Helpful tips from industry professionals. Learn home improvement, remodeling, & construction tips from members of the HBA of Greater Springfield.
…
continue reading
HBA Podcasts
Brain aneurysms, told through the voices of patients, families and experts. Host Rebecca Middleton, founder of Hereditary Brain Aneurysm Support, uncovers inspiring stories, treatments, and research breakthroughs. Rebecca, herself a brain aneurysm patient, speaks with people affected by the condition and medical professionals to explore diagnosis, treatment options, hereditary factors, and the journey of recovery. Each episode blends medical insight with lived experience – highlighting resil ...
…
continue reading
For members of the Home Builders Association of Greater Springfield, staying up to date on the latest issues, advocacy and members-only special offers is critical. On the Housing News Podcast, host Matt Morrow shares the latest with HBA members.
…
continue reading
Get green building tips, pointers and updates from industry professionals in the Ozarks. Members of the Home Builders Association of Greater Springfield tell you how to make your home more cost effective and environmentally sensitive.
…
continue reading
Looking back at the NOW That's What I Call Music! series Ben and Ed look at the albums, the stats and the history behind the worlds most popular music compilation series. Taking a look a 6 albums in an episode every week, picking one song each from the albums. Listen to all the music from each episode on Spotify search Ben and Ed Present. A Best Specialist Music Programme Nominee at the HBA Awards 2019!
…
continue reading
Healthy by Association is a space for association professionals to set goals, share their workout accomplishments, exchange healthy recipes and, above all, stay motivated. Learn more about Healthy by Association of Facebook https://www.facebook.com/groups/HealthyByAssociation/?ref=bookmarks. See us on Vimeo https://vimeo.com/channels/1403872 Blog about HBA https://eventgarde.com/services/healthy-by-association?fbclid=IwAR3mTJwwGO_0pqY5hSXgkF4mLx9njr0Jp3ZcNzyJHRXByZXGiqQuTi3VeDg #goalgetters ...
…
continue reading
Jammy Kiggundu is the host of Go On Say It, Jammy is an Attorney, Entrepreneur, Entertainment Executive, Orator, and E&S Law HBA Chair emeritus.
…
continue reading
From the HBA Podcast Network, The Podcast Hub is specifically designed to support members of our network. From answering your technical queries to production tips and FAQs, this is a space for health & wellbeing broadcasters across the UK to get all the help you need to make an amazing podcast!
…
continue reading
1
The Medium Rules: Long-Term Trends in Media and Technology
Alan Baldachin, and produced by HBA Studios
Conversations with founders, investors and thought leaders in the orbit of HBA's tech and media ecosystem and beyond. How are media and technology companies conceived, how do they scale, and how do they interact with the broader social, economic and political culture we live in today and that we will inhabit in the future. This is a show about innovation and its effects on our lives, hosted by HBA's managing partner and head of media and technology, Alan Baldachin. Hosted on Acast. See acast ...
…
continue reading
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
…
continue reading
Welcome to your go-to source for understanding how government financial systems work — simplified for everyone! In this podcast, we explore topics like checking bill statuses, tracking advances and loans, understanding AGPR systems, and making sense of the PIFRA portal. Whether you’re a government employee trying to stay updated or just someone looking to better understand how public sector finances operate, this show is for you. Each episode offers clear explanations, step-by-step guides, a ...
…
continue reading
Thank you for listening to THE LITTLE AGENCY THAT ROARS Podcast!! We're all about creating a space where you can listen to candid interviews from the individuals that impact the world around us. Covering a range of topics across many industries, passions, lifestyles and so much more. All unedited, no time limits, no rules or predicable questions formatting just the good stuff recorded in Kansas City at Fasone and Partners. Hosted by Michal Fasone, Managing Partner at Fasone and Partners Adve ...
…
continue reading
Ben and Ed are back with a festive treat! In this special holiday edition of From Then to Now, they unwrap the glittering history of the Now Christmas albums in the UK, celebrating their 40th anniversary. From the very first release to the latest compilation, the duo takes listeners on a nostalgic sleigh ride through decades of yuletide hits. Along…
…
continue reading
1
ROAR-DNA - A groundbreaking new genetic study exploring brain aneurysm risk
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14In this episode of Brain Aneurysms & Beyond, we explore the ground-breaking ROAR (Risk of Aneurysm Rupture) DNA genetic study; research that could reshape how family risk is understood in the years ahead. Guest host Vivienne Parry brings together consultant neurosurgeon Professor Diederik Bulters and clinical lecturer in neurosurgery Ben Gaastra, a…
…
continue reading
1
In Their Words 1: Andy's brain aneurysm story
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12Recovering from a brain aneurysm isn’t only about the physical journey, it’s also about rebuilding emotional confidence. In this inspiring episode, host Rebecca Middleton, founder of Hereditary Brain Aneurysm Support, is joined by Andy, who shares his personal story with honesty, humour and optimism, reflecting on how recovery has shaped his outloo…
…
continue reading
1
Welcome to the CompTIA Server+ Certification
2:08
2:08
Play later
Play later
Lists
Like
Liked
2:08By Jason Edwards
…
continue reading
Health anxiety after a brain aneurysm diagnosis is very understandable, but it can be managed. In this uplifting episode, Rebecca Middleton from Hereditary Brain Aneurysm Support is joined by Kym Winter, a psychotherapist and founder/clinical director of Rareminds, to share practical ways to move from worry towards confidence, resilience and hope. …
…
continue reading
1
Facts not fear: Living well with a brain aneurysm
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55How do you get on with life after a brain aneurysm diagnosis or during recovery from treatment? In this episode, you’ll discover inspiring patient stories, expert medical guidance, and the vital role of UK charities in providing support, prevention, and hope. A brain aneurysm diagnosis can bring fear and uncertainty, but it doesn’t have to mean los…
…
continue reading
1
Episode 124 — Misconfigured NICs and VLANs — Interface Troubleshooting Tactics
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17This episode explains how misconfigured network interface cards (NICs) and VLAN settings can disrupt server connectivity. We cover issues such as incorrect VLAN tagging, mismatched speed and duplex settings, and disabled interfaces. The discussion includes how multi-NIC configurations require careful planning for load balancing, redundancy, or VLAN…
…
continue reading
1
Episode 123 — Network Connectivity Issues — DHCP, DNS, and Route Problems
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23This episode focuses on diagnosing network connectivity failures by examining IP assignment, name resolution, and routing paths. We explain how DHCP misconfigurations can lead to incorrect or missing IP addresses, how DNS issues prevent hostname resolution, and how routing problems can block communication between subnets or external networks. We pr…
…
continue reading
1
Episode 122 — Configuration and Service Failures — Improper Setup and Missing Resources
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24This episode covers how incorrect configurations and missing dependencies can prevent services from starting or functioning correctly. We discuss common causes, such as incorrect file paths, insufficient permissions, or disabled services. Identifying these issues often requires checking configuration files, logs, and service dependencies. Practical…
…
continue reading
1
Episode 121 — Dependency and Update Conflicts — Software Incompatibility Resolution
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24This episode explains how dependency issues and update conflicts can cause application or service failures. We discuss scenarios where software relies on specific versions of libraries, frameworks, or drivers, and how updates can inadvertently break functionality by replacing or removing required components. The importance of maintaining compatibil…
…
continue reading
1
Episode 120 — OS and Software Problems — Login Issues and Patch Failures
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50This episode addresses troubleshooting operating system and application problems, including failed logins, service outages, and patch installation errors. We explain how authentication misconfigurations, expired credentials, or corrupted profiles can block user access, while incomplete or incompatible patches can destabilize services. We connect th…
…
continue reading
1
Episode 119 — Partition and Filesystem Errors — Misalignment, Corruption, and Boot Failures
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52This episode examines how partition and file system errors can impact server operations. We explain problems such as partition misalignment reducing performance, corruption preventing access to data, and boot failures caused by damaged boot sectors or missing system files. The discussion includes how these issues can originate from improper setup, …
…
continue reading
1
Episode 118 — HBA and Controller Issues — Advanced Storage Adapter Failures
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47This episode focuses on diagnosing problems with host bus adapters (HBAs) and storage controllers, which are critical for connecting servers to storage devices. We discuss symptoms of adapter failure, such as intermittent connectivity, degraded performance, and device detection errors. Configuration mismatches, outdated firmware, and driver incompa…
…
continue reading
1
Episode 117 — Storage Failures — Mount Errors, Slow Access, and File Corruption
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56This episode covers how to identify and resolve storage-related failures in server environments. We explain symptoms such as inability to mount volumes, significantly degraded read/write speeds, and corrupted files. Common causes include failing drives, controller faults, cabling issues, and file system corruption. Real-world and exam-relevant exam…
…
continue reading
1
Episode 116 — RAID Misconfigurations — Faulty Arrays, Rebuilds, and Bad Sectors
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44This episode explains how RAID misconfigurations can lead to degraded performance, data loss, or complete array failure. We discuss common causes such as incorrect drive order, mismatched drive sizes, incompatible RAID levels for the workload, and improper rebuild procedures. The importance of verifying configuration settings against vendor guideli…
…
continue reading
1
Episode 115 — Visual and Auditory Cues — LED, LCD, and Unusual Sounds or Smells
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26This episode examines how to use visual and auditory indicators to troubleshoot hardware problems. We discuss interpreting status LEDs, reading LCD panel error codes, and recognizing abnormal sounds such as failing fans or clicking drives. The importance of detecting unusual smells, like burnt circuitry, as a sign of component failure is also cover…
…
continue reading
1
Episode 114 — CMOS Battery and Lockup Events — Diagnosing Time and Power Problems
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00This episode covers how a failing CMOS battery can cause time drift, loss of BIOS settings, and boot failures. We explain the function of the CMOS battery in maintaining system configuration when power is removed, and how to identify symptoms of failure. Lockup events related to power issues are also discussed, including those caused by unstable po…
…
continue reading
1
Episode 113 — POST Errors and Random Lockups — Identifying Hardware Start Failures
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33This episode explains how to diagnose Power-On Self-Test (POST) errors and intermittent system lockups that indicate potential hardware problems. We discuss common beep codes, LED indicators, and error messages displayed during startup, as well as how they map to specific hardware components. Lockups that occur after startup are also examined for p…
…
continue reading
1
Episode 112 — Memory-Related Issues — Dumps, Crashes, and RAM Errors
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33This episode focuses on troubleshooting server memory problems, from application crashes to full system halts. We explain how to interpret memory dumps, identify faulty DIMMs, and use diagnostic tools to confirm suspected issues. The discussion also includes how improper memory configurations, such as mismatched speeds or unsupported sizes, can lea…
…
continue reading
1
Episode 111 — Predictive Failures — Early Warning Signs and Indicators
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45This episode explains how predictive failure technologies and monitoring tools can identify hardware issues before they cause outages. We discuss using SMART data for drives, temperature and fan speed sensors for CPUs, and vendor-specific monitoring utilities for servers. These early warnings allow administrators to schedule maintenance or replacem…
…
continue reading
1
Episode 110 — Troubleshooting Documentation — Recording Actions and Outcomes
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31This episode focuses on documenting troubleshooting activities from the initial problem report to the final resolution. We discuss capturing details about symptoms, diagnostic steps, implemented changes, and verification results. Thorough documentation allows for faster resolution of similar issues in the future and provides a record for compliance…
…
continue reading
1
Episode 109 — Root Cause Analysis — Preventing Future Incidents
9:41
9:41
Play later
Play later
Lists
Like
Liked
9:41This episode covers how to conduct a root cause analysis (RCA) to determine why a problem occurred and how to prevent its recurrence. We explain how to gather evidence, map the sequence of events, and identify both technical and process-related contributing factors. Documenting the findings is essential for long-term operational improvement. We the…
…
continue reading
1
Episode 108 — Functional Verification — Ensuring System Stability Post-Fix
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43This episode explains the importance of verifying that a system is fully functional after implementing a fix. We discuss running validation tests, confirming service availability, and ensuring performance metrics are within acceptable ranges. Functional verification also involves checking related systems that may have been indirectly affected by th…
…
continue reading
1
Episode 107 — Change Implementation — Testing and Controlled Changes
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36This episode focuses on executing the planned solution in a controlled environment. We cover making one change at a time, monitoring for its effect, and ensuring each adjustment aligns with the overall remediation strategy. Implementing changes incrementally reduces the risk of introducing new problems and makes it easier to isolate the source of a…
…
continue reading
1
Episode 106 — Establishing a Plan of Action — Solution Planning and Notifications
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12This episode explains how to create a detailed plan of action once the root cause of a problem is identified. We discuss outlining step-by-step remediation tasks, sequencing changes to minimize downtime, and identifying potential risks before implementation. The plan should also include a rollback procedure in case the fix causes unexpected issues.…
…
continue reading
1
Episode 105 — Testing the Theory — Verification and Adjustment Techniques
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47This episode focuses on testing the theory of probable cause to confirm whether it explains the observed issue. We discuss performing controlled changes, using diagnostic tools, and monitoring system behavior for improvement or recurrence of the problem. If the theory is confirmed, the next step is implementing a permanent fix; if not, the theory m…
…
continue reading
1
Episode 104 — Theory of Probable Cause — Narrowing Down Server Failures
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44This episode discusses how to form a theory of probable cause after gathering information about a problem. We explain how to use evidence from logs, performance metrics, and user reports to eliminate unlikely factors and focus on the most probable source of the issue. This step ensures troubleshooting efforts are targeted and efficient. We then exp…
…
continue reading
1
Episode 103 — Replication and Documentation — Reproducing and Logging Issues
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15This episode explains how replicating an issue helps confirm the root cause and ensures that corrective measures address the actual problem. We discuss how to safely recreate issues in test environments, document exact steps and conditions, and capture relevant logs or screenshots for further analysis. Detailed documentation also aids in escalation…
…
continue reading
1
Episode 102 — Identifying Problems — Scoping and User Input Techniques
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47This episode focuses on the first step of the troubleshooting process: accurately identifying and scoping a problem. We discuss gathering user reports, reviewing monitoring data, and determining the affected systems or services. Scoping ensures the issue is clearly defined before any corrective action is taken, preventing wasted time on unrelated a…
…
continue reading
1
Episode 101 — Domain 4 Overview — Troubleshooting Methodologies and Practices
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11This episode introduces Domain 4 of the CompTIA Server+ exam, which focuses on structured troubleshooting processes and the tools needed to resolve hardware, software, network, and security issues. We outline the methodology steps—problem identification, theory development, testing, implementation, and documentation—and explain how they ensure cons…
…
continue reading
1
Episode 100 — Hardware Hardening — Physical Ports, BIOS, and Boot Order Settings
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59This episode covers hardware-level security measures that prevent unauthorized use or modification of server systems. We explain how to disable unused physical ports, set administrative BIOS passwords, and configure boot order to restrict booting from external media. These measures reduce the risk of unauthorized device access or operating system b…
…
continue reading
1
Episode 99 — Host and Application Hardening — Antivirus and Updates Explained
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10This episode explains how to secure individual server hosts and applications through targeted hardening measures. We discuss deploying antivirus and anti-malware tools, ensuring timely application of patches, and disabling unnecessary application features or services. Application configuration best practices, such as enforcing authentication and en…
…
continue reading
1
Episode 98 — Server OS Hardening — Patches, Ports, and Service Reduction
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17This episode focuses on securing a server operating system by applying hardening techniques that minimize vulnerabilities. We cover the importance of keeping systems fully patched, closing unused network ports, and disabling unneeded services. The discussion also includes reviewing startup processes, removing default accounts, and enforcing secure …
…
continue reading
1
Episode 97 — Regulatory Constraints — PII, PCI DSS, and Legal Retention
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27This episode reviews the regulatory and legal frameworks that affect server administration, focusing on requirements for protecting personally identifiable information (PII) and complying with industry-specific standards such as the Payment Card Industry Data Security Standard (PCI DSS). We explain how legal retention rules dictate how long certain…
…
continue reading
1
Episode 96 — Security Monitoring — SIEM, Log Analysis, and Role Separation
11:26
11:26
Play later
Play later
Lists
Like
Liked
11:26This episode explains how security monitoring systems, particularly Security Information and Event Management (SIEM) platforms, collect and correlate logs from multiple sources to detect suspicious activity. We discuss how SIEM tools enable real-time alerting, historical analysis, and compliance reporting. The importance of role separation in monit…
…
continue reading
1
Episode 95 — Breach Identification — Event Recognition and Disclosure Requirements
10:54
10:54
Play later
Play later
Lists
Like
Liked
10:54This episode covers how to identify potential security breaches through event monitoring, anomaly detection, and forensic investigation. We discuss the signs of compromise, such as unusual network traffic, unauthorized configuration changes, or unexpected data transfers. The importance of timely breach recognition is emphasized, along with the lega…
…
continue reading
1
Episode 94 — Backdoors and Social Engineering — Recognizing Hidden Threats
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15This episode explains the dangers of backdoors—hidden access methods intentionally or unintentionally left in systems—and how they can be exploited by attackers. We also examine social engineering tactics used to manipulate individuals into revealing sensitive information or granting access, including phishing, pretexting, and baiting. Understandin…
…
continue reading
1
Episode 93 — Data Loss Prevention — Duplication, Access, and Disclosure Controls
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This episode focuses on data loss prevention (DLP) strategies used to protect sensitive information from unauthorized access, duplication, or disclosure. We explain how DLP technologies monitor data movement across networks, block risky transfers, and enforce encryption requirements. Access controls, role assignments, and policy enforcement are dis…
…
continue reading
1
Episode 92 — Malware and Insider Threats — Detection and Prevention Concepts
11:26
11:26
Play later
Play later
Lists
Like
Liked
11:26This episode explores two major security risks: malicious software infections and insider threats. We explain how malware types such as ransomware, trojans, and worms can impact servers, along with the indicators of compromise that signal infection. Insider threats are addressed in terms of intentional sabotage, data theft, or accidental security b…
…
continue reading
1
Episode 91 — Hardware Failure Risks — Power, Components, and Environmental
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37This episode covers the common risks that can lead to hardware failures in server environments, starting with power-related issues such as surges, brownouts, and outages. We discuss how failing components like power supplies, fans, and storage drives can cause system downtime, as well as how environmental factors such as excessive heat, humidity, o…
…
continue reading
1
Episode 90 — Single Sign-On (SSO) — Streamlined Identity Access Control
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47This episode focuses on Single Sign-On (SSO) technology, which allows users to authenticate once and gain access to multiple systems or applications without re-entering credentials. We explain how SSO improves user experience while centralizing authentication for stronger oversight. Common protocols such as SAML, OAuth, and OpenID Connect are intro…
…
continue reading
1
Episode 89 — Multifactor Authentication — Knowledge, Possession, and Biometrics
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35This episode explains multifactor authentication (MFA) and how combining factors—something you know, something you have, and something you are—enhances security. We review examples such as passwords plus hardware tokens, smart cards plus PINs, and biometric scans paired with one-time passwords. The discussion also covers how MFA mitigates risks fro…
…
continue reading
1
Episode 88 — Segregation of Duties — Delegation and Least Privilege
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35This episode examines how segregation of duties reduces the risk of fraud, errors, and insider threats by dividing responsibilities among multiple individuals. We explain how this principle supports compliance frameworks and strengthens overall security posture. Delegation is discussed as a controlled method of granting temporary access to specific…
…
continue reading
1
Episode 87 — Role-Based and Rule-Based Access — Models for Control Enforcement
16:48
16:48
Play later
Play later
Lists
Like
Liked
16:48This episode compares role-based access control (RBAC), where permissions are tied to job roles, with rule-based access control, where access is determined by specific conditions or rules. We explain how RBAC simplifies management by assigning users to predefined roles, while rule-based models allow dynamic access control based on attributes such a…
…
continue reading
1
Episode 86 — Password Policies — Strength, Lockouts, and Enforcement Rules
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15This episode explains how to design and implement password policies that balance security with usability. We discuss key elements such as minimum length, complexity requirements, and expiration periods, as well as how account lockout policies deter brute-force attacks. The importance of enforcing password history and preventing reuse is also covere…
…
continue reading
1
Episode 85 — Audit Mechanisms — Activity Logs, Deletion Events, and Group Changes
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52This episode explains how audit mechanisms track and record user and system activities to support accountability, security investigations, and compliance requirements. We cover the types of events that should be logged, such as user logins, file deletions, and group membership changes, and how these logs can be centralized for easier analysis. We t…
…
continue reading
1
Episode 84: User Account Security — Roles, Groups, and Permissions
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49This episode focuses on managing user accounts to enforce security policies and maintain proper access control within server environments. We explain how to assign users to groups, apply role-based permissions, and ensure the principle of least privilege is maintained. The discussion also covers auditing account activities and enforcing password po…
…
continue reading
1
Episode 83 — HVAC and Sensor Systems — Environmental Controls for Servers
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23This episode examines the role of HVAC (Heating, Ventilation, and Air Conditioning) systems and environmental sensors in maintaining stable operating conditions for servers. We discuss how precise temperature and humidity control prevents hardware degradation, while airflow management ensures even cooling throughout the facility. Sensors for temper…
…
continue reading
1
Episode 82 — Fire Suppression — Server Room Protection Technologies
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52This episode explains fire suppression methods used in server environments to protect equipment while minimizing collateral damage. We review clean agent systems such as FM-200 and inert gas solutions, which extinguish fires without harming electronics, as well as pre-action sprinkler systems designed to avoid accidental water discharge. The discus…
…
continue reading
1
Episode 81 — Secure Access Methods — Card Readers and Multifactor Systems
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50This episode covers secure access control methods that rely on card reader systems and multifactor authentication for physical entry into server facilities. We explain how card readers function as a primary factor—something you have—and how they are often integrated with secondary verification such as PINs or biometrics to meet multifactor authenti…
…
continue reading