Building an Edge Device with Open Source Hardware: From Data Collection to Deployment
Sai Yamanoor - IoT Applications Engineer • Praxair
With the arrival of powerful microcontrollers and software toolsets, it is possible to run a neural network on a microcontroller. This provides a lot of opportunities in applications like image processing, keyword detection etc.
Edge Computing enables recurring costs like cellular data charges, provide alternatives when there is poor connectivity or react immediately to a critical sensor input and avoid loss of productivity, identify anomalies (e.g.: leak detection) in data streams etc. In this talk, we will demonstrate the different hardware and software toolsets available to build an edge device and walk the audience through the different steps involved in building an edge device. We will also talk about the challenges involved in building and testing an edge device
Day 2 AM Sessions
9:00 am CST
Transforming the Mobile Enterprise with 5G
RJ Mahadev, Head of Remote and Mobile Assets • Cisco
The average 5G connection is expected to generate about three times more traffic than the average 4G connection*. Consequently, 5G and other technologies such as Wi-Fi 6 will noticeably alter the mobile enterprise for many users. This will bring new capabilities to fleets, such as vehicle-to-everything and ultra reliable low-latency communication.
Managing Industrial Ethernet and Wi-Fi will stretch IT departments, as they will need to explore the security, integration and complexity challenges to accelerate their mobile capabilities. Session takeaways include:
A better understanding of which access technologies in the network will continue their irreplaceable roles
A clearer sense of whether to co-manage with the service provider (SP) or self-manage 5G use for your mobility requirements
Best practice for the combined efforts of Operational Technology and Information Technology in fleet management
IoT Digital Transformation – Carrier Perspective
Wai C. Chan - IoT Product Management, Global Products and Solutions • Verizon
The number of connected IoT devices will increase from 27 billion in 2017 to around 125 billion in 2030 according to information services company IHS Markit. Communications service providers (CSP) are offering managed IoT connectivity products and services to enable businesses monitor, manage and control assets associated with business processes in different customer segments.
Improving customer’s digital experience and operation scalability in this high growth environment becomes a challenge for CSPs. This paper provides an overview of digital transformation to enable the CSPs to sustain competitiveness in the IoT marketplace while addressing diverse requirements from the customers and partners:
Supply Chain Management
5G IoT and Enterprise
Safi Khan - Regional Product Marketing Director • Telit
5G is designed to deliver the framework for the full integration of corporate IT and the IoT. The “how”’ becomes secondary; the enterprise by and large doesn’t care about the underpinning technology.
With a substantial number of IoT projects already in advanced stages around the world, deployments are set to grow significantly, but only if the enterprise can benefit from 5G IoT that is driving down costs and improving efficiencies. This presentation will demonstrate why and how service providers need to lead the way by creating innovative business cases, ensuring ease of integration, and create new revenue streams for their customers and for themselves.
11:00 am CST
A Realistic Look at the Future of IoT Connectivity
Sam Colley - CEO • Pod Group
There’s a lot of hype around the future of IoT connectivity, particularly about the potential of 5G’s low latency and high speeds to revolutionize the type of IoT applications that are developed. I want to take a clear look at the connectivity technology currently on offer and how it is likely to develop and offer a hype-free, realistic view of the future of IoT connectivity, focusing on 5G and eUICC.
I will discuss 5G, NB-IoT and Cat-M, the varying technical specifications of these connectivity standards, what their short and long term availability will be, what types of IoT applications each one is best suited to, and how they are realistically likely to develop over the next few years. I will also talk about eUICC, the impact that it will have on global deployments and the limitations of the technology today, such as the availability of profiles, compatible modules and the costs.
11:45 am CST
Day 2 PM Sessions
1:00 pm CST
Why Successful Industrial IoT Needs Automated AI/ML?
Viji Krishnamurthy, Sr. Director of Product Management - Oracle
Margie Steele, Master Principal Solution Engineer - Oracle
Businesses today collect a variety of data on products, processes, customers and employees. In the connected world, the volume of data collected in multiple often silo-ed enterprise systems is extremely large and of diverse variety. While such data holds wealth of information for improving business, most go unused as it typically requires significant engagement from domain expert, data scientist and application developer to reap those benefits. In this talk, we discuss how automated AI/ML embedded IoT applications delivers the benefits of connected business. Specifically, we showcase automation from three dimensions namely, automation of data science process, automation of model operations and automation of business knowledge ingestion. We will discuss several customer use cases where automated AI/ML embedded Oracle IoT applications influence tactical and strategic business decisions.
The IIoT challenge: Building a System Today for 2040 and Beyond.
Jim Kokal - Presodent & CEO • Wavetrix
Industrial Internet of Things (IIoT) offers different challenges than consumer IoT applications. Beyond frequently operating in harsher environmental conditions, the lifetimes of industrial products are much longer than typical consumer products.
Creating a product with a long life starts with examining where it is going to be used, who/what is going to interact with it, the maintenance cycle, and the expectations of lifetime. As an example, consider configuration of the device. One of the most popular options today is using an app on a smartphone to configure the product. Smart phones available in ten or twenty years will only be able to run the configuration app if it has been maintained for the entire time. That implies a hefty app maintenance cost. There may be other options that have a lower life-cycle cost.
Configuration is only one example, part obsolescence and connectivity issues with cellular, Wi-Fi, USB, etc. also need to be considered. Addressing these issues will affect the development, device, connectivity and support costs in both getting the service to market and maintaining it through its operational life. Creating a product to last an industrial lifetime requires forethought, ignoring these issues can radically change the business model making the venture a money-loser rather than a money-winner.
2:15 pm CST
Hacker-Powered Data: The Most Common IOT Security Weaknesses and How to Avoid Them
John Baker, Sales Engineering Manager • HackerOne
Today, device manufacturers, technology companies, and even governments are embracing collaboration with ethical hackers to find vulnerabilities in production environments before cyber criminals have a chance to exploit the same bugs for nefarious purposes. Using six years of data from 1,300+ bug bounty programs and real-world examples from over 100,000 valid vulnerabilities found, this talk offers new analysis of what hackers actually exploit in IOT environments. Attendees will come away armed with the tools to defend against the most common real-world security weaknesses present in production today and have discussions with security and engineering teams at their organizations. Attendees to this session will:
Discover firsthand examples of vulnerabilities attendees may not otherwise observe, including obscure bugs and their potential impact.
Gain insights that will help advance your defenses against the most common vulnerabilities.
Learn practical tips for avoiding the most common vulnerabilities and how to increase your chances of discovering them early on.
2:45 pm CST
Three Ways Systems Developers & Manufacturers Can Protect IoT Connected Devices and Machines
Alan Grau - VP of IoT, Embedded Solutions • Sectigo
IoT and connected device security needs to begin with the device’s initial design process, including the device’s various components. Suppliers of devices with complex components must also apply security standards to the components provided to the supply chain. To harden & secure their connected industrial systems and products, manufacturers must understand and implement three proven security processes:
Device Identity – Digital certificate provisioning to enable a cryptographically strong identity that ensures device authenticity and to protect against device cloning and counterfeiting.
Device Integrity – Secure boot, secure updates, secure key storage, embedded firewalls, and intrusion detection for embedded devices to ensure the device is protected from cyberattacks.
Data Protection – Secure key storage and data encryption solutions for resource-limited devices to ensure data is secure and protected from attackers.
3:30 pm CST