Great news! As of today, the IEEE Technology Report on Wake-Up Radio, a ground-breaking analysis of low-power/low-latency 802.11 wireless LAN interfaces, is now available for purchase at 50% off its original price. If […]

Great news! As of today, the IEEE Technology Report on Wake-Up Radio, a ground-breaking analysis of low-power/low-latency 802.11 wireless LAN interfaces, is now available for purchase at 50% off its original price. If […]
Unix tools defined the modern computing landscape. Originally created in the 1960’s, in today’s fast moving market place, Unix tools provide the user the avenue to solve many engineering and […]
The Consumer Electronics Show (CES) is the annual place to be for technology professionals, experts, and enthusiasts. There are literally hundreds of new product launches, and sometimes it’s hard to […]
Artificial intelligence (AI) is poised to make an indelible mark on how business is done in a variety of fields. The AI industry will have tremendous impact on the way […]
Closed-circuit security cameras, smart phones, wireless printers, IP-connected energy meters, video conferencing systems. These are the type of “things” that make up the Enterprise Internet of Things (EIoT). Although the […]
The National Electrical Safety Code (NESC) can be found everywhere in everyday life. You probably just aren’t aware of it. The NESC protects the public as well as utility workers, […]
It’s been a busy year for us here at IEEE Innovation at Work since our first article went live this past March. Between then and now, we’ve written roughly 21,000 […]
To stay innovative, companies must constantly anticipate the next big disruption to their industry. This year, millions of dollars were invested in developing blockchain. While many business and IT leaders have […]
The Ericsson Research Blog recently profiled IEEE Wake-Up Radio (check it out here). Frequent readers of ours will know that this ground-breaking technology, developed by the IEEE 802.11ba standards task […]
In the absence of comprehensive cyber security training, cyber threats can wreak havoc on businesses in seconds, as the time from knowledge of vulnerability to release of exploit is shrinking. […]