The objectivity and integrity of contemporary science faces many threats. A cause of particular concern is the growing competition for research funding and academic positions, which, combined with an increasing use of bibliometric parameters to evaluate careers (e.g. number of publications and the impact factor of the journals they appeared in), pressures scientists into continuously producing “publishable” results. (Fanelli 2010: Introduction) Such begins Daniele Fanelli his 2010 article on the negative consequences of the ‘publish or perish’ policy—since quite some decades running wild within academia. But since when exactly? My educated guess is: since the late 1960s and early 1970s, … Continue reading
Category Archives: science
WASHINGTON — NASA will hold a news conference at 2 p.m. EST on Thursday, Dec. 2, to discuss an astrobiology finding that will impact the search for evidence of extraterrestrial life. Astrobiology is the study of the origin, evolution, distribution and future of life in the universe. read more … and here is a discussion of NASA’s politics concerning announcements of that ilk. … Continue reading
Cybernetics was defined by Norbert Wiener [see picture above] as ‘the science of control and communication, in the animal and the machine’ [↵Wiener 1948]—in a word, as the art of steermanship, and it is to this aspect that the book will be addressed. Co-ordination, regulation and control will be its themes, for these are of the greatest biological and practical interest. (↵Ashby 1957[1956]:1) Additionally a slightly longer quotation from a more recent article: Derived from the Greek kybernetes, or “steersman”, the term “cybernetics” first appears in Antiquity with Plato, and in the 19th century with Ampère, who both saw it … Continue reading
Wonderful, wonderful, they have done it again. The god of the information age indeed is a trickster. The ‘World Multiconference on Systemics, Cybernetics and Informatics’ (WMSCI) has accepted a paper submitted by the graduate students Jeremy Stribling, Max Krohn, and Dan Aguayo—of course all three of them home-based at MIT, where hacker-culture was born—called “↑Rooter: A Methodology for the Typical Unification of Access Points and Redundancy” [.pdf | 709KB]. That’s nearly as good as Alan Sokal’s famous “↑Transgressing the Boundaries: Toward a Transformative Hermeneutics of Quantum Gravity” with which Sokal triggered a hard-time for the journal ‘Social Text’ and a … Continue reading