Author Archives: Russell Doty

About Russell Doty

A technology strategist and product manager at Red Hat, working on the next generation of open source systems.

Innovation

The previous article introduced the concept of product lifecycles. Examining the lifecycle model leads to the conclusion that the most profitable approach is to focus on the majority markets and largely ignore the innovators. In fact this is valid – … Continue reading

Posted in Uncategorized | 1 Comment

Building Successful Products

Building a new product is hard. Building a successful new product is even harder. And building a profitable new product is the greatest challenge! To make things even more interesting, the fundamental customer requirements for a product change as the … Continue reading

Posted in Uncategorized | 5 Comments

Where Did That Software Come From?

I have an article in the Oct. 9 issue of Military Embedded Systems magazine on software provenance titled Where Did That Software Come From? Where did the software on your embedded system come from? Can you prove it? Can you … Continue reading

Posted in Uncategorized | Leave a comment

IoT Security for Developers [Survive IoT Part 5]

Previous articles focused on how to securely design and configure a system based on existing hardware, software, IoT Devices, and networks. If you are developing IoT devices, software, and systems, there is a lot more you can do to develop … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Security by Isolating Insecurity [Survive IoT Part 4]

In my previous post I introduced “Goldilocks Security”, proposing three approaches to security. Solution 1: Ignore Security Safety in the crowd – with tens of millions of cameras out there, why would anyone pick mine? Odds are that the bad … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Goldilocks Security: Bad, Won’t Work, and Plausible [Survive IoT Part 3]

Previous posts discussed the security challenge presented by IoT devices, using IP Video Cameras as an example. Now let’s consider some security alternatives: Solution 1: Ignore Security This is the most common approach to IoT security today. And, to a … Continue reading

Posted in IoT, Security | Leave a comment

Representative IoT Device: IP Video Camera [Survive IoT Part 2]

One of the most flexible, powerful, and useful IoT sensors is a video camera. Video streams can be used directly. They can also be analyzed using modern software and an incredible range of information extracted from the images: motion detection … Continue reading

Posted in IoT, Security | Leave a comment