M2M Evolution Miami 2015 In Progress

M2M Evolution Conference Program


PRINT FRIENDLY

Monday, August 17, 2015
12:00pm
Monday - 08/17/15
Fast Pitch - Sponsored by AT&T
AT&T Fast Pitch Walk In Auditions
ATT-01
12:05pm
Monday - 08/17/15
IoT Certification Course
IoT+M2M Introduction; Overview Terminology, and Concepts
IOTC-01
Marketing Chair
OneM2M
The first of three sessions will focus on the Promise, the Opportunity… and the Challenges in deploying a fully realized IoT. Is the market potential Billions? …Trillions? …and how do we get there from today’s initial deployments. Key industry terms will be defined and their usage described, including the distinction between, and co-dependence of IoT and M2M.
IoT Security Summit
Protecting and Defending the Edge
IOTS-01
M2M Solution Sales Manager, NORAM
Gemalto
Senior Partner
RMAC Technology Partners
Business Development Manager, Technology Partner Program
Axis Communications
The growth of IoT is occurring at an incredible rate and as we become increasingly reliant on intelligent, interconnected devices in our lives and businesses. This reliance raises alarms about security and privacy issues. How do we protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? This panel discusses the critical issues in developing, managing and securing the edge devices in an IoT Network.
1:00pm
Monday - 08/17/15
IoT Certification Course
IoT at the Edge; Sensors & Technologies
IOTC-02
Marketing Chair
OneM2M
The 2nd session begins with a discussion on ‘Things’ e.g. Sensors, Wearables, Constrained Devices, and MEMS, and the role each plays in building and implementing a fully interconnected IoT. The need to tie together this myriad of edge technologies leads to an overview of the current landscape in Sensor Networking Topologies. This includes wireless topologies such as 3G/4G, 5G and Mesh, as well as the extensive list of networking capabilities coming from: Allseen, Apple, Google, OIC, ZigBee… and others.
IoT Security Summit
The Core of Securing Networks
IOTS-02
Founder & CEO
PubNub
VP, Business Development
Accelerated Concepts
Senior Analyst - Security & Managed Services
James Brehm & Associates
Everyone draws a cloud these days to signify the network, but is the network the Internet, a private cloud or a hybrid? How do companies connect the edge, gateways, core and cloud will minimizing or avoiding weak links? This panel addresses the issues of deploying networks, managing ID’s and protecting the network from hackers.
2:00pm
Monday - 08/17/15
AT&T Workshop
Creating IoT Solutions
ATT-02
Sales Director
AT&T Internet of Things
You collected the data, now what? Rapidly gaining access to machine data and turning it into actionable business insight is no easy task. During this breakout session, AT&T will describe how AT&T M2X cloud-based data storage services accelerate your ability to access and manage time-series device data. You will learn how you can leverage this data from within different application enablement platforms to quickly transform your IoT data into business value with connected applications.
IoT Certification Course
Putting it Together; M2M Architectures and Services
IOTC-03
Marketing Chair
OneM2M
The IoT cannot be pervasive on a single device family, or on a single edge network type. This closing session will bring it all together, and explain how IP-based M2M communications capabilities such as CoAP, HTTP, and MQTT allow sets of systems to be aggregated, to interwork, and to federate. These tools are needed to scale massively, and to build interconnected applications and services; extending from multi-room… to multi-national, and fulfilling the promise of the IoT; “Everything Connected”.
IoT Security Summit
Security at the Top
IOTS-03
Principal Analyst
Machina Research
Distinguished Engineer
IBM
North American Marketing Manager
Morpho North America
Application Level Security is sometimes viewed as the ultimate security location. As the Bring Your Own Device [BYOD] employee and customer use their smart phones, tablets and personal devices to access IoT business intelligence, the ability to use firewalls comes down to application specific ports and constant monitoring. How can applications lock themselves down and ensure that they are not a gateway to an Enterprise? Does using mobile Web apps add additional vulnerabilities?
3:00pm
Monday - 08/17/15
IoT Evolution Battle of the Platforms
X-01
Senior Manager M2M/IoT Product, Platforms & Strategy
Sprint
Senior Manager, M2M/IoT Business Development
T-Mobile USA
Internet of Things Lead Marketing Manager
AT&T
Director, Product Management
US Cellular
M2M Specialist
Verizon Wireless
General Manager, M2M/IoT Global Partner Sales
Telefonica
3:15 Mera 3:30  Numerex 3:45 accelerated 4:00 Systech 4:30 anypresence4:45 Onstream
 5:00 Pubnub 5:15 Opengear 5:30 Kore
5:45pm
Monday - 08/17/15
Faster, More Flexible Development of IoT Solutions with the Intel® IoT Gateway
X-12
Software Architect
Intel
The Intel IoT Gateway product family has expanded to give developers the flexibility to create and deploy innovative, cost effective IoT solutions for diverse market segments. Join this session to hear about: - Updates to the Intel IoT Gateway product; - Available operating systems, including Ubuntu* Snappy Core and the Wind River* Intelligent Device Platform XT 3; - New and flexible packaging options with a low cost entry point for more price sensitive applications; - How to get up and running quickly with new experience kits and sensor integration.
6:15pm
Monday - 08/17/15
Battle of the Platforms Networking Reception - Open to All Attendees
X-02
Tuesday, August 18, 2015
8:00am
Tuesday - 08/18/15
Continental Breakfast
X-03
9:00am
Tuesday - 08/18/15
Analyze This
GS-01
Founder and Chief Technology Evangelist
James Brehm & Associates
Partner
151 Advisors
Principal Analyst
Machina Research
CEO, Director of Content
Crossfire Media
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
Analyst
451 Research
Practice Director, M2M and Enterprise Mobility
ABI Research
When the analysts talk, you need to listen! Now you’re moving beyond the Hype into the realities of implementation - which means that IoT is not only everywhere, but its changing the way we work, live and travel. Gather with the analysts to not only see the big picture, but to understand where the rapid growth is happening and what opportunities will emerge in the next eighteen months.
10:00am
Tuesday - 08/18/15
Keynote Presentation by Eurotech
GS-02
CEO
Eurotech, Inc.
10:45am
Tuesday - 08/18/15
Special Presentation by Spireon
GS-03
Chief Executive Officer
Spireon
11:15am
Tuesday - 08/18/15
Keynote Presentation by Joe Gibbs: A Winning Mindset
K-01
Joe Gibbs Racing, Inc.
Data is key, whether that means having the best information on the football field, the most accurate diagnostics for a race car, or launching a new IoT application. Coach Gibbs shares his personal experiences and looks forward to a data-driven future.
12:00pm
Tuesday - 08/18/15
Keynote Luncheon Featuring Sikorsky Aircraft - Aviation: The Leading Edge of Connected Transportation
X-04
Senior Program Manager, Intelligence Technology
Sikorsky Aircraft Corporation
The modern fly-by-wire aircraft generates a massive amount of data. Hundreds of sensors gather everything from real-time health usage and monitoring to flight information and tracking, all within one of the harshest environments for vibrations, particulates and corrosion. To overcome these obstacles the industry is developing some of the most advanced algorithms, hardware and data connectivity available for products where performance is paramount to price. Come learn about the challenges and opportunities in aviation from a world leader in rotorcraft, Sikorsky Aircraft, and their advanced technology arm Sikorsky Innovations.
1:00pm
Tuesday - 08/18/15
Connected Home & Building
The Ultimate Gateway: The Battle for Your Home
CH-01
Research Analyst
BI Intelligence
M2M & IoT Business Development – Smart Grid and Energy
Sprint
VP, Marketing
Icontrol Networks
Director, Product Management
US Cellular
Principal Architect of Advanced Platforms and Services
CableLabs
Meter? Thermostat? Alarm panel? Refrigerator? As connections proliferate in and around the home, which connected device will come out on top as the “master control” for your household? Our panelists come armed with their favorite devices to battle it out for the lead in the story of your connected life.
Connected Transportation
New Business Models for the OEM
CT-01
CTO
Morey
Director, Global M2M & IoT Partnerships
Rogers Communications
CEO & Managing Director
CGS Advisors
Chief Security Officer
Covisint
Director, Business Development
CalAmp
With more than 100 years under its belt, the automotive OEM business can hardly be considered new anymore. But the current proliferation of connected technology in the vehicle is driving a new class of innovation. While connected car offerings over the past 15 to 20 years tended to revolve around a few key services, we are beginning to see entirely new business models emerge taking connectivity to new levels. How will these new services affect our driving experience and how will they impact vehicle-dependent businesses like rental cars, taxis and the like?
Fog Computing, Analytics & Data
Leveraging the Cloud to Manage Your Thing Data
FOG-01
Co-Founder
Bright Wolf
Founder and Chief Technology Evangelist
James Brehm & Associates
Founder & Chief Strategy Officer
WoT.io
VP, Worldwide Product Development
Haemonetics
Sr Director of Marketing
AMD
The more we connect, the more data we have to manage, analyze and act upon. How are cloud services impacting the Internet of Things and how can you find the best possible solution to managing your unique data sets?
IoT Evolution Developer
Get Cloud Resources to the IoT Edge with Fog Computing
IOTD-01
Principal Strategist
Cisco Systems, Inc.
Embedded devices in the IoT are hampered by the compute, storage, and service limitations of living life on the edge. As IoT edge devices comprise broader sensor networks for industrial automation, transportation, and other safetycritical applications, their high uptime requirements are nonnegotiable and service latencies must be kept within realtime or near realtime parameters. However, the size, weight, power, and cost constraints of edge platforms also inhibit the ondevice resources available for executing such functions. In this session, Gandhi will introduce Fog Computing, a new paradigm for the IoT that extends compute, storage, and application resources from the cloud to the network edge. Beyond the interplay between Fog and Cloud, Gandhi will show how Fog services can be leveraged across a range of heterogeneous platforms—from enduser devices and access points to edge routers and switches—through software technology that facilitates the collection, storage, analysis, and fusion of data to drive success in your next IoT device deployment.
M2M Evolution
Value Chain in Flux
IOT-01
CEO
KORE
Director of Product Management & Business Development
Systech Corporation
Principal Analyst: Enterprise Services
Ovum
President, Telit Americas
Telit Wireless Solutions, Inc.
There has been plenty of M&A activity of late in the M2M/IoT space, but the question for new adopters remains: Exactly what bits and pieces do I require to develop and deploy my IoT application. We’ll talk to super focused players as well as those who are working to deliver a comprehensive end-to-end solution to understand exactly what makes up a complete solution and which players are involved. Plus, we’ll take a look at some of the latest mergers and acquisitions to understand the go-to-market strategy of these “new” companies and what their consolidation means for their customers.
2:00pm
Tuesday - 08/18/15
Connected Home & Building
Convergence: The Connected Home in a Connected World
CH-02
Director, Product Management – DTBU
Spirent Communications
Sr. Director of Product Marketing
Ayla Networks
CTO
Clear2there
There is a lot of promise from the connected home and other connected applications that make up the Internet of Things. But to truly deliver on that promise, our connected cars, homes, offices, etc. will all need to speak to each other. Take a look at early crossover applications and how they work together to deliver enhanced value as a unit.
Connected Transportation
Beyond Built In: Consumer Aftermarket
CT-02
Senior Manager, M2M/IoT Business Development
T-Mobile USA
Editor-In-Chief
The HD Connect Project
M2M Specialist
Verizon Wireless
What new applications are drivers adding on to their vehicle? Connected services are delivering the new custom car. Whether it’s an aftermarket navigation system, an insurance rate-cutting OBD II dongle, a virtual backseat driver for your teenager or a satellite radio, savvy consumers are looking to create their own seamless connected experience even without paying a premium for top-of-the-line embedded connectivity. Learn about the applications drivers are giving a green light
Fog Computing, Analytics & Data
Saas/Paas: Leaders or Lackeys, Who Will Lead, Who Will Lose?
FOG-02
Principal Analyst
Machina Research
Analyst
First Analysis
Sr. Strategist & Consultant, Head of M2M
Compass Intelligence
Principal Analyst: Enterprise Services
Ovum
Practice Director, M2M and Enterprise Mobility
ABI Research
It seems nearly everyone in M2M and IoT is coming up with a new platform as a service offering. Among so many contenders, it can be a challenge to even evaluate the differences. Who’s most likely to succeed? Examine the latest industry resesrch and evaluate the top players, find the right fit and hear a few predictions for the future of IoT cloud platforms.
IoT Evolution Developer
Securing Embedded Devices in the Industrial IoT
IOTD-02
President & Co-Founder
Icon Labs
The Internet of Things is enabling connectivity in ways we didn’t even imagine five years ago. Soon connected Things will be everywhere, and many of them will be outside of traditional security perimeters. Companies are aware of the need to ensure privacy and protect data, but little attention has been paid to securing the device itself. Organizations have traditionally relied on perimeter security; but alone, that tactic is not enough and doesn't scale to meet the demands of IoT security. The perimeter can be compromised, and in many cases threats originate from inside the secure zone. More importantly, the Things in the IoT are often deployed outside of the traditional security perimeter and have no protection at all. Even though many corporate PCs have long been on “secure” networks, they still have firewalls and endpoint security inside. IoT connected machines and devices need the same protection. This session will cover some cyber threats for IoT devices, the approaches that can be taken to secure your device and comply with security standards, how this links with the enterprise security strategy, and how you can help create the Internet of Secure Things.
M2M Evolution
Supply Chain and Logistics
IOT-02
Sr. Industry Advisor, Manufacturing
SAS
Principal
IoT Strategies
Manager Marketing - Vertical Market Development
SenseAware powered by FedEX
From the factory floor, through testing, shipping and installation, IoT has a role to play in improving quality and delivery times. We bring together multiple players in the supply chain to talk about how IoT is improving their business and how they can jointly provide a better customer experience as a result.
3:00pm
Tuesday - 08/18/15
Connected Home & Building
The Latest Connected Gadgets for the Home
CH-03
President
Arrayent
CEO & Co-Founder
Notion
CRO
Reemo
We’ve seen pet trackers, connected light bulbs -- even Internet baby monitors -- what are the latest connected devices arriving on the market for your connected home? Join our panel as we take a look at the fun, novel, inspiring, and sometimes silly devices promising to deliver the ultimate connected lifestyle.
Connected Transportation
Convergence: The Connected Car in a Connected World
CT-03
Distinguished Engineer
IBM
SVP & CTO
Harland Clarke Holdings
Senior Manager, M2M/IoT Business Development
T-Mobile USA
VP, Electronics
FEV North America, Inc.
There is a lot of promise from the connected car and other connected applications that make up the Internet of Things. But to truly deliver on that promise, our connected cars, homes, offices, etc. will all need to speak to each other. Take a look at early crossover applications and how they work together to deliver enhanced value as a unit.
Fog Computing, Analytics & Data
Convergence 1: Managing Disparate Technologies
FOG-03
Co-Founder
Stream
Founder & Chief Technologist
Blue Mountain Microsystems Inc.
EVP, Advanced Applications
KORE
Director of Wireless Products and IoT
Semtech Corporation
Executive Director, Marketing, Information Management
Dell
RFID, NFC, Bluetooth, Wi-Fi, Zigbee, Z-Wave, SigFox, TV Whitespace, MEMS, LoRa, Cellular, GPS, Glonass, Beidou, Satellite -- there are a lot of technologies that go into a full-fledged IoT solution -- but managing them all can be a nightmare. How do cloud solutions address the problem and who makes it simple for the non-technologist line of business manager?
IoT Evolution Developer
The Evolution of Automotive Software with IoT
IOTD-03
Global Director, Business Development
QNX Software Systems
The Internet of Things (IoT) has the potential to harness vehicle information and influence every stage of the automotive lifecycle. Vehicle software is undergoing rapid evolvement to meet the demands of today’s consumer securely, including downloadable content, built-in apps, and mobile device support. The next generation of cars will require end-to-end, connected solutions that integrate sensors, data processing, and over-the-air updates to deploy fixes and new features. As the IoT continues to open up, so will new revenue streams – and challenges. Andrew Poliak will discuss how to provide a true end-to-end automotive IoT solution and strategies for overcoming obstacles to implementing the IoT in our cars.
M2M Evolution
Power Chain
IOT-03
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
CEO
PLAT.ONE
Vice President, Advanced Metering
Silver Spring Networks
Smart Grid has become a priority for governments around the world. For certain customers, the power chain management is not just optimal but critical. Whether you’re running a hospital, a police department or a data center, businesses are totally dependent on reliable power supply. How are IoT solutions improving the reliability of power from oil fields to pipelines to local delivery? What is the next step toward 100% dependable power distribution?
3:45pm
Tuesday - 08/18/15
Keynote Address by IBM - Transforming business: Capturing new value with Enterprise Internet of Things
K-02
CTO for Internet of Things
IBM Analytics Division
Organizations across all industries recognize the value opportunity embedded within the Internet of Things. However, many remain unclear about its potential within their own business or about how best to evolve existing physical and information infrastructures. Whether you're engineering new products or optimizing your industrial operations, it's time to reinvent value with the internet of things.
4:15pm
Tuesday - 08/18/15
Keynote Presentation by AT&T
K-03
Vice President of Industrial IoT Solutions
AT&T Business Solutions
5:00-7:00pm
Tuesday - 08/18/15
IoT Evolution Exhibit Hall Grand Opening Reception
X-05
Wednesday, August 19, 2015
8:00am
Wednesday - 08/19/15
Continental Breakfast
X-06
8:30am
Wednesday - 08/19/15
Connected Home & Building
Lessons in Building Automation
CH-04
VP, Business Development
Waterfall Security Solutions
President
Ontegrity
President & CEO
Continental Automated Buildings Association
Hear from companies who have utilized the IoT to automate facilities management and eliminate the silo management of a buildings functions. Learn from their experience, obstacles and successes.
Connected Transportation
Drones & Other Autonomous Vehicles
CT-04
Technical Leader and Platform Architect
Cisco
There’s plenty of buzz around drones these days -- taking aerial photos, bombing rebels, maybe even delivering our next Amazon package -- but few are aware just how much autonomy is already built into the vehicles we ride in every day. For years, commuters have ridden in driverless vehicles whether between airport terminals or across town. No one eve bats an eyelash at autopilot for commercial air travel. And with features like self-parking and adaptive cruise control -- even our personal vehicles are becoming more and more autonomous. We may soon achieve the transportation holy grail: cars that can’t crash. So what are we waiting for? Are we just control freaks or are there valid safety considerations holding us back?
Fog Computing, Analytics & Data
Convergence 2: Joining Disparate Business Systems
FOG-04
Director of Technology
Silver Spring Networks
M2M Business Development Director
ILS Technology a Telit company
Director, Cloud Solutions
Eurotech
If one considers the IoT revolution the 2nd stage in the computing and Internet revolution, and a critical part of that Big Data everyone talks about, then we need to think about how to merge “thing” data with the extensive, expensive enterprise resource planning and customer relationship management systems companies have shelled out millions for over the past few years. How does one go about merging often siloed IoT data with these broad reaching systems to drive enterprise-wide value?
IoT Evolution Developer
How (and Why) to Make the IoT Trusted
IOTD-04
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
Complex dynamic operating systems are moving lower and lower in the device chain and with that moves comes a possibility that they get subverted or do the wrong thing due to a software bug. The threads of this happening on a PC or smartphone are frightening, but on IoT devices that have access to key data, this can endanger lives. If these IoT devices don't operate in a trustworthy fashion, a widespread attack could result in a decision that's made in the cloud because it is based on unsubstantiated data. The solution is to establish a strong hardware device identity, a policy enforcement point in hardware that is isolated from the OS along with attestation capabilities that allow a consumer of device data in the cloud to gauge the trust level of each harvested data point after it was collected. This session will highlight how a TPM can offer all these abilities when attached securely to the IoT device and bring measurable trust to the device and the data it produces.
M2M Evolution
Lessons in Cold Chain: Food & Beverage
IOT-04
CEO
Locus Traxx Worldwide
Senior Manager, M2M/IoT Business Development
T-Mobile USA
IoT Solutions Practice Manager
Eurotech
The IoT will reinvent the food and beverage industry. From Farm to Fork, the IoT will play a role in maintaining freshness, safety and the strong viability of this industry. Hear how the IoT is assisting in everything from supply chain planning and execution to farm automation.
9:30am
Wednesday - 08/19/15
Swimming with the Sharks: Finding Investors to Back Your Future
GS-04
President & CEO
AKnowledge Partners
Founder and Chief Technology Evangelist
James Brehm & Associates
Managing Director
Media Venture Partners, LLC
Managing Director, Senior Equity Analyst
Canaccord
Are you sitting on the next big idea in supply chain? This panel of finance and investment experts will help you understand exactly what it takes to get noticed by institutional investors in order to support your application from concept to reality.
10:20am
Wednesday - 08/19/15
AT&T Fast Pitch Award Announcement
X-11
10:30am
Wednesday - 08/19/15
Keynote Presentation by Oracle - Transforming Business: Edge to Enterprise
K-04
Vice President, Architecture, Internet of Things (IoT) Group
Oracle
The Internet of Things poses a huge opportunity to fundamentally change your business, but in order to do so you must adopt a new way of managing a variety of complex and fast data in order to help achieve business differentiation. It requires a robust and scalable infrastructure that is always on and can handle massive amounts of data, transforming it for immediate business value. These end-to-end requirements include greater device flexibility, comprehensive security and device cloud analytics in order to achieve the promise of IoT. The industry must help organizations reduce complexity to get started. Join Atul Mahamuni from Oracle as he illustrates how reducing complexity and simplifying the approach to IoT can enable the modern business to achieve a shorter time to value.
10:55am
Wednesday - 08/19/15
Keynote Presentation by On-Ramp Wireless: Low Power, High Return: How LPWA is Positioned to Change the M2M Game
K-05
CEO
On-Ramp Wireless
Low-power wide area (LPWA) technologies have been flying under the radar, but as M2M communications and the Internet of Things continues to grow, and more and more devices are in play, LPWA is emerging as a real contender. The triple-threat combination that LWPA brings to the table— network value, wide and deep coverage, and system longevity in terms of network and battery life—is why Machina Research forecasted there will be more than over 3 billion LPWA connections by 2023. Join John Horn, CEO of On-Ramp Wireless, as he discusses the potential of LPWA technologies and how they’re positioned to change the game for M2M.
11:15am-4:00pm
Wednesday - 08/19/15
IoT Evolution Exhibit Hall Open
X-07
12:30pm
Wednesday - 08/19/15
Lunch
X-08
1:30pm
Wednesday - 08/19/15
Connected Home & Building
Physical Security
CH-05
CEO
Machine-To-Machine Intelligence (M2Mi) Corporation
Senior Partner
RMAC Technology Partners
Business Development Manager, Technology Partner Program
Axis Communications
Senior Analyst - Security & Managed Services
James Brehm & Associates
North American Marketing Manager
Morpho North America
Sensors; cameras; temperature, smoke and motion detectors -- how is your smart building equipped against physical intrusion. Thanks to the Internet of Things, we now know more about what’s happening in the building than ever before -- but with more and more data entry points, are we exposing ourselves to low-cost hacks that could render the entire system useless. Hear from security experts about how technology can protect your physical spaces, personnel and business information, while limiting exposure to sophisticated data intruders.
Connected Transportation
Lessons in Fleet Management
CT-05
CTO
Aeris
Vice President, Software Architecture and Strategy
Trimble
Vice President, Sales
Geotab
Cars and Trucks have increased their sensors 100 fold, has the software for fleet management systems kept up? This session looks at how we are adding new services and features thanks to sophisticated Fleet Management Software.
Fog Computing, Analytics & Data
Convergence 3: Managing Multiple Networks/Carriers
FOG-05
Director of Sales - Telit Connect, Telit Wireless Solutions
Telit Wireless Solutions
Chief Innovation and Technology Officer
Numerex
We’ve converged multiple radio technologies into multiple enterprise systems, but how do we manage the carrier situation? For global enterprises, this is no small hurdle. Assume for many countries, you need to use multiple carriers as a failsafe -- then add the problem of each country having distinct carriers focused on their own geographic region. LTE-Advanced carrier aggregation helps, but what about the traditional low-bandwidth M2M application? This session will discuss options to tackle multiple geographies and multiple carriers by leveraging the power of the cloud.
IoT Evolution Developer
Enabling Security in the Automobile of Tomorrow
IOTD-05
Chief Security Officer
BlackBerry
Wireless connectivity in the car, aka V2X, presents compelling capabilities for next-generation automobiles. The possibilities include improved collision avoidance, autonomous operation, predictive maintenance and lower total cost of ownership, and improved driver and passenger experiences. Security researchers, however, have demonstrated that attack vectors across these vehicular networks pose a threat to the same safety and productivity functions they seek to foster. To meet this challenge, OEMs and their suppliers must embrace a higher level of rigor when it comes to threat modeling to accurately and efficiently determine security requirements and then apply a similar level of rigor for assuring the software and systems that manifest these requirements. This class will examine common threats and mitigations facing next-generation connected cars, with an emphasis on best practices and standards for achieving this required level of rigor.
M2M Evolution
Lessons in Cold Chain: Medical/Pharma
IOT-05
CEO
Phononic
Head of Customer Success
Zoom
VP, Worldwide Product Development
Haemonetics
Head of M2M for the Americas
Vodafone
Co-Founder, Chief Evangelist
Aria Systems
Your Health is Priceless, so keeping costs in line seems to be a lesser priority. The IoT offers impactful ways to optimize the Medical/Pharma cold chain so that safety and cost containment go hand in hand.
2:30pm
Wednesday - 08/19/15
Connected Home & Building
Disaster Recovery
CH-06
VP of Software Engineering and Product Management
Intrado
CEO
Safer Mobility
President
Ontegrity
The world is an uncertain place -- and, as we all know, disasters can happen. How can IoT technology help identify impending disaster and assist in your recovery once disaster hits.
Connected Transportation
Carrier Aggregation for Public Transport
CT-06
Senior Manager, M2M/IoT Business Development
T-Mobile USA
VP, Product Management
Cradlepoint
M2M Specialist
Verizon Wireless
When it comes to rush hour, peak demands require peak network availability. That’s the idea behind carrier aggregation, by which bandwidth of multiple carriers is made available simultaneously to provide a seamless experience no matter what the time of day. How is this unique feature of LTE Advanced likely to impact your morning commute? Our panelists will look at the technology behind better bandwidth and how carriers and hardware manufacturers are working together as never before to deliver a better mobile experience.
Fog Computing, Analytics & Data
Architectural Ideology
FOG-06
Senior Manager Software Development Engineering
Cisco
VP of Business Development
Cradlepoint
CTO
Aeris
Principal Product Manager
Opengear
Cloud services come in so many shapes and forms even understanding exactly which part of your application they address can be a challenge. This panel seeks to help you find the architectural elements you need covered in order to find the ideal solution for your application.
IoT Evolution Developer
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-06
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this hands-on workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and vice-versa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage. Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
M2M Evolution
Convergence: Linking Across Verticals
IOT-06
CTO
Morey
Director, Business Development
CalAmp
What if all your IoT systems spoke seamlessly to each other? Would it improve your supply chain? Would it better ensure safe, on-time delivery of your product? This panel will look at related “links” in the chain and discuss how cooperation between suppliers can improve the total customer experience.
3:30pm
Wednesday - 08/19/15
Connected Home & Building
Connected Infrastructure
CH-07
Head of Innovation & Business Development
Ericsson
Sr. Strategist & Consultant, Head of M2M
Compass Intelligence
Director of Smart Cities Business Development
Silver Spring Networks
Whether it’s the power grid or the roadways, sensor technology is making even asphalt smart these days. Join us as our panelists take you through some smart city cases leveraging smart infrastructure to improve both operations and services.
Connected Transportation
A Tangled Web: Insurance, Buy Here/Pay Here and Government Regulation
CT-07
CEO
Skypatrol
Over the past few years, there have been a few surprises for the telematics marketplace. Usage-based insurance and the Buy Here/Pay Here credit applications have taken the business benefits of better data and transformed them into true consumer-empowerment. And when it comes to consumers, as the FTC has already stated, it is the government’s job to protect. But how? What is the proper role of government in these are other telematics applications? When is regulation helpful and when is it detrimental? And what can we learn from these new connected approaches to legacy businesses?
Fog Computing, Analytics & Data
Hardware and Software Considerations in Designing Fog Nodes
FOG-07
Distinguished Engineer, CTG Architecture
Cisco
Fog Nodes exist in the network space between the Cloud and the edge. The Fog compliments the Cloud in unique ways. Fog Nodes each offer some degree of compute, storage and networking defined by both the vertical application they serve and their location in the network. They are typically organized in a hierarchical topology that allows for more resources to be provided at the higher levels. As such, they are designed to offer or augment services or capabilities that neither the Cloud nor Edge devices can on their own. That doesn’t mean that Edge devices rely exclusively on one or more Fog devices for services. What it does mean for Edge devices is that some services will be provided exclusively by the Cloud, some services will be provided exclusively within the Fog hierarchy, and some services will be provided with the cooperation of both the Fog and Cloud. The Edge device will be unaware of where and how the service is provided, only that it gets the service it needs with the attributes it requires. How do you build and design such platforms? What are the organizing principles involved? How do you accommodate a wide variety of conflicting requirements and solve the problem in a manageable and cost effective manner? This talk will discuss these and many other issues involved in designing and building effective and efficient Fog Nodes by looking at the drivers for Fog and how they affect design decisions with examples from a number of different vertical application spaces. It will discuss both platform hardware and platform software considerations to illustrate how the two complement Fog Node functionality in different ways for different verticals.
IoT Evolution Developer
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-07
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this hands-on workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and vice-versa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage. Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
M2M Evolution
Unchained: Unlocking Business Value
IOT-07
CEO
Parlevel Systems
Distinguished Engineer
IBM
Co-Founder, Chief Evangelist
Aria Systems
There are plenty of purpose build IoT applications along the supply chain today. Most are designed to drive efficiency. Today we are starting to see a trend toward new services and business models previously unconsidered. What can connectivity do for you? We’ll look into the future of supply chain management and the role IoT technology can plan in transforming your business.
4:30pm
Wednesday - 08/19/15
Connected Home & Building
IOT and WebRTC Machines Talk in Real Time
CH-08
Unified Communications CTO
MERA Software Services
Technical Director
Acision
CEO / CTO
Bit6
Getting information in the hands of the people that make decisions often requires real time discussions. WebRTC can be an enabling technology for people looking to augment the IoT information with external and internal media resources. This panel looks at what's possible and the benefits of real time communication to IOT.
Connected Transportation
Introduction to Swarm Intelligence for IoT
CT-08
Senior RSDE
Microsoft Research
The term "swarm intelligence" sounds like it belongs in a low budget science fiction movie, but in fact swarm intelligence is well-established, practical, and ideally suited for IoT. In this lively and informative session, Dr. James McCaffrey from Microsoft Research will explain exactly what swarm intelligence is (without using Greek letters or annoying jargon), describe the types of problems swarm intelligence can solve, and present live demos of the three primary types of swarm intelligence. You'll leave this session with a solid understanding of swarm intelligence and key knowledge that will enable you to use swarm intelligence to create powerful new systems.
Fog Computing, Analytics & Data
Big Data & Analytics: Where will your Data Take You?
FOG-08
Solution Expert, Internet of Things and Industrial Data
Splunk
CTO & Co-Founder
Vitria Technology
VP of Marketing and Product Management
Predixion Software
After you build your lake of data, how do you manage big data to get relevant information. Does gathering everything help or hurt the quest for insight? How does your data guide you to new opportunities? This panel talks about the successes and failures of finding the insight in your IoT data.
IoT Evolution Developer
Panel: The Biggest IoT Challenges Faced by Developers
IOTD-08
Technical Leader and Platform Architect
Cisco
Chief Security Officer
BlackBerry
EVP/CTO
Micrium
EVP/Brand Manager for Embedded/IoT
Open Systems Media
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
The challenges a design engineer faces when attempting to make secure and reliable connections to the IoT are plentiful. May of them have been well documented, but many have not. In this panel session, we'll uncover some of the issues that a designer may not be aware of, with potential solutions to those hurdles.
M2M Evolution
IoT Friendly: Long Range Wide Area
IOT-08
Principal
IoT Strategies
CEO
Link Labs
Director of Wireless Products and IoT
Semtech Corporation
While Cellular and the ARMy of Silicon manufacturers continue to embrace the massively mobile marketplace, many IoT requirements are looking for sensor deployment solutions that don’t add to the spectrum exhaustion of LTE and instead use LoRA, SigFox and Weightless microwave. This panel talks to the need, the demand and the reason for the accelerated interest in these solutions.
5:15pm
Wednesday - 08/19/15
The Interplay Between Cloud and Fog
GS-05
Senior Technical Leader
Cisco
From the get-go Fog Computing was defined as an extension of the Cloud from the core to the edge of the network. The flexibility of the pay-as-you go model and reduced CAPEX and OPEX due to economies of scale have determined the success of the Cloud. Rather than carving into the Cloud application space, Fog Computing is positioned to complement its applications that admit only very low latency, are widely geographically distribution, face bandwidth challenges, need support for rapid mobility, and for which semi-autonomy is a must. For many use cases, though, the issue is not the choice between the exclusive use of either the Cloud or the Fog, but rather the right level of interplay between them. Some basic questions motivate this talk: what processing must be done by the Fog, and what in the Cloud?, what (and when) should be stored in either one (or both)?; more to the point, are there organizational principles that determine a wise division of labor between Cloud and Fog?
Thursday, August 20, 2015
8:00am
Thursday - 08/20/15
Continental Breakfast
X-09
9:00am
Thursday - 08/20/15
Connected Home & Building
The Apps @ Home Get It or Forget It!
CH-09
Vice President, Strategic Initiatives
Support.com
Chief Product Officer
Kii
Director of Product Marketing
Applause
Connected Home Applications (e.g., fitness trackers, smart heating systems and appliances) will be commonplace in five to 10 years. This means users, who have become accustomed to connected devices and the IoT, will want their digital services to work the first time, every time. If users are confused by the way a brand’s app works, they simply won’t use it and companies will lose market share. This session will focus on how companies can make their apps functional, usable and appealing across the spectrum of devices. We will revisit old testing approaches and relate to the new world of sensors. Hear how to provide superior digital experiences – from web to mobile to wearables to smart TVs, etc. to become a trusted and valued brand.
Connected Transportation
Cracking Open the On-Board Applications Ecosystem
CT-09
Lead Architect, Cloud Management Division
EMC
Innovative IoT applications create business value. Innovation thrives in an open world with fail-fast agility. In the mobile phone ecosystem apps fail. For on-board apps failure can have catastrophic effect. Is common wisdom correct, that auto manufacturers must keep absolute control and ignore the ad-hoc app fringes? This presentation looks at how an On-board Applications platform can instead simplify safety, compliance, and manage liability to enable an open app ecosystem. We'll start with business drivers, derive transportation special on-board platform requirements, and list gaps in an Android-based implementation. And relish how this application ecosystem will someday transform that shared car into My car.
Fog Computing, Analytics & Data
Multi-dimensional Scalability using Fog Computing
FOG-09
Solution Architect & Software Engineer
Akana
Technical Leader and Platform Architect
Cisco
VP of Business Development
PubNub
This talk discusses these five dimensions of scalability in large scale IoT deployments and how Fog Computing can help address the challenges associated with them. • Capacity – Hear how Fog nodes can scale horizontally and vertically to help address capacity challenges. • Performance - Networks must exhibit low latency, high storage throughput, and very accurate algorithm results. Hear ho fog Computing allows computation and storage functions to be moved to the optimal place in the network, and dynamically grow or shrink in performance as needed. • Scalable reliability, including the ability to address non-critical but cost sensitive IoT applications in the same network as lifeline and life critical apps, directly controlling high power or potentially hazardous systems. Hear how fog nodes support both internal fault tolerance (using techniques like duplicated processors and RAID storage) and node-level redundancy. • Scalable security – Hera about Fog’s robust security infrastructure that can be selectively applied to different layers of data in different ways. • Application scalability, including the ability of Fog nodes to host different layers of different applications, isolate some applications from others, support multi-tenancy, and dynamically distribute application hosting horizontally and vertically across large networks of Fog nodes.
IoT Evolution Developer
Secure Cloud Computing for Big Data and the IoT
IOTD-09
Chief Architect
Red Hat
The IoT means different things to different people, depending on the person's perspective. Are you designing an end device? Are you designing something that has to be mission critical? In this talk, Kirkland will discuss how the cloud should be configured for the IoT and how to maintain reliability and security, even in environments with thousands of connections. He will discuss the benefits and tradeoffs of a tiered, scalable approach.
M2M Evolution
Architecture
IOT-09
Chief Technology Officer
Guavus
Director, Cloud Solutions
Eurotech
There is more than one way to do just about anything. Then again, there can only be one “best” way. Let’s take a look at how IoT adopters across vertical markets are architecting their solutions in order to learn from their mistakes and adapt the best-of-breed architecture to telematics applications.
10:00am
Thursday - 08/20/15
Connected Home & Building
The Guiding Light of PoS: Beacons
CH-10
Director, IoT Business Development
Multi-Tech Systems, Inc
CEO
Mera Software
Analyst
ABI Research
Principal Consultant
Statler Consulting
Lost in the Mall? We have an app for that! Trying to find your receipt? We have an App for that too. Hear how beacons are bringing new dimensions and data analytics to retail point of sale to impact everything from the effectiveness of displays to loyalty strategies with customers to enabling the consumer, retailer and credit card company to track the entire shopping experience. Learn are marketing metrics changing as a result of this new technology.
Connected Transportation
Supply Chain Logistics: Realities of Worldwide Delivery
CT-10
CEO
Locus Traxx Worldwide
Chief Operating Officer
Rakuten
Chief Technology Officer
Guavus
Hear how innovative wireless tracking can provide actionable data results to improve transportation logistics. Companies ship using a variety of internal and external fleets, rail, ship and air carriers. The requirements are for a sophisticated worldwide tracking intelligence to manage shipping logistics. The session will follow each step of the supply chain from initial packaging through its destination. Conclusions will be offered based on the extensive data capture that is provided through the sophisticated tracking. The volume of data collected provides the “Big Data” that can provide new insights into how IoT will benefit the transportation industry.
Fog Computing, Analytics & Data
Unleashing Value from Analyzing Data Generated by Internet of Things
FOG-10
Director, IoT Strategy
CA Technologies
CEO
Parstream
Associate Partner
151 Advisors
Executive Director, Marketing, Information Management
Dell
For businesses to derive value from the massive amounts of real-time data in the emerging IoT world, it's imperative they transform their thinking, processes and infrastructure to act in seconds -- not hours and days. Forward-thinking companies are converting the vast amounts of data into actionable insights by applying advanced analytics technologies designed specifically to handle the requirements of real-time big data analytics. Providing deeper value and the ability to decipher what the data actually means to the business is what will set successful companies apart. This presentation will cover how real-time analytics generates value for IoT.
IoT Evolution Developer
From Sensor Data to Embedded Processing and Security: a Holistic View at the Edge of IoT
IOTD-10
Director
Freescale
When accounting for industry projections that estimate nearly half a trillion Internet of Things (IoT) sensors by 2025, the term “edge node” is somewhat of an injustice. Embedded processing and sensor solutions are a keystone of end-to-end IoT deployments, as they exist on the front lines of both data capture and analysis and IoT security. Meanwhile, industry is increasingly demanding new levels of price, performance, and power optimization from these systems, as well as ever-smaller form factors that meet the requirements of deployment in the wild. Innovation is now required. In “From analyzing sensor data to embedded processing and security: A holistic consideration at the edge of the IoT,” Freescale’s Ian Chen provides a comprehensive perspective on IoT sensor platform design. From edge analytics and localized processing to sensor fusion and cybersecurity, this hands-on demonstration will illustrate how silicon vendors and industry organizations are collaborating across hardware, software, and connectivity to provide an integrated approach to development at the IoT edge.
M2M Evolution
Sensors
IOT-10
Director of Wireless Products and IoT
Semtech Corporation
President
Zeidman Technologies
RFID, NFC, Bluetooth, Wi-Fi, Zigbee, Z-Wave, SigFox, TV Whitespace, MEMS, LoRa, Cellular, GPS, Glonass, Beidou, Satellite . . . If it’s all Greek to you, you’re not alone. The truth is, most drivers couldn’t care less about what type of radios or sensor technology is behind their connected car -- they are, rightly, primarily interested in the service. Of course, this is no consolation to the engineers, programmers and operations folks tasked with developing, deploying and ultimately managing those applications. Join us as we discuss the landscape of different technologies and what the industry is doing to make sure they all “speak the same language” despite operating at different points on the spectrum.
11:00am-2:00pm
Thursday - 08/20/15
IoT Evolution Exhibit Hall Open
X-10
11:00am
Thursday - 08/20/15
Connected Home & Building
Out in the Field: Where the Data is Real-Time
CH-11
Director of Business Development
PTC
Sr. Director of Product Marketing
Ayla Networks
Agriculture, Mining, Oil and Gas and Smart Grids sound like totally different businesses, but in truth they have one aspect of IoT in common. The need for remote data collection and real time actionable field information makes them look for innovative ways to connect, collect and communicate. This panel explores the architectures based on a particular industry’s requirements and how different industries can learn from each other and share field services solutions and techniques.
Connected Transportation
Filling The Skills Gap With The Connected Vehicle Industry
CT-11
CEO
Mobile Comply
Is your Mechanic ready to be an RF Engineer? Will Fryes or Best Buy do your maintenance? "In the next five years, there will be a seven fold increase in new cars equipped with factory-fitted mobile connectivity" says the GSMA Connected Car Forecast (published February 2015). To prepare for emerging technologies within the connected vehicle ecosystem we will look at what hardware and software architecture skills will be needed to work with mobility, vehicle, and infrastructure systems to fill the gap of 500,000 new jobs within the next five years.
Fog Computing, Analytics & Data
Fog Computing Reality Check: Real World Applications and Architectures
FOG-11
Founder & CEO
Aankhen Inc.
Principal Strategist
Cisco Systems, Inc.
The IoT is flooded with a variety of platforms and solutions. Fog Computing has been notably appearing as an evolving term in the context of IoT software. There is skepticism that Fog Computing is just another buzzword destined to disappear in the dust of time. Get insight from concrete business cases in a variety of IoT verticals – Agriculture, Industrial Manufacturing, Transportation, Smart & Connected Communities etc. and learn how Fog Computing can play a substantial role in each one of these verticals. Develop a judicious point of view with respect to the future of Fog Computing through market research, technology disruption vectors and ROI use cases presented in this session.
IoT Evolution Developer
Open Source Development for IoT Devices
IOTD-11
Chief Scientist
The PTR Group, Inc.
As the IoT picks up momentum, smaller devices such as the ARM Cortex-M series parts are starting to dominate the sensor market. And while there are several commercial development platforms for these parts, the larger maker community is where a lot of innovation will occur. In this session, we will present the options for open-source development tools that target the MMU-less Cortex-M parts for operating systems such as ARM's mbed and more. We will discuss development tools ranging from development operating systems, to IDEs to compilers and debuggers, all available at little or no cost.
M2M Evolution
Standards
IOT-11
Marketing Chair
OneM2M
Director, Product Management – DTBU
Spirent Communications
Director, Market Development
Open Mobile Alliance
Principal Architect of Advanced Platforms and Services
CableLabs
CIO/CSO
ILS Technology a Telit Company
We’ve been talking IoT standards for years. In fact, there are multiple organizations and countless professionals dedicated full-time to the standardization of IoT technology. But with so many different hardware and software considerations and so many different application sets, this holy grail of IoT has proven elusive. Hear from the men and women committed to making standards happen and learn how they plan to get there.