Resolving the Technical and Business Challenges of Getting Connected to the Internet of Things
June 5-6, 2018 - SANTA CLARA, CA - Santa Clara Convention Center

Agenda - Presentation Abstracts

May 25th
Registration/badge pick-up: 8:00 am - 6:00 pm
Conference Sessions: 8:45 am - 5:00 pm
Exhibits, Mezzanine area: 9 am - 6:30 pm
Exhibits, Santa Clara Ballroom: 12:15 pm - 6:30 pm
Networking Reception: 5:00pm - 6:30 pm

May 26th
Registration/badge pick-up: 8:00 am - 4:00 pm
Conference Sessions: 8:30 am - 5:00 pm
Exhibits, Mezzanine area: 9 am - 5:00 pm
Exhibits, Santa Clara Ballroom: 10:00 am - 2:30 pm


Keynotes and Headliners
AI and Deep Learning in the Enterprise

From better fraud detection, to chat bots, to recommendation engines, AI methods like deep learning are making their way into the enterprise. Already popular in everyday mobile services that we use like Google Voice, and Apple Siri, these new methods dramatically improve accuracy for many other use cases. The speaker will present use cases of how deep learning based AI methods can be used to garner insights from data now available to enterprises and discuss some of the challenges facing companies as they take advantage of these new methods. 

Perception, Deep Learning and Autonomous Driving

The recent surge in the quality of results achieved by deep learning has led to a number of state of the art advances in perception problems applicable to autonomous driving. These include object detection and tracking, semantic segmentation, and others. However, what is sometimes overlooked are the computational, memory, and power requirements of the many different neural net architectures. In this talk, we touch briefly on several perception problems in autonomous driving and then outline their resources needs.

Shifting the IoT Mindset from Security to Trust

The Internet of Things has opened up new vectors of attack on industrial control systems, connected vehicles, smart buildings and cities. Developers building security into applications must consider scenarios where hackers are able to penetrate physical security and layered network defenses. In order to address these challenges, we must consider moving from a security mindset to a trust mindset. Endpoints, gateways and cloud servers themselves must be trusted and must be able to communicate securely with strong controls for data confidentiality and integrity. Securing IoT devices from the inside out requires moving from implementing security that is convenient to what is critical to ensuring safety and reliability.

Zero Touch Device Onboarding for IoT

Today it takes an average of 20 minutes per device to onboard to a control platform where data is being streamed to operational systems. Manual keying of the device identity, network access, data privacy, and poor ROI are pervasive problems to solve. Obviously this is the elephant in the room that will prevent the industry from achieving 50B connected devices by 2020. Intel talks about a new revolutionary approach that will enable devices to power on, phone home, & register with the owners IoT control platform in under a minute all automated, with privacy protected and a secure device baseline established.


IoT Dev Strategies
Bluetooth and Beyond

Without Bluetooth and Bluetooth Low Energy, the idea of a future where people experience seamless IoT engagement falls apart. But along with Bluetooth, connectivity technologies such as NFC and WiFi will also be essential. Arun Rajasekaran of Plantronics will explore current Bluetooth trends, challenges, and opportunities associated with voice, mobility, security, and new standards activities. He will share thoughts and solicit audience discussion about the possibilities, opportunities, and challenges associated with developing a master radio technology. What problems could be solved and what new business models triggered if the best aspects of each of today's open connectivity technologies, including Bluetooth and BLE, were brought together to enable an all new connectivity ecosystem?

Build Moving Experiences

Uber's mission is to bring transportation as reliable as running water to everyone, everywhere. Our open, public API ( is a key part of our strategy to make Uber easier to use wherever you might need it in every app, device, and computing environment in today's busy world. In this talk, Alexander Graebe (@agraebe), Developer Relations Lead will outline how Uber's APIs empower developers to connect bits and atoms by providing transportation through IoT services and reach customers while they're on the go.

How to Save the Smart Home from Cyber Invasion

The smart home is the new front in the war against IoT vulnerabilities. In this presentation, prpl Foundation president, Art Swift, will take a look at how security is being overlooked in the smart home – by manufacturers and users – and what it will take to turn things around. Using new global data he’ll examine the extent of wireless embedded computing in our homes. And he’ll uncover exactly how widespread bad security practices are – such as failing to update home routers. The research will also shine a spotlight on who consumers think should be responsible for securing the connected home. Attendees will take away a list of best practice tips which could help secure the smart home, including: regular firmware updates; password protection; and due diligence on vendors

Makeup of an Ideal Secured IoT Device

The Internet of Things is bringing exciting new benefits to businesses and consumers across many different industries. It is also bringing a whole host of equally exciting, yet certainly challenging problems to solve - including security. If you are responsible for developing an IoT solution, you know it needs to be secure, but what does that mean and how do you go about achieving that security? In this session we will look at some of the key ingredients involved in securing your IoT solution from both the hardware and the software perspectives.

Why are 70% of IoT Projects Stuck in PoC Purgatory?

Analyst research has found that IoT adoption has slowed and the greatest quagmire for projects is at the proof of concept stage. Why? Although reasons vary, across the board, there are common issues such as application integration, robust security, connectivity and management that stall projects. These factors are only exacerbated as projects move out of the lab and into production at scale. What seems troubling at a few units becomes insurmountable when looking at 100s of 1000s to millions of edge devices. We'll discuss approaches to planning and implementing projects that become connected products, many getting to market faster and at less cost than budgeted.


Deus ex Machina
Extracting Intelligence from IoT Data using Deep Neural Networks

With the evolution of technologies centered on IoT and connected sensors, Artificial Intelligence now has the power to reach every corner of the world. Most of the data generated in the IoT ecosystem is sequential in nature, so we need to use a learning model that can specifically take advantage of its characteristics. Sequence Learning is a paradigm within Artificial Intelligence that deals with extracting meaningful insights from sequences. It enables computers to think and learn on their own based on sequential measurements obtained from sensors. In order to achieve this, we use deep neural networks to extract wisdom from IoT data. It can be used to solve some of the most challenging problems like water leakage or energy wastage that's impacting billions of people around the world.

Powering a Bold New IoT Conversation

Life is conversational. As a logical evolution of technology, things are becoming part of that conversation. Early examples of this is consumer-facing virtual assistants from Amazon or Google. But what goes on behind the curtain is of greater relevance to those building the IoT. Developing toward natural interaction is key. Ever-more precise and relevant data collection, secure data capture from many protocols, machine learning and pattern matching, and tiny edge device AI engines will enable increasingly natural interactions with technology. As IoT devices grow ubiquitous in daily life and things increasingly capture greater context, the conversation between people, processes and things will become more natural and productive, powering IoT applications we can't even imagine at present.

Semiconductors Rule! -- From Devices to Networks to Data Centers

No matter if it's IoT, Automotive, AR/VR, Intelligent Clients, Industry 4.0, 4G/5G, Servers/Clouds – the smarts that keeps them all kicking are the multitude of SoCs forged by semiconductor technologies. The initial part of the presentation provides an overview of key industries, market shifts, and forecasted value. Then we'll explore how the technologies:
• Engage the right Processing for the right applications:
o Ultra Low Power and Leakage, Performance-on-Demand for cost effective IoT device nodes
o Deliver Hyperscale performance for higher end Mobile, Networks and Data Center applications
• Enhance with additional capabilities – Embedded Memory, Connectivity, Security
• Evolve the Supply Chain
• Empower the future roadmap for newer markets

Taming the Urban Jungle: A Story of Practical IoT Development

What does it actually take to build a commercial-grade IoT solution? This session will focus on the evolution of a single project from dream, to prototype, and into commercial production; as built by a complete IoT novice. As we work through the entire process, I will share with you the components, documentation, code samples and techniques, and various pitfalls all the way from dream to commercialization plans. If you are just starting out your own IoT project you will learn about the typical mistakes and challenges of a consumer-driven IoT solution, and some actionable ways to overcome them. If you are already established in the IoT market, this session will share with you a real life story of what your customer might be experiencing the first time they interact with your IoT solution.

You Say You Want AI Revolution?

Despite recent advancements in AI, hardware and software solutions are still in their infancy. Current solutions use brute force methods of forcing AI software frameworks to run on standard computing architectures. As AI advances, it will break existing computing models and chart a new course for technology for the next 50 years. We will discuss the driving forces in this new model and what it means to the future of technology and the industry.


IoT Connectivity
A Standards-Based Approach to Long-Range Wireless Connectivity for Sensor Nodes

The Sub-1 GHz band enables long-range communication but has lacked a standard networking solution, limiting its growth in the IoT market because developers needed expertise in low-level RF communications. IEEE has now extended support for low power wireless networking to the Sub-1 GHz band, in the �g� amendment of the IEEE 802.15.4 specification. We will summarize key attributes of the Sub-1 GHz spectrum, including longer range and penetration, data rates, and power consumption. We will next describe the implementation of a protocol stack based on this standard including the MAC layer and network management protocols. We will conclude by addressing security and message integrity followed by an overview of a Linux-based stack that bridges the packets to the internet.

All BlueTooth-Enabled Devices are not Created Equal

All vendors spec their devices’ BLE transmit and receive power in datasheets, but these numbers cannot be translated into energy values. Furthermore, BLE uses a variety of operational modes where the power changes over time. Additionally, since the exact runtime details for transmit and receive are not specified in a datasheet, it’s nearly impossible to compare the energy of one microcontroller and/or module to another. The device comparison is even more difficult because vendors can use any settings for transmit power, which also has a significant effect on a device’s energy usage. For example, the LSR SaBLE-x Bluetooth BLE module and Silicon Labs EFR32 Blue Gecko BLE SoCs are spec’d at 8.4mA transmit mode (+5 dBm) and 8.5mA transmit mode (0 dBm), respectively. This presentation describes the methodology behind the EEMBC IoTMark-BLE that will help clarify these spec games.

MacBee - IP-based IOT solution

An novel IOT system solution and protocol (dubbed MacBee) that make use of ubiquitous IP network to create IP-meshed IOT network will be presented. The system consists of the sensor device, gateway, related protocol with cloud support and control terminals (smart phone App). Most of IOT network construction and network issues are resolved at gateway. This greatly simplified the device from hardware and software design, thus lower the power consumption on the device, a key to the long battery life. This system can be easily scaled up to hundreds of thousand nodes. It has gained attention not only from home automation, also for office, hotel lighting management. The device node sale is approaching to a million unit per month. One of the product based on MacBee won 2016 CES innovation award


Application Development
Boosting Your IoT Application in All Dimensions

An efficient and professional IDE will make all the difference in your IoT project. The golden rule is to be as fast and energy efficient as possible, but smaller than 'X'; however, without knowing how to get the most out of your C/C++ compiler, you can shoot yourself in the foot by running out of time trying to hand-optimize your code. This presentation will help you to understand how optimizations affect your code and how to boost your application by structuring your application to meet the demands of being small, fast and low-energy at the same time. Additionally, we will also demonstrate on how to perform smart debugging to measure energy and profile your application behavior during runtime.

COTS vs Custom - Optimizing IIoT Solutions for Longevity and Reliability

Prototyping is easy but the path to production is often full of hidden risks and costs. What questions are critical, and how do you determine when to buy COTS vs Custom? We discuss these top concerns within the context of our consultative design methodology and how we help customers optimize IIoT solutions to maximize value for the full program lifecycle. As designers focus on their own technical requirements, they often overlook the importance of early compliance and certification planning, longevity of hardware components, upgradability of software, and design reliability for industrial environments.

Data Modeling for the Industrial Internet of Things

When creating an Industrial Internet of Things (IIoT) application, many developers start by thinking about connectivity, sensors, or even the user interface. But what about the Data Model? The Data Model defines the basic structure of your information and how you store, manipulate and interact with it. Best practices for IIoT application development recommend that the Data Model is one of the first things to think about. Decide who needs to interact with the data and what specific requirements they'll have. Think about modularity, reusability and future updates. Consider how your application's data will interface with external system and what impact external data has for the "standardization" of your Data Model. We'll talk about this and more in our session, Data Modeling for the IIoT.

Exploring IoT Connectivity - Conquering the Beast

A myriad of both de facto and sanctioned standard connectivity protocols and physical transports exist in the IoT. How does one bring some coherency to this fragmentation, to optimize product development and time to market? Attend this presentation to get an understanding of the challenge and some ideas of how to conquer the 'connectivity beast' and smoothly share data in IoT.

Fog Computing's Role in Solving Next-Generation IoT Challenges

Fog computing is a necessary architectural pattern for a variety of real-world situations. From industrial, manufacturing, remote oil & gas operations, and even to the enterprise itself, the concept of Fog, or edge computing, has a place in solving many of the next-generation Internet of Things challenges. In this session, we will review what the fog means, how it works, and go over a selection of use cases that highlight why it is important as the number of devices connected to the Internet continues to grow - particularly for mission-critical scenarios where latency is not an option. Attendees will walk away with actionable insight and an improved understanding of fog computing and its importance when managing Internet of Things implementations.

Insider Stories of Successful IoT Projects

Internet of Things (IoT) is a very broad term and depending on the industry type demands a variety of requirements to be fulfilled. To provide the necessary overview, industry cases in the IoT domain are presented and their unique features and communication details examined including LG's smart TVs, Dolby conference phone, Tesla's IVIs, Kohler's smart showers and more. This categorization shall then be used to define the IoT term in the context of utilizing software development environments for commercial purposes. Real world success stories and technical examples are presented to underline these capabilities.

IOTs Affect on Current Product Life-Cycle Development - Are We Ready?

How will IOT design differ from past endeavors in the chip and embedded spaces? Accordingly, how will the semiconductor and embedded hardware-software IP companies address the large number of in-experienced SOC designers needed for the coming huge IoT market - specifically in designing small devices. This talk will outline the overwhelming number of life-cycle tools, engineering skill sets, life-cycle costs, IP acquisition and industry associations needed to navigate the IOT chip and embedded development process. Potential solutions will also be considered.

Sensor-2-Server: Execute Locally, Communicate Globally

The idea of comparing data in motion (at the sensor level) to data at rest (in a big data server warehouse) with predictive analytics in the cloud is very appealing to many industrial customers. However, the problem is access to that data in motion at the sensor location.The increasing shift toward Industrial Internet of Things (IIoT) tends to bring up questions about the continued value of Supervisory Control and Data Acquisition (SCADA) systems that have traditionally served as the driver for monitoring and control in industrial markets. Although OT and IT are beginning to converge, there is still high demand for SCADA data. The goals of this session are to define Sensor-to-Server, compare data at rest to data in motion, and identify steps for successful Sensor-to-Server implementation.

Smart Homes, Mobile Apps and the Emergence of Voice

The success of voice as product interface currently is personified by the intelligent assistant Amazon Alexa. Combining improvements in speech, artificial intelligence and microphone technology, Alexa is an exciting, and natural, shift away from mobile screen-and-keyboard-controlled apps that came before. Pundits didn't predict this trend when we last gathered for IoT Devcon -- even after Amazon introduced the Echo. If past is prologue, the landscape will continue to change. Therefore, consumer-goods manufacturers need to choose an IoT software platform that allows their products to keep up with new mobile technologies and consumer trends, both during the design phase, and after purchase and installation. Why voice is good for product development will be an emphasis of this talk.

The Digital Twin: A Radical New Approach to IoT

In the past decades, Digitalization has been all about dematerialization: orders, invoices, checks, dictionaries, etc have all been replaced by Digital records or data. Even human interaction have been fully digitalized. When it comes to the Physical world, the "things" are not going to disappear as we bring them in the Digital World. The Digital Twin is a new construct that bridges the Physical world and the Digital world. In this session we will look at the history of Digital Twins and why they are best suited to digitalize the physical world. We will dive into what opportunity they represent today for the IoT world. We will also discuss the technologies and the problems the Digital Twin solves and will look into the potential impact from a new business model and monetization standpoint.

Voice UX: Designing IoT products for Zero UI

This presentation talks about the new paradigm in UX design called Zero UI, where IoT device interfaces are no longer constrained by screens or buttons. The introduction of the Amazon Echo, an always-on voice assistant for the home, introduced voice interface to consumers. Using simple voice commands the user can play music, turn on lights and check the weather. The linear screen by screen UI workflow does not work for Zero UI where a user can invoke an action at any time. This new found freedom can easily disorient a user. This session describes the architecture of a voice assistant. It will talk about common best practices when designing a voice UX and talk about factors like intent count, command discovery and response time.

When the Hardware Doesn't Do What Your Software Told It To

Today IoT, M2M and embedded devices are more and more defined By software applications As we develop these devices, we rely more and more on the hardware to be seamless. There is a reliance on seamless interoperability between Components and devices. However, software written for IoT/SoC systems can have unexpected effects on the hardware. This presentation will introduce ProVIDE, a software tool for your IDE that allows integrated control of hardware test tools.


Living on the Edge
A Developer's Guide to MIPI I3C Implementation

Preparing to implement MIPI's new sensor interface, MIPI I3C, in your next design? This presentation provides adopters of MIPI I3C with targeted guidance on how to ensure a successful and efficient implementation of I3C in their IoT products. Leveraging I2C as a foundation, many components of I3C will be familiar to implementers, but with guidance provided here, attendees will leave with a clearer understanding of I3C's new innovative features, how they will improve their systems and what considerations should be made to fully leverage them. Implementation guidance will include, but not be limited to support for legacy I2C devices, understanding network topology tradeoffs and good design practices.

Achieving the Potential of IoT Through a Global Set of Standards

The full potential of the IoT can only be realised through a fully open, interoperable system. oneM2M aims to bring exactly that's offering all IoT ecosystem stakeholders a common service layer that facilitates secure end-to-end data exchange between IoT devices and applications across different vertical implementations. Having just published its Release 2, oneM2M is breaking new ground in IoT standardization. Release 2 provides enhanced security by enabling secure information exchange between applications and host servers and allows dynamic authorisation of outside concepts such as device onboarding. Semantic interoperability enables meaningful data exchange for secure distribution and reuse and the interworking feature enables interoperability with devices.

Advantages of MIPI Interfaces in IoT Applications

In addition to sensors, high-resolution cameras are key enablers of IoT devices. The challenge for IoT designers is to find a solution that delivers low power consumption and high performance, while meeting cost constraints. MIPI CSI-2 is a proven interface in the mobile market, and because of its successful implementation, it is being utilized in new applications like IoT and virtual/augmented reality devices. The new MIPI I3C specification delivers a cost-effective solution that enables multiple sensor connectivity in a simplified architecture. This presentation defines the MIPI CSI-2 and I3C specifications, and describes their implementation, as well as power and performance advantages in IoT SoCs.

Custom SoC Design for IoT

IoT is driving a new wave of custom application specific SoCs and System in Packages (SiPs). These devices typically integrate custom analog & security blocks with a low power CPU and wireless connectivity to reduce both bill of materials and product footprint, while facilitating custom applications. Additional benefits of a custom mixed signal SoC include reduced power consumption, reduced component count, IP protection, and increased reliability. This presentation will provide information on when and why it makes sense to develop a custom SoC for IoT applications and will detail the design flow required. This presentation will provide information on solutions to accelerate the deployment of application specific IoT devices and will detail the design flow required.

Designing for Ultra Low Power: Mechanisms for Reducing Energy Consumption

In the last few years the need to reduce energy consumption has grown. This is instigated by government (e.g. EnergyStar) as well as by the need to do more with the same or less energy (e.g. mobile phone or Internet-of-Things node battery lifetimes). We should realize that energy consumption is a system issue and involves weighing one thing against another. Energy consumption can be reduced by software, but only so far as the hardware allows. It is also multidisciplinary, because both software and hardware discipline must be involved in the design in order to achieve the desired goal. There are many measures that can reduce energy consumption. We list available mechanisms and define an approach that leads to less energy consumption. We show what MCU parameters are important for ULP.

Verifying and Optimizing Software for Power on IoT SoCs

IoT endpoints need extreme low power. Software has become an integral part of the power management on IoT SoCs. Software also provides needed processing functions on the end-point. But the dirty little secret is that software has bugs. And those bugs can drain your batteries in no time - even when they do not show up as functional failures. This session will show a debug approach that enables SoC developers to correlate software execution with switching activity in the SoC at the RTL or gate level. This enables developers to confirm that software is correctly managing the various power domains on the device. It also enables developers to see which areas of software are correlated with periods of high switching activity. Software can then be modified to minimize power consumption.

Why Existing Memory Device Architectures Aren't Good Enough for IoT Designs

When PCs were the largest consumer of semiconductor components, target specifications for memory manufacturers were dictated by their needs; energy consumption wasn't an issue. With the advent of laptops, cell phones and other mobile computing devices, extending battery life has become a primary focus. Semiconductor designs have undergone a major shift to accommodate more compact, energy efficient systems. The IOT represents yet another major re-think of embedded systems with reduction in energy consumption at an absolute premium. Semiconductor memories are lagging far behind other system components in making the grade. This presentation examines the requirements for efficient IoT memory, tracks technological progress and looks at trade-offs between existing and new memory architectures.


Securing IoT Devices and Applications
Security Tradeoffs and Commissioning Methods for IoT Wireless Protocols

IoT benefits will not be realized without properly securing systems. Most connected devices require wireless technology and the links must be secure. What are the security tradeoffs for the different IoT wireless protocols? High security requirements can reduce and slow down technology adoption as much as having overly lax security. IoT applications must have the right balance between security and usability. Many IoT devices are resource and interface constrained. These constraints limit the potential commissioning methods, and along with usability, force system developers to make security tradeoffs. This session will review the different security trade-offs made by the various IoT wireless protocols such as Bluetooth low energy, zigbee, Thread and Wi-Fi, and their commissioning methods.

A Hands-On Intro to Industrial IoT Security

Industrial-strength security is now available for IoT applications. An off-the-shelf reference implementation of Industrial Security combines Avnet's Industrial IoT Starter Kit with an Infineon OPTIGA Trusted Platform Module (TPM), a Xilinx Zynq-7000 SOM, and Bluemix software from IBM. The design of the reference implementation will be presented, as well as a demonstration of the platform integrity and remote attestation capabilities of the system.

How to Secure your(IoT)Product

We will go through a simplified process of securing an IoT device starting from known and new trends in IoT threats, breaking down security into its elements and assemble them into a sample solution and if time allows, give some examples.

How to Securely Connect to the Cloud

Trustworthiness is quintessential quality in establishing secure communications with any cloud service. In this session we present how the STM32 IoT Discovery Kit secures the communications and how adding a secure element helps improve a platforms integrity.

IoT Security Means Protecting Code and Securing Communications

Security aspect of IoT will be discussing. Huge numbers of small connected devices pose a major threat to national infrastructure and national security. Making them safe requires focus on their access and connections.

Performance and Energy Benchmark for IoT Security Implementations

Many IoT designers avoid security because they’re afraid of incorrect implementation, they don’t know how to proceed, or are concerned that security functionality will impact their product’s performance or cost. Security vendors are challenged to provide IoT security features that are included with relative ease. The performance impact varies depending on the hardware and/or software security elements that are included. This presentation describes a method to help IoT designers choose the best security products from different vendors, using performance and energy as the criteria for making equitable comparisons. Other topics include IoT security basics and the different levels of security complexity or functionality; and security functions that are typically not well-implemented in IoT.

Reserved Session
Secure Gateway and IoT Sensor Hub running OpenWRT

Key to the IoT environment is the need to concentrate sensor input from multiple IoT nodes and channel the data back to a monitoring location. A secure gateway, demonstrated on the Microchip SAMA5D2 MPU XULT board, is a quick and inexpensive solution for this, due to free Linux and peripheral driver support and OpenWRT for the router function. Ethernet and Wi-Fi are easily supported for the upstream connection. Security is critical for IoT and the SAMA5D2 is well suited, supported by the on-chip ARM Trust Zone, secure boot, memory integrity checker, external memory de-/encryption, secure key storage, environmental monitors, anti-tamper pins and die shielding. Adding the ECC508 low-cost crypto-companion chip facilitates secure key provisioning to connect to a cloud service such as AWS.

The Internet of Industrial Devices, are we there yet?

The IoT revolution has swept through many markets,but it has yet to take hold in industrial.Most industrial devices are in heavily regulated verticals where, if we use medical as an example, one has to balance innovation against patient privacy and safety and lives are literally on the line. While integrating IoT features into medical devices has the potential for improving the quality and effectiveness of service for both physician and patient alike, any consequence from one of these devices going awry is totally unacceptable.This presentation outlines security and safety related features developers must consider during the design process to harden the device, secure communications, and prevent malicious exploits.It also addresses methods to protect device data at rest,in transit, and in use.


IoT Connectivity (II)
Developing Beacons with Bluetooth Low Energy Technology

Bluetooth beacons enable proximity-aware applications for consumers, businesses and industry. The market possibilities for Bluetooth beacons are endless. However, designing and implementing Bluetooth beacons can be challenging. Adding beacons to an IoT product, pushing the data to the cloud and using that data to create real value are new frontiers for embedded developers, OEMs, retailers, service providers and consumers. Bluetooth beacons are pseudo-standards running on Bluetooth low energy using proprietary beacon code. In this session, we will examine beacon applications and use cases, provide an overview of the Bluetooth standard and its derivatives, address leading beacon pseudo-standards and provide key information on end-to-end beaconing solutions to help get developers started.

Fearless Monolithic Integration of Bluetooth IP

While there are many technologies available for wireless connectivity, Bluetooth with low energy features has emerged as the standard of choice for IoT applications such as wearables/nearables. The new Bluetooth 5 is expected to enable smart home applications with extended reach and higher speeds. To meet their design requirements, designers must decide if they should integrate wireless technologies in a single chip or leverage off-chip solutions. This presentation details the benefits of integrating wireless technology such as Bluetooth low energy in a single SoC and explains how designers can reduce the cost and power of their IoT SoCs with a compliant IP solution. A brief outline of the newly released Bluetooth 5 features will also be given.

LoRa Technology and Real World Applications

LoRaWAN has become established as the leading technology within the LPWAN space, with a fast growing ecosystem of solutions ready to use today. This presentation will provide an overview of the technology and its capabilities, a view into the LoRa Alliance and its growing membership, plus real world examples of both public and private deployments

Multiprotocol Connectivity from Bluetooth Commissioning to Mesh Networking

There are compelling use cases for wireless SoCs supporting multiple protocols at various bandwidths, from 2.4 GHz to sub-GHz. For example, a connected device can be configured by a smartphone using Bluetooth low energy and then join a connected home network using ZigBee or Thread. However, multiprotocol can mean different things to different developers, so it is important to clearly define the term and use cases. A key factor in determining multiprotocol support is whether an SoC has one or more on-chip radios. Most multiprotocol wireless SoCs available today have only one integrated radio, enabling many but not all use cases of multiprotocol support. In this session, we will explore five major use cases and consider real-world examples of applications requiring multiprotocol support.

Navigating the Non-Cellular Sea: Transitioning to LPWAN

There is currently a lot of talk surrounding non-cellular connectivity for IoT, and it can be difficult to see how to integrate these new services with your existing devices. The applications that can benefit from these technologies are almost endless, from smart roads to agriculture and renewable energy, but as LPWAN expands globally, cellular technology will help to supplement its growth. For these sectors and countless more, freedom to use both cellular and LPWAN technologies together is crucial to minimise downtime, and allows devices to be future-proofed despite major market changes. This presentation will elucidate the different options available to the IoT market today, and show that a flexible approach to connectivity is the most sensible approach in these interim stages of LPWAN.