Internet of Things (IoT)

Edge computing is vital not just to the burgeoning world of real-time responsive IoT, but to enterprise network security, as these IoT systems multiply and spread. Edge computing creates a distributed infrastructure with centralized management and lights-out -- or remote -- operations built on private cloud infrastructure. Edge...

Everything is different now. That's true for all of us, as we cope with the enduring presence and lingering aftereffects of the Covid-19 pandemic. But it's particularly true for enterprise technologists, who are witnessing a once-in-a-generation set of paradigm shifts that are transforming how companies and...

As enterprises begin to embrace the idea of edge computing, all evaluations should begin with use cases. After all, the only reason to deploy resources on or near a remote location, as opposed to in a data center or in the cloud, is to meet stringent,...

Edge computing focuses on putting compute and storage resources outside the enterprise data center, in or near branches. But edge computing, propelled by IoT and poised to grow with the spread 5G services, is not traditional decentralized computing. CIOs need to understand what drives an edge computing strategy in order...

The ultimate end state of software-defined network security is what we at Nemertes Research call deep segmentation. The term refers to the ability to finely control what entities can see, who they communicate with and how they do this, end to end across the enterprise network. With...

' IoT can be game-changing for organizations -- in more ways than one. In fact, organizations that successfully implemented IoT generated an average of $8.36 million in new revenue, $5 million in savings and 41.8% improvement in business process efficiency, according to our Nemertes Research IoT...

  "Water, water, every where, nor any drop to drink." This line from Samuel Taylor Coleridge's The Rime of the Ancient Mariner could just as easily apply to CIOs seeking to fill crucial spots in their IT organizations. The world may seem full of systems engineers, network specialists...

' The right IoT database depends on the requirements of each IoT project. The first step to select a database is to factor in critical characteristics of IoT when selecting among database architectures. IoT technologists must determine the types of data to be stored and managed; the data...

' When it comes to implementing IoT initiatives, tech leaders should internalize one key lesson: IoT infrastructure matters. A growing number of organizations adopt IoT to achieve new goals and improve established processes, which testifies to the advantages that the technology can provide. More than two-thirds of organizations...

In Nemertes’ 2019-2020 IoT research study, we found that 68% of participants were in proof-of-concept (POC) or early production (less than 25% complete) stages of their IoT rollouts. Half of those expected both device counts and project counts to grow at 25% or more per...

On January 6, 2020, NYC-based private equity firm Insight Partners acquired the Israeli IoT cybersecurity  firm Armis for an eye-popping $1.1 billion. Armis is privately held, so it doesn't publish revenue numbers, but estimates are on the order of $30 million annually--meaning this is not only...