40:36,080 --> 00:40:38,600
Each choice expands the tool catalog
1131
00:40:38,600 --> 00:40:41,400
and expanding the tool catalog expands the decision pathways.
1132
00:40:41,400 --> 00:40:42,640
That's not a governance point.
1133
00:40:42,640 --> 00:40:43,600
It's mechanical.
1134
00:40:43,600 --> 00:40:45,240
More tools means more branches.
1135
00:40:45,240 --> 00:40:48,480
Over time, copilot stops being a single capability.
1136
00:40:48,480 --> 00:40:50,920
It becomes a family of microagents.
1137
00:40:50,920 --> 00:40:52,960
One inside teams with meeting context,
1138
00:40:52,960 --> 00:40:55,400
one inside outlook with mailbox context,
1139
00:40:55,400 --> 00:40:57,840
one inside SharePoint with library context,
1140
00:40:57,840 --> 00:41:00,840
plus a handful of departmental agents with custom tools
1141
00:41:00,840 --> 00:41:03,160
and instructions, plus whatever people built
1142
00:41:03,160 --> 00:41:05,640
in copilot studio to patch gaps.
1143
00:41:05,640 --> 00:41:07,840
Leadership keeps calling it one rollout,
1144
00:41:07,840 --> 00:41:09,880
operators start seeing it as multiple systems.
1145
00:41:09,880 --> 00:41:11,760
The fifth signal is output quality drift
1146
00:41:11,760 --> 00:41:13,320
that correlates with nothing obvious.
1147
00:41:13,320 --> 00:41:15,680
Week one, summaries are solid, week six,
1148
00:41:15,680 --> 00:41:18,920
the same meeting format yields inconsistent action items.
1149
00:41:18,920 --> 00:41:22,440
Week 10, citations shift, week 14, users complain
1150
00:41:22,440 --> 00:41:23,760
that it's not as good anymore
1151
00:41:23,760 --> 00:41:25,440
and nobody can tie it to a change ticket
1152
00:41:25,440 --> 00:41:27,000
because the change wasn't a single thing.
1153
00:41:27,000 --> 00:41:30,160
It was an accumulation, a model update, a team's feature change,
1154
00:41:30,160 --> 00:41:32,480
new content in SharePoint, a permission cleanup
1155
00:41:32,480 --> 00:41:34,560
that removed something, a new channel created,
1156
00:41:34,560 --> 00:41:37,680
a different meeting organizer, a different transcript quality,
1157
00:41:37,680 --> 00:41:39,320
a different retrieval ranking.
1158
00:41:39,320 --> 00:41:41,680
In deterministic sass, you'd isolate variables.
1159
00:41:41,680 --> 00:41:44,080
In post sass, variables are the runtime.
1160
00:41:44,080 --> 00:41:45,920
And that's where MTTE becomes real
1161
00:41:45,920 --> 00:41:48,000
because the practical debugging question is not
1162
00:41:48,000 --> 00:41:49,360
is copilot up.
1163
00:41:49,360 --> 00:41:50,840
It's what did copilot see?
1164
00:41:50,840 --> 00:41:52,600
Not what it could see, what it did see.
1165
00:41:52,600 --> 00:41:54,560
What context it selected, what it ignored
1166
00:41:54,560 --> 00:41:56,040
and which tool calls it executed
1167
00:41:56,040 --> 00:41:57,920
without that you can't explain behavior,
1168
00:41:57,920 --> 00:41:59,360
you can only argue about it.
1169
00:41:59,360 --> 00:42:01,360
And the final entropy signal in copilot
1170
00:42:01,360 --> 00:42:03,760
is the slow collapse of shared assumptions.
1171
00:42:03,760 --> 00:42:06,160
The organization thinks it has one assistant.
1172
00:42:06,160 --> 00:42:08,640
In reality, it has multiple execution parts
1173
00:42:08,640 --> 00:42:10,480
and multiple behavioral versions.
1174
00:42:10,480 --> 00:42:12,680
Different teams start trusting different patterns,
1175
00:42:12,680 --> 00:42:14,280
building different workarounds
1176
00:42:14,280 --> 00:42:16,800
and relying on different known good prompts
1177
00:42:16,800 --> 00:42:19,080
that only work inside their slice of the tenant.
1178
00:42:19,080 --> 00:42:21,320
That's micro agent divergence, the same brand,
1179
00:42:21,320 --> 00:42:22,960
the same license, the same platform,
1180
00:42:22,960 --> 00:42:24,480
different behavior, different risks,
1181
00:42:24,480 --> 00:42:26,360
different incident narratives.
1182
00:42:26,360 --> 00:42:28,240
And once that divergence becomes normal,
1183
00:42:28,240 --> 00:42:30,240
the next move is predictable.
1184
00:42:30,240 --> 00:42:31,720
Make a step into fix it.
1185
00:42:31,720 --> 00:42:34,400
Scenario two set up, power platform agents at scale,
1186
00:42:34,400 --> 00:42:36,880
and that's when the maker step into fix it.
1187
00:42:36,880 --> 00:42:39,440
Not because they're reckless, because they're useful.
1188
00:42:39,440 --> 00:42:41,360
Power platform exists to turn local pain
1189
00:42:41,360 --> 00:42:42,760
into local solutions.
1190
00:42:42,760 --> 00:42:45,160
And in the sass era, that was mostly fine.
1191
00:42:45,160 --> 00:42:46,800
A flow that copies an attachment,
1192
00:42:46,800 --> 00:42:48,480
a form that standardizes intake,
1193
00:42:48,480 --> 00:42:50,320
a little app that replaces a spreadsheet,
1194
00:42:50,320 --> 00:42:53,000
you could call it sprawl, but it was legible sprawl.
1195
00:42:53,000 --> 00:42:55,400
Apps and flows you could list, owners you could ping,
1196
00:42:55,400 --> 00:42:57,200
environments you could lock down,
1197
00:42:57,200 --> 00:42:59,080
when someone finally complained.
1198
00:42:59,080 --> 00:43:01,760
Agenetic power platform changes the shape of that sprawl,
1199
00:43:01,760 --> 00:43:05,120
because the power platform isn't just low code automation anymore.
1200
00:43:05,120 --> 00:43:07,440
It's a distribution channel for decision logic.
1201
00:43:07,440 --> 00:43:09,080
Copilot Studio and power automate
1202
00:43:09,080 --> 00:43:10,680
don't just help someone build a workflow.
1203
00:43:10,680 --> 00:43:12,760
They help someone package reasoning, retrieval,
1204
00:43:12,760 --> 00:43:14,800
and actions into a reusable capability
1205
00:43:14,800 --> 00:43:17,520
that other humans will treat as the system.
1206
00:43:17,520 --> 00:43:19,160
And the cost of doing that is low enough
1207
00:43:19,160 --> 00:43:20,720
that it will happen everywhere.
1208
00:43:20,720 --> 00:43:22,200
This is the uncomfortable truth.
1209
00:43:22,200 --> 00:43:24,400
If you want to understand how fast an organization
1210
00:43:24,400 --> 00:43:27,320
will scale agents, don't look at Azure, look at power platform.
1211
00:43:27,320 --> 00:43:29,320
Azure is where teams build carefully.
1212
00:43:29,320 --> 00:43:31,640
Power platform is where teams build constantly.
1213
00:43:31,640 --> 00:43:32,560
And the reason is simple,
1214
00:43:32,560 --> 00:43:34,520
it sits at the intersection of three things
1215
00:43:34,520 --> 00:43:36,880
enterprises can't control with policy docs,
1216
00:43:36,880 --> 00:43:38,880
business urgency, permission convenience,
1217
00:43:38,880 --> 00:43:40,320
and template gravity.
1218
00:43:40,320 --> 00:43:43,320
Business urgency means the moment a team has a recurring annoyance,
1219
00:43:43,320 --> 00:43:45,320
they don't open a project, they open a float,
1220
00:43:45,320 --> 00:43:46,840
they don't ask for a system change,
1221
00:43:46,840 --> 00:43:49,040
they ask copilot to draft something,
1222
00:43:49,040 --> 00:43:51,840
route something, create something, notify someone,
1223
00:43:51,840 --> 00:43:53,800
and when that something works once,
1224
00:43:53,800 --> 00:43:56,280
the next move is predictable, schedule it, trigger it,
1225
00:43:56,280 --> 00:43:57,800
wrap it, turn it into an agent.
1226
00:43:57,800 --> 00:44:00,160
Now it's no longer assistance, it's execution.
1227
00:44:00,160 --> 00:44:02,160
Permission convenience is the part nobody likes
1228
00:44:02,160 --> 00:44:03,680
talking about in architecture meetings.
1229
00:44:03,680 --> 00:44:06,040
Connectors are power, delegated connectors are borrowed
1230
00:44:06,040 --> 00:44:06,880
authority.
1231
00:44:06,880 --> 00:44:09,080
And the platform is designed to make connecting easy
1232
00:44:09,080 --> 00:44:10,960
because friction kills adoption.
1233
00:44:10,960 --> 00:44:13,800
So a maker connects to SharePoint, Outlook, Teams,
1234
00:44:13,800 --> 00:44:16,880
Dataverse, maybe an ERP, maybe a ticketing system,
1235
00:44:16,880 --> 00:44:19,280
and now the flow has reached across systems
1236
00:44:19,280 --> 00:44:21,760
that were previously separated by human effort.
1237
00:44:21,760 --> 00:44:23,360
The flow becomes a cross domain actor.
1238
00:44:23,360 --> 00:44:25,400
Template gravity is why this scales
1239
00:44:25,400 --> 00:44:27,040
without anyone intending it to.
1240
00:44:27,040 --> 00:44:29,360
Power platform is full of examples, starter kits,
1241
00:44:29,360 --> 00:44:31,400
copy this and tweak it patterns.
1242
00:44:31,400 --> 00:44:33,440
Copilot makes that even worse in a useful way
1243
00:44:33,440 --> 00:44:35,960
because it reduces the work of copying to basically nothing.
1244
00:44:35,960 --> 00:44:37,640
A team sees a working agent, forks it,
1245
00:44:37,640 --> 00:44:39,720
changes a couple of prompts, swaps a connector,
1246
00:44:39,720 --> 00:44:41,120
and now they have their own version.
1247
00:44:41,120 --> 00:44:42,200
It looks like innovation.
1248
00:44:42,200 --> 00:44:44,560
Architecturally, it's divergence with a smile,
1249
00:44:44,560 --> 00:44:47,920
so scenario two starts the same way every time.
1250
00:44:47,920 --> 00:44:50,080
A business unit gets excited about copilot,
1251
00:44:50,080 --> 00:44:52,560
hits a limitation, and then discovers they can build
1252
00:44:52,560 --> 00:44:54,640
their own agent-like behavior in power,
1253
00:44:54,640 --> 00:44:56,800
automate, and copilot studio.
1254
00:44:56,800 --> 00:45:00,320
It starts as just a helper, something that drafts a response,
1255
00:45:00,320 --> 00:45:03,120
summarizes a request, or triages in email,
1256
00:45:03,120 --> 00:45:05,080
then it becomes just a workflow,
1257
00:45:05,080 --> 00:45:07,640
something that roots approvals, updates, records,
1258
00:45:07,640 --> 00:45:10,600
creates tasks, posts, notifications.
1259
00:45:10,600 --> 00:45:12,520
And then quietly it becomes business logic
1260
00:45:12,520 --> 00:45:15,280
because once the system can take an unstructured input,
1261
00:45:15,280 --> 00:45:18,600
an email, a form, a chat message, interpret it,
1262
00:45:18,600 --> 00:45:21,680
choose a path and execute actions across systems,
1263
00:45:21,680 --> 00:45:23,120
you've moved past automation,
1264
00:45:23,120 --> 00:45:25,760
you've embedded decision pathways into the organization.
1265
00:45:25,760 --> 00:45:27,480
This is where the ownership model breaks
1266
00:45:27,480 --> 00:45:29,640
in a very specific way, team's own outcomes,
1267
00:45:29,640 --> 00:45:31,280
nobody owns life cycles.
1268
00:45:31,280 --> 00:45:34,720
A maker owns the flow, a manager owns the process,
1269
00:45:34,720 --> 00:45:37,800
the eye owns the platform, security owns the policy,
1270
00:45:37,800 --> 00:45:40,800
compliance owns the audit, and the agent-like behavior
1271
00:45:40,800 --> 00:45:43,080
sits across all of them, prompt instructions
1272
00:45:43,080 --> 00:45:46,360
in copilot studio, branching logic in power automate,
1273
00:45:46,360 --> 00:45:49,720
data in data-vers, a youth in connectors, context in SharePoint,
1274
00:45:49,720 --> 00:45:51,440
notifications in teams.
1275
00:45:51,440 --> 00:45:53,200
So when it works, everyone claims value,
1276
00:45:53,200 --> 00:45:55,240
when it fails, nobody owns the behavior.
1277
00:45:55,240 --> 00:45:56,360
That's not a tooling flaw.
1278
00:45:56,360 --> 00:45:58,200
That's the operating model mismatch
1279
00:45:58,200 --> 00:46:00,400
showing up in the place where scale is easiest.
1280
00:46:00,400 --> 00:46:01,720
And it produces a failure mode
1281
00:46:01,720 --> 00:46:03,960
that looks different from copilot variants.
1282
00:46:03,960 --> 00:46:07,640
With copilot, people argue about output quality and citations.
1283
00:46:07,640 --> 00:46:09,000
With Power Platform agents,
1284
00:46:09,000 --> 00:46:10,920
the system starts doing things in the background.
1285
00:46:10,920 --> 00:46:12,720
It creates records, it sends emails,
1286
00:46:12,720 --> 00:46:14,320
it triggers downstream processes,
1287
00:46:14,320 --> 00:46:15,680
it touches systems of records.
1288
00:46:15,680 --> 00:46:18,760
So the consequences aren't just copilot answered weird.
1289
00:46:18,760 --> 00:46:21,880
The consequences are side effects, duplicates in data-verse,
1290
00:46:21,880 --> 00:46:25,280
premature notifications, silent routing to the wrong queue,
1291
00:46:25,280 --> 00:46:27,240
a connector that was authorized for convenience
1292
00:46:27,240 --> 00:46:29,520
and now acts as an escalation path,
1293
00:46:29,520 --> 00:46:32,880
an environment that got cloned and now runs the same flow
1294
00:46:32,880 --> 00:46:35,440
with different secrets, a prompt tweak
1295
00:46:35,440 --> 00:46:37,000
that changes which branch fires
1296
00:46:37,000 --> 00:46:39,480
and nobody realizes until three weeks later.
1297
00:46:39,480 --> 00:46:41,280
And because the platform makes building easy,
1298
00:46:41,280 --> 00:46:43,720
the organization will build faster than it can observe.
1299
00:46:43,720 --> 00:46:45,880
That's the entire setup for scenario two.
1300
00:46:45,880 --> 00:46:48,200
Low friction creation of agent-like behavior
1301
00:46:48,200 --> 00:46:51,200
in the one place enterprises already struggle to keep legible.
1302
00:46:51,200 --> 00:46:53,040
What follows is the real entropy signal.
1303
00:46:53,040 --> 00:46:55,680
It isn't shadow IT, it's shadow cognition.
1304
00:46:55,680 --> 00:46:57,800
Scenario two, entropy signals.
1305
00:46:57,800 --> 00:47:00,120
From shadow IT to shadow cognition,
1306
00:47:00,120 --> 00:47:02,280
shadow IT was annoying, but it was visible.
1307
00:47:02,280 --> 00:47:04,120
Someone spun up an unsanctioned app.
1308
00:47:04,120 --> 00:47:05,640
Someone moved files into Dropbox,
1309
00:47:05,640 --> 00:47:07,680
someone paid for a tool with a credit card,
1310
00:47:07,680 --> 00:47:10,120
you could discover it, block it, or at least name it.
1311
00:47:10,120 --> 00:47:13,120
Shadow cognition is worse because it doesn't look like a thing.
1312
00:47:13,120 --> 00:47:14,720
It looks like a reasonable workflow
1313
00:47:14,720 --> 00:47:16,360
that happens to contain decision logic
1314
00:47:16,360 --> 00:47:18,680
nobody can fully see, version, or test.
1315
00:47:18,680 --> 00:47:21,640
The first entropy signal is where the logic actually lives.
1316
00:47:21,640 --> 00:47:23,400
In Power Platform agent scenarios,
1317
00:47:23,400 --> 00:47:26,040
the business logic is no longer just in a flow definition
1318
00:47:26,040 --> 00:47:27,640
you can export and review.
1319
00:47:27,640 --> 00:47:29,360
It's split across four layers.
1320
00:47:29,360 --> 00:47:32,440
Natural language instructions, connector configuration,
1321
00:47:32,440 --> 00:47:34,520
data shape and branching behavior.
1322
00:47:34,520 --> 00:47:37,680
The instructions in Copilot Studio become the decision policy,
1323
00:47:37,680 --> 00:47:39,560
the connector becomes the authority boundary,
1324
00:47:39,560 --> 00:47:41,520
data verse becomes the memory and state
1325
00:47:41,520 --> 00:47:43,680
and the flow becomes the execution engine
1326
00:47:43,680 --> 00:47:45,640
that turns a judgment into side effects.
1327
00:47:45,640 --> 00:47:48,520
That fragmentation matters because you can't review the agent
1328
00:47:48,520 --> 00:47:49,880
as a single artifact anymore.
1329
00:47:49,880 --> 00:47:52,360
You can review a flow, you can review a DLP policy,
1330
00:47:52,360 --> 00:47:53,520
you can review a connector.
1331
00:47:53,520 --> 00:47:54,960
But the behavior is the composite
1332
00:47:54,960 --> 00:47:57,640
and composites are where audit narratives go to die.
1333
00:47:57,640 --> 00:47:59,360
The second signal is drift vectors
1334
00:47:59,360 --> 00:48:02,720
that have nothing to do with someone changing the process.
1335
00:48:02,720 --> 00:48:05,480
Connector auth changes, someone reauthenticates
1336
00:48:05,480 --> 00:48:08,160
with a different account because the original owner left
1337
00:48:08,160 --> 00:48:09,760
a token scope changes.
1338
00:48:09,760 --> 00:48:11,800
A conditional access rule gets tightened.
1339
00:48:11,800 --> 00:48:14,440
A premium connector gets swapped for a non-premium one
1340
00:48:14,440 --> 00:48:16,160
to avoid licensing friction.
1341
00:48:16,160 --> 00:48:18,880
Suddenly, the same agent takes a different path.
1342
00:48:18,880 --> 00:48:20,280
Not because logic changed,
1343
00:48:20,280 --> 00:48:22,520
but because reachable capabilities changed.
1344
00:48:22,520 --> 00:48:24,840
Environment moves are another drift vector.
1345
00:48:24,840 --> 00:48:27,800
Make us clone environments, copy solutions, migrate flows
1346
00:48:27,800 --> 00:48:30,560
and bring along just enough configuration to make it run.
1347
00:48:30,560 --> 00:48:32,160
The flow still says production,
1348
00:48:32,160 --> 00:48:35,520
but the secrets, endpoints or connection references aren't the same.
1349
00:48:35,520 --> 00:48:38,400
So behavior diverges while the artifact looks identical.
1350
00:48:38,400 --> 00:48:40,120
Schema drift is the quiet killer.
1351
00:48:40,120 --> 00:48:41,240
A column gets renamed.
1352
00:48:41,240 --> 00:48:42,200
A choice value changes.
1353
00:48:42,200 --> 00:48:43,400
A table gets extended.
1354
00:48:43,400 --> 00:48:44,800
A view gets filtered differently.
1355
00:48:44,800 --> 00:48:47,560
The agent still works, but it now grounds decisions
1356
00:48:47,560 --> 00:48:49,440
on slightly different data.
1357
00:48:49,440 --> 00:48:51,480
And because the decision layer is probabilistic,
1358
00:48:51,480 --> 00:48:52,680
you don't get a clean error.
1359
00:48:52,680 --> 00:48:54,280
You get subtly wrong outcomes
1360
00:48:54,280 --> 00:48:57,240
that only show up weeks later as operational friction.
1361
00:48:57,240 --> 00:48:58,800
And then there's prompt drift,
1362
00:48:58,800 --> 00:49:01,280
which is basically configuration drift with better PR.
1363
00:49:01,280 --> 00:49:05,200
A maker tweaks instructions because the agent fell to verbose.
1364
00:49:05,200 --> 00:49:06,720
Someone adds a guardrail sentence,
1365
00:49:06,720 --> 00:49:09,480
someone copies the agent and customizes it for their team.
1366
00:49:09,480 --> 00:49:11,840
Now the organization has multiple cognitive variants
1367
00:49:11,840 --> 00:49:15,080
of the same workflow, same name, same intent, different reasoning.
1368
00:49:15,080 --> 00:49:16,080
You have forked brains.
1369
00:49:16,080 --> 00:49:17,680
The third signal is the audit gap.
1370
00:49:17,680 --> 00:49:19,800
Most organizations can see that a flow ran.
1371
00:49:19,800 --> 00:49:21,240
They can see inputs and outputs.
1372
00:49:21,240 --> 00:49:23,040
They can see which connector call happened.
1373
00:49:23,040 --> 00:49:26,360
That sounds sufficient until the incident question becomes,
1374
00:49:26,360 --> 00:49:28,000
why did it choose that branch?
1375
00:49:28,000 --> 00:49:30,160
Why did it mark this request as urgent?
1376
00:49:30,160 --> 00:49:31,480
Why did it notify that group?
1377
00:49:31,480 --> 00:49:34,080
Why did it open a ticket instead of asking for clarification?
1378
00:49:34,080 --> 00:49:36,040
Why did it write to data verse before approval?
1379
00:49:36,040 --> 00:49:37,720
The flow log can show what happened.
1380
00:49:37,720 --> 00:49:40,480
It cannot show the internal decision path that produced,
1381
00:49:40,480 --> 00:49:42,600
therefore, due X because that decision path
1382
00:49:42,600 --> 00:49:44,320
is embedded in a probabilistic layer
1383
00:49:44,320 --> 00:49:46,840
with context selection and instruction interpretation.
1384
00:49:46,840 --> 00:49:48,680
So you can prove that the system executed.
1385
00:49:48,680 --> 00:49:50,600
You can't prove why it executed that way.
1386
00:49:50,600 --> 00:49:51,800
That's shadow cognition.
1387
00:49:51,800 --> 00:49:53,920
Decision making that affects systems of record
1388
00:49:53,920 --> 00:49:55,840
but can't be reconstructed in human terms
1389
00:49:55,840 --> 00:49:57,200
fast enough to be safe.
1390
00:49:57,200 --> 00:49:59,360
The fourth signal is behavioral side effects
1391
00:49:59,360 --> 00:50:01,440
that look like data quality issues,
1392
00:50:01,440 --> 00:50:03,360
but are actually decision pathway issues.
1393
00:50:03,360 --> 00:50:05,200
Duplicate records are the classic one.
1394
00:50:05,200 --> 00:50:07,120
The agent interprets two similar emails
1395
00:50:07,120 --> 00:50:10,200
as two distinct requests triggers the same flow twice,
1396
00:50:10,200 --> 00:50:13,840
creates two cases, and now humans spend hours reconciling.
1397
00:50:13,840 --> 00:50:15,440
Primature notifications are another.
1398
00:50:15,440 --> 00:50:17,440
The agent decides it has enough context
1399
00:50:17,440 --> 00:50:19,520
to alert stakeholders, but it's wrong.
1400
00:50:19,520 --> 00:50:22,040
And now the organization burns credibility.
1401
00:50:22,040 --> 00:50:25,120
Silent permission escalation is the most uncomfortable.
1402
00:50:25,120 --> 00:50:27,640
Delegated connectors run under a service identity
1403
00:50:27,640 --> 00:50:30,520
that has broader reach than the initiating user understands,
1404
00:50:30,520 --> 00:50:33,000
so the agent can move data or trigger actions
1405
00:50:33,000 --> 00:50:34,640
that feel like privilege creep,
1406
00:50:34,640 --> 00:50:36,920
even if nothing malicious happened.
1407
00:50:36,920 --> 00:50:39,320
The fifth signal is MTT spiking into permanence.
1408
00:50:39,320 --> 00:50:42,240
Debugging stops being engineering and becomes archaeology.
1409
00:50:42,240 --> 00:50:43,560
You're not tracing one system.
1410
00:50:43,560 --> 00:50:45,400
You're correlating copilot studio instructions,
1411
00:50:45,400 --> 00:50:47,360
flow history, connector, or context,
1412
00:50:47,360 --> 00:50:50,240
environment configuration, dataverse state,
1413
00:50:50,240 --> 00:50:52,400
and whatever prompt changes someone made last month
1414
00:50:52,400 --> 00:50:54,640
because it worked better.
1415
00:50:54,640 --> 00:50:56,800
You ask who owns it and you get three names.
1416
00:50:56,800 --> 00:50:59,200
You ask who can change it and you get six.
1417
00:50:59,200 --> 00:51:01,920
You ask what version is running and you get silence.
1418
00:51:01,920 --> 00:51:04,280
And then the most predictable outcome happens.
1419
00:51:04,280 --> 00:51:05,320
The business doesn't stop.
1420
00:51:05,320 --> 00:51:06,720
They can't, so they patch again.
1421
00:51:06,720 --> 00:51:10,680
Another flow, another exception, another connector, another tweak.
1422
00:51:10,680 --> 00:51:11,880
That's the loop.
1423
00:51:11,880 --> 00:51:13,800
Shadow it created unapproved tools.
1424
00:51:13,800 --> 00:51:16,000
Shadow cognition creates unowned decisions.
1425
00:51:16,000 --> 00:51:18,720
And once unowned decisions can execute side effects,
1426
00:51:18,720 --> 00:51:20,640
you're no longer scaling productivity,
1427
00:51:20,640 --> 00:51:22,400
you're scaling ambiguity.
1428
00:51:22,400 --> 00:51:24,000
Scenario three, set up.
1429
00:51:24,000 --> 00:51:26,840
As your AI orchestration without a control plane,
1430
00:51:26,840 --> 00:51:28,280
shadow cognition is what happens
1431
00:51:28,280 --> 00:51:30,640
when makers distribute decision logic faster
1432
00:51:30,640 --> 00:51:32,080
than anyone can see it.
1433
00:51:32,080 --> 00:51:33,320
Scenario three is what happens
1434
00:51:33,320 --> 00:51:34,560
when engineers do the same thing
1435
00:51:34,560 --> 00:51:36,800
but with better tooling and higher blast radius.
1436
00:51:36,800 --> 00:51:38,840
This is where Azure shows up in the story
1437
00:51:38,840 --> 00:51:40,800
and the comforting myth returns.
1438
00:51:40,800 --> 00:51:42,880
At least the Pro Code teams will do it properly.
1439
00:51:42,880 --> 00:51:44,600
They won't. They'll do it efficiently.
1440
00:51:44,600 --> 00:51:45,640
They'll do it under pressure.
1441
00:51:45,640 --> 00:51:46,960
They'll do it in fragments.
1442
00:51:46,960 --> 00:51:49,560
And then they'll move on to the next backlog item
1443
00:51:49,560 --> 00:51:52,400
while the fragments stay behind as permanent infrastructure
1444
00:51:52,400 --> 00:51:54,880
because Azure AI orchestration isn't one product.
1445
00:51:54,880 --> 00:51:57,840
It's an assembly line, a model endpoint, a tool layer,
1446
00:51:57,840 --> 00:52:01,040
some retrieval, a queue, a worker, a database for state,
1447
00:52:01,040 --> 00:52:03,080
a memory store, a set of retries,
1448
00:52:03,080 --> 00:52:05,800
some temporary glue to connect a system of record,
1449
00:52:05,800 --> 00:52:08,400
a dashboard maybe, a tracing setup hopefully.
1450
00:52:08,400 --> 00:52:10,480
And a dozen small decisions about identity,
1451
00:52:10,480 --> 00:52:12,200
secrets, networking and logging
1452
00:52:12,200 --> 00:52:14,560
that determine whether this thing is an engineered system
1453
00:52:14,560 --> 00:52:16,840
or a probabilistic pile of side effects.
1454
00:52:16,840 --> 00:52:19,600
Most organizations start Scenario three the same way.
1455
00:52:19,600 --> 00:52:21,360
A team gets asked to build an agent
1456
00:52:21,360 --> 00:52:24,040
that does something real, not summarize documents,
1457
00:52:24,040 --> 00:52:27,440
something with consequences, create tickets, update records,
1458
00:52:27,440 --> 00:52:29,280
trigger approvals, triage incidents,
1459
00:52:29,280 --> 00:52:31,920
draft customer responses and push them into a CRM.
1460
00:52:31,920 --> 00:52:33,480
The exact use case doesn't matter.
1461
00:52:33,480 --> 00:52:34,360
The pattern does.
1462
00:52:34,360 --> 00:52:37,480
It starts as an experiment because everything starts as an experiment.
1463
00:52:37,480 --> 00:52:40,040
So they spin up an Azure open AI deployment
1464
00:52:40,040 --> 00:52:43,080
or use Foundry or whatever their internal standard is this quarter.
1465
00:52:43,080 --> 00:52:44,080
They add a little rag.
1466
00:52:44,080 --> 00:52:45,360
They wire up a few tools.
1467
00:52:45,360 --> 00:52:47,000
They test it with happy path prompts.
1468
00:52:47,000 --> 00:52:48,280
It looks good in a demo.
1469
00:52:48,280 --> 00:52:50,880
Leadership sees the demo and thinks the hard part is done.
1470
00:52:50,880 --> 00:52:53,560
The hard part hasn't started because the system that demo as well
1471
00:52:53,560 --> 00:52:56,520
is almost never the system that survives production reality.
1472
00:52:56,520 --> 00:52:58,720
Partial failures, inconsistent inputs,
1473
00:52:58,720 --> 00:53:02,200
permission edges, rate limits, downstream API quirks,
1474
00:53:02,200 --> 00:53:04,600
and the simple fact that human workflows are messy
1475
00:53:04,600 --> 00:53:06,640
and rarely match the data model.
1476
00:53:06,640 --> 00:53:08,320
So the team adds orchestration,
1477
00:53:08,320 --> 00:53:09,840
not because they love architecture,
1478
00:53:09,840 --> 00:53:13,040
because they need the agent to do multiple steps reliably.
1479
00:53:13,040 --> 00:53:15,040
And this is where the entropy begins.
1480
00:53:15,040 --> 00:53:17,600
Each project invents orchestration from scratch.
1481
00:53:17,600 --> 00:53:19,720
One team builds a state machine in code.
1482
00:53:19,720 --> 00:53:21,240
Another uses durable functions.
1483
00:53:21,240 --> 00:53:24,880
Another uses logic apps for steps and a custom worker for reasoning.
1484
00:53:24,880 --> 00:53:27,960
Another uses cues and retries and calls it event driven.
1485
00:53:27,960 --> 00:53:31,640
Another uses a framework and assumes the framework is the architecture.
1486
00:53:31,640 --> 00:53:34,840
Another uses a notebook that becomes a scheduled job
1487
00:53:34,840 --> 00:53:36,440
that becomes a production dependency,
1488
00:53:36,440 --> 00:53:38,200
because nobody had time to rewrite it.
1489
00:53:38,200 --> 00:53:41,240
Same outcome, bespoke state, bespoke memory, bespoke logging.
1490
00:53:41,240 --> 00:53:43,480
It's not malicious, it's normal.
1491
00:53:43,480 --> 00:53:45,640
And because every team has slightly different skills
1492
00:53:45,640 --> 00:53:47,000
and slightly different constraints,
1493
00:53:47,000 --> 00:53:48,680
they pick different building blocks,
1494
00:53:48,680 --> 00:53:51,720
different storage, different telemetry, different auth strategies,
1495
00:53:51,720 --> 00:53:53,400
different ways to do tool calling,
1496
00:53:53,400 --> 00:53:55,160
different ways to handle human in the loop,
1497
00:53:55,160 --> 00:53:56,760
different ways to package prompts,
1498
00:53:56,760 --> 00:53:58,520
different ways to version anything at all.
1499
00:53:58,520 --> 00:54:01,160
So the enterprise doesn't get an agent platform.
1500
00:54:01,160 --> 00:54:04,200
It gets multiple orchestration dialects that can't explain each other.
1501
00:54:04,200 --> 00:54:07,240
This is the part nobody says out loud in architecture reviews.
1502
00:54:07,240 --> 00:54:10,040
Orchestration logic becomes the new integration layer.
1503
00:54:10,040 --> 00:54:13,800
And integration layers are where enterprises accumulate their worst legacy.
1504
00:54:13,800 --> 00:54:15,480
Not because the code is old,
1505
00:54:15,480 --> 00:54:18,120
because the dependency density becomes untouchable.
1506
00:54:18,120 --> 00:54:20,120
Then the second predictable thing happens.
1507
00:54:20,120 --> 00:54:21,480
Prototype gravity.
1508
00:54:21,480 --> 00:54:24,120
A proof of concept gets used just for a pilot.
1509
00:54:24,120 --> 00:54:26,680
Then the pilot gets used just for this one team.
1510
00:54:26,680 --> 00:54:29,160
Then the team depends on it for a quarterly process,
1511
00:54:29,160 --> 00:54:30,760
then monthly, then daily.
1512
00:54:30,760 --> 00:54:33,160
And now the agent is part of the operating model.
1513
00:54:33,160 --> 00:54:35,320
But it still runs on POC assumptions.
1514
00:54:35,320 --> 00:54:38,440
Week versioning informal ownership, missing kill switches,
1515
00:54:38,440 --> 00:54:39,640
inconsistent tracing,
1516
00:54:39,640 --> 00:54:41,480
and an identity model that looks fine
1517
00:54:41,480 --> 00:54:43,800
until it has to touch a system of record at scale.
1518
00:54:43,800 --> 00:54:46,200
At this point, the architecture diagram
1519
00:54:46,200 --> 00:54:47,720
stops representing reality.
1520
00:54:47,720 --> 00:54:49,880
Because the diagram shows components and arrows,
1521
00:54:49,880 --> 00:54:52,120
the runtime is decisions and side effects.
1522
00:54:52,120 --> 00:54:54,360
And when a probabilistic system executes,
1523
00:54:54,360 --> 00:54:57,240
the most important details are the ones diagrams don't capture,
1524
00:54:57,240 --> 00:54:58,600
which tool was selected,
1525
00:54:58,600 --> 00:55:00,200
what context was retrieved,
1526
00:55:00,200 --> 00:55:01,560
which retries happened,
1527
00:55:01,560 --> 00:55:03,160
what partial execution occurred,
1528
00:55:03,160 --> 00:55:04,680
which compensations ran,
1529
00:55:04,680 --> 00:55:07,240
and what authority the agent carried when it acted.
1530
00:55:07,240 --> 00:55:08,680
Without a control plane,
1531
00:55:08,680 --> 00:55:10,600
none of that is consistently captured.
1532
00:55:10,600 --> 00:55:12,440
So every incident becomes bespoke,
1533
00:55:12,440 --> 00:55:14,120
every post-mortem becomes a debate
1534
00:55:14,120 --> 00:55:16,040
about whether the agent did something wrong
1535
00:55:16,040 --> 00:55:18,600
or whether the downstream system behaved strangely
1536
00:55:18,600 --> 00:55:20,440
or whether the input was ambiguous
1537
00:55:20,440 --> 00:55:23,000
or whether the model update changed behavior.
1538
00:55:23,000 --> 00:55:24,200
All of those can be true.
1539
00:55:24,200 --> 00:55:24,840
That's the point.
1540
00:55:24,840 --> 00:55:28,120
In scenario three, as your doesn't just amplify the agent problem,
1541
00:55:28,120 --> 00:55:29,640
it industrializes it.
1542
00:55:29,640 --> 00:55:32,200
Because now the organization can build agents
1543
00:55:32,200 --> 00:55:35,240
that run continuously at scale across many systems
1544
00:55:35,240 --> 00:55:37,320
with autonomous retries and delegation chains
1545
00:55:37,320 --> 00:55:41,400
and tool catalogs that evolve faster than any centralized document can track.
1546
00:55:41,400 --> 00:55:42,760
And if there's no control plane,
1547
00:55:42,760 --> 00:55:45,480
no enforced identity, no consistent telemetry,
1548
00:55:45,480 --> 00:55:46,760
no life cycle ownership,
1549
00:55:46,760 --> 00:55:49,000
no single place where tool authorization
1550
00:55:49,000 --> 00:55:51,000
and version responsibility are anchored,
1551
00:55:51,000 --> 00:55:52,520
you don't have an agent estate.
1552
00:55:52,520 --> 00:55:54,600
You have a fleet of unsupervised workflows
1553
00:55:54,600 --> 00:55:56,200
pretending to be software.
1554
00:55:56,200 --> 00:55:57,960
Next comes the uncomfortable part.
1555
00:55:57,960 --> 00:56:00,040
When orchestration becomes the new legacy,
1556
00:56:00,040 --> 00:56:01,720
it fails in a very specific way.
1557
00:56:01,720 --> 00:56:04,120
It doesn't crash, it leaves side effects.
1558
00:56:04,120 --> 00:56:05,960
Scenario three entropy signals.
1559
00:56:05,960 --> 00:56:08,280
Orchestration logic becomes the new legacy.
1560
00:56:08,280 --> 00:56:10,200
The entropy signals in Azure orchestration
1561
00:56:10,200 --> 00:56:11,720
don't show up as AI problems,
1562
00:56:11,720 --> 00:56:13,320
then they show up as software problems
1563
00:56:13,320 --> 00:56:15,000
that don't behave like software anymore.
1564
00:56:15,000 --> 00:56:16,600
The first signal is that orchestration
1565
00:56:16,600 --> 00:56:17,960
becomes the hidden monolith,
1566
00:56:17,960 --> 00:56:19,560
not because the code base is huge,
1567
00:56:19,560 --> 00:56:22,760
because the dependency density is one agent now depends on,
1568
00:56:22,760 --> 00:56:25,880
model deployments, prompt variants,
1569
00:56:25,880 --> 00:56:28,040
tool schemers, secrets,
1570
00:56:28,040 --> 00:56:30,920
queues, state stores, retrieval indexes,
1571
00:56:30,920 --> 00:56:32,520
downstream APIs,
1572
00:56:32,520 --> 00:56:36,040
and whatever retry policy someone chose at 2AM during the pilot.
1573
00:56:36,040 --> 00:56:38,280
Each dependency is reasonable on its own.
1574
00:56:38,280 --> 00:56:40,920
Together, they form a system no one can safely change
1575
00:56:40,920 --> 00:56:42,760
without breaking something they can't see.
1576
00:56:42,760 --> 00:56:44,920
So the system keeps running and it keeps a greeting.
1577
00:56:46,120 --> 00:56:48,120
That's how legacy is born in the cloud,
1578
00:56:48,120 --> 00:56:51,320
not by age, but by accumulated reluctance to touch it.
1579
00:56:51,320 --> 00:56:54,360
The second signal is the partial execution failure mode.
1580
00:56:54,360 --> 00:56:56,600
Deterministic workflows usually fail cleanly.
1581
00:56:56,600 --> 00:56:58,600
The transaction rolls back, the drop errors out,
1582
00:56:58,600 --> 00:57:01,080
the process stops, you get a single failure point.
1583
00:57:01,080 --> 00:57:01,960
You know where to look.
1584
00:57:01,960 --> 00:57:05,240
Agent orchestration fails like a distributed set of side effects.
1585
00:57:05,240 --> 00:57:06,920
A tool called succeeds,
1586
00:57:06,920 --> 00:57:08,520
the next one times out,
1587
00:57:08,520 --> 00:57:09,640
retries fire,
1588
00:57:09,640 --> 00:57:11,320
compensations don't,
1589
00:57:11,320 --> 00:57:13,160
and now the system has done some of the work
1590
00:57:13,160 --> 00:57:15,640
with no coherent boundary around what's complete.
1591
00:57:15,640 --> 00:57:17,400
It created a ticket but didn't notify.
1592
00:57:17,400 --> 00:57:19,480
It sent the email but didn't update the record.
1593
00:57:19,480 --> 00:57:22,040
It updated the record twice because the retry logic
1594
00:57:22,040 --> 00:57:23,720
didn't understand the importance.
1595
00:57:23,720 --> 00:57:24,680
Nothing is down,
1596
00:57:24,680 --> 00:57:26,120
but the business state is wrong,
1597
00:57:26,120 --> 00:57:28,520
and because it's wrong in small ways, it doesn't trip alarms.
1598
00:57:28,520 --> 00:57:29,720
It trips humans.
1599
00:57:29,720 --> 00:57:31,640
That's where MTE gets paid again,
1600
00:57:31,640 --> 00:57:33,160
not explaining an outage,
1601
00:57:33,160 --> 00:57:35,000
explaining a trail of half-actions.
1602
00:57:35,000 --> 00:57:37,640
The third signal is that retries become policy decisions.
1603
00:57:37,640 --> 00:57:38,680
In classic systems,
1604
00:57:38,680 --> 00:57:40,360
retry logic is mostly technical,
1605
00:57:40,360 --> 00:57:41,480
exponential back-off,
1606
00:57:41,480 --> 00:57:43,480
circuit breakers, dead-letter cues.
1607
00:57:43,480 --> 00:57:44,920
Boring, fine.
1608
00:57:44,920 --> 00:57:46,040
In orchestration systems,
1609
00:57:46,040 --> 00:57:47,720
retries become behavioral governance,
1610
00:57:47,720 --> 00:57:48,920
whether you admit it or not.
1611
00:57:48,920 --> 00:57:50,760
Do you retry an action that sends an email?
1612
00:57:50,760 --> 00:57:52,520
Do you retry something that creates a record?
1613
00:57:52,520 --> 00:57:54,520
Do you retry something that triggers a payment
1614
00:57:54,520 --> 00:57:56,840
or changes a permission or posts into a channel
1615
00:57:56,840 --> 00:57:57,640
that people act on?
1616
00:57:57,640 --> 00:57:59,960
Every retry risks duplicating a side effect.
1617
00:57:59,960 --> 00:58:03,720
Every, don't retry risks abandoning a workflow mid-flight.
1618
00:58:03,720 --> 00:58:06,120
So engineers end up encoding business policy
1619
00:58:06,120 --> 00:58:07,240
into technical defaults
1620
00:58:07,240 --> 00:58:08,600
because there is no separate layer
1621
00:58:08,600 --> 00:58:10,040
where those decisions live.
1622
00:58:10,040 --> 00:58:11,800
That's entropy when policy migrates
1623
00:58:11,800 --> 00:58:13,720
into the least-reviewed code path.
1624
00:58:13,720 --> 00:58:16,040
The fourth signal is tool-call reliability
1625
00:58:16,040 --> 00:58:17,480
turning into a lottery.
1626
00:58:17,480 --> 00:58:19,800
Every tool is available until it isn't.
1627
00:58:19,800 --> 00:58:21,880
Graph throttles.
1628
00:58:21,880 --> 00:58:22,920
API's change.
1629
00:58:22,920 --> 00:58:24,520
A connector version shifts.
1630
00:58:24,520 --> 00:58:27,320
A downstream system enforces a new validation rule.
1631
00:58:27,320 --> 00:58:29,320
A key rotates, a permission gets removed.
1632
00:58:29,320 --> 00:58:31,560
The orchestrator still plans as if the tool exists
1633
00:58:31,560 --> 00:58:33,160
because the catalog says it does.
1634
00:58:33,160 --> 00:58:35,000
But runtime reality disagrees.
1635
00:58:35,000 --> 00:58:36,360
So the system adapts.
1636
00:58:36,360 --> 00:58:38,120
And adapts is the dangerous word here
1637
00:58:38,120 --> 00:58:39,800
because adaptation without constraints
1638
00:58:39,800 --> 00:58:42,120
is just improvisation with production data.
1639
00:58:42,120 --> 00:58:44,040
One agent falls back to a different source.
1640
00:58:44,040 --> 00:58:45,960
Another changes the order of operations.
1641
00:58:45,960 --> 00:58:48,920
Another asks the user for input in one channel
1642
00:58:48,920 --> 00:58:50,680
and proceeds without input in another.
1643
00:58:50,680 --> 00:58:53,560
Over time, the behavior becomes a statistical distribution,
1644
00:58:53,560 --> 00:58:54,680
not a design flow.
1645
00:58:54,680 --> 00:58:57,080
Again, nothing is down, but outcomes drift.
1646
00:58:57,080 --> 00:59:01,000
The fifth signal is delegation chain blast radius.
1647
00:59:01,000 --> 00:59:02,520
Teams love multi-agent patterns
1648
00:59:02,520 --> 00:59:04,120
because they look clean on paper.
1649
00:59:04,120 --> 00:59:06,280
Specialize the agents, delegate the tasks,
1650
00:59:06,280 --> 00:59:08,920
keep prompt small, keep responsibilities clear.
1651
00:59:08,920 --> 00:59:11,560
In production, delegation chains
1652
00:59:11,560 --> 00:59:13,240
are how you lose accountability.
1653
00:59:13,240 --> 00:59:15,400
A parent agent delegates to a retrieval agent
1654
00:59:15,400 --> 00:59:18,280
which delegates to a data agent which calls an MCP server
1655
00:59:18,280 --> 00:59:20,040
which calls an internal API,
1656
00:59:20,040 --> 00:59:21,960
which triggers an event that wakes a worker
1657
00:59:21,960 --> 00:59:23,640
that runs another tool call.
1658
00:59:23,640 --> 00:59:26,440
At the end of that chain, a side effect lands
1659
00:59:26,440 --> 00:59:27,800
in a system of record.
1660
00:59:27,800 --> 00:59:30,440
And the only useful question is whose authority was that?
1661
00:59:30,440 --> 00:59:32,120
Most stacks can't answer it cleanly.
1662
00:59:32,120 --> 00:59:34,760
They can tell you which service principle executed the call.
1663
00:59:34,760 --> 00:59:37,400
They can't tell you which decision pathway authorized it,
1664
00:59:37,400 --> 00:59:38,920
which context justified it
1665
00:59:38,920 --> 00:59:40,600
and which human intended traces back to
1666
00:59:40,600 --> 00:59:42,280
because the chain is assembled dynamically.
1667
00:59:42,280 --> 00:59:44,520
So you end up with a system that is order table
1668
00:59:44,520 --> 00:59:46,440
in the shallow sense, logs exist,
1669
00:59:46,440 --> 00:59:48,360
but illegible in the operational sense,
1670
00:59:48,360 --> 00:59:51,160
meaning can't be reconstructed quickly enough to matter.
1671
00:59:51,160 --> 00:59:53,560
The sixth signal is telemetry that exists
1672
00:59:53,560 --> 00:59:55,400
but doesn't compile into explanation.
1673
00:59:55,400 --> 00:59:57,560
Teams will instrument, they'll add open telemetry,
1674
00:59:57,560 --> 00:59:59,320
they'll capture traces, they'll log prompts,
1675
00:59:59,320 --> 01:00:01,320
they'll store outputs, they'll have dashboards.
1676
01:00:01,320 --> 01:00:03,480
And still, in the incident,
1677
01:00:03,480 --> 01:00:05,560
someone asks the question that matters.
1678
01:00:05,560 --> 01:00:08,040
Why did it choose that tool in that order
1679
01:00:08,040 --> 01:00:10,200
with that authority given that context?
1680
01:00:10,200 --> 01:00:13,080
And the traces don't answer it because tracing tells you what happened.
1681
01:00:13,080 --> 01:00:15,880
It doesn't tell you what the system believed when it happened.
1682
01:00:15,880 --> 01:00:18,280
Or what it ignored, or what it couldn't see.
1683
01:00:18,280 --> 01:00:21,400
Or which version of the reasoning instructions it was operating under.
1684
01:00:21,400 --> 01:00:24,040
That's the real entropy signal in scenario three.
1685
01:00:24,040 --> 01:00:26,200
Orchestration logic becomes the new legacy
1686
01:00:26,200 --> 01:00:29,080
because it accumulates decisions faster than your organization
1687
01:00:29,080 --> 01:00:30,120
can keep them legible.
1688
01:00:30,120 --> 01:00:31,560
It doesn't crash, it corrods.
1689
01:00:31,560 --> 01:00:33,960
And once it corrods, the enterprise does what it always does.
1690
01:00:33,960 --> 01:00:35,080
It blames the platform.
1691
01:00:35,080 --> 01:00:37,400
But the platform did exactly what it was designed to do.
1692
01:00:37,400 --> 01:00:39,080
It executed the reveal.
1693
01:00:39,080 --> 01:00:42,440
Entropy is an operating model failure, not a platform failure.
1694
01:00:42,440 --> 01:00:43,960
Here's what always happens next.
1695
01:00:43,960 --> 01:00:45,560
The organization blames the platform.
1696
01:00:45,560 --> 01:00:47,400
Copilot is unreliable.
1697
01:00:47,400 --> 01:00:49,560
Power platform is the wild west.
1698
01:00:49,560 --> 01:00:51,160
Azure is too flexible.
1699
01:00:51,160 --> 01:00:53,240
MCP is another thing to govern.
1700
01:00:53,240 --> 01:00:55,160
Foundry is moving too fast.
1701
01:00:55,160 --> 01:00:56,520
The vendor narrative is tempting
1702
01:00:56,520 --> 01:00:58,840
because it gives leadership a clean scapegoat.
1703
01:00:58,840 --> 01:01:00,520
The tooling created the chaos.
1704
01:01:00,520 --> 01:01:02,360
Therefore, better tooling will remove it.
1705
01:01:02,360 --> 01:01:03,480
It won't.
1706
01:01:03,480 --> 01:01:05,480
Because the platform didn't create the entropy,
1707
01:01:05,480 --> 01:01:06,440
the organization did,
1708
01:01:06,440 --> 01:01:09,480
by deploying probabilistic execution into an operating model
1709
01:01:09,480 --> 01:01:11,080
designed for deterministic systems.
1710
01:01:11,080 --> 01:01:12,760
That distinction matters.
1711
01:01:12,760 --> 01:01:14,920
Microsoft platforms behave predictably,
1712
01:01:14,920 --> 01:01:16,840
not in the nothing changes sense.
1713
01:01:16,840 --> 01:01:17,880
In the system sense.
1714
01:01:17,880 --> 01:01:19,720
They do exactly what they are designed to do.
1715
01:01:19,720 --> 01:01:21,960
They expose capability, they reduce friction,
1716
01:01:21,960 --> 01:01:23,240
they enable delegation,
1717
01:01:23,240 --> 01:01:25,400
they let teams compose solutions locally
1718
01:01:25,400 --> 01:01:27,800
and they keep running even when no one is watching.
1719
01:01:27,800 --> 01:01:28,600
That isn't the flaw.
1720
01:01:28,600 --> 01:01:29,400
That's the product.
1721
01:01:29,400 --> 01:01:31,960
The failure is that enterprises
1722
01:01:31,960 --> 01:01:34,920
keep treating agent systems like feature rollouts
1723
01:01:34,920 --> 01:01:36,920
when they are actually operating model changes.
1724
01:01:36,920 --> 01:01:38,760
A new execution layer doesn't fit inside
1725
01:01:38,760 --> 01:01:40,120
the older accountability model.
1726
01:01:40,120 --> 01:01:40,840
It breaks it.
1727
01:01:40,840 --> 01:01:41,960
In deterministic SaaS,
1728
01:01:41,960 --> 01:01:43,720
responsibility is easy to assign.
1729
01:01:43,720 --> 01:01:45,240
IT owns the service configuration,
1730
01:01:45,240 --> 01:01:46,520
security owns policy,
1731
01:01:46,520 --> 01:01:47,720
the business owns process,
1732
01:01:47,720 --> 01:01:49,240
support owns incidents,
1733
01:01:49,240 --> 01:01:50,600
vendors own uptime.
1734
01:01:50,600 --> 01:01:52,520
And most of the time, that mapping works.
1735
01:01:52,520 --> 01:01:53,880
Because execution is bounded.
1736
01:01:53,880 --> 01:01:55,240
Users click systems run,
1737
01:01:55,240 --> 01:01:56,600
logs tell a coherent story.
1738
01:01:56,600 --> 01:01:57,400
In post-SaaS,
1739
01:01:57,400 --> 01:01:59,480
execution is not bounded by the UI.
1740
01:01:59,480 --> 01:02:01,720
Execution is bounded by whatever tools are reachable,
1741
01:02:01,720 --> 01:02:03,320
whatever context is selectable,
1742
01:02:03,320 --> 01:02:06,200
and whatever authority the agent can present when it acts.
1743
01:02:06,200 --> 01:02:07,560
Those are not settings.
1744
01:02:07,560 --> 01:02:08,840
They are decision rights.
1745
01:02:08,840 --> 01:02:11,800
And most enterprises have never explicitly designed decision rights
1746
01:02:11,800 --> 01:02:13,160
for non-human actors.
1747
01:02:13,160 --> 01:02:15,080
So you get the predictable failure mode.
1748
01:02:15,080 --> 01:02:17,320
Everyone owns a slice, nobody owns the behavior.
1749
01:02:17,320 --> 01:02:18,440
The business unit says,
1750
01:02:18,440 --> 01:02:19,400
we own the outcome.
1751
01:02:19,400 --> 01:02:21,240
As I'd says, we own the platform.
1752
01:02:21,240 --> 01:02:23,000
Security says, we set the policies.
1753
01:02:23,000 --> 01:02:24,760
That you make us say, we build the flow.
1754
01:02:24,760 --> 01:02:26,760
Developers say, we ship the API.
1755
01:02:26,760 --> 01:02:28,600
And the agent sits across all of them,
1756
01:02:28,600 --> 01:02:30,920
making runtime choices that no single team
1757
01:02:30,920 --> 01:02:32,760
is accountable for explaining end-to-end.
1758
01:02:32,760 --> 01:02:33,880
That's not a tooling gap.
1759
01:02:33,880 --> 01:02:35,960
That's an operating model with a missing role.
1760
01:02:35,960 --> 01:02:38,520
Someone has to own behavior, not just resources.
1761
01:02:38,520 --> 01:02:41,240
Now, mostly this respond with the word governance.
1762
01:02:41,240 --> 01:02:43,560
And then they do the thing enterprises always do
1763
01:02:43,560 --> 01:02:45,160
when reality gets messy.
1764
01:02:45,160 --> 01:02:46,520
They schedule meetings.
1765
01:02:46,520 --> 01:02:49,720
Committees, review boards, intake forms, approval workflows,
1766
01:02:49,720 --> 01:02:51,640
centers of excellence, quarterly check-ins,
1767
01:02:51,640 --> 01:02:54,360
a big spreadsheet where someone tries to list every agent,
1768
01:02:54,360 --> 01:02:55,800
every flow, every connector,
1769
01:02:55,800 --> 01:02:58,760
every prompt library, every plug-in, every experiment.
1770
01:02:58,760 --> 01:03:00,680
That approach fails for a simple reason.
1771
01:03:00,680 --> 01:03:02,200
Decisions happen at runtime.
1772
01:03:02,200 --> 01:03:06,120
A meeting cannot govern a decision the system already executed.
1773
01:03:06,120 --> 01:03:08,600
A policy doc cannot constrain a tool call the agent
1774
01:03:08,600 --> 01:03:09,800
can still reach.
1775
01:03:09,800 --> 01:03:11,960
A review board cannot keep up with prompt drift
1776
01:03:11,960 --> 01:03:14,120
that spreads in a team's chat in an afternoon.
1777
01:03:14,120 --> 01:03:15,160
So the reveal is blunt.
1778
01:03:15,160 --> 01:03:17,240
The organization thinks it has a governance problem.
1779
01:03:17,240 --> 01:03:19,160
It actually has a contract problem.
1780
01:03:19,160 --> 01:03:21,240
Agentex systems need explicit contracts.
1781
01:03:21,240 --> 01:03:22,840
What the agent is allowed to decide,
1782
01:03:22,840 --> 01:03:24,440
what it is not allowed to decide,
1783
01:03:24,440 --> 01:03:25,640
what tools it can call,
1784
01:03:25,640 --> 01:03:26,920
what data it can ground on,
1785
01:03:26,920 --> 01:03:28,520
what identity it must use,
1786
01:03:28,520 --> 01:03:29,960
what telemetry it must emit,
1787
01:03:29,960 --> 01:03:32,360
and what constitutes a recoverable failure
1788
01:03:32,360 --> 01:03:34,680
versus a business impacting side effect.
1789
01:03:34,680 --> 01:03:37,320
Without those contracts, you don't have AI adoption.
1790
01:03:37,320 --> 01:03:39,000
You have conditional chaos.
1791
01:03:39,000 --> 01:03:40,760
And the most uncomfortable part is this.
1792
01:03:40,760 --> 01:03:42,440
The platform can't solve that for you
1793
01:03:42,440 --> 01:03:44,040
because it's not a product decision.
1794
01:03:44,040 --> 01:03:45,320
It's an organizational decision.
1795
01:03:45,320 --> 01:03:47,400
It's the definition of intent enforced by design.
1796
01:03:47,400 --> 01:03:49,880
The platform will happily give you more capability.
1797
01:03:49,880 --> 01:03:51,640
More connectors, more models,
1798
01:03:51,640 --> 01:03:52,920
more orchestration patterns,
1799
01:03:52,920 --> 01:03:54,200
more automation surfaces,
1800
01:03:54,200 --> 01:03:55,240
that's not the problem.
1801
01:03:55,240 --> 01:03:57,560
The problem is that your scaling execution
1802
01:03:57,560 --> 01:04:00,440
without scaling accountability for decision pathways,
1803
01:04:00,440 --> 01:04:02,760
you're giving the enterprises second workforce.
1804
01:04:02,760 --> 01:04:04,280
An agent workforce,
1805
01:04:04,280 --> 01:04:07,320
without redefining how work gets authorized,
1806
01:04:07,320 --> 01:04:08,680
observed, and retired.
1807
01:04:08,680 --> 01:04:09,800
So when leaders ask,
1808
01:04:09,800 --> 01:04:11,400
why is entropy increasing?
1809
01:04:11,400 --> 01:04:12,280
The answer is simple,
1810
01:04:12,280 --> 01:04:14,760
because you tried to run probabilistic systems
1811
01:04:14,760 --> 01:04:16,920
with a deterministic operating model.
1812
01:04:16,920 --> 01:04:19,000
You kept ownership at the resource layer
1813
01:04:19,000 --> 01:04:21,000
and you left behavior unowned.
1814
01:04:21,000 --> 01:04:22,520
And that's why entropy keeps winning.
1815
01:04:22,520 --> 01:04:24,120
It has no counterforce.
1816
01:04:24,120 --> 01:04:25,400
The way out is not more tooling.
1817
01:04:25,400 --> 01:04:26,520
It's a design discipline.
1818
01:04:27,160 --> 01:04:28,840
Agent First Architecture,
1819
01:04:28,840 --> 01:04:31,400
explicit boundaries for probabilistic systems,
1820
01:04:31,400 --> 01:04:33,160
where reasoning stays conditional,
1821
01:04:33,160 --> 01:04:35,240
but execution stays deterministic,
1822
01:04:35,240 --> 01:04:36,280
legible, and owned.
1823
01:04:36,280 --> 01:04:38,360
Agent First Architecture,
1824
01:04:38,360 --> 01:04:40,760
explicit boundaries for probabilistic systems.
1825
01:04:40,760 --> 01:04:43,480
Agent First Architecture is not a new diagram style.
1826
01:04:43,480 --> 01:04:45,800
It's a discipline for keeping probabilistic reasoning
1827
01:04:45,800 --> 01:04:47,880
from infecting deterministic execution.
1828
01:04:47,880 --> 01:04:49,960
Most organizations inverted by accident.
1829
01:04:49,960 --> 01:04:51,640
They let the agent reason,
1830
01:04:51,640 --> 01:04:53,800
choose tools, execute actions,
1831
01:04:53,800 --> 01:04:56,280
and then they ask humans to review
1832
01:04:56,280 --> 01:04:59,080
outcomes after the fact that is not human in the loop.
1833
01:04:59,080 --> 01:05:00,280
That's human as auditor.
1834
01:05:00,280 --> 01:05:02,360
And auditors don't prevent side effects.
1835
01:05:02,360 --> 01:05:04,120
And they just write reports about them.
1836
01:05:04,120 --> 01:05:05,640
The core principle is simple.
1837
01:05:05,640 --> 01:05:07,400
Probabilistic reasoning must wrap
1838
01:05:07,400 --> 01:05:09,080
deterministic execution.
1839
01:05:09,080 --> 01:05:10,120
Never the reverse.
1840
01:05:10,120 --> 01:05:11,880
Reesoning can propose, reasoning can rank,
1841
01:05:11,880 --> 01:05:13,640
reasoning can draft, reasoning can
1842
01:05:13,640 --> 01:05:14,920
ask for missing context.
1843
01:05:14,920 --> 01:05:16,360
Execution must be constrained.
1844
01:05:16,360 --> 01:05:17,800
Execution must have contracts.
1845
01:05:17,800 --> 01:05:19,400
Execution must be legible.
1846
01:05:19,400 --> 01:05:22,040
If an agent can trigger an external side effect,
1847
01:05:22,040 --> 01:05:24,600
then the system must force that side effect
1848
01:05:24,600 --> 01:05:28,040
through a deterministic boundary that enforces assumptions.
1849
01:05:28,040 --> 01:05:29,880
Identity, authorization,
1850
01:05:29,880 --> 01:05:32,680
identity, approvals, and telemetry.
1851
01:05:32,680 --> 01:05:35,480
That boundary is where the enterprise stops improvisation.
1852
01:05:35,480 --> 01:05:37,080
This is where most people misunderstand
1853
01:05:37,080 --> 01:05:38,200
what agents are doing.
1854
01:05:38,200 --> 01:05:39,720
They think the agent is the worker.
1855
01:05:39,720 --> 01:05:41,640
Architecturally, the agent is the planner.
1856
01:05:41,640 --> 01:05:44,360
The worker is your existing automation layer.
1857
01:05:44,360 --> 01:05:47,240
APIs, workflows, cues, transactional systems,
1858
01:05:47,240 --> 01:05:48,360
and the parts of the platform
1859
01:05:48,360 --> 01:05:50,120
that already know how to do reliable work.
1860
01:05:50,120 --> 01:05:51,720
The agent should not replace those.
1861
01:05:51,720 --> 01:05:53,720
It should call them through a controlled interface
1862
01:05:53,720 --> 01:05:55,080
with narrow capabilities.
1863
01:05:55,080 --> 01:05:58,280
So the first design move is separation of agent types.
1864
01:05:58,280 --> 01:06:00,360
Task agents versus decision agents.
1865
01:06:00,360 --> 01:06:03,480
Task agents operate inside a deterministic envelope.
1866
01:06:03,480 --> 01:06:05,560
Collect these inputs, fill this template,
1867
01:06:05,560 --> 01:06:08,760
open this ticket, post the summary, schedule this meeting.
1868
01:06:08,760 --> 01:06:10,040
Their decisions are bounded
1869
01:06:10,040 --> 01:06:11,560
and their actions are reversible
1870
01:06:11,560 --> 01:06:13,160
or at least compensatable.
1871
01:06:13,160 --> 01:06:14,520
Decision agents are different.
1872
01:06:14,520 --> 01:06:15,720
They decide what should happen,
1873
01:06:15,720 --> 01:06:17,080
not just how to do it.
1874
01:06:17,080 --> 01:06:18,360
They classify urgency.
1875
01:06:18,360 --> 01:06:19,800
They choose who gets notified.
1876
01:06:19,800 --> 01:06:21,160
They decide when to escalate.
1877
01:06:21,160 --> 01:06:23,000
They choose between competing workflows.
1878
01:06:23,000 --> 01:06:24,760
They are a policy surface.
1879
01:06:24,760 --> 01:06:26,840
And that means you can't casually mix them.
1880
01:06:26,840 --> 01:06:28,760
If the same agent both decides and acts,
1881
01:06:28,760 --> 01:06:31,400
it will eventually act on a decision you can't defend.
1882
01:06:31,400 --> 01:06:32,600
Not because it's evil,
1883
01:06:32,600 --> 01:06:34,680
because it's operating on incomplete context,
1884
01:06:34,680 --> 01:06:37,160
changing context, and shifting tool availability.
1885
01:06:37,160 --> 01:06:39,480
Over time, it becomes a probabilistic policy engine
1886
01:06:39,480 --> 01:06:40,920
with production permissions.
1887
01:06:40,920 --> 01:06:42,440
So agent first architecture
1888
01:06:42,440 --> 01:06:44,680
forbids a common anti-pattern.
1889
01:06:44,680 --> 01:06:46,920
One smart agent that does the whole thing.
1890
01:06:46,920 --> 01:06:49,480
Instead, it forces explicit handoffs.
1891
01:06:49,480 --> 01:06:51,480
A decision agent can propose an action plan
1892
01:06:51,480 --> 01:06:53,320
with confidence scores and rationale.
1893
01:06:53,320 --> 01:06:55,320
A task agent can execute steps only
1894
01:06:55,320 --> 01:06:58,360
when given a signed, deterministic instruction set.
1895
01:06:58,360 --> 01:07:00,120
A separate policy boundary can enforce
1896
01:07:00,120 --> 01:07:01,720
whether the plan is allowed at all.
1897
01:07:01,720 --> 01:07:03,480
That separation sounds bureaucratic
1898
01:07:03,480 --> 01:07:05,720
until you've lived through a side-effect incident
1899
01:07:05,720 --> 01:07:07,720
where nobody can answer the only question
1900
01:07:07,720 --> 01:07:08,760
that matters.
1901
01:07:08,760 --> 01:07:10,440
Who authorised this?
1902
01:07:10,440 --> 01:07:12,840
The second design move is treating human in the loop
1903
01:07:12,840 --> 01:07:14,680
as a boundary condition, not a checkbox.
1904
01:07:14,680 --> 01:07:15,880
Human in the loop is not,
1905
01:07:15,880 --> 01:07:17,400
someone can stop it if they notice.
1906
01:07:17,400 --> 01:07:18,680
It is an architectural gate
1907
01:07:18,680 --> 01:07:20,120
where the system must pause,
1908
01:07:20,120 --> 01:07:21,560
present the decision context,
1909
01:07:21,560 --> 01:07:23,960
and require an explicit authorization to proceed.
1910
01:07:23,960 --> 01:07:26,120
That gate should trigger on risk, not on vibes,
1911
01:07:26,120 --> 01:07:28,120
sensitive data access, external sharing,
1912
01:07:28,120 --> 01:07:29,800
financial transactions, permission changes,
1913
01:07:29,800 --> 01:07:31,320
customer facing communications,
1914
01:07:31,320 --> 01:07:33,640
or any action that can't be undone cheaply.
1915
01:07:33,640 --> 01:07:34,680
And when a human approves,
1916
01:07:34,680 --> 01:07:37,400
that approvals becomes part of the execution record.
1917
01:07:37,400 --> 01:07:39,320
Not a team's message, not a meeting note,
1918
01:07:39,320 --> 01:07:42,280
a first class artifact tied to the agent identity
1919
01:07:42,280 --> 01:07:43,320
and the tool call.
1920
01:07:43,320 --> 01:07:45,080
The third design move is legibility
1921
01:07:45,080 --> 01:07:46,600
as a non-negotiable requirement.
1922
01:07:46,600 --> 01:07:48,120
Most leaders treat explainability
1923
01:07:48,120 --> 01:07:49,640
like a compliance slogan.
1924
01:07:49,640 --> 01:07:52,680
Agent first architecture treats it as a scaling constraint.
1925
01:07:52,680 --> 01:07:54,840
If the organization cannot reconstruct
1926
01:07:54,840 --> 01:07:56,360
the decision path quickly,
1927
01:07:56,360 --> 01:07:58,520
inputs, selected context,
1928
01:07:58,520 --> 01:08:01,000
selected tools, prompt a version,
1929
01:08:01,000 --> 01:08:03,880
identity used, and resulting side effects.
1930
01:08:03,880 --> 01:08:05,240
Then the organization is not allowed
1931
01:08:05,240 --> 01:08:07,800
to scale that agent beyond a small blast radius.
1932
01:08:07,800 --> 01:08:09,800
It is not legibility is not a nice to have.
1933
01:08:09,800 --> 01:08:11,640
It is the only antidote to MTT,
1934
01:08:11,640 --> 01:08:13,560
and this is where the post-sass paradox
1935
01:08:13,560 --> 01:08:14,760
finally gets a counterforce.
1936
01:08:14,760 --> 01:08:16,680
Entropy grows when decision pathways
1937
01:08:16,680 --> 01:08:18,200
multiply faster than explanation.
1938
01:08:18,200 --> 01:08:19,800
So you design for explanation first.
1939
01:08:19,800 --> 01:08:22,040
You don't ask, can we build this agent?
1940
01:08:22,040 --> 01:08:24,760
You ask, can we explain this agent under pressure
1941
01:08:24,760 --> 01:08:26,840
during an incident to security to audit
1942
01:08:26,840 --> 01:08:28,920
and to the business owner who just got burned?
1943
01:08:28,920 --> 01:08:30,840
If the answer is no, then it's not an agent.
1944
01:08:30,840 --> 01:08:32,600
It's a liability with a chat interface.
1945
01:08:32,600 --> 01:08:35,160
The final design move is to formalize boundaries
1946
01:08:35,160 --> 01:08:36,360
as contracts.
1947
01:08:36,360 --> 01:08:37,400
Tool contracts.
1948
01:08:37,400 --> 01:08:40,360
What is callable with what parameters with what scopes?
1949
01:08:40,360 --> 01:08:42,280
Data contracts, what sources are allowed,
1950
01:08:42,280 --> 01:08:43,480
what labels are required,
1951
01:08:43,480 --> 01:08:45,320
what grounding rules apply.
1952
01:08:45,320 --> 01:08:46,680
Behavior contracts.
1953
01:08:46,680 --> 01:08:48,840
What the agent is allowed to decide
1954
01:08:48,840 --> 01:08:50,120
and what it must escalate.
1955
01:08:50,120 --> 01:08:52,680
Life cycle contracts.
1956
01:08:52,680 --> 01:08:54,200
Who owns versions?
1957
01:08:54,200 --> 01:08:55,400
Who owns deprecation?
1958
01:08:55,400 --> 01:08:56,840
Who owns the kill switch?
1959
01:08:56,840 --> 01:08:59,400
This is how agent first architecture turns
1960
01:08:59,400 --> 01:09:01,480
AI strategy back into architecture.
1961
01:09:01,480 --> 01:09:03,000
Not by slowing down intelligence,
1962
01:09:03,000 --> 01:09:05,400
by forcing intelligence to operate inside boundaries
1963
01:09:05,400 --> 01:09:07,880
that remain deterministic, enforceable,
1964
01:09:07,880 --> 01:09:09,000
and legible at scale.
1965
01:09:09,000 --> 01:09:10,360
And once those boundaries exist,
1966
01:09:10,360 --> 01:09:11,720
then you can talk about the thing,
1967
01:09:11,720 --> 01:09:13,080
most organizations skip.
1968
01:09:13,080 --> 01:09:14,680
The control plane that enforces them.
1969
01:09:15,480 --> 01:09:17,240
The agent control plane.
1970
01:09:17,240 --> 01:09:19,080
Identity, telemetry,
1971
01:09:19,080 --> 01:09:21,160
life cycle, and kill switches.
1972
01:09:21,160 --> 01:09:23,320
At this point, most leaders hear control plane
1973
01:09:23,320 --> 01:09:25,400
and their brain jumps to an admin portal.
1974
01:09:25,400 --> 01:09:26,360
That's not what this is.
1975
01:09:26,360 --> 01:09:27,880
A control plane is not a UI.
1976
01:09:27,880 --> 01:09:29,880
It's an enforcement layer for assumptions.
1977
01:09:29,880 --> 01:09:33,240
Identity, authorization, observability, and life cycle.
1978
01:09:33,240 --> 01:09:35,000
The system either has that layer
1979
01:09:35,000 --> 01:09:37,160
or it slowly devolves into conditional chaos
1980
01:09:37,160 --> 01:09:38,600
with nicer branding.
1981
01:09:38,600 --> 01:09:39,720
In deterministic sass,
1982
01:09:39,720 --> 01:09:42,120
the control plane lived in the service itself.
1983
01:09:42,120 --> 01:09:43,960
Exchange online had admin boundaries,
1984
01:09:43,960 --> 01:09:45,320
SharePoint had admin boundaries.
1985
01:09:45,320 --> 01:09:47,800
The workload owned its own behavior surface
1986
01:09:47,800 --> 01:09:49,320
and your job was to configure it.
1987
01:09:49,320 --> 01:09:51,720
In post-sass behavior sits above workloads.
1988
01:09:51,720 --> 01:09:53,160
It sits in orchestration.
1989
01:09:53,160 --> 01:09:55,320
Agent selecting tools, selecting context,
1990
01:09:55,320 --> 01:09:57,640
delegating tasks, and executing side effects.
1991
01:09:57,640 --> 01:09:59,560
So the control plane has to move upstack too.
1992
01:09:59,560 --> 01:10:01,080
And it has to be boring on purpose.
1993
01:10:01,080 --> 01:10:03,000
The first requirement is agent identity,
1994
01:10:03,000 --> 01:10:04,520
not the maker who built it.
1995
01:10:04,520 --> 01:10:06,120
Not the user who clicked it.
1996
01:10:06,120 --> 01:10:07,640
The agent itself.
1997
01:10:07,640 --> 01:10:08,840
If an agent can act,
1998
01:10:08,840 --> 01:10:10,360
it needs a first class principle
1999
01:10:10,360 --> 01:10:12,920
with a stable identity that survives org charts,
2000
01:10:12,920 --> 01:10:15,400
team reorganizations, and the inevitable,
2001
01:10:15,400 --> 01:10:16,680
this started as a pilot.
2002
01:10:16,680 --> 01:10:19,800
That identity needs ownership metadata
2003
01:10:19,800 --> 01:10:22,440
who is accountable what business process it supports,
2004
01:10:22,440 --> 01:10:24,520
what environments it's allowed to run in
2005
01:10:24,520 --> 01:10:26,840
and what category of authority it holds.
2006
01:10:26,840 --> 01:10:28,760
Without that, you can't do least privilege.
2007
01:10:28,760 --> 01:10:30,040
You can only do optimism
2008
01:10:30,040 --> 01:10:32,120
because least privilege is not a philosophical stance.
2009
01:10:32,120 --> 01:10:33,480
It's an authorization graph.
2010
01:10:33,480 --> 01:10:35,160
If you can't point to an agent as an actor,
2011
01:10:35,160 --> 01:10:36,200
you can't draw the graph.
2012
01:10:36,200 --> 01:10:37,080
You can't review it.
2013
01:10:37,080 --> 01:10:38,360
You can't revoke it cleanly.
2014
01:10:38,360 --> 01:10:39,800
You can't even explain what happened
2015
01:10:39,800 --> 01:10:41,080
when it does something expensive.
2016
01:10:41,080 --> 01:10:43,320
The second requirement is tool authorization
2017
01:10:43,320 --> 01:10:45,320
as a contract, not a convenience.
2018
01:10:45,320 --> 01:10:48,600
Most organizations let tool reach ability emerge organically.
2019
01:10:48,600 --> 01:10:50,840
Connectors added, plugins enabled,
2020
01:10:50,840 --> 01:10:52,040
graph permissions granted,
2021
01:10:52,040 --> 01:10:54,360
and then everything gets called integration.
2022
01:10:54,360 --> 01:10:56,360
That's how you build an accidental super user.
2023
01:10:56,360 --> 01:10:58,920
The control plane needs a capability catalog.
2024
01:10:58,920 --> 01:11:00,760
These are the tools this agent can call.
2025
01:11:00,760 --> 01:11:02,280
These are the operations exposed.
2026
01:11:02,280 --> 01:11:03,160
These are the scopes.
2027
01:11:03,160 --> 01:11:05,400
These are the data classifications allowed.
2028
01:11:05,400 --> 01:11:07,800
And these are the conditions under which the call is permitted.
2029
01:11:07,800 --> 01:11:10,760
If you can't express that in a machine enforceable way,
2030
01:11:10,760 --> 01:11:13,000
then the agent is not integrated.
2031
01:11:13,000 --> 01:11:13,880
It's armed.
2032
01:11:13,880 --> 01:11:15,560
The third requirement is telemetry
2033
01:11:15,560 --> 01:11:17,720
that answers the questions people actually asked
2034
01:11:17,720 --> 01:11:19,640
during incidents, not did it run.
2035
01:11:19,640 --> 01:11:21,240
Who acted on what?
2036
01:11:21,240 --> 01:11:22,520
Using which identity?
2037
01:11:22,520 --> 01:11:23,880
With which authority?
2038
01:11:23,880 --> 01:11:25,400
Based on what retrieved context,
2039
01:11:25,400 --> 01:11:26,760
through which tool calls?
2040
01:11:26,760 --> 01:11:27,800
In what sequence?
2041
01:11:27,800 --> 01:11:29,000
With what fallbacks?
2042
01:11:29,000 --> 01:11:31,480
And what side effects landed in which systems of record?
2043
01:11:31,480 --> 01:11:32,280
That's the minimum.
2044
01:11:32,280 --> 01:11:34,520
Anything less is performative observability.
2045
01:11:34,520 --> 01:11:36,840
This is also where the industry keeps lying to itself
2046
01:11:36,840 --> 01:11:37,640
with dashboards.
2047
01:11:37,640 --> 01:11:38,840
Dashboards are summaries.
2048
01:11:38,840 --> 01:11:40,280
Incidents are specifics.
2049
01:11:40,280 --> 01:11:42,360
You need event-grade traces that can be stitched
2050
01:11:42,360 --> 01:11:43,720
into a narrative at human speed.
2051
01:11:43,720 --> 01:11:46,280
If the only thing you can produce is a chat transcript,
2052
01:11:46,280 --> 01:11:47,560
you don't have observability.
2053
01:11:47,560 --> 01:11:49,320
You have theater.
2054
01:11:49,320 --> 01:11:51,320
The fourth requirement is lifecycle management
2055
01:11:51,320 --> 01:11:54,040
because entropy loves abandoned artifacts.
2056
01:11:54,040 --> 01:11:56,280
Agents are not set and forget.
2057
01:11:56,280 --> 01:11:57,480
Prompts drift.
2058
01:11:57,480 --> 01:11:58,440
Tools change.
2059
01:11:58,440 --> 01:11:59,720
Connectors rotate.
2060
01:11:59,720 --> 01:12:00,920
Models update.
2061
01:12:00,920 --> 01:12:02,600
Data sources get cleaned up.
2062
01:12:02,600 --> 01:12:03,480
People leave.
2063
01:12:03,480 --> 01:12:05,240
The agent keeps executing anyway
2064
01:12:05,240 --> 01:12:07,720
because the system does not care about your org structure.
2065
01:12:07,720 --> 01:12:10,760
So the control plane needs explicit version ownership
2066
01:12:10,760 --> 01:12:11,800
and decommissioning.
2067
01:12:11,800 --> 01:12:15,080
Every agent needs a named owner, a versioning scheme,
2068
01:12:15,080 --> 01:12:17,320
a change log, and a retirement path.
2069
01:12:17,320 --> 01:12:20,760
And owner can't mean the last person who touched it.
2070
01:12:20,760 --> 01:12:23,960
It has to mean accountable for behavior and side effects.
2071
01:12:23,960 --> 01:12:26,360
Otherwise, your agent estate becomes a museum
2072
01:12:26,360 --> 01:12:27,880
of half-owned automation.
2073
01:12:27,880 --> 01:12:29,560
And then finally, kill switches.
2074
01:12:29,560 --> 01:12:31,560
Not as a last resort security fantasy
2075
01:12:31,560 --> 01:12:33,080
as an architectural primitive.
2076
01:12:33,080 --> 01:12:34,760
If an agent can execute side effects,
2077
01:12:34,760 --> 01:12:37,320
you must be able to pause it, revoke its tool access
2078
01:12:37,320 --> 01:12:38,760
or force it into a safe mode
2079
01:12:38,760 --> 01:12:40,920
without redeploying half your environment.
2080
01:12:40,920 --> 01:12:42,200
And you need escalation paths
2081
01:12:42,200 --> 01:12:43,880
that are defined before the incident,
2082
01:12:43,880 --> 01:12:45,240
not negotiated during it.
2083
01:12:45,240 --> 01:12:47,480
Because the incident you're trying to prevent
2084
01:12:47,480 --> 01:12:48,520
is not an outage.
2085
01:12:48,520 --> 01:12:50,520
It's an agent doing the wrong thing quickly,
2086
01:12:50,520 --> 01:12:52,760
repeatedly across multiple systems
2087
01:12:52,760 --> 01:12:55,960
while everyone argues about whether it was expected behavior.
2088
01:12:55,960 --> 01:12:58,440
A real control plane makes that argument irrelevant.
2089
01:12:58,440 --> 01:13:00,120
It enforces intent at runtime.
2090
01:13:00,120 --> 01:13:01,400
And here's the uncomfortable truth.
2091
01:13:01,400 --> 01:13:03,720
Once you have identity, tool contracts,
2092
01:13:03,720 --> 01:13:05,640
telemetry, life cycle, and kill switches,
2093
01:13:05,640 --> 01:13:08,680
you've built the thing most AI strategies quietly avoid.
2094
01:13:08,680 --> 01:13:10,920
You've made agents operationally legible,
2095
01:13:10,920 --> 01:13:12,520
which means you can finally scale them
2096
01:13:12,520 --> 01:13:14,120
without scaling ambiguity.
2097
01:13:14,120 --> 01:13:15,720
Now, the next question becomes obvious.
2098
01:13:15,720 --> 01:13:18,280
If tools brawl is one of the fastest entropy surfaces,
2099
01:13:18,280 --> 01:13:22,040
what happens when MCP makes tool integration dramatically easier?
2100
01:13:22,040 --> 01:13:23,560
MCP's integration relief
2101
01:13:23,560 --> 01:13:25,720
and a new entropy surface if unmanaged.
2102
01:13:25,720 --> 01:13:27,720
MCP is going to sound like the part of this story
2103
01:13:27,720 --> 01:13:30,440
where the clouds part and the architecture gets easier.
2104
01:13:30,440 --> 01:13:32,280
Because mechanically, it does.
2105
01:13:33,160 --> 01:13:36,600
The integration problem in the agent era is brutal.
2106
01:13:36,600 --> 01:13:38,360
Every agent wants to call tools.
2107
01:13:38,360 --> 01:13:41,400
Every tool has an API, every API has an else model,
2108
01:13:41,400 --> 01:13:43,080
and every team wires it differently.
2109
01:13:43,080 --> 01:13:44,760
That creates the classic MXN mess.
2110
01:13:44,760 --> 01:13:47,480
You end up with bespoke connectors, brittle adapters,
2111
01:13:47,480 --> 01:13:49,640
duplicated wrappers, and a constant tax
2112
01:13:49,640 --> 01:13:51,240
every time anything changes.
2113
01:13:51,240 --> 01:13:54,280
MCP's promise is to collapse that mess into something more linear.
2114
01:13:54,280 --> 01:13:57,240
One side speaks agent, the other side speaks tool.
2115
01:13:57,240 --> 01:13:59,320
The protocol becomes the contract discovery,
2116
01:13:59,320 --> 01:14:02,040
schemers, and a standard way to call capabilities.
2117
01:14:02,040 --> 01:14:04,600
So instead of building 10 different custom integrations
2118
01:14:04,600 --> 01:14:06,200
for 10 different co-pilots,
2119
01:14:06,200 --> 01:14:08,600
you build or adopt an MCP server once
2120
01:14:08,600 --> 01:14:10,520
and any MCP capable agent can use it.
2121
01:14:10,520 --> 01:14:11,320
That's real relief.
2122
01:14:11,320 --> 01:14:14,280
It reduces the integration surface area you have to handcraft.
2123
01:14:14,280 --> 01:14:16,680
It reduces the number of places where tool calling
2124
01:14:16,680 --> 01:14:18,280
gets implemented poorly.
2125
01:14:18,280 --> 01:14:20,280
And it makes tool reuse realistic,
2126
01:14:20,280 --> 01:14:22,280
which is the difference between an agent program
2127
01:14:22,280 --> 01:14:23,400
and a thousand snowflakes.
2128
01:14:23,400 --> 01:14:24,920
But here's what most people miss.
2129
01:14:24,920 --> 01:14:26,680
MCP doesn't remove complexity.
2130
01:14:26,680 --> 01:14:29,320
It relocates it into the one place
2131
01:14:29,320 --> 01:14:32,280
enterprises are already failing to control capabilities, brawl.
2132
01:14:32,280 --> 01:14:35,320
MCP turns tool exposure into something that can scale
2133
01:14:35,320 --> 01:14:37,080
as fast as copying a config file.
2134
01:14:37,080 --> 01:14:38,120
That's the upside.
2135
01:14:38,120 --> 01:14:39,560
It's also the failure mode,
2136
01:14:39,560 --> 01:14:41,880
because once integration becomes easy,
2137
01:14:41,880 --> 01:14:44,280
the default organizational behavior becomes
2138
01:14:44,280 --> 01:14:46,680
expose one more tool at one more server,
2139
01:14:46,680 --> 01:14:48,040
publish one more capability,
2140
01:14:48,040 --> 01:14:49,720
let one more agent use it.
2141
01:14:49,720 --> 01:14:51,560
We can always tighten it later when you want.
2142
01:14:51,560 --> 01:14:52,760
That distinction matters.
2143
01:14:52,760 --> 01:14:54,120
In architectural terms,
2144
01:14:54,120 --> 01:14:56,360
MCP is not an integration convenience.
2145
01:14:56,360 --> 01:14:57,800
It is a tool distribution system
2146
01:14:57,800 --> 01:15:00,520
and every distribution system becomes an entropy accelerator
2147
01:15:00,520 --> 01:15:03,400
unless you force contracts around what gets distributed,
2148
01:15:03,400 --> 01:15:04,680
who can publish it,
2149
01:15:04,680 --> 01:15:07,080
and what safe to consume actually means.
2150
01:15:07,080 --> 01:15:09,480
So MCP introduces a new entropy surface,
2151
01:15:09,480 --> 01:15:10,920
standardized tool sprawl.
2152
01:15:10,920 --> 01:15:13,080
Before MCP tool sprawl was slowed by friction.
2153
01:15:13,080 --> 01:15:14,680
Every integration required effort,
2154
01:15:14,680 --> 01:15:16,280
which acted like a crude control.
2155
01:15:16,280 --> 01:15:17,720
With MCP, the friction drops,
2156
01:15:17,720 --> 01:15:20,920
so the sprawl becomes limited only by imagination and urgency.
2157
01:15:20,920 --> 01:15:22,120
That's not a moral critique.
2158
01:15:22,120 --> 01:15:23,320
It's system behavior.
2159
01:15:23,320 --> 01:15:26,040
The first risk is server registration
2160
01:15:26,040 --> 01:15:28,040
becoming an accidental marketplace.
2161
01:15:28,040 --> 01:15:31,480
Teams stand up MCP servers for their own needs,
2162
01:15:31,480 --> 01:15:32,520
a Giro server,
2163
01:15:32,520 --> 01:15:33,960
a service now server,
2164
01:15:33,960 --> 01:15:35,320
a CRM server,
2165
01:15:35,320 --> 01:15:37,080
an internal data server.
2166
01:15:37,080 --> 01:15:39,400
Each one exposes a slightly different schema,
2167
01:15:39,400 --> 01:15:41,080
different naming, different guardrails,
2168
01:15:41,080 --> 01:15:43,560
and different assumptions about authentication.
2169
01:15:43,560 --> 01:15:44,920
Then agents discover them,
2170
01:15:44,920 --> 01:15:47,400
and now the enterprise has created an internal app store
2171
01:15:47,400 --> 01:15:48,600
for capabilities.
2172
01:15:48,600 --> 01:15:51,400
Without the review rigor that app stores evolve to require.
2173
01:15:51,400 --> 01:15:53,880
The second risk is capability catalogs drifting away
2174
01:15:53,880 --> 01:15:56,040
from least privileged tools are never neutral.
2175
01:15:56,040 --> 01:15:58,360
A tool is authority packaged as an API.
2176
01:15:58,360 --> 01:15:59,880
If a tool can create a ticket,
2177
01:15:59,880 --> 01:16:02,680
send an email, update a record, or change access,
2178
01:16:02,680 --> 01:16:05,400
then exposing that tool through MCP isn't integration.
2179
01:16:05,400 --> 01:16:06,440
It's delegation.
2180
01:16:06,440 --> 01:16:07,400
So the question isn't,
2181
01:16:07,400 --> 01:16:09,240
can the agent call the tool?
2182
01:16:09,240 --> 01:16:10,920
It's under what identity?
2183
01:16:10,920 --> 01:16:11,960
With what scopes?
2184
01:16:11,960 --> 01:16:13,080
With what constraints?
2185
01:16:13,080 --> 01:16:14,840
And with what audit narrative?
2186
01:16:14,840 --> 01:16:16,920
If MCP makes it easy to call tools,
2187
01:16:16,920 --> 01:16:19,160
it also makes it easy to call the wrong tools
2188
01:16:19,160 --> 01:16:20,280
with the wrong authority,
2189
01:16:20,280 --> 01:16:22,040
especially when teams treat servers
2190
01:16:22,040 --> 01:16:25,000
as shared utilities instead of controlled boundaries.
2191
01:16:25,000 --> 01:16:26,840
The third risk is change management
2192
01:16:26,840 --> 01:16:28,440
collapsing into surprise.
2193
01:16:28,440 --> 01:16:30,520
MCP supports dynamic discovery.
2194
01:16:30,520 --> 01:16:31,560
That's the feature.
2195
01:16:31,560 --> 01:16:34,040
agents can learn what tools exist without hard coding.
2196
01:16:34,040 --> 01:16:36,920
But dynamic discovery, without change control,
2197
01:16:36,920 --> 01:16:39,560
is how you turn production behavior into a moving target.
2198
01:16:39,560 --> 01:16:41,320
A server adds a new capability.
2199
01:16:41,320 --> 01:16:43,480
A schema changes, a parameter meaning shifts,
2200
01:16:43,480 --> 01:16:44,840
and all the requirement changes.
2201
01:16:44,840 --> 01:16:46,680
The agent doesn't break in a neat way.
2202
01:16:46,680 --> 01:16:48,360
It adapts, it selects different actions.
2203
01:16:48,360 --> 01:16:49,480
It fails over.
2204
01:16:49,480 --> 01:16:51,320
It produces different side effects.
2205
01:16:51,320 --> 01:16:53,960
And your MTT spikes because the execution path
2206
01:16:53,960 --> 01:16:56,440
changed without a deployment event you can point to.
2207
01:16:56,440 --> 01:16:57,480
That's the paradox.
2208
01:16:57,480 --> 01:17:00,920
Again, interoperability increases the need for contracts, not less.
2209
01:17:00,920 --> 01:17:04,040
So if an organization adopts MCP as integration relief,
2210
01:17:04,040 --> 01:17:06,840
but doesn't treat MCP servers as first class production
2211
01:17:06,840 --> 01:17:10,200
surfaces, versioned, owned, restricted, observable,
2212
01:17:10,200 --> 01:17:12,280
then MCP becomes the fastest way
2213
01:17:12,280 --> 01:17:14,200
to industrialize conditional chaos.
2214
01:17:14,200 --> 01:17:16,600
This is why the agent control plane matters even more
2215
01:17:16,600 --> 01:17:17,880
once MCP shows up.
2216
01:17:17,880 --> 01:17:20,360
You need enforced server registration rules.
2217
01:17:20,360 --> 01:17:22,760
What qualifies as publishable, who approves,
2218
01:17:22,760 --> 01:17:24,520
and what metadata must exist?
2219
01:17:24,520 --> 01:17:26,360
You need capability classification.
2220
01:17:26,360 --> 01:17:30,040
Read only tools versus side effect tools versus privilege tools.
2221
01:17:30,040 --> 01:17:33,240
You need identity boundaries, which agents can call which servers,
2222
01:17:33,240 --> 01:17:35,880
and whether those calls are on behalf of a user
2223
01:17:35,880 --> 01:17:37,320
or under a service principle.
2224
01:17:37,320 --> 01:17:39,080
And you need change discipline.
2225
01:17:39,080 --> 01:17:42,280
Versioning, deprecation, and explicit compatibility promises
2226
01:17:42,280 --> 01:17:43,960
because otherwise every small improvement
2227
01:17:43,960 --> 01:17:45,880
is a behavioral drift event.
2228
01:17:45,880 --> 01:17:48,440
MCP can absolutely reduce integration dead,
2229
01:17:48,440 --> 01:17:51,000
but it will also let you scale bad integration faster
2230
01:17:51,000 --> 01:17:52,120
than you ever could before.
2231
01:17:52,120 --> 01:17:53,640
The protocol isn't your safety net.
2232
01:17:53,640 --> 01:17:55,080
It's your multiplier.
2233
01:17:55,080 --> 01:17:57,480
And once you accept that, the next move is obvious.
2234
01:17:57,480 --> 01:17:59,240
Don't scale agents first.
2235
01:17:59,240 --> 01:18:00,840
Scale legibility first.
2236
01:18:00,840 --> 01:18:03,400
Which is why the only sane way forward is a controlled pilot
2237
01:18:03,400 --> 01:18:06,200
that proves you can explain behavior before you amplify it.
2238
01:18:06,200 --> 01:18:07,880
The 90-day agent first pilot,
2239
01:18:07,880 --> 01:18:09,800
prove legibility before scale.
2240
01:18:09,800 --> 01:18:11,400
The worst way to respond to all of this
2241
01:18:11,400 --> 01:18:13,000
is to announce an agent program
2242
01:18:13,000 --> 01:18:16,040
and then let every team build whatever they want faster
2243
01:18:16,040 --> 01:18:17,640
because the board is excited
2244
01:18:17,640 --> 01:18:19,480
that just turns entropy into a KPI.
2245
01:18:19,480 --> 01:18:21,960
The only sane move is a 90-day pilot
2246
01:18:21,960 --> 01:18:24,440
that proves one thing before you scale anything.
2247
01:18:24,440 --> 01:18:27,480
The organization can explain agent behavior under pressure.
2248
01:18:27,480 --> 01:18:28,280
Not in a demo.
2249
01:18:28,280 --> 01:18:31,160
In a messy week, with real inputs, with real side effects,
2250
01:18:31,160 --> 01:18:34,360
with real stakeholders who get angry when the system improvises,
2251
01:18:34,360 --> 01:18:37,240
so pick one cross-functional process with consequences,
2252
01:18:37,240 --> 01:18:40,360
not drafting content, not summarized meetings.
2253
01:18:40,360 --> 01:18:42,360
Pick something that touches a system of record
2254
01:18:42,360 --> 01:18:44,040
and triggers downstream work.
2255
01:18:44,040 --> 01:18:46,200
Onboarding, access requests,
2256
01:18:46,200 --> 01:18:48,680
supplier onboarding, service triage,
2257
01:18:48,680 --> 01:18:50,200
invoice exceptions.
2258
01:18:50,200 --> 01:18:53,000
Something where the organization already knows what wrong looks like.
2259
01:18:53,000 --> 01:18:55,240
Then design the agents like products, not helpers.
2260
01:18:55,240 --> 01:18:58,280
That means you name an owner who owns behavior, not just the repo.
2261
01:18:58,280 --> 01:19:00,840
You give it a backlog, versions, a deprecation plan,
2262
01:19:00,840 --> 01:19:02,440
and a defined blast radius.
2263
01:19:02,440 --> 01:19:04,680
You decide what production means for this agent,
2264
01:19:04,680 --> 01:19:06,040
you decide who can change it.
2265
01:19:06,040 --> 01:19:08,200
And you decide how change gets reviewed
2266
01:19:08,200 --> 01:19:10,200
because prompt edits are still logic edits
2267
01:19:10,200 --> 01:19:11,480
even when they look like English.
2268
01:19:11,480 --> 01:19:14,760
Now you establish the boundaries the pilot exists to validate.
2269
01:19:14,760 --> 01:19:16,760
The deterministic core comes first.
2270
01:19:16,760 --> 01:19:18,920
The workflow steps that must be correct,
2271
01:19:18,920 --> 01:19:20,600
auditable, and idempotent.
2272
01:19:20,600 --> 01:19:23,080
The things that create records, update fields,
2273
01:19:23,080 --> 01:19:25,640
send external messages or change access.
2274
01:19:25,640 --> 01:19:29,160
Then you wrap that deterministic core with probabilistic reasoning.
2275
01:19:29,160 --> 01:19:31,880
Classification, extraction from messy inputs,
2276
01:19:31,880 --> 01:19:35,560
drafting, summarization, prioritization, and recommendations.
2277
01:19:35,560 --> 01:19:37,000
Reasoning can propose actions.
2278
01:19:37,000 --> 01:19:39,160
It can't execute side effects directly.
2279
01:19:39,160 --> 01:19:41,000
It must call the deterministic layer
2280
01:19:41,000 --> 01:19:42,840
through explicit tool contracts
2281
01:19:42,840 --> 01:19:44,600
and you don't let the pilot cheat.
2282
01:19:44,600 --> 01:19:47,080
If the agent needs a tool, you register the tool.
2283
01:19:47,080 --> 01:19:49,800
If it needs data, you define which sources are allowed.
2284
01:19:49,800 --> 01:19:53,000
If it needs authority, you assign an identity and scope it.
2285
01:19:53,000 --> 01:19:55,320
If it needs to escalate, you define a human gate
2286
01:19:55,320 --> 01:19:57,880
with a named approver and a clear stop condition.
2287
01:19:57,880 --> 01:20:01,160
This is also where you design for failure as a first class feature.
2288
01:20:01,160 --> 01:20:02,920
Agents will hit ambiguous inputs.
2289
01:20:02,920 --> 01:20:04,440
Downstream APIs will throttle.
2290
01:20:04,440 --> 01:20:05,800
A connector will fail.
2291
01:20:05,800 --> 01:20:07,720
A human will ignore an approver request.
2292
01:20:07,720 --> 01:20:09,720
A model update will change behavior slightly.
2293
01:20:09,720 --> 01:20:10,840
None of that is surprising.
2294
01:20:10,840 --> 01:20:13,640
What matters is whether the system fails legibly.
2295
01:20:13,640 --> 01:20:15,640
So your pilot needs two kill switches.
2296
01:20:15,640 --> 01:20:17,000
One to pause the agent
2297
01:20:17,000 --> 01:20:21,000
and one to force safe mode where it can only draft and recommend, not act.
2298
01:20:21,000 --> 01:20:23,080
And those switches can't be buried in a runbook.
2299
01:20:23,080 --> 01:20:24,840
They have to be operational muscle memory.
2300
01:20:24,840 --> 01:20:26,040
Now, measure it.
2301
01:20:26,040 --> 01:20:28,840
Not vanity metrics like prompts per user.
2302
01:20:28,840 --> 01:20:31,960
Measure the entropy signals this episode is built on before and after.
2303
01:20:31,960 --> 01:20:34,360
Mean time to explain is the headline metric.
2304
01:20:34,360 --> 01:20:36,760
How long it takes to answer why did it do that
2305
01:20:36,760 --> 01:20:38,920
with a coherent narrative and evidence?
2306
01:20:38,920 --> 01:20:41,960
If MTT drops, you're building a system you can scale.
2307
01:20:41,960 --> 01:20:45,000
If MTT stays high, you're building a mystery generator.
2308
01:20:45,000 --> 01:20:46,840
Track incident ambiguity.
2309
01:20:46,840 --> 01:20:50,520
How many incidents involve behavior drift instead of outages?
2310
01:20:50,520 --> 01:20:52,200
Track drift frequency?
2311
01:20:52,200 --> 01:20:54,680
How often prompts, tools or connectors change
2312
01:20:54,680 --> 01:20:57,800
without a corresponding change record tied to the agent product?
2313
01:20:57,800 --> 01:21:00,200
Track agent to human ratio inside the pilot,
2314
01:21:00,200 --> 01:21:03,000
not as a brag, as a budget conversation.
2315
01:21:03,000 --> 01:21:05,560
If one agent produces a thousand decisions a day,
2316
01:21:05,560 --> 01:21:07,880
then you just created a new operational workload
2317
01:21:07,880 --> 01:21:09,240
whether you planned it or not
2318
01:21:09,240 --> 01:21:11,240
and then do the part most pilots avoid.
2319
01:21:11,240 --> 01:21:12,360
Proof decommissioning.
2320
01:21:12,360 --> 01:21:15,400
At day 90, you either promote it with stronger boundaries
2321
01:21:15,400 --> 01:21:16,520
or you retire it.
2322
01:21:16,520 --> 01:21:18,440
That retirement must revoke identity,
2323
01:21:18,440 --> 01:21:20,280
disconnect tools, archive traces,
2324
01:21:20,280 --> 01:21:22,280
and remove it from discoverability.
2325
01:21:22,280 --> 01:21:24,360
If the organization can't cleanly kill an agent,
2326
01:21:24,360 --> 01:21:26,200
it can't claim it controls agents.
2327
01:21:26,200 --> 01:21:27,320
It just accumulates them.
2328
01:21:27,320 --> 01:21:29,720
The output of this pilot isn't a slide deck.
2329
01:21:29,720 --> 01:21:31,960
It's a repeatable pattern, a reference architecture,
2330
01:21:31,960 --> 01:21:33,240
a decision rights model,
2331
01:21:33,240 --> 01:21:35,800
and a telemetry story that compiles into explanation.
2332
01:21:35,800 --> 01:21:37,720
That's what scale actually requires.
2333
01:21:37,720 --> 01:21:38,600
Conclusion.
2334
01:21:38,600 --> 01:21:41,080
AI doesn't reduce complexity.
2335
01:21:41,080 --> 01:21:43,800
It converts visible systems into invisible behavior,
2336
01:21:43,800 --> 01:21:46,920
and invisible behavior is where architectural entropy multiplies.
2337
01:21:46,920 --> 01:21:48,680
If this matched what you're seeing,
2338
01:21:48,680 --> 01:21:52,760
leave a quick review with the worst mean time to explain story you've lived through
2339
01:21:52,760 --> 01:21:54,760
and connect with myocopieters on LinkedIn,
2340
01:21:54,760 --> 01:21:57,960
send examples to the next episode, "Disex Real Failures."
















