Latest Posts

Working With Electricity: How the NESC Differs From the NEC
The titles National Electrical Code® (NEC®) and National Electrical Safety Code® (NESC®) may sound similar, but you shouldn’t confuse the two. In the ever-changing electrical landscape, it’s important to understand the intent and application of each code. When it comes to working with electricity, ...

GDPR Readiness Gap: Survey Finds Companies Overconfident & Underprepared
A vast majority of the world’s largest organizations believe they’re prepared for the General Data Protection Regulation (GDPR). But they’re not. At least, that’s according to international law firm, Paul Hastings, which surveyed general counsel and chief security officers from 100 FTSE and 100 Fortune500 ...

IEEE’s Wake-Up Radio Report: Save Up To 50% Off
Great news! As of today, the IEEE Technology Report on Wake-Up Radio, a ground-breaking analysis of low-power/low-latency 802.11 wireless LAN interfaces, is now available for purchase at 50% off its original price. If your organization is involved in developing devices and sensors for the Internet of Things, it’s ...

Unix Tools: Power Tools for Power Programmers
Unix tools defined the modern computing landscape. Originally created in the 1960’s, in today’s fast moving market place, Unix tools provide the user the avenue to solve many engineering and business analytics problems professionals face today. Although by the standards of shiny IDEs some ...

The Consumer Electronics Show (CES) is the annual place to be for technology professionals, experts, and enthusiasts. There are literally hundreds of new product launches, and sometimes it’s hard to cut through all the clutter to find out what’s actually worth knowing about. Of the ...

Is Your Industry Ripe for Artificial Intelligence Disruption?
Artificial intelligence (AI) is poised to make an indelible mark on how business is done in a variety of fields. The AI industry will have tremendous impact on the way people and programs work together effectively. Here are the industries that are primed to see ...

Enterprise Internet of Things: Four Core Security Threats
Closed-circuit security cameras, smart phones, wireless printers, IP-connected energy meters, video conferencing systems. These are the type of “things” that make up the Enterprise Internet of Things (EIoT). Although the EIoT holds different weight among different companies, with IoT devices being always-on, always-connected, the risk is ...

The 2017 National Electrical Safety Code® (NESC®): Rules To Live & Work By

Top 5 IEEE Innovation at Work Articles of 2017
It’s been a busy year for us here at IEEE Innovation at Work since our first article went live this past March. Between then and now, we’ve written roughly 21,000 words on a range of topics, including artificial intelligence, cyber security, ethical hacking, and the ...
Top Posts & Pages
- IEEE Certificates Program
- The Smart Grid and Renewable Energy
- Real-Life Use Cases for Edge Computing
- The Advantages of the Finite Element Method
- What’s the Difference Between Wireless Standards IEEE 802.11ac and IEEE 802.11ax?
- Home
- Improve Your English With Artificial Intelligence-Powered Apps
- PELS Continuing Education Webinar Certificates
- Vehicle to Grid (V2G) Technology
- IEEE Continuing Education Course Certificates