Is Imagination Constrained Enough for Science?

2019 ◽  
pp. 250-261 ◽  
Author(s):  
Deena Skolnick Weisberg

The imagination is a necessary tool for doing science, because it allows scientists to form hypotheses, make predictions about the future, and consider non-actual possibilities. But some have worried that the imagination is too unconstrained to be used in the service of scientific inquiry, which needs to be tied closely to reality. This chapter reviews these arguments and provides empirical evidence that the imagination is constrained enough for science. Both children and adults base their imagined worlds on the real world, and these worlds rarely stray from the causal structure of reality. And although the imagination may be subject to some biases that make certain kinds of worlds easier to imagine, these biases can be identified and corrected through training and enculturation in science. Finally, the conclusions drawn within an imagined context can be brought to bear appropriately on reality, allowing the results of thought experiments and hypothetical scenarios to inform the practice of science.

Author(s):  
Mary Lee Dunn ◽  
Polly Hoppin ◽  
Beth Rosenberg

Eula Bingham, toxicologist and former head of the Occupational Safety and Health Administration, is now at that place in her professional life where she can look back over her long career and identify its turning points and evaluate what worked and what didn't, what was important and what of lesser significance. In two interviews, she also looks at the present and the future and expresses concerns about the way we live now.


2021 ◽  
Vol 336 ◽  
pp. 06013
Author(s):  
Jizhaxi Dao ◽  
Zhijie Cai ◽  
Rangzhuoma Cai ◽  
Maocuo San ◽  
Mabao Ban

Corpus serves as an indispensable ingredient for statistical NLP research and real-world applications, therefore corpus construction method has a direct impact on various downstream tasks. This paper proposes a method to construct Tibetan text classification corpus based on a syllable-level processing technique which we refer as TC_TCCNL. Empirical evidence indicates that the algorithm is able to produce a promising performance, which may lay a starting point for research on Tibetan text classification in the future.


2021 ◽  
pp. 1-14
Author(s):  
Irina Astrova ◽  
Arne Koschel ◽  
Marc Schaaf ◽  
Samuel Klassen ◽  
Kerim Jdiya

This paper is aimed at helping organizations to understand what they can expect from a serverless architecture in the future and how they can make sound decisions about the choice between microservice and serverless architectures in the present. A serverless architecture is a new approach to offering services in the cloud. It was invented as a solution to the problem that many organizations are facing today – about 85% of their servers have underutilized capacity, which is proved to be costly and wasteful. By employing the serverless architecture, the organizations get a way to eliminate idle, underutilized servers and thus, to reduce their operational costs. Many cloud providers are now jumping to the serverless world because they know it is going to be the future of software architectures. However, being a new approach, the serverless architecture is still relatively immature – it is in the early stages of its support by cloud service platform providers. This paper provides an in-depth study about the serverless architecture and how to apply FaaS in the real world.


2020 ◽  
Vol 19 (1) ◽  
pp. 11-27
Author(s):  
Janet H. Murray

With the advent of mass consumer virtual reality (VR) headsets and controllers in the second decade of the 20th century, some experts have predicted we are on a path toward losing the distinction between the real and the virtual. These predictions overstate the empirical evidence for the effects of VR; ignore its technical limitations; take for granted highly speculative claims about the nature of consciousness; and, most fundamentally, lose sight of the continuities between VR and other representational media. This article argues against thinking of VR as a magical technology for creating seamless illusions. Instead it situates VR as an emerging medium within an evolving community that is beginning to develop the media conventions to support sustained interaction and immersion. The future of VR is not an inevitable and delusional metaverse but a medium of representation that will always require our active creation of belief.


1990 ◽  
Vol 46 (3) ◽  
Author(s):  
J. J. Kritzinger

World evangelisation within the Lausanne movement This article considers a number of key themes regarding world evangelisation. The point of departure is the second general conference of the Lausanne movement, which was held in Manila during July 1989. The first section gives some background to the Lausanne movement and events leading to this large and representative gathering. Secondly, some personal impressions gained at the conference itself are related. This is followed by a section on the Philippine setting of the conference, which played an important role in creating an atmosphere of involvement with the real world. The last section deals with some of the important issues arising from the conference. What should the future agenda be for world missions?


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2020 ◽  
pp. 125-183
Author(s):  
Christina Schachtner

Abstract In this chapter, the empirical data are presented as a typology of narratives in which experiences and activities in virtual space and the real world are interwoven, along with ideas and wishes for the future, what has happened in the past, and what is happening in the present. They run like a subterranean web through the narrators’ lives, initiating patterns of thinking and doing which revolve around a specific focus. The following types of narrations were identified: stories about interconnectedness, self-staging, supplying and selling, managing boundaries, and transformation, as well as setting out and breaking away.


There are hundreds of technologies today. Companies and brands continuously try to create and bring something innovative in the market to attract consumers to them in order to get a rise in market share. In the world where people have started getting used to hundreds of technologies, if asked about those which have affected them the most in last ten to twelve years, no one will miss mentioning blockchain. Blockchain has gained very much popularity after the introduction of bitcoin and ethereum in its environment. Blockchain mainly has two types of functionalities. One that involves transactions and the other which talks about contracts. This work highlights some of the very much talked about applications of this technology in the real world. The work also considers various factors and methods by which this technology can be introduced to the audience by suggesting ways in which blockchain can be introduced in the lives. Discussion on how this technology can affect human lives in the future is also an important part of this paper. Because blockchain has huge number of applications that the paper has tried to inculcate, it can be a technology of future which many scientists and industrialists have already started to believe. That is why this work finds a unique and all in one collection of applications and possibilities of Blockchain.


Author(s):  
John Nordlinger

Many of the opportunities in the virtual world are not available in the physical world, others open our eyes to real world opportunities we couldn’t imagine and teach us vocabulary and skills applicable to the real world. This chapter explores some of the connections between virtual decisions and real consequences, as envisioned in thought experiments of early philosophers from both eastern and western traditions.


Sign in / Sign up

Export Citation Format

Share Document