Skip to main content

Chris Christi: Let's NOT Hire this one

The Love-Gov, Chris Christi

Yesterday, after a lot of speculation and a hard ride which took him from media favorite to nobody’s first choice, Chris Christi, the 52 year old Catholic two-time governor of the state of New Jersey announced he is running for president.
The volatile and loud mouthed governor famous for screaming at people in town hall meetings to “shut up” is polling at only roughly 4%, behind even Donald Trump. Christi comes into the 2016 race with the scandal of Bridgegate still hanging over his head, and with a problem; actually its everybody’s problem in the race, but since Christi is an establishment-moderate candidate himself, for him the problem is even bigger, and of course its named Jeb Bush.
Jeb Bush is soaking up donors left and right, and he’s not taking the type that Ted Cruz or Rand Paul are going after. He’s getting the money of the old Republicans, the ones who still look at the world as it was before the clocks changed to 2,000 AD. But those were supposed to be Christi’s big take away, and now they are disappearing.
Christi has little chance at this point of winning in Iowa, as other candidates have been working there for months, and also because the state’s grassroots members tend to be more conservative than the guy from Jersey. So the governor is instead aiming his sights at the number two state, New Hampshire, where he is already working to get support.
Another big problem Christi has is that he probably would do pretty well in the general election. He’s moderate, nobody would ever accuse him of being a real hardcore conservative, and he’s willing to compromise. While compromise is not a bad thing, and has been used with great dignity and good effect by the likes of Benjamin Franklin, George Washington, Alexander Hamilton and other great American names, among them Henry Clay, in recent years it has become popular for far-right conservatives to scream on the stump “I will not compromise!”
Real statesmen like Winston call compromise what it is, a part of governing. It’s often rational, like when the constitution, a great compromise, was written up. But Republican Primaries are not the most rational place. (Remember when Newt Gingrich said he would set the price of gas at 2.50 and people believed him?)
While Chris Christi has stances that could be seen by conservatives as real problems, such as his questionable stance on abortion, as he formerly called himself pro-choice, but has since switched to saying he is pro-life without doing much about that stance as governor, or his horrible stance of surveillance, if Christi loses, and most feel he will, it will not be because of Bridgegate or his weight issues or even screaming at people to shut while he’s talking. It will be because he hugged President Obama a few years ago, with all the cameras rolling, and because Christi is willing to understand that Republicans and the TEA Party are not alone in this nation, and nearly half of the people an American President would have to represent would be Democrats.
At this point we are still too far off to tell exactly what the final lineup will look like, or who will stand on the stage at the Republican National Convention, but I neither hope nor really believe that the man or woman who stands there that night telling all of us “I accept your nomination” will be a two term governor from New Jersey named Chris Christi.

Andrew C. Abbott

Comments

Popular Posts

Create Your Own Social Networking Site

Create Your Own Social Networking Site JCOW: Ethical Hacking Top 10 reasons to choose Jcow:- 1. Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and  speed up your website. 2 Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively. 3 Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form. 4 Easily share stuff - Within the AJAX sharing Box, your members can publish status,  photos, videos, and blogs. 5 Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps. 6 Every profile could be Unique - Members can customize their own profile theme and  add music play...

HL7V2.x to HL7V3.0 Translation Issues Details-2

In continuation of my previous post this post lists the other issues associated with HL7 v2.x to HL7v3 translation Conformance Patterns: The other major issue with the transformation of messages is the behavior of application when a particular information exchange takes place. In HL7V3.0 apart from the trigger events and interactions there exists the notion of application role as senders and receivers. The application role is characterized as the entire set of interactions for which the sender and receiver are responsible for transmitting. HL7V3.0 clearly defines the possible interactions and the application behavior associated these interactions in the form of responses for which the sender and receiver needs to adhere to. The differences in messages between V2.x and V3.0 and absence of clear guidance on V2.x regarding application behavior on receipt of message makes the transformation exercise more difficult. Vocabulary: It is a well known fact that 80% of HL7 V2.x message failu...

Hack WiFi Account From Phishing Attack With WifiPhisher

WiFi Phishing Attack With WifiPhisher Tool  Wifiphisher   is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases. From the victim's perspective, the attack makes use in three phases: 1. Victim is being deauthenticated from her access point. Wifiphisher continuously jams all of the target access point's wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well. 2. Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point's settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up ...