IoT Evolution Agenda | JANUARY 22-25, 2018 | ORLANDO | FLORIDA

Recommendation: Use LANDSCAPE orientation when printing

Days



Tracks

Monday, January 22, 2018
1:00pm
Monday - 1/22/18
Fog Computing Workshop
Introduction to FOG
FOG-01
Is Fog just about bringing the cloud closer? How does edge management change by utilizing a Fog framework? Find out why Fog Computing may be an ideal environment for IoT.
IoT Certification
Managing IoT Partners and Competitors
IOTC-01
It is unusual for a customer to only have one brand for their cars, appliances, etc. When it comes to the Internet of things best of breed solutions often require support services from distributors to support their partners. This session focuses on how distributors work to bring complete solutions and support their ecosystem.
IoT Security Certification
IoT Security Basics
IOTSC-01
Lots of elements go into a discussion of security, including some personal concerns about privacy. When we talk about IoT devices that are distributed and designed to report critical information, redundancy is also a major concern. What represents the framework for IoT to be secure?
LoRA Workshop
Introduction to LoRAWAN
LORA-01
What is the technology associated with LoRa and what are the benefits in deploying these systems? This session looks at the advantages of LoRa for specific deployments and how companies are embracing LoRa solutions.
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
2:00pm
Monday - 1/22/18
Fog Computing Workshop
Edge Management and the Fog Framework
FOG-02
IoT is all about distributed systems and as a result it represents the requirements for extending the Enterprise networking capabilities beyond the firewall. This session discusses how enterprises can use the Fog Framework to enhance security and optimize processing.
IoT Certification
Developing IoT Reseller and VAR Relationships
IOTC-02
The Internet has certainly accelerated everyones go to market strategy, but there are still customers, products and solutions that need to be managed by people and not just the web. This session looks at the pluses and minuses of go to market opportunities and how to segment opportunities to maximize revenue and minimize cost.
IoT Security Certification
IoT Blockchain Strategies
IOTSC-02
Many people point to block chain as a method of improving IoT solutions, this sessions looks at the real advantages of block chain for IoT and what can be done to support complex solutions using IoT in supply chain and manufacturing.
LoRA Workshop
Narrowband (and CAT M1) versus LoRa
LORA-02
The initial push for LTE was designed for the consumers, which left a gap to be filled to support small devices sharing small amounts of information. Now LTE has increased its capabilities to support IoT requirements with NB and Cat M1 solutions. How does LoRa compare with these implementations?
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
3:00pm
Monday - 1/22/18
Fog Computing Workshop
Multi-dimensional Scalability using Fog Computing
FOG-03
This talk discusses five dimensions of scalability in large-scale IoT deployments, and how Fog Computing can help address the challenges. The first dimension is capacity, which is the IoT network’s ability to support huge numbers of devices, computational loads, data sets, numbers of users, and network bandwidth. Fog nodes can scale horizontally and vertically to help address these challenges. The second dimension is performance, where networks must exhibit low latency, high storage throughput, and very accurate algorithm results. Fog Computing allows computation and storage functions to be moved to the optimal place in the network, and dynamically grow or shrink in performance as needed. Third, there is scalable reliability, including the ability to address non-critical but cost sensitive IoT applications in the same network as lifeline and life critical apps, directly controlling high power or potentially hazardous systems. Fog nodes support both internal fault tolerance (using techniques like duplicated processors and RAID storage) and node-level redundancy. For the fourth dimension, Fog supports scalable security, where data and applications in the IoT system have varying requirements related to data security, privacy, and data breech resistance and hacker immunity. Fog has a very robust security infrastructure that can be selectively applied to different layers of data in different ways. Finally, there is application scalability, including the ability of Fog nodes to host different layers of different applications, isolate some applications from others, support multi-tenancy, and dynamically distribute application hosting horizontally and vertically across large networks of Fog nodes.
IoT Certification
Supporting the Developer Community
IOTC-03
Go from a simple IoT prototype, to a market-leading solution faster. During this session, Verizon ThingSpace will create a working prototype using ThingSpace, Verizon’s IoT Platform. The prototype will use Verizon Cat M1 network to transmit sensor data to ThingSpace IoT platform where it can be displayed and analyzed. From idea to prototype in minutes…. Rapid development using cutting edge platform and one of the most advanced networks.
IoT Security Certification
Device Security
IOTSC-03
The Internet of Things is bringing exciting new benefits to businesses and consumers across many different industries. It is also bringing a whole host of equally exciting, yet certainly challenging problems to solve - including security. If you are responsible for developing an IoT solution, you know it needs to be secure, but what does that mean and how do you go about achieving that security? In this session we will look at some of the key ingredients involved in securing your IoT solution from both the hardware and the software perspectives.
LoRA Workshop
LoRa Case Studies
LORA-03
Who is using LoRa today and what are the lessons they have learned in deploying these systems?
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
4:00pm
Monday - 1/22/18
Special General Session
Battle of the Platforms
GS-01
  Special General Session
5:30pm
Monday - 1/22/18
Networking Reception & Battle Awards
X-01
  
Tuesday, January 23, 2018
8:30am
Tuesday - 1/23/18
Continental Breakfast - Proper Badge Required
X-02
  
9:00am
Tuesday - 1/23/18
Business Intelligence and Analytics
Making Sense of Data Streams
BIA-01
The critical challenge is using this data when it is still in motion – and extracting valuable information from it. How do companies tap into their IoT sensors to collect data, enable predictive and prescriptive analytics while still maintaining data integrity?
Industrial IoT Conference
IoT on the Factory Floor
IIOT-01
How is IOT being deployed on the factory floor and how does it improve the management of production? Have we gotten to the point where Programmable Line Cards are taking advantage of connectivity or are gateways making human intervention easier. Where is the promise of IoT for manufacturing being delivered and how?
IoT Security
Role Based Access Control
IOTS-01
It’s embarrassing how many times we end up reading about a sensor or a system has been breached and hackers use the back door to access consumer information. Part of the issue is that data is not mapped into models of access control. Hear about solutions that allow companies to secure the information and ensure that the data is not available to everyone.
IoT Enterprise Operations
Using Market Research to Guarantee Success
OPS-01
IoT transforms problems into opportunities. But how do you know if you have optimized the opportunity? The answer lies in gathering and analyzing primary research on the problems, identifying the possible outcomes and ideal solutions. This discussion is focused on how to perform the research, identify the risks and achieve the desired outcome and benefits.
The Smart Cities Event
Planning for Smart, Safe & Secure Cities
SC-01
The news is filled with discussions and proposals about smart city deployments, but what are the development strategies that make the implementation real and valuable to the municipalities? This session provides a framework for cities that are looking to make Smart City systems a permanent part of their infrastructure.
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
10:00am
Tuesday - 1/23/18
Business Intelligence and Analytics
The Analytics of Things
BIA-02
It often gets lost that one of the core components of the IoT’s “things” is their attributes and the data dictionary that must be mapped into the Business Intelligence systems. Once the data mapping is done the next effort is to integrate the knowledge base into the processes. This panel is a discussion about how IoT analytics impact Enterprise IT systems.
Industrial IoT Conference
The Industrial Internet Security Concerns
IIOT-02
Identity theft happens despite attempts to protect personal information, and it can be a devastating event for the individual. Cyber-attacks occur similarly in an enterprise or its Industrial Control System (ICS) architecture, also delivering devastating impacts for the success of the business. This session will address the current state of these threats, outline what technical solutions, either available now or under development, can be identified to close the gaps regarding cyber security.
IoT Security
IoT Sensors: Hardened and Tested
IOTS-02
IoT device makers face a number of choices when it comes to securing their products. Often security decisions are limited to the needs and limitations of each product. That could, over time, lead to a fragmented set of technologies that need to be managed leading to higher costs. Secondly, security failures can occur at multiple points in a devices lifecycle. How does this impact device security? What are the core principles that all device OEMs must take into consideration to implement an IoT security Strategy and not just a point solution? Is there a framework that can be applied to make the right decision?
IoT Enterprise Operations
Planning Field Deployments
OPS-02
Your company has done its’ research and identified the benefits of IoT for your operations, but now comes the questions about implementation. It’s time to look at the location of your assets and determine the best strategy. Where does LoRA fit in? Should gateways act as aggregation points? This panel looks at how to determine and build upon the right strategy.
The Smart Cities Event
Smart Phones, Smart Citizens and the Social Good
SC-02
Social networks, like Facebook, Wayz and Yelp are defacto word of mouth engines that people use to guide and avoid issues. How can a city build solutions that take advantage of citizen connectivity to alert, alarm and appreciate the concerns and communications needed in a city? Is “there an App for that” or do we need to augment apps with other things?
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
11:00am
Tuesday - 1/23/18
Keynote Presentation
Keynote Presentation
K-01
  Keynote Presentation
11:30am
Tuesday - 1/23/18
Keynote Presentation
Keynote Presentation
K-02
  Keynote Presentation
12:00pm
Tuesday - 1/23/18
Conference Luncheon - Proper Badges Required
X-03
  
1:00pm
Tuesday - 1/23/18
Business Intelligence and Analytics
Measuring Success with Real Results
BIA-03
Most of the sensor information you get is pretty binary. Things are working or they are not; yet somehow you are required to report how you have improved operations with real results. How do you go from Big Data to relevant data in a manner that proves the value of your IoT deployment?
Industrial IoT Conference
Trustworthy Endpoints
IIOT-03
Trustworthiness is a paradigm put forth by NIST (National Institute of Standards and Technology) and IIC (Industrial Internet Consortium) to address the relationship of key system characteristics of IIoT (Industrial Internet of Things) component and systems. The IIC defines trustworthiness as the degree of confidence one has that a system performs as expected, characterized by the five key elements of safety, security, reliability, resilience and privacy in the face of environmental disruptions, human errors, system faults and attacks. Trustworthiness is a trait used for years to define the characteristics of both IT (Information Technology) and OT (Operation Technology) systems. In IT, trustworthiness mainly addresses security, reliability, and privacy. On the other hand, trustworthiness in OT mainly addresses safety, reliability and resilience. Addressing the missing key system characteristics in both IT and OT systems and focusing on the relationship of the five key characteristics of the IIoT, trustworthiness paradigm will solve many IT/OT convergence problems, especially conflicts between safety, security, and privacy.
IoT Security
Why DIY is DOA for IoT Security
IOTS-03
Securing IoT is unlike any other computing scenario we’ve secured in the past. Like icing on a cake, nearly all-previous security solutions have been ‘layered’ on top of the device. This approach to secure IoT simply is not possible. For IoT, security needs to be in the cake batter… before the cake is baked. The critical importance of IoT in today’s IT infrastructure has passed the threshold of tolerance for using open source or DIY solutions. Most organizations need complete, flexible, commercial solutions including management (GUI), reporting and analytics…and designed to be ‘in the cake batter’ and not layered on.
IoT Enterprise Operations
Bluetooth 5: One PAN to Rule Them All
OPS-03
Bluetooth 5 is a new personal area network protocol released by the Bluetooth SIG to improve and grow the capabilities of an already existing and successful protocol. This lecture talks about the ins and outs of Bluetooth 5 from a use case, hardware, and protocol standpoint. Bluetooth 5 now provides more capabilities of any PAN communication and is set to overtake the IoT world as the de-facto standard for near range communication.
The Smart Cities Event
Clean Water and Other Utilities
SC-03
Smart public infrastructure includes the ability to deliver essential services like clean water, dependable power, safe gas, and efficient public lighting. Smarter management of them is the foundation for smart cities. What sensor strategies and frameworks should be put in place for cities to support their citizens and avoid the missteps recently in the news?
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
2:00pm
Tuesday - 1/23/18
Special Panel Discussion
Analyze This
GS-02
  Special Panel Discussion
3:00pm
Tuesday - 1/23/18
Keynote Presentation
Keynote Presentation
K-03
  Keynote Presentation
3:30pm
Tuesday - 1/23/18
Keynote Presentation
Keynote Presentation
K-04
  Keynote Presentation
4:00pm
Tuesday - 1/23/18
Special Panel Discussion
Money Matters
GS-03
  Special Panel Discussion
5:00-6:30pm
Tuesday - 1/23/18
Grand Opening Reception in Exhibit Hall
X-04
  
Wednesday, January 24, 2018
8:30am
Wednesday - 1/24/18
Continental Breakfast - Proper Badge Required
X-05
  
9:00am
Wednesday - 1/24/18
Special Panel Discussion
Women in IoT
GS-04
  Special Panel Discussion
10:00am
Wednesday - 1/24/18
Keynote Presentation
Keynote Presentation
K-05
  Keynote Presentation
10:30am
Wednesday - 1/24/18
Keynote Presentation
Keynote Presentation
K-06
  Keynote Presentation
11:00am-4:00pm
Wednesday - 1/24/18
Visit the IoT Evolution Exhibit Hall
X-06
  
12:00pm
Wednesday - 1/24/18
Lunch Tickets Provided in Exhibit Hall - Proper Badge Required
X-07
  
1:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics
Analytics: Going Beyond Gathering to Finding Value
BIA-04
Before we called it IoT and M2M, we had various closed systems that enabled reporting and system evaluations. As IoT deployments become better networked, do the analytics measure new opportunities for IoT to be deployed? Hear about the analytics that will make IoT valuable.
Industrial IoT Conference
The IIC Testbeds: Proving the Value of IIoT
IIOT-04
Testbeds are a major focus and activity of IIC’s members and helps to quickly validate reference solutions in a collaborative manner. IIC’s Testbed Working Group accelerates the creation of Testbeds by providing a framework, for architectural and security best practices. These symbolize the innovation and opportunities of the Industrial Internet to its members. Hear from these panelists about their first hand experiences. Learn how to become part of new or existing Testbeds.
IoT Security
IoT - The S is for Security
IOTS-04
People make jokes about IoT security, but the reality is that connectivity can be taken advantage of regardless of whether you deploy IoT solutions or not. How do companies identify and isolate sensors and systems that have back doors and represent threats to the entire network? Hear how companies can implement an IoT Security strategy that manages legacy as well as new opportunities.
IoT Enterprise Operations
Building IoT Success
OPS-04
Every Enterprise has the challenge of managing multiple buildings of some kind, (e.g. Factories, Garages, Office space, Retail Outlets, and / or Warehouses). For years, these challenges have been managed without a lot of data gathering. Thermostats were localized and the use of energy for heating, cooling and lighting were considered “sunk costs”. Find out how IoT has changed and improved upon this model of building Management.
The Smart Cities Event
Commuting Delays with Smart Traffic
SC-04
Is their any mayor in the world that has not heard a complaint about commuting? The Answer is probably not. Using IoT to smooth out traffic patterns may not eliminate the calls, but it can certainly improve the systems and reduce the jams. This is a discussion about Smart Traffic Management, be it road, rail, street or subway.
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
2:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics
Big Data, Big Lakes, Bad Decisions
BIA-05
In the old days, we used to field various closed systems to enable reporting and local system management. Now, however, we are facing massive amounts of data being delivered in various formats. Streams and lakes of data are being gathered, but insight can still be elusive. This session will explore how IoT systems will increase business intelligence in the enterprise.
Industrial IoT Conference
Putting a Framework on Connectivity Requirements
IIOT-05
The Industrial Internet of Things (IIoT) landscape today is a confusing mix of proprietary connectivity technologies and standards. Some are general purpose, some are mostly appropriate for enterprise applications and others are optimized for a narrow set of domain-specific use cases in vertically integrated systems. This confusion hinders the ability to share data that IIoT systems need. Architects need clarity on how to effectively share data between IIoT components and systems. To address this confusion, the Industrial Internet Consortium (IIC) just released the Industrial Internet Connectivity Framework (IICF). It is the result of years of work by many organizations and is the only extensive connectivity analysis by multiple experts from many companies at a major consortium. More importantly, it not only provides high-level design guidance, but also detailed, useful, tangible and practical guidance for those building IIoT solutions today. In this session, Dr. Rajive Joshi, co-chair of the IIC Connectivity Task Group will discuss the significance of the IICF in accelerating IoT development and will provide an analysis of current standards.
IoT Security
Asset Management & Surveillance
IOTS-05
Crimes of convenience can occur because things of value are neglected. IoT can be used to determine the position of systems and to monitor assets with GeoFencing and thereby reduce the opportunity for theft. This session talks about the practical aspects of using asset management to protect corporate inventory as well as business and institutional property.
IoT Enterprise Operations
Offshore Energy Harvesting
OPS-05
The Ocean has more than one way to harvest energy. Oil Rigs and Wind Turbines have similar requirements in terms of alerts, alarms and management, but need connectivity and control. Hear how IoT is being used to manage both of these resources.
The Smart Cities Event
Smart City Success Stories
SC-05
We have had a lot of investment in trials from both the public and private sector in Smart City solutions. We have asked implementers of these solutions to participate and share their experience and frustrations with becoming a Smart City.
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
3:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics
Fog Computing: Analytics and Processing at the Edge
BIA-06
While the Cloud promises economies of scale and vast resources, many enterprises are recognizing the need for computing resources at the point where processing can have the most impact. Edge and Fog Computing are paradigms that seek to maximize performance by keeping the information where it’s most valued – at the edge.
Industrial IoT Conference
MuLTEfire Solutions: Does LTE Mean Linking Things Everywhere
IIOT-06
MulteFire is delivering a new way to wireless. MulteFire is an LTE-based small cell technology that operates standalone in unlicensed and shared spectrum – delivering LTE-like-performance with Wi-Fi-like deployment simplicity. By removing the requirement to own licensed spectrum to deploy LTE technology, MulteFire broadens the LTE ecosystem to industrial IoT, enterprises, venues and more. Attendees at this session will learn how MulteFire allows anyone to deploy and operate their own private or neutral host MulteFire network. They will gain an understanding of how an industrial IoT environment will benefit by deploying a MulteFire network.
IoT Security
Avoiding the IoT Zombie Apocalypse
IOTS-06
What are the business and technical implications of new attacks like the CIA’s CherryBlossom toolkit and Mirai? These toolkits go after IoT devices, routers, and gateways. They use sophisticated techniques to compromise these systems, turn them into zombies, and enslave them into botnet armies that are rented out for DDoS attacks. Thus, even mighty giants like Twitter and Netflix have laid low. Hear about the new practices that use hardware security to protect the next generation of IoT devices and routers against such attacks. How can IoT avoid being part of the problem?
IoT Enterprise Operations
Agricultural IoT: Managing Earth, Wind and Water
OPS-06
On the farm the weather drives decisions. If there is a drought you try to store, if there is rain you try to divert. Whether drones are watching above or sensors are buried in the soil, they are being used to manage resources, optimize crop production and track equipment. This session explores the numerous ways farming is being optimized by IoT.
The Smart Cities Event
The Whole City is Watching?
SC-06
Surveillance systems have been deployed in every major city, yet we now have less than 10% of the video is watched by a human. How do we move surveillance to the next level where systems can make us safer and deter crime?
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
4:15pm
Wednesday - 1/24/18
Special Panel Discussion
IoT Security Strategies
GS-05
  Special Panel Discussion
8:00pm
Wednesday - 1/24/18
IoT Conference Party
X-08
  
Thursday, January 25, 2018
8:30pm
Thursday - 1/25/18
Continental Breakfast - Proper Badge Required
X-09
  
9:00am
Thursday - 1/25/18
Business Intelligence and Analytics
Horizontal vs. Vertical Analytics
BIA-07
All Enterprises have to report information in a common manner when it comes to finances. However when it comes to IoT operations and IT often are at odds about whether platforms can be common or specific to the functions of the company. This panel is a debate about what works and why when developing your IoT Business Intelligence and Analytics strategy.
Industrial IoT Conference
IIoT and AI: Thinking Linking Things
IIOT-07
The speed of the Internet goes beyond human ability to process, so machine learning and artificial intelligence is essential in order for IoT to deliver on the promise of “just in time management”. How is AI being designed and developed to take advantage of IoT. What markets will be the early adopters and what lessons do we hope to gain from it.
IoT Security
The Birds of a Feather Security Q&A
IOTS-07
Until recently most security experts have had open and frank conversations in public about threats. These days’ companies have a tendency to hide their pain. We are hosting this open forum for everyone to improve their cyber security plans. No question is stupid, so ask away. We have gathered some of our best thought leaders into the room to answer any questions attendees have about their unique situations.
IoT Enterprise Operations
Finding the Answers at the Edge
OPS-07
The cloud is constantly be touted as the platform for IoT, but the reality is that solutions for operations are local, isolated and do not require IT’s central control. This discussion is about how solutions at the edge like Fog, Mobile Edge and other perimeter management frameworks enable Enterprises to improve processes in the field.
The Smart Cities Event
FirstNet: Getting Answers to Manage Crisis
SC-07
The Next Generation of emergency services is not a 911 call but the ability for people to report crisis and for dispatchers to see the entire situation. Where do we stand on getting the network deployed and how is it changing the ways cities react to situations of turmoil.
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
10:00am
Thursday - 1/25/18
Business Intelligence and Analytics
Session Details TBA
BIA-08
Industrial IoT Conference
Session Details TBA
IIOT-08
IoT Security
Session Details TBA
IOTS-08
IoT Enterprise Operations
Session Details TBA
OPS-08
The Smart Cities Event
Session Details TBA
SC-08
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security
  IoT Enterprise Operations
  The Smart Cities Event
11:00am-2:00pm
Thursday - 1/25/18
IoT Evolution Exhibit Hall Open
X-10
  
11:15am
Thursday - 1/25/18
Keynote Presentation
Keynote Presentation in Expo Hall Theatre
K-07
  Keynote Presentation
11:45am
Thursday - 1/25/18
Special Panel Discussion
Conference Wrap-Up in Expo Hall Theatre
GS-06
  Special Panel Discussion