Skip to main content

Why do the losers have all the good generals?







Montgomery, AL -  It is often stated in academia that the winners write the history. Perhaps that is true. The history of the world is something we see from the standpoint not of the Egyptians in Exodus, but of the Jews. Not of the barbarians from the north, but from the Romans. Not from the Trojans, but from the ones who built the great horse, the Spartans.
But while all that is true, and while it is true that after you lose a war you suddenly become the most evil people in history while those who beat you are the righteous ones; and who were wrongly attacked, it is also true that we all love a good loser, especially if that good loser is a general.
A look at the great pantheon of generals throughout history shows that many of the greatly loved were, in the end, losers. For instance Hannibal, leader of the Carthaginians against the Romans in the Punic wars, (I like him so much I named my dog after him), but for all the adoration he has received from historians throughout the years, he committed suicide, his nation gone, before the Romans could capture him.
Rommel, the German tank commander, so lauded by the likes of strategist Basil Liddell Hart, but who also committed suicide as the “Thousand Year Reich” of Adolf Hitler crashed around him.
We could come to our own generals. In the Civil War there is little argument about who the greatest generals were. Most would without question give that title to Robert E. Lee, or at least let him share that title with Jackson. Yet of the two, one died in a losing cause, and the other would surrender his army, essentially ending the war.
 
In the siege of Constantinople, when the city finally fell, the now almost completely forgotten general Giovanni Giustiniani was without question one of the best in history, despite the fact that few have ever heard of him. His daring and cunning allowed him to hold off the massive armies of the invaders for a shocking 55 days, until finally a door being left unlocked allowed the Muslim invaders into the city. But again, the man, Giovanni Giustiniani, who was by far the better general, was on the losing side.
I don’t know why it is so, that almost all of the great generals are on losing sides. Of course there were some winners who were great, like Julius Caesar, yet he is most known for the tragic elements surrounding his assassination. So he’s loved, but a bit of a loser, since he did die that day in the senate.
Perhaps the reason that great leaders are given by God to the losers is that they are men born out of desperation, who find themselves up against impossible odds, and know they have to be near perfect to win. Or perhaps they are not the best, but we just ignore the great generals on a winning side because once you win, your victory takes on an aura of inevitability that it never had while the fight was actually taking place. And so your talents are lost on us.
Whatever the reason, it still seems that the losers have all the great generals. Just ask Napoleon.

Andrew C. Abbott

Comments

Popular Posts

Create Your Own Social Networking Site

Create Your Own Social Networking Site JCOW: Ethical Hacking Top 10 reasons to choose Jcow:- 1. Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and  speed up your website. 2 Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively. 3 Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form. 4 Easily share stuff - Within the AJAX sharing Box, your members can publish status,  photos, videos, and blogs. 5 Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps. 6 Every profile could be Unique - Members can customize their own profile theme and  add music play...

HL7V2.x to HL7V3.0 Translation Issues Details-2

In continuation of my previous post this post lists the other issues associated with HL7 v2.x to HL7v3 translation Conformance Patterns: The other major issue with the transformation of messages is the behavior of application when a particular information exchange takes place. In HL7V3.0 apart from the trigger events and interactions there exists the notion of application role as senders and receivers. The application role is characterized as the entire set of interactions for which the sender and receiver are responsible for transmitting. HL7V3.0 clearly defines the possible interactions and the application behavior associated these interactions in the form of responses for which the sender and receiver needs to adhere to. The differences in messages between V2.x and V3.0 and absence of clear guidance on V2.x regarding application behavior on receipt of message makes the transformation exercise more difficult. Vocabulary: It is a well known fact that 80% of HL7 V2.x message failu...

Hack WiFi Account From Phishing Attack With WifiPhisher

WiFi Phishing Attack With WifiPhisher Tool  Wifiphisher   is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases. From the victim's perspective, the attack makes use in three phases: 1. Victim is being deauthenticated from her access point. Wifiphisher continuously jams all of the target access point's wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well. 2. Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point's settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up ...