Where Industry Meets Innovation

  • Contact Us
  • sign in Sign In
  • Sign in with certificate
mit campus

Past Conferences

Conference Details - Agenda

ILP Conference overview header image

2019 MIT Information and Communication Technologies Conference

Digital Frontiers
April 9-10, 2019
Day 01 Day 02 | All

Day 1: Tuesday, April 9, 2019

8:00 - 9:00

Registration with Light Breakfast

9:00 - 9:15

Welcome Remarks

9:15 - 9:50

Introduction to Quantum Computing
In this talk, we will introduce quantum computing. Quantum computers are fundamentally different than conventional computers. They promise to solve important problems that are practically prohibitive and even impossible to implement using today’s supercomputers. The challenge is building one that is large enough to be useful. We will review the state-of-the-art today, discuss the path forward, and highlight the MIT Center for Quantum Engineering and the role it will play in helping to define the quantum future.

9:50 - 10:25

How to Survive and Thrive in the Third Digital Revolution
The first digital revolution was in communication, the second in computation. The third digital revolution, in fabrication, is now completing the first two by bringing the programmability of the digital world out into the physical world. I will survey opportunities for aligning the representations of hardware and software, and explore the implications of exponential scaling in going from bits to atoms (and back).

10:25 - 10:30

MIT Professional Education
MIT Professional Education (http://web.mit.edu/professional) provides a gateway to MIT expertise and knowledge for science and engineering professionals around the world. Through MIT Professional Education programs taught by renowned faculty from across the Institute, technical professionals have the opportunity to gain crucial and timely knowledge in specialized fields, to advance their careers, boost their organization performance, and help make a difference in the world.

ILP members receive a 15 percent discount on all MIT Professional Education Short Programs and Digital Programs at time of registration.
Read More

10:30 - 10:50

Networking Break

10:50 - 11:25

Cyber Security of IoT
How can you protect yourself against threats you don’t know about? What measures can you take to assess your risk before a breach? How can you protect yourself against an attack that originates in an innocuous object like a toaster? Professor John Williams will discuss how organizations can prepare themselves to defend against cybersecurity threats to protect their enterprises. He will discussrisk a modeling and data analytics tool (Saffron), that helps to identify risk tolerance and strategies for assessing, responding to, and monitoring cyber security risks.
Read More

11:25 - 12:00

Situational Awareness Tool for Cyber Security Event Prediction and Quantification (SAFFRON)
SAFFRON is a risk modeling and data analytics tool that allows energy delivery OT operators to better understand the risks associated with cyber threats. At present they do not have the capability to fully understand the risks associated with the cyber threats of today and tomorrow – risks that will continue to grow as Information Technology (IT) and Operations Technology (OT) networks increasingly integrate. It is important to have a better understanding of these risks, costs, and potential consequences. This aggregation of risk data will inform EDS OT operators in understanding how risk changes as the software deployed changes, and support actions (i.e., identify corrective actions that reduce the risk.) Similarly, risk computation will support operators in equipment replacement and procurement by quantifying device risk and impact on the network. SAFFRON has developed a risk model and data analytics tool, along with the necessary algorithms that identify risk tolerance and strategy for assessing, responding to, and monitoring cyber security risks. Foundational validated research is presingly neededed to develop risk models and visual analytics that are understandable to OT operators and leads to or even suggests corrective action. The tool uses a simulation model of the physical/IT system and acts as a proxy for the physical infrastructure.
Read More

12:00 - 12:40

MIT Startup Exchange: Introduction with Lightning Talks

MIT Startup Exchange actively promotes collaboration and partnerships between MIT-connected startups and industry. Qualified startups are those founded and/or led by MIT faculty, staff, or alumni, or are based on MIT-licensed technology. Industry participants are principally members of MIT’s Industrial Liaison Program (ILP).

MIT Startup Exchange maintains a propriety database of over 1,500 MIT-connected startups with roots across MIT departments, labs and centers; it hosts a robust schedule of startup workshops and showcases, and facilitates networking and introductions between startups and corporate executives.

STEX25 is a startup accelerator within MIT Startup Exchange, featuring 25 “industry ready” startups that have proven to be exceptional with early use cases, clients, demos, or partnerships, and are poised for significant growth. STEX25 startups receive promotion, travel, and advisory support, and are prioritized for meetings with ILP’s 230 member companies.

MIT Startup Exchange and ILP are integrated programs of MIT Corporate Relations.
Read More

Startup Lightning Talks Part I
Frontiers of Technology
- Secure AI Labs: Streamlines data access for business analytics
- Lightelligence: Optical chips for machine learning
- Zapata Computing: Algorithms for quantum computing
- Labber: Firmware for quantum computing
- Top Flight Technologies: Heavy lift, long range hybrid-electric UAVs
- DeepMagic: Vision & AI for frictionless retail

Startup Lightning Talks Part II
Smart Manufacturing
- Inkbit: Vision-based 3D printing
- Righthand Robotics: Robots for piece-picking and packaging
- DUST Identity: Trusted physical identity with diamond dust
- Sentenai: Optimizing operational data for equipment monitoring
- BlinkAI: Imaging AI for autonomy, robotics, sensing

12:40 - 12:45

MIT and the Cambridge Innovation Cluster

12:45 - 2:00

Lunch with Startup Exhibit
Additional exhibiting IT and IoT startups:
- Abstract: Discover hidden factory with retrofit sensors & video
- Gradient: Authentication for IoT & edge devices
- IIoT-OXYS: Industrial IoT and domain-specific machine learning
- DeepWeb: Macro trends visualization and analysis for finance and research
- Silverthread: Improving software health and economics
- Posh: Conversational AI for customer service & helpdesk

2:00 - 2:35

The Network in Network Coding
In this talk, we overview the application of random linear network coding (RLNC) in a variety of layers of the network, ranging from right above the physical layer to the application layer. We show that coding can be included in a flexible fashion at multiple layers, without the need for selecting a single layer. We provide a few use cases.

2:35 - 3:10

Computational Design and Manufacturing
Over the next few decades, we are going to transition to a new economy where highly complex, customizable products are manufactured on demand by flexible robotic systems. This change is already underway in a number of fields. For example, additive manufacturing is revolutionizing production of parts in consumer, aerospace, automotive, and medical industries. Overall, these new machines enable batch-one manufacturing of products that have unprecedented complexity.

In this talk, I will present a new computational design and manufacturing workflow that draws inspiration from computer architectures, programing languages, and program synthesis. I will describe how designs can be synthesized from their functional specifications to the corresponding low-level instructions that are executed on intelligent manufacturing hardware.
Read More

3:10 - 3:45

Creating the Next Generation Enterprise
How will your company compete in the digital economy? Based on her book What’s Your Digital Business Model? (Harvard Business School Press, 2018), co-authored with Peter Weill and cited by Forbes as one of the top ten business books in 2018, Stephanie L. Woerner presents six questions for business leaders to answer in order to navigate their digital transformation journeys. Stephanie will describe the future business model framework, based on two dimensions of major change enabled by digitization — getting closer to end consumers and moving from value chains to ecosystems—and show the financial performance of firms pursuing each model with examples drawn from a variety of industries. She will discuss what it takes to succeed in each model and the key capabilities each company must build.
Read More

3:45 - 3:50

MIT Sloan Executive Education
MIT Sloan Executive Education’s non-degree executive programs are led by senior MIT Sloan faculty and provide business professionals from around the world with a targeted and flexible means to advance their career development goals and position their organizations for future growth. Our cutting-edge leadership training includes more than 50 short courses, executive certificates, online courses, custom programs for organizations, and our flagship program, the five-week Advanced Management Program.

ILP members receive a 15 percent discount on selected courses at time of registration.
Read More

3:50 - 4:10

Networking Break

4:10 - 4:45

Scaling ICT Capacity by 1,000,000x at Constant Cost, Energy, and Footprint
During the past two decades, compute performance, measured by GFLOPS, has increased at a rate of 1000x/10yr. Is this pace sustainable for the next two decades? Hardware, software, and system architectures are undergoing radical changes to meet growing ICT demand with available resources. Hardware solutions based on revolutionary electronic-photonic integration are emerging. The endpoint will likely be a sort of worldwide data center that virtualizes distributed resources and provisions them as services with optimized efficiency and performance.
Read More

4:45 - 5:20

Developing privacy-preserving identity systems and safe distributed computation, enabling an Internet of Trusted Data. The Trust::Data Consortium addresses the growing tension between societal data proliferation and data security by developing specifications, software, tools and documentation that help organizations adopt a holistic approach to cyber protection. Trust::Data is building new models for digital identity, data provenance, universal access, and secure privacy-preserving transactions to harness the future potential of global data sharing.

Read More

5:20 - 6:30

Networking Reception

* All schedule and speakers are subject to change without notice.