Last year, I entered the Hilton Chicago to embark on my very first Midwest Energy Solutions Conference. Being new to the MEEA staff, I gleaned a lot of good advice from colleagues, but there was nothing like experiencing the conference full-on for the first time.
Whether you’re an MES veteran or a first-timer, here are a few tips for getting the most out of your conference experience:
Business Cards: MES is one of the industry’s best networking events, so bring plenty of business cards. Whether you are an entry level staff member or a CEO, there is always going to be an exchanging of cards and information. You don’t want to be the person writing information down on a cocktail napkin because you weren’t prepared. So, grab a handful and…Learn more ›
Energy efficiency investments and their resulting energy savings drive financial benefits throughout the Midwest region. To spread these benefits, on February 7, 2018, MEEA will host the "Good EE Policy for Economic Growth Summit" in Chicago. This free summit, sponsored by E4theFuture and preceding the 2018 Midwest Energy Solutions Conference, will focus on the ways energy efficiency advocates develop sound policy to drive regional economic and job growth. Attendees will hear from a diverse set of advocacy and policymaker perspectives on the value of contractor and business-led advocacy, the economic impact of energy efficiency and how we leverage our collective efforts to inform and shape future EE policy in the Midwest.
You can still…Learn more ›
By Mark Milby and Ian Blanding
For years we’ve heard the specter of cybersecurity raised at nearly every conference or workshop focused on energy efficiency technologies or program design. In most cases it’s discussed only superficially, more like a vague threat on the horizon or a worrisome issue to be given more thought soon. This isn’t surprising, as security experts and cyber operations professionals are rarely present at energy efficiency industry meet ups, and most program implementation folks probably don’t peruse recent literature on cryptography and network vulnerability on a regular basis. But a growing reliance on connected devices, data collection and remote or automated control of energy-intensive equipment to achieve energy…Learn more ›