Author Archives: Russell Doty

About Russell Doty

A technology strategist and product manager at Red Hat, working on the next generation of open source systems.

False Dichotomy

A previous article suggested that the two ways to deal with potentially disruptive technologies are to either invest in all potentially disruptive technologies or to ignore all potentially disruptive technologies. One of the most powerful ways to go wrong is … Continue reading

Posted in Product Development | Leave a comment

Unknowable Markets

Clayten Christensen is very clear about understanding the markets for disruptive technologies: “Markets that do not exist cannot be analyzed: Suppliers and customers must discover them together. Not only are the market applications for disruptive technologies unknown at the time … Continue reading

Posted in Product Development | 1 Comment

Innovation

The previous article introduced the concept of product lifecycles. Examining the lifecycle model leads to the conclusion that the most profitable approach is to focus on the majority markets and largely ignore the innovators. In fact this is valid – … Continue reading

Posted in Product Development | 1 Comment

Building Successful Products

Building a new product is hard. Building a successful new product is even harder. And building a profitable new product is the greatest challenge! To make things even more interesting, the fundamental customer requirements for a product change as the … Continue reading

Posted in Product Development | 5 Comments

Where Did That Software Come From?

I have an article in the Oct. 9 issue of Military Embedded Systems magazine on software provenance titled Where Did That Software Come From? Where did the software on your embedded system come from? Can you prove it? Can you … Continue reading

Posted in Security | Leave a comment

IoT Security for Developers [Survive IoT Part 5]

Previous articles focused on how to securely design and configure a system based on existing hardware, software, IoT Devices, and networks. If you are developing IoT devices, software, and systems, there is a lot more you can do to develop … Continue reading

Posted in IoT, Security, System Management | Leave a comment

Security by Isolating Insecurity [Survive IoT Part 4]

In my previous post I introduced “Goldilocks Security”, proposing three approaches to security. Solution 1: Ignore Security Safety in the crowd – with tens of millions of cameras out there, why would anyone pick mine? Odds are that the bad … Continue reading

Posted in IoT, Security, System Management | Leave a comment