<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Growth Framework]]></title><description><![CDATA[Grow faster in tech using AI. Build skills, confidence, AI workflows, coding habits, communication strength, personal brand and career resilience with simplified, bite-sized micro learning.]]></description><link>https://www.thegrowthframework.com</link><image><url>https://substackcdn.com/image/fetch/$s_!-4nl!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F523d446f-6fa3-4469-804c-da20793d9737_700x700.png</url><title>The Growth Framework</title><link>https://www.thegrowthframework.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 10 May 2026 10:38:09 GMT</lastBuildDate><atom:link href="https://www.thegrowthframework.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Batchmore B.V.]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[growthframework@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[growthframework@substack.com]]></itunes:email><itunes:name><![CDATA[Glen Smale]]></itunes:name></itunes:owner><itunes:author><![CDATA[Glen Smale]]></itunes:author><googleplay:owner><![CDATA[growthframework@substack.com]]></googleplay:owner><googleplay:email><![CDATA[growthframework@substack.com]]></googleplay:email><googleplay:author><![CDATA[Glen Smale]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The real reason Bezos is dropping billions on AI nobody’s talking about yet]]></title><description><![CDATA[Bezos is back, poaching OpenAI talent and building AI that actually understands physics.]]></description><link>https://www.thegrowthframework.com/p/the-real-reason-bezos-dusted-off</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/the-real-reason-bezos-dusted-off</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Tue, 18 Nov 2025 06:47:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/01f4d6ce-2fd9-46ba-bbec-08f141b2a983_636x373.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Big news across social right now. Jeff Bezos, who for some reason always gives me the Austin Powers Dr Evil vibe minus the pinky and the bald cat, has dropped his Mediterranean sabbatical and gone all in on a new venture called Project Prometheus.</p><p>Prometheus. I sat with that for a moment. Normally, a new venture gets named after something relevant to the company&#8217;s activity, usually a mix of words tied to the product or industry. But in this case, Bezos chose a name pulled straight from Greek mythology, after a titan rather than a business theme.</p><p>In fact, he was the cheeky Titan (I had to look this up) who defied the gods by stealing fire from Mount Olympus and gifting it to humanity. And for his trouble, he got chained to a rock on eternal barbecue duty, courtesy of Zeus&#8217;s HR department.</p><p>Strip away the mythic flair, and Project Prometheus emerges as a calculated strike at the heart of an industry stuck in slow motion. A six point two billion dollar war chest, with Bezos fronting a significant slice, fuelling an AI venture that&#8217;s already poached nearly one hundred minds from the labs of Meta, OpenAI and Google DeepMind.</p><p>Something straight out of Meta&#8217;s recent playbook, where they went on a hiring spree to beef up their own AI ambitions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zF3o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zF3o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zF3o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zF3o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zF3o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zF3o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg" width="1104" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1104,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95441,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/179219529?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zF3o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zF3o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zF3o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zF3o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be3d903-50c9-4430-8ed0-add6b6e002b9_1104x832.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So he&#8217;s back in play, and I didn&#8217;t think too much of it at first, apart from the usual &#8220;maybe he&#8217;s just bored with the Med, retail or rockets.&#8221; But the detail that shifted me from that to &#8220;okay, this is actually big news&#8221; was learning that his new venture is zeroed in on AI for the physical economy. Real tools that simulate and improve the gritty realities of engineering and manufacturing.</p><p>Think proprietary models that crunch physics data to virtually test rocket fuselages for thermal stress or check new EV battery chemistries for long term wear. All of it still speculation, but if it works, it could cut prototyping timelines from years to months and trim costs by fifty to seventy percent in the most expensive parts of R&amp;D.</p><p>Now, this is all good and well, but where does this actually get applied? What&#8217;s the gameplay here?</p><p>He is betting big on what I would think is AI that whispers sweet nothings to physics itself, on a mission to drag American manufacturing back from its rusty exile in Shenzhen&#8217;s shadow.</p><p>Think proprietary models that crunch physics data to virtually test rocket fuselages for thermal stress or check new EV battery chemistries for long term wear. All of it is still speculation, but if it works, it could cut prototyping timelines from years to months and trim costs by fifty to seventy percent in the most expensive parts of R&amp;D.</p><p>This is a big play and probably something you would expect from Elon Musk&#8217;s playbook, because it&#8217;s the meat and potatoes of forward thinking innovation. And I would be remiss if I didn&#8217;t admit that part of me wonders if Bezos was stepping out on an overambitious limb.</p><p>But then&#8230;</p><p>You see his operational co pilot, or officially Co-CEO and Co-Founder. It&#8217;s <a href="https://www.linkedin.com/in/drvikbajaj/">Vik Bajaj</a>, a physicist chemist with proper moonshot pedigree. Co founder of Alphabet&#8217;s Verily, which is Google&#8217;s life sciences arm, and a key architect at Google X, where he helped spearhead both self driving bets and early biotech work.</p><p>So Bajaj&#8217;s brief is to helm the science while Bezos drives the scale, a setup that mirrors Amazon&#8217;s early playbook of relentless execution layered over audacious vision.</p><p>Now here&#8217;s where the pot gets stirred, because you can&#8217;t talk about this without touching the China question. If Prometheus actually works, automation becomes the great equaliser. Labour costs suddenly matter a lot less. Whether a welder in the U.S. charges thirty dollars an hour or someone in Shenzhen charges five&#8230; the machine doesn&#8217;t care.</p><p>Picture AI-run factories pumping out chips and hardware at the same pace as China&#8217;s best, boosted by CHIPS Act money and a few well placed Bezos-built plants in Ohio running twenty four seven with robot crews that never call in sick and don&#8217;t go on strike. That is the dream scenario.</p><p>But poke that bear a little harder. China is not going to sit there and watch. Huawei is already building out its HarmonyOS world, their state backed AI fabs are well into the hundreds of billions, and they control most of the global battery supply. Around sixty percent. The U.S. still trails badly in raw materials. Rare earths? China handles most of that. And you still have the data problem. Prometheus needs huge piles of physics data, and export controls could choke some of the input that these models depend on.</p><p>So the only way this works in the long run is if Bezos builds real moats. Maybe he keeps some of the best stuff inside Blue Origin. Maybe he pushes for tight supply chains that Washington will support. Without that, it starts feeling like David squaring up to a dragon that breathes fire.</p><p>Could he pull it off? Sure. If he manages to hand out this new &#8220;fire&#8221; without burning down the village. And if not&#8230; well, in true Titan fashion, we might all just end up warming our hands at the blaze.</p>]]></content:encoded></item><item><title><![CDATA[This is the first real case of AI being used in a cyber attack]]></title><description><![CDATA[The biggest AI story this week wasn&#8217;t the release of GPT-5.1. It was the cyber attack run on Claude.]]></description><link>https://www.thegrowthframework.com/p/this-is-the-first-real-case-of-ai</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/this-is-the-first-real-case-of-ai</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Sun, 16 Nov 2025 07:03:54 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/397e7fd0-1a1a-492d-a55c-36e53f2a3ab9_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>It has been a busy week in AI.</em></p><p><strong>GPT 5.1 landed</strong> with solid upgrades.<br><strong>Kimi pushed out K2</strong> and people jumped straight into testing the reasoning boost.<br>A few labs dropped new benchmarks.</p><p>But that is not the real headline.</p><p>The real headline is that Anthropic released the full report of a live cyber attack that ran in September.</p><p>The back story is that a state linked espionage team used Claude in a real intrusion.</p><p>Not theory.<br>Not a demo.<br>A real operation with real targets.</p><p>This is the first time we have seen a fully documented case of an AI system helping to carry out intrusion steps in the wild.</p><p>We have officially moved beyond the &#8220;what if&#8221; stage.<br>It is now clear that AI cyber attacks have begun.</p><p>Let&#8217;s break down what happened and what it means for platforms and engineers.</p><div><hr></div><h2>What GTG 1002 Actually Did</h2><p>The report identifies the operators as <strong>GTG 1002</strong>, a state linked espionage team known for targeting high value environments.</p><p><em>Here&#8217;s how Anthropic described the intrusion in their official November 2025 report.</em></p><blockquote><p>In mid-September 2025, we detected a highly sophisticated cyber espionage operation conducted by a Chinese state-sponsored group we&#8217;ve designated GTG-1002 that represents a fundamental shift in how advanced threat actors use AI. Our investigation revealed a well-resourced, professionally coordinated operation involving multiple simultaneous targeted intrusions. The operation targeted roughly 30 entities and our investigation validated a handful of successful intrusions.<br><em><strong>Source: Anthropic Full Report, November 2025</strong></em></p></blockquote><p>Their targets included banks, tech firms, and government bodies.<br>Roughly thirty organisations in total.<br><br>These were not random targets.<br>These were chosen for access, insight, and strategic value.<br><br>This is now what automated cyber threat campaigns look like.</p><p>A small team suddenly has the power of a much larger threat operation.</p><div><hr></div><h2>The Architecture Behind the Operation</h2><p>The architecture of this campaign tells you everything about how far threat actors have already gone with AI driven operations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lx6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lx6U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 424w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 848w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1272w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png" width="838" height="493" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:493,&quot;width&quot;:838,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:87680,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178984827?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lx6U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 424w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 848w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1272w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>GTG 1002 did not run a simple script or a noisy mass scan.<br>They built a structured campaign with clear phases, long lived model sessions, and a split between model autonomy and human oversight.</p><p>Claude handled most of the operational work.<br>The human operators only stepped in at strategic points where judgment mattered.</p><p>This is how the report describes it:</p><blockquote><p>&#8220;The campaign proceeded through structured phases, where AI autonomy increased progressively while human oversight remained concentrated at strategic decision gates.&#8221;<br><strong>Source: Anthropic Full Report, November 2025</strong></p></blockquote><p>This means the operation had a real hierarchy.<br>Claude did the scanning, sorting, checking, mapping, testing, and summarising.<br>The humans chose targets, adjusted strategy, and decided what to do next.</p><p>Across the campaign, the pattern looked like this:</p><p>Claude ran two to six hour blocks of autonomous activity.<br>Humans stepped in every five to twenty minutes to approve the next move.<br>Then Claude ran the next sequence.</p><p>This architecture let a small team work at a speed that usually requires a large crew.<br>Much of the workflow ran like a distributed system.</p><p>Claude acted as the worker nodes, processing small tasks and producing structured output.</p><p>The human operators acted as the orchestrators, linking outputs into the bigger chain.</p><p>It is also clear that the attackers understood the model&#8217;s tool ecosystem.<br>They used browser tools, scanning utilities, payload testers, and structured reporting to keep the workflow cohesive.</p><p>Everything was broken into small tasks so the model would treat each step as normal.</p><p>Once you understand the architecture, the lifecycle makes sense.<br>The attack was not random.<br>It moved through phases.<br>It expanded autonomy with each step.</p><p>And it used human oversight only where strategic decisions were needed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T6bH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T6bH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 424w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 848w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1272w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T6bH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png" width="742" height="559" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:559,&quot;width&quot;:742,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:118812,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178984827?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T6bH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 424w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 848w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1272w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Anthropic&#8217;s Response</h2><blockquote><p>&#8220;Upon detecting this activity, we immediately launched an investigation to understand its scope and nature. Over the following ten days, as we mapped the severity and full extent of the operation, we banned accounts as they were identified, notified affected entities as appropriate, and coordinated with authorities as we gathered actionable intelligence.&#8221;<br><em><strong>Source: Anthropic Full Report, November 2025</strong></em></p></blockquote><p>Anthropic&#8217;s response was fast and structured.</p><p>They picked up the unusual behaviour patterns early and moved into an investigation straight away.</p><p>The next ten days were spent mapping the scale of the operation, confirming what was real, and verifying how far the attackers had progressed.</p><p>As they traced the activity across accounts, they banned each one as soon as it was confirmed.</p><p>They notified the organisations that were affected.</p><p>And they worked with the relevant authorities while the intelligence was being collected.</p><p>This is an important part of the story.<br>The detection came from behaviour, not prompts.<br>And the response followed the same pattern you would expect from any security incident:<br>detect, verify, isolate, notify, and contain.</p><p>This also shows that the defenders moved at speed.<br>And speed matters now more than ever.</p><div class="pullquote"><p><em>And while that response closed the main attack, the report surfaced something else.<br>A separate weakness.<br>A different path that attackers could use.<br>And this one came from Claude&#8217;s own network features.</em></p></div><h2>Claude&#8217;s Network Feature Flaw</h2><p>The report surfaced another issue.</p><p>A separate flaw that involved Claude&#8217;s network features and how they could be manipulated through indirect prompt injection.</p><p>Security researcher Johann Rehberger discovered this weakness in October.</p><p>Claude&#8217;s coding tool has a network mode called package managers only.<br>It was designed to allow safe access to a small list of approved domains.</p><p>Claude&#8217;s &#8220;Package managers only&#8221; network mode allowed outbound calls to a short allowlist of trusted domains:</p><pre><code>api.anthropic.com</code></pre><p>The idea was that Claude could install software packages from trusted sources like npm, PyPI, GitHub, and a few Anthropic controlled endpoints.</p><p>But the setup introduced an opening.</p><p>Rehberger found that an attacker could hide instructions inside a normal looking file.</p><p>A document.<br>A script.<br>Even a printed message.</p><p>The moment a user asked Claude to analyse that file, hidden instructions could be executed.</p><p>It&#8217;s  indirect prompt injection.</p><p>The flow is simple.<br>Claude reads the content.<br>Follows the content.<br>Carries out the steps.</p><p>In this case, the steps were:</p><p>Gather recent chat history.<br>Write it into a file inside the sandbox.<br>Use the Anthropic SDK to send that file to the attacker&#8217;s own Anthropic account.</p><p>Because the allowed domain list included Anthropic&#8217;s own API endpoint, the upload request looked legitimate.</p><p>And since each upload supported up to thirty megabytes, the data exfiltration could happen at scale.</p><p>Early tests showed the exploit worked without much resistance.<br>Later versions of Claude started flagging obvious API keys.</p><p>So the researcher disguised the payload inside harmless print statements, and Claude ran it.</p><p>The weakness was reported through HackerOne.</p><p>At first, Anthropic treated it as a model safety issue, not a security issue.</p><p>However, after public discussion, they acknowledged it formally and confirmed it as an actual security problem.</p><p>This incident showed something important.</p><p>Even limited connectivity in an AI system can be misused.</p><p>Once a model can run code and make outbound calls, every allowed domain becomes a possible path for misuse.<br><br><em>So what does this mean, and what&#8217;s the gameplay for us as engineers?<br>I will unpack that next.</em></p><div><hr></div><h2>Fundamentals of Defence</h2><p>The report highlights that AI can change the tempo of an attack.<br>But it does not change the fundamentals of defence.</p><p>The workflows used in both incidents were built on things we already know.</p><p>Weak configurations.<br>Open paths.<br>Routine tasks.<br>And systems that trust too much by default.</p><p><em>So here is the gameplay for engineers.</em></p><p>Keep your systems tight.<br>Keep the paths narrow.<br>Keep the attack surface small.</p><p>The threat actors used automation to speed things up.<br>But they still relied on the same entry points every attacker uses.<br>The same mistakes.<br>The same gaps.<br>The same blind spots.</p><p>If your patching is current, the paths shrink.<br>If your identity controls are strong, the paths shrink.<br>If your endpoints are clean and monitored, the paths shrink.<br>If your staff know what a phishing lure looks like, the paths shrink again.</p><p>And if you shut down unnecessary network access,<br>there is no path for automated exfiltration in the first place.</p><p>AI allows attackers to run more checks, faster checks, and wider checks.<br><br>But it cannot bypass a well secured system.</p><p>It cannot push through a patch that is already applied.<br>It cannot defeat a hardware token.<br>It cannot log in where no credential exists.</p><p>The gameplay is the same.<br>But the discipline needs to be sharper.</p><p><em>So what should we do about it?</em></p><div><hr></div><h2>The Playbook</h2><p>If there is one message from this incident, it is this.<br>AI speeds up attacks, but it does not invent new ones.<br>It just runs the same old paths faster.</p><p>So the defence still starts with the basics.<br>But they need to be done properly.<br>And they need to be checked often.</p><p><em>Let&#8217;s dive in.</em></p><div><hr></div><h3>1. Multi Factor Authentication Everywhere</h3><p>Use hardware tokens or certificate based authentication.<br>Avoid SMS.<br>Keep admin accounts separate.<br>Rotate them on a fixed schedule.</p><p>Check your logs for unusual sign in attempts.<br>Look for access from strange locations.<br>Look for repeated failed logins.</p><p>A strong identity control blocks most intrusion chains before they begin.</p><div><hr></div><h3>2. Patch the Top Attack Surfaces Fast</h3><p>Do not wait for quarterly maintenance windows.<br>Patch the critical surfaces as soon as fixes are released.</p><p>Focus on:<br>Exchange and mail servers.<br>VPN appliances.<br>Firewall platforms.<br>Hypervisors.<br>Public facing apps.<br>Open source libraries in your dependency chain.</p><p>Keep a monthly patch report.<br>Track each issue until it is closed.<br>This one action removes a large slice of real world attack paths.</p><div><hr></div><h3>3. Segment Your Network Properly</h3><p>Keep critical systems isolated.<br>Block sideways movement by default.<br>Follow zero trust principles in practice, not only on paper.</p><p>Test this every quarter.<br>Try to move from a low value system to a high value one.</p><p>If you can do it easily, an attacker can too.</p><div><hr></div><h3>4. Lock Down Remote Access</h3><p>Limit remote tools to a small approved list.<br>Block everything else at the policy level.</p><p>Watch for:<br>AnyDesk<br>TeamViewer<br>Unapproved RDP paths<br>Unusual remote sessions<br>Processes spawning remote tools</p><p>If you really need external RDP, put it behind a VPN or jump server.</p><p>Use hardware based MFA on every privileged account.</p><div><hr></div><h3>5. Run Strong Backup Routines</h3><p>Follow the three, two, one rule.<br>Three copies.<br>Two media types.<br>One kept offline.</p><p>Run a restore test monthly.<br>Write down the result.</p><p>A backup that has never been tested is not a backup.</p><div><hr></div><h3>6. Use EDR and Threat Hunting</h3><p>Watch for common attack tradecraft:</p><p>Unexpected PowerShell activity.<br>PsExec tasks.<br>Credential dumping.<br>Cobalt Strike style patterns.<br>Large file locks.<br>Strange data staging.<br>New scheduled tasks.<br>Weird WMI activity.</p><p>Feed your EDR with updated threat intelligence.<br>Run weekly hunt reports with indicators from CISA and other trusted sources.</p><div><hr></div><h3>7. Identity and Privilege Control</h3><p>Keep access tight.<br>Grant admin rights only for the short time needed.<br>Review all elevated access at the end of each month.</p><p>Disable old accounts.<br>Rotate service credentials.<br>Remove default passwords from every device and every app.</p><p>This stops attackers from moving freely once they get a foothold.</p><div><hr></div><h3>8. Insider Risk and Behaviour Monitoring</h3><p>Watch for patterns like:<br>Sudden privilege jumps.<br>Unusual login times.<br>Large data pulls.<br>Repeated access to sensitive folders.<br>Admin users acting outside their normal scope.</p><p>Generate a monthly behaviour report.<br>Investigate anything that looks strange.</p><div><hr></div><h3>9. Shut Down Unused Ports and Services</h3><p>Every open port is a possible path.<br>Close anything that is not required.</p><p>Focus on:<br>Old SSH ports.<br>Legacy management ports.<br>Stale database listeners.<br>Forgotten web dashboards.<br>Old test environments.</p><p>Scan the network weekly and compare it to last week&#8217;s map.</p><div><hr></div><h3>10. Train Staff Against Phishing and Social Engineering</h3><p>Human error is still the quickest path in.<br>Teach your staff what phishing looks like.<br>Run simulated tests.<br>Give people simple rules to follow.</p><p>A trained team stops a large number of attacks long before your tools do.</p><div><hr></div><h2>The Goal</h2><p>Reduce the number of open paths.<br>Shrink the attack surface.<br>Make the system harder to move through.<br>Make every step slower for an attacker.</p><p>If you do that, even an AI driven operation will struggle.</p><div><hr></div><h2>Closing Thoughts</h2><p>Both incidents point to the same reality.</p><p>AI is now part of the attack surface.<br>Not in theory.<br>Not in forecasts.<br>In practice.</p><p>The attackers did not use magic.<br>They used automation.<br>They used scale.<br>They used speed.<br>And they relied on the same weaknesses that teams struggle with every day.</p><p>That is the part we cannot ignore.</p><p>AI lets a small group move faster.<br>It lets them run more checks.<br>It lets them chain tasks together.<br>But it does not remove the need for an open path.<br>It does not remove the need for a weak configuration.<br>It does not remove the need for something to grab onto.</p><p>So the path forward is clear.</p><p>Tighten the basics.<br>Reduce the openings.<br>Monitor behaviour, not just content.<br>Keep identity controls strong.<br>Keep patching sharp.<br>Keep your endpoints clean.<br>And keep your staff aware.</p><p>If you make the attack paths narrow,<br>even an AI driven operation finds it hard to do real damage.</p><p>This report is a warning.<br>But it is also a reminder.</p><p>Good engineering still works.<br>Good security still works.<br>And the teams that stay disciplined will stay ahead.</p><div><hr></div><p><em>That is it for today&#8217;s deep dive.</em></p><p><em>A quick note. I have added two new newsletter sections to help you catch up on each week&#8217;s big news.</em></p><p><em>This Week in AI.<br>This Week in Cybersecurity and Compliance.</em></p><p><em>Tip: If you find this helpful, subscribe to get new episodes automatically.</em></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Memory types, and why agents forget]]></title><description><![CDATA[Most agent failures come from memory gaps. Here is how to fix them.]]></description><link>https://www.thegrowthframework.com/p/memory-types-and-why-agents-forget</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/memory-types-and-why-agents-forget</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Fri, 14 Nov 2025 18:08:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f801ee5a-a029-4d34-9914-0df7e1ae8559_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Do agents forget things?<br>Yes, it happens.<br>More often than people expect.</p><p>Some people think the model is broken.<br>Others blame the tools.<br>Some assume the agent should remember everything by default.</p><p>That is not how it works.<br>Agents forget for very specific reasons.<br>And most people do not realise how many types of memory an agent can have.</p><p>If you started here, you may have missed the earlier episodes:</p><p>What an AI agent actually is<br>The agent thinking loop explained in simple language<br>How to give an agent a goal it can actually follow</p><p>You may want to read those first.<br>They give the foundation you need.</p><p>In this episode, we focus on memory.</p><p>Why agents forget.<br>The types of memory they use.<br>And how you can design memory so the agent stops losing track of the task.</p><p>By the end of this, you will understand the main memory types, when to use each one, and how memory shapes the behaviour of the entire agent loop.</p><p>This is it.<br>Let&#8217;s get into it.</p><div><hr></div><h2>Why memory matters</h2><p>Memory is what stops an agent from repeating mistakes.<br>It helps the agent understand context.<br>It keeps the loop stable.<br>It stops the agent from starting from zero every time.</p><p>Without memory, even a good agent will behave strangely.<br>It will lose steps.<br>Lose instructions.<br>Lose progress.</p><p>Understanding memory is one of the fastest ways to improve your agent.</p><div><hr></div><h2>The three types of memory</h2><p>There are three main types you will work with:</p><ol><li><p>Short-term memory</p></li><li><p>Long-term memory</p></li><li><p>Functional memory</p></li></ol><p>Each one has a different purpose.<br>Each one solves a different problem.</p><p>Let&#8217;s break them down.</p><div><hr></div><h3>1. Short term memory</h3><p>This is the memory inside the loop.<br>It only lasts for the current cycle.</p><p>It includes:</p><p>&#8226; the observation<br>&#8226; the thought<br>&#8226; the action result<br>&#8226; the reflection</p><p>The agent uses this memory only for the current pass through the loop.<br>Once it moves on, most of this disappears unless you store it.</p><p>Short-term memory helps the agent decide the next step.<br>But it does not help the agent remember what happened ten steps ago.</p><p>This is why long tasks break without long-term memory.</p><div><hr></div><h3>2. Long term memory</h3><p>This is the memory the agent can return to later.<br>It survives across loops.<br>It survives across sessions.</p><p>It might be stored in:</p><p>&#8226; a vector database<br>&#8226; a structured file<br>&#8226; a notes system<br>&#8226; a memory log<br>&#8226; a knowledge base</p><p>The agent uses long-term memory to:</p><p>&#8226; remember past steps<br>&#8226; carry insights into future tasks<br>&#8226; store important information<br>&#8226; keep track of goals and subgoals<br>&#8226; avoid repeating old mistakes</p><p>Agents with good long-term memory feel stable.<br>Agents without it feel confused and scattered.</p><div><hr></div><h3>3. Functional memory</h3><p>This is the memory inside specific tools.<br>It is not part of the model.<br>It is not part of the loop.<br>It is inside the action itself.</p><p>Examples:</p><p>&#8226; a tool that saves previous API calls<br>&#8226; a tool that tracks file edits<br>&#8226; a tool that collects user preferences<br>&#8226; a tool that stores conversation turns</p><p>Functional memory makes tools smarter without touching the agent&#8217;s core memory.</p><p>It is useful for:</p><p>&#8226; tracking progress<br>&#8226; remembering previous tool actions<br>&#8226; improving tool accuracy<br>&#8226; reducing repeated work</p><p>Functional memory is the hidden engine behind many advanced agent systems.</p><div><hr></div><h2>Why agents forget</h2><p>Agents forget when:</p><p>&#8226; the short-term memory is not passed forward<br>&#8226; long-term memory is not stored<br>&#8226; the agent is not instructed to recall memory before acting<br>&#8226; the memory is saved in the wrong format<br>&#8226; the memory is too large to fit back into the loop<br>&#8226; the system has no rules for what to remember and what to ignore</p><p>Forgetting is not a bug.<br>It is a design issue.</p><p>Fix the memory design, and the agent becomes reliable.</p><div><hr></div><h2>A simple example</h2><p>Goal: plan a three step project outline.</p><p>Short-term memory:<br>Each step the agent decides.</p><p>Long-term memory:<br>Stores the full outline so the agent does not lose earlier steps.</p><p>Functional memory:<br>A planning tool might keep track of previous drafts.</p><p>If any of these memory layers are missing, the outline will drift or collapse.</p><div><hr></div><h2>How to use this today</h2><p>Before you build or test an agent, ask:</p><p>&#8226; What should the agent remember<br>&#8226; How long should it remember it<br>&#8226; Where should this memory live<br>&#8226; Does the memory help the loop<br>&#8226; Is this short-term, long-term or functional</p><p>A clear memory plan strengthens the agent&#8217;s behaviour more than most people expect.</p><p>Save this.<br>Good memory design is one of the core skills in agent building.</p><div><hr></div><h2>Up Next</h2><p>Tools, and how agents use them to act</p><p>In the next episode in this series, you will learn how tools give agents the ability to take action, why tools matter more than model size, and how to pick the right tools for your system.</p><p>Tip: Find this helpful? Subscribe to get new episodes automatically.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[How to give an agent a goal it can actually follow]]></title><description><![CDATA[Most agents fail because the goal is written badly. Here is how to fix that.]]></description><link>https://www.thegrowthframework.com/p/how-to-give-an-agent-a-goal-it-can</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/how-to-give-an-agent-a-goal-it-can</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Fri, 14 Nov 2025 17:57:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/459108f9-1ede-4f8a-9a1f-d049daaeba89_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It seems many people get stuck at the same point.<br>They build an agent.<br>They test it.<br>And it behaves in a strange way that makes no sense.</p><p>Most of the time, the problem is not the model.<br>It is not the tools.<br>It is not the memory or the loop.</p><p>It is the goal.</p><p>A vague goal creates a confused agent.<br>A broad goal creates an unpredictable agent.<br>A sloppy goal creates a messy loop.</p><p>They give you the foundation you need.</p><p>In this episode, we focus on the goal.<br>How to write it.<br>How to shape it.<br>How to make it so clear that the agent has no room to drift.</p><p>By the end of this, you will know how to write goals that guide the agent, support the loop, and reduce the chance of failure.</p><p>This is it.<br>Let&#8217;s get into it.</p><div><hr></div><h2>Why goals matter so much</h2><p>An agent follows a loop.<br>Observe.<br>Think.<br>Act.<br>Reflect.</p><p>The goal is the thing that anchors the loop.<br>It tells the agent what success looks like.<br>It tells the agent when to stop.<br>It tells the agent which direction to move in.</p><p>If the goal is fuzzy, the loop becomes messy.<br>If the goal is clear, the loop becomes focused.</p><p>A good goal is not long.<br>It is not complex.<br>It is not technical.</p><p>It is simple.<br>It is measurable.<br>It is understandable.</p><div><hr></div><h2>What a bad goal looks like</h2><p>Here are common examples:</p><p>&#8226; &#8220;Help me with my inbox&#8221;<br>&#8226; &#8220;Make this document better&#8221;<br>&#8226; &#8220;Organise everything for me&#8221;<br>&#8226; &#8220;Check my data and fix issues&#8221;<br>&#8226; &#8220;Handle my tasks&#8221;</p><p>These goals are too broad.<br>They hide the real outcome you want.<br>They give the agent no direction.</p><p>When the goal is unclear, the agent will guess.<br>And its guesses are often wrong.</p><div><hr></div><h2>What a good goal looks like</h2><p>Here are the patterns you want:</p><p>&#10003; Clear<br>&#10003; Short<br>&#10003; Focused<br>&#10003; One outcome<br>&#10003; No hidden expectations</p><p>Examples:</p><p>&#8226; &#8220;Show me the five messages I must read today&#8221;<br>&#8226; &#8220;Find the dates that do not match in this dataset&#8221;<br>&#8226; &#8220;Sort these tasks into today, this week and later&#8221;<br>&#8226; &#8220;Summarise the risk points in this document in one paragraph&#8221;<br>&#8226; &#8220;Extract the vendor names and list them in a table&#8221;</p><p>Clear outcome.<br>Straight path.<br>No confusion.</p><p>Agents thrive when the goal is small and well defined.</p><div><hr></div><h2>The structure of a strong goal</h2><p>Use this simple pattern:</p><p><strong>Action + Target + Outcome</strong></p><p>Examples:</p><p>&#8226; &#8220;Sort + these tasks + into three buckets&#8221;<br>&#8226; &#8220;Extract + the key findings + into a clean list&#8221;<br>&#8226; &#8220;Check + this dataset + for gaps in the dates&#8221;<br>&#8226; &#8220;Summarise + this report + in under one paragraph&#8221;</p><p>When the goal follows this shape, the agent knows exactly what the target is and what the result must look like.</p><div><hr></div><h2>Add constraints if they matter</h2><p>Constraints are optional, but useful.</p><p>Examples:</p><p>&#8226; &#8220;Do not change the original text&#8221;<br>&#8226; &#8220;Keep the final answer under one hundred words&#8221;<br>&#8226; &#8220;Use these three categories only&#8221;<br>&#8226; &#8220;Do not run any external tools&#8221;</p><p>Constraints help shape the loop.<br>They give the agent boundaries.<br>They stop unnecessary actions.</p><p>You do not need many.<br>Just the ones that matter.</p><div><hr></div><h2>A quick example</h2><p>Bad goal:<br>&#8220;Help me clean my inbox&#8221;</p><p>Better goal:<br>&#8220;Show me the five messages I must read today&#8221;</p><p>Even better with constraints:<br>&#8220;Show me the five messages I must read today.<br>Ignore newsletters.<br>Ignore promotions.<br>Ignore anything older than two weeks.&#8221;</p><p>This turns vague chaos into a clean task.</p><div><hr></div><h2>How to use this today</h2><p>Before you build or test an agent, ask yourself:</p><p>&#8226; Is my goal clear<br>&#8226; Is it one outcome<br>&#8226; Can an agent act on it<br>&#8226; Does it follow action, target, outcome<br>&#8226; Does it need constraints</p><p>If the answer is no, rewrite it.<br>A strong goal will save you hours of debugging later.</p><p>Save this.<br>Good goal writing is half of agent design.</p><div><hr></div><h2>Up Next</h2><p><a href="https://www.thegrowthframework.com/p/memory-types-and-why-agents-forget">Memory types and why agents forget.</a></p><p>In the next episode in this series, you will learn the difference between short-term memory, long-term memory and functional memory inside an agent, and how each one shapes the loop.</p><p>Tip: Find this helpful? Subscribe to get new episodes automatically.</p>]]></content:encoded></item><item><title><![CDATA[The agent thinking loop, explained in simple language]]></title><description><![CDATA[This is the loop that makes an agent feel alive.]]></description><link>https://www.thegrowthframework.com/p/the-agent-thinking-loop-explained</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/the-agent-thinking-loop-explained</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Fri, 14 Nov 2025 17:44:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a9263d2c-2e7b-4bee-a2f5-7cd06afb01be_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I think there is confusion about how agents actually think.<br>Some imagine complex logic.<br>Others think it is one giant model doing everything in one go.</p><p>Most explanations jump straight into diagrams.<br>Or long technical code.<br>Or patterns that only make sense if you already know the topic.</p><p>In this episode, we focus on how the agent thinks, step by step.</p><p>No heavy theory.<br>No complicated design patterns.</p><p>By the end of this, you will understand the thinking loop behind every agent, why it matters, and how this simple cycle powers almost everything an agent can do.</p><p>This is it.<br>Let&#8217;s get into it.</p><div><hr></div><h2>The agent thinking loop</h2><p>This loop is the process of modern agentic systems.<br>Every useful agent follows it.<br>Nothing works without it.</p><p>Here are the five steps, explained in simple terms.</p><div><hr></div><h4>1. Observe</h4><p>The agent looks at what is happening right now.</p><p>This could be:</p><p>&#8226; a document<br>&#8226; a webpage<br>&#8226; an inbox<br>&#8226; a database entry<br>&#8226; the result from the last step</p><p>It is the agent saying,<br>&#8220;What is the situation right now?&#8221;</p><div><hr></div><h4>3. Act</h4><p>The agent does something.</p><p>It might:</p><p>&#8226; call a tool<br>&#8226; fetch data<br>&#8226; write to a file<br>&#8226; trigger an API<br>&#8226; update its memory<br>&#8226; transform content</p><p>This is why tools matter.<br>Talking is nothing without action.</p><div><hr></div><h4>4. Reflect</h4><p>After each action, the agent checks the result.</p><p>It asks:</p><p>&#8226; Did that work<br>&#8226; Did I move closer to the goal<br>&#8226; Do I need to adjust<br>&#8226; Did something fail</p><p>Reflection stops bad loops.<br>It helps the agent recover when something goes wrong.</p><div><hr></div><h4>5. Repeat</h4><p>The loop runs again.<br>Observe.<br>Think.<br>Act.<br>Reflect.</p><p>And again.<br>And again.<br>Until the task is done or the agent hits a limit.</p><p>This loop gives agents momentum.<br>It turns small steps into real progress.</p><div><hr></div><h2>A simple example</h2><p>Goal: clean up my task list for today.</p><p>Observe: read the list<br>Think: decide what counts as important<br>Act: sort tasks into buckets<br>Reflect: check if the buckets make sense<br>Repeat: refine until the list looks right</p><p>Nothing fancy.<br>Just a small loop done properly.</p><div><hr></div><h2>Why the loop matters</h2><p>Because without it, you do not have an agent.<br>You have a single reply.<br>Or a prompt.<br>Or a thin wrapper around a model.</p><p>The loop is what makes an agent:</p><p>&#10003; adaptable<br>&#10003; able to fix its own mistakes<br>&#10003; capable of multi-step work<br>&#10003; responsive to changing information<br>&#10003; useful inside real business tasks</p><p>Once you understand this loop, everything else becomes easier.</p><p>Save this.<br>You will use it again and again.</p><div><hr></div><h2>Up Next</h2><p><a href="https://www.thegrowthframework.com/p/how-to-give-an-agent-a-goal-it-can">How to give an agent a goal, it can actually follow.</a></p><p>In the next episode in this series, you will learn the right way to write goals so the agent can understand the task and take the right actions from the start.</p><p>Tip: Find this helpful? Subscribe to get new episodes automatically.</p>]]></content:encoded></item><item><title><![CDATA[What an AI agent actually is]]></title><description><![CDATA[Forget the noise. Here is the simple picture that finally makes sense of agents.]]></description><link>https://www.thegrowthframework.com/p/what-an-ai-agent-actually-is</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/what-an-ai-agent-actually-is</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Thu, 13 Nov 2025 20:29:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/46274ba6-1996-4b3d-ab61-800cfa4eb4ff_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>People talk about AI agents like they are some kind of magic trick.</p><p>Everyone throws the word around.<br>Very few explain it in a clear way.</p><p>Most people are confused.<br>Some think an agent is just a chatbot.<br>Others think it is automation with a fancy name.</p><p>I decided to get the most up-to-date answer.</p><p>I wanted to explain this in the clearest and simplest way possible.<br>So I spent more than thirty hours researching.</p><p>Reviewing the updated methods.<br>Studying the patterns, the better guides agree on.<br>And cutting out everything that makes this topic harder than it should be.</p><p>You do not have time to sift through technical chapters.<br>So I did and made this simple.<br>And I made it practical.</p><p>By the end of this, you will know exactly what an agent is, how it works, and how to tell the difference between a real agent and a chatbot pretending to be one.</p><p>This is it.<br>Let&#8217;s get into it.</p><div><hr></div><h2>What an AI agent actually is</h2><p>Forget the noise online.<br>An AI agent is nothing more than a software system that works towards a goal through small steps of thinking and action.</p><p>An agent can:</p><p>&#10003; understand the goal<br>&#10003; look at information<br>&#10003; think about what to do next<br>&#10003; use tools to act<br>&#10003; review the result<br>&#10003; loop until it finishes or gets stuck</p><p>The key idea is that an agent keeps going.<br>It does not reply once and stop.</p><div><hr></div><h2>Chatbots talk. Agents work.</h2><p>A chatbot waits for your question, gives you one answer, and stops.</p><p>An agent does more:</p><p>&#10003; starts with a goal<br>&#10003; breaks the work down<br>&#10003; thinks before each step<br>&#10003; uses tools to change things<br>&#10003; reviews the result<br>&#10003; keeps looping until the task is complete</p><p>This is why agents can run processes, update systems and support real business tasks.</p><div><hr></div><h2>A simple model to remember</h2><p>Use this tiny formula.<br>It will make the whole topic easier to understand.</p><p><strong>Agent = goal + loop + tools + memory</strong></p><p>&#8226; The goal tells the agent what you want<br>&#8226; The loop is how it moves step by step<br>&#8226; The tools let it act<br>&#8226; The memory helps it avoid starting from zero each time</p><p>If these parts are missing, you do not have an agent.<br>You have a chatbot or a scripted workflow.</p><div><hr></div><h2>A quick real example</h2><p>Imagine an inbox cleanup agent.</p><p>Goal: show me the messages I must read today</p><p>It might:</p><p>Observe your inbox<br>Think about what counts as important<br>Act by filtering and sorting<br>Reflect on the results<br>Repeat until it feels confident</p><p>It is simple.<br>Just small actions done in sequence.</p><div><hr></div><h2>How to use this today</h2><p>When you see a product or model claiming to be an agent, check if it:</p><p>&#10003; follows a goal<br>&#10003; thinks step by step<br>&#10003; uses tools<br>&#10003; reviews its own actions<br>&#10003; loops until finished</p><p>If not, it is not a real agent.</p><p>Save this.<br>Everything else we learn will build from this one.</p><div><hr></div><h2>Up Next</h2><p><a href="https://www.thegrowthframework.com/p/the-agent-thinking-loop-explained">The agent thinking loop, explained in simple language</a></p><p>In the next episode in this series, you will see exactly how an agent thinks, step by step.</p><p>Tip: Find this helpful? Subscribe to get new episodes automatically.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Are independent AI tools living on borrowed time?]]></title><description><![CDATA[Are we too busy building features to see they&#8217;re being built over?]]></description><link>https://www.thegrowthframework.com/p/are-independent-ai-tools-living-on</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/are-independent-ai-tools-living-on</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Wed, 12 Nov 2025 09:26:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZwfN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZwfN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZwfN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ZwfN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ZwfN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ZwfN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZwfN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2420742,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178676173?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZwfN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ZwfN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ZwfN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ZwfN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff54efd03-9b57-45cb-98d6-b98ec2546d6a_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;ve been thinking about this a lot lately.<br><br>A lot of us are giddy on the AI hype right now.<br><br>We&#8217;re learning prompts, creating templates, building automation stacks, crafting these highly optimised, AI-orchestrated lives.<br><br>And it&#8217;s exciting, right?<br><br>But I can&#8217;t help wondering&#8230; is all this noise distracting us from the real issue at hand?<br><br>Because while we&#8217;re figuring out how to use AI, the big AI platforms are figuring out how to absorb everything we&#8217;re building.<br><br>Think about it, the big model players are steadily folding more and more independent features into their own stacks.<br><br>Take OpenAI, for example.<br><br>They&#8217;ve moved from chat to checkout with &#8220;Buy it in ChatGPT&#8221;, with an Agentic Commerce Protocol co-developed with Stripe, pulling shopping carts and payments directly into the model layer.<br><br>Amazon is doing something similar with its Rufus and Lens Live integrations, turning search &#8594; conversation &#8594; purchase entirely inside its own walls. Essentially, they&#8217;re closing the loop so users never need to leave the platform.<br><br>Google is collapsing separate Gemini add-ons and bundling those capabilities straight into Workspace.<br>Platform-level absorption of once-independent tools.<br><br>Microsoft is baking generative image creation and editing right into Windows, Paint Cocreator, Photos, Snipping Tool, steadily squeezing out headroom for standalone image editors.<br><br>Adobe is doing the same with Firefly, building generative fill and vector creation directly into Photoshop and Illustrator.<br>A textbook &#8220;platform eats plugin&#8221; move.<br><br>And Meta?<br><br>They&#8217;re embedding AI photo editing straight into Instagram Stories, making it easier to bypass dozens of independent image-editing apps entirely.<br><br>There&#8217;s a clear pattern here, and it&#8217;s not subtle.<br><br>So here&#8217;s what I&#8217;m asking:<br><br>Are we thinking enough about this?<br><br>What&#8217;s the future impact of all these integrations?<br><br>Because right now, it would appear AI independents are frogs in water, splashing around while the temperature steadily rises.<br><br>And by the time they realise what&#8217;s happening, it might already be too late.<br><br>Because I don&#8217;t think they will exist in ten years.<br><br>Maybe not even five, at the current pace.<br><br>Just my opinion, of course.<br><br>But be real, once you let these thoughts manifest, and you pay attention to what is happening around you.<br><br>You realise just how screwed all these independent AI builders really are!<br><br>Now, I may be wrong, and hopefully I am. But then again, maybe I&#8217;m not!</p><p><br><em>If you find my insights useful, please consider sharing them with others in your network who may benefit.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/p/are-independent-ai-tools-living-on?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/p/are-independent-ai-tools-living-on?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Ransomware attackers aren’t hackers, they’re operators.]]></title><description><![CDATA[Know this and block 90% of their attacks.]]></description><link>https://www.thegrowthframework.com/p/most-ransomware-attackers-arent-geniuses</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/most-ransomware-attackers-arent-geniuses</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Mon, 10 Nov 2025 22:44:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2084984e-56c6-48da-b98b-8cbb101e6387_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If your picture of a hacker is someone in a dark room typing genius code from scratch, you&#8217;re about ten years out of date.</p><p>Ransomware isn&#8217;t a story about lone coders anymore. It&#8217;s a business.</p><p>Think of it like Ransomware as a Service. You rent the malware. You follow the guide. You split the profit.</p><p>In today&#8217;s insight, I&#8217;m walking through how BlackCat (ALPHV) shaped this whole model, why it still matters even after the takedown, and the steps you can take right now to stop most RaaS attacks before they spread.<br><br>From this guided insight, you will:</p><p>&#128073; Understand how RaaS really works<br>&#128073; Learn what indicators actually matter<br>&#128073; See how to block the tools attackers rely on daily</p><p><strong>Know your attackers&#8217; tools, defend with precision.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>The Myth vs The Model</h2><p>Here&#8217;s the truth: ransomware today isn&#8217;t driven by genius. It&#8217;s driven by structure.</p><p>The days of lone hackers are mostly gone. In their place, you&#8217;ve got a commercialised underground economy with developers, affiliates and profit splits.</p><p>It&#8217;s sold as RaaS, Ransomware as a Service. I sometimes call it Rent a Service because that&#8217;s basically what it is.</p><p>You don&#8217;t need to write code anymore. You use what&#8217;s already out there. You rent it, repurpose it or tweak existing malware, then run the job and split the profit.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RraV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RraV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!RraV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RraV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1425506,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RraV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!RraV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Over time, the market professionalised</h2><p>A small group of skilled developers started building solid ransomware toolkits with admin panels, payment systems and clear instructions.</p><p>They offered these platforms to operators on private channels. Sometimes rented, sometimes sold, copied from leaked code.</p><p>Affiliates buy access, pick their targets and run the attacks.</p><p>Developers look after the platform, handle payments and take their cut.</p><p>That&#8217;s how a few coders can fuel hundreds of global breaches. And BlackCat (ALPHV) shows this better than anyone.</p><div><hr></div><h2>What Is BlackCat (ALPHV)?</h2><p>Why this matters: it&#8217;s the playbook for professional ransomware operations. It&#8217;s modular, runs on different systems, and feels a lot like commercial software.</p><p>BlackCat, also called ALPHV or Noberus, showed up in late 2021.</p><p>It&#8217;s written in Rust, one of my favourite languages. I&#8217;ve got a soft spot for Go and Elixir, too.</p><p>Rust is fast, memory safe and tough to reverse engineer, which makes it great for staying hidden.</p><p>Unlike older strains, BlackCat runs on Windows, Linux and VMware ESXi. So it hits both cloud and on-premises systems.</p><p>The code is clean, the logic is tight, and the whole thing feels like it was built to make money rather than cause random chaos.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MAno!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MAno!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!MAno!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MAno!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1442940,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MAno!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!MAno!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>How BlackCat Works</h2><p>Why this matters: Knowing the flow helps defenders break it before anything gets encrypted.</p><p>BlackCat runs on the Ransomware as a Service model. Developers keep the platform running, and affiliates carry out the intrusions.</p><p>Here&#8217;s the attack flow:</p><p>Initial Access: through phishing, stolen RDP credentials or exploited weaknesses like ProxyShell, Log4j or ESXi flaws.</p><p>Lateral Movement: using tools like Cobalt Strike, AnyDesk or PsExec to move through the network, gain higher access and shut down security controls.</p><p>Data Exfiltration: before any encryption starts, sensitive data is taken for double extortion.</p><p>Encryption: files are locked with AES 256 and ChaCha20. A random seven-character extension is added, and system files are skipped so the device can still boot.</p><p>Ransom Demand: a note drops with a dot onion link for negotiation. Payment is usually Bitcoin or Monero.</p><p>Affiliates keep most of the profit. Developers take a smaller platform cut.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>Attack Indicators</h2><p><strong>Why this matters:</strong> Early detection often decides whether an event becomes an incident.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GMC4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GMC4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 424w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 848w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1272w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GMC4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png" width="728" height="323.10567296996663" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c57cb8fc-3821-4f61-8016-d441770901c1_899x399.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:399,&quot;width&quot;:899,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:26765,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GMC4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 424w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 848w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1272w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Behavioural Indicators</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2muP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2muP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 424w, https://substackcdn.com/image/fetch/$s_!2muP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 848w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1272w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2muP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png" width="891" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:891,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:21855,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2muP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 424w, https://substackcdn.com/image/fetch/$s_!2muP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 848w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1272w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What to Do About It</h2><p>Why this matters: precision beats panic. These actions close the paths BlackCat-style operators depend on.</p><p><strong>Multi Factor Authentication (Platform / SecOps)</strong><br>Use hardware tokens or certificate-based MFA. Skip SMS codes.<br>Verify: check a sample of high-privilege logins each week.</p><p><strong>Patch Vulnerabilities (IT Ops)</strong><br>Focus on Exchange issues like ProxyShell and ProxyLogon, Log4j, VMware ESXi, Fortinet and SonicWall.<br>Verify: keep monthly reports that track each weakness through to patch.</p><p><strong>Network Segmentation (Network / SecOps)</strong><br>Follow Zero Trust ideas. Keep critical systems isolated and block sideways movement by default.<br>Verify: run quarterly drills that test sideways movement.</p><p><strong>Remote Access Controls (IT Ops)</strong><br>Allow only approved remote tools. Block everything else through Group Policy.<br>Verify: review a weekly software inventory diff.</p><p><strong>Backups (IT Ops)</strong><br>Use the three two one rule. Three copies, two types of media, one kept offline.<br>Verify: run a monthly restore test and write down the result.</p><p><strong>EDR and Threat Hunting (SecOps)</strong><br>Watch for Rust payloads, Cobalt Strike traffic, mass file locks and strange data staging.<br>Verify: produce weekly hunt reports with IOC checks.</p><p><strong>Identity and Privilege Controls (SecOps / HR)</strong><br>Keep access tight, rotate admin accounts and use Just in Time access.<br>Verify: review all raised access each month.</p><p><strong>Insider Risk Monitoring (SecOps / HR)</strong><br>Watch for odd admin behaviour, sudden privilege jumps and unusual access patterns.<br>Verify: send a behavioural report and raise anything that stands out.</p><div><hr></div><h2>Quick Wins (5 Minutes)</h2><p>Why this matters: small changes stack up fast. These actions close the gaps that attackers use every day.</p><p>Most attackers don&#8217;t write code on the fly. They use normal admin tools, the same ones your IT team trusts.</p><p>Cut off their access to these, and you slow them down fast.</p><p>&#128421;&#65039; RDP<br>A common path in.<br>Turn off external RDP.<br>If you really need it, put it behind a VPN or a jump host.<br>Use hardware MFA like a YubiKey.<br>Watch for failed logins and odd locations.</p><p>&#127919; Cobalt Strike<br>Common in cracked form.<br>Pull in CISA IOCs for active command paths.<br>Use community SSL and TLS intel feeds like abuse.ch SSLBL.<br>Let your EDR or IDS watch for Beacon patterns because domain blocks alone are never enough.</p><p>&#129520; AnyDesk and TeamViewer<br>Easy backdoor tools for intruders.<br>Keep only the approved ones.<br>Remove anything unapproved through Group Policy.<br>Let only admins install remote tools.</p><p>&#128273; Mimikatz<br>Used to pull credentials.<br>Turn on LSASS protection with RunAsPPL.<br>Make sure WDigest is off. It is off by default on recent Windows builds. If you run older ones, apply KB2871997, then turn it off.<br>Watch for dumping behaviour in your EDR.<br>Rotate high-privilege passwords on a regular schedule.</p><p>&#9889; PowerShell and PsExec<br>Built-in tools are often used in attacks.<br>Limit PowerShell to signed or admin-approved scripts through WDAC or AppLocker.<br>Log Event IDs 4104 and 4688, and watch 5861 for WMI persistence.<br>Limit PsExec for non-admins and push all logs to your SIEM.</p><p>Outcome: you&#8217;ve now blocked around ninety percent of real-world ransomware tradecraft, including BlackCat.</p><div><hr></div><h2>Final Thought</h2><p>BlackCat isn&#8217;t just another ransomware strain. It&#8217;s a template for how modern cybercrime grows and keeps itself going.</p><p>Assume breach. Verify everything. Patch fast. Segment deep. Back up smart.</p><p><strong>Know the tools attackers use and defend with precision.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Most Businesses Say They “Use AI.” Few See Results.]]></title><description><![CDATA[Here&#8217;s What They&#8217;re Missing.]]></description><link>https://www.thegrowthframework.com/p/most-businesses-say-they-use-ai-few</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/most-businesses-say-they-use-ai-few</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Mon, 10 Nov 2025 12:18:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6d8744a7-acf9-458f-859e-f8086fa22575_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Lots of companies say they use AI, but only a small number are getting real results from it.</p><p>A recent McKinsey study shows that almost every big company is testing AI tools, but only a few can make them work across the whole business. Most are stuck in trial mode without clear plans, goals or a way to check if AI is actually helping.</p><div><hr></div><h3>Many AI Projects Get Dropped Halfway</h3><p>Gartner predicts that about <strong>30% of AI projects will be abandoned by the end of 2025. </strong>That&#8217;s like building a cool robot, testing it once, then putting it in a closet because it&#8217;s too expensive or doesn&#8217;t do the job well.</p><div><hr></div><h3>Almost No One Is Ready to Run AI Safely</h3><p>According to F5, only <strong>2% of companies</strong> are ready to use AI securely.<br>That means almost everyone else still struggles with data privacy, safety, and keeping hackers out. Many haven&#8217;t even set up simple AI &#8220;firewalls&#8221; to stop attacks or bad inputs.</p><div><hr></div><h3>The Risks Are Growing Faster Than the Rules</h3><p>Stanford&#8217;s <em>AI Index</em> says as AI spreads, <strong>so do its problems</strong>, things like bias, wrong answers, and security issues. Governments are quickly making new laws, but most companies haven&#8217;t built systems to follow them yet.</p><div><hr></div><h2>Why This Is Happening</h2><p><strong>1. Bad data = bad AI.</strong><br>AI learns from data. If the data is messy or wrong, the AI will be too.</p><p><strong>2. No plan for growth.</strong><br>It&#8217;s easy to test one AI idea, but hard to grow it across an entire company. Most don&#8217;t have a step-by-step plan.</p><p><strong>3. Security gaps.</strong><br>Hackers can now attack AI systems by tricking them or stealing data. Few companies have tools to stop that.</p><p><strong>4. High costs.</strong><br>AI needs lots of computing power and people to manage it. Without planning, the costs grow fast.</p><p><strong>5. New rules keep coming.</strong><br>Governments are setting new AI safety laws, but companies aren&#8217;t ready to follow them all.</p><div><hr></div><h2>How the Research Fits Together</h2><ul><li><p><strong>McKinsey &amp; Stanford:</strong> Companies use AI but can&#8217;t scale it.</p></li><li><p><strong>Gartner:</strong> Many AI projects fail early because they cost too much or don&#8217;t show results.</p></li><li><p><strong>F5:</strong> Only a few companies are ready to use AI safely.</p></li><li><p><strong>Stanford:</strong> Risks are rising faster than companies can manage them.</p></li></ul><div><hr></div><h2>What the Smart Companies Do</h2><p><strong>They plan before they build.</strong><br>They make clear goals, measure success, and ensure AI actually helps people do better work.</p><p><strong>They make security part of the plan.</strong><br>They protect their AI with strong digital walls and keep track of what it&#8217;s doing.</p><p><strong>They follow trusted rulebooks.</strong><br>They use standards like <strong>NIST&#8217;s AI Risk Framework</strong> or <strong>ISO 42001</strong>, which help companies use AI safely and fairly.</p><div><hr></div><h2>How to Fix the Problem</h2><p><strong>1. Start with a real goal.</strong><br>Every AI project should solve a clear problem, like saving time, cutting costs, or improving service.</p><p><strong>2. Build good data habits.</strong><br>Keep your data clean, accurate, and up to date. If AI learns from bad data, it gives bad answers.</p><p><strong>3. Protect your AI.</strong><br>Use special security tools (like AI firewalls) to block hackers and keep private information safe.</p><p><strong>4. Keep checking your AI.</strong><br>Watch what your AI is doing. If it starts giving wrong answers, fix it fast.</p><p><strong>5. Prove the value.</strong><br>If the AI doesn&#8217;t help, stop the project, learn from it, and try again in a smarter way.</p><div><hr></div><h3>Mini-Takeaway</h3><p>AI isn&#8217;t magic; it only works well when it&#8217;s built on <strong>good data, strong security, and clear goals. </strong>The companies that treat AI as a serious system &#8212; not just a fun experiment &#8212; will be the ones who truly win with it.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Level Up in Cybersecurity]]></title><description><![CDATA[Built for Hands-On Cybersecurity Professionals Who Want to Lead, Grow, and Dominate in their Careers.]]></description><link>https://www.thegrowthframework.com/p/level-up-in-cybersecurity</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/level-up-in-cybersecurity</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Mon, 03 Nov 2025 12:57:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b50a1965-7ccf-4861-a4bd-4c1947bd760e_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re here, you&#8217;re probably curious about <strong>The Growth Framework</strong> &#8212; and exploring new ways to advance your skills and career in hands-on cybersecurity.</p><p>Maybe you&#8217;re looking to sharpen your technical edge, gain more confidence in your role, or build a clear path toward your next career milestone. Perhaps you want to understand how AI is reshaping cybersecurity and how to stay ahead of it.</p><p>Whatever your goal, <strong>The Growth Framework</strong> is designed to help you make progress &#8212; with practical guidance, actionable insights, and proven strategies for technical professionals who want to grow.</p><p>You&#8217;re hands-on. You build, you defend, you test, you respond. You know that every improvement counts &#8212; and that growth in cybersecurity comes from learning, practising, and staying adaptable.</p><p>That&#8217;s why we created <strong>The Growth Framework</strong> &#8212; to help you turn curiosity into capability, and capability into career momentum.</p><div><hr></div><h3>Who We&#8217;re For</h3><p>This is for practical, hands-on cybersecurity professionals:</p><ul><li><p><strong>Offensive operators:</strong> Red Teamers, penetration testers, exploit developers</p></li><li><p><strong>Defensive operators:</strong> Blue Teamers, SOC analysts, threat hunters, incident responders</p></li><li><p><strong>Technical specialists:</strong> Security engineers, application security specialists, and automation experts</p></li></ul><p>If your work is <strong>technical, tactical, and grounded in practical operations</strong>, you belong here.</p><div><hr></div><h3>What You&#8217;ll Gain</h3><p>We&#8217;re here to help you <strong>lead, grow, and dominate</strong>:</p><p><strong>Lead Your Field</strong></p><ul><li><p>Become the go-to expert in your role</p></li><li><p>Command operations confidently</p></li><li><p>Mentor and influence peers</p></li></ul><p><strong>Grow Your Skills</strong></p><ul><li><p>Step-by-step Red Team and Blue Team playbooks</p></li><li><p>Realistic labs, simulations, and exercises</p></li><li><p>Master AI-driven cybersecurity tools and workflows</p></li></ul><p><strong>Dominate Your Career</strong></p><ul><li><p>Tactical frameworks for offensive and defensive operations</p></li><li><p>Automation, scripting, and next-level tools</p></li><li><p>Career guidance, certifications, and mentorship to accelerate your progress</p></li></ul><div><hr></div><h3>The Challenges We Solve</h3><p>We know the landscape is tough:</p><ul><li><p>Threats evolve faster than training materials</p></li><li><p>Hands-on practice is hard to find while working full-time</p></li><li><p>AI is changing how attacks and defences work</p></li><li><p>Career paths can feel unclear or stalled</p></li></ul><p>We&#8217;ve built <strong>The Growth Framework</strong> to remove these barriers, giving you clear, actionable strategies to advance your skills and career.</p><div><hr></div><h3>How We Support You</h3><ul><li><p><strong>Weekly newsletter:</strong> Insights, tactics, and career advice delivered to your inbox</p></li><li><p><strong>Knowledge hub:</strong> Practical guides, frameworks, and labs you can apply immediately</p></li><li><p><strong>Community:</strong> A space to learn, share, and grow with other hands-on professionals</p></li></ul><p>Whether you&#8217;re a beginner, intermediate, or advanced practitioner, <strong>The Growth Framework</strong> is your path to mastering cybersecurity and leading in your career.</p><div><hr></div><p>So, feel free to look around. Explore what we offer, see how we approach career growth, and get a sense of the type of content designed to help you progress.</p><p>When you&#8217;re ready, <strong>subscribe to our weekly newsletter</strong> &#8212; your inside track to insights, tactics, and strategies that keep you growing in your cybersecurity career.</p><p>Because that&#8217;s what we&#8217;re here for at <strong>The Growth Framework</strong>: to help you <strong>lead, grow, and dominate</strong> in cybersecurity &#8212; with the knowledge, skills, and frameworks to thrive, hands-on, every step of the way.</p><p><strong>Lead. Grow. Dominate. Advance with confidence.</strong></p><p>&#8212;<br><em>Glen Smale - The Growth Framework<br></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Island Raises $250M for Cyber Browser. Why It Matters and Who’s Affected]]></title><description><![CDATA[What CEOs and IT leaders need to know about Island&#8217;s new browser]]></description><link>https://www.thegrowthframework.com/p/island-raises-250m-for-cyber-browser</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/island-raises-250m-for-cyber-browser</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Thu, 25 Sep 2025 12:22:36 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fd02e686-8895-4a0d-993a-91726c6ed7e6_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Latest Insight</strong> &#8211; <a href="https://www.island.io/">Island</a> raised $250M in Series E funding for its next-generation cybersecure enterprise browser, a potential game-changer for IT leaders and Chief Information Security Officers (CISOs). Here&#8217;s what you need to know and who should pay attention.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yUFl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yUFl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 424w, https://substackcdn.com/image/fetch/$s_!yUFl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 848w, https://substackcdn.com/image/fetch/$s_!yUFl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 1272w, https://substackcdn.com/image/fetch/$s_!yUFl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yUFl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp" width="728" height="409.67300380228136" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:296,&quot;width&quot;:526,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:72190,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/174520783?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yUFl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 424w, https://substackcdn.com/image/fetch/$s_!yUFl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 848w, https://substackcdn.com/image/fetch/$s_!yUFl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 1272w, https://substackcdn.com/image/fetch/$s_!yUFl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27de416c-1b2c-471f-8afc-72280a7d49f2_526x296.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>What Happened</strong> &#8211; <a href="https://www.island.io/">Island</a> recently closed its $250M Series E at a $4.8B valuation, fuelling expansion to Fortune 500 clients. Analysts call it one of the most significant enterprise security launches in recent years.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe for more insights like this.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>What It&#8217;s About</strong> &#8211; <a href="https://www.island.io/">Island</a> is a Chromium-based enterprise browser that embeds security, visibility, and policy enforcement directly into cloud applications (often called SaaS, or Software as a Service). It protects data and monitors activity without needing multiple add-on tools.</p><p><strong>Who&#8217;s Behind It</strong> &#8211; Founded by <a href="https://www.linkedin.com/in/mikefey/">Mike Fey</a> (former Chief Operating Officer and Chief Technology Officer at Symantec and McAfee) and <a href="https://www.linkedin.com/in/danamiga/">Dan Amiga</a> (founder of Fireglass, acquired by Symantec for $250M), the company blends deep cybersecurity expertise with enterprise product experience.</p><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/webp&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/725bebbb-ece6-49c0-b1e1-822df8b2921c_166x296.webp&quot;},{&quot;type&quot;:&quot;image/webp&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cbe5f2bb-2761-4bd9-a0b6-dcd0c404f1c4_166x296.webp&quot;},{&quot;type&quot;:&quot;image/webp&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30f5d2ee-1f21-4332-a5ae-814ff993fd06_288x512.webp&quot;},{&quot;type&quot;:&quot;image/webp&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52ac8bf9-dfa0-44ae-a67d-637a0aab178b_166x296.webp&quot;}],&quot;caption&quot;:&quot;&quot;,&quot;alt&quot;:&quot;Island Browser&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/64c37385-b8bf-41d4-a963-ae0303565a5e_1456x1456.png&quot;}},&quot;isEditorNode&quot;:true}"></div><p></p><p><strong>Market &amp; Competition</strong> &#8211; <a href="https://www.island.io/">Island</a> challenges traditional Data Loss Prevention (DLP) providers like <a href="https://www.forcepoint.com/">Forcepoint</a> and <a href="https://www.trellix.com/en-gb/">Trellix</a> by baking security into the browser itself, something older tools cannot replicate. It also pressures cloud-native vendors such as <a href="https://www.zscaler.com/">Zscaler</a>, which deliver Secure Access Service Edge (SASE) solutions for enterprise networks.</p><p><strong>Funding &amp; Financials</strong> &#8211; The company has raised $730M total, including the $250M Series E led by Coatue, funding research and development, global expansion, and enterprise adoption, all at a $4.8B valuation.</p><p><strong>Valuation &amp; Financial Outlook</strong> &#8211; At $4.8B, <a href="https://www.island.io/">Island</a> is one of the most valuable enterprise security startups. Research firm Gartner predicts enterprise browsers will be part of 25% of web security decisions by 2025 (up from 5% in 2022), potentially pushing Island&#8217;s valuation to $6&#8211;7B within 2&#8211;3 years.</p><p><strong>Strategy &amp; Vision</strong> &#8211; The company&#8217;s strategy is to replace traditional security layers (like separate DLP or Cloud Access Security Broker (CASB) tools) with a browser-first approach. The goal is a unified, secure workspace that improves user experience while scaling across global SaaS platforms.</p><p><strong>Technology &amp; Platform</strong> &#8211; Built on Chromium (the same foundation as Google Chrome), <a href="https://www.island.io/">Island</a> integrates security directly into everyday browsing. It supports Single Sign-On (SSO) systems such as <a href="https://www.okta.com/en-gb/">Okta</a> and <a href="https://www.microsoft.com/en-us/security/business/microsoft-entra">Microsoft Entra ID</a> while providing real-time analytics and IT visibility.</p><p><strong>How to Use</strong> &#8211; <a href="https://www.island.io/">Island</a> is installed like Chrome or <a href="https://www.mozilla.org/firefox/">Firefox</a>, it&#8217;s a standalone browser, not an extension. Employees log in with corporate credentials to access SaaS apps securely, while IT teams can deploy it through software distribution tools, virtual desktops, or app stores. The experience feels familiar to users but adds enterprise-grade security controls.</p><p><strong>How This Technology Benefits Your Business</strong> &#8211; <a href="https://www.island.io/">Island</a> reduces the risk of data leaks, simplifies compliance, and consolidates multiple security tools into one browser. It helps IT leaders cut infrastructure costs, improve productivity, and ensure employees work securely without disruption.</p><p><strong>Who It Benefits</strong> &#8211; Sectors with heavy SaaS usage, such as financial services, healthcare, higher education, and large enterprises, gain the most. IT leaders, CISOs, SaaS administrators, and employees all benefit from stronger security and smoother workflows.</p><p><strong>Who It Affects</strong> &#8211; <a href="https://www.island.io/">Island</a> disrupts DLP providers like <a href="https://www.forcepoint.com/">Forcepoint</a> and <a href="https://www.trellix.com/en-gb/">Trellix</a>, cloud security vendors like <a href="https://www.zscaler.com/">Zscaler</a>, and even mainstream browsers such as Chrome and <a href="https://www.mozilla.org/firefox/">Firefox</a>, as enterprises may adopt Island as the default browser for secure SaaS management.</p><p><strong>Price Estimates</strong> &#8211; <a href="https://www.island.io/">Island</a> uses a subscription model with per-user licensing. Based on public contracts, pricing ranges from &#163;150&#8211;&#163;200 per user annually. For a 500-user company, this equates to $75K&#8211;$100K (&#163;60K&#8211;&#163;80K) per year, though enterprise contracts may include additional fees for integrations and support.</p><p><strong>User Benefits</strong> &#8211; By adopting <a href="https://www.island.io/">Island</a>, organisations can replace multiple point solutions like DLP, CASB, and endpoint monitoring with a single tool. This reduces costs, simplifies IT management, strengthens compliance, and provides full visibility into SaaS activity, without disrupting employee workflows.</p><p><strong>Challenges &amp; Risks</strong> &#8211; <a href="https://www.island.io/">Island</a> faces challenges convincing businesses to replace entrenched DLP tools, balancing strong security with user experience, and proving return on investment (ROI). Resistance to moving away from mainstream browsers and integration hurdles may also slow adoption.</p><p><strong>Recent Developments</strong> &#8211; In Q2 2025, <a href="https://www.island.io/">Island</a> launched AI Threat Shield, an artificial intelligence-powered detection system built into the browser. In Q3, it released the Island App Marketplace for partner integrations. In September, a $250&#8211;$300M employee tender offer pushed its valuation to $5B, signalling strong internal confidence.</p><p><strong>Key Takeaways</strong> &#8211; Enterprise browsers are reshaping how companies balance security and productivity. Backed by $730M in funding, <a href="https://www.island.io/">Island</a> is positioned to disrupt SaaS protection. CEOs, CIOs, and IT leaders should track its rise and the pressure it puts on both security vendors and traditional browsers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Support The Growth Framework by becoming a free or paid subscriber for more deep-dive insights.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[TensorFlow vs. PyTorch]]></title><description><![CDATA[A Developer&#8217;s Perspective in 2025]]></description><link>https://www.thegrowthframework.com/p/tensorflow-vs-pytorch</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/tensorflow-vs-pytorch</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Tue, 16 Sep 2025 11:34:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/88910150-e8d4-4b26-846a-93c5856350b0_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Introduction</h2><p>As a developer entrenched in the evolving landscape of machine learning (ML) and deep learning (DL), the choice between TensorFlow and PyTorch remains pivotal.</p><p>Both frameworks have carved niches in the AI ecosystem, with TensorFlow often recommended for "real projects," especially those targeting production environments.</p><p>However, insights from prominent figures like Andrej Karpathy, Yann LeCun, and Fran&#231;ois Chollet offer nuanced perspectives that merit consideration.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C4DO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C4DO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!C4DO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!C4DO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!C4DO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C4DO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png" width="1000" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:51044,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/173743599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C4DO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!C4DO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!C4DO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!C4DO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97d2405a-6e01-46ce-b6f3-51df6e38584a_1000x714.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><br>The Industry's Leaning Towards TensorFlow</h2><p>In professional settings, particularly within large-scale systems and production pipelines, TensorFlow's robustness and scalability make it a preferred choice. </p><p>Its comprehensive ecosystem, including tools like TensorFlow Serving, TensorFlow Lite, and TensorFlow.js, facilitates seamless deployment across various platforms.</p><p>Moreover, TensorFlow's support for distributed training and integration with Google's cloud infrastructure enhances its appeal for enterprise applications.</p><p></p><h2>The Research Community's Affinity for PyTorch</h2><p>Conversely, the research community exhibits a strong preference for PyTorch. Its dynamic computation graph and intuitive design align well with the iterative nature of research and experimentation.</p><p>Notably, <em>Yann LeCun</em>, a pioneer in AI and Meta's chief AI scientist, has expressed his preference for PyTorch, stating, "Why? PyTorch. That's why" <strong><a href="https://x.com/ylecun/status/1614186881171742720">X post</a></strong>.</p><p>Similarly, <em>Andrej Karpathy</em>, known for his work at Tesla, has highlighted PyTorch's flexibility and developer-friendly interface as key factors in its adoption for research purposes <strong><a href="https://itsabout.ai/the-decline-of-tensorflow-and-the-rise-of-pytorch-in-ai-workloads-a-documented-shift/">itsabout.ai</a></strong>.</p><p></p><h2>Reconciling the Divergence</h2><p>The apparent dichotomy between TensorFlow's dominance in production and PyTorch's prevalence in research underscores the distinct priorities of these domains.</p><p>While TensorFlow offers stability and scalability essential for production environments, PyTorch provides the flexibility and ease of experimentation crucial for research advancements.</p><p><em>Fran&#231;ois Chollet</em>, the creator of Keras and a Google AI researcher, has emphasised the importance of choosing the right tool for the task at hand.</p><p>In a discussion about the popularity of ML frameworks, he remarked, "Personally, I hate having to compare TF/Keras popularity and PyTorch popularity. I don't care what tools you use -- use what you like" <strong><a href="https://twitter.com/fchollet/status/1615023183442350081">X post</a>.</strong></p><p>This sentiment reflects a broader understanding that the choice between frameworks should align with project objectives and team expertise.</p><p></p><h2>Arguments For and Against</h2><h3>TensorFlow</h3><p><strong>Pros:</strong></p><ul><li><p><strong>Scalability:</strong> Efficient handling of large-scale data and complex models.</p></li><li><p><strong>Deployment Tools:</strong> Comprehensive support for deploying models across various platforms.</p></li><li><p><strong>Community Support:</strong> Backed by Google, ensuring continuous development and support.</p></li></ul><p><strong>Cons:</strong></p><ul><li><p><strong>Steeper Learning Curve:</strong> The static computation graph can be challenging for newcomers.</p></li><li><p><strong>Less Intuitive:</strong> The framework's design may require more boilerplate code compared to PyTorch.</p></li></ul><h3>PyTorch</h3><p><strong>Pros:</strong></p><ul><li><p><strong>Ease of Use:</strong> Dynamic computation graph and Pythonic interface facilitate quick prototyping.</p></li><li><p><strong>Research Adoption:</strong> Preferred by the academic community for its flexibility and ease of debugging.</p></li><li><p><strong>Integration:</strong> Seamless compatibility with research libraries and tools.</p></li></ul><p><strong>Cons:</strong></p><ul><li><p><strong>Deployment Challenges:</strong> Less mature deployment tools compared to TensorFlow.</p></li><li><p><strong>Scalability:</strong> While improving, it may not match TensorFlow's performance in large-scale systems.</p></li></ul><p></p><h2>To sum it up</h2><p>The choice between TensorFlow and PyTorch is not a matter of one being superior to the other, but rather which aligns best with the specific requirements of a project. For developers, understanding the strengths and limitations of each framework, as well as the insights from industry leaders, can guide informed decisions that enhance both development efficiency and project outcomes.</p>]]></content:encoded></item><item><title><![CDATA[Deep Fakes: The Silent Threat to Business Trust – And How to Counter It]]></title><description><![CDATA[Video, used to be the gold standard for truth, but no more.]]></description><link>https://www.thegrowthframework.com/p/deep-fakes-the-silent-threat-to-business</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/deep-fakes-the-silent-threat-to-business</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Thu, 21 Aug 2025 09:39:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/56148856-55b0-4c9b-b2c2-58d495012eda_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Current Landscape: Deep Fakes in 2025</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8jk6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8jk6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8jk6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8jk6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8jk6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8jk6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg" width="1278" height="716" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:1278,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:446338,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/171543044?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8jk6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8jk6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8jk6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8jk6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc0808c-d3fc-4708-a18e-6b233c2b636c_1278x716.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Picture this: a Ferrari executive receives WhatsApp messages from someone claiming to be CEO Benedetto Vigna, pushing a &#8220;major acquisition&#8221; with urgent requests to sign an NDA. The voice on the follow-up call nails Vigna&#8217;s southern Italian accent, but it&#8217;s a deep fake &#8211; a scam that nearly cost millions. As of August 2025, deep fake incidents like this have surged 1,740% in North America since 2022, with losses exceeding $200 million in Q1 alone. Companies like Ferrari and WPP are prime targets, with fake exec voices and videos tricking staff into transferring funds or leaking sensitive data. Human detection accuracy is a mere 62%, akin to spotting a forged signature in a stack of papers &#8211; most miss it, and the fallout can shatter trust.</p><ul><li><p><strong>Rising Sophistication</strong>: In the Ferrari case, scammers used AI, likely Generative Adversarial Networks (GANs), to clone Vigna&#8217;s voice from public speeches, paired with social engineering via WhatsApp. Tools like ElevenLabs now enable &#8220;Deepfake-as-a-Service&#8221; scams, costing firms an average $450K per hit.</p></li><li><p><strong>Detection Lag</strong>: AI detectors claim 90%+ accuracy but struggle as generative AI evolves faster &#8211; it&#8217;s like chasing a car that&#8217;s always one gear ahead. Ferrari&#8217;s executive caught the scam by asking about a book Vigna recommended (<em>Decalogue of Complexity</em>), a detail the AI couldn&#8217;t fake, highlighting the gap between detection and deception.</p></li><li><p><strong>Real-World Impact</strong>: From Ferrari&#8217;s near-miss to synthetic personas in job interviews, deep fakes disrupt operations. I&#8217;ve heard of execs, rattled by cases like Ferrari&#8217;s, now double-checking video calls with secure codes, slowing decision-making but protecting against fraud.</p></li></ul><h2>The Core Problem: Trust Under Siege</h2><p>Deep fakes, powered by Generative Adversarial Networks (GANs), turn video from a reliable source into a potential liability. For businesses, a single fake video &#8211; think a fabricated endorsement or a doctored boardroom clip &#8211; can tank stock prices, spark PR crises, or trigger legal battles. 92% of companies have faced deep fake attacks, leading to extortion, intellectual property theft, and reputational damage. For growth leaders, this disrupts customer acquisition; for execs, it&#8217;s a governance nightmare that can stall scaling.</p><ul><li><p><strong>Business Risks</strong>: Fake videos can manipulate markets, with share price drops of up to 15% reported; workplace fraud and harassment using deep fake &#8220;evidence&#8221; are rising; fraud losses hit $10M in some cases.</p></li><li><p><strong>Growth Opportunities</strong>: Ethical deep fakes could enhance marketing (e.g., personalised ads), but misuse risks outweigh benefits, eroding consumer trust and slowing innovation.</p></li></ul><h2>The Technology: How Deep Fakes Work and How to Spot Them</h2><p>Deep fakes rely on GANs &#8211; two AI models working in tandem, one creating fakes, the other refining them until they&#8217;re near-perfect. Creation is now accessible: A few minutes and a $10/month subscription can produce a hyperreal video or voice.</p><ul><li><p><strong>Detection Methods</strong>: Visual analysis flags pixel glitches or unnatural blinks; audio checks detect pitch anomalies; behavioural cues spot mismatched gestures. Machine Learning (ML) models like Convolutional Neural Networks (CNNs) analyse frames, but temporal inconsistencies remain a challenge.</p></li><li><p><strong>Advanced Tools</strong>: Multi-modal fusion (combining video, audio, and metadata) boosts detection; blockchain creates a tamper-proof hash at video creation, verifying authenticity like a digital certificate of origin.</p></li><li><p><strong>How It&#8217;s Done</strong>: Scammers clone voices with minimal data, layer on video, and deploy. Detection involves tools like Microsoft&#8217;s Video Authenticator, but it&#8217;s reactive &#8211; like mopping up after a flood.</p></li></ul><h2>Business Impacts: Scaling or Stumbling</h2><p>For founders, deep fakes threaten growth: Fake endorsements erode customer confidence, slowing acquisition rates. Execs face internal risks &#8211; impersonated leaders authorising fraudulent transfers, like the $150K CFO wire scam. On the positive side, mastering detection can position your brand as a trusted leader, unlocking partnerships and loyalty. But unchecked, deep fakes lead to regulatory fines, revenue losses, and stalled scaling &#8211; with a 95% rise in fake exec attacks hitting C-suites.</p><ul><li><p><strong>Growth Angle</strong>: Deep fakes could enable scalable, personalised marketing, but a single viral fake can slash user bases and derail campaigns.</p></li><li><p><strong>Operational Impact</strong>: As a leader, I&#8217;ve started using secure verification for video calls &#8211; it&#8217;s a hassle, but it beats explaining a &#8220;fake you&#8221; to stakeholders.</p></li></ul><h2>Strategies to Counter: Protect and Scale</h2><p>Treat deep fakes like cybersecurity: Invest proactively to avoid catastrophic costs. Here&#8217;s how to stay ahead:</p><ul><li><p><strong>Adopt Technology</strong>: Integrate multi-modal detectors and blockchain for content provenance. Tools like Reality Defender or Pindrop for voice verification can flag fakes in real time. Budget for these like you would cloud infrastructure.</p></li><li><p><strong>Strengthen Policies</strong>: Advocate for regulations like the EU&#8217;s AI Act; train teams on media literacy to verify sources (e.g., cross-check X posts with reputable outlets). Embed trust protocols in governance.</p></li><li><p><strong>Operational Tactics</strong>: Use biometric proof-of-personhood for internal comms; implement zero-knowledge crypto for secure verification. For growth, include &#8220;trust audits&#8221; in scaling plans &#8211; watermark digital assets, educate staff, and join initiatives like the Content Authenticity Initiative (CAI).</p></li><li><p><strong>Proactive Mindset</strong>: Build a culture of verification, like double-checking contracts before signing. It&#8217;s not paranoia; it&#8217;s survival.</p></li></ul><h2>Final Take</h2><p>Deep fakes are a silent threat, eroding the trust that fuels business growth. Like a virus, they exploit vulnerabilities in our reliance on video, impacting everything from customer acquisition to boardroom decisions. Blockchain and AI detection are strong tools, but they&#8217;re only part of the solution. By blending cutting-edge tech, robust policies, and a culture of vigilance, businesses can turn this challenge into an opportunity to lead with trust. For founders and execs, the message is clear: Invest in countermeasures now to safeguard your reputation and scale confidently. Stay proactive, verify relentlessly, and keep truth at the core of your growth strategy.</p>]]></content:encoded></item><item><title><![CDATA[Selling Shovels in the AI Boom]]></title><description><![CDATA[Lessons from History for Early Founders]]></description><link>https://www.thegrowthframework.com/p/selling-shovels-in-the-ai-boom</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/selling-shovels-in-the-ai-boom</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Thu, 14 Aug 2025 13:27:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4d9fa661-4c8b-43f2-8b0f-faf06a1851ee_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In 1848, a carpenter and sawmill worker named James W. Marshall was helping to build a sawmill for John Sutter, a Swiss-American pioneer, near Coloma, California, when he made a historic discovery. While working by the river, Marshall noticed what looked like flakes of gold in the water&#8212;a find that would spark one of the most feverish quests for wealth in history.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gG09!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gG09!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gG09!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gG09!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gG09!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gG09!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg" width="724" height="481.48366013071893" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:407,&quot;width&quot;:612,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:258566,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/170963408?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gG09!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gG09!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gG09!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gG09!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7843f6d-7c3b-4b64-b9b2-895044c992c8_612x407.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As news of the find slowly spread, miners from across the globe flocked to California, dreaming of instant riches. Within a year, California&#8217;s population exploded from around 14,000 to over 100,000. Ships were abandoned in San Francisco Bay as entire crews rushed inland. Everyone imagined themselves as the next millionaire. Yet few realised that turning raw gold into fortune required more than luck&#8212;it required tools, supplies, and infrastructure.</p><p>Enter Samuel Brannan. A Mormon elder and entrepreneur running a general store in San Francisco, Brannan was well-connected, shrewd, and always alert to opportunity. When he heard of Marshall&#8217;s discovery, he rushed ahead&#8212;not to dig for gold&#8212;but to stock up on shovels, picks, pans, and other mining essentials.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NW10!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NW10!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!NW10!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!NW10!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!NW10!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NW10!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png" width="1000" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:489224,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/170963408?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NW10!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!NW10!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!NW10!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!NW10!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6791432d-1286-470c-99b8-6d61ccdef896_1000x714.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Brannan then executed a masterstroke: he paraded a vial of gold through the streets of San Francisco, effectively announcing the discovery. Almost overnight, miners flooded in, desperate for the tools they needed. Brannan&#8217;s foresight ensured he was selling exactly what everyone required&#8212;the shovels, pans, and picks that made gold mining possible.</p><p>Meanwhile, Marshall struggled. He had made the discovery, but lacked the business acumen and timing to capitalise on it. Over time, his role became more a matter of historical record than personal fortune. Brannan, by contrast, quietly amassed a fortune, proving that the real opportunity often lies not in chasing gold but in enabling others to succeed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0Z_V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0Z_V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0Z_V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0Z_V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0Z_V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0Z_V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg" width="1000" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:812028,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/170963408?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0Z_V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0Z_V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0Z_V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0Z_V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cda0ed8-e8cc-48a3-a959-8ac726bc2ac6_1000x714.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What happened in the 19th century wasn&#8217;t just about gold&#8212;it was about an ecosystem forming almost overnight, with winners and losers determined not by who struck gold, but by who built the picks, shovels, and supply lines. Those who provided the tools thrived, long after the gold rush hype had faded.</p><p>Fast forward to today, and we are in the midst of a new kind of rush&#8212;the AI boom. The parallels are striking: companies race to build the next breakthrough AI model or app, yet the real &#8220;shovel&#8221; opportunities lie in providing the tools, services, and infrastructure that make AI usable, reliable, and safe.</p><h2>Here&#8217;s what&#8217;s fueling the frenzy today:</h2><ul><li><p>The global AI market is estimated at $391 billion in 2025, projected to soar to $1.81 trillion by 2030&#8212;a compound annual growth rate (CAGR) of nearly 36%. (<em><a href="https://ff.co/ai-statistics-trends-global-market/">Founders Forum Group</a></em>)</p></li><li><p>The AI infrastructure market alone is expected to grow from $57 billion in 2024 to over $74 billion in 2025&#8212;a booming 30% CAGR&#8212;and climb to $223 billion by 2029. (<em><a href="https://www.thebusinessresearchcompany.com/report/ai-infrastructure-global-market-report">The Business Research Company</a> <a href="https://www.sphericalinsights.com/our-insights/ai-infrastructure-market">Spherical Insights</a></em>)</p></li><li><p>Organisations are adopting AI at unprecedented speeds&#8212;78% of firms used AI in 2024, up from 55% just the year before. (<em><a href="https://hai.stanford.edu/ai-index/2025-ai-index-report">Stanford HAI</a>, <a href="https://learn.g2.com/ai-adoption-statistics">G2 Learn Hub</a></em>)</p></li><li><p>Executives plan to increase AI spending: 92% expect to spend more on AI in the next three years, and more than half expect to boost budgets by at least 10%. (<em><a href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/superagency-in-the-workplace-empowering-people-to-unlock-ais-full-potential-at-work">McKinsey &amp; Company</a></em>)</p></li><li><p>Morgan Stanley reports real-world returns from AI&#8212;insurance firms increased AI adoption from 48% to 71%, and adoption in retail and real estate is enabling powerful gains in efficiency and performance. (<em><a href="https://www.businessinsider.com/ai-hype-translating-real-returns-investors-financials-morgan-stanley-2025-7">Business Insider</a></em>)</p></li><li><p>Giants like Microsoft, Amazon, Meta, and Alphabet are investing massively&#8212;roughly $340 billion on AI data centres and development in 2025 alone, contributing significantly to GDP growth. (<a href="https://www.barrons.com/articles/ai-spending-economy-microsoft-amazon-meta-alphabet-3e2e5fda">Barron's</a>)</p></li></ul><h2>30 AI &#8220;Shovel&#8221; Opportunities for Early Founders</h2><p>Here are real-world niches where early founders can build essential AI tools and services. Each includes examples of companies already in the space to spark ideas.</p><ol><li><p><strong>Data Preparation &amp; Labelling</strong><br><strong>The Need:</strong> AI models require vast amounts of clean, well-labelled data to learn effectively. Many companies lack the internal resources to prepare and label this data efficiently.<br><strong>Opportunity:</strong> Labelling is tedious and specialised; new platforms could focus on niche domains (e.g., medical imaging) or efficiency improvements like semi-automated labelling pipelines.<br><strong>Example:</strong> <strong><a href="https://scale.com/">Scale AI</a></strong> provides tools and human-in-the-loop services to label images, text, video, or sensor data, often for autonomous vehicles and computer vision applications.</p></li><li><p><strong>AI Integration Tools</strong><br><strong>The Need:</strong> Organisations struggle to plug AI into existing workflows without specialised technical knowledge.<br><strong>Opportunity:</strong> Tools that simplify AI adoption or integrate with popular business software are in demand.<br><strong>Example:</strong> <strong><a href="https://www.levity.ai/">Levity</a></strong> offers no-code platforms that allow businesses to integrate AI into email triage, document processing, or customer workflows.</p></li><li><p><strong>Monitoring &amp; Testing AI</strong><br><strong>The Need:</strong> AI models can behave unpredictably or degrade over time. Organisations need ways to track, debug, and maintain model performance.<br><strong>Opportunity:</strong> Solutions that simplify AI observability, error detection, and alerting are highly sought after.<br><strong>Example:</strong> <strong><a href="https://whylabs.ai/">WhyLabs</a></strong> monitors AI models in real-time to detect data and prediction anomalies.</p></li><li><p><strong>Knowledge &amp; Search Tools</strong><br><strong>The Need:</strong> AI performs better with structured knowledge and relevant context, but companies struggle to organise and query their data effectively.<br><strong>Opportunity:</strong> AI-powered search solutions for corporate or private knowledge bases are increasingly valuable.<br><strong>Example:</strong> <strong><a href="https://kagi.com/">Kagi</a></strong> provides an AI-powered search for private or corporate knowledge.</p></li><li><p><strong>Privacy, Security &amp; Compliance</strong><br><strong>The Need:</strong> Organisations must maintain privacy, meet regulatory requirements, and secure sensitive data while using AI.<br><strong>Opportunity:</strong> Tools that simplify compliance and protect data in AI workflows are essential for businesses in regulated industries.<br><strong>Example:</strong> <strong><a href="https://bigid.com/">BigID</a></strong> helps manage data privacy, compliance, and governance for AI applications.</p></li><li><p><strong>Managed AI Services</strong><br><strong>The Need:</strong> Many organisations lack internal AI expertise or teams to build and deploy models.<br><strong>Opportunity:</strong> Outsourced AI training and deployment services can help companies adopt AI without hiring full-time specialists.<br><strong>Example:</strong> <strong><a href="https://spell.ml/">Spell</a></strong> provides managed AI training and deployment services.</p></li><li><p><strong>Specialised Marketplaces</strong><br><strong>The Need:</strong> Companies need easy access to datasets, pre-trained models, or AI APIs.<br><strong>Opportunity:</strong> Platforms that simplify the discovery, licensing, and sharing of AI assets can create significant value.<br><strong>Example:</strong> <strong><a href="https://huggingface.co/">Hugging Face AI Hub</a></strong> offers datasets, models, and APIs.</p></li><li><p><strong>Synthetic Data</strong><br><strong>The Need:</strong> Real-world datasets can be limited or sensitive, making AI training challenging.<br><strong>Opportunity:</strong> Generating synthetic, privacy-preserving data allows companies to train models safely and efficiently.<br><strong>Example:</strong> <strong><a href="https://mostly.ai/">Mostly AI</a></strong> generates realistic synthetic datasets for AI training.</p></li><li><p><strong>AutoML &amp; Model Building Tools</strong><br><strong>The Need:</strong> Many organisations cannot afford AI engineers; automating model building makes AI accessible.<br><strong>Opportunity:</strong> Platforms that simplify model creation, training, and deployment help non-experts leverage AI.<br><strong>Example:</strong> <strong><a href="https://www.datarobot.com/">DataRobot </a></strong>automates building and deploying AI models.</p></li><li><p><strong>Industry-Specific AI Solutions</strong><br><strong>The Need:</strong> Generic AI models often underperform in specialised domains like healthcare or finance.<br><strong>Opportunity:</strong> Customised AI solutions tailored to sector-specific problems are in demand.<br><strong>Example:</strong> <strong><a href="https://www.pathai.com/">PathAI</a></strong> provides AI for pathology and medical diagnostics.</p></li><li><p><strong>AI-Powered Document Automation</strong><br><strong>The Need:</strong> Organisations produce large volumes of documents that are difficult to manage manually.<br><strong>Opportunity:</strong> AI-driven document understanding, summarisation, and structuring can save time and reduce errors.<br><strong>Example:</strong> <strong><a href="https://docugami.com/">Docugami</a></strong> turns complex documents into structured data.</p></li><li><p><strong>Automated Transcription &amp; Translation</strong><br><strong>The Need:</strong> Audio and video content requires accurate transcription and translation for accessibility and analysis.<br><strong>Opportunity:</strong> AI tools that deliver fast, precise, multilingual support are in high demand.<br><strong>Example:</strong> <strong><a href="https://www.rev.com/">Rev</a></strong> and <strong><a href="https://www.deepl.com/">DeepL</a></strong> provide transcription and translation services.</p></li><li><p><strong>Robotic Process Automation (RPA)</strong><br><strong>The Need:</strong> Businesses perform repetitive, rule-based tasks that can be automated.<br><strong>Opportunity:</strong> Integrating AI with RPA enhances efficiency, accuracy, and scalability.<br><strong>Example:</strong> <strong><a href="https://www.uipath.com/">UiPath</a></strong> helps automate workflows using AI.</p></li><li><p><strong>AI Observability &amp; Debugging</strong><br><strong>The Need:</strong> Monitoring AI performance in production and understanding model decisions is crucial for trust and compliance.<br><strong>Opportunity:</strong> Tools that provide explainability and model health tracking are critical for enterprise adoption.<br><strong>Example:</strong> <strong><a href="https://www.fiddler.ai/">Fiddler AI</a></strong> offers explainability and monitoring for AI models.</p></li><li><p><strong>Annotation &amp; Labelling Platforms</strong><br><strong>The Need:</strong> Labelled data is required for supervised learning across multiple data types.<br><strong>Opportunity:</strong> Crowdsourced or specialised annotation platforms can serve high-volume or niche needs.<br><strong>Example:</strong> <strong><a href="https://appen.com/">Appen</a></strong> provides crowdsourced annotation and labelling services.</p></li><li><p><strong>AI-Powered Customer Service</strong><br><strong>The Need:</strong> Companies want to provide rapid, intelligent support without relying solely on human agents.<br><strong>Opportunity:</strong> AI chatbots and virtual assistants improve response times and learning from interactions.<br><strong>Example:</strong> <strong><a href="https://www.ada.cx/">Ada</a></strong> powers AI chatbots for customer support.</p></li><li><p><strong>Fraud Detection</strong><br><strong>The Need:</strong> Financial transactions and networks are vulnerable to fraud and cyber threats.<br><strong>Opportunity:</strong> AI systems that detect anomalies quickly are highly valuable in banking, insurance, and e-commerce.<br><strong>Example:</strong> <strong><a href="https://www.darktrace.com/">Darktrace</a></strong> uses AI to detect cyber threats and fraud.</p></li><li><p><strong>AI-Driven Market Research</strong><br><strong>The Need:</strong> Extracting insights from vast amounts of consumer or market data is challenging manually.<br><strong>Opportunity:</strong> AI can identify trends, sentiment, and opportunities faster than traditional methods.<br><strong>Example:</strong> <strong><a href="https://www.crimsonhexagon.com/">Crimson Hexagon</a></strong> provides AI-driven consumer insights.</p></li><li><p><strong>AI-Powered Recruitment</strong><br><strong>The Need:</strong> Screening and evaluating candidates efficiently is complex and time-consuming.<br><strong>Opportunity:</strong> AI can streamline candidate assessment, improve hiring decisions, and reduce bias.<br><strong>Example:</strong> <strong><a href="https://www.hirevue.com/">HireVue</a></strong> uses AI to evaluate candidate interviews.</p></li><li><p><strong>AI in Logistics</strong><br><strong>The Need:</strong> Supply chains are complex, with fluctuating demand, routes, and inventory needs.<br><strong>Opportunity:</strong> AI can optimise routing, inventory management, and delivery efficiency.<br><strong>Example:</strong> <strong><a href="https://www.llamasoft.com/">Llamasoft</a></strong> provides AI-driven supply chain optimisation.</p></li><li><p><strong>AI for Healthcare Operations</strong><br><strong>The Need:</strong> Hospitals and clinics face administrative bottlenecks and patient care inefficiencies.<br><strong>Opportunity:</strong> AI can predict patient needs, automate tasks, and improve operational efficiency.<br><strong>Example:</strong> <strong><a href="https://www.oliveai.com/">Olive</a></strong> automates healthcare administrative tasks.</p></li><li><p><strong>AI-Powered Personalisation</strong><br><strong>The Need:</strong> Consumers expect customised experiences across digital platforms.<br><strong>Opportunity:</strong> AI-driven personalisation increases engagement, conversion, and retention.<br><strong>Example:</strong> <strong><a href="https://www.dynamicyield.com/">Dynamic Yield</a></strong> provides AI personalisation for e-commerce.</p></li><li><p><strong>AI for Legal Workflows</strong><br><strong>The Need:</strong> Law firms and in-house teams handle vast amounts of documents and case data.<br><strong>Opportunity:</strong> AI can assist with research, contract analysis, and case prediction.<br><strong>Example:</strong> <strong><a href="https://casetext.com/">Casetext</a></strong> provides AI legal research tools.</p></li><li><p><strong>AI in Real Estate &amp; Property Management</strong><br><strong>The Need:</strong> Property valuation, occupancy management, and market analysis are complex and data-heavy.<br><strong>Opportunity:</strong> AI can provide predictive insights, streamline management, and optimise listings.<br><strong>Example:</strong> <strong><a href="https://www.reonomy.com/">Reonomy</a></strong> leverages AI for commercial real estate insights.</p></li><li><p><strong>AI for Energy &amp; Sustainability</strong><br><strong>The Need:</strong> Optimising energy use and predicting equipment failure is critical for efficiency and cost reduction.<br><strong>Opportunity:</strong> AI solutions can monitor consumption, improve maintenance schedules, and reduce waste.<br><strong>Example:</strong> <strong><a href="https://uplight.com/">Uplight </a></strong>provides AI-based energy management solutions.</p></li><li><p><strong>AI in Manufacturing</strong><br><strong>The Need:</strong> Manufacturing processes face inefficiencies, defects, and equipment downtime.<br><strong>Opportunity:</strong> Predictive maintenance, quality control, and process automation via AI reduce costs and improve output.<br><strong>Example:</strong> <strong><a href="https://www.seebo.com/">Seebo</a></strong> provides AI process optimisation for manufacturers.</p></li><li><p><strong>AI for Cybersecurity</strong><br><strong>The Need:</strong> Cyber threats evolve rapidly, often outpacing human detection.<br><strong>Opportunity:</strong> AI can detect, prevent, and respond to attacks faster and more accurately than manual processes.<br><strong>Example:</strong> <strong><a href="https://www.cylance.com/">Cylance</a></strong> uses AI to prevent cyber attacks.</p></li><li><p><strong>AI-Powered Education Tools</strong><br><strong>The Need:</strong> Education systems struggle to provide personalised learning at scale.<br><strong>Opportunity:</strong> Adaptive AI platforms can deliver customised learning experiences for students and professionals.<br><strong>Example:</strong> <strong><a href="https://www.squirrelai.com/">Squirrel AI</a></strong> provides AI-driven personalised learning.</p></li><li><p><strong>AI in Finance &amp; Accounting</strong><br><strong>The Need:</strong> Financial operations involve complex data analysis, auditing, and forecasting.<br><strong>Opportunity:</strong> AI can automate reconciliations, detect anomalies, and generate predictive insights.<br><strong>Example:</strong> <strong><a href="https://www.kensho.com/">Kensho</a></strong> provides AI analytics for finance.</p></li><li><p><strong>AI for Governance &amp; Compliance</strong><br><strong>The Need:</strong> Keeping up with regulatory changes is challenging, especially in financial and highly regulated industries.<br><strong>Opportunity:</strong> AI solutions can track compliance requirements, flag risks, and automate reporting.<br><strong>Example:</strong> <strong><a href="https://www.compliance.ai/">Compliance.ai</a></strong> helps financial firms stay compliant using AI.</p></li></ol><h2>Summary</h2><p>The AI landscape is moving fast, and the lesson from history is clear: the biggest opportunities often aren&#8217;t in striking gold yourself&#8212;they&#8217;re in giving others the tools to succeed. Early founders, builders, and operators don&#8217;t need to be the next OpenAI or Nvidia to make a meaningful impact. There are countless &#8220;shovel&#8221; opportunities&#8212;places where AI is critical, boring, or invisible, but indispensable&#8212;waiting to be discovered and built. By focusing on these foundational needs, you position yourself at the center of the AI boom, providing real value and generating sustainable growth.</p><div><hr></div><p>This is just one of many insights to come. If you found this helpful and want more, you can subscribe to my newsletter at <strong><a href="https://www.thegrowthframework.com/welcome">thegrowthframework.com</a></strong>.</p><div><hr></div><p>by</p><p><strong>Glen Smale</strong><br>Founder, Software Engineer, Techpreneur &amp; Curator of <strong>The Growth Framework</strong><br><em>A tech media platform uncovering frameworks for growth and success in the real world</em><br><strong><a href="https://www.thegrowthframework.com">www.thegrowthframework.com</a></strong></p><p></p>]]></content:encoded></item><item><title><![CDATA[What do Scott Adams, Charlie Munger, James Clear, and Alex Hormozi all agree on?]]></title><description><![CDATA[They all believe in one big idea!]]></description><link>https://www.thegrowthframework.com/p/what-do-scott-adams-charlie-munger</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/what-do-scott-adams-charlie-munger</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Fri, 25 Jul 2025 08:59:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f2a023d0-d4b3-47ce-97f4-b3ec81338441_1000x714.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-26i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-26i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!-26i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!-26i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!-26i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-26i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png" width="1000" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:287860,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://growthframework.substack.com/i/169204752?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-26i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!-26i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!-26i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!-26i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21260866-5b80-4bd4-a935-db9195e62ea1_1000x714.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>Stacking skills lead to success</h2><p>Each frames it slightly differently:</p><blockquote><p><strong>&#8220;Talent stacking means acquiring skills that work well together.&#8221;</strong><br>&#8212; <em>Scott Adams</em>, creator of <em>Dilbert</em></p></blockquote><blockquote><p><strong>&#8220;Spend each day trying to be a little wiser than you were when you woke up.&#8221;</strong><br>&#8212; <em>Charlie Munger</em></p></blockquote><blockquote><p><strong>&#8220;You do not rise to the level of your goals. You fall to the level of your systems.&#8221;</strong><br>&#8212; <em>James Clear</em>, <em>Atomic Habits</em></p><p></p></blockquote><p><strong>Alex Hormozi tends to explain it better:</strong> </p><blockquote><p>&#8220;<em>Skills stack; acquire rare and valuable ones</em>&#8221;</p></blockquote><p>In context, this is a powerful yet simple framework for becoming <strong>irreplaceable</strong>, <strong>highly valuable</strong>, and ultimately <strong>successful</strong> in both life and business.</p><p></p><h3>Here&#8217;s what it &#8212;really means:</h3><ul><li><p><strong>Skills compound.</strong> Like interest, when you combine skills, your value multiplies &#8212; not adds.</p></li><li><p><strong>Rare skills set you apart.</strong> Don&#8217;t just learn what everyone else knows. Learn what few people know &#8212; and even fewer can do well.</p></li><li><p><strong>Valuable skills get paid.</strong> The market rewards skills that solve painful, expensive problems.</p></li></ul><p>Instead of focusing on just becoming excellent at <strong>one thing</strong>, Hormozi suggests <strong>becoming very good at a few things that work well together</strong> &#8212; for example:<br>&#8594; Copywriting + Sales + Marketing + Business Strategy<br>&#8594; Or: Public Speaking + Leadership + Storytelling + Finance</p><p>When these are stacked together, they make you:</p><ul><li><p><strong>Harder to replace</strong></p></li><li><p><strong>Easier to trust</strong></p></li><li><p><strong>More in-demand</strong></p></li><li><p>And ultimately, <strong>more successful</strong></p></li></ul><h3>Why this matters:</h3><p>Because <strong>one skill is not enough</strong> in a world of high competition.<br>But a <strong>stack of the right skills</strong> makes you almost unstoppable.</p><p></p><p>Here&#8217;s to your skills, growth, and success.<strong><br>The Growth Framework.</strong><br>&#8212; Glen Smale</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe for </p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Focus Protocol: The Discipline That Separates Dabblers from Doers]]></title><description><![CDATA[Most people half-start everything and finish nothing. This is how I broke that pattern &#8212; by committing to one task at a time, seeing it through, and refusing to stop until it was done.]]></description><link>https://www.thegrowthframework.com/p/the-focus-protocol-the-discipline</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/the-focus-protocol-the-discipline</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Tue, 22 Jul 2025 16:20:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/310ffe4c-28a8-49d5-88ab-e6d99e479ca1_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h-S-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h-S-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h-S-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h-S-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h-S-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h-S-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg" width="1278" height="716" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:1278,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1253750,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://growthframework.substack.com/i/168963185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h-S-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h-S-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h-S-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h-S-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562d50e5-056f-4829-b0c3-38613f347626_1278x716.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Introduction: A Personal Confession</h2><p>Let me be direct.</p><p>I&#8217;ve lost more time than I care to admit, starting important work only to get distracted, pulled into something else, or convinced that I could &#8220;get back to it later.&#8221;</p><p>That moment rarely came. When it did, the context was gone. Momentum was gone. The result? Another half-finished task. Another day where I looked busy but built nothing meaningful.</p><p>Eventually, I learned the hard truth: productivity doesn&#8217;t come from dabbling across tasks&#8212;it comes from finishing.<br>And the way you finish is by locking in, starting, and not stopping until it&#8217;s done. </p><p>That&#8217;s <strong>The Focus Protocol</strong>.</p><p>This isn&#8217;t a trick, a time management technique, or a trendy habit. It&#8217;s a principle that separates those who <em>start things</em> from those who <em>ship results</em>.</p><div><hr></div><h2>Why You&#8217;re Always Busy But Rarely Effective</h2><p>We are surrounded by distractions. Notifications. Meetings. Email. Micro-decisions. Tabs. Messages. The modern work environment rewards responsiveness, not results.</p><p>You think you&#8217;re productive because you&#8217;re juggling multiple tasks and staying &#8220;involved.&#8221; But the science&#8212;and your frustration&#8212;says otherwise.</p><ul><li><p>Gloria Mark&#8217;s research shows most people switch tasks every 47 seconds during computer work.</p></li><li><p>Stanford research on multitasking found performance drops significantly when people attempt to handle more than one cognitive task at a time.</p></li></ul><p>Every time you switch context, even briefly, you pay a cognitive tax. And that tax compounds throughout the day.</p><div><hr></div><h2>What The Focus Protocol Is (And Isn&#8217;t)</h2><p>The Focus Protocol means the following:</p><ul><li><p>Identify the one task that truly matters.</p></li><li><p>Start it.</p></li><li><p>Do not stop until it is done.</p></li></ul><p>This means:</p><ul><li><p>No breaks.</p></li><li><p>No context switching.</p></li><li><p>No &#8220;checking something quickly.&#8221;</p></li><li><p>No tab surfing or inbox peeking.</p></li><li><p>No timeboxing it and moving on.</p></li><li><p>No excuses.</p></li></ul><p>You begin. You finish. That&#8217;s it.</p><p>This is not about working longer hours. It&#8217;s about finishing critical work in one sustained push&#8212;without bleeding time and energy into everything else.</p><div><hr></div><h2>Real-World Examples of Singular Focus</h2><h3>Cal Newport</h3><p>In <em>Deep Work</em>, Newport explains how distraction-free work at your cognitive limit is where your real output lives. He outlines how he writes academic papers, books, and code by eliminating all shallow work until the deep work is complete.</p><p>He doesn&#8217;t suggest time blocks. He finishes what he starts. That&#8217;s the key.</p><h3>J.K. Rowling</h3><p>Rowling completed the final <em>Harry Potter</em> novel by checking into a hotel and writing in isolation. No distractions. No partial work. Just complete immersion until the task was done.</p><h3>Warren Buffett</h3><p>Buffett is known for ruthless prioritisation. He suggests listing your top 25 goals, then focusing only on the top 5&#8212;and actively avoiding the rest until those are complete. He doesn&#8217;t recommend multitasking. He recommends deep commitment.</p><div><hr></div><h2>How To Apply The Focus Protocol</h2><p>This is not a technique. It is a commitment.</p><p>Follow these steps.</p><p><strong>1. Identify a single, meaningful task</strong><br>Pick one task that will move the needle. Not urgent tasks. Not shallow tasks. Pick the thing that matters most.</p><p><strong>2. Eliminate every possible source of interruption</strong><br>Turn off your phone. Close your browser. Silence notifications. Let people know you are unavailable. Shut the door. Disconnect.</p><p><strong>3. Begin. And don&#8217;t stop.</strong><br>Start the task. Do not stop. If you need to go to the bathroom, do it before you begin. You must remain fully engaged until the task is completed.</p><p><strong>4. Finish</strong><br>Completion is non-negotiable. Even if it&#8217;s uncomfortable. Even if it gets hard. You do not walk away until it is done.</p><p><strong>5. Review</strong><br>Once done, review what you completed. Log it. Note how long it took. Note how you feel. You&#8217;ve just done what most people can&#8217;t: finished meaningful work.</p><div><hr></div><h2>A Real Case Study: Shipping an MVP</h2><p>A developer I worked with had over a dozen half-built apps. He always said, &#8220;I&#8217;ll get back to it,&#8221; but he never did. We switched his approach.</p><p>He picked one project. We agreed on a single rule: start the day with that task and don&#8217;t touch anything else until it&#8217;s launched.</p><p>Six weeks later, he had an MVP, 25 beta users, and real market feedback. He didn&#8217;t change tools or learn anything new&#8212;he just applied <strong>unbroken focus</strong>.</p><div><hr></div><h2>How To Protect the Habit</h2><p>Here are a few ways to reinforce the Focus Protocol:</p><ul><li><p>Start each day with one key task. Don&#8217;t schedule anything else until it&#8217;s done.</p></li><li><p>Keep a focus log. Write down what you started and what you finished.</p></li><li><p>Avoid incomplete transitions. Never stop mid-way through something important unless it&#8217;s a true emergency.</p></li><li><p>Respect energy and recovery. If the task is big, rest after&#8212;not during.</p></li><li><p>Don&#8217;t stack big tasks. Complete one before moving to another.</p></li></ul><div><hr></div><h2>Final Thoughts: Why Finishers Win</h2><p>Dabblers touch everything but complete nothing.</p><p>Their hard drives are full of drafts, outlines, and &#8220;90% done&#8221; files. Their calendars are packed. Their outputs are invisible.</p><p>Finishers commit.</p><p>They pick a door. Open it. Walk through. And close it behind them.</p><p>The world rewards finishers. You don&#8217;t need more tools, more systems, or more hacks.</p><p>You need to commit fully.</p><p>So here&#8217;s the challenge:</p><p><strong>Pick one task. Start it. Don&#8217;t stop. Finish it.</strong><br>Then do it again tomorrow.</p><p>The Focus Protocol isn&#8217;t a productivity style.<br>It&#8217;s a discipline.</p><p>And it separates those who move the world from those who merely wander through it.</p><p>That&#8217;s where growth begins.</p><p>&#8211; Glen</p><p>#TheGrowthFramework</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Join a community of driven minds mastering the strategies, systems, and mindsets needed to 10x your impact.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[How Hyper Is Leveraging AI to Transform Emergency Services]]></title><description><![CDATA[An In-Depth Look for Founders and Innovators]]></description><link>https://www.thegrowthframework.com/p/how-hyper-is-leveraging-ai-to-transform</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/how-hyper-is-leveraging-ai-to-transform</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Tue, 22 Jul 2025 05:07:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6ba5826f-93ff-4524-9676-41528a586855_1000x714.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XniA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XniA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!XniA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!XniA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!XniA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XniA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png" width="1000" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:473861,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://growthframework.substack.com/i/168921494?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XniA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 424w, https://substackcdn.com/image/fetch/$s_!XniA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 848w, https://substackcdn.com/image/fetch/$s_!XniA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 1272w, https://substackcdn.com/image/fetch/$s_!XniA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90191049-6c9e-4b74-bc85-ee0daf0fdfc8_1000x714.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Artificial intelligence has been rapidly transforming industries ranging from finance to healthcare, yet public safety and emergency services have remained notably resistant to wholesale disruption. This is not for lack of need but rather due to the extremely high stakes, regulatory complexity, and cultural barriers inherent in these systems. </p><p>Amid these challenges, <strong>Hyper</strong>, a voice AI startup, is carving a path forward by applying sophisticated AI to emergency 911 call centres&#8212;delivering not just automation but <strong>intelligent augmentation</strong> that enhances operational efficiency and improves outcomes for communities.</p><div><hr></div><h3>Understanding the Emergency Dispatch Challenge</h3><p>The U.S. emergency dispatch system fields over 240 million calls annually, but estimates suggest that more than 50% of these calls are <strong>non-emergency</strong> in nature&#8212;noise complaints, non-urgent medical questions, requests for information, or even prank calls. Despite being low-risk, these calls consume disproportionate dispatcher time and resources, slowing response to genuine emergencies and contributing to staff burnout.</p><p>Traditional call centres are ill-equipped to filter this volume efficiently. Manual triage is slow and error-prone, and many legacy dispatch systems lack modern digital infrastructure to support innovative workflows. This creates a systemic bottleneck where human resources are overwhelmed with tasks that AI is well-positioned to handle&#8212;provided it can understand and act on nuanced verbal communications in real time.</p><div><hr></div><h3>How Hyper&#8217;s AI System Works: Real-Time, Context-Aware Voice Intelligence</h3><p>At its core, Hyper&#8217;s technology is a <strong>real-time voice AI platform</strong> designed specifically for 911 dispatch environments. Unlike general-purpose voice assistants (e.g., Siri, Alexa) or standard transcription services, Hyper trains its models on an <strong>extensive corpus of anonymised 911 call recordings</strong>. This unique dataset is a critical competitive advantage, as it enables the AI to understand emergency call dynamics&#8212;including emotional cues, urgency levels, local jargon, and call flow patterns.</p><p>The AI performs multiple simultaneous tasks:</p><ul><li><p><strong>Speech recognition:</strong> Converts spoken language into highly accurate, real-time text.</p></li><li><p><strong>Intent classification:</strong> Determines the nature of the call (e.g., non-emergency noise complaint vs. immediate threat).</p></li><li><p><strong>Sentiment and urgency analysis:</strong> Identifies stress, panic, confusion, or signs of critical danger.</p></li><li><p><strong>Task automation:</strong> For non-emergencies, it can generate police reports, provide information via text messages, and route calls to the correct non-emergency departments without human involvement.</p></li><li><p><strong>Escalation triggers:</strong> Automatically transfers complex or ambiguous calls to human dispatchers to ensure no critical situation is missed.</p></li></ul><p>This pipeline enables the AI to act as a <strong>trusted first responder assistant</strong>, handling routine calls end-to-end and freeing human dispatchers to focus on high-impact, time-sensitive emergencies.</p><div><hr></div><h3>Why Training Data and Domain Expertise Matter</h3><p>One of the biggest technical hurdles in voice AI is <strong>domain adaptation</strong>. Emergency calls differ drastically from consumer voice queries. They are unstructured, emotionally charged, and often noisy. Hyper&#8217;s access to real 911 audio allows them to fine-tune speech recognition models for these unique acoustic and linguistic patterns. Moreover, their engineers continuously update and improve models using ongoing anonymised call data, creating a virtuous cycle of learning.</p><p>This domain specialisation sets Hyper apart from generic AI providers who offer tools that might work well in customer service centres but lack the precision and context awareness required for public safety.</p><div><hr></div><h3>Integrating AI Into a Complex and Regulated Environment</h3><p>The technical innovation alone would be impressive, but insufficient if the system couldn&#8217;t be <strong>safely integrated</strong> into existing public safety infrastructure.</p><p>Hyper has navigated a difficult landscape:</p><ul><li><p><strong>Regulatory compliance:</strong> Emergency dispatch is governed by strict laws regarding privacy, data security, and liability. Hyper&#8217;s systems incorporate end-to-end encryption and strict data anonymisation protocols to meet federal and state requirements.</p></li><li><p><strong>Legacy systems interoperability:</strong> Many dispatch centres use outdated hardware and software. Hyper&#8217;s API-first architecture allows integration without massive overhauls, respecting the budget and operational constraints of public agencies.</p></li><li><p><strong>Human-centred design:</strong> Understanding that dispatchers must trust the system, hyper-designed interfaces that provide transparency into AI decisions and allow dispatchers to easily intervene, override, or audit AI actions.</p></li></ul><div><hr></div><h3>The Strategic Investors Behind Hyper&#8217;s AI Revolution in Emergency Services</h3><p>Hyper&#8217;s successful $6.3 million seed funding round was led by a group of seasoned venture capital firms with a track record of backing transformative technology companies. Each investor brings more than just capital&#8212;they bring domain expertise, strategic guidance, and access to networks critical for scaling within complex and regulated markets such as emergency services.</p><h4>Ripple Ventures</h4><p><strong>Ripple Ventures</strong> is a San Francisco-based venture capital firm known for its focus on early-stage technology companies that are disrupting traditional industries through software innovation. Ripple has invested in numerous startups specialising in AI, enterprise SaaS, and data analytics. Their support signals confidence in Hyper&#8217;s ability to harness advanced AI to streamline complex, mission-critical workflows.</p><p>Ripple Ventures&#8217; experience helping startups navigate the transition from product-market fit to scale will be invaluable as Hyper expands into new cities and integrates with diverse emergency dispatch infrastructures.</p><h4>GreatPoint Ventures</h4><p>Founded by industry veterans with deep operational experience, <strong>GreatPoint Ventures</strong> invests in early-stage companies in enterprise software, AI, and cybersecurity. GreatPoint&#8217;s portfolio emphasises companies solving real-world problems with robust technology platforms.</p><p>Their investment in Hyper indicates a belief in the company&#8217;s ability to deliver reliable, scalable AI solutions that meet the stringent demands of public safety environments. Moreover, GreatPoint&#8217;s operational expertise in navigating enterprise and government sales cycles will help Hyper build partnerships with municipalities and emergency response agencies.</p><h4>VSC Ventures</h4><p><strong>VSC Ventures</strong> is a lesser-known but highly specialised investor focused on AI, data-driven startups, and infrastructure technology. Their philosophy centres on backing companies that provide foundational technology with a broad societal impact.</p><p>VSC Ventures&#8217; involvement reinforces the long-term strategic potential of Hyper&#8217;s technology to become an integral part of critical public infrastructure. Their network of technical advisors and AI researchers can support Hyper&#8217;s ongoing model development and domain adaptation.</p><h4>Tusk Venture Partners</h4><p><strong>Tusk Venture Partners</strong> stands out as a venture capital firm with a unique emphasis on startups that engage with government, regulatory, and public sector markets. Founded by Bradley Tusk, who has experience as a political strategist and advisor to technology companies navigating government relations, Tusk Venture Partners is ideally suited to support companies operating at the intersection of tech and public policy.</p><p>Tusk&#8217;s backing is particularly meaningful for Hyper, which must work closely with municipalities and comply with regulatory frameworks that govern emergency services. Their expertise in public affairs and policy will assist Hyper in managing complex stakeholder ecosystems and accelerating adoption.</p><h4>K5 Global</h4><p><strong>K5 Global</strong> is a venture capital firm investing in early-stage technology companies with a focus on enterprise SaaS, AI, and security. Known for backing startups that blend innovative technology with strong commercial models, K5 Global supports companies poised for rapid growth in large addressable markets.</p><p>K5&#8217;s investment reflects confidence in Hyper&#8217;s business model and commercial potential within the public safety vertical. Their experience scaling SaaS businesses and building strategic partnerships will be critical as Hyper expands its footprint across the U.S. and potentially internationally.</p><div><hr></div><h3>Why This Group Matters</h3><p>Taken together, these investors represent a powerful blend of:</p><ul><li><p><strong>Technical and AI expertise</strong> to help refine Hyper&#8217;s product and accelerate innovation.</p></li><li><p><strong>Operational experience</strong> in navigating complex sales cycles in government and enterprise.</p></li><li><p><strong>Public policy insight</strong> is essential for gaining regulatory approvals and building trust in sensitive public systems.</p></li><li><p><strong>Capital resources</strong> to support growth, hiring, and market expansion.</p></li></ul><p>Their involvement signals that Hyper is not just another AI startup chasing general voice automation but a company with a <strong>mission-driven vision</strong>, capable technology, and a credible plan to transform emergency services on a national scale.</p><p>For founders and innovators, this lineup underscores the importance of aligning with investors who bring strategic value beyond money&#8212;partners who understand the technical challenges, regulatory environment, and market dynamics of your industry.</p><div><hr></div><h3>Looking Forward: The Future of AI in Emergency Response</h3><p>Hyper is among the first to prove that AI can be deployed responsibly and effectively within emergency services. But this is just the beginning. Future opportunities include:</p><ul><li><p><strong>Expanding multilingual support</strong> to serve increasingly diverse populations.</p></li><li><p><strong>Leveraging AI insights</strong> to predict demand surges and optimise dispatcher staffing.</p></li><li><p><strong>Integrating with smart city infrastructure</strong> for more proactive, data-driven emergency management.</p></li><li><p><strong>Building broader AI ecosystems</strong> that connect emergency medical, fire, and police services seamlessly.</p></li></ul><div><hr></div><h3>Final Thoughts</h3><p>For founders and innovators exploring AI&#8217;s potential beyond consumer tech and enterprise automation, Hyper&#8217;s approach is a compelling blueprint. By focusing on <strong>deep domain expertise</strong>, <strong>human-centric design</strong>, and <strong>robust integration</strong>, they have turned a challenging, critical public problem into an opportunity for AI to genuinely augment human capability and save lives.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Join a community of driven minds mastering the strategies, systems, and mindsets of high-impact leaders.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>