M2M Evolution Miami 2015 In Progress

M2M Evolution Conference Program


PRINT FRIENDLY

Monday, August 17, 2015
12:00pm
Monday - 08/17/15
IoT Certification Course
IoT+M2M Introduction; Overview Terminology, and Concepts
IOTC-01
Marketing Chair
OneM2M
The first of three sessions will focus on the Promise, the Opportunity… and the Challenges in deploying a fully realized IoT. Is the market potential Billions? …Trillions? …and how to we get there from today’s initial deployments. Key industry terms will be defined and their usage described, including the distinction between, and co-dependence of IoT and M2M.
IoT Security Summit
Protecting and Defending the Edge
IOTS-01
M2M Solution Sales Manager, NORAM
Gemalto
Senior Partner
RMAC Technology Partners
Business Development Manager, Technology Partner Program
Axis Communications
The growth of IoT is occurring at an incredible rate and we are becoming increasingly reliant on intelligent, interconnected devices in our lives and businesses. This reliance is raising alarms about security and privacy issues. How do we protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? This panel discusses the critical issues in developing, managing and securing the edge devices in an IoT Network.
1:00pm
Monday - 08/17/15
IoT Certification Course
IoT at the Edge; Sensors & Technologies
IOTC-02
Marketing Chair
OneM2M
The 2nd session will begin with a discussion on ‘Things’ e.g. Sensors, Wearables, Constrained Devices, and MEMS, and the role each plays in building and implementing a fully interconnected IoT. The need to tie together this myriad of edge technologies leads to an overview of the current landscape in Sensor Networking Topologies. This includes wireless topologies such as 3G/4G, 5G and Mesh, as well as the extensive list of networking capabilities coming from: Allseen, Apple, Google, OIC, ZigBee… and others.
IoT Security Summit
The Core of Securing Networks
IOTS-02
Founder & CEO
PubNub
Senior Analyst - Security & Managed Services
James Brehm & Associates
Everyone draws a cloud these days to signify the network, but is the network the Internet, a private cloud or a hybrid? How do companies connect the edge, gateways, core and cloud will minimizing or avoiding weak links? This panel talks to the issues of deploying networks, managing ID’s and protecting the network from hackers.
2:00pm
Monday - 08/17/15
IoT Certification Course
Putting it Together; M2M Architectures and Services
IOTC-03
Marketing Chair
OneM2M
The IoT cannot become pervasive on a single device family, or on a single edge network type. This closing session will bring it all together, and explain how IP-based M2M communications capabilities such as CoAP, HTTP, and MQTT allow sets of systems to be aggregated, to interwork, and to federate. These are the tools needed to scale massively, and to build interconnected applications and services; extending from multi-room… to multi-national, and fulfilling the promise of the IoT; “Everything Connected”.
IoT Security Summit
Security at the Top
IOTS-03
Principal Analyst
Machina Research
Distinguished Engineer
IBM
Application Level Security is sometimes viewed as the ultimate security location. As the Bring Your Own Device [BYOD] employee and customer use their smart phones, tablets and personal devices to access IoT business intelligence, the ability to use firewalls comes down to application specific ports and constant monitoring. How can applications lock themselves down and ensure that they are not a gateway to an Enterprise? Does using mobile Web apps add additional vulnerabilities?
3:00pm
Monday - 08/17/15
IoT Evolution Battle of the Platforms
X-01
Senior Manager M2M/IoT Product, Platforms & Strategy
Sprint
Senior Manager, M2M/IoT Business Development
T-Mobile USA
Internet of Things Lead Marketing Manager
AT&T
Director, Product Management
US Cellular
M2M Specialist
Verizon Wireless
General Manager, M2M/IoT Global Partner Sales
Telefonica
TIME TBA: accelerated TIME TBA: anypresence TIME TBA: Mera TIME TBA: Numerex TIME TBA: Opengear
TIME TBA: Onstream TIME TBA: Spireon TIME TBA: Systech
5:30pm
Monday - 08/17/15
Battle of the Platforms Networking Reception - Open to All Attendees
X-02
Tuesday, August 18, 2015
8:00am
Tuesday - 08/18/15
Continental Breakfast
X-03
9:00am
Tuesday - 08/18/15
Analyze This
GS-01
Founder and Chief Technology Evangelist
James Brehm & Associates
Partner
151 Advisors
Principal Analyst
Machina Research
CEO, Director of Content
Crossfire Media
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
Analyst
451 Research
Practice Director, M2M and Enterprise Mobility
ABI Research
When the analysts talk, you need to listen! Now you’re moving beyond the Hype into the realities of implementation - which means that IoT is not only everywhere, but its changing the way we work, live and travel. Gather with the analysts to not only see the big picture, but to understand where the rapid growth is happening and what opportunities will emerge in the next eighteen months.
10:00am
Tuesday - 08/18/15
Special General Session
GS-02
CEO
Eurotech, Inc.
10:45am
Tuesday - 08/18/15
Special Presentation by Spireon
GS-03
Chief Executive Officer
Spireon
11:15am
Tuesday - 08/18/15
Keynote Presentation by Joe Gibbs: A Winning Mindset
K-01
Joe Gibbs Racing, Inc.
Data is key, whether that means having the best information on the football field, the most accurate diagnostics for a race car, or launching a new IoT application. Coach Gibbs shares his personal experiences and looks forward to a data-driven future.
12:00pm
Tuesday - 08/18/15
Luncheon - Business Impact Awards
X-04
1:00pm
Tuesday - 08/18/15
Connected Home & Building
The Ultimate Gateway: The Battle for Your Home
CH-01
Research Analyst
BI Intelligence
VP, Marketing
Icontrol Networks
Meter? Thermostat? Alarm panel? Refrigerator? As connections proliferate in and around the home, which connected device will come out on top as the “master control” for your household? Our panelists come armed with their favorite devices to battle it out for the lead in the story of your connected life.
Connected Transportation
New Business Models for the OEM
CT-01
Director, Business Development
CalAmp
With more than 100 years under its belt, the automotive OEM business can hardly be considered new anymore. But the current proliferation of connected technology in the vehicle is driving a new class of innovation. While connected car offerings over the past 15 to 20 years tended revolve around a few key services, we are beginning to see entirely new business models emerge taking connectivity to new levels. How will these new services affect our driving experience and how will they impact vehicle-dependent businesses like rental cars, taxis and the like?
Fog Computing, Analytics & Data
Leveraging the Cloud to Manage Your Thing Data
FOG-01
Co-Founder
Bright Wolf
Founder and Chief Technology Evangelist
James Brehm & Associates
Principal Strategist
Cisco Systems, Inc.
Founder & Chief Strategy Officer
WoT.io
M2M Business Development Director
ILS Technology a Telit company
Sr Director of Marketing
AMD
The more we connect, the more data we have to manage, analyze and act upon. How are cloud services impacting the Internet of Things and how can you find the best possible solution to managing your unique data sets?
IoT Evolution Developer
Get Cloud Resources to the IoT Edge with Fog Computing
IOTD-01
Technical Leader and Platform Architect
Cisco
Embedded devices in the IoT are hampered by the compute, storage, and service limitations of living life on the edge. As IoT edge devices comprise broader sensor networks for industrial automation, transportation, and other safety-critical applications, their high uptime requirements are non-negotiable and service latencies must be kept within real-time or near-real-time parameters. However, the size, weight, power, and cost constraints of edge platforms also inhibit the on-device resources available for executing such functions. In this session, Byers will introduce Fog Computing, a new paradigm for the IoT that extends compute, storage, and application resources from the cloud to the network edge. Beyond the interplay between Fog and Cloud, Byers will show how Fog services can be leveraged across a range of heterogeneous platforms—from end-user devices and access points to edge routers and switches—through software technology that facilitates the collection, storage, analysis, and fusion of data to drive success in your next IoT device deployment.
M2M Evolution
Value Chain in Flux
IOT-01
CEO
KORE
Director of Product Management & Business Development
Systech Corporation
President, Telit Americas
Telit Wireless Solutions, Inc.
There has been plenty of M&A activity of late in the M2M/IoT space, but the question for new adopters remains: exactly what bits and pieces do I require to develop and deploy my IoT application. We’ll talk to super focused players as well as those who are working to deliver a comprehensive end-to-end solution to understand exactly what makes up a complete solution and which players are involved. Plus, we’ll take a look at some of the latest mergers and acquisitions to understand the go-to-market strategy of these “new” companies and what their consolidation means for their customers.
2:00pm
Tuesday - 08/18/15
Connected Home & Building
Convergence: The Connected Home in a Connected World
CH-02
Director, Product Management – DTBU
Spirent Communications
Sr. Director of Product Marketing
Ayla Networks
There is a lot of promise from the connected home and other connected applications that make up the Internet of Things. But to truly deliver on that promise, our connected cars, homes, offices, etc. will all need to speak to each other. Take a look at early crossover applications and how they work together to deliver enhanced value as a unit.
Connected Transportation
Beyond Built In: Consumer Aftermarket
CT-02
M2M Specialist
Verizon Wireless
What new applications are drivers adding on to their vehicle? Connected services are delivering the new custom car. Whether it’s an aftermarket navigation system, an insurance rate-cutting OBD II dongle, a virtual backseat driver for your teenager or a satellite radio, savvy consumers are looking to create their own seamless connected experience even without paying a premium for top-of-the-line embedded connectivity. Learn about the applications drivers are giving a green light
Fog Computing, Analytics & Data
Saas/Paas: Leaders or Lackeys, Who Will Lead, Who Will Lose?
FOG-02
Principal Analyst
Machina Research
Analyst
First Analysis
Sr. Strategist & Consultant, Head of M2M
Compass Intelligence
Principal Analyst: Enterprise Services
Ovum
Practice Director, M2M and Enterprise Mobility
ABI Research
It seems nearly everyone in M2M and IoT is coming up with a new platform as a service offering. Among so many contenders, it can be a challenge to even evaluate the differences. Who’s most likely to succeed? Examine the latest industry resesrch and evaluate the top players, find the right fit and hear a few predictions for the future of IoT cloud platforms.
IoT Evolution Developer
Securing Embedded Devices in the Industrial IoT
IOTD-02
President & Co-Founder
Icon Labs
The Internet of Things is enabling connectivity in ways we didn’t even imagine five years ago. Soon connected Things will be everywhere, and many of them will be outside of traditional security perimeters. Companies are aware of the need to ensure privacy and protect data, but little attention has been paid to securing the device itself. Organizations have traditionally relied on perimeter security; but alone, that tactic is not enough and doesn't scale to meet the demands of IoT security. The perimeter can be compromised, and in many cases threats originate from inside the secure zone. More importantly, the Things in the IoT are often deployed outside of the traditional security perimeter and have no protection at all. Even though many corporate PCs have long been on “secure” networks, they still have firewalls and endpoint security inside. IoT connected machines and devices need the same protection. This session will cover some cyber threats for IoT devices, the approaches that can be taken to secure your device and comply with security standards, how this links with the enterprise security strategy, and how you can help create the Internet of Secure Things.
M2M Evolution
Supply Chain and Logistics
IOT-02
Sr. Industry Advisor, Manufacturing
SAS
Principal
IoT Strategies
From the factory floor, through testing, shipping and installation, IoT has a role to play in improving quality and delivery times. We bring together multiple players in the supply chain to talk about how IoT is improving their business and how they can jointly provide a better customer experience as a result.
3:00pm
Tuesday - 08/18/15
Connected Home & Building
The Latest Connected Gadgets for the Home
CH-03
President
Arrayent
CRO
Reemo
We’ve seen pet trackers, connected light bulbs -- even Internet baby monitors -- what are the latest connected devices arriving on the market for your connected home? Join our panel as we take a look at the fun, novel, inspiring, and sometimes silly devices promising to deliver the ultimate connected lifestyle.
Connected Transportation
Convergence: The Connected Car in a Connected World
CT-03
IoT, Connected Car
IBM
Senior Manager, M2M/IoT Business Development
T-Mobile USA
There is a lot of promise from the connected car and other connected applications that make up the Internet of Things. But to truly deliver on that promise, our connected cars, homes, offices, etc. will all need to speak to each other. Take a look at early crossover applications and how they work together to deliver enhanced value as a unit.
Fog Computing, Analytics & Data
Convergence 1: Managing Disparate Technologies
FOG-03
Co-Founder
Stream
Founder & Chief Technologist
Blue Mountain Microsystems Inc.
EVP, Advanced Applications
KORE
Director of Wireless Products and IoT
Semtech Corporation
Executive Director, Marketing, Information Management
Dell
RFID, NFC, Bluetooth, Wi-Fi, Zigbee, Z-Wave, SigFox, TV Whitespace, MEMS, LoRa, Cellular, GPS, Glonass, Beidou, Satellite -- there are a lot of technologies that go into a full-fledged IoT solution -- but managing them all can be a nightmare. How do cloud solutions address the problem and who makes it simple for the non-technologist line of business manager?
IoT Evolution Developer
The Evolution of Automotive Software with IoT
IOTD-03
Global Director, Business Development
QNX Software Systems
The Internet of Things (IoT) has the potential to harness vehicle information and influence every stage of the automotive lifecycle. Vehicle software is undergoing rapid evolvement to meet the demands of today’s consumer securely, including downloadable content, built-in apps, and mobile device support. The next generation of cars will require end-to-end, connected solutions that integrate sensors, data processing, and over-the-air updates to deploy fixes and new features. As the IoT continues to open up, so will new revenue streams – and challenges. Andrew Poliak will discuss how to provide a true end-to-end automotive IoT solution and strategies for overcoming obstacles to implementing the IoT in our cars.
M2M Evolution
Power Chain
IOT-03
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
CEO
PLAT.ONE
Vice President, Advanced Metering
Silver Spring Networks
Smart Grid has become a priority for governments around the world. For certain customers, the power chain management is not just optimal but critical. Whether you’re running a hospital, a police department or a data center, businesses are totally dependent on reliable power supply. How are IoT solutions improving the reliability of power from oil fields to pipelines to local delivery? What is the next step toward 100% dependable power distribution?
3:45pm
Tuesday - 08/18/15
Keynote Address by IBM
K-02
4:15pm
Tuesday - 08/18/15
Keynote Presentation by AT&T
K-03
Vice President of Industrial IoT Solutions
AT&T Business Solutions
5:00-7:00pm
Tuesday - 08/18/15
IoT Evolution Exhibit Hall Grand Opening Reception
X-05
Wednesday, August 19, 2015
8:00am
Wednesday - 08/19/15
Continental Breakfast
X-06
8:30am
Wednesday - 08/19/15
Connected Home & Building
Lessons in Building Automation
CH-04
VP, Business Development
Waterfall Security Solutions
President
Ontegrity
President & CEO
Continental Automated Buildings Association
Hear from companies who have utilized the IoT to automate facilities management and eliminate the silo management of a buildings functions. Learn from their experience, obstacles and successes.
Connected Transportation
Drones & Other Autonomous Vehicles
CT-04
Technical Leader and Platform Architect
Cisco
There’s plenty of buzz around drones these days -- taking aerial photos, bombing rebels, maybe even delivering our next Amazon package -- but few are aware just how much autonomy is already built into the vehicles we ride in every day. For years, commuters have ridden in driverless vehicles whether between airport terminals or across town. No one eve bats an eyelash at autopilot for commercial air travel. And with features like self-parking and adaptive cruise control -- even our personal vehicles are becoming more and more autonomous. We may soon achieve the transportation holy grail: cars that can’t crash. So what are we waiting for? Are we just control freaks or are there valid safety considerations holding us back?
Fog Computing, Analytics & Data
Convergence 2: Joining Disparate Business Systems
FOG-04
Director of Technology
Silver Spring Networks
If one considers the IoT revolution the 2nd stage in the computing and Internet revolution, and a critical part of that Big Data everyone talks about, then we need to think about how to merge “thing” data with the extensive, expensive enterprise resource planning and customer relationship management systems companies have shelled out millions for over the past few years. How does one go about merging often siloed IoT data with these broad reaching systems to drive enterprise-wide value?
IoT Evolution Developer
How (and Why) to Make the IoT Trusted
IOTD-04
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
Complex dynamic operating systems are moving lower and lower in the device chain and with that moves comes a possibility that they get subverted or do the wrong thing due to a software bug. The threads of this happening on a PC or smartphone are frightening, but on IoT devices that have access to key data, this can endanger lives. If these IoT devices don't operate in a trustworthy fashion, a widespread attack could result in a decision that's made in the cloud because it is based on unsubstantiated data. The solution is to establish a strong hardware device identity, a policy enforcement point in hardware that is isolated from the OS along with attestation capabilities that allow a consumer of device data in the cloud to gauge the trust level of each harvested data point after it was collected. This session will highlight how a TPM can offer all these abilities when attached securely to the IoT device and bring measurable trust to the device and the data it produces.
M2M Evolution
Lessons in Cold Chain: Food & Beverage
IOT-04
The IoT will reinvent the food and beverage industry. From Farm to Fork, the IoT will play a role in maintaining freshness, safety and the strong viability of this industry. Hear how the IoT is assisting in everything from supply chain planning and execution to farm automation.
9:30am
Wednesday - 08/19/15
Swimming with the Sharks: Finding Investors to Back Your Future
GS-04
President & CEO
AKnowledge Partners
Founder and Chief Technology Evangelist
James Brehm & Associates
Managing Director
Media Venture Partners, LLC
Managing Director, Senior Equity Analyst
Canaccord
Are you sitting on the next big idea in supply chain? This panel of finance and investment experts will help you understand exactly what it takes to get noticed by institutional investors in order to support your application from concept to reality.
10:15am
Wednesday - 08/19/15
Keynote Presentation TBA
K-04
11:15am-4:00pm
Wednesday - 08/19/15
IoT Evolution Exhibit Hall Open
X-07
12:30pm
Wednesday - 08/19/15
Lunch
X-08
1:30pm
Wednesday - 08/19/15
Connected Home & Building
Physical Security
CH-05
CEO
Machine-To-Machine Intelligence (M2Mi) Corporation
Senior Partner
RMAC Technology Partners
Business Development Manager, Technology Partner Program
Axis Communications
Senior Analyst - Security & Managed Services
James Brehm & Associates
Sensors; cameras; temperature, smoke and motion detectors -- how is your smart building equipped against physical intrusion. Thanks to the Internet of Things, we now know more about what’s happening in the building than ever before -- but with more and more data entry points, are we exposing ourselves to low-cost hacks that could render the entire system useless. Hear from security experts about how technology can protect your physical spaces, personnel and business information, while limiting exposure to sophisticated data intruders.
Connected Transportation
Lessons in Fleet Management
CT-05
Chief Technology Officer
Guavus
Vice President, Sales
Geotab
Cars and Trucks have increased their sensors 100 fold, has the software for fleet management systems kept up? This session looks at how we are adding new services and features thanks to sophisticated Fleet Management Software.
Fog Computing, Analytics & Data
Convergence 3: Managing Multiple Networks/Carriers
FOG-05
Director of Sales - Telit Connect, Telit Wireless Solutions
Telit Wireless Solutions
Chief Innovation and Technology Officer
Numerex
We’ve converged multiple radio technologies into multiple enterprise systems, but how do we manage the carrier situation? For global enterprises, this is no small hurdle. Assume for many countries, you need to use multiple carriers as a failsafe -- then add the problem of each country having distinct carriers focused on their own geographic region. LTE-Advanced carrier aggregation helps, but what about the traditional low-bandwidth M2M application? This session will discuss options to tackle multiple geographies and multiple carriers by leveraging the power of the cloud.
IoT Evolution Developer
Enabling Security in the Automobile of Tomorrow
IOTD-05
Chief Security Officer
BlackBerry
Wireless connectivity in the car, aka V2X, presents compelling capabilities for next-generation automobiles. The possibilities include improved collision avoidance, autonomous operation, predictive maintenance and lower total cost of ownership, and improved driver and passenger experiences. Security researchers, however, have demonstrated that attack vectors across these vehicular networks pose a threat to the same safety and productivity functions they seek to foster. To meet this challenge, OEMs and their suppliers must embrace a higher level of rigor when it comes to threat modeling to accurately and efficiently determine security requirements and then apply a similar level of rigor for assuring the software and systems that manifest these requirements. This class will examine common threats and mitigations facing next-generation connected cars, with an emphasis on best practices and standards for achieving this required level of rigor.
M2M Evolution
Lessons in Cold Chain: Medical/Pharma
IOT-05
CEO
Phononic
Head of M2M for the Americas
Vodafone
Co-Founder, Chief Evangelist
Aria Systems
Your Health is Priceless, so keeping costs in line seems to be a lesser priority. The IoT offers impactful ways to optimize the Medical/Pharma cold chain so that safety and cost containment go hand in hand.
2:30pm
Wednesday - 08/19/15
Connected Home & Building
Disaster Recovery
CH-06
VP of Software Engineering and Product Management
Intrado
CEO
Safer Mobility
President
Ontegrity
The world is an uncertain place -- and, as we all know, disasters can happen. How can IoT technology help identify impending disaster and assist in your recovery once disaster hits.
Connected Transportation
Carrier Aggregation for Public Transport
CT-06
VP of Business Development
Cradlepoint
When it comes to rush hour, peak demands require peak network availability. That’s the idea behind carrier aggregation, by which bandwidth of multiple carriers is made available simultaneously to provide a seamless experience no matter what the time of day. How is this unique feature of LTE Advanced likely to impact your morning commute? Our panelists will look at the technology behind better bandwidth and how carriers and hardware manufacturers are working together as never before to deliver a better mobile experience.
Fog Computing, Analytics & Data
Architectural Ideology
FOG-06
VP of Business Development
Cradlepoint
CTO
Aeris
Senior Technical Leader
Cisco
Principal Product Manager
Opengear
Cloud services come in so many shapes and forms even understanding exactly which part of your application they address can be a challenge. This panel seeks to help you find the architectural elements you need covered in order to find the ideal solution for your application.
IoT Evolution Developer
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-06
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this hands-on workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and vice-versa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage. Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
M2M Evolution
Convergence: Linking Across Verticals
IOT-06
Director, Business Development
CalAmp
What if all your IoT systems spoke seamlessly to each other? Would it improve your supply chain? Would it better ensure safe, on-time delivery of your product? This panel will look at related “links” in the chain and discuss how cooperation between suppliers can improve the total customer experience.
3:30pm
Wednesday - 08/19/15
Connected Home & Building
Connected Infrastructure
CH-07
Sr. Strategist & Consultant, Head of M2M
Compass Intelligence
Director of Smart Cities Business Development
Silver Spring Networks
Whether it’s the power grid or the roadways, sensor technology is making even asphalt smart these days. Join us as our panelists take you through some smart city cases leveraging smart infrastructure to improve both operations and services.
Connected Transportation
A Tangled Web: Insurance, Buy Here/Pay Here and Government Regulation
CT-07
CEO
Skypatrol
Over the past few years, there have been a few surprises for the telematics marketplace. Usage-based insurance and the Buy Here/Pay Here credit applications have taken the business benefits of better data and transformed them into true consumer-empowerment. And when it comes to consumers, as the FTC has already stated, it is the government’s job to protect. But how? What is the proper role of government in these are other telematics applications? When is regulation helpful and when is it detrimental? And what can we learn from these new connected approaches to legacy businesses?
Fog Computing, Analytics & Data
Holding Your Own Against the Big Guys
FOG-07
IoT is a hot topic these days and we’re seeing interest from companies who rarely if ever talked publicly about its precursor M2M. With IBM, Accenture, Google and others taking an active interest, how is the traditional M2M service provider to stay ahead of the curve. We’ll investigate how the big guys are entering the market, where their strengths lie and where partnership opportunities abound.
IoT Evolution Developer
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-07
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this hands-on workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and vice-versa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage. Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
M2M Evolution
Unchained: Unlocking Business Value
IOT-07
There are plenty of purpose build IoT applications along the supply chain today. Most are designed to drive efficiency. Today we are starting to see a trend toward new services and business models previously unconsidered. What can connectivity do for you? We’ll look into the future of supply chain management and the role IoT technology can plan in transforming your business.
4:30pm
Wednesday - 08/19/15
Connected Home & Building
Session Details TBA
CH-08
Connected Transportation
Session Details TBA
CT-08
Fog Computing, Analytics & Data
Session Details TBA
FOG-08
Sr Director, Product Management
Predixion Software
IoT Evolution Developer
Panel: The Biggest IoT Challenges Faced by Developers
IOTD-08
Technical Leader and Platform Architect
Cisco
Chief Security Officer
BlackBerry
EVP/CTO
Micrium
EVP/Brand Manager for Embedded/IoT
Open Systems Media
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
The challenges a design engineer faces when attempting to make secure and reliable connections to the IoT are plentiful. May of them have been well documented, but many have not. In this panel session, we'll uncover some of the issues that a designer may not be aware of, with potential solutions to those hurdles.
M2M Evolution
Session Details TBA
IOT-08
5:15pm
Wednesday - 08/19/15
Data Security and the Internet of Things
GS-05
Distinguished Engineer, CTG Architecture
Cisco
Senior Partner
RMAC Technology Partners
Nobody wants to be hacked -- but that common aversion becomes even more exaggerated when we apply it to our cars, child trackers, home security systems or the millions of other connections proliferating across the globe and across vertical markets. Though there has been a great deal of talk about the dangers, our panel will give us a view not only of the danger, but what is being done to address data security in the Internet of Things -- and what more needs to happen.
Thursday, August 20, 2015
8:00am
Thursday - 08/20/15
Continental Breakfast
X-09
9:00am
Thursday - 08/20/15
Connected Home & Building
The Apps @ Home Get It or Forget It!
CH-09
Chief Product Officer
Kii
Director of Product Marketing
Applause
Connected Home Applications (e.g., fitness trackers, smart heating systems and appliances) will be commonplace in five to 10 years. This means users, who have become accustomed to connected devices and the IoT, will want their digital services to work the first time, every time. If users are confused by the way a brand’s app works, they simply won’t use it and companies will lose market share. This session will focus on how companies can make their apps functional, usable and appealing across the spectrum of devices. We will revisit old testing approaches and relate to the new world of sensors. Hear how to provide superior digital experiences – from web to mobile to wearables to smart TVs, etc. to become a trusted and valued brand.
Connected Transportation
Connected Car: It’s All About Location Data, Location Data, Location Data!
CT-09
The availability of real-time location data from vehicles, phones, and almost anything else that is not nailed down, opens up endless possibilities for creating value, provided that you have the infrastructure to collect and keep up with all that data and the analytical smarts to make sense of it. From emergency response to location-based marketing, and from fraud detection to network optimization, you will need the tools to analyze geospatial locations and relationships in real time, on data in motion, and on massive amounts of time-indexed data at rest.
Fog Computing, Analytics & Data
Multi-dimensional Scalability using Fog Computing
FOG-09
Technical Leader and Platform Architect
Cisco
VP of Business Development
PubNub
This talk discusses these five dimensions of scalability in large scale IoT deployments and how Fog Computing can help address the challenges associated with them. • Capacity – Hear how Fog nodes can scale horizontally and vertically to help address capacity challenges. • Performance - Networks must exhibit low latency, high storage throughput, and very accurate algorithm results. Hear ho fog Computing allows computation and storage functions to be moved to the optimal place in the network, and dynamically grow or shrink in performance as needed. • Scalable reliability, including the ability to address non-critical but cost sensitive IoT applications in the same network as lifeline and life critical apps, directly controlling high power or potentially hazardous systems. Hear how fog nodes support both internal fault tolerance (using techniques like duplicated processors and RAID storage) and node-level redundancy. • Scalable security – Hera about Fog’s robust security infrastructure that can be selectively applied to different layers of data in different ways. • Application scalability, including the ability of Fog nodes to host different layers of different applications, isolate some applications from others, support multi-tenancy, and dynamically distribute application hosting horizontally and vertically across large networks of Fog nodes.
IoT Evolution Developer
Secure Cloud Computing for Big Data and the IoT
IOTD-09
Chief Architect
Red Hat
The IoT means different things to different people, depending on the person's perspective. Are you designing an end device? Are you designing something that has to be mission critical? In this talk, Kirkland will discuss how the cloud should be configured for the IoT and how to maintain reliability and security, even in environments with thousands of connections. He will discuss the benefits and tradeoffs of a tiered, scalable approach.
M2M Evolution
Architecture
IOT-09
Chief Technology Officer
Guavus
There is more than one way to do just about anything. Then again, there can only be one “best” way. Let’s take a look at how IoT adopters across vertical markets are architecting their solutions in order to learn from their mistakes and adapt the best-of-breed architecture to telematics applications.
10:00am
Thursday - 08/20/15
Connected Home & Building
The Guiding Light of PoS: Beacons
CH-10
VP of Business Development
Cradlepoint
Principal Analyst: Enterprise Services
Ovum
Principal Consultant
Statler Consulting
Lost in the Mall? We have an app for that! Trying to find your receipt? We have an App for that too. Hear how beacons are bringing new dimensions and data analytics to retail point of sale to impact everything from the effectiveness of displays to loyalty strategies with customers to enabling the consumer, retailer and credit card company to track the entire shopping experience. Learn are marketing metrics changing as a result of this new technology.
Connected Transportation
Supply Chain Logistics: Realities of Worldwide Delivery
CT-10
Hear how innovative wireless tracking can provide actionable data results to improve transportation logistics. Companies ship using a variety of internal and external fleets, rail, ship and air carriers. The requirements are for a sophisticated worldwide tracking intelligence to manage shipping logistics. The session will follow each step of the supply chain from initial packaging through its destination. Conclusions will be offered based on the extensive data capture that is provided through the sophisticated tracking. The volume of data collected provides the “Big Data” that can provide new insights into how IoT will benefit the transportation industry.
Fog Computing, Analytics & Data
Unleashing Value from Analyzing Data Generated by Internet of Things
FOG-10
Director, IoT Strategy
CA Technologies
Associate Partner
151 Advisors
Executive Director, Marketing, Information Management
Dell
For businesses to derive value from the massive amounts of real-time data in the emerging IoT world, it's imperative they transform their thinking, processes and infrastructure to act in seconds -- not hours and days. Forward-thinking companies are converting the vast amounts of data into actionable insights by applying advanced analytics technologies designed specifically to handle the requirements of real-time big data analytics. Providing deeper value and the ability to decipher what the data actually means to the business is what will set successful companies apart. This presentation will cover how real-time analytics generates value for IoT.
IoT Evolution Developer
From Sensor Data to Embedded Processing and Security: a Holistic View at the Edge of IoT
IOTD-10
Director
Freescale
When accounting for industry projections that estimate nearly half a trillion Internet of Things (IoT) sensors by 2025, the term “edge node” is somewhat of an injustice. Embedded processing and sensor solutions are a keystone of end-to-end IoT deployments, as they exist on the front lines of both data capture and analysis and IoT security. Meanwhile, industry is increasingly demanding new levels of price, performance, and power optimization from these systems, as well as ever-smaller form factors that meet the requirements of deployment in the wild. Innovation is now required. In “From analyzing sensor data to embedded processing and security: A holistic consideration at the edge of the IoT,” Freescale’s Ian Chen provides a comprehensive perspective on IoT sensor platform design. From edge analytics and localized processing to sensor fusion and cybersecurity, this hands-on demonstration will illustrate how silicon vendors and industry organizations are collaborating across hardware, software, and connectivity to provide an integrated approach to development at the IoT edge.
M2M Evolution
Sensors
IOT-10
Director of Wireless Products and IoT
Semtech Corporation
RFID, NFC, Bluetooth, Wi-Fi, Zigbee, Z-Wave, SigFox, TV Whitespace, MEMS, LoRa, Cellular, GPS, Glonass, Beidou, Satellite . . . If it’s all Greek to you, you’re not alone. The truth is, most drivers couldn’t care less about what type of radios or sensor technology is behind their connected car -- they are, rightly, primarily interested in the service. Of course, this is no consolation to the engineers, programmers and operations folks tasked with developing, deploying and ultimately managing those applications. Join us as we discuss the landscape of different technologies and what the industry is doing to make sure they all “speak the same language” despite operating at different points on the spectrum.
11:00am-2:00pm
Thursday - 08/20/15
IoT Evolution Exhibit Hall Open
X-10
11:00am
Thursday - 08/20/15
Connected Home & Building
Out in the Field: Where the Data is Real-Time
CH-11
Sr. Director of Product Marketing
Ayla Networks
Agriculture, Mining, Oil and Gas and Smart Grids sound like totally different businesses, but in truth they have one aspect of IoT in common. The need for remote data collection and real time actionable field information makes them look for innovative ways to connect, collect and communicate. This panel explores the architectures based on a particular industry’s requirements and how different industries can learn from each other and share field services solutions and techniques.
Connected Transportation
Filling The Skills Gap With The Connected Vehicle Industry
CT-11
Is your Mechanic ready to be an RF Engineer? Will Fryes or Best Buy do your maintenance? "In the next five years, there will be a seven fold increase in new cars equipped with factory-fitted mobile connectivity" says the GSMA Connected Car Forecast (published February 2015). To prepare for emerging technologies within the connected vehicle ecosystem we will look at what hardware and software architecture skills will be needed to work with mobility, vehicle, and infrastructure systems to fill the gap of 500,000 new jobs within the next five years.
Fog Computing, Analytics & Data
Fog Computing Reality Check: Real World Applications and Architectures
FOG-11
Founder & CEO
Aankhen Inc.
Senior Manager Software Development Engineering
Cisco
The IoT is flooded with a variety of platforms and solutions. Fog Computing has been notably appearing as an evolving term in the context of IoT software. There is skepticism that Fog Computing is just another buzzword destined to disappear in the dust of time. Get insight from concrete business cases in a variety of IoT verticals – Agriculture, Industrial Manufacturing, Transportation, Smart & Connected Communities etc. and learn how Fog Computing can play a substantial role in each one of these verticals. Develop a judicious point of view with respect to the future of Fog Computing through market research, technology disruption vectors and ROI use cases presented in this session.
IoT Evolution Developer
Open Source Development for IoT Devices
IOTD-11
Chief Scientist
The PTR Group, Inc.
As the IoT picks up momentum, smaller devices such as the ARM Cortex-M series parts are starting to dominate the sensor market. And while there are several commercial development platforms for these parts, the larger maker community is where a lot of innovation will occur. In this session, we will present the options for open-source development tools that target the MMU-less Cortex-M parts for operating systems such as ARM's mbed and more. We will discuss development tools ranging from development operating systems, to IDEs to compilers and debuggers, all available at little or no cost.
M2M Evolution
Standards
IOT-11
Marketing Chair
OneM2M
Director, Product Management – DTBU
Spirent Communications
Director, Market Development
Open Mobile Alliance
Principal Architect of Advanced Platforms and Services
CableLabs
CIO/CSO
ILS Technology a Telit Company
We’ve been talking IoT standards for years. In fact, there are multiple organizations and countless professionals dedicated full-time to the standardization of IoT technology. But with so many different hardware and software considerations and so many different application sets, this holy grail of IoT has proven elusive. Hear from the men and women committed to making standards happen and learn how they plan to get there.