Visualisation on the difference between Google and Apple

It’s a telling statistic about how Apple and Google operate differently. Apple is driven largely by a centralized development structure, stemming from its fabled design studio, whereas Google has a more distributed, open-source approach to new products. And to get a real picture of how this plays out organizationally, the Portland-based data visualization studio Periscopic created a series of visualizations custom for Co.Design, which compares “innovation signatures” charting the last 10 years of patents filed at Apple and Google.

Each blob is a patent inventor, and since many patents have multiple inventors, each line is a link between an inventor and co-inventors. From this view, Apple looks like a big ball of tinker toys, while Google is a monotonous, cellular blob more akin to the Borg. And while you can only tell so much of a company’s structure from just its patents, Periscopic believes it has spotted a clear narrative in the images.

“Over the past 10 years Apple has produced 10,975 patents with a team of 5,232 inventors, and Google has produced 12,386 with a team of 8,888,” writes Wes Bernegger, data explorer at Periscopic. Those numbers are, frankly, pretty similar in terms of proportion. “The most notable difference we see is the presence of the group of highly connected, experienced ‘super inventors’ at the core of Apple compared to the more evenly dispersed innovation structure in Google,” he continues. “This seems to indicate a top-down, more centrally controlled system in Apple vs. potentially more independence and empowerment in Google.”

The theory makes a lot of sense. Apple’s top-secret design lab, long led by Jonathan Ive, has given birth to the company’s very few, very profitable products. And inside Apple’s innovation footprint, you’ll spot Ive, along with the names of basically every under-celebrated designer in the inner circle, including Eugene Whang, Christopher Stringer, Bart Andre, and Richard Howarth, who now leads hardware development at Apple and is largely responsible for the design of every iPhone you’ve seen.

Google, on the other hand, has a relatively flat organizational structure of many small teams filled with empowered individuals. (The company even attempted to wipe out all management back in 2002, but since reinstated the idea.) All of this can be seen in their innovation signature, of course. By patents, Googlers all look pretty equal, dispersed relatively evenly.

That said, Bernegger insists there’s actually more “connectivity and collaboration” at Apple than at Google. “The average number of inventors listed on a patent at Apple is 4.2. At Google, it’s 2.8,” he explains. “These combined effects mean an inventor at Apple has, on average, produced more than twice the patents than one at Google. Nine vs. four.”

They couldn’t appear more different, but look closer at the patent structure, and you can spot a big similarity between the two companies. Namely, both Apple and Google have a membrane-like ring surrounding the entire structure

Source: The Real Difference Between Google And Apple | Co.Design | business + design

Facts about migration and crime in Sweden – Government.se

Swedish Ministry for Foreign Affairs looks at some of the most common claims, simplistic and occasionally completely inaccurate information about Sweden and Swedish migration policy has been disseminated

  • Claim: “Sweden had its first islamic terrorist attack not so long ago”
  • Claim: “There has been a major increase in gun violence in Sweden.”
  • Claim: “There has been a major increase in the number of rapes in Sweden.”
  • Claim: “Refugees are behind the increase in crime, but the authorities are covering it up.”
  • Claim: “In Sweden there are a number of ‘no-go zones’ where criminality and gangs have taken over and where the emergency services do not dare to go.”
  • Claim: “The high level of immigration means that the system in Sweden is on the verge of collapse.”
  • Claim: “Muslims will soon be in the majority in Sweden.”

Source: Facts about migration and crime in Sweden – Government.se

Cloudflare has had a security leak in it’s servers, and it is highly recommended that everyone **changes their passwords immediately**.

Between 2016-09-22 – 2017-02-18 passwords, private messages, API keys, and other sensitive data were leaked by Cloudflare to random requesters. Data was cached by search engines, and may have been collected by random adversaries over the past few months.

Requests to sites with the HTML rewrite features enabled triggered a pointer math bug. Once the bug was trigerred the response would include data from ANY other cloudfare proxy customer that happened to be in memory at the time. Meaning a request for a page with one of those features could include data from Uber or one of the many other customers that didn’t use those features. So the potential impact is every single one of the sites using CloudFare’s proxy services (including HTTP & HTTPS proxy).

“The greatest period of impact was from February 13 and February 18 with around 1 in every 3,300,000 HTTP requests through Cloudflare potentially resulting in memory leakage (that’s about 0.00003% of requests), potential of 100k-200k paged with private data leaked every day” — sauce

What action should you take?

As a precaution, change passwords for the following affected sites**: Reddit, Discord, Uber, Yelp, OKCupid, 4Chan, Mangafox, Crunchyroll, Patreon, Stackoverflow, and many more.

  • authy.com
  • coinbase.com
  • betterment.com
  • transferwise.com
  • prosper.com
  • digitalocean.com
  • patreon.com
  • bitpay.com
  • news.ycombinator.com
  • producthunt.com
  • medium.com
  • 4chan.org
  • yelp.com
  • okcupid.com
  • zendesk.com
  • uber.com
  • poloniex.com
  • localbitcoins.com
  • kraken.com
  • 23andme.com
  • curse.com (and some other Curse sites like minecraftforum.net)
  • counsyl.com
  • tfl.gov.uk

The full list can be found here: <https://github.com/pirate/sites-using-cloudflare>
Official post: <https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/>

Please make sure to change your passwords as this **most likely affects everyone** and stay safe!

You do not need to be a programer for creating a 4G/LTE IMSI Catchers

Until recently LTE (Long Term Evolution) protocols were considered secure against IMSI Catchers privacy attacks due to the stronger authentication and key exchange mechanisms. This claim has now been proved to be incorrect. The 4G/LTE is vulnerable to active privacy attacks by IMSI Catcher, and we found that these attacks can be done quite easily and therefore can impact the confidence and reliability of commercial mobile networks.  Continue reading You do not need to be a programer for creating a 4G/LTE IMSI Catchers