Conference Program

Featured Presentations

Exploring Open Big Data
This talk is all about using cloud services to investigate big data hypotheses in the cloud. It’ll be demo heavy, focusing on digging around in huge open data sets. It’ll be an interactive talk that will use audience input to guide the investigations.

The Internet of Things works like this: 1. Collect all the data.  2. ??? 3. Useful insights about the world.  Our job is to fill in step 2, and turn tons of raw data into useful insights. This does not always go as planned.  How many times have you spent a week building a data pipeline and pretty graph only to discover that your new graph isn’t useful?

In this talk Jenny Tong, a Developer Advocate on Google Cloud Platform, will explore huge open data sets. She’ll drill into Wikipedia logs, GDELT news data, and global weather. You’ll leave knowing how to use cloud services like BigQuery to validate your big data hypotheses before writing a bunch of code.

Jenny Tong, Developer Advocate on Google Cloud Platform – Google

Relational Databases in a Ephemeral World
SQL and relational databases management systems have been having a rough time recently with NoSQL and Big Data.  But the RDMS vendors have not been sleeping.  This session will cover how new features are being added to traditional databases to provide for the three Vs of big data — Volume, velocity, and variety.  Maybe you do not need to buy new server farms or hire additional staff but upgrading to new versions of existing databases and exploiting new features.  See how you can have SQL and NoSQL wit volumes of data you never thought possible.

David Stokes, MySQL Community Manager – Oracle

Transformational Characteristics of IoT Solutions for Enterprises
Enterprises across the globe are looking to Internet of Things solutions to gain competitive advantage for their products and services. Increasingly, however, enterprises are deploying IoT solutions to impact multiple facets of their organizations, including operations, logistics, manufacturing, product management and design. This presentation will look at top trends in enterprise IoT evolution and how these initiatives are driving real ROI, operational benefits and better engagement with customers. Machina Research will also highlight their recommendations for enterprise IoT strategies, tactics and architecture and how enterprises can leverage these approaches to achieve new product and service designs in key verticals as well as utilize IoT data to transform their businesses and generate new business models.

Andy Castonguay, Principal Analyst – Machina Research

Mapping Your Connected Journey to ROI
A successful connected journey must be mapped to ROI. Through this presentation, we will look the leading use cases, based on personal experience, of companies that have gained a competitive edges via IoT. Using these use cases, you will discover how you can validate ROI and capture new opportunities more quickly in the market. And, in parallel, ensure that the essential elements are in place for you to continue to grow and compete in our connected world.

Questions to be answered:

  • What approaches will allow you to validate IoT solutions and generate ROI out-of-the-gate?
  • As companies are running towards IoT, are they overlooking essential elements to scale?
  •  What are the top use cases where companies have delivered ROI via IOT?

Raj Paul, Vice President of Automotive and Emerging Technologies –  Lochbridge 

Big Data Sessions

Big Data: Big Opportunity, Big Headaches
Big Data is the rage in the marketplace with lots of potential to solve a myriad of customer and corporate issues.  With this opportunity comes a new set of issues around security and privacy.  The more data we have and want to use means more potential for the bad guys to attempt to harvest that same data for criminal activity.  In this session, you will discover the latest strategies for monitoring Big Data usage and implementing controls to ensure your sensitive data is not exploited.

Andy Land, Program Director, Security Systems – IBM

The Market Drivers Influencing IoT Deployment Architectures
The majority of IoT projects in production, or even most simply launched and underway, are primarily generating small amounts of data and exist in closed-loop message response silos. These systems can be compelling in their own right, but are just a glimpse of where the market is headed, both in terms of project and data volumes and complexity.

As the momentum builds with more and more initiatives moving to production, the origin of the messages, the amount of corresponding data, and the need to leverage that data at all points in the ecosystem will see increasing attention. This will give rise to an increased emphasis on deployment architectures that include multi-tiered edge processing and careful considerations about leveraging the utility value of IoT data in combination with other external data sources at the point of the first receiver, as well as subsequent points both within and beyond the originating organization.

In this presentation, Don DeLoach will explore the likely evolution of IoT deployment architectures and the market drivers that will influence this evolution, such as the need for users of IoT systems to retain and leverage that data on a broader scale both internally and externally, as well as the opportunities that will unfold as a result.

Don DeLoach, President and CEO – Infobright

How GSA is Using Data Analytics to Drive Operational Excellence
The US General Services Administration (GSA) is responsible for delivering the best value in real estate, acquisition and technology services to government. This presentation will cover three case studies to illustrate how an information-centric approach using Big Data and analytics has helped GSA and other federal agencies to become more transparent and gain operational efficiency. Two case studies will illustrate how the federal government is using analytics to better serve the American people. The third case study will explain how GSA uses analytics, both real time and predictive to drive down energy costs and meet the agency’s sustainability goals.

Dr. Ann Kalayil, Regional Administrator, GSA Great Lakes Region

Establishing a Secure Data Management Foundation to Enable Predictive Analytics for Smarter Operations
This presentation will cover how collecting and storing information in real-time for analysis and reporting provides organizations the insights required to make smarter decisions. Using a case study from Duke Energy as an example, the session will explain the advantages of using secure centralized data management software, including the ability for personnel across the organization to easily access and share data, onsite or remotely. This session will discuss software solutions that handle data collection, storage, archival, analysis, alarming and reporting, across multiple locations and assets, allowing a holistic view of operations.

We will also explain how a data management infrastructure provides the foundation for predictive asset analytics software to achieve the next level of operational efficiency and make the most of the increasing amount of information available. Predictive analytics software helps organizations avoid equipment failure and reduce unscheduled downtime while increasing reliability and ultimately controlling costs. Cloud-based deployment models for remote monitoring will also be discussed.

Sean Gregerson, Director – Schneider Electric

On-board IoT: Moving Intelligence to the Machine
Companies leveraging IoT cannot afford to wait for a machine’s data to be sent to the cloud, analyzed, and sent back to the machine for action. Effective IoT solutions implement analytics at the machine level to keep pace with the speed of operations.

At the machine level, the benefit is cloud assistance and on-board analytics. At a cloud level, companies leveraging IoT can build better predictive capabilities by aggregating machine-level data. Collecting this granular level information across an entire fleet allows a company to keep pulse on the condition of its assets and maintain an application view of the system.

This session focuses on the opportunities and benefits of machine-level IoT that push the intelligence to the asset and the field, enable asset-to-asset communication, and in turn, optimize fleets and systems. This presentation will also discuss industry trends for a number of industrial applications and emerging interoperability concepts.

Brad Nicholas, Lead IoT Architect – Uptake

IoT Security Sessions

Securing IoT: Think Outside the Wall
Most of the devices in the Internet of Things (IoT) reside outside of your security wall. Some, such as mobile point-of-sale terminals and other publicly accessible devices, are outside because they could be a gateway for malicious attacks. Others, such as sensors and remote monitors, may be too distant to include inside. And some, such as medical devices and other specialized tools, may be outside of IT’s sphere. However, all of these devices still need to be protected.

With little or no local storage, IoT devices are heavily dependent on communications, so securing the communications path is as important as hardening the device. Protecting the IoT is not like protecting a data center. Securing the IoT requires looking at the whole ecosystem, not just individual points and devices. From silicon to software and from platforms to management, industry specialists must be able to incorporate these tools into their unique solutions, addressing the specific needs of their target markets. Best practices demand that we not only harden the devices, but also secure the communications and monitor and manage the security state.  Most important, we need to remember that by protecting the data, we are protecting the privacy of our customers, colleagues, neighbors, friends, and families.

Scott Montgomery, Vice President & Chief Technical Strategist - Intel Security Group

How Secure is Smart?
As ‘smart’ penetrate daily lives, the constant question remains, “how much security do I really need?” Following the evolution of smartphones, the consumer electronic industry is experiencing similar progress in almost every electronic device in homes today. From televisions to coffee pots, all are being replaced by “smart” alternatives.  The increase of connected and smart end-point devices, mean more exchange of data and vast amounts of vulnerable data means more security risks.

The growing concerns over privacy protection and breach of personalized data has sparked controversy, debate and discussion. This presentation will explore the changing security trends introduced by IoT, risks consumers face as devices become more connected and how companies, technologists and government can work together to protect the consumer.

Asit Goel, VP and General Manager of Secure Monitoring and Control – NXP 

Preserving Security and Privacy in IoT Big Data Analytics Solutions
Although Big Data Analytics solutions will allow organizations to turn data into actionable knowledge based on “connecting the dots” in various patterns of the data and aggregation of device data with other related data sets, security and privacy concerns are growing.

Organizations collecting information face challenges, as most of today’s analytics solutions were not designed with security in mind, because there are a growing number of laws and regulations aimed at preserving data privacy, and because there are often unanticipated side-effects when combining data sets from various devices and information systems that threaten the disclosure of sensitive information.

This presentation will focus on the challenges, use cases, and practical real-world solutions related to securing and preserving privacy, addressing authorization, differential privacy, and more. We will look at real-world examples of security and privacy “gone bad”, and we will offer guidance and best practices.

Kevin Smith, Chief Security Architect – Tridium, a unit of Honeywell

IoT Attack Modeling
Too many IoT vendors focus their security efforts on encryption, authentication and fine-grained, least-privilege authorization. Such products are often vulnerable to common attack models, such as platform attacks on operating systems and communications stacks. Why try to break a gazillion-bit PKI certificate, when a buffer-overflow attack lets an attacker into the device without a key or a password?

Risk assessments are equally murky. “We have security covered” and “a live penetration test on this network is too dangerous” cannot both be true. Attack modeling connects common attack techniques to defensive capabilities. Attack modeling develops a representative set of high-impact attacks and draws a line through them called the design basis threat. Attacks below the line are the ones we have a high degree of confidence of defeating.Attacks above the line we have a lower degree of confidence of defeating.

Practice has proven that senior decision-makers understand attacks better than they do made-up attack probabilities, or qualitative attack scores. With attack modeling, senior decision-makers can be asked if the line is drawn in the right location, and if not where they want the security team to draw the line.

Andrew Ginter, VP of Industrial Security – Waterfall Security

Integrity Protection for Embedded Systems
Software for embedded systems is based increasingly upon open system platforms, such as Linux Embedded, VxWorks, Windows Embedded, QNX and many others. In addition to powerful core functionality, one of the main benefits of using open platforms is their implementation of standardized interfaces for loading code or calling system functions (APIs).

However, use of open systems in embedded systems increases vulnerability to cyber attacks. These attacks come from two main challenge points. First, execution codes can be replaced or modified by malicious code during code updates via the Internet. Secondly, with knowledge of the open source execution code binary structure, hackers can use powerful development/analytical tools to directly modify the code in a static attack.

This session will educate attendees on an effective solution to protect the running program code itself against any modifications and also prevent the loader of the operating system to start any unauthorized code. This also includes protecting the open system platform itself to prevent hackers from installing their own loader. Furthermore, the BIOS of the embedded system prevents the loading of an unauthorized operating system.

Marcellus Buchheit, President and CEO – Wibu-Systems USA

Industrial IoT/Industry 4.0

What to Consider When Starting Your Industrial Internet of Things Journey
The central concept of the Industrial Internet of Things has been around for a while as engineers have used intelligent devices to control networks. What has changed are technological capabilities as the Internet age has progressed.

This presentation examines these new changes, showing attendees how IIoT concepts can benefit their operation, including in the areas of remote monitoring, machine and process control, and connecting multiple points. In addition, the presentation will address how you can prepare your existing device network for the IIoT; measures to take to increase cybersecurity; how to use information gleaned from your IIoT efforts to manage your energy usage and meet sustainability objectives; and how to build up your IIoT integration in a way that’s best for your operation.

Keith Blodorn, Director of Program Management-Wireless - ProSoft Technology

Using PACs as Manufacturing Data Portals
The purpose of this presentation is describe how Programmable Automation Controllers (PACs) and Programmable Logic Controllers (PLCs) can be used to aggregate data and act as a gateway to the cloud – or a “Manufacturing Data Portal.” These data portals are most suited in the factory floor to collect data due to their wide breadth of input types such as traditional I/O and analog inputs, motion and other control busses. In addition, they have the logic to make immediate control changes on the factory floor while also receiving higher-level commands such as change-over times recommended by an analytics program. Since nearly all PAC and PLCs now offer Ethernet TCP/IP, they can directly transport machine data to the cloud for analytics without extra complication in the network. But how can manufacturing benefit from all this machine data?

Marissa K Tucker, Electromechanical and Drives Division Manager, Parker-Hannifin

Cloud-connected Industry Powers Continuous Improvement

The use of highly-connected devices in manufacturing can drive significant business insights through the integration of modern data analytics. This philosophy provides the basis for not only IoT but also the Industrial Internet of Things (IIoT) and flexible manufacturing strategies such as Industry 4.0. The application of these same core concepts to best manage data can be applied to achieve new process optimizations that drive all the right decisions in continuous improvement initiatives.

This educational seminar will highlight key implementation strategies for IIoT applications, specifically noting real-world examples with directions on how to get there. Other highlights will include the intrinsic benefits of increased connectivity and the game-changing flexibility provided through secure global access to manufacturing and production data via encrypted cloud-based systems.

Daymon Thompson, Automation Specialist - Beckhoff Automation

Open Source Software as a Template for Leak Monitoring and Prediction for Piped Water Networks
Mandya is a small town in India with a population of about 140,000. The water supply utility of the town pumps approximately 30 million liters per day of water. It is struggling with nearly 30 percent loss in just the transmission network. Recent studies have shown that the losses are primarily due to leakage.

IBM India is working on a proof-of-concept project for the that would primarily help identify the losses in the Mandya’s water supply network. The aim is to provide a near real time, predictive, hydraulic-model based solution to detect such leaks and alert utility providers significantly in advance to ensure preventive action can be taken.

This case study session present an open source, cloud based software solution for real time monitoring and leakage prediction in piped water supply and distribution networks.  This is a complete end to end solution that can be used as a template for deployment across large scale water networks.  In this paper we present the overall software architecture of the solution. 

Ninad Sathaye, Advisory Research Engineer - IBM India Pvt. Ltd.

IoT Connects the Distributed Industrial Enterprise
In the industrial space, the foundation for the Internet of Things has been laid over the last decade. Industrial blueprints have included sophisticated sensing equipment that is able to capture both operational and performance data in almost real time, and the networks already exist to broadcast data from the field to the back office.

Some challenges still remain, including the pressing need for simple data aggregation from siloed systems throughout the enterprise. The IoT platforms that deliver greatest value
are those that transcend those silos and connect at every level of the value chain.

In this session, we explore in a systematic approach the real value of connecting the enterprise. We examine the potential impact of the IoT in mining, where connecting the process presents enormous opportunities for optimizing the “pit to port” value chain; improvements such as job site planning, fleet management and process optimization. The impact of these improvements would be substantial and numerous.

Eddie Nath, Director – Uptake

Taking the Internet of Things Beyond Data to Actionable Insights – A Component Manufacturer’s Role
This session will education attendees on the role component manufacturers play in deriving usable applications and solutions from the Industrial Internet of Things. Session attendees will learn how component manufacturers can create additional value by interpreting the data collected from sensors attached to their devices.

Jeremy King, Product Marketing Manager - Bimba Manufacturing Company

Indoor Positioning Systems (IPS) for IIoT
In logistics or manufacturing industries, the main challenges include identifying hidden costs and increasing productivity. The Industrial- Internet of Things (IIoT) will play an increasingly significant role in gathering data to reveal bottlenecks and wasteful operations. Indoor positioning systems, which, among other uses, enable logistics and manufacturing companies to calculate and analyze the location of things indoors, can help them cut waste and streamline operations.

In this session, Christian Lundquist will discuss the impact of IPS in industrial environments. The talk will describe a use case where indoor location brought valuable data to the table that revealed and validated issues in the industrial customers’   forklift warehouse complex.

Christian Lundquist, CEO and Co-Founder – SenionLab

IoT Standards and Protocols

HomeKit, Brillo, Alljoyn…Oh My! Seeking the Wizard of IoT
In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen. HomeKit, Brillo, Alljoyn and OIC all have their supporters and detractors, their strengths and challenges, their pros and cons.

This session will review why interoperability is important to IoT’s goal of making life easier for users, and what happens when smart devices don’t work together. We will look at each standard in detail, highlighting their strengths and weaknesses, as well as differences in how users interact with devices using the standards and how data is stored. We also will look at whether these standards can or should co-exist, and what it would take to make this happen both for the consumer and for developers. Finally, we’ll discuss what promising new technologies are on the horizon.

Adam Justice, VP and General Manager – Grid Connect

ZigBee, WiFi and IPv6 – Standards Enabling the Enterprise IoT
Currently, the most widely used standard for wireless solutions for use in energy management, commercial and consumer applications, is ZigBee. While it is not the only standard, there are control vendors and customers that prefer to use WiFi. Also on the horizon is Internet Protocol version 6 (IPv6).  It is designed to solve many of the problems of IPv4, including mobility, auto-configuration, and overall extensibility. IPv6 expands the address space on the Internet and supports a nearly unlimited number of devices that can be directly connected to the Internet. All of these standards help to enable the E-IoT, but which one will remain the long-term standard?  And can any single standard remain as control technologies continue to evolve?

This session will review the standards on the market that are suitable for today’s energy control technology, and cover what is being adopted and why.  Also he will look out on the horizon for new standards and review how control systems may benefit and increase their Enterprise IoT connections.

Mandeep Khera, Vice President – Daintree Networks

How can IoT Become What the World Wants?
Just as identity has proven to be central to securing the Internet we have, identity will be critical for securing the coming Internet of Things (IoT). No longer will it be only users and applications that have identities. In the world of IoT every conceivable physical object, from thermostats to locomotives to glucose monitors will have an identity, and these need to be issued, managed, authenticated, authorized, and eventually revoked.

In order for IoT to become what the world wants, it needs things and applications to be able to discover, authenticate and trust devices with identities. This talk will describe how identity technology can become a passport for the connected world, and how identity standards OAuth 2.0 and OpenID Connect 1.0 can be applied to the constrained reality of things. The presenter will educate attendees on why these standards are critical tools that every IoT engineer and developer needs to embrace in order to produce an interoperable identity layer that is scalable for enterprises, secure for users, and convenient for all.

Paul Madsen, Principle Technical Architect, office of the CTO – Ping Indentity

IoT Networking and Networks

Not All Networks Are Created Equal: New Requirements For Building the IoT
The ubiquitous global connectivity of billions of devices and people is the single most transformative technology trend of our lifetimes.  But not all networks are created equal: the requirements for massive-scale, outdoor, scaleable and secure M2M networks differ greatly from those for consumer or business infrastructure.

This session will provide a deep-dive into the next-generation criteria for critical infrastructure networks such as energy, cities, water, transportation, and other rapidly growing areas of the industrial IoT.  It will also explore the implications of the next wave of the IoT build-out — how entrepreneurs and enterprises will harness the massive step-function in distributed intelligence and real-time data streams as edge sensors plummet in cost while skyrocketing in processing, storage, and networking capabilities.

Raj Vaswani, Chief Technology Officer, Silver Spring Networks

Building the IoT’s Infrastructure: Fog Computing and Network Gateway Intelligence
The Internet of Things is poised to apply major stresses to the current Internet and data center infrastructure. Our current infrastructure relies upon centralized cloud data processing in a single site, but with the sheer amount of input data that will be received from the IoT’s globally distributed sources, this central processing structure will require backup.

Cisco has proposed a fog computing framework using routers with industrial-strength reliability. These robust gateways would strengthen the entire IoT infrastructure, by absorbing the brunt of processing work before passing it to the cloud. In this way, smart edge gateways would either handle or intelligently redirect the millions of tasks coming from the myriad sensors and monitors of the IoT, transmitting only summary and exception data to the cloud proper. The success of fog computing, and the IoT itself, hinges directly on the resilience of those smart gateways directing countless tasks on an Internet teeming with IoT devices.

To produce a bulletproof end-user experience, these edge gateways must be highly intelligent, and will need to rely on features such as out-of-band access, automatic detection and recovery from outages, 4G LTE cellular connectivity with 3G failback, and military-grade FIPS 140-2 security. Having secure control over gateways even when networks are down will be integral to maintaining services affecting the daily lives of consumers.

Shrish Nilekar, Director of Product Management - Opengear

Cloud-Based Data Acquisition System, or Secure Private Network? You CAN Have Your Cloud and Eat it Too
The “Internet of Things” and “Industrial Internet of Things” have become an inevitable part of the current data acquisition landscape. Many industries are adopting cloud-based systems to integrate remote sensors and devices into widespread data gathering and control networks.

Yet, many companies involved with critical infrastructure have serious concerns over implementing a “Cloud” architecture, as compared with existing private communication networks because of the inherent assumption that such systems represent unacceptable security risks.

This presentation will demonstrate the feasibility of a robust and secure Internet of Things solution, using an MQTT publish-and-subscribe brokering technology to glean the best of both worlds of security and platform capability. Real-world examples will be given of energy and telecommunications companies who are gaining the benefits of incorporating such services as part of their network migration and enterprise integration strategies.

Jon Tandy, Industrial Data Gateway Manager – Elecsys Corp.

M2M Enabled Private LTE Best Practices for Cost Takeout
Architecture drives strategy when it comes to M2M deployments.  By utilizing LTE 5G architectures, a new utility based M2M Opex model is available that mirrors Wi-Fi economics and avoids the traditional barriers of consumer grade networks.  What was once considered “not achievable” by traditional M2M service providers is here now as M2M Enabled Private LTE.  This presentation will outline the best practice benchmarks for M2M affordability and answer the how to questions associated with deploying Internet Economics that support Layer 7 M2M traffic.  Layer 7 traffic requires low latency/high velocity streaming so M2M can unlock stranded data with remote access to Industrial Internet infrastructures.

Michael Sisto, VP - Lemko Corp. 

Getting Practical: Three Considerations for M2M/IoT Connectivity
As the IoT continues to grow, different options are emerging to help businesses, municipalities and other organizations connect with their M2M/IoT assets. Cellular, satellite, low-power solutions and other options are all building out connectivity to help organizations worldwide to manage their increasing IoT data needs.

Although many connectivity providers are touting their near-ubiquitous connectivity, most organizations don’t need ubiquity, they need reliable, cost-effective connectivity. With so many connectivity options, the landscape can get complicated quickly. However, there are three key considerations for businesses weighing IoT connectivity options:

1)      Where are your assets located and what coverage options are available in those areas?2)      How frequently do you need to connect with these assets?
3)      What is your roadmap for upgrading your M2M/IoT equipment?

This sessionwill help attendees take a hard look at each of these connectivity considerations and determine which connectivity option makes the most sense for their individual business as they map out their M2M/IoT strategy.

John Horn, CEO – Ingenu

Wearables, Apps and IoT Devices

A Patent Based Study of Smart Wearable Technologies: Current Status and Future Direction
Wearables are gaining ground within both academic and practitioner studies with attempt to better understand the trend of innovation in order to provide a guidance for both policymakers and companies in supporting its development. The aim of this session is to analyse the diffusion of smart wearable technology in different market and prediction of wearable technology’ trends.

Therefore, this presentation focuses on old and recent developments of patents related to wearable technology with a focus on patent filing and challenges that are likely to happen in this technology. Moreover, it attempts to provide some insights into the prospects of this technology. Hence, the paper will explore 1,016 patents that received all over the world between 2000 and 2015.

To date, no research exists addressing the pattern and trend of patents for smart wearable technologies. The examination of patents in terms of country, IPC code, type of applicant and description and number of claims may provide orientations into the future that are useful for making decisions on market strategies.

Milad Dehghani - Sapienza University of Rome

Going from “Real Cool” to “Real World” – Avoiding Mistakes When Deploying Connected Products
Connected product demos are exciting, and leave you with a sense of urgency to get to market as fast as possible. But commercializing that lab demo is not an easy task. Taking the proof-of-concept that works seamlessly in a controlled lab situation and perfecting it for use in the uncontrolled real world involves much more than technical hurdles. Smart IoT system architects must balance the feature wish list with things like workflow, logistics and deployment costs so that the product is scalable and most importantly, it is revenue ready.

A successful IoT Smart product rollout is more than simply wirelessly connecting a remote product to a computer. Taking it from idea to launch is about orchestrating a vast engineering community of software, communication, manufacturing, as well as sales, marketing and business leaders – many of whom speak different “languages.” In this presentation you will learn how to approach the technical design of an IoT Smart system so that it is has life beyond the lab.

TJ Butler, Chief Software Architect – Mesh Systems

User POV Critical for IoT App Success
Today’s markets are driven more and more by adoption of mobile applications, especially as the Internet of Things  continues to influence user demand for flawless digital experiences. This is why it is important for developers of apps and the digital experiences that make up the IoT increase high value testing that accounts for the all-important point-of-view (POV) in development and testing, as well as through (and after) launch.

As such, complementing in-lab manual and automated testing with testing in real user environments is a critical component of DevOps for mobile in an increasingly IoT-connected landscape. This approach enables developers to leverage the right mix of software testing tools, in-house testing, mobile SDKs, analytics tied to ongoing user sentiment, and outside-the-lab-testers, which all play a critical role in developing high quality mobile applications that users love.

Ben Gray, Digital Experience Analyst – Applause