Linley IoT Hardware Conference 2017
Focusing on hardware design for the IoT and wearables
July 25 - 26, 2017
Hyatt Regency Hotel, Santa Clara, CA

» Events  |  Event Info  |  Agenda Day One  |  Proceedings

Agenda for Day Two: July 26, 2017
View Day One

Click arrow below to view presentation abstract or click here -> to view all abstracts
9:00am-10:00amKeynote: Enabling Voice in the IoT: Cloud, Embedded, and Personal Assistants

Voice is rapidly conquering the IoT space. Properly implemented, voice provides a flexible user experience more economically than traditional touch screens or keyboards. We will explore how cloud and embedded platforms work together to deliver brand-aware personal assistants that give a natural, intuitive user experience while simplifying the job of adding custom voice controls to anything. Users are increasingly demanding voice; the time to plan for it in your product lines is now.

Rich Kennewick, President & CoFounder, Voicebox

10:00am-10:25amBREAK – Sponsored by Synopsys
10:25am-11:30amSession 3: Low-Power Processors for IoT and Wearables

For the IoT to proliferate to billions of sensor nodes, such devices must be capable of sustaining always-on operation without prematurely draining their batteries. Energy conservation is also a requirement in always-on wall-connected devices, such as voice-activated digital assistants, which could represent a parasitic load to a smart home or smart building electrical system. This session, moderated by Linley Gwennap, principal analyst at The Linley Group, will present IP cores and design methodologies for building low power sensor nodes and voice-processing SoCs.

Optimizing IoT Processors for Lowest Power, Highest Performance
Avinash Lingamneni, Principal Design Engineer, Tensilica R&D, Cadence

IoT products span a broad range from ultra-low power sensors that operate for multiple years on a single battery to performance-driven, wall powered multi-microphone digital assistants. Common to all IoT products are the requirements to "sense" the environment and communicate with the network. Whether implementing voice trigger, sensor fusion, speech recognition or other IoT processing tasks there is a strong desire to minimize both power consumption and costs. We will discuss a processor family, including a new audio, voice and speech DSP core, which enable optimal IoT SOC designs.

HMP for IoT – The Path to Powerful Ultra-Efficient Nodes
Mike Eftimakis, IoT Product Manager, Arm

IoT cannot just rely on cloud processing.

As the number of IoT nodes grow, data from these nodes will need to be minimized using more localized computing. This, and requirements for richer user interfaces, will drive the migration to more powerful processors. Unfortunately, power consumption is limited. To run for years on small batteries or harvesting energy, the architecture will need to dynamically adjust processing performance according to the usage needs. This presentation will discuss techniques to manage such systems.

This session includes a panel discussion and Q&A featuring the above speakers.

11:30am-1:00pmLunch – Sponsored by Synopsys
1:00pm-1:45pmSegmenting the IoT Processor Market

To address the growing demand for wirelessly-connected IoT and wearable devices, processor vendors have developed purpose-built chips optimized for low cost, low power, and enhanced security. These processors range from MCU/radio combos enabling Bluetooth, Wi-fi, and 802.15.4 connectivity to a new class of chips for LTE Cat-M1 and Cat-NB1. Wearable application processors add the ability to run Android Wear or Tizen. This presentation by Linley Gwennap, principal analyst at The Linley Group, will describe our segmentation of the IoT processor industry, and provide a comparison of the leading devices in each category.
1:45pm-3:20pmSession 4: IoT Security IP

Establishing a secure Internet of Things extends from client devices on the edge to the sensors hubs and gateways that connect them to cloud platforms and services. To ensure the security of their IoT designs, engineers must select the optimal set of hardware/software components that fit with their performance, cost, and power objectives. This session, moderated by Loyd Case, senior analyst at The Linley Group, will present solutions for building a secure IoT device with licensable IP cores.

Protecting IoT SoCs with a Secure Hardware Root of Trust
Dana Neustadter, Sr. Manager, Product Marketing, Synopsys

Creating trust in IoT devices begins early in the design process and figures in manufacturing, service, and maintenance processes from fabrication to end-of-life. Building an isolated secure environment within the SoC protects the device from malicious attacks. This session discusses how a trusted environment with a Root of Trust secure module maintains SoC integrity throughout a device's life-cycle, and enables secure debug and field updates for industrial control, IoT nodes, and networking applications.

HW to Secure Your (IoT) Product
Ron Keidar, Security Architect and Senior FAE, INSIDE Secure

WikiLeaks opened a Pandora box by releasing hacking tools developed by the CIA. This led to the WannaCry ransomware attacks, with more likely to follow. Public awareness of such security issues will play a major role in the IoT's long-term growth. In this presentation, we'll describe the process of securing an IoT device by assembling security building blocks into a sample solution that includes INSIDE Secure's best-fit crypto engines, packet engines, and hardware-security module IP cores.

Strong and Flexible Chip-to-Cloud Security for IoT
Steve Singer, Senior Director, WW Field Applications Engineering, Rambus

Securing the Internet of Things (IoT) is a daunting task due to the cost restrictions and fractured nature of the ecosystem. Any set of solutions will need to be flexible and easy to implement while securing against a wide array of attacks. We will explore the challenges associated with securing IoT devices and services from a holistic perspective. In addition, we will discuss potential methods for plugging the security gaps, from a hardware root of trust to key provisioning to security-as-a-service to device monitoring.

This session includes a panel discussion and Q&A featuring the above speakers.

3:20pm-4:30pm“Happy Hour” – Sponsored by Synopsys


Premier Sponsor

Gold Sponsor

Andes Technologies

Industry Sponsor