• Black Facebook Icon
  • Black Twitter Icon

10:45 am

Building an Edge Device with Open Source Hardware: From Data Collection to Deployment

Sai Yamanoor - IoT Applications Engineer • Praxair

With the arrival of powerful microcontrollers and software toolsets, it is possible to run a neural network on a microcontroller. This provides a lot of opportunities in applications like image processing, keyword detection etc.

Edge Computing enables recurring costs like cellular data charges, provide alternatives when there is poor connectivity or react immediately to a critical sensor input and avoid loss of productivity, identify anomalies (e.g.: leak detection) in data streams etc. In this talk, we will demonstrate the different hardware and software toolsets available to build an edge device and walk the audience through the different steps involved in building an edge device. We will also talk about the challenges involved in building and testing an edge device

Day Two

9/17

Day 2 AM Sessions

8:45 am CDT

Transforming the Mobile Enterprise with 5G

RJ Mahadev, Head of Remote and Mobile Assets • Cisco

Philippe Daroux, Industrial Network Design & Consulting Manager • Chervon

Shamik Basu, Internet of Things and Digital growth leader • Verizon

 

The average 5G connection is expected to generate about three times more traffic than the average 4G connection*. Consequently, 5G and other technologies such as Wi-Fi 6 will noticeably alter the mobile enterprise for many users. This will bring new capabilities to enterprises, such as the blurring of the WAN & LAN and use of new wireless options such as private LTE for operations networks.  Managing these Industrial Ethernet and Wi-Fi platforms will stretch IT departments, as they will need to explore the security, SLAs and complexity challenges to accelerate their wireless capabilities. Session takeaways include:

 

  • A better understanding of which access technologies in the network will continue their irreplaceable roles

  • A clearer sense of how you balance public wireless with private wireless use and the accompanying SLA requirements

  • Are wireless technologies ready to support industrial control requirements

9:45 am CDT

IoT Digital Transformation – Carrier Perspective

Wai C. Chan - IoT Product Management, Global Products and Solutions • Verizon
The number of connected IoT devices will increase from 27 billion in 2017 to around 125 billion in 2030 according to information services company IHS Markit. Communications service providers (CSP) are offering managed IoT connectivity products and services to enable businesses monitor, manage and control assets associated with business processes in different customer segments.

 

Improving customer’s digital experience and operation scalability in this high growth environment becomes a challenge for CSPs.  This paper provides an overview of digital transformation to enable the CSPs to sustain competitiveness in the IoT marketplace while addressing diverse requirements from the customers and partners:

  • Partner Management

  • Device Certification

  • Customer Onboarding

  • Supply Chain Management

  • Customer Care

10:30 am CDT

5G IoT and Enterprise

Safi Khan - Regional Product Marketing Director • Telit

5G is designed to deliver the framework for the full integration of corporate IT and the IoT. The “how”’ becomes secondary; the enterprise by and large doesn’t care about the underpinning technology. 

With a substantial number of IoT projects already in advanced stages around the world, deployments are set to grow significantly, but only if the enterprise can benefit from 5G IoT that is driving down costs and improving efficiencies. This presentation will demonstrate why and how service providers need to lead the way by creating innovative business cases, ensuring ease of integration, and create new revenue streams for their customers and for themselves.  

11:00 am CDT

A Realistic Look at the Future of IoT Connectivity

Sam Colley - CEO • Pod Group

There’s a lot of hype around the future of IoT connectivity, particularly about the potential of 5G’s low latency and high speeds to revolutionize the type of IoT applications that are developed. I want to take a clear look at the connectivity technology currently on offer and how it is likely to develop and offer a hype-free, realistic view of the future of IoT connectivity, focusing on 5G and eUICC.

I will discuss 5G, NB-IoT and Cat-M, the varying technical specifications of these connectivity standards, what their short and long term availability will be, what types of IoT applications each one is best suited to, and how they are realistically likely to develop over the next few years. I will also talk about eUICC, the impact that it will have on global deployments and the limitations of the technology today, such as the availability of profiles, compatible modules and the costs.  

11:30 am CDT

Successful IoT Transitions From 2G/3G to LTE, LTE-M, NB-IoT, and Beyond

Syed Zaeem Hosain, Chief Technical Officer - Aeris Communications

This session will cover the migration of IoT applications from using 2G/3G cellular connectivity to 4G and 5G – including LTE-M and NB-IoT. As carriers sunset the older technologies, IoT applications requiring cellular data connectivity must begin using the newer next-gen services. The presentation will discuss the real-world learnings that our customers have experienced in making this transition successfully.

 

In particular, we will cover the specifics of LTE-M, and NB-IoT, and why these are excellent connectivity transports that easily match, and exceed, what 2G can provide. This includes the need for:

 

  • Understanding the manufacturing and data timing requirements for large-scale deployments.

  • How to effectively use newer SIM products – eUICC and iUICC – for simpler installations.

  • The low-power capabilities that enable battery-powered IoT devices in a variety of markets and applications.

 

We will conclude the presentation by briefly discussing 5G and how LTE-M and NB-IoT technologies fit into the Massive Machine Communications specification of 5G.

12:00 pm CDT

Industry 4.0 Acceleration: How 5G is Driving Digital Transformation Across Industries

Mike Calabrese, Senior Vice President, Americas - Nokia Enterprise

 

Industrial digitalization requires predictable performance, and that is why private wireless networks (4.9G) supports 85% of today’s industrial applications. Industrial first movers have already made early investments in 4.9G private wireless networks, industries such as transportation, energy, manufacturing, logistics, as well as governments and cities. The industrial world is now in a pivotal moment as heavy-asset industries and enterprises accelerate their digitalization and need to become more resilient and agile across their global operations. These require more sophisticated use cases such as automotive manufacturing, where cloud, robotics, and autonomous machine operations require 5G capabilities – fast speed, ultra-low latency, and multiple simultaneous connections.

 

Key Takeaways that the Audience will Learn from the Session:

  • Mission Critical needs of Enterprises and Heavy-asset Industries

  • The Power of Private Wireless Networks: how 4.9G is creating value Today

  • From Now to Next: 5G as the critical catalyst for Industry 4.0

  • Use-cases across industries

1:00 pm CDT

Why Successful Industrial IoT Needs Automated AI/ML?

Viji Krishnamurthy, Sr. Director of Product Management - Oracle

Margie Steele, Master Principal Solution Engineer - Oracle

Businesses today collect a variety of data on products, processes, customers and employees. In the connected world, the volume of data collected in multiple often silo-ed enterprise systems is extremely large and of diverse variety. While such data holds wealth of information for improving business, most go unused as it typically requires significant engagement from domain expert, data scientist and application developer to reap those benefits.  In this talk, we discuss how automated AI/ML embedded IoT applications delivers the benefits of connected business. Specifically, we showcase automation from three dimensions namely, automation of data science process, automation of model operations and automation of business knowledge ingestion. We will discuss several customer use cases where automated AI/ML embedded Oracle IoT applications influence tactical and strategic business decisions.

1:45 pm CDT

The IIoT challenge: Building a System Today for 2040 and Beyond.

Jim Kokal - Presodent & CEO • Wavetrix

Industrial Internet of Things (IIoT) offers different challenges than consumer IoT applications. Beyond frequently operating in harsher environmental conditions, the lifetimes of industrial products are much longer than typical consumer products.

 

Creating a product with a long life starts with examining where it is going to be used, who/what is going to interact with it, the maintenance cycle, and the expectations of lifetime. As an example, consider configuration of the device. One of the most popular options today is using an app on a smartphone to configure the product. Smart phones available in ten or twenty years will only be able to run the configuration app if it has been maintained for the entire time. That implies a hefty app maintenance cost. There may be other options that have a lower life-cycle cost.

 

Configuration is only one example, part obsolescence and connectivity issues with cellular, Wi-Fi, USB, etc. also need to be considered. Addressing these issues will affect the development, device, connectivity and support costs in both getting the service to market and maintaining it through its operational life. Creating a product to last an industrial lifetime requires forethought, ignoring these issues can radically change the business model making the venture a money-loser rather than a money-winner.

2:15 pm CDT

Hacker-Powered Data: The Most Common IOT Security Weaknesses and How to Avoid Them

Will Kapcio, Security Solutions Engineer • HackerOne

Today, device manufacturers, technology companies, and even governments are embracing collaboration with ethical hackers to find vulnerabilities in production environments before cyber criminals have a chance to exploit the same bugs for nefarious purposes. Using six years of data from 1,300+ bug bounty programs and real-world examples from over 100,000 valid vulnerabilities found, this talk offers new analysis of what hackers actually exploit in IOT environments. Attendees will come away armed with the tools to defend against the most common real-world security weaknesses present in production today and have discussions with security and engineering teams at their organizations. Attendees to this session will:

  • Discover firsthand examples of vulnerabilities attendees may not otherwise observe, including obscure bugs and their potential impact.

  • Gain insights that will help advance your defenses against the most common vulnerabilities.

  • Learn practical tips for avoiding the most common vulnerabilities and how to increase your chances of discovering them early on.

2:45 pm CDT

Three Ways Systems Developers & Manufacturers Can Protect IoT Connected Devices and Machines

Alan Grau - VP of IoT, Embedded Solutions • Sectigo

IoT and connected device security needs to begin with the device’s initial design process, including the device’s various components. Suppliers of devices with complex components must also apply security standards to the components provided to the supply chain. To harden & secure their connected industrial systems and products, manufacturers must understand and implement three proven security processes: 

  • Device Identity – Digital certificate provisioning to enable a cryptographically strong identity that ensures device authenticity and to protect against device cloning and counterfeiting.

  • Device Integrity – Secure boot, secure updates, secure key storage, embedded firewalls, and intrusion detection for embedded devices to ensure the device is protected from cyberattacks.

  • Data Protection – Secure key storage and data encryption solutions for resource-limited devices to ensure data is secure and protected from attackers.

3:30 pm CDT

Conference Conclusion

2020 IoT Innovation North America Conference Agenda

Sign up for updates

© 2019 TWST Events

Social Media