Skip to main content

Rick Perry: If at first you don't succeed


Atlanta, GA- When a party starts, the host is able to gush over the first person that arrives. If they are a particularly excitable and energetic host, they just might gush over the first few. But at some point, the ability to gush simply ends, and we get to the phase of just waving hi to Joe as he walks in. I don’t know when it happened, but the Republican Party of candidates for 2016 has become so crowded that we’ve gone beyond even having the energy to wave as a new candidate hits the door.

We already have lots of far right wing conservatives running. We already have former governors running, and we even already have a Texan running. But that’s not stopping Rick Perry, Texas’ longest serving governor, the man who was the follow up act to George Bush Jr., and the man who managed the state into a fortress of conservative political ideals of God, Gravy, and Guns, from announcing that he will be running a second time for the presidency.
Rick Perry, at least to me, comes across as a likeable guy, and being a Texan, he always tried to make himself out as a rough-and-ready sort of character. But he also had a tendency on the campaign trail three years ago to open his mouth a lot, and stuff his foot down his gullet.
However, for all of this I don’t see Perry as one of the ones without a chance. He managed to lead Texas into remarkable economic growth. During his watch, the state added roughly 1,800,000 jobs. He managed to fill nearly every position in Texas with someone loyal to him, he managed to actually pass conservative legislation, he managed to even get his chosen successor elected.
There is a cloud of a political indictment hanging over Perry of two felony charges, however, an in indictment is not a conviction, and many have called the indictment politically motivated against the governor because of his far right stances.
What we saw in 2011 was a man who was not comfortable on the debate stages. But supposedly practice makes perfect, add although Perry’s 2011 debate circuit was filled with gaffes and a famous “oops” after he forgot the three Federal Agencies he would cut if elected, perhaps he has grown and gotten better. Maybe not, but certainly Perry’s managers have to know where their candidate is weak, and will be practicing many hours with him so as not to have a repeat of some awkward moments.
But in the long run, surprisingly, all the gaffes just might help Perry. Americans are jaded with polished politicians, and they just might like a down home good old boy from Texas who isn’t afraid to make a mistake or three.

Andrew C. Abbott

Comments

Popular Posts

Create Your Own Social Networking Site

Create Your Own Social Networking Site JCOW: Ethical Hacking Top 10 reasons to choose Jcow:- 1. Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and  speed up your website. 2 Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively. 3 Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form. 4 Easily share stuff - Within the AJAX sharing Box, your members can publish status,  photos, videos, and blogs. 5 Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps. 6 Every profile could be Unique - Members can customize their own profile theme and  add music play...

HL7V2.x to HL7V3.0 Translation Issues Details-2

In continuation of my previous post this post lists the other issues associated with HL7 v2.x to HL7v3 translation Conformance Patterns: The other major issue with the transformation of messages is the behavior of application when a particular information exchange takes place. In HL7V3.0 apart from the trigger events and interactions there exists the notion of application role as senders and receivers. The application role is characterized as the entire set of interactions for which the sender and receiver are responsible for transmitting. HL7V3.0 clearly defines the possible interactions and the application behavior associated these interactions in the form of responses for which the sender and receiver needs to adhere to. The differences in messages between V2.x and V3.0 and absence of clear guidance on V2.x regarding application behavior on receipt of message makes the transformation exercise more difficult. Vocabulary: It is a well known fact that 80% of HL7 V2.x message failu...

Hack WiFi Account From Phishing Attack With WifiPhisher

WiFi Phishing Attack With WifiPhisher Tool  Wifiphisher   is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases. From the victim's perspective, the attack makes use in three phases: 1. Victim is being deauthenticated from her access point. Wifiphisher continuously jams all of the target access point's wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well. 2. Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point's settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up ...