We need first of all the reform of our justice system. We need reform of the education system because of quality of education because of innovation and technology. And we need administrative reform. Too much bureaucracy.
Bear in mind North Korea has been the leading source a leading source of nuclear technology and of missile delivery systems to some of the world's great rogues in Iran and Syria.
Thompson and Ritchie were among the first to realize that hardware and compiler technology had become good enough that an entire operating system could be written in C and by 1978 the whole environment had been successfully ported to several machines of different types.
We may have to force people to get together in terms of picking a particular type of technology and starting to build to that technology as opposed to everybody exercising their right to buy their own system you know at will.
The Cox Report documents a systematic well-planned effort by the Chinese military at the highest levels to target and acquire technology for military modernization.
I have never come across a technology that doesn't change. This is inevitable. You have to adapt your systems as technology develops.
But my view is that you need a system at the border. You need some fencing but you need technology. You need boots on the ground. And then you need to have interior enforcement of our nation's immigration laws inside the country. And that means dealing with the employers who still consistently hire illegal labor.
What is needed now is a transformation of the major systems of production more profound than even the sweeping post-World War II changes in production technology.
For the blue-collar worker the driving force behind change was factory automation using programmable machine tools. For the office worker it's office automation using computer technology: enterprise-resource-planning systems groupware intranets extranets expert systems the Web and e-commerce.
A company can spend hundreds of thousands of dollars on firewalls intrusion detection systems and encryption and other security technologies but if an attacker can call one trusted person within the company and that person complies and if the attacker gets in then all that money spent on technology is essentially wasted.