IoT Evolution Health
Remote Patient Monitoring
IoT Evolution World and IoT Evolution Health
The Healthcare industry on the edge of an emergency fueled by an aging population and rising costs developed countries, while access to healthcare remains a challenge in developing countries. Enter a solution: low power wireless technology. Imagine wearable applications with no batteries harvesting energy from vibration, motion, temperature and sunlight.
Industrial IoT Conference
Trustworthiness is a paradigm put forth by NIST (National Institute of Standards and Technology) and IIC (Industrial Internet Consortium) to address the relationship of key system characteristics of IIoT (Industrial Internet of Things) component and systems. The IIC defines trustworthiness as the degree of confidence one has that a system performs as expected, characterized by the five key elements of safety, security, reliability, resilience and privacy in the face of environmental disruptions, human errors, system faults and attacks. Trustworthiness is a trait used for years to define the characteristics of both IT (Information Technology) and OT (Operation Technology) systems. In IT, trustworthiness mainly addresses security, reliability, and privacy. On the other hand, trustworthiness in OT mainly addresses safety, reliability and resilience. Addressing the missing key system characteristics in both IT and OT systems and focusing on the relationship of the five key characteristics of the IIoT, trustworthiness paradigm will solve many IT/OT convergence problems, especially conflicts between safety, security, and privacy.
IoT Security 4.0 Conference
Security at the Edge of IoT
The exponential growth of connected devices operating at the edge of the network is creating a wide range of security concerns that require a new approach. As devices proliferate, it's getting harder to manage security credentials and software, monitor the security status, and provide cost-effective protection through traditional security model that rely on host-based protections and cloud security services. Fog computing—which distributes resources and services of computing, data storage, and smart networking close to end users—can provide a range of new security services at or nearer the endpoints to help address some of these challenges. This panel will discuss how fog computing can meet the stringent latency requirements for security-related processing in mission-critical systems such as industrial control systems and connected vehicles and how to overcome bandwidth constraints for cloud-based security services.
Asset Management: Utilizing Solutions
Excelerated Technology Consulting
IoT Enterprise Operations
Smart Phones, Smart Citizens and the Social Good
Social networks, like Facebook, Wayz and Yelp are defacto word of mouth engines that people use to guide and avoid issues. How can a city build solutions that take advantage of citizen connectivity to alert, alarm and appreciate the concerns and communications needed in a city? Is “there an App for that” or do we need to augment apps with other things?
The Smart City Event
Clean Water and Other Utilities
City of Kansas City, Missouri
SPEC Sensors, LLC
Smart public infrastructure includes the ability to deliver essential services like clean water, dependable power, safe gas, and efficient public lighting. Smarter management of them is the foundation for smart cities. What sensor strategies and frameworks should be put in place for cities to support their citizens and avoid the missteps recently in the news?