Conference Program

November 3rd, 2016 Program -

8:00 am – Keynote Presentation
Making Value Chains Smarter: Impacting Performance with IoT and Big Data
Enterprise data volume is concurrently estimated to grow 50X year-over-year between now and 2020. At the same time, more than 30 billion devices will be wirelessly connected to the Internet of Things (IoT) by 2020.  IoT and Big Data presents both challenges and opportunities for companies and supply chains.

The use cases for IoT and Big Data in supply chain, product development and manufacturing are numerous – from sensing and shaping demand to better predictability in capturing production changes, monitoring environmental values, among many other scenarios. How can you leverage IoT and big data to boost you companies performance? This session will discuss the impact, best practices and case studies on how leading companies are leveraging IoT & big data today across their supply chains to impact growth and performance.

Maha Muzumdar, Vice President, Industry Transformation, Cloud Business Group – Oracle Corp.

9:00 am – Track 1
What Big Data Will Require in an IOT World
In this presentation, Kris Alexander, chief strategist at Akamai, will discuss how the continued growth of industrial IoT will raise the bar for Internet reliability.  He will address how the need for low latency and high speed within the industrial IOT space is driving the adoption of new networking standards and causing industry and tech leaders to ask some tough questions about reliability, security and data.

Kris will also review the considerations for implementing any and all IoT solutions over the Internet in terms of reliably connecting different machines over that use different protocols at scale; collecting and storing the massive amounts of data generated; ensuring performance of communications between devices; and securing your infrastructure from end point to data center.  Attendees will receive insights into what steps organizations are doing now to ensure their infrastructure is in place as IOT and the subsequent data generation continues to explode.

 Kris Alexander, Chief Strategist, Connected Devices & Gaming - Akamai Technologies

Track 2
IoT Prototyping with Node.js and Firebase
Everyone seems to be talking about the Internet of Things. From houseplants to ice machines, from fitness bracelets to fish tanks: It’s all fair game. This is a whole new world of computing. It’s a lot of fun, but it also brings new challenges for us software developers. Early validation of your idea is critical. You need to be confident that your plan is going to work before you order 1,000 printed circuit boards.

In this talk Jenny Tong, a Developer Advocate on Google Cloud Platform, will show you how node.js, Firebase, and development boards come together in NodeBots to make your IoT project real. This talk will include live electronics hacking, and live coding.

Jenny Tong, Developer Advocate – Google

10:00 am - Networking Break/Exhibit Hall Opens

11:00 am – Track 1
Data Analytics Considerations for Building Business-Oriented IoT Solutions
The Holy Grail of IoT is generating business outcomes. To do so, there are tangible use cases for consideration from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools to creating feedback loops improving product design to improving and enhancing enterprise customer experiences. Advanced data analytics is just one vital technology in the IoT machine but the intelligence gathered can influence important business decisions.

This session will explore four key steps for effective analytic problem solving that enable data driven decision-making.

Dave McCarthy, Senior Director of Products – BSquare, Corp. 

Track 2
IoT from A to Z
Join us in this session to see the IoT development process from start to finish.  That’s right.  A real, live demonstration of an IoT application being created, right in front of you.  In fact, you will be able to contribute to the definition of the project, so bring your creative juices.

During the session, we will review the ROI of the application.  We will select the IoT sensors and devices that will interact with the real world.  We will explore various IoT wireless networks, including ZigBee and Z-Wave.  Software programming of the local IoT gateway will be addressed, including the development of local data analytics.  Internet connectivity will be selected.  Finally, the user interface will be developed.  Throughout the process, we will review the security implications of each phase of development. By the end of the session, if all goes well, the final IoT application that we created together will be up and running.

Robert Lutz, Director of Product Management – Systech Corp.

11:30 am – Track 1
Leveraging the Utility Value of Data in a Complex IoT Landscape
This session will explore what is needed to move from the basic “IoT-enabled capital equipment stage” of IoT to leveraging the data in real and meaningful ways. In doing so, we will discuss the status and direction of IoT deployment and considerations as to how and why governance and architecture will play a key role in allowing organizations to leverage the utility value of the underlying IoT data. The session will also provide examples of the issues associated with the certain massive build-up of IoT data volumes, long running complex queries, and overwhelming resource consumption and discuss how auto-generated statistical metadata models will be used to deliver high value approximate answers to gain equivalent insight into large data lakes nearly instantaneously.

Tim Tyrrell, Vice President - Infobright

Track 2
Why Location is the Missing Link in the IoT Ecosystem
With everything connected, applications that automatically adjust lights, reset thermostats and activate security systems based on our needs – without the requirement for human intervention.  However, delivering these benefits will require more than just connecting devices and building apps; it will require the construction of an entirely new IoT ecosystem.  This ecosystem will require device management, communications, intelligent gateways, wide area networks, development platforms, analytics, applications and most importantly, location.

This presentation will address the how the connected world needs a new ecosystem built upon a foundation of location intelligence. Attendees will learn how location-based IoT systems – with an eye towards simplicity, safety, and eco-responsibility – are already delivering benefits to consumers, organizations, and governments. The session will also address the technologies needed to deliver a successful IoT ecosystem including device management, communications, intelligent gateways, wide area networks, development platforms, analytics, applications and location-based systems.

Randy Frantz, Director of Telecom Solutions – Esri

12:00 pm - Networking Lunch

1:00 pm – Track 1
Ubiquitous IoT Connectivity? How 2.4 GHz Spectrum Can Provide That, and More
IoT needs a strong backbone to support the volume and diversity of devices, applications and platforms coming online. However, today’s businesses are global, and these global companies need not only connectivity, but also ubiquity and interoperability. Companies developing applications want to be able to deliver their solution to the widest available market, and companies using IoT solutions want to be able to utilize the same technologies in Madrid and Hong Kong as they do in Los Angeles.

Current and proposed cellular networks aren’t equipped to handle the volume of IoT traffic now, let alone in the future, and they cannot provide the economies of scale and roaming capabilities that the IoT requires to operate “businesses across borders.”

John Horn, CEO – Ingenu

Track 2
Launching High-Quality Apps for the IoT Digital Playground
As users seek out the devices that will keep them connected to everything while on-the-go, developers must ensure that the apps they’re building play nicely with each other in an increasingly connected IoT digital playground, no matter what operating system or form factor they are intended.

This session will explore the essential technical elements that developers must utilize that go beyond the traditional quality assurance lab to help them launch higher quality apps that will work flawlessly with each other, and to help companies achieve the 360° app quality they need to thrive in the modern IoT digital economy.

Ben Gray, Digital Experience Analyst – Applause

1:30 pm – Track 1
Expanding the Volume of M2M/IOT With Battery Operated Devices
Of the 50 billion nodes that are predicted to be connected to the Internet by 2020, less than 10 percent are predicted to be GSM.  A long range, high capacity system is needed by the telecom companies to consolidate the fragmented, battery operated wireless market for sensor networks, smart cities, smart metering, security systems, smart home, and industrial control.

A widely available network for battery-operated devices is the only way to accommodate the predicted volumes for IoT.  The LoRa Alliance is a collective of industry leaders committed to enabling IoT and seeks to standardize these wide area networks needed to facilitate low-cost, long-range interconnectivity of devices. Learn how Semtech, IBM, Cisco, Actility, Bouygues Telecom, KPN, FastNet, Swisscom are working together to better-equip network infrastructure for the predicted spike in interconnectivity needs.

Hardy Schmidbauer, Director of Wireless Products – Semtech Corp.

Track 2
IoT Isn’t Just Buzz, It’s Big Business
Building a new product is risky. That’s why your business must begin the process by prototyping. But prototyping an IoT product is a little different than the prototyping process your team is probably used to.

This session will discuss three key factors that makes prototyping for IoT apps different than what most people are used to. For example, how the complexity inherent in IoT products makes it imperative to understand the difference between prototype and production-ready, and how it also means longer feedback loops and testing cycles. You’ll more than likely have to build your own components, which is great because you’re pioneering a new space, but challenging because you can’t rely on pre-existing libraries or frameworks.

This session will walk you through the four stages of IoT prototyping including what to tackle first, R&D, when to start building, and how to polish your prototype so it’s ready to be tested.

Rudy Mutter, EVP of Technology & a Founding Partner – Yeti

2:00 pm – Track 1
Everything Changes with IoT Connectivity
When moving from traditional discrete products to connected IoT offerings, manufacturers have to rethink their entire business model, top to bottom—including staffing priorities, pricing structures, distribution channels, sales processes, support services, relationships with customers, and even the very concept of a “product” in an IoT environment. In fact, manufacturers will find that their IoT offerings look less like products and more like services.

When moving to connected IoT offerings, manufacturers have to reconcile the longevity of durable goods, such as washing machines, with the Internet-speed expectations of today’s consumers.

This presentation will outline some of the most important considerations for manufacturers as they make the transition from traditional to connected products, and from traditional to IoT-era business models—starting with a change in mindset, which is the most important first step.

Adrian Caceres, Co-Founder, CTO, VP of Engineering – Ayla Networks

Track 2
Getting it Right: IoT and the User Experience
It is imperative that we merge our inherent senses into new ‘sensing’ environments: vision, touch, hearing and speech – creating seamless, natural, human experiences. To do this, product owners, designers, and developers will need to think beyond individual devices to how we can orchestrate the user experience across these devices. When we connected computers and mobile phones to the Internet, it transformed how we use those devices. Now, as we connect ourselves and the world around us, how will our lives be transformed? This will be a truly complex but ultimately rewarding challenge for all technology developers. In this session, Mr. Wesselman, will share his thoughts on this rising opportunity, focusing on the need for the UX to adapt appropriately as these new sensing environments come on line.

Tom Wesselman, Director of Communications Ecosystem Architecture – Plantronics

2:30 pm - Track 1
IoT Traffic Impacts on Your Networks
With the rapid growth of IoT applications and devices, the impact facing network operators is significant. The characteristics of data traversing the network are changing with the rapid expansion of IoT services. Network traffic is exploding with millions of new small-packet telematics and sensor readings, along with potentially high bandwidth video – including encrypted streams – as well as more rich media content that is being produced by IoT services including machine vision, smart home and business applications, and remote monitoring and surveillance.

Understanding the impact that IoT traffic will have on networks, measuring and monitoring the impacts, and planning for changes in network infrastructure are things that should be addressed now.

Dr. Alan Clark, CEO and Founder – Telchemy

Track 2
A House Divided
There is a significant barrier to the Internet of Things. Products are split by competing standards, creating problems for the interoperability of devices in the home. The question is, who will come out on top? HomeKit, Brillo/Weave, Amazon Alexa and OCF all are promising. Manufacturers are dependent upon these standards as stages for the interoperability of their products.

This session will evaluate how the consolidation of standards will affect the market for connected devices and what is needed to drive the industry forward. We will review the role of manufacturers and consumers in developing our own future as it relates to connected technology.

Adam Justice, Vice President and GM – Grid Connect

3:00 pm – Networking Break in Exhibit Hall

3:30 pm – Track 1
The Power of Tablets
In this session, Alex Brisbourne will discuss importance of choosing a network provider that provides seamless, global connectivity in order to ensure that even in remote locations, technology can function without a glitch, while also providing platforms and tools to help end users better analyze the data they find. In addition, he will discuss the integral role the technology enabler – tablets, play in providing a remote application and technology that fits the business needs of the end user. Brisbourne will highlight how tablets can improve even third-world applications, and that tablets are not just an inexpensive alternative in a resource-poor area. Because of the design and features that tablets offer, it is often better suited for these kinds of environments than more complex and more expensive equipment.

Alex Brisbourne, CEO – KORE

Track 2
Compose IoT Business Solutions with a Low-Code Development Platform
Most IoT applications created today are point solutions with simple backend integration. As digital business evolves, the value of IoT can only be realized when the creation of IoT Business Solutions can be simplified. One of the key characteristics shared by these high value IoT business solutions is that they all require sophisticated backend orchestrations span actors, line-of-business systems, Cloud services, and other IoT systems. In this session, we will discuss why the traditional application development methodologies, even with the widely adopted Agile Methodology, does not address the challenge.

We will then explore why Low-Code Development platforms are the wave of the future, empowering organizations to build everything from simple IoT point solution to composite IoT business solution in days or weeks instead of months.

Jesse Shiah, Co-founder and CEO - AgilePoint, Inc.

4:00 pm – Track 1
Analysis of Security Requirements for 5G
Security and privacy are the fundamental elements of mobile networks today.  This requirement will only increase as we transition to 5G.  This session will discuss the four main 5G areas as defined by 3GPP, Massive IoT, Critical Communications, Enhanced Mobile Broadband & Network Operations.  It will discuss each segment’s security requirements and discuss a hardware based solution.  Background for this session will come from SIMalliance’s whitepaper, An analysis of the security needs of the 5G market, of which Morpho was a key contributor.

Nicholas Vondrak, North American Marketing Manager - Safran Identity & Security

Track 2
How Wearables Companies Need to Evolve and Monetize After the Hardware Sale
In the rush to be the next wearable of choice for consumers, the focus is understandably on the hardware itself. However as seen with Fitbit and GoPro, the next challenge is always how to create an ecosystem of partners and innovation around the devices. Wearables manufacturers know that they need to create an environment where consumers spend money on services and content long after the sale of the device itself. And they know that to attract developers they need to create a profitable ecosystem where innovation is rewarded.

This presentation will look at parallels in other industries like mobile, where for years the cellphone has been given away as long as the consumer signs up for a monthly plan, and where value-added services and upsells are the norm. The cellphone is a means to an end for the carriers, and in the future the wearable will be the same. It will merely be a conduit towards consumer engagement and monetization.

Terry Hughes Managing Director – AppCarousel

4:30 pm – Track 1
Navigating the IoT Universe
Ever since the potential of connecting devices to the Internet was realized, the challenge for applications developers has been how to make sense of a very fragmented market, especially in terms of the lack of standardization in hardware, software and connectivity. Although the opportunity for generating revenue is enormous, the market has become so complex that it is difficult to see how it will evolve in the future. For many, the overriding issue is how to take advantage of this revenue opportunity in the long term.

This presentation will address this dilemma and help to answer some pertinent questions being asked in the industry right now, for example; how much of the predicted growth is hype and how much represents a genuine opportunity? Where is the IoT market going and how can developers make decisions now about what solutions will be profitable in the future? What tools exist to help developers plan the design of their solutions and choose the right partners to work with? What business models should developers consider to maximize long term profits? Where do the real revenue opportunities lie now and over the next few years? These and other questions will be addressed during the presentation.

Sam Colley, CEO – Podsystem Inc. 

 

Track 2
Key Marketing Strategies to Bring an IOT Product to Market Successfully
Identifying your market is critical for your IOT business success. One of the top three reasons early stage tech companies fail is due to an inability to understand the product’s market needs.  What are the key considerations to bringing your product to market?  Analyzing your target market and segmenting their needs can help you define your products, services, and solutions that resonate with your customers.

This talk will outline these key marketing strategies and tactical approaches to answer critical questions on:

  • How to segment and to identify how big is your target market?
  • How and where do you want to grow?
  • What are your barriers to entry?
  • Why is your product better?
  • What’s your value proposition?

You’ll walk away with better insights into who you’re targeting and how to reach team most effectively.

 Kim Chau, VP of Marketing – Product Creation Studio

5:00 pm – Cocktail Reception in the Exhibit Hall

November 4th, 2016 Program

8:00 am – Keynote Presentation
Next Generation Security for Next Generation IoT Platforms
Architects, product engineers, and suppliers are all working to design in security that can detect, protect, and mitigate current and emerging threats. While networking and increased computational capability increase the threat level, distributed security intelligence and layers of defenses that are intentional and proactive will help secure from chip to cloud.

These tools and technologies can be designed in, but they also need to comprehend the operational phase of the mobile IoT platform, which may last for decades. We need a new approach that can adapt to new threat models via advanced software techniques.  It’s not just a matter of capabilities like firmware and software patches, over-the-air updates, and other countermeasures to quickly close vulnerabilities and reduce the cost of compromise. It also means developing new machine learning based approaches that encompass all of the stakeholders.

Lorie Wigle, VP and GM of IOT Security Solutions - Intel Security

9:00 am – Featured Presentation
The “Five Forces” of IoT: How the IoT Transforms Competition and Companies
For 30 years, Prof. Michael E. Porter has been a leading thinker on business strategy and the nature of competition. He’s put his intellectual muscle against the IoT and co-authored two in depth articles in the Harvard Business Review. Get the key concepts in a mini-MBA format presentation from a member of the research team that helped develop this seminal article. Learn how the IoT is transforming organizational structures, value creation and the very nature of competition.

Eric Snow, Senior Vice President – PTC

10:00 am – Networking Break in Exhibit Hall

10:30 am – Track 1
Using Mobile to Connect Trillions of Disposable Goods
The Internet of Things is set to dramatically improve the way we interact with objects and products – as long as we deploy cost-effective, scalable solutions to embed intelligence and connectivity into everyday items.

In this session Patricia Britton of Thin Film will discuss disposable, printed electronic sensors and how this technology will transform the healthcare and food industries by bringing connectivity to everyday items. Attendees will learn about the various advancements in printed disposable electronics and how producers, retailers, distributors and consumers will be able to make smarter decisions while improving business performance, supply chain efficiency and consumer safety.

Patricia Britton, VP Sales and Business Development, North America  -
Thin Film Electronics ASA

Track 2
All Your Things Are Belong to Us or The Internet of Hackable Things
Hackers rejoice, we live in a time when vulnerable networked devices are on the rise and invading all aspects of life. It’s never been so easy to gain access to private networks or generally wreak havoc through these IoT devices.

In this session I’m going to demonstrate some examples of what we as hackers don’t want IoT developers to implement when creating their next “smart” device. This will be a basic overview of hardware and software security layer options to consider during development. There will also be particular focus on the negative affect of certain security measures.

I’ll cover the vulnerabilities inherent in M2M network technologies (e.g. Ethernet, WiFi, Bluetooth) and protocols (e.g. ZigBee, MQTT). I’ll review how encryption can be implemented even for the smallest microcontroller (e.g. Arduino/atmega). The largest portion of the presentation will cover the software in your IoT platform and gateway and how it can make or break the security for all of your devices.

Anthony Canterbury, Software Engineer and IoT Developer – Cincom Systems

11:00 am – Track 1
Creating an IoT Ecosystem
Over the next 30 years, IoT will connect almost every inanimate object in our environments. Dr. Walsh would like to address how this revolution will demand companies develop new and better business models for the IoT ecosystem.

For network carriers and device manufacturers this will present a huge opportunity for them to be more vital to consumers than ever and have access to greater customer data . But with so many possibilities for consumers and companies, how do we make sure we are using all the data we have correctly and responsibly for everyone? How do we build the best products that customers don’t even know they want while not being an intrusive presence?

Dr. Walsh currently works with Samsung, and Panasonic on a variety of projects around this and would be able to draw from this experience to discuss how IoT can and will change existing business models in the future.

Dr. Jim Walsh, Chief Technology Officer - GlobalLogic

Track 2
Securing the Internet of Things: Defense-in-Depth
The Internet of Things offers an environment rife with security holes. In order to sustain and reap the benefits of IoT, security must be part of design DNA and not an afterthought. This discussion will take a 360 degree approach to learning how to protect your IoT networks and devices from threats, including:

  • Prevent: Implement best practices with authentication, authorization, access Control, site-to-site VPN and a dedicated IP address and APN for enterprise traffic isolation
  • Shield: Go beyond best practices by disabling Internet traffic and direct thing-to-thing communication, SMS only via secure APIs, and restrict network access to/from the enterprise via authorized sites/servers
  • Detect: Monitor “things” usage to benchmark normal access, and to detect unauthorized access based on sources
  • Respond: Contain a breach by quarantining the affected devices and fix via remote device management

Amit Khetawat, Director, Product Management - Aeris

11:30 am – Track 1
While Building an IoT Solution Don’t Forget Your Supply Chains
IoT solutions require system solutions (combinations of sensors, software, servers, networks and cloud connectivity along with big data systems) and a solutions perspective.  IoT end markets and solutions have a significant impact on the ability to plan and deliver the hardware and devices that are incorporated into your solution.

There are two ways to deliver these system solutions to end customers: 1) sell components that integrate based upon a standard; or 2) as part of a turnkey solution.  While enthusiasts and experts love building their own solutions, many markets will prefer turnkey solutions that are provided as a working bundle.  For this reason, IoT is a market that will be driven by systems integrators and turnkey solution providers.

All of the component systems required for the IoT solutions will be dependent on the ability for the supply chain to deliver the needed solution components.  There are challenges introduced into the supply chain by IoT that the hardware / device / sensor providers will need to wrestle with.  It is helpful to understand the impact of demand planning and supply chain communication to anticipate your ability to deliver your full solutions to your customers.

Bob Scarborough, CEO - Tensoft, Inc.

Track 2
Scalable Security Solutions for IoT Sensors, Gateways and Everything in Between
Traditionally security solutions do not scale to meet the demands of sensors and other small footprint IoT devices. Furthermore, the Things in the IoT are often deployed outside of the traditional security perimeter. Even though many corporate PCs have long been on “secure” networks, they still have firewalls and endpoint security inside. IoT connected machines and devices need the same protection.

As connected devices proliferate, the risks associated with a successful cyber attack increase. It is critical to include protection, visibility, situational awareness, and auditability inside these devices to ensure their security and comply with current and emerging regulations.

We will discuss what security means for IoT sensors and devices, cyber threats for IoT devices, scalable security solutions for IoT devices, and how this aligns with the enterprise security strategy. Together these methods can be used to help create the Internet of Secure Things.

Alan Grau, President and Co-Founder – Icon Labs

12:00 pm – Networking Lunch 

1:00 pm – Track 1
IoT Enabled Intelligent Cars
This session will explore IoT technologies for data management in context of a real world example. Projects are underway to research, develop and enhance systems and inject intelligence into normal objects. In this new era, data management and connectivity play an important role as manufacturers equip themselves with the right technologies to operate with or without internet access.

We have developed a demonstration program to simulate an IoT enabled vehicle. With solar powered cars and autonomous vehicles rapidly becoming a reality, automobile manufacturers need a solid foundation of on-board computer technologies to harness the continuous stream of information produced by high-tech components. Raw data is used by the vehicle to make intelligent decisions and provide passengers with instant feedback. Securely sharing the same data with cloud services makes it possible to visualize trends, improve fleet maintenance and pave the way to connected mobility.

Sasan Montaseri, President and Founder – ITTIA

Track 2
Cybersecurity Liability Implications for IoT + Cloud
With the IoT + Cloud push toward global ecosystem-level offerings, this potentially exposes limitations in governance, information protection, business decisions and practical operations related to cyber liability implications. This presentation’s focus will be on due diligence considerations with specific practices and operations to reduce IoT + Cloud business risks. The speaker will address Total Economic Impact, hidden risks and benefits of IoT + Cloud efforts for organizational and business growth.

Maria Horton (CISSP, ISSMP, IAM) Founder and CEO – EmeSec Inc.

1:30 pm – Track 1
Strong Security Elements for IoT Manufacturing
Connecting technologies in new ways and deploying them in new cyber-physical environments extends the attack area in an ecosystems. Trends are also increasing for providers to leverage software-based mechanisms to enable features of their devices, leading to the question: How do you prevent counterfeiting and piracy of your product? At the same time, IoT products are on the development fast track and manufacturers are rushing to create exciting new smart devices with user experience in mind, not necessarily security. What is the best approach for manufacturers to integrate security into their products from the outset? This session takes a look at three security concerns that IoT developers need to address: authentication, privacy and integrity.

Nisarg Desai, Project Manager of IoT - GlobalSign

Track 2
Security in the IoT: Learning from the Mistakes of our Past
Due to the rapid growth of the IoT market, entrepreneurs and big businesses alike are bringing amazing innovations to market on a daily basis.  Unfortunately, the rush to be first to market could have disastrous consequences. Often times critical components, like security, hit the cutting room floor. One of the greatest lessons the dawn of the Internet age taught us is that security is of the utmost importance. It can’t be treated as an afterthought – it must be a consideration in every aspect of the development cycle. Calum’s session will explore the biggest security challenges the IoT faces today, tips on how to develop a secure connected product, and a discussion around the most important lessons history has taught us to ensure it doesn’t repeat itself.

Calum Barnes, Manager, IoT Products & Strategy – Xively by LogMeIn

2:00 pm - Track 1
Four Converging Problems Everyone in IoT Will Face
With billions of IoT devices coming online, there has been little discussion about the challenges IoT engineers will face in handling all the data that these devices generate. These challenges include:

  • Data Costs - The amount of data that will be generated by billions of IoT devices will dwarf anything we’ve seen on the Internet to date. And the types of networks becoming prevalent in IoT implementations have stringent limitations on the amount of data that can be sent.
  • Battery Life - Most IoT devices use batteries that might need to keep running for months or years. These devices are typically small, with space constraints that limit the size of batteries. As a result, preserving battery life becomes critical.
  • Operational Efficiency - IoT solutions often communicate over slower wireless networks. This means that more actionable data needs to be extracted faster.
  • Low-Power Networks - Today’s low-power WANs (LPWANs) run at extremely low data rates. These low data rates impose severe limits on the amount of data that can be communicated over a wireless network.

Overcoming these challenges means looking at reinventing data compression, thereby reducing the size and frequency of data transmissions to cut radio usage, optimizing data to overcome bandwidth, latency and power issues, and enabling devices to operate efficiently, regardless of network constraints.

Tom Hunt, CEO - WindSpring, Inc.

2:30 pm – Sessions TBA

3:00 pm – Conference Conclusion