U.S. Flag Etiquitte

The Flag Code formalizes and unifies the traditional ways in which we give respect to the flag. It also contains specific instructions on how the flag is not to be used.

Are YOU the Security Breach?

While the usual suspects of security breaches are card issuing companies, cell phone companies, government agencies, banking institutions, and other large corporations, there is an often overlooked source of security breaches – you.

Savings Angel

The Story of Taps

The 24-note bugle call known as “Taps” is thought to be a revision of a French bugle signal, called “tattoo,” that notified soldiers to cease an evening’s drinking and return to their barracks or garrisons.

Recipe Box
Moms Membership