IT Industry Comes Together in Washington

Standard

The following was published in the Sunday, August 12, 2018 edition of Fosters and Seacoast Sunday.

CC18

As it does each year, the IT industry gathered for the annual CompTIA ChannelCon conference from July 31 through Aug. 2. This year’s event was held in Washington, D.C. and focused on “The Business of Technology.”

Unless you have been living under a rock or entirely “off the grid,” you know technology is more pervasive than ever. Every business relies on technology today and for many, it is the most important competitive differentiator that they have. The “Business of Technology” encompasses every aspect of the information technology industry and quite literally, every business that leverages technology to deliver their good and/or services to their customers.

More than 1,000 technology professionals attended the event in person and several thousand more participated via ChannelCon Online, a live stream of the event for those who were not able to get to DC. ChannelCon is a unique event in the technology industry as it is not sponsored by any vendor. As the industry’s nonprofit trade association, CompTIA is in a unique position to give all organization an even playing field on which to participate. Tracks included things like BizTech, field trips, future trends, IT Pro, networking events, a technology vendor fair, vendor education, community meetings and general sessions. As I’m sure you would expect, the sessions were packed with insight into the future of the industry as well as reflections on where we have been and where we are at present.

The conference was keynoted by Four-Star General Stanley McChrystal, former commander of U.S. and International Forces in Afghanistan. At first glance, you might not think there is a lot of commonality between fighting terrorists and business, but Gen. McChrystal drew some impressive parallels of how adaptability and technology allowed JSOC, the Joint Special Operations Command to be become a modern hybrid model that leveraged technology, trust and a common purpose to confront one of the most difficult adversaries they had ever encountered.

They leveraged technology to connect ever member of the command, no matter what their role or physical location and it transformed their ability to deliver on their mission. The parallels to business communications, processes and technology were quite clear.

Another key theme that was present throughout the conference was the changing ways that technology is procured and implemented. Technology decisions are no longer the sole domain of the senior executive in charge of information technology. Many decisions are now made at the business unit or functional level within a company. Consultants, managed service providers and the technology vendor themselves, all need to be engaged with the right people within their customers organization. Only with this deep level of engagement, can the end customer ensure that they are getting the best advice, products and services to help them accomplish the business outcome they are seeking. This is a shift in how business technology has historically been consumed and managed. This is what the “Business of Technology” is all about.

I sat in on several sessions throughout the event and one that really stood out was a meeting of the Joint Advisory Councils. This group comprises senior executives in the technology industry representing companies from established and emerging technologies. They presented several infographics covering topics as diverse as how drones are being used in businesses, to how technology is allowing the development of “smart cities,” the evolution of software consumption and licensing models and more.

And of course, there was plenty of talk about cyber security. You can’t talk about technology without getting in to a discussion about security, for good reason. As a trade association, CompTIA has some very insightful research and other resources to help its members address the cyber security concerns of their customers.

Attendees also had the opportunity to learn about the products and services offered by more than 150 vendors who had a booth at the Technology Vendor Fair. Unlike other industry events, CompTIA levels the playing field, providing each exhibiting vendor with the same size booth from which to make their pitch. It allows attendees to very objectively survey the technology landscape, learn about new and established vendors alike and ensure that the services that are brought to market are best-in-class.

The IT industry shined bright in DC. These are exciting times and new technologies continue to come to market that will truly revolutionize our lives. It’s a privilege to work in such an exciting business and be part of a great company, Onepath and a member of a fantastic organization, CompTIA.

Great Fun with a Great Business Partner

Standard

Thank you to our partner, Intermedia and our partner manager, Nancy McDevitt for a great time last evening.  We took several of the Onepath northeast team out on Portsmouth Harbor Cruises the Heritage for a sunset harbor cruise.

The weather could not have been more perfect.  We sailed the back channels of Portsmouth Harbor to New Castle Harbor and out into the Atlantic.  We circled back and came back to port through the mouth of Portsmouth Harbor and back to the dock.

It was a nice celebration of a great business partnership.  It’s really nice when relationships work like this.  We’ve got each others backs and have a genuine interest in working together, as one team, delivering best of class solutions to our mutual clients.

Here are some pictures from the cruise to enjoy (hover on each picture for a description or click on the first one and scroll though the images to read the complete description)…

 

CompTIA World Fall 2018

Standard

At CompTIA‘s annual ChannelCon 2018 last week, the latest edition of the CompTIA World magazine was released.  The Fall 2018 edition is the fourth edition of CompTIA World.

It features a profile of Victor Johnson, CompTIA Member of the Year.  Victor shares his inspiring story in print.  He also gave one of the best and most sincere speeaches I have ever heard from the main stage at ChannelCon 2018 last week in Washington, DC.

I am honored to have been interviewed for a piece in this latest edition of CompTIA World.  You can access the article here.  While you are there, check out the entire edition.  It’s a great read and an excellent publication for the IT industry.

CompTIAWorld Fall 2018.jpg

ChannelCon 2018 is Here!

Standard

The first week of August each year is one of my favorite weeks of the year.  It’s when CompTIA members gather for the annual ChannelCon IT industry conference.  ChannelCon is the most valuable event I attend each year.

CC18.jpg

If you are a regular reader of my blog, you know that I am highly engaged in CompTIA and a big proponent of CompTIA’s work.  The key to this organization is the diversity of its membership and the breadth of what this organization does in the IT industry.  This will also be my last ChannelCon as a member of the Board of Directors.  It’s been a true privilege to serve this amazing organization as a member of the Board.  I’ve had the distinct honor to serve three years as Board Chair and am finishing up my term as Immediate Past Chair.

ChannelCon brings together the best of the business for three intense days of networking and educational opportunities.  This event is not about one company or one technology, it’s about the entire IT industry, from A to Z, from the Channel to upstart business application vendors, from certified IT professionals to drones, small cities and emerging technology.  It’s about educational opportunities to provide insight into where the indsutry is heading and what any business in the IT industry needs to be aware of to remain relevant in one of the most dynamic and ever changing industries in the world.

It’s also about philanthropy and giving back.  From the Creating IT Futures Foundation, that helps all manner of individuals gain access to exciting careers in technology to the Advancing Women and Advancing Diversity Communities that are striving to break through artificial barriers in our industry.  It’s also about helping our colleagues improve themselves and their businesses, based on real world experience, in the field.

From household name technology brands to the newest startup in the field, over one thousand professionals will be in DC this week, talking about the Business of Technology and the bright future we all have ahead of us.  Here’s to a great week.

Tech Talk: Sextortion is the Latest Email Scam

Standard

SextortionThe following article was published in today’s editions of Foster’s and Seacoast Sunday.

The headline is racy, Sextortion. It’s the latest email scam circulating the internet and it certainly raises some eyebrows and causes anxiety for many recipients. The good news is it’s an email scam that sounds a lot worse than it is.

Here’s how it works. You receive an email with a subject containing a username and password you are either currently using or have used in the past. The message goes on to say that you recently visited an adult website and while you were there, the sender of this email installed malware on your computer. This malware allowed them to take control of your webcam and record you. Unless you agree to send a ransom in Bitcoin, the sender threatens to release the videos they have of you and the adult websites you have visited to your contact list.

The sender also employs a little odd humor, commenting on your good taste in adult videos you watch. That aside, there is nothing funny about this. This scam plays on your sense of privacy and prudence. It attempts to shame you into paying a ransom to protect your reputation. It’s just the latest example of extortion attempts via email.

So where are the bad guys getting your username and password? The first thing to confirm is whether the password is one you use currently. It may be. It may also be one you have not used for years.

So where are the bad guys getting your username and password?  The first thing to confirm is whether the password is one you use currently.  It may be.  It may also be one you have not used for years.  Most security researchers believe that the usernames and passwords are being obtained from databases on the Dark Web that have millions of compromised credentials, gathered from numerous data breaches that have taken place over the last ten or more years.  The problem is that many people don’t change their passwords often or use a unique password for each site you need a login for.  So, it’s quite likely that the password may still be in use, on at least some of the web sites that you visit.

The good news is there are no reports that anyone has actually had the threats in the email carried out. But the threat is what gets people to take action and in some cases, actually pay the demanded Bitcoin ransom. You should never do this as it just fuels these scams. All indications are this is an automated scam, mining data on Dark Web and crafting these email messages. If the bad guys behind this receive even a small fraction of the ransom they are demanding, they will make out pretty well. Don’t fall for the scam and help them make money.

So, what can you do to help protect yourself against email scams like this? Use a strong password, preferably a passphrase that consists of several words put together to create a strong passphrase that will be very difficult to hack. I recommend a bare minimum of 12 characters, mixing upper and lower case letters, numbers and symbols. Don’t use the same password on more than one website. This is probably the most difficult thing to do, with all the username and password combinations you have. If you struggle with this one, look into a password manager to help you manage all the usernames and passwords you have. If you are not familiar with password managers, Google them and read user reviews to see if one may be good for you. Also, be sure to enable two factor authentication whenever it is an option, to further secure your logins.

Most importantly, if you get one of these messages, don’t panic and absolutely do not reply or send the ransom. The worst thing you can do is engage in an exchange with a hacker like this. Or pay them.

Surviving a Crippled Smartphone

Standard

While on vacation this week, my iPhone X developed a perplexing and crippling fix-iphone-x-unresponsive-screen-498x800problem.  My wife and I were walking down the beach, taking pictures from time to time with my phone.  I had it in the back pocket of my swimsuit and I was not wet, nor was the phone.  I would take it out of my pocket, tap the camera widget on the lock screen, take a picture and put it back.

One time doing this, the widget was greyed out, as if the camera didn’t exist.  At the same time, I noticed that the touchscreen was completely unresponsive.  I was unable to unlock the phone using Face ID, nor was I able to tap in the passcode to manually unlock it.  Not thinking much more that the phone was acting up, I used the camera app on my Apple Watch to take pictures of things we wanted to capture as we walked.  Sure enough, that worked and the photo’s uploaded to iCloud as I could see them on my iPad and PC.

But the touchscreen would not work.  Multiple soft resets would not resolve the issue.  I was unable to hard reset the phone as I could not connect to iTunes on my PC because I was not able to acknowledge the prompts on the screen.  The iPhone X was unresponsive, except it was working.  I just couldn’t control it at all.

The next morning, I went to local Verizon store, hoping they would be able to hard reset it and perhaps bring it back to full functionality.  Unfortunately, they could not and my only option was a warranty replacement.  If I had been close to an Apple Store, I would have been able to go there and get it replaced the same day.  Unfortuantely, I was not and was heading home the next day, so opted to have Verizon overnight me the warranty replacement.

Fortunately, becuase I have an Apple Watch and an iPad, I was able to limp along while I waited for a new phone to be overnighted to me under warranty.  I could take calls and send and receive texts on either device.  Takeing calls on the Apple Watch is still a little humorous and definitely gets interesting looks, but it works.  I was also lucky, because the iPhone still paired to my car and I was able to operate it using the steering wheel controls to make and take calls on the drive home, to meet my new iPhone, which is now easily up and running thanks to iCloud backup restoring nearly all of my apps and settings.

About the only thing I was not able to do was receive pictures and videos via text on the Apple Watch.  When those would come in, it would tell me I needed to view the message on my iPhone.  That wasn’t happening, so I had to wait to get back to my iPad on WiFi, but all in all, for a pretty crippling event, I was able to stay in touch and functional and was back to full operation in under two days.  Not bad.

Sextortion, the Latest Email Scam

Standard

sextortion-caution-signHave you received an email with your password in the subject line?  If you have, you may be the latest victim of “sextortion,” the latest email scam making its way around the internet.

Here’s an example of what the email you may receive might look like:

Subject: yourusername – yourpassword
I am well aware yourpassword is your pass. Lets get straight to point. You may not know me and you are probably thinking why you’re getting this email? Not one person has paid me to investigate you.
actually, I installed a malware on the X videos (pornography) web site and guess what, you visited this web site to experience fun (you know what I mean). While you were watching videos, your internet browser initiated operating as a Remote control Desktop that has a keylogger which provided me accessibility to your display screen as well as cam. Just after that, my software obtained your entire contacts from your Messenger, Facebook, as well as e-mail . After that I created a double-screen video. 1st part shows the video you were viewing (you have a nice taste : )), and 2nd part displays the view of your cam, & it is you.
You got only 2 choices. Let us explore these types of choices in aspects:
1st solution is to just ignore this email. In this situation, I will send your actual recorded material to every one of your contacts and just consider about the awkwardness you can get. And consequently if you are in a committed relationship, how it will affect?
In the second place alternative should be to compensate me $7000. We are going to call it a donation. Then, I most certainly will asap remove your video recording. You can keep on your life like this never happened and you will not ever hear back again from me.
You’ll make the payment through Bitcoin (if you don’t know this, search “how to buy bitcoin” in Google).
BTC Address: 1MVikLH1GbsvYa8bXVGScgZLXP1tVNH9o4
[case-sensitive so copy & paste it]
Should you are planning on going to the police, anyway, this email message cannot be traced back to me. I have taken care of my steps. I am not attempting to demand a whole lot, I simply want to be paid. You have one day to make the payment. I have a unique pixel within this e-mail, and at this moment I know that you have read through this e-mail. If I do not get the BitCoins, I will, no doubt send your video recording to all of your contacts including family members, co-workers, etc. Nevertheless, if I receive the payment, I will destroy the recording right away. If you want proof, reply Yea! then I will send your video recording to your 7 friends. This is a nonnegotiable offer and thus do not waste mine time and yours by responding to this e-mail.

Despite the dire warning, this is a harmless scam.  The sender is trying to intimidate you into sending them a Bitcoin payment, plain and simple.  Numerous, credible security researchers have determined that the hackers of getting your username and password from databases on the Dark Web that sell stolen credentials.  In some cases, these passwords may be years old.

You can check to see if your information has been exposed on the Dark Web by checking the Have You Been Pwned? web site.  The link is to a post I wrote about that some time ago.

If you get a message like this, delete it and ignore it.  This is just the latest email scam going around, but due to its selatious nature, it’s garnering a lot of concern.

The following is an email alert the Onepath, my employer, put out earlier today on this matter.  There are some prudent recommendations in this message, to help maintain your online safety.  Stay Safe Online!

Onepath Alert

We have become aware of a new scam making the rounds that we want to alert you to.  You or your colleagues may receive an email that includes a password that you may currently use or have used in the past. This email may make reference to you having visited an adult web site or that the hacker sending the email may have installed malicious software on your computer. In some instances, the email may also state that the hacker has activated your webcam and captured video of you. The email will ask you to pay a ransom, in Bitcoin, to avoid any embarrassing information about you being leaked to your contact list. Rest assured that this is a scam. At this point in time, Onepath is not aware of this being a valid threat.

Research suggests that this is just the latest type of automated email scam that seeks to scare the recipient in to making a payment. Onepath urges you to never make payments to hackers as a result of an email like this. Multiple security researchers feel that the password emailed to you was obtained from a database of hacked passwords that were obtained from one of the large hacks that have taken place over the last several years. In other words, this is not a current threat. That said, we still recommend you do the following, to help ensure that your accounts are as safe as possible:

  1. Do not use the same password across multiple online accounts.
  2. Instead of a password, consider using a passphrase, a collection of words and make them complex, replacing letters with numbers and symbols and mixing upper and lower case.
  3. Where you can, enable two factor authentication to further protect your account.
  4. Consider use of a password manager to make managing your online accounts a bit easier and more secure.

Onepath recommends that our clients have an information security game plan that focuses on the following:

  1. Take steps to protect your company, customers and suppliers data.
  2. Regularly discuss data protection and system access with your employees.
  3. Implement incremental steps to mitigate data breach and system access risk in your environment.

Your Onepath Client Engagement Manager can help evaluate your present security posture and recommend testing and training solutions to help your employees maintain a proactive defense against many threats. Onepath’s Information Security Division also provides a full suite of services that can assist you with the development of a more complete security game plan. If you have any further questions please contact your Client Engagement Manager.

logo-onepath
978.683.9100
www.1path.com

A Labor of Love

Standard

If you regularly follow my blog, you know I love technology.  You know that I also post an occassional personal thought and in this post, I’m combining both.

My wife Jennifer Shoer is a professional genealogist.  Her business, Reconnecting Relatives, helps answer questions that families have been asking for generations and reconnects lost family members with one another.  This is her labor of love, as technology is mine.  The most important thing I do, is support her research and be sure her technology is always doing what she needs it to do.

Technology has had a huge impact on the world of genealogical research.  The digitization of centuries of records, some becoming available for the first time since the end of the Cold Way, has revolutionized this research and lead to discovers that have impact beyond words.

My cousin Michael Shoer is another member of my family who has had the good fortune to pursue labors of love, first from his impressive career on the ground floor of CNN to his latest venture, Creative Word and Image, Inc. in Atlanta and his @boomzoom video channel on YouTube.  Michael creatively leverages technology to bring important messages and stories to life in effective ways.

Michael and Jennifer recently leveraged video technologies to bring an incredible missing piece of our family history to not just our family, but the world.  The ability to find this missing evidence was a breakthrough that Jennifer has been working on for years.  It’s an amazing discovery that has brought joy and sadness to our family in a profound way.  Most importantly, technology has allowed Michael and Jennifer to preserve this important historical record for generations to come.

This is why we all love what we do…

Look Out Slack, Here Comes Teams

Standard

The following was published in the Sunday, July 15 editions of Foster’s and Seacoast Sunday.

Microsoft-Teams-vs-Slack

Several months ago, I wrote about new workplace communication tools, namely Slack. Slack is the market leader in this space, but Microsoft, true to form, is coming on strong with its tool called Teams. At the time I wrote the original article, Slack really owned the market. Fast forward five short months and the scale is swinging toward Teams.

So what is Slack and Teams? These are commonly referred to as workplace collaboration tools. Slack, from their website, says it is “Where work happens. When your team needs to kick off a project, hire a new employee, deploy some code, review a sales contract, finalize next year’s budget, measure an A/B test, plan your next office opening, and more, Slack has you covered.”

The Teams website is “The hub for teamwork in Office 365. Communicate through chat, meetings and calls. Collaborate together with integrated Office 365 apps. Customize your workplace and achieve more. Connect across devices.”

These tools are hubs of information and collaboration. They are places where people communicate in groups or teams, share information, use collaborative applications to drive productivity, host meetings, make voice and video calls and store information. This can be done in small groups of people, between departments, publicly, privately and most importantly securely.

Slack was first to market and Microsoft has followed with Teams. While the tools themselves are becoming more similar than different, Slack had a clear edge with its broad integration with a wealth of other apps that many businesses use. This integration allowed users to collaborate in one place, across multiple apps, projects and discussions. Initially, Teams lacked these same integrations, but that has changed. Teams now has as broad a set of integrations as Slack and because Microsoft includes Teams in all of its business Office 365 subscriptions, it has millions of users, almost overnight.

If you are a Microsoft Office 365 subscriber, you have Teams. If you are not using it yet, you likely will be soon. Skype for Business, Microsoft’s popular business chat, voice and video service is also bundled with Office 365 and had a very large subscriber base from before Microsoft’s acquisition of Skype several years ago. Skype for Business is being merged into Teams so if you are a Skype for Business user, you will eventually become a Teams user. Microsoft is not yet forcing this transition, rather allowing you to continue to use Skype for Business while you explore and plan your eventual transition to Teams.

One of the main benefits users tout for these platforms is the reduction in email volume. Instead of lengthy email exchanges, with people being added and removed from replies and topic being equally added and removed, these platforms organize these conversations into distinct threads. By moving conversations into these collaboration platforms, you remove the immediacy of interruption that is often associated with email. You are able to more finely control your alerting preferences and when and how you want to consume the information. You can share and collaborate on documents, spreadsheets and more, while maintaining more control over the original file and keeping the spread of the file living in numerous places.

With support for voice and video calling, these hubs become a single tool for all manner of communication within the business. Extensive search capabilities make finding current or past information far simpler than searching through email and server folders. Rich auditing and tracking as well as discrete permissions management also means you can control the flow of information and restrict access, to keep information secure.

If you have not yet looked into these collaboration tools, you should. Check out Slack at www.slack.com and Teams at www.microsoft.com/teams. You’ll be glad you did.

Roundup of Informative News

Standard

Here’s another roundup of some really informative articles that have been published on the Onepath web site.  I hope you will check them out as there is some truly great content here from some real industry luminaries.  Let me know what you think of these pieces.  We love feedback and knowing what we’ve done well and what you are interested in learning more about.  Enjoy!

The Business Side of Cybersecurity – Keynote Presentation to Georgia Construction Conference
Given by Greg Chevalier

InfoSec

With all the big companies in the news for data breaches or other cyber security “incidents,” does the average mid-size business really need to worry about cybersecurity?  In his keynote presentation to the 2018 Georgia Construction Conference at the Cobb Energy Centre in Atlanta last week, Greg Chevalier helped a group of finance and operations executives understand the answer is a definitive “yes,” and not just to protect yourself directly, but also indirectly through your trading partners.

Network traffic has grown rapidly; your cybersecurity needs to evolve with it.  Network traffic has grown exponentially over the last 20 years, driven not just by the adoption of smartphones and laptops for personal use, but by the explosive growth of machines on the network.  Not just servers, but firewalls, edge routers, webcams, wireless access points, vending machines and thermostats.  Each of these devices presents something that needs to be either protected or potentially defended.  In the ‘90s, intrusion prevention systems were largely sufficient to deal with the individuals who may be bad actors trying to attack a manageable number of machines using fairly common security frameworks.  But with the rise of so many different machines on the network, the number of security frameworks has grown just as fast.  This means your cybersecurity has to now solve for an exponentially greater number of potential issues than 10 years, or even 5 years ago.  As a business executive, you have to consider when was the last time you made a meaningful update to your IT security infrastructure?  In response, various industry groups and regulatory bodies have developed security regulations such as PCI (payment cards), HIPAA (healthcare), GLBA (banking), FINRA (financial services) as well as industry standards such as ISO 27001/2, SOC Type I/II,III, and NIST CSF to help companies keep their data and their networks secure. [Continue reading…]


MeetingSpace.jpg
10 Ways to Improve Your Conference Room Meeting Experience
By Michael Lane

The first 10 minutes of a 30 minute meeting all-too-often look like this:

“How do we connect my laptop to the TV?”

“Can someone get Sarah? She knows how to turn on the projector.”

“I think I have the wrong meeting link; here let me find that in my email.”

“While I’m looking, can someone go ahead and dial us in on the speakerphone?”

“There we go. Can everybody hear me? No? Here, I’ll slide over closer to the microphone.”

By the end of the meeting, you may not even realize you’ve run out of time until someone pops their head through the doorway because they’ve booked the room for the next block of time, and now you’re delaying the start of their meeting.

$37 billion dollars is lost annually to poor meetings, according to the U.S. Bureau of Labor Statistics.

Audiovisual (AV) has changed from a speciality area to a business-critical application. Businesses need to interact with remote workers, remote clients, and remote vendors, so presentation and collaboration technology is increasingly part of how we communicate. AV equipment is therefore becoming as central to running your business as other communications like phone or email. The shift to AV being business-critical in nature has in turn created a demand for reliable, sustainable, and repeatable AV solutions. [Continue reading…]


AtlantaAttack.png

Q&A: What Can We Learn from the Atlanta Cyberattack?
By Patrick Kinsella

In light of the recent and ongoing ransomware cyberattack affecting the City of Atlanta’s IT systems, we sat down with Onepath’s Senior VP of Engineering and Technology Patrick Kinsella, to get his perspective on the events of the last week. The ransomware attack began on Thursday, March 22, and affects almost half of the city’s systems, from Municipal Courts to Watershed Management. On Tuesday, March 27, city employees were advised to turn their machines back on. By Friday, a few systems were slowly starting to come back online, but a couple were still not back up.

Q: What is ransomware?

A: It’s the information technology version of someone breaking into your home, locking you out of it, and demanding a ransom to regain entry; all the while you hope your belongings are intact when you’re able to return. In the IT world, the items behind held captive could be personal health information (PHI), or other personally identifiable information (PII), which may actually belong to your business’s customers or stakeholders.

Q: When a ransomware cyberattack happens, what are the first things a business, or in this case a city, usually does to respond?

A: The first thing is, do everything you can to stop the bleeding. You determine what you need to shutdown, and what backups need to be stopped from running to avoid poisoning the last good copy, assuming you’ve been diligent in running backups. In a different incident, for example, Hancock Health shut everything off after being hit with ransomware—computers, backup scripts—within 90 minutes. For the City of Atlanta, they seem to have followed that procedure as well. [Continue reading…]


CSSAT.png

Onepath Launches Cybersecurity Self-Assessment Tool
Created by our Web Dev Team

Onepath has created a cybersecurity self-assessment tool to help businesses establish a baseline of their current security level and posture. The questions are around the basics – the blocking and tackling needed to establish an information security foundation. It may be just a start, but it could be that critical first step you take to get your business on a path toward cyber protection. [Take the assessment…]