Days


Tracks

Monday, January 22, 2018
1:00pm
Monday - 1/22/18
Fog Computing Workshop ()
Introduction to FOG
FOG-01
Is Fog just about bringing the cloud closer? How does edge management change by utilizing a Fog framework? Find out why Fog Computing may be an ideal environment for IoT.
Register me
IoT Certification ()
Managing IoT Partners and Competitors
IOTC-01
It is unusual for a customer to only have one brand for their cars, appliances, etc. When it comes to the Internet of things best of breed solutions often require support services from distributors to support their partners. This session focuses on how distributors work to bring complete solutions and support their ecosystem.
Register me
IoT Security Certification ()
IoT Security Basics
IOTSC-01
Lots of elements go into a discussion of security, including some personal concerns about privacy. When we talk about IoT devices that are distributed and designed to report critical information, redundancy is also a major concern. What represents the framework for IoT to be secure?
Register me
LoRA Workshop ()
Introduction to LoRAWAN
LORA-01
What is the technology associated with LoRa and what are the benefits in deploying these systems? This session looks at the advantages of LoRa for specific deployments and how companies are embracing LoRa solutions.
Register me
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
2:00pm
Monday - 1/22/18
Fog Computing Workshop ()
Edge Management and the Fog Framework
FOG-02
IoT is all about distributed systems and as a result it represents the requirements for extending the Enterprise networking capabilities beyond the firewall. This session discusses how enterprises can use the Fog Framework to enhance security and optimize processing.
Register me
IoT Certification ()
Developing IoT Reseller and VAR Relationships
IOTC-02
The Internet has certainly accelerated everyones go to market strategy, but there are still customers, products and solutions that need to be managed by people and not just the web. This session looks at the pluses and minuses of go to market opportunities and how to segment opportunities to maximize revenue and minimize cost.
Register me
IoT Security Certification ()
IoT Blockchain Strategies
IOTSC-02
Many people point to block chain as a method of improving IoT solutions, this sessions looks at the real advantages of block chain for IoT and what can be done to support complex solutions using IoT in supply chain and manufacturing.
Register me
LoRA Workshop ()
Narrowband (and CAT M1) versus LoRa
LORA-02
The initial push for LTE was designed for the consumers, which left a gap to be filled to support small devices sharing small amounts of information. Now LTE has increased its capabilities to support IoT requirements with NB and Cat M1 solutions. How does LoRa compare with these implementations?
Register me
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
3:00pm
Monday - 1/22/18
Fog Computing Workshop ()
Multi-dimensional Scalability using Fog Computing
FOG-03
This talk discusses five dimensions of scalability in large-scale IoT deployments, and how Fog Computing can help address the challenges. The first dimension is capacity, which is the IoT network’s ability to support huge numbers of devices, computational loads, data sets, numbers of users, and network bandwidth. Fog nodes can scale horizontally and vertically to help address these challenges. The second dimension is performance, where networks must exhibit low latency, high storage throughput, and very accurate algorithm results. Fog Computing allows computation and storage functions to be moved to the optimal place in the network, and dynamically grow or shrink in performance as needed. Third, there is scalable reliability, including the ability to address non-critical but cost sensitive IoT applications in the same network as lifeline and life critical apps, directly controlling high power or potentially hazardous systems. Fog nodes support both internal fault tolerance (using techniques like duplicated processors and RAID storage) and node-level redundancy. For the fourth dimension, Fog supports scalable security, where data and applications in the IoT system have varying requirements related to data security, privacy, and data breech resistance and hacker immunity. Fog has a very robust security infrastructure that can be selectively applied to different layers of data in different ways. Finally, there is application scalability, including the ability of Fog nodes to host different layers of different applications, isolate some applications from others, support multi-tenancy, and dynamically distribute application hosting horizontally and vertically across large networks of Fog nodes.
Register me
IoT Certification ()
Supporting the Developer Community
IOTC-03
Go from a simple IoT prototype, to a market-leading solution faster. During this session, Verizon ThingSpace will create a working prototype using ThingSpace, Verizon’s IoT Platform. The prototype will use Verizon Cat M1 network to transmit sensor data to ThingSpace IoT platform where it can be displayed and analyzed. From idea to prototype in minutes…. Rapid development using cutting edge platform and one of the most advanced networks.
Register me
IoT Security Certification ()
Device Security
IOTSC-03
The Internet of Things is bringing exciting new benefits to businesses and consumers across many different industries. It is also bringing a whole host of equally exciting, yet certainly challenging problems to solve - including security. If you are responsible for developing an IoT solution, you know it needs to be secure, but what does that mean and how do you go about achieving that security? In this session we will look at some of the key ingredients involved in securing your IoT solution from both the hardware and the software perspectives.
Register me
LoRA Workshop ()
LoRa Case Studies
LORA-03
Who is using LoRa today and what are the lessons they have learned in deploying these systems?
Register me
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
4:00pm
Monday - 1/22/18
  Special General Session
5:30pm
Monday - 1/22/18
()
Networking Reception & Battle Awards
X-01
  
Tuesday, January 23, 2018
8:30am
Tuesday - 1/23/18
()
Continental Breakfast - Proper Badge Required
X-02
  
9:00am
Tuesday - 1/23/18
Business Intelligence and Analytics ()
Making Sense of Data Streams
BIA-01
The critical challenge is using this data when it is still in motion – and extracting valuable information from it. How do companies tap into their IoT sensors to collect data, enable predictive and prescriptive analytics while still maintaining data integrity?
Register me
Industrial IoT Conference ()
IoT on the Factory Floor
IIOT-01
How is IOT being deployed on the factory floor and how does it improve the management of production? Have we gotten to the point where Programmable Line Cards are taking advantage of connectivity or are gateways making human intervention easier. Where is the promise of IoT for manufacturing being delivered and how?
Register me
IoT Security ()
Role Based Access Control
IOTS-01
It’s embarrassing how many times we end up reading about a sensor or a system has been breached and hackers use the back door to access consumer information. Part of the issue is that data is not mapped into models of access control. Hear about solutions that allow companies to secure the information and ensure that the data is not available to everyone.
Register me
IoT Enterprise Operations ()
Using Market Research to Guarantee Success
OPS-01
IoT transforms problems into opportunities. But how do you know if you have optimized the opportunity? The answer lies in gathering and analyzing primary research on the problems, identifying the possible outcomes and ideal solutions. This discussion is focused on how to perform the research, identify the risks and achieve the desired outcome and benefits.
Register me
The Smart Cities Event ()
Planning for Smart, Safe & Secure Cities
SC-01
The news is filled with discussions and proposals about smart city deployments, but what are the development strategies that make the implementation real and valuable to the municipalities? This session provides a framework for cities that are looking to make Smart City systems a permanent part of their infrastructure.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
10:00am
Tuesday - 1/23/18
Business Intelligence and Analytics ()
The Analytics of Things
BIA-02
It often gets lost that one of the core components of the IoT’s “things” is their attributes and the data dictionary that must be mapped into the Business Intelligence systems. Once the data mapping is done the next effort is to integrate the knowledge base into the processes. This panel is a discussion about how IoT analytics impact Enterprise IT systems.
Register me
Industrial IoT Conference ()
The Industrial Internet Security Concerns
IIOT-02
Identity theft happens despite attempts to protect personal information, and it can be a devastating event for the individual. Cyber-attacks occur similarly in an enterprise or its Industrial Control System (ICS) architecture, also delivering devastating impacts for the success of the business. This session will address the current state of these threats, outline what technical solutions, either available now or under development, can be identified to close the gaps regarding cyber security.
Register me
IoT Security ()
IoT Sensors: Hardened and Tested
IOTS-02
IoT device makers face a number of choices when it comes to securing their products. Often security decisions are limited to the needs and limitations of each product. That could, over time, lead to a fragmented set of technologies that need to be managed leading to higher costs. Secondly, security failures can occur at multiple points in a devices lifecycle. How does this impact device security? What are the core principles that all device OEMs must take into consideration to implement an IoT security Strategy and not just a point solution? Is there a framework that can be applied to make the right decision?
Register me
IoT Enterprise Operations ()
Planning Field Deployments
OPS-02
Your company has done its’ research and identified the benefits of IoT for your operations, but now comes the questions about implementation. It’s time to look at the location of your assets and determine the best strategy. Where does LoRA fit in? Should gateways act as aggregation points? This panel looks at how to determine and build upon the right strategy.
Register me
The Smart Cities Event ()
Smart Phones, Smart Citizens and the Social Good
SC-02
Social networks, like Facebook, Wayz and Yelp are defacto word of mouth engines that people use to guide and avoid issues. How can a city build solutions that take advantage of citizen connectivity to alert, alarm and appreciate the concerns and communications needed in a city? Is “there an App for that” or do we need to augment apps with other things?
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
11:00am
Tuesday - 1/23/18
  Keynote Presentation
11:30am
Tuesday - 1/23/18
  Keynote Presentation
12:00pm
Tuesday - 1/23/18
()
Conference Luncheon - Proper Badges Required
X-03
  
1:00pm
Tuesday - 1/23/18
Business Intelligence and Analytics ()
Measuring Success with Real Results
BIA-03
Most of the sensor information you get is pretty binary. Things are working or they are not; yet somehow you are required to report how you have improved operations with real results. How do you go from Big Data to relevant data in a manner that proves the value of your IoT deployment?
Register me
Industrial IoT Conference ()
Trustworthy Endpoints
IIOT-03
Trustworthiness is a paradigm put forth by NIST (National Institute of Standards and Technology) and IIC (Industrial Internet Consortium) to address the relationship of key system characteristics of IIoT (Industrial Internet of Things) component and systems. The IIC defines trustworthiness as the degree of confidence one has that a system performs as expected, characterized by the five key elements of safety, security, reliability, resilience and privacy in the face of environmental disruptions, human errors, system faults and attacks. Trustworthiness is a trait used for years to define the characteristics of both IT (Information Technology) and OT (Operation Technology) systems. In IT, trustworthiness mainly addresses security, reliability, and privacy. On the other hand, trustworthiness in OT mainly addresses safety, reliability and resilience. Addressing the missing key system characteristics in both IT and OT systems and focusing on the relationship of the five key characteristics of the IIoT, trustworthiness paradigm will solve many IT/OT convergence problems, especially conflicts between safety, security, and privacy.
Register me
IoT Security ()
Why DIY is DOA for IoT Security
IOTS-03
Securing IoT is unlike any other computing scenario we’ve secured in the past. Like icing on a cake, nearly all-previous security solutions have been ‘layered’ on top of the device. This approach to secure IoT simply is not possible. For IoT, security needs to be in the cake batter… before the cake is baked. The critical importance of IoT in today’s IT infrastructure has passed the threshold of tolerance for using open source or DIY solutions. Most organizations need complete, flexible, commercial solutions including management (GUI), reporting and analytics…and designed to be ‘in the cake batter’ and not layered on.
Register me
IoT Enterprise Operations ()
Bluetooth 5: One PAN to Rule Them All
OPS-03
Bluetooth 5 is a new personal area network protocol released by the Bluetooth SIG to improve and grow the capabilities of an already existing and successful protocol. This lecture talks about the ins and outs of Bluetooth 5 from a use case, hardware, and protocol standpoint. Bluetooth 5 now provides more capabilities of any PAN communication and is set to overtake the IoT world as the de-facto standard for near range communication.
Register me
The Smart Cities Event ()
Clean Water and Other Utilities
SC-03
Smart public infrastructure includes the ability to deliver essential services like clean water, dependable power, safe gas, and efficient public lighting. Smarter management of them is the foundation for smart cities. What sensor strategies and frameworks should be put in place for cities to support their citizens and avoid the missteps recently in the news?
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
2:00pm
Tuesday - 1/23/18
  Special Panel Discussion
3:00pm
Tuesday - 1/23/18
  Keynote Presentation
3:30pm
Tuesday - 1/23/18
  Keynote Presentation
4:00pm
Tuesday - 1/23/18
  Special Panel Discussion
5:00-6:30pm
Tuesday - 1/23/18
()
Grand Opening Reception in Exhibit Hall
X-04
  
Wednesday, January 24, 2018
8:30am
Wednesday - 1/24/18
()
Continental Breakfast - Proper Badge Required
X-05
  
9:00am
Wednesday - 1/24/18
  Special Panel Discussion
10:00am
Wednesday - 1/24/18
  Keynote Presentation
10:30am
Wednesday - 1/24/18
  Keynote Presentation
11:00am-4:00pm
Wednesday - 1/24/18
()
Visit the IoT Evolution Exhibit Hall
X-06
  
12:00pm
Wednesday - 1/24/18
()
Lunch Tickets Provided in Exhibit Hall - Proper Badge Required
X-07
  
1:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics ()
Analytics: Going Beyond Gathering to Finding Value
BIA-04
Before we called it IoT and M2M, we had various closed systems that enabled reporting and system evaluations. As IoT deployments become better networked, do the analytics measure new opportunities for IoT to be deployed? Hear about the analytics that will make IoT valuable.
Register me
Industrial IoT Conference ()
The IIC Testbeds: Proving the Value of IIoT
IIOT-04
Testbeds are a major focus and activity of IIC’s members and helps to quickly validate reference solutions in a collaborative manner. IIC’s Testbed Working Group accelerates the creation of Testbeds by providing a framework, for architectural and security best practices. These symbolize the innovation and opportunities of the Industrial Internet to its members. Hear from these panelists about their first hand experiences. Learn how to become part of new or existing Testbeds.
Register me
IoT Security ()
IoT - The S is for Security
IOTS-04
People make jokes about IoT security, but the reality is that connectivity can be taken advantage of regardless of whether you deploy IoT solutions or not. How do companies identify and isolate sensors and systems that have back doors and represent threats to the entire network? Hear how companies can implement an IoT Security strategy that manages legacy as well as new opportunities.
Register me
IoT Enterprise Operations ()
Building IoT Success
OPS-04
Every Enterprise has the challenge of managing multiple buildings of some kind, (e.g. Factories, Garages, Office space, Retail Outlets, and / or Warehouses). For years, these challenges have been managed without a lot of data gathering. Thermostats were localized and the use of energy for heating, cooling and lighting were considered “sunk costs”. Find out how IoT has changed and improved upon this model of building Management.
Register me
The Smart Cities Event ()
Commuting Delays with Smart Traffic
SC-04
Is their any mayor in the world that has not heard a complaint about commuting? The Answer is probably not. Using IoT to smooth out traffic patterns may not eliminate the calls, but it can certainly improve the systems and reduce the jams. This is a discussion about Smart Traffic Management, be it road, rail, street or subway.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
2:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics ()
Big Data, Big Lakes, Bad Decisions
BIA-05
In the old days, we used to field various closed systems to enable reporting and local system management. Now, however, we are facing massive amounts of data being delivered in various formats. Streams and lakes of data are being gathered, but insight can still be elusive. This session will explore how IoT systems will increase business intelligence in the enterprise.
Register me
Industrial IoT Conference ()
Putting a Framework on Connectivity Requirements
IIOT-05
The Industrial Internet of Things (IIoT) landscape today is a confusing mix of proprietary connectivity technologies and standards. Some are general purpose, some are mostly appropriate for enterprise applications and others are optimized for a narrow set of domain-specific use cases in vertically integrated systems. This confusion hinders the ability to share data that IIoT systems need. Architects need clarity on how to effectively share data between IIoT components and systems. To address this confusion, the Industrial Internet Consortium (IIC) just released the Industrial Internet Connectivity Framework (IICF). It is the result of years of work by many organizations and is the only extensive connectivity analysis by multiple experts from many companies at a major consortium. More importantly, it not only provides high-level design guidance, but also detailed, useful, tangible and practical guidance for those building IIoT solutions today. In this session, Dr. Rajive Joshi, co-chair of the IIC Connectivity Task Group will discuss the significance of the IICF in accelerating IoT development and will provide an analysis of current standards.
Register me
IoT Security ()
Asset Management & Surveillance
IOTS-05
Crimes of convenience can occur because things of value are neglected. IoT can be used to determine the position of systems and to monitor assets with GeoFencing and thereby reduce the opportunity for theft. This session talks about the practical aspects of using asset management to protect corporate inventory as well as business and institutional property.
Register me
IoT Enterprise Operations ()
Offshore Energy Harvesting
OPS-05
The Ocean has more than one way to harvest energy. Oil Rigs and Wind Turbines have similar requirements in terms of alerts, alarms and management, but need connectivity and control. Hear how IoT is being used to manage both of these resources.
Register me
The Smart Cities Event ()
Smart City Success Stories
SC-05
We have had a lot of investment in trials from both the public and private sector in Smart City solutions. We have asked implementers of these solutions to participate and share their experience and frustrations with becoming a Smart City.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
3:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics ()
Fog Computing: Analytics and Processing at the Edge
BIA-06
While the Cloud promises economies of scale and vast resources, many enterprises are recognizing the need for computing resources at the point where processing can have the most impact. Edge and Fog Computing are paradigms that seek to maximize performance by keeping the information where it’s most valued – at the edge.
Register me
Industrial IoT Conference ()
MuLTEfire Solutions: Does LTE Mean Linking Things Everywhere
IIOT-06
MulteFire is delivering a new way to wireless. MulteFire is an LTE-based small cell technology that operates standalone in unlicensed and shared spectrum – delivering LTE-like-performance with Wi-Fi-like deployment simplicity. By removing the requirement to own licensed spectrum to deploy LTE technology, MulteFire broadens the LTE ecosystem to industrial IoT, enterprises, venues and more. Attendees at this session will learn how MulteFire allows anyone to deploy and operate their own private or neutral host MulteFire network. They will gain an understanding of how an industrial IoT environment will benefit by deploying a MulteFire network.
Register me
IoT Security ()
Avoiding the IoT Zombie Apocalypse
IOTS-06
What are the business and technical implications of new attacks like the CIA’s CherryBlossom toolkit and Mirai? These toolkits go after IoT devices, routers, and gateways. They use sophisticated techniques to compromise these systems, turn them into zombies, and enslave them into botnet armies that are rented out for DDoS attacks. Thus, even mighty giants like Twitter and Netflix have laid low. Hear about the new practices that use hardware security to protect the next generation of IoT devices and routers against such attacks. How can IoT avoid being part of the problem?
Register me
IoT Enterprise Operations ()
Agricultural IoT: Managing Earth, Wind and Water
OPS-06
On the farm the weather drives decisions. If there is a drought you try to store, if there is rain you try to divert. Whether drones are watching above or sensors are buried in the soil, they are being used to manage resources, optimize crop production and track equipment. This session explores the numerous ways farming is being optimized by IoT.
Register me
The Smart Cities Event ()
The Whole City is Watching?
SC-06
Surveillance systems have been deployed in every major city, yet we now have less than 10% of the video is watched by a human. How do we move surveillance to the next level where systems can make us safer and deter crime?
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
4:15pm
Wednesday - 1/24/18
  Special Panel Discussion
8:00pm
Wednesday - 1/24/18
()
IoT Conference Party
X-08
  
Thursday, January 25, 2018
8:30pm
Thursday - 1/25/18
()
Continental Breakfast - Proper Badge Required
X-09
  
9:00am
Thursday - 1/25/18
Business Intelligence and Analytics ()
Horizontal vs. Vertical Analytics
BIA-07
All Enterprises have to report information in a common manner when it comes to finances. However when it comes to IoT operations and IT often are at odds about whether platforms can be common or specific to the functions of the company. This panel is a debate about what works and why when developing your IoT Business Intelligence and Analytics strategy.
Register me
Industrial IoT Conference ()
IIoT and AI: Thinking Linking Things
IIOT-07
The speed of the Internet goes beyond human ability to process, so machine learning and artificial intelligence is essential in order for IoT to deliver on the promise of “just in time management”. How is AI being designed and developed to take advantage of IoT. What markets will be the early adopters and what lessons do we hope to gain from it.
Register me
IoT Security ()
The Birds of a Feather Security Q&A
IOTS-07
Until recently most security experts have had open and frank conversations in public about threats. These days’ companies have a tendency to hide their pain. We are hosting this open forum for everyone to improve their cyber security plans. No question is stupid, so ask away. We have gathered some of our best thought leaders into the room to answer any questions attendees have about their unique situations.
Register me
IoT Enterprise Operations ()
Finding the Answers at the Edge
OPS-07
The cloud is constantly be touted as the platform for IoT, but the reality is that solutions for operations are local, isolated and do not require IT’s central control. This discussion is about how solutions at the edge like Fog, Mobile Edge and other perimeter management frameworks enable Enterprises to improve processes in the field.
Register me
The Smart Cities Event ()
FirstNet: Getting Answers to Manage Crisis
SC-07
The Next Generation of emergency services is not a 911 call but the ability for people to report crisis and for dispatchers to see the entire situation. Where do we stand on getting the network deployed and how is it changing the ways cities react to situations of turmoil.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
10:00am
Thursday - 1/25/18
IoT Security ()
Session Details TBA
IOTS-08
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
11:00am-2:00pm
Thursday - 1/25/18
()
IoT Evolution Exhibit Hall Open
X-10
  
11:15am
Thursday - 1/25/18
Keynote Presentation ()
Keynote Presentation in Expo Hall Theatre
K-07
  Keynote Presentation
11:45am
Thursday - 1/25/18
Special Panel Discussion ()
Conference Wrap-Up in Expo Hall Theatre
GS-06
  Special Panel Discussion

 

DIAMOND SPONSOR

CORPORATE SPONSOR

ANALYST PARTNERS

MEDIA SPONSORS