Author Archives: Russell Doty

About Russell Doty

A technology strategist and product manager at Red Hat, working on the next generation of open source systems.

Where Did That Software Come From?

I have an article in the Oct. 9 issue of Military Embedded Systems magazine on software provenance titled Where Did That Software Come From? Where did the software on your embedded system come from? Can you prove it? Can you … Continue reading

Posted in Uncategorized | Leave a comment

IoT Security for Developers [Survive IoT Part 5]

Previous articles focused on how to securely design and configure a system based on existing hardware, software, IoT Devices, and networks. If you are developing IoT devices, software, and systems, there is a lot more you can do to develop … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Security by Isolating Insecurity [Survive IoT Part 4]

In my previous post I introduced “Goldilocks Security”, proposing three approaches to security. Solution 1: Ignore Security Safety in the crowd – with tens of millions of cameras out there, why would anyone pick mine? Odds are that the bad … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Goldilocks Security: Bad, Won’t Work, and Plausible [Survive IoT Part 3]

Previous posts discussed the security challenge presented by IoT devices, using IP Video Cameras as an example. Now let’s consider some security alternatives: Solution 1: Ignore Security This is the most common approach to IoT security today. And, to a … Continue reading

Posted in IoT, Security | Leave a comment

Representative IoT Device: IP Video Camera [Survive IoT Part 2]

One of the most flexible, powerful, and useful IoT sensors is a video camera. Video streams can be used directly. They can also be analyzed using modern software and an incredible range of information extracted from the images: motion detection … Continue reading

Posted in IoT, Security | Leave a comment

How I Survived the Internet of Things [Survive IoT Part 1]

Working with IoT from a software architecture perspective teaches you a lot, but leaves the nagging question “how does this really work?”. Theory is great and watching other people work is relaxing, but the time comes when I have to … Continue reading

Posted in IoT, Security | Leave a comment

Red Hat Improves IoT Communications

The just released Red Hat Enterprise Linux 7.3 improves support for IoT by providing enhanced connectivity to IoT devices – better connection of “things” to the Intenet. To give a little context for this, IoT is based on machine to … Continue reading

Posted in IoT | Leave a comment