<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
    <channel>
        <title>VentureBeat</title>
        <link>https://venturebeat.com/feed/</link>
        <description>Transformative tech coverage that matters</description>
        <lastBuildDate>Mon, 18 May 2026 18:17:09 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <copyright>Copyright 2026, VentureBeat</copyright>
        <item>
            <title><![CDATA[Four AI supply-chain attacks in 50 days exposed the release pipeline red teams aren't covering]]></title>
            <link>https://venturebeat.com/security/supply-chain-incidents-openai-anthropic-meta-release-surface-vendor-questionnaire-matrix</link>
            <guid isPermaLink="false">2TogpsbblgCIIXNp1426LY</guid>
            <pubDate>Mon, 18 May 2026 17:16:58 GMT</pubDate>
            <description><![CDATA[<p>Four supply-chain incidents hit OpenAI, Anthropic and Meta in 50 days: three adversary-driven attacks and one self-inflicted packaging failure. None targeted the model, and all four exposed the same gap: release pipelines, dependency hooks, CI runners, and packaging gates that no <a href="https://openai.com/index/gpt-4o-system-card/">system card</a>, <a href="https://www.aisi.gov.uk/work/advanced-ai-evaluations-may-update">AISI evaluation</a>, or <a href="https://www.grayswan.ai/">Gray Swan red-team exercise</a> has ever scoped.</p><p>On May 11, 2026, a self-propagating worm called <a href="https://venturebeat.com/security/shai-hulud-worm-172-npm-pypi-packages-valid-provenance-ci-cd-audit">Mini Shai-Hulud</a> published 84 malicious package versions across 42 @tanstack/* npm packages in six minutes flat. The worm rode in on release.yml, chaining a pull_request_target misconfiguration, GitHub Actions cache poisoning, and OIDC token extraction from runner memory to hijack TanStack’s own trusted release pipeline. The packages carried <a href="https://snyk.io/blog/tanstack-npm-packages-compromised/">valid SLSA Build Level 3 provenance</a> because they were published from the correct repository, by the correct workflow, using a legitimately minted OIDC token. No maintainer password was phished. No 2FA prompt was intercepted.</p><p>The trust model worked exactly as designed and still produced 84 malicious artifacts.</p><p>Two days later, <a href="https://openai.com/index/our-response-to-the-tanstack-npm-supply-chain-attack/">OpenAI confirmed</a> that two employee devices were compromised and credential material was exfiltrated from internal code repositories. OpenAI is now revoking its macOS security certificates and forcing all desktop users to update by June 12, 2026. OpenAI noted that it had already been hardening its CI/CD pipeline after an earlier supply-chain incident, but the two affected devices had not yet received the updated configurations. That is the response profile of a build-pipeline breach, not a model-safety incident.</p><h2>Four incidents, one finding</h2><p><a href="https://www.penligent.ai/hackinglabs/ai-supply-chain-security-after-mercor/">Model red teams do not cover release pipelines</a>. The four incidents below are evidence for a single architectural finding that belongs in every AI vendor questionnaire.</p><p><b>OpenAI Codex command injection (disclosed March 30, 2026). </b>BeyondTrust Phantom Labs researcher Tyler Jespersen found that <a href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token">OpenAI Codex passed GitHub branch names directly into shell commands</a> with zero sanitization. An attacker could inject a semicolon and a backtick subshell into a branch name, and the Codex container would execute it, returning the victim’s GitHub OAuth token in cleartext. The flaw affected the ChatGPT website, Codex CLI, Codex SDK, and the IDE Extension. OpenAI classified it Critical Priority 1 and <a href="https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html">completed remediation by February 2026</a>. The Phantom Labs team used Unicode characters to make a malicious branch name visually identical to &quot;main&quot; in the Codex UI. One branch name. That is where the attack started.</p><p><b>LiteLLM supply-chain poisoning and Mercor breach (March 24–27, 2026). </b>The threat group <a href="https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/">TeamPCP used credentials stolen</a> in a prior compromise of Aqua Security’s Trivy vulnerability scanner to publish two poisoned versions of the <a href="https://docs.litellm.ai/blog/security-update-march-2026">LiteLLM</a> Python package to PyPI. LiteLLM is a widely adopted open-source LLM proxy gateway used across major AI infrastructure teams. The malicious versions were live for roughly 40 minutes and received nearly 47,000 downloads before PyPI quarantined them.</p><p>That was enough.</p><p>The attack cascaded downstream into <a href="https://www.theregister.com/2026/04/02/mercor_supply_chain_attack/">Mercor</a>, the $10 billion AI data startup that supplies training data to Meta, OpenAI, and Anthropic. Four terabytes exfiltrated, including proprietary training methodology references from Meta. <a href="https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk">Meta froze the partnership indefinitely</a>. A class action followed within five days. One compromised open-source dependency sitting 40 minutes on PyPI created a cross-industry blast radius that no single vendor’s model red team would have caught.</p><p><b>Anthropic Claude Code source map leak (March 31, 2026). </b>This incident was not adversary-driven. Anthropic shipped <a href="https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html">Claude Code version 2.1.88 to the npm registry</a> with a 59.8 MB source map file that should never have been included. The map file pointed to a zip archive on Anthropic’s own Cloudflare R2 bucket containing 513,000 lines of unobfuscated TypeScript across 1,906 files. Agent orchestration logic. 44 feature flags. System prompts. Multi-agent coordination architecture. All public. All downloadable. No authentication required. Security researcher <a href="https://www.infoq.com/news/2026/04/claude-code-source-leak/">Chaofan Shou flagged the exposure</a> within hours, and Anthropic pulled the package. Anthropic confirmed it was a “release packaging issue caused by human error.” This was <a href="https://www.zscaler.com/blogs/security-research/anthropic-claude-code-leak">the second such leak in 13 months</a>. The root cause was a missing line in .npmignore. No attacker was involved, but the release-surface gap is identical. No human review gate existed between the build artifact and the registry publish step.</p><p><b>TanStack worm and downstream propagation (May 11–14, 2026). </b>Wiz Research <a href="https://www.wiz.io/blog/mini-shai-hulud-strikes-again-tanstack-more-npm-packages-compromised">attributed the Mini Shai-Hulud attack to TeamPCP</a> with high confidence. <a href="https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-self-spreading-supply-chain-attack-hits-the-npm-ecosystem">StepSecurity detected the compromise</a> within 20 minutes. The worm spread beyond TanStack to Mistral AI, UiPath, and 160-plus packages within hours. Mini Shai-Hulud even impersonated the Anthropic Claude GitHub App identity by authoring commits under the fabricated identity “claude &lt;claude@users.noreply.github.com&gt;” to bypass code review.</p><p>Four incidents. Three frontier labs. One finding. The red-team scope stops at the model boundary, and the build pipeline sits on the other side of it.</p><h2>The timing no system card can explain</h2><p>On May 10, 2026, OpenAI <a href="https://openai.com/daybreak/">launched Daybreak</a>, a cybersecurity initiative built on GPT-5.5 and a new permissive model called <a href="https://thehackernews.com/2026/05/openai-launches-daybreak-for-ai-powered.html">GPT-5.5-Cyber</a> designed for authorized red teaming, penetration testing, and vulnerability discovery. Daybreak pairs Codex Security with partners, including Cisco, CrowdStrike, Akamai, Cloudflare, and Zscaler. OpenAI positioned the launch as proof that frontier AI can tilt the balance toward defenders.</p><p>The next day, the TanStack worm compromised two OpenAI employee devices.</p><p>OpenAI’s own <a href="https://openai.com/index/our-response-to-the-tanstack-npm-supply-chain-attack/">incident disclosure</a> acknowledged the gap directly. The company had already been hardening its CI/CD pipeline after the earlier Axios supply-chain attack, but the two affected devices “did not have the updated configurations that would have prevented the download.” The controls existed. The deployment was in progress. The worm arrived first.</p><p>The security community saw the same gap: Security researcher <a href="https://x.com/EnTr0pY_88/status/2055147742360391766">@EnTr0pY_88 noted</a> on X that the real signal was the certificate rotation, not the exfiltrated code. &quot;The cert rotation…is what you do when the blast radius reached signing trust, not just source access.&quot; <a href="https://x.com/OpenMatter_/status/2055191302828925286">@OpenMatter_</a> put the SLSA provenance failure in one sentence. &quot;If an attacker controls your CI runner, they control your attestations. Policy-based security is failing at scale.&quot; And <a href="https://x.com/The_Calda/status/2055185299873931725">@The_Calda</a> compressed the disclosure&#x27;s internal contradiction into seven words. &quot;&#x27;Limited impact&#x27; but the next sentence is &#x27;we&#x27;re rotating signing certs.&#x27;&quot;</p><div></div><p>A company that launched a cyber defense platform on Sunday and disclosed a build-pipeline breach on Tuesday is not failing at model safety. OpenAI is demonstrating the exact gap this audit grid exists to close. The model red team and the release-pipeline red team are two different disciplines; four incidents in 50 days suggest only one of them is being funded consistently.</p><h2>The VentureBeat Prescriptive Matrix</h2><p>The matrix below maps the seven release-surface classes missing from AI vendor questionnaires, with vendor hit, failure mechanism, detection gap, technical mitigation, and priority tier a security team can execute before Q2 renewals close.</p><p>For teams that need to map these rows into existing GRC tooling, rows 2, 3, and 5 align with NIST SSDF PS.1.1 (protect all forms of code from unauthorized access and tampering). Row 4 maps to SSDF PS.2.1 (provide mechanisms for verifying software release integrity). Row 6 maps partially to SLSA Source Track requirements for verified contributor identity, though no published framework directly addresses upstream dependency maintainer credential provenance. Row 7 is not yet addressed by any published framework, which is itself the finding.</p><table><tbody><tr><td><p><b>Release-surface class</b></p></td><td><p><b>Vendor hit</b></p></td><td><p><b>Failure mechanism</b></p></td><td><p><b>Detection gap</b></p></td><td><p><b>Technical mitigation</b></p></td><td><p><b>Priority</b></p></td></tr><tr><td><p><b>Model capability evals</b> (jailbreak, misuse, exfiltration)</p></td><td><p>All three (ongoing)</p></td><td><p>Covered. System cards, AISI Expert suite, Gray Swan scope this today.</p></td><td><p>None. This row is the baseline.</p></td><td><p>Continue requiring the system card at every renewal.</p></td><td><p>Baseline</p></td></tr><tr><td><p><b>CI runner trust boundary</b> (pull_request_target)</p></td><td><p>TanStack; OpenAI downstream (May 11–14, 2026)</p></td><td><p>TanStack pwn-request ran fork code in base-repo context. Poisoned pnpm cache. Extracted OIDC token from runner memory. Two OpenAI employee devices compromised.</p></td><td><p>No system card covers CI runner isolation. No AISI eval tests fork-to-base trust boundaries.</p></td><td><p>Audit every repo for pull_request_target + fork SHA checkout. Block fork code from base-repo context. Pin cache keys to commit SHA.</p></td><td><p>Do this week</p></td></tr><tr><td><p><b>OIDC trusted-publisher + SLSA provenance</b></p></td><td><p>TanStack; OpenAI downstream (May 11, 2026)</p></td><td><p>TanStack minted valid SLSA Build Level 3 provenance for all 84 malicious packages. First known npm worm with valid cryptographic attestation.</p></td><td><p>SLSA attestation confirms build origin, not build intent. No vendor questionnaire distinguishes the two.</p></td><td><p>Pin trusted publisher to branch + workflow, not just repository. Add behavioral analysis at install time.</p></td><td><p>Do this week</p></td></tr><tr><td><p><b>Release packaging review</b> (human gate before publish)</p></td><td><p>Anthropic (Mar 31, 2026)</p></td><td><p>Missing .npmignore shipped 59.8 MB source map in Claude Code npm package. 513K lines exposed including agent logic, 44 feature flags, system prompts. Second leak in 13 months. Self-inflicted, not adversary-driven.</p></td><td><p>No red-team exercise checks artifact contents before registry publish.</p></td><td><p>Human review between build artifact and registry publish. Enforce .npmignore in CI. Fail build on unexpected artifact size.</p></td><td><p>Before renewal</p></td></tr><tr><td><p><b>Dependency lifecycle hooks</b> (prepare, postinstall)</p></td><td><p>TanStack; OpenAI + downstream (May 11, 2026)</p></td><td><p>router_init.js executes on import. tanstack_runner.js self-propagates via optionalDependencies prepare hook. Spread to Mistral AI, UiPath, 160+ packages in hours.</p></td><td><p>Lifecycle hooks execute before any scanner runs. Model evals never test package install behavior.</p></td><td><p>Disable lifecycle scripts in CI by default. Explicit allowlist for production. Flag new optionalDependencies in PR review. Set minimumReleaseAge.</p></td><td><p>Do this week</p></td></tr><tr><td><p><b>Vendor maintainer credential hygiene</b></p></td><td><p>Meta via Mercor (Mar 24–27, 2026)</p></td><td><p>TeamPCP stole LiteLLM maintainer credential via prior Trivy compromise. Two poisoned PyPI versions live 40 min. Mercor cache held Meta training methodology references. 4 TB exfiltrated. Meta froze the partnership.</p></td><td><p>Vendor questionnaires ask about encryption and access control, not maintainer credential provenance for upstream dependencies.</p></td><td><p>Require hardware-key auth from every maintainer before onboarding. Add package-manager cooldown. Audit transitive dependency tree quarterly.</p></td><td><p>Add to vendor contract</p></td></tr><tr><td><p><b>Agent container input sanitization</b></p></td><td><p>OpenAI Codex (disclosed Mar 30, 2026)</p></td><td><p>BeyondTrust Phantom Labs injected shell commands through GitHub branch-name parameter. Stole OAuth tokens from Codex container. Scalable across shared repos. Rated Critical P1, patched Feb 2026.</p></td><td><p>Agent red teams test prompt injection, not input-parameter injection at the container level.</p></td><td><p>Sanitize all external input before shell execution. Audit OAuth token scope and lifetime per agent session. Enforce least-privilege on every container.</p></td><td><p>Do this week</p></td></tr></tbody></table><h2>Security director action plan</h2><p>The matrix tells your team what to fix. Three actions tell security directors how to move it forward.</p><ol><li><p><b>Add one question to every AI vendor questionnaire. </b>&quot;Does your organization red-team its release pipeline, including CI runner trust boundaries, OIDC token scoping, dependency lifecycle hooks, and registry publish gates? Provide the last assessment date and scope.&quot; No date and no scope document is the finding.</p></li><li><p><b>Run rows 2 through 7 against your own CI pipelines this week. </b><a href="https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-self-spreading-supply-chain-attack-hits-the-npm-ecosystem">StepSecurity</a> and <a href="https://snyk.io/blog/tanstack-npm-packages-compromised/">Snyk</a> both published detection and remediation steps for the TanStack worm patterns. Dev teams pull OpenAI SDKs, Anthropic packages, and Llama weights through npm, PyPI, and HuggingFace every week. The same patterns that got exploited are in your CI right now.</p></li><li><p><b>Brief the board on the provenance gap. </b>The TanStack worm proved that valid cryptographic provenance can sit on top of a malicious package. Attestation tells the board where a package was built. Behavioral analysis tells the board what it does after install. Q2 renewal requires both. Snyk&#x27;s analysis recommends pinning trusted publisher configurations to specific branches and workflows, not just repositories. That is the language the board presentation needs.</p></li></ol><h2>The worm already knows where your AI credentials live</h2><p>Mini Shai-Hulud does not stop at CI secrets. <a href="https://securitylabs.datadoghq.com/articles/shai-hulud-open-source-framework-static-analysis/">Datadog Security Labs documented</a> that the payload reads ~/.claude.json and exfiltrates it. It scans for 1Password and Bitwarden vaults, Kubernetes service accounts, cloud provider tokens, and shell history files where developers paste API keys. StepSecurity&#x27;s deobfuscation confirmed that Mini Shai-Hulud harvests Claude and Kiro MCP server configurations, which store API keys and auth tokens for external services. For developers using AI coding agents, the worm already knows where their credentials live.</p><p>OpenAI, Anthropic, and Meta will keep publishing system cards. They will keep funding red-team competitions. They will keep passing model evaluations. None of that stops the next worm from riding in on release.yml.</p><p>The TanStack postmortem team said it directly. Modern supply-chain defenses are important but not sufficient on their own. Teams must proactively identify and close workflow gaps rather than relying solely on the security features of their tools.</p>]]></description>
            <author>louiswcolumbus@gmail.com (Louis Columbus)</author>
            <category>Security</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/1PhXKP5YpstNpQ89sknvrW/0f83c1efa4e5200bad70dae1c9f3558f/hero.png?w=300&amp;q=30" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[LangSmith Engine closes the agent debugging loop automatically — but multi-model enterprises still need a neutral layer]]></title>
            <link>https://venturebeat.com/orchestration/langsmith-engine-closes-the-agent-debugging-loop-automatically-but-multi-model-enterprises-still-need-a-neutral-layer</link>
            <guid isPermaLink="false">74F4yApGA8lcMnw82ih7Q8</guid>
            <pubDate>Mon, 18 May 2026 16:23:19 GMT</pubDate>
            <description><![CDATA[<p>Enterprises building and deploying agents have a problem: it’s taking their engineers too long to find out that an agent made a mistake, and the loop has continued to perpetuate, especially without a human at every step. </p><p>LangSmith, the monitoring and evaluation platform from LangChain, launched a new capability in public beta that could make that issue more manageable. <a href="https://www.langchain.com/blog/introducing-langsmith-engine">LangSmith Engine</a> automates the entire chain by detecting production failures, diagnosing root causes against the live codebase, drafting a fix and preventing regression. It does this in a single automated pass. </p><p>LangSmith Engine gives AI engineers a faster path to triage, but it launches into a crowded field: Anthropic, OpenAI and Google are all pulling observability and evaluation <a href="https://venturebeat.com/orchestration/claude-codes-goals-separates-the-agent-that-works-from-the-one-that-decides-its-done">into their own platforms</a>.</p><h2>LangSmith Engine looks at failures</h2><p>LangChain said in a blog post that the typical agent development cycle starts by tracing the agent to understand what it’s doing, followed by identifying gaps, making changes to the prompts and tools, and creating ground-truth datasets. Developers then run experiments and check for regressions before shipping the agent. </p><p>The problem is that customers often run into issues when the trace review doesn’t surface faulty patterns, error repetition gets difficult to see, and there’s no targeted evaluator to catch the same problem when it repeats in production.</p><p>LangSmith Engine works by monitoring production traces for several signal types, “explicit errors, online evaluator failures, trace anomalies, negative user feedback and unusual behaviors like user asking questions the agent wasn’t built to answer,” according to the blog post.</p><p>Engine will then read the live codebase, find the culprit and draft a pull request before proposing a custom evaluator for that specific failure pattern. The human comes in at the approval step. </p><p>It’s built on top of LangSmith’s existing tracing and evaluation infrastructure and also works with an enterprise’s evaluator results. </p><p>Unlike observability tools such as Weights &amp; Biases, Arize Phoenix and Honeyhive, LangSmith Engine takes the entire chain automatically — detecting the failure, diagnosing root cause, drafting a fix — and brings the human in only at the approval step.</p><h2>Model providers bringing evaluators in platform</h2><p>While LangSmith identified this evaluation loop as a need for many enterprises, Engine comes at a time where the larger providers are beginning to offer observability tools within their platform. This means enterprises may choose to use an end-to-end platform rather than add LangSmith Engine onto their existing workflows. </p><p><a href="https://venturebeat.com/orchestration/anthropic-wants-to-own-your-agents-memory-evals-and-orchestration-and-that-should-make-enterprises-nervous">Anthropic&#x27;s Claude Managed Agents</a> brings together agentic deployment, evaluation and orchestration into a single suite. <a href="https://venturebeat.com/orchestration/openai-launches-centralized-agent-platform-as-enterprises-push-for-multi">OpenAI&#x27;s Frontier</a> offers a similar end-to-end platform for building, governing and evaluating enterprise agents — though both have faced questions from enterprises wary of committing to a single vendor.</p><p>However, practitioners point out that not everyone wants to bring evaluations and observability fully into one platform.</p><p>Leigh Coney, founder and principal consultant at Workwise Solutions, told VentureBeat that third-party observability is the default for many enterprises. </p><p>“One fund I work with runs Claude for analysis and GPT for a separate workflow. If observability lives inside each provider&#x27;s tooling, you now have two systems that can&#x27;t talk to each other. Your compliance team can&#x27;t produce a unified audit trail,” he said. “So third-party observability is surviving because multi-model is already the default in enterprise, and somebody has to sit across providers.”</p><p>Jessica Arredondo Murphy, CEO and co-founder of True Fit, said independent platforms like LangSmith have to prove to enterprises that they can &quot;answer the long-term question of whether they become the cross-model operating layer for quality and reliability.”</p><p>“Enterprises are not consolidating onto the first-party model provider tooling as quickly as the model providers would prefer. What I see is a pragmatic split: teams will use first-party tooling for fast onboarding and early-stage debugging, but as soon as they care about production reliability, governance, and long-term flexibility, they tend to introduce a more neutral layer for observability and evaluation,” she said. </p><p>LangSmith Engine is available now in public beta. Teams can connect a tracing project, optionally connect their repo, and Engine will begin surfacing issues from production traces automatically.<!-- -->
</p>]]></description>
            <category>Orchestration</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/JbvsjhXQ0uQ9LfTtxh5wZ/2dbacae3929a9933067cdb1cae3d70a7/crimedy7_illustration_of_a_supervisor_robot_evaluating_other__35a35697-0dc1-4a73-acea-a033e99f2fac_1.png?w=300&amp;q=30" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Architectural patterns for graph-enhanced RAG: Moving beyond vector search in production]]></title>
            <link>https://venturebeat.com/orchestration/architectural-patterns-for-graph-enhanced-rag-moving-beyond-vector-search-in-production</link>
            <guid isPermaLink="false">7DCBWp4cgzNh8eft5KpZ16</guid>
            <pubDate>Sun, 17 May 2026 18:00:23 GMT</pubDate>
            <description><![CDATA[<p>Retrieval-augmented generation (RAG) has become the de facto standard for grounding large language models (LLMs) in private data. The standard architecture — chunking documents, embedding them into a vector database, and retrieving top-k results via cosine similarity — is effective for unstructured semantic search.</p><p>However, for enterprise domains characterized by highly interconnected data (supply chain, financial compliance, fraud detection), vector-only RAG often fails. It captures <i>similarity</i> but misses <i>structure</i>. It struggles with multi-hop reasoning questions like, &quot;How will the delay in Component X impact our Q3 deliverable for Client Y?&quot; because the vector store doesn&#x27;t &quot;know&quot; that Component X is part of Client Y&#x27;s deliverable.</p><p>This article explores the graph-enhanced RAG pattern. Drawing on my experience building high-throughput logging systems at Meta and private data infrastructure at Cognee, we will walk through a reference architecture that combines the semantic flexibility of vector search with the structural determinism of graph databases.</p><h2><b>The problem: When vector search loses context</b></h2><p>Vector databases excel at capturing meaning but discard topology. When a document is chunked and embedded, explicit relationships (hierarchy, dependency, ownership) are often flattened or lost entirely.</p><p>Consider a supply chain risk scenario. While this is a hypothetical example, it represents the exact class of structural problems we see constantly in enterprise data architectures:</p><ul><li><p><b>Structured data:</b> A SQL database defining that Supplier A provides Component X to Factory Y.</p></li><li><p><b>Unstructured data:</b> A news report stating, <i>&quot;Flooding in Thailand has halted production at Supplier A&#x27;s facility.&quot;</i></p></li></ul><p>A standard vector search for &quot;production risks&quot; will retrieve the news report. However, it likely lacks the context to link that report to Factory Y&#x27;s output. The LLM receives the news but cannot answer the critical business question: &quot;Which downstream factories are at risk?&quot;</p><p>In production, this manifests as hallucination. The LLM attempts to bridge the gap between the news report and the factory but lacks the explicit link, leading it to either guess relationships or return an &quot;I don&#x27;t know&quot; response despite the data being present in the system.</p><h2><b>The pattern: Hybrid retrieval</b></h2><p>To solve this, we move from a &quot;Flat RAG&quot; to a &quot;Graph RAG&quot; architecture. This involves a three-layer stack:</p><ol><li><p><b>Ingestion (The &quot;Meta&quot; Lesson):</b> At Meta, working on the Shops logging infrastructure, we learned that structure must be enforced at ingestion. You cannot guarantee reliable analytics if you try to reconstruct structure from messy logs later. Similarly, in RAG, we must extract entities (nodes) and relationships (edges) during ingestion. We can use an LLM or named entity recognition (NER) model to extract entities from text chunks and link them to existing records in the graph.</p></li><li><p><b>Storage:</b> We use a graph database (like Neo4j) to store the structural graph. Vector embeddings are stored as properties on specific nodes (e.g., a RiskEvent node).</p></li><li><p><b>Retrieval:</b> We execute a hybrid query:</p><ul><li><p><b>Vector scan:</b> Find entry points in the graph based on semantic similarity.</p></li><li><p><b>Graph traversal:</b> Traverse relationships from those entry points to gather context.</p></li></ul></li></ol><h2><b>Reference implementation</b></h2><p>Let&#x27;s build a simplified implementation of this supply chain risk analyzer using Python, Neo4j, and OpenAI.</p><h3><b>1. Modeling the graph</b></h3><p>We need a schema that connects our unstructured &quot;risk events&quot; to our structured &quot;supply chain&quot; entities.</p><h3><b>2. Ingestion: Linking structure and semantics</b></h3><p>In this step, we assume the structural graph (suppliers -&gt; factories) already exists. We ingest a new unstructured &quot;risk event&quot; and link it to the graph.</p><h3><b>3. The hybrid retrieval query</b></h3><p>This is the core differentiator. Instead of just returning the top-k chunks, we use Cypher to perform a vector search to find the event, and then traverse to find the downstream impact.</p><p>The output: Instead of a generic text chunk, the LLM receives a structured payload:</p><p>[{&#x27;issue&#x27;: &#x27;Severe flooding...&#x27;, &#x27;impacted_supplier&#x27;: &#x27;TechChip Inc&#x27;, &#x27;risk_to_factory&#x27;: &#x27;Assembly Plant Alpha&#x27;}]</p><p>This allows the LLM to generate a precise answer: <i>&quot;The flooding at TechChip Inc puts Assembly Plant Alpha at risk.&quot;</i></p><h2><b>Production lessons: Latency and consistency</b></h2><p>Moving this architecture from a notebook to production requires handling trade-offs.</p><h3><b>1. The latency tax</b></h3><p>Graph traversals are more expensive than simple vector lookups. In my work on product image experimentation at Meta, we dealt with strict latency budgets where every millisecond impacted user experience. While the domain was different, the architectural lesson applies directly to Graph RAG: You cannot afford to compute everything on the fly.</p><ul><li><p><b>Vector-only RAG:</b> ~50-100ms retrieval time.</p></li><li><p><b>Graph-enhanced RAG:</b> ~200-500ms retrieval time (depending on hop depth).</p></li></ul><p><b>Mitigation:</b> We use semantic caching. If a user asks a question similar (cosine similarity &gt; 0.85) to a previous query, we serve the cached graph result. This reduces the &quot;graph tax&quot; for common queries.</p><h3><b>2. The &quot;stale edge&quot; problem</b></h3><p>In vector databases, data is independent. In a graph, data is dependent. If Supplier A stops supplying Factory Y, but the edge remains in the graph, the RAG system will confidently hallucinate a relationship that no longer exists.</p><p><b>Mitigation:</b> Graph relationships must have Time-To-Live (TTL) or be synced via Change Data Capture (CDC) pipelines from the source of truth (the ERP system).</p><h2><b>Infrastructure decision framework</b></h2><p>Should you adopt Graph RAG? Here is the framework we use at Cognee:</p><ol><li><p><b>Use vector-only RAG if:</b></p><ul><li><p>The corpus is flat (e.g., a chaotic Wiki or Slack dump).</p></li><li><p>Questions are broad (&quot;How do I reset my VPN?&quot;).</p></li><li><p>Latency &lt; 200ms is a hard requirement.</p></li></ul></li><li><p><b>Use graph-enhanced RAG if:</b></p><ul><li><p>The domain is regulated (finance, healthcare).</p></li><li><p>&quot;Explainability&quot; is required (you need to show the traversal path).</p></li><li><p>The answer depends on multi-hop relationships (&quot;Which indirect subsidiaries are affected?&quot;).</p></li></ul></li></ol><h2><b>Conclusion</b></h2><p>Graph-enhanced RAG is not a replacement for vector search, but a necessary evolution for complex domains. By treating your infrastructure as a knowledge graph, you provide the LLM with the one thing it cannot hallucinate: The structural truth of your business.</p><p><i>Daulet Amirkhanov is a software engineer at UseBead.</i></p>]]></description>
            <category>Orchestration</category>
            <category>DataDecisionMakers</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/4pNNCAwgjcNOld8FlE4iQa/173a95b2d2fa4050052358cb4e742203/Boxes.png?w=300&amp;q=30" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[The enterprise risk nobody is modeling: AI is replacing the very experts it needs to learn from]]></title>
            <link>https://venturebeat.com/technology/the-enterprise-risk-nobody-is-modeling-ai-is-replacing-the-very-experts-it-needs-to-learn-from</link>
            <guid isPermaLink="false">1Ag11ovK9DCceXmuEKpxm7</guid>
            <pubDate>Sat, 16 May 2026 21:05:53 GMT</pubDate>
            <description><![CDATA[<p>For <a href="https://venturebeat.com/infrastructure/intent-based-chaos-testing-is-designed-for-when-ai-behaves-confidently-and-wrongly?_gl=1*11n0mtp*_up*MQ..*_ga*NTg2MjM1NTE0LjE3Nzg5NjQ5NzA.*_ga_SCH1J7LNKY*czE3Nzg5NjQ5NjkkbzEkZzAkdDE3Nzg5NjQ5NjkkajYwJGwwJGgw*_ga_B8TDS1LEXQ*czE3Nzg5NjQ5NjkkbzEkZzAkdDE3Nzg5NjQ5NjkkajYwJGwwJGgw">AI systems</a> to keep improving in knowledge work, they need either a reliable mechanism for autonomous self-improvement or human evaluators capable of catching errors and generating high-quality feedback. The industry has invested enormously in the first. It&#x27;s giving almost no thought to what&#x27;s happening to the second.</p><p>I’d argue that we need to treat the human evaluation problem with just as much rigor and investment as we put into building the model capabilities themselves. New grad hiring at major tech companies has <a href="https://fortune.com/2025/08/15/ai-gutting-next-generation-of-talent/"><u>dropped by half since 2019</u></a>. Document review, first-pass research, data cleaning, code review: Models handle these now. The economists tracking this call it displacement. The companies doing it call it efficiency. Neither are focusing on the future problem.</p><h2><b>Why self-improvement has limits in knowledge work</b></h2><p>The obvious pushback is reinforcement learning (RL). AlphaZero learned Go, chess, and Shogi at superhuman levels without human data and generated novel strategies in the process. Move 37 in the 2016 match against Lee Sedol, a move professionals said they would never have played, didn&#x27;t come from human annotation. It emerged from AI self-play. </p><p>What enables this is the stability of the environment. Move 37 is a novel move within the fixed state space of Go. The rules are complete, unambiguous, and permanent. More importantly, the reward signal is perfect: Win or lose, and immediate, with no room for interpretation. The system always knows whether a move was good because the game eventually ends with a clear result.</p><p>Knowledge work doesn&#x27;t have either of those properties. The rules in any professional domain are dynamic and continuously rewritten by the humans operating in them. New laws get passed. New financial instruments are invented. A legal strategy that worked in 2022 may fail in a jurisdiction that has since changed its interpretation. Whether a medical diagnosis was right may not be known for years. Without a stable environment and an unambiguous reward signal, you cannot close the loop. You need humans in the evaluation chain to continue teaching the model.</p><h2><b>The formation problem</b></h2><p>The AI systems being built today were trained on the expertise of people who went through exactly that formation. The difference now is that entry-level jobs that develop such expertise were automated first. Which means the next generation of potential experts is not accumulating the <a href="https://medium.com/@ahmad.al.dahle/the-future-of-software-engineering-isnt-what-you-think-96abb293d70a"><u>kind of judgment</u></a> that makes a human evaluator worth having in the loop.</p><p>History has examples of knowledge dying. Roman concrete. Gothic construction techniques. Mathematical traditions that took centuries to recover. But in every historical case, the cause was external: Plague, conquest, the collapse of the institutions that hosted the knowledge. What&#x27;s different here is that no external force is required. Fields could atrophy not from catastrophe but from a thousand individually rational economic decisions, each one sensible in isolation. That&#x27;s a new mechanism, and we don&#x27;t have much practice recognizing it while it&#x27;s happening.</p><h2><b>When entire fields go quiet</b></h2><p>At its logical limit, this isn’t just a pipeline problem. It’s a <a href="https://venturebeat.com/security/ai-tool-poisoning-exposes-a-major-flaw-in-enterprise-agent-security?_gl=1*11n0mtp*_up*MQ..*_ga*NTg2MjM1NTE0LjE3Nzg5NjQ5NzA.*_ga_SCH1J7LNKY*czE3Nzg5NjQ5NjkkbzEkZzAkdDE3Nzg5NjQ5NjkkajYwJGwwJGgw*_ga_B8TDS1LEXQ*czE3Nzg5NjQ5NjkkbzEkZzAkdDE3Nzg5NjQ5NjkkajYwJGwwJGgw">demand collapse</a> for the expertise itself.</p><p>Consider advanced mathematics. It doesn’t atrophy because we stop training mathematicians. It atrophies because organizations stop needing mathematicians for their day-to-day work, the economic incentive to become one disappears, the population of people who can do frontier mathematical reasoning shrinks, and the field’s capacity to generate novel insight quietly collapses. The same logic applies to coding. Our question is not “will AI write code” but “if AI writes all production code, who develops the deep architectural intuition that produces genuinely novel systems design?” </p><p>There is a critical difference between a field being automated and a field being understood. We can automate a huge amount of structural engineering today, but the abstract knowledge of why certain approaches work lives in the heads of people who spent years doing it wrong first. If you eliminate the practice, you don’t just lose the practitioners. You lose the capacity to know what you’ve lost.</p><p>Advanced mathematics, theoretical computer science, deep legal reasoning, complex systems architecture: When the last person who deeply understands a subfield of algebra retires and no one replaces them because the funding dried up and the career path disappeared, that knowledge isn’t likely to be rediscovered any time soon. </p><p>It’s gone. And nobody notices because the models trained on their work still perform well on benchmarks for another decade. I think of this as a hollowing out: The surface capability remains (models can still produce outputs that look expert) while the underlying human capacity to validate, extend, or correct that expertise quietly disappears.</p><h2><b>Why rubrics don&#x27;t fully substitute</b></h2><p>The current approach is rubric-based evaluation. Constitutional AI, reinforcement learning from AI feedback (RLAIF), and structured criteria that let models score models are serious techniques that meaningfully reduce dependence on human evaluators. I&#x27;m not dismissing them.</p><p>Their <a href="https://venturebeat.com/infrastructure/intent-based-chaos-testing-is-designed-for-when-ai-behaves-confidently-and-wrongly?_gl=1*138a6ow*_up*MQ..*_ga*NTg2MjM1NTE0LjE3Nzg5NjQ5NzA.*_ga_SCH1J7LNKY*czE3Nzg5NjQ5NjkkbzEkZzAkdDE3Nzg5NjQ5NjkkajYwJGwwJGgw*_ga_B8TDS1LEXQ*czE3Nzg5NjQ5NjkkbzEkZzAkdDE3Nzg5NjQ5NjkkajYwJGwwJGgw">limitation</a> is this: A rubric can only capture what the person who wrote it knew to measure. Optimize hard against it and you get a model that&#x27;s very good at satisfying the rubric. That&#x27;s not the same thing as a model that&#x27;s actually right.</p><p>Rubrics scale the explicit, articulable part of judgment. The deeper part, the instinct, the felt sense that something is off, doesn&#x27;t fit in a rubric. You can&#x27;t write it down because you need to experience it first before you know what to write.</p><h2><b>What this means in practice</b></h2><p>This isn’t an argument for slowing development. The capability gains are real. And it’s possible that researchers will find ways to close the evaluation loop without human judgment. Maybe synthetic data pipelines get good enough. Maybe models develop reliable self-correction mechanisms we can’t yet imagine.</p><p>But we don’t have those today. And in the meantime, we’re dismantling the human infrastructure that currently fills the gap, not as a deliberate decision but as a byproduct of a thousand rational ones. The responsible version of this transition isn’t to assume the problem will solve itself. It’s to treat the evaluation gap as an open research problem with the same urgency we bring to capability gains.</p><p>The thing AI most needs from humans is the thing we’re least focused on preserving. Whether that’s permanently true or temporarily true, the cost of ignoring it is the same.</p><p><i>Ahmad Al-Dahle is CTO of Airbnb. </i></p>]]></description>
            <category>Technology</category>
            <category>DataDecisionMakers</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/3iCqyxRTfwQ8eGj1QIr9vm/a1cb0a9309957e782665907e20bde9ca/Humans_AI.png?w=300&amp;q=30" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Intercom, now called Fin, launches an AI agent whose only job is managing another AI agent]]></title>
            <link>https://venturebeat.com/technology/intercom-now-called-fin-launches-an-ai-agent-whose-only-job-is-managing-another-ai-agent</link>
            <guid isPermaLink="false">6xYr5OkuqdkF8BAVNFwKrZ</guid>
            <pubDate>Fri, 15 May 2026 21:06:09 GMT</pubDate>
            <description><![CDATA[<p>The company formerly known as <a href="https://www.intercom.com/">Intercom</a> just did something that no major customer service platform has attempted at scale: it built an AI agent whose sole job is to manage another AI agent.</p><p><a href="https://fin.ai/operator">Fin Operator</a>, announced Thursday at a live event in San Francisco, is a new AI-powered system designed specifically for the back-office teams that configure, monitor, and improve <a href="https://fin.ai/">Fin</a>, the company&#x27;s customer-facing AI agent. Rather than replacing human support agents — which is what Fin itself does on the front lines — Operator targets the growing army of support operations professionals who spend their days updating knowledge bases, debugging conversation failures, and combing through performance dashboards.</p><p>&quot;Fin is an agent for your customers,&quot; Brian Donohue, the company&#x27;s VP of Product, told VentureBeat in an exclusive interview ahead of the launch. &quot;Operator is an agent for your support ops team. This is an agent for the back office team who manages Fin and then manages their human agents.&quot;</p><p>The announcement arrives at a pivotal moment for the company. Just two days ago, CEO Eoghan McCabe formally <a href="https://www.linkedin.com/pulse/today-intercom-becomes-fin-eoghan-mccabe-7ov5c/">renamed the 15-year-old company from Intercom to Fin</a> — an aggressive signal that the AI agent is now the business, not merely a feature of it. Fin recently crossed $100 million in annual recurring revenue and is growing at 3.5x. The broader company generates<a href="https://fin.ai/about"> $400 million in ARR</a>, meaning the AI agent now accounts for roughly a quarter of total revenue and virtually all of its growth.</p><p><a href="https://fin.ai/operator">Fin Operator</a> enters early access for Pro-tier users starting today, with general availability planned for summer 2026.</p><h2>The invisible crisis behind every AI customer service deployment</h2><p>As companies push their AI agents to handle more conversations — Fin alone now resolves more than two million customer issues each week across 8,000 customers globally, including <a href="https://www.anthropic.com/">Anthropic</a>, <a href="https://doordash.com/">DoorDash</a>, and <a href="https://mercury.com/">Mercury</a> — the operational complexity behind those systems has exploded. Someone has to keep the knowledge base current. Someone has to figure out why the bot entered an infinite loop with a frustrated customer last Tuesday. Someone has to analyze whether the automation rate dropped after a product update.</p><p>That &quot;someone&quot; is the support operations team, and according to Donohue, they are drowning.</p><p>&quot;Almost every support ops team is already doing data analysis and knowledge management — that&#x27;s table stakes today,&quot; Donohue said. &quot;Where teams struggle is the agent builder work. It&#x27;s a new skill set, and most don&#x27;t have enough time for it. They get their first iteration up and running, and then they get stuck.&quot;</p><p>The problem is structural. AI customer agents are not static software. They require constant tuning — a process that looks more like training a new employee than configuring a SaaS tool. Each customer conversation is a potential source of failure, and each failure requires diagnosis, root-cause analysis, a configuration fix, testing, and monitoring. It is tedious, technical, and relentless. <a href="https://fin.ai/operator">Fin Operator</a> aims to collapse that entire loop into a conversational interface.</p><h2>How one AI system plays data analyst, knowledge manager, and debugger all at once</h2><p>Donohue described <a href="https://fin.ai/operator">Operator</a> as filling three distinct roles that typically consume the bandwidth of support ops teams: expert data analyst, expert knowledge manager, and expert agent builder.</p><p>As a data analyst, Operator can field high-level questions like, &quot;How did my team perform last week?&quot; and generate on-the-fly charts, trend reports, and drill-down analyses across all of the data already stored in Intercom&#x27;s platform. The company has loaded Operator with contextual knowledge about customer-specific data attributes to help it interpret workspace-specific metrics accurately.</p><p>As a knowledge manager, Operator can ingest a product update — say, a three-page PDF describing a new feature — and autonomously search the company&#x27;s entire content library to identify what needs to change. It finds gaps, drafts new articles, suggests edits to existing ones, and presents everything in a diff-style review interface. The underlying search engine is the same semantic search system that Intercom has built and optimized for Fin over more than two years.</p><p>&quot;On that knowledge management front, you just have such a time compression of something that would take, certainly hours, sometimes days, into the space of about 10 minutes,&quot; Donohue said.</p><p>As an agent builder, Operator introduces what the company calls a &quot;<a href="https://fin.ai/operator">debugger skill</a>.&quot; Support ops teams can paste in a link to a conversation where Fin misbehaved, and Operator will trace every step of Fin&#x27;s internal reasoning, identify the root cause — often a piece of guidance that unintentionally creates a loop — propose a rewrite, back-test the change against the original conversation, and then suggest creating a production monitor to catch similar issues going forward.</p><p>&quot;This is literally what our professional services team does,&quot; Donohue explained. &quot;You&#x27;ve written guidance that is unintentionally causing Fin to repeat itself — this happens a lot. You didn&#x27;t realize it, but you never gave it an escape hatch.&quot;</p><h2>The &#x27;pull request&#x27; safety net that keeps humans in control of AI changes</h2><p>One of the most consequential design decisions in <a href="https://fin.ai/operator">Fin Operator</a> is what the company calls its &quot;proposal system&quot; — a mechanism that functions like a pull request in software engineering.</p><p>Every change that Operator recommends — whether it is an edit to a help article, a rewrite of an AI guidance rule, or the creation of a new QA monitor — appears as a proposal with a full diff view. Users can inspect, edit, and approve each change before it takes effect. Nothing goes live without a human clicking &quot;Apply.&quot;</p><p>&quot;Right now, we&#x27;re taking zero risk on this — Fin cannot make any changes to the system without human approval,&quot; Donohue emphasized. &quot;Nothing goes live until a human clicks apply.&quot;</p><p>This is a notable architectural choice. In a market increasingly enamored with fully autonomous AI systems, the company is deliberately keeping a human approval gate in place — at least for now. Donohue acknowledged this will evolve, but said the current moment demands caution: &quot;It&#x27;s too big a leap to just let Operator make changes automatically and then tell the team, &#x27;Hey, let me tell you about what I did.&#x27;&quot;</p><p>For enterprise buyers evaluating AI tools, this design point matters. It is the difference between an AI system that proposes changes and one that enacts them — a distinction that compliance teams, security officers, and risk managers will scrutinize closely.</p><h2>Why Fin Operator runs on Anthropic&#x27;s Claude instead of the company&#x27;s own AI models</h2><p>In a revealing technical detail, Donohue confirmed that <a href="https://fin.ai/operator">Fin Operator</a> does not use the company&#x27;s proprietary Apex models — the same custom AI models that power the customer-facing Fin agent and that the company has promoted as outperforming GPT-5.4 and Claude Sonnet 4.6 in customer service benchmarks.</p><p>Instead, Operator runs on Anthropic&#x27;s Claude.</p><p>&quot;We&#x27;re not using our custom models,&quot; Donohue said. &quot;Those are designed to directly answer customer questions, whereas these are closer to what frontier models are best suited for. This is really closer to software engineering.&quot;</p><p>The distinction is telling. Fin&#x27;s <a href="https://fin.ai/cx-models">Apex models</a> are optimized for one thing: resolving customer service conversations with minimal hallucination and maximum accuracy. Operator&#x27;s tasks — analyzing data, writing code-like configurations, debugging complex reasoning chains — demand a different kind of intelligence. Donohue characterized these capabilities as more akin to software engineering, an area where Anthropic&#x27;s Claude models have been deliberately optimized.</p><p>The company has not ruled out building custom models for <a href="https://fin.ai/operator">Operator</a> in the future, but Donohue positioned it as a lower priority. What the team has built around Claude, he argued, is the differentiated layer: the proposal system, the debugger skill, the semantic search integration, the data attribution logic, and the charting capabilities that make Operator more than just &quot;Claude inside the app.&quot;</p><h2>Early beta testers say Fin Operator feels like adding five people to the team</h2><p><a href="https://fin.ai/operator">Fin Operator</a> is currently in beta with roughly 200 customers, a number Donohue said has &quot;ramped up pretty fast the last couple of weeks.&quot;</p><p>Constantina Samara, VP of Customer Support, Enablement &amp; Trust at <a href="https://www.synthesia.io/">Synthesia</a>, said the tool has already changed how her team works: &quot;Previously, improving how Fin handles a conversation often meant reviewing everything yourself — the conversation, the configuration, the content. With Fin Operator, you just ask. It walks you through what happened and makes improving Fin dramatically easier.&quot;</p><p>Jordan Thompson, an AI Conversational Analyst at <a href="https://www.raylo.com/">Raylo</a>, reported that he has been using Operator daily and has run head-to-head comparisons between Operator&#x27;s analysis and his own manual work. &quot;It&#x27;s very accurate,&quot; Thompson said. &quot;It&#x27;s just as strong at high-level trend analysis as it is at debugging individual conversations. That&#x27;s a real limitation when using an LLM connector on its own — you get conversational depth but nothing on reporting or trends.&quot;</p><p>Donohue also shared an internal anecdote from the company&#x27;s own knowledge management team. Beth, who leads knowledge operations, told the product team that Operator made her feel like she had &quot;five more people on my team.&quot; Whether internal testimonials carry the same weight as external customer validation is debatable, but Donohue said the knowledge management use case consistently generates the most visceral reactions because the time savings are so stark — collapsing hours or days of content auditing into roughly 10 minutes.</p><h2>A new pricing model signals how AI is reshaping the economics of enterprise software</h2><p><a href="https://fin.ai/operator">Fin Operator</a> will live inside the company&#x27;s Pro add-on tier — a relatively new bundle that already includes advanced analytics features like CX scoring, topic detection, real-time issue detection, and quality assurance monitoring across both AI and human agent conversations.</p><p>The pricing model introduces something new for the company: usage-based billing. Intercom has historically relied on outcome-based pricing — charging roughly $0.99 per conversation that Fin resolves without human intervention. Operator&#x27;s work does not map cleanly to that model because it produces configuration changes, not customer resolutions.</p><p>&quot;This has pushed us to a different model, to go more into that usage model for support ops teams,&quot; Donohue said. &quot;We&#x27;ll try to be generous with the usage amounts that come into Pro, but for people who are leaning heavily in, we&#x27;ll have the ability to buy more usage blocks.&quot;</p><p>The shift is worth watching. Outcome-based pricing was one of the company&#x27;s most distinctive market positions — a bet that customers would pay for results rather than seats. Extending that philosophy to internal operations work proved impractical, which suggests that as AI agents take on more diverse roles within an organization, the pricing models that support them will need to become equally diverse.</p><h2>How Fin Operator stacks up in a crowded field of AI customer service competitors</h2><p>Fin Operator lands in an increasingly competitive landscape. <a href="https://www.zendesk.com/">Zendesk</a>, <a href="https://www.salesforce.com/">Salesforce</a>, <a href="https://sierra.ai/">Sierra</a>, and a constellation of AI-native startups are all building some version of AI-powered support operations tooling. The broader AI automation market is projected to reach <a href="https://www.grandviewresearch.com/industry-analysis/ai-automation-market-report">$169 billion in 2026</a>, according to Grand View Research, growing at a 31.4% compound annual rate.</p><p>But Donohue argued that Operator&#x27;s differentiation lies in two areas. First, breadth: Operator works across the full surface area of the company&#x27;s configuration system — data, content, procedures, simulations, guidance, and monitoring — rather than addressing a single narrow use case. Second, the fact that it spans both AI and human operations.</p><p>&quot;Most critically, where I think we have the most differentiation is because it&#x27;s for your human system and your AI system,&quot; Donohue said. &quot;That&#x27;s really one of the unique spaces we have — to have a first-class AI agent and a first-class help desk, and Operator works across both.&quot;</p><p>The competitive positioning also benefits from timing. The company&#x27;s <a href="https://www.linkedin.com/pulse/today-intercom-becomes-fin-eoghan-mccabe-7ov5c/">recent corporate rebrand </a>from Intercom to Fin signals a wholesale commitment to AI that legacy players may struggle to match. As CEO McCabe wrote in announcing the name change, the AI agent &quot;is about to be the largest part of our business.&quot; The help desk product continues as Intercom 2, but the parent company now carries the name of its AI agent — a branding move that some industry observers have interpreted as pre-IPO positioning. The Fin <a href="https://fin.ai/api-platform">API Platform</a>, launched in early April, adds another dimension: the company opened its proprietary Apex models to third-party developers and even offered to license the technology to direct competitors like Decagon and Sierra.</p><h2>The real paradigm shift isn&#x27;t a new chat interface — it&#x27;s an agent that does the thinking for you</h2><p>Step back from the product specifics and <a href="https://fin.ai/operator">Fin Operator</a> represents something potentially more consequential than a new dashboard or analytics tool. It is one of the first commercial products to explicitly embody the emerging paradigm of AI agents that manage other AI agents — a two-layer abstraction that is beginning to reshape how companies think about operational software.</p><p>Donohue was emphatic on this point. The real paradigm shift, he argued, is not the chat interface replacing buttons and menus. It is that the AI is doing the actual knowledge work — figuring out what should change, why, and how.</p><p>&quot;The UX change is secondary, even though it&#x27;s most visible,&quot; Donohue said. &quot;The change is that we are identifying and doing the work of support operations. It&#x27;s doing the work of what the knowledge manager is doing, so that they just have to approve that. That&#x27;s the huge shift.&quot;</p><p>The analogy to software engineering is apt. Over the past year, AI coding agents have fundamentally altered the daily workflow of developers, shifting their primary responsibility from writing code to reviewing and guiding the AI that writes it. Donohue sees the same transformation arriving for support operations professionals.</p><p>&quot;Software engineers — three months have upended their world, where their primary job now is managing agents who are actually writing the code,&quot; he said. &quot;Similarly now, support ops, your job is to manage an agent who&#x27;s managing the agent for your customers.&quot;</p><p>Whether this vision pans out at enterprise scale remains to be seen. The company is still launching <a href="https://fin.ai/operator">Operator</a> in beta precisely because it wants to keep refining quality through what Donohue described as a painstaking, conversation-by-conversation debugging process. &quot;We&#x27;ve spent three months, conversation by conversation, learning, fixing, learning, fixing, to get it where it&#x27;s robust,&quot; he said.</p><p>But if the early returns hold, <a href="https://fin.ai/operator">Fin Operator</a> may preview what the next generation of enterprise software looks like: not tools that help humans do work faster, but agents that do the work themselves, subject to human judgment and approval. For customer service leaders already running AI agents in production, the question is no longer just &quot;how good is my bot?&quot; It is now, inevitably, &quot;who is managing it?&quot; And increasingly, the answer is another bot.</p>]]></description>
            <author>michael.nunez@venturebeat.com (Michael Nuñez)</author>
            <category>Technology</category>
            <category>Orchestration</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/10I7GZFZUePTddNj8ASkQA/6377bab1d1c7f5e7bfeed8c047ac2588/Nuneybits_Vector_art_of_a_back-office_maze_navigated_by_an_AI_o_f7f13274-2bb1-4557-bc50-34a00548ce56.webp?w=300&amp;q=30" length="0" type="image/webp"/>
        </item>
        <item>
            <title><![CDATA[How RecursiveMAS speeds up multi-agent inference by 2.4x and reduces token usage by 75%]]></title>
            <link>https://venturebeat.com/orchestration/how-recursivemas-speeds-up-multi-agent-inference-by-2-4x-and-reduces-token-usage-by-75</link>
            <guid isPermaLink="false">tIF6rTJtyHUNZv8xOM8Zo</guid>
            <pubDate>Fri, 15 May 2026 21:04:15 GMT</pubDate>
            <description><![CDATA[<p>One of the key challenges of current multi-agent AI systems is that they communicate by generating and sharing text sequences, which introduces latency, drives up token costs, and makes it difficult to train the entire system as a cohesive unit. </p><p>To overcome this challenge, researchers at University of Illinois Urbana-Champaign and Stanford University developed <a href="https://recursivemas.github.io/"><u>RecursiveMAS</u></a>, a framework that enables agents to collaborate and transmit information through embedding space instead of text. This change results in both efficiency and performance gains. </p><p>Experiments show that RecursiveMAS achieves accuracy improvement across complex domains like code generation, medical reasoning, and search, while also increasing inference speed and slashing token usage. </p><p>RecursiveMAS is significantly cheaper to train than standard full fine-tuning or LoRA methods, making it a scalable and cost-effective blueprint for custom multi-agent systems.</p><h2>The challenges of improving multi-agent systems</h2><p><a href="https://venturebeat.com/orchestration/research-shows-more-agents-isnt-a-reliable-path-to-better-enterprise-ai"><u>Multi-agent systems</u></a> can help tackle complex tasks that single-agent systems struggle to handle. When scaling multi-agent systems for real-world applications, a big challenge is enabling the system to evolve, improve, and adapt to different scenarios over time. </p><p>Prompt-based adaptation improves agent interactions by iteratively refining the shared context provided to the agents. By updating the prompts, the system acts as a director, guiding the agents to generate responses that are more aligned with the overarching goal. The fundamental limitation is that the capabilities of the models underlying each agent remain static. </p><p>A more sophisticated approach is to train the agents by updating the weights of the underlying models. Training an entire system of agents is difficult because updating all the parameters across multiple models is computationally non-trivial.</p><p>Even if an engineering team commits to training their models, the standard method of agents communicating via text-based interactions creates major bottlenecks. Because agents rely on sequential text generation, it causes latency as each model must wait for the previous one to finish generating its text before it can begin its own processing. </p><p>Forcing models to spell out their intermediate reasoning token-by-token just so the next model can read it is highly inefficient. It severely inflates token usage, drives up compute costs, and makes iterative learning across the whole system painfully slow to scale. </p><h2>How RecursiveMAS works</h2><p>Instead of trying to improve each agent as an isolated, standalone component, RecursiveMAS is designed to co-evolve and scale the entire multi-agent system as a single integrated whole. </p><p>The framework is inspired by <a href="https://venturebeat.com/ai/mits-new-recursive-framework-lets-llms-process-10-million-tokens-without"><u>recursive language models</u></a> (RLMs). In a standard language model, data flows linearly through a stack of distinct layers. In contrast, a recursive language model reuses a set of shared layers that processes the data and feeds it back to itself. By looping the computation, the model can deepen its reasoning without adding parameters.</p><p>RecursiveMAS extends this scaling principle from a single model to a multi-agent architecture that acts as a unified recursive system. In this setup, each agent functions like a layer in a recursive language model. Rather than generating text, the agents iteratively pass their continuous latent representations to the next agent in the sequence, creating a looped hidden stream of information flowing through the system. </p><p>This latent hand-off continues down the line through all the agents. When the final agent finishes its processing, its latent outputs are fed directly back to the very first agent, kicking off a new recursion round. </p><p>This structure allows the entire multi-agent system to interact, reflect, and refine its collective reasoning over multiple rounds entirely in the latent space, with only the very last agent producing a textual output in the final round. It is like the agents are communicating telepathically as a unified whole and the last agent provides the final response as text.</p><h2>The architecture of latent collaboration</h2><p>To make continuous latent space collaboration possible, the authors introduce a specialized architectural component called the RecursiveLink. This is a lightweight, two-layer module designed to transmit and refine a model&#x27;s latent states rather than forcing it to decode text. </p><p>A language model&#x27;s last-layer hidden states contain the rich, semantic representation of its reasoning process. The RecursiveLink is designed to preserve and transmit this high-dimensional information from one embedding space to another. </p><p>To avoid the cost of updating every parameter across multiple large language models, the framework keeps the models&#x27; parameters frozen. Instead, it optimizes the system by only training the parameters of the RecursiveLink modules.</p><p>To handle both internal reasoning and external communication, the system uses two variations of the module. The inner RecursiveLink operates inside an agent during its reasoning phase. It takes the model&#x27;s newly generated embeddings and maps them directly back into its own input embedding space. This allows the agent to continuously generate a stream of latent thoughts without generating discrete text tokens. </p><p>The outer RecursiveLink serves as the bridge between agents. Because agents in a real-world system might use different model architectures and sizes, their internal embedding spaces have entirely different dimensions. The outer RecursiveLink includes an additional layer designed to match the embeddings from one agent&#x27;s hidden dimension with the next agent&#x27;s embedding space.</p><p>During training, first, the inner links are trained independently to warm up each agent&#x27;s ability to think in continuous latent embeddings. Then, the system enters outer-loop training, where the diverse, frozen models are chained together in a loop, and the system is evaluated based on the final textual output of the last agent. </p><p>The only thing that gets updated in the training process is the RecursiveLink parameters and the original model weights remain unchanged, similar to <a href="https://venturebeat.com/ai/running-thousands-of-llms-on-one-gpu-is-now-possible-with-s-lora"><u>low-rank adaptation</u></a> (LoRA). Another advantage of this system comes into effect when you have multiple agents on top of the same backbone model. </p><p>If you have a multi-agent system where two agents are built on the exact same foundation model acting in different roles, you do not need to load two copies of the model into your GPU memory, nor do you train them separately. The agents will share the same backbone as the brain and use the RecursiveLink as the connective tissue.</p><h2>RecursiveMAS in action</h2><p>The researchers evaluated RecursiveMAS across nine benchmarks spanning mathematics, science and medicine, code generation, and search-based question answering. They created a multi-agent system using open-weights models including Qwen, Llama-3, Gemma3, and Mistral. These models were assigned roles to form different agent collaboration patterns such as sequential reasoning and mixture-of-experts collaboration. </p><p>RecursiveMAS was compared to baselines under identical training budgets, including standalone models enhanced with LoRA or full supervised fine-tuning, alternative multi-agent frameworks like Mixture-of-Agents and TextGrad, and recursive baselines like LoopLM. It was also compared to Recursive-TextMAS, which uses the same recursive loop structure as RecursiveMAS but forces the agents to explicitly communicate via text.</p><p>RecursiveMAS achieved an average accuracy improvement of 8.3% compared to the strongest baselines across the benchmarks. It excelled particularly on reasoning-heavy tasks, outperforming text-based optimization methods like TextGrad by 18.1% on AIME2025 and 13% on AIME2026. </p><p>Because it avoids generating text at every step, RecursiveMAS achieved 1.2x to 2.4x end-to-end inference speedup. RecursiveMAS is also much more token efficient than the alternative. Compared to the text-based Recursive-TextMAS, it reduces token usage by 34.6% in the first round of the recursion, and by round three, it achieves 75.6% token reduction. RecursiveMAS also proved remarkably cheap to train. Because it only updates the lightweight RecursiveLink modules, which consist of roughly 13 million parameters or about 0.31% of the trainable parameters of the frozen models, it requires the lowest peak GPU memory and cuts training costs by more than half compared to full fine-tuning.</p><h2>Enterprise adoption</h2><p>The efficiency gains — lower token consumption, reduced GPU memory requirements, and faster inference — are intended to make complex multi-step agent workflows viable in production environments without the compute overhead that limits enterprise agentic deployments. The researchers have released the <a href="https://github.com/RecursiveMAS/RecursiveMAS">code</a> and <a href="https://huggingface.co/RecursiveMAS">trained model weights</a> under the Apache 2.0 license.</p>]]></description>
            <author>bendee983@gmail.com (Ben Dickson)</author>
            <category>Orchestration</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/40XcHj8m7JLdkkZiy8Ry4n/54c900f7056ba18eb8e368cd2681e4d3/recursive_multi-agent_system.jpg?w=300&amp;q=30" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Claude’s next enterprise battle is not models: it’s the agent control plane]]></title>
            <link>https://venturebeat.com/orchestration/claudes-next-enterprise-battle-is-not-models-its-the-agent-control-plane</link>
            <guid isPermaLink="false">2RqKEaJ8C092nywdy7f3nM</guid>
            <pubDate>Fri, 15 May 2026 16:45:00 GMT</pubDate>
            <description><![CDATA[<p><i>New VB Pulse data shows Microsoft and OpenAI leading enterprise agent orchestration, but Anthropic’s first measurable foothold points to a larger fight over who controls the infrastructure where AI agents run.</i></p><p>For the last two years, the enterprise AI race has mostly been framed as a model war: OpenAI’s GPT series versus Anthropic’s Claude versus Google’s Gemini, with smaller and open-source alternatives also coming in from the U.S. and China. </p><p>But the next strategic fight may not be over which model answers a prompt best. It may be over who controls the layer where agents plan, call tools, access data, run workflows and prove to security teams that they did not do anything they were not supposed to do.</p><p>New <a href="https://venturebeat.com/data/the-retrieval-rebuild-why-hybrid-retrieval-intent-tripled-as-enterprise-rag-programs-hit-the-scale-wall">VB Pulse survey data</a> suggests the category is already taking shape. Our independent Enterprise Agentic Orchestration tracker, a survey that records the preferences of qualified, verified technical-decision maker respondents at enterprises at regular intervals, found that <b>Microsoft Copilot Studio and Azure AI Studio</b> <b>led with 38.6%</b> primary-platform adoption in February, up from 35.7% in January. </p><p><b>OpenAI’s Assistants and Responses API</b> held second place, rising from 23.2% to<b> 25.7%</b>. </p><p><b>Anthropic remained far smaller, but it made its first appearance in the tracker</b>: moving from 0% in January to <b>5.7% in February</b> for Anthropic tool use and workflows. </p><p>The underlying move is small — four respondents out of a total 70 in this cohort, with more to come — but strategically interesting because it marks the first sign in this tracker of Claude usage moving from the model layer into native orchestration.</p><p>That distinction matters. Enterprises are not merely choosing chatbots. They are deciding where the live operational machinery of AI work will sit: inside Microsoft’s stack, inside OpenAI’s API layer, inside Anthropic’s managed runtime, inside an open framework, or across a hybrid mix of all of them.</p><p>“This is the convergence moment for enterprise AI,” said Tom Findling, CEO and cofounder of AI cybsersecurity startup <a href="https://www.conifers.ai/">Conifers</a>, in a statement to VentureBeat. “Models and agent frameworks have matured enough together that enterprises are now shifting focus beyond model quality to the control plane around it. In security operations, we’re seeing the competitive advantage move toward platforms that can orchestrate agents, leverage enterprise context, and provide governance and auditability across customer environments.”</p><div></div><h2><b>Anthropic’s number is still small to start — but the increase is not</b></h2><p>The Anthropic number, by itself, should not be overread. A <b>move from zero to 5.7% is not a juggernaut</b>. It is not proof that Anthropic has captured enterprise orchestration. </p><p>It is not even enough to say Anthropic has a durable lead in any part of this market. Microsoft owns the early enterprise distribution advantage, and OpenAI has a much larger installed base in orchestration than Anthropic.</p><p>But <b>small numbers can matter when they appear at the start of a new market structure</b>. Anthropic’s emergence in orchestration comes as the broader VB Pulse data shows <b>Claude also gaining massive enterprise adoption at the </b><i><b>model</b></i><b> layer.</b> </p><p>In our VB Pulse Q1 Foundation Models and Intelligence Platforms tracker<b>, Anthropic rose from 23.9%</b> in January to 28.6%<b> </b>in February and then even more dramatically to<b> 56.2% in March</b> among qualified enterprise respondents, with the March reading flagged as directional only, because the sample was only 16 respondents.</p><p>The story, then, is not that Anthropic is winning orchestration today. It is that<b> Anthropic’s model momentum may be starting to spill into the orchestration layer.</b></p><p>That is where the strategic stakes get higher.</p><h2><b>A model is easier to swap than an agent runtime</b></h2><p>A model is relatively easy to swap, at least in theory. A company can route one workload to Claude, another to GPT, another to Gemini and another to a smaller open model. </p><p>In fact, the VB Pulse Foundation Models tracker over the same Q1 period shows that multi-model strategy is the enterprise consensus: respondents increasingly report adopting multiple models and building orchestration layers that route across them by task, cost and risk profile.</p><p>An agent runtime is different. Once a company’s workflows, tool permissions, credentials, audit logs, memory, sandboxed execution and operational monitoring live inside one provider’s environment, switching providers becomes less like changing models and more like changing infrastructure.</p><h2><b>That is the real reason Anthropic’s 5.7% foothold is worth watching</b></h2><p>Anthropic has already made clear that it wants to provide more than the model. Its Claude Managed Agents documentation describes a public beta for a managed agent harness with secure sandboxing, built-in tools and API-run sessions, while Anthropic’s engineering post frames the architecture around decoupling the model from the surrounding agent machinery: the session, the harness and the sandbox.</p><p>In plain English, Anthropic is trying to host the environment where Claude agents remember context, use tools, run code, operate inside sandboxes and persist across long-running workflows. That is no longer just inference. That is operational infrastructure.</p><p>The pitch is obvious: most enterprises do not want to stitch together their own agent stack from scratch. They want agents that can act, but they also want permission boundaries, audit trails, workflow reliability and ways to stop the system when something goes wrong.</p><h2><b>Security is becoming the buying criterion</b></h2><p>The VB Pulse orchestration tracker shows that buyers are prioritizing exactly those concerns.<b> Security and permissions ranked as the top orchestration platform selection criterion</b> in both January and February, at <b>39.3% and 37.1%</b>.</p><p>Control over agent execution rose from 17.9% to 22.9%, while flexibility across models and tools fell from 35.7% to 25.7%. The market appears to be shifting from optionality toward governance.</p><p>That shift is not surprising. A chatbot can be wrong and still remain mostly contained. An agent that can send emails, modify documents, query databases, call APIs or execute workflows has a much larger blast radius. The enterprise question is not only whether the agent is smart enough. </p><p>It is who gave it permission, what it touched, what it changed, whether those actions were logged, and whether the company can unwind the damage if something goes wrong.</p><p>Ev Kontsevoy, cofounder and CEO of <a href="https://goteleport.com/about/">Teleport</a>, an identity and digital infrastructure solutions company, argues that the industry is still putting too much emphasis on orchestration itself and not enough on identity: “The race to own the agent orchestration layer is real,” Kontsevoy said. “It’s also solving the wrong problem first. Orchestration without identity only multiplies chaos. Without identity, you don’t know what an agent can access, what it actually did, or how to revoke its access when it operates outside policy. A unified identity layer is a prerequisite to deploying agents — one or many — in infrastructure.”</p><p>Syam Nair, Chief Product Officer at the intelligent data infrastructure company <a href="https://www.netapp.com/">NetApp</a>, believes data management is key in all cases to secure AI agent orchestration across the enterprise. As he said in a statement to VentureBeat:<i> &quot;Effective agent management requires built-in intelligence and a continuously updated understanding of both data and, critically, its metadata. This visibility allows organizations to define and enforce clear policies so data is used only by the right agents, for the right purposes. Making this work at scale is a crossfunctional effort. Security, storage, and data science teams must work together to implement policies that safeguard company data, while creating a strong data foundation for AI.&quot;</i></p><p>He continued: &quot;The CIOs and technology leaders that are successful are the ones who take the input, policies, and vision from all these teams into account as they build a data infrastructure that minimizes risk and drives business value.&quot;</p><h2><b>Microsoft has the distribution edge</b></h2><p>That is why Microsoft’s early lead makes sense. Copilot Studio and Azure AI Studio sit inside an enterprise stack many companies already use: Microsoft 365, Teams, Entra ID, Azure and existing procurement relationships. </p><p>The VB Pulse Orchestration Tracker for Q1 2026 describes<b> Microsoft as the enterprise default,</b> with <b>no other platform within 13 percentage points in February. </b></p><p>David Weston, CVP, AI Security, Microsoft, provided some insight on why, writing in a statement to VentureBeat: &quot;Without a unified control layer, you start to see fragmentation – agents operating in silos, inconsistent governance, and gaps in security. What customers are asking for is a way to bring order to that complexity. With Agent 365, we’re providing a single control plane to observe, govern, and secure agents across Microsoft, partner, and third-party ecosystems, all grounded in enterprise data and identity.&quot;</p><p>OpenAI’s second-place position is also unsurprising. Its <a href="https://venturebeat.com/ai/openai-announces-gpt-4-turbo-assistants-api-at-devday-aims-to-revolutionize-ai-apps">Assistants</a> and <a href="https://venturebeat.com/orchestration/openai-upgrades-its-responses-api-to-support-agent-skills-and-a-complete">Responses API </a>gave developers an early way to build agent-like systems using OpenAI’s models and tooling. In the orchestration tracker, OpenAI is not surging, but it is still ticking up steadily: <b>23.2% in January to 25.7% in February.</b></p><p>Anthropic is the newcomer at the orchestration layer. But its timing may be favorable. The VB Pulse Foundation Models tracker for Q1 2026 suggests enterprises increasingly see Claude as a fit for higher-stakes workloads where safety, instruction following, long context and governance matter. </p><p>The orchestration tracker suggests those same buyers are now moving from agent experiments toward production workflows, where security, permissions and task reliability become the gating issues.</p><p>That creates a possible path for Anthropic: not to beat Microsoft as the default enterprise platform, at least not immediately, but to become the agent runtime for companies that already trust Claude for sensitive or complex workloads.</p><h2><b>The risk is lock-in</b></h2><p>The risk for enterprises is lock-in.</p><p>The orchestration tracker found that<b> a hybrid control plane — combining provider-native orchestration with external orchestration — was the leading expected architecture</b>, holding <b>around 35% to 36%</b> across the two substantive waves. </p><p>Provider-managed-only approaches grew modestly but remained a minority. The report’s conclusion is blunt: enterprises are not willing to give full orchestration control to any single provider.</p><p>It makes total sense as enterprises seek to leverage the &quot;best-in-breed&quot; models, harnesses, and tools from multiple vendors, especially as their needs differ widely across sector, business, and size.</p><p>&quot;Most enterprises will operate in a multi-model, multi-agent environment, which makes an independent control plane essential,&quot; agreed Felix Van de Maele, CEO of <a href="https://www.collibra.com/">Collibra</a>, a company specializing in unified governance for data and AI, in a statement to VentureBeat. &quot;That is why we built AI Command Center: to give organizations the visibility, governance, and real-time oversight needed to manage AI systems and agents across the full lifecycle.&quot;</p><p>That caution shows up in the risk data. When asked about risks if agent control lives inside a model provider platform, respondents cited security and permissioning limitations as the top concern.<b> Vendor lock-in was the second-largest concern </b>and the <b>only one that increased from January to February, rising from 23.2% to 25.7%.</b></p><p>This is the tension at the heart of the agent market. Enterprises want managed infrastructure because building reliable agents is hard. But the more a provider manages, the more it may own.</p><p>Dr. Rania Khalaf, chief AI officer at <a href="https://wso2.com/about/">WSO2</a> — the subsidiary of EQT that offers open source, customizable AI stacks for enterprises — said enterprises will need an agent control plane that sits apart from individual frameworks, harnesses and runtimes because agents combine the unpredictability of LLMs with the ability to take actions that have consequences.</p><p>“Teams want the freedom to use the best model and framework for each job — Claude for coding, Gemini for writing, LangGraph or CrewAI for dynamic modular behavior — and that heterogeneity makes consistent governance untenable in integrated platforms that lock into one ecosystem,” Khalaf said.</p><h2><b>From LLMOps to Agent Ops</b></h2><p>Khalaf said the industry is also moving from MLOps to LLMOps to “Agent Ops,” where governance has to cover the whole agent, not just the model call.</p><p>“A guardrail on an LLM call can catch hallucination or toxic output, but it will not catch an agent thrashing in an unbreakable, costly loop, which is why governance now has to extend out from the LLM interaction to the scope of the agent,” she said.</p><p>The practical implication is that enterprises need to separate policy and control from the agent logic itself. Khalaf pointed to the recent example of an agent deleting a production database despite being told not to, arguing that the failure showed the limits of relying on prompt-level instructions where hard identity and access controls are needed.</p><p>“Pulling guardrails, evals, policies, bindings, and agent identity out of the core agent logic allows them to be configured per deployment and per environment, owned by the appropriate teams in security, product, and compliance, without fragmenting the governance layer as different teams choose different models and frameworks,” Khalaf said.</p><h2><b>MCP is open. The runtime may still be sticky</b></h2><p>That is where Anthropic’s Model Context Protocol, or MCP, complicates the story. MCP is not a walled garden; Anthropic introduced it as an open standard for connecting AI systems to data and tools, and Anthropic’s documentation describes MCP as an open-source standard for connecting AI applications to external systems.</p><p>But openness at the protocol layer does not automatically eliminate lock-in at the runtime layer. An enterprise could use an open protocol to connect tools while still becoming dependent on a provider’s managed sessions, logs, sandboxes, permissions model, workflow state and deployment environment. In other words, MCP may reduce integration friction, while managed agent infrastructure could still increase switching costs.</p><p>Khalaf said Microsoft’s lead likely reflects its M365 and Azure distribution, while Anthropic’s emerging foothold could reflect a different architectural bet around open protocols such as MCP. But she argued the long-term direction is not a single-provider stack.</p><p>“Enterprises serious about running agents in production will end up multi-vendor across these layers,” Khalaf said, “which is why the open and interoperable control plane matters more than the current percentages might suggest.”</p><h2><b>The next cycle may be cross-vendor collaboration</b></h2><p>That same tension — between provider-native convenience and cross-vendor reality — is where Arick Goomanovsky, CEO and cofounder of universal AI agent orchestrator startup <a href="https://www.band.ai/">BAND</a>, sees the next competitive cycle forming.</p><p>“Enterprises now run agents everywhere: individual assistants and coding agents, multi-agent systems in production, agents embedded in Agentforce and ServiceNow, and third-party agents consumed as agent-as-a-service,” Goomanovsky said. “None of them collaborate across those boundaries by default.”</p><p>Goomanovsky argues that the missing layer is not just orchestration inside a single model provider, but a cross-vendor collaboration layer that lets agents from different ecosystems act together.</p><p>“What’s emerging in parallel is demand for an agentic collaboration harness - an interaction layer that lets agents from Microsoft, OpenAI, Anthropic, and internal teams operate as one workforce,” he said. “Orchestration inside any single vendor is still a walled garden so the next competitive cycle is cross-vendor agent collaboration.”</p><h2><b>Independent frameworks face an enterprise packaging problem</b></h2><p>There is also a warning sign for independent orchestration frameworks. LangChain and LangGraph fell from 5.4% to 1.4% as the primary orchestration platform in the qualified enterprise sample.</p><p>External orchestration abstracted entirely from model providers also <b>fell from 8.9% to 2.9%. </b></p><p>Scott Likens, Global Chief AI Engineer at professional services giant <a href="https://www.pwc.com/">PwC</a>, has a front row seat to this trend as the company spearheads and assists clients with their AI transformations. </p><p>As he told VentureBeat in a statement: &quot;Right now, most enterprises are still operating in fragmented environments, with orchestration spread across platforms, business applications, and internally developed tooling. Over time, the market will likely move toward more unified orchestration models, but interoperability, governance and security will remain critical because enterprises are unlikely to standardize on a single agent ecosystem.&quot;</p><p>The report argues that fully independent orchestration frameworks may not yet have the enterprise packaging — security certifications, support, compliance documentation and vendor accountability — that procurement teams require.</p><p>That does not mean open frameworks are irrelevant. It does suggest that enterprise buyers may increasingly consume open or developer-first orchestration through managed products, cloud-provider partnerships or internal control planes rather than as standalone frameworks.</p><h2><b>The agent market starts to look like cloud infrastructure</b></h2><p>This is where the agent market starts to look less like the early chatbot market and more like enterprise cloud infrastructure. The winning vendors will not only have capable models. They will have identity integration, permission controls, audit logs, observability, workflow tooling, sandboxing, evaluation and a credible answer to who owns the control plane.</p><p>Indeed, the orchestration layer is but one part of the stack that the enterprise must fill in, and enterprises may actually decide to have <i>different</i> orchestration layers for agents working in different departments and functions. </p><p>As Nithya Lakshmanan, Chief Product Officer at revenue orchestration company <a href="https://www.outreach.ai/">Outreach.ai </a>wrote in a statement to VentureBeat: <i>&quot;General-purpose orchestration platforms coordinate agent activity well, but they don&#x27;t carry the workflow-specific context that determines whether an agent&#x27;s action is correct for a given situation. In revenue workflows, an agent acting on incomplete deal history or missing buyer context will underperform and erode trust with users. The teams getting the most out of multi-agent systems are treating domain-specific data as the governance layer, with orchestration sitting on top. Most enterprises have chosen their orchestration stack, and what they&#x27;re now figuring out is how those platforms get access to the workflow context they need to make agents useful inside specific business functions.&quot;</i></p><p>That is why Anthropic — which is increasingly launching its own domain-specific <a href="https://www.anthropic.com/news/finance-agents">agents for finance</a> and <a href="https://www.anthropic.com/news/claude-design-anthropic-labs">design</a>, among other categories  — is worth following closely. The company does not need to win the entire orchestration market tomorrow for its strategy to matter. It only needs to persuade a growing set of Claude enterprise customers to let Anthropic handle more of the surrounding machinery: tools, workflows, memory, execution and governance.</p><p>If it succeeds, Claude becomes more than a model in a multi-model portfolio. It becomes part of the infrastructure where enterprise work gets done.</p><p>That would put Anthropic in a more direct fight with OpenAI and Microsoft — not just over model quality, but over the operating layer of AI agents.</p><h2><b>The narrow but important read</b></h2><p>The safe interpretation of the VB Pulse data is narrow but important: Anthropic is not yet a major enterprise orchestration platform. Microsoft is. OpenAI is much closer. But Anthropic has registered its first measurable foothold at the orchestration layer, just as the market is deciding who should control agent execution.</p><p>For enterprise buyers, that may be the question that matters most in 2026. Not which model is best, but which provider gets to run the agent — and how hard it will be to leave once the agent is running.</p>]]></description>
            <author>carl.franzen@venturebeat.com (Carl Franzen)</author>
            <category>Orchestration</category>
            <enclosure url="https://images.ctfassets.net/jdtwqhzvc2n1/QIFFk030xew6nEvO7DFQB/2e91ff2cbababc24cd63134f601983a0/ChatGPT_Image_May_15__2026__09_09_07_AM.png?w=300&amp;q=30" length="0" type="image/png"/>
        </item>
    </channel>
</rss>