Uncategorized

>> GOOD EVENING. WE ARE HERE TO >> GOOD EVENING. WE ARE HERE TO TALK ABOUT SECURELY UNLOCKING OIT TALK ABOUT SECURELY UNLOCKING OIT WITH YOUR AZURE SPHERE. I’M HALINA WITH YOUR AZURE SPHERE. I’M HALINA MCMASTER AND I HAVE TWO COLLEAGUES MCMASTER AND I HAVE TWO COLLEAGUES STEVE PATRICK AND MARCELLO MAJONCHI STEVE PATRICK AND MARCELLO MAJONCHI AND WE ARE EXCITED TO HAVE DAN APONE AND WE ARE EXCITED TO HAVE DAN APONE FROM STARBUCKS JOIN US. MICROCONTROLLERS FROM STARBUCKS JOIN US. MICROCONTROLLERS ARE LOW COST SINGLE CHIP COMPUTERS ARE LOW COST SINGLE CHIP COMPUTERS THEY ARE ABOUT THE SIZE OF YOUR THEY ARE ABOUT THE SIZE OF YOUR THUMB NAIL AND ARE IN VIRTUALLY THUMB NAIL AND ARE IN VIRTUALLY EVERYTHING FROM AUTOMOBILE TO APPLIANCES EVERYTHING FROM AUTOMOBILE TO APPLIANCES TO MEDICAL DEVICES TO THE ESCALATORS TO MEDICAL DEVICES TO THE ESCALATORS IN THIS BUILDING. WHEN MCU’S WERE IN THIS BUILDING. WHEN MCU’S WERE INTRODUCES THEY WERE NOT CONNECTED INTRODUCES THEY WERE NOT CONNECTED TO THE INTERNET. TODAY ONLY 1 OF TO THE INTERNET. TODAY ONLY 1 OF THEM ARE. THAT’S CHANGING RAPIDLY THEM ARE. THAT’S CHANGING RAPIDLY CONNECTED DEVICES WILL CHANGE THE CONNECTED DEVICES WILL CHANGE THE WAY THAT WE LIVE AND WORK IN WAYS WAY THAT WE LIVE AND WORK IN WAYS WE CAN’T IMAGINE YET. WE ARE SEEING WE CAN’T IMAGINE YET. WE ARE SEEING TRANSFORMATION ACROSS ANY INDUSTRIES TRANSFORMATION ACROSS ANY INDUSTRIES AND THAT’S BECAUSE OF THE VALUE AND THAT’S BECAUSE OF THE VALUE OF CONNECTIVITY BRINGS AND THE OPPORTUNITY OF CONNECTIVITY BRINGS AND THE OPPORTUNITY YOU ARE ABLE TO GET TELEMETRY AND YOU ARE ABLE TO GET TELEMETRY AND UNDERSTAND FEATURE USAGE PATTERNS UNDERSTAND FEATURE USAGE PATTERNS YOU CAN OFFER YOUR CUSTOMER NEW YOU CAN OFFER YOUR CUSTOMER NEW CAPABILITIES, HOST SALES AND NEW CAPABILITIES, HOST SALES AND NEW EXPERIENCES LIKE PREDICTIVE MAINTENANCE EXPERIENCES LIKE PREDICTIVE MAINTENANCE WHEN WE TALK TO CUSTOMER WE TYPICALLY WHEN WE TALK TO CUSTOMER WE TYPICALLY FIND THAT THEY ARE SOLD ON THE VALUE FIND THAT THEY ARE SOLD ON THE VALUE THAT THEY COULD GAIN BUT THEY HAVEN’T THAT THEY COULD GAIN BUT THEY HAVEN’T MOVED AHEAD BECAUSE OF THE RISKS MOVED AHEAD BECAUSE OF THE RISKS SECURITY IS THE BIG CHALLENGE AND SECURITY IS THE BIG CHALLENGE AND THE CONCERN. AND A RECENT STUDY THE CONCERN. AND A RECENT STUDY SHOWED THAT CUSTOMERS WOULD PAY SHOWED THAT CUSTOMERS WOULD PAY 22 MORE ON AVERAGE FOR AN IOT DEVICE 22 MORE ON AVERAGE FOR AN IOT DEVICE IF IT WERE SECURE AND BUY 70 MORE IF IT WERE SECURE AND BUY 70 MORE DEVICES IF THEY WERE SECURE. THOSE DEVICES IF THEY WERE SECURE. THOSE ARE BIG NUMBERS. THAT’S NOT TOO ARE BIG NUMBERS. THAT’S NOT TOO SURPRISING WHEN YOU CONSIDER EVERYTHING SURPRISING WHEN YOU CONSIDER EVERYTHING THAT COULD GO WRONG. YOU COULD HAVE THAT COULD GO WRONG. YOU COULD HAVE YOUR DEVICE RENDERED USELESS, TAKEN YOUR DEVICE RENDERED USELESS, TAKEN OVER MALICIOUS USES. IMAGINE YOU OVER MALICIOUS USES. IMAGINE YOU RELY ON DEVICES AROUND THE WORLD RELY ON DEVICES AROUND THE WORLD TO RUN YOUR BUSINESS AND SUDDENLY TO RUN YOUR BUSINESS AND SUDDENLY THEY ARE ALL BRICKED. THINK ABOUT THEY ARE ALL BRICKED. THINK ABOUT THE LOGISTICS, THE COST OF ROLLING THE LOGISTICS, THE COST OF ROLLING TRUCKS AROUND THE GLOBE, THE DOWN TRUCKS AROUND THE GLOBE, THE DOWN TIME YOU HAVE AND THE DAMAGE THAT TIME YOU HAVE AND THE DAMAGE THAT THIS COULD CAUSE TO YOUR BRAND THIS COULD CAUSE TO YOUR BRAND ROBUST END-TO-END PROCESS SECURE ROBUST END-TO-END PROCESS SECURE IS THE KEY TO ADDRESSING THESE RISKS IS THE KEY TO ADDRESSING THESE RISKS IN ORDER TO BE HIGHLY SECURED, A IN ORDER TO BE HIGHLY SECURED, A CONNECTED DEVICE MUST HAVE THESE CONNECTED DEVICE MUST HAVE THESE 7 PROPERTIES. THESE ARE ACTUAL PROPERTIES 7 PROPERTIES. THESE ARE ACTUAL PROPERTIES THINGS THAT CAN BE MEASURED. THEY THINGS THAT CAN BE MEASURED. THEY ARE NOT SIMPLY PRINCIPALS OR INTENTIONS ARE NOT SIMPLY PRINCIPALS OR INTENTIONS OR ASPIRATIONS. OUR TEAM HAS WRITTEN OR ASPIRATIONS. OUR TEAM HAS WRITTEN A PAPER THAT DESCRIBES EACH PROPERTY A PAPER THAT DESCRIBES EACH PROPERTY IN DETAIL. SOME OF THE PROPERTIES IN DETAIL. SOME OF THE PROPERTIES DEPEND ON HARDWARE. FOR EXAMPLE, DEPEND ON HARDWARE. FOR EXAMPLE, THE HARDWARE ROOT OF TRUST. YOUR THE HARDWARE ROOT OF TRUST. YOUR DEVICE MIGHT PASS THROUGH A WHOLE DEVICE MIGHT PASS THROUGH A WHOLE SALER, A RETAILER AND OTHER SUPPLY SALER, A RETAILER AND OTHER SUPPLY CHAIN PARTNERS UNTIL IT IS INSTALLED CHAIN PARTNERS UNTIL IT IS INSTALLED ONCE INSTALLED IT WILL CONNECT BACK ONCE INSTALLED IT WILL CONNECT BACK TO YOUR ENTERPRISE TO YOUR CLOUD TO YOUR ENTERPRISE TO YOUR CLOUD WHEN THAT HAPPENS YOU WILL WANT WHEN THAT HAPPENS YOU WILL WANT TO KNOW FIRST, THAT THAT DEVICE TO KNOW FIRST, THAT THAT DEVICE HAS AN IDENTITY AND THAT IT IS ACTUALLY HAS AN IDENTITY AND THAT IT IS ACTUALLY YOUR DEVICE AND ITS IDENTITY HASANT YOUR DEVICE AND ITS IDENTITY HASANT BEEN STOLEN. SECOND, WHEN THAT DEVICE BEEN STOLEN. SECOND, WHEN THAT DEVICE BOOTS UP, YOU WANT TO KNOW IT’S BOOTS UP, YOU WANT TO KNOW IT’S THE SOFTWARE YOU PUT ON IT AND NOT THE SOFTWARE YOU PUT ON IT AND NOT SOMEBODY ELSE LIKE A HACKER HAS SOMEBODY ELSE LIKE A HACKER HAS PUT ON IT. THAT’S SECURE BOOT. THIRD, PUT ON IT. THAT’S SECURE BOOT. THIRD, WHEN THAT DEVICE CONNECTS, YOU WANT WHEN THAT DEVICE CONNECTS, YOU WANT TO KNOW IT’S STILL RUNNING THE SOFTWARE TO KNOW IT’S STILL RUNNING THE SOFTWARE YOU PUT ON IT AND NOT SOME OTHER YOU PUT ON IT AND NOT SOME OTHER SOFTWARE THAT HAS BEEN COMPROMISED SOFTWARE THAT HAS BEEN COMPROMISED ALL OF THESE DEPEND ON HARDWARE ALL OF THESE DEPEND ON HARDWARE SOME OF THE PROPERTIES DEPEND ON SOME OF THE PROPERTIES DEPEND ON HARDWARE AND SOFTWARE WORKING TOGETHER HARDWARE AND SOFTWARE WORKING TOGETHER DYNAMIC COMPARTMENTS ARE AN EXAMPLE DYNAMIC COMPARTMENTS ARE AN EXAMPLE IT’S ANALOGOUS TO THE PHYSICAL LAYERS IT’S ANALOGOUS TO THE PHYSICAL LAYERS YOU SEE HERE IN THE CASTLE WALLS YOU SEE HERE IN THE CASTLE WALLS HARDWARE IS REQUIRED TO CREATE BARRIERS HARDWARE IS REQUIRED TO CREATE BARRIERS AND SOFTWARE THAT KNOWS HOW TO CONFIGURATION AND SOFTWARE THAT KNOWS HOW TO CONFIGURATION THAT AND CREATE COMPARTMENTS. THE THAT AND CREATE COMPARTMENTS. THE TWO HAVE TO WORK TOGETHER. SOME TWO HAVE TO WORK TOGETHER. SOME PROPERTIES DEPEND ON HARDWARE, SOFTWARE PROPERTIES DEPEND ON HARDWARE, SOFTWARE AND THE CLOUD WORKING TOGETHER AND THE CLOUD WORKING TOGETHER RENEWABLE SECURE IS AN EXAMPLE RENEWABLE SECURE IS AN EXAMPLE THE ABILITY TO UPDATE YOUR DEVICE THE ABILITY TO UPDATE YOUR DEVICE BECAUSE A VULNERABILITY HAS EMERGED BECAUSE A VULNERABILITY HAS EMERGED WITH SOFTWARE AND SECURITY YOU ARE WITH SOFTWARE AND SECURITY YOU ARE NEV REALLY DONE. HACKERS WILL TRY NEV REALLY DONE. HACKERS WILL TRY TO USE NEW ATTACKS. SO YOU HAVE TO USE NEW ATTACKS. SO YOU HAVE TO HAVE A CLOUD THAT PROVIDES UP TO HAVE A CLOUD THAT PROVIDES UP DATES, SOFTWARE THAT KNOWS HOW TO

DATES, SOFTWARE THAT KNOWS HOW TO ROBUSTLY APPLY UP DATES AND HARDWARE ROBUSTLY APPLY UP DATES AND HARDWARE THAT CAN PREVENT A ROLL BACK ATTACK THAT CAN PREVENT A ROLL BACK ATTACK A ROLL BACK ATTACK IS WHEN YOU HAVE A ROLL BACK ATTACK IS WHEN YOU HAVE VERSION 1 SOFTWARE RUNNING ON YOUR VERSION 1 SOFTWARE RUNNING ON YOUR DEVICE AND A VULNERABILITY EMERGES DEVICE AND A VULNERABILITY EMERGES SO YOU RELEASE VERSION 2. BUT YOU SO YOU RELEASE VERSION 2. BUT YOU NEED TO GUARD AGAINST HACKERS TRICKING NEED TO GUARD AGAINST HACKERS TRICKING YOUR DEVICE AND ROLLING INTO YOUR YOUR DEVICE AND ROLLING INTO YOUR VERSION. YOU HAVE TO GUARD AGAINST VERSION. YOU HAVE TO GUARD AGAINST VERSION 1 EVER RUNNING AGAIN ON VERSION 1 EVER RUNNING AGAIN ON THAT DEVICE. A BLOWN FUSE FOR EXAMPLE THAT DEVICE. A BLOWN FUSE FOR EXAMPLE THIS MIGHT SOUND SCARY. IT IS REALLY THIS MIGHT SOUND SCARY. IT IS REALLY HARD TO BUILD A DEVICE THAT GUARDS HARD TO BUILD A DEVICE THAT GUARDS AGAINST ALL OF THESE RISKS ON AN AGAINST ALL OF THESE RISKS ON AN ONGOING BASIS. YOU HAVE TO HAVE ONGOING BASIS. YOU HAVE TO HAVE TECHNICAL EXPERTISE THAT KNOWS HOW TECHNICAL EXPERTISE THAT KNOWS HOW TO BUILD AND WEAVE TOGETHER ALL TO BUILD AND WEAVE TOGETHER ALL OF THESE COMPONENTS. YOU HAVE TO OF THESE COMPONENTS. YOU HAVE TO HAVE SECURITY EXCEPTESE THAT KNOWS HAVE SECURITY EXCEPTESE THAT KNOWS HOW TO DETECT THREATS. JOW TO HAVE HOW TO DETECT THREATS. JOW TO HAVE INFRASTRUCTURE AND OPERATIONAL EXPERTISE INFRASTRUCTURE AND OPERATIONAL EXPERTISE TO DELIVER UP DATES GLOBALLY AND TO DELIVER UP DATES GLOBALLY AND RAPIDLY. THE COMPLEXITY AND CHALLENGE RAPIDLY. THE COMPLEXITY AND CHALLENGE IN ADDRESSING THIS IS THE PROBLEM IN ADDRESSING THIS IS THE PROBLEM THAT WE ARE ADDRESSING WITH AZURE THAT WE ARE ADDRESSING WITH AZURE SPHERE. THERE ARE THREE COMPONENTS SPHERE. THERE ARE THREE COMPONENTS TO AZURE SPHERE. FIRST WE HAVE OUR TO AZURE SPHERE. FIRST WE HAVE OUR CERTIFIED MCU’S. THIS IS A NEW CLASS CERTIFIED MCU’S. THIS IS A NEW CLASS OF MICROCONTROLLERS THAT WE ARE OF MICROCONTROLLERS THAT WE ARE WORKING WITH OUR PARTNERS TO CREATE WORKING WITH OUR PARTNERS TO CREATE THERE ARE YEARS OF MICROSOFT LEARNINGS THERE ARE YEARS OF MICROSOFT LEARNINGS BUILDING HIGHLY SECURE DEVICES THAT BUILDING HIGHLY SECURE DEVICES THAT HAVE GONE INTO THE IP BLOCK IN EVERY HAVE GONE INTO THE IP BLOCK IN EVERY CHIP. SO MICROSOFT SECURITY TECHNOLOGY CHIP. SO MICROSOFT SECURITY TECHNOLOGY BUILT IN. SECOND, WE HAVE OUR OPERATING BUILT IN. SECOND, WE HAVE OUR OPERATING SYSTEM. WE HAVE A THRUST WORTHY SYSTEM. WE HAVE A THRUST WORTHY PLATFORM WITH HARDWARE AND SOFTWARE PLATFORM WITH HARDWARE AND SOFTWARE WORKING TOGETHER. THIRD WE HAVE WORKING TOGETHER. THIRD WE HAVE OUR SECURITY SERVICES. THIS SERVICE OUR SECURITY SERVICES. THIS SERVICE REACHES OUT AND GUARDS EVERY AZURE REACHES OUT AND GUARDS EVERY AZURE SPHERE DEVICE OUT THERE. IT USES SPHERE DEVICE OUT THERE. IT USES CERTIFICATE AUTHENTICATION FROM CERTIFICATE AUTHENTICATION FROM DEVICE TO CLOUD IDENDIFICATIONS DEVICE TO CLOUD IDENDIFICATIONS THERE IS SO PASSWORDS USED. IT ALSO THERE IS SO PASSWORDS USED. IT ALSO MONITORS THE ENTIRE ECOSYSTEM. IT MONITORS THE ENTIRE ECOSYSTEM. IT PROVIDES UPDATE MECHANISM AND CHANNEL PROVIDES UPDATE MECHANISM AND CHANNEL FOR OS AND APPLICATION UP DATES FOR OS AND APPLICATION UP DATES SO, HOW DO YOU IMPLEMENT AZURE SPHERE? SO, HOW DO YOU IMPLEMENT AZURE SPHERE? WHAT OFTEN COMES TO MIND FOR FOLKS WHAT OFTEN COMES TO MIND FOR FOLKS IS THE GREEN FIELD. BUILDING INTO IS THE GREEN FIELD. BUILDING INTO A NEW DEVICE. YOU CAN ABSOLUTELY A NEW DEVICE. YOU CAN ABSOLUTELY DO THAT. THERE’S ALWAYS THE BROWN DO THAT. THERE’S ALWAYS THE BROWN FIELD. THERE ARE EXISTING DEVICES FIELD. THERE ARE EXISTING DEVICES OUT THERE AND YOU MIGHT NOT BE READY OUT THERE AND YOU MIGHT NOT BE READY YET TO UPDATE THE EQUIPMENT IN YOUR YET TO UPDATE THE EQUIPMENT IN YOUR FACTORY OR BUILDING OR RETAIL ENVIRONMENT FACTORY OR BUILDING OR RETAIL ENVIRONMENT SO WE WILL TALK ABOUT HOW TO GET SO WE WILL TALK ABOUT HOW TO GET STARTED IN THE BROWN FIELD WITH STARTED IN THE BROWN FIELD WITH AZURE SPHERE. WE ARE REALLY EXCITED AZURE SPHERE. WE ARE REALLY EXCITED ABOUT THE GROWTH IN OUR HARDWARE ABOUT THE GROWTH IN OUR HARDWARE E ECOSYSTEM. WE HAVE DEVELOPMENT E ECOSYSTEM. WE HAVE DEVELOPMENT KITS THAT CAN HELP YOU GET STARTED KITS THAT CAN HELP YOU GET STARTED PROTOTYPING. WE HAVE MODULES TO PROTOTYPING. WE HAVE MODULES TO EXCELERATE YOUR TIME TO MARKET EXCELERATE YOUR TIME TO MARKET WE HAVE GUARDIANS POWERED BY AZURE WE HAVE GUARDIANS POWERED BY AZURE SPHERE. I’M GOING TO TURN IT OVER SPHERE. I’M GOING TO TURN IT OVER TO STEVE TO TALK ABOUT GUARDIAN TO STEVE TO TALK ABOUT GUARDIAN MODULES. >> THANK YOU HALIANA. BROWN MODULES. >> THANK YOU HALIANA. BROWN FIELD SCENARIOS INCLUDE EXISTING FIELD SCENARIOS INCLUDE EXISTING DEVICES THAT MAY OR MAY NOT HAVE DEVICES THAT MAY OR MAY NOT HAVE CONNECTIVITY BUILT INTO THEM. THEY CONNECTIVITY BUILT INTO THEM. THEY MAY NOT BE DIRECTLY SUITABLE TO MAY NOT BE DIRECTLY SUITABLE TO BE CONNECTED TO THE INTERNET. I BE CONNECTED TO THE INTERNET. I INVITE YOU TO REVIEW THE 7 PROPERTIES INVITE YOU TO REVIEW THE 7 PROPERTIES MAKE THAT DETERMINATION FOR YOURSELVES MAKE THAT DETERMINATION FOR YOURSELVES HOWEVER, AN A GUARDIAN MODULE IS HOWEVER, AN A GUARDIAN MODULE IS MEANT TO [INAUDIBLE]. LET’S LOOK MEANT TO [INAUDIBLE]. LET’S LOOK AT WHEN YOU WOULD USE A GUARDIAN AT WHEN YOU WOULD USE A GUARDIAN MODULE. A GUARDIAN MODULE IS NOT MODULE. A GUARDIAN MODULE IS NOT A GATE WAY. IT DOES INGEST DATA A GATE WAY. IT DOES INGEST DATA FROM THE DOWN STREAM DEVICE AND FROM THE DOWN STREAM DEVICE AND PERFORM LIMITED PROCESSING AND FILTERING PERFORM LIMITED PROCESSING AND FILTERING AND SECURES THE DOWN STREAM DEVICE AND SECURES THE DOWN STREAM DEVICE AS A CONNECTIVITY SERVICE. WE SUPPORT AS A CONNECTIVITY SERVICE. WE SUPPORT WIFI AND ETHERNET TODAY. FOR DOWN WIFI AND ETHERNET TODAY. FOR DOWN STREAM COMMUNICATION PROTOCOLS WE STREAM COMMUNICATION PROTOCOLS WE SUPPORT A LOT OF THINGS. A COUPLE SUPPORT A LOT OF THINGS. A COUPLE OF THINGS TO KEEP IN MIND AS YOU OF THINGS TO KEEP IN MIND AS YOU GO FORWARD AND LOOK AT WHAT YOU GO FORWARD AND LOOK AT WHAT YOU WANT TO USE YOUR GUARDIAN MODULE

WANT TO USE YOUR GUARDIAN MODULE FOR. THERE ARE LIMITED STORAGE FOR. THERE ARE LIMITED STORAGE THIS IS NOT A FULL AZURE IOT. YOU THIS IS NOT A FULL AZURE IOT. YOU NEED SOMETHING LARGER. IN ADDITION NEED SOMETHING LARGER. IN ADDITION IT HAS LIMITED STORAGE. AS YOU LOOK IT HAS LIMITED STORAGE. AS YOU LOOK AT YOUR DOWN STREAM DEVICE, YOU AT YOUR DOWN STREAM DEVICE, YOU NEED TO CONSIDER WHERE THE DATA NEED TO CONSIDER WHERE THE DATA WILL LAND. FOR A GUARDIAN MODULE WILL LAND. FOR A GUARDIAN MODULE OR AZURE SPHERE THERE’S LIMITED OR AZURE SPHERE THERE’S LIMITED STORAGE ON THE DEVICE. SO HERE’S STORAGE ON THE DEVICE. SO HERE’S AN EXAMPLE OF A GUARDIAN MODULE AN EXAMPLE OF A GUARDIAN MODULE TODAY. SO YOU SEE THE AZURE SPHERE TODAY. SO YOU SEE THE AZURE SPHERE MCU ON THERE. IT’S ATTACHED TO A MCU ON THERE. IT’S ATTACHED TO A [INAUDIBLE] MODULE. FOR DOWN STREAM [INAUDIBLE] MODULE. FOR DOWN STREAM INTERFACING WE HAVE ETHERNET. MAYBE INTERFACING WE HAVE ETHERNET. MAYBE A TOASTER OR WHATEVER YOU ARE CONNECTING A TOASTER OR WHATEVER YOU ARE CONNECTING TO. YOU HAVE EXTERNAL LED INDICATORS TO. YOU HAVE EXTERNAL LED INDICATORS YOU MIGHT WANT TO PULL THE EXTERNAL YOU MIGHT WANT TO PULL THE EXTERNAL INDICATORS OUT SO THE WIFI [INAUDIBLE] INDICATORS OUT SO THE WIFI [INAUDIBLE] THIS PARTICULAR ONE IS POWERED BY THIS PARTICULAR ONE IS POWERED BY USB AND AN [INAUDIBLE] CHIP FOR USB AND AN [INAUDIBLE] CHIP FOR ONLINE MANAGEMENT. SO LET’S TAKE ONLINE MANAGEMENT. SO LET’S TAKE A LOOK AT COMMUNICATION FLOW BETWEEN A LOOK AT COMMUNICATION FLOW BETWEEN A GUARDIAN MODULE POWERED BY AZURE A GUARDIAN MODULE POWERED BY AZURE SPHERE AND THE AZURE SPHERE SECURITY SPHERE AND THE AZURE SPHERE SECURITY SERVICES. IN THE BOTTOM LEFT CORNER SERVICES. IN THE BOTTOM LEFT CORNER WE HAVE A BROWN FIELD DEVICE, EXISTING WE HAVE A BROWN FIELD DEVICE, EXISTING DEVICE. THE AZURE SPHERE GUARDIAN DEVICE. THE AZURE SPHERE GUARDIAN MODULE POWERED. UP TOP WE HAVE THE MODULE POWERED. UP TOP WE HAVE THE AZURE SPHERE SECURITY SERVICES AND AZURE SPHERE SECURITY SERVICES AND AZURE IOT SERVICESS CENTRAL. SO AZURE IOT SERVICESS CENTRAL. SO WHEN AN AZURE SPHERE DEVICE BOOTS WHEN AN AZURE SPHERE DEVICE BOOTS UP, ONE OF THE FIRST THINGS IT DOES UP, ONE OF THE FIRST THINGS IT DOES IS CHECK FOR APPLICATION AND OS IS CHECK FOR APPLICATION AND OS UP DATES. IT WILL LOOK FOR UP DATES UP DATES. IT WILL LOOK FOR UP DATES AND APPLICATIONS THAT THE CUSTOMER AND APPLICATIONS THAT THE CUSTOMER CONFIGURATION FOR UP DATES. AS PART CONFIGURATION FOR UP DATES. AS PART OF THIS PROCESS, THE FIST THING OF THIS PROCESS, THE FIST THING IT DOES IS AUTHENTICATES TO THE IT DOES IS AUTHENTICATES TO THE AZURE SPHERE SERVICESS. THEN IT AZURE SPHERE SERVICESS. THEN IT PERFORMANCE [INAUDIBLE]. IN A HAPPY PERFORMANCE [INAUDIBLE]. IN A HAPPY PATH WHERE EVERYTHING WORKS, AUTHENTICATION PATH WHERE EVERYTHING WORKS, AUTHENTICATION IS SUCCESSFUL, THE DEVICE WILL GET IS SUCCESSFUL, THE DEVICE WILL GET A CERTIFICATE FOR CLIENT AUTHFROM A CERTIFICATE FOR CLIENT AUTHFROM THE AZURE SPHERE SECURITY SERVICES THE AZURE SPHERE SECURITY SERVICES TO THE GUARDIAN MODULE. IT CAN USE TO THE GUARDIAN MODULE. IT CAN USE THAT FOR SUBSKNT AUTHENTICATION THAT FOR SUBSKNT AUTHENTICATION LET’S TALK ABOUT AN AREA THAT I LET’S TALK ABOUT AN AREA THAT I WAS TALKING ABOUT PREVIOUSLY. AUTHENTICATION WAS TALKING ABOUT PREVIOUSLY. AUTHENTICATION AND [INAUDIBLE]. ONE OF THE KEY AND [INAUDIBLE]. ONE OF THE KEY PROBLEMS IS USER NAME AND PASSWORDS PROBLEMS IS USER NAME AND PASSWORDS IF YOU ARE FAMILIAR WITH THE [INAUDIBLE] IF YOU ARE FAMILIAR WITH THE [INAUDIBLE] BOT NET IT MADE NEWS A COUPLE YEARS BOT NET IT MADE NEWS A COUPLE YEARS BACK. IT’S PRIMARY ATTACK IS THROUGH BACK. IT’S PRIMARY ATTACK IS THROUGH USER NAME AND PASSWORDS. THERE ARE USER NAME AND PASSWORDS. THERE ARE NO PASSWORDS TO AUTHENTICATE TO NO PASSWORDS TO AUTHENTICATE TO THE AZURE SPHERE. IT LEVERAGES THE THE AZURE SPHERE. IT LEVERAGES THE AZURE SPHERE SECURITY SERVICES IN AZURE SPHERE SECURITY SERVICES IN ORDER TO ENABLE HIGH ASSURANCE CERT ORDER TO ENABLE HIGH ASSURANCE CERT IFICATION. IT GOES THROUGH A NUMBER IFICATION. IT GOES THROUGH A NUMBER OF CHECKS TO MAKE SURE IT’S GENUINE OF CHECKS TO MAKE SURE IT’S GENUINE AND TRUSTED. SO LET’S TALK TALK AND TRUSTED. SO LET’S TALK TALK ABOUT HOW REMOTE [INAUDIBLE] WORKS ABOUT HOW REMOTE [INAUDIBLE] WORKS WHEN A DEVICE CONNECTS TO THE AZURE WHEN A DEVICE CONNECTS TO THE AZURE SPHERE, IT WILL AUTHENTICATE THE SPHERE, IT WILL AUTHENTICATE THE DEVICE. AUTHENTICATION PROVES THAT DEVICE. AUTHENTICATION PROVES THAT THE DEVICE IS A GENUINE AZURE SPHERE THE DEVICE IS A GENUINE AZURE SPHERE DEVICE. GENUINE DOESN’T NECESSARILY DEVICE. GENUINE DOESN’T NECESSARILY MEAN TRUSTED. ORIGINALLY IT WAS MEAN TRUSTED. ORIGINALLY IT WAS OS VERSION 1. IT WAS GENUINE. OVER OS VERSION 1. IT WAS GENUINE. OVER TIME A VERNERABILITY IS EXPOSED TIME A VERNERABILITY IS EXPOSED AND NEW OPRATING SYSTEMS COME OUT AND NEW OPRATING SYSTEMS COME OUT THAT VERSION IS NO LONGER TRUSTED THAT VERSION IS NO LONGER TRUSTED SO ATTESTATION. SO WE HAVE A SUBCOMPONENT SO ATTESTATION. SO WE HAVE A SUBCOMPONENT CALLED PLUTON. THE HARDWARE ROOT CALLED PLUTON. THE HARDWARE ROOT OF TRUST TAKES A MEASUREMENT DATA OF TRUST TAKES A MEASUREMENT DATA OF THE OPERATING SYSTEM, PERFORMS OF THE OPERATING SYSTEM, PERFORMS HASH MECHANISM AND SIGNS IT WITH HASH MECHANISM AND SIGNS IT WITH A UNIQUE KEY TO THAT DEVICE. DURING A UNIQUE KEY TO THAT DEVICE. DURING ATTESTATION, THE SIGNATURE IS LOOKED

ATTESTATION, THE SIGNATURE IS LOOKED AT AND SEE IF THESE SET OF MEASUREMENTS AT AND SEE IF THESE SET OF MEASUREMENTS ARE TRUSTED. IF NOT, GO GET AN OS ARE TRUSTED. IF NOT, GO GET AN OS UPDATE. SO, LET’S TAKE A LOOK AT UPDATE. SO, LET’S TAKE A LOOK AT HOW AAZURE SPHERE ISSUES A CERTIFICATE HOW AAZURE SPHERE ISSUES A CERTIFICATE A COUPLE OF KEY CONCEPTS I WANT A COUPLE OF KEY CONCEPTS I WANT TO TALK ABOUT. WE HAVE SOMETHING TO TALK ABOUT. WE HAVE SOMETHING CALLED AN AZURE SPHERE TENANT. THINK CALLED AN AZURE SPHERE TENANT. THINK OF OF IT AS A LOGICAL GROUPING OF OF OF IT AS A LOGICAL GROUPING OF DEVICES. YOU MIGHT HAVE A SET OFER DEVICES. YOU MIGHT HAVE A SET OFER HARDWARE AND YOU ARE GOING TO GROUP HARDWARE AND YOU ARE GOING TO GROUP THAT. ESSENTIALLY ASSIGN THOSE DEVICES THAT. ESSENTIALLY ASSIGN THOSE DEVICES TO AN AZURE SPHERE TENANT TO MANAGE TO AN AZURE SPHERE TENANT TO MANAGE SO I’M SAYING GO SELECT THIS TENANT SO I’M SAYING GO SELECT THIS TENANT I PREBAKE STUFF IN HERE AND SAY I PREBAKE STUFF IN HERE AND SAY I HAVE A TENANT WITH THIS [INAUDIBLE] I HAVE A TENANT WITH THIS [INAUDIBLE] YOU GET A NUMBER OF TOOLS. AZSPHAERE YOU GET A NUMBER OF TOOLS. AZSPHAERE WHEN YOU CREATE A TENTANT, WE ACTUALLY WHEN YOU CREATE A TENTANT, WE ACTUALLY CREATE A CERTIFICATE AUTHORITY TO CREATE A CERTIFICATE AUTHORITY TO ENSURE THAT THESE DEVICES ARE ONLY ENSURE THAT THESE DEVICES ARE ONLY ISSUEED CERTIFICATE TO THESE TENANT ISSUEED CERTIFICATE TO THESE TENANT EVERY TENANT HAS ITS OWN INDIVIDUAL EVERY TENANT HAS ITS OWN INDIVIDUAL CA’S. IF YOU EVMANAGE CERTIFICATE CA’S. IF YOU EVMANAGE CERTIFICATE AUTHORITIES YOU KNOW HOW COMPLEX AUTHORITIES YOU KNOW HOW COMPLEX THIS CAN BE. IN IOT DEVICES IN GENERAL THIS CAN BE. IN IOT DEVICES IN GENERAL THIS IS A GREAT STORY HERE. YOU THIS IS A GREAT STORY HERE. YOU DON’T HAVE TO PROVISION MANUALLY DON’T HAVE TO PROVISION MANUALLY OR MANAGE THE LIFE CYCLE HERE. SO OR MANAGE THE LIFE CYCLE HERE. SO GOING ON THAT PATH LET’S LOOK AT GOING ON THAT PATH LET’S LOOK AT THE ACTUAL CERTIFICATE OF AUTHORITY THE ACTUAL CERTIFICATE OF AUTHORITY FOR THIS TENANT. WE HAVE A COMMAND FOR THIS TENANT. WE HAVE A COMMAND THAT SAYS I ALREADY PICKED THE TENANT THAT SAYS I ALREADY PICKED THE TENANT DOWNLOAD THE — ONE SECOND. DOWNLOAD DOWNLOAD THE — ONE SECOND. DOWNLOAD THE CERTIFICATE. SO WHEN I’M AUTHENTICATED, THE CERTIFICATE. SO WHEN I’M AUTHENTICATED, I’M AUTHENTICATED WITH MY AZURE I’M AUTHENTICATED WITH MY AZURE SPHERE DIRECTORY ACCOUNT. THAT GUI SPHERE DIRECTORY ACCOUNT. THAT GUI IS THE SAME THAT KW PUT UP HERE IS THE SAME THAT KW PUT UP HERE FOR THE PARTICULAR TENANT THAT I FOR THE PARTICULAR TENANT THAT I PICKED. WHERE IT COMES TO PLAY IS PICKED. WHERE IT COMES TO PLAY IS WHEN YOU ARE AUTHENTICATING SERVICESS WHEN YOU ARE AUTHENTICATING SERVICESS WITHIN IOT CENTRAL WE HAVE THIS WITHIN IOT CENTRAL WE HAVE THIS INTERFACE HERE. IT SAYS THE ROOT INTERFACE HERE. IT SAYS THE ROOT OR CERTIFICATE SHOWN BELOW CAN BE OR CERTIFICATE SHOWN BELOW CAN BE USED TO GENERATE LEAF CERTIFICATE USED TO GENERATE LEAF CERTIFICATE IT IS SAYING UP LOAD A CERTIFICATE IT IS SAYING UP LOAD A CERTIFICATE CERT AND DEVICES ISSUEED CERTIFICATES CERT AND DEVICES ISSUEED CERTIFICATES FROM THIS CA CAN AUTHENTICATE TO FROM THIS CA CAN AUTHENTICATE TO THIS IOT APPLICATION. LET’S DO THAT THIS IOT APPLICATION. LET’S DO THAT REALLY QUICK. WE ARE DONE. IT SAYS REALLY QUICK. WE ARE DONE. IT SAYS NEEDS VERIFICATION. WHY? WE WANT NEEDS VERIFICATION. WHY? WE WANT TO PROVE TO IOT CENTRAL THAT WE TO PROVE TO IOT CENTRAL THAT WE OWN THAT CERTIFICATE AUTHORITY OWN THAT CERTIFICATE AUTHORITY THERE NEEDS TO BE PROOF. THIS IS THERE NEEDS TO BE PROOF. THIS IS SOMETHING THAT I MANAGE AND CONTROL SOMETHING THAT I MANAGE AND CONTROL SO IF WE GO IN HERE, IT’S GOING SO IF WE GO IN HERE, IT’S GOING TO GENERATE A VERIFICATION CODE TO GENERATE A VERIFICATION CODE IT’S SAYING PROVE THAT YOU HAVE IT’S SAYING PROVE THAT YOU HAVE ACCESS TO THIS, GENERATE A CERTIFICATE ACCESS TO THIS, GENERATE A CERTIFICATE AND UP LOAD THAT TO IOT CENTRAL AND UP LOAD THAT TO IOT CENTRAL FOR VERIFICATION. LET’S DO THAT FOR VERIFICATION. LET’S DO THAT WE HAVE A DOWNLOAD VERIFICATION WE HAVE A DOWNLOAD VERIFICATION CERTIFICATE. WE ARE GOING TO PUT CERTIFICATE. WE ARE GOING TO PUT IN THAT UNIQUE VALUE AND GENERATE IN THAT UNIQUE VALUE AND GENERATE A POP. CER. SO WE ARE GOING TO TAKE A POP. CER. SO WE ARE GOING TO TAKE THAT . IT’S CHECKING. WE CAN SEE THAT . IT’S CHECKING. WE CAN SEE THAT THE CERTIFICATE IS VERIFIED THAT THE CERTIFICATE IS VERIFIED SO AN END TO END HOW TO GET RID SO AN END TO END HOW TO GET RID OF USER NAME AND PASSWORDS TO MANAGE OF USER NAME AND PASSWORDS TO MANAGE AZURE SPHERE DEVICES, HOW AUTHENTICATION AZURE SPHERE DEVICES, HOW AUTHENTICATION THESE ARE RENEWED . THAT’S THE INTERFACE

THESE ARE RENEWED . THAT’S THE INTERFACE I SHOWED. I THINK AT THIS POINT I SHOWED. I THINK AT THIS POINT I’M GOING TO BRING DAN APONE FROM I’M GOING TO BRING DAN APONE FROM STARBUCKS. I DON’T KNOW IF YOU SAW STARBUCKS. I DON’T KNOW IF YOU SAW THE KEY NOTE THE OTHER DAY. THERE THE KEY NOTE THE OTHER DAY. THERE WAS A PIECE ABOUT AZURE SPHERE AND WAS A PIECE ABOUT AZURE SPHERE AND STARBUCKS. DAN IS HERE TO TALK ABOUT STARBUCKS. DAN IS HERE TO TALK ABOUT THE REAL WORLD ASPECTS OF THE ONGOING THE REAL WORLD ASPECTS OF THE ONGOING PLANS. >> THANK YOU, STEVE. HELLO, PLANS. >> THANK YOU, STEVE. HELLO, EVERYONE. I’M DAN APONE. I’M THE EVERYONE. I’M DAN APONE. I’M THE ENGINEERING MANAGER RESPONSIBLE ENGINEERING MANAGER RESPONSIBLE FOR THE IOT PROGRAM ON OUR CONNECTED FOR THE IOT PROGRAM ON OUR CONNECTED EQUIPMENT. SMART APPLIANCES. IOT EQUIPMENT. SMART APPLIANCES. IOT CAN MEAN MANY THINGS TO MANY PEOPLE CAN MEAN MANY THINGS TO MANY PEOPLE IT’S THE EQUIPMENT ON THE COUNTER IT’S THE EQUIPMENT ON THE COUNTER AT STARBUCKS AND WHAT DATA WE CAN AT STARBUCKS AND WHAT DATA WE CAN GET FROM THOSE AND WHAT RECIPES GET FROM THOSE AND WHAT RECIPES WE CAN PUSH TO THOSE MACHINES. IN WE CAN PUSH TO THOSE MACHINES. IN THE WORLD OF STARBUCKS ALL THE IOT THE WORLD OF STARBUCKS ALL THE IOT VALUE FALLS INTO TWO DIFFERENT BUCKETS VALUE FALLS INTO TWO DIFFERENT BUCKETS ONE IS ENSURING HIGH QUALITY PRODUCT ONE IS ENSURING HIGH QUALITY PRODUCT IS DELIVERED TO OUR CUSTOMERS AND IS DELIVERED TO OUR CUSTOMERS AND THE OTHER IS REDUCING MACHINE MAINTENANCE THE OTHER IS REDUCING MACHINE MAINTENANCE COST AND DOWN TIME. TALKING ABILITY COST AND DOWN TIME. TALKING ABILITY PRODUCT QUALITY IS PUSHING RECIPES PRODUCT QUALITY IS PUSHING RECIPES TO EACH ONE OF THE COFFEE MACHINES TO EACH ONE OF THE COFFEE MACHINES EVERY TIME WE HAVE A NEW COFFEE EVERY TIME WE HAVE A NEW COFFEE BEAN. IT GETS SLIGHTLY DIFFERENT BEAN. IT GETS SLIGHTLY DIFFERENT BREW PARAMETERS. SO WE OPTIMIZE BREW PARAMETERS. SO WE OPTIMIZE OUR FLAVOR FOR WHAT THAT BEAN IS OUR FLAVOR FOR WHAT THAT BEAN IS SUPPOSED TO DELIVER. WHEN WE TALK SUPPOSED TO DELIVER. WHEN WE TALK ABOUT THE OVENS AND EACH BREAKFAST ABOUT THE OVENS AND EACH BREAKFAST SANDWICH OR MUFFIN, EACH GET DIFFERENT SANDWICH OR MUFFIN, EACH GET DIFFERENT SETTINGS IN THE OVEN. SO WE WANT SETTINGS IN THE OVEN. SO WE WANT TO CUSTOMIZE FOR WHATEVER PRODUCT TO CUSTOMIZE FOR WHATEVER PRODUCT IS BEING PRODUCED. THE PRODUCT QUALITY IS BEING PRODUCED. THE PRODUCT QUALITY STUFF DOESN’T END THERE. IT GETS STUFF DOESN’T END THERE. IT GETS INTO OPERATIONAL BEHAVIORS OF THE INTO OPERATIONAL BEHAVIORS OF THE STORE. WITH THE IOT AND CONNECTED STORE. WITH THE IOT AND CONNECTED MACHINES WE ARE GOING TO BE ABLE MACHINES WE ARE GOING TO BE ABLE TO SEE IF BARISTAS ARE PROPERLY TO SEE IF BARISTAS ARE PROPERLY DISPOSING OF PRODUCTS THAT DON’T DISPOSING OF PRODUCTS THAT DON’T FOLLOW SPECKS. THERE’S A LOT OF FOLLOW SPECKS. THERE’S A LOT OF MACHINE HEALTH OVER TIME — THERE MACHINE HEALTH OVER TIME — THERE ARE BARISTA BEHAVIOR THAT EFFECTS ARE BARISTA BEHAVIOR THAT EFFECTS THE MACHINE OVER TIME. THE BARISTA THE MACHINE OVER TIME. THE BARISTA IS SUPPOSED TO [INAUDIBLE] THE STEAM IS SUPPOSED TO [INAUDIBLE] THE STEAM WAND. SO WE ARE SEEING HOW GOOD WAND. SO WE ARE SEEING HOW GOOD THE STORES ARE COMPLYING WITH THAT THE STORES ARE COMPLYING WITH THAT AND HAVING STORE MANAGERS TO BRAIN AND HAVING STORE MANAGERS TO BRAIN THEIR BARISTAS BETTER. ON THE MAINTENANCE THEIR BARISTAS BETTER. ON THE MAINTENANCE SIDE OF THINGS, WE ARE SEEING THE SIDE OF THINGS, WE ARE SEEING THE ABILITY TO HELP TECHNICIANS IN THE ABILITY TO HELP TECHNICIANS IN THE FIELD TO REMOTELY TROUBLE SHOOT FIELD TO REMOTELY TROUBLE SHOOT THESE MACHINES ARE LIKE 20 GRAND THESE MACHINES ARE LIKE 20 GRAND IF THE MACHINE IS BROKEN AND THE IF THE MACHINE IS BROKEN AND THE TECHNICIAN HAVE TO SERVICE IT, THEY TECHNICIAN HAVE TO SERVICE IT, THEY LEARN AND THEY LEARN IT NEEDS A LEARN AND THEY LEARN IT NEEDS A BOILER. THEY DON’T HAVE A SPARE BOILER. THEY DON’T HAVE A SPARE BOILER IN THEIR TRUCK. SO THEY TELL BOILER IN THEIR TRUCK. SO THEY TELL THE STORE IT’S ONORDER AND HAVE THE STORE IT’S ONORDER AND HAVE TO COME BACK. SO THE STORE HAS A TO COME BACK. SO THE STORE HAS A DOWN MACHINE FOR 3 DAYS AND THE DOWN MACHINE FOR 3 DAYS AND THE CUSTOMERS CAN’T GET THE PRODUCT CUSTOMERS CAN’T GET THE PRODUCT THEY WANT AND WE HAVE PAID FOR TWO THEY WANT AND WE HAVE PAID FOR TWO TECHNICIANS VISITS. THE REMOTE TROUBLE TECHNICIANS VISITS. THE REMOTE TROUBLE SHOOTING SHOULD ALLOW THE TECHNICIAN SHOOTING SHOULD ALLOW THE TECHNICIAN TO HAVE THE BOILER IN THE TRUCK TO HAVE THE BOILER IN THE TRUCK THE FIRST VISIT. SO WE HAVE BLENDERS, THE FIRST VISIT. SO WE HAVE BLENDERS, WATER FILTRATION SYSTEMS, OVENS WATER FILTRATION SYSTEMS, OVENS AND EXISTING EQUIPMENT THAT’S THE AND EXISTING EQUIPMENT THAT’S THE EXACT SCENARIO THAT THE BROWN FIELD EXACT SCENARIO THAT THE BROWN FIELD DEVICES THAT STEVE MENTIONED. THE DEVICES THAT STEVE MENTIONED. THE GUARDIAN MODULE IS WHAT WE ARE USING GUARDIAN MODULE IS WHAT WE ARE USING TO CONNECT TO THESE COFFEE MACHINESS TO CONNECT TO THESE COFFEE MACHINESS WE HAVE A NEW ESPRESSO MACHINE ROLEING WE HAVE A NEW ESPRESSO MACHINE ROLEING OUT. THERE WILL BE SEVERAL THOUSAND OUT. THERE WILL BE SEVERAL THOUSAND BY THE END OF THE YEAR. THE ESPRESSO BY THE END OF THE YEAR. THE ESPRESSO MACHINE IN QUESTION HERE — WHEN MACHINE IN QUESTION HERE — WHEN WE HAVE THE — THE ESPRESSO MACHINE WE HAVE THE — THE ESPRESSO MACHINE CONNECTS TO THE GUARDIAN MODULE CONNECTS TO THE GUARDIAN MODULE WITH AN ETHER NET AND SUPPLIES UX WITH AN ETHER NET AND SUPPLIES UX SW POWER. A LOT OF MANUFACTURERS

SW POWER. A LOT OF MANUFACTURERS PUT ETHERNET PORTS THINKING IT WILL PUT ETHERNET PORTS THINKING IT WILL CONNECT SOME DAY. THEY USUALLY HAVE CONNECT SOME DAY. THEY USUALLY HAVE USB PORTS BECAUSE YOU MANUALLY UPDATE USB PORTS BECAUSE YOU MANUALLY UPDATE THE FIRM WARE. SO THE COFFEE MACHINE THE FIRM WARE. SO THE COFFEE MACHINE ARE ABLE TO CONNECT TO THE GUARDIAN ARE ABLE TO CONNECT TO THE GUARDIAN MODULE OVER ETHERNET AND POWER IT MODULE OVER ETHERNET AND POWER IT OVER USB. THAT’S NOT THE DESIRED OVER USB. THAT’S NOT THE DESIRED END STATE. WHEN WE HAVE NEW PRODUCTS END STATE. WHEN WE HAVE NEW PRODUCTS IN DEVELOPMENT, WE ARE TRYING TO IN DEVELOPMENT, WE ARE TRYING TO GET THESE SPHERE MODULES BUILT IN GET THESE SPHERE MODULES BUILT IN SO WE DON’T HAVE WIRES RUNNING AROUND SO WE DON’T HAVE WIRES RUNNING AROUND OUR STORE THAT GETS IN THE WAY OF OUR STORE THAT GETS IN THE WAY OF THE BARISTA AND CAUSES EXTRA NIGHTMARES THE BARISTA AND CAUSES EXTRA NIGHTMARES FOR OUR FACILITIES DEPARTMENT WHEN FOR OUR FACILITIES DEPARTMENT WHEN THEY GET UNPLUGGED. FOR NOW WE ARE THEY GET UNPLUGGED. FOR NOW WE ARE DEALING WITH CONNECTING LEGACY EQUIPMENT DEALING WITH CONNECTING LEGACY EQUIPMENT SO WE HAVE GUARDIAN MODULES WHICH SO WE HAVE GUARDIAN MODULES WHICH WILL BE MOUNTED UNDER THE COUNTER WILL BE MOUNTED UNDER THE COUNTER BELOW THE ESPRESSO MACHINE. THE BELOW THE ESPRESSO MACHINE. THE GUARDIAN MODULE SENDS IT INTO THE GUARDIAN MODULE SENDS IT INTO THE IOT CLOUD. SO ALL THE ANALYSIS AND IOT CLOUD. SO ALL THE ANALYSIS AND DASHBOARD ARE BUILT IN THE AZURE DASHBOARD ARE BUILT IN THE AZURE CLOUD PLATFORM. WE HAVE A CLOSE CLOUD PLATFORM. WE HAVE A CLOSE RELATIONSHIP WITH OUR MICROSOFT RELATIONSHIP WITH OUR MICROSOFT FRIENDS. WHEN WE ORIGINALLY STARTED FRIENDS. WHEN WE ORIGINALLY STARTED DOING CONNECTED APPLIANCES IT WAS DOING CONNECTED APPLIANCES IT WAS WITH A COFFEE MACHINE CALLED THE WITH A COFFEE MACHINE CALLED THE CLOVER. WHICH IS WHAT STARBUCKS CLOVER. WHICH IS WHAT STARBUCKS STORES USE TO BREW COFFEE. WHAT STORES USE TO BREW COFFEE. WHAT THAT DECADE OF USE HAS SHOWN US THAT DECADE OF USE HAS SHOWN US THERE’S GREAT VALUE TO STARBUCKS THERE’S GREAT VALUE TO STARBUCKS TO PUSH RECIPES TO THESE MACHINES TO PUSH RECIPES TO THESE MACHINES AND MONITOR ERRORS. IT’S SHOWN US AND MONITOR ERRORS. IT’S SHOWN US IT’S TOO EXPENSIVE TO HARDWARE ALL IT’S TOO EXPENSIVE TO HARDWARE ALL OF THE APPLIANCES IN OUR STORES OF THE APPLIANCES IN OUR STORES SO FOR YEARS WE HAVE BEEN LOOKING SO FOR YEARS WE HAVE BEEN LOOKING FOR A WIFI SOLUTION THAT HAS SECURITY FOR A WIFI SOLUTION THAT HAS SECURITY BOXES CHECKED AS WELL AS OFFERING BOXES CHECKED AS WELL AS OFFERING SOME SORT OF PLATFORM FOR MANAGING SOME SORT OF PLATFORM FOR MANAGING THE DEVICES IN THE FIELD. WHEN OUR THE DEVICES IN THE FIELD. WHEN OUR MICROSOFT FRIENDS STARTED TALKING MICROSOFT FRIENDS STARTED TALKING ABOUT THE SPHERE PLATFORM WE WERE ABOUT THE SPHERE PLATFORM WE WERE ALL EARS AND JUMPED IN WITH THEM ALL EARS AND JUMPED IN WITH THEM THAT’S NOT TO SAY IT’S EASY. IOT THAT’S NOT TO SAY IT’S EASY. IOT IS ACTUALLY REALLY COMPLICATED IN IS ACTUALLY REALLY COMPLICATED IN THE REAL WORLD. STARTING WITH THINKING THE REAL WORLD. STARTING WITH THINKING ABOUT HOW MANY COLLEGE MAJORS ARE ABOUT HOW MANY COLLEGE MAJORS ARE CALLED IOT. IT INVOLVES A MILLION CALLED IOT. IT INVOLVES A MILLION DIFFERENT DISCIPLINES. THE PERSON DIFFERENT DISCIPLINES. THE PERSON WHO KNOWS THE FIRM WARE AND WIFI WHO KNOWS THE FIRM WARE AND WIFI AND SECURITY CONCERNS. THE KNOWLEDGE AND SECURITY CONCERNS. THE KNOWLEDGE BASE IS SPREAD ACROSS A LOT OF DIFFERENT BASE IS SPREAD ACROSS A LOT OF DIFFERENT PEOPLE AND ACADEMIC BACK GROUNDS PEOPLE AND ACADEMIC BACK GROUNDS WHAT THAT MANIFESTS ITSELF IN THE WHAT THAT MANIFESTS ITSELF IN THE CORPORATE WORLD IS ALL OF THESE CORPORATE WORLD IS ALL OF THESE PEOPLE LIVE IN DIFFERENT GROUPS PEOPLE LIVE IN DIFFERENT GROUPS INSIDE STARBUCKS I’M WORKING WITH INSIDE STARBUCKS I’M WORKING WITH 8 OR SO GROUPS THAT FUNNEL UP TO 8 OR SO GROUPS THAT FUNNEL UP TO 5 DIFFERENT EXECUTIVES. SO WORKING 5 DIFFERENT EXECUTIVES. SO WORKING ACROSS THE TEAMS EVEN THOUGH WE ACROSS THE TEAMS EVEN THOUGH WE ARE WORKING ON THE SAME PROJECT ARE WORKING ON THE SAME PROJECT AND SAME END GOAL IT’S SOMETIMES AND SAME END GOAL IT’S SOMETIMES HARD WITH INEFFICIENCIES OF WORK HARD WITH INEFFICIENCIES OF WORK AND THE NATURE OF TRYING TO GET AND THE NATURE OF TRYING TO GET A BIG PROJECT DONE. THEN ALL OF A BIG PROJECT DONE. THEN ALL OF THE WORK OUTSIDE OF THE STARBUCKS THE WORK OUTSIDE OF THE STARBUCKS VIEW OF IT YOU ARE DEALING WITH VIEW OF IT YOU ARE DEALING WITH A NETWORK OF COMPANIES. OUR GUARDIAN A NETWORK OF COMPANIES. OUR GUARDIAN MODULES AN IS PARTNERSHIP BETWEEN MODULES AN IS PARTNERSHIP BETWEEN STARBUCKS, AVNET AND MICROSOFT STARBUCKS, AVNET AND MICROSOFT THEN WE HAVE THE FLEET OF WIFI PROVIDERS THEN WE HAVE THE FLEET OF WIFI PROVIDERS THAT WE ARE USING IN STORES LIKE THAT WE ARE USING IN STORES LIKE THE GOOGLES AND CENTURY LINKS AND THE GOOGLES AND CENTURY LINKS AND INTERNET PROVIDERS OF THE WORLD INTERNET PROVIDERS OF THE WORLD THEN I HAVE A PORTFOLIO OF EQUIPMENT THEN I HAVE A PORTFOLIO OF EQUIPMENT STOLE BY SEVERAL DOZEN DIFFERENT STOLE BY SEVERAL DOZEN DIFFERENT COMPANIES AROUND THE WORLD, MOST COMPANIES AROUND THE WORLD, MOST OF WHICH ARE NOT SAVVY ABOUT SOFTWARE OF WHICH ARE NOT SAVVY ABOUT SOFTWARE THE REFRIGERATION COMPANY IS EXPERT THE REFRIGERATION COMPANY IS EXPERT ON REFRIGERATION BUT PROBABLY DON’T ON REFRIGERATION BUT PROBABLY DON’T HAVE SOFTWARE ENGINEERS ON STAFF HAVE SOFTWARE ENGINEERS ON STAFF THE ESPRESSO KNOW ABOUT ESPRESSO THE ESPRESSO KNOW ABOUT ESPRESSO BUT NOT MUCH ABOUT INTERNET. SO BUT NOT MUCH ABOUT INTERNET. SO WHEN WE PRESENT THEM WITH THE API WHEN WE PRESENT THEM WITH THE API SPECK WITH HOW THEIR MACHINE IS SPECK WITH HOW THEIR MACHINE IS SUPPOSED TO CONNECT WITH OUR GUARDIAN SUPPOSED TO CONNECT WITH OUR GUARDIAN MODULE. WE GET A CHANGE OF ANSWERS MODULE. WE GET A CHANGE OF ANSWERS FROM THAT’S EASY ALL THE WAY TO FROM THAT’S EASY ALL THE WAY TO WHAT ARE YOU ASKING ME AND YOU GUYS WHAT ARE YOU ASKING ME AND YOU GUYS NEED TO FUND A SOFTWARE AT MY COMPANY NEED TO FUND A SOFTWARE AT MY COMPANY JUST TO SEND A COUPLE J-SON STRINGS JUST TO SEND A COUPLE J-SON STRINGS IT’S DELIGHTFUL TO SEE THE ARRANGE IT’S DELIGHTFUL TO SEE THE ARRANGE WE BUY A LOT OF EQUIPMENT. SO MOST

WE BUY A LOT OF EQUIPMENT. SO MOST OF THE ECHO SYSTEM IS INTERESTED OF THE ECHO SYSTEM IS INTERESTED IN PLAYING ALONG. SO IF YOU MADE IN PLAYING ALONG. SO IF YOU MADE IT TO THE STARBUCKS EXHIBIT IN THE IT TO THE STARBUCKS EXHIBIT IN THE 4TH FLOOR OF THE CONVENTION CENTER 4TH FLOOR OF THE CONVENTION CENTER YOU WOULD HAVE SEEN TWO COFFEE MACHINES YOU WOULD HAVE SEEN TWO COFFEE MACHINES AND A DASHBOARD WITH THE IOT CENTRAL AND A DASHBOARD WITH THE IOT CENTRAL TOOL SET. THAT WAS DONE BY MARCELLO TOOL SET. THAT WAS DONE BY MARCELLO MAJONCHI. I WOULD LIKE TO INVITE MAJONCHI. I WOULD LIKE TO INVITE HIM UP TO TALK ABOUT IOT CENTRAL HIM UP TO TALK ABOUT IOT CENTRAL >> THANK YOU, DAN. GOOD AFTERNOON >> THANK YOU, DAN. GOOD AFTERNOON AS DAN IN A WONDERFULLY CANDID WAY AS DAN IN A WONDERFULLY CANDID WAY EXPLAINED AZURE. ENTERPRISE ARE EXPLAINED AZURE. ENTERPRISE ARE FACING BECAUSE OF COMPLEXITY AND FACING BECAUSE OF COMPLEXITY AND SKILL SET AND INVESTMENT AND TIME SKILL SET AND INVESTMENT AND TIME A LOT OF COMPANIES THAT ARE STARTING A LOT OF COMPANIES THAT ARE STARTING THIS JOURNEY OF DIGITAL CONFIRMATION THIS JOURNEY OF DIGITAL CONFIRMATION GET STUCK. THEY GET STUCK BECAUSE GET STUCK. THEY GET STUCK BECAUSE MAYBE THE INVESTMENT THAT THEY ENVISION MAYBE THE INVESTMENT THAT THEY ENVISION AT THE BEGINNING GETS OVER BUDGET, AT THE BEGINNING GETS OVER BUDGET, OR BECAUSE THEY REALIZE THEY DON’T OR BECAUSE THEY REALIZE THEY DON’T HAVE THE SKILLS IN ORDER TO TAKE HAVE THE SKILLS IN ORDER TO TAKE ON THAT TYPE OF PROJECT OR GET STUCK ON THAT TYPE OF PROJECT OR GET STUCK BECAUSE THEY REALIZE THAT THEY WON’T BECAUSE THEY REALIZE THAT THEY WON’T BE ABLE TO GET THE PRODUCT AND GET BE ABLE TO GET THE PRODUCT AND GET THE BUSINESS RESULTS OUT OF THE THE BUSINESS RESULTS OUT OF THE DOOR IN TIME. THIS IS SOMETHING DOOR IN TIME. THIS IS SOMETHING THAT BEEN WELL DEFINED BY JEFFREY THAT BEEN WELL DEFINED BY JEFFREY MORE CALLED CROSSING THE CHASM MORE CALLED CROSSING THE CHASM IT’S A BOOK THAT REALLY DEFINED IT’S A BOOK THAT REALLY DEFINED WHAT ARE THE CHALLENGES OF WHAT WHAT ARE THE CHALLENGES OF WHAT COMPANIES NEED TO INNOVATE. CROSSES COMPANIES NEED TO INNOVATE. CROSSES THE CHASM IS A KEY POINT. CUTTING THE CHASM IS A KEY POINT. CUTTING DOWN ON THE COMPLEXITY THAT ARE DOWN ON THE COMPLEXITY THAT ARE RELATED TO OUR IOT PROJECTS IS WHAT RELATED TO OUR IOT PROJECTS IS WHAT CAN ENABLE CUSTOMERS [INAUDIBLE] CAN ENABLE CUSTOMERS [INAUDIBLE] TO BEING ABLE TO BE SUCCESSFUL WITH TO BEING ABLE TO BE SUCCESSFUL WITH THAT. THIS IS WHY AS MICROSOFT, THAT. THIS IS WHY AS MICROSOFT, WE ANNOUNCED A YEAR AGO THAT WE WE ANNOUNCED A YEAR AGO THAT WE WOULD INVEST $5 BILLION IN IOT WOULD INVEST $5 BILLION IN IOT THE MAIN GOAL AND INVESTMENT OF THE MAIN GOAL AND INVESTMENT OF THOSE $5 MILLION IS TO HELP OUR THOSE $5 MILLION IS TO HELP OUR CUSTOMERS AND PARTNERS TO SIMPLIFY CUSTOMERS AND PARTNERS TO SIMPLIFY THEIR DIGITAL TRANSFORMATION JOURNEY THEIR DIGITAL TRANSFORMATION JOURNEY WE ARE BUILDING TECHNOLOGY AND SERVICESS WE ARE BUILDING TECHNOLOGY AND SERVICESS THAT WOULD ABSTRACT MOST OF THE THAT WOULD ABSTRACT MOST OF THE COMPLEXITY BY RAISING AND MAKING COMPLEXITY BY RAISING AND MAKING AVAILABLE THE CAPABILITIES IN ORDER AVAILABLE THE CAPABILITIES IN ORDER TO REACH MODERN IOT APPLICATIONS TO REACH MODERN IOT APPLICATIONS THE PRODUCT BEST INBODIES THIS STRATEGY THE PRODUCT BEST INBODIES THIS STRATEGY OF CUTTING COMPLEXITY WITH OUR CLOUD OF CUTTING COMPLEXITY WITH OUR CLOUD WITH AZURE SO OUR PARTNERS DON’T WITH AZURE SO OUR PARTNERS DON’T HAVE TO IS A PARTNER CALLED AZURE HAVE TO IS A PARTNER CALLED AZURE IOT CENTRAL. THIS IS OUR HOSTED IOT CENTRAL. THIS IS OUR HOSTED IOT PLATFORM. IT’S BASED ON THE IOT PLATFORM. IT’S BASED ON THE SAME IOT BUILDING BLOCKS THAT YOU SAME IOT BUILDING BLOCKS THAT YOU CAN USE AS AZURE SERVICES BUT IT CAN USE AS AZURE SERVICES BUT IT MESHES IT UP TOGETHER AS A SINGLE MESHES IT UP TOGETHER AS A SINGLE SERVICES THAT PROVIDES GLOBAL SCALE SERVICES THAT PROVIDES GLOBAL SCALE AUTOMATIC SCALEMENT, AUTOMATIC [INAUDIBLE] AUTOMATIC SCALEMENT, AUTOMATIC [INAUDIBLE] OF THE SERVICES UNDERNEATH. EFFECTIVELY OF THE SERVICES UNDERNEATH. EFFECTIVELY YOU CAN GET OUT OF THE BOX. CAPABILITIES YOU CAN GET OUT OF THE BOX. CAPABILITIES OF DEVICE [INAUDIBLE] MONITORING OF DEVICE [INAUDIBLE] MONITORING RULES THAT ARE BASED ON STREAMING RULES THAT ARE BASED ON STREAMING DATA. THE ABILITY TO MAP USER ROLES DATA. THE ABILITY TO MAP USER ROLES AND PERMISSION AND CREATE REACH AND PERMISSION AND CREATE REACH EXPERIENCE IN TERMS OF DASH BOARDS EXPERIENCE IN TERMS OF DASH BOARDS AND MONITORING CAPABILITIES. SINCE AND MONITORING CAPABILITIES. SINCE IT’S [INAUDIBLE] WHAT I ASK STEVE IT’S [INAUDIBLE] WHAT I ASK STEVE TO COME ON STAGE AND DO WITH ME TO COME ON STAGE AND DO WITH ME IS SHOW HOW EASY IT WAS TO TAKE IS SHOW HOW EASY IT WAS TO TAKE AN AZURE SPHERE DEVICE, BUILD [INAUDIBLE], AN AZURE SPHERE DEVICE, BUILD [INAUDIBLE], PROVISION THE DEVICE AND CONNECT PROVISION THE DEVICE AND CONNECT IT TO CENTRAL AND USE OIT CENTRAL IT TO CENTRAL AND USE OIT CENTRAL AND TRANSFORM IT INTO A REAL RICH AND TRANSFORM IT INTO A REAL RICH EXPERIENCE. THIS IS SOMETHING THAT EXPERIENCE. THIS IS SOMETHING THAT USUALLY TAKES WEEKS OR MONTHS. WE USUALLY TAKES WEEKS OR MONTHS. WE WILL TRY TO DO IT IN 15 MINUTES WILL TRY TO DO IT IN 15 MINUTES WE WILL CUT CORNERS AND HAVE TIME WE WILL CUT CORNERS AND HAVE TIME — SOMETHING THAT IS ALREADY BAKED — SOMETHING THAT IS ALREADY BAKED OUT OF THE OVEN. STEVE? >> HEY,

OUT OF THE OVEN. STEVE? >> HEY, I’M GOING TO SHOW YOU HOW SIMPLE I’M GOING TO SHOW YOU HOW SIMPLE IT WOULD BE EASY. I HAVE A DEFAULT IT WOULD BE EASY. I HAVE A DEFAULT TEMPLATE. YOU END WITH A NUMBER TEMPLATE. YOU END WITH A NUMBER OF BOILER PLATE SAMPLES HERE. THE OF BOILER PLATE SAMPLES HERE. THE ONE WE ARE GOING TO CHOOSE IS THE ONE WE ARE GOING TO CHOOSE IS THE IOT HUB SAMPLE. YOU DON’T HAVE TO IOT HUB SAMPLE. YOU DON’T HAVE TO WORRY ABOUT THE MANAGING [INAUDIBLE] WORRY ABOUT THE MANAGING [INAUDIBLE] 1 OF THE THINGS WHEN YOU GO AHEAD 1 OF THE THINGS WHEN YOU GO AHEAD AND LOAD UP THIS SAMPLE AND LOOK AND LOAD UP THIS SAMPLE AND LOOK AT — THERE IT IS. YOU CAN SEE HERE AT — THERE IT IS. YOU CAN SEE HERE THAT WHAT WE HAVE GOT IS THIS OVVIEW THAT WHAT WE HAVE GOT IS THIS OVVIEW SECTION HERE. IN THIS OVER VIEW SECTION HERE. IN THIS OVER VIEW SECTION YOU CAN LOOK AT THE DEVICE SECTION YOU CAN LOOK AT THE DEVICE THAT’S CONNECTED TO YOUR DEV MACHINE THAT’S CONNECTED TO YOUR DEV MACHINE I HAVE THIS SMALL DEV KIT HOOKED I HAVE THIS SMALL DEV KIT HOOKED UP. YOU CAN SEE I HAVE INFORMATION UP. YOU CAN SEE I HAVE INFORMATION ABOUT IT. THE WIFI STATUS THINGS ABOUT IT. THE WIFI STATUS THINGS LIKE THAT. I’M GOING TO PICK AN LIKE THAT. I’M GOING TO PICK AN EXISTING IOT HUB THAT I HAVE AND EXISTING IOT HUB THAT I HAVE AND WE ARE GOING TO MODIFY THAT AND WE ARE GOING TO MODIFY THAT AND SHOW YOU HOW TO HOOK IT UP TO IOT SHOW YOU HOW TO HOOK IT UP TO IOT CENTRAL. INSERTED BOILER PLATE CODE CENTRAL. INSERTED BOILER PLATE CODE WE ARE GOING TO MODIFY THIS. I’M WE ARE GOING TO MODIFY THIS. I’M GOING TO LOOK AT SOME FUNCTIONS GOING TO LOOK AT SOME FUNCTIONS ONE OF THE MAIN MESSAGES HERE IS ONE OF THE MAIN MESSAGES HERE IS SEND MESSAGE TO IOT HUB. INSTEAD SEND MESSAGE TO IOT HUB. INSTEAD OF SAYING HELLO FROM IOT SAMPLE, OF SAYING HELLO FROM IOT SAMPLE, WE ARE GOING TO ADD CODE IN HERE WE ARE GOING TO ADD CODE IN HERE SIMULATING TEMPERATURE AND HUMIDITY SIMULATING TEMPERATURE AND HUMIDITY THIS IS SAYING GIVE US RANDOM TEMPERATURES THIS IS SAYING GIVE US RANDOM TEMPERATURES SAMPLES. SO LET’S LOOK AT AZURE SAMPLES. SO LET’S LOOK AT AZURE IOT SEND MESSAGE. IN SEND MESSAGE IOT SEND MESSAGE. IN SEND MESSAGE IT’S SIMPLE. YOU HAVE A STANDARD IT’S SIMPLE. YOU HAVE A STANDARD MESSAGE PAY LOAD. YOU PASS THAT MESSAGE PAY LOAD. YOU PASS THAT AND SEND THAT OFF TO YOUR HUB. A AND SEND THAT OFF TO YOUR HUB. A COUPLE THINGS I WANT TO SHOW YOU COUPLE THINGS I WANT TO SHOW YOU AZURE SPHERE, BY DEFAULT IS WELL AZURE SPHERE, BY DEFAULT IS WELL LOCKED DOWN. I’M GOING TO SHOW YOU LOCKED DOWN. I’M GOING TO SHOW YOU THE APPLICATION MANIFEST HERE. I THE APPLICATION MANIFEST HERE. I DON’T KNOW IF YOU CAN SEE THAT WELL DON’T KNOW IF YOU CAN SEE THAT WELL SO IN HERE WE HAVE A MANIFEST FOR SO IN HERE WE HAVE A MANIFEST FOR THIS PARTICULAR APPLICATION. BY THIS PARTICULAR APPLICATION. BY DEFAULT IT’S LOCKED DOWN IN THIS DEFAULT IT’S LOCKED DOWN IN THIS PARTICULAR EXAMPLE WE OPENED UP PARTICULAR EXAMPLE WE OPENED UP THESE GPIO’S. YOU HAVE TO DEFINE THESE GPIO’S. YOU HAVE TO DEFINE THEM IF YOU WANT TO ACCESS THEM THEM IF YOU WANT TO ACCESS THEM DEVICE AUTHENTICATION SHOULD BE DEVICE AUTHENTICATION SHOULD BE TENANT I. D. SO I’VE GOT PREBAKED TENANT I. D. SO I’VE GOT PREBAKED VALUES HERE. I’M GOING TO TAKE THESE VALUES HERE. I’M GOING TO TAKE THESE AND POP THEM IN HERE. WHAT WE HAVE AND POP THEM IN HERE. WHAT WE HAVE DONE IS DEFINED THE CONNECTIONS DONE IS DEFINED THE CONNECTIONS TO THE HUB THAT WE ARE INTERESTED TO THE HUB THAT WE ARE INTERESTED IN. WE PREDEFINED THE DEVICE AUTHENTICATION IN. WE PREDEFINED THE DEVICE AUTHENTICATION TENANT IS WHAT WE USED FOR THE EXAMPLE TENANT IS WHAT WE USED FOR THE EXAMPLE I GAVE PREVIOUSLY. PREF WE WANT I GAVE PREVIOUSLY. PREF WE WANT TO MAKE SURE WE HAVE THE CORRECT TO MAKE SURE WE HAVE THE CORRECT SCOPE I. D. WE TAKE THE SCOPE I

SCOPE I. D. WE TAKE THE SCOPE I D. AND POP THIS IN HERE. SO NOW D. AND POP THIS IN HERE. SO NOW WE ARE GOING TO CONNECT UP TO THE WE ARE GOING TO CONNECT UP TO THE — WE ENABLED AZURE SPHERE TO THE — WE ENABLED AZURE SPHERE TO THE CORRECT SCOPE I. D. FOR THE APPLICATION CORRECT SCOPE I. D. FOR THE APPLICATION WE ARE GOING TO GO BACK INTO THE WE ARE GOING TO GO BACK INTO THE UTILITIES AND CHANGE UP THAT SEND UTILITIES AND CHANGE UP THAT SEND MESSAGE FUNCTION. MESSAGE PAY LOAD MESSAGE FUNCTION. MESSAGE PAY LOAD I MENTIONED THAT IOT CENTRAL WHEN I MENTIONED THAT IOT CENTRAL WHEN YOU DEFINE SOMETHING LIKE HERE’S YOU DEFINE SOMETHING LIKE HERE’S A TEMPERATURE VALUE, YOU ARE GOING A TEMPERATURE VALUE, YOU ARE GOING TO DEFINE THE TEMPERATURE IS 35 TO DEFINE THE TEMPERATURE IS 35 DEGREES. HUMIDITY IS 70. WE ARE DEGREES. HUMIDITY IS 70. WE ARE GOING TO CHANGE THIS UP TO INCLUDE GOING TO CHANGE THIS UP TO INCLUDE OR ACCOMMODATE THE VALUE I MENTIONED OR ACCOMMODATE THE VALUE I MENTIONED PREVIOUSLY. WE ARE GOING TO COMMENT, PREVIOUSLY. WE ARE GOING TO COMMENT, TAKE THIS, TAKE THE KEY NAME AND TAKE THIS, TAKE THE KEY NAME AND VALUE NAME AND INSERT INTO THE MESSAGE VALUE NAME AND INSERT INTO THE MESSAGE AND CREATE IT FROM STRING AND HAND AND CREATE IT FROM STRING AND HAND IT OFF. WE ALSO NEED TO MODIFY OUR IT OFF. WE ALSO NEED TO MODIFY OUR DEFINITION HERE. LET ME GO BACK DEFINITION HERE. LET ME GO BACK SO THAT’S PRETTY MUCH IT. WE SHOULD SO THAT’S PRETTY MUCH IT. WE SHOULD BE ABLE TO BUILD THIS. IF EVERYTHING BE ABLE TO BUILD THIS. IF EVERYTHING WORKS OUT NICELY, IT WILL CONNECT WORKS OUT NICELY, IT WILL CONNECT UP TO THE AZURE SPHERE SERVICESS, UP TO THE AZURE SPHERE SERVICESS, PULL DOWN A CERTIFICATE, TAKE THE PULL DOWN A CERTIFICATE, TAKE THE CERTIFICATE, USE THAT TO AUTHENTICATE CERTIFICATE, USE THAT TO AUTHENTICATE TO THE IOT SERVICESS AND PUSH UP TO THE IOT SERVICESS AND PUSH UP DATA TO THE SERVICES. WHILE THAT’S DATA TO THE SERVICES. WHILE THAT’S GOING, UNDER THE COVERS WHAT I DIDN’T GOING, UNDER THE COVERS WHAT I DIDN’T TELL YOU IS THAT THE AZURE SPHERE TELL YOU IS THAT THE AZURE SPHERE SKD INCLUDES THE AZURE IOT SDK SKD INCLUDES THE AZURE IOT SDK WE SHOULD BE ABLE TO SEND SOME DATA WE SHOULD BE ABLE TO SEND SOME DATA UP THERE. LET’S LOOK AT THE SPECIFIC UP THERE. LET’S LOOK AT THE SPECIFIC DEVICE AND DEVICE EXPLORER. WE HAVE DEVICE AND DEVICE EXPLORER. WE HAVE THIS PARTICULAR GUARDIAN MODULE THIS PARTICULAR GUARDIAN MODULE EXAMPLE FOR THE DEVICE I’VE GOT EXAMPLE FOR THE DEVICE I’VE GOT WITHIN THERE WE HAVE JUST A FEW WITHIN THERE WE HAVE JUST A FEW EASY STEPS TO JUST GET YOURSELF EASY STEPS TO JUST GET YOURSELF UP AND RUNNING. [APPLAUSE]. TO HOOK UP AND RUNNING. [APPLAUSE]. TO HOOK UP TO IOT CENTRAL. I’M GOING TO UP TO IOT CENTRAL. I’M GOING TO HAND IT BACK TO MARCELLO MAJONCHI HAND IT BACK TO MARCELLO MAJONCHI >> THANK YOUX STEVE. SO THE DEMO >> THANK YOUX STEVE. SO THE DEMO GODS ARE ON OUR SIDE TODAY. WE CLEARED GODS ARE ON OUR SIDE TODAY. WE CLEARED THE FIRST BIG [INAUDIBLE]. GETTING THE FIRST BIG [INAUDIBLE]. GETTING ON THE DEVICE AND GET IT CONNECTED ON THE DEVICE AND GET IT CONNECTED AND SENDING DATA TO THE CLOUD. AT AND SENDING DATA TO THE CLOUD. AT THIS POINT WHAT WE CAN DO WITH IOT THIS POINT WHAT WE CAN DO WITH IOT CENTRAL IS TURN THIS DEVICE THAT CENTRAL IS TURN THIS DEVICE THAT SHOWS SOME MEASUREMENT ON CHART SHOWS SOME MEASUREMENT ON CHART TO SOMETHING THAT IS MEANING FOR TO SOMETHING THAT IS MEANING FOR US. REALLY TURNING THE ROGUE DATA US. REALLY TURNING THE ROGUE DATA THAT WE ARE GETTING FROM THIS DEVICE THAT WE ARE GETTING FROM THIS DEVICE INTO ACTIONABLE INSIGHT THAT DRIVE INTO ACTIONABLE INSIGHT THAT DRIVE OUR RICH APPLICATION. IN ORDER TO OUR RICH APPLICATION. IN ORDER TO DO THIS IOT CENTRAL PROVIDE US WITH DO THIS IOT CENTRAL PROVIDE US WITH CAPABILITIES TO TAKE ADVANTAGE OF CAPABILITIES TO TAKE ADVANTAGE OF THOSE WITHOUT DEALING WITH THE SERVICESS THOSE WITHOUT DEALING WITH THE SERVICESS THEMSELVES. SO WHEN WE CREATE AN THEMSELVES. SO WHEN WE CREATE AN IOT CENTRAL APPLICATION WE HAVE IOT CENTRAL APPLICATION WE HAVE THE [INAUDIBLE] EXPLORE THE DEVICES THE [INAUDIBLE] EXPLORE THE DEVICES AUTOMATIC PROVISION AND SHOWS UP AUTOMATIC PROVISION AND SHOWS UP IN IOT CENTRAL. WE HAVE THE CAPABILITIES IN IOT CENTRAL. WE HAVE THE CAPABILITIES OF GROUP DEVICES. THEY ARE QUERIES OF GROUP DEVICES. THEY ARE QUERIES TO CREATE FLEETS OF DEVICES TO USE TO CREATE FLEETS OF DEVICES TO USE THE DATA FROM THOSE DEVICES TO RUN

THE DATA FROM THOSE DEVICES TO RUN ANLETICS. SO USE AND RUN TIME QUERIES ANLETICS. SO USE AND RUN TIME QUERIES IN ORDER TO FIND ANOMALIES. TO RUN IN ORDER TO FIND ANOMALIES. TO RUN JOBS. TO RUN REMOTE COMMANDS OR JOBS. TO RUN REMOTE COMMANDS OR SERIES OF CONFIGURATION ON THOSE SERIES OF CONFIGURATION ON THOSE DEVICES. THINK OF A FIRM UPDATE DEVICES. THINK OF A FIRM UPDATE ON THE DEVICE. THEN WE HAVE THE ON THE DEVICE. THEN WE HAVE THE ABILITY TO MODIFY WHAT WE SEE AND ABILITY TO MODIFY WHAT WE SEE AND THE BEHAVIOR OF THOSE DEVICES. WITH THE BEHAVIOR OF THOSE DEVICES. WITH A WIZY WIG ENVIRONMENT THAT IS EMBEDDED A WIZY WIG ENVIRONMENT THAT IS EMBEDDED IN THE IOT APPLICATION. FOR EACH IN THE IOT APPLICATION. FOR EACH DEVICE WE DEFINE A SPECIFIC DEVICE DEVICE WE DEFINE A SPECIFIC DEVICE TEMPLATE THAT REPRESENT THE SCHEME TEMPLATE THAT REPRESENT THE SCHEME OF THE DEVICE WHICH IS THE COMBINATION OF THE DEVICE WHICH IS THE COMBINATION OF THE SCHEME OF THE DATA AND THE OF THE SCHEME OF THE DATA AND THE SCHEMA OF ALL THE ADDITIONAL INFORMATION SCHEMA OF ALL THE ADDITIONAL INFORMATION THAT WE RELATE TO THAT SPECIFIC THAT WE RELATE TO THAT SPECIFIC DEVICE. THE METADATA, THE BEHAVIOR DEVICE. THE METADATA, THE BEHAVIOR AND THE RULE OF THE AUTOMATIC RULES AND THE RULE OF THE AUTOMATIC RULES THAT WE RUN AND THE DASHBOARD. THE THAT WE RUN AND THE DASHBOARD. THE ABILITY TO CREATE AND TEMPTLET OZTHE ABILITY TO CREATE AND TEMPTLET OZTHE DATA. AS YOU SEE OVER HERE, WE HAVE DATA. AS YOU SEE OVER HERE, WE HAVE A BUNCH OF TELEMETRY AND DATA POINTS A BUNCH OF TELEMETRY AND DATA POINTS THAT WERE DEFINED IN THE CODE BY THAT WERE DEFINED IN THE CODE BY STEVE. THEN WE CAN DEFINE SPECIFIC STEVE. THEN WE CAN DEFINE SPECIFIC SETTINGS WHICH IS CONFIGURATION SETTINGS WHICH IS CONFIGURATION THAT WE CAN SEND BACK TO THE DEVICE THAT WE CAN SEND BACK TO THE DEVICE WE CAN TRACK METADATAUCT THIS DEVICE WE CAN TRACK METADATAUCT THIS DEVICE WE CAN STORE THAT ON THE CLOUD OR WE CAN STORE THAT ON THE CLOUD OR META’ DATA THAT WE WANT THE DEVICE META’ DATA THAT WE WANT THE DEVICE TO UPDATE. RUN COMMANDS. THINK OF TO UPDATE. RUN COMMANDS. THINK OF METHODS WE CAN CALL ON THE CLOUD METHODS WE CAN CALL ON THE CLOUD AND RUN ON THE DEVICE. MONITORING AND RUN ON THE DEVICE. MONITORING RULES WHICH IS EFFECTIVELY THE ABILITY RULES WHICH IS EFFECTIVELY THE ABILITY TO MONITOR PAY LOADS THAT WE ARE TO MONITOR PAY LOADS THAT WE ARE GETTING FOR THE DEVICE IN ORDER GETTING FOR THE DEVICE IN ORDER TO TRIGGER SPECIFIC BEHAVIORS AND TO TRIGGER SPECIFIC BEHAVIORS AND THEN THE ABILITY TO CREATE COMPELLING THEN THE ABILITY TO CREATE COMPELLING DASHBOARDS. IT TAKES ONLY A FEW DASHBOARDS. IT TAKES ONLY A FEW MINUTES TO DO THIS. IN ORDER TO MINUTES TO DO THIS. IN ORDER TO SAVE TIME, I HAVE AN EXAMPLE OF SAVE TIME, I HAVE AN EXAMPLE OF A SIMILAR TEMPLATE THAT I DID STARTING A SIMILAR TEMPLATE THAT I DID STARTING FROM THE SAME STATING POINT AS THIS FROM THE SAME STATING POINT AS THIS BUT GIVING IT THE FLAVOR OF WHAT BUT GIVING IT THE FLAVOR OF WHAT A REAL DEVICE POWERED BY AN AZURE A REAL DEVICE POWERED BY AN AZURE SPHERE BOARD WILL ACTUALLY LOOK SPHERE BOARD WILL ACTUALLY LOOK LIKE. I GO BACK TO THE DEVICE TEMPLATE LIKE. I GO BACK TO THE DEVICE TEMPLATE IN ADDITION TO THE [INAUDIBLE] MODEL IN ADDITION TO THE [INAUDIBLE] MODEL I CREATED A FAKE POWER GENERATOR I CREATED A FAKE POWER GENERATOR THIS POWER GENERATOR HAS THE SAME THIS POWER GENERATOR HAS THE SAME TEMPERATURE AND HUMIDITY AS THE TEMPERATURE AND HUMIDITY AS THE GUARDIAN MODULE BUT ALSO ADDED ADDITIONAL GUARDIAN MODULE BUT ALSO ADDED ADDITIONAL TYPE OF DATA THAT WE ARE TRACKING TYPE OF DATA THAT WE ARE TRACKING IMAGINING THAT THIS DEVICE COULD IMAGINING THAT THIS DEVICE COULD HAVE [INAUDIBLE] MAGNETOMETERS HAVE [INAUDIBLE] MAGNETOMETERS THE ABILITY TO SPEND SPECIFIC EVENTS THE ABILITY TO SPEND SPECIFIC EVENTS THAT WE CAN TRACK AND MAP TO SPECIFIC THAT WE CAN TRACK AND MAP TO SPECIFIC BEHAVIORS. VARYING SETTINGS. WE BEHAVIORS. VARYING SETTINGS. WE DEFINE A BUNCH OF CONFIGURATION DEFINE A BUNCH OF CONFIGURATION THAT CAN BE RELATED TO THE SPEED THAT CAN BE RELATED TO THE SPEED OF THE COOLING FAN, PROPERTIES, OF THE COOLING FAN, PROPERTIES, THOSE ARE THE META DATA THAT YOU THOSE ARE THE META DATA THAT YOU CAN EXPECT FROM AN INDUSTRIAL MACHINE CAN EXPECT FROM AN INDUSTRIAL MACHINE SO TRACKING THE MODEL, SERIAL NUMBER, SO TRACKING THE MODEL, SERIAL NUMBER, WHO ARE THE PEOPLE IN CHARGE OF WHO ARE THE PEOPLE IN CHARGE OF MAINTAINING IT. COMMANDS, THE EXAMPLE MAINTAINING IT. COMMANDS, THE EXAMPLE IS THE FIRM WARE THAT WE CAN TRIGGER IS THE FIRM WARE THAT WE CAN TRIGGER FROM HERE. MONITORING RULE EXAMPLE FROM HERE. MONITORING RULE EXAMPLE I’M MONITORING THE PAY LOAD FOR I’M MONITORING THE PAY LOAD FOR THE TEMPERATURE VALUES THAT ARE THE TEMPERATURE VALUES THAT ARE COMING. I’M RUNNING EACH PAY LOAD COMING. I’M RUNNING EACH PAY LOAD THAT I’M GETTING AGAINST A SIMPLE THAT I’M GETTING AGAINST A SIMPLE CONDITION. IN THIS CASE I’M MONITORING CONDITION. IN THIS CASE I’M MONITORING THAT THE VALUE IS GREATER THAN A THAT THE VALUE IS GREATER THAN A SPECIFIC NUMBER. 100 IN THIS CASE SPECIFIC NUMBER. 100 IN THIS CASE WHAT I CAN DO AND I HAVE A VISUAL WHAT I CAN DO AND I HAVE A VISUAL REPRESENTATION OF MY RULE THAT WE REPRESENTATION OF MY RULE THAT WE ARE GETTING FROM THIS DEVICE. I ARE GETTING FROM THIS DEVICE. I CAN TRIGGER SPECIFIC ACTIONS EITHER CAN TRIGGER SPECIFIC ACTIONS EITHER INSIDE THE PRODUCT WHICH IS SENDING INSIDE THE PRODUCT WHICH IS SENDING AN E-MAIL NOTIFICATION OR CALLING AN E-MAIL NOTIFICATION OR CALLING A [INAUDIBLE] OR OUTSIDE OF THE A [INAUDIBLE] OR OUTSIDE OF THE PRODUCT. WE HAVE FIRSTER PART INTEGRATION PRODUCT. WE HAVE FIRSTER PART INTEGRATION WITH MAJOR AZURE SERVICESS THAT WITH MAJOR AZURE SERVICESS THAT WE ARE SURE YOU WILL RECOGNIZE FROM WE ARE SURE YOU WILL RECOGNIZE FROM AZURE FUNCTION TO AZURE [INAUDIBLE] AZURE FUNCTION TO AZURE [INAUDIBLE] FLOW IS PARTICULARLY INTERESTING FLOW IS PARTICULARLY INTERESTING BECAUSE WE HAVE A FLOW CONNECTOR BECAUSE WE HAVE A FLOW CONNECTOR WHICH WHO IS ALTERING IS INTEGRATING WHICH WHO IS ALTERING IS INTEGRATING THE IOT CENTRAL. SO YOU WILL DEFINE THE IOT CENTRAL. SO YOU WILL DEFINE YOUR MICROSOFT FLOW FROM HERE. WE YOUR MICROSOFT FLOW FROM HERE. WE HAVE TEMPLATES THAT YOU CAN START HAVE TEMPLATES THAT YOU CAN START WITH BUT YOU CAN START FROM SCRATCH WITH BUT YOU CAN START FROM SCRATCH IN THE FLOW CATALOG OF ACTION YOU IN THE FLOW CATALOG OF ACTION YOU WILL HAVE IOT CENTRAL ACTIONS AND WILL HAVE IOT CENTRAL ACTIONS AND TRIGGERS. AN EXAMPLE WE HAVE TEMPLATES TRIGGERS. AN EXAMPLE WE HAVE TEMPLATES TO TRIGGER SPECIFIC ACTION IN DYNAMICS, TO TRIGGER SPECIFIC ACTION IN DYNAMICS, IN TEAMS, IN FLOW APPS, [INAUDIBLE], IN TEAMS, IN FLOW APPS, [INAUDIBLE], EMAILS FROM OUT LOOK. WE CAN START

EMAILS FROM OUT LOOK. WE CAN START WITH A BLANK TEMPLATE THAT WILL WITH A BLANK TEMPLATE THAT WILL ENABLE AZURE TO TAKE A LOOK AUTOWHAT ENABLE AZURE TO TAKE A LOOK AUTOWHAT WE CAN DO TO FLOW. I DON’T WANT WE CAN DO TO FLOW. I DON’T WANT TO GIVE YOU A FULL FLOW DEMO. THAT’S TO GIVE YOU A FULL FLOW DEMO. THAT’S A DIFFERENT SESSION. JUST TO GIVE A DIFFERENT SESSION. JUST TO GIVE YOU AN IDEA. I LOG IN WITH MY MICROSOFT YOU AN IDEA. I LOG IN WITH MY MICROSOFT ACCOUNT. I HAVE MY TEMPLATE. IT’S ACCOUNT. I HAVE MY TEMPLATE. IT’S LOADING THE DATA THAT IS TRIGGERING LOADING THE DATA THAT IS TRIGGERING THE FLOW. THIS IS THE RULE THAT THE FLOW. THIS IS THE RULE THAT IS TRIGGERING. FROM HERE I CAN TAP IS TRIGGERING. FROM HERE I CAN TAP INTO THE VAST CATALOG OF ACTIONS INTO THE VAST CATALOG OF ACTIONS THAT FLOW IS PROVIDING. SOMETHING THAT FLOW IS PROVIDING. SOMETHING SUPER SIMPLE LIKE CREATING A NEW SUPER SIMPLE LIKE CREATING A NEW SMS IN FLOW LIKE MOBILE NOTIFICATION SMS IN FLOW LIKE MOBILE NOTIFICATION THE TYPE OF META DATA THAT I DEFINE THE TYPE OF META DATA THAT I DEFINE ARE LIMITED BUT THE INTERESTING ARE LIMITED BUT THE INTERESTING PART IS FOR EACH EVENT THAT IS TRIGGERED PART IS FOR EACH EVENT THAT IS TRIGGERED BY A RULE, I PASS A PAY LOAD THAT BY A RULE, I PASS A PAY LOAD THAT CONTAGS ALL THE METADATA AND USE CONTAGS ALL THE METADATA AND USE THAT AS A PAY LOAD AND CREATE A THAT AS A PAY LOAD AND CREATE A RICH NOTIFICATION IN THIS CASE RICH NOTIFICATION IN THIS CASE SO I CAN PUT A NOTIFICATION OF WHAT SO I CAN PUT A NOTIFICATION OF WHAT WAS THE DEVICE THAT TRIGGERED IT WAS THE DEVICE THAT TRIGGERED IT AND WHAT WAS THE VALUE. ANOTHER AND WHAT WAS THE VALUE. ANOTHER IDEA OF AN EXAMPLE GOING BACK CREATING IDEA OF AN EXAMPLE GOING BACK CREATING A SIMPLE NOTIFICATION E-MAIL. WE A SIMPLE NOTIFICATION E-MAIL. WE ARE SHOWING A TEMPLATE OF THE E-MAIL ARE SHOWING A TEMPLATE OF THE E-MAIL WE WILL BE SENDING OUT. AS YOU CAN WE WILL BE SENDING OUT. AS YOU CAN SEE HERE WE HAVE ALL THE METADATA SEE HERE WE HAVE ALL THE METADATA IN THE E-MAIL ABOUT THE DEVICE TYPE IN THE E-MAIL ABOUT THE DEVICE TYPE OR RULE AND THE VALUE AND NODES OR RULE AND THE VALUE AND NODES THAT WERE TRIGGERED BY THIS RULE THAT WERE TRIGGERED BY THIS RULE LAST BUT NOT LEAST, DASHBOARD. THE LAST BUT NOT LEAST, DASHBOARD. THE ABILITY TO USE ALL THE DATA AND ABILITY TO USE ALL THE DATA AND METADATA FOR THE SPECIFIC DEVICE METADATA FOR THE SPECIFIC DEVICE TO CREATE A RICH EXPERIENCE FOR TO CREATE A RICH EXPERIENCE FOR THE USERS LOGGING IN. HERE IS A THE USERS LOGGING IN. HERE IS A TYPICAL WHAT YOU SEE IS WHAT YOU TYPICAL WHAT YOU SEE IS WHAT YOU GET DASHBOARD THAT I CAN COMPOSE GET DASHBOARD THAT I CAN COMPOSE WITH A LIBRARY OF WIDGETS. THE WIDGETS WITH A LIBRARY OF WIDGETS. THE WIDGETS I CHOOSE FROM A LIBEARY OF DIFFERENT I CHOOSE FROM A LIBEARY OF DIFFERENT TYPES AND THE NATURE OF DATA I WANT TYPES AND THE NATURE OF DATA I WANT TO DISPLAY. I SELECT A NEW WIDGET TO DISPLAY. I SELECT A NEW WIDGET I WILL FIND HERE. I GIVE IT A NAME I WILL FIND HERE. I GIVE IT A NAME I DEFINE THE TIME RANGE IN THE QUERY I DEFINE THE TIME RANGE IN THE QUERY THAT I WANT TO DO ON THE TIME SERIES THAT I WANT TO DO ON THE TIME SERIES THE PAST 30 MINUTES. I DEFINE THE THE PAST 30 MINUTES. I DEFINE THE MEASUREMENTS. LET’S SAY I WANT TEMPERATURE MEASUREMENTS. LET’S SAY I WANT TEMPERATURE AND HUMIDITY. I SAVE IT AUTOMATICALLY AND HUMIDITY. I SAVE IT AUTOMATICALLY I GET ALL THE DATA THAT I HAVE OVER I GET ALL THE DATA THAT I HAVE OVER HERE. NOW, IN ORDER TO BE ABLE TO HERE. NOW, IN ORDER TO BE ABLE TO HAVE A RICH EXPERIENCE, IOT CENTRAL HAVE A RICH EXPERIENCE, IOT CENTRAL BEFORE CONNECTING THE SPHERE DEVICE BEFORE CONNECTING THE SPHERE DEVICE I CAN LEVERAGE A SIMULATOR THAT I CAN LEVERAGE A SIMULATOR THAT ENABLES ME TO CREATE SIMULATED DEVICES ENABLES ME TO CREATE SIMULATED DEVICES IN ORDER TO MAKE SURE THAT WHAT IN ORDER TO MAKE SURE THAT WHAT I’M BUILDING IN IOT CENTRAL MAKES I’M BUILDING IN IOT CENTRAL MAKES SENSE. I HAVE A SIMULATED DEVICE SENSE. I HAVE A SIMULATED DEVICE HERE. THERE IS A SIMULATED DATA HERE. THERE IS A SIMULATED DATA COMING IN IN TERMS OF EVENTS, IN COMING IN IN TERMS OF EVENTS, IN TERMS OF TELEMETRY AND THE DASHBOARD TERMS OF TELEMETRY AND THE DASHBOARD THAT WE SAW. THIS IS HOW IT LOOKS THAT WE SAW. THIS IS HOW IT LOOKS WITH JUST SIMULATED DATA THAT IS WITH JUST SIMULATED DATA THAT IS COMING IN. WE CAN DISPLAY TIME SERIOUS COMING IN. WE CAN DISPLAY TIME SERIOUS DATA. WE CAN DISPLAY META DATA AND DATA. WE CAN DISPLAY META DATA AND DIFFERENT CHARTS AND DATA. AS YOU DIFFERENT CHARTS AND DATA. AS YOU SEE OVER HERE WE CAN DISPLAY MAPS SEE OVER HERE WE CAN DISPLAY MAPS MAPS ARE THE RENDERING OF LOCATIONS MAPS ARE THE RENDERING OF LOCATIONS THAT ARE TRACKED IN PROPERTIES THAT ARE TRACKED IN PROPERTIES SO IF WE GO BACK HERE IN THE PROPERTIES, SO IF WE GO BACK HERE IN THE PROPERTIES, WE HAVE SPECIFIC GPS LOCATION VALUE WE HAVE SPECIFIC GPS LOCATION VALUE WE WILL USE CORPORATE ADDRESS. IF WE WILL USE CORPORATE ADDRESS. IF I SAVE IT HERE AND GEBACK TO THE I SAVE IT HERE AND GEBACK TO THE DASHBOARD THE MAP WILL BE RENDERED DASHBOARD THE MAP WILL BE RENDERED THIS WILL SHOW THE LOCATION. THIS THIS WILL SHOW THE LOCATION. THIS LOCATION CAN BE [INAUDIBLE]. IF LOCATION CAN BE [INAUDIBLE]. IF I HAVE CONNECTED TO A GPS, THE DEVICE I HAVE CONNECTED TO A GPS, THE DEVICE IT TRACK ITS LOCATION AND [INAUDIBLE] IT TRACK ITS LOCATION AND [INAUDIBLE] UPDATED LIVE IN THE DEVICE ITSELF UPDATED LIVE IN THE DEVICE ITSELF I ALSO HAVE A BUNCH OF [INAUDIBLE] I ALSO HAVE A BUNCH OF [INAUDIBLE] THAT I CAN LEVERAGE IN ORDER TO THAT I CAN LEVERAGE IN ORDER TO CREATE RICHER EXPERIENCES. ONE IMPORTANT CREATE RICHER EXPERIENCES. ONE IMPORTANT THING IS WHAT WE CALL [INAUDIBLE] THING IS WHAT WE CALL [INAUDIBLE] BASICALLY THE ABILITY TO CREATE BASICALLY THE ABILITY TO CREATE DIFFERENT TYPES OF PROFILE TO EXPORT DIFFERENT TYPES OF PROFILE TO EXPORT DATA TARGETING THE DIFFERENT AZURE DATA TARGETING THE DIFFERENT AZURE SERVICES. I HAVE THE ABILITY TO SERVICES. I HAVE THE ABILITY TO DUMP DATA INTO AN AZURE BLOG STORAGE

DUMP DATA INTO AN AZURE BLOG STORAGE I CAN ALSO USE IT [INAUDIBLE]. IF I CAN ALSO USE IT [INAUDIBLE]. IF I WANT REAL-TIME DATA, I CAN JUST I WANT REAL-TIME DATA, I CAN JUST HOOK IT UP TO AN EVENT HUB OF MY HOOK IT UP TO AN EVENT HUB OF MY CHOICE AND BE ABLE TO STREAM THE CHOICE AND BE ABLE TO STREAM THE DATA FROM ALL THE DEVICES CONNECTED DATA FROM ALL THE DEVICES CONNECTED SEEMLESSLY TO THAT SPECIFIC APPLICATION SEEMLESSLY TO THAT SPECIFIC APPLICATION THE CONFIGURATION IS VERY EASY THE CONFIGURATION IS VERY EASY I JUST WITH THE SAME UI JUSTIFY I JUST WITH THE SAME UI JUSTIFY THE PARAMETERS OF MY EXPORT, WHAT THE PARAMETERS OF MY EXPORT, WHAT TYPE OF DATA THAT I WANT TO EXPORT, TYPE OF DATA THAT I WANT TO EXPORT, I PUT THE [INAUDIBLE] EVENT HUB I PUT THE [INAUDIBLE] EVENT HUB AND HIT SAVE AND BE ALL SET. THIS AND HIT SAVE AND BE ALL SET. THIS IS JUST SCRATCHING THE SERVICES IS JUST SCRATCHING THE SERVICES WITH WHAT YOU CAN DO WITH IOT CENTRAL WITH WHAT YOU CAN DO WITH IOT CENTRAL ALL THE CAPABILITIES THAT I SHOWED ALL THE CAPABILITIES THAT I SHOWED HERE ARE JUST WHAT WE EXPOSED. EVERY HERE ARE JUST WHAT WE EXPOSED. EVERY SINGLE CAPABILITY [INAUDIBLE] IS SINGLE CAPABILITY [INAUDIBLE] IS A SERVICE THAT YOU DON’TS HAVE TO A SERVICE THAT YOU DON’TS HAVE TO MANAGE. IT’S PART OF THE PRODUCT MANAGE. IT’S PART OF THE PRODUCT IF YOU CONNECT ONE DEVICE, WE WILL IF YOU CONNECT ONE DEVICE, WE WILL SCALE THAT SERVICES IN ORDER TO SCALE THAT SERVICES IN ORDER TO MANAGE THE DATA AND HANDLE ONE DEVICE MANAGE THE DATA AND HANDLE ONE DEVICE IF YOU DECIDE 1 MILLION DEVICES, IF YOU DECIDE 1 MILLION DEVICES, THE INFRASTRUCK WILL SCALE TO PROVIDE THE INFRASTRUCK WILL SCALE TO PROVIDE ALL THE PROPER SIZE OF SERVICES ALL THE PROPER SIZE OF SERVICES THAT YOU NEED FOR THAT DEVICE. [INAUDIBLE] THAT YOU NEED FOR THAT DEVICE. [INAUDIBLE] YOU DON’T PAY FOR THE SERVICESS YOU DON’T PAY FOR THE SERVICESS THAT UNDERNEATH. YOU JUST PAY A THAT UNDERNEATH. YOU JUST PAY A SINGLE BILL FOR IOT CENTRAL AS A SINGLE BILL FOR IOT CENTRAL AS A PRODUCT. THIS IS ABOUT IOT CENTRAL PRODUCT. THIS IS ABOUT IOT CENTRAL IT’S A GREAT COMBINATION WITH SPHERE IT’S A GREAT COMBINATION WITH SPHERE THANK YOU FOR TODAY. WE WILL REMAIN THANK YOU FOR TODAY. WE WILL REMAIN HERE FOR YOUR QUESTIONS. I INVITE HERE FOR YOUR QUESTIONS. I INVITE YOU TO GET A SPHERE [INAUDIBLE] YOU TO GET A SPHERE [INAUDIBLE] OPEN UP YOUR OWN APPLICATION. IT’S OPEN UP YOUR OWN APPLICATION. IT’S FREE UP TO 5 DEVICES AND TRY IT FREE UP TO 5 DEVICES AND TRY IT OUT YOURSELF. THANK YOU SO MUCH OUT YOURSELF. THANK YOU SO MUCH [APPLAUSE] [APPLAUSE]. >> IF YOU [APPLAUSE] [APPLAUSE]. >> IF YOU CAN GO TO THE MICROPHONE. FORM A CAN GO TO THE MICROPHONE. FORM A LINE. >> MY QUESTION IS IN REGARDS LINE. >> MY QUESTION IS IN REGARDS TO THE MARKET PLACE THAT YOU HAVE TO THE MARKET PLACE THAT YOU HAVE REGARDING CERTIFICATED DEVICES THAT REGARDING CERTIFICATED DEVICES THAT WE SAW EARLY. WE SAW [INAUDIBLE] WE SAW EARLY. WE SAW [INAUDIBLE] THAT CONNECT TO THE CLOUD. I’M LOOKING THAT CONNECT TO THE CLOUD. I’M LOOKING AT THIS AND THINKING MAYBE WE COULD AT THIS AND THINKING MAYBE WE COULD DO MORE PURCHASE SOLUTION RATHER DO MORE PURCHASE SOLUTION RATHER THAN BUILD EVERYTHING OURSELVES THAN BUILD EVERYTHING OURSELVES WE WOULD HAVE TO CONNECT TO THE WE WOULD HAVE TO CONNECT TO THE BLE RELAY AND FIRM WAY. MY QUESTION BLE RELAY AND FIRM WAY. MY QUESTION IS IS THERE SOMETHING ALREADY IN IS IS THERE SOMETHING ALREADY IN EXISTENCE THAT YOU KNOW OF THAT EXISTENCE THAT YOU KNOW OF THAT WOULD DO THAT. >> [INAUDIBLE] WILL WOULD DO THAT. >> [INAUDIBLE] WILL ENABLE YOU TO DO [INAUDIBLE] AS ENABLE YOU TO DO [INAUDIBLE] AS A GATE WAY AND CONNECT THE BLE DEVICES A GATE WAY AND CONNECT THE BLE DEVICES AND BEING ABLE TO MANAGE THEM. >> AND BEING ABLE TO MANAGE THEM. >> I DON’T KNOW IF YOU SAW IN THE CONVENTION I DON’T KNOW IF YOU SAW IN THE CONVENTION CENTER THERE’S A MODULE BY [INAUDIBLE] CENTER THERE’S A MODULE BY [INAUDIBLE] THAT HAS BLE BUILT INTO IT. >> WHY THAT HAS BLE BUILT INTO IT. >> WHY DID YOU USE AN IOT EDGE DEVICE INSTEAD DID YOU USE AN IOT EDGE DEVICE INSTEAD OF THE GUARDIAN MODULE. WHY DID OF THE GUARDIAN MODULE. WHY DID YOU CHOOSE THE GUARDIAN MODULE FOR YOU CHOOSE THE GUARDIAN MODULE FOR THIS? >> WHY WOULD I NOT USE AN THIS? >> WHY WOULD I NOT USE AN IOT EDGE? WE USE AN AZURE SPHERE IOT EDGE? WE USE AN AZURE SPHERE DEVICE. >> THE GUARDIAN MODULE THAT’S DEVICE. >> THE GUARDIAN MODULE THAT’S THE AZURE SPHERE WAS PUT IN THE THE AZURE SPHERE WAS PUT IN THE MODULE? SO WHAT DOES THE GUARDIAN MODULE? SO WHAT DOES THE GUARDIAN MODULE PROVIDE? >> THE GUARDIAN MODULE PROVIDE? >> THE GUARDIAN MODULE IS A CONCEPT OR DEPLOYMENT MODULE IS A CONCEPT OR DEPLOYMENT METHOD IF YOU HAVE BROWN FIELD DEVICES METHOD IF YOU HAVE BROWN FIELD DEVICES IF YOU HAVE EXISTING DEVICE YOU IF YOU HAVE EXISTING DEVICE YOU WANT TO UTILIZE WHAT YOU HAVE. YOU WANT TO UTILIZE WHAT YOU HAVE. YOU COULD HOOK UP A GUARDIAN MODULE COULD HOOK UP A GUARDIAN MODULE UP TO IT. GUARDIAN MODULE ARE POWERED UP TO IT. GUARDIAN MODULE ARE POWERED BY AZURE SPHERE. THE AZURE SPHERE BY AZURE SPHERE. THE AZURE SPHERE IS THE MCU. THE SHIP ON IT. >> SO IS THE MCU. THE SHIP ON IT. >> SO EVERYTHING IS ON THE AZURE SPHERE? EVERYTHING IS ON THE AZURE SPHERE? >> CORRECT. >> ANY HOPE FOR [INAUDIBLE] >> CORRECT. >> ANY HOPE FOR [INAUDIBLE] BEING INTEGRATED WITH AZURE SPHERE BEING INTEGRATED WITH AZURE SPHERE AS OPPOSED TO MICROSOFT. >> IS THE AS OPPOSED TO MICROSOFT. >> IS THE QUESTION CAN I USE EXTERNAL CA CHAINS QUESTION CAN I USE EXTERNAL CA CHAINS TO AUTHENTICATE TO OTHER SERVICES? TO AUTHENTICATE TO OTHER SERVICES? THERE’S NO PLANS RIGHT NOW. IF I

THERE’S NO PLANS RIGHT NOW. IF I COULD INTEGRATE MY EXISTING CHAIN COULD INTEGRATE MY EXISTING CHAIN INTO AZURE SPHERE SERVICESS INTO INTO AZURE SPHERE SERVICESS INTO MY TENTANT AND PULL FROM YOUR EXISTING MY TENTANT AND PULL FROM YOUR EXISTING CHAIN? >> CORRECT. >> CURRENTLY CHAIN? >> CORRECT. >> CURRENTLY NO. THAT’S GOOD FEEDBACK. WE WOULD NO. THAT’S GOOD FEEDBACK. WE WOULD LOVE TO TALK TO YOU AFTERWARDS LOVE TO TALK TO YOU AFTERWARDS >> ANY CHANCE OF ADDING RECLAIMING >> ANY CHANCE OF ADDING RECLAIMING A DEVICE? >> YEAH, WE GET THAT FEEDBACK A DEVICE? >> YEAH, WE GET THAT FEEDBACK A LOT. WE ARE WORKING ON SOMETHING A LOT. WE ARE WORKING ON SOMETHING FOR THAT. WE HEAR THAT A LOT. CURRENTLY FOR THAT. WE HEAR THAT A LOT. CURRENTLY WE DON’T HAVE ANYTHING TO CHANGE WE DON’T HAVE ANYTHING TO CHANGE THAT NOW. THE REAL CHALLENGE IS THAT NOW. THE REAL CHALLENGE IS HOW DO YOU IDENTIFY A DEV KIT DEVICE HOW DO YOU IDENTIFY A DEV KIT DEVICE VERSES A [INAUDIBLE] DEVICE. >> VERSES A [INAUDIBLE] DEVICE. >> AZURE SPHERE IS ABOUT THE 7 PROPERTIES AZURE SPHERE IS ABOUT THE 7 PROPERTIES IN THE EARLY SLIDES YOU SAID AZURE IN THE EARLY SLIDES YOU SAID AZURE SPHERE [INAUDIBLE] IF YOU GO INTO SPHERE [INAUDIBLE] IF YOU GO INTO AN INDUSTRIAL SECURITY SPACE CUSTOMERS AN INDUSTRIAL SECURITY SPACE CUSTOMERS ARE NOTE TAKING SKILLED IN HOW STRONG ARE NOTE TAKING SKILLED IN HOW STRONG THE SECURITY CLAIM. IS THERE ANY THE SECURITY CLAIM. IS THERE ANY DOCUMENTATION HOW MUCH PRODUCTION DOCUMENTATION HOW MUCH PRODUCTION THE SOLUTION PROVIDES? FOR EXAMPLE, THE SOLUTION PROVIDES? FOR EXAMPLE, IS IT A PROTECTION AGAINST SPA’S, IS IT A PROTECTION AGAINST SPA’S, DPA? GOOD PRACTICE IN SECURITY BUSINESS DPA? GOOD PRACTICE IN SECURITY BUSINESS IS THAT YOU DEFINE YOUR SECURITY IS THAT YOU DEFINE YOUR SECURITY GOAL AND UBTRACT TO AN EVALUATION GOAL AND UBTRACT TO AN EVALUATION THAT PROVES YOU HAVE NOT MADE ANY THAT PROVES YOU HAVE NOT MADE ANY FAULT IN THE IMPLEMENTATION? >> FAULT IN THE IMPLEMENTATION? >> I CAN’T ANSWER THAT. IF YOU STICK I CAN’T ANSWER THAT. IF YOU STICK AROUND SOMEONE MIGHT. ARE THERE AROUND SOMEONE MIGHT. ARE THERE OTHER CERTIFICATE THAT WOULD HELP OTHER CERTIFICATE THAT WOULD HELP TELL THAT STORY. STICK AROUND. I TELL THAT STORY. STICK AROUND. I THINK THERE’S FOLKS UP FRONT TO THINK THERE’S FOLKS UP FRONT TO HELP. >> DOES THERE A SECURITY TARGET HELP. >> DOES THERE A SECURITY TARGET EXIST? A DOCUMENTATION EXIST? >> EXIST? A DOCUMENTATION EXIST? >> [INAUDIBLE] LITERATURE? >> [INAUDIBLE] [INAUDIBLE] LITERATURE? >> [INAUDIBLE] >> I TALKED TO JOSH ABOUT THIS EARLIER >> I TALKED TO JOSH ABOUT THIS EARLIER THE UNDER LYING ASSUMPTION IS YOU THE UNDER LYING ASSUMPTION IS YOU HAVE A HIGH SPEED NETWORK. WHEN HAVE A HIGH SPEED NETWORK. WHEN YOU GO WITH CELLULAR CONNECTIVITY YOU GO WITH CELLULAR CONNECTIVITY THERE ARE UNDER LYING ISSUES. MATCHING THERE ARE UNDER LYING ISSUES. MATCHING AND COMPRESSING DATA. YOU NEED INTEGRATION AND COMPRESSING DATA. YOU NEED INTEGRATION WITH CELL PHONE PROVIDERS FOR BILLING WITH CELL PHONE PROVIDERS FOR BILLING INFORMATION. THERE’S A LOT OF OTHER INFORMATION. THERE’S A LOT OF OTHER STUFF THERE. REALLY NEED A SOLUTION STUFF THERE. REALLY NEED A SOLUTION THAT INTEGRATES ALL THESE CAPABILITIES THAT INTEGRATES ALL THESE CAPABILITIES INTO A CELL PHONE NETWORK BASE SOLUTION INTO A CELL PHONE NETWORK BASE SOLUTION >> AGREED. WE HAVE HEARD THAT FEEDBACK >> AGREED. WE HAVE HEARD THAT FEEDBACK BEFORE AND WE ARE INVESTIGATING BEFORE AND WE ARE INVESTIGATING THAT AS A FUTURE CONNECTIVITY OPTION THAT AS A FUTURE CONNECTIVITY OPTION >> HI, I HAVE TWO QUESTIONS. ONE >> HI, I HAVE TWO QUESTIONS. ONE IS AROUND AZURE SPHERE. LET’S SAY IS AROUND AZURE SPHERE. LET’S SAY WE HAVE A SET OF WHERE WE HAVE AN WE HAVE A SET OF WHERE WE HAVE AN IOT EDGE DEVICE, WHERE WOULD THIS IOT EDGE DEVICE, WHERE WOULD THIS — IT DOES NOT HAVE AZURE SPHERE — IT DOES NOT HAVE AZURE SPHERE BUILT IN. WHERE WOULD THE GUARDIAN BUILT IN. WHERE WOULD THE GUARDIAN MODULE SIT? ON THE DEVICE SIDE OR MODULE SIT? ON THE DEVICE SIDE OR THE INTERNET SIDE? >> IF I UNDERSTAND THE INTERNET SIDE? >> IF I UNDERSTAND CORRECTLY, SAY YOU HAVE AN IOT EDGE CORRECTLY, SAY YOU HAVE AN IOT EDGE SERVER AND A CONCEPT OF THE GUARDIAN SERVER AND A CONCEPT OF THE GUARDIAN MODULE. WHERE DOES IT PLAY IN THIS MODULE. WHERE DOES IT PLAY IN THIS SPACE? AZURE SPHERE WOULDN’T SERVE SPACE? AZURE SPHERE WOULDN’T SERVE AS THE IOT DEVICE. THESE ARE CONSTRAINED AS THE IOT DEVICE. THESE ARE CONSTRAINED DEVICES. SO YOU WOULD LOOK AT THE DEVICES. SO YOU WOULD LOOK AT THE GUARDIAN MODULE CONNECTED AS A DOWNSTREAM GUARDIAN MODULE CONNECTED AS A DOWNSTREAM DEVICE CONNECTING THROUGH THE IOT DEVICE CONNECTING THROUGH THE IOT EDGE SERVER, PROCESSING COGNITIVE EDGE SERVER, PROCESSING COGNITIVE SERVICES AND PROCESSING UP. >> SO SERVICES AND PROCESSING UP. >> SO IF I HAVE 100 DIFFERENT DEVICES, IF I HAVE 100 DIFFERENT DEVICES, BROWN FIELD, CONNECTING THEN DO BROWN FIELD, CONNECTING THEN DO I NEED 100 DIFFERENT GUARDIAN MODULE I NEED 100 DIFFERENT GUARDIAN MODULE HOOKED UP? >> YES. >> OKAY. THE HOOKED UP? >> YES. >> OKAY. THE SECOND QUESTION IS AROUND IOT CENTRAL SECOND QUESTION IS AROUND IOT CENTRAL YOU MENTION THERE IS A COST ASSOCIATED YOU MENTION THERE IS A COST ASSOCIATED TO PURCHASING THE IOT CENTRAL AS

TO PURCHASING THE IOT CENTRAL AS OPPOSED TO UNDER LYING COST. IF OPPOSED TO UNDER LYING COST. IF I’M DOING SOMETHING LIKE A PROOF I’M DOING SOMETHING LIKE A PROOF OF TECHNOLOGY FOR A CLIENT AND THEY OF TECHNOLOGY FOR A CLIENT AND THEY JUST WANT TO HOOK UP A FEW DEVICES, JUST WANT TO HOOK UP A FEW DEVICES, DO YOU HAVE A PACKAGE — >> [INAUDIBLE] DO YOU HAVE A PACKAGE — >> [INAUDIBLE] IS A FREE MODEL UP TO 5 DEVICES IS A FREE MODEL UP TO 5 DEVICES THEN YOU START PAYING AFTER 6. >> THEN YOU START PAYING AFTER 6. >> HOW DO YOU DEFINE A DEVICE. ONE HOW DO YOU DEFINE A DEVICE. ONE DEVICE MAY BE [INAUDIBLE]. >> IT’S DEVICE MAY BE [INAUDIBLE]. >> IT’S WHATEVER MAKES SENSE FOR YOU. WHATEVER WHATEVER MAKES SENSE FOR YOU. WHATEVER COMES WITH AN I. D. AND COMES WITH COMES WITH AN I. D. AND COMES WITH A SINGLE DEDICATED AUTHENTICATION A SINGLE DEDICATED AUTHENTICATION IS THE DEVICE FOR YOU. YOU CAN MESH IS THE DEVICE FOR YOU. YOU CAN MESH UP TO PHYSICAL DEVICES BUT IT’S UP TO PHYSICAL DEVICES BUT IT’S UP TO YOU. >> THANK YOU SO MUCH, UP TO YOU. >> THANK YOU SO MUCH,

You Want To Have Your Favorite Car?

We have a big list of modern & classic cars in both used and new categories.