Twelve months ago, Google published the Agent-to-Agent protocol spec with 50 supporting organizations.
Every AI agent that interacts with a website today is doing the digital equivalent of reading a restaurant menu through the window and guessing what the...
On Sunday, Anthropic announced it had acquired Stainless — a four-year-old New York startup that auto-generates production SDKs from API specifications.
Every agent framework that shipped before 2026 solved the same problem in the same embarrassing way.
Between March and May 2026, OpenAI, Google, Anthropic, and Microsoft each shipped production-grade agent SDKs.
AWS shipped a managed MCP server last week that exposes every AWS API through a single tool called call_aws. One tool.
OpenAI shipped a Codex update last week that buries the lede in its own announcement.
Last week I added a fifth MCP server to a coding agent I've been running in production. Response quality dropped off a cliff.
Everyone covered the Slackbot makeover — 30+ AI features, email drafting from chat, agentic everything.
Last month I watched a team spend three hours debugging phantom timeouts.
How many AI agents are running inside your org right now?
Ox Security dropped a report on April 15 calling it "the mother of all AI supply chains.
Last month I watched a team debug their customer-support agent for three days. Hallucinations, wrong tool calls, invented parameters.
Pluto Security calls it MCPwn, which is about as on-the-nose as vulnerability names get.
Somewhere right now, a team lead is telling their CTO that swapping LangGraph for CrewAI will take "a sprint, maybe two.
OpenAI shipped a Codex update on April 16 that got buried under the usual cycle of model-release drama and benchmark wars.
I spent last week trying something simple: "Claude, draft me a blog post about Docker network modes and publish it." The drafting part worked.
Twelve months ago, most agent teams cared about one protocol: MCP. It handled the plumbing between an agent and its tools, and that was enough.
Last month, researchers at Token Security dropped a vulnerability report that should have made every MCP server operator lose sleep.