IT News and Events
Sep 19th, 2022 — Sep 25th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 294, Issue 3 << Previous Issue
Fortinet News
Fortinet's Fortiguard Labs Discovers Multiple dotCMS Vulnerabilities
In June 2022, Fortinet's FortiGuard Labs discovered and reported four vulnerabilities in dotCMS - an Open Source Hybrid CMS built on Java technology that combines the flexibility of a headless CMS with the efficiency of traditional content authoring.
The vulnerabilities were found in versions 22.05 and below. At the time of the writing of this advisory, discovered issues have been fixed and updates published by the vendor. FortiGuard Labs appreciates the vendor's quick response and timely fixes.
Fortinet News, September 22nd, 2022
(Get More Information . .) open to premium members only

How To Protect Against Social Engineering Fraud
Cyber adversaries maximize every opportunity they can get. They prey on vulnerabilities, security gaps, but also human nature.
In fact, there is one risk that cannot be 'patched' easily and that is the human factor. It remains a key concern in breaches and cyber attacks. Basic cyber hygiene and the importance of cybersecurity awareness training remain critical to cyber defense especially for fraud based social engineering attacks.

Unfortunately, the odds are often in the favor of the attacker, because they only need one unsuspecting person to click on a malicious link or to provide credentials, to access the corporate network. And, as attackers evolve to include more reconnaissance, even business partners can also be indirect targets, in efforts to obtain information or context to improve their odds.

Fortinet News, September 21st, 2022
(Get More Information . .) open to premium members only

Key Insights From The Second Annual Fortinet Security Summit
Last week the Fortinet community of elite customers, partners, executives, and global industry experts came together for two days of keynotes, panels and roundtable discussions during the Fortinet Championship Security Summit.
This premier event kicked off the 2022 PGA TOUR Fortinet Championship, at the Silverado Resort and Spa in Napa, California. The Security Summit was also complemented with a Technology Vendor Expo.

Sessions and discussions provided critical insights into today's most pressing cybersecurity challenges and how to solve them. With cyberattacks on the rise, the event allowed professionals to challenge existing knowledge and gain new ideas from peers and industry experts for further protecting their organizations.

Fortinet News, September 23rd, 2022
(Get More Information . .) open to premium members only

Meeting The 'Ministrer'
Things not always being as they seem is a common adage that lends itself well to the cyber world.
Phishing tries explicitly to convince an email recipient that a message is legitimate and trustworthy when it is not. This applies equally to cases where the sender is interested in criminal exploits or nation-state activity.

FortiGuard Labs recently came across an unassuming phishing email that proved to be far more than it initially seemed.

Fortinet News, September 19th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
Top 10 Strategic Technology Trends For 2023: Gartner
Gartner has revealed its top 10 strategic technology trends for 2023, which focus on three themes: optimize, scale and pioneer.
Cutting costs by optimizing IT, scaling networks to deliver business value and growth, and changing the direction of the business itself are among the top 10 technology trends Gartner predicts for 2023.

There is growing uncertainty on how to move past the most recent challenges resulting from supply chain issues, war in Ukraine and Eastern Europe, difficulty finding talent, and the evolving financial crisis. To overcome those, some businesses will cut costs, others will continue with existing expansion plans, and some will change the direction of their business strategy completely.

CIO, September 14th, 2022
(Get More Information . .) open to premium members only

What Is ESG And How Does It Apply To My Business?
The abbreviation ESG stands for environmental, social and corporate governance. It is a measurement that takes into account a company's social and environmental impact on the global community.
Investors, customers and other stakeholders are beginning to contend with new risk factors when it comes to their data, including climate change, demographic shifts, cybersecurity issues and regulatory pressures. These complex changes have resulted in a new approach to evaluating enterprise data and business strategies: Environmental, social and corporate governance.
TechRepublic, September 14th, 2022
(Get More Information . .) open to premium members only

UTSA Rebooted Its IT Department, Erasing 10 Years Of Technical Debt
The goal was for technology to become a catalyst for success, not a form of distraction for students.
When shifting the focus of an IT department from outage management to driving innovation, organizations must rethink how to scale, increase visibility and integrate applications - a task the University of Texas at San Antonio took on.

Nassos Galiopoulos, CTO and deputy CIO of UTSA, described the transformation goal as striving to be a digital backpack that students could reach into and pull out whatever they need to be successful. However, to get to that level, some things had to change.

CIODIVE, September 12th, 2022
(Get More Information . .) open to premium members only

Why Digital Transformation Projects Fail; How Data Architecture Can Help
Every year, large corporations spend trillions of dollars on digital transformation projects, which they hope will help them take advantage of emerging technologies and boost their business operations.
Among these technologies are predictive analytics and decision-support systems, which have the potential to transform the traditional focus of IT from saving costs and solving technical constraints to proactively creating value and opportunities across the organization.

However, implementation challenges mean many of these digital transformation projects end in ruins, leading to huge financial losses for the companies involved.

Architechure & Governance, September 12th, 2022
(Get More Information . .) open to premium members only

How CIOs Can Learn From Mastercard's Five Cs For Building IT Teams
Community, common vision, cross-functional, culture, cutting edge: credit giant Mastercard has a clear vision when it comes to creating new teams for its technology centres worldwide.
All indications are that Mastercard's vision for creating teams built around the so-called 'Five Cs' - community, common vision, cross-functionality, culture, and Cutting edge - works.

Two years after its opening, the 230 employees at Mastercard's Global Intelligence and Cyber Centre of Excellence in Vancouver have already submitted 30 patents and some of their products are in use around the world, helping to protect both commercial businesses and consumers from cybercriminals.

CIO, September 15th, 2022
(Get More Information . .) open to premium members only

How To Become A CISO
The chief information security officer role is growing in profile and importance. Explore six actionable tips for aspiring CISOs as they work toward cybersecurity's top job.
Cybersecurity issues continue to pervade all areas of business, which means having a great security organization -- and a capable CISO to lead it -- is essential for almost every company. But it takes a certain kind of person, with a special set of capabilities, to thrive in the demanding, tense environments in which CISOs often find themselves.
SearchSecurity, September 13th, 2022
(Get More Information . .) open to premium members only

Why A Data Privacy Officer Should Be Your Company's Next Hire
It would be a mistake to assume that the role of a data privacy officer (DPO) is limited to data security.
In the same way that the financial crisis created a more financially astute public, data security breaches, privacy stories and scandals are making people more aware of their data privacy rights - and more concerned about how companies and the government use their data.

Data breaches affect all organisations. Those that have been hit by major breaches in the last five years range from tech corporations such as Facebook (April 2019) and Alibaba (November 2019), to hotel chain Marriott International (September 2018) and airlines British Airways (September 2018) and EasyJet (May 2020)

InformationAge, September 13th, 2022
(Get More Information . .) open to premium members only

What Is GRC?
Governance, risk and compliance, often referred to as GRC, is a blanket term used to describe the strategies and technologies used to manage an organization's compliance with regulatory mandates and corporate governance standards.
The concept of GRC can be traced back to 2003, but the topic was first extensively discussed in a peer-reviewed paper by Scott L. Mitchell, published in the International Journal of Disclosure and Governance in 2007. In this guide, we discuss what GRC is and what it can mean for your business.
TechRepublic, September 14th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
Why Object Storage Is Best For Cloud-Native Apps
A crucial question that plagues cloud application developers is, 'What kind of storage should we use for our app?'
Unlike other choices like compute runtimes-Lambda/serverless, containers or virtual machines-data storage choice is highly sticky and makes future application improvements and migrations much harder.

All three hyperscalers have storage services that present block, file and object-based data access. Each of these storage services are mature and offer different advantages, making the choice even harder. Though block and file-based storage has existed for multiple decades, in this article we will illustrate some key differentiators that should make object storage your default storage choice for new applications written in the cloud., September 12th, 2022
(Get More Information . .) open to premium members only

6 Traits Of Data-Driven Enterprises
Few organizations are truly positioned to deliver on the promise of data-driven decision-making. Here's how to tell if yours is one.
Companies have learned to thrive - and in some cases survive - by leveraging data for competitive advantage. But how many organizations are truly data-driven enterprises?

'Data is becoming increasingly valuable, especially from a business perspective,' says Lakshmanan Chidambaram, president of Americas strategic verticals at global IT consulting firm Tech Mahindra. 'Afterall, data can tell us a lot about a company's processes and activities. It shows whether one is moving in the right direction, identifies areas of improvement, and suggests an appropriate process to make those improvements.'

CIO, September 14th, 2022
(Get More Information . .) open to premium members only

Backblaze Thinks SSDs Are More Reliable Than Hard Drives
The ones used as boot drives in its datacenters seem to be, but perhaps not over time
Cloudy backup and storage provider Backblaze has found that flash SSDs are more reliable than hard drives, at least as far as the boot drives deployed in its datacenters go, but cautions this could change in future as the SSDs age.

These findings come from Backblaze's latest report detailing reliability statistics on the drives used in its infrastructure, and in this case it is only the second such report to focus on SSDs, following one the company published in March.

The Register, September 13th, 2022
(Get More Information . .) open to premium members only

Backblaze Rides Nautilus Data Center Wave For More Than 1EB
On the outside and on the inside, our newest data center is more than a little different: there are no cooling towers chugging on the roof, no chillers, or coolants at all.
This data center, owned and developed by Nautilus Data Technologies, Inc., is nice and cool inside. Built with a mix of maritime and industrial water-cooling technologies that use river water to cool everything inside-racks, servers, switches, and people-this data center is environmentally awesome, secure, fascinating, and other such w, September 12th, 2022
(Get More Information . .) open to premium members only

Scale-Out Storage
Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded through the addition of devices in connected arrays with their own resources.
In a scale-out system, new hardware can be added and configured as the need arises. When a scale-out system reaches its storage limit, another array can be added to expand the system capacity. Scale-out storage can harness the extra storage added across arrays and use added devices to increase network storage capacity, adding performance and addressing the need for additional storage.

Before scale-out storage became popular, enterprises often bought storage arrays much larger than needed to ensure that plenty of disk space would be available for future expansion. If that expansion never occurred or the storage needs turned out to be less than anticipated, much of the originally purchased disk space went to waste., September 12th, 2022
(Get More Information . .) open to premium members only

IT News - AI
Worldwide Spending On AI-Centric Systems Will Pass $300 Billion By 2026, According To IDC
AI is becoming a crucial component of all systems, leading to dramatic improvements in software and hardware capabilities
A new forecast from the International Data Corporation (IDC) Worldwide Artificial Intelligence Spending Guide shows that global spending on artificial intelligence (AI), including software, hardware, and services for AI-centric systems*, will reach nearly $118 billion in 2022 and surpass $300 billion in 2026. The ongoing incorporation of AI into a wide range of products will drive a compound annual growth rate (CAGR) of 26.5% over the 2022-2026 forecast. This is more than four times greater than the five-year CAGR of 6.3% for worldwide IT spending over the same period.
AiTHORITY, September 12th, 2022
(Get More Information . .) open to premium members only

Best Practices For Developing Cloud-Based Machine Learning Platforms
With the cloud, enterprises can easily experiment with machine learning capabilities and scale up as projects go into production and demand sees an uptick.
Many people are familiar with leading technology platforms like Windows, iOS, and AWS. Platforms are a group of technologies that serve as a base from which other applications are built and scaled. These platforms enable most of today's advanced technology capabilities and help organizations deliver cutting-edge customer experiences.

In a bid to maintain pace with the scale and complexity of the technological capabilities brought by big data, Artificial Intelligence (AI), and machine learning, many organizations are building sophisticated internal platforms. Businesses are beginning to understand that investing in the infrastructure requires training, testing, and deploying models and is crucial for long-term viability.

ITCloud Demand, September 13th, 2022
(Get More Information . .) open to premium members only

IDC: Worldwide AI Spending Grew Over 20% In 2021, Will Reach $450B In 2022
A new report from IDC predicts the global market value of artificial intelligence solutions will reach close to $450 billion in 2022 and will continue to grow over the next five years.
According to IDC's Worldwide Semiannual Artificial Intelligence Tracker, worldwide revenues for AI software, hardware, and services totaled $383.3 billion in 2021 for an increase of 20.7% over 2020.

The largest sector of the overall AI market was AI software in four categories: AI applications delivery and deployment, AI applications, AI system infrastructure software, and AI platforms. These categories combined to reach over $340 billion in market value in 2021 with AI applications accounting for nearly half. AI platforms demonstrated a YoY growth rate of 36.6%.

datanami, September 15th, 2022
(Get More Information . .) open to premium members only

Google's Deepmind Has A Long-Term Goal Of Artificial General Intelligence
When DeepMind, an Alphabet subsidiary, started off more than a decade ago, solving some most pressing research questions and problems with AI wasn't at the top of the company's mind.
Instead, the company started off AI research with computer games. Every score and win was a measuring stick of success, and pointed to DeepMind's AI going in the right direction.

'Five years ago, we conquered the game of Go. This was a great moment,' said Colin Murdoch, the chief business officer, during a fireside chat on Tuesday at the AI Hardware Summit being held in Santa Clara, California.

Many years on, the gaming experiment has now turned into a much more ambitious AI effort to solve massive problems in areas that include protein folding, nuclear fusion and quantum chemistry.

HPCWire, September 14th, 2022
(Get More Information . .) open to premium members only

NVIDIA, Qualcomm Shine In Mlperf Inference; Intel's Sapphire Rapids Makes An Appearance.
The steady maturation of MLCommons/MLPerf as an AI benchmarking tool was apparent in today's release of MLPerf v2.1 Inference results.
Twenty-one organizations submitted 5,300 performance results and 2,400 power measurement. While Nvidia again dominated, showcasing its new H100 GPU, Qualcomm impressed on both performance and power consumption metrics. Intel ran a Sapphire Rapids CPU-based system, albeit in the preview category. AI start-ups Biren, Moffet AI, Neural Magic, Sapeon were among the entrants.
EnterpriseAI, September 13th, 2022
(Get More Information . .) open to premium members only

The Business Value Of NLP: 5 Success Stories
These five organizations are using natural language processing to better serve their customers, automate repetitive tasks, and streamline operations.
Data is now one of the most valuable enterprise commodities. According to's State of the CIO 2022 report, 35% of IT leaders say that data and business analytics will drive the most IT investment at their organization this year, and 58% say their involvement with data analysis will increase over the next year.

While data comes in many forms, perhaps the largest pool of untapped data consists of text. Patents, product specifications, academic publications, market research, news, not to mention social feeds, all have text as a primary component and the volume of text is constantly growing. According to Foundry's Data and Analytics Study 2022, 36% of IT leaders consider managing this unstructured data to be one of their biggest challenges.

CIO, September 16th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
How To Conduct An IT Compliance Review In 6 Steps
Do you want your business to face consequences like fines, federal monitoring, lawsuits, or reputation loss?
That's an easy question: of course not. If you fail your IT compliance audits, you could face these consequences and more.

Conducting your own IT compliance review to identify weak points upfront can give you time to solve them before audit time rolls around. Instead of waiting to discover the flaws in your cybersecurity and IT compliance efforts until it's too late, get a jump-start on the process today.

This post will give you a simple, step-by-step guide you and your team can follow to conduct an IT compliance review for your organization.

Security Boulevard, September 15th, 2022
(Get More Information . .) open to premium members only

IT News - Security
What is SOC2 Compliance?
Cloud security is an ongoing requirement for all organizations born and built in the cloud.
As organizations build and develop new features and expand their presence in the cloud, they must not only contend with the ability to continually grow their security coverage, but likewise align with any changes to compliance and regulatory requirements. Additionally, and importantly to SaaS companies, security programs must also demonstrate verifiable proof of a robust security program. One way to probably demonstrate security controls is with a SOC 2 report.
Security Boulevard, September 13th, 2022
(Get More Information . .) open to premium members only

ISACA's State Of Digital Trust 2022 Report Highlights Gaps In What Businesses Are Doing And What They Should Do To Win Customer Trust In Digital Ecosystem
Consequences of low digital trust of an organization include customer loss, more cybersecurity incidents, and reputation deduction, among others.
47% say digital trust will be much more important in the next five years; however, 57% say their organizations do not provide staff training in digital trust.

Most significant obstacles to digital trust are lack of skills and training (56%), lack of leadership buy-in (49%), lack of alignment of digital trust and enterprise goals (49%), lack of technological resources (47%) and insufficient processes and/or governance practices (41%)., September 16th, 2022
(Get More Information . .) open to premium members only

5 Priorities For A Modern IT Security Team
As part of Solutions Review's Premium Content Series, Christopher Prewitt of Inversion6 takes us through the five pillars every IT security team should have to hold up their castle in the cloud.
Like a medieval castle, protecting our IT assets used to be about digging deeper and wider moats to keep away invaders. Today, there is no castle. Our people and information are as scattered as the attackers attempting to exploit them- and like an old moat with nothing to guard, traditional methods of protection are largely obsolete against modern forms of attack.

Over the last 12 years, we have seen an explosion of new security solutions springing up to combat these new types of threats.

Solutions Review, September 14th, 2022
(Get More Information . .) open to premium members only

5 Best Practices For Building Your Data Loss Prevention Strategy
The entire security team should share in the responsibility to secure sensitive data.
Several recent high-profile instances of data loss serve as cautionary tales for organizations handling sensitive data - including a recent case where the personal data of nearly half a million Japanese citizens was put in a compromising position when the USB drive on which it was stored was mislaid.
DARK Reading, September 15th, 2022
(Get More Information . .) open to premium members only

The ClubCISO Report Reveals A Fundamental Shift In Security Culture
With business and technology becoming increasingly intertwined, organizations are being forced to rethink how they look at digital security.
Once overlooked or viewed as a mere afterthought, today it has become a business-critical necessity. As a result, organizations across industry lines are racing to improve their security postures. Chief Information Security Officers (CISOs) are at the core of this transformation, spearheading a wave of proactive and future-forward cybersecurity change while enabling security-first innovation.
tripwire, September 12th, 2022
(Get More Information . .) open to premium members only

The Challenge Of Securing Critical Operational Technology Systems At The Ground Level
Although a 'shift in attitude' is happening around securing the operational technology (OT) that underpins critical infrastructure like manufacturing plants or utilities, the federal government is still working through challenges in targeting efforts toward smaller operators grappling with limited resources, and ensuring that the OT investments being made today have security built into them.
The Biden administration over the past year has spearheaded several initiatives that aim to better secure industrial control systems (ICS), including a National Security Memorandum passed last July, which directed the Cybersecurity and Infrastructure Security Agency (CISA) to work with the National Institute of Standards and Technology (NIST) to develop a number of security performance goals for critical infrastructure sectors.

But at a Thursday hearing called 'Building on our Baseline: Securing Industrial Control Systems Against Cyberattacks,' government officials discussed further security improvements needed at the ground level to secure critical infrastructure environments and the particularly complex challenge of building security into the design of OT systems.

Decipher, September 15th, 2022
(Get More Information . .) open to premium members only

How to Prepare for New PCI DSS 4.0 Requirements
With the new requirements set to start in March 2024, organizations should start preparing now -- a multi-step process that will be felt across the organization.
The upcoming changes to the Payment Card Industry Data Security Standard (PCI DSS) will affect every organization that stores, transmits, or processes cardholder data and/or sensitive authentication data.

Effective starting in March 2024, the new standard, known as PCI DSS 4.0, spans dozens of changes in areas including risk assessment, how keys and certificates are managed, and what can be accessed remotely.

The update will also impact identity and access management (IAM) and the technologies used for email filtering, anti-malware, multi-factor authentication (MFA), security information and event management (SIEM), as well as application development.

InformatiionWeek, September 15th, 2022
(Get More Information . .) open to premium members only

To Improve Cybersecurity, Assume Vulnerability
One struggle continues to rear its head with regard to cyberverse security: adopting a proactively vulnerable mindset.
Understanding the nature of vulnerabilities allows a company to address them in a proactive manner. Google understood phishing was a preventable problem, and famously implemented FIDO to good effect; they have not been successfully phished since. But their choice is an exception rather than the rule.

Thus far, market adoption of cybersecurity best practices has been an exercise in corrective maintenance, not preventative.

HYPR, September 15th, 2022
(Get More Information . .) open to premium members only

Phishing Attacks: What You Need To Know Now - Arkose Labs
According to the FBI Internet Crime Report 2021, phishing was the fastest growing type of internet crime from 2019 to 2021, and bad actors continue to evolve their phishing attack techniques.
The latest phishing attack, EvilProxy, allows even inexperienced criminals to use reverse proxy and cookie-injection methods to provide a way around two factor authenticated (2FA) sessions on a large scale.

What is a phishing attack?

Phishing is the practice of attackers sending malicious emails meant to lead users to fall for a scam. Phishing attacks attempt to trick users into clicking on web links that will download malware or redirect to a malicious website with the intent of gathering private information such as login credentials, multifactor authentication (MFA) tokens, and financial information.

Security Boulevard, September 15th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
CrossOver Review: The 'Premium Wine' To Run Windows Software On Linux
CrossOver allows you to run Windows software on Linux, macOS, and ChromeOS.
It is not an emulator program. Instead, it provides a compatibility layer on top of your host operating system to make it possible to run Windows software.

In other words, it adds components that windows software needs to run on any supported OS.

But how well does it work? Can you run all Windows software using it? Is it a viable solution for you to ditch Windows for good?

Here, I shall share my experience with using CrossOver on Linux and sharing my experience with it.

It's FOSS, September 14th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
5 Ways To Improve Your Cloud Security Posture
With more applications deployed to multiple clouds, organizations must shore up their security posture, and cloud security posture management is designed to help. Find out why.
Organizations are increasingly moving applications to the cloud to better serve their customers, partners and employees. The ability to quickly deploy applications to the cloud so employees, partners and customers can connect to companies for business transactions and services gives organizations a competitive advantage.
SearchSecurity, September 14th, 2022
(Get More Information . .) open to premium members only

Your Organization Has Cloud Sprawl
As your organization grows, so does your reliance on cloud services. But with that growth comes the risk of cloud sprawl - when too many cloud services are added without proper planning and oversight, leading to security and compliance risks. How do you know if your cloud is in danger?
And how can you address the problem before it becomes unmanageable?

Business growth is usually an excellent indicator of success. The accompanying cloud growth often fulfills business needs to result in positive outcomes; however, the unstoppable forces of an ephemeral cloud and agile development are driving momentous changes in how enterprises secure applications. These shifts have many implications, among them is cloud sprawl. In fact, according to research by the Cloud Security Alliance, cloud sprawl is one of the top security threats organizations face today.

Security Boulevard, September 15th, 2022
(Get More Information . .) open to premium members only

IT News - Email
How Do I Display My Brand's Logo In Emails?
Have you noticed some brand logos show up in the primary inbox in Gmail and other emails? Are you wondering how these brands are able to show their logos instead of just their first letters in the avatar slot? Do you also want to personalize your emails this way?
If your answer to any of these questions is yes, here's the solution you're looking for: Verified Mark Certificates (VMCs), digital certificates that make it all possible. Conceptualized and primarily developed by Entrust, VMCs enable organizations to display their registered trademark logo alongside emails in their customer's inbox. BIMI (Brand Indicators for Message Identification) are the guidelines that standardize how to get your logo to appear on email.
Security Boulevard, September 15th, 2022
(Get More Information . .) open to premium members only

IT News - Big Data
Top Data Governance Tools Of 2022
The best data governance tools help ensure that the right information is available at the right time. Here's a list of tools that can help you optimize your operations.
As companies continue to grow and rely on data to make business decisions, it is more important than ever for them to implement a strategy for their data management.

Organizations today can't afford downtime caused by ineffective data governance strategies. With so much on the line, businesses must use appropriate data governance tools and software to maintain control of their company's most valuable asset: data.

TechRepublic, September 12th, 2022
(Get More Information . .) open to premium members only

IT News - Encryption
Organizations Are Struggling To Keep Up With Ever-Expanding Cloud Attack Surfaces And Increasing Multicloud Complexity, According To Orca Security Research.
Organizations are struggling to keep up with ever-expanding cloud attack surfaces and increasing multicloud complexity, according to Orca Security research.
While most organizations list cloud security as one of their top IT priorities, they continue to ignore basic security hygiene when it comes to data in the cloud, according to Orca's latest public cloud security report. The report revealed that 36% of organizations have unencrypted sensitive data such as company secrets and personally identifiable information in their cloud assets.
CSO Online, September 13th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section