Green Bay Packers’ rookie Eddie Lacy is the first to admit he’s a big guy. But maybe he is bigger than he thinks.A photo surfaced online of the running back turning back to look for a ball during a recent training camp practice, and he looked out of shape.Circulation of the photo went viral and by late Monday, Lacy caught wind of all the fat jokes that were being made at his expense.Listed at 5-foot-11 and 230 pounds, Lacy brushed off the jokes, saying his coaches have no issues with his weight or conditioning.“I’m at a weight where I’m comfortable at and the coaching staff feels as though they’re comfortable where I’m at,” Lacy said after Tuesday’s practice, which was his best of camp so far. “So as far as that’s concerned, we’re all on the same page.”Coach Mike McCarthy didn’t seem worried about Lacy’s size.“If we had any concerns about any of our guys conditioning-wise, they wouldn’t be on the field,” said McCarthy.
In other Black quarterback news, Michael Vick has been relieved of his starting duties with the New York Jets in favor of Geno Smith. The real news is that Vick’s days as a consistently productive NFL QB appear to be done.Face it: If he cannot hold the position over Geno Smith, who has has his moments but has been mostly deplorable in his 1 1/2 years in the league, then Vick cannot beat out anyone else. Which means perhaps he should let this season be his last, and depart with some dignity. Last thing he needs is another year or two subbing for injured quarterbacks or wearing a cap and holding a clipboard while feigning to be interested.And if he cannot beat out Smith, after having had a fair chance to do so, why would another team consider Vick a viable option?His aforementioned dignity, by the way, was regained in how humbly and remorsefully he comported himself after the dog-fighting scandal that landed him in prison. He could have been outwardly angry for the over-the-top punishment he received. He could have been surly. He could have been shut down.Instead, he became an advocate for animal safety and opened up about his demons and his flaws and worked on them. On the field with the Philadelphia Eagles, he at times was brilliant. He earned a second $100-million contract, the ultimate mark of his ascension.But he’s played 12 years, taken some vicious hits and just no longer has the sharpness in his reads or bounce in his step. His accuracy always was an issue, and it has not gotten better. Last week, the Jets lost to the Buffalo Bills 38-3. Vick threw for 79 yards. Enough said.When Jets coach Rex Ryan deems Smith as a stronger alternative, well, enough said.“The main factor is you want to give your guys a chance to win the game,” Ryan said. “That’s the No. 1 factor you look into. But that’s what we did. We feel good. . . As an organization, all of our decisions are organizational driven. We just want to get Geno another opportunity to show what he can do. Obviously we like the way he finished last season. We’ve had some bumps in the road this year. We sat him down for a few weeks and we’ll see how he responds.”At the same time, the Jets sit down Vick, perhaps for the last time. If so, he had a memorable career. Some flashes of spectacular early with the Falcons, and less frequent flashes along the way–with a prison stint in between.If this does mark the end for Vick, he can be proud that he stayed around for a dozen seasons, even if they were not what he or anyone projected them to be when he joined the NFL.Vick went 1-2 as the starter. He played turnover-free football in his first two starts, steadying the offense with his veteran leadership. But he was terrible on Monday night, completing only 7 of 19 passes for 76 yards and an interception. Smith replaced him in the third quarter. QB rating of 22.2. Not good.
The third overseas theatre troupe of the festival, Center of Artistic Creativity, Egypt, headed by Md. Habib performed ‘Flashback’. The short play based on the classic, Romeo-Juliet, was presented in dance-drama style. However, the event of the evening was Kalindi Bratyajon’s children’s workshop based production, ‘Bhombol Sardar’. The young artistes stole the heart of the gathering at the Academy of Fine Arts with their enthusiasm and what seemed far superior spontaneity and acting skills than adults. Credit goes to the director of the production Sumanta Roy and the initiatives taken by Bratyajon in developing young talents to flourish and engage with nuances of theatre and culturally rich Bengali literature for children, much before they face the harsh reality of their lives. Also Read – Add new books to your shelfThe 31 bubbly, pint-size energy bombs, in the age group 4 years to 14 years, flaunted their on-stage artistry, on the inaugural show. Bratya Basu, the convener of the festival, reiterated the importance of reading and engaging with children’s literature of Khagendranath Mitra, Lila Majumder, Bibhutibhusan Bandyopadhyay, Rabindranath Thakur etc. along with English literature of the kinds of Harry Potter and others. He thanked the guardians for keeping faith in the enormous power of theatrical art form having massive potential to add positivity, confidence, and vigour in tender minds. In the end, Sangita Chakraborty of Ashokenagar Natyamukh was felicitated as a promising young director of theatre in Bengal.
Throughout history, whenever technology has advanced, there has always been a concurrent change in the way we live our lives and go about our business. For the most part, this co-evolution has been welcomed and embraced. These advancements have made work simpler, and communication and collaboration across networks seamless.Related: Got Effective Cybersecurity Practices? Be Aware: The FTC Is Watching You.However, this transition to increased connectivity and quick, seamless, one-click solutions has also given rise to security issues when it comes to the private information held by the institutions leveraging those innovative solutions that optimize business operations.In their bid to be more connected, businesses have increased the touch points of their organizations across networks, increasing the opportunities cyber criminals have to penetrate: Every time any of us visit Angie’s List, BestAdvisor (U.K.), Yelp or any other review site to decide on what to purchase, then proceed to Amazon, Walmart or other ecommerce store, whipping out our credit cards and making a purchase, we’re releasing vital pieces of personal information.Things only get worse when we fill out a detailed form online. This is fodder for the plethora of hackers seeking ways to penetrate personal and corporate firewalls ,to get to the private information they protect. No wonder so many organizations spend so much on security. No wonder we can’t ignore the vital role cyber security plays for businesses and individuals.While businesses are safeguarding their sensitive data (including customer personal information), you, as a smaller-scale entrepreneur, need to take steps to ensure that you don’t become a part of the cyber attack statistics. Here are several of those steps to take:1. Back up everything offline.Set up a regular schedule for backing up all your information, whether it’s your personal data or company files. This practice should be performed as frequently as possible so that, in the event of a breach, the information loss will be minimal.Related: 4 Reasons You Need Developers With Cybersecurity Skills in All Tech TeamsIf you use a cloud computing service, make sure to set up real-time backup. And then, nothing beats offline backup if you really want solid protection. Move a copy of all the information you hold dear onto a trusty thumb drive or backup drive. In this world of increasing personal digital espionage, offline means “safe.”2. Keep your eyes peeled for unusual financial activity.Little things like checking your card statement once every few days or once a week may be the only thing that will save you from financial damage if you are hacked. This checking frequency means that you will be able to take action against suspicious account activity within seven days, at the latest. A monthly check leaves fully 30 days between checks — not a good strategy for stemming damage from a hack.Also consider setting up a transaction limit on your card and/or bank account. Most banks, credit card companies and other financial institutions understand the implication, and willingly provide real-time alerts whenever activity occurs that contravenes your settings. This helps ensure the authenticity of transactions on your account while decreasing the probability of a successful hack.3. Develop a degree of security paranoia.Effective cyber security measures require a bit of paranoia. This means that you double-check whether you logged out your account from a friend’s laptop, or whether your password combination is strong enough. Such an attitude toward the security of your information causes you to be proactive.You should, for instance, make sure that all your passwords are strong enough to give any hacker a tough time. To stay on the safe side, install a reputable internet security software on your devices to protect all your online passwords. Maximize as many internet security solutions as you can, and set up your internet security software to check for the authenticity of those that lack that security protocol.Also, never give out your personal data to anyone, no matter how convincing that person sounds. Obviously, you shouldn’t incorporate any of your personal information into the password, such as your birthday or first name. Instead, your password should be a mixture of multiple elements: small letters and caps, symbols and digits sufficient to dissuade or demotivate intruders.As much as is possible, ensure that the websites you visit have “https” URLs, since that final “s” denotes security protocols. Finally, keep your operating system, antivirus, network intrusion detection tools and other software updated to take advantage of the most recent security features available.4. Seek out a cyber-security expert.You shouldn’t wait till all else fails before you hire a security expert, especially if you run a business. You need someone who can analyze your systems, identify any security risks and develop and implement strategies for dealing with them.In the event of a data breach or compromise, a security expert can be the difference between comprehensive systems breakdown and minimal damage. The benefit of an expert becomes increasingly obvious when your business begins to expand operations and grow your network, leading to a greater number of potential breachable contact points.Related: 7 Cybersecurity Layers Every Entrepreneur Needs to UnderstandIt’s a no-brainer that it’s more cost effective to hire an expert than to recover from the damage a data breach may cause. Opinions expressed by Entrepreneur contributors are their own. Enroll Now for Free 5 min read September 19, 2017 Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience.