First Sessions Announced

What to Expect from Quantum Cybersecurity?
Andreas Baumhof, Vice President of Quantum Technologies, QuintessenceLabs

Quantum technologies are undergoing rapid change and will deliver transformational capabilities to many fields. Companies large and small are expanding the capabilities of quantum computers, governments are supporting quantum programs, NIST is seeking replacements for vulnerable encryption protocols, and quantum cryptography solutions to protect our data from the quantum threat are taking huge strides, strides that are even taking the technology into space.  Andreas Baumhof will navigate through the maze of information on quantum tech to provide a practical overview of current state of the art of quantum security techniques, with some interesting surprises. He will lift the hood and shine a light on show what quantum cybersecurity really delivers, what its limitations are and what people should expect in terms of performance and progress in the years ahead.


Internal IoT and Facility/IT Convergence for Smart Data Centers
Gavin Lu, R&D Director, VMware

This session will highlight use cases of IoT and edge computing for smart data centers. Data centers are core departments in modern enterprises. There are quite a few IoT systems in these "data factories" on facilities: power supply, cooling, environmental control (temperature & humidity), security etc. They are called "Internal IoT". Facility systems in data centers are generally not integrated well with IT systems if any, where virtualization and container technology in IT creates more complexity for that target. This session will explore the necessity and trend to converge facility and IT systems and even teams together. Some exploratory work in this direction will be introduced, including: an open and neutral architecture, example adapters, several use cases, and a patrolling ground robot in data centers.


Fog Computing Technical Framework, An Overview
Dr. John Zao, Director, NCTU Edge/Fog Computing Research Center, National Chiao Tung University

After the successful adoption of the OpenFog Reference Architecture as the IEEE 1934 standard, the OpenFog Computing team, which is now the IIC Fog Computing Task Group, continues to develop the Fog Computing Technical Framework, a functional specification of a Fog Node and a Fog Computing System.  In this talk, we will walk through the essential components of a Fog Node including the Trusted Computing Platform, the End-to-End Security Services, the Node Management and the Service / Application Management Modules. We will also discuss the logical and virtual abstractions of a Fog Node. At the system level, we will also expound on the concepts of hierarchical Interoperability and Service Domains that span across the Things-to-Cloud Continuum. Finally, the synergy among Edge and Fog Computing and the related standard activities will be discussed.   


Tutorial: Edge Computing
Charles C. Byers, Associate Chief Technology Officer of the Industrial Internet Consortium

Edge computing moves the value of cloud computing closer to the edge of networks.  In this tutorial, experts on edge computing will provide an overview, and answer your questions.  Topics include:

  • How edge computing fits into IoT
  • Vertical markets, use cases and applications Edge requirements
  • Architectures for Edge Computing Security in edge computing
  • Managing edge networks Testbeds Standards, consortia, and the ecosystem

Battle of the Network Stars: Edge Architecture Edition

Join representatives from the leading standards, consortia, open source projects and commercial companies in the edge marketplace as they give rapid-fire overviews of their offers. Each speaker will give a 5-10-minute talk on their solution's history, targeted verticals, architecture, advantages, future direction and commercial model. Compare and contrast some of the leading solutions in the market.


The API Security Challenge
Sandy Carielli, Principal Analyst, Forrester Research

APIs enable organizations to introduce new business opportunities that enhance customer relationships and provide new revenue streams. However, each API, if not secured, offers attackers another entry point into the corporate infrastructure. Security leaders who have spent years focused on securing web applications may be dismayed to discover that not only are APIs subject to many of the same vulnerabilities but that their existing web application security toolset is not sufficient to secure APIs. In this session, we'll review the current state of API security, cover essential technologies to secure APIs and discuss ways to address the gaps.


Toshiba DX Journey Toward Leading-edge CPS Technology Company
Hiroshi Yamamoto, Digitization Chief Technology Officer and General Manager of Corporate Digital Innovation Technology Center, Toshiba Corporation

Toshiba has globally announced 12 Industrial IoT services across 4 industry domains on November 2019. Those services are based on Toshiba IoT Reference Architecture announced in 2018 that is based on Cyber Physical System framework announced by NIST. In this session a few criteria of RA compliance and several Design policies will be presented. Energy IIoT solution will be also presented featuring Digital Twin, Hybrid Cloud and OT/IT integration. Lastly the latest update of Toshiba RA reflection to the next version of IIRA will be introduced.


Intelligent Edge in Industrial IoT
Dr. Xiao Yang, Director of Machine Learning, Object Computing, Inc. (OCI)

Artificial intelligence (AI) and the internet of things (IoT) are unique on their own, but what makes them even more interesting is where they intersect. In this talk, Dr. Xiao Yang, will demonstrate how his team used AI Cloud Vision to digitize analog gauge data and enable automated readings from a remote location, alleviating the need to dispatch a crew to read gauges manually. Learn how utility, manufacturing, and energy remotely diagnose problems, optimized maintenance timelines, predict failures and prevent outages prevention of outages.

Mobilizing the IIoT: Bringing Edge Computing to the Palm of your Hand
Ramya Ravichandar, PhD, Vice President, Product Management, FogHorn

By 2025 IIoT connections will overtake consumer IoT connections by 400%, meaning industrial ecosystems will use more mobile devices for tasks and activities, enabling countless use cases for OT staff. Mobile device efficiency and capabilities, including real-time insights and AI, will be key and must occur without requiring cloud connectivity. This session will explore how Android devices use edge computing to solve problems, by exploring use cases in Barcode image reconstruction and Device battery prediction.


Energy Adaptive Networks and Software Defined Power Grids to Protect Against Natural Disasters
Michael Enescu, Co-founder & CEO, EAN Corporation

Fires caused by electric grid failures are increasing at an alarming rate. As green power is coming online, accepting renewables into the grid creates complex issues. The recent California wildfires have been ignited by reactive power fluctuations induced by uncontrolled, rapid, random fluctuations from distributed energy resources in moving weather fronts. This session will explore the energy adaptive networks technology based on Caltech research and the distributed edge application previously used to monitor and control reverse power flows in microgrids now used to create a "planetary skin", a mesh of devices that capture time-series data, analyzes it in real-time, and minimize power fluctuations in the grid. The presentation will highlight the system architecture, first deployments, examples and collaboration required to address the challenge of gathering the data, analyzing it in real-time, reliably enough to take action to make communities safer, healthier, and more sustainable.

Optimizing Edge Deployments from Aerial Drones to Smart Factories
Rhonda Dirvin, Senior Director, Automotive and IoT Marketing and Ecosystems, Arm

The term "edge" has grown in popularity lately. What does it mean and how does fog fit in? What are the advantages of "edge"? Use cases written both by the OpenFog Consortium and the Industrial Internet Consortium illustrate the edge advantages. These use cases will be described with emphasis on the key advantage of edge that made it the right architecture for that use case. This session will also review some of the remaining challenges of edge.


Tracking the Lifecycle of Edge Computing Deployments
Charles C. Byers, Associate Chief Technology Officer of the Industrial Internet Consortium

Edge computing deployments follow a multi-stage lifecycle from market identification to requirements to architectures to implementation to deployment to ongoing operation.  This talk will discuss the activities performed in each of these stages, as well as the processes and decision criteria involved in moving between stages.  Throughout the stages, business case analysis will track and optimize total lifecycle cost of ownership.


On the Fast Track Edge of Autonomous Vehicle Development
Stan Schneider, CEO, Real-Time Innovations

The predictions of reading or sleeping in fully autonomous vehicles by 2020 seem increasingly optimistic. Today's autonomous vehicles can operate safely in structured settings like freeways. These "level 3" environments have clear rules, uncluttered sensing, and predictable situations. The crowded streets and challenging environments of level 4 are much harder. To cope, advanced autonomous systems need sophisticated sensors, complex perception fusion, and strategies to handle erratic human actions. These corner cases prevent truly autonomous operation. This session will explore examples of intelligent edge-based, data-centric connectivity. Over 1500 designs use this, including over 100 autonomous flight systems and 50 production-track commercial autonomous vehicles.


Making AI on Edge Real
Arjmaud Samuel, Principal Program Manager, Microsoft Azure IoT, Microsoft

One of the key business use cases for Internet of Things edge computing is running AI on edge devices, and being able to manage these AI workloads in a scalable and secure manner. There are a number of technical and business challenges needed to be surpassed to make this real, among them, performance, security, manageability, scale and evolving business models are key. In this session, we will highlight some of the emerging scenarios driving the deployment of AI workloads to the edge. Examples of how businesses are using AI on edge for their business transformation would be discussed, along with some of the technical and business solutions that have been solved, or need to be surpassed.


Automotive Cybersecurity: Addressing the Gap for Guidance from Standards
Sven Schrecker, Vice President and Chief Architect, Cyber Security, LHP Engineering Solutions

As the Internet of Things (IoT) becomes an integral part of business strategy, the question of securing the IoT environment has come to the forefront. How can you tell if your IoT solution is sufficiently secure to address your needs? The Industrial Internet Consortium (IIC) created the IoT Security Maturity Model (SMM) to help organizations address these issues and provide a framework that addresses IoT requirements, the merging of information technology (IT) with operational technology (OT), and the overarching security and trustworthiness goals. In this session, we will provide an overview of the structure, purpose, usage and extensibility of the model and engage the audience on applying the model to the automotive industry. How might you apply the model to autonomous vehicles or other intelligent components of your car?

Produced by:
Industrial Internet Consortium