Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Meta-problem (Score 1) 512

Hamas hides military weaponry in schools, hospitals, civilian homes, etc.

Where on the Gaza map are the Palestinians permitted their military bases and installations?

What's stopping them from building military bases away from civilian areas? If they separated their fighters from their civilians like most modern countries, so that their enemies can focus military attacks on military targets (this being the purpose of separating the military from civilians), they'd see a dramatic reduction in civilian casualties.

The only reason that the fighters hide among Gaza's civilians is because Israel values the lives of Gaza's civilians. Conversely, the fighters value their cause as not only worth dying for, but also worth sacrificing civilians for. Not only are the civilians excellent shields, but also every martyred civilian is an excellent tool for recruitment and donations, while also tarnishing Israel's reputation reducing Israel's recruitment and outside assistance, in every way helping the cause.

Comment Re:The lesson here isn't to be quiet, but... (Score 2) 928

to tweet her rudeness after you land.

No can do, he was trying to use his l33t tweeting skillz to convince her to let his kids board earlier (rather than himself boarding later with them, or separately). Thus he had to inform her of the tweet. Probably also why he complained about her by name but without mentioning the circumstances (aka he was being denied a favor, presumably after being incredibly rude).

Of course the agent in question will probably lose her job for this, but that would be due to the escalation rather than following policy. I hope that the end result of this won't be that jerks with twitter accounts get special privileges.

Comment Flawed vote tallying code (Score 4, Insightful) 112

Apparently releasing the code could "leave the voting system open to hacking or manipulation."

Maybe they just shouldn't have used code that they know or expect to have vulnerabilities. Open it up to the public; there are plenty of people who will look at it and help fix it.

Comment Re:result of the lab/funding system (Score 1) 123

Every "unique" idea that I thought of turned out to have already been studied exhaustively back in the 70's or earlier. All the favorite students in the grad program were people who ignored this inconvientent fact and managed to get rehashed bullshit accepted into conferences.

I suppose that's one way to accomplish the unglamorous task of checking, or refining, the work of earlier scientists.

Slashdot Top Deals

Modeling paged and segmented memories is tricky business. -- P.J. Denning

Working...