世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

IoTと組み込みOSの世界市場

The Global Market for IoT & Embedded Operating Systems

 

出版社 出版年月価格
VDC Research Group
VDCリサーチグループ社
2020年5月お問い合わせください

サマリー

この調査レポートはIoTと組み込みOS市場を調査し、地域・垂直市場別の比較予測や関連企業情報などを提供しています。

Inside This Report

As traditional, general-purpose licensed operating systems (OSs) revenue faces increasing pressure from free competition, VDC recommends IoT & embedded operating system vendors continue to shift their focus into safety-critical markets. The unprecedented COVID-19 pandemic is forcing vendors to pause and reevaluate their go-to-market plans as they attempt to navigate a rapidly changing market.

Vendors Listed in this Report

Amazon, Arm, BlackBerry QNX, Canonical, Concurrent Real-Time, Enea, eSOL, ETAS (Bosch), Express Logic (Microsoft), Google, Green Hills Software, Lineo Solutions, Lynx Software, Mentor Graphics (Siemens), Micrium (Silicon Labs), Microsoft, MontaVista Software, Red Hat, SEGGER, SUSE (Micro Focus), SYSGO (Thales Group), Timesys, Wind River, WITTENSTEIN H.I.S.



目次

Contents

EXECUTIVE SUMMARY
GLOBAL MARKET OVERVIEW
COMPARATIVE FORECASTS BY REGION
COMPARATIVE FORECASTS BY VERTICAL MARKET
COMPETITIVE LANDSCAPE
ENGINEER INSIGHTS
APPENDIX AND DEFINITIONS
ABOUT THE AUTHORS

List of Report Exhibits

Exhibit 1 Global Revenue of IoT & Embedded Operating Systems and Related Services
Exhibit 2 Global Unit Shipments of IoT & Embedded Operating Systems
Exhibit 3 Global Unit Shipments of IoT & Embedded Operating Systems by OS Type
Exhibit 4 Global Revenue of IoT & Embedded Operating Systems and Related Services by OS Type
Exhibit 5 Global Revenue of IoT & Embedded OSs and Related Services by Geographic Region
(Excluding Microsoft)
Exhibit 6 Global Revenue of IoT & Embedded Operating Systems and Related Services by Leading
Vendors and Geography, 2019
Exhibit 7 Global Revenue of IoT & Embedded OSs and Related Services by Vertical Market
Exhibit 8 Global Revenue of IoT & Embedded Operating Systems and Related Services by Leading
Vendors and Vertical Market, 2019
Exhibit 9 Global Unit Shipments of IoT & Embedded Operating Systems and Related Services by
Vertical Market
Exhibit 10 Global Revenue Share of IoT & Embedded Operating Systems and Related Services by
Revenue Leaders
Exhibit 11 Global Unit Share of IoT & Embedded Operating Systems by Revenue Leaders
Exhibit 12 Global Unit Share of IoT & Embedded Operating Systems by Unit Leaders
Exhibit 13 Global Revenue of RTOS and Related Services by Revenue Leaders
Exhibit 14 Global Revenue of Commercial Linux and Related Services by Revenue Leaders
Exhibit 15 Previous, Current, and Expected Primary OS by OS Source
Exhibit 16 Most Important Characteristics when Selecting Primary Operating System
Exhibit 17 Largest Overall Challenge for Respondent’s Organization in Developing IoT Solutions by OS Source

List of Survey Exhibits

Exhibit 1 Primary Country of Residence
Exhibit 2 Type of Most Current or Recent Project
Exhibit 3 Personally Involved with Engineering of Embedded Technology
Exhibit 4 Type of Purchase by Respondent’s Organization
Exhibit 5 Primary Industry Classification of Project
Exhibit 6 Type of Aerospace & Defense Application for Most Recent Project
Exhibit 7 Type of Automotive In-Vehicle Application for Most Recent Project
Exhibit 8 Type of Communications & Networking Application for Most Recent Project
Exhibit 9 Type of Consumer Electronics Application for Most Recent Project
Exhibit 10 Type of Digital Security Application for Most Recent Project
Exhibit 11 Type of Digital Signage Application for Most Recent Project
Exhibit 12 Type of Energy and Utilities Application for Most Recent Project
Exhibit 13 Type of Gaming Application for Most Recent Project
Exhibit 14 Type of Industrial Automation Application for Most Recent Project
Exhibit 15 Type of Medical Device Application for Most Current Project
Exhibit 16 Type of Mobile Phone
Exhibit 17 Type of Office/Business Automation Application for Most Recent Project
Exhibit 18 Type of Transportation Application for Most Recent Project
Exhibit 19 Type of Retail Automation Application for Most Recent Project
Exhibit 20 Type of Non-Manufacturing/Services Application for Most Recent Project
Exhibit 21 Certification/Approval Standards Required for Current Project
Exhibit 22 Highest Design/Development Assurance Levels (DAL) Required for Project Software
(Aerospace)
Exhibit 23 Highest Software Integrity Levels (SIL) Certification Required for Project Software
Exhibit 24 Highest Automotive Software Integrity Levels for Project Software
Exhibit 25 Capabilities/Features of Current Project
Exhibit 26 Capabilities/Features Expected in a Project Three Years From Now
Exhibit 27 Type of Real-Time Deadlines for Current Project
Exhibit 28 Application’s Shortest Response Deadline to a Time-Critical Input or Event
Exhibit 29 Expectation of Whether Current Communications and Networking Project Product will be
Deployed with SDN and/ or NFV Capabilities
Exhibit 30 Expectation of Whether Communications and Networking Project Product will be Deployed
with SDN and/ or NFV Capabilities Three Years From Now
Exhibit 31 Estimated Length for Current Project (In Months)
Exhibit 32 Current Project’s Schedule
Exhibit 33 Estimated Number of Years Current Project will be Manufactured Once Complete
Exhibit 34 Estimated Number of Years of Useful Life for Product Once Deployed
Exhibit 35 Attributions of Delays to Project
Exhibit 36 Engineering Tasks Personally Involved
Exhibit 37 Estimated Percent of Time Spent on Engineering Tasks
Exhibit 38 Tasks Respondent Personally Planned For/Designed, Identified or Remediated Security
Issues During the Development Process
Exhibit 39 Percent of Time Respondent Personally Spent on Tasks During the Development Process
Exhibit 40 Formal Policies and Procedures for Testing the Security of IoT Devices
Exhibit 41 Personnel Testing the Security of IoT Devices
Exhibit 42 Estimated Number of Full-Time Staff on Current Project
Exhibit 43 Engineering and Development Work Outsourced to Third-Party Engineering Services
Exhibit 44 Percent of Engineering/Development Efforts Outsourced for Current Project
Exhibit 45 Percent of Third-Party Outsourced Tasks Related to Security Issues
Exhibit 46 Estimate of Number of Full-Time Engineers or Developers Employed by Organization
Exhibit 47 Estimated Percent of Organization’s Full-Time Engineers/Developers Working in Specific
Roles
Exhibit 48 Estimated Total Cost of Development for Current Project
Exhibit 49 Estimated Bill of Materials for Current Project
Exhibit 50 Estimated Units to be Shipped Per Year of Current Project
Exhibit 51 Estimated Percent of Engineering Tasks/Domains Development Costs Spent on Specific
Tasks
Exhibit 52 Estimated Percent of Engineering Tasks/Domains Development Costs Expected to be Spent
on Specific Tasks for a Similar Project Three Years From Now
Exhibit 53 Estimate of Fully-Loaded Labor Costs for a Typical Engineer Involved with IT/Enterprise/
Embedded Systems
Exhibit 54 Estimation of Number of Defects or Software Patches Reported/Required by Customer Per
Year for Most Current Project
Exhibit 55 Estimated Total Combined Man-Hours of IT and Engineering Time Required for Each Patch
or Defect Remediation
Exhibit 56 Estimated Percentage of Devices that Will Become Inoperable Each Year
Exhibit 57 Primary Method for Updating Devices Once Deployed in Field
Exhibit 58 Types of Computer System Components or Sub-Systems Purchased by Respondent’s
Organization
Exhibit 59 Processing Unit(s) Used on Current Project
Exhibit 60 Processing Unit(s) Expected to Use on a Project Three Years From Now
Exhibit 61 Primary/Application Processor Used in Current Project
Exhibit 62 Processor Family/Architecture of Primary/Application Processor in Current Project
Exhibit 63 Other Processor Family/Architecture Considered for Current or Similar Project
Exhibit 64 Bit-Width of the Architecture Used by the Primary Application Processor Within Current
Project
Exhibit 65 Bit-Width of the Architecture Used by the First Additional Processor Within Current Project
Exhibit 66 Bit-Width of the Architecture Used by the Second Additional Processor Within Current
Project
Exhibit 67 Bit-Width of the Architecture Used by the Third Additional Processor Within Current Project
Exhibit 68 Most Important Characteristics When Choosing an Embedded Processor
Exhibit 69 CPU/MCU Suppliers for Current Project
Exhibit 70 MCU Suppliers for Current Project
Exhibit 71 SoC Suppliers for Current Project
Exhibit 72 ASSP Suppliers for Current Project
Exhibit 73 FPGA/PLD Suppliers for Current Project
Exhibit 74 Rating of Experience with Embedded Processor Supplier
Exhibit 75 Likelihood of Using the Same Embedded Processor Vendor on Similar Project Three Years
From Now
Exhibit 76 Most Important Characteristics When Selecting the CPU Boards, Blades, and/or Modules in
Organization’s Product
Exhibit 77 Board/Module Architectures Currently Used by Respondent’s Organization
Exhibit 78 Board/Module Architecture Expected to be Used by Respondent’s Organization Three Years
from Now
Exhibit 79 COM Form Factors Currently Used by Respondent’s Organization
Exhibit 80 COM Form Factors Expected to be Used by Respondent’s Organization Three Years From
Now
Exhibit 81 Embedded Board and Module Vendors Being Used for Current Project
Exhibit 82 Level of Satisfaction with Embedded Board/Module Supplier
Exhibit 83 Likelihood of Using the Same Embedded Board/Module Vendor on a Similar Project Three
Years From Now
Exhibit 84 Most Important Product Selection Criteria when Purchasing or Specifying Embedded
Computing and/or Storage Systems, Aside From Cost
Exhibit 85 Architectures or Form Factors Currently Used in Embedded Computing Systems Purchased
or Specified by Respondent’s Organization
Exhibit 86 Architectures or Form Factors Expected to be Purchased by Respondent’s Organization
Three Years From Now
Exhibit 87 Motherboard Form Factor Class(es) Currently Used
Exhibit 88 Motherboard Form Factor Class(es) Expected to be Used Three Years From Now
Exhibit 89 Industrial Computer/PC (IPC) Form Factor(s) Currently Used
Exhibit 90 Industrial Computer/PC (IPC) Form Factor(s) Expected to be Used Three Years From Now
Exhibit 91 COM Form Factor(s) Currently Used
Exhibit 92 COM Form Factor(s) Expected to be Used Three Years From Now
Exhibit 93 Percentage of Total Third Party Platform Purchases Represented by Standard and Custom
Suppliers
Exhibit 94 Embedded System Vendors Currently Purchasing From for Current Project
Exhibit 95 Embedded System Vendors That Have Been Considered/Evaluated for Project Three Years
From Now
Exhibit 96 Embedded System Vendors That Were Not Considered for Current Project
Exhibit 97 Satisfaction with Current Embedded System Supplier
Exhibit 98 Likelihood of Using the Same Embedded System on a Similar Project Three Years From
Now
Exhibit 99 Wired Connections In Use or Expected from Products Built by Organization for Current
Project
Exhibit 100 Wired Connections In Use or Expected from Products Built by Organization Three Years
From Now
Exhibit 101 Wireless Connections In Use or Expected From Products Built by Company in Current
Project
Exhibit 102 Wireless Connections In Use or Expected From Products Built by Company Three Years
From Now
Exhibit 103 Current Low-Power Wide-Area-Network Protocols/Networks Used in Products Built by
Organization
Exhibit 104 Low-Power Wide-Area-Network Protocols/Networks Expected to Be Used in Products Built by Organization Three Years From Now
Exhibit 105 Estimation of Data Gathered by Organization’s Product Systems Each Day Per Unit/Device
Exhibit 106 Estimation of Data Gathered by Organization’s Product Systems Each Day Per Unit/Device
Three Years from Now
Exhibit 107 Middleware Framework(s) or Platform(s) Used in Most Recent Embedded Project
Exhibit 108 Communication Protocol(s) Used in Most Recent Project
Exhibit 109 Types of Devices/Systems Current/Upcoming Project Will Connect To
Exhibit 110 Percent of Overall Computation Being Done by Location of Computation
Exhibit 111 Primary Operating System Used on Current Project
Exhibit 112 Primary Operating System Used on Previous Project
Exhibit 113 Primary Operating System Expected to be Used in Three Years
Exhibit 114 Commercially Obtained, Non Open Source Operating System Used on Current Project
Exhibit 115 Commercially or Consortia Obtained Open Source Operating System Used on Current
Project
Exhibit 116 Freely and/or Publicly Available, Open Source Operating System Used on Most Current
Project
Exhibit 117 Chip/Board Vendor-Supplied Operating System Used on Current Project
Exhibit 118 Most Important Characteristics When Selecting the Primary Embedded Operating System
for Current Project
Exhibit 119 Likelihood of Using the Same Operating System on a Similar Project Three Years From Now
Exhibit 120 Embedded Software Stack Components Required on Current/Most Recent Project, Other
than the Operating System
Exhibit 121 Expectation of Embedded Software Stack Components Required on a Project Three Years
From Now
Exhibit 122 Vendor Used for On-Device Analytics in Current Project
Exhibit 123 Vendor(s) or Technologies Used for Virtualization/Hypervisors/Containers In Current Project
Exhibit 124 Factors Driving Organization to Adopt Hypervisor/Virtualization/Container Technology in
Current Project
Exhibit 125 Biggest Obstacle to the Development and Growth of the Connected Vehicle Industry
Exhibit 126 Level of Automation of Respondent’s Current Vehicle/Component Work
Exhibit 127 Biggest Obstacle to the Development and Growth of the Autonomous Vehicle Industry
Exhibit 128 Current Primary Competition to the Connected/Autonomous Car Space
Exhibit 129 Expected Primary Competition Three Years From Now
Exhibit 130 Technologies Respondent’s Organization is Most Interest in Investing In and/or Building for Future Customers
Exhibit 131 Importance of Security to Current Project
Exhibit 132 Actions Respondent’s Organization Has Taken in Response to Security Requirements
Exhibit 133 How Well Respondent’s Organization has Addressed Security Requirements on Current
Project
Exhibit 134 Most Important Reason Why Security is Not More Important to Respondent’s Project
Exhibit 135 Does Respondent’s Organization Offer a Program to Facilitate Reporting of Security
Vulnerabilities Discovered by External Security Researchers (e.g. Bug Bounty)
Exhibit 136 Have Vulnerabilities or Security Failures Within Respondent’s Organization Been Exposed
or Identified Externally
Exhibit 137 Were Any Exposed Vulnerabilities Disclosed to Respondent’s Organization’s Customers
Exhibit 138 Effects of Exposed Vulnerabilities
Exhibit 139 Business Implications of Exposed Vulnerabilities
Exhibit 140 Commercial Embedded Security Solution Vendors Being Used on Current Project
Exhibit 141 Types of Embedded Security Software Solutions Included in Current/Most Recent Project
Exhibit 142 Types of Embedded Security Hardware Solutions Included in Current/Most Recent Project
Exhibit 143 Types of Embedded Security Hardware Solutions Expected to be Included in Project Three Years From Now
Exhibit 144 Does Current Project Use Any Local Network-Based Security Software or Products
Exhibit 145 Does Current Project Use Any Cloud-Based Security Services
Exhibit 146 Do Devices in Respondent’s Current Project Contain Digital Certificates, Encryption Keys, or Encrypted Device IDs
Exhibit 147 Functions of Digital Certificates/Encryption Keys/Encrypted Device IDs
Exhibit 148 Where Digital Certificates/Encryption Keys/Encrypted Device IDs are
Exhibit 149 How Digital Certificates are Provisioned
Exhibit 150 Certificate Authority (CA) Primarily Used to Issue Digital Certificates
Exhibit 151 Estimate of Cost of Digital Certificates Per Device
Exhibit 152 Types of Devices Currently Connected to Respondent’s Organization’s IT Network
Exhibit 153 Types of Devices Expected to be Connected to Respondent’s Organization’s IT Network
Three Years From Now
Exhibit 154 Do Respondent’s Organization’s Current IT Security Policies Cover Smartphones
Exhibit 155 Do Respondent’s Organization’s Current IT Security Policies Cover Tablets
Exhibit 156 Do Respondent’s Organization’s Current IT Security Policies Cover HVAC Sensors,
Controls, and/or Thermostats
Exhibit 157 Do Respondent’s Organization’s Current IT Security Policies Cover Lighting Control
Systems
Exhibit 158 Do Respondent’s Organization’s Current IT Security Policies Cover Medical Monitoring
Devices
Exhibit 159 Do Respondent’s Organization’s Current IT Security Policies Cover Medical Imaging
Devices
Exhibit 160 Do Respondent’s Organization’s Current IT Security Policies Cover Security Systems
Exhibit 161 Do Respondent’s Organization’s Current IT Security Policies Cover Point-of-Sale Terminals
Exhibit 162 Do Respondent’s Organization’s Current IT Security Policies Cover Information Kiosks
Exhibit 163 Do Respondent’s Organization’s Current IT Security Policies Cover Set Top Boxes for Cable/Satellite TV
Exhibit 164 Do Respondent’s Organization’s Current IT Security Policies Cover Televisions
Exhibit 165 Do Respondent’s Organization’s Current IT Security Policies Cover Factory or Industrial
Automation Equipment
Exhibit 166 Do Respondent’s Organization’s Current IT Security Policies Cover Asset Location Trackers
Exhibit 167 Do Respondent’s Organization’s Current IT Security Policies Cover Fleet Vehicles or Trucks
Exhibit 168 Do Respondent’s Organization’s Current IT Security Policies Cover Additional Devices other than Laptops, PCs, or Servers
Exhibit 169 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Smartphones
Exhibit 170 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Tablets
Exhibit 171 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
HVAC Sensors, Controls, and/or Thermostats
Exhibit 172 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Lighting Control Systems
Exhibit 173 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Medical Monitoring Devices
Exhibit 174 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Medical Imaging Devices
Exhibit 175 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Security Systems
Exhibit 176 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Point-of-Sale Terminals
Exhibit 177 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Information Kiosks
Exhibit 178 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Set Top Boxes for Cable/Satellite TV
Exhibit 179 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Televisions
Exhibit 180 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Factory or Industrial Automation Equipment
Exhibit 181 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Asset Location Trackers
Exhibit 182 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to Cover
Fleet Vehicles or Trucks
Exhibit 183 Has Respondent’s Organization Enacted IT Security Policies Specifically Designed to
Additional Devices other than Laptops, PCs, or Servers
Exhibit 184 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Smartphones Within the Next Three Years
Exhibit 185 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Tablets Within the Next Three Years
Exhibit 186 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover HVAC Sensors, Controls, and/or Thermostats Within the Next 3 Years
Exhibit 187 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Lighting Control Systems Within the Next Three Years
Exhibit 188 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Medical Monitoring Devices Within the Next Three Years
Exhibit 189 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Medical Imaging Devices Within the Next Three Years
Exhibit 190 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Security Systems Within the Next Three Years
Exhibit 191 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Point-of-Sales Terminals Within the Next Three Years
Exhibit 192 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed Cover to Information Kiosks Within the Next Three Years
Exhibit 193 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed Cover to Set Top Boxes for Cable/Satellite TV Within the Next Three Years
Exhibit 194 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Televisions Within the Next Three Years
Exhibit 195 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Factory or Industrial Automation Equipment Within the Next Three Years
Exhibit 196 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Asset Location Trackers Within the Next Three Years
Exhibit 197 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Fleet Vehicles or Trucks Within the Next Three Years
Exhibit 198 Does Respondent Expect their Organization Will Enact IT Security Policies Specifically
Designed to Cover Additional Devices other than Laptops, PCs, or Servers Within the Next
Three Years
Exhibit 199 Extent to Which Respondent’s Organization Expect IT Security Vendors Will Provide
Security Solutions for IoT Devices
Exhibit 200 Security Threats, other than Laptops/PCs and Servers, Respondent’s are Concerned about
for IoT Devices Connected to Organization’s Network
Exhibit 201 IoT Devices Currently Create Security Risks for My Organization
Exhibit 202 IoT Devices Are Likely to Create Security Risks for My Organization Within the Next Three
Years
Exhibit 203 My Organization Has Control Over What Specific IoT Devices Connect to Its Network
Exhibit 204 My Organization is Prepared to Manage Many Different Types of Connected IoT Devices
Exhibit 205 An IoT Device Security Failure Has Already Cost My Organization Money
Exhibit 206 Security Solutions Used to Protect IoT Devices Connected to Respondent’s Organization’s
Network
Exhibit 207 Security Solutions Respondent Would Like to See Used to Protect IoT Devices Connected
to Respondent’s Organization’s Network Three Years From Now
Exhibit 208 Vendors Supplying Commercial IT Security Products
Exhibit 209 Use of Security Solutions from IoT Specialists Vendors
Exhibit 210 Percent of Organization IT Budget Related to Security
Exhibit 211 Percent of Organization’s IT Security Budget Attributed to Commercial Security Software/
Services
Exhibit 212 Percent of Organization’s IT Security Budget Expected to be Related to Security Three
Years From Now
Exhibit 213 Person(s) Within Respondent’s Organization Responsible for the Selection and Purchase of Enterprise Security Solutions
Exhibit 214 Types of Tools Used in Current/Most Recently Completed Project
Exhibit 215 Types of Tools Expected to be Used in Similar Project Three Years From Now
Exhibit 216 Most Important Characteristics When Selecting the Compiler Used on Current or Most
Recent Project
Exhibit 217 Does Respondent’s Engineering Organization Purchase Cross or Native Compliers
Exhibit 218 Type of Compilation Tool(s) Currently Used by Respondent
Exhibit 219 Type of Static Analysis or SAST Being Used on Current Project
Exhibit 220 Most Important Factors in Selection of Static Analysis or SAST Tools Being Used in Current Project
Exhibit 221 Typical Decision Maker for Purchase of Static Analysis or SAST Tools Used by Respondent
and Engineering Team
Exhibit 222 Dynamic Testing or DAST Tools Being Used on Current Project
Exhibit 223 Most Important Factors in Selection of Dynamic Testing Tools Being Used in Current Project
Exhibit 224 Typical Decision Maker for Purchase of Dynamic Testing Tools Used by Respondent and
Engineering Team
Exhibit 225 Requirements Management/Definition Tools Being Used on Current Project
Exhibit 226 Most Important Factors in Selection of Requirements Management/Definition Tools Being
Used in Current Project
Exhibit 227 Typical Decision Maker for Purchase of Requirements Management/Definition Tools Used by Respondent and Engineering Team
Exhibit 228 Standard Language-Based Modeling Tools Being Used on Current Project
Exhibit 229 Most Important Factors in Selection of Standard Language-Based Modeling Tools Being
Used in Current Project
Exhibit 230 Typical Decision Maker for Purchase of Standard Language-Based Testing Tools Used by
Respondent and Engineering Team
Exhibit 231 Proprietary Language-Based Modeling Tools Being Used on Current Project
Exhibit 232 Most Important Factors in Selection of Proprietary Language-Based Modeling Tools Being
Used in Current Project
Exhibit 233 Typical Decision Maker for Purchase of Proprietary Language-Based Software/System
Modeling Tools Used by Respondent and Engineering Team
Exhibit 234 Release Management/Continuous Deployment Tools Being Used on Current Project
Exhibit 235 Most Important Factors in Selection of Release Management/Continuous Deployment Tools Being Used in Current Project
Exhibit 236 Typical Decision Maker for Purchase of Release Management/Continuous Deployment Tools Used by Respondent and Engineering Team
Exhibit 237 Software Composition Analysis (SCA)/IP Compliance Tools Being Used on Current Project
Exhibit 238 Most Important Factors in Selection of Software Composition Analysis (SCA)/IP Compliance Tools Being Used in Current Project
Exhibit 239 Typical Decision Maker for Purchase of Software Composition Analysis (SCA)/IP
Compliance Tools Used by Respondent and Engineering Team
Exhibit 240 Organization’s Linking System Requirements in Respondent’s Current Project
Exhibit 241 Respondent’s Description of Organization’s Requirement Engineering
Exhibit 242 Has Respondent’s Organization Investigated or Implemented Ways to Enhance Cross-
Engineering Domain Integration Between Software/System Development (ALM), Mechanical
Engineering/Product Lifecycle Management (PLM), and/or Electrical Engineering/Electronic
Design Automation (EDA)
Exhibit 243 Biggest Advantages/Benefits of Cross-Engineering Domain Integrations
Exhibit 244 Has Respondent’s Organization Investigated or Implemented Ways to Enhance the Delivery of Continuous Post-Deployment Content and Service Support
Exhibit 245 Budget for Development Tools Being Used on Current or Most Recent Project
Exhibit 246 Types of Prototyping Solutions on Current Project
Exhibit 247 Use of Own Prototyping Board or Commercial Solution on Most Recent Project
Exhibit 248 ASIC Gate Count of What Was Prototyped (ASIC Equivalent Gates)
Exhibit 249 FPGAs Used in Most Recent Prototype
Exhibit 250 FPGA Vendor(s) Used for Prototype Hardware on Most Recent Project
Exhibit 251 Rating of FPGA-Based Prototyping Challenges
Exhibit 252 FPGA-Based/Physical Prototyping Solution Currently Used
Exhibit 253 Type of Tasks in Which Virtual Prototyping Solutions are Used
Exhibit 254 Virtual Prototyping Solution(s) Currently Using
Exhibit 255 Most Important Characteristics When Selecting Virtual Prototyping Solution
Exhibit 256 Location of Vertical Prototype Creation
Exhibit 257 Language(s) Used to Develop Software for Previous Projects
Exhibit 258 Language(s) Used to Develop Software for Current Project
Exhibit 259 Language(s) Expected to be Used to Develop Software for a Similar Project in Three Years
Exhibit 260 Estimate of Total Source Lines of Code Required on Current or Most Recent Project
Exhibit 261 Percent of Total Software Code in Final Design of Current Project Coming From Various
Origins
Exhibit 262 Expected Change to Amount of Software Content/Lines of Code on the Next Commercial
Third-Party Software Project
Exhibit 263 Expected Change to Amount of Software Content/Lines of Code on the Next Open Source
Third-Party Software Project
Exhibit 264 Expected Change to Amount of Software Content/Lines of Code on the Next In-House
Developed Code Project
Exhibit 265 Expectation of the Percentage Increase of Software Content/Lines of Code for Commercial Third-Party Software
Exhibit 266 Expectation of the Percentage Increase of Software Content/Lines of Code for Open Source Third-Party Software
Exhibit 267 Expectation of the Percentage Increase of Software Content/Lines of Code for In-House
Developed Code
Exhibit 268 Expectation of the Percentage Decrease of Software Content/Lines of Code for Commercial Third-Party Software
Exhibit 269 Expectation of the Percentage Decrease of Software Content/Lines of Code for Open
Source Third-Party Software
Exhibit 270 Expectation of the Percentage Decrease of Software Content/Lines of Code for In-House
Developed Code
Exhibit 271 Estimated Percent of In-House Developed Software Code for Current Project, by Origin
Exhibit 272 Software Design Methodologies Used on Current Project
Exhibit 273 Software Design Methodologies Expected to Use on Similar Project Three Years From Now
Exhibit 274 Certification/Process Standard(s) Being Adhered to for Current Project
Exhibit 275 Adherence to CERT C Coding Standard in Current Project
Exhibit 276 Adherence to CERT C++ Coding Standard in Current Project
Exhibit 277 Adherence to CWE Coding Standard in Current Project
Exhibit 278 Adherence to HIC++ Coding Standard in Current Project
Exhibit 279 Adherence to MISRA C Coding Standard in Current Project
Exhibit 280 Adherence to MISRA C++ Coding Standard in Current Project
Exhibit 281 Adherence to JSF AV++ Coding Standard in Current Project
Exhibit 282 Adherence to In House/Internal Coding Standard Coding Standard in Current Project
Exhibit 283 When Respondent’s Organization Intends to Deploy IoT Capability and/or Applications into its Products
Exhibit 284 Primary Factor Driving Organization Towards Utilizing and/or Providing IoT Solutions
Exhibit 285 Ways IoT Most Impacts Respondent’s Organization’s Business Prospect. IoT Enables
Organization to…
Exhibit 286 Biggest Overall Challenge in Developing IoT Solutions
Exhibit 287 Most Important Elements When Considering Suppliers for IoT Components and/or Entire
Solutions
Exhibit 288 Plans to Use IoT/Cloud Services to Build Projects
Exhibit 289 Use of Any IoT/Cloud Services to Connect, Manage, or Analyze Any of the IoT Devices on
Networks Owned or Managed by Respondent’s Organization
Exhibit 290 Types of IoT/Cloud Services Being Used on Current Project
Exhibit 291 Types of IoT/Cloud Services Planned to Use on a Project Three Years From Now
Exhibit 292 Estimated Annual Cost of Current IoT Connectivity Services
Exhibit 293 Estimated Annual Cost of Current IoT Remote Monitoring and Control Services
Exhibit 294 Estimated Annual Cost of Current IoT Data Collection and Storage Services
Exhibit 295 Estimated Annual Cost of Data Analytics Services
Exhibit 296 Estimated Annual Cost of Other Current IoT Services
Exhibit 297 Types of Cloud Analytics Used to Analyze IoT Data on Current Project
Exhibit 298 Is Respondent’s Organization Selling, or Planning to Resell Any Connectivity Services as a
Value-Added Service to End Customers
Exhibit 299 Is Respondent’s Organization Selling, or Planning to Resell Any Remote Monitoring and
Control Services as a Value-Added Service to End Customers
Exhibit 300 Is Respondent’s Organization Selling, or Planning to Resell Any Data Collection and Storage Services as a Value-Added Service to End Customers
Exhibit 301 Is Respondent’s Organization Selling, or Planning to Resell Any Data Analytics Services as
a Value-Added Service to End Customers
Exhibit 302 Is Respondent’s Organization Selling, or Planning to Resell Any Other IoT/Cloud Services as a Value-Added Service to End Customers
Exhibit 303 Non-Cloud/IoT Services Being Used to Support Customers on Current Project
Exhibit 304 IoT Cloud Platforms-as-a-Service (PaaS) Being Used on Current or Most Recent Project
Exhibit 305 IoT Cloud Platforms-as-a-Service (PaaS) Expected to Be Used on a Similar Project Three
Years From Now
Exhibit 306 Cloud Services Used as a Part of IoT Cloud Platforms Currently Being Used in Project
Exhibit 307 Cloud Services Expected to be Used as a Part of IoT Cloud Platforms in a Similar Project
Three Years From Now
Exhibit 308 Does Respondent’s Company Currently Purchase or Create/Integrate Embedded Computer Hardware Products Considered to be IoT Gateway Devices?
Exhibit 309 Does Respondent’s Company Plan to Purchase or Create/Integrate New or Additional
Embedded Computer Hardware Products They Would Consider to be IoT Gateways in the
Future?
Exhibit 310 How Respondent’s Company Expects to Source its Gateway Technology
Exhibit 311 Approximate Number of Endpoints/Devices That Will Be Supported by the IoT Gateways
Purchased/Used/Integrated by Respondent’s Company
Exhibit 312 Most Important Product Requirements In Selecting Embedded Computer Products That
Would Provide Connectivity at the IoT Gateway in the Equipment Used/Built/Integrated by
Respondent’s Company
Exhibit 313 Vendors Used for Analytics Solutions on Gateway Devices
Exhibit 314 IoT Gateway Hardware Suppliers Used with Current or Most Recent Project
Exhibit 315 IoT Gateway Hardware Suppliers Expected to be Used Three Years From Now
Exhibit 316 Respondent’s Current or Projected Future Use of Blockchain
Exhibit 317 Source of Blockchain Technology in Current Project
Exhibit 318 Source of Blockchain Technology Expected to be Used Three Years From Now
Exhibit 319 Most Important Elements When Considering Blockchain Vendors/Integrators
Exhibit 320 Why Respondent’s Company Plans to Not Use Blockchain
Exhibit 321 Use of Machine Learning/Neural Networks on Current and Future Projects
Exhibit 322 Source of Machine Learning Technology Used on Current Project
Exhibit 323 Source of Machine Learning Technology Expected Three Years From Now
Exhibit 324 Types of Machine Learning Currently Used
Exhibit 325 Types of Machine Learning Expected to be Used Three Years from Now
Exhibit 326 Where Current Machine Learning Models are Trained
Exhibit 327 Where Current Machine Learning Models are Expected to be Trained in Future Projects
Exhibit 328 Target Architecture(s) Used for Inferencing In Current Project
Exhibit 329 Target Architecture(s) Expected to be Used for Inferencing In Future Projects
Exhibit 330 Machine Learning Software/Analytics Vendor(s) Currently Used
Exhibit 331 Machine Learning Software/Analytics Vendor(s) Expected to be Used Three Years From
Now
Exhibit 332 Most Important Elements When Considering ML Vendors/Integrators
Exhibit 333 Primary Role Within Company/Organization
Exhibit 334 Respondent’s Organization’s Primary Industry
Exhibit 335 Total Number of Employees at Respondent’s Organization

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る