The Reagan Administration, generally regarded as having conducted the most successful Transition of modern times, had managed during the election campaign to build bridges to the Democrats in some areas, notably foreign and national security policy.
If this Nation really wants to create an effective border security policy, we need to have a debate that includes a discussion about actual solutions to our problems, which means taking all of the political grandstanding and baiting out of the equati...
When I was young, many people worked for a company with a pension plan that covered them for as long as they lived. If they didn't have a pension plan, they could count on Social Security and Medicare.
Since Social Security faces a large gap between what it promises younger workers and what it can afford to pay them, private savings will likely need to play a larger role in retirement planning for younger workers.
The production of natural resources in agriculture, forestry and fisheries, stable natural hydrological cycles, fertile soils, a balanced climate and numerous other vital ecosystem services can only be permanently secured through the protection and s...
Leaving what feels secure behind and following the beckoning of our hearts doesn't always end as we expect or hope. We may even fail. But here's the payoff: it can also be amazing and wonderful and immensely satisfying.
The only thing that permits human beings to collaborate with one another in a truly open-ended way is their willingness to have their beliefs modified by new facts. Only openness to evidence and argument will secure a common world for us.
Over the last five years, the Administration and the majority in Congress have appropriated less than $900 million for port security grants - despite the Coast Guard's determination that $5.4 billion is needed over 10 years.
See that you buy the field where the Pearl is; sell all, and make a purchase of salvation. Think it not easy: for it is a steep ascent to eternal glory: many are lying dead by the way, slain with security.
When my co-founder and I first had the idea for IronPort, an email security company, we triangulated a list of the 20 most relevant people in email - former CEOs, open source technologists, investors and thought leaders.
When the mind stops searching, when it stops wanting refuge, when it no longer goes in search of security, when it no longer craves more books and information, when it ignores even the memory of desire, only then will Love arrive within.
The platform we had in Dallas, the 1984 Republican platform, all the ideas we supported there - from tax policy, to foreign policy; from individual rights, to neighborhood security - are things that Jefferson Davis and his people believed in.
He's not a safe safe or a tame God, securely lodged behind the bars of a distant Heaven; He has the most annoying manner of showing up when we least want Him; of confronting us in the strangest ways.
We live in an era of mind-blowing scientific discovery, virtually none of which ever makes the front page, even as every trivial twist and turn in the rococo political drama has a secure place as the lead story.
It was quite risky to open the book with one of my quieter stories; I'm kind of trying, I think, to lure readers into a false sense of security and then assault them with a couple really loud, really strange stories.
Our National Guard, as I think everybody knows, has provided about 40 percent of the boots on the ground in Iraq and in the conflict against Islamofascism. They went into that battle, being called up for their national security service, short of equi...
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch manageme...
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and res...
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
Ethanol has reduced our nation's dependence on imported energy, created thousands of jobs, reduced air pollution, and increased energy security. And renewable fuels cost less at the pump. It is a growth fuel that fuels opportunities for millions of A...
You will encounter many distractions and many temptations to put your goal aside: The security of a job, a wife who wants kids, whatever. But if you hang in there, always following your vision, I have no doubt you will succeed.