Staying on top of technology trends related to the Internet of Things (IoT) is an ongoing challenge, given the industry’s rapid-fire changes and how those changes affect business processes. At LiveWorx, you’ll learn about the tools, processes, and tactics to implement emerging IoT-related technologies, and create a playbook on how to improve productivity and efficiencies at your organization. Below are just some of the sessions featured at LiveWorx this year:
Bell and Howell: Service & Retail Innovation with Next-Gen IoT
Monday, June 18th | 10:30am - 11:15am
Bell and Howell transformed its service organization by enabling remote monitoring and service of its connected industrial mechatronic machines. They selected ThingWorx as the foundation of an innovative, next-generation IoT-enabled offering designed to further optimize service capabilities for all of its OEM service partners. Discover how Bell and Howell got up and running in 8 weeks with the ThingWorx Industrial Innovation Platform and how they created the PackRobot: an autonomous self-service retail click and collect package retrieval system that allows customers to pick up their online orders in a matter of seconds by scanning a code on their smartphone.
From the Factory to the Field: Digital Twin/Thread and Closing the Loop from PLM to Smart Devices
Monday, June 18th | 12:30pm - 1:15pm
The concept of Digital Twin has become popularized particularly in association with the ability of this technology to provide better data for product manufacturers based on simulations (virtual copies) of physical products, enabling predictive/conditional maintenance, and the shift to ‘as a service’ business models. In this session, join Calvin Smith, Co-Chair of the Smart Factory Task Group in the Industrial Internet Consortium, and Director and Global Head of IoT Partner Engineering at Wipro Digital, to discuss the evolution of the Digital Twin Concept through a new approach called Closed Loop PLM: Connecting in-factory CAD and XLM systems through an IoT Platform to Smart Devices deployed in the field, where AR/VR techniques are applied.
Digital Strategy IdeaStorm Card Game: Ideate Ways to Compete and Win with Game-Changing Technology
Tuesday, June 19th | 11:00am - 11:45am
Digital strategy. The buzzword of the day or the most important thing you should be pursuing today? The challenge is that the possibilities seem endless and it’s tough to get alignment as a management team. Based on our experience developing numerous client applications, Kalypso has designed a fun, interactive card game called IdeaStorm that helps companies with the first step of a digital strategy: developing ideas for creating new digital value.
Digital Transformation and the Customer Experience Revolution
Tuesday, June 19th | 4:15pm - 5:00pm
When everybody’s business is becoming digital, digital is everybody’s business. For enterprises to remain relevant and competitive, Digital Transformation of their business is key, and the.e success of these transformations is a direct result of outcomes realized. Hear from Schneider Electric's EVP of Digital Services & IoT, Cyril Perducat, on how and why customer experience must be enriched digitally- made fast, intuitive, and answer the question: “How are you going to solve my problem?”.
Key Requirements & Software Updates In Connected Devices
Wednesday, June 20th | 10:30am - 11:15am
A key requirement for connected devices is the ability to deploy remote software updates so that bugs, vulnerabilities and new features can be addressed for devices that may live in the field for up to 10 years. Explore the findings of the Mender.io project, which uncovered best practices for the current state of enabling by interviewing over 100 embedded developers.
IoT Security From A DevSecOps Perspective
Wednesday, June 20th | 12:30pm - 1:15pm
Many IoT activities need to be supported through the cloud. This session will discuss IoT security from a cloud perspective, while also touching on device security. Building a secure IoT platform has many challenges. To name a few, these challenges include secure onboarding, configuration and provisioning of unknown devices into managed networks, setting up the basics for secure data collection, managing the messages and data into typically public cloud backend databases and compute engines, sophisticated authorization of access of applications and analytics engines, and IoT data resting in vast data lakes. Learn how to address these challenges.
These are just a handful of the dozens of sessions available in the IoT Track. Browse the Session Catalog to view all of them!