Monday, July 17, 2017
1:00 pm- 4:00 pm
The home is where the heart of the IoT is. For many consumers, the only place they know they touch the IoT, is at home, in the form of smart lighting, security systems and other technologies.
To earn greater adoption rates, IoT companies need to get to them where they live. In this workshop, we will introduce solutions for: Smart Energy, Voice Control, Mobile device Integration, Privacy, and more.
Building Success in the Evolving Smart Home
Mahesh Patel, US Cellular
Vishwapathi Rao Tadinada, NXP
The smart home has been threatened by well-meaning applications that were thwarted due to lack of intelligent communication between devices.
Join us for this workshop and hear about the technologies that need to interoperate for IoT companies to achieve widespread growth in the Smart Home market. Find out what key changes companies need to make in order to roll out successful IoT strategies.
Support it Right or Die: Why what We've Always Done won't Work Anymore
Lee Gruenfeld, Cholawsky & Gruenfeld
The best technology in the world doesn't make a bit of difference if customers can't understand it enough to reap the benefits or have difficulty getting it to work in the first place. Given that their attention spans aren't what they used to be, support takes on a critical role in making sure customer keep what they've bought and then keep buying.
Join us for this workshop and hear how is support changing and what can you do to make sure you stay ahead of the curve.
Connected Home: Fool's Paradise
Paul Lipman, BullGuard
More than 6.5 billion connected gadgets in homes worldwide are ultimately hackable in ways that, until recently we couldn't imagine. It's without a doubt that cyber-attacks are becoming both more brazen and more common. One of the more terrifying and interesting ways that hackers can perform an attack is through the backdoor of millions of connected devices from light bulbs to fridges and baby monitors. Using rapidly emerging IoT technology, hackers can take control of vast amounts of hardware to send out their malicious attacks.
Join us for this session get strategies for defense and participate in a live demonstration of how to secure connected devices.