Started in the heart of the COVID pandemic, the University of Pittsburgh’s Joseph M. Katz Graduate School of Business Super Analytics Challenge was a novel way to connect graduate school students and the corporate community to solve society's biggest issues with data analytics. Over the last three years, the challenge has addressed homelessness, food insecurity and access to mental health.
This year, the Challenge expanded to include more schools with 10 teams of five students looking to address the workforce shortage in southwestern Pennsylvania’s advanced manufacturing industry.
As technology continues to advance, the integration of Artificial Intelligence (AI) in the workplace has become increasingly prevalent. While AI offers a myriad of benefits such as improved efficiency, enhanced decision-making, and streamlined processes, it also creates a unique set of challenges and considerations that employers must address to ensure that they comply with employment-related laws in this evolving legal landscape. Katie O’Connor and Danielle Mrdjenovich of Buchanan Ingersoll can walk you through the key details and what steps you need to consider.
In today's economy, it seems that every business sector has its own set of cyber security requirements. These requirement documents are often written in a "legal" language and style unfamiliar to the technical employees responsible for their implementation. Using CMMC requirements as an example, Kevin Slonka of Concurrent Technologies Corporation gives practical examples on how to interpret the requirement language and ensure your organization is on the right path to passing your cyber security assessment.
Surely you have seen some pretty crazy interviews during this time of ongoing and nearly constant crisis in America. From hysterical pronouncements to over-reactions and under-reactions, it seems like every interview is one step worse than the next. If you are a small business, or big corporation dealing with the realities of COVID-19 or a hurricane or a tragic shooting, you may find yourself being interviewed by a member of the press. Any crisis situation demands some level of communications and companies today must be prepared for any scenario – whether it’s a terrorist attack, a weather emergency or a healthcare crisis. Jeff Durosko has top tips.
In 2023, credentials were the top culprit in successful breaches. Hackers use credentials for reconnaissance, to gain initial access, and to get access to the final target to encrypt and request ransom - what we know well as ransomware. But why and how do hackers steal credentials to do all these bad things in the first place? You've come to the right place. Let's take a look at what evil-doings hackers have been up to. Peig.io's David Rihack explains the threats and how to stay safe.
The Tech Council's podcast machine has been in high gear, telling our members' stories, sharing their insights and inspiring everyone to be a positive force in our technology ecosystem. Grab your headphones and start listening today. You never know what you might learn.