Resolving the Technical and Business Challenges of Getting Connected to the Internet of Things

Agenda - Presentation Abstracts

Agenda | Register


Internet of Keynote Things
Location: Magnolia Room
Accelerating Business Value and Outcomes with Data and Analytics

Countries, cities, industries and businesses around the globe are becoming digital to capitalize on the unprecedented opportunity brought about by the next wave of the Internet – the Internet of Everything (IoE). When people, process, data and things are connected there is an incredible opportunity to create new revenue streams, compete with disruptive competitors, and deliver better experiences, and new operating models to drive both efficiency and value.

Once connected, gaining business insights from data is top of mind for organizations today. Over 38% of the value to be realized with the IoE will be generated by insights from analytics. To harness the data that is massive, messy and everywhere, it is necessary to deploy analytics from the core to the edge to bring together both historical and new real-time data sources to generate unique and real time insights. In this session, Mala Anand will demystify big data and analytics and showcase how companies are benefiting today.

Accelerating Solutions for IoT

Today, the IoT revolution is transforming markets from a 'sale of goods' trade to a 'sale of goods and services' trade; economy. To fuel this model, intelligent and connected platforms will emerge to enable new value chains based on platforms and their associated ecosystems. These connected platforms will drive additional changes to markets by giving customers a direct line of communication to vendors, enabling consumers to provide specific use case information that lets vendors provide goods and services customized to individual consumers. Ali Sebt, President of Renesas Electronics America, will discuss how forward-thinking semiconductor vendors can better serve IoT customers by simplifying the design process to help them develop unique, connected applications that capitalize on the IoT economy.

Bridging the Physical and Virtual Worlds

From a technology perspective, bridging the physical and virtual world to accelerate IoT and help companies optimize and transform their businesses requires an end-to-end approach. This keynote will discuss the importance of achieving synergy between silicon and software to help companies integrate new technologies into existing legacy systems; explain how integrated, end-to end solutions bridge the intersections between information technology and devices; and provide insight into the supply/value chain and the ecosystem.

Designing for IoT: 5 Elements of Innovation for Success

IoT presents a vast number of opportunities for innovation across industries. While specific opportunities vary greatly depending on the industry and the application, IoT device design needs to address not just the complexities around connectivity, node based processing and sensor analytics, but also the evolving requirements of security and interoperability. Coupled with emerging standards and the flexibility that over-the-air updates and always-on devices provide, innovation options exist across all phases of a project lifecycle to allow extensions in use and purpose beyond the initial concept. In designing the next generation of IoT devices, where as an industry do we need to innovate to drive progress, and where as companies can we innovate to create our own differentiation?

Securing the Internet of Things: From Node to Cloud

As the IoT gains momentum, one challenge has become more evident - the lack of unified guidelines for ensuring security of IoT applications. The things on the internet are increasingly vulnerable to security breaches. Recently, execution of unauthorized code enabled the exfiltration of millions of credit cards and in another case, vital automotive systems were taken over by a hacker injecting rogue data into a car's controller network. Securing the IoT is a multi-faceted issue, encompassing platform trust, access control, and data security in systems spanning cloud data centers, networking processors, and sub-$1 nodes. A holistic view of the systems and challenges comprising the Internet of Things is needed for it to achieve its potential value and transform into the Internet of Tomorrow.


Internet of Strategic Things
Location: Magnolia Room: Track Chair - Kevin Krewell
A Guide to IOT Platform Services: Don’t Have Buyers Remorse

As any IOT project manager knows, building hardware is only part of the challenge: you also need a sophisticated software platform to connect the devices. Since developing a secure and reliable platform from the ground-up requires a significant investment in back-end programmers and devops experts, using a "Platform as a Service" (PaaS) offloads some of these requirements, making it very easy to deploy scalable applications to the cloud with minimal overhead. Services like Heroku, Google's AppEngine and Amazon Elastic Beanstalk are very useful but deliberately generic. Recently, many platform services have appeared that address specific needs of IOT. However, this IOT PaaS space is crowded with nearly two dozen providers, from heavyweights like Microsoft and Oracle, to startups like EVRYTHNG and Meshify. Peter will make sense of today's IOT PaaS space by providing an overview of the key players and a feature comparison of their services that will help you understand their tradeoffs and capabilities, giving you a better sense of which one suits your company's needs.

Network All The Things and Make Them Smart! Distributed, Composable, Federated Systems of Things.

The IoT isn’t one system. Any given IoT deployment will be a system of systems designed, manufactured and deployed by many organizations. There are three fundamentally different aspects to IoT from classic embedded and M2M – 1) distributed pools of resources, 2) dynamic composition of resources to meet quality of service commitments and 3) federation to increase capabilities and diversify features. The edge of the cloud will turn into fog as it extends through to the edge of the network, which is somewhat fuzzy too. How can you see your way to design “future proof” products when the future is so bright, we gotta wear shades?

Technologies, Protocols, Profiles, Security – Is Seamless Integration Possible?”

The Internet of Things (IoT) is driving the addition of wireless capability to end node applications. One of the key challenges is not the lack there of but the plethora of solutions, including technologies, protocols and application profiles, available today that designers have to decide between. So which is the best solution? How do you know? And what about security? A clear understanding of what is required for all of this to work seamlessly together is critical. Consortiums are forming to discuss the IoT technology available today to address these challenges. The Thread Group is a great use case example showing how different companies have come together to address the diversity that exists with home automation.

The Internet of Things That See: Bringing Visual Intelligence to Embedded Devices

Improvements in processors, sensors, algorithms, and other technologies are now making it possible to incorporate computer vision into a wide range of products, including size-, cost- and power-constrained systems such as door locks, digital signs, and personal health devices. Incorporating visual intelligence into devices enables devices to know much more about their environments--and hence to be safer, easier to use, and more capable. In this presentation, we'll explore this fast-growing trend, and the opportunities and challenges that it presents. We'll examine the different classes of processors used for embedded vision, and illuminate techniques for reconciling the high computation requirements of typical vision algorithms with the constraints of small embedded devices.

Translating Mobile Innovations Into IoE Innovations

Eran Sandhaus, senior director in Qualcomm's Internet of Everything (IoE) business unit, will make a case for why mobile innovations are at the heart of successful proliferation and ultimately, the most useful IoE. He will cover ways our industry can leverage key learnings from the macro mobile technology revolution to the macro IoE trend in front of us. Mobile technology continues to permanently transfer mobile-class user expectations to an ever-expanding range of device categories (cars, cities, healthcare, wearables, etc.), and today these new categories of connected devices/things are aligned in primary needs and priorities (interoperability, security, privacy, etc.). Join Eran to hear Qualcomm's perspective on the continued growth of IoE and how it is fueled by mobile innovation.


Poster Sessions
Bridging the IoT - from the sensor to the cloud

The IoT is typically seen from the perspective of a domain technology such as edge devices. This presentation looks at the IoT from a software development perspective of the sharing data from the sensor to cloud. The challenges in the flow include writing software for edge device communications APIs to moving data to the applications processor to communicating with the cloud. Today�s challenges are highlighted. Then, the presentation provides a vision for securing data and moving data in the IoT, that is, to/from the sensor and to/for the cloud.

Building Industrial Internet Solutions using MicroServices based Architecture

This talk will summarize why the microservices based architecture was chosen and demonstrate how it is applied to a variety industrial usecases in HealthCare and Power systems. As the first usecase we will look at what it takes to connect a Medical Imaging device such as CT Scan, MRI devices to GE cloud to create the word�s largest Image sharing network connecting multiple hospitals and patients. Along the way we will discuss topics like data access level security for patient cases, concurrency, and event loops and how they play into building secure, responsive, resilient, scalable application In addition we will discuss on how OSGI based Predix� Machine gateway built for Industrial Machines is used to collect data from various sensors on Industrial Wind Turbine and the data analyzeIn addition we will discuss on how OSGI based Predix� Machine gateway built for Industrial Machines is used to collect data from various sensors on Industrial Wind Turbine and the data analyzed in the GE Clould to provide valuable insights to customers. We will discuss topics like Big Data Analytics , Stream processing and how it is used to build mission critical industrial applications.

Data Analytics Techniques for Internet of Things (IoT) Sensor Data

As more and more devices are connected to the internet and as the data from these devices is aggregated in the Cloud, there is an increasing need to analyze this data in order to gain insight and take action on the data. In this paper, we will demonstrate several different techniques to clean- up and analyze data from real IoT data streams. To demonstrate these analytical techniques, we will look at data from different IoT edge devices including a weather station and an instrumented beverage dispenser. The data from these edge nodes is sent to ThingSpeak, a free IoT data aggregator. We then use MATLAB® to retrieve this data, remove outliers, find trends, change the time granularity of the data, perform basic statistics on the data, and replace missing data with interpolated data.

Enabling Smart Sensor and Iot Applications with Application Specific Instruction Set Processors

The demands of IoT and Smart sensor designs is breaking the one size fits all paradigm of traditional embedded design. To achieve the power, performance, and cost requirements, new solutions are needed. Application Specific Instruction-set Processors (ASIP) deliver the ability to optimize a processor to the exact needs of the design. However, traditional ASIP design techniques have required expertise beyond the reach of most SoC design teams. In this presentation we will show how a new approach, combined with advanced automation, makes ASIP practical for any IoT design. We will utilize a smart sensor example to demonstrate the process, however the approach is applicable to many other IoT type devices.

Impact, Importance and Inclusion of IOT in Product Manufacturing

John Chambers noted that by 2020, 40% of Fortune 500 companies will not exist. IOT is allowing manufacturers to keep up with the paradigm shift of expected after sale product enhancement. Attendees will understand the changing market environment, how cloud computing can address the need to stay on top of this change, what to look for in an IOT cloud platform in order to be successful in manufacturing, and how platforms can help you without needing to also change your IT business.

IoT Integrity: How to Control the Expansion of Endpoints for Test

If you're responsible for an application that depends on the feedback or functionality of various IoT endpoints (sensors or devices), your brand reputation depends upon each of the many moving parts being secure, reliable, and compliant. To truly protect your brand, i's critical to ensure that each third-party endpoint you leverage is truly aligned with your organization's business priorities. After all, if your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from code you developed internally or from a component that you've integrated. If you consume it, you own it. So what can you do to ensure that the endpoints you leverage actually enhance, not erode, your brand? This session outlines a multi-phase strategy:

Protocols and Standards for Internet of Things

There is a broad set of protocols and standards that are available in the IOT space. The objective of all the protocols is the application data transfer, processing and communication with the devices. All these protocols differ in their implementation, data transfer capabilities, communication , security, strength and weaknesses. It is really confusing how to choose the right protocol and standards for the right set of use case. We will take a look at basic protocols and standards, its advantages and disadvantages, deployment challenges and methodology to choose the right protocol with respect to the use cases.

Role of frameworks and methods for handling real-time and complex event processing in a heterogeneous IoT environment

There are different characteristics and dimensions to every IoT application; yet they also have some commonalities. These are mainly in terms of, connecting different objects, to sense physical awareness, in order to achieve rich interactivity amongst things, empowered by intelligent decision making systems. Even though more focus is on end results, we cannot undermine the importance of frameworks and methods that enable processing of events that arrive from heterogeneous sources like sensors, RFID readers, GPS etc. During this session a detailed walk-through of some real-world case studies will enable audience to understand the role of different frameworks in a complex event processing (CEP). The session will also provide a deep dive into an event processing layer in an IoT ecosystem.

Semiconductor Technologies of the Future for IoT

The IoT market demands a low cost and ultra-low power ASIC, and this is where the former process nodes (180nm, 90nm etc.) are more appealing. Moreover, low-power design schemes, IP tuned for IoT applications, security architecture for IoT applications and ultra-low power cores need to be considered for making a compelling IoT ASIC. Also at this stage the IoT market seems to be more driven by software, but the scenario will soon change when the demand of running imaging algorithms, fusion stack, and other DSP functions in hardware will arise. The key thing to consider here is that not everything could be put into hardware, so partitioning becomes important. To achieve an optimum solution, a clear understanding of which elements should be partitioned in hardware and/or software is necessary

Start Integrating Internet of Things Data into your Information System

Talend will discuss the drivers for the growth of Internet of Things and connected objects as well as outline the advantages of utilizing open big data solutions as part of Internet of Things data software deployments. Attendees will be provided with criteria for evaluating open big data solutions to manage machine-generated information, Internet of Things data originating from connected devices and sensors.

Why the Internet is insecure and broken for IoT and what we can do about it

We describe ten principles in IoT security learned from working in the IoT space for nearly 30 years. We give practical examples of security problems, issues and potential solutions. We believe the current state of the Internet is fundamentally broken for the IoT. The ten concepts that we describe are: 1. Your IoT devices must work when the Internet is down 2. You cannot trust your local network 3. IoT devices must be invisible to the outside world 4. Security solutions must be simple 5. Security solutions must be open 6. There must be visibility to what is happening to your devices 7. Security solutions must interoperate and cooperate with each other 8. Anything can and will fail in the IoT 9. Security solutions must scale 10. Nothing is true when billions of devices are deployed.


Securing the IoT (I)
Location: Magnolia Room
Don't Trust the IoT, Or Why You Need Better Security Now

By 2015, Cisco estimates 50 billion things connected to the Internet - all vulnerable to attacks, hacks and malware. It is possible for OEMs to implement meaningful security. This presentation will explore the basic tenets of trust and how to use it in the IoT. Cannady will address protection of identity credentials, attestation of integrity and built-in access control as fundamental attributes of a security architecture that can be applied equally well to embedded devices, end user devices and cloud servers, with examples. Cannady also will address mandatory access control. References for further information and relevant tools will be provided. The talk will give designers and ISVs a clear view to embedded security using industry standards and tools and how to start using these

Software Development Strategies for Securing the Internet of Things

Much of the technological innovation in IoT is centered on the protocols, standards, and applications needed to enable new capabilities. Security, however, is largely an afterthought. This talk will discuss the security and privacy challenges introduced by IoT and how developers in the IoT world can use security to gain competitive advantage in their designs and their businesses.

Use Cases for ARM TrustZone - What You Need to Know to Secure IoT Devices

Just when you figured out how to take advantage of multiple cores from ARM Cortex-A9 to A53/57, silicon vendors are changing the roadmaps with heterogeneous devices. Regardless of your industry, security is quickly becoming a key design consideration - especially in IoT. Connected embedded devices today are more pervasive, more powerful, and offer expanded connectivity options giving consumers the ability to download a great variety of arbitrary 3rd party applications.

What steps need to be taken to ensure sensitive data is secure and that your design is robust? In this session, attendees will step through the real life examples of configuring and securing a multicore device to address both the real-time demands and the requirements to incorporate open source software. Concepts covered in this session include:
- Protecting data at rest, in use and in transit
- Secure boot, root of trust, and software attestation
- Anti-tampering, obfuscation, and encryption of data
- Validation of run-time device integrity with local and remote manifest audit


Services, Data Management, and Maker
Location: Cypress Room
Makers of Things

It is important for one to understand the Design and Engineering aspect of IoT (Makers of Things) so that these 'things' to be connected, are created more effectively and efficiently. Far too many conversations are focused around the object which can be included in an IoT project, but many are not aware of the process around the creation, design & development of these objects and systems to be implemented. This session shows the continuous engineering concepts which include enterprise capability for accelerating the delivery of increasingly sophisticated and connected products. Engineers are able to better manage dependencies and respond to change more flexibly and quickly throughout the development lifecycle, while controlling costs, quality and potential risks.

Simulation: A Must-Have for IoT Testing Automation

Developing and testing IoT systems is a big challenge. The systems are big, contain many independent units, and are distributed across a large space. The bigger the system is, the harder it is to fit it into a lab for testing. So if you want to deploy software to your customers on a frequent basis, how do you practically�and cost-effectively�test that software to ensure it will run on hundreds or thousands of low-power sensor nodes as well as on servers and various gateways? This presentation will discuss using simulation as a staging area for testing a complex IoT system. In addition to providing some IoT testing strategies, we will address how using simulation can significantly improve your ability to automate testing for your IoT application.

Using an Open Source RESTful Backend for IoT Applications

IoT devices must efficiently and securely store and access data with backend systems, and the REST (Representation State Transfer) API has emerged as the de facto standard for connecting mobile devices with backend data stores. This session will explore the use of an open source REST API platform that may become a standard for IoT development. DreamFactory founder, Bill Appleton, will present examples of how IoT devices can use this services platform to securely store and access data via RESTful services. IoT examples that employ this REST API platform will be covered, including Intel's Galileo Gateway, Raspberry Pi2, and we will explain how Solution Family connects mobile users to industrial machinery.


Implementation Fundamentals
Location: BayShore West
Session Chair: Ajay Dubey
Can You See Inside Your SSD?

The key ingredient to a successful IoT device design is durable solid-state storage. It’s important to note that most of these devices must withstand harsh environments and data activity that goes far beyond the norm. In addition to best components and manufacturing, solid-state devices of choice provide a bigger window inside the drive – enabling monitoring, fine-tuning, overprovisioning and security to maximize efficiency and prolong drive life. This presentation discusses these considerations and how Virtium is focusing its efforts to expand the window into their drives with its SSD Software Suite. The suite of tools helps designers understand workload histories, wear, performance tuning and when to plan maintenance and transitions. Attendees of this presentation will increase their knowledge of all of the variables and the tools available for optimum industrial embedded SSD implementation.

Ten Architecture Principles for Business IoT Systems

Today IoT projects in business & industrial domains have mostly been confined to sensors, connectivity, data collection and analysis. However, to create the promised trillion-dollar impact, IoT applications need not only data, but also actions; not only detection but also responses. Conventional software architecture will not work here. A fundamentally different type of software is required because we have marched into uncharted territories: 1. A (complex) system - with multiple autonomous actors 2. Physical - not purely informational 3. Need actions - not purely data Using actual deployment examples in smart cities and smart fleets, and supported by a demo showcase, we will explain ten architecture principles and a reference architecture for business IoT systems.

Why Memory Technology Plays a Critical Role in Battling IoT’s Rising Security Threat

The number of IoT is exploding and with this increase comes significant security questions. A study conducted by HP found that more than 70% of IoT devices contain vulnerabilities, a key concern when designing IoT devices for applications such as medical instruments or conditional access systems. The right choice of memory technology to store critical code or data is required for maximum security. A security lock register, bit or memory can be inherently vulnerable to an attack if implemented with the wrong technology.


Securing the IoT (II)
Location: Magnolia Room
Don't Reinvent the Wheel for IoT Security

Why start over with IoT security? For decades, other industries have dealt with similar problems - how can we get strong security at a low price and with low power? And what if the attacker has physical access to a device that must be protected? These are not unsolvable problems or even new ones. On the contrary, they are solved problems. In this talk, we'll review the lessons learned by industries that faced these security problems and compare the problems they faced to those of IoT security. We'll explore the similarities and differences in threat models and other constraints. And we'll see how existing technologies such as hardware-based security technologies have been successfully adapted for IoT applications.

Establishing Trust in the Internet of Things: It Starts at the Root

Security must be at the core when building devices for IoT. Yet implementing a strong security framework can be costly and complicated for manufacturers. Security frameworks defined only by software is hard to enforce and challenging to implement. However, security defined only by hardware is expensive, can have limitations and often lacks scalability. A hardware root of trust (ROT) that uses a novel architecture that is small, flexible and efficient provides both strong security and integrity with the hardware, while also providing the flexibility and scalability required by these devices through the software. The focus of this presentation is to discuss the technical aspects of this design which include the security framework, hardware and software components and the various use cases.

Understanding and Mitigating IoT Security Hazards

The growth of IoT is occurring at an incredible rate, justly raising alarms about security and privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the world’s most well known OEMs to deploy connected product fleets.


Services, Data Management, and Maker
Location: Cypress Room
Dashboard of Things: Programming Interactions between Devices, Apps and Data

With IoT, enterprises and consumers are programming automatic interactions between data and devices. For example: Turn on the lights at sunset; or Email me the log when an error occurs. But as IoT grows, how do we orchestrate and control millions of complex interactions at once? One approach is to use a unified platform to monitor and program all connected devices and activities. In this session, you will learn how to connect your own apps and devices to a dashboard to reach new audiences and empower users to engage with your products in new ways. Using a newly created, JavaScript-based language we will demonstrate how users can program complicated interactions and write “Potions" to automatically perform any action, even using complex scenarios with multiple conditions and triggers.

Innovation: The Maker Way

IoT is currently at the peak of inflated expectations. While the market will be massive, we have really only delivered consumer value in very specific cases. The talk will explore the Maker Way: how to use recent and major advances in technology, design and practice to quickly create products with provably high user value.

IoT Product Development for Fun and Profit

Building a winning IoT application starts with a great idea. Simply having that great idea though, isn’t enough. Actually executing the idea presents a range of challenges and, in addition to writing the code, demands connecting some combination of processing, connectivity, sensing, actuation, and efficient energy management capabilities. Mastering all the low-level details of all of these functions may be beyond the budget or resources of a startup or small maker, and the path from prototype to production may add another level of complexity.This presentation will describe pitfalls, as well as various tools and techniques that can help manage the costs and complexity and get your idea rapidly to market.


IoT Connectivity (I)
Location: BayShore West
Charting Your IoT Course: Navigating the Critical Decisions on the Road to Market Success

The Internet of Things: Everyone is talking about it - and just about every company wants in on it. But actually building products that are IoT-ready takes a lot of planning. Designing products for IoT requires the flexibility and scalability to plan for the future and pivot for the unexpected. Join Wind River's Senior Director of Product Management Prashant Dubal for a look at what it takes to plan, design, and build products for IoT. You will be guided from the various starting points of IoT projects through the critical forks in the road. Topics covered will include: sensors, devices, machines, systems; operating environments; data to the cloud; designing in security and unique market requirements. By the end of this presentation, you'll have a chartered course to IoT success.

Developing an End-to-End Ecosystem for Smart Lighting

Building an integrated ecosystem for the Internet of Everything (IoE) is essential to success. In this technical discussion Eran Sandhaus, senior director at Qualcomm, will provide a deep dive into Qualcomm’s ecosystem for the smart home, focusing on smart lighting as a prime case study. Sandhaus will walk through the current status of the residential lighting ecosystem, future opportunities and outline options for designers and OEMs to start building smart lighting platforms and products. He will touch on the necessary components that are needed to make this ecosystem a successful reality, emphasizing the importance of a common language. Join Eran to hear more about how to develop an end-to-end ecosystem for smart lighting.

LTE is an Ideal Wide-Area Wireless Technology for IoT and M2M Devices

The barriers against the use of LTE for M2M and IoT devices are falling away, and LTE is the only truly future-proof technology for the Internet of Things. LTE chipset platforms now exist that are specifically designed to enable low-cost, low-power M2M and IoT devices, and as a result the LTE-enabled Internet of Things is becoming a reality. LTE has been evolving to support lower categories of throughput, such as Category 1 (10 Mbps) available today, and soon, Category 0 (1 Mbps) defined in 3GPP Releases 12 and 13. This presentation will explain the 3GPP releases and specifications and discuss how developers can use the latest low-cateogry LTE chipset platforms to balance functionality, throughput and ultra-high efficiency to the best advantage. Also presented is a comparison between these low-category LTE solutions and other low power wide area technologies.


IoT Connectivity (II)
Location: Cypress Room
Bluetooth and Connecting to the IoT

The world is becoming more and more connected and Bluetooth wireless technology is helping to make that a reality. Join us to discuss how Bluetooth technology compares to other wireless technologies and why it plays such a powerful role in the “Internet of Things”. We’ll walk through trends about Bluetooth device use, adoption, and potentials – looking specifically to Bluetooth Smart. We’ll also look a case studies around troubleshooting Bluetooth enabled devices and interoperability.

Meeting the Reliability and Security Demands of the Industrial-IoT

We have seen it time and again: networking protocols long entrenched in specific markets and applications being supplanted by Ethernet. And it's happening once again: this time in Industrial-IoT (IIoT) networks. Ethernet standards are already tackling the last hurdle, adding determinism, as part of the IEEE 802.1TSN efforts. But as these IIoT networks connect to the outside world, each other and the cloud, managing security issues is top priority. This presentation will examine these issues and how best to address them in evolving IIoT networks.

Network Performance, Reliability and Metrics for Embedded IP Mesh Networks

Millions of devices have been deployed on IEEE 802.15.4 networks, which use a variety of protocols ranging from proprietary point-to-point to ZigBee and now IP-based mesh networking stacks (Thread). When developing connected device products for 802.15.4 networks, it is important to understand expected device and network behaviors. In wireless mesh networks, device efficiency impacts the behavior of all interacting devices. The software/hardware interaction varies between network implementations, making it difficult to calculate critical parameters such as battery life. In this session, we will explore underlying device and network behaviors enabling developers to make design choices impacting device interaction and the resulting effect on system-level energy consumption and battery life.

Solutions to Embedded IoT Challenges

The Internet of Things (IoT) takes advantage of Cloud Connected Embedded Systems. These systems can be found in products all around you, such as wearable fitness monitors, home security systems, home automation systems, garage door openers, industrial controls, and many others. With a variety of wireless solutions, sensors and eXtreme Low Power (XLP) PIC® microcontrollers, Microchip�s products enable end-to-end solutions that help successfully connect embedded systems to the cloud, taking full advantage of its benefits. In this presentation, we will explore the different roles and responsibilities required to connect an embedded system to the cloud, common pitfalls and how to avoid them. Note: PIC is a registered trademark of Microchip Technology Incorporated in the U.S.A.

Wireless Communications: the Battle for the IoT

With the emergence of the IoT and its many disparate devices, there is a great deal of attention on IoT wireless communications technologies including Bluetooth, 802.15.4, Wi-Fi and others. Which technology will secure the leading position in potentially billions of IoT devices? We’ll provide an overview of the communications technologies that are vying for a place. We’ll look at the main candidates, with an eye on its range, capabilities, supporters, standards status and more. We’ll also look at where each is most suitable – be it on your wrist, in your living room, or in the cow pasture. We’ll also discuss what designers of IoT devices can do to future-proof their designs considering an uncertain future.


Living on the Edge
Location: BayShore West
Achieving Energy Efficiency for IoT SoC Designs with Advanced Techniques in IP

Reducing energy consumption and system costs are critical in today's IoT applications. New investments in IP and tools play a significant role in extending battery life, reducing energy costs and enabling added functionality for wearable and machine-to-machine devices. Developing SoCs for IoT applications requires IP that not only supports low power process technologies but also implements advanced low power techniques for energy-efficient sensing, processing and communications. This presentation will cover the latest trends in IoT designs and the most popular architectures used in today's IoT applications for high-end, low-end and smart analog systems. It will also cover IoT specific design considerations to improve system power usage and overall energy efficiency for a variety of apps.

Integrating Secure and Low Power Multicore MCUs Into IoT End Nodes

Using multicore MCUs for the IoT space allows designers to more quickly add new features to their product without compromising the performance, power, and software of the original solution. Things like connectivity, sensor fusion, and security can be addressed using the second core, while maintaining other critical functions on the first core. In this session, attendees will learn about the trends in the market and the benefits they will see in moving to a multicore MCU solution, such as lower power and higher level of security. This session will also look at some of the challenges of designing with a multicore MCU and how they can be addressed.

IoT Platform for Signal Processing Savvy Applications

Current IoT development platforms provide adequate control capabilities for bring up of connected-devices, from a simple garage door up to a fancy activity tracker. However, to cope with a smartwatch, smart-glasses or smart home environment, much more powerful development platforms are required. From audio sensing, through scene analysis, to multidimensional connectivity aspects (PAN to WAN), things get quickly out of scope of most development platforms. In this session we will present a DSP based platform for IoT developers seeking advanced signal processing capabilities for intelligent sensing (motion, health, audio, vision), scene analysis, and connectivity, for actionable application assist.

Meeting the Battery-Life Requirements for Your IoT Edge Node Product

An edge node, the 'thing' of the IoT, can be described by four features: 1) the transducer; 2) the interfaces connecting the transducers and microcontroller; 3) the processing (e.g. encryption, compression, protocol stack, data analysis); and 4) communication mechanism used to send/receive information between the thing and the network. When designing your edge node device, battery-life might be one of the most important factors, but how do you reliably determine the combined energy consumption of the entire platform? In this talk, representatives from EEMBC will describe a new benchmark methodology that measures the combined energy effect, taking into consideration the real-world effects of the four 'thing' features, allowing you to carefully select the microcontroller and RF component.

Using Customized CPU Cores to Build Lower Power and More Secure IoT Chips

In this talk, we will examine the potential IoT market and show some examples of IoT devices, exploring the general requirements for IoT devices and discussing how to create better and more competitive SoC products.


IoT is Inoperable Without Interoperability
Location: Magnolia Room
A Scalable and Secure Approach to IoT Device Management

While much attention is focused on the potentially billions of forecasted IoT devices, the key value proposition of IoT is in the underlying services enabled by cloud connectivity. The cloud can provide the ultimate 'customer' feedback, and in doing so can dramatically shift the planned purpose of a device. Developers must be prepared to dynamically adapt to insights and evolve their businesses to address the true opportunities their devices/services can address. 'Scaling' is more than the ability to add new users; it's about dynamic and secure adaptation. We'll discuss examples of where IoT adaptation is occurring and outline critical first step decisions that IoT entrepreneurs need to make as they develop product concepts and plan for dynamically scaling into new directions over time.

IoT Standards: Too Many Cooks in the Kitchen

The Internet of Things has exploded, with experts now predicting that 30 million devices will be connected to the Internet by 2020. From Google acquiring Nest and Apple announcing the HomeKit, these connected devices are being introduced to make life, as we know it, easier. There's one thing that's not-so-easy though: standards. As the Internet of Things and its standards become more of a hot topic, tech companies are flocking to both join and create their own IoT standards groups, organizations and consortiums. There's a necessity to work together regarding IoT standards and rallying behind one set of standards will significantly push the IoT space forward. Adam will provide an overview of existing standards and their pros and cons, as well as the big players among IoT standards groups.

Testing the Interoperability of the Internet of Things

As the Internet of Things pushes towards a more connected world, and as time to market continues to be a major competitive advantage, the need to work in an open standardized environment becomes increasingly important. Confirming the interoperability between IoT devices and between components, modules and software within devices will ensure that they are able to connect, and work with other devices in a particular IoT ecosystem. With the growing complexity of designs and increased scale of integration, how will hardware, firmware and software engineers effectively test, debug and validate the intricate communications within and between devices? This session will explore the requirements for IoT validation.

What Does Interoperability Mean for the IoT?

Interoperability is a key requirement for the IoT but what does it really mean? Standard protocols for different vendor's devices to interact with each other? Connection between different languages and operating systems? Wireless technology choice? A way for devices to interact with the cloud? Does it include data syntax? Must we model semantics? Can security interoperate? RTI, the world's largest embedded middleware company, participates in about 15 different "interoperability" efforts, including FACE (avionics), GVA (European vehicle architecture), SGIP (smart grid) and ICE (medical systems). We are leaders in the Industrial IoT and its leading consortium, the Industrial Internet Consortium (IIC). This session will examine the depth of the interoperability problem and explore solutions.

Without Standards, There's No Internet of Anything

It's no secret that many of the companies building IoT products and services aren't exactly communicating with one another. The IoT is a 'wild west' when it comes to standardization and interoperability, and many IoT products on the market today are not able to communicate with other vendors' smart products and software. For long-term success, the IoT ecosystem needs to avoid a disjointed, incompatible, and proprietary environment and instead pursue a common approach for such things to interconnect and interoperate. This talk will detail an ambitious endeavor to create and deliver such a standard for developers to use in order for their devices and smart things to work together and with the expected billions of other devices to come - regardless of manufacturer, brand or product type.