Agenda


Interested in being an Exhibitor at IoT Evolution Developers Conference in Las Vegas? Learn more HERE.


PRINT FRIENDLY
Monday, August 17, 2015
12:00pm
Monday - 08/17/15
  Fast Pitch - Sponsored by AT&T (Room - Forum 14)
AT&T Fast Pitch Walk In Auditions
ATT-01
12:05pm
Monday - 08/17/15
  IoT Certification Course (Room - Forum 15)
IoT+M2M Introduction; Overview Terminology, and Concepts
IOTC-01
Marketing Chair
OneM2M
The first of three sessions will focus on the Promise, the Opportunity… and the Challenges in deploying a fully realized IoT. Is the market potential Billions? …Trillions? …and how do we get there from today’s initial deployments. Key industry terms will be defined and their usage described, including the distinction between, and codependence of IoT and M2M.
  IoT Security Summit (Room - Forum 17)
Protecting and Defending the Edge
IOTS-01
Device Integration Manager
Gemalto
Senior Partner
RMAC Technology Partners
Business Development Manager, Technology Partner Program
Axis Communications
The growth of IoT is occurring at an incredible rate and as we become increasingly reliant on intelligent, interconnected devices in our lives and businesses. This reliance raises alarms about security and privacy issues. How do we protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? This panel discusses the critical issues in developing, managing and securing the edge devices in an IoT Network.
1:00pm
Monday - 08/17/15
  IoT Certification Course (Room - Forum 15)
IoT at the Edge; Sensors & Technologies
IOTC-02
Marketing Chair
OneM2M
The 2nd session begins with a discussion on ‘Things’ e.g. Sensors, Wearables, Constrained Devices, and MEMS, and the role each plays in building and implementing a fully interconnected IoT. The need to tie together this myriad of edge technologies leads to an overview of the current landscape in Sensor Networking Topologies. This includes wireless topologies such as 3G/4G, 5G and Mesh, as well as the extensive list of networking capabilities coming from: Allseen, Apple, Google, OIC, ZigBee… and others.
  IoT Security Summit (Room - Forum 17)
The Core of Securing Networks
IOTS-02
Senior Partner
RMAC Technology Partners
Sr Product Manager
PubNub
VP, Business Development
Accelerated Concepts
Senior Analyst - Security & Managed Services
James Brehm & Associates
Everyone draws a cloud these days to signify the network, but is the network the Internet, a private cloud or a hybrid? How do companies connect the edge, gateways, core and cloud will minimizing or avoiding weak links? This panel addresses the issues of deploying networks, managing ID’s and protecting the network from hackers.
2:00pm
Monday - 08/17/15
  AT&T Workshop (Room - Forum 14)
Creating IoT Solutions
ATT-02
Sales Director
AT&T Internet of Things
Application Practice Manager, Advanced Mobile Application Practice
AT&T
You collected the data, now what? Rapidly gaining access to machine data and turning it into actionable business insight is no easy task. During this breakout session, AT&T will describe how AT&T M2X cloudbased data storage services accelerate your ability to access and manage timeseries device data. You will learn how you can leverage this data from within different application enablement platforms to quickly transform your IoT data into business value with connected applications.
  IoT Certification Course (Room - Forum 15)
Putting it Together; M2M Architectures and Services
IOTC-03
Marketing Chair
OneM2M
The IoT cannot be pervasive on a single device family, or on a single edge network type. This closing session will bring it all together, and explain how IPbased M2M communications capabilities such as CoAP, HTTP, and MQTT allow sets of systems to be aggregated, to interwork, and to federate. These tools are needed to scale massively, and to build interconnected applications and services; extending from multiroom… to multinational, and fulfilling the promise of the IoT; “Everything Connected”.
  IoT Security Summit (Room - Forum 17)
Security at the Top
IOTS-03
Principal Analyst
Machina Research
Distinguished Engineer
IBM
Senior Partner
RMAC Technology Partners
Application Level Security is sometimes viewed as the ultimate security location. As the Bring Your Own Device [BYOD] employee and customer use their smart phones, tablets and personal devices to access IoT business intelligence, the ability to use firewalls comes down to application specific ports and constant monitoring. How can applications lock themselves down and ensure that they are not a gateway to an Enterprise? Does using mobile Web apps add additional vulnerabilities?
3:00pm
Monday - 08/17/15
  (Room - Forum 12)
IoT Evolution Battle of the Platforms
X-01
Senior Manager M2M/IoT Product, Platforms & Strategy
Sprint
Senior Manager, M2M/IoT Business Development
T-Mobile USA
Internet of Things Lead Marketing Manager
AT&T
Director, Product Management
US Cellular
Partner Program - Internet of Things
Verizon Wireless
General Manager, M2M/IoT Global Partner Sales
Telefonica
3:15 Mera 3:30  Numerex 3:45 accelerated 4:00 Systech 4:30 anypresence4:45 Onstream
 5:00 Pubnub 5:15 Opengear 5:30 Kore
5:45pm
Monday - 08/17/15
  (Room - Forum 12)
Faster, More Flexible Development of IoT Solutions with the Intel® IoT Gateway
X-12
Software Architect
Intel
The Intel IoT Gateway product family has expanded to give developers the flexibility to create and deploy innovative, cost effective IoT solutions for diverse market segments. Join this session to hear about: Updates to the Intel IoT Gateway product; Available operating systems, including Ubuntu* Snappy Core and the Wind River* Intelligent Device Platform XT 3; New and flexible packaging options with a low cost entry point for more price sensitive applications; How to get up and running quickly with new experience kits and sensor integration.
6:15pm
Monday - 08/17/15
  
Battle of the Platforms Networking Reception - Open to All Attendees
X-02
Tuesday, August 18, 2015
8:00am
Tuesday - 08/18/15
  
Continental Breakfast
X-03
9:00am
Tuesday - 08/18/15
  Special General Session (Room - Forum 12)
Analyze This
GS-01
Founder and Chief Technology Evangelist
James Brehm & Associates
Partner
BH IoT Group
Principal Analyst
Machina Research
CEO, Director of Content
Crossfire Media
Sr. Principal Analyst, M2M & the Internet of Things
IHS Technology
Vice President, B2B
ABI Research
When the analysts talk, you need to listen! Now you’re moving beyond the Hype into the realities of implementation which means that IoT is not only everywhere, but its changing the way we work, live and travel. Gather with the analysts to not only see the big picture, but to understand where the rapid growth is happening and what opportunities will emerge in the next eighteen months.
10:00am
Tuesday - 08/18/15
  (Room - Forum 12)
Keynote Presentation by Eurotech - IoT Acceleration Secrets, from Pilot to Production
GS-02
CEO
Eurotech, Inc.
The Internet of Things is slowly maturing, with an increasing number of success stories and financial returns. To speed this adoption, learn the secrets for success when defining and transitioning from Proof of Concepts / Pilots to scalable Production ready systems. What hurdles are likely in the near future for early generation IOT solutions? What can we learn from them now to move even faster? This session explores the strategic system level design and business decisions associated with predictably getting to Production while acknowledging the rapid innovation and changes occurring in the industry.
10:45am
Tuesday - 08/18/15
  (Room - Forum 12)
Special Presentation by Spireon
GS-03
Chief Executive Officer
Spireon
11:15am
Tuesday - 08/18/15
  (Room - Forum 12)
Keynote Presentation by Joe Gibbs: A Winning Mindset
K-01
Joe Gibbs Racing, Inc.
Data is key, whether that means having the best information on the football field, the most accurate diagnostics for a race car, or launching a new IoT application. Coach Gibbs shares his personal experiences and looks forward to a datadriven future.
12:00pm
Tuesday - 08/18/15
  (Room - Forum 12)
Keynote Luncheon Featuring Sikorsky Aircraft - Aviation: The Leading Edge of Connected Transportation
X-04
Senior Program Manager, Intelligence Technology
Sikorsky Aircraft Corporation
The modern flybywire aircraft generates a massive amount of data. Hundreds of sensors gather everything from realtime health usage and monitoring to flight information and tracking, all within one of the harshest environments for vibrations, particulates and corrosion. To overcome these obstacles the industry is developing some of the most advanced algorithms, hardware and data connectivity available for products where performance is paramount to price. Come learn about the challenges and opportunities in aviation from a world leader in rotorcraft, Sikorsky Aircraft, and their advanced technology arm Sikorsky Innovations.
1:00pm
Tuesday - 08/18/15
  IoT Evolution Developer - Room Forum 17
Get Cloud Resources to the IoT Edge with Fog Computing
IOTD-01
Principal Strategist
Cisco Systems, Inc.
Embedded devices in the IoT are hampered by the compute, storage, and service limitations of living life on the edge. As IoT edge devices comprise broader sensor networks for industrial automation, transportation, and other safetycritical applications, their high uptime requirements are nonnegotiable and service latencies must be kept within realtime or near realtime parameters. However, the size, weight, power, and cost constraints of edge platforms also inhibit the ondevice resources available for executing such functions. In this session, Gandhi will introduce Fog Computing, a new paradigm for the IoT that extends compute, storage, and application resources from the cloud to the network edge. Beyond the interplay between Fog and Cloud, Gandhi will show how Fog services can be leveraged across a range of heterogeneous platforms—from enduser devices and access points to edge routers and switches—through software technology that facilitates the collection, storage, analysis, and fusion of data to drive success in your next IoT device deployment.
2:00pm
Tuesday - 08/18/15
  IoT Evolution Developer - Room Forum 17
Securing Embedded Devices in the Industrial IoT
IOTD-02
President & Co-Founder
Icon Labs
The Internet of Things is enabling connectivity in ways we didn’t even imagine five years ago. Soon connected Things will be everywhere, and many of them will be outside of traditional security perimeters. Companies are aware of the need to ensure privacy and protect data, but little attention has been paid to securing the device itself. Organizations have traditionally relied on perimeter security; but alone, that tactic is not enough and doesn't scale to meet the demands of IoT security. The perimeter can be compromised, and in many cases threats originate from inside the secure zone. More importantly, the Things in the IoT are often deployed outside of the traditional security perimeter and have no protection at all. Even though many corporate PCs have long been on “secure” networks, they still have firewalls and endpoint security inside. IoT connected machines and devices need the same protection. This session will cover some cyber threats for IoT devices, the approaches that can be taken to secure your device and comply with security standards, how this links with the enterprise security strategy, and how you can help create the Internet of Secure Things.
3:00pm
Tuesday - 08/18/15
  IoT Evolution Developer - Room Forum 17
The Evolution of Automotive Software with IoT
IOTD-03
Global Director, Business Development
QNX Software Systems
The Internet of Things IoT has the potential to harness vehicle information and influence every stage of the automotive lifecycle. Vehicle software is undergoing rapid evolvement to meet the demands of today’s consumer securely, including downloadable content, builtin apps, and mobile device support. The next generation of cars will require endtoend, connected solutions that integrate sensors, data processing, and overtheair updates to deploy fixes and new features. As the IoT continues to open up, so will new revenue streams – and challenges. Andrew Poliak will discuss how to provide a true endtoend automotive IoT solution and strategies for overcoming obstacles to implementing the IoT in our cars.
3:45pm
Tuesday - 08/18/15
  (Room - Forum 12)
Keynote Address by IBM - Transforming business: Capturing new value with Enterprise Internet of Things
K-02
CTO for Internet of Things
IBM Analytics Division
Organizations across all industries recognize the value opportunity embedded within the Internet of Things. However, many remain unclear about its potential within their own business or about how best to evolve existing physical and information infrastructures. Whether you're engineering new products or optimizing your industrial operations, it's time to reinvent value with the internet of things.
4:15pm
Tuesday - 08/18/15
  (Room - Forum 12)
Keynote Presentation by AT&T
K-03
Vice President of Industrial IoT Solutions
AT&T Business Solutions
5:00-7:00pm
Tuesday - 08/18/15
  
IoT Evolution Exhibit Hall Grand Opening Reception
X-05
5:10pm
Tuesday - 08/18/15
  
Connected Services & Solutions Demo Zone - Expo Hall Presentation Theatre
TH-01

TUESDAY, AUGUST 18:

Connected Services & Solutions Demo Zone

5:10pm

Fybr

5:25pm

Konekt

5:40pm

Cisco

6:00pm

Litmus Automation

6:15pm

SS7Ware

6:30pm

Covisint

5:15pm
Tuesday - 08/18/15
  AT&T Booth #401
AT&T Fast Pitch Finals
ATT-03
Wednesday, August 19, 2015
8:00am
Wednesday - 08/19/15
  
Continental Breakfast
X-06
8:30am
Wednesday - 08/19/15
  IoT Evolution Developer - Room Forum 17
How (and Why) to Make the IoT Trusted
IOTD-04
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
Complex dynamic operating systems are moving lower and lower in the device chain and with that moves comes a possibility that they get subverted or do the wrong thing due to a software bug. The threads of this happening on a PC or smartphone are frightening, but on IoT devices that have access to key data, this can endanger lives. If these IoT devices don't operate in a trustworthy fashion, a widespread attack could result in a decision that's made in the cloud because it is based on unsubstantiated data. The solution is to establish a strong hardware device identity, a policy enforcement point in hardware that is isolated from the OS along with attestation capabilities that allow a consumer of device data in the cloud to gauge the trust level of each harvested data point after it was collected. This session will highlight how a TPM can offer all these abilities when attached securely to the IoT device and bring measurable trust to the device and the data it produces.
9:30am
Wednesday - 08/19/15
  (Room - Forum 12)
Swimming with the Sharks: Finding Investors to Back Your Future
GS-04
President & CEO
AKnowledge Partners
Founder and Chief Technology Evangelist
James Brehm & Associates
Managing Director
MVP Capital
Managing Director, Senior Equity Analyst
Canaccord Genuity Research
Are you sitting on the next big idea in supply chain? This panel of finance and investment experts will help you understand exactly what it takes to get noticed by institutional investors in order to support your application from concept to reality.
10:20am
Wednesday - 08/19/15
  (Room - Forum 12)
AT&T Fast Pitch Award Announcement
X-11
10:30am
Wednesday - 08/19/15
  (Room - Forum 12)
Keynote Presentation by Oracle - Transforming Business: Edge to Enterprise
K-04
Vice President, Architecture, Internet of Things (IoT) Group
Oracle
The Internet of Things poses a huge opportunity to fundamentally change your business, but in order to do so you must adopt a new way of managing a variety of complex and fast data in order to help achieve business differentiation. It requires a robust and scalable infrastructure that is always on and can handle massive amounts of data, transforming it for immediate business value. These endtoend requirements include greater device flexibility, comprehensive security and device cloud analytics in order to achieve the promise of IoT. The industry must help organizations reduce complexity to get started. Join Atul Mahamuni from Oracle as he illustrates how reducing complexity and simplifying the approach to IoT can enable the modern business to achieve a shorter time to value.
10:55am
Wednesday - 08/19/15
  (Room - Forum 12)
Keynote Presentation by On-Ramp Wireless: Low Power, High Return: How LPWA is Positioned to Change the M2M Game
K-05
Independent
Lowpower wide area LPWA technologies have been flying under the radar, but as M2M communications and the Internet of Things continues to grow, and more and more devices are in play, LPWA is emerging as a real contender. The triplethreat combination that LWPA brings to the table— network value, wide and deep coverage, and system longevity in terms of network and battery life—is why Machina Research forecasted there will be more than over 3 billion LPWA connections by 2023. Join John Horn, CEO of OnRamp Wireless, as he discusses the potential of LPWA technologies and how they’re positioned to change the game for M2M.
11:15am-4:00pm
Wednesday - 08/19/15
  
IoT Evolution Exhibit Hall Open
X-07
12:00pm
Wednesday - 08/19/15
  
Case Studies Theatre - Expo Hall Presentation Theatre
TH-02

WEDNESDAY, AUGUST 19:

Case Studies Theatre

12:00pm

Haemonetics

12:25pm

Systech Corporation

12:40pm

phononic

12:55pm

Accelerated Concepts

1:10pm

DeveloperProgram.com

1:35pm

Stream

1:50pm

MultiTech

2:05pm

EPSON

2:20pm

Sensoplex

2:35pm

Hyginex

2:50pm

Xensr


12:30pm
Wednesday - 08/19/15
  
Lunch
X-08
1:30pm
Wednesday - 08/19/15
  IoT Evolution Developer - Room Forum 17
Enabling Security in the Automobile of Tomorrow
IOTD-05
Chief Security Officer
BlackBerry
Wireless connectivity in the car, aka V2X, presents compelling capabilities for nextgeneration automobiles. The possibilities include improved collision avoidance, autonomous operation, predictive maintenance and lower total cost of ownership, and improved driver and passenger experiences. Security researchers, however, have demonstrated that attack vectors across these vehicular networks pose a threat to the same safety and productivity functions they seek to foster. To meet this challenge, OEMs and their suppliers must embrace a higher level of rigor when it comes to threat modeling to accurately and efficiently determine security requirements and then apply a similar level of rigor for assuring the software and systems that manifest these requirements. This class will examine common threats and mitigations facing nextgeneration connected cars, with an emphasis on best practices and standards for achieving this required level of rigor.
2:30pm
Wednesday - 08/19/15
  IoT Evolution Developer - Room Forum 17
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-06
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this handson workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and viceversa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage.Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
3:30pm
Wednesday - 08/19/15
  IoT Evolution Developer - Room Forum 17
Hands-On Workshop: Connect Your IoT Device to the Cloud
IOTD-07
EVP/CTO
Micrium
From the IoT device to the cloud and back: In this handson workshop, attendees will set up an embedded system using a Qualcomm GT202 WiFi module. Once the WiFi onboarding process is completed, attendees will control the board using Micrium’s µC/Probe graphical user interface. Any action taken on the cloud will be visible locally and viceversa. This session describes the IP protocols dedicated to IoT because it helps shape the system capabilities. Attendees will use MQTT in conjunction with the 2lemetry broker. The activities in this class are structured around the IT services that differentiate products. The Cloud services that will be covered in the session include rules and actions, web visualization, and analytics, in addition to data storage.Note that the first 50 registered attendees will receive Renesas development kit, a Qualcomm WiFi module, and Micrium uC Probe, all for free
4:30pm
Wednesday - 08/19/15
  IoT Evolution Developer - Room Forum 17
Panel: The Biggest IoT Challenges Faced by Developers
IOTD-08
Technical Leader and Platform Architect
Cisco
Chief Security Officer
BlackBerry
EVP/CTO
Micrium
EVP/Brand Manager for Embedded/IoT
Open Systems Media
Senior Security Architect and Software Development Engineer
Microsoft/Trusted Computing Group
The challenges a design engineer faces when attempting to make secure and reliable connections to the IoT are plentiful. May of them have been well documented, but many have not. In this panel session, we'll uncover some of the issues that a designer may not be aware of, with potential solutions to those hurdles.
5:15pm
Wednesday - 08/19/15
  (Room - Forum 12)
The Interplay Between Cloud and Fog
GS-05
Senior Technical Leader
Cisco
From the getgo Fog Computing was defined as an extension of the Cloud from the core to the edge of the network. The flexibility of the payasyou go model and reduced CAPEX and OPEX due to economies of scale have determined the success of the Cloud. Rather than carving into the Cloud application space, Fog Computing is positioned to complement its applications that admit only very low latency, are widely geographically distribution, face bandwidth challenges, need support for rapid mobility, and for which semiautonomy is a must.For many use cases, though, the issue is not the choice between the exclusive use of either the Cloud or the Fog, but rather the right level of interplay between them. Some basic questions motivate this talk: what processing must be done by the Fog, and what in the Cloud?, what and when should be stored in either one or both?; more to the point, are there organizational principles that determine a wise division of labor between Cloud and Fog?
Thursday, August 20, 2015
8:00am
Thursday - 08/20/15
  
Continental Breakfast
X-09
9:00am
Thursday - 08/20/15
  IoT Evolution Developer - Room Forum 17
Secure Cloud Computing for Big Data and the IoT
IOTD-09
Chief Architect
Red Hat
The IoT means different things to different people, depending on the person's perspective. Are you designing an end device? Are you designing something that has to be mission critical? In this talk, Kirkland will discuss how the cloud should be configured for the IoT and how to maintain reliability and security, even in environments with thousands of connections. He will discuss the benefits and tradeoffs of a tiered, scalable approach.
10:00am
Thursday - 08/20/15
  IoT Evolution Developer - Room Forum 17
From Sensor Data to Embedded Processing and Security: a Holistic View at the Edge of IoT
IOTD-10
Director
Freescale
When accounting for industry projections that estimate nearly half a trillion Internet of Things IoT sensors by 2025, the term “edge node” is somewhat of an injustice. Embedded processing and sensor solutions are a keystone of endtoend IoT deployments, as they exist on the front lines of both data capture and analysis and IoT security. Meanwhile, industry is increasingly demanding new levels of price, performance, and power optimization from these systems, as well as eversmaller form factors that meet the requirements of deployment in the wild. Innovation is now required.In “From analyzing sensor data to embedded processing and security: A holistic consideration at the edge of the IoT,” Freescale’s Ian Chen provides a comprehensive perspective on IoT sensor platform design. From edge analytics and localized processing to sensor fusion and cybersecurity, this handson demonstration will illustrate how silicon vendors and industry organizations are collaborating across hardware, software, and connectivity to provide an integrated approach to development at the IoT edge.
11:00am-2:00pm
Thursday - 08/20/15
  
IoT Evolution Exhibit Hall Open
X-10
11:00am
Thursday - 08/20/15
  IoT Evolution Developer - Room Forum 17
Open Source Development for IoT Devices
IOTD-11
Chief Scientist
The PTR Group, Inc.
As the IoT picks up momentum, smaller devices such as the ARM CortexM series parts are starting to dominate the sensor market. And while there are several commercial development platforms for these parts, the larger maker community is where a lot of innovation will occur. In this session, we will present the options for opensource development tools that target the MMUless CortexM parts for operating systems such as ARM's mbed and more. We will discuss development tools ranging from development operating systems, to IDEs to compilers and debuggers, all available at little or no cost.
11:30am
Thursday - 08/20/15
  
IoT Startup Pavilion - Expo Hall Presentation Theatre
TH-03

THURSDAY, AUGUST 20:

IoT Startup Pavilion

11:30am

Medium One

11:50am

wot.io

12:10pm

Solair

12:30pm

SCADANexus