Google’s plan to block certain ads in Chrome is making ad executives nervous and fueling conspiracy talk | Business Insider

Google’s plan to block certain ads in Chrome is making ad executives nervous and fueling conspiracy talk; Mike Shields; In Business Insider; 2017-10-27.

tl;dr → Google’s Coalition for Better Ads is non-transparent. Many have FUD.


  • Google
  • Parsec
    • runs proscribed ads
    • will have to abandon that practice
  • Interactive Advertising Bureau (IAB)
    honorific: <quote>the leading digital-ad trade group</quote>
  • Venable,
    Venable is a purveyor of legal services to the trades.


The Better Ads Standards
  1. auto-play video with sound
  2. mobile full screen rollover (takeover), statement
  3. ten other types, not enumerated
    (there are twelve proscribed creative types)




two tiers (three tiers)
  1. Google
  2. Tier 1, dues required.
  3. Tier 2, dues required.


  • “dozens of members”
  • Exemplars
    (dropping some names that you are expected to recognize)

    • Google,
    • IAB,
    • GroupM,
    • Procter & Gamble,
    • Thompson Reuters.


For color, background & verisimilitude…

  • Anonymous, spox, Google
  • Marc Guldimann, CEO, Parsec
    is against it.
  • Harry Kargman, CEO, Kargo,
    Kargo is in media arbitrage & agency work,
    is against it.
  • Gefen Lamdan, senior vice president, Celtra.
    Celtra is an agency,
    is against it.
  • Ari Lewine, co-founder, chief strategy officer, Triplelift.
    is against it; was vague, mentioned Facebook, Google.
  • Brendan McCormick, spox, Venable
  • Jim Spanfeller
    • honorific: an industry veteran,
    • ex-GM, attributed as “who once ran”
    • founder The Daily Meal, (a blog)
  • Troy Young, president digital, Hearst Media.
    like it; opines Google’s viewpoint on Google’s media.



In Business Insider

Alex Kozinski dissent in U.S. v. Jacob Del Mundo Vaagal

Court Documents

<quote>Here’s what this case boils down to: Officers had a hunch that a drug transaction was going down. They saw nothing obviously suspicious, but got tired of waiting, watching and wiretapping. They then jumped the gun by executing a warrantless search. Until today, this was not enough to support probable cause, but going forward it will be. This is a green light for the police to search anyone’s property based on what officers subjectively believe—or claim to believe—about someone’s everyday conduct. That puts all of us at risk. Accordingly, I dissent, and I’m off to Costco to buy some food. </quote>

Brink Lindsey and the Road to Utopia | Bradford DeLong Commentariat

Bradford DeLong; Brink Lindsey and the Road to Utopia; In His Blog; 2017-10-05.

Original Sources

Brink Lindsey; The End of the Working Class; In The American Interest; 2017-08-30; previously filled
“Outside a well-educated and comfortable elite comprising 20-25 percent of Americans, we see unmistakable signs of social collapse… ”


  • No opinion shown.
  • An extensive quote is exhibited.

Network Information API | W3C

Network Information API; W3C; 2017-10-02.



The NavigatorNetworkInformation Interface

[NoInterfaceObject, Exposed=(Window,Worker)]
interface NavigatorNetworkInformation {
  readonly attribute NetworkInformation connection;
Navigator implements NavigatorNetworkInformation;
WorkerNavigator implements NavigatorNetworkInformation;

The NetworkInformation Interface

interface NetworkInformation : EventTarget {
  readonly attribute ConnectionType type;
  readonly attribute EffectiveConnectionType effectiveType;
  readonly attribute Megabit downlinkMax;
  readonly attribute Megabit downlink;
  readonly attribute Millisecond rtt;
  readonly attribute boolean saveData;
  attribute EventHandler onchange;
typedef unrestricted double Megabit;
typedef unsigned long long Millisecond;

Designing Data-Intensive Applications | Kleppmann

Martin Kleppmann; Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems; OReilly Media; 2017-04-02; 604 pages; ASIN:1449373321: Kindle: $32, paper: $24+SHT;


unclear but…

  • NoSQL
  • Big Data
  • Scalability
  • CAP Theorem
  • Eventual Consistency
  • Sharding

Is the First Amendment Obsolete? | Tim Wu

Tim Wu; Is the First Amendment Obsolete?; In Emerging Threats Series; Knight First Amendment Institute, Columbia University; 2017-09; pdf (27 pages).

tl;dr → No. Betteridge’s Law. It is a Modest Proposal.
and → Whereas free speech is dangerous, re-evaluation of the “unfettered” concept is indicated. Options toward remediation are evaluated.


Is the First Amendment Obsolete?
  1. Core Assumptions of the Political First Amendment
  2. Attentional Scarcity and the Economics of Filter Bubbles
  3. Obsolete Assumptions
    • The Waning of Direct Censorship
    • Troll Armies
    • Reverse Censorship, Flooding, and Propaganda Robots
  4. What Might Be Done
    • Accepting a Limited First Amendment
    • First Amendment Possibilities
    • State Action — Accomplice Liability
    • State Action — Platforms
    • Statutory or Law Enforcement Protection of Speech Environments and the Press
  5. Conclusion


<quote>It is obvious that changes in communications technologies will present new challenges for the First Amendment. For nearly twenty years now, scholars have been debating how the rise of the popular Internet might unsettle what the First Amendment takes for granted. Yet the future retains its capacity to surprise, for the emerging threats to our political speech environment are different from what many predicted. Few forecast that speech itself would become a weapon of censorship. In fact, some might say that celebrants of open and unfettered channels of Internet expression (myself included) are being hoisted on their own petard, as those very same channels are today used as ammunition against disfavored speakers. As such, the emerging methods of speech control present a particularly difficult set of challenges for those who share the commitment to free speech articulated so powerfully in the founding—and increasingly obsolete—generation of First Amendment jurisprudence.</quote>


There are 134 references. In the typset version (pdf), the references are sprinkled throughout in the legal style.  The web version places them at the end <ahem>where they don’t get in the way of the argument, and where they belong</ahem>.

DOJ Subpoenas Twitter About Popehat, Dissent Doe And Others Over A Smiley Emoji Tweet | Techdirt

DOJ Subpoenas Twitter About Popehat, Dissent Doe And Others Over A Smiley Emoji Tweet; Mike Masnick; In TechDirt; 2017-10-24.

Attribution by Design, a meta-promotion



On understanding software agility – a social complexity point of view | Adrian Colyer

Adrian Colyer; On understanding software agility – a social complexity point of view; In His Blog; 2017-10-19 (announced as “six days ago”)

tl;dr → Diagnosis &amp&; Nostrum

The true meaning of Christmas Agile has been lost.
Only through diligent introspection can its Salubrious Result tb obtained.

The Salubrious Result
  • To be truly scalable.
  • To be truly sustainable
  • <quote>Only then will Agile be truly scalable and sustainable.</quote>

Original Sources


  • Wicked Problem
  • Important Problem
  • Complex Problem
  • Cynefin Framework
    • ‘butterfly stamping’ exercise
  • Linear causality
    Let go of linear causality,
    There is no linear causality. [sounds very Buddhist]
  • The sense-making is only warranted as a retrospective technique.
  • Whereas predictive patterns do not predict success,
    smaller predictions, smaller actions, in an iterative mode are indicated.
  • Something about Einstein’s definition of insanity being falseified.
    To wit: [insanity is defined as] the repetition of inputs against a “system,” with the expectation of differential outcomes.


  • Observe, Orient, Decide, Act (OODA),
    of Boyd, not cited.
  • Double Loop Learning
    of Argyris, not cited.
  • Explore-Exploit,
    learning theory.
  • Probe-Sense-Respond,
  • Apply-Inspect-Adapt
  • Iterative [Design], Spiral [Design]


Complex System


  1. Interaction – a complex system has a large number of diverse components (agents) involved in rich interaction
  2. Autonomy – agents are largely autonomous but subject to certain laws, rules or norms; there is no central control but agent behaviour is not random
  3. Emergence – global behaviour of a complex system “emerges” from the interaction of agents and is therefore unpredictable
  4. Far from equilibrium – complex systems are “far from equilibrium” since frequent disruptive events do not allow the system to return to equilibrium
  5. Nonlinearity – nonlinearity occasionally causes an insignificant input to be amplified into an extreme event
  6. Self-organisation – complex systems are capable of self-organisation in response to disruptive events
  7. Co-evolution – complex systems irreversibly coevolve with their environments

per Adrian Colyer, summarizing George Rzevski.


  • Kent Beck, boffo.
    • brand method: eXtreme Programming,
    • first-in-Europe credit: certified ScrumMaster Practitioner and Trainer.
      <verified-claims>certified by whom?</verified-claims>
  • Joseph Pelrine, ex-assistant, Kent Beck
  • George Rzevski, theorist.
  • Horst W. J. Rittel, theorist.
  • Melvin M. Webber, theorist.


  • Rittel & Webber, Dilemmas in a General Theory of Planning, Working Papers from the Urban & Regional Development [Noun?], University of California-Berkeley (yes, they hyphenated it back then), In Policy Sciences, Volume 4, 1973, pages 155-169. Originally performed at the Panel on Policy Sciences, at the meeting of the American Association for the Adveancement of Science, in Boston, circa 1969-12 [i.e. four years later, it was memorialized in print by Elsevier].
    Also, see Wicked Problem in Jimi Wales’ Wiki.


In His Blog


Software Agility Table


Simple Complicated Complex Chaotic Unordered
Knowing when
a task is done
about coding
No release
actual time
Fixing the build Countering a
belief in magic
Feature-itis Finding who
to talk to
Task estimation Project volume
too big
Lack of trust