Blog
News and Insights from ATC
Building Internal AI Capabilities: A How-To Guide
The use cases and potential of artificial intelligence are well documented. However, the journey to cognitive capabilities can be difficult and unclear. Our how-to guide "Building Internal Artificial Intelligence Capabilities" outlines the key steps companies should...
The Secret To AI Is Vuja De
Imagination should be the most desired skill set in the age of artificial intelligence. We have entered the 4th Industrial Revolution where data will power business and AI will become a ubiquitous technology that moves commerce. However, AI and data are merely...
6 Tips for Integrating Company Cultures During Organizational Changes
“No matter how good the numbers look, the key to the realization of any acquisition [or merger] is the successful integration of cultures.” This quote from an article written by G&A Partners’ co-founders hits at the root of one of the key reasons a merger or...
Breach Blog: The Texas Ransomware Attack
Prep your systems, local governments. 2019 is the year of government-targeted ransomware. At least 22 Texas towns were recently hit by a malicious, coordinated ransomware attack – the first of its kind to hit the public sector. It’s unclear at this time how the attack...
Talent-Leadership-Culture (TLC) Ep. 2: Building the Team
ATC is proud to partner with Cendea to present the series, "Talent-Leadership-Culture (TLC)". This blog series addresses the questions and gives insight to the art of finding the RIGHT tech leader to hire at the director level and above. Thank you to our experts for...
MaaS is Changing the Face of Manufacturing
MaaS, or Manufacturing as a Service, is rapidly changing the way engineers, buyers, innovators, and the like purchase outsourced manufacturing services. In the world of EMS (Electronic Manufacturing Services), some are calling it the second revolution, or EMS2.0, such...
Verizon Mobile Security Index 2019
It’s been another headline-grabbing 12 months for cybersecurity. There were many large and damaging compromises affecting retailers, airlines and credit rating companies, to name just a few. Thousands of organizations weren't prepared and had sensitive data stolen,...
ThreatWarrior and Involta Enter Strategic Cybersecurity Partnership
ThreatWarrior, a leader in AI-powered network threat analysis, announced today that it has established a partnership with Involta, an award-winning national IT service provider and consulting firm. The partnership combines ThreatWarrior’s Cyber Immune Response™...
Networking Tips for Introverts from an Introvert
Meeting new people is scary. Making small talk is scary. Getting out of the office and meeting people is scary. I’ve been there. You’re sitting at a table looking around awkwardly in between forced smiles you exchange with people that you accidentally make eye-contact...
Talent-Leadership-Culture (TLC): Attracting the Right Executive Leader
ATC is proud to partner with Cendea to present the series, "Talent-Leadership-Culture (TLC)". This blog series addresses the questions and gives insight to the art of finding the RIGHT tech leader to hire at the director level and above. Thank you to our experts for...