nemertes dn3658 benchmark report wan best practices … · nemertes’research’’’’’’...

16
Nemertes Research www.nemertes.com +1 888.241.2685 Q3 14 C OMPASS D IRECTION P OINTS Less is More – Leveraging a single ISP for WAN correlates with success, yet a significant portion of companies uses multiple providers. Managed is Better – Companies using managed WAN services tend to be more successful, but a majority have no plans for this, with 30% already leveraging managed WAN and only 4% planning to. Widely Deployed, largely successful – Encrypted WAN correlates with success, and is deployed by 44% of companies with another 10% of companies showing interest in the technology. However, many companies are not looking at encryption at all. Internetonly in Small Doses – The most successful WAN initiatives leverage a limited and measured percentage of Internetonly branches, falling somewhere between 5% and 10%. The vast majority of companies show no direct Internet access growth, but 25% of sites use Internetas WAN and this number is slowly rising. Nemertes 201415 Benchmark Report WAN Best Practices and Success Factors Nemertes Research Benchmark Reports provide detailed assessment and analysis of adoption of key technologies and services. Data is based on direct interviews with more than 200 organizations.

Upload: trinhdung

Post on 17-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

   

   

N e m e r t e s   R e s e a r c h               w w w . n e m e r t e s . c o m             + 1   8 8 8 . 2 4 1 . 2 6 8 5  

Q3  14  

08  Fall  

COMPASS  DIRECTION  POINTS  ± Less  is  More  –  Leveraging  a  single  ISP  for  WAN  correlates  with  success,  yet  

a  significant  portion  of  companies  uses  multiple  providers.  ± Managed  is  Better  –  Companies  using  managed  WAN  services  tend  to  be  

more  successful,  but  a  majority  have  no  plans  for  this,  with  30%  already  leveraging  managed  WAN  and  only  4%  planning  to.    

± Widely  Deployed,  largely  successful  –  Encrypted  WAN  correlates  with  success,  and  is  deployed  by  44%  of  companies  with  another  10%  of  companies  showing  interest  in  the  technology.  However,  many  companies  are  not  looking  at  encryption  at  all.    

± Internet-­‐only  in  Small  Doses  –  The  most  successful  WAN  initiatives  leverage  a  limited  and  measured  percentage  of  Internet-­‐only  branches,  falling  somewhere  between  5%  and  10%.  The  vast  majority  of  companies  show  no  direct  Internet  access  growth,  but  25%  of  sites  use  Internet-­‐as-­‐WAN  and  this  number  is  slowly  rising.    

Nemertes  2014-­‐15  Benchmark  Report    WAN  Best  Practices  and  Success  Factors  Nemertes  Research  Benchmark  Reports  provide  detailed  assessment  and  analysis  of  adoption  of  key  technologies  and  services.  Data  is  based  on  direct  interviews  with  more  than  200  organizations.  

       

 

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   2  

 

TABLE  OF  CONTENTS  WAN  Best  Practices  and  Success  Factors  ........................................................................  3  Executive  Summary  .........................................................................................................................  3  

Top  Trends  ................................................................................................................................  3  Go-­‐To  ISP  .............................................................................................................................................  4  Don’t  Let  WAN  Make  IT  Wan  .........................................................................................................  5  Keep  Unwanted  Eyes  Off  WAN  ......................................................................................................  7  Internet-­‐Only:  Use  in  Moderation  ...............................................................................................  8  

Conclusion  and  Recommendations  ...................................................................................  9  

Benchmark  Methodology  ...................................................................................................  10  

For  Further  Information  .....................................................................................................  16            

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   3  

WAN  BEST  PRACTICES  AND  SUCCESS  FACTORS    

Executive  Summary  With  26%  of  companies  increasing  their  Wide  Area  Network  (WAN)  budget  in  2014  and  40%  in  2015,  enterprises  are  beefing  up  their  networks  as  more  and  more  data  traverses  campuses  on  airwaves  and  in  wired  Ethernet.  Especially  with  so  many  companies  increasing  WAN  spending,  IT  should  closely  evaluate  technologies  and  practices  most  aligned  with  successful  networks.  These  include  Internet  service  provider  (ISP)  relationships,  managed  WAN  deployment,  encrypted  WAN  adoption,  and  using  Internet-­‐as-­‐WAN  strategically  in  relatively  small  doses.    Leveraging  a  single  ISP,  or  just  one  for  the  lion’s  share  of  WAN  correlates  with  WAN  success,  but  ISP  strategies  are  mixed.  Managed  WAN  aligns  favorably  with  success,  but  most  companies  aren’t  looking  at  pushing  router,  firewall,  and  switch  management  to  Managed  Service  Providers  (MSP)s.  Encrypted  WAN  sees  greater  adoption  than  managed  WAN  but  is  still  by  no  means  ubiquitous.  Organizations  finding  the  right  dose  of  Internet-­‐only  sites,  between  5%  and  10%,  have  the  most  successful  WAN  initiatives.  As  network  investments  rise,  these  technologies  and  strategies  should  gain  more  traction  and  fast-­‐moving  organizations  can  jump  ahead  of  the  majority  by  taking  advantage  of  them.      

TOP  TRENDS  ! Go-­‐To  ISP.  Having  a  single  ISP  or  an  ISP  that  takes  on  the  bulk  of  the  WAN  

correlates  with  higher  WAN  success  than  having  a  fleet  of  ISPs.  Only  20%  of  companies  have  a  single  ISP  and  35%  have  a  dominant  (but  not  exclusive)  ISP.  Unfortunately,  for  organizations  crossing  oceans  and  national  boundaries,  a  single  ISP  strategy  can  be  very  hard  to  achieve,  especially  when  cost  plays  a  large  part  of  choosing  a  partner.    

 ! Don’t  Let  WAN  Make  IT  Wan.  Approximately  30%  of  companies  currently  farm  

out  WAN  management,  and  another  4%  of  companies  plan  on  doing  so  by  the  end  of  2014.  Managed  solutions  have  a  clear  association  with  successful  WAN;  by  outsourcing  this  to  carriers,  IT  has  another  free  hand  to  be  more  strategic.      

! Keep  Unwanted  Eyes  Off  WAN.  Currently,  44%  of  companies  use  WAN  encryption,  with  few  companies  planning  on  encryption  at  this  layer  in  the  future.    With  regulation  requirements  and  general  security  the  top  drivers,  encrypted  WAN  helps  organizations  achieve  a  security  for  data  at  rest  and  in  motion.  

 

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   4  

! Internet-­‐Only:  Use   in  Moderation.  Keeping   Internet-­‐only  branches  between  5%  and   10%   of   the   entire   on-­‐   and   off-­‐site   campus   aligns   with   successful   WAN  initiatives.   Using   only   Internet-­‐as-­‐WAN   configurations   reduces   WAN   costs,  making   this   strategy   a   likely   choice   for   select   remote   branches  where   private  services  may  be  cost  prohibitive.  

Go-­‐To  ISP  Having  an  exclusive  ISP  or  one  ISP  for  the  majority  of  Internet  access  needs  correlates  with  success.  The  simplicity  of  a  single  provider  as  well  as  the  operational  efficiencies  that  go  with  troubleshooting  with  a  single  provider  drives  this  correlation.  However,  42%,  of  companies  rely  on  multiple  carriers.  Why?  Multiple  carriers  provide  greater  resiliency,  albeit  often  at  a  higher  cost.  Additionally,  many  companies  leverage  local  ISPs  in  remote  locations  to  minimize  costs,  or  where  services  from  their  primary  ISP  aren’t  available.  “In  China  we  have  no  choice.  It's  China  Telecom,”  says  the  Director  of  IT  at  a  global  professional  services  company.  “Elsewhere,  in  the  U.S.  it's  CenturyLink  because  that  was  our  historical  carrier;  in  Europe  Masergy  [is]  easy  because  we  get  our  MPLS  from  them.  You  can  just  add  a  VLAN  and  get  public  Internet.”  (Please  see  Figure  2.)        

 Figure  1:  Internet  Provider  Portfolio  and  WAN  Success  

 Resiliency  and  high  availability  is  by  far  the  most  sought  feature  of  ISPs,  with  cost  coming  in  second.  Availability,  geography-­‐specific  solutions  and  ease  of  management  equally  share  the  lower  rung  of  WAN  needs.  Companies  managing  a  global  WAN  allocate  nearly  double  ($44,716)  spend  per  location  as  U.S.-­‐only  organizations,  which  puts  greater  strain  on  worldwide  companies  to  look  for  cost  

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   5  

cuts  anywhere  possible,  including  prioritizing  cost-­‐effective  providers  in  a  region  over  keeping  a  single  strategic  partner.      

 Figure  2:  Current  Internet  Provider  Portfolio  Strategy  Drivers  

In  Figure  2,  it’s  important  to  keep  in  mind  that  the  “Other”  percentage  speaks  to  multiple  issues,  including  ease  of  management  and  geographic  constraints/issues.  Ease  of  management,  as  mentioned  earlier,  comes  as  a  benefit  of  leveraging  a  single  partner  for  WAN  due  to  fewer  management  systems  and  consolidated  troubleshooting  tickets.      

Don’t  Let  WAN  Make  IT  Wan  Outsourcing  WAN  hardware  management  drives  greater  WAN  success  than  relying  on  existing  IT  staff  and  resources  to  keep  the  network  running  smoothly.  (Please  see  Figure  3.)    

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   6  

 Figure  3:  Managed  WAN  Adoption  and  WAN  Success  

In-­‐house  WAN  management  brings  two  detractors:  it’s  expensive  and  potentially  less  efficient.  IT  budget  needs  to  accommodate  adequate  staffing,  on-­‐premises  appliances  and  monitoring  systems,  and  staff  training.  Refreshing  and  updating  hardware  and  software  can  bring  service  interruptions  or  leave  security  protocols  outdated.  MSPs  take  the  pressure  off  of  IT,  freeing  IT’s  hands  to  work  on  other  more  strategic  projects  instead  of  managing  increasingly  complex  network  infrastructure.  However,  keeping  WAN  MSPs  to  a  minimum  is  critical—stringing  together  multiple  MSPS  can  create  a  complicated,  expensive  web  of  managed  service  providers  that  leaves  gaps  across  the  network  due  to  different  hardware  and  software  maintenance  and  refreshing  cycles.    Through  the  end  of  2014,  only  33%  of  organizations  use  or  plan  to  use  managed  WAN  services,  making  it  an  area  where  companies  can  still  reap  the  benefits  of  being  (relatively)  early  adopters  while  following  in  the  footsteps  of  more  technologically  aggressive  organizations.      

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   7  

 Figure  4  Managed  WAN  adoption  

Keep  Unwanted  Eyes  Off  WAN  Nothing  is  certain  except  death  and  taxes,  but  encrypting  WAN  links  will  help  network  operators  sleep  at  night.  Sites  using  a  private  WAN  should  also  consider  encryption  to  mitigate  risk  as  much  as  possible,  especially  if  non-­‐employees  frequently  visit  these  branches.  For  organizations  prioritizing  security  for,  encryption  offers  a  security  stopgap  that  helps  organizations  meet  regulatory  standards  like  PCI,  DSS,  or  HIPAA.      

 Figure  5  WAN  encryption  trends  and  WAN  success  

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   8  

 Organizations  shifting  to  Internet  as  WAN  need  to  be  cautious  of  security  threats  lurking  on  the  net.  For  Internet  as  WAN  branches,  encryption  is  table  stakes,  but  as  such  it  is  still  a  key  component  to  successful  WAN.  WAN  encryption  keeps  threats  on  the  Web  at  a  minimum.  As  essential  as  security  is,  network  operators  need  to  find  a  balance.  “Encryption  on  WAN  link  is  almost  20%  latency  hit,  so  we  encrypt  the  traffic  we  want  that  level  of  security  on,”  says  the  Director  of  IT  Process  and  Planning  at  a  U.S.  university.    

Internet-­‐Only:  Use  in  Moderation  Internet  as  WAN  offers  useful  perks  like  reducing  traffic  on  more  expensive  MPLS  or  Ethernet  WAN  services.  Ninety-­‐six  percent  of  companies  leverage  Internet  services  for  network  connections.  But,  companies  with  the  best  WAN  deployments  won’t  abuse  an  Internet-­‐only  strategy.      

 Figure  6  Internet-­‐Only  Sites  and  WAN  success  ratings  

Small,  midsize  and  large  companies  all  surpass  the  10%  watermark.  Midsize  companies  are  closest  with  14%  of  sites  using  Internet-­‐only;  small  companies  fall  in  at  40%,  and  large  companies  sit  in  the  middle  at  25%.  This  overinvestment  in  Internet-­‐only  sites  likely  comes  from  cost;  it’s  cheaper  to  opt  for  direct-­‐Internet  or  Internet  as  WAN  strategies  instead  of  provisioning  infrastructure  and  backhauling  more  traffic  over  WAN.  However  using  Internet  as  a  WAN  can  negatively  impact  performance  as  there’s  no  way  to  prioritize  latency  sensitive  traffic  like  VOIP  or  video  conferencing  over  the  public  Internet,  thus  Internet  as  a  WAN  is  ideal  for  bulk  data  traffic  such  as  backups,  or  other  traffic  where  intermittent  delays  or  packet  loss  will  not  impact  operations.  

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   9  

 

CONCLUSION  AND  RECOMMENDATIONS  WAN  trends  and  best  practices  are  well  established:  a  single  ISP,  managed  WAN,  encrypted  WAN,  and  limited  Internet-­‐only  sites  all  lean  towards  a  successful  deployment.  However,  adoption  of  these  strategies  is  not  yet  the  norm,  leaving  agile  organizations  an  opportunity  to  pivot  and  hop  ahead  of  the  pack.  IT  decision  makers  should  consider  the  following:  

! Explore  the  cost  and  operational  benefits  of  consolidating  ISPs.  Engage  ISPs  to  discover  if  there  are  discounts  for  deploying  their  WAN  across  the  enterprise,  ask  for  measurable  data  like  time-­‐to-­‐remediation  and  network  uptime,  and  push  for  customizable  SLAs.    

! Obtain  an  understanding  of  how  much  time  internal  network  administrators  spend  on  WAN  maintenance.  Measure  this  time  against  the  cost  of  managed  WAN  services  and  the  benefits  of  allocating  internal  IT  resources  to  other  initiatives.    

! For  organizations  emphasizing  network  security,  leverage  WAN  encryption  for  all  branches.  Even  private  WAN  networks  could  be  at  risk.    

! Establish  Internet-­‐only  sites  sparingly;  relying  too  much  on  public  Internet  could  be  counterproductive  as  there  are  more  opportunities  for  network  compromises  and  session  performance  issues  due  to  sharing  bandwidth  with  public  traffic.      

       

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   10  

BENCHMARK  METHODOLOGY  Nemertes  conducted  212  interviews  with  IT  professionals  at  201  companies  or  organizations  to  compile  its  2014-­‐2015  benchmark.    Nemertes  analysts  conducted  in-­‐depth  interviews,  ranging  in  duration  from  30  minutes  to  five  hours  (not  always  in  a  single  phone  call),  with  all  of  the  benchmark  participants.  We  also  conducted  several  short  follow-­‐up  calls  or  exchanged  emails  to  clarify  and  augment  data.  During  interviews,  each  analyst  asked  a  pre-­‐planned  list  of  questions  to  ensure  we  asked  the  questions  consistently.  Many  questions  are  open-­‐ended,  providing  an  opportunity  for  our  participants  to  provide  their  own  unbiased  insight  and  observations.  We  did  not  provide  the  list  of  questions  to  participants  ahead  of  time.  To  ensure  the  report  is  relevant  to  the  largest  possible  group  of  readers,  we  deliberately  sought  to  reach  the  broadest  possible  range  of  industries  and  company  sizes.  In  particular,  we  asked  open-­‐ended  questions  about  best  practices,  strategic  goals,  business  drivers,  company  initiatives,  costs,  vendor  successes  and  failures,  and  technical  and  operational  challenges.  We  also  asked  participants  to  describe  their  organizational  and  operational  structures,  and  to  position  their  specific  technology-­‐related  decisions  and  operations  within  the  context  of  IT  and  overall  business  goals.  As  a  result,  individual  interviews  varied  considerably  in  the  number  of  questions  answered  and  in  the  number  of  subject  areas  each  addressed,  as  well  as  in  the  degree  of  insight  they  provided  for  each  topic,  based  on  the  interest  and  expertise  of  the  participants  involved.      For  the  interviews,  Nemertes  drew  participants  primarily  from  its  database  of  IT  professionals,  its  non-­‐vendor  client  base,  and  to  a  lesser  extent,  from  publicly  available  lists  of  IT  executives.    Nemertes  guarantees  confidentiality  and  anonymity  for  participants  and  their  companies.  These  reports  include  quotations  from  real  individuals,  identified  only  by  title  and/or  industry  affiliation.  Please  note  these  quotes  are  verbatim,  with  no  changes  in  content  or  wording,  except  to  correct  grammar.    

Timeframe  We  conducted  interviews  with  benchmark  participants  from  IT  organizations  between  January  2014  and  April  2014.  We  asked  participants  to  provide  us  with  insight  into  ongoing  communications,  computing,  and  security  initiatives  and  those  planned  for  the  next  two  years.    

Participants  In   selecting   individual   participants,   we   asked   to   speak   with   the   individual   or  individuals   within   IT   (or,   where   they   are   separate,   security   organizations)   most  closely  associated  with  decision-­‐making,  operations  and  overall  knowledge  in  each  technology  area.  For  example,  to  discuss  communications  technologies  we  typically  speak   with   VPs,   directors,   and   managers   in   network   management,   telecom,  

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   11  

enterprise  architecture,  systems  integration,  collaborative  applications,  and  unified  communications,  as  well  as  CIOs  and  CTOs.  For  computing  and  security   topics,  we  typically  speak  with  directors  and  managers  of  data-­‐center  operations,   systems  or  enterprise  architecture,  directors  of  security  operations,  CIOs,  CISOs,  and  CTOs.  

By  Title  This  year,  Nemertes  secured  interviews  with  a  wide  range  of  decision  makers/influencers  and  their  corresponding  viewpoints.  C-­‐Level  participants  made  up  19.8%  of  the  total.  These  include  CIOs,  CEOs,  CTOs,  and  presidents.  VP-­‐level  participants  made  up  an  additional  11.7%.  The  majority  of  participants  consisted  of  directors  (32%)  and  managers  (20.3%).  These  groups  were  comprised  of  IT  executives  across  different  groups  including,  but  not  limited  to  telecom,  network,  infrastructure,  and  security.  The  remaining  16.2%  were  made  up  of  engineers,  consultants,  and  analysts.    

 

Figure  1:  IT  Executive  Participants  by  Title  

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   12  

By  Industry  As  noted,  we  sought  to  include  the  broadest  possible  range  of  industries  in  our  research.  Manufacturing,  financial  services,  higher  education,  and  professional  services  (broadly  covering  all  professional  services  sub-­‐areas,  including  engineering,  accounting,  law  firms,  etc.)  top  the  list  of  industries  represented,  accounting  for  17.4%,  15.4%,  13.9%,  and  13.9%  of  participants,  respectively.  This  is  very  close  to  our  participant  demographics  from  2013-­‐2014  except  the  top  two  industries  are  reversed.  Last  year,  financial  services  accounted  for  19.8%,  followed  by  manufacturing  (16.5%),  professional  services  (14.3%),  and  higher  education  (9.9%).    

Figure  2:  Participants  by  Industry  

By  Size:  Revenue  We  seek  insight  from  organizations  large  and  small.  For  benchmark  analysis,  we  characterize  companies  as  being  small,  midsize,  large  and  very  large  by  several  measures,  including  revenue.      

Our  size  characterization  cased  on  annual  revenue  is  as  follows:  • Small  =  $300  million  or  less  • Midsize  =  $300.1  million  to  $1  billion  • Large  =  $1.01  billion  to  $10  billion  • Very  large  =  Greater  than  $10  billion  

Slightly  more  than  one-­‐quarter  (27%)  of  the  participating  companies  are  small.  The  smallest  group  represented  is  midsize  companies,  with  16.3%  of  respondents.  Large  and  very  large  companies  make  up  the  majority  of  respondents:  56.7  %  in  total,  or  32.7%  and  24%,  respectively.    

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   13  

Although  this  differs  from  the  “traditional”  business  demographics,  in  which  small  businesses  make  up  the  largest  percentage  of  total  businesses,  large  organizations  tend  to  have  the  most  diverse  set  of  IT  and  ET  (Enterprise  Technology)  initiatives  under  development  or  in  operations.  As  such,  we  are  able  to  characterize  and  forecast  enterprise  adoption  of  technologies  with  a  large  base  of  large  companies.  That  said,  we  certainly  do  talk  to  many  innovative  small  and  midsize  organizations,  so  a  solid  coverage  of  all  types  of  companies  is  imperative.  

 

Figure  3:  Participant  Company  Size  by  Revenue  

By  Size:  Employees  

Similarly,  we  classify  company  size  based  on  number  of  employees.  In  all  size  bands,  we  have  stayed  close  to  our  previous  year’s  methodology  and  to  the  Nemertes  benchmark  profile.  We  characterize  size  by  number  of  employees  as  follows:  

• Small  =  250  employees  or  less  • Midsize  =  251  to  2,500  employees  • Large  =  2,501  to  10,000  employees  • Very  Large  =  More  than  10,000  employees  

In  this  year’s  benchmark,  the  “very  large”  group  is  the  largest  based  on  number  of  employees  (37.5%),  followed  by  midsize    (25%),  large  (23.5%)  and  small  (14%).      

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   14  

Figure  4:  Participant  Company  Size  by  Employees  

 

By  Global  Operations  This  year,  we  spoke  with  fewer  companies  operating  with  all  locations  in  one  country  (48.8%)  than  those  with  global  operations  (51.2%).  Global  operations  are  defined  as  any  organization  that  has  locations  in  more  than  one  country  or  region.    

Figure  5:  Participant  Company  Global  Operations  

 

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   15  

By  IT  Culture  We  asked  interview  participants  to  describe  their  company’s  culture  around  IT,  in  terms  of  whether  they  look  at  IT  as  a  strategic  differentiator,  and  of  how  rapidly  (and  why)  they  deploy  new  technologies.  There  had  been  a  pronounced  shift  toward  more  “aggressive”  cultures  recently,  yet  last  year  slight  shift  back  toward  amore  conservative  culture  occurred.  That  trend  continued  into  this  year.  More  than  half  of  organizations  now  claim  a  more  conservative  view  towards  IT.  

 Figure  6:  IT  Culture  

   

©Nemertes  Research  2014   !     www.nemertes.com       !     888-­‐241-­‐2685     !       DN3658   16  

   

FOR  FURTHER  INFORMATION  Nemertes  has  thousands  of  charts,  correlation  points,  and  data  analysis  for  this  and  numerous  other  topics.  We  can  provide  this  information  via  more  detailed  papers,  presentations,  conversations,  and  Webcasts.  If  you  have  further  questions,  please  contact  [email protected].  Clients,  please  contact  client-­‐[email protected].      About  Nemertes  Research:  Nemertes  Research  is  a  research-­‐advisory  and  strategic-­‐consulting  firm  that  specializes  in  analyzing  and  quantifying  the  business  value  of  emerging  technologies.  You  can  learn  more  about  Nemertes  Research  at  our  Website:  http://www.nemertes.com