<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Steve Herrod | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2017-08-15T14:23:09+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/steve-herrod" />
	<id>https://www.vox.com/authors/steve-herrod/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/steve-herrod/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Steve Herrod</name>
			</author>
			
			<title type="html"><![CDATA[The uproar about the anti-diversity memo may turn out to have been a good thing for Google]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2017/8/15/16146486/google-manifesto-diversity-sundar-pichai-engineering-teams-coders" />
			<id>https://www.vox.com/2017/8/15/16146486/google-manifesto-diversity-sundar-pichai-engineering-teams-coders</id>
			<updated>2017-08-15T10:23:09-04:00</updated>
			<published>2017-08-15T09:30:02-04:00</published>
			<category scheme="https://www.vox.com" term="Diversity" /><category scheme="https://www.vox.com" term="Future of Work" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[The outpouring of emotional responses to a now-fired Google engineer&#8217;s internal memo about diversity and hiring practices can be painful to read. But contrary to what you might think, this controversy may turn out to have been a good thing for Google &#8212; and for every engineering team. I&#8217;m glad it&#8217;s calling out the myth [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="yuoak / Getty Images" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/9049823/code_ninja.png?quality=90&#038;strip=all&#038;crop=0,11.7,100,88.3" />
	<figcaption>
		</figcaption>
</figure>
<p>The <a href="https://redef.com/set/media-set-1502295510848">outpouring of emotional responses</a> to a <a href="https://www.recode.net/2017/8/7/16110696/firing-google-ceo-employee-penned-controversial-memo-on-women-has-violated-its-code-of-conduct">now-fired Google engineer&rsquo;s internal memo about diversity and hiring practices</a> can be painful to read. But contrary to what you might think, this controversy may turn out to have been a good thing for Google &mdash; and for every engineering team. I&rsquo;m glad it&rsquo;s calling out the myth that only coding prowess matters, and that backchannel gripes about diversity in tech are now out in the open.</p>

<p>I helped grow VMware&rsquo;s stellar engineering team from 30 to more than 3,000, and I&rsquo;m now an investor in the next generation of startups. Scaling a team is a complex, nuanced process. It requires diligence, perseverance and open discussion of ideas.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>The current controversy may turn out to have been a good thing for Google — and for every engineering team.</p></blockquote></figure>
<p>Today&rsquo;s engineering teams are nothing like the old stereotype &mdash; a bunch of<a href="https://www.nytimes.com/2017/08/12/upshot/techs-damaging-myth-of-the-loner-genius-nerd.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=second-column-region&amp;region=top-news&amp;WT.nav=top-news&amp;mtrref=www.nytimes.com&amp;gwh=E2C61160C69592BCA52532F286A8A836"> loner nerd boys</a> who grew up playing video games and tinkering with code by themselves in their parents&rsquo; basements. To build successful products, you need a diverse group of personalities: People with strong customer empathy, others who can innovate on user experience, still others with the &ldquo;brown thumb&rdquo; for finding bugs before they ship, and those who take pride in fixing those bugs for good. And the personalities you need to hire will change as you grow to 10, then 100, then 1,000 engineers.</p>

<p>No engineer works in solitude today &mdash; even a code ninja is part of a team. That&rsquo;s why you also need people who can keep track of product priorities and schedules, who can make difficult trade-offs, and who have the people skills to keep team members focused on the goals and deadlines that matter. Technical teams also need people who can interface with marketing, sales, operations, human resources, customers and everyone else so that the company, as it grows bigger, stays headed in the right direction. &ldquo;Soft skills&rdquo; are just as critical as coding chops.</p>

<p>For a company to scale successfully, its engineers not only must be the best hires, they need to be given paths to develop the aforementioned skills and to grow according to their abilities and interests. And it&rsquo;s up to technical management to incentivize that development and to establish the best ways to measure that growth.</p>

<p>You need to make moving the company forward a requirement for individual advance. You might set growth milestones for engineers to reach, including some that get them away from their screens and into more extroverted, public roles &mdash; publishing papers, giving presentations at conferences and mentoring new team members.</p>

<p>At VMware, we gave cash bonuses for having a paper accepted to present at a top-tier conference, just as we did for patent filing. The pure technical achievement was given the same weight as being able to clearly define and present those technical ideas to a qualified and questioning audience. We also made mentorship an explicit qualification for promotions up the technical ladder. Individual contributors are important, but those who can effectively share knowledge and help shape the skills of more junior technical staff are just as critical.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>To build the next Google, you’ll need to create a company that fosters this kind of open dialogue — including complaints about the dialogue that results.</p></blockquote></figure>
<p>As a manager, you must send a strong signal that communication and organizational skills are equally as important as technical skills, especially as the team grows too big to all know one another. Needless to say, you must set a strong example for this balance as well. VMware created a parallel management career track alongside the technical track, and made clear there was no stigma in switching from one to the other and even back again.</p>

<p>Why do communication skills matter so much? Diversity of ideas is what leads to innovation.&nbsp;Software companies in particular &mdash; built on new abstract concepts &mdash; take pride in encouraging employees to speak their minds, even when their co-workers resent it. &ldquo;<a href="https://www.thinkwithgoogle.com/marketing-resources/passion-not-perks/">Everything is up for question and debate</a>,&rdquo; Google&rsquo;s SVP of People Operations, Laszlo Bock, asserted not long ago. Free-speech culture and its blowups &#8212; familiar to everyone on <a href="http://royal.pingdom.com/2008/09/11/10-interesting-open-source-software-forks-and-why-they-happened/">open source software</a> projects &mdash; are the foundation of great software companies.</p>

<p>But this also requires a culture of mutual respect. The loudest complaints on both sides of the ongoing showdown share common themes: My co-workers don&rsquo;t respect me. My co-workers don&rsquo;t take me seriously. My co-workers enjoy saying things they know make me feel unwelcome. The challenge for leaders is to maintain openness and respect in parallel as three engineers become 30, then 300, then 3,000.</p>

<p>A successful team is diverse, driven, communicative, vocal &#8230; and often argumentative. Imagine a world where everyone shuts up and does their job as assigned. Where you get ahead by not rocking the boat. Where you learn to nod in agreement with the common wisdom. Where there&rsquo;s never a workplace spat and &ldquo;disrupt&rdquo; is a slogan rather than a verb. Those are the companies that have been run off the Internet, one after another, over the past two decades.</p>

<p>If you want to build the next Google, you&rsquo;ll need to create a company that fosters this kind of open dialogue &mdash; including complaints about the dialogue that results. The larger your company gets, the more it will matter. You&rsquo;ll need to hire a broad range of people and guide them to grow together &mdash; even when they fight.</p>

<p>At some point, we&rsquo;ll be glad everyone has stopped holding back their feelings about diversity conflicts in tech. Remember when Yahoo&rsquo;s <a href="http://www.zdnet.com/article/can-a-peanut-butter-manifesto-save-yahoo/">Peanut Butter Manifesto</a> was considered a scandal? Finally we&rsquo;re talking about the real issues.</p>
<hr class="wp-block-separator" />
<p><a href="http://generalcatalyst.com/team/dr-steve-herrod/"><em>Steve Herrod</em></a><em>&nbsp;is a managing director at&nbsp;</em><a href="http://generalcatalyst.com/"><em>General Catalyst</em></a><em>, investing in infrastructure- and&nbsp;developer-centric companies. Prior to joining the firm, Herrod was CTO and SVP of R&amp;D at VMware, where he played an integral role in growing the engineering team to more than 3,000 people. Reach him&nbsp;</em><a href="https://twitter.com/herrod"><em>@herrod</em></a><em>.</em></p>
<hr class="wp-block-separator" />
<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Steve Herrod</name>
			</author>
			
			<title type="html"><![CDATA[Connected devices are easily hacked. Why aren’t we holding manufacturers accountable?]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/10/24/13387188/connected-devices-hacking-internet-manufacturers-security" />
			<id>https://www.vox.com/2016/10/24/13387188/connected-devices-hacking-internet-manufacturers-security</id>
			<updated>2016-10-24T16:44:51-04:00</updated>
			<published>2016-10-24T15:00:03-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Last Friday&#8217;s daylong cascade of cyber attacks highlighted an issue that until now has largely been a discussion point on security-specific blogs and forums: The internet, and thus much of our modern way of life, is in a precarious state. DDoS attacks are one of the oldest tricks in the cyber-attack book. Coerce a bunch [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="A man takes a picture of a replica of a Trojan horse made up of thousands of computer and mobile phone components infected with various viruses and malware, displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University. | Jack Guez / AFP / Getty" data-portal-copyright="Jack Guez / AFP / Getty" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7336147/cyber%2520Trojan%2520Horse.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	A man takes a picture of a replica of a Trojan horse made up of thousands of computer and mobile phone components infected with various viruses and malware, displayed at the entrance to the annual Cyber Week conference at the Tel Aviv University. | Jack Guez / AFP / Getty	</figcaption>
</figure>
<p>Last Friday&rsquo;s daylong cascade of cyber attacks highlighted an issue that until now has largely been a discussion point on security-specific blogs and forums: The internet, and thus much of our modern way of life, is in a precarious state.</p>

<p>DDoS attacks are one of the oldest tricks in the cyber-attack book. Coerce a bunch of unsuspecting machines into sending gobs of data at a target and <em>bam</em>, the target is down. Defenses have gotten better, and there are plenty of services that can deflect run-of-the-mill attacks. But the bad guys aren&rsquo;t content with sticking to run of the mill.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Cars are recalled for defects and if they fail inspection or smog tests, they’re taken off the road. Why aren’t we advocating the same level of oversight for our shared internet?</p></blockquote></figure>
<p>Security guru <a href="https://www.schneier.com/blog/archives/2016/09/someone_is_lear.html">Bruce Schneier warned last month</a> that bad actors are probing some of the fundamental layers of internet technology for vulnerabilities and testing for defense capacities. And security expert Brian Krebs, who reports on vulnerabilities, bad actors and fishy &ldquo;security&rdquo; services, <a href="https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/">experienced one of the largest DDoS attacks seen</a> to date.</p>

<p>That attack may have been the result of hundreds of gigabytes of data per second being lobbed at his site not by hacked computers, but by Internet of Things devices, a <a href="https://motherboard.vice.com/read/internet-of-things-malware-mirai-ddos">botnet living in our shiny new gadgets</a> &mdash; things like IP cameras and digital video recorders.&nbsp;And it appears we saw this again yesterday with the attack on Dyn&rsquo;s DNS service, disrupting popular consumer sites and services like Twitter, Spotify, Sony&rsquo;s Playstation Network and EA, along with many others. &nbsp;</p>

<p>When the personal automobile hit the roads, it was a free-for-all. If you could buy a car, you could drive said car. There were no rules governing safety or emissions. It took decades before the <a href="https://en.wikipedia.org/wiki/National_Traffic_and_Motor_Vehicle_Safety_Act">National Traffic and Motor Vehicle Safety Act</a> was passed, and the <a href="https://en.wikipedia.org/wiki/National_Highway_Traffic_Safety_Administration">National Highway Traffic Safety Administration</a> was created to ensure that vehicles sold were held to safety standards and that manufacturers were liable in the event of malfunctioning features. Once on our shared roads, cars are recalled for defects; if they fail inspection or smog tests, they&rsquo;re taken off the road. Why aren&rsquo;t we advocating the same level of oversight for our shared internet?</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>We’ve allowed just about anyone to ship new attack vectors (a.k.a. IoT devices) with zero responsibility for making them secure.</p></blockquote></figure>
<p>We do not have decades to wait for the government to create and enforce security standards for connected devices. The internet powers global commerce, communication and innovation. It is critically important to the stability of financial markets and the overall economy. Yet we&rsquo;re squeamish about enforcing standards that could mitigate some of its increasingly debilitating threats. As a result, we&rsquo;ve allowed just about anyone to ship new attack vectors (a.k.a. IoT devices) with zero responsibility for making them secure. It&rsquo;s bad enough that these devices put the owner&rsquo;s data and privacy at risk, but we&rsquo;ve just shown that they can also impact our broader shared internet infrastructure.</p>

<p>Good security practices take time, money and expertise (<a href="https://www.linkedin.com/pulse/were-losing-cyber-war-its-time-mobilize-steve-herrod">all of which are in short supply</a>) to apply and maintain. Short of us spinning into an altruistic utopia, that willingness will be born out of assigned responsibility &mdash; and monetary penalties.</p>

<p>Device manufacturers should be held accountable for their devices&rsquo; behaviors out in the wild. Without clear accountability, we&rsquo;re going to continue shipping easy-to-use yet wildly vulnerable devices. Examples of manufacturer requirements should include:</p>
<ul class="wp-block-list"><li><strong>An end to common default passwords</strong>. It’s more work, but every device should start with a different administrative password <em>and</em> require that it be set to an even more secure one when first used in the wild. It sounds obvious, but today you can control a huge number of home devices via a simple search for “default password.”</li><li><strong>Impactful alerts for vulnerabilities</strong>. These devices will certainly use software that has vulnerabilities, but how does a consumer know these problems are found? Anyone out there constantly hitting refresh on the manufacturer’s device support page to find out? I didn’t think so. Manufacturers must be responsible for getting alerts to their buyers similar to how car makers handle priority vehicle safety recalls. And if the warnings are not heeded within a set amount of time, the device should be disabled.</li><li><strong>Self-patching software. </strong>Even the lowest-cost camera, Wi-Fi access point or DVR must ship with self-patching software. We can’t have vulnerability-laden devices all over the place just waiting for the bad guys to take them over. And it’s not the owners’ faults — the patching experience for these devices is often miserable, assuming that you even knew it was needed. It’s time to require that these devices meet a minimum standard around simple and automatic patching.</li><li><strong>Information sharing. </strong>It’s both good and bad news that so many internet-connected devices have so much software in common. It’s bad in that a zero-day exploit can instantly put myriad devices at risk. It’s good in that we can more proactively monitor and protect them using common processes and coordinated patches. Device manufacturers should be required to share findings regarding vulnerabilities and attacks with their peers. Done properly, it can help other manufacturers protect their products and give the cyber security industry a head start in preventing any resulting attacks.   </li></ul>
<p>Once upon a time, the prevailing idea was that stringent standards and regulation would stifle the promise of the internet. But as attacks like the ones against Dyn&rsquo;s DNS service are illustrating, the promise of the internet might very well depend on them.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.linkedin.com/in/steveherrod"><em>Steve Herrod</em></a><em> is a managing director at </em><a href="http://generalcatalyst.com"><em>General Catalys</em></a><em>t, investing in infrastructure- and developer-centric companies. Prior to joining the firm, Herrod was CTO and SVP of R&amp;D at VMware, where he played an integral&nbsp;role in growing the engineering team to more than 3,000 people. Reach him </em><a href="https://twitter.com/herrod"><em>@herrod</em></a><em>.</em></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
	</feed>
