Dear Editor,The recent debate on the No-Confidence vote in the National Assembly highlights how fractured we have become as a people. For years we were the first to say that “is only election time we have problem, but other than that we alright.” But is this actually true today? Recent discussions, video interactions, and especially social media (the place where everyone is an expert at everything) have highlighted these – frankly – nasty attitudes of some of our peoples.This is a wealthy nation. Look at the geological map and you will see that we are blessed with a lot, and we have no need to beg for anything. Yet, increasingly, we are getting poorer with our morality and civility.We are by no means the most troubled spot in Caricom in terms of our politics and our diversity and ethnic relations, but we have failed to capitalise on the decency of our common sense to iron out the creases in the national fabric.Our sister state of Jamaica is known for political divisions which often affects individual towns through ‘gully politics’. The reports of this political confrontation at the local level is numerous as is the violence that can accompany it. Yet despite the intense personal rivalry of the JLP and PNP which often goes back generations, Jamaica consistently sees the peaceful transfer of power between the two parties after elections.Take a look at the swearing in of a new Jamaican Prime Minister and you will see gathered; the outgoing Prime Minister and all of the living predecessors regardless of political affiliation. This at the bare minimum displays a respect for the system of Government, the Constitution and more importantly the will of all the people. When was the last time this minute act of symbolism was present in our country?Trinidad and Tobago is possibly the Caricom state that closest resembles our diversity and recent colonial history. The pages of Trinidad and Tobago’s history contains the evidence of political agitation and the current disagreements between the PNM and the UNC often mirrors our own. Yet like Jamaica, in recent history Trinidad and Tobago have seen peaceful transfer of power from one political group to another and back again.What is our problem? Are we so engrossed with political differences that we can no longer be civil as the bare minimum? We go overseas and deck our halls with our nationalism but at home we are ashamed of it, we disown it. How can we be part of a country when we see ourselves and our identities distinct from it?We have forgotten that ours is a history of struggle, hard work, determination, and dynamism. The illustrious history of our culture is carried on the shoulders of all our peoples. Each group has contributed something to make this piece of land home. Today our ancestors must surely be ashamed of some of us and the hate we have for each other.As a person in their 20’s I can say a part of this problem is the complacency of people my age. We need to spend time understanding our history – all of it – and how our constitutional systems work. You cannot change the system if you don’t know the system. The youth have to show that the old people saying “stay out of big people business” has no place today in our society.Today we see people arguing among each other. We lack respect for each other. We judge each other by trivialities. We see each other as the enemy while our enemies circle us like vultures enjoying the self-destructive show we are carrying on.We expect PPP/C, AFC, APNU, PNC, WPA, JFAP, and WXYZ to set our houses in order and we let political affiliation become a part of our core identity. Over 50 years independent, our mentality towards each other remains colonial and divisive.The third stanza of our national anthem says:Great land of Guyana, diverse though our strains,We’re born of their sacrifice, heirs of their pains,And ours is the glory their eyes did not see,One land of six peoples, united and free.We have a lot to be proud of, if only we recognise it all. No one is going to fix our house and our problems. That task falls to all of us. We have a lush agricultural land, massive potential in water, gold and mineral wealth, the endurance to strive and make our country better and the zeal and dynamism to see that it is a success. What are we waiting for?Regards,V Hemsworth
Intellectual property loss, difficult remediation programs, and reputation damage are all possible results of a cyberattack. Major data breaches are popping up everywhere, and the costs to the U.S. economy is enormous. In 2013, a federal commission estimated a loss of $300 billion each year in intellectual property alone. The same year, an independent study performed by Ponemon Institute revealed that the average organizational cost for a data breach was upwards of $5.4 million. For some companies, an attack of that magnitude could be disastrous.Security software has been the go-to defense in the enterprise, but no matter how tight your firewall or how many anti-malware services you use, there are still cybercriminals who will find new vulnerabilities or approaches to your protected data. The ideal hardware perfect partners with many current security software offerings that improves performance and productivity, accelerates cryptography, and bolsters encryption.SoftwareThe biggest problem with security software is that the technology of the services hasn’t kept pace with the kinds of security problems modern enterprises are facing. Due to increased demand for new device support and consumerization, the IT infrastructure of most companies is expanding. This is good in many ways, but it also offers a larger playing field for hackers. For example, an unsecured device paired with unsecured wireless connectivity could mean trouble, no matter what your software security plan looks like.In addition to being slow to evolve, security software is also notorious for slowing down your employees. In this new, hyperconnected business environment, employees expect performance and high levels of usability from the platforms they use to do work. Productivity lags when there are barriers to efficiency. Not only does locking down a data center and adding layers of authentication on protected files still leave you vulnerable, it can also slows down your company’s workflow.HardwareThe complex, processor-intensive functions that many current security technologies employ can often create performance lag for users. By coupling your security software strategy with new Intel processors, you can mitigate most of this lag, creating a strong security platform with no noticeable performance decrease for users. Intel’s new approach to data protection starts with embedding security features directly into processors. New Intel Xeon, Core, and Atom processors include features that accelerate the large integer arithmetic required for public key cryptography and reduce processor loads. Additionally, these new Intel processors implement sub-steps of the Advanced Encryption Standard (AES) that accelerates execution of the AES software application while simultaneously lowering the risk of side-channel attacks.Take a Hard LineThe benefit of implementing secure hardware into your information security strategy is clear: fewer productivity bottlenecks caused by processor-heavy security software coupled with strengthened security endpoints leads to more efficient ways to meet regulatory compliance mandates.For more information on how Intel’s security-enabled processors can protect your business, please read “Protect Your Data from Prying Eyes.” Join in the social conversation, follow @IntelITCenter, and be sure to use #ITCenter.