#93 The Four Superpowers of Digital Transformation

Subscribe to get the latest

on Thu Jun 23 2022 17:00:00 GMT-0700 (Pacific Daylight Time)

with Darren W Pulsipher, Greg Ernst,

On this episode, Darren discusses the four superpowers of digital transformation with Intel’s Greg Ernst, Corporate VP of Sales, Americas. Ubiquitous compute, Pervasive Connectivity, Cloud to Edge, Artificial Intelligence.


Keywords

#cybersecurity #aiml #multicloud #comms

Listen Here


Intel focuses on ubiquitous computing, pervasive connectivity, cloud to the edge, and artificial intelligence (AI). Elements of these four superpowers are mandatory in digital transformation strategies for companies worldwide, so there is great synergy.

Ubiquitous Compute

Ubiquitous computing is a software engineering concept where computing is everywhere. Not only does it refer to smart personal devices such as phones, watches, and appliances, or data center infrastructure and cloud-based apps, but it’s the idea that enterprise infrastructure that has historically been behind a firewall is now coming into everyday life. Enterprise infrastructure is available to employees on campus, and anywhere they have a device. Even more importantly, the infrastructure can extend to customers to improve their experience.

Intel is looking at what foundational elements should be driven through the ecosystem to achieve a goal of every person on earth having access to a petabyte of data or a petaflop of computing within less than a millisecond of access. Intel is working on the laws of physics, economy, and data sovereignty to make that possible. This will give software companies, cloud companies, and all the companies worldwide a framework for software that will create value for their customers.

Pervasive Connectivity

In a recent interview, Glenn Kurowski, the CTO of CACI, talked about connectivity and how he sees it unleashing into the space domain. A great example is when Elon Musk flew Starlink over Ukraine to keep them from going into the internet darkness.

With this tremendous computing power, connectivity is crucial. There is satellite connectivity, 5G, and 4G. Still, even within the internet, between states and countries, the question is, how do you traverse through networks and enable pools of computing that are not interconnected? Without connectivity, the value of computing rapidly declines.

To protect this interconnected data, Intel and teams of hundreds of technology companies are collaborating and innovating together. Governments must also understand the laws, rules, and concerns. Intel, for example, employs a sizable force to help lawmakers have those conversations to create laws that protect data. Intel’s ecosystem is vast, and people pay attention when Intel says this security is essential.

Estonia is a good model of a country protecting their citizens’ data but also unleashing that data and providing more for their citizens at a lower cost. There will be a natural evolution to this model, as governments actively protect the privacy and think strategically.

Cloud to Edge

On the enterprise side is the extension of the surface that businesses can interact with their customers via the cloud to edge. A great example is Omnichannel retail, where a company knows who the customer is, their trends, and what they need. They can recommend additional services with pervasive connectivity from cloud to edge. They could tell the customer where something they are looking for is located when they arrive at the store. Retailers could extend their networks from a data center cloud or on-prem data center to unifying at the edge, creating a mesh network that goes all the way through the store.

Not only would this improve the shopper experience, but the stores could decrease loss by detecting things that are out of stock and the flow within the store. They could place their products in the most advantageous places and monitor, for example, perishable goods to take actions to move products quickly while it’s at their peak.

Artificial Intelligence

AI is an extension of data analytics and will inevitably grow. Mass amounts of data are created daily, and it is already beyond companies’ abilities to effectively compute. People are only looking at less than five percent of generated data.

With AI algorithms, it’s possible to find patterns with that data to, for example, cure cancer. It might be sitting there because the information is not yet in a spot where AI can use it. There will have to be a new market surrounding centralized, accessible data sets. An organized data brokerage could make centralized data available to multiple companies via the cloud while protecting data privacy, such as patient identification.

Security of Data

COVID quickly made ubiquitous computing important to employees working from home. That, and the subsequent hybrid workforce, exposed security flaws in the industry. There is currently a significant uptick in funding for security to address the problems and keep up with the expansion of the superpowers. Especially with edge-to-cloud architectures and ubiquitous computing, the attack surface has exploded. The industry can keep up but requires tremendous effort and forward-thinking.

Intel has significant innovations in this space with software guard extensions, security features in silicon, and the ecosystem to take advantage of these things. The ecosystem can build new use cases such as confidential distributed analytics for cancer research or multi-domain analytics, which mean across unclassified, classified, and top-secret data. Before, that data could never mingle. Now it can mix securely and solve problems we couldn’t solve before.

Intel Software

Many might be surprised that Intel has more than 19,000 software engineers. Intel can keep all of these engineers fully occupied as they operate at three levels: foundational software; languages, frameworks, tools, and libraries; and application-level work.

Most of this technology on the application level is given away in the open-source community, where it is accessible, secure, and optimized.

Go to http://embracingdigital.org for Intel resources related to the four superpowers.

Podcast Transcript

1

Hello, thisis Darren Pulsipher, chief solutionarchitect of public sector at Intel.

And welcome to Embracing

Digital Transformation,where we investigate effective change,leveraging people, processand technology.

On today's episode, The Four Superpowersof Digital Transformationwith special guest

Greg Ernst, Corporate VP of Salesin the Americas.

Greg, welcome to the show.

Thank you, dear.

It's good to be on for my second show.

I know it's been, what, a yearsince you were on.

I think it is about once a yearthat once a yearyou get to come on the show,tell us how things are going.

Yeah, I get to instead of listening,it gets actually speak.

You become I tell my my team all the time

I listen to this while I run.

So it's been thank you for theentertainment over the last 52 weeks.

Well, they thank you.

Thank you, Greg.

I appreciate your supportin helping me do this, especially today.

We're going to talk about Intel'sfour superpowers.

They really a tie in to public sector.

On my side, I talk about the six pillarsof public sector transformationand four of those pillarsare the four superpowers.

So great minds think alike.

Yeah, exactly. No, no coincidence.

But but as I've delvedeeper and deeper into the public sector,it's just clear that so much of whaton the public sectorside they're trying to solve regardingmission outcomes and how they do it,like you said,aligned to what our four superpowers arethat are very applicableto enterprises as well.

Yeah.

So let's go over with those,what those four superpowers arebecause not everyone listensto every show.

I know that it's a shame everyone should,but they don't.

So let's talkabout what those four superpowers are.

And these are four areas that Intelis really focusing on above and beyond.

They're not going to sound likesilicon at all.

Are they?

Know they're not.

And that's what it's

I mean, for me, it's these four.

I'll just list them real quick.

The concept of ubiquitous computenumber is number one.

And this idea thatit's really kind ofa concept in software engineeringwhere compute is pervasive and everywhere.

So so that would be number one.

Number two is pervasive connectivityand it allows technologythat's dispersed all over the worldto communicate.

Number threeis this concept of really cloud edgeand extending your compute networkas a as an enterpriseor a public sector from cloudall the way to edge.

And then third or fourthare artificial intelligence,which allows businesses and agenciesto take the billionsand billions of bytes of datathat get createdeach day and really extractactionable insights from them.

So at a real basic level,those are the four and dare.

And what I'm seeing is as if we go outand we talk to companiesor public agencies around their digitaltransformation strategy.

There's elements of each for thesethat that's mandatory,it's an underpinning.

And so it'swhat we're working on as a company andwhat all the businesses aroundthe world are doingas part of digital transformationis that there's a great synergy there.

So let's talkfirst about pervasive compute.

I mean, what really does that mean?

Because you're saying ubiquitous, I guessubiquitous computing.

Yeah. You're saying it's everywhere.

Which means what?

I mean, we're talking smartwatches,smart phones, smart refrigerators.

Now that tell me when my milk is bad.

Yeah, right.

Is that what you're talking about?

Well, yeah.

And PCs, data centerinfrastructure, the cloud based appsthat we all have on our phones,whether it's Uber or Twitterwithin the enterprise workday.

And then really the idea of makingthat that enterprise infrastructureand today right now just startingto kind of enterprise and pub sector.

But the idea of taking thatwhat historically was behinda firewall enterprise infrastructureonly accessiblewhile you're on campus to bring thatinto everyday life for the employees.

But more even more importantly,

Daryn, is the customers.

So as we talk to retailers,as we talk to construction orinfrastructuremanagement companies around,how do they improve thatthe customer experience as well.

So it's really kind of extending beyondjust your employeesaccessing the infrastructure.

You're actually extendingthat out to the customers even more.

That's right.

It's employees as well as the customersand and so at Intel, what we're looking atare what are the foundational elementsthat we could drive through the ecosystem.

But one day what we view as achievableis that every person on earth,they'll have access to a petaflops of dataand or byte of data,petaflops, top of compute,all within less than a millisecond access.

And so it's now it's the laws of physics,the laws of economy,the laws, the data sovereignty.

Those are the things now we're working onis, is to make that possible.

And that'll give a frameworkfor softwarecompanies and cloud companiesand all the companies that are worldreally to create valuefor their customers.

You know, that's really fascinatingbecause in a recent interviewwith Glencore of the CTO of CCI,he talked about that same sort of thing,about that connectivitythat connects us all, that allowsthat sort of thing to happen,and that he sees that coming into space,that the unleashing of the space domainis really going to make that happen.

A great example of that,when Elon Musk flew his,you know, StarLink over the Ukraineand kept the Ukrainefrom going into Internetdarkness, that was brilliantand showed the power of that new domainthat is now available.

Yeah, that idea and that brings usin really a second one,which is if you had this computein a in a threw downreally that the big goal of a petabyteless than a millisecond away.

But but but if you have that computeit's got to be connected.

And and like you said, there'sthere's the satellite connectivity,there's 5Gand cellular connectivity or 4G.

And then there's even the concept ofwithin Internet here,within a city,within a state, within a country ofhow do you traverse through networksand enable that constant connectivitybecause that the the pools of compute,if they're not interconnected,the value to humankind just goes downquickly.

Right?

Yeah.

So this should be kind of scary, though,for people.

You talked about datasovereignty in this space.

Isn't that a little bit scaryfor a lot of a lot of peopleand governments that are like, whoa, wait,everyone's connectedand where's their data?

Don't

I want some protection for my people?

How does Intelhow does Intel work through that?

But wellwant first from a technologybut then but then to with the governmentsthemselves understanding the rulesthe laws, the concerns.

It's one of the reasonswhy we we employ at Intel a pretty,pretty sizable force really in countriesto help have those conversationswith the lawmakers of the countriesin order to create lawsthat protect the data,but also continue tofor the for each of these countriesand the businesses in those countriesreally to foster innovation.

But I as you know, they're up.

So I was I was like,we don't do anything alone.

And no, no,we it's a team of teams of hundredsof technology companiesthat are collaborating together on this.

But I think we're kind of the tipof the spear on a lot of this stuff.

We're the ones that are bringingconsortiums together.

Our ecosystem is is vast.

And I think people pay attentionwhen Intel says,hey, this is important.

Estonia was way ahead of everyone elsein this digital transformationand protecting their citizens data,but also unleashing that dataand providing more for their citizensat lower cost and much more effective.

You see that same model pervasivethroughout the Americas as well.

We'll see that as advanced yetas as a scourge.

Do you see it happening as well?

I think it will.

I think it absolutely will.

I mean, it plays closely into the privacy.

And, you know, that that's a spacethat every government active aroundis protecting the privacy.

But then I think a natural evolution fromthere is exactlywhat's going on and what Estonia has done.

And so I do think it's a it'sa natural evolution.

The first ones always protect.

That's just that'sjust human beings. Right.

But then that then the secondis actually thinking strategicallyas a country, as a nation, what to do.

All right.

So let's talk outside of the public sectora little bit on pervasive connectivity.

What other use modelsis this really bring up?

When you say pervasive of

I'm thinking factories, I'mthinking schools, I'm thinking c, I,

I go back to my public sector, right?

Everything but I'm also thinkingroads and freeways that are connected.

I mean, the list can go along.

I think it's is.

Yeah.

I mean, all of those are it is endless.

Right.

But, but for me on on the enterpriseside, it's justand we hit on this earlier,it's the connection ofbusiness services with their customersand the extension of that that surfacethat businesses can interactwith their customers.

And so retail is a great one.

And this concept of omnireally omni channel retailwhere a businesswhether whether I buy from let's just pickone here in the US let's say targetwhether I buy from online on Targetin the store at Targetor Wal Mart or best Buy should nameall of our favorite retailers.

Kroger.

They want oneseamless experience for mewhere the they know who

I am, they know my trendsand they know what I need.

So then they can recommendadditional services in in addition.

And so sothis is what where you couldn't do that.

But without this concept of pervasiveconnectivity, if the only connectivitywas I want,

I can either shop online from my computeror go in the storeif there is no connecting of the systemsare with that pervasive connectivitythat you could see whatthat that experience for me.

Well who I would want that would breakso that would be interesting.

So if I looked at something onlineon the Target websitewhen I arrived at the store, I'd say,hey, this is on aislewith what you were looking atis on aisle five and then six.

Go check it out.

That'd be kind of cool.

But every retaileras it is, they have theirtheir omni channel channel strategies.

Some some are more advanced.

But but as I travel through the Americas,similarto Mexico, Brazil, the US, Canada,it's a regular kind of radio topic.

But again, I that's that and that combinesbecause all of these superpowersif you will build on top of each otherthat service combiningthe ubiquitous computethe pervasive connectivity.

And then the third one which we haven'ttalked through yet, but is this idea ofas a companyextending their networkfrom what today would be primarilya data center cloud, whether on prem,data center or on prem cloud,public cloud,but then also unifying the edge.

And in our target example,it would be,and I should say again, Walmart Best Buy.

But but in those examples,then it's creating a meshnetworkthat goes all the way through the store.

So in the store that means point of salesystems,cameras, sensors, weight weightscales, the whole thing.

Right,all of that, right? Yeah. Yeah, exactly.

All with thegoal of improving the shopper experience.

And soby but then there's also benefitsfor the stores,which is eliminating lossby having cameras,like you said, easier checkoutfor the clients, inventory management,eliminating out of stock,automatically detecting out of stoptraffic flow within the store.

So understanding what the traffic flowpatterns are and then being ableto place products into the right place.

All of those, every one of thoseyou could imagine, if you're not carefulas a business, you setthey could set it up as really a disparatestandalone solutionwhich which would be a mistake.

What they really want to dois really set upan architecture,an edge to cloud architecture.

That's almost as ifyou think kind of one platformand then they can just layer on topsoftware applicationsand that allows a much quicker deployment.

Now I like that.

In fact,

I was talking to a retailer recentlyand their ideas on moving some of thisedge computing outwas to help with spoilagein in their produce sectionas a brilliantand when they were talkingabout the numbers, which I can't disclosebut when they were talking aboutthe numbers on how much fruitgets thrown out or vegetablesget thrown outbecause of spoilage, it's amazingwhat the retailers have to do.

I mean, because, hey, once it's spoiled,it's spoiled.

So if they can do better predictionon when things spoiland look at traffic flow and with thatpervasive connectivity and edge,this is all really changingand being more efficient and moreresponsiblewith the resources that we have.

That's pretty obvious.

If you enable thethe team is stuck in the shelves to easilybe able to stock what they limes,lemons, seafood when they put it outand then there was a record of thatand then a digital record of that.

You can you can quickly see how storesthen can take different functionsto to move the product quicklywhile it's still at its peak.

Right.

And that fascinating use cases there.

We've also talked in factory, too.

There's a lot of things we can doin factories, in manufacturing,with industry, Ford Auto,with edge computing.

Well, there's some great ideas there, too,of a preventative maintenance failure.

You know, predicting failuresand handling the maintenance.

You know, a big you can imagineeven just a company like Intel Digitalcontinuing to digitize our manufacturing,which is for us, it's a long process.

But to be able to have a record of that,know where each processor isby customer and the eventual destinationbecomes a huge servicefor our own customers on manufacturing.

So. All right.

Hey, the last superpowers

I may argue with you, is it really A.I.or is it more data analytics?

So I want you I want you to convince methat it's just really just A.I..

Well, I think it I mean, it isit's more complex data analytics,

I would say.

Okay, there you go.

So you could concept of matrixmath in allowing in

I don't know what point the crossover is,but but at some pointon the number of variablesand number of data setswhere you have to rely on matrix math,

I do think there isa crossover there for a lot for for sure.

But, but it's something I,

I joke with companies all the time.

You know, you can imagine like SAS,they're saying, hey,we've been in the dataanalytics business for decadesand in the AI business for decades,we just called it data analytics.

So Oh yeah, that's accurate.

So A.I.

So what where do you see this going?

The air, air space.

Because air to me is like this blackbox of magic, you know, voodoo magic that,oh, data comes inand the air takes over the world.

And we've got, you know, Skynet.

Well, I do think it's there.

There's definitely a piece of it's upto the humans to make sure the machinesmake the right decisionand that there's definitelyan ethical element to it.

Now, insome of these just their math equationsthat can't be solved by humans,which is the promise, promise of air.

And so so there is again, just as we weretalking around data, there is elements ofethical AI.

There's also elementsof really incorporating

AI into all applications,which is where you were going.

Really an extension oftoday is just data, data analytics.

But, but to me,

I think it's, it's inevitablethat this is going to continue to grow.

There's justa massive amounts of datacreated every day.

Companies, it's beyond companies abilityto really compute.

It will continue to grow.

You know, even at Intel, we're using itmore and more of operations.

You know, it's interesting,

I just sat in an IDC conferenceand they talkedabout the explosion of data.

And today we're only we're only lookingat one of 4.5% of the data generated.

And that's nothing that even seemshigh to me.

Yeah. I mean, yeah.

Can we imagine with A.I.algorithms what we might be ableto find other patterns in that data?

Maybe the cure cured canceris sitting there and we can unleash itbecause we don't have the datain a spot yet that we can use A.I.to use it. Yeah. No,it absolutely will. It'sand I do

I mean, some emerging concepts to thatthat will make it easier, which issome of the concepts aroundlike an enterprise blockchain.

There

I'm very excited aboutand really having acentralized accessible datasets that through permission based.

You can get access to having the datain the same format is also a big one downwhere we so many companies strugglewith their own data, let aloneother third party data sets in order to doexactly what you just said.

So do you see an emergingkind of data brokerageindustry forming around these data sets?

Then they can be hired, right?

I do. I do.

And then we've already seen somesome in market fight around this.

You call it data brokerage.

But that's really that's some ofthese concepts brought through blockchainwhere that that centralized data setavailable via cloudcan be accessed by multiple companies.

And then there's a ledgerof each interaction with that datato to me, it's it's very powerfulunlocking exactly what you just saidwould lead to curing cancer.

So so protecting patients databy making it accessible to researchersall over is without exposing datawithout you.

Right? That's exactly right. Yeah.

So these architectures.

Yeah, these are these are goodarchitectures that exist today, right?

Yeah.

So these are theand so I think all four though.

Right.

Is the again ubiquitous computethen the connectivity of itand then having really a data centerto edge strategyand then also really understandingwhether I call data analytics.

Okay, I use the buzzword, buzzword dujour, right?

So we're going to use it as.

Oh, yeah, yes.

Well, that's what we've been using.

But I'm with you thereand I think it's a data analytics,but I think I mean, to meit's all it's clear.

It's all forour keyto a digital transformation strategy.

One piece we didn't discuss,which I know you're a huge believerand expert on on this podcast,is the secure D Yeah.

Of the data of the informationof the assets as it moves.

And we would be crazy not to spend a few,few minutes just kind of talking throughsome of the trends we see there, right?

Yeah.

Those trends are really this last coveredkind of exposed a lot of stuffin some respects.

COVID made ubiquitous,computing important.

I mean, extremely important. Right.

I need to be able to access my workfrom anywherein the office, at home,you know, wherever.

And that really kind of shined a big lighton ubiquitouscomputing in that hybrid workforcethat we see happening.

And it also exposedour security flaws in the industryas a whole.

Huge, huge, hugegaping holes over the last two years,some in the way that we have beenarchitect doing networks on securityand then some in our reliability on opensource projects and kind of ourwe played this game of securitythroughout this occasion.

Well, if I make it confusing enough,no one will figure it out.

Well, they did.

They figured out some of those thingsand we had some major exposure.

So I see a huge uptick inin the importanceand the money being put into security.

Right now.

It's it's incredible, actually,just to listenand watch what's going on.

You feel like Darren, it's ouras an industryyou feel like we're on a path to continueis is the rate of our ability to securekeeping up with with the expansion ofthese four superpowers are soit has to as especiallywhen you talk aboutthe edge edge to cloud architecturesand the ubiquitouscomputing our attacksurface is just exploded.

We used to say, hey, if I put a nice hardshell around my data center, I'm safe.

But all of a sudden

I now have a data center without walls.

My data is in the cloud,it's on the edge, it's in the datacenter, it's everywhere.

So how do I secure that data everywhere?

That has really made usfundamentally rethink security.

So I think, yes, the answer is yes.

We can't keep up.

But it it requires rethinking,rethinking.

So things like zero trust architecturesor principles or philosophies, whatever

I was calling it.

So but I think yes,

I think we can't keep up, butit's going to require effortand not just I'll dealwith security later,which a lot of companieshave done in the past.

Yeah, yeah, I agree.

I think it's so and I've been excitedaround Intel's innovations in the spaceand some ofthe things that we've been bringing outaround from a technology wise, thingslike the software card extensions,which is really a safe lockbox of datathat a server can use it really.

You can run

Linux based apps on the data, butbut that data remains protectedfrom the rest of the system.

So some of the some of the work thatwe've done there is super exciting for us.

Oh, yeah, very exciting.

And this goes into Intel'screated a lot of really great securityfeatures in silicon, and we're buildingthe ecosystem to take advantage of it.

And that's the key, right?

Because just having the hardware

Silicon itself doesn't doeverything you want it to do.

You really need peoplethat know how to use it,and they can build newuse cases around itlike a confidential distributed analytics.

Yeah, for cancer research or multi-domainanalytics across which means acrossunclassified,classified and top secret data,where before that data can never mingle.

Now we can mingle that datain a protected way and find new waysof solving problemsthat we couldn't solve before.

So very cool stuff.

Yeah, I've been it'sone of the things that increasinglyjust naturally as we talk to customers,

CIOs,i.t, directors, CISOs is reallywhat we've been doing at a software level,as you said, to really enablethese partners to build these softwarecompanies to build around and extractthe value from our technologies.

We've made huge strides, I think.

No, no small part of having Greg Lavendercome over.

He was at VMware,his former CTO at Citibank.

He really understands the CIO,the app dev, and understandshow to make it easier for themto extract the value of the hardware.

And a big part of that is our software,the ecosystem of software companies.

Yeah,

I love Pat Gelsinger, our Vision 2022.

Right.

He said, Hey,

I used to run one of the biggest softwarecompanies in the world, VMware,and we have moresoftware engineers at Intelthan we had to be aware.

It was like, Whoa, you know, I don't thinkpeople know that about Intel.

Yeah, it's it's a crazy wayto think of it, though.

But but but you can quickly apply.

Think of that.

That day we let the world knowwe had 19,000 software engineers.

But you could quickly thinkyou could quickly apply themto a lot of projects.

And then all of a sudden,the 19,000 are full at fully occupied,because for us we operate at three layers.

One is the foundational software,which is firmware bios,the work we do with with virtualization,enabling the workwe do with like for instance, Red Hat,some of the good Linuxopen source contributions that we make.

You know, that firstis that foundational level, which is keyfor security, is absolutely foundation.

And then the second layer, you startthinking through some of the languagesand frameworks and the toolsand libraries that we create.

So like company for instance,granular that we acquiredwas really absolutely there,absolutely brilliant,really taking existing codeand being able optimizeit and get better performance now.

But then even things like PyTorchgetting our optimizations into TensorFlowfor our standard Xeon processors, forall the things that we're doingwith Sickle,

C++, parallel C++, round one API.

So now that's at second layerand then the third layer,then you start looking at some of thethe more applicationlevel work that we doand there's hundreds, hundreds of that,some of whichwe never take out of beta.

So some we do commercialize butbut and some we just give away usually.

Yeah.

In the open source community,which is huge.

Yeah. Yeah, exactly.

I mean everything from like data centermanagement softwareto some of the acceleratorsand some of the tools for open vino.

So it's very quickly.

Wow, 19,000 engineers.

But then you think about the rolethat we have to do thatwe get to do for the world to really makethe compute accessibleand safe and secure.

You can see you can see why night 2000engineers are fully occupied.

Now, I love how you said that it's safe,secure and optimized.

I think those are our keyfocus areas on on our software endeavors.

So hopefullymore people learn about those.

So they can take advantageof all the siliconthat's there, which iswhich is what we want people to do.

Right.

Well, that's my dream.

My dream is like everyevery developer on Earthknows these tools,knows these benefits, because it reallydoes unlock the value of the hardware.

And we were talking earlier aroundlike kind of the moonshotchallengeof petabyte of data petaflops computeone millisecondaway from every person on earth.

I'll be the first to sign up for that.

Give me that right now. I'll be happy.

It's a developer's dream right now.

It's like, wow.

Okay. With that unlock innovation.

So, yeah.

So that's what we do that. Very cool.

Hey, Greg, it's been wonderful againtalking to you about the four superpowers.

Any last words for ourour listeners out therenow? I just, you know, thank you.

And Amy Darren, if they want moreinformation, what's what do you recommend?

What's the one best place to go?

You know, the best place to gois embracing digital dot org.

And on there, we've got tons of linksfrom this episodeand all of our other episodesinto Intel resources so that you can findwhat you're looking for, whether it'ssecurity, ubiquitous, compute,pervasive connectivity.

I'm going to get them all A.I.and edge to cloud.

You can find out more informationat embracingdigital dot org.

Thank you, Darren, and have a great night.

Hey, thanks.

Thank you for listeningto Embracing Digital Transformation today.

If you enjoyed our podcast, give itfive stars on your favorite podcast siteor YouTube channel.

You can find out more informationabout embracing digital transformationand embracing digital dot org until nexttime, go out and do something wonderful.