Inequality. If you look at what actually happened to people, a lot of what matters, they are aftertax income and weve had substantial tax cuts in middleclass families, make tax cuts permanent that are worth thousands of dollars a year, had additional tax cuts for the areas like the itc and Child Tax Credit and on top of that you have the Affordable Care act. When you take all that into account, the policies of this administration have substantially reduced income inequality relative to what you otherwise would have had. In terms of the underlying trend in the economy i think that challenge is to with this and their dynamics, technology, education, globalization institutional changes, declining value of the minimum wage, all of those factors i think our continuing you know to create an underlying challenge to inequality and thats what were proposing all the steps we are for minimum wage to education to shaping globalization in terms are good for American Workers and the American Economy
Interesting sometimes the best thing to do with information sharing is to keep a secret. And in this case after, to their credit, they handled this fantastic. We are lucky that this turned out to be a microsoft problem because they had a sophisticated Incident Response Security Program and so it was their mistake 15 years ago but the people that handled it now were the right people and we are all very lucky. But they immediately bought it and there was no convincing them that this was serious. That took three emails. They worked on it very hard for a year. The best thing to do was to give them the runway to fix it right. The worst thing to do would have been to put an arbitrary deadline in front of them and told them to fix it fast. In this case there were not ways to fix it fast, so that would have been cited tracking to the detriment of the end of the security goal. So in this case yesterdays way to share information was to give the vendor the runway to fix it and to keep it secret.
Barriers are the only ones that can make it through the legislation. So there we are focused on the legislation passing. But we also have government to government sharing. Lets start with an side of inside of the federal government. There they try to get us for Intelligence Matters we need to do a better job of doing the analysis. Thus ctic is doing the the levin is doing the analysis that isnt necessarily sharing the intelligence but being able to do the analysis. So, then you also have the sharing that needs to happen between the centers. Weve done a good job of increasing the sharing among the centers and among the agencies involved. Now its about doing the analysis. So, we have these four different for different kind of sharing that i phrased. Each one is equally important. We are trying to come up with policy solutions to figure out where the barriers are in each of them and get the policy answers that salt is different here years. And i think thats one of the when i was getting p
Incident response Security Program and so it was their mistake 15 years ago but the people that handled it now were the right people and we are all very lucky. But they immediately bought it and there was no convincing them that this was serious. That took three emails. They worked on it very hard for a year. The best thing to do was to give them the runway to fix it right. The worst thing to do would have been to put an arbitrary deadline in front of them and told them to fix it fast. In this case there were not ways to fix it fast, so that would have been cited tracking to the detriment of the end of the security goal. So in this case yesterdays way to share information was to give the vendor the runway to fix it and to keep it secret. But that is hard and interesting because keeping the secret especially for 13 months is hard. But we actually discovered this issue under contract with a third party so that made it even more interesting. Fortunately, the third party happened to be ica
Fantastic. We are lucky that this turned out to be a microsoft problem because they had a sophisticated Incident Response Security Program and so it was their mistake 15 years ago but the people that handled it now were the right people and we are all very lucky. But they immediately bought it and there was no convincing them that this was serious. That took three emails. They worked on it very hard for a year. The best thing to do was to give them the runway to fix it right. The worst thing to do would have been to put an arbitrary deadline in front of them and told them to fix it fast. In this case there were not ways to fix it fast, so that would have been cited tracking to the detriment of the end of the security goal. So in this case yesterdays way to share information was to give the vendor the runway to fix it and to keep it secret. But that is hard and interesting because keeping the secret especially for 13 months is hard. But we actually discovered this issue under contract w