Paragon Software Engineering — Incorporated 1993

Systems built to last.
For the people
who depend on them.

Thirty years of critical infrastructure. Warehouses, factories, schools, universities, government agencies — every system built on the same principle: integrity isn't a feature. It's the foundation. Now turning that discipline toward the defining challenge of our time.


What we've built

Three decades.
Systems that survived.

Paragon Core 1990 — Present

1990 — 2023

Red River Army Depot ASRS

Automated Storage and Retrieval System for one of the US Army's largest depots. Migrated from TAL on HP NonStop mainframes to Java, JBoss, and a modern shop-floor UI — introduced incrementally, with the mainframe running in parallel until the final day. Ran for over thirty years.

Critical Infrastructure

2024 — Present

Maryland Dept. of Health

Replacing a legacy Medicaid provider enrollment system. PostgreSQL state machine architecture, comprehensive audit logging, and API infrastructure serving hundreds of thousands of provider records.

Public Health Infrastructure
Extended Portfolio 1995 — 2015

June 1995 — Jan 1998

Motorola Semiconductor (now onsemi)

High-speed chip testing systems on HP NonStop Tandem infrastructure — processing up to six chips per second across production lines. The same Tandem expertise that built ASRS applied to semiconductor manufacturing at scale.

Semiconductor Manufacturing

Jan 1998 — Oct 2002

NCS Pearson

J2EE application consolidating student services — attendance, class rosters, grade management, enrollment — deployed across thousands of public schools nationwide. Federated information exchange system spanning school, district, and state levels.

Public Education

Oct 2002 — Dec 2007

Apollo Group — University of Phoenix

Custom SOA framework generating SOAP-based web services across student, CRM, payment, and faculty domains. Tens of millions of transactions per day across Oracle, PostgreSQL, and MSSQL platforms serving University of Phoenix ground and online campuses.

Higher Education

Dec 2007 — Apr 2015

EDMC

Lead Management System handling 350,000 calls per day across Avaya, Siemens, and Cisco telephony infrastructure at five geographically distributed call centers — zero perceptible pause on answer. Six million transactions per day across student, faculty, payment, and CRM domains.

Automated Communications

The systems we build don't make the news. They run quietly, correctly, for years. When a warehouse worker scans a part or a Medicaid coordinator enrolls a provider, the software disappears. That invisibility is the goal.

Military Logistics Automated storage and retrieval across four factory floor buildings at Red River Army Depot — high-speed cranes, AGV fleets, and kitting stations for the US Army.
Semiconductor Manufacturing High-speed chip testing systems at Motorola (now onsemi), processing up to six chips per second across production lines.
Public Education Assessment and data infrastructure at NCS Pearson supporting K–12 students and educators across the nation.
Higher Education SOA and API architecture at Apollo Group (University of Phoenix) integrating Oracle, PostgreSQL, and MSSQL across ground and online platforms serving hundreds of thousands of students.
Automated Communications Telephony infrastructure at EDMC spanning three phone providers and five locations — 300,000 calls per day, zero perceptible pause on answer.
Public Health Medicaid provider enrollment modernization for the Maryland Department of Health — PostgreSQL state machine architecture and API infrastructure serving hundreds of thousands of provider records.

Artificial intelligence is not a product cycle.
It is the most significant shift in human intellectual evolution since we learned to use fire.

Fire didn't replace humans. It changed what humans were. Cooking food externalized digestion — pre-breaking nutrients before they entered the body — which meant the gut no longer needed to do that work. Gut tissue is metabolically expensive. So is brain tissue. On a fixed caloric budget, you cannot grow both. This was not a graceful transition. It was a battle. Variants with oversized guts competing against variants whose shrinking guts freed energy for expanding brains. The brain won. Not because it was elegant. Because it survived better and reproduced more. Across hundreds of thousands of years, across countless generations, with no awareness of what was happening.

This is that. Compressed into decades. One generation instead of a thousand. And unlike the gut-brain competition, which had no adversary — only pressure — this battle has actors with intent. AI deployed to extract and exploit human cognition is already in the field. The variant that augments and protects human cognition is still being built. The AI transition is moving faster than democratic institutions can track, faster than regulatory frameworks can form, faster than the human nervous system evolved to process. We have one generation to get this right.

In the same week, two separate juries found Meta liable for deliberately addicting children to its platforms and for enabling the sexual exploitation of those same children. Combined damages: $381 million. At Meta's current revenue rate, that represents less than 24 hours of operation. The algorithm runs today exactly as it ran yesterday. The children do not.

The same psychographic targeting infrastructure that Cambridge Analytica demonstrated in 2016 has been refined for a decade since. It does not spread false information randomly. It delivers precisely calibrated psychological payload to individual vulnerability profiles at scale — finding the fear, the unresolved trauma, the tribal identity threat — and exploiting it with content engineered to bypass rational evaluation entirely.

Banning cannot keep pace with workarounds. Legislation cannot keep pace with capability curves. Fact-checking cannot reach the 70% of people who will never read a correction.

The only viable response operates at the same speed and scale as the threat. Which means it must be AI. Which means the question is not whether AI shapes our information environment. The question is: whose values does it serve?

~800,000 BCE

Controlled Fire

Changed human digestion, brain size, social structure, and the length of the day. Took millennia to reshape civilization.

~3,200 BCE

Written Language

Externalized memory. Enabled civilization at scale. Took centuries for culture, law, and religion to reorganize around it.

1440 CE

The Printing Press

Democratized knowledge. Also enabled 150 years of religious war before shared epistemic ground restabilized.

Now

Artificial Intelligence

The first tool that thinks alongside us. Arriving faster than any previous shift. No historical precedent for the required adaptation speed.

The question

Symbiosis or Extraction?

Every prior inflection point was eventually integrated. This one is being actively weaponized before the defenses exist. The outcome is not predetermined.

The answer

Neither Alone Can Win

Human judgment without AI assistance fights an information war with bows against autonomous weapons. AI without human values optimizes without wisdom. Symbiosis is not optional.

"We are not building a fact-checker. We are building an evolutionary adaptation — the immune system that the symbiosis requires to survive its own adolescence."
— Paragon Software Engineering

What we're building

Detection architecture
for the reader, not the institution.

01

Browser-level detection

Pattern recognition at the point of consumption — before content reaches the reader's cognitive evaluation. Not correcting what you see. Showing you what the infrastructure behind it looks like.

02

Psychographic targeting fingerprints

Coordinated inauthenticity leaves tracks. Precision emotional targeting has a signature. Metadata forensics at scale can surface what individual human judgment cannot process fast enough to see.

03

Open source and decentralized

A tool owned by a single entity — political, commercial, or governmental — is a weapon waiting for its next owner. This must be ungovernable by any single interest. It forks. It survives. It belongs to no one and therefore to everyone.

04

Interdisciplinary by design

The attack surface is not logical — it is neurological, psychological, tribal, and political simultaneously. Systems architecture alone cannot defend it. This requires computer science, psychology, philosophy, media studies, and journalism working from a shared foundation.

We are actively seeking collaborators.

This work is early. The architecture exists in discipline and direction, not yet in deployable code. What it needs now is the coalition that builds it right — because building it wrong would be worse than not building it at all.

If you work in any of these fields and the problem resonates, we want to hear from you.

Systems Architecture Cognitive Psychology Media Studies Philosophy of Mind Journalism Data Science Political Science Disinformation Research Human-Computer Interaction EU Policy Open Source Development Ethics