March 29th, 2017 – Day 1
7:00 am – 8:00 am – Registration and Continental Breakfast
8:00 am – Keynote Presentation
Getting Started on an IoT Journey
Sometimes the hype around billions of inter-connected IoT devices, robots, homes, cities and factories can sound overwhelming. It’s time to talk past the hype and laser focus on how to get started on your company’s own IoT journey
In this presentation, Cisco VP Maciej Kranz brings decades of experience with IoT – before it even became a name. Mr. Kranz will share both the vision for IoT and the detailed roadmap on how to get there: Build partner ecosystems, integrate technology with business operations, focus on real problems, form cross-functional teams, focus on service models, start with low-hanging fruit, and be serious about security. You will learn proven, practical steps needed to prepare, plan and implement IoT solutions in any industry.
Mr. Kranz will also draw on case studies in his forthcoming book, “Building the Internet of Things: Implement New Business Models, Disrupt Competitors, Transform Your Industry.” The case studies will feature successful IoT implementations at companies such Ford Motors, Harley Davidson, and Stanley Black & Decker.
Maciej Kranz, Vice President, Corporate Strategic Innovation Group – Cisco Systems
9:00 am – Featured Presentation
2020: Life with 50 Billion Connected Devices
It’s a sunny March morning in 2023. 7:18 AM. You’re buttering your bagel and gulping your coffee. You’re looking forward to your commute – you’ll do a conference call with your team. You’re thankful you don’t have to actually drive, your car knows the way. As you get into your car you are presented with an urgent message. Your car has been immobilized and you need to pay 4 Bitcoin in ransom. You’re not going anywhere right now.
Learn from one of the foremost IoT thought leaders how a world of sensors, devices and machines everywhere, some we see, others we don’t, sending vast quantities of data, will affect our daily lives, change our behaviors, and influence our thoughts about innovation, convenience, security and privacy. We’ll examine a day in the life of a digital citizen in 2020 and identify the implications of a world where nearly everything is connected.
Three questions this session will answer:
Gary Davis, Chief Consumer Security Evangelist - Intel Security
10:00 am – Networking Break in Exhibit Hall/Expo Hall Opens
11:00 am – Breakout Sessions Begin
IoT: A Great Opportunity, but Security Issues Hinder Adoption
The emerging IoT trend presets many stakeholders a great opportunity to thrive, however, the burgeoning number of connected devices creates new security threat vectors that are already being exploited by bad actors. In this presentation, the audience will hear how the market is growing for IoT devices, services, and applications, but also the dangers from a security standpoint.
Neil Strother, Principal Research Analyst - Navigant Research
Session 2 -
The Role of the First Receiver in a Maturing IoT Market
While the data growth in IoT, and the overall growth in deployed IoT systems remains relatively small compared to almost any projection, the consensus is strong that data growth will be enormous. The key will be leveraging the underlying value of all of that data to translate into insight that begets action. The ultimate goal of IoT deployment will be to allow for leveraging the value of the data so the right data is delivered to the right constituent at the right time in the right way – as that is where the real and maximum value for companies will be derived.
This session will explore the notion of the First Receiver and how this technological advancement will provide the disruptive innovation that every executive should know in order to fully understand the opportunity as well as the practical execution considerations of leveraging IoT to the fullest.
Don DeLoach, CEO and President – Infobright
11:30 am – Session 1
Protecting Industrial Internet of Things Endpoints
An attack to an Industrial Internet of Things system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent. An endpoint is a component that has an interface for network communication and the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied.
There are many security threats and vulnerabilities that can be exploited in an IIoT endpoint and developers must be aware of the possibilities. Attack points exist in hardware components, the boot process, operating system, applications, APIs, and many other areas. Endpoint security solutions must address data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection.
Marcellus Buchheit, President and CEO – Wibu-Systems USA
Session 2 -
The IoT Ecosystem: Think Beyond Connectivity
IoT is about so much more than connectivity. It’s about how the application of IoT data is going to change everything, from healthcare, to business productivity, to the way cities operate.
John Gardner is a lead investor at NGP, which is currently the largest fund ($350M) to focus specifically on IoT. He will discuss why applied machine learning is an essential component to success, and why solutions must be tailored to specific industries. Drawing from his IoT investment expertise, he will also discuss solution trends and his vision for the global proliferation of IoT.
John Gardner, Partner – Nokia Growth Partners
12:15 pm – Networking Lunch
1:15 pm – Session 1
IoT Security: Smarter Systems Engineering Must Compensate for Our
It’s fascinating to read the accounts of IoT related hacks, especially those that make headlines in both the popular press and the tech blogs. Casual readers might conclude that opening the door to IoT connected devices means hackers will have access to their cars, their security systems and even literally their front doors. Reading a bit more deeply into these stories reveals that, as Cisco has said, “employees are the weak link.”
Systems engineering and its cousin systems thinking suggest a path to an answer. If we understand that both intentional hackers and unintentional misbehaving humans are part of the system, then thought can be given to making the system resilient and responsive, even to threats that don’t look like threats. As we like to say in systems thinking, “the system is always working,” that is, the system in its entirety is working as we have designed and built it. This session will explore ways to use these ideas in designing IoT systems.
Barclay R. Brown, Ph.D., ESEP, Global Solution Executive – IBM Watson IoT
Session 2 -
Connecting Humans to the Industrial Internet of Things
The promise of the Internet of Things is the creation of systems having increasing intelligence. These smart systems rely on machine learning and analytics derived from ubiquitous IoT devices. The Industrial IoT will follow the same evolution, but due primarily to safety concerns, it will continue to have a stronger focus on the human in the loop. Humans must distill large amounts of sensor information for situation awareness in order to control industrial processes. While this has primarily been done from a central control room, a more mobile workforce is emerging, requiring an adaptive contextual human machine interface (HMI) which is available on standard mobile devices.
Contextual HMI provides the right information and controls to the right mobile device delivered securely to the right person at the right time. Mastering the interface between humans, industrial systems and the connected industrial IoT devices increases efficiency, accuracy and safety of humans managing automated industrial processes, smart buildings and energy management.
Ed Nugent, Chief Operating Officer – PcVue Inc.
1:45 pm - Session 1
Crypto Strategies for IoT Devices
Cryptography is critical to the protection of IoT data, systems, and devices; but it is also the aspect of IoT that is most often done improperly. This has led to everything from IoT botnets to data theft, and spawned an entire fledgling market for cryptographic APIs, libraries, and systems using everything from the blockchain to specialized hardware.
In this presentation, we will explore the basic concepts of cryptography, and demystify the concepts that the cybersecurity industry too often over-complicates. We will erase the fear, uncertainty, and doubt when it comes to choosing algorithms and methods, and offer some simple solutions for properly implementing cryptography in devices constrained by strict size, weight, and power limitations. Whether you are choosing from the vast array of commercial and open source products or looking to implement encryption yourself, this presentation will give you all the knowledge you need to make the right choices.
Tom Mihm – Redwall Technologies
Session 2 -
A New Model for the Industrial Internet of Things
The Internet of Things will generate a phenomenal 400 zettabytes of data a year by 2018. In all of that data lies unprecedented opportunities, especially when it comes to the Industrial Internet of Things. Rather than harnessing the vast economic value of this new data, most enterprises are overwhelmed by the sheer amount of it. When they attempt to use it to their benefit, they seek help that forces to customize a one-size-fits-all software product and change management to adopt it.
This session will cover a new model that promises to change our current approach to the IIoT. One in which even older, well-established companies can apply their deep expertise to co-create relevant digital solutions.
This model enables companies to innovate and leapfrog generations of technology without having to internally develop massive capacity in big data, analytics and software development. Instead, this model allows technology startups to contribute their entrepreneurial speed and agility on solving complex and relevant industrial problems. This leads to digital transformation and true IIoT value, with a minimum of pain and expense.
Joseph Bradley is President of Business Ventures – Uptake
2:15 pm - Session 1
Hardware vs. Software security – What is Right for my IoT Device
Engineers developing IoT and IIoT devices have a wide range of choices for adding security to their device. Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates and security management.
This presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied in order to secure IoT devices. Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations.
Alan Grau, President and Co-Founder – Icon Labs
Session 2 -
How the Third Wave of Internet Evolution Will Affect Manufacturing Automation Systems
The first Internet wave constructed the infrastructure that forms the Internet we enjoy today. Websites, once new and novel, became mandatory. In the second Internet wave, apps and cloud computing became integral to our work and home lives. Global apps like Facebook, Uber, Pandora, Twitter and became prominent. Other apps were created to serve employees, suppliers, and customers. Now we are on the cusp of a third Internet wave – pervasive, integrated, seamless connectivity that will again change how we work and how we live.
This presentation will examine how that third Internet wave, the industrial Internet of Things, will transform manufacturing automation. It will examine the changing requirements of manufacturing systems, the third wave technologies that can meet these requirements and how automation integrators can profit from this evolution.
John Rinaldi, Chief Strategist and CEO – Real Time Automation
2:45 pm – Session 1
IoT Driving the Need for More Secure Big Data Analytics
Cyberattack methods are increasingly sophisticated. Of great concern is that the IoT ecosystem expands this attack surface – not only the back-end, but also mobile applications and connected devices. The impact of a successful data breach includes damage to the mobile operator’s brand and reputation, loss of sensitive customer data and potential physical damage to the individual person.
Data privacy as well as security needs to be at the forefront of strategy and architectural considerations, in commissioning any new enterprise application processing sensitive data, and in implementing new IoT initiatives.
‘Privacy by Design’ has emerged as an essential best practice in meeting security and privacy compliance mandates. This embodies data-centric security to neutralize sensitive data in use, in motion, as well as at rest; software development lifecycle security and automated application vulnerability detection during release and operation.
Reiner Kappenberger, Global Product Management - HPE Security
Session 2 -
What Do Agricultural and IoT Have to do With Each Other?!
One of the global challenges facing our world is the fact that population growth will soon outpace food production. It’s estimated that by 2050 the population will reach 9.7 Billion. To meet the food needs, global agriculture will need to increase by around 70 percent. Learn how Deere & Company is working to provide solutions to feed the world using IoT.
Using case studies and recent applications, this session will teach attendees about some of the common pitfalls found working in remote environments and explain why connectivity is critical. This will help bring to life what IoT enablement means for the agriculture market. Attendees will gain a deeper understanding of the business case for using IoT and will understand that IoT in global rural areas is critical.
Kevin Hendress, Technology Architect - Deere & Company
3:15 pm – Networking Break in Exhibit Hall
3:45 pm – Session 1
Connecting the Unconnected: Hardware Pitfalls to Avoid
You’ve got your development board, your applications are running, your backend is operational and you’re pulling data into the cloud. But are your endpoints properly developed and positioned to reliably gather that data and communicate it? How are you going to ensure your connected devices don’t suddenly become unconnected?
Similar to the business transformation that followed companies who moved from spreadsheets to automated ERP systems in the past, modern day companies face a new business transformation opportunity by catching the IoT wave. This involves connecting the unconnected to mine data from sources that were never available in the past, providing unprecedented business intelligence. In this session, Morey CTO Richard Catizone discusses how embracing the IoT revolution inherently puts businesses and “big data” into the embedded hardware game, common hardware pitfalls to avoid in the design, manufacturing and deployment stages and solidifying your value chain to assure reliable endpoints and data collection.
Richard Catizone, CTO – The Morey Corporation
Session 2 -
Sensor-2-Server: Execute Locally, Communicate Globally
The increasing shift toward Industrial Internet of Things (IIoT) tends to bring up a lot of questions about the continued value of Supervisory Control and Data Acquisition (SCADA) systems that have traditionally served as the driver for monitoring and control in industrial markets. Although OT and IT are beginning to converge, there is still high demand for SCADA data. However, new technology offers the opportunity for data to be used in ways that were previously not possible, such as predictive analytics. This doesn’t make SCADA obsolete, as many operators are using it and will continue to employ it.
Scott Allen, Chief Marketing Officer – FreeWave Technologies
4:15 pm – Session 1
Connecting the Industrial IoT
Despite the hype around consumer IoT applications, most analysts agree that the future potential of the IoT is not in the consumer market but in the business market. More specifically, the industrial/manufacturing sector. The IoT has the possibility to completely disrupt the industrial market; streamlining processes, ramping up productivity, boosting efficiency and generating new revenue streams.
However, there are many aspects of IoT application design that are unique to this sector, not least the extreme conditions that can be created by industrial processes, the complexities caused by different elements of the supply chain and the disparate location of manufacturing premises. Added to this, traditional business models and information silos will need to be drastically altered. This presentation will discuss the keys to success for Industrial IoT solutions and explain which aspects need to be addressed at the design stage to ensure longevity of the application in the field.
Sam Colley, CEO – Podsystem, Inc.
Session 2 -
How IIoT has Changed the Current Industrial Landscape
We are looking towards a future where there will not just be smart factories but altogether smarter manufacturing. With machines generating enormous amounts of data, Industry 4.0 is well on its way. There is a need to create Intelligence that understands this data and can react to it. With specified rules running on real time data, anomalies can be identified and reported. The reported anomalies needs to be studied by a system that can improve itself. This is where Artificial Intelligence, Machine Learning, and Data Science meets Industrial IOT. By applying the latest technologies to the machines and the data they generate, they can not only be smarter but more proficient in areas like Product Design, Production, Supply chain to impact the entire lifecycle of a manufactured product.
Chad Dirks, Engagement Director – Softweb Solutions
4:45 pm – Session 1
The Rise of eSIM for IoT, M2M and Wearables in Consumer Devices
The concept of the embedded SIM (eSIM) card for mobile devices has not been completely defined nor truly implemented yet in a big way on M2M and IoT Devices, yet the potential uptake in usage is staggering. Imagine Smart City meters, connected cars with 3/4G LTE WWAN wireless connectivity all requiring an eSIM.
The key to understanding eSIM is to understand Multi-IMSI - International Mobile Subscriber Identity and operator profiles, which allows for the MNO’s (wireless operator) profile to be purchased as part of a data plan for downloading over the air and on the fly where only one subscriber can be present (only one enabled profile) at one time but a cleaver way to avoid incurring heavy roaming fees for out of state or country data usage on the device (especially in another country). We will explain how the wearables industry will explode in 2016 for eSIM products on Smartphones, Tablet PCs, Smart watch wrist bands and even more. Karl’s presentation will focus on both Hard and Software for connected wearables.
Karl J. Weaver, OEM Biz Dev Director – Oasis Smart SIM
Session 2 -
Increasing Connectivity for Mobile Circumstances in Distributed Enterprises
The next step in IoT is to increase connectivity for mobile circumstances. For distributed enterprises to take maximum advantage of IoT solutions, it is critical to have in place highly reliable, high-bandwidth mobile connectivity in a dramatically smaller form factor, combined with the flexibility to perform diagnostics and analytics anywhere decision makers want, such as on-site or at a central location.
Fog computing is the key to optimizing mobile connectivity for distributed enterprises. Fog computing extends cloud computing to the edge of network, helping end devices and data centers work together better. When relaying data via LTE, mobile enterprises present a challenge for off-loading or storing mass amounts of data in an efficient, cost effective way. In order to keep costs down and increase efficiency and impact, the ability to run applications directly on the connecting gateway and process data on-site is essential.
Jessica Sweeney, Senior Director of Market and Product Strategy – LILEE Systems
5:15 pm – Cocktail Reception in the Exhibit Hall
March 30th, 2017 – Day 2
7:30 am – 8:00 am – Registration Opens/Continental Breakfast
8:00 am – Keynote Presentation
Making Value Chains Smarter: Impacting Performance with IoT and Big Data
Enterprise data volume is concurrently estimated to grow 50X year-over-year between now and 2020. At the same time, more than 30 billion devices will be wirelessly connected to the Internet of Things by 2020. IoT and Big Data presents both challenges and opportunities for companies and supply chains.
The use cases for IoT and Big Data in supply chain, product development and manufacturing are numerous – from sensing and shaping demand to better predictability in capturing production changes, monitoring environmental values among many other scenarios. How can you leverage IoT and big data to boost you companies performance? This session will discuss the impact, best practices and case studies on how leading companies are leveraging IoT & big data today across their supply chains to impact growth and performance.
Maha Muzumdar, VP, Industry Transformation, Cloud Business Group – Oracle
8:45 am -
Making IoT Smarter with Artificial Intelligence
It is predicted that 50 billion IoT devices will be connected by 2020. Along with the devices and sensors connected to the internet are massive amounts of data. What will we do with this data? In order to make use of the data and obtain insights is through Artificial intelligence. Artificial Intelligence allows us to make things smarter.
In this presentation, we will focus on the opportunities in IoT and how Artificial Intelligence can enhance devices and services to make the Internet of Things smarter. We will also walk through a live demo of a smart home solution integrated with craft ai, an AI-as-service platform.
Jeanine Jue – Software Engineer, Developer Evangelist – Samsung ARTIK Cloud
9:30 am -
Start Building Practical Field-to-Enterprise IoT Connectivity
The amazing benefits that IoT can potentially offer businesses and the economy has mesmerized companies and countries alike. While there is a lot to be excited about– it is essential for companies to be aware that IoT digital business transformation is not a one-step process. Instead, it is important to team up with an experienced OPC UA technology suppliers, prepare a pragmatic game-plan that starts with OPC UA enabling infrastructure for open, secure, and reliable data connectivity while preserving investments. Attend this session to learn what leading companies are doing today, how you can get started, and what is coming next in the rapidly growing world of OPC UA/IoT data connectivity.
Thomas Burke, President – OPC Foundation
10:00 am – Networking Break in the Exhibit Hall
10:30 am – Session 1
Debunking the IoT Standards Myth
Many argue that the lack of industry-wide standards limits the mass-market adoption of IoT solutions. But they’re wrong.
As the leader of NGP’s Connected Enterprise IoT investments, Upal Basu can debunk this myth, and will share why he is adamant that, from railways and home video to telecoms and smart phone evolutions, standards driven by industry quickly emerged when the value of the solution became fully apparent. Once industry sees the customer demand, standards tend to coalesce relatively quickly – the same will happen with IoT. Upal will explain why companies driving tangible value for customers are already gaining traction, and the winners will shape the standards to their own needs rather than waiting passively for the industry to come together.
Upal Basu, Partner, Nokia Growth Partners
Session 2 -
The Rise of the Machine – is Skynet Closer Than Ever?
Skynet? Really? How close are we to self aware, self replicating machines? In this fun session learn some of what computers can do and what they can’t. You think you know. You may be surprised.
The emerging focus on Cognitive computing, general AI, Computer Vision, Internet of Things, etc. signpost the way to new opportunities and new challenges for computers and humans alike. We decided to see how far we could get in building our own version of an all powerful controlling entity.
In this session we’ll cover how we did it, what we learned and answer those important questions like: “Can we build a Skynet yet?”, “Can my computer be my best friend?”, ”Will I ever able to program without a keyboard?”, ”Can a computer read my mind?” and the all important “will drones be able to deliver beer at the right temperature?”
Steve Poole, Lead Engineer, Cloud and Development Platforms – IBM
Luc Desrosiers, Certified IT Architect – IBM
11:00 am – Session 1
Monetization of IoT – New Business Models Bring new Challenges
Comparing IoT to the established world of mobile apps, the traditional models of one-time purchase of apps, subscriptions to services, and in-app purchases, are being replaced in IoT by real-time billing on demand, billing per transaction or per byte of big data, micro-payments, and the holy grail of data brokering where it’s the data (not the app) that’s valuable and can be sold and resold again. The key to successful monetization of IoT is understanding the ecosystems and the business benefits they derive. This presentation will analyze why IoT billing solutions need to be very different from everything we have seen before, the landscape of monetization providers, and some real use cases being deployed.
Colin Chong, Head of Product – AppDirect
Session 2 -
AI Testing for Today’s IoT Digital Ecosystem
Digital experiences are no longer confined to the desktop or mobile device. Artificial intelligence (AI) products will represent a big part of the IoT digital ecosystem. As the increasingly connected digital landscape continues to expand, especially as new AI products hit the market, the ability to research, test, and get user feedback about digital experiences from people who mirror a company’s end user base is the key for brands to gain a major competitive advantage over those who don’t.
This session will explore how the leading AI players are making sure their development teams are designing high-quality AI-based interfaces that consumers demand and expect, as well as the best practices to solve typical AI usability testing challenges that developers need to know about.
Rahul Shah, Senior VP of Global Delivery & Customer Success – Applause
11:30 am – Session 1
Predictive and Dynamically Adaptive Solution for Cost Effective IoT Connectivity
It is expected that with 20 – 50 billion devices by 2020, more than 50% of the traffic will be from “Things”. This will have a big impact on the wireless ecosystem. IoT services are likely to be a key driver for further growth in cellular.
Deployment of these IoT devices is very likely to ride on the same wireless network deployed for traditional non-IoT broadband traffic. Scale and diversity of IoT devices will inevitably put a strain on the network and add varying, uncontrolled demands on wireless networks. The main concern for operators deploying IoT today is the impact to user experience and KPI degradation to non-IoT traffic when the IoT traffic explodes.
Attendees at this session will learn the optimal Access/Path selection for handling IoT traffic while maximizing network resource usage and ensuring quality of experience for legacy traffic.
Padma Sudarsan, Director and Domain Leader, Mobile Network Chief Technology Office – Nokia
Subhasis Laha, Director and Domain Leader, Mobile Networks Chief Technology Office – Nokia
Session 2 -
Enabling a Serendipitous Internet of Things With Distributed Ledgers
This session will describe a serendipitous IoT; one with outcomes that are both beneficial yet unforeseen. These interactions will act on the users behalf with some level of autonomy and will demand much more flexibility and dynamicity than the current model of prior configuration and static interactions. A serendipitous IoT demands dynamics in how devices discover each other, validate their authenticity, determine what data and services they can provide, and even negotiate payment for those services.
Attendees will explore how placing a representation of a device – its features and services, its capabilities and constraints – on a distributed ledger might enable such a flexible interaction model. The session will conclude with the speaker exploring the implications of devices writing and reading to a distributed ledger in real-time on the performance requirements of that ledger (e.g. the consensus protocol, fairness, etc.), and whether current blockchains can be expected to meet those requirements.
Paul Madsen, Principal Technical Architect – Ping Identity
12:00 pm – Networking Lunch
1:00 pm – Session 1
Chasing Changing IoT Standards Without a Crystal Ball
Less than two years ago, manufacturers wanted their connected consumer products to “work with Nest.” A few months later, they wanted their products to work with Apple Homekit. And yet again, before their designs were completed, they had switched to wanting their product to work with Amazon’s Alexa.
Combining improvements in speech, artificial intelligence and microphone technology, voice-activated “conversational systems” like Alexa and Google Assistant are an exciting shift away from mobile screen-and-keyboard-controlled consumer IoT product interfaces. But they way things seem to be going, interactive virtual augmented reality may be the next big thing.
In light of constantly changing standards, this presentation will cover:
Oliver Cockcroft, Product Architect - Ayla Networks
Session 2 -
The Future of IoT in an AI World
The adoption of IoT devices is creating an environment where large amounts of big data is being generated. The emerging movement will be taking this Big Data and using it to drive AI (Artificial Intelligence) using the inputs from IoT devices and the AI to automatically drive events and decisions at both a system level and a regional level. What are the possibilities? This session will address some of the challenges that need to be addressed in the IoT world and will help educate the attendee as to the current state of IOT and AI coming together and further explore some of the potential possibilities for the future.
Paul Williams, Vice President of Solutions – Control4
1:30 pm – Session 1
As IoT in the Consumer Sector Experiences Wireless Crowding, are Backbones the Key to its Survival?
Broadband carriers are increasingly delivering ultra-broadband services of 100 Mbps to a Gigabit to the home. But are in-home networks able to keep up? Distributing high bandwidth entertainment applications seamlessly throughout every corner of the home is now the expectation of the consumer. G.hn, a multi-medium wired solution, could be the key to securing a fast, simple, stable and secure means to connect the explosive number of devices and services being installed by consumers.
Donna Yasay will discuss how G.hn is the only medium that can fulfil the needs of distributing the upcoming 10 Gb broadband required by carrier services to meet the demands of consumers. She will expand on how G.hn can reliably deliver wireless video throughout the home in the home’s existing infrastructure; over powerline, coax, phoneline or Passive Optical Fiber (POF) with the lowest latency required to deliver a seamless in-home ultra-broadband experience.
Thomas Starr, Board Member – HomeGrid Forum
Session 2 -
Artificial Intelligence-Based Data Product for B2B IIoT Applications
The data generated by Industrial IoT applications is put to two main uses: (1) predictive maintenance of the devices, and (2) feedback to the vendor for design improvements. But a third, novel data product could address the needs of business customers for operational improvements, unlike B2C uses of IoT where consumers generally lack external stakeholders that drive them to improve. Advances in artificial intelligence enable confidentially comparing business customers to each other, discovering comparative insights, and expressing them in perfect, shareable English (not dashboards) which serves both to enlighten and to motivate, either for internal customer success purposes or as a premium information product. I’ll discuss applications of such benchmarking technology in domains that are analogous to IoT.
Raul Valdes-Perez Co-Founder – OnlyBoth
2:00 pm – Session 1
IoT Adoption and Security Accountability in the Smart Home
For many years, the Smart Home was seen as limited to enthusiasts who had the money to afford IoT devices and were based in regions with the infrastructure and availability of gadgets to support the craze. But with the rise of IOT popularity and maturity, the market has since shifted. This raises a key question when it comes to IOT security: Who is accountable?
There is no unified regulating body to instill functional and security standards on device manufacturers. Users have the freedom to decide which IoT devices to introduce to their homes, but they don’t always understand how their personal privacy or safety may be effected. As IoT branches out from user homes and into the city, users become significantly more powerless. Will the burden of security fall to government? This session will include an interactive discussion around the security considerations of smart home adoption trends and review the responsibilities of manufacturers, municipalities, consumers and the security community.
Jon Clay, Sr. Manger Global Threat Communications - Trend Micro
Session 2 -
Machine and Device Connectivity
Large PaaS vendors have developed big data offerings that claim to consume and analyze device data, and then provide results that will improve your customer’s experience, help you build better products, and enable new revenue streams. But what about the devices themselves?
They need to be up and running so that they can continue to perform and provide the data needed by these platforms. Devices need to be managed throughout their lifecycle so that they can provide that data, but also perform optimally and be protected from new and unknown security threats. In addition to a data strategy, successful IoT programs need a device management strategy; one that accounts for the health and care of devices in the field.
This presentation will cover the components of device lifecycle management, how it fits in with PaaS offerings, and what companies should consider as they develop an IoT strategy for their devices and the data they produce.
Dave Bennett, Director of Global IoT Sales – WindRiver
2:30 pm – Session 1
Home 2.0: The Impact of Home Assistants on the Connected Smart Home Landscape
Home assistants (HAs) can change this and help catapult penetration of connected smart devices into millions of homes by providing a brain and body to represent home as we know it, enabling humans to experience an easier and more pleasant interaction with their home. Furthermore, HAs will deliver a new platform for 3rd party application development, and will be in position to become the next generation of revolutionary platforms after smart phones and smart watches.
However, the human machine interaction (HMI) of HAs is critical to the success or failure of the platform. This presentation will provide an overview of the smart integration of speech and machine vision along with smart segmentation of embedded and cloud services, in addition to usability cases that will provide the greatest benefit to consumers.
Mesut Eraslan, Senior Director of Design and Engineering – Flex
3:00 pm – Conference Conclusion & Closing Remarks