Building an Edge Device with Open Source Hardware: From Data Collection to Deployment
Sai Yamanoor - IoT Applications Engineer • Praxair
With the arrival of powerful microcontrollers and software toolsets, it is possible to run a neural network on a microcontroller. This provides a lot of opportunities in applications like image processing, keyword detection etc.
Edge Computing enables recurring costs like cellular data charges, provide alternatives when there is poor connectivity or react immediately to a critical sensor input and avoid loss of productivity, identify anomalies (e.g.: leak detection) in data streams etc. In this talk, we will demonstrate the different hardware and software toolsets available to build an edge device and walk the audience through the different steps involved in building an edge device. We will also talk about the challenges involved in building and testing an edge device
Registration & Breakfast
Check back for more information on our keynote presentation.
From Sensors to Insights at the Edge: Applying AI to IoT Data
Applying the power of IoT and AI lets organizations gain valuable insights from a universe of physical assets, from vehicles to facilities and systems. Learn how to harness IoT data to deliver operational and predictive maintenance insights using AI at the Edge.
Take a fast-paced journey that follows IoT sensor data from generation, edge gateways and analytics, encryption, IBM Cloud, Watson IoT, Node-RED processing, cloud storage, Watson Studio, Apache Spark analysis in Jupyter notebooks, PixieDust visualization, machine learning algorithms and deployment of the models for edge prediction.
Sorry, Dave – I’m Unable to Turn on Your Toaster
Tobin Richardson - President and CEO • Zigbee Alliance
For the IoT movement, consumers validated and embraced voice control for managing ‘things’ around them. Manufacturers/influencers reached across competitive boundaries to work and innovate from common ground, common standards, and a common language. Now, devices will connect once installed and ‘just work.’ Innovations – such as Frustration Free Setup and AI – are fueling satisfaction and intrigue. It took decades, but simplicity and choice finally prevailed.
Yet consumers burned by bad experiences still believe having a smart home is “too complicated,” according to research by Ovum.
Zigbee Alliance CEO and President Tobin Richardson will pull back the curtains and share a glimpse into the inner workings of the next version of the smart home. Its orchestration is already underway by visionaries and innovators (Amazon, Comcast, IKEA, Signify, Somfy, etc. – more to be named soon) as they diligently work through industry channels to drive trust, value and advancements. The IoT isn’t an easy-to-build market – but through continued commitment to working together, we’re taking things ‘next-level’ in 2020 to usher us all into a wondrous intelligent future.
Networking Break & Dedicated Expo Time
Standards Essential Patents & the Internet of Things: Key Perspectives
Brian Scarpelli - Senior Global Policy Counsel • ACT | The App Association
Today, technical standards for interoperability and innovation represent key protocols (Ethernet, WiFi, LTE, etc.) that ensure compatibility and to promote competition. Moving forward these technical standards will underlie the development of an increasingly seamlessly internet-connected Internet of Things. As standards are developed, patented technologies are often contributed to the effort. “Standards essential patents” (SEPs) are patents covering technology implemented into a technical standard to the degree that an implementer of the technical standard must use the patent. Understanding SEP-related legal and policy issues is important to any organization that creates technology or provides products and services related to technical standard. Join this session to learn about, and engage on, SEP licensing negotiation tactics, perspectives on IP enforcement, emerging legal and policy developments across key venues, and the ultimate impact on IoT technology developers.
Introduction to the Data Distribution Service
Nina Tucker - Co-Founder and VP of Client Services • Twin Oaks Computing
This session is a technical presentation on DDS 101. The Data Distribution Service (DDS) from the Object Management Group (OMG) is a data connectivity framework becoming standardized in a wide range of industries and military systems. From autonomous vehicles and embedded medical devices to electrical grids and intelligence and weapon systems, DDS is found in a growing number of architecture standards and government contracts.
IoT Digital Transformation – Carrier Perspective
Wai C. Chan - IoT Product Management, Global Products and Solutions • Verizon
The number of connected IoT devices will increase from 27 billion in 2017 to around 125 billion in 2030 according to information services company IHS Markit. Communications service providers (CSP) are offering managed IoT connectivity products and services to enable businesses monitor, manage and control assets associated with business processes in different customer segments.
Improving customer’s digital experience and operation scalability in this high growth environment becomes a challenge for CSPs. This paper provides an overview of digital transformation to enable the CSPs to sustain competitiveness in the IoT marketplace while addressing diverse requirements from the customers and partners:
Supply Chain Management
5G IoT and Enterprise
Safi Khan - Regional Product Marketing Director • Telit
5G is designed to deliver the framework for the full integration of corporate IT and the IoT. The “how”’ becomes secondary; the enterprise by and large doesn’t care about the underpinning technology.
With a substantial number of IoT projects already in advanced stages around the world, deployments are set to grow significantly, but only if the enterprise can benefit from 5G IoT that is driving down costs and improving efficiencies. This presentation will demonstrate why and how service providers need to lead the way by creating innovative business cases, ensuring ease of integration, and create new revenue streams for their customers and for themselves.
A Realistic Look at the Future of IoT Connectivity
Sam Colley - CEO • Pod Group
There’s a lot of hype around the future of IoT connectivity, particularly about the potential of 5G’s low latency and high speeds to revolutionize the type of IoT applications that are developed. I want to take a clear look at the connectivity technology currently on offer and how it is likely to develop and offer a hype-free, realistic view of the future of IoT connectivity, focusing on 5G and eUICC.
I will discuss 5G, NB-IoT and Cat-M, the varying technical specifications of these connectivity standards, what their short and long term availability will be, what types of IoT applications each one is best suited to, and how they are realistically likely to develop over the next few years. I will also talk about eUICC, the impact that it will have on global deployments and the limitations of the technology today, such as the availability of profiles, compatible modules and the costs.
Networking Break & Dedicated Expo Time
Implementing secure and reliable OTA updates for IoT devices
Nick Lethaby - IoT Ecosystem Manager • Texas Instrument
OTA (Over-The-Air) updates are critical for IoT devices, enabling bugs or security flaws to be patched remotely. However, if an OTA update fails and results in a ‘bricked device’ or injects malware that causes security breaches for end users, reputational damage may be significant. In this paper, we examine the embedded software architecture required on an IoT device to implement a secure and reliable OTA update process. This discussion draws from an OTA update implementation based on an ARM-Cortex M-based wireless microcontroller connecting to a commercial cloud-based IoT service.
We will begin with a summary of the security and reliability risks associated with performing an OTA update, followed by a brief summary of embedded hardware requirements to implement secure and reliable OTA updates. We will then discuss cloud software-side implementation requirements, including how to prepare the download image such as image signing and metadata that enhance security and reliability. Next we consider the design of the OTA agent, which manages the OTA update process on the IoT device, and how it can minimize intrusion to the device’s normal operating modes. We then show how the embedded device authenticates the OTA image to verify it really came from the IoT device vendor and was not corrupted during transmission. We conclude with a detailed walk through of a fail-safe booting mechanism that runs boot-time tests to verify the new image is working correctly and, if the test fails or hangs, reverts to the previous working image to avoid ‘bricked devices’.
Why Successful Industrial IoT Needs Automated AI/ML?
Viji Krishnamurthy, Sr. Director of Product Management - Oracle
Margie Steele, Master Principal Solution Engineer - Oracle
Businesses today collect a variety of data on products, processes, customers and employees. In the connected world, the volume of data collected in multiple often silo-ed enterprise systems is extremely large and of diverse variety. While such data holds wealth of information for improving business, most go unused as it typically requires significant engagement from domain expert, data scientist and application developer to reap those benefits. In this talk, we discuss how automated AI/ML embedded IoT applications delivers the benefits of connected business. Specifically, we showcase automation from three dimensions namely, automation of data science process, automation of model operations and automation of business knowledge ingestion. We will discuss several customer use cases where automated AI/ML embedded Oracle IoT applications influence tactical and strategic business decisions.
Hacker-Powered Data: The Most Common IOT Security Weaknesses and How to Avoid Them
Thaddeus Bender - Technical Program Manager • HackerOne
Today, device manufacturers, technology companies, and even governments are embracing collaboration with ethical hackers to find vulnerabilities in production environments before cyber criminals have a chance to exploit the same bugs for nefarious purposes. Using six years of data from 1,300+ bug bounty programs and real-world examples from over 100,000 valid vulnerabilities found, this talk offers new analysis of what hackers actually exploit in IOT environments. Attendees will come away armed with the tools to defend against the most common real-world security weaknesses present in production today and have discussions with security and engineering teams at their organizations. Attendees to this session will:
Discover firsthand examples of vulnerabilities attendees may not otherwise observe, including obscure bugs and their potential impact.
Gain insights that will help advance your defenses against the most common vulnerabilities.
Learn practical tips for avoiding the most common vulnerabilities and how to increase your chances of discovering them early on.
Three Ways Systems Developers & Manufacturers Can Protect IoT Connected Devices and Machines
Alan Grau - VP of IoT, Embedded Solutions • Sectigo
IoT and connected device security needs to begin with the device’s initial design process, including the device’s various components. Suppliers of devices with complex components must also apply security standards to the components provided to the supply chain. To harden & secure their connected industrial systems and products, manufacturers must understand and implement three proven security processes:
Device Identity – Digital certificate provisioning to enable a cryptographically strong identity that ensures device authenticity and to protect against device cloning and counterfeiting.
Device Integrity – Secure boot, secure updates, secure key storage, embedded firewalls, and intrusion detection for embedded devices to ensure the device is protected from cyberattacks.
Data Protection – Secure key storage and data encryption solutions for resource-limited devices to ensure data is secure and protected from attackers.