Quotulatiousness

July 5, 2012

Between loopholes and exemptions, Bloomberg’s soda rules fail to address real problem

Filed under: Food, Government, Health, USA — Tags: , , , — Nicholas @ 10:35

Jacob Sullum has a modest proposal to fix NYC Mayor Michael Bloomberg’s ineffectual soda rule:

At a Board of Health meeting last month, several members zeroed in on the most obvious problem with Mayor Bloomberg’s plan to shrink New Yorkers’ waistlines by shrinking their soft drink servings: It does not go far enough.

One member questioned the exception for milk-based beverages such as shakes, which “have monstrous amounts of calories.” Another noted that the carveout for convenience stores, supermarkets and vending machines (which are not regulated by the city’s Health Department) means 7-Eleven’s Big Gulp — the epitome of effervescent excess — will remain available. There also was murmuring about the continued legality of free refills, which will let people drink as much soda as they want, provided they do it 16 ounces at a time.

But one glaring gap in Bloomberg’s big beverage ban went unprobed: Why limit the limit to soft drinks? What about the hard stuff?

[. . .]

With all that in mind, think about eggnog, which is doubly exempt from Bloomberg’s drink order, since it is milk-based and alcoholic. This drink is a horror measured by calories alone, clocking in at 50 or so an ounce, more than four times the count for sugar-sweetened soda. Yet this lurking threat to thinness and sobriety is untouched by Bloomberg’s pitiful pint-size pop prescription.

Beer, also exempt from Bloomberg’s serving ceiling, can contain as many as 28 calories an ounce — more than twice as many as soda. Why do you think they call it stout?

Some sensible regulation in this area could head off many incipient beer bellies and lots of loutish behavior at Yankee games. Instead of the mayor’s arbitrary 16-ounce limit, why not simply decree that all beer orders from now on will be light beer orders? Taste is a small sacrifice to make for public health.

British army reduces and consolidates 17 units

Filed under: Britain, Military — Tags: , , , — Nicholas @ 09:47

As reported earlier, the British army will be losing several battalions of infantry in the consolidation effort to reduce the army’s total manpower by 20,000:

The four infantry battalions to disappear are the 2nd Battalion the Royal Regiment of Fusiliers, the 2nd Battalion the Yorkshire Regiment (Green Howards), the 3rd Battalion the Mercian Regiment and the 2nd Battalion the Royal Welsh.

A fifth infantry battalion, the 5th Battalion the Royal Regiment of Scotland (Argyll and Sutherland Highlanders), will become a single company to carry out public duties in Scotland.

The Armoured Corps will be reduced by two units with the mergers of the Queen’s Royal Lancers and the 9th/12th Royal Lancers and the 1st and 2nd Tank Regiments.

The Royal Artillery, the Royal Engineers, the Army Air Corps, the Royal Logistic Corps, the Royal Electrical and Mechanical Engineers and the Royal Military Police will also be affected.

[. . .]

Details of the other changes are:

  • The Royal Artillery will be reduced from 13 to 12 units with the withdrawal of the 39th Regiment Royal Artillery
  • The Royal Engineers will be reduced from 14 to 11 units with the withdrawal of 24 and 28 Engineer Regiments and 67 Works Group
  • The Army Air Corps will reduce from five to four units as 1 Regiment AAC merges with 9 Regiment AAC
  • The Royal Logistic Corps will be reduced from 15 to 12 units with 1 and 2 Logistic Support Regiments withdrawn from the Order of Battle and 23 Pioneer Regiment disbanded
  • The Royal Electrical and Mechanical Engineers will be reduced to seven units with the withdrawal of 101 Force Support Battalion
  • 5 Regiment Royal Military Police will be removed

Update: As you’d expect, the changes are not being welcomed by current or former soldiers.

The reforms have caused anger and frustration within senior ranks. Earlier this week, a leaked letter to General Wall from one senior officer in the Royal Fusiliers showed the anger brewing over the scale of the proposed cuts.

Brigadier David Paterson, the honorary Colonel of the Regiment of Fusiliers, said the decision to axe one of its battalions would not “best serve” the armed forces and “cannot be presented as the best or most sensible military option”.

He added: “I, as Colonel, have the duty to tell my men why it is their battalion, which at the time of the announcement will be the best manned battalion in the army, with recruits waiting in the wings, was chosen by CGS. I will then also have to explain to my Fusiliers in a fully manned battalion why they are likely to be posted to battalions that cannot recruit. This will not be an easy sell.”

What do software developers and predatory bankers have in common?

Filed under: Business, Technology — Tags: , , , , , — Nicholas @ 09:02

In his regular column at The Register, Matt Asay points out that using another company’s API can be a quick and easy way to get going, but it carries significant risks:

In tech today, it has become a truism that “if you’re not paying for it, you’re the product”. Somehow we have applied this wisdom to consumers without recognising that the same principle applies to enterprises and their developers. Recently, however, Netflix and LinkedIn have reminded us just how precarious it is to build on someone else’s platform — or API.

Paul Graham, one of the founders of Y Combinator, has described APIs as “self-serve [business development]”. It’s a great story: open and document your API and watch a thousand businesses bloom, bringing you cash and legitimacy. All of which may be true, if done correctly.

But the other side of Graham’s “business development” is the difficulty of predicting the business planning on the other side of the API. Twitter was pretty free with API access in its early days when it was seeking adoption rather than income. Now that the company has grown up and continues to tighten its grip on how and where users interact with tweets, Twitter terminated its tweet syndication partnership with LinkedIn and has promised to clamp down even more tightly on how developers use its API. Twitter is doing this because it can, as professor Joel West points out, but also because it must: its advertising business depends upon it.

So where’s the banking similarity come in?

There’s one other thing to consider, as venture capitalist Bill Davidow opines in The Atlantic, and that is the very real possibility that this API mercantilism is a sign of how the technology world is changing, and not for the better:

    At both Hewlett-Packard and Intel, where I next worked, money was important — but it wasn’t the top priority. The goal was to do the right thing and do it well. If you did that, over time, rewards followed and shareholders supported your efforts…

    Many other things have changed in the valley over the past five decades. I’ve become increasingly concerned about one thing that is seldom discussed: the valley is no longer as concerned about serving the customer, and even sees great opportunity in exploitation. We are beginning to act like the bankers who sold subprime mortgages to naïve consumers…

Or sold developers subprime APIs?

The failed state league table

Filed under: Africa, Government — Tags: , , , , , , — Nicholas @ 08:51

This is a list you never want your country (or your neighbours) to appear on: the “top ten” failed states.

For the fifth year in a row, Somalia is ranked as the most failed failed state on the planet. This ranking was made by The Fund for Peace and Foreign Policy Magazine. Over the last decade, it’s become popular for think tanks, risk management firms and intelligence agencies to compile lists of “failed states.” This is what unstable countries, prone to rebellion and civil disorder, are called these days. What they all have in common is a lack of “civil society” (rule of, and respect for, law), and lots of corruption. The two sort of go together. Somalia consistently comes in first on most of these failed state lists. This year the top ten list of failed states (from worst to less worse) was Somalia, Congo Democratic Republic, Sudan, Chad, Zimbabwe, Afghanistan, Pakistan, Guinea, Cote d’Ivoire and the Central African Republic.

Not surprisingly, the best example of a failed state has long been Somalia, and that’s largely because the concept of the “nation of Somalia” is a very recent development (the 1960s). It never caught on, which is a common feature of failed states. Same could be said for the Palestinians. Sudan is accused of being a failed state, but it isn’t in the same league with Somalia. Sudan has had central government of sorts, on and off, for thousands of years. Not so Somalia.

Another common problem in failed states is a large number of ethnic groups. This is a common curse throughout Africa, which why the majority of the worst failed states are there. Europe, and much of Asia, have managed to get past this tribalism, although that has not always resulted in a civil society. It usually takes the establishment of a functioning democracy to make that happen. This tribalism has kept most African nations from making a lot of economic or political progress. The top five failed states are all African. Somalia is also unique in that it is one of those rare African nations that is not ethnically diverse. Instead, Somalia suffers from tribal animosities and severe warlordism (basically successful gangsters who establish temporary control over an area).

Cisco “updates” consumer routers to allow tracking of internet usage, automatic bricking for terms & conditions violations

If you have a modern Cisco or LinkSys router on your home network, you may have just given up a significant amount in the last “update” the company distributed. ESR has the details:

For those of you who have missed the news, last a few days Cisco pushed a firmware update to several of its most popular routers that bricked the device unless you signed up for Cisco’s “cloud” service. To sign up, you had to agree to the following restrictions:

    When you use the Service, we may keep track of certain information related to your use of the Service, including but not limited to the status and health of your network and networked products; which apps relating to the Service you are using; which features you are using within the Service infrastructure; network traffic (e.g., megabytes per hour); internet history; how frequently you encounter errors on the Service system and other related information (“Other Information”).

So in order to continue using the hardware you bought and paid for and own, you have to agree to let Cisco snoop your browser history and monitor your traffic — a clickstream they would of course instantly turn around and sell to advertising agencies and other snoops. Those terms are so loose (“including but not limited to”) that they could legally read your email and sell that data too.

Disgusted enough yet? Wait, it gets better. The cloud terms of service also includes this gem:

    You agree not to use or permit the use of the Service: (i) to invade another’s privacy; (ii) for obscene, pornographic, or offensive purposes; (iii) to infringe another’s rights, including but not limited to any intellectual property rights; (iv) to upload, email or otherwise transmit or make available any unsolicited or unauthorized advertising, promotional materials, spam, junk mail or any other form of solicitation; (v) to transmit or otherwise make available any code or virus, or perform any activity, that could harm or interfere with any device, software, network or service (including this Service); or (vi) to violate, or encourage any conduct that would violate any applicable law or regulation or give rise to civil or criminal liability.

Translated out of lawyerese, this gives Cisco the right to brick your router if you use it to view anything Cisco considers pornography, or do anything that it might consider IP theft — like, say, bit-torrenting a movie. Or even if you send anything it considers unsolicited advertising — which doesn’t have to mean bulk spam, see “any other form of solicitation”?

The sum of these paragraphs is: “We control your digital life. We can spy on you, we can filter your traffic, we can cut off your net access unilaterally if you do anything we don’t like, and you have no recourse.”

The idea of replacing your router with one that can load and run an open source rather than proprietary system just became a lot more enticing (such things do already exist, although not for all routers).

Powered by WordPress