A year after being upset in the title game, top-seeded Canoga Park won the City title and completed the first undefeated season in program history by defeating No. 2 San Fernando 3-1 in Saturday’s final at East Los Angeles College. Rojas scored the deciding goal on a penalty kick in the 53rd minute and added his team-high 32nd goal of the season in the 72nd minute. Omar De La Piedra gave Canoga Park (24-0-1) the initial lead with a score in the 23rd minute. MONTEREY PARK – Camilo Rojas, Jeffrey Quijano, Rafael Garcia and the rest of the Canoga Park High boys’ soccer team will likely go down as one of the greatest collections of talent in area history. But what the Hunters, ranked No. 2 in the nation, really wanted to be remembered as was City Section champions. Mission accomplished. “This feels great,” Rojas said. “I started to cry when the referee blew the whistle. This doesn’t compare to anything. It’s so amazing.” The Hunters took off their shirts and waved them over their heads in celebration for a drastically different scene than last year’s tearful ending. Canoga Park’s only loss last season was to Birmingham of Lake Balboa in the final. Avenging last year’s disappointment rarely left the Hunters’ minds this season and made them hungrier than ever to win before graduating 12seniors from this year’s team. “This tops all of our careers,” said Quijano, one of the few holdovers from Canoga Park’s last championship in 2004. “After last year, this is the icing on the cake, the cherry on the sundae. It doesn’t get any better than this. We really wanted this.” San Fernando (22-3-3), playing for its first title since 1973, came out equally determined. The Tigers were much improved from the version that lost 3-0 against the Hunters early in the season. The loss snapped a 20-game unbeaten streak. “They were right up there with the best teams we played this year,” said Quijano, whose team had faced prominent opponents en route to a championship at the December West Coast Classic. “They gave us a great game. We didn’t even think about the last game, they’re a different team now.” Canoga Park’s first-half lead lasted just three minutes before a corner kick set up San Fernando’s tying shot by Jorge Flores. The goal was the first the Hunters allowed during the postseason and ignited flashbacks of last year’s final, in which Canoga Park had also taken the early lead. “It felt like a carbon copy of last year,” Rojas said. “Like we were going to crumble again. But our team stepped up and pulled through.” The Hunters were shut down on several scoring opportunities before Rojas took the penalty shot that sailed into the left side while San Fernando goalkeeper Orlando Cardenas dove in the opposite direction. “I was so nervous,” Rojas said. “It’s been a great run,” Canoga park coach Jake Gwin said. “We’ll see if we can rebuild.” [email protected] (818) 713-3607 160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set!
Share Facebook Twitter Google + LinkedIn Pinterest The U.S. Department of Agriculture National Agricultural Statistics Service (USDA NASS) recently released its five-year, comprehensive survey of U.S. agriculture, the 2017 Census of Agriculture. Using that data, the Ohio Ecological Food and Farm Association (OEFFA) has published an analysis, “Ohio Agriculture: The Changing Contours of Farming,” which illustrates important trends and opportunities for growth and investment in Ohio agriculture.“The new NASS data reveals ongoing challenges, like an aging farmer population and consolidation in agriculture, but also very positive growth in the number of beginning and organic farmers, as well as an increase in farmland for the first time in decades,” said Amalie Lipstreu, policy director for OEFFA. “These trends provide data needed for Ohio policymakers to make real investments to grow the agricultural economy in the state and create jobs that contribute to community economic, environmental, and social health.”The USDA NASS census was sent to millions of farmers and sought information from any farm operation generating $1,000 or more of agricultural products.Other notable findings from the survey include:The number of women operators in the U.S. increased 27%.In Ohio, 91% of farms are 499 acres or less and the amount of leased land in farming decreased by almost 165,000 acres.Nationally, the number of conventional farmers seeking organic certification increased by almost 40%.Ohio is sixth in the nation in the number of certified organic farms and second in the nation in the number of acres being transitioned to organic production systems.“The growth in interest in organics, which is a voluntary, market-based certification program that requires a comprehensive annual farm plan, inspections, and oversight, should send a signal that organic agriculture is a viable option for improving water quality in Ohio,” Lipstreu said. “As the Governor and the Ohio Legislature contemplate ways to incentivize good management practices, certified organic production systems — which help to build soil structure and reduce runoff — need to be prioritized.”Other areas ripe for investment, according to Lipstreu, include local and regional food systems. The value of food sold directly to U.S. consumers almost doubled since the last census.“Investments in meat processing, as well as fruit and vegetable processing and distribution infrastructure can result in a huge return on investment,” she said.To access the complete report and analysis, visit https://action.oeffa.com/ohio/.
The Rise and Rise of Mobile Payment Technology Location Labs may not be a familiar name to consumers, but its services operate on the backend of many well known consumer-facing products, like AT&T’s FamilyMap and Sprint’s Family Location service.In this case, the mobile couponing service is provided by Location Labs’ Sparkle Platform, a toolkit for developers that allows mobile apps to incorporate geofencing technology into their offerings. For those unfamiliar with the term “geofencing,” it means that a developer can define a particular geographic area and then have a specific action occur when a mobile user crosses the boundaries of that area.For example, Sparkle works to power the third-party Foursquare application called Mayor Maker, an app which automatically checks you in to your favorite Foursquare venues without you having to launch the Foursquare app to do it yourself. While Foursquare is fun, and sometimes offers rewards to its users in the form of discounts or other specials from participating merchants, its focus has been more on the gaming aspects – acquiring badges, points and the honorary title of “Mayor” for the places you frequent the most.While maybe not as fun as Foursquare, coupon clipping is a more practical use of location-based services, those services which use GPS and/or other mobile tracking technologies to determine your physical location in the real world.With Cellfire, Sparkle is making “geo-targeted” coupons, as they’re called, possible – and it’s a first for the grocery store coupon industry.Using CellfireThe Cellfire mobile app is available for free from iTunes or from the mobile website at www.cellfire.com. To receive the coupons, you must first enable the Store Alerts feature – it’s not on by default. Cellfire also allows you to customize the stores and other conditions that will trigger the alerts.At present, Cellfire only works in conjunction with stores that offer customer loyalty cards as it allows you to select coupons which will then be processed at checkout when the card is scanned. Unfortunately, the list of participating grocery stores is not remarkable. There are less than 20 brands that work with Cellfire, and Kroger is the only major brand listed on Cellfire’s site.That being said, this is a new and unique use of location-based technology which can provide real value to consumers. The challenge now is getting more brands on board to make it useful to a larger group of shoppers. Tags:#Location#marketing#mobile#Real World#web Why IoT Apps are Eating Device Interfaces sarah perez What it Takes to Build a Highly Secure FinTech … Role of Mobile App Analytics In-App Engagement Related Posts Have you ever arrived at your local grocery store only to realize that you had left your trusted stash of carefully clipped and saved coupons at home? That may no longer be an issue with today’s launch of geo-targeted mobile grocery coupons that work with mobile application Cellfire’s network of 5,000 grocery stores here in the U.S.Now, instead of browsing through the newspaper for coupons to clip, you can opt to receive a real-time alert on your mobile device of the coupons available to you, as you enter the grocery store itself.The new service is made possible thanks to a ?partnership between Cellfire, a mobile couponing application, and Location Labs, providers of a location-as-a-service platform.Beyond the Check-in: Location Gets Practical
IT + Project Management: A Love Affair Securing a Bring Your Own Device (BYOD) program means more than hoping endpoint authentication will keep out the bad guys.BYOD security is a big deal. In 2012, Intel surveyed 3,000 IT decision makers and 1,300 end users from Australia, Germany, South Korea and the United States to better understand their BYOD challenges. In three of the four countries, IT Managers considered a lack of security features the most important factor inhibiting device adoption. German IT managers ranked it second, after only government compliance. Massive Non-Desk Workforce is an Opportunity fo… Lead image courtesy of Shutterstock. ReadWrite Sponsors Tags:#BYOD#BYOD Grows Up#cybersecurity#Intel#mobile#security BYOD may be inevitable, but the security concerns around it are well-founded. Some of IT’s top BYOD security issues are beyond the ability of software-management tools to handle alone. These includeUnlicensed Software: Owner-installed applications on personal devices can violate enterprise license agreements, and others could compromise the integrity of your network.Unsecured Third-Party Connections: All smartphones and most tablets can connect to unsecured wireless networks, offering an unmonitored back channel.Malware: Devices can become infected outside the firewall through non-work usage.Rooted Devices: By gaining root access to mobile devices, users can bypass security restrictions and, in some cases, install rogue apps.Lost, Stolen, Or Damaged Devices: When devices disappear or go out of service unexpectedly, businesses can lose access to critical data. Furthermore, in addition to compromising local data, stolen devices can expose the entire network.Each device class and user type brings unique security challenges. To address them all, IT needs to leverage software and hardware solutions to lock down and manage devices while simultaneously securing the data itself. Here are three steps to help make the BYOD environment as secure as it can be.1: Educate EmployeesCurbing dangerous behavior is the first step toward reducing risk. Personal device management policies and procedures help reduce your company’s risk with very low cost and complexity. In a review of its own, internal BYOD program, Intel noted three types of employee education necessary to minimize risk:User Training: Training end users about the content and ramifications of the employee service agreement and sharing best practices for data protection inside and outside of the office.Security-Desk Training: Training the Help Desk to answer questions quickly, efficiently, and within the allowable legal scope created by the program.Developer Training: Training developers to build secure data access and storage into their application code.With its favorable cost-benefit ratio, education is low-hanging fruit. In the IT manager survey referenced earlier, managers from all four participating countries that had begun securing their BYOD systems had most commonly implemented device management rules and an employee code of conduct. Employee education is a rewarding place to start, but – based on the fact that security concerns persist – it is obviously not a standalone solution.2. Secure Your DataTomorrow’s devices could be completely different, future applications may handle data in entirely new ways and users will always find ways to use devices inappropriately. Future-proofing your network against the unknown requires a shift from protecting devices to protecting the data they use. Encrypting and backing up data is essential, but IT should also consider other, complementary methods of making sensitive information less accessible.One popular software-based security method gaining steam in BYOD environments is the Virtual Hosted Desktop (VHD). VHD (sometimes known as Virtual Desktop Infrastructure, or VDI) creates a complete desktop image that includes an operating system, all applications and settings. The hosted desktop can be accessed from any compatible machine, and processing and storage take place on a central server. With enough network bandwidth and powerful hardware, this type of virtualized environment can combine acceptable performance with high-levels of security.For high-security environments in which manageability and recovery trump everything else, it is often the default computing paradigm. But for most BYOD workers, VHD’s drawbacks usually outweigh its advantages. VHD cannot take full advantage of all the features of local hardware, and it performs poorly on marginal networks – a major issue for remote workers. Furthermore, the desktop paradigm may break down on non-PC devices, limiting the available audience. Containerization is way to address VHD’s issues by placing native applications inside a safe zone on a device. A virtual machine manager (VMM) abstracts the container from the client hardware, boosting performance and reducing server strain by allowing client-side execution – while still improving security by isolating the container from certain functions, such as wireless network connections, USB ports or device cameras. Some virtual containers contain an entire operating system and productivity application suite, while others are purpose-built, single-function virtual devices that provide services like compliance monitoring or highly secure applications.Example showing multiple containers on a single device.IT can create or purchase containerized applications for every platform, including smartphones, providing a much broader client base than VHD. Containerized applications also run at or close to the speed of fully native applications, and caching lets users continue working through network disruptions. However, containerization can compound development and administrative burdens, and since containerized apps require client-side storage, they are inherently less secure than fully virtualized solutions.3. Use Your Hardware Selecting the right subset of hardware to support will bolster software-based security measures while lowering management costs. For example, if a company chooses to support a variety of Intel-based devices, IT could implement a 100% Windows-based environment. This would reduce the cost of developing and securing applications for different platforms while allowing IT to leverage Windows’ existing security infrastructure, virtualization tools and anti-malware. And it would still allow employees a wide choice of devices to meet their individual needs.On an application level, properly chosen hardware can augment your management tools. Mobile Device Management (MDM) software can identify devices that are out of compliance, but it has limited reach into rooted, broken, hacked or otherwise compromised systems.Chipset-level security technologies like Intel VPro (found in 3rd-generation Intel Core processors) allow MDM to reach underneath a managed device’s operating system, performing remote wipes and pre-boot virus scans, regardless of the device’s status. By providing access below the operating system, VPro allows administrators to correct problems by loading software patches and virus definitions, and its integrated support for Public Key Infrastructure (PKI) allows IT to use the devices themselves to authenticate users, removing the need for third-party software tokens or hardware-based authentication devices. Intel Anti-Theft technology extends security features such as remote, OS-independent device locking and unlocking to earlier processors, as well as newer, VPro-compatible chipsets.Finally, selecting the right hardware can make other software options more viable. For example, VHD’s biggest drawback is performance. Hardware that accelerates common virtualization tasks can mitigate that sluggishness, making the security of VHD more acceptable to users.Securing BYOD will always be a challenge, but with the right planning and proper device selection, IT can make users’ hardware work for the cause, rather than against it. Cognitive Automation is the Immediate Future of… Related Posts 3 Areas of Your Business that Need Tech Now