Is big data more dangerous than it’s worth?
How does machine design affect data security on a network?
What’s the difference between machine-to-machine communications and the Internet of Things?
What is the danger of taking M2M communications to the Internet of Things?
The Internet of Things (IoT) and machine-to-machine (M2M) communications are the same, and yet different, because IoT takes M2M on the Internet. One thing is for sure: It transcends governmental boundaries. Equipment can be anywhere in the world and still be part of the conversation.
This group of heavy hitters in the IoT domain offer an international take on M2M communications and what the future holds. Learn more about IoT and what it means to manufacturing at Smart Industry.
Meet the Panel
Francisco Maroto is managing director and founder at OIES Consulting in Madrid, Spain. He has more than 20 years of international experience with information technology and IoT/ M2M communications. Prior to OIES, he led communications development teams in the Europe, Middle East and Africa (EMEA) market and has helped numerous startup companies with their technology and information-system implementation. He also speaks on M2M communications and IoT at numerous live events.
Nicola De Carne’s passion is connecting the unconnected. He is CEO of Wi-Next in Milan, Italy. He is a hands-on researcher whose primary focus is on changing the Wi-Fi paradigm. Wi-Next works to bring industrial production data closer to systems for advanced analytics and intelligent management decisions. It was recently honored in Gartner’s Cool Vendors in Italy 2015 report for its work with the industrial Internet of Things (IIoT), including Wi-Next’s patented Network Operating System, a dynamically reconfigurable mesh network based on open industry standards.
Anshul Saxena is deputy general manager of IT at Bharti Airtel in New Delhi, India. Airtel has operations in 20 countries across Asia and Africa with more than 300 million customers. Saxena has worked in IT across several industries, including both public and private organizations. He has a master’s degree in computer science from the University of Mississippi and an MBA from Indian Institute of Management—Ahmedabad. A core technologist, Saxena works with upcoming technologies with a keen eye to monetizing them.
Anand Gijare is IoT practice leader with Mind Commerce Publishing, which produces research reports in the areas of IoT, data and analytics, infrastructure, virtualization, big data, business strategy, wearable technology, software and applications. Located in India, Gijare has authored more than 110 reports on various trends, and he regularly tracks technologies and writes about them, as well as market forecasts.
Jonathan Pollet, founder of Red Tiger Security in Houston, is an "ethical hacker" specializing in industrial cybersecurity. He consults for a broad range of manufacturers, energy companies and other critical infrastructure industries. He's presented SCADA security workshops to the FBI, DHS and Utility Telecom Council, and he’s spoken at industry events such as Black Hat, Kaspersky Security Analyst Summit and The Chertoff Group Security Series.
Peter Waher is co-founder and CEO of Clayster Laboratorios in Chile, an IoT solutions company that originated in Scandinavia but that now operates on four continents. Originally a mathematician, commercial pilot and computer games developer, Waher has worked 20 years with computer and device communications, from low-level development in assembler for resource-constrained devices to high-level system design and architecture. He’s a participant in various standardization efforts within IEEE, IEC, ISO, UPnP and XSF, working on standards for the Internet of Things. His work with Smart Applications for the Internet of Things and the development of the IP-TV application, Energy Saving Through Smart Applications, won the Urban Living Labs global showcase award in the Cultural and Societal Participation and Collaboration Tools category.
Click the links below to see what the panel had to say
Is big data more dangerous than it’s worth?
How does machine design affect data security on a network?
What’s the difference between machine-to-machine communications and the Internet of Things?
What is the danger of taking M2M communications to the Internet of Things?