Analyst Blogs

HERE acquisition: Who and Why

April 17, 2015, 5:55 a.m.
Patrick Connolly, Principal Analyst

With HERE officially issuing a “come and get me” this week, there is a lot of speculation as to who will acquire the company. The whole thing raises a series of questions, which I am going to attempt to answer below.

Why Now?

Why has Nokia decided to sell HERE ...


Read more...

Fast Lanes are Dead: Long Live the Fast Lanes

March 25, 2015, 2:21 p.m.
Eric Abbruzzese, Research Analyst

The FCC passed net neutrality regulation using Title II, a strict—and more consumer-friendly—legislative option. Whether nudged in that direction after President Obama “suggested” Title II was the way to go, or the FCC arrived at the final legislature unbiased, is neither here nor there. The regulations are in the final ...


Read more...

A few thoughts on CE biometric applications

March 17, 2015, 7:33 a.m.
Dimitrios Pavlakis, Research Analyst

Biometric security measures are not something new from a technological perspective and until recently they were employed mostly in the governmental sector. Recent technological advancements in both biometrics and smartphone technologies are allowing a convergence between the two that is naturally evolving, allowing multiple verticals to benefit from it. Biometry ...


Read more...

Amazon's IoT Slumber Ends with 2lemetry Acquisition

March 13, 2015, 7:33 a.m.
Aapo Markkanen, Principal Analyst

Well, that didn’t take long. About two weeks after I had remarked that Amazon doesn’t seem to have a lot going on for its IoT strategy, the laggard in question confirms to TechCrunch that it has acquired 2lemetry, for an undisclosed sum. So I stand corrected. That’s a savvy acquisition ...


Read more...

Security Roundup @ MWC15

March 13, 2015, 3:50 a.m.
Michela Menting , Practice Director

Security was a more imposing topic this year at MWC. It has always been part of the show, but I believe this year, security really came into its own, with increasing interest in root of trust and embedded security. From mobile to carrier networks, from hardware to managed services, there ...


Read more...