We want more – STGC principal

first_img JC A TOUGH TEAM Principal Margaret Campbell believes her St George’s College (STGC) school spirit will soar even higher following that institution’s emphatic ISSA/Flow Super Cup 4-0 beating of Jamaica College (JC) inside the National Stadium, last Saturday. STGC pocketed $1,000,000, JC took home $375,000 for second place, while Wolmer’s Boys finished third after beating St Jago 2-1. 17-year-old Alex Marshall, STGC’s influential striker, was named the Golden Boot winner for his six goals. Following Saturday’s massive final, which saw the Corporate Area kingpins settle at one Super Cup each, STGC’s jubilant principal is eying “more titles and more success.” “This year when our theme is ‘STGC good and true, fanning the flames of the white and blue’, this just brings everybody together. It’s just wonderful to win, and the million dollars of course is wonderful,” Campbell joked. “I have to say our coach Neville Bell is wonderful, but in addition to that, I think because we are now expected to be winning in football the students that choose us choose because of football. “I believe in excellence, win or lose, I am proud of my boys but it’s always good to win, so it would be good to win all four titles. It would do a lot for us in terms of school spirit, support for us and support from our old boys,” the principal told The Gleaner. She added: “JC were not a walk over, they’re a tough team to beat.” “Absolutely, big celebrations for us next week, just a school thing for now until we figure out what we are going to do,” she outlined. Saturday’s final was a vintage performance from Alex Marshall who scored two and played a part in all four goals. Gregory Messam Jr dispatched a fifth-minute penalty after Marshall was dragged down in the penalty box. Marshall then finished off an exquisite strike from captain Shevon Stewart in minute 14. The irrepressible number 11 returned to torment JC in the second half, with his frustrated man-marker Ajeanie Talbott getting his second yellow card for a foul 24 yards out. Former JC player Ronaldo Watson caressed home the free kick in minute 53, while Marshall polished off his superb brace in the 58th minute. “It was always difficult against Stewart and Marshall we applied a man-marker against Marshall, he found space and anytime he got a look on goal it’s a goal. St George’s and Jamaica College is always a tough rivalry, hats off to St George’s, they were the better team, they were decisive in front of goal,” said JC Coach Miguel Coley. – Shayne Fairmanlast_img read more

In SSDs we trust (but they need to earn it)

first_img Leave a Reply Cancel reply You must Register or Login to post a comment. This site uses Akismet to reduce spam. Learn how your comment data is processed. Continue Reading Previous Is Raspberry Pi the next thin client?Next Benson’s Blocks We entrust SSDs with an ever-widening array of uses — from booting up $300 laptops to storing crucial data in remote Internet of Things (IoT) applications. The trouble is that some SSDs are thrust into applications for which they are not fully suited to truly secure the data they are entrusted to hold. This is of particular significance in embedded and industrial applications.It goes without saying that off-the-shelf SSDs designed for less-crucial applications come up short with regard to ensuring data integrity and protecting it from falling into the wrong hands. By the nature of their architectures and manufacturing processes, SSDs made for embedded and industrial applications provide a large measure of data reliability. Taking this one step further, SSDs have the ability to encrypt their stored data automatically, meaning critical uses — embedded designs for IoT applications, for example — can enjoy an unprecedented degree of security.The major distinctions between classes of SSDs can be found in their intended applications. Client applications are fairly straightforward as there are countless use cases on the client side as well as clear metrics associated with desktop, notebook, and ultrabook computers, tablets, and smart phones. In these, SSDs are used almost exclusively for storing operating systems and user data generated or downloaded by a single user. Performance of these drives is largely subjective, based on the user’s needs and preferences, with the most common requirements being rapid boot-up time and application responsiveness. Client SSDs are usually optimized for reads; write speeds don’t matter nearly as much. This use case is further distinguished by the down-time associated with client applications — enough for the SSD to attend to background tasks that help it achieve higher performance and last longer.In the industrial/embedded space, however, it’s a different game. Boot times and the speed with which applications respond mean little if an SSD isn’t reliable — sometimes in harsh conditions — or its critical data isn’t protected from system failures and attempted theft. The growing importance of solid-state storage integrity, and the data it’s expected to manage, has engendered an emerging category: infrastructure SSDs. Such drives are designed to take on the unique storage requirements of industrial and embedded equipment that can ill-afford downtime, data loss, or frequent hardware replacement. Look no further than the IoT to see the crucial role infrastructure SSDs play, and why drive and data integrity are their primary metric. (By the way, this is the very topic I’ll be addressing during a panel presentation at this year’s Flash Memory Summit, August 9-13, 2016, at the Santa Clara Convention Center, Santa Clara, California. For those attending, it will be Session 304-A.)As functionality and applications, including those comprising the industrial IoT , or IIoT, move closer to the end-user and the network edge, more and more data is put at risk. While this threat has been in existence for some time, it has typically been addressed using application-specific devices and designs. For example, “mission-critical” military systems incorporate layer upon layer of security into their designs, including data encryption, secure erase, and data purge, while network and IT managers employ more discrete hardware and software methods, including virtual private networks, intrusion detection, and firewalls. The challenge is that these security methods are costly and/or difficult to deploy remotely (and discreetly). What is needed is a simplified, integrated, cost-effective approach that’s easy to deploy — even in remote or harsh environments.Self-encrypting drives (SEDs), such as the recently introduced line of SEDs highlighted in Embedded.com, provide a more simplified approach to data security as they can be easily deployed without the need for additional software layers on top of host operating systems (encryption keys are managed and stored on the SSD itself). And because encryption is integrated into the SSD’s controller and firmware, it can be easily implemented on any industrial-type drive format, such as 2.5-inch, 1.8-inch, Slim SATA, mSATA, M.2, and CFast. This allows a secure storage solution to be deployed easily and discreetly just about anywhere, regardless of size constraints, operating conditions, or environmental issues (Figure 1).Self-encrypting SSDs add a significant level of data protection to both IoT and IIoT applications (Source: Virtium) To achieve self-encryption, random Advanced Encryption Standard (AES) encryption keys for the SSDs are generated at product initialization using the drive controller’s integrated random number generator. These keys are stored in the drive and they are used in conjunction with an integrated AES encryption engine to encrypt and store the host data in the NAND without burdening the host system. Keys are non-retrievable and non-changeable without complete loss of the data encrypted on the SSD. Of course, encryption alone does not provide full data protection because, without drive authentication (TCG Opal 2.0 or ATA security-based), the stored data is still accessible. Therefore, it is recommended to employ authentication in conjunction with encryption to derive the greatest security benefit.Self-encrypting drives now on the market address a wide variety of industrial/ embedded applications. For example, Virtium SEDs support industrial temperatures (-40 to +85°C) as well as low power, integrated power-fail protection, and vtView SSD monitoring software. From a security perspective, these SSDs also support other data-protection features, including secure erase, Trusted Computing Group (TCG) compatibility, and write protection (hardware and software) to protect against malicious or unintended writes to the SSD. The drives also support customizable “secure boot” options built on the trusted send/receive command within the Opal 2.0 Storage Specification.With industrial SEDs being so flexible, cost-effective, and easy to deploy, there is really no reason not to use them in applications where data is potentially at risk. No longer are such applications limited in their selection to consumer-grade options that do not meet the rigid criteria of endurance, longevity, and ruggedness. True industrial-grade storage solutions are now available and suitable for everything from simple boot drives to mission-critical applications in industrial applications.SSDs have always held a trusted place in the embedded and industrial spaces. Now, with self-encryption and their unrivaled reliability in fast-growing applications such as the IoT and IIoT, they’ve elevated that trust to new heights.Scott Phillips is vice president of marketing at Virtium Solid State Storage and Memory, in Rancho Santa Margarita, California (www.virtium.com). center_img Share this:TwitterFacebookLinkedInMoreRedditTumblrPinterestWhatsAppSkypePocketTelegram Tags: Communications, Industry, Medical, Security last_img read more