Conference Program

Conference Program
The 2017 IoT North America Conference Program will be broken down into industry verticals for the IoT market. Drill down to the details of how to deploy IoT technologies in your specific application.

Big Data & AnalyticsIIoT/Industry 4.0Artificial IntelligenceNetworking
IoT SecuritySmart Home

Featured Presentations -
Getting Started on an IoT Journey
Sometimes the hype around billions of inter-connected IoT devices, robots, homes, cities and factories can sound overwhelming. It’s time to talk past the hype and laser focus on how to get started on your company’s own IoT journey

In this presentation, Cisco VP Maciej Kranz brings decades of experience with IoT – before it even became a name. Mr. Kranz will share both the vision for IoT and the detailed roadmap on how to get there: Build partner ecosystems, integrate technology with business operations, focus on real problems, form cross-functional teams, focus on service models, start with low-hanging fruit, and be serious about security. You will learn proven, practical steps needed to prepare, plan and implement IoT solutions in any industry.

Mr. Kranz will also draw on case studies in his forthcoming book, “Building the Internet of Things: Implement New Business Models, Disrupt Competitors, Transform Your Industry.”  The case studies will feature successful IoT implementations at companies such Ford Motors, Harley Davidson, and Stanley Black & Decker.

Maciej Kranz, Vice President, Corporate Strategic Innovation Group – Cisco Systems

2020: Life with 50 Billion Connected Devices
It’s a sunny March morning in 2023. 7:18 AM. You’re buttering your bagel and gulping your coffee.  You’re looking forward to your commute – you’ll do a conference call with your team.  You’re thankful you don’t have to actually drive, your car knows the way.  As you get into your car you are presented with an urgent message.  Your car has been immobilized and you need to pay 4 Bitcoin in ransom. You’re not going anywhere right now.

Learn from one of the foremost IoT thought leaders how a world of sensors, devices and machines everywhere, some we see, others we don’t, sending vast quantities of data, will affect our daily lives, change our behaviors, and influence our thoughts about innovation, convenience, security and privacy. We’ll examine a day in the life of a digital citizen in 2020 and identify the implications of a world where nearly everything is connected.

Three questions this session will answer:

  • What does a world of 50 billion connected devices look like?  What are all these devices, what are they doing and why?
  • What are some of the major ways society and interpersonal relations will change in a world where nearly everything is connected?
  • This world is coming – are we ready?  What are some of the implications of this onslaught of connectivity on issues like privacy and security?

Gary Davis, Chief Consumer Security Evangelist - Intel Security

Debunking the IoT Standards Myth
Many argue that the lack of industry-wide standards limits the mass-market adoption of IoT solutions. But they’re wrong.

As the leader of NGP’s Connected Enterprise IoT investments, Upal Basu can debunk this myth, and will share why he is adamant that, from railways and home video to telecoms and smart phone evolutions, standards driven by industry quickly emerged when the value of the solution became fully apparent. Once industry sees the customer demand, standards tend to coalesce relatively quickly – the same will happen with IoT. Upal will explain why companies driving tangible value for customers are already gaining traction, and the winners will shape the standards to their own needs rather than waiting passively for the industry to come together.

Upal Basu, Partner, Nokia Growth Partners

Monetization of IoT – New Business Models Bring new Challenges
Comparing IoT to the established world of mobile apps, the traditional models of one-time purchase of apps, subscriptions to services, and in-app purchases, are being replaced in IoT by real-time billing on demand, billing per transaction or per byte of big data, micro-payments, and the holy grail of data brokering where it’s the data (not the app) that’s valuable and can be sold and resold again. The key to successful monetization of IoT is understanding the ecosystems and the business benefits they derive. This presentation will analyze why IoT billing solutions need to be very different from everything we have seen before, the landscape of monetization providers, and some real use cases being deployed.

Colin Chong, Head of Product – AppDirect

Big Data, Data Analytics and Machine Learning -
Making Value Chains Smarter: Impacting Performance with IoT and Big Data
Enterprise data volume is concurrently estimated to grow 50X year-over-year between now and 2020. At the same time, more than 30 billion devices will be wirelessly connected to the Internet of Things by 2020.  IoT and Big Data presents both challenges and opportunities for companies and supply chains.

The use cases for IoT and Big Data in supply chain, product development and manufacturing are numerous – from sensing and shaping demand to better predictability in capturing production changes, monitoring environmental values among many other scenarios. How can you leverage IoT and big data to boost you companies performance? This session will discuss the impact, best practices and case studies on how leading companies are leveraging IoT & big data today across their supply chains to impact growth and performance.

Maha Muzumdar, VP, Industry Transformation, Cloud Business Group – Oracle

The Internet of Things is a Service Application
The relevant IoT discussion is not so much about sensors or about communication standards, the IoT is about data collection, analytics and self-learning systems that can quantify life. Real IoT applications for the consumer are “things like” lifestyle coaches, home butlers, caretakers, etc.: applications that produce value in our daily lives providing more security, more comfort, use less energy, cost less and bring peace of mind.

To be able to make better informed decisions more timely: this is how the IoT becomes a new source for wealth creation in our complex society and in our exciting lives.

Cees Links, General Manager of the Low Power Wireless Business Unit – Qorvo

The Role of the First Receiver in a Maturing IoT Market
While the data growth in IoT, and the overall growth in deployed IoT systems remains relatively small compared to almost any projection, the consensus is strong that data growth will be enormous. The key will be leveraging the underlying value of all of that data to translate into insight that begets action. The ultimate goal of IoT deployment will be to allow for leveraging the value of the data so the right data is delivered to the right constituent at the right time in the right way – as that is where the real and maximum value for companies will be derived.

This session will explore the notion of the First Receiver and how this technological advancement will provide the disruptive innovation that every executive should know in order to fully understand the opportunity as well as the practical execution considerations of leveraging IoT to the fullest. 

Don DeLoach, CEO and President – Infobright

The IoT Ecosystem: Think Beyond Connectivity
IoT is about so much more than connectivity. It’s about how the application of IoT data is going to change everything, from healthcare, to business productivity, to the way cities operate.

John Gardner is a lead investor at NGP, which is currently the largest fund ($350M) to focus specifically on IoT. He will discuss why applied machine learning is an essential component to success, and why solutions must be tailored to specific industries. Drawing from his IoT investment expertise, he will also discuss solution trends and his vision for the global proliferation of IoT.

John Gardner, Partner, Nokia Growth Partners

Giving Big Data and IoT a Place to Call Home
To quote the Chairman of Jive Software Tony Zingale: “We know more about what our high school girlfriends had for dinner, than what goes on in our organizations.” It’s a sad, but truthful reality.  Businesses have more than enough data to work with today thanks to the emergence of Big Data.

The big question about Big Data and its associated applications – IoT, predictive analytics, authoritative data, social feeds and the like – is how do we harness that information for business use? How do we do it quickly, effectively? Enter spatial technology. Often referred to Geographic Information Systems (GIS), spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. This presentation will take a closer look at the current state of spatial technology and articulate how it can connect the dots to bridge the gap between Big Data and IoT.

Bill Meehan, Director of Utility Solutions – Esri 

Industrial IoT/Industry 4.0 -
What Do Agricultural and IoT Have to do With Each Other?!
One of the global challenges facing our world is the fact that population growth will soon outpace food production.  It’s estimated that by 2050 the population will reach 9.7 Billion. To meet the food needs, global agriculture will need to increase by around 70 percent. Learn how Deere & Company is working to provide solutions to feed the world using IoT.

Using case studies and recent applications, this session will teach attendees about some of the common pitfalls found working in remote environments and explain why connectivity is critical. This will help bring to life what IoT enablement means for the agriculture market. Attendees will gain a deeper understanding of the business case for using IoT and will understand that IoT in global rural areas is critical.

Kevin Hendress, Technology Architect - Deere & Company 

How IIOT has Changed the Current Industrial Landscape
We are looking towards a future where there will not just be smart factories but altogether smarter manufacturing. With machines generating enormous amounts of data, Industry 4.0 is well on its way.  There is a need to create Intelligence that understands this data and can react to it.  With specified rules running on real time data, anomalies can be identified and reported.  The reported anomalies needs to be studied by a system that can improve itself. This is where Artificial Intelligence, Machine Learning, and Data Science meets Industrial IOT.  By applying the latest technologies to the machines and the data they generate, they can not only be smarter but more proficient in areas like Product Design, Production, Supply chain to impact  the entire lifecycle of a manufactured product.

Chad Dirks, Engagement Director – Softweb Solutions

How the Third Wave of Internet Evolution Will Affect Manufacturing Automation Systems
The first Internet wave constructed the infrastructure that forms the Internet we enjoy today. Websites, once new and novel, became mandatory. In the second Internet wave, apps and cloud computing became integral to our work and home lives. Global apps like Facebook, Uber, Pandora, Twitter and became prominent. Other apps were created to serve employees, suppliers, and customers. Now we are on the cusp of a third Internet wave – pervasive, integrated, seamless connectivity that will again change how we work and how we live.

This presentation will examine how that third Internet wave, the industrial Internet of Things, will transform manufacturing automation. It will examine the changing requirements of manufacturing systems, the third wave technologies that can meet these requirements and how automation integrators can profit from this evolution.

John Rinaldi, Chief Strategist and CEO – Real Time Automation

Transforming Manufacturing Technologies with New IIoT Technologies: Are You Engaged?
In this session will learn the playbook for thriving in an IoT world through manufacturing transformation. As companies grapple with ways to effectively deploy and scale new technologies that leverage industrial connectivity, clear pathways are emerging for the creation value from the massive amounts of data produced on the shop floor. The session will describe how companies can: make decisions quickly by connecting and unifying different sources internal and external data in real-time; streamline their operations and continuously innovate through predictive analytics, digital processes, and an augmented reality guided workforce; and achieve optimal execution through continuous, closed-loop process improvement and adaptive operations.

 Howard Heppelmann, GM,  IoT Manufacturing Solutions – PTC

 Sensor-2-Server: Execute Locally, Communicate Globally
The idea of comparing data in motion (at the sensor level) to data at rest (in a big data server warehouse) with predictive analytics in the cloud is very appealing to many industrial customers. However, the problem is access to that data in motion at the sensor location.

The increasing shift toward IIoT tends to bring up a lot of questions about the continued value of SCADA systems that have traditionally served as the driver for monitoring and control in industrial markets. Although OT and IT are beginning to converge, there is still high demand for SCADA data. However, new technology offers the opportunity for data to be used in ways that were previously not possible, such as predictive analytics. This doesn’t make SCADA obsolete, as many operators are using it and will continue to employ it.

 Scott Allen, CMO – FreeWave Technologies

Artificial Intelligence and Machine Learning -
The Rise of the Machine – is Skynet Closer Than Ever?
Skynet? Really? How close are we to self aware, self replicating machines? In this fun session learn some of what computers can do and what they can’t. You think you know. You may be surprised.

The emerging focus on  Cognitive computing, general AI, Computer Vision, Internet of Things, etc. signpost the way to new opportunities and new challenges for computers and humans alike. We decided to see how far we could get in building our own version of an all powerful controlling entity.

In this session we’ll cover how we did it, what we learned and answer those important questions like: “Can we build a Skynet yet?”, “Can my computer be my best friend?”,  ”Will I ever able to program without a keyboard?”,  ”Can a  computer read my mind?” and the all important “will drones be able to deliver beer at the right temperature?”

Steve Poole, Lead Engineer, Cloud and Development Platforms – IBM
Luc Desrosiers, Certified IT Architect – IBM

AI Testing for Today’s IoT Digital Ecosystem
Digital experiences are no longer confined to the desktop or mobile device. Artificial intelligence (AI) products will represent a big part of the IoT digital ecosystem. As the increasingly connected digital landscape continues to expand, especially as new AI products hit the market, the ability to research, test, and get user feedback about digital experiences from people who mirror a company’s end user base is the key for brands to gain a major competitive advantage over those who don’t.

This session will explore how the leading AI players are making sure their development teams are designing high-quality AI-based interfaces that consumers demand and expect, as well as the best practices to solve typical AI usability testing challenges that developers need to know about.

Rahul Shah, Senior VP of Global Delivery & Customer Success – Applause

Enabling a Serendipitous Internet of Things With Distributed Ledgers
This session will describe a serendipitous IoT; one with outcomes that are both beneficial yet unforeseen. These interactions will act on the users behalf with some level of autonomy and will demand much more flexibility and dynamicity than the current model of prior configuration and static interactions. A serendipitous IoT demands dynamics in how devices discover each other, validate their authenticity, determine what data and services they can provide, and even negotiate payment for those services.

Attendees will explore how placing a representation of a device – its features and services, its capabilities and constraints – on a distributed ledger might enable such a flexible interaction model. The session will conclude with the speaker exploring the implications of devices writing and reading to a distributed ledger in real-time on the performance requirements of that ledger (e.g. the consensus protocol, fairness, etc.), and whether current blockchains can be expected to meet those requirements.

Paul Madsen, Principal Technical Architect – Ping Identity

The Future of IoT in an AI World
The adoption of IoT devices is creating an environment where large amounts of big data is being generated.  The emerging movement will be taking this Big Data and using it to drive AI (Artificial Intelligence) using the inputs from IoT devices and the AI to automatically drive events and decisions at both a system level and a regional level.  What are the possibilities?  This session will address some of the challenges that need to be addressed in the IoT world and will help educate the attendee as to the current state of IOT and AI coming together and further explore some of the potential possibilities for the future.

Paul Williams, Vice President of Solutions – Control4

Networking and Connectivity -
Predictive and Dynamically Adaptive Solution for Cost Effective IoT Connectivity
It is expected that with 20 – 50 billion devices by 2020, more than 50% of the traffic will be from “Things”. This will have a big impact on the wireless ecosystem. IoT services are likely to be a key driver for further growth in cellular.

Deployment of these IoT devices is very likely to ride on the same wireless network deployed for traditional non-IoT broadband traffic. Scale and diversity of IoT devices will inevitably put a strain on the network and add varying, uncontrolled demands on wireless networks. The main concern for operators deploying IoT today is the impact to user experience and KPI degradation to non-IoT traffic when the IoT traffic explodes.

Attendees at this session will learn the optimal Access/Path selection for handling IoT traffic while maximizing network resource usage and ensuring quality of experience for legacy traffic.

Padma Sudarsan, Director and Domain Leader, Mobile Network Chief Technology Office – Nokia
Subhasis Laha, Director and Domain Leader, Mobile Networks Chief Technology Office –  Nokia 

Connecting the Industrial IoT
Despite the hype around consumer IoT applications, most analysts agree that the future potential of the IoT is not in the consumer market but in the business market. More specifically, the industrial/manufacturing sector.  The IoT has the possibility to completely disrupt the industrial market; streamlining processes, ramping up productivity, boosting efficiency and generating new revenue streams.

However, there are many aspects of IoT application design that are unique to this sector, not least the extreme conditions that can be created by industrial processes, the complexities caused by different elements of the supply chain and the disparate location of manufacturing premises. Added to this, traditional business models and information silos will need to be drastically altered. This presentation will discuss the keys to success for Industrial IoT solutions and explain which aspects need to be addressed at the design stage to ensure longevity of the application in the field.

Sam Colley, CEO – Podsystem, Inc.

The Rise of eSIM for IoT, M2M and Wearables in Consumer Devices
The concept of the embedded SIM (eSIM) card for mobile devices has not been completely defined nor truly implemented yet in a big way on M2M and IoT Devices, yet the potential uptake in usage is staggering.  Imagine Smart City meters, connected cars with 3/4G LTE WWAN wireless connectivity all requiring an eSIM.

The key to understanding eSIM is to understand Multi-IMSI - International Mobile Subscriber Identity and operator profiles, which allows for the MNO’s (wireless operator) profile to be purchased as part of a data plan for downloading over the air and on the fly where only one subscriber can be present (only one enabled profile) at one time but a cleaver way to avoid incurring heavy roaming fees for out of state or country data usage on the device (especially in another country). We will explain how the wearables industry will explode in 2016 for eSIM products on Smartphones, Tablet PCs, Smart watch wrist bands and even more.  Karl’s presentation will focus on both Hard and Software for connected wearables.

Karl J. Weaver, OEM Biz Dev Director – Oasis Smart SIM

Increasing Connectivity for Mobile Circumstances in Distributed Enterprises

The next step in IoT is to increase connectivity for mobile circumstances. For distributed enterprises to take maximum advantage of IoT solutions, it is critical to have in place highly reliable, high-bandwidth mobile connectivity in a dramatically smaller form factor, combined with the flexibility to perform diagnostics and analytics anywhere decision makers want, such as on-site or at a central location.

Fog computing is the key to optimizing mobile connectivity for distributed enterprises. Fog computing extends cloud computing to the edge of network, helping end devices and data centers work together better. When relaying data via LTE, mobile enterprises present a challenge for off-loading or storing mass amounts of data in an efficient, cost effective way. In order to keep costs down and increase efficiency and impact, the ability to run applications directly on the connecting gateway and process data on-site is essential.

Jessica Sweeney, Senior Director of Market and Product Strategy – LILEE Systems

IoT Security -
IoT: A Great Opportunity, but Security Issues Hinder Adoption
The emerging IoT trend presets many stakeholders a great opportunity to thrive, however, the burgeoning number of connected devices creates new security threat vectors that are already being exploited by bad actors. In this presentation, the audience will hear how the market is growing for IoT devices, services, and applications, but also the dangers from a security standpoint.

Neil Strother, Principal Research Analyst - Navigant Research

IoT Security: Smarter Systems Engineering Must Compensate for Our
It’s fascinating to read the accounts of IoT related hacks, especially those that make headlines in both the popular press and the tech blogs. Casual readers might conclude that opening the door to IoT connected devices means hackers will have access to their cars, their security systems and even literally their front doors. Reading a bit more deeply into these stories reveals that, as Cisco has said, “employees are the weak link.”

Systems engineering and its cousin systems thinking suggest a path to an answer. If we understand that both intentional hackers and unintentional misbehaving humans are part of the system, then thought can be given to making the system resilient and responsive, even to threats that don’t look like threats. As we like to say in systems thinking, “the system is always working,” that is, the system in its entirety is working as we have designed and built it. This session will explore ways to use these ideas in designing IoT systems.

Barclay R. Brown, Ph.D., ESEP, Global Solution Executive – IBM Watson IoT

Protecting Industrial Internet of Things Endpoints
An attack to an Industrial Internet of Things system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent. An endpoint is a component that has an interface for network communication and the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied.

There are many security threats and vulnerabilities that can be exploited in an IIoT endpoint and developers must be aware of the possibilities. Attack points exist in hardware components, the boot process, operating system, applications, APIs, and many other areas. Endpoint security solutions must address data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection.

Marcellus Buchheit, President and CEO – Wibu-Systems USA

Crypto Strategies for IoT Devices
Cryptography is critical to the protection of IoT data, systems, and devices; but it is also the aspect of IoT that is most often done improperly. This has led to everything from IoT botnets to data theft, and spawned an entire fledgling market for cryptographic APIs, libraries, and systems using everything from the blockchain to specialized hardware.

In this presentation, we will explore the basic concepts of cryptography, and demystify the concepts that the cybersecurity industry too often over-complicates. We will erase the fear, uncertainty, and doubt when it comes to choosing algorithms and methods, and offer some simple solutions for properly implementing cryptography in devices constrained by strict size, weight, and power limitations. Whether you are choosing from the vast array of commercial and open source products or looking to implement encryption yourself, this presentation will give you all the knowledge you need to make the right choices.

Eric Uner, CTO – Redwall Technologies

Hardware vs. Software security – What is Right for my IoT Device
Engineers developing IoT and IIoT devices have a wide range of choices for adding security to their device. Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates and security management.

This presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied in order to secure IoT devices.  Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations.

Alan Grau, President and Co-Founder – Icon Labs

IoT Driving the Need for More Secure Big Data Analytics
Cyberattack methods are increasingly sophisticated. Of great concern is that the IoT ecosystem expands this attack surface – not only the back-end, but also mobile applications and connected devices.  The impact of a successful data breach includes damage to the mobile operator’s brand and reputation, loss of sensitive customer data and potential physical damage to the individual person.

Data privacy as well as security needs to be at the forefront of strategy and architectural considerations, in commissioning any new enterprise application processing sensitive data, and in implementing new IoT initiatives.

‘Privacy by Design’ has emerged as an essential best practice in meeting security and privacy compliance mandates. This embodies data-centric security to neutralize sensitive data in use, in motion, as well as at rest; software development lifecycle security and automated application vulnerability detection during release and operation.

Reiner Kappenberger, Global Product Management - HPE Security

Smart Home -
Chasing Changing IoT Standards Without a Crystal Ball
Less than two years ago, manufacturers wanted their connected consumer products to “work with Nest.” A few months later, they wanted their products to work with Apple Homekit. And yet again, before their designs were completed, they had switched to wanting their product to work with Amazon’s Alexa.

Combining improvements in speech, artificial intelligence and microphone technology, voice-activated “conversational systems” like Alexa and Google Assistant are an exciting shift away from mobile screen-and-keyboard-controlled consumer IoT product interfaces. But they way things seem to be going,  interactive virtual augmented reality may be the next big thing.

In light of constantly changing standards, this presentation will cover:

  • Forces affecting widespread consumer adoption of connected products
  • How conversational systems will drive the next phase of product design
  • How to ensure that consumer products are flexible enough to adapt to changing standards and new directions

Oliver Cockcroft, Product Architect - Ayla Networks

As IoT in the Consumer Sector Experiences Wireless Crowding, are Backbones the Key to its Survival?
Broadband carriers are increasingly delivering ultra-broadband services of 100 Mbps to a Gigabit to the home. But are in-home networks able to keep up? Distributing high bandwidth entertainment applications seamlessly throughout every corner of the home is now the expectation of the consumer. G.hn, a multi-medium wired solution, could be the key to securing a fast, simple, stable and secure means to connect the explosive number of devices and services being installed by consumers.

Donna Yasay will discuss how G.hn is the only medium that can fulfil the needs of distributing the upcoming 10 Gb broadband required by carrier services to meet the demands of consumers. She will expand on how G.hn can reliably deliver wireless video throughout the home in the home’s existing infrastructure; over powerline, coax, phoneline or Passive Optical Fiber (POF) with the lowest latency required to deliver a seamless in-home ultra-broadband experience.

Donna Yasay, President – HomeGrid Forum

IoT Adoption and Security Accountability in the Smart Home
For many years, the Smart Home was seen as limited to enthusiasts who had the money to afford IoT devices and were based in regions with the infrastructure and availability of gadgets to support the craze.  But with the rise of IOT popularity and maturity, the market has since shifted.  This raises a key question when it comes to IOT security: Who is accountable?

There is no unified regulating body to instill functional and security standards on device manufacturers. Users have the freedom to decide which IoT devices to introduce to their homes, but they don’t always understand how their personal privacy or safety may be effected. As IoT branches out from user homes and into the city, users become significantly more powerless. Will the burden of security fall to government?  This session will include an interactive discussion around the security considerations of smart home adoption trends and review the responsibilities of manufacturers, municipalities, consumers and the security community.

Jon Clay, Sr. Manger Global Threat Communications - Trend Micro

Home 2.0: The Impact of Home Assistants on the Connected Smart Home Landscape
Home assistants (HAs) can change this and help catapult penetration of connected smart devices into millions of homes by providing a brain and body to represent home as we know it, enabling humans to experience an easier and more pleasant interaction with their home. Furthermore, HAs will deliver a new platform for 3rd party application development, and will be in position to become the next generation of revolutionary platforms after smart phones and smart watches.

However, the human machine interaction (HMI) of HAs is critical to the success or failure of the platform. This presentation will provide an overview of the smart integration of speech and machine vision along with smart segmentation of embedded and cloud services, in addition to usability cases that will provide the greatest benefit to consumers.

Mesut Eraslan, Senior Director of Design and Engineering – Flex