A new way to create podcasts using AI

I have been creating podcasts on and off — mostly off — since 2007, when Paul Gillin and I came up with the idea to talk to each other about war stories from the tech PR world. (You can listen to the very first pod here.) That series would eventually evolve into several different pods that Paul and I would do over the years, with the most recent episode here. In between these shows, I would freelance pods to various clients and publications such as eWeek and various IDG ones.

Dick and Jane: We LookI tell you this because today in the span of a few minutes, I managed to create some very credible podcasts out of previously just my written content, using a new Google tool called notebooklm.google.com. You upload your documents (PDFs or text files) and it converts them into two-host conversations that use some of it, along with using AI to bring in other information. The two “hosts” sound great: one is a male voice and the other a female voice. Call them Dick and Jane. The AI adds in almost the right amount of temporizing with “ums” and “likes” and back-and-forth byplay into the conversation. You can download the audio files here and hear it for yourself:

  • I wrote a handbook for CSOonline recently about AI security posture management. Here is the pod:
  • I also wrote an article for Internet Protocol Journal about the history of the Interop Shownet. Here is that pod:

I did almost no additional work to create these pods, other than search my own hard drive to find something that I wrote. Both of these samples are about ten minutes long. And while I wrote every word in both articles, the pods use examples that I never wrote (that were actually quite good) and bring in other information.) Using their ML routines to keep things more conversational works reasonably well and you almost believe that Dick and Jane are two live humans talking to each other about something that they “just read.” I could do with a few less inserted “likes” which seem to be the basic conversational building block of a certain generation. One thing that Google hasn’t coded into its system is to have the two hosts talk over each other, which I find annoying on other pods that have multiple human hosts.

Google’s tool is still very much in the experimental stage, but it is free to try out. In addition to creating podcasts, you can also query the content you upload just like any AI system, and it will also provide a summary and FAQs and other supporting things around your content. I would suggest that you don’t upload any private content however.

What does this mean for podcasters? Well, uh, things are going to get very interesting. While the Dick and Jane voices aren’t yet configurable, they are pleasant to listen to and seem 85% human. It also portends that my podcast business is probably dead in the water, not that I ever relied on it to produce any significant revenue. Given that I don’t cultivate any political outrage, or any outrage (other than from non-working tech or over-promised products), there was zero chance that my podcasting career would ever take off.

If you do produce some pods that you would like me to listen and compare to the original source materials, do drop a note in the comments.

Tech+Main podcast: The changing role of today’s CISOs

I spoke to Shaun St. Hill, host of the Tech&Main podcast, about the latest YL Ventures CISO Circuit Report. They have a very strong advisory panel of security professionals and annually poll them about industry trends, what their biggest organizational challenges are, and how they interact with their management and boards of directors to protect their companies.

You can listen to the 30 min. podcast here.

SiliconANGLE: The state of collaboration: It’s the people, not the tech, who make it all work

Business collaboration is finally fulfilling its promise — but less because of new technology than people finding better ways to use it.

The technology has gotten a boost, thanks to post-COVID distributed work teams that have embraced video conferencing and instant messaging. But figuring out the collaboration workflows isn’t just choosing between Microsoft Teams and Zoom. but becoming more adept about when and how to work with others. In other words, having the right people with the right mindsets and operating under the right corporate culture are more important than having the right technical infrastructure.

My take on the evolution of collaboration tools for SiliconANGLE can be found here.

Next week, tune in for this webinar that I am doing for Vonage that will cover this ground in more detail.

The realities of ChatGPT as cyber threats (webcast)

I had an opportunity to be interviewed by Tony Bryant, of CyberUP, a cybersecurity non-profit training center, about the rise of ChatGPT and its relevance to cyber threats. This complemented a blog that I wrote earlier in the year on the topic, and certainly things are moving quickly with LLM-based AIs. The news this week is that IBM is replacing 7,800 staffers with various AI tools, making new ways of thinking about the future of upskilling GPT-related jobs more important. At the RSAC show last week, there was lots of booths that were focused on the topic, and more than 20 different conference sessions that ranged from danger ahead to how we can learn to love ChatGPT for various mundane security tasks, such as pen testing and vulnerability assessment. And of course news about how ChatGPT writes lots of insecure code, according to French infosec researchers, along with a new malware infostealer is out with a file named ChatGPT For Windows Setup 1.0.0.exe. Don’t download that one!

There are still important questions you need to ask if you are thinking about deploying any chatbot app across your network, including how is your vendor using AI, which algorithms and training data are part of the model, how to build in any resilience or SDLC processes into the code, and what problem are you really trying to solve.

Wikibon Breaking Analysis podcast: the state of infosec today

One of my first outings for SiliconANGLE is doing this pod with co-founder Dave Vellente this week. We cover a wide range of topics, including examining a new report from Unit42, the “double supply chain” attack on 3CX’s network (and how inadequate their response will be, at least according to their own admissions), where passwordless is for enterprise IT, and other infosec matters. You can read my best bits on the transcript link, or watch the entire pod!

FIR B2B PODCAST #158: ANNA GRIFFIN ON MARKETING IN UNCERTAIN TIMES

We are back after a hiatus and speaking to Anna Griffin, who recently joined cloud storage provider Commvault as Chief Market Officer. Anna has held marketing leadership positions at Smartsheet, Intercom, Nortel, CA and Juniper Networks, among others. That longevity has helped her gain perspective in how to operate in good times and not-so-good times, and our interview explores what she has learned from these experiences.

Anna told us about how marketers have to be careful not to let their organization appear to be a cost center. Rather, they should believe and demonstrate that they are a necessary and valuable asset to the company. Take advantage of a downturn by leaning in and focusing on customers so that the company can craft a message that’s more relevant to their needs. She suggested that marketers should fight for their budgets and focus on high-value activities that will help the company grow. “Someone has to grow, even in lean times,” she said.

Anna spoke about how she has embraced many of the tenets of B2C marketing, even though she has spent more of her career in the B2B world. “I believe that is true since the beginning of time; we are selling human-to-human after all.” Maybe we should start using the term H2H?

“We should remove any frictions in the purchasing process by understanding that community is the new B2B playbook and that customers want things now,” she said. The sales organization needs to be part of the marketing effort, and marketers should be sure playbooks are coordinated.

Being a market leader isn’t just about touting your company’s presence on some “magic quadrant” because customers don’t buy MQs, Anna said. “We have to show more specifics about how we can solve the actual customers’ problems. This means we have to be more targeted in how we can add value for them on day one.”

Listen to our 19 min. podcast here.

FIR B2B podcast #157: Why the end of third-party cookies is a bigger deal than you think

Profile photo of Chris MattyPaul and I spoke to Chris Matty, the co-founder and Chief Revenue Officer at Versium, Inc. His company is developing better B2B ad tracking technologies that will ultimately be used when the third-party web cookie finally bites the dust next year.

As with so many online technologies, replacing cookies might require a lot of work from advertisers and web publishers. This is because Google, Facebook, Apple and Amazon all have a vested interest in keeping customers within their “walled gardens” and not necessarily sharing their tracking data with others. The great cookie demise will bring about a series of consequences, some intended and some unintended.

For example, there will be an initial rush for advertisers to make use of first-party data (meaning data that they have collected over the years themselves) until they realize that this data is outdated or inaccurate and can’t really provide the sufficient quality or insights or a path towards eventual purchases that the old cookies had. There will also be an adjustment as advertisers realize that reaching B2B customers is a lot more difficult than reaching consumers because many business customers don’t necessarily identify themselves as such — think of all the LinkedIn accounts that carry Gmail addresses as an example.

The work-from-home movement has increased the complexity of the tracking business customers now have different IP addresses or are hidden behind VPNs, so all that geofencing and IP tracking data is out the window! Versium is attempting to resolve these issues by aggregating anonymous data from a variety of sources to profile website visitors without compromising their privacy. Resolving identity means collecting and matching deterministic data that allows a marketer to reach or contact a specific person, such as email, phone numbers, addresses and device IDs. For example, think of trying to ensure you have identified the same person when sometimes they call themselves Bob Smith, sometimes Robert Smith, and in other cases they show up as @rsmith. Versium believes that’s possible in many cases using independent, opt-in sources.

The company is working with a variety of independent publishers and advertisers to consolidate data assets to allow independent publishers and site owners to better compete with the internet giants. The goal is to achieve personalization with privacy protection.

Chris has written extensively on this topic here. “Companies that deploy identity resolution solutions to optimize and leverage data can take back the control they had once ceded to third-party cookies,” he asserts.

You can listen to our 16 min. interview with Chris here.