IoT is a business revolution enabled by technology. Organizations are already seeing significant monetary benefits from insights they gain by connecting their assets to an IoT platform. However the barrier to entry for Iot applications is still very high. Cloud IoT platforms have to make it extremely easy to build a complete solution out of a set of core components. In this talk we will go over some of the challenges and how platform vendors like Microsoft are simplifying IoT. Presentation
Affan Dar (Principal Group Software Engineering Manager, Azure IoT Platform, Microsoft): Simplifying IoT with Cloud and Edge
Commercial machine learning systems traditionally require that data be uploaded to a datacenter where learning algorithms are run. However, concerns about privacy, energy, and latency in the Internet of Things has led to techniques that push machine learning to the edge of the network. In this talk I'll provide an overview of several approaches from the research community and from my work at AlgoSnap and at Samsung Research. I'll also raise key issues and problems for further discussion. Presentation
Evan Welbourne (Amazon): Learning at the Edge
Anind Dey (Carnegie Mellon University): GIoTTO: An Open-Source IoT Framework
My group at Carnegie Mellon was the recipient of a large targeted Google grant to support and Expedition effort on the Internet of Things. With that support, we have designed and implemented GIoTTO, a scalable and open-source infrastructure to support IoT deployments and applications (iotexpedition.org/). While most IoT infrastructures are cloud-based and support connecting sensors and actuators together, ours also focuses on privacy and security, machine learning and the end-user experience. We have deployed GIoTTO in several locations and have built a wide variety of applications to meet our goal of creating a living IoT laboratory at CMU. Presentation
Artur Laksberg (Microsoft): Intelligent IoT Edge: The View from Microsoft
We're seeing the emergence of a new trend in the IoT industry - the decentralization of the computing infrastructure with an increased emphasis on local, or locally distributed compute. Broadly speaking, we call the devices with increased compute capabilities the "IoT edge" devices.
The trend is apparent on both the supply and the demand sides of the industry. On the supply side, the growth of the compute power is realized through the continuing exploit of the Moore's Law, as well as increased heterogeneity of silicon. In addition to CPU and GPGPU, hardware manufacturers add specialized processing units to get an edge (pun intended) over the competition.
Examples include Intel's acquisition of Movidius and Nervana and Qualcomm's introduction of Neural Processing Units. With Core ML, Apple is adding machine learning capabilities into their operating system. Google has announced that a version of TensorFlow will be added to the next version of Android.
At the same time, customers demand more from their IoT devices. Instead of being merely a sensor or an actuator, they want an intelligent device that is still connected to the cloud but also performs local compute - be it computer vision, machine learning, data cleanup etc. These intelligent devices must handle limited or intermittent network connectivity common in IoT. Often, the data simply cannot be sent to the cloud due to security and privacy concerns. Finally, there are scenarios where network-imposed latency is not acceptable.
We must take advantage of this trend to sustain and grow our business, and deliver solutions that our customers demand. Presentation
Suman Banerjee (University of Wisconsin): Intelligent Edge for Education
Delivering quality education today requires students to have hands on access to high-end computing platforms and technologies on which they get hands-on training. While it is available to some students, many are not always as fortunate. An obvious solution is to use available cloud infrastructure to bridge this divide for students who lack suitable access. In this talk I will describe some ongoing successes and key challenges that arise in the context of online mechanisms to for training people in software tools, and the potential use of edge platforms to meet some of the goals. Presentation
Steve Hodges (Microsoft Research): Building connected devices
Two common expectations for the coming decade are an explosion in the number of connected devices and a significant shortage of computer science skills in the workforce. I will briefly talk about two projects at Microsoft which make it easier to prototype connected devices with the collective aims of inspiring students to pursue computing as a career whilst enabling developers with computer science skills to get hands-on with embedded device hardware. Presentation
Vamsi Talla (Jeeva Wireless): Enabling cheap and reliable connectivity for the next billion devices
The vision of embedding connectivity into billions of everyday objects runs into the reality of wireless communication - there exists no wireless technology that can provide reliable and long-range communication as well as cost less than a dime. While backscatter is low-power and low-cost, it is known to be limited to short ranges. In this talk I will overturn this conventional wisdom about backscatter and present the first wide-area backscatter system developed by Jeeva Wireless. Our design can successfully backscatter from any location between an RF source and receiver, separated by 475 m, while consuming less than 25 μW of power from tiny button cells, printed batteries and being compatible with commodity hardware. Further, we have demonstrated that our system achieves reliable coverage in a 4,800 ft2 house spread across three floors, a 13,024 ft2 office area covering 41 rooms, as well as a one-acre vegetable farm using only a single RF source and receiver. We also build a contact lens prototype as well as a flexible epidermal patch device attached to the human skin and show that these devices can reliably backscatter data across a 3,328 ft2 room. This is orders of magnitude larger range than prior backscatter designs. We believe that Jeeva's near zero-power, inexpensive and scalable communications technology can unleash the true potential of ubiquitous connectivity embedded in everyday objects and power billions of Internet connected devices in the near future. Presentation
Vikram Iyer (University of Washington): 3D Printing Internet Connected Objects
Our goal is to 3D print wireless sensors, input widgets and objects that are connected to the Internet ecosystem, without the need for batteries or electronics. To this end, in this talk we present a novel computational toolkit for wireless connectivity that can be integrated with 3D digital models and fabricated using commodity desktop 3D printers and commercially available plastic filament materials.
Specifically, we introduce the first computational methods that 1) send data to commercial RF receivers including Wi-Fi, enabling 3D printed wireless sensors and input widgets, and 2) embed data within objects using magnetic fields and decode the data using magnetometers on commodity smartphones. To demonstrate the potential of our techniques, we design the first fully 3D printed wireless sensors including a weight scale, flow sensor and anemometer that can transmit sensor data. Furthermore, we 3D print various objects including eyeglass frames, armbands as well as artistic models with embedded magnetic data. Finally, we present various 3D printed application prototypes including buttons, smart sliders and physical knobs that wirelessly control music volume and lights as well as smart bottles that can sense liquid flow and send data to nearby RF devices, without batteries or electronics. Presentation
Alanson Sample (Disney Research): Rethinking the RF physical layer to enable the next generation of IoT sensors
While radio technology is a fundamental element of IoT networks, there is the opportunity to re-examine the RF physical layer and explore novel means of using electromagnetic waves for sensing, energy transfer, and communication. This talk presents an overview of several ongoing research projects at Disney Research. First, ID-Sense uses commercially available, long-range RFID tags to enable battery-free human object interaction detection. Usage examples include activity inferencing in the home or office, interactive toys, and the identification of consumer shopping habits. Next, Quasi-Static Cavity Resonance based wireless power transfer enables a seamless user experience where devices are recharged as easily as data is transferred through the air. Our technique enables purpose-built rooms to generate quasi-static magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. Lastly, ultra-wideband ambient backscatter techniques are described that leverage the breath of commercial broadcast signals from 80 MHz to 1000 MHz from sources such as FM radios, digital TVs, and cellular networks to enable ultra-low power communication throughout an office space. Presentation
Saman Naderiparizi, University of Washington: Battery-free Cameras for IoT
Wireless video streaming has traditionally been considered an extremely power-hungry operation. Existing approaches optimize the camera and communication modules individually to minimize their power consumption. However, the joint redesign and optimization of wireless communication as well as the camera is what that provides more power saving. We start with presenting WISPCam which is, what we believe, the world's first wireless battery-free camera. Building on top of WISPCam, we also present an ultra-low-power wireless video streaming camera. To achieve this, we discuss a novel "analog" video backscatter technique that feeds analog pixels from the photo-diodes directly to the backscatter hardware, thereby eliminating power consuming hardware components such as ADCs and amplifiers. We prototype our wireless camera using off-the-shelf hardware and show that our design can stream video at up to 13 FPS and can operate up to a distance of 150 feet from the access point. Our COTS prototype consumes 2.36mW. Finally, to demonstrate the potential of our design, we built two proof-of-concept applications: video streaming for micro-robots and security cameras for face detection. Presentation
Joshua Smith (University of Washington): Battery-free Cellphones
I will briefly review the opportunity for battery free sensing platforms, and then describe a recent, exciting example: the battery free cell phone. Presentation
Ranveer Chandra (Microsoft): FarmBeats: AI and IoT For Data-Driven Farming
Data-driven techniques can help boost agricultural productivity by increasing yields, reducing losses, and cutting down costs of supplies. However, barriers to adopting these techniques include the high costs associated with collecting data manually and limited connectivity to networks. FarmBeats demonstrates a seamless end-to-end platform for agriculture that combines Internet of Things for data collection from various sensors, cameras and drones; connectivity using the TV White Spaces spectrum; and analysis of the data via vision and machine learning algorithms. The system design explicitly accounts for weather-related power and Internet outages, which has enabled the system to be successfully deployed for six-month stints in two US farms. Presentation
Klara Nahrstedt (University of Illinois, Urbana-Champaign): Exploring IoT Co-dependencies in Electro-Mobility
In smart cities, we are facing heterogeneous static and mobile Internet of Things (IoT) as part of smart services that depend on each and need to collaborate with each other to provide utility to the citizens. One already sees the co-dependence of IoT devices, protocols and information in food-energy-water sectors. In this talk, I will talk about co-dependence, collaboration and interoperability challenges among energy-automobile-telecommunication-roads sectors and their IoT devices when one desires ubiquity of electric vehicles and plug-in hybrid vehicles deployment. Because of major advances in energy storage, wireless charging and autonomous driving expected by 2050, we will see a tremendous impact and challenges on next generation cyber-physical systems and IoT to acquire, manage, analyze, reason, direct, actuate and secure all digital information around co-dependent resources involved in electro-mobility. I will present few examples of challenging electro-mobility scenarios where co-dependence among IoTs embedded in EVs, roads, power grid must be considered carefully. Presentation
Edward Wang (University of Washington): Changing the way we diagnose health using mobile and IoT technologies
The widespread adoption of smartphones provides an opportunity to access sensor systems that are already everywhere to address the currently uneven distribution of health care diagnostics available in the world. At its core, sensors on the phones (i.e. cameras, microphones, accelerometers) are similar to those in medical devices. By pairing sensors with analysis powered by machine learning, we have demonstrated it is possible to convert smartphones into medical devices with an app download. HemaApp, uses the smartphone camera and LEDs to measure the color of the blood at the finger to perform blood analysis for hemoglobin levels accurate enough to perform anemia screening. Biliscreen, using similar concepts, allows the user to take a selfie to screen for pancreatic cancer by looking at yellowing in the whites of their eye. BPApp, takes advantage of the microphone and camera of the phone to measure the person's blood pressure in the comfort of their own home. The aim of these systems is not to replace clinics, but rather provide better availability for rural screening and at home monitoring of health conditions that would otherwise be too costly to monitor. The smartphone, with its slew of sensors and on-board computation is allowing us to explore vital monitoring in new contexts and generate this new paradigm for widespread monitoring and, while also identifying limitations that would be better addressed using other form factors. As we move forward, the explorations we make on smartphones for health monitoring is only a first step in this concept of embedding the clinic into the fabric of everyday life. Beyond smartphones, wearable technologies are opening new opportunities for continuous monitoring that one would have only expected in the ICU. Glabella, is a blood pressure monitor embedded into a pair of glasses that can track changes in blood pressure throughout the day. With it, we can monitor effects of behavior, activities, medication, and posture changes on blood pressure. Environmental sensors can also be re-imagined to provide richer health information, such as using the bathroom scale to also monitor blood pressure or using motion sensors in the house to monitor mobility in order to perform early predict pain onsets for sickle cell patients. The proliferation of the IoT ecosystem will contribute to better distribution of health care diagnostic capabilities and ultimately provide previously unavailable treatment solutions for people around the world.
Deepak Ganesan (UMass Amherst): Towards continuous measurement of cognitive state and addictive behavior in natural environments
Wearable sensors offer tremendous opportunities for accelerating biomedical discovery, and improving population-scale health and wellness. There is a growing appetite for health analytics - we are no longer content with wearables that count steps and calories, we want to measure physiology, behavior, activities, cognition, affect, and other parameters with the expectation that such data will lead to deep insights that can improve quality of life.
In this talk, I will describe some of our work on designing new wearable devices that expand our ability to sense human states, as well as methodological challenges that emerge in analyzing continuous sensor data in natural environments. Specifically, I will talk about iShadow, a low-power computational eyeglass that enables continuous measurement of gaze, pupil dilation, saccades, and blinks can provide a window on cognitive state such as attention, fatigue, and dopamine levels, thereby allowing us to design the next generation of digital biomarkers. I will also briefly discuss our experiences with measuring cocaine usage in natural settings, and the challenges we face in using wearables for understanding addictive behavior. Presentation
Rahul Bhattacharyya (MIT): Low-cost, pervasive sensing leveraging existing wireless infrastructure
There are many applications, particularly in the developing world, that suffer from a lack of visibility due to limited sensing data. At the same time, there are many well established wireless communication technologies that are amenable to low-cost, pervasive sensor development. In this talk I present example applications including the use of RFID tags for agriculture or medicine, and smartphones for vehicular monitoring. Presentation
Jean Camp (Indiana University): Risk Communication as Security Interaction in the IoT
Security in the IoT requires useable incentive-aligned systems. Incentives require two conditions. First, the incentives must be visible. Second, there must be a clear action to take in response to the incentives. Incentive alignment requires usability and risk communication. Both of these outcomes are the goal of translucent design. A truly transparent design can overwhelm and under-inform the user with information about configuration, the nature of the security technology, and the elements of a risk that are mitigated. Opaque designs enable the user take an action seamlessly rather than requiring some understanding of the underlying system design. However, security choices inherently require some information, or the default option is to prevent all risky behaviors without interaction. In fact, blocking desired action without communication is one reason that individuals may abandon security technologies even when the risks these technologies mitigate are known.
Risk communication allows individuals to easily see the consequences of their action. The ideal of making visible user-action-system-consequence may be overwhelming or context-dependent. Risk communication is neither transparent nor opaque; but rather consists of security technologies that are easy to use, communicate risk choices only to the degree necessary to avoid inadvertent fatal choices, can be overcome in a straightforward manner if the individual chooses to take a risk, or if the system is in error. Presentation
Anat Caspi (UW Allen School): Independent mobility in the Connected City: IoT-enabled Pedestrian-Centered Mobility for People with Disabilities and Older Adults
Current transportation systems offer inadequate mobility solutions to millions of people with disabilities and older adults. This deficiency impacts people's ability to complete important tasks, obtain regular employment, commute to appointments, or fully engage in community life. Recent advances in automated vehicles, personalized mobility, connected urban infrastructure, and pedestrian-based technologies are enabled by wireless communications that connect travelers and their mobile devices, vehicles, and street infrastructure.
The smart, connected city and other complementary technologies have the potential to bring about transformational changes to the lives of people with mobility challenges. While major efforts to support automated vehicles and smart city infrastructure are underway in both public and private sector, it is important to explore pathways that ensure these new technologies are accessible and available to everyone. The Taskar Center for Accessible Technology is currently pursuing three specific projects along this front: short range communication between pedestrian traffic lights and mobile-devices to enable green light alerts, and an autonomous wheelchair project allowing accessible pedestrian path choices informed by a connected city. Additionally, we are using the sensed connected environment (by way of deployed sensors around the city) to offer informative map overlays and personalized routing through multi-variable cost functions that reason about the best route viz-a-viz transient environmental data (weather changes, 'temperature as felt on the ground', sun cover, pollution, pollen, etc.)
Aakanksha Chowdhery (Princeton): Video analytics at scale for mobile Internet-of-things platform
Content-rich sensors, such as video cameras, are growing at an astonishing rate with emerging applications in traffic monitoring, surveillance for smart cities, and connected vehicles such as drones. Today, most of this collected video sensor data is stored close to the point of capture and is not easy to search even when timely remote access will provide valuable real-time insights. Emerging applications of Internet of things (IoT) need intelligent solutions to decide what data to analyze locally, what data to transmit to server without taxing network constraints to get a timely response, and how to use the responses for control and coordination among a network of IoT devices. My research focuses on the design of novel architectures and algorithms for IoT that can intelligently leverage edge computing and networking to minimize network traffic and response latencies. Presentation
James Fogarty (UW Allen School): The Data is the Interaction
The full-scale arrival of Ubiquitous Computing and the Internet of Things presents everyday people with unprecedented personal data. But we often lack an understanding of how to design for interaction with this new data, so we instead just copy forward the prior interaction. As we design for the new data enabled by this new generation of technologies, we must rethink underlying questions of their benefits, burdens, and control. It is us who will decide whether this new data is for people, or merely about them. Presentation
Hamed Haddadi (Imperial College London): Containing Personal Data Processing with the Databox
We are all increasingly the subjects of data collection and processing systems that use data generated both about and by us to provide and optimise a wide range of services. Means for others to collect and process data that concerns each of us -- often referred to possessively as "your data" -- are only increasing with the long-heralded advent of the Internet of Things just the latest example. In response to these challenges we have proposed the Databox, a collection of physical and cloud-hosted software components that provide for an individual data subject to manage, log and audit access to their data by other parties. We will sketch the background to Databox, before discussing in more detail the platform design and implementation, as well as how we are addressing challenges in distributing analytics. For more information, see www.databoxproject.uk or join the discussions at forum.databoxproject.uk. Presentation
Lynette Millett (National Academy of Sciences): Avoiding Predictable but Alarming Trajectories
How does IOT exacerbate (or address) known security and privacy challenges that arise when people, data, networks, communications, and things interact? Cryptographic agility and software update serve as illustrative security mechanisms to consider -- how well, or not, can they work in IOT domains? What new challenges are emerging? To what extent will relying on understood mitigations suffice for IOT and what sorts of new solutions are needed?
Josh Siegel (MIT): Context and Cognition for a Secure and Efficient IoT
The Internet of Things has the potential to transform industries, but its rapid growth is constrained by substantial device resource requirements and user concerns about system security. Practitioners must contend with systems having limited battery power, costly bandwidth, and constrained computation while ensuring timely performance and security for sensitive data and actuators. Solving these problems is a challenge, and many contemporary efforts to do so have been tailored to specific applications. Such purpose-built solutions are not scalable and cause further fragmentation and stratification in IoT.
Meeting the need for enhanced resource efficiency and system security, I will present a generalizable "cognitive" and context-aware architecture for IoT. This human-inspired approach builds upon common Cloud models and employs model-based "Data Proxies" to turn sparse physical system data into rich digital representations. A related "Cognitive Layer" applies these same models to identify impending system faults and to apply a context-aware firewall capable of blocking malignant commands. This approach shifts computation from end devices into the Cloud, where computation and other resources are abundant and readily scalable.
I will close by examining sample applications for this architecture drawing from the automotive domain to show what is possible when connectivity is made safe and efficient. Presentation
Dave Thaler (Microsoft): Trusted Cyber-Physical Systems
IoT systems, also known in some contexts as "cyber-physical" systems, have the potential to change the way people live and work. With this potential comes the potential for dire consequences if things go wrong. Scarcely a week goes by without seeing news articles about IoT hacks and ransomware, which causes justifiable reluctance to enable any connectivity to devices with privacy-sensitive data or potentially life-threatening safety concerns. Using hardware-enforced trusted execution environments end-to-end can provide an important defense that may be critical to getting significant deployment. Presentation
Philip Levis (Stanford): Safely and Efficiently Programming a 64kB Computer
Tock is a secure OS kernel for embedded IoT devices. Tock is written in the Rust language. Tock uses a combination of hardware and Rust's software protection mechanisms to simultaneously provide concurrency, efficiency, liveness, isolation, and multiprogramming properties that were previously unachievable in embedded systems. Presentation
Ben Zorn (Microsoft): Building an Internet of Things We Can Trust
The Internet of Things has the potential to transform society, economies, and science. The combination of IoT devices with sensors and actuators connected to cloud services with powerful machine learning capabilities creates dramatic new opportunities to gather and process data in real time. While IoT + cloud technology is transformative, the pervasive deployment of IoT devices raises significant concerns about safety, security, and privacy, including emerging threats from unintended consequences like massive botnets. Fortunately, significant advances in computer-supported reasoning are enabling software verification techniques to be applied at a scale previously unavailable. I'll describe the ambitions and progress of one project, Everest, which is attempting to verify the entire HTTPS software stack. Even with significant advances in formal methods, new application development that leverages machine learning is already pushing new boundaries of what is possible to verify and even what verifying such systems means. Presentation
Peter Bodik (Microsoft Research): Optimizing Edge-Cloud IoT Applications for Performance and Cost
Abstract forthcoming. Presentation
Prabal Dutta (Berkeley): Signpost: Sensors for Urban Monitoring
Abstract forthcoming. Presentation
Dan Lieberman (Pioneer Square Labs): Taking Enterprise IoT from Prototype to Production
According to a recent Cisco survey 75% of Enterprise IoT projects fail and 60% of projects never make it past the proof-of-concept stage. To accelerate the process and reduce the barriers in moving from prototype to production, there are 4 key areas that we are working to address: improving the end-user experience and simplifying the deployment process, building security & privacy in from the ground up, removing the "science project" from the prototyping process, and creating a smooth path to take a prototype to a finished product at scale.
Chenyang Lu (Washington University): Dependable Internet of Things
IoT-driven control underpins many IoT applications in industries and smart cities. In contrast to best-effort IoT often found in consumer markets, there remain daunting challenges to develop IoT systems that not only monitor but also control physical systems in a dependable fashion. We will highlight the dependability challenges caused by communication delays, data loss and resource constraints of IoT. We will further discuss cyber-physical co-design as a key approach to achieve dependable control based on IoT. Presentation
Steve Myers (Indiana University): Long-lived cryptography for long-lived devices and secure updating in the IoT
The long lived nature of many IoT devices suggest that they will need cryptographic technology that remains secure over longer life cycles than most IT has traditionally considered. For example, one only expects to replace a furnace every 15-25 years. This has implications for key-length selection, and cryptographic algorithms. For example, will quantum computers finally be a reality in 10 years, requiring post-quantum cryptographic primitives? Many IoT devices being deployed today need to consider these lifecycles, and secure firwmare upgrade cycles to support possible changing cryptographic primitives. I'll discuss these issues and preliminary work on getting lattice based cryptography working on low-power devices.
Thomas Pfenning (Microsoft): Windows IoT
Microsoft is offering an operating system for the IOT market. This talk will cover the latest developments and future investments. Presentation
Matt Reynolds (University of Washington): Wave Imaging and Long-Range Wireless Power
Wireless signals can do more than communicate - they can also be used for high resolution imaging and long range wireless power. I will highlight some recent work from my lab, including a high resolution millimeter wave massive MIMO imaging system as well as progress toward long range, high efficiency wireless power with focused microwave and millimeter wave beams.
Stefan Thom (Microsoft): How to fight an adversary that is not bound by the linearity of time?
Processors are not bound by the same physics that humans are. They can essentially jump to any point in 'time' by repositioning the instruction pointer to freeze, repeat and skip any 'moments' they perceive. This makes enforcement of security policies on a device from the viewpoint of a human very unpredictable, unless they are designed them with a very human quality: To 'forget' things.
Chris Diorio (CEO, Vice Chairman, and Founder at Impinj): The Littlest Biggest Internet Opportunity
We are fast approaching a day when trillions of everyday items are connected to the Internet. This connectivity presents both challenges and opportunities for the IoT. In this talk I will review RAIN RFID's significant role in connecting everyday items and will then propose a framework for addressing those IoT challenges and opportunities. Presentation
James Landay (Stanford): Out of body User Experience
Today's most common user interfaces represent an incremental change from the GUI popularized by the Apple Macintosh in 1984. Over the last 30 years the dominant hardware has changed drastically while the user interface has barely moved: from one hand on a mouse to two fingers on a panel of glass. I will show how interfaces we are designing take an even more radical approach, moving the interface off the human body altogether and onto drones that project into the space around people. Presentation
Rajalakshmi Nandakumar (UW Allen School): Interacting with small devices using active sonar
Abstract forthcoming. Presentation
Joe Paradiso (MIT Media Lab): Sir/Cortanai/Alexa vs. the Other Me - Pre-Cognitive Human Extension as the Future of IoT
We have already witnessed profound and often unanticipated developments as IoT starts to build out and the world is mediated via a mainly graphic wireless device held at arm's length. But what will happen once the world is precognitively interpreted by what we term 'sensory prosthetics' that change what and how humans physically perceive, a world where your own intelligence is split ever more seamlessly between your brain and the cloud? Accordingly, this talk will overview the broad theme of interfacing humans to the ubiquitous electronic "nervous system" that sensor networks will soon extend across things, places, and people, going well beyond the 'Internet of Things,' to challenge the notion of physical presence. I'll illustrate this through two avenues of research - one looking at a new kind of digital "omniscience" (e.g., different kinds of browsers for sensor network data & agile frameworks for sensor representation) and the other looking at buildings & tools as "prosthetic" extensions of humans (e.g., making HVAC and lighting systems an extension of your natural activity and sense of comfort, or smart tools as human-robot cooperation in the hand). Presentation
Gregory Abowd (Georgia Tech): Extreme Ubiquity: De-emphasizing the importance of Moore's Law
I will describe an effort at Georgia Tech to rethink the driving features of computational devices through the exploration of advances in materials science, energy harvesting and computational architectures. Rather than focusing on decreasing feature size of computational elements, we emphasize creating computational materials that can harvest the energy needed to compute, store, sense, actuate and communicate. The goal for producing these computational materials is to manufacture them at rates comparable to building materials, a phenomenon I refer to as the COSMOS Conjecture.
Ron Zahavi (Chief Strategist for IoT standards at Microsoft for Azure IoT): IoT Success Factors & Business Models
In this session I will describe how IoT combines elements of existing and new capabilities into systems of systems that can be highly complex, involving many new business models. I will then review issues and pitfalls to avoid, different business models, and the elements existing organizations ongoing transformation, as well as startups, need to succeed in the new IoT connected world. Presentation
Please check back for updates.
Last updated: 8 August 2017
Paul G. Allen School of Computer Science & Engineering
University of Washington
185 E Stevens Way NE
Seattle, WA 98195
Copyright © 2017 University of Washington - Seattle - Paul G. Allen School of Computer Science & Engineering | All Rights | Privacy | Terms