IoT hackers – just like regular hackers.

I’m one of the only people at Link Labs without a technical background, but when it comes to the word “hacker” and it’s many meanings, my philosophical training comes in handy parsing all the options.

Coming into the tech world from a career in energy and environmental policy, the first thing that popped into my head when I heard the word “hacker” is “bad actor”, what I now know to be people who call themselves “black hats”. It took me several weeks to realize that my engineer colleagues used the word “hack” all the time, but in a mostly positive sense, like “we’ve got to hack this together” or “it works, but it’s just a hack”. It dawned on me at some point recently that my coworkers are hackers too, but so-called “white hats”.

The media coverage of the potential security flaws in the Internet of Things (IoT) focuses almost exclusively on the bad actor types of hackers: the hackers that are going to steal and reveal all our information, etc. While I’m sure there are plenty of those types of hackers out there, IoT companies, like Link Labs, depend on hackers – inside the company and also our external partners – for success. Without tinkerers, do-it-yourselfers, makers, without hackers IoT will be a long time coming.

I started writing this article thinking I would cleverly reclaim the “h-word” by giving hacking a noble objective: finding ways that savvy computer experts and engineers could help us make our products better. I guess I’m not surprised that this fight isn’t new and rather has been underway for a long time. What’s encouraging to me is the spirit of collaboration and sharing that underpins so much of what goes into hacking – both white hat and black hat, but mostly the white hat kind. For our startup, we depend on this every day. When we work with our partners on beta versions, we need people to test and break our programs and products, in order to make them better. I have a whole new appreciation for hackers and what they do. They make our company a success.

Sure, like any company in IT or IoT, we are going to have to contend with our fair share of bad actor hackers, but with the help of the makers, doers, and hackers out there, and of course based on the team we have, we are going to bring great things to market.

InPost-CTA-SelectingWirelessTechnology-1

Jennifer Halstead

Written by Jennifer Halstead

Jennifer Halstead, MBA, CPA brings more than 20 years financial industry experience to Link Labs. She began her career in finance within the pharmaceutical industry and has continued in both public accounting and private companies. She passed the CPA exam with the 3rd highest score in the state and completed her MBA with an accounting concentration (summa cum laude). Jennifer has worked with several software companies and has led multiple venture financing, merger and acquisitions deals. She has helped companies expand internationally and has managed the finance department of a startup to 33 consecutive quarters of growth prior to acquisition. After the acquisition, she served as the Controller of Dell Software Group’s Data Protection Division where she managed a portfolio of multiple hardware and software products to scale and achieve over triple-digit growth worldwide in 18 months. Jennifer brings a depth of finance experience to the Link Labs team.

Related Blogs

Asset Tracking, BLE Asset Management logistics

Beyond Tracking: The Importance of Asset Monitoring

Asset Tracking, BLE Asset Management logistics

The True Value of a Trailer Tracking System

Subscribe to Link Labs' blog weekly update!

Subscribe

Subscribe to Link Labs' blog weekly update!