How Not to Network a Nation. The Uneasy History of the Soviet Internet

(Ben Green) #1

Notes to Chapter 1 233




  1. For more on Lysenko, see deJong-Lambert and Krementsov, “On Labels and
    Issues.” Wolfe, “The Cold War Context of the Golden Jubilee,” rethinks the accepted
    positions against Lysenko laid out in Joravsky, The Lysenko Affair, and Soyfer, Lysenko
    and the Tragedy of Soviet Science.




  2. Graham and Kantor, Naming Infinity, 129.




  3. Arnosht (Ernest) Kol’man, My ne dolzhny byli tak zhit’ [We Should Not Have Lived
    That Way] (New York: Chalidze, 1982), 7, quoted in Graham and Kantor, Naming
    Infinity, 130.




  4. Ernest Kolman,“Shto takoe kibernetika?” [What Is Cybernetics?”], Voprosi Filos-
    ophii (Akademia Nauk CCCR Institut Filosophii, Moscow) 4 (1955): 148–149.




  5. Ibid., 149.




  6. Wiener briefly studied at Columbia under John Dewey in 1915 and worked as a
    consultant for a National Defense Research Committee–supported Statistical
    Research Group based there in 1940.




  7. Kolman, “Shto takoe kibernetika?,” 150–157.




  8. Helmut Dahm, “Zur Konzeption der Kybernetik im dialektischen Materialis-
    mus,” unpublished manuscript, 25, quoted in Günther, “Cybernetics and Dialectical
    Materialism of Marx and Lenin,” 317–332.




  9. David Holloway, for example, writes that “the hostile image of capitalist society,
    which had played an important part in the early attacks on cybernetics, was now
    turned to its defense,” in “Innovation in Science: The Case of Cybernetics in the
    Soviet Union,” Science Studies 4 (1974): 316.




  10. Gerovitch, From Newspeak to Cyberspeak, 180.




  11. Ibid.




  12. Sobolev, Kitov, and Lyapunov, “Osnovnye cherty kibernetiki,” quoted in Gero-
    vitch, From Newspeak to Cyberspeak, 180.




  13. Erickson et al., How Reason Almost Lost Its Mind, 272.




  14. Galison, “The Ontology of the Enemy,” 228–266. Peter Galison says that “the
    enemy as human-machine black box becomes us as human-machine black box.” In
    Sina Najafi and Peter Galison, “The Ontology of the Enemy: An Interview with Peter
    Galison,” Cabinet 12 (2003), accessed April 10, 2015, http://cabinetmagazine.org/
    issues/12/najafi2.php.




  15. John A. Armstrong, “Sources of Administrative Behavior: Some Soviet and
    Western European Comparisons,” American Political Science Review 59 (3) (1965):
    643–655.




  16. Gerovitch, “The Cybernetics Scare and the Origins of the Internet,” 32–38.



Free download pdf