Inside Apple (Amazon) — If Apple is Silicon Valley’s answer to Willy Wonka’s Chocolate Factory, then author Adam Lashinsky provides readers with a golden ticket to step inside. In this primer on leadership and innovation, the author will introduce readers to concepts like the “DRI” (Apple’s practice of assigning a Directly Responsible Individual to every task) and the Top 100 (an annual ritual in which 100 up-and-coming executives are tapped a la Skull & Bones for a secret retreat with company founder Steve Jobs). Hopefully it can provide a better template for successful executive behaviour than “be an arsehole who has opinions about design” which seems to be all that many have taken from the life and works of Steve Jobs. (via BoingBoing)
Microsoft Buys Netscape Patents from AOL (Slashgear) — when your employer says “we need you to file for a patent on this, just so we can build up our defensive arsenal”, bear this in mind: you can never know that the defensive portfolio won’t be bought by an aggressive competitor in the future. I’m not sure that we can all sleep sound knowing that Microsoft owns autofill and SSL.
Open Data and The Gulf Oil Spill (Ars Technica) — competing interests meant uncoordinated data collection, reporting distorted research by omitting caveats on preliminary work and findings, and talking openly about what you’re doing can jeopardise your chance of publication in many journals. I found data collection stories particularly horrifying. (via Pete Warden)
Smart Meter Hacks — Liston and Weber have developed a prototype of a tool and software program that lets anyone access the memory of a vulnerable smart meter device and intercept the credentials used to administer it. Weber said the toolkit relies in part on a device called an optical probe, which can be made for about $150 in parts, or purchased off the Internet for roughly $300. “This is a well-known and common issue, one that we’ve warning people about for three years now, where some of these smart meter devices implement unencrypted memory,” Weber said. “If you know where and how to look for it, you can gather the security code from the device, because it passes them unencrypted from one component of the device to another.” Also notable for the fantastic line: “What you’re hearing is the sound of [a] paradigm shifting without a clutch,” Former said.