AUGUST 17 – 20, 2015 • Caesars Palace | Las Vegas, Nevada

IoT Evolution Expo Agenda

Monday, August 17, 2015
12:00pm
Monday - 08/17/15
IoT Security Summit
Protecting and Defending the Edge
IOTS-01
Business Development Manager, Technology Partner Program
Axis Communications
The growth of IoT is occurring at an incredible rate and we are becoming increasingly reliant on intelligent, interconnected devices in our lives and businesses. This reliance is raising alarms about security and privacy issues. How do we protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? This panel discusses the critical issues in developing, managing and securing the edge devices in an IoT Network.
1:00pm
Monday - 08/17/15
IoT Security Summit
The Core of Securing Networks
IOTS-02
Founder & CEO
PubNub
Senior Analyst - Security & Managed Services
James Brehm & Associates
Everyone draws a cloud these days to signify the network, but is the network the Internet, a private cloud or a hybrid? How do companies connect the edge, gateways, core and cloud will minimizing or avoiding week links? This panel talks to the issues of deploying networks, managing ID’s and protecting the network from hackers.
2:00pm
Monday - 08/17/15
IoT Security Summit
Security at the Top
IOTS-03
Machina Research
Application Level Security is sometimes viewed as the ultimate security location. As the Bring Your Own Device [BYOD] employee and customer use their smart phones, tablets and personal devices to access IoT business intelligence, the ability to use firewalls comes down to application specific ports and constant monitoring. How can applications lock themselves down and ensure that they are not a gateway to an Enterprise? Does using mobile Web apps add additional vulnerabilities?
3:00pm
Monday - 08/17/15
IoT Evolution Battle of the Platforms
X-01
5:30pm
Monday - 08/17/15
Battle of the Platforms Networking Reception - Open to All Attendees
X-02
Tuesday, August 18, 2015
8:00am
Tuesday - 08/18/15
Continental Breakfast
X-03
9:00am
Tuesday - 08/18/15
Analyze This
GS-01
Founder and Technology Evangelist
James Brehm & Associates
Partner
151 Advisors
Principal Analyst
Machina Research
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
Analyst
451 Research
Practice Director, Enterprise & M2M
ABI Research
10:00am
Tuesday - 08/18/15
Special General Session TBA
GS-02
10:45am
Tuesday - 08/18/15
Special Presentation by Spireon
GS-03
Chief Executive Officer
Spireon
11:15am
Tuesday - 08/18/15
Keynote Presentation by Joe Gibbs: A Winning Mindset
K-01
Joe Gibbs Racing, Inc.
Data is key, whether that means having the best information on the football field, the most accurate diagnostics for a race car, or launching a new IoT application. Coach Gibbs shares his personal experiences and looks forward to a datadriven future.
12:00pm
Tuesday - 08/18/15
Luncheon - Business Impact Awards
X-04
1:00pm
Tuesday - 08/18/15
IoT Evolution
Value Chain in Flux
IOT-01
Director of Product Management & Business Development
Systech Corporation
There has been plenty of M&A activity of late in the M2M/IoT space, but the question for new adopters remains: exactly what bits and pieces do I require to develop and deploy my IoT application. We’ll talk to super focused players as well as those who are working to deliver a comprehensive endtoend solution to understand exactly what makes up a complete solution and which players are involved. Plus, we’ll take a look at some of the latest mergers and acquisitions to understand the gotomarket strategy of these “new” companies and what their consolidation means for their customers.
Connected Home & Building
The Ultimate Gateway: The Battle for Your Home
CH-01
VP, Marketing
Icontrol Networks
Meter? Thermostat? Alarm panel? Refrigerator? As connections proliferate in and around the home, which connected device will come out on top as the “master control” for your household? Our panelists come armed with their favorite devices to battle it out for the lead in the story of your connected life.
Connected Transportation
New Business Models for the OEM
CT-01
With more than 100 years under its belt, the automotive OEM business can hardly be considered new anymore. But the current proliferation of connected technology in the vehicle is driving a new class of innovation. While connected car offerings over the past 15 to 20 years tended revolve around a few key services, we are beginning to see entirely new business models emerge taking connectivity to new levels. How will these new services affect our driving experience and how will they impact vehicledependent businesses like rental cars, taxis and the like?
Fog Computing, Analytics & Data
Leveraging the Cloud to Manage Your Thing Data
FOG-01
Principal Strategist
Cisco Systems, Inc.
Founder & Chief Strategy Officer
WoT.io
The more we connect, the more data we have to manage, analyze and act upon. How are cloud services impacting the Internet of Things and how can you find the best possible solution to managing your unique data sets?
IoT Evolution Developer
Get Cloud Resources to the IoT Edge with Fog Computing
IOTD-01
Technical Leader and Platform Architect
Cisco
Embedded devices in the IoT are hampered by the compute, storage, and service limitations of living life on the edge. As IoT edge devices comprise broader sensor networks for industrial automation, transportation, and other safetycritical applications, their high uptime requirements are nonnegotiable and service latencies must be kept within realtime or nearrealtime parameters. However, the size, weight, power, and cost constraints of edge platforms also inhibit the ondevice resources available for executing such functions. In this session, Byers will introduce Fog Computing, a new paradigm for the IoT that extends compute, storage, and application resources from the cloud to the network edge. Beyond the interplay between Fog and Cloud, Byers will show how Fog services can be leveraged across a range of heterogeneous platforms—from enduser devices and access points to edge routers and switches—through software technology that facilitates the collection, storage, analysis, and fusion of data to drive success in your next IoT device deployment.
2:00pm
Tuesday - 08/18/15
IoT Evolution
Supply Chain and Logistics
IOT-02
VP of Sales
IoT Advisor, Evangelist & Strategist
From the factory floor, through testing, shipping and installation, IoT has a role to play in improving quality and delivery times. We bring together multiple players in the supply chain to talk about how IoT is improving their business and how they can jointly provide a better customer experience as a result.
Connected Home & Building
Convergence: The Connected Home in a Connected World
CH-02
Sr. Director of Product Marketing
Ayla Networks
There is a lot of promise from the connected home and other connected applications that make up the Internet of Things. But to truly deliver on that promise, our connected cars, homes, offices, etc. will all need to speak to each other. Take a look at early crossover applications and how they work together to deliver enhanced value as a unit.
Connected Transportation
Beyond Built In: Consumer Aftermarket
CT-02
What new applications are drivers adding on to their vehicle? Connected services are delivering the new custom car. Whether it’s an aftermarket navigation system, an insurance ratecutting OBD II dongle, a virtual backseat driver for your teenager or a satellite radio, savvy consumers are looking to create their own seamless connected experience even without paying a premium for topoftheline embedded connectivity. Learn about the applications drivers are giving a green light
Fog Computing, Analytics & Data
Saas/Paas: Leaders or Lackeys, Who Will Lead, Who Will Lose?
FOG-02
Principal Analyst
Machina Research
Analyst
First Analysis
Sr. Strategist & Consultant, Head of M2M
Compass Intelligence
Principal Analyst: Enterprise Practice: US
Ovum
Practice Director, Enterprise & M2M
ABI Research
It seems nearly everyone in M2M and IoT is coming up with a new platform as a service offering. Among so many contenders, it can be a challenge to even evaluate the differences. Who’s most likely to succeed? Leveraging the latest industry research, James Brehm evaluates the top players, helps adopters find the right fit and makes a few predictions for the future of IoT cloud platforms.
IoT Evolution Developer
Securing Embedded Devices in the Industrial IoT
IOTD-02
President & Co-Founder
Icon Labs
The Internet of Things is enabling connectivity in ways we didn’t even imagine five years ago. Soon connected Things will be everywhere, and many of them will be outside of traditional security perimeters. Companies are aware of the need to ensure privacy and protect data, but little attention has been paid to securing the device itself. Organizations have traditionally relied on perimeter security; but alone, that tactic is not enough and doesnt scale to meet the demands of IoT security. The perimeter can be compromised, and in many cases threats originate from inside the secure zone. More importantly, the Things in the IoT are often deployed outside of the traditional security perimeter and have no protection at all. Even though many corporate PCs have long been on “secure” networks, they still have firewalls and endpoint security inside. IoT connected machines and devices need the same protection. This session will cover some cyber threats for IoT devices, the approaches that can be taken to secure your device and comply with security standards, how this links with the enterprise security strategy, and how you can help create the Internet of Secure Things.
3:00pm
Tuesday - 08/18/15
IoT Evolution
Power Chain
IOT-03
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
CEO
PLAT.ONE
Smart Grid has become a priority for governments around the world. For certain customers, the power chain management is not just optimal but critical. Whether you’re running a hospital, a police department or a data center, businesses are totally dependent on reliable power supply. How are IoT solutions improving the reliability of power from oil fields to pipelines to local delivery? What is the next step toward 100% dependable power distribution?
Connected Home & Building
The Latest Connected Gadgets for the Home
CH-03
President
Arrayent
We’ve seen pet trackers, connected light bulbs even Internet baby monitors what are the latest connected devices arriving on the market for your connected home? Join our panel as we take a look at the fun, novel, inspiring, and sometimes silly devices promising to deliver the ultimate connected lifestyle.
Connected Transportation
Convergence: The Connected Car in a Connected World
CT-03
There is a lot of promise from the connected car and other connected applications that make up the Internet of Things. But to truly deliver on that promise, our connected cars, homes, offices, etc. will all need to speak to each other. Take a look at early crossover applications and how they work together to deliver enhanced value as a unit.
Fog Computing, Analytics & Data
Convergence 1: Managing Disparate Technologies
FOG-03
Co-Founder
Stream
Founder & Chief Technologist
Blue Mountain Microsystems Inc.
RFID, NFC, Bluetooth, WiFi, Zigbee, ZWave, SigFox, TV Whitespace, MEMS, LoRa, Cellular, GPS, Glonass, Beidou, Satellite there are a lot of technologies that go into a fullfledged IoT solution but managing them all can be a nightmare. How do cloud solutions address the problem and who makes it simple for the nontechnologist line of business manager?
IoT Evolution Developer
The Evolution of Automotive Software with IoT
IOTD-03
Director, Automotive & General Embedded
QNX Software Systems
Global Director, Business Development
QNX Software Systems
The Internet of Things IoT has the potential to harness vehicle information and influence every stage of the automotive lifecycle. Vehicle software is undergoing rapid evolvement to meet the demands of today’s consumer securely, including downloadable content, builtin apps, and mobile device support. The next generation of cars will require endtoend, connected solutions that integrate sensors, data processing, and overtheair updates to deploy fixes and new features. As the IoT continues to open up, so will new revenue streams – and challenges. Andrew Poliak will discuss how to provide a true endtoend automotive IoT solution and strategies for overcoming obstacles to implementing the IoT in our cars.
3:45pm
Tuesday - 08/18/15
Keynote Address TBA
K-02
4:15pm
Tuesday - 08/18/15
Keynote Presentation by AT&T
K-03
5:00-7:00pm
Tuesday - 08/18/15
IoT Evolution Exhibit Hall Grand Opening Reception
X-05
Wednesday, August 19, 2015
8:00am
Wednesday - 08/19/15
Continental Breakfast
X-06
8:30am
Wednesday - 08/19/15
IoT Evolution
Lessons in Cold Chain: Food & Beverage
IOT-04
The IoT will reinvent the food and beverage industry. From Farm to Fork, the IoT will play a role in maintaining freshness, safety and the strong viability of this industry. Hear how the IoT is assisting in everything from supply chain planning and execution to farm automation.
Connected Home & Building
Lessons in Building Automation
CH-04
President
Continental Automated Buildings Association
Hear from companies who have utilized the IoT to automate facilities management and eliminate the silo management of a buildings functions. Learn from their experience, obstacles and successes.
Connected Transportation
Drones & Other Autonomous Vehicles
CT-04
Technical Leader and Platform Architect
Cisco
There’s plenty of buzz around drones these days taking aerial photos, bombing rebels, maybe even delivering our next Amazon package but few are aware just how much autonomy is already built into the vehicles we ride in every day. For years, commuters have ridden in driverless vehicles whether between airport terminals or across town. No one eve bats an eyelash at autopilot for commercial air travel. And with features like selfparking and adaptive cruise control even our personal vehicles are becoming more and more autonomous. We may soon achieve the transportation holy grail: cars that can’t crash. So what are we waiting for? Are we just control freaks or are there valid safety considerations holding us back?
Fog Computing, Analytics & Data
Convergence 2: Joining Disparate Business Systems
FOG-04
If one considers the IoT revolution the 2nd stage in the computing and Internet revolution, and a critical part of that Big Data everyone talks about, then we need to think about how to merge “thing” data with the extensive, expensive enterprise resource planning and customer relationship management systems companies have shelled out millions for over the past few years. How does one go about merging often siloed IoT data with these broad reaching systems to drive enterprisewide value?
IoT Evolution Developer
How (and Why) to Make the IoT Trusted
IOTD-04
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
Complex dynamic operating systems are moving lower and lower in the device chain and with that moves comes a possibility that they get subverted or do the wrong thing due to a software bug. The threads of this happening on a PC or smartphone are frightening, but on IoT devices that have access to key data, this can endanger lives. If these IoT devices dont operate in a trustworthy fashion, a widespread attack could result in a decision thats made in the cloud because it is based on unsubstantiated data. The solution is to establish a strong hardware device identity, a policy enforcement point in hardware that is isolated from the OS along with attestation capabilities that allow a consumer of device data in the cloud to gauge the trust level of each harvested data point after it was collected. This session will highlight how a TPM can offer all these abilities when attached securely to the IoT device and bring measurable trust to the device and the data it produces.
9:30am
Wednesday - 08/19/15
Swimming with the Sharks: Finding Investors to Back Your Future
GS-04
President & CEO
AKnowledge Partners
Managing Director, Senior Equity Analyst
Canaccord
Are you sitting on the next big idea in supply chain? This panel of finance and investment experts will help you understand exactly what it takes to get noticed by institutional investors in order to support your application from concept to reality.
10:15am
Wednesday - 08/19/15
Keynote Presentation TBA
K-04
11:15am-4:00pm
Wednesday - 08/19/15
IoT Evolution Exhibit Hall Open
X-07
12:30pm
Wednesday - 08/19/15
Lunch
X-08
1:30pm
Wednesday - 08/19/15
IoT Evolution
Lessons in Cold Chain: Medical/Pharma
IOT-05
Head of M2M for the Americas
Vodafone
Co-Founder, Chief Evangelist
Aria Systems
Your Health is Priceless, so keeping costs in line seems to be a lesser priority. The IoT offers impactful ways to optimize the Medical/Pharma cold chain so that safety and cost containment go hand in hand.
Connected Home & Building
Physical Security
CH-05
CEO
Machine-To-Machine Intelligence (M2Mi) Corporation
Senior Partner
RMAC Technology Partners
Business Development Manager, Technology Partner Program
Axis Communications
Senior Analyst - Security & Managed Services
James Brehm & Associates
Sensors; cameras; temperature, smoke and motion detectors how is your smart building equipped against physical intrusion. Thanks to the Internet of Things, we now know more about what’s happening in the building than ever before but with more and more data entry points, are we exposing ourselves to lowcost hacks that could render the entire system useless. Hear from security experts about how technology can protect your physical spaces, personnel and business information, while limiting exposure to sophisticated data intruders.
Connected Transportation
Lessons in Fleet Management
CT-05
Vice President, Sales
Geotab
Cars and Trucks have increased their sensors 100 fold, has the software for fleet management systems kept up? This session looks at how we are adding new services and features thanks to sophisticated Fleet Management Software.
Fog Computing, Analytics & Data
Convergence 3: Managing Multiple Networks/Carriers
FOG-05
Chief Innovation and Technology Officer
Numerex
We’ve converged multiple radio technologies into multiple enterprise systems, but how do we manage the carrier situation? For global enterprises, this is no small hurdle. Assume for many countries, you need to use multiple carriers as a failsafe then add the problem of each country having distinct carriers focused on their own geographic region. LTEAdvanced carrier aggregation helps, but what about the traditional lowbandwidth M2M application? This session will discuss options to tackle multiple geographies and multiple carriers by leveraging the power of the cloud.
IoT Evolution Developer
Enabling Security in the Automobile of Tomorrow
IOTD-05
Chief Security Officer
BlackBerry
Wireless connectivity in the car, aka V2X, presents compelling capabilities for nextgeneration automobiles. The possibilities include improved collision avoidance, autonomous operation, predictive maintenance and lower total cost of ownership, and improved driver and passenger experiences. Security researchers, however, have demonstrated that attack vectors across these vehicular networks pose a threat to the same safety and productivity functions they seek to foster. To meet this challenge, OEMs and their suppliers must embrace a higher level of rigor when it comes to threat modeling to accurately and efficiently determine security requirements and then apply a similar level of rigor for assuring the software and systems that manifest these requirements. This class will examine common threats and mitigations facing nextgeneration connected cars, with an emphasis on best practices and standards for achieving this required level of rigor.
2:30pm
Wednesday - 08/19/15
IoT Evolution
Convergence: Linking Across Verticals
IOT-06
What if all your IoT systems spoke seamlessly to each other? Would it improve your supply chain? Would it better ensure safe, ontime delivery of your product? This panel will look at related “links” in the chain and discuss how cooperation between suppliers can improve the total customer experience.
Connected Home & Building
Disaster Recovery
CH-06
VP of Software Engineering and Product Management
Intrado
The world is an uncertain place and, as we all know, disasters can happen. How can IoT technology help identify impending disaster and assist in your recovery once disaster hits.
Connected Transportation
Carrier Aggregation for Public Transport
CT-06
VP of Business Development
Cradlepoint
When it comes to rush hour, peak demands require peak network availability. That’s the idea behind carrier aggregation, by which bandwidth of multiple carriers is made available simultaneously to provide a seamless experience no matter what the time of day. How is this unique feature of LTE Advanced likely to impact your morning commute? Our panelists will look at the technology behind better bandwidth and how carriers and hardware manufacturers are working together as never before to deliver a better mobile experience.
Fog Computing, Analytics & Data
Architectural Ideology
FOG-06
VP of Business Development
Cradlepoint
CTO
Aeris
Senior Technical Leader
Cisco
Principal Product Manager
Opengear
Cloud services come in so many shapes and forms even understanding exactly which part of your application they address can be a challenge. This panel seeks to help you find the architectural elements you need covered in order to find the ideal solution for your application.
IoT Evolution Developer
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-06
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this handson workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and viceversa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage.Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
3:30pm
Wednesday - 08/19/15
IoT Evolution
Unchained: Unlocking Business Value
IOT-07
There are plenty of purpose build IoT applications along the supply chain today. Most are designed to drive efficiency. Today we are starting to see a trend toward new services and business models previously unconsidered. What can connectivity do for you? We’ll look into the future of supply chain management and the role IoT technology can plan in transforming your business.
Connected Home & Building
Connected Infrastructure
CH-07
Sr. Strategist & Consultant, Head of M2M
Compass Intelligence
Whether it’s the power grid or the roadways, sensor technology is making even asphalt smart these days. Join us as our panelists take you through some smart city cases leveraging smart infrastructure to improve both operations and services.
Connected Transportation
A Tangled Web: Insurance, Buy Here/Pay Here and Government Regulation
CT-07
Over the past few years, there have been a few surprises for the telematics marketplace. Usagebased insurance and the Buy Here/Pay Here credit applications have taken the business benefits of better data and transformed them into true consumerempowerment. And when it comes to consumers, as the FTC has already stated, it is the government’s job to protect. But how? What is the proper role of government in these are other telematics applications? When is regulation helpful and when is it detrimental? And what can we learn from these new connected approaches to legacy businesses?
Fog Computing, Analytics & Data
Holding Your Own Against the Big Guys
FOG-07
IoT is a hot topic these days and we’re seeing interest from companies who rarely if ever talked publicly about its precursor M2M. With IBM, Accenture, Google and others taking an active interest, how is the traditional M2M service provider to stay ahead of the curve. We’ll investigate how the big guys are entering the market, where their strengths lie and where partnership opportunities abound.
IoT Evolution Developer
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-07
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this handson workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and viceversa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage.Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
4:30pm
Wednesday - 08/19/15
IoT Evolution
Session Details TBA
IOT-08
Connected Home & Building
Session Details TBA
CH-08
Connected Transportation
Session Details TBA
CT-08
Fog Computing, Analytics & Data
Session Details TBA
FOG-08
IoT Evolution Developer
Panel: The Biggest IoT Challenges Faced by Developers
IOTD-08
Technical Leader and Platform Architect
Cisco
Chief Security Officer
BlackBerry
EVP/CTO
Micrium
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
The challenges a design engineer faces when attempting to make secure and reliable connections to the IoT are plentiful. May of them have been well documented, but many have not. In this panel session, well uncover some of the issues that a designer may not be aware of, with potential solutions to those hurdles.
5:15pm
Wednesday - 08/19/15
Data Security and the Internet of Things
GS-05
Distinguished Engineer, CTG Architecture
Cisco
Nobody wants to be hacked but that common aversion becomes even more exaggerated when we apply it to our cars, child trackers, home security systems or the millions of other connections proliferating across the globe and across vertical markets. Though there has been a great deal of talk about the dangers, our panel will give us a view not only of the danger, but what is being done to address data security in the Internet of Things and what more needs to happen.
Thursday, August 20, 2015
8:00am
Thursday - 08/20/15
Continental Breakfast
X-09
9:00am
Thursday - 08/20/15
IoT Evolution
Architecture
IOT-09
There is more than one way to do just about anything. Then again, there can only be one “best” way. Let’s take a look at how IoT adopters across vertical markets are architecting their solutions in order to learn from their mistakes and adapt the bestofbreed architecture to telematics applications.
Connected Home & Building
The Apps @ Home Get It or Forget It!
CH-09
Chief Product Officer
Kii
Director of Product Marketing
Applause
Connected Home Applications e.g., fitness trackers, smart heating systems and appliances will be commonplace in five to 10 years. This means users, who have become accustomed to connected devices and the IoT, will want their digital services to work the first time, every time. If users are confused by the way a brand’s app works, they simply won’t use it and companies will lose market share. This session will focus on how companies can make their apps functional, usable and appealing across the spectrum of devices. We will revisit old testing approaches and relate to the new world of sensors. Hear how to provide superior digital experiences – from web to mobile to wearables to smart TVs, etc. to become a trusted and valued brand.
Connected Transportation
Connected Car: It’s All About Location Data, Location Data, Location Data!
CT-09
The availability of realtime location data from vehicles, phones, and almost anything else that is not nailed down, opens up endless possibilities for creating valueprovided that you have the infrastructure to collect and keep up with all that data and the analytical smarts to make sense of it. From emergency response to locationbased marketing, and from fraud detection to network optimization, you will need the tools to analyze geospatial locations and relationships in real time, on data in motion, and on massive amounts of timeindexed data at rest.
Fog Computing, Analytics & Data
Multi-dimensional Scalability using Fog Computing
FOG-09
Technical Leader and Platform Architect
Cisco
VP of Business Development
PubNub
This talk discusses these five dimensions of scalability in large scale IoT deployments and how Fog Computing can help address the challenges associated with them.•Capacity – Hear how Fog nodes can scale horizontally and vertically to help address capacity challenges. •Performance Networks must exhibit low latency, high storage throughput, and very accurate algorithm results. Hear ho fog Computing allows computation and storage functions to be moved to the optimal place in the network, and dynamically grow or shrink in performance as needed. •Scalable reliability, including the ability to address noncritical but cost sensitive IoT applications in the same network as lifeline and life critical apps, directly controlling high power or potentially hazardous systems. Hear how fog nodes support both internal fault tolerance using techniques like duplicated processors and RAID storage and nodelevel redundancy. •Scalable security – Hera about Fog’s robust security infrastructure that can be selectively applied to different layers of data in different ways. •Application scalability, including the ability of Fog nodes to host different layers of different applications, isolate some applications from others, support multitenancy, and dynamically distribute application hosting horizontally and vertically across large networks of Fog nodes.
IoT Evolution Developer
Secure Cloud Computing for Big Data and the IoT
IOTD-09
Developer
inders.in
The IoT means different things to different people, depending on the persons perspective. Are you designing an end device? Are you designing something that has to be mission critical? In this talk, Kirkland will discuss how the cloud should be configured for the IoT and how to maintain reliability and security, even in environments with thousands of connections. He will discuss the benefits and tradeoffs of a tiered, scalable approach.
10:00am
Thursday - 08/20/15
IoT Evolution
Sensors
IOT-10
RFID, NFC, Bluetooth, WiFi, Zigbee, ZWave, SigFox, TV Whitespace, MEMS, LoRa, Cellular, GPS, Glonass, Beidou, Satellite . . . If it’s all Greek to you, you’re not alone. The truth is, most drivers couldn’t care less about what type of radios or sensor technology is behind their connected car they are, rightly, primarily interested in the service. Of course, this is no consolation to the engineers, programmers and operations folks tasked with developing, deploying and ultimately managing those applications. Join us as we discuss the landscape of different technologies and what the industry is doing to make sure they all “speak the same language” despite operating at different points on the spectrum.
Connected Home & Building
The Guiding Light of PoS: Beacons
CH-10
VP of Business Development
Cradlepoint
Principal Analyst: Enterprise Practice: US
Ovum
Principal Consultant
Statler Consulting
Lost in the Mall? We have an app for that! Trying to find your receipt? We have an App for that too. Hear how beacons are bringing new dimensions and data analytics to retail point of sale to impact everything from the effectiveness of displays to loyalty strategies with customers to enabling the consumer, retailer and credit card company to track the entire shopping experience. Learn are marketing metrics changing as a result of this new technology.
Connected Transportation
Supply Chain Logistics: Realities of Worldwide Delivery
CT-10
Hear how innovative wireless tracking can provide actionable data results to improve transportation logistics. Companies ship using a variety of internal and external fleets, rail, ship and air carriers. The requirements are for a sophisticated worldwide tracking intelligence to manage shipping logistics. The session will follow each step of the supply chain from initial packaging through its destination. Conclusions will be offered based on the extensive data capture that is provided through the sophisticated tracking. The volume of data collected provides the “Big Data” that can provide new insights into how IoT will benefit the transportation industry.
Fog Computing, Analytics & Data
Unleashing Value from Analyzing Data Generated by Internet of Things
FOG-10
Director, IoT Strategy
CA Technologies
Associate Partner
151 Advisors
For businesses to derive value from the massive amounts of realtime data in the emerging IoT world, its imperative they transform their thinking, processes and infrastructure to act in seconds not hours and days. Forwardthinking companies are converting the vast amounts of data into actionable insights by applying advanced analytics technologies designed specifically to handle the requirements of realtime big data analytics. Providing deeper value and the ability to decipher what the data actually means to the business is what will set successful companies apart. This presentation will cover how realtime analytics generates value for IoT.
IoT Evolution Developer
From Sensor Data to Embedded Processing and Security: a Holistic View at the Edge of IoT
IOTD-10
Director
Freescale
11:00am-2:00pm
Thursday - 08/20/15
IoT Evolution Exhibit Hall Open
X-10
11:00am
Thursday - 08/20/15
IoT Evolution
Standards
IOT-11
We’ve been talking IoT standards for years. In fact, there are multiple organizations and countless professionals dedicated fulltime to the standardization of IoT technology. But with so many different hardware and software considerations and so many different application sets, this holy grail of IoT has proven elusive. Hear from the men and women committed to making standards happen and learn how they plan to get there.
Connected Home & Building
Out in the Field: Where the Data is Real-Time
CH-11
Agriculture, Mining, Oil and Gas and Smart Grids sound like totally different businesses, but in truth they have one aspect of IoT in common. The need for remote data collection and real time actionable field information makes them look for innovative ways to connect, collect and communicate. This panel explores the architectures based on a particular industry’s requirements and how different industries can learn from each other and share field services solutions and techniques.
Connected Transportation
Filling The Skills Gap With The Connected Vehicle Industry
CT-11
Is your Mechanic ready to be an RF Engineer? Will Fryes or Best Buy do your maintenance? In the next five years, there will be a seven fold increase in new cars equipped with factoryfitted mobile connectivity says the GSMA Connected Car Forecast published February 2015. To prepare for emerging technologies within the connected vehicle ecosystem we will look at what hardware and software architecture skills will be needed to work with mobility, vehicle, and infrastructure systems to fill the gap of 500,000 new jobs within the next five years.
Fog Computing, Analytics & Data
Fog Computing Reality Check: Real World Applications and Architectures
FOG-11
Senior Manager Software Development Engineering
Cisco
The IoT is flooded with a variety of platforms and solutions. Fog Computing has been notably appearing as an evolving term in the context of IoT software. There is skepticism that Fog Computing is just another buzzword destined to disappear in the dust of time. Get insight from concrete business cases in a variety of IoT verticals – Agriculture, Industrial Manufacturing, Transportation, Smart & Connected Communities etc. and learn how Fog Computing can play a substantial role in each one of these verticals. Develop a judicious point of view with respect to the future of Fog Computing through market research, technology disruption vectors and ROI use cases presented in this session.
IoT Evolution Developer
Open Source Development for IoT Devices
IOTD-11
Chief Scientist
The PTR Group, Inc.
As the IoT picks up momentum, smaller devices such as the ARM CortexM series parts are starting to dominate the sensor market. And while there are several commercial development platforms for these parts, the larger maker community is where a lot of innovation will occur. In this session, we will present the options for opensource development tools that target the MMUless CortexM parts for operating systems such as ARMs mbed and more. We will discuss development tools ranging from development operating systems, to IDEs to compilers and debuggers, all available at little or no cost.