October 30, 2014

Insider Threats – the myth of the black swan
Obviously, the average impact of insider threat cases does not tell anything about their overall frequency. Even if an average case is less than $50,000 in cost, when these low-profile cases happen on a daily basis, the cumulative loss will be very significant for most companies. And this says nothing for reputation lost, which is difficult to measure. As we have seen in previous posts of this series, the threat landscape broadens and diversifies with new BYOD policies, reduced and changing employee loyalty to employers, and higher employee churn rates create a large gray area of threats that include unintentional misbehaviors, violation of policies, and minor thefts.


A CIO's guide to the future of work
It can seem like a no-win situation, yet organizations can clearly not do nothing, and in fact, most realize they must do far more than they have until now. The net result of all of these trends and forces is that most organizations are busy undergoing some form of large-scale 'digital transformation.' A recent study by Altimeter found that 88% of the organizations they studied are in middle of such change efforts already, with social media, mobility, and information discovery as key elements of the process for more than half of respondents.


Private Links to Cloud Now Fastest Growing Business Segment
Private cloud connection services like AWS Direct Connect or Azure ExpressRoute were designed to address this problem. Through them, colocation providers like Equinix, CoreSite, TelecityGroup, and Datapipe, among others, can link their enterprise customers’ servers to the cloud data centers privately, bypassing the Internet altogether. In addition to colos, the cloud providers also partner with network carriers, which exponentially increases the amount of data centers around the world that can connect customers to the public clouds privately.


The Interdependence of Technology and Culture
Yes, technology will cause new challenges and further problems. Human creativity will use once again technology to solve those, not a methodology or legislation that restricts and demands safety and conformity. There is no need to fear technology as long as enough humans have the freedom to choose in a democratic environment. Technology that empowers will free the employees minds and unlock creativity and innovation. The same free minds will mostly use freedom to do the moral thing. No matter what your opinion is on the subject, the evolution of technology is tightly linked to our own.


Does NoSQL = NoDBA?
Many companies will keep their relational databases for applications like OLTP where the level of data persistence is, by default, very high. At the same time, when new needs arise because of Big Users or Big Data, revolutionary apps or cloud-based offerings, they’ll think non-relational. And in some cases, both will be chosen. A relational database, for example, is an expensive way to store data, so lots of people will use, say, Hadoop to store the raw data and then process into a relational database for fast service and interactive queries. So it’s actually not a question of SQL or NoSQL, it’s more one of SQL and NoSQL.


UK cyber threat sharing ahead of target, says Cert-UK
Initially, the remit of CISP was to focus on technical network-level defender issues for large organisations, but that is now being broadened to include small and medium enterprises (SMEs). “This means that, in addition to technical information, we are now also pushing out more general information aimed at raising the level of awareness around cyber security topics,” said Gibson. For the September Nato Summit in Wales, Cert-UK set up a CISP-style node for all those involved in the event, from Nato’s incident response teams down to the hotel where the summit was being held.


Flipboard’s latest update integrates Zite’s tech to make you fall in love with digital magazines
The updated Flipboard addresses the problem of finding the best digital magazines by first asking you to select a handful of topics you’re interested in. When you start reading content based on a particular topic, Flipboard will then suggest other topics to follow and related magazines worth checking out. The idea, McCue told me, is to slowly refine how Flipboard delivers and recommends content by occasionally prompting you to follow or favorite the stuff you enjoy.


Facebook gives away homebrewed OS monitoring tool
The tool, called Osquery, allows administrators to run SQL-based queries on operating system characteristics stored in a high-performance database, collecting data such as running processes, loaded kernel modules and open networking connections, wrote Mike Arpaia, a Facebook software engineer. In the last few months, Facebook let other companies try Osquery after "it became clear to us that maintaining insight into the low-level behavior of operating systems is not a problem which is unique to Facebook," he wrote.


CIO relationships and priorities remain conflicted
A closer look at the data raises concerns about the CIO’s ability to achieve the promise of those good intentions. Although 70 percent of respondents say their organization has maturity in delivering business outcomes, only 55 percent prioritize this goal. Likewise in the next dimensions, enhancing customer experience and building a more agile IT delivery model. ... It is interesting to compare relationship importance to relationship quality, in the above diagram. We see that the CIO does not have a “very good” relationship with the CEO, CFO, or COO even though CIOs report these relationships as “very important.”


Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
Here’s how the attack worked in the case Shape observed: The hacker first set up an anonymous Gmail account, then infected a computer on the target’s network with malware. (Shape declined to name the victim of the attack.) After gaining control of the target machine, the hacker opened their anonymous Gmail account on the victim’s computer in an invisible instance of Internet Explorer—IE allows itself to be run by Windows programs so that they can seamlessly query web pages for information, so the user has no idea a web page is even open on the computer.



Quote for the day:

“The value of a man resides in what he gives and not in what he is capable of receiving." -- Albert Einstein

October 29, 2014

Google Developing Disease Detection Pill
"Nanoparticles are the nexus between biology and engineering, so we can make these nanoparticles behave in ways that we want them to," Conrad explained. "Essentially, the idea is simple: You swallow a pill with these nanoparticles, and they're decorated with antibodies or molecules that detect other molecules. They course through your body, and, because the core of these particles are magnetic, you can call them somewhere... And you can ask them what they saw."


From Wearable to Invisible Technology
One of the big players in this school of thought is a company called MC10. MC10 has been working for almost 10 years to create BioStamp and Checklight. These are tiny, wearable devices that come with wireless capabilities, sensors and a number of other features. In BioStamp’s case, the device isn’t so much worn as it is stuck right on the body. Because of it’s flexibility, it can be worn like a temporary patch, or bandaid. Athletes could use something like this to closely and accurately monitor their heart rate and breathing patterns during physical exercise. The device could even track how their muscles respond to different training and what seems to be most effective or most damaging.


Joining up is hard to do
Just as full integration is impossible at a system level, it is also unlikely at an organisational level. Advocates of integrated solutions are often guilty of the merger illusion, namely that putting functions together in the same organisation is sufficient to make sectionalism subside. But as anyone who works in a large organisation will attest, the fact that managers share the same employer and use the same front door is pretty much irrelevant to whether they put corporate, customer-focussed interests above departmental, producerist ones.


Is it Enterprise Architecture or Wall Art?
The thing you have to be careful of is that if you see your markets disappearing, if your product is outdated, or your whole industry is redefining itself, as we have seen in things like media, you have to be ready to innovate. Architecture can restrict your innovative gene, by saying, “Wait, wait, wait. We want to slow down. We want to do things on our platform.” That can be very dangerous, if you are really facing disruptive technology or market changes. Albert Camus wrote a famous essay exploring the Sisyphus myth called “The Myth of Sisyphus,” where he reinterpreted the central theme of the myth.


Tech Support’s NSFW Problem
One big concern: As McAfee Labs warns in its 2014 Threat Predictions report, "Attacks on mobile devices will also target enterprise infrastructure. These attacks will be enabled by the now ubiquitous bring-your-own-device phenomenon coupled with the relative immaturity of mobile security technology. Users who unwittingly download malware will in turn introduce malware inside the corporate perimeter that is designed to exfiltrate confidential data." Today's malware from porn sites is usually not the kind of spyware that's dangerous to enterprises, says Carlos Castillo, mobile and malware researcher at McAfee Labs -- but that could change.


Top 10 Cloud Myths
"Cloud computing, by its very nature, is uniquely vulnerable to the risks of myths. It is all about capabilities delivered as a service, with a clear boundary between the provider of the service and the consumer," said David Mitchell Smith, vice president and Gartner Fellow. "From a consumer perspective, 'in the cloud' means where the magic happens, where the implementation details are supposed to be hidden. So it should be no surprise that such an environment is rife with myths and misunderstandings." Even with a mostly agreed on formal definition, multiple perspectives and agendas still conspire to mystify the subject ever more.


Five ways to make identity management work best across hybrid computing environments
The idea of holistic management for identity is key. There's no question about that, and something that we'll come back to is this idea of the weakest link -- a very commonly understood security principle. As our environment expands with cloud, mobile, on-prem, and managed hosting, the idea of a weak point in any part of that environment is obviously a strategic flaw.  As we like to say at SailPoint, it’s an anywhere identify principle. That means all people -- employees, contractors, partners, customers, basically from any device, whether you’re on a desktop, cloud, or mobile to anywhere.


Is US Tech Policy Ready For A Zombie Apocalypse?
One Delaware law seeks to solve this problem by allowing all digital content to be passed along to family members after death. However, because eBooks on Amazon and movies on iTunes aren't owned, but rather licensed, these digital goods can be passed on only to the extent allowed by end-user licensing agreements. These agreements handle transfers differently.Apple's EULA defers to California law, while Amazon's and Google's EULAs don't allow for any transfer. Therefore, many state laws (such as Delaware's) will have little effect. Federal legislation is needed to put this issue to rest.


Cloud Sprawl: The Problem of Too Many Clouds
Believe it or not, this is actually becoming a bit of a problem. Administrators are working with a very new technology and are beginning to expand their WAN (or cloud) presence far beyond what they originally thought would be possible. IT consumerization has been the main driver behind this push as has been the demand for more distributed computing systems. Unlike virtualization or even desktop sprawl, administrators have the opportunity to get control of the cloud environment sooner rather than later.


How SOA Governance (and SOA Management) Should Actually Be Done
Organizations do have well-defined separation of governance and management functions in general, but this wisdom seems to be absent when dealing with SOA. After all, the board of directors and the executive management team look at the “what” and “how”, respectively, of everything the organization does. Similarly, project steering committees and working groups do the same at lower levels. So what about SOA governance (and SOA management)? Why is there so much confusion and conflation between these two functions? Shouldn’t it be just a simple matter of extension, based on what we know about SOA and about the functions of governance and management?



Quote for the day:

"The man who complains about the way the ball bounces is likely to be the one who dropped it." -- Lou Holtz

October 28, 2014

Speedboats Race with the Cloud
Gary Barnett, an analyst with Ovum, said this is a great idea, not just for SilverHook, but for other racing outlets. "It's definitely an interesting use of the cloud, for sure," he said. "And in the context of racing, this is really significant. In Formula 1 racing, the ability to get real-time data from the car to the engineers during a race has become crucial in winning races.... The big benefit of basing this on cloud infrastructure is the idea of what's next? Having designed the solution this way, SilverHook can easily add another boat or boats. They just scale the infrastructure to support more data."


Big Data Digest: Rise of the think-bots
Cognitive Scale offers a set of APIs (application programming interfaces) that businesses can use to tap into cognitive-based capabilities designed to improve search and analysis jobs running on cloud services such as IBM's Bluemix, detailed the Programmable Web. Cognitive Scale was founded by Matt Sanchez, who headed up IBM's Watson Labs, helping bring to market some of the first e-commerce applications based on the Jeopardy-winning Watson technology, pointed out CRN. AI-based deep learning with big data was certainly on the mind of senior Google executives. This week the company snapped up two Oxford University technology spin-off companies that focus on deep learning, Dark Blue Labs and Vision Factory.


The utopian invisibility of design and connectivity
“Eventually everything connects – people, ideas, objects. . . the quality of the connections is the key to quality per se,” Charles Eames once said. He might as well have been looking into the future and talking about today’s world of connected devices. While most companies see design in the physical dimension, there are some that understand the importance of software as part of design. But there are only a handful that actually think about the overall experience as the ultimate idea of design. Particularly for those design-neglected — Nest’s CEO Tony Fadell would call them “unloved” — products, the network connection makes you rethink the entire idea of a device.


Five Reasons Your Social Analytics Are (Probably) All Wrong
Now, social marketing measurement here means information pulled from common social media listening tools and not firewalled data from your owned channels, e.g., your brand’s own Facebook page. Ninjas among you are aware of flaws, biases and — ahem — issues inherent herein, but a majority of digital marketing analytics consumers may not be. ... So here are five non-obvious reasons to interrogate the truthiness of your current social marketing analytics dashboards, reports, white papers, assumptions, content marketing efforts, and periodic self-congratulations:


Network misdirection may help foil targeted attacks
Chang defines network topology as how devices are connected within a network, both physically and logically. "The term refers to all devices connected to a network, be it the computers, the routers, or the servers," explains Chang. "Since it also refers to how these devices are connected, network topology also includes passwords, security policies, and the like." Chang suggests altering the network's topology and security policy in ways that would make it impossible or at least hugely difficult for sleepers to obtain company secrets. Chang also recommends changing the network in ways that make the attacker's reconnaissance information obsolete.


The Three Breakthroughs That Have Finally Unleashed AI on the World
At first glance, you might think that Google is beefing up its AI portfolio to improve its search capabilities, since search contributes 80 percent of its revenue. But I think that's backward. Rather than use AI to make its search better, Google is using search to make its AI better. Every time you type a query, click on a search-generated link, or create a link on the web, you are training the Google AI. When you type “Easter Bunny” into the image search bar and then click on the most Easter Bunny-looking image, you are teaching the AI what an Easter bunny looks like. Each of the 12.1 billion queries that Google's 1.2 billion searchers conduct each day tutor the deep-learning AI over and over again.


Gartner Highlights the Top 10 Cloud Myths
"Cloud computing, by its very nature, is uniquely vulnerable to the risks of myths. It is all about capabilities delivered as a service, with a clear boundary between the provider of the service and the consumer," said David Mitchell Smith, vice president and Gartner Fellow. "From a consumer perspective, 'in the cloud' means where the magic happens, where the implementation details are supposed to be hidden. So it should be no surprise that such an environment is rife with myths and misunderstandings." Even with a mostly agreed on formal definition, multiple perspectives and agendas still conspire to mystify the subject ever more.


Alert! Websites Will Soon Start Pushing App-Style Notifications
Web pages will be able to behave much like mobile apps, says Michael van Ouwerkerk, a software engineer on Google’s Chrome team who’s working on the technology. “Once the user has opted in, Web apps will be able to provide timely information to the user without having to go through an installation process,” he says. For example, when you check your flight status on an airline’s mobile website, a single tap could subscribe you to updates on any delays. ... Tim Varner, cofounder of a startup called Roost, which offers tools to help website publishers use Web push notifications, says he expects both Google and Mozilla to release the technology for their mobile and desktop browsers within a few months.


ExpositionalArchitecture
I use the term "expositional" to emphasize the fact that these architectures are a source of interesting ideas, and they are not intended to be some kind of "best practice". For a start, I'm very wary of architectures that are set up as some kind of standard, because there are so many variables to pay attention to when building a concrete system. For example, many people stress the importance of a scalable architecture (by which they usually mean the ability to handle large amounts of load). Yet many useful systems are internal systems that never have a high load, so should be designed to support a different set of drivers.


255 terabits a second: New fiber speed record?
The innovation, described in a paper for the current online edition of the journal Nature Photonics, lies in the use of a group of seven microstructured fibers, rather than a single one. Eindhoven University of Technology professor Chigo Okonkwo, one the paper’s principal authors, said that the individual fibers are less than 200 microns in diameter. The effect was described as being “like going from a one-way road to a seven-lane highway.” Additionally, the team used two additional dimensions that can be used by data, “as if three cars can drive on top of each other in the same lane.”



Quote for the day:

"Either you deal with what is the reality or you can be sure that the reality is going to deal with you." -- Alex Haley

October 27, 2014

A CFO's View of Consumer Data
There is a difference between customer data, and customer data that is reliable and useful. Once we have the data, the challenge is knowing what to do with it. How can we integrate customer data into our traditional systems? How do we assemble it in a way that allows us to improve client media plans? We have people who can turn data into insights and strategies, but we need to give those strategists meaningful data. The challenge is in hiring the data scientists who can organize the data.


Large Russian bank, turns to big data analysis to provide real-time financial insights
From the technical perspective and from the cost-efficient perspective, there was a big difference in the business case. Our bank is not a classical bank in the Russian market, because in our bank the technology team leads the innovation, and the technology team is actually the influence-maker inside the business.  So, the business was with us when we proposed the new data warehouse. We proposed to build the new solution to collect all data from the whole of Russia and to organize via a so-called continuous load. This means that within the day, we can show all the data, what’s going on with the business operations, from all line of business inside all of Russia. It sounds great.


3 risk factors and strategies when managing data center migrations
One of the largest risks is damage to the physical hardware during shipment; damage during shipment can render backups useless. Another challenge is the physical distance between data centers may not permit this option and have services available within an acceptable period. The second strategy is to perform data migration over a leased circuit. With a leased circuit comes two sub-swing hardware options. One option is to perform a physical to physical (P2P) migration. A P2P migration involves acquiring like hardware that both the application and hardware can be migrated to while keeping downtime to a minimum.


The 15 Dos and Don’ts of App Development
You might already have a mobile or web application or you might be starting from scratch. Either way, once in the mobile and web application game you are constantly in a battle for improvement. Your business, no matter the industry or if it’s B2C or B2B, will benefit from a functionality-rich performance application. It might be gained revenue, increased productivity or improved brand loyalty. Whether you are part of the development team or responsible for the end-user experience, these 15 do’s and don’ts will help you when developing or improving your mobile application.


The Big Data Capacity Crisis
The fact remains though, that the growth in worldwide volume of data is increasingly outpacing the manufacture of physical storage space – after all it is a lot easier to generate digital data than to build devices like hard disks, optical devices and solid-state storage. Intel’s Jim Held told a conference on the matter, way back in 2010: “Walmart adds a billion rows per minute to it’s database, Youtube contains as much data as all the commercial networks broadcast in a year, and the Large Hadron Collider can generate terabytes of data per second.”


Bugs lead banks to approve fake EMV transactions
The really odd thing about this attack is that the cards that were used in the transactions were not EMV cards; the banks involved ("at least three U.S. financial institutions" according to Krebs) hadn't even begun issuing EMV cards. The transactions were submitted through Visa and MasterCard as EMV transactions without a PIN, and yet they were honored. The experts with whom Krebs spoke suspect that the thieves had control of a payment terminal and were able to manipulate fields in the transactions.


The internet of things is becoming the next cloud battleground
As it stands, the internet of things, like the web and mobile economies from which it grew, runs largely on Amazon Web Services. But there’s no guarantee the status quo will remain in place. As part of its broader home-automation plans, for example, Google is already buying up large AWS users such as Nest and Dropcam. Dropcam Co-founder and CEO Greg Duffy told me last year that his company runs “the largest inbound streaming service on the entire internet” — bigger than even YouTube. Assuming they eventually move onto Google’s infrastructure, AWS will lose both revenue and some banner use cases.


Air Traffic Control for Drones
If a drone strayed out of its approved area, for example, the system might automatically send a command that made it return to its assigned area, or land immediately. The commands could vary depending on the situation—such as how close the drone is to a populated area—or the size and weight of the aircraft, says Downey. Ultimately, NASA wants its system to do things like automatically steer drones out of the way of a crewed helicopter that unexpectedly passes through.


A guide to rapid IT Service Management as a foundation for overall business agility
It was a lesson learned by IT organizations. Today, saying that it will take a year to upgrade, or it will take six months to upgrade, really gets a response. Why should it? There's been a change in the way it’s approached with most of the customers we go on-site to now. Customers say we want to use out of box, it used to be, we want to use out of box, and sometimes it still happens that they say, and here’s all the things we want that are not out of box.  But they've gotten much better at saying they want to start from out of box, leverage that, and then fill in the gaps, so that they can deploy more quickly.


Why Some Web APIs Are Not RESTful
It’s obvious that today many web APIs are not RESTful. Nothing stops the respective companies to build such APIs, and they have been quite successful at doing so. What we do not understand is why they insist on calling them RESTful? They could coin another term. Web API could be enough. It also remains to be seen who will win in the end, if there will be a winner or rather a peaceful coexistence between the two: REST or wannabe RESTful web APIs? In a discussion with InfoQ, Tilkov expressed his confidence that REST “has more than just theoretical advantages, and in the past couple of decades, the web approach always won in the end.”



Quote for the day:

"The role of leadership is to transform the complex situation into small pieces and prioritize them." -- Carlos Ghosn

October 26, 2014

Enterprise Architecture: Single-org versus Multi-org Strategy
One of the most important decisions throughout your Salesforce journey is to decide your “org strategy.” What this really means is: “How many instances of Salesforce will you have in your company?” As a Certified Technical Architect I mostly deal with Fortune 500 companies. The larger the company the more complex this question becomes. It is one of the most foundational and architecturally significant choices that must be made – this decision will impact all future Salesforce initiatives and designs. Here are the 12 questions that I ask my clients in order to make a recommendation regarding the most appropriate org strategy:


Bridging enterprise-architecture and systems-thinking
Presentation at Open Day on Enterprise-Architecture and Systems-Thinking, London, 21 October 2104, for SCiO (Systems and Cybernetics in Organisations). This used my development-work on the Enterprise Canvas framework as a worked-example of how we might create tools to bridge the gaps between enterprise-architecture and systems-thinking, in support of organisations' needs. This slidedeck also provides a useful overview and primer for Enterprise Canvas itself.


Tutorial – NUnit and Sequence Diagram Recording in Enterprise Architect 9.3
Enterprise Architect from Sparx Systems can be a real Swiss army knife for .net developers! Most of the stuff shown will also work with a Java environment. I did already a series of blog posts around this type of topics. All of them are based around EA 8. As a lot of stuff changed since EA 8, the release of EA 9.3 motivated to rework the tutorial to reflect the changes. We regularly use these techniques to find issues in large IOC (Inversion of Control) architectures. Where many modules are loaded dynamically and simple test beds like console runners and unit tests are your only chance to isolate the problematic parts in the source code.


Business Capability Planning in the Enterprise Intelligence Age
Business capabilities can be the best starting point for your business architecture program. In the report “Business Capabilities provide the Rosetta Stone of Business-IT Alignment”, Forrester dubs business capabilities as the map to business and IT translation. Getting business and IT on the same page by adopting a common business capabilities nomenclature enables fact-based conversations about the portfolios and their alignment to the business roadmap. ... The adoption of a common language supports the use of business capability maps across the enterprise.


DevOps in the middle: what enterprise architects can learn from the English Channel
It should be no surprise that enterprise architecture has come to include application development, and many enterprise architects now find themselves struggling to understand something called DevOps. But that’s easier said than done. DevOps, after all, is an emerging discipline. Many don’t even know what DevOps is, and some think it’s nothing but hype. Others believe it simply isn’t significant to their organizations. From my perspective, I think it is something to which every enterprise architect should be paying close attention.


How to Become a Cloud Architect
Should you decide to go after a Master's degree, I'd recommend waiting until you've made your job switch into a cloud computing role, and then look around to see what kinds of programs are available to help you advance in this arena. A return to school also argues for moving to either Austin or Raleigh as well, because you will find many top-notch colleges and universities in both areas, many of which offer directly relevant Master's degrees in computer science or similar fields to help you pursue your chosen subject matter.


eBook: Enterprise Architecture a Professional Practice Guide
Over the last several years, we’ve seen more and more organizations consider enterprise architecture as a means to improve the efficiency, effectiveness, and agility of the enterprise. As a result, there has been greater calls for many of the things that are common place in more mature disciplines such as, (1) standardization in areas such as education, certifications, and practices; (2) greater research and understanding in areas such as the value proposition of enterprise architecture, implementation practices, and value measurement and management; and in (3) more cooperation and consolidation of activities and thought across the different enterprise architecture related professional associations and perspectives.


Evolution Toward Enterprise and System Architectures Emphasizing Embedded Security
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting, and there is new emphasis on the integration of security requirements and functionality from the beginning of the technology development life cycle. ... Programmatic frictions arise when critical functional elements of an emerging or upgraded capability are defined and/or dictated by an external entity that, for all intents and purposes, is not a stakeholder with respect to the capability’s intended use.


Open Group launches IT4IT, vendor-neutral reference architecture for IT management
IT standards organisation Open Group has announced the launch of IT4IT, a forum composed enterprises... The reference architecture provides a set of standard approaches and prescriptive guidelines for the delivery of IT services with a view towards making IT faster, cheaper, and less risky. The forum is composed of Capgemini, AT&T, BP, Shell, PwC, Logicalis, Umbrio, Atos, IBM, HP, Architecting For Enterprise and Microsoft among others, with each member organisation feeding their own experience into the forum to help develop a model for how IT can manage the service life cycle and broker services to the enterprise.


Design Thinking in Education
The world is filled with people looking for solutions (users) and people looking to solve problems (solution makers), and ideally, the two are fully aware of each other’s needs and desires. In other words, students can realize that it is in the best interests of the businesses, institutions and organizations they interact with on a daily basis to best serve their end-users, and that accordingly, end-users have both the right and power to influence and shape the products and services they receive. Like the students, businesses (as solution makers) also benefit from this co-creative dialogue: a population that, through an exposure to design thinking and its emphasis on collaboration, is more aware, engaged and ready to interact is ultimately beneficial to them.



Quote for the day:

“Finish Well; Anyone Can Start Well” -- Miles Anthony Smith