表紙
市場調查報告書

IoT & 嵌入作業系統的全球市場

The Global Market for IoT & Embedded Operating Systems

出版商 VDC Research Group, Inc. 商品編碼 951144
出版日期 內容資訊 英文 29 Pages; 17 Exhibits/Market Study; 335 Exhbits/End User Survey
商品交期: 最快1-2個工作天內
價格
IoT & 嵌入作業系統的全球市場 The Global Market for IoT & Embedded Operating Systems
出版日期: 2020年05月31日內容資訊: 英文 29 Pages; 17 Exhibits/Market Study; 335 Exhbits/End User Survey
簡介

因為傳統的通用許可證作業系統(OS)的收益面臨來自免費的競爭壓力高漲,VDC持續推薦IoT及嵌入作業系統供應商轉移焦點到安全重視的市場。由於史無前例的COVID-19大流行疫情,供應商,試圖駕馭瞬息萬變的市場時,需要臨時停止市場開拓計劃並重新評估。

本報告提供全球IoT & 嵌入作業系統市場相關調查,市場概要,地區、各業界的分析與預測,及競爭情形等相關分析。

本調查的刊載供應商

Amazon, Arm, BlackBerry QNX, Canonical, Concurrent Real-Time, Enea, eSOL, ETAS (Bosch), Express Logic (Microsoft), Google, Green Hills Software, Lineo Solutions, Lynx Software, Mentor Graphics (Siemens), Micrium (Silicon Labs), Microsoft, MontaVista Software, Red Hat, SEGGER, SUSE (Micro Focus), SYSGO (Thales Group), Timesys, Wind River, WITTENSTEIN H.I.S.

目錄

  • 摘要整理
  • 全球市場概要
  • 比較預測:各地區
  • 比較預測:各業界
  • 競爭情形
  • 工程師的考察
  • 附錄和定義
  • 關於作者
目錄

Inside This Report:

As traditional, general-purpose licensed operating systems (OSs) revenue faces increasing pressure from free competition, VDC recommends IoT & embedded operating system vendors continue to shift their focus into safety-critical markets. The unprecedented COVID-19 pandemic is forcing vendors to pause and reevaluate their go-to-market plans as they attempt to navigate a rapidly changing market.

Vendors Listed in this Report:

Amazon, Arm, BlackBerry QNX, Canonical, Concurrent Real-Time, Enea, eSOL, ETAS (Bosch), Express Logic (Microsoft), Google, Green Hills Software, Lineo Solutions, Lynx Software, Mentor Graphics (Siemens), Micrium (Silicon Labs), Microsoft, MontaVista Software, Red Hat, SEGGER, SUSE (Micro Focus), SYSGO (Thales Group), Timesys, Wind River, WITTENSTEIN H.I.S.

TABLE OF CONTENTS

  • EXECUTIVE SUMMARY
  • GLOBAL MARKET OVERVIEW
  • COMPARATIVE FORECASTS BY REGION
  • COMPARATIVE FORECASTS BY VERTICAL MARKET
  • COMPETITIVE LANDSCAPE
  • ENGINEER INSIGHTS
  • APPENDIX AND DEFINITIONS
  • ABOUT THE AUTHORS

LIST OF REPORT EXHIBITS

  • Exhibit 1 Global Revenue of IoT & Embedded Operating Systems and Related Services
  • Exhibit 2 Global Unit Shipments of IoT & Embedded Operating Systems
  • Exhibit 3 Global Unit Shipments of IoT & Embedded Operating Systems by OS Type
  • Exhibit 4 Global Revenue of IoT & Embedded Operating Systems and Related Services by OS Type
  • Exhibit 5 Global Revenue of IoT & Embedded OSs and Related Services by Geographic Region (Excluding Microsoft)
  • Exhibit 6 Global Revenue of IoT & Embedded Operating Systems and Related Services by Leading Vendors and Geography, 2019
  • Exhibit 7 Global Revenue of IoT & Embedded OSs and Related Services by Vertical Market
  • Exhibit 8 Global Revenue of IoT & Embedded Operating Systems and Related Services by Leading Vendors and Vertical Market, 2019
  • Exhibit 9 Global Unit Shipments of IoT & Embedded Operating Systems and Related Services by Vertical Market
  • Exhibit 10 Global Revenue Share of IoT & Embedded Operating Systems and Related Services by Revenue Leaders
  • Exhibit 11 Global Unit Share of IoT & Embedded Operating Systems by Revenue Leaders
  • Exhibit 12 Global Unit Share of IoT & Embedded Operating Systems by Unit Leaders
  • Exhibit 13 Global Revenue of RTOS and Related Services by Revenue Leaders
  • Exhibit 14 Global Revenue of Commercial Linux and Related Services by Revenue Leaders
  • Exhibit 15 Previous, Current, and Expected Primary OS by OS Source
  • Exhibit 16 Most Important Characteristics when Selecting Primary Operating System
  • Exhibit 17 Largest Overall Challenge for Respondent's Organization in Developing IoT Solutions by OS Source

LIST OF SURVEY EXHIBITS

  • Exhibit 1 Primary Country of Residence
  • Exhibit 2 Type of Most Current or Recent Project
  • Exhibit 3 Personally Involved with Engineering of Embedded Technology
  • Exhibit 4 Type of Purchase by Respondent's Organization
  • Exhibit 5 Primary Industry Classification of Project
  • Exhibit 6 Type of Aerospace & Defense Application for Most Recent Project
  • Exhibit 7 Type of Automotive In-Vehicle Application for Most Recent Project
  • Exhibit 8 Type of Communications & Networking Application for Most Recent Project
  • Exhibit 9 Type of Consumer Electronics Application for Most Recent Project
  • Exhibit 10 Type of Digital Security Application for Most Recent Project
  • Exhibit 11 Type of Digital Signage Application for Most Recent Project
  • Exhibit 12 Type of Energy and Utilities Application for Most Recent Project
  • Exhibit 13 Type of Gaming Application for Most Recent Project
  • Exhibit 14 Type of Industrial Automation Application for Most Recent Project
  • Exhibit 15 Type of Medical Device Application for Most Current Project
  • Exhibit 16 Type of Mobile Phone
  • Exhibit 17 Type of Office/Business Automation Application for Most Recent Project
  • Exhibit 18 Type of Transportation Application for Most Recent Project
  • Exhibit 19 Type of Retail Automation Application for Most Recent Project
  • Exhibit 20 Type of Non-Manufacturing/Services Application for Most Recent Project
  • Exhibit 21 Certification/Approval Standards Required for Current Project
  • Exhibit 22 Highest Design/Development Assurance Levels (DAL) Required for Project Software (Aerospace)
  • Exhibit 23 Highest Software Integrity Levels (SIL) Certification Required for Project Software
  • Exhibit 24 Highest Automotive Software Integrity Levels for Project Software
  • Exhibit 25 Capabilities/Features of Current Project
  • Exhibit 26 Capabilities/Features Expected in a Project Three Years From Now
  • Exhibit 27 Type of Real-Time Deadlines for Current Project
  • Exhibit 28 Application's Shortest Response Deadline to a Time-Critical Input or Event
  • Exhibit 29 Expectation of Whether Current Communications and Networking Project Product will be Deployed with SDN and/ or NFV Capabilities
  • Exhibit 30 Expectation of Whether Communications and Networking Project Product will be Deployed with SDN and/ or NFV Capabilities Three Years From Now
  • Exhibit 31 Estimated Length for Current Project (In Months)
  • Exhibit 32 Current Project's Schedule
  • Exhibit 33 Estimated Number of Years Current Project will be Manufactured Once Complete
  • Exhibit 34 Estimated Number of Years of Useful Life for Product Once Deployed
  • Exhibit 35 Attributions of Delays to Project
  • Exhibit 36 Engineering Tasks Personally Involved
  • Exhibit 37 Estimated Percent of Time Spent on Engineering Tasks
  • Exhibit 38 Tasks Respondent Personally Planned For/Designed, Identified or Remediated Security Issues During the Development Process
  • Exhibit 39 Percent of Time Respondent Personally Spent on Tasks During the Development Process
  • Exhibit 40 Formal Policies and Procedures for Testing the Security of IoT Devices
  • Exhibit 41 Personnel Testing the Security of IoT Devices
  • Exhibit 42 Estimated Number of Full-Time Staff on Current Project
  • Exhibit 43 Engineering and Development Work Outsourced to Third-Party Engineering Services
  • Exhibit 44 Percent of Engineering/Development Efforts Outsourced for Current Project
  • Exhibit 45 Percent of Third-Party Outsourced Tasks Related to Security Issues
  • Exhibit 46 Estimate of Number of Full-Time Engineers or Developers Employed by Organization
  • Exhibit 47 Estimated Percent of Organization's Full-Time Engineers/Developers Working in Specific Roles
  • Exhibit 48 Estimated Total Cost of Development for Current Project
  • Exhibit 49 Estimated Bill of Materials for Current Project
  • Exhibit 50 Estimated Units to be Shipped Per Year of Current Project
  • Exhibit 51 Estimated Percent of Engineering Tasks/Domains Development Costs Spent on Specific Tasks
  • Exhibit 52 Estimated Percent of Engineering Tasks/Domains Development Costs Expected to be Spent on Specific Tasks for a Similar Project Three Years From Now
  • Exhibit 53 Estimate of Fully-Loaded Labor Costs for a Typical Engineer Involved with IT/Enterprise/ Embedded Systems
  • Exhibit 54 Estimation of Number of Defects or Software Patches Reported/Required by Customer Per Year for Most Current Project
  • Exhibit 55 Estimated Total Combined Man-Hours of IT and Engineering Time Required for Each Patch or Defect Remediation
  • Exhibit 56 Estimated Percentage of Devices that Will Become Inoperable Each Year
  • Exhibit 57 Primary Method for Updating Devices Once Deployed in Field
  • Exhibit 58 Types of Computer System Components or Sub-Systems Purchased by Respondent's Organization
  • Exhibit 59 Processing Unit(s) Used on Current Project
  • Exhibit 60 Processing Unit(s) Expected to Use on a Project Three Years From Now
  • Exhibit 61 Primary/Application Processor Used in Current Project
  • Exhibit 62 Processor Family/Architecture of Primary/Application Processor in Current Project
  • Exhibit 63 Other Processor Family/Architecture Considered for Current or Similar Project
  • Exhibit 64 Bit-Width of the Architecture Used by the Primary Application Processor Within Current Project
  • Exhibit 65 Bit-Width of the Architecture Used by the First Additional Processor Within Current Project
  • Exhibit 66 Bit-Width of the Architecture Used by the Second Additional Processor Within Current Project
  • Exhibit 67 Bit-Width of the Architecture Used by the Third Additional Processor Within Current Project
  • Exhibit 68 Most Important Characteristics When Choosing an Embedded Processor
  • Exhibit 69 CPU/MCU Suppliers for Current Project
  • Exhibit 70 MCU Suppliers for Current Project
  • Exhibit 71 SoC Suppliers for Current Project
  • Exhibit 72 ASSP Suppliers for Current Project
  • Exhibit 73 FPGA/PLD Suppliers for Current Project
  • Exhibit 74 Rating of Experience with Embedded Processor Supplier
  • Exhibit 75 Likelihood of Using the Same Embedded Processor Vendor on Similar Project Three Years From Now
  • Exhibit 76 Most Important Characteristics When Selecting the CPU Boards, Blades, and/or Modules in Organization's Product
  • Exhibit 77 Board/Module Architectures Currently Used by Respondent's Organization
  • Exhibit 78 Board/Module Architecture Expected to be Used by Respondent's Organization Three Years from Now
  • Exhibit 79 COM Form Factors Currently Used by Respondent's Organization
  • Exhibit 80 COM Form Factors Expected to be Used by Respondent's Organization Three Years From Now
  • Exhibit 81 Embedded Board and Module Vendors Being Used for Current Project
  • Exhibit 82 Level of Satisfaction with Embedded Board/Module Supplier
  • Exhibit 83 Likelihood of Using the Same Embedded Board/Module Vendor on a Similar Project Three Years From Now
  • Exhibit 84 Most Important Product Selection Criteria when Purchasing or Specifying Embedded Computing and/or Storage Systems, Aside From Cost
  • Exhibit 85 Architectures or Form Factors Currently Used in Embedded Computing Systems Purchased or Specified by Respondent's Organization
  • Exhibit 86 Architectures or Form Factors Expected to be Purchased by Respondent's Organization Three Years From Now
  • Exhibit 87 Motherboard Form Factor Class(es) Currently Used
  • Exhibit 88 Motherboard Form Factor Class(es) Expected to be Used Three Years From Now
  • Exhibit 89 Industrial Computer/PC (IPC) Form Factor(s) Currently Used
  • Exhibit 90 Industrial Computer/PC (IPC) Form Factor(s) Expected to be Used Three Years From Now
  • Exhibit 91 COM Form Factor(s) Currently Used
  • Exhibit 92 COM Form Factor(s) Expected to be Used Three Years From Now
  • Exhibit 93 Percentage of Total Third Party Platform Purchases Represented by Standard and Custom Suppliers
  • Exhibit 94 Embedded System Vendors Currently Purchasing From for Current Project
  • Exhibit 95 Embedded System Vendors That Have Been Considered/Evaluated for Project Three Years From Now
  • Exhibit 96 Embedded System Vendors That Were Not Considered for Current Project
  • Exhibit 97 Satisfaction with Current Embedded System Supplier
  • Exhibit 98 Likelihood of Using the Same Embedded System on a Similar Project Three Years From Now
  • Exhibit 99 Wired Connections In Use or Expected from Products Built by Organization for Current Project
  • Exhibit 100 Wired Connections In Use or Expected from Products Built by Organization Three Years From Now
  • Exhibit 101 Wireless Connections In Use or Expected From Products Built by Company in Current Project
  • Exhibit 102 Wireless Connections In Use or Expected From Products Built by Company Three Years From Now
  • Exhibit 103 Current Low-Power Wide-Area-Network Protocols/Networks Used in Products Built by Organization
  • Exhibit 104 Low-Power Wide-Area-Network Protocols/Networks Expected to Be Used in Products Built by Organization Three Years From Now
  • Exhibit 105 Estimation of Data Gathered by Organization's Product Systems Each Day Per Unit/Device
  • Exhibit 106 Estimation of Data Gathered by Organization's Product Systems Each Day Per Unit/Device Three Years from Now
  • Exhibit 107 Middleware Framework(s) or Platform(s) Used in Most Recent Embedded Project
  • Exhibit 108 Communication Protocol(s) Used in Most Recent Project
  • Exhibit 109 Types of Devices/Systems Current/Upcoming Project Will Connect To
  • Exhibit 110 Percent of Overall Computation Being Done by Location of Computation
  • Exhibit 111 Primary Operating System Used on Current Project
  • Exhibit 112 Primary Operating System Used on Previous Project
  • Exhibit 113 Primary Operating System Expected to be Used in Three Years
  • Exhibit 114 Commercially Obtained, Non Open Source Operating System Used on Current Project
  • Exhibit 115 Commercially or Consortia Obtained Open Source Operating System Used on Current Project
  • Exhibit 116 Freely and/or Publicly Available, Open Source Operating System Used on Most Current Project
  • Exhibit 117 Chip/Board Vendor-Supplied Operating System Used on Current Project
  • Exhibit 118 Most Important Characteristics When Selecting the Primary Embedded Operating System for Current Project
  • Exhibit 119 Likelihood of Using the Same Operating System on a Similar Project Three Years From Now
  • Exhibit 120 Embedded Software Stack Components Required on Current/Most Recent Project, Other than the Operating System
  • Exhibit 121 Expectation of Embedded Software Stack Components Required on a Project Three Years From Now
  • Exhibit 122 Vendor Used for On-Device Analytics in Current Project
  • Exhibit 123 Vendor(s) or Technologies Used for Virtualization/Hypervisors/Containers In Current Project
  • Exhibit 124 Factors Driving Organization to Adopt Hypervisor/Virtualization/Container Technology in Current Project
  • Exhibit 125 Biggest Obstacle to the Development and Growth of the Connected Vehicle Industry
  • Exhibit 126 Level of Automation of Respondent's Current Vehicle/Component Work
  • Exhibit 127 Biggest Obstacle to the Development and Growth of the Autonomous Vehicle Industry
  • Exhibit 128 Current Primary Competition to the Connected/Autonomous Car Space
  • Exhibit 129 Expected Primary Competition Three Years From Now
  • Exhibit 130 Technologies Respondent's Organization is Most Interest in Investing In and/or Building for Future Customers
  • Exhibit 131 Importance of Security to Current Project
  • Exhibit 132 Actions Respondent's Organization Has Taken in Response to Security Requirements
  • Exhibit 133 How Well Respondent's Organization has Addressed Security Requirements on Current Project
  • Exhibit 134 Most Important Reason Why Security is Not More Important to Respondent's Project
  • Exhibit 135 Does Respondent's Organization Offer a Program to Facilitate Reporting of Security Vulnerabilities Discovered by External Security Researchers (e.g. Bug Bounty)
  • Exhibit 136 Have Vulnerabilities or Security Failures Within Respondent's Organization Been Exposed or Identified Externally
  • Exhibit 137 Were Any Exposed Vulnerabilities Disclosed to Respondent's Organization's Customers
  • Exhibit 138 Effects of Exposed Vulnerabilities
  • Exhibit 139 Business Implications of Exposed Vulnerabilities
  • Exhibit 140 Commercial Embedded Security Solution Vendors Being Used on Current Project
  • Exhibit 141 Types of Embedded Security Software Solutions Included in Current/Most Recent Project
  • Exhibit 142 Types of Embedded Security Hardware Solutions Included in Current/Most Recent Project
  • Exhibit 143 Types of Embedded Security Hardware Solutions Expected to be Included in Project Three Years From Now
  • Exhibit 144 Does Current Project Use Any Local Network-Based Security Software or Products
  • Exhibit 145 Does Current Project Use Any Cloud-Based Security Services
  • Exhibit 146 Do Devices in Respondent's Current Project Contain Digital Certificates, Encryption Keys, or Encrypted Device IDs
  • Exhibit 147 Functions of Digital Certificates/Encryption Keys/Encrypted Device IDs
  • Exhibit 148 Where Digital Certificates/Encryption Keys/Encrypted Device IDs are
  • Exhibit 149 How Digital Certificates are Provisioned
  • Exhibit 150 Certificate Authority (CA) Primarily Used to Issue Digital Certificates
  • Exhibit 151 Estimate of Cost of Digital Certificates Per Device
  • Exhibit 152 Types of Devices Currently Connected to Respondent's Organization's IT Network
  • Exhibit 153 Types of Devices Expected to be Connected to Respondent's Organization's IT Network Three Years From Now
  • Exhibit 154 Do Respondent's Organization's Current IT Security Policies Cover Smartphones
  • Exhibit 155 Do Respondent's Organization's Current IT Security Policies Cover Tablets
  • Exhibit 156 Do Respondent's Organization's Current IT Security Policies Cover HVAC Sensors, Controls, and/or Thermostats
  • Exhibit 157 Do Respondent's Organization's Current IT Security Policies Cover Lighting Control Systems
  • Exhibit 158 Do Respondent's Organization's Current IT Security Policies Cover Medical Monitoring Devices
  • Exhibit 159 Do Respondent's Organization's Current IT Security Policies Cover Medical Imaging Devices
  • Exhibit 160 Do Respondent's Organization's Current IT Security Policies Cover Security Systems
  • Exhibit 161 Do Respondent's Organization's Current IT Security Policies Cover Point-of-Sale Terminals
  • Exhibit 162 Do Respondent's Organization's Current IT Security Policies Cover Information Kiosks
  • Exhibit 163 Do Respondent's Organization's Current IT Security Policies Cover Set Top Boxes for Cable/ Satellite TV
  • Exhibit 164 Do Respondent's Organization's Current IT Security Policies Cover Televisions
  • Exhibit 165 Do Respondent's Organization's Current IT Security Policies Cover Factory or Industrial Automation Equipment
  • Exhibit 166 Do Respondent's Organization's Current IT Security Policies Cover Asset Location Trackers
  • Exhibit 167 Do Respondent's Organization's Current IT Security Policies Cover Fleet Vehicles or Trucks
  • Exhibit 168 Do Respondent's Organization's Current IT Security Policies Cover Additional Devices other than Laptops, PCs, or Servers
  • Exhibit 169 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Smartphones
  • Exhibit 170 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Tablets
  • Exhibit 171 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover HVAC Sensors, Controls, and/or Thermostats
  • Exhibit 172 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Lighting Control Systems
  • Exhibit 173 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Medical Monitoring Devices
  • Exhibit 174 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Medical Imaging Devices
  • Exhibit 175 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Security Systems
  • Exhibit 176 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Point-of-Sale Terminals
  • Exhibit 177 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Information Kiosks
  • Exhibit 178 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Set Top Boxes for Cable/Satellite TV
  • Exhibit 179 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Televisions
  • Exhibit 180 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Factory or Industrial Automation Equipment
  • Exhibit 181 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Asset Location Trackers
  • Exhibit 182 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Cover Fleet Vehicles or Trucks
  • Exhibit 183 Has Respondent's Organization Enacted IT Security Policies Specifically Designed to Additional Devices other than Laptops, PCs, or Servers
  • Exhibit 184 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Smartphones Within the Next Three Years
  • Exhibit 185 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Tablets Within the Next Three Years
  • Exhibit 186 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover HVAC Sensors, Controls, and/or Thermostats Within the Next 3 Years
  • Exhibit 187 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Lighting Control Systems Within the Next Three Years
  • Exhibit 188 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Medical Monitoring Devices Within the Next Three Years
  • Exhibit 189 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Medical Imaging Devices Within the Next Three Years
  • Exhibit 190 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Security Systems Within the Next Three Years
  • Exhibit 191 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Point-of-Sales Terminals Within the Next Three Years
  • Exhibit 192 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed Cover to Information Kiosks Within the Next Three Years
  • Exhibit 193 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed Cover to Set Top Boxes for Cable/Satellite TV Within the Next Three Years
  • Exhibit 194 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Televisions Within the Next Three Years
  • Exhibit 195 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Factory or Industrial Automation Equipment Within the Next Three Years
  • Exhibit 196 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Asset Location Trackers Within the Next Three Years
  • Exhibit 197 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Fleet Vehicles or Trucks Within the Next Three Years
  • Exhibit 198 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically Designed to Cover Additional Devices other than Laptops, PCs, or Servers Within the Next Three Years
  • Exhibit 199 Extent to Which Respondent's Organization Expect IT Security Vendors Will Provide Security Solutions for IoT Devices
  • Exhibit 200 Security Threats, other than Laptops/PCs and Servers, Respondent's are Concerned about for IoT Devices Connected to Organization's Network
  • Exhibit 201 IoT Devices Currently Create Security Risks for My Organization
  • Exhibit 202 IoT Devices Are Likely to Create Security Risks for My Organization Within the Next Three Years
  • Exhibit 203 My Organization Has Control Over What Specific IoT Devices Connect to Its Network
  • Exhibit 204 My Organization is Prepared to Manage Many Different Types of Connected IoT Devices
  • Exhibit 205 An IoT Device Security Failure Has Already Cost My Organization Money
  • Exhibit 206 Security Solutions Used to Protect IoT Devices Connected to Respondent's Organization's Network
  • Exhibit 207 Security Solutions Respondent Would Like to See Used to Protect IoT Devices Connected to Respondent's Organization's Network Three Years From Now
  • Exhibit 208 Vendors Supplying Commercial IT Security Products
  • Exhibit 209 Use of Security Solutions from IoT Specialists Vendors
  • Exhibit 210 Percent of Organization IT Budget Related to Security
  • Exhibit 211 Percent of Organization's IT Security Budget Attributed to Commercial Security Software/ Services
  • Exhibit 212 Percent of Organization's IT Security Budget Expected to be Related to Security Three Years From Now
  • Exhibit 213 Person(s) Within Respondent's Organization Responsible for the Selection and Purchase of Enterprise Security Solutions
  • Exhibit 214 Types of Tools Used in Current/Most Recently Completed Project
  • Exhibit 215 Types of Tools Expected to be Used in Similar Project Three Years From Now
  • Exhibit 216 Most Important Characteristics When Selecting the Compiler Used on Current or Most Recent Project
  • Exhibit 217 Does Respondent's Engineering Organization Purchase Cross or Native Compliers
  • Exhibit 218 Type of Compilation Tool(s) Currently Used by Respondent
  • Exhibit 219 Type of Static Analysis or SAST Being Used on Current Project
  • Exhibit 220 Most Important Factors in Selection of Static Analysis or SAST Tools Being Used in Current Project
  • Exhibit 221 Typical Decision Maker for Purchase of Static Analysis or SAST Tools Used by Respondent and Engineering Team
  • Exhibit 222 Dynamic Testing or DAST Tools Being Used on Current Project
  • Exhibit 223 Most Important Factors in Selection of Dynamic Testing Tools Being Used in Current Project
  • Exhibit 224 Typical Decision Maker for Purchase of Dynamic Testing Tools Used by Respondent and Engineering Team
  • Exhibit 225 Requirements Management/Definition Tools Being Used on Current Project
  • Exhibit 226 Most Important Factors in Selection of Requirements Management/Definition Tools Being Used in Current Project
  • Exhibit 227 Typical Decision Maker for Purchase of Requirements Management/Definition Tools Used by Respondent and Engineering Team
  • Exhibit 228 Standard Language-Based Modeling Tools Being Used on Current Project
  • Exhibit 229 Most Important Factors in Selection of Standard Language-Based Modeling Tools Being Used in Current Project
  • Exhibit 230 Typical Decision Maker for Purchase of Standard Language-Based Testing Tools Used by Respondent and Engineering Team
  • Exhibit 231 Proprietary Language-Based Modeling Tools Being Used on Current Project
  • Exhibit 232 Most Important Factors in Selection of Proprietary Language-Based Modeling Tools Being Used in Current Project
  • Exhibit 233 Typical Decision Maker for Purchase of Proprietary Language-Based Software/System Modeling Tools Used by Respondent and Engineering Team
  • Exhibit 234 Release Management/Continuous Deployment Tools Being Used on Current Project
  • Exhibit 235 Most Important Factors in Selection of Release Management/Continuous Deployment Tools Being Used in Current Project
  • Exhibit 236 Typical Decision Maker for Purchase of Release Management/Continuous Deployment Tools Used by Respondent and Engineering Team
  • Exhibit 237 Software Composition Analysis (SCA)/IP Compliance Tools Being Used on Current Project
  • Exhibit 238 Most Important Factors in Selection of Software Composition Analysis (SCA)/IP Compliance Tools Being Used in Current Project
  • Exhibit 239 Typical Decision Maker for Purchase of Software Composition Analysis (SCA)/IP Compliance Tools Used by Respondent and Engineering Team
  • Exhibit 240 Organization's Linking System Requirements in Respondent's Current Project
  • Exhibit 241 Respondent's Description of Organization's Requirement Engineering
  • Exhibit 242 Has Respondent's Organization Investigated or Implemented Ways to Enhance Cross- Engineering Domain Integration Between Software/System Development (ALM), Mechanical Engineering/Product Lifecycle Management (PLM), and/or Electrical Engineering/Electronic Design Automation (EDA)
  • Exhibit 243 Biggest Advantages/Benefits of Cross-Engineering Domain Integrations
  • Exhibit 244 Has Respondent's Organization Investigated or Implemented Ways to Enhance the Delivery of Continuous Post-Deployment Content and Service Support
  • Exhibit 245 Budget for Development Tools Being Used on Current or Most Recent Project
  • Exhibit 246 Types of Prototyping Solutions on Current Project
  • Exhibit 247 Use of Own Prototyping Board or Commercial Solution on Most Recent Project
  • Exhibit 248 ASIC Gate Count of What Was Prototyped (ASIC Equivalent Gates)
  • Exhibit 249 FPGAs Used in Most Recent Prototype
  • Exhibit 250 FPGA Vendor(s) Used for Prototype Hardware on Most Recent Project
  • Exhibit 251 Rating of FPGA-Based Prototyping Challenges
  • Exhibit 252 FPGA-Based/Physical Prototyping Solution Currently Used
  • Exhibit 253 Type of Tasks in Which Virtual Prototyping Solutions are Used
  • Exhibit 254 Virtual Prototyping Solution(s) Currently Using
  • Exhibit 255 Most Important Characteristics When Selecting Virtual Prototyping Solution
  • Exhibit 256 Location of Vertical Prototype Creation
  • Exhibit 257 Language(s) Used to Develop Software for Previous Projects
  • Exhibit 258 Language(s) Used to Develop Software for Current Project
  • Exhibit 259 Language(s) Expected to be Used to Develop Software for a Similar Project in Three Years
  • Exhibit 260 Estimate of Total Source Lines of Code Required on Current or Most Recent Project
  • Exhibit 261 Percent of Total Software Code in Final Design of Current Project Coming From Various Origins
  • Exhibit 262 Expected Change to Amount of Software Content/Lines of Code on the Next Commercial Third-Party Software Project
  • Exhibit 263 Expected Change to Amount of Software Content/Lines of Code on the Next Open Source Third-Party Software Project
  • Exhibit 264 Expected Change to Amount of Software Content/Lines of Code on the Next In-House Developed Code Project
  • Exhibit 265 Expectation of the Percentage Increase of Software Content/Lines of Code for Commercial Third-Party Software
  • Exhibit 266 Expectation of the Percentage Increase of Software Content/Lines of Code for Open Source Third-Party Software
  • Exhibit 267 Expectation of the Percentage Increase of Software Content/Lines of Code for In-House Developed Code
  • Exhibit 268 Expectation of the Percentage Decrease of Software Content/Lines of Code for Commercial Third-Party Software
  • Exhibit 269 Expectation of the Percentage Decrease of Software Content/Lines of Code for Open Source Third-Party Software
  • Exhibit 270 Expectation of the Percentage Decrease of Software Content/Lines of Code for In-House Developed Code
  • Exhibit 271 Estimated Percent of In-House Developed Software Code for Current Project, by Origin
  • Exhibit 272 Software Design Methodologies Used on Current Project
  • Exhibit 273 Software Design Methodologies Expected to Use on Similar Project Three Years From Now
  • Exhibit 274 Certification/Process Standard(s) Being Adhered to for Current Project
  • Exhibit 275 Adherence to CERT C Coding Standard in Current Project
  • Exhibit 276 Adherence to CERT C++ Coding Standard in Current Project
  • Exhibit 277 Adherence to CWE Coding Standard in Current Project
  • Exhibit 278 Adherence to HIC++ Coding Standard in Current Project
  • Exhibit 279 Adherence to MISRA C Coding Standard in Current Project
  • Exhibit 280 Adherence to MISRA C++ Coding Standard in Current Project
  • Exhibit 281 Adherence to JSF AV++ Coding Standard in Current Project
  • Exhibit 282 Adherence to In House/Internal Coding Standard Coding Standard in Current Project
  • Exhibit 283 When Respondent's Organization Intends to Deploy IoT Capability and/or Applications into its Products
  • Exhibit 284 Primary Factor Driving Organization Towards Utilizing and/or Providing IoT Solutions
  • Exhibit 285 Ways IoT Most Impacts Respondent's Organization's Business Prospect. IoT Enables Organization to...
  • Exhibit 286 Biggest Overall Challenge in Developing IoT Solutions
  • Exhibit 287 Most Important Elements When Considering Suppliers for IoT Components and/or Entire Solutions
  • Exhibit 288 Plans to Use IoT/Cloud Services to Build Projects
  • Exhibit 289 Use of Any IoT/Cloud Services to Connect, Manage, or Analyze Any of the IoT Devices on Networks Owned or Managed by Respondent's Organization
  • Exhibit 290 Types of IoT/Cloud Services Being Used on Current Project
  • Exhibit 291 Types of IoT/Cloud Services Planned to Use on a Project Three Years From Now
  • Exhibit 292 Estimated Annual Cost of Current IoT Connectivity Services
  • Exhibit 293 Estimated Annual Cost of Current IoT Remote Monitoring and Control Services
  • Exhibit 294 Estimated Annual Cost of Current IoT Data Collection and Storage Services
  • Exhibit 295 Estimated Annual Cost of Data Analytics Services
  • Exhibit 296 Estimated Annual Cost of Other Current IoT Services
  • Exhibit 297 Types of Cloud Analytics Used to Analyze IoT Data on Current Project
  • Exhibit 298 Is Respondent's Organization Selling, or Planning to Resell Any Connectivity Services as a Value-Added Service to End Customers
  • Exhibit 299 Is Respondent's Organization Selling, or Planning to Resell Any Remote Monitoring and Control Services as a Value-Added Service to End Customers
  • Exhibit 300 Is Respondent's Organization Selling, or Planning to Resell Any Data Collection and Storage Services as a Value-Added Service to End Customers
  • Exhibit 301 Is Respondent's Organization Selling, or Planning to Resell Any Data Analytics Services as a Value-Added Service to End Customers
  • Exhibit 302 Is Respondent's Organization Selling, or Planning to Resell Any Other IoT/Cloud Services as a Value-Added Service to End Customers
  • Exhibit 303 Non-Cloud/IoT Services Being Used to Support Customers on Current Project
  • Exhibit 304 IoT Cloud Platforms-as-a-Service (PaaS) Being Used on Current or Most Recent Project
  • Exhibit 305 IoT Cloud Platforms-as-a-Service (PaaS) Expected to Be Used on a Similar Project Three Years From Now
  • Exhibit 306 Cloud Services Used as a Part of IoT Cloud Platforms Currently Being Used in Project
  • Exhibit 307 Cloud Services Expected to be Used as a Part of IoT Cloud Platforms in a Similar Project Three Years From Now
  • Exhibit 308 Does Respondent's Company Currently Purchase or Create/Integrate Embedded Computer Hardware Products Considered to be IoT Gateway Devices?
  • Exhibit 309 Does Respondent's Company Plan to Purchase or Create/Integrate New or Additional Embedded Computer Hardware Products They Would Consider to be IoT Gateways in the Future?
  • Exhibit 310 How Respondent's Company Expects to Source its Gateway Technology
  • Exhibit 311 Approximate Number of Endpoints/Devices That Will Be Supported by the IoT Gateways Purchased/Used/Integrated by Respondent's Company
  • Exhibit 312 Most Important Product Requirements In Selecting Embedded Computer Products That Would Provide Connectivity at the IoT Gateway in the Equipment Used/Built/Integrated by Respondent's Company
  • Exhibit 313 Vendors Used for Analytics Solutions on Gateway Devices
  • Exhibit 314 IoT Gateway Hardware Suppliers Used with Current or Most Recent Project
  • Exhibit 315 IoT Gateway Hardware Suppliers Expected to be Used Three Years From Now
  • Exhibit 316 Respondent's Current or Projected Future Use of Blockchain
  • Exhibit 317 Source of Blockchain Technology in Current Project
  • Exhibit 318 Source of Blockchain Technology Expected to be Used Three Years From Now
  • Exhibit 319 Most Important Elements When Considering Blockchain Vendors/Integrators
  • Exhibit 320 Why Respondent's Company Plans to Not Use Blockchain
  • Exhibit 321 Use of Machine Learning/Neural Networks on Current and Future Projects
  • Exhibit 322 Source of Machine Learning Technology Used on Current Project
  • Exhibit 323 Source of Machine Learning Technology Expected Three Years From Now
  • Exhibit 324 Types of Machine Learning Currently Used
  • Exhibit 325 Types of Machine Learning Expected to be Used Three Years from Now
  • Exhibit 326 Where Current Machine Learning Models are Trained
  • Exhibit 327 Where Current Machine Learning Models are Expected to be Trained in Future Projects
  • Exhibit 328 Target Architecture(s) Used for Inferencing In Current Project
  • Exhibit 329 Target Architecture(s) Expected to be Used for Inferencing In Future Projects
  • Exhibit 330 Machine Learning Software/Analytics Vendor(s) Currently Used
  • Exhibit 331 Machine Learning Software/Analytics Vendor(s) Expected to be Used Three Years From Now
  • Exhibit 332 Most Important Elements When Considering ML Vendors/Integrators
  • Exhibit 333 Primary Role Within Company/Organization
  • Exhibit 334 Respondent's Organization's Primary Industry
  • Exhibit 335 Total Number of Employees at Respondent's Organization