Conference Program April 13th, 2016 – Day 1
7:00 am – Registration Opens & Continental Breakfast
8:00 am – Welcome Address and Keynote Session
Exploring Open Big Data
This talk is all about using cloud services to investigate big data hypotheses in the cloud. It’ll be demo heavy, focusing on digging around in huge open data sets. It’ll be an interactive talk that will use audience input to guide the investigations.
The Internet of Things works like this: 1. Collect all the data. 2. ??? 3. Useful insights about the world. Our job is to fill in step 2, and turn tons of raw data into useful insights. This does not always go as planned. How many times have you spent a week building a data pipeline and pretty graph only to discover that your new graph isn’t useful?
In this talk Jenny Tong, a Developer Advocate on Google Cloud Platform, will explore huge open data sets. She’ll drill into Wikipedia logs, GDELT news data, and global weather. You’ll leave knowing how to use cloud services like BigQuery to validate your big data hypotheses before writing a bunch of code.
Jenny Tong, Developer Advocate on Google Cloud Platform – Google
9:00 am – Featured Presentation
Transformational Characteristics of IoT Solutions for Enterprises
Enterprises across the globe are looking to Internet of Things solutions to gain competitive advantage for their products and services. Increasingly, however, enterprises are deploying IoT solutions to impact multiple facets of their organizations, including operations, logistics, manufacturing, product management and design. This presentation will look at top trends in enterprise IoT evolution and how these initiatives are driving real ROI, operational benefits and better engagement with customers. Machina Research will also highlight their recommendations for enterprise IoT strategies, tactics and architecture and how enterprises can leverage these approaches to achieve new product and service designs in key verticals as well as utilize IoT data to transform their businesses and generate new business models.
Andy Castonguay, Principal Analyst – Machina Research
10:00 am – Exhibit Hall Opens/Networking Break
11:00 am – Concurrent Sessions
Securing IoT: Think Outside the Wall
Most of the devices in the Internet of Things (IoT) reside outside of your security wall. Some, such as mobile point-of-sale terminals and other publicly accessible devices, are outside because they could be a gateway for malicious attacks. Others, such as sensors and remote monitors, may be too distant to include inside. And some, such as medical devices and other specialized tools, may be outside of IT’s sphere. However, all of these devices still need to be protected.
With little or no local storage, IoT devices are heavily dependent on communications, so securing the communications path is as important as hardening the device. Protecting the IoT is not like protecting a data center. Securing the IoT requires looking at the whole ecosystem, not just individual points and devices. From silicon to software and from platforms to management, industry specialists must be able to incorporate these tools into their unique solutions, addressing the specific needs of their target markets. Best practices demand that we not only harden the devices, but also secure the communications and monitor and manage the security state. Most important, we need to remember that by protecting the data, we are protecting the privacy of our customers, colleagues, neighbors, friends, and families.
Scott Montgomery, Vice President & Chief Technical Strategist - Intel Security Group
Relational Databases in a Ephemeral World
SQL and relational databases management systems have been having a rough time recently with NoSQL and Big Data. But the RDMS vendors have not been sleeping. This session will cover how new features are being added to traditional databases to provide for the three Vs of big data — Volume, velocity, and variety. Maybe you do not need to buy new server farms or hire additional staff but upgrading to new versions of existing databases and exploiting new features. See how you can have SQL and NoSQL wit volumes of data you never thought possible.
David Stokes, MySQL Community Manager – Oracle
What to Consider When Starting Your Industrial Internet of Things Journey
The central concept of the Industrial Internet of Things has been around for a while as engineers have used intelligent devices to control networks. What has changed are technological capabilities as the Internet age has progressed.
This presentation examines these new changes, showing attendees how IIoT concepts can benefit their operation, including in the areas of remote monitoring, machine and process control, and connecting multiple points. In addition, the presentation will address how you can prepare your existing device network for the IIoT; measures to take to increase cybersecurity; how to use information gleaned from your IIoT efforts to manage your energy usage and meet sustainability objectives; and how to build up your IIoT integration in a way that’s best for your operation.
Keith Blodorn, Director of Program Management-Wireless - ProSoft Technology
11:30 am - Concurrent Sessions
Effectively Securing Embedded Software in the Embedded World
Software/firmware encryption is part of a comprehensive Iot security strategy for embedded systems. Companies must encrypt their applications so that the code – and inherent intellectual property – is protected from hacking attempts. Another requirement of the IoT is a comprehensive feature licensing solution that governs which machine a program is allowed to run on.
In addition to pure licensing management, network equipment should be protected at the code level against tampering and manipulation. Solutions that contain a hardware-based encryption component offer the best protection. A highly secure smart card chip provides the best possible protection against sophisticated types of attacks such as Differential Power Analysis (DPA) and reverse engineering by means of electron beams or ion microscopy.
Entitlement management comes into play when companies need to assign different permissions to different groups of employees based on entitlements. If an employee requires access to device data on a daily basis, he may only receive permission to read this data, but not, for example, to change the machine settings. A service technician, on the other hand, may be permitted to also configure the device. Learn about these topics while attending these sessions.
Mark Horvath, Consultant/Engineer - Gemalto
Big Data: Big Opportunity, Big Headaches
Big Data is the rage in the marketplace with lots of potential to solve a myriad of customer and corporate issues. With this opportunity comes a new set of issues around security and privacy. The more data we have and want to use means more potential for the bad guys to attempt to harvest that same data for criminal activity. In this session, you will discover the latest strategies for monitoring Big Data usage and implementing controls to ensure your sensitive data is not exploited.
Andy Land, Program Director, Security Systems – IBM
Efficiency In The Connected Factory
In today’s connected factories ERP systems are proving to be far too complex and challenging to manage, having far too many features which are not necessary for most companies. Innovative manufacturers are building their own ERP systems, such as Tesla, who designed and built an ERP system in four months. The Tesla ERP is shared among other Musk companies, since it’s far more nimble to meet business demands. Tesla still uses standard product lifecycle management (PLM) Software that is then used to manage product lifecycle and feed data to manufacturing execution systems (MES). These then drive robotics and automation.
Learn how advanced companies are using custom ERP data from ordering to manufacturing to determine real-time decision making and inventory management. Most of today’s companies that do this effectively are combining packaged applications and custom applications to create business advantages. Modern companies are connecting the customer journey from exploration on the website, e commerce, manufacturing, and delivery in a seamless manner to create a business advantage against legacy competitors.
Jonah Kowall, Vice President of Market Development and Insights - AppDynamics
12:00 pm – Networking Lunch
1:00 pm - Concurrent Sessions
How Secure is Smart?
As ‘smart’ penetrate daily lives, the constant question remains, “how much security do I really need?” Following the evolution of smartphones, the consumer electronic industry is experiencing similar progress in almost every electronic device in homes today. From televisions to coffee pots, all are being replaced by “smart” alternatives. The increase of connected and smart end-point devices, mean more exchange of data and vast amounts of vulnerable data means more security risks.
The growing concerns over privacy protection and breach of personalized data has sparked controversy, debate and discussion. This presentation will explore the changing security trends introduced by IoT, risks consumers face as devices become more connected and how companies, technologists and government can work together to protect the consumer.
Asit Goel, VP and General Manager of Secure Monitoring and Control – NXP
The Market Drivers Influencing IoT Deployment Architectures
The majority of IoT projects in production, or even most simply launched and underway, are primarily generating small amounts of data and exist in closed-loop message response silos. These systems can be compelling in their own right, but are just a glimpse of where the market is headed, both in terms of project and data volumes and complexity.
As the momentum builds with more and more initiatives moving to production, the origin of the messages, the amount of corresponding data, and the need to leverage that data at all points in the ecosystem will see increasing attention. This will give rise to an increased emphasis on deployment architectures that include multi-tiered edge processing and careful considerations about leveraging the utility value of IoT data in combination with other external data sources at the point of the first receiver, as well as subsequent points both within and beyond the originating organization.
In this presentation, Don DeLoach will explore the likely evolution of IoT deployment architectures and the market drivers that will influence this evolution, such as the need for users of IoT systems to retain and leverage that data on a broader scale both internally and externally, as well as the opportunities that will unfold as a result.
Don DeLoach, President and CEO – Infobright
Creating a Dynamic Manufacturing Environment Through IIoT
Material flow management is the biggest problem impacting factories today and the greatest hindrance to their ability to transition to the growing demand for highly dynamic “on-demand” manufacturing. The problem is that most factories’ processes are rooted in the decades old use of static paper label systems.
IIoT technology now exists that is transforming the way people and machines interact by using data and analytics in new ways to drive efficiency gains, accelerate productivity and achieve overall operational excellence. Companies at the forefront of manufacturing are implementing intelligent auto-identification solutions to replace the paper labels and work instructions on the machines and containers traversing factory floors across the globe. Unlike paper labels, visual instructions on these e-paper labels can be changed at any time as conditions merit providing manufacturers with unprecedented control of the process flow.
This presentation will use specific examples from case studies to examine how Fortune 500 companies are embracing IIoT to create dynamic, intelligent operational environments that are setting the standard for and leading the wave of 21st century manufacturing in America.
George E. Daddis Jr., PhD, CEO - Omni-ID
1:30 pm - Concurrent Sessions
Preserving Security and Privacy in IoT Big Data Analytics Solutions
Although Big Data Analytics solutions will allow organizations to turn data into actionable knowledge based on “connecting the dots” in various patterns of the data and aggregation of device data with other related data sets, security and privacy concerns are growing.
Organizations collecting information face challenges, as most of today’s analytics solutions were not designed with security in mind, because there are a growing number of laws and regulations aimed at preserving data privacy, and because there are often unanticipated side-effects when combining data sets from various devices and information systems that threaten the disclosure of sensitive information.
This presentation will focus on the challenges, use cases, and practical real-world solutions related to securing and preserving privacy, addressing authorization, differential privacy, and more. We will look at real-world examples of security and privacy “gone bad”, and we will offer guidance and best practices.
Kevin Smith, Chief Security Architect – Tridium, a unit of Honeywell
How GSA is Using Data Analytics to Drive Operational Excellence
The US General Services Administration (GSA) is responsible for delivering the best value in real estate, acquisition and technology services to government. This presentation will cover three case studies to illustrate how an information-centric approach using Big Data and analytics has helped GSA and other federal agencies to become more transparent and gain operational efficiency. Two case studies will illustrate how the federal government is using analytics to better serve the American people. The third case study will explain how GSA uses analytics, both real time and predictive to drive down energy costs and meet the agency’s sustainability goals.
Dr. Ann Kalayil, Regional Administrator – GSA Great Lakes Region
Cloud-Connected Industry Powers Continuous Improvement
The use of highly-connected devices in manufacturing can drive significant business insights through the integration of modern data analytics. This philosophy provides the basis for not only IoT but also the Industrial Internet of Things (IIoT) and flexible manufacturing strategies such as Industry 4.0. The application of these same core concepts to best manage data can be applied to achieve new process optimizations that drive all the right decisions in continuous improvement initiatives.
This educational seminar will highlight key implementation strategies for IIoT applications, specifically noting real-world examples with directions on how to get there. Other highlights will include the intrinsic benefits of increased connectivity and the game-changing flexibility provided through secure global access to manufacturing and production data via encrypted cloud-based systems.
Daymon Thompson, Automation Specialist - Beckhoff Automation
2:00 pm - Concurrent Sessions
IoT Attack Modeling
Too many IoT vendors focus their security efforts on encryption, authentication and fine-grained, least-privilege authorization. Such products are often vulnerable to common attack models, such as platform attacks on operating systems and communications stacks. Why try to break a gazillion-bit PKI certificate, when a buffer-overflow attack lets an attacker into the device without a key or a password?
Risk assessments are equally murky. “We have security covered” and “a live penetration test on this network is too dangerous” cannot both be true. Attack modeling connects common attack techniques to defensive capabilities. Attack modeling develops a representative set of high-impact attacks and draws a line through them called the design basis threat. Attacks below the line are the ones we have a high degree of confidence of defeating. Attacks above the line we have a lower degree of confidence of defeating.
Practice has proven that senior decision-makers understand attacks better than they do made-up attack probabilities, or qualitative attack scores. With attack modeling, senior decision-makers can be asked if the line is drawn in the right location, and if not where they want the security team to draw the line.
Andrew Ginter, VP of Industrial Security – Waterfall Security
Establishing a Secure Data Management Foundation to Enable Predictive Analytics for Smarter Operations
This presentation will cover how collecting and storing information in real-time for analysis and reporting provides organizations the insights required to make smarter decisions. Using a case study from Duke Energy as an example, the session will explain the advantages of using secure centralized data management software, including the ability for personnel across the organization to easily access and share data, onsite or remotely. This session will discuss software solutions that handle data collection, storage, archival, analysis, alarming and reporting, across multiple locations and assets, allowing a holistic view of operations.
We will also explain how a data management infrastructure provides the foundation for predictive asset analytics software to achieve the next level of operational efficiency and make the most of the increasing amount of information available. Predictive analytics software helps organizations avoid equipment failure and reduce unscheduled downtime while increasing reliability and ultimately controlling costs. Cloud-based deployment models for remote monitoring will also be discussed.
Sean Gregerson, Director – Schneider Electric
Using PACs as Manufacturing Data Portals
The purpose of this presentation is describe how Programmable Automation Controllers (PACs) and Programmable Logic Controllers (PLCs) can be used to aggregate data and act as a gateway to the cloud – or a “Manufacturing Data Portal.” These data portals are most suited in the factory floor to collect data due to their wide breadth of input types such as traditional I/O and analog inputs, motion and other control busses. In addition, they have the logic to make immediate control changes on the factory floor while also receiving higher-level commands such as change-over times recommended by an analytics program. Since nearly all PAC and PLCs now offer Ethernet TCP/IP, they can directly transport machine data to the cloud for analytics without extra complication in the network. But how can manufacturing benefit from all this machine data?
Marissa K Tucker, Product Marketing Manager for Controls and HMI - Parker-Hannifin
2:30 pm – Concurrent Sessions
Threats from IoT Devices
In last year’s “IoT Security Primer” the focus was on securing IoT devices and communication; this year we present the flip side of the coin, and address how to prevent IoT devices themselves from becoming threats. From the physical and economic damage that malfunctions and hackers can cause, to the threats IoT device pose to our networks, the presentation will explore how to prevent these threats in the first place. We will explore common and simple mitigations IoT vendors, IT organizations, and users can easily implement. No prior knowledge of IT security or device security is required, and experts and neophytes alike will benefit from the information.
Eric Uner, CTO - Redwall Technologies
On-Board IoT: Moving Intelligence to the Machine
Companies leveraging IoT cannot afford to wait for a machine’s data to be sent to the cloud, analyzed, and sent back to the machine for action. Effective IoT solutions implement analytics at the machine level to keep pace with the speed of operations.
At the machine level, the benefit is cloud assistance and on-board analytics. At a cloud level, companies leveraging IoT can build better predictive capabilities by aggregating machine-level data. Collecting this granular level information across an entire fleet allows a company to keep pulse on the condition of its assets and maintain an application view of the system.
This session focuses on the opportunities and benefits of machine-level IoT that push the intelligence to the asset and the field, enable asset-to-asset communication, and in turn, optimize fleets and systems. This presentation will also discuss industry trends for a number of industrial applications and emerging interoperability concepts.
Brad Nicholas, Lead IoT Architect – Uptake
A Roadmap to Digital Transformation
Digital transformation is a big idea with big promise. But you can’t take just any big data analytics solution and make it work on the plant floor. Manufacturing operations create different kinds of data than other industries that have already adopted analytics. In addition to classically structured in-factory databases, there’s analog data, images, raw sensor data, and literally hundreds of device types to access. There are also legacy systems on the factory floor that aren’t easy to get data out of. And there are very specific business problems that don’t necessarily lend themselves to generic data models.
That’s where manufacturing analytics comes in – it’s big data analytics built specifically for manufacturing designed to work with factory data and systems to address manufacturing-specific challenges.
This session will explore ways manufacturing organizations can use the data they have today to identify investment priorities and accelerate innovation, and outline best practices for developing implementation strategies.
Jon Sobel, CEO & Co-Founder – Sight Machine
3:00 pm - Networking Break in Exhibit Hall
3:30 pm - Concurrent Sessions
Integrity Protection for Embedded Systems
Software for embedded systems is based increasingly upon open system platforms, such as Linux Embedded, VxWorks, Windows Embedded, QNX and many others. In addition to powerful core functionality, one of the main benefits of using open platforms is their implementation of standardized interfaces for loading code or calling system functions (APIs).
However, use of open systems in embedded systems increases vulnerability to cyber attacks. These attacks come from two main challenge points. First, execution codes can be replaced or modified by malicious code during code updates via the Internet. Secondly, with knowledge of the open source execution code binary structure, hackers can use powerful development/analytical tools to directly modify the code in a static attack.
This session will educate attendees on an effective solution to protect the running program code itself against any modifications and also prevent the loader of the operating system to start any unauthorized code. This also includes protecting the open system platform itself to prevent hackers from installing their own loader. Furthermore, the BIOS of the embedded system prevents the loading of an unauthorized operating system.
Marcellus Buchheit, President and CEO – Wibu-Systems USA
User POV Critical for IoT App Success
Today’s markets are driven more and more by adoption of mobile applications, especially as the Internet of Things continues to influence user demand for flawless digital experiences. This is why it is important for developers of apps and the digital experiences that make up the IoT increase high value testing that accounts for the all-important point-of-view (POV) in development and testing, as well as through (and after) launch.
As such, complementing in-lab manual and automated testing with testing in real user environments is a critical component of DevOps for mobile in an increasingly IoT-connected landscape. This approach enables developers to leverage the right mix of software testing tools, in-house testing, mobile SDKs, analytics tied to ongoing user sentiment, and outside-the-lab-testers, which all play a critical role in developing high quality mobile applications that users love.
Ben Gray, Digital Experience Analyst – Applause
IoT Connects the Distributed Industrial Enterprise
In the industrial space, the foundation for the Internet of Things has been laid over the last decade. Industrial blueprints have included sophisticated sensing equipment that is able to capture both operational and performance data in almost real time, and the networks already exist to broadcast data from the field to the back office.
Some challenges still remain, including the pressing need for simple data aggregation from siloed systems throughout the enterprise. The IoT platforms that deliver greatest value
are those that transcend those silos and connect at every level of the value chain.
In this session, we explore in a systematic approach the real value of connecting the enterprise. We examine the potential impact of the IoT in mining, where connecting the process presents enormous opportunities for optimizing the “pit to port” value chain; improvements such as job site planning, fleet management and process optimization. The impact of these improvements would be substantial and numerous.
Eddie Nath, Director – Uptake
4:00 pm - Concurrent Sessions
Connected Car Payments – The New Mobile Commerce
Connected car technology is rapidly evolving to improve automobile safety, vehicle maintenance, and network connectivity but there is another benefit that consumers will soon find far more valuable – connected card payments. This is a new definition of what mobile commerce means to most businesses. Changes in the payments ecosystem based on chip card technology and mobile wallets are being adapted into automobiles as well.
Most smart phones already have payments options built in to them, such as Apple Pay and Android Pay. When that mobile device is connected via Bluetooth in a connected car, all of that ecosystem can be transferred to the automobile’s sophisticated GPS and digital communications system, so when that car pulls up to a gas pump, the pump can recognize the driver and pre-authorize their payment and enable the pump. If the driver wants to add a coffee and a donut to his order, he can do so and not stop at the counter. Projects are underway by Visa and MasterCard to equip cars with mobile commerce capabilities and organizations representing the parking industry, toll systems, fast food industry, and retail petroleum are already using mobile devices to add fast, convenient, and secure payment for consumers.
Randy Vanderhoof is the Executive Director - Smart Card Alliance
Mapping Your Connected Journey to ROI
A successful connected journey must be mapped to ROI. Through this presentation, we will look the leading use cases, based on personal experience, of companies that have gained a competitive edges via IoT. Using these use cases, you will discover how you can validate ROI and capture new opportunities more quickly in the market. And, in parallel, ensure that the essential elements are in place for you to continue to grow and compete in our connected world.
Questions to be answered:
Raj Paul, Vice President of Automotive and Emerging Technologies – Lochbridge
Taking the Internet of Things Beyond Data to Actionable Insights – A Component Manufacturer’s Role
This session will education attendees on the role component manufacturers play in deriving usable applications and solutions from the Industrial Internet of Things. Session attendees will learn how component manufacturers can create additional value by interpreting the data collected from sensors attached to their devices.
Jeremy King, Product Marketing Manager - Bimba Manufacturing Company
4:30 pm - Concurrent Sessions
IoT Security and Protecting Connected Car Data
More and more cars are joining the IoT bandwagon to share data and leverage the data. These data might be engine data for servicing and maintenance or data about what is being listened to on the radio. The important part of this whole connected car paradigm is that an access has been provided to send and receive data from cars from and to the outside world. Previously this type of communication between the cars and the outside world was unheard of. This creates an unprecedented threat level and also opportunities to solve these problems for the market.
This paper analyses the data from real cars and will be shown to the audience what those data means. A general architecture of how a car’s network is wired and how the data can be accessed through an IoT network or any other network is also explained. Moreover, the pitfalls of the present day car’s data network and how it might be modified is presented. Finally, possible solutions to these problems and the pros and cons of those solutions are discussed.
Shanmugasundaram.M, Associate Director - Happiest Minds Technologies Pvt.
Open Source Software as a Template for Leak Monitoring and Prediction for Piped Water Networks
Mandya is a small town in India with a population of about 140,000. The water supply utility of the town pumps approximately 30 million liters per day of water. It is struggling with nearly 30 percent loss in just the transmission network. Recent studies have shown that the losses are primarily due to leakage.
IBM India is working on a proof-of-concept project for the that would primarily help identify the losses in the Mandya’s water supply network. The aim is to provide a near real time, predictive, hydraulic-model based solution to detect such leaks and alert utility providers significantly in advance to ensure preventive action can be taken.
This case study session present an open source, cloud based software solution for real time monitoring and leakage prediction in piped water supply and distribution networks. This is a complete end to end solution that can be used as a template for deployment across large scale water networks. In this paper we present the overall software architecture of the solution.
Ninad Sathaye, Advisory Research Engineer - IBM India Pvt. Ltd.
Indoor Positioning Systems (IPS) for IIoT
In logistics or manufacturing industries, the main challenges include identifying hidden costs and increasing productivity. The Industrial- Internet of Things (IIoT) will play an increasingly significant role in gathering data to reveal bottlenecks and wasteful operations. Indoor positioning systems, which, among other uses, enable logistics and manufacturing companies to calculate and analyze the location of things indoors, can help them cut waste and streamline operations.
In this session, Christian Lundquist will discuss the impact of IPS in industrial environments. The talk will describe a use case where indoor location brought valuable data to the table that revealed and validated issues in the industrial customers’ forklift warehouse complex.
Christian Lundquist, CEO and Co-Founder – SenionLab
5:00 pm – Cocktail Reception in the Exhibit Hall
April 14th, 2016 – Day 2
7:30 am - Registration Opens & Continental Breakfast
8:00 am – Day 2 Keynote Session/Exhibit Hall Opens
The Business Case for IoT
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools to creating feedback loops improving product design to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from disparate devices and applying data analytics and, ultimately, business logic to that data. Properly implemented (and I do mean properly), IoT can effectively deliver these business outcomes.
Dave McCarthy, Director of Products – Bsquare Corp.
9:00 am – Speaking Session TBA
10:00 am – Networking Break in Exhibit Hall
10:30 am - Concurrent Sessions
Not All Networks Are Created Equal: New Requirements For Building the IoT
The ubiquitous global connectivity of billions of devices and people is the single most transformative technology trend of our lifetimes. But not all networks are created equal: the requirements for massive-scale, outdoor, scaleable and secure M2M networks differ greatly from those for consumer or business infrastructure.
This session will provide a deep-dive into the next-generation criteria for critical infrastructure networks such as energy, cities, water, transportation, and other rapidly growing areas of the industrial IoT. It will also explore the implications of the next wave of the IoT build-out — how entrepreneurs and enterprises will harness the massive step-function in distributed intelligence and real-time data streams as edge sensors plummet in cost while skyrocketing in processing, storage, and networking capabilities.
Raj Vaswani, Chief Technology Officer – Silver Spring Networks
HomeKit, Brillo, Alljoyn…Oh My! Seeking the Wizard of IoT
In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen. HomeKit, Brillo, Alljoyn and OIC all have their supporters and detractors, their strengths and challenges, their pros and cons.
This session will review why interoperability is important to IoT’s goal of making life easier for users, and what happens when smart devices don’t work together. We will look at each standard in detail, highlighting their strengths and weaknesses, as well as differences in how users interact with devices using the standards and how data is stored. We also will look at whether these standards can or should co-exist, and what it would take to make this happen both for the consumer and for developers. Finally, we’ll discuss what promising new technologies are on the horizon.
Adam Justice, VP and General Manager – Grid Connect
11:00 am - Concurrent Sessions
Building the IoT’s Infrastructure: Fog Computing and Network Gateway Intelligence
The Internet of Things is poised to apply major stresses to the current Internet and data center infrastructure. Our current infrastructure relies upon centralized cloud data processing in a single site, but with the sheer amount of input data that will be received from the IoT’s globally distributed sources, this central processing structure will require backup.
Cisco has proposed a fog computing framework using routers with industrial-strength reliability. These robust gateways would strengthen the entire IoT infrastructure, by absorbing the brunt of processing work before passing it to the cloud. In this way, smart edge gateways would either handle or intelligently redirect the millions of tasks coming from the myriad sensors and monitors of the IoT, transmitting only summary and exception data to the cloud proper. The success of fog computing, and the IoT itself, hinges directly on the resilience of those smart gateways directing countless tasks on an Internet teeming with IoT devices.
To produce a bulletproof end-user experience, these edge gateways must be highly intelligent, and will need to rely on features such as out-of-band access, automatic detection and recovery from outages, 4G LTE cellular connectivity with 3G failback, and military-grade FIPS 140-2 security. Having secure control over gateways even when networks are down will be integral to maintaining services affecting the daily lives of consumers.
Gary Marks, President - Opengear
ZigBee, WiFi and IPv6 – Standards Enabling the Enterprise IoT
Currently, the most widely used standard for wireless solutions for use in energy management, commercial and consumer applications, is ZigBee. While it is not the only standard, there are control vendors and customers that prefer to use WiFi. Also on the horizon is Internet Protocol version 6 (IPv6). It is designed to solve many of the problems of IPv4, including mobility, auto-configuration, and overall extensibility. IPv6 expands the address space on the Internet and supports a nearly unlimited number of devices that can be directly connected to the Internet. All of these standards help to enable the E-IoT, but which one will remain the long-term standard? And can any single standard remain as control technologies continue to evolve?
This session will review the standards on the market that are suitable for today’s energy control technology, and cover what is being adopted and why. Also he will look out on the horizon for new standards and review how control systems may benefit and increase their Enterprise IoT connections.
Jason Choong, CTO – Daintree Networks
11:30 am - Concurrent Sessions
A Fresh Approach to Connectivity Will Overcome Challenges for Remote IoT Applications
A huge number of IoT devices are located outside urban areas, with some of the biggest growth sectors (including agriculture, energy, environment, logistics and transport) requiring devices in rural areas or roaming across countries and continents. This poses significant challenges both in terms of the design of the device and how it connects. The main issue is that there is no room for error, as troubleshooting and maintenance of the devices is complicated and costly.
Once the devices are out in the field, they need to be self-sufficient and able to function without any human intervention on the ground. Remote control of devices and the importance of ensuring that the device can receive and respond to the correct commands is often discussed. However, remote control of connectivity is one aspect that is often overlooked, and without careful planning IoT applications developers can find themselves locked into long term contracts with operators that do not allow them flexibility in terms of price or coverage. This presentation will focus on the challenges of developing remote IoT applications and making the correct choices in terms of device design, connectivity and future proofing to prolong the lifespan of the application and avoid costly mistakes.
Sam Colley, CEO – Podsystem Group
How can IoT Become What the World Wants?
Just as identity has proven to be central to securing the Internet we have, identity will be critical for securing the coming Internet of Things (IoT). No longer will it be only users and applications that have identities. In the world of IoT every conceivable physical object, from thermostats to locomotives to glucose monitors will have an identity, and these need to be issued, managed, authenticated, authorized, and eventually revoked.
In order for IoT to become what the world wants, it needs things and applications to be able to discover, authenticate and trust devices with identities. This talk will describe how identity technology can become a passport for the connected world, and how identity standards OAuth 2.0 and OpenID Connect 1.0 can be applied to the constrained reality of things. The presenter will educate attendees on why these standards are critical tools that every IoT engineer and developer needs to embrace in order to produce an interoperable identity layer that is scalable for enterprises, secure for users, and convenient for all.
Paul Madsen, Principle Technical Architect, office of the CTO – Ping Indentity
12:00 pm - Networking Lunch
1:00 pm - Concurrent Sessions
Cloud-Based Data Acquisition System, or Secure Private Network? You CAN Have Your Cloud and Eat it Too
The “Internet of Things” and “Industrial Internet of Things” have become an inevitable part of the current data acquisition landscape. Many industries are adopting cloud-based systems to integrate remote sensors and devices into widespread data gathering and control networks.
Yet, many companies involved with critical infrastructure have serious concerns over implementing a “Cloud” architecture, as compared with existing private communication networks because of the inherent assumption that such systems represent unacceptable security risks.
This presentation will demonstrate the feasibility of a robust and secure Internet of Things solution, using an MQTT publish-and-subscribe brokering technology to glean the best of both worlds of security and platform capability. Real-world examples will be given of energy and telecommunications companies who are gaining the benefits of incorporating such services as part of their network migration and enterprise integration strategies.
Jon Tandy, Industrial Data Gateway Manager – Elecsys Corp.
Knitting IoT Together using IFTTT and Other Open Ecosystem Approaches
Today’s IOT is a patchwork quilt of different ecosystems, for example today’s connected car doesn’t talk to today’s smart home system. Open technologies and approaches like IFTTT and Zapier, and large sets of proprietary APIs between systems, will enable all the Things to communicate together and work in harmony. One day your fitness tracker will let your car know when you are heading back to the car and your car will let your alarm and thermostat know you are heading home, and the role of standards bodies, de-facto standards and industry muscle to achieve that will be explored in this presentation.
Terry Hughes, Managing Director - App Carousel
1:30 pm - Concurrent Sessions
M2M Enabled Private LTE Best Practices for Cost Takeout
Architecture drives strategy when it comes to M2M deployments. By utilizing LTE 5G architectures, a new utility based M2M Opex model is available that mirrors Wi-Fi economics and avoids the traditional barriers of consumer grade networks. What was once considered “not achievable” by traditional M2M service providers is here now as M2M Enabled Private LTE. This presentation will outline the best practice benchmarks for M2M affordability and answer the how to questions associated with deploying Internet Economics that support Layer 7 M2M traffic. Layer 7 traffic requires low latency/high velocity streaming so M2M can unlock stranded data with remote access to Industrial Internet infrastructures.
Michael Sisto, VP - Lemko Corp.
A Patent Based Study of Smart Wearable Technologies: Current Status and Future Direction
Wearables are gaining ground within both academic and practitioner studies with attempt to better understand the trend of innovation in order to provide a guidance for both policymakers and companies in supporting its development. The aim of this session is to analyse the diffusion of smart wearable technology in different market and prediction of wearable technology’ trends.
Therefore, this presentation focuses on old and recent developments of patents related to wearable technology with a focus on patent filing and challenges that are likely to happen in this technology. Moreover, it attempts to provide some insights into the prospects of this technology. Hence, the paper will explore 1,016 patents that received all over the world between 2000 and 2015.
To date, no research exists addressing the pattern and trend of patents for smart wearable technologies. The examination of patents in terms of country, IPC code, type of applicant and description and number of claims may provide orientations into the future that are useful for making decisions on market strategies.
Milad Dehghani - Sapienza University of Rome
2:00 pm -
Getting Practical: Three Considerations for M2M/IoT Connectivity
As the IoT continues to grow, different options are emerging to help businesses, municipalities and other organizations connect with their M2M/IoT assets. Cellular, satellite, low-power solutions and other options are all building out connectivity to help organizations worldwide to manage their increasing IoT data needs.
Although many connectivity providers are touting their near-ubiquitous connectivity, most organizations don’t need ubiquity, they need reliable, cost-effective connectivity. With so many connectivity options, the landscape can get complicated quickly. However, there are three key considerations for businesses weighing IoT connectivity options:
1) Where are your assets located and what coverage options are available in those areas?2) How frequently do you need to connect with these assets?
3) What is your roadmap for upgrading your M2M/IoT equipment?
This sessionwill help attendees take a hard look at each of these connectivity considerations and determine which connectivity option makes the most sense for their individual business as they map out their M2M/IoT strategy.
John Horn, CEO – Ingenu
2:30 pm -
Going from “Real Cool” to “Real World” – Avoiding Mistakes When Deploying Connected Products
Connected product demos are exciting, and leave you with a sense of urgency to get to market as fast as possible. But commercializing that lab demo is not an easy task. Taking the proof-of-concept that works seamlessly in a controlled lab situation and perfecting it for use in the uncontrolled real world involves much more than technical hurdles. Smart IoT system architects must balance the feature wish list with things like workflow, logistics and deployment costs so that the product is scalable and most importantly, it is revenue ready.
A successful IoT Smart product rollout is more than simply wirelessly connecting a remote product to a computer. Taking it from idea to launch is about orchestrating a vast engineering community of software, communication, manufacturing, as well as sales, marketing and business leaders – many of whom speak different “languages.” In this presentation you will learn how to approach the technical design of an IoT Smart system so that it is has life beyond the lab.
TJ Butler, Chief Software Architect – Mesh Systems
3:00 pm – Conference Conclusion