IoT Summit

Wed, 2016-02-10 14:01

The Internet of Unexpected Things (sponsored by Microsoft)

Connecting to the cloud many different devices of various form factors, powered by eclectic platforms running apps developed in random languages to build an advanced end-to-end IoT solution seems (and often is) as complicated as this sentence is long… Let’s take a look at how it’s done with Azure IoT services, device SDKs and tools in a demo-heavy session for developers.

Tue, 2016-01-19 11:03

Introduction to Apache Spark for IoT

Apache Spark is a rapidly emerging big data platform which is experiencing broad adoption, including in a number of IoT areas thanks to resilience, scalability and a strong performance provided by a memory-centric programming model. Come learn about Apache Spark (including code examples) and hear about how it fits into IoT flows including how we're helping revolutionize Madrid traffic congestion issues thanks to some advanced analytics.

Wed, 2016-01-13 05:37

Open Source Internet of Things 101

IoT is the new black, and you sure want to be trendy and cool, and claim that you're doing IoT too! Open source initiatives like Eclipse IoT have your back covered by providing you with the building blocks needed for enabling IoT solutions.

We would like to welcome you to the IoT Summit by giving you an introduction to the key challenges of IoT and an overview of the approach undertaken by Eclipse IoT to develop an ecosystem of open-source technologies that will help you connect and manage your current and future IoT devices.

Tue, 2015-12-22 08:32

From MEMS to Stems, a case study in IoTomatoes

A look at a co-creation effort spurred by Analog Devices Inc. and the MEMS and Sensors Industry Group. In addressing the 4 pillars of earth, MIG hosted an event where one of the speakers "challenged" the MEMS component suppliers, "Why isn't the industry more focused on providing global solutions to help with clean energy, hunger, health, or clean water?". Analog Devices stepped up a as technology integrator and has partnered with several other stalwarts in the industry to create a low cost, easily deployable "Sensor to Cloud" strategy for precision agriculture.

Fri, 2015-12-11 02:24

How to allow smart devices to communicate using Eclipse Vorto

IoT is becoming more and more complex every day with steadily growing variety of devices and their accessibility via different protocols. This complexity influences the development in terms of time-to-market and skills you need to bring along significantly. One of the main targets of Eclipse Vorto is to provide means for harmonizing and simplifying the process of integrating devices into IoT platforms or more generic into IoT solutions.

Thu, 2015-12-10 12:44

Working without wires: Simulating hardware components for IoT development

IoT software development is often slowed or delayed because the target hardware is unfinished, unstable, or just a few units are available. Existing hardware simulation tools allow developers to test if their code is functionally correct on a specific device. Unfortunately, this type of simulation alone falls short when integrating the code into more complex applications or libraries, or when simulating hardware sensors or components that have custom interfaces.

Wed, 2015-12-09 12:18

Building an open LoRaWAN network

There are four constraints for internet of things to succeed: devices should have connectivity even on a long range, connectivity should be free and secure, devices consume very little power and the form factor is reduced to the size of the battery. LoRa enables this: long range, low power communication over free-to-use frequencies around the world. In this talk, I will introduce the open standard LoRaWAN: the wide area network protocol stack built on top of LoRa, maintained by telecom operators, chipmakers and IoT industry leaders.

Thu, 2015-12-03 19:19

IoT Security: Lessons From a Hostile World

Security is widely seen as key to the success of IoT. Security is no longer ignored - unfortunately, it is often implemented poorly. For example, using SSL based encryption but installing the same certificate on 900,000 systems. Or hard coded maintenance and diagnostic passwords. How about using the MAC address to "securely" identify a system? Note that IT systems have long been targeted by a wide range of attacks and have developed tools, technologies, techniques, and strategies for dealing with hostile environments.


Subscribe to IoT Summit