Facebook Twitter Google+ Kris Joseph was startled by being a focal point.In the 2010 NCAA Tournament, the Big East’s Sixth Man of the Year was no longer coming off the bench. Syracuse center Arinze Onuaku was out with a knee injury and Butler game-planned against Joseph in the SU starting lineup.‘They were kind of giving me the ‘Rondo treatment,” Joseph said, referring to Boston Celtics point guard Rajon Rondo, ‘where they were playing me in the key and forcing me to shoot.’Joseph shot just 3-of-8 from the field for six points, missing his only 3-point attempt, and the top-seeded Orange fell to fifth-seeded Butler in the Sweet 16 of the 2010 NCAA Tournament. Joseph, then a sophomore, called the game a wake-up call that showed him just how much he needed to develop his all-around game. The Bulldogs played Joseph as a driving forward, daring him to shoot, and he couldn’t capitalize.Just more than two weeks later, Syracuse’s shining star, Wes Johnson, declared for the NBA Draft. The Big East Player of the Year was selected by the Minnesota Timberwolves with the fourth pick overall.AdvertisementThis is placeholder textJoseph assumed his position as small forward of the Orange. With it came expectations, presumptions that Joseph would be what Johnson was — the star. They were the same height and Joseph weighed two more pounds. Joseph averaged double digits off the bench in 2009-10. He had to be great.In the two seasons since, Joseph has assumed a role as team leader. He hasn’t been Johnson, a player who captivated the Syracuse fans during one remarkable season on the court. But the senior from Montreal has found his niche as an unselfish, consistent player on the wing for Syracuse. And he is the Orange’s go-to player.Joseph will leave Syracuse as the all-time winningest player in Orange history —something he accomplished against Louisville on March 3. It has not been flashy, but he leads the team with 14.1 points per game and has scored in double digits in all but five games of his senior season.When all is said and done, he’s next in the line of talented swingmen to develop a legacy at Syracuse.‘He’s very talented, he’s very chill,’ SU guard Brandon Triche said. ‘He’s a guy you want to be around, and he’s getting his degree as well. Guys that stay four years really help the team out.’Joseph said the expectations entering the 2010-11 season, his junior year, did not bother him. He set high expectations for himself entering the year as well.Still, Joseph acknowledged the media hype surrounding him was that he was going to burst into the starting lineup and be the next star for the Orange. He chose to ignore it.‘I wasn’t thinking about whose shoes I had to fill because I don’t think that would necessarily help out the team,’ Joseph said.Joseph referred to himself as a facilitator. But he can score, too.He was a scorer for Archbishop Carroll High School in Washington D.C., the high school that bred SU’s all-time leading scorer, Lawrence Moten. And Joseph was a scorer off the bench as a sophomore at Syracuse.At Archbishop Carroll, though, he was one of the bigger and more athletic players on the court. He was relatively unknown heading into his sophomore year at SU.Now, he deals with the brunt of the opposing team’s defensive game plan. So he has no problem moving the ball to someone with an easier path to the basket.‘If you need him to score, he’ll score. That’s the thing about him,’ Johnson said. ‘If you need him to have a big night, he’ll have a big night for you. But he’ll really just try to get everyone else involved and score when he needs to score.’Moten is close with the player who shares both his high school and college alma maters. He said he remembers hearing about Joseph being a top talent in high school. Like Johnson, Joseph possesses a similar game to Moten, too. The long-armed, slash-and-shoot wing players who have become staples of Syracuse head coach Jim Boeheim’s 2-3 zone and are dynamic on offense.‘It’s a gift of having a knack for the ball and knowing where to be in particular positions in the right place at the right time,’ Moten said. ‘And I see that in him.’Joseph’s junior season didn’t live up to the expectations that were in place for him. He averaged 14.3 points per game, but he did not do what Johnson did. He was steady, less exciting.Moten described Joseph’s style as ‘low-key.’ There is a lot of hard work behind the scenes. He is quiet and humble on the court.But at times, he is still able to step up. That’s been especially evident in his senior season, a full year after Johnson left SU.‘I think a lot of people were sort of hyping the situation more than they should have,’ Johnson said. ‘Just not letting Kris be Kris and putting a lot of stuff on him. But I think this year it’s working out for him, and I think the team is showing that, too.’The 2011-12 season can be Joseph’s legacy. Though Dion Waiters has been flashy, C.J. Fair has produced some highlight-reel dunks and Fab Melo is the Big East’s Defensive Player of the Year, Joseph is still the player Syracuse can trust most with the game on the line.He knocked down a long jumper over Stanford guard Jarrett Mann to put the Orange up one with three minutes left in the NIT Season Tip-Off championship game Nov. 25. Against Georgetown on Feb. 8, Joseph got open for 3 from the left corner to provide the clinching points in a 64-61 overtime victory. Joseph said that game is one of his favorite moments of his career.Joseph might have missed those clutch 3-pointers if he was the player of two years ago. He might not have taken them. But he developed that shot into a reliable tool to keep defenses honest. Joseph said he feels he’s more comparable to Johnson this year because of his shooting ability.And with the Orange heading into postseason play on fire, he still has a chance to do something that would make Johnson incomparable to him — lead SU to a national championship.He’ll want the ball in his hands for a shot in that game. Something that helps him fit right in with the other historic wings in SU history.‘When it comes down to it, I’ve been here four years. I’m one of the veterans on this team,’ Joseph said. ‘And I would trust myself with the ball in my hands in the dying seconds of a tie game. Whether I make or miss the shot, I’d rather have the ball in my hands.’[email protected] Comments Published on March 6, 2012 at 12:00 pm Contact Mark: [email protected] | @mark_cooperjr
Frequent consumption of citrus fruits like whole grapefruit and orange juice may be associated with an increased risk of melanoma, a type of skin cancer, says a large study.Analysing dietary patterns among more than 100,000 people in the US, the researchers found that melanoma risk was 36
Kolkata: A US-Bangla Airlines flight from Dhaka to Kolkata reported a bird hit while landing at the N S C Bose International Airport here Monday, airport sources said. After landing, an inspection was carried out and no damage to the aircraft was found, an Airports Authority of India (AAI) spokesperson at Kolkata said. The time of the arrival of the Dhaka-Kolkata flight number BS 201 was 10.19 am. The flight departed for Dhaka at 12.05 pm, the spokesperson added.
6 min read November 4, 2010 Brought to you by Business Insider Register Now » Data security should be an important area of concern for every small-business owner. When you consider all the important data you store virtually — from financial records, to customers’ private information — it’s not hard to see why one breach could seriously damage your business.According to the most recent Verizon Data Breach Investigations Report [PDF], an estimated “285 million records were compromised in 2008.” And 74 percent of those incidents were from outside sources.We consulted Roland Cloutier, Chief Security Officer for ADP and a board member for the National Cyber Security Alliance, and Matt Watchinski, Senior Director of the Vulnerability Research Team for cybersecurity provider Sourcefire, to find out the key security measures every small business should be taking.1. Establish strong passwordsImplementing strong passwords is the easiest thing you can do to strengthen your security.Cloutier shares his tip for crafting a hard-to-crack password: use a combination of capital and lower-case letters, numbers and symbols and make it 8 to 12 characters long.According to Microsoft, you should definitely avoid using: any personal data (such as your birthdate), common words spelled backwards and sequences of characters or numbers, or those that are close together on the keyboard.Use their convenient password checker to see how strong yours is.As for how often you should change your password, Cloutier says that the industry standard is “every 90 days,” but don’t hesitate to do it more frequently if your data is highly-sensitive.Another key: make sure every individual has their own username and password for any login system, from desktops to your CMS. “Never just use one shared password,” says Cloutier.And finally, “Never write it down!” he adds.2. Put up a strong firewallIn order to have a properly protected network, “firewalls are a must,” Cloutier says.A firewall protects your network by controlling internet traffic coming into and flowing out of your business. They’re pretty standard across the board — Cloutier recommends any of the major brands.3. Install antivirus protectionAntivirus and anti-malware software are essentials in your arsenal of online security weapons, as well.”They’re the last line of defense” should an unwanted attack get through to your network, Cloutier explains.4. Update your programs regularlyMaking sure your computer is “properly patched and updated” is a necessary step towards being fully protected; there’s little point in installing all this great software if you’re not going to maintain it right.”Your security applications are only as good as their most recent update,” Watchinski explains. “While applications are not 100 percent fool-proof, it is important to regularly update these tools to help keep your users safe.”Frequently updating your programs keeps you up-to-date on any recent issues or holes that programmers have fixed.5. Secure your laptopsBecause of their portable nature, laptops are at a higher risk of being lost or stolen than average company desktops. It’s important to take some extra steps to make certain your sensitive data is protected.Cloutier mandates “absolutely: encrypt your laptop. It’s the easiest thing to do.”Encryption software changes the way information looks on the harddrive so that, without the correct password, it can’t be read.Cloutier also stresses the importance of never, ever leaving your laptop in your car, where it’s an easy target for thieves. If you must, lock it in your trunk.6. Secure your mobile phonesCloutier points out that smartphones hold so much data these days that you should consider them almost as valuable as company computers — and they’re much more easily lost or stolen. As such, securing them is another must.The must-haves for mobile phones:Encryption softwarePassword-protection (Cloutier also suggests enabling a specific “lock-out” period, wherein after a short amount of time not being used, the phone locks itself)Remote wiping enabledRemote wiping is “extremely effective,” Cloutier says, recounting the story of one executive who lost his Blackberry in an airport, after he had been looking at the company’s quarter financials. The exec called IT in a panic, and within 15 minutes they were able to completely wipe the phone.7. Backup regularlyScheduling regular backups to an external hard drive, or in the cloud, is a painless way to ensure that all your data is stored safely.The general rule of thumb for backups: servers should have a complete backup weekly, and incremental backups every night; personal computers should also be backed up completely every week, but you can do incremental backups every few days if you like (“however long you could live without your data,” Cloutier explains).Getting your data compromised is a painful experience — having it all backed up so you don’t completely lose it will make it much less so.8. Monitor diligently”All this great technology […] is no good unless you actually use it. You have to have someone be accountable for it,” says Cloutier.One good monitoring tool Cloutier suggests is data-leakage prevention software, which is set up at key network touchpoints to look for specific information coming out of your internal network. It can be configured to look for credit card numbers, pieces of code, or any bits of information relevant to your business that would indicate a breach.If you don’t monitor things, warns Cloutier, “it’s a waste of time and a waste of resources.” And you won’t know that you’ve been compromised until it’s far too late.9. Be careful with e-mail, IM and surfing the WebIt’s not uncommon for a unsuspecting employee to click on a link or download an attachment that they believe is harmless — only to discover they’ve been infected with a nasty virus, or worse.”Links are the numbers one way that malware ends up on computers,” says Cloutier. “Links are bad!”As such, never click on a link that you weren’t expecting or you don’t know the origination of in an e-mail or IM.You have to “be smart when surfing the Web,” Watchinski warns. “[You] should take every “warning box” that appears on [your] screen seriously and understand that every new piece of software comes with its own set of security vulnerabilities.”10. Educate your employeesTeaching your employees about safe online habits and proactive defense is crucial.”Educating them about what they are doing and why it is dangerous is a more effective strategy than expecting your IT security staff to constantly react to end users’ bad decisions,” Watchinski says.It’s not easy: “One of the most difficult things to do is protect end users against themselves,” he adds. But ultimately, prevention is the best approach to handling your data security.Make sure your employees understand how important your company’s data is, and all the measures they can take to protect it. Growing a business sometimes requires thinking outside the box. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global