ActualKey 70-561 Exam Training

At ActualKey Certified Microsoft 70-561 we provide you with Practice Questions and Answers, Practice Testing Software, 70-561 Study Guides, Preparation Labs and Audio Learning’s. ActualKey Certified Microsoft 70-561 exam Training Tools are detailed and provide you with a real time environment.

 


Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

ActualKey Microsoft 70-561 Exam is a popular Certification Test. We have prepared highest quality ActualKey 70-561 Study Guide and best online 70-561 Dumps for IT professionals to pass Microsoft 70-561 Exam. ActualKey 70-561 Questions and Answers are so thorough and comprehensive that nearly every field and category of content networking has been covered to assure IT professionals of obtaining Microsoft Certification successfully.

ActualKey has a variety of Microsoft 70-561 rapidshare and other exam preparation materials giving you consolidation in the ways of your interest and ease. ActualKey 70-561 TESTING ENGINE Download, Term Papers, Real Exam Answers and other materials give you detailed and logical coverage of Microsoft 70-561 exam objectives and provide you with the real exam environment as these products are built by IT examiners so you experience the real exam features in our products.

ActualKey Certified 70-561 cover 100% of the exam objectives set by Microsoft. These ActualKey Certified products are available in popular formats and are easy to download. ActualKey Certified products are prepared by IT professionals and industrious experts who have implemented their real life experience in 70-561 exam dumps in order to provide candidate with the best 70-561 product available in the market.

Online provides 70-561 exam dumps experts create all of the Microsoft 70-561 exam products available through ActualKey. Our main goal is to get your certified with a firm understanding of the core material. Whereas other online distributors only concern themselves with helping you obtain the paper, we strive to educate the certification candidate and better prepare them for their IT career. and help you to achieve your dream

ActualKey 70-561 is your best choice for Microsoft Certification 70-561 Exam because of its high quality. It provides 70-561 practice test for the test, including the questions, answers and pinpoint explanations supplied by a group of IT experts.

Not only questions and answers, our material is also your access to high technical expertise and accelerated learning capacity. Our team of highly skilled staff that work in cooperation with numerous testing centers consistently works to provide the most up-to-date materials for the certification enthusiast like you.

Beyond the browser: Microsoft’s ‘C3’ next-gen platform for HTML-based applications

Must a traditional Web browser be the primary way to interact with and navigate a Web application?

Microsoft researchers think the answer is no. They are building another option — ‘C3,’ an extensible platform for HTML-based applications. Along with University of Washington researchers, Microsoft researchers will show off C3 at the WebApps’11 conference this June in Portland, Oreg.

 

 



Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

 

 

(C3 may stand for “cloud computing client,” one of my contacts said.)

Word of the existence of C3 emerged last November when researchers posted a technical paper, entitled “Verified Security for Browser Extensions.” That paper made mention of C3, which researchers called “a new platform for HTML5 experimentation developed entirely in a type-safe, managed language,” specifically C#. (They also subsequently referred to C3 in that paper as “a research Web browser.”)

There’s a bit more information available now about C3 (though the full WebApps’11 paper on it is not yet available). From one of the University of Washington researcher’s description:

“We present C3, an implementation of the HTML/JS/CSS platform designed for web client research and experimentation. C3 introduces novel extension points and generalizes existing ones, creating simpler and more powerful opportunities for customization. In addition, C3’s typesafe, modular architecture lowers the barrier to web and browser research. We discuss and evaluate C3’s design decisions for flexibility, and provide examples for various extensions that we and others have built.”

And from a UW Engineering Web page on the project:

“Nothing inherently confines webapps to a browser’s page- navigation idiom, and browsers can do far more than merely render content.”

The C3 team, which includes on the Microsoft side Wolfram Schute and Herman Venter, have done a lot of work around the concept of extensions, it seems. That leads me to wonder whether C3 is somehow connected to another Microsoft Research project, known as Xax.

“Xax is a browser plugin model that enables developers to leverage existing tools, libraries, and entire programs to deliver feature-rich applications on the web,” according to the Microsoft Research web page about the project. “Xax employs a novel combination of mechanisms that collectively provide security, OS-independence, performance, and support for legacy code.”

Microsoft Researchers are working on other browser- and HTML-app-centric projects, as well, including the ServiceOS/Verve one about which I’ve blogged previously.

Update: If you want to understand Microsoft’s obsession on plug-ins, the just-posted blog entry from the Internet Explorer team on add-ons and IE 9 reliability is worth a read.

Google insists it will remain open source player

Google insists that Android will remain an open source platform and takes great exception to reports to the contrary.

That’s good news.

“Recently, there’s been a lot of misinformation in the press about Android and Google’s role in supporting the ecosystem. I’m writing in the spirit of transparency and in an attempt to set the record straight,” wrote Andy Rubin, vice president of engineering at Google, in a blog earlier this month.

“Our approach remains unchanged: there are no lock-downs or restrictions against customizing UIs. There are not, and never have been, any efforts to standardize the platform on any single chipset architecture.

Google will release its Android 3.0 code to the open source community when it’s ready.

“We continue to be an open source platform and will continue releasing source code when it is ready. As I write this the Android team is still hard at work to bring all the new Honeycomb features to phones. As soon as this work is completed, we’ll publish the code. This temporary delay does not represent a change in strategy. We remain firmly committed to providing Android as an open source platform across many device types.”

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

It’s good news that Google reacted so negatively to questions about its open source commitment. If the company had been silent … now that would have been concerning.

I was one of those who raised concerns about Google’s decision — who spread the “misinformation.”

Rubin’s reaction is understandable to some extent. Google has done a lot of good for the open source community. And it employs Andrew Morton and Jeremy Allison, after all.

Nevertheless, it is the job of the press and the public to raise questions when there are apparent deviations to clearly defined principles of open source. That’s the beauty of transparency.

The beauty of open source is that it is open — open for inspection, open for debate and open for criticism.  Was some of the criticism a kneejerk reaction? Maybe.  Maybe not. Whether or not such criticism is “misinformation” has yet to be proven.  But it is worthy of discussion.

HOW TO: Make Craigslist Better & Prettier With a Browser Extension

Craigslist is one of the most useful and yet one of the ugliest tools on the Internet. And its bare-bones, basic feature set is both a blessing and a curse.

So, how to ease the pain of using Craigslist while keeping its simplicity and utility? Allow us to introduce you to Craigslist Helper.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

This handy browser extension (available for Chrome, Firefox and Safari) lets you preview text and thumbnails from your Craigslist search results. You can also bookmark listings and even make your own notes on them.

For example, if you’re househunting, you might use the app to see images of your new pad options without having 30 tabs open; then, you’d be able to prioritize them and even keep track of conversations with potential landlords, all without leaving Craigslist.

Other features include:

* Alerts when new listings that match your search appear
* Multiple searches by geographical area, or even a whole-site search
* Hide ads
* Filter by keyword; for example, choose not to see listings with “freeway”
* Map popups to show locations
* Phone number highlighting

Here’s an example screenshot showing housing listings within 350 miles of San Francisco:

As the extensions’ mysterious developer writes on Quora, “My guess is, [Craigslist doesn’t] innovate simply because they can afford not to — at least until a Facebook to their MySpace comes along.” And until another classifieds startup successfully challenges Craigslist — and believe us, a few of them are trying — apps like Craigslist Helper will have to do.

Will you be trying Craigslist Helper next time you have to do a classifieds search?

Microsoft 70-642 Certification Training

Microsoft 70-642 Certification Exam is of core importance both in your Professional life and Microsoft Certification Path. With 70-642 Certification you can get a good job easily in the market and get on your path for success. Professionals with passed Microsoft 70-642 Certification Exam are an absolute favorite in the industry. If you can pass Microsoft 70-642 Certification Exam then career opportunities are open for you.

 


Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

Certkingdom’s 70-642 braindump and 70-642 Training Tools are prepared by Industry Experts and Professionals who keep an eye on the latest 70-642 Certification Exam Objectives and change the 70-642 Exam Study Material accordingly. You will not only get the top quality 70-642 Study Material and Training Tools from Certkingdom but can be assured of it being up to date as well. Certkingdom offers economic 70-642 Certification Training Tools packages with best quality and dynamic updates. Use Certkingdom for accurate 70-642 Study Material for a successful preparation of 70-642 Certification Exam.

The specialty of Certkingdom 70-642 provide most updated and latest versions available so that you don’t have to bother about anything else. All you need is to log on to the Certkingdom site and get the 70-642 exam. The whole package includes not only 70-642 dumps, study guides but also test question which are real time exam simulations. Easiest way to get these certifications is to log on to the 70-642 Certkingdom and download the 70-642 practice exam to obtain your Microsoft 70-642 exam certification

With Certkingdom Microsoft 70-642 Training Tools, your ultimate success in Microsoft 70-642 Certification Exam is no more a dream. Certkingdom guarantees your passing Microsoft 70-642 Certification Exam.

Preparation Guide for Exam 70-299

Implementing and Administering Security in a Microsoft Windows Server 2003 Network Skills measured by 70-299 Exam

Implementing, Managing, and Troubleshooting Security Policies Plan security templates based on computer role. Computer roles include SQL Server computer, Microsoft Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server.

 


Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

*Configure security templates.
*Configure registry and file system permissions.
*Configure account policies.
*Configure .pol files.
*Configure audit policies.
*Configure user rights assignment.
*Configure security options.
*Configure system services.
*Configure restricted groups.
*Configure event logs.

Deploy security templates.
*Plan the deployment of security templates.
*Deploy security templates by using Active Directory-based Group Policy objects (GPOs).
*Deploy security templates by using command-line tools and scripting.

Troubleshoot security template problems.
*Troubleshoot security templates in a mixed operating system environment.
*Troubleshoot security policy inheritance.
*Troubleshoot removal of security template settings.

Configure additional security based on computer roles. Server computer roles include SQL Server computer, Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server. Client computer roles include desktop, portable, and kiosk.
*Plan and configure security settings.
*Plan network zones for computer roles.
*Plan and configure software restriction policies.
*Plan security for infrastructure services. Services include DHCP and DNS.
*Plan and configure auditing and logging for a computer role. Considerations include Windows Events, Internet Information Services (IIS), firewall log files, Netlog, and RAS log files.
*Analyze security configuration. Tools include Microsoft Baseline Security Analyzer (MBSA), the MBSA command-line tool, and Security Configuration and Analysis.

Implementing, Managing, and Troubleshooting Patch Management Infrastructure Plan the deployment of service packs and hotfixes.
*Evaluate the applicability of service packs and hotfixes.
*Test the compatibility of service packs and hotfixes for existing applications.
*Plan patch deployment environments for both the pilot and production phases.
*Plan the batch deployment of multiple hotfixes.
*Plan rollback strategy.

Assess the current status of service packs and hotfixes. Tools include MBSA and the MBSA command-line tool.
*Assess current patch levels by using the MBSA GUI tool.
*Assess current patch levels by using the MBSA command-line tool with scripted solutions.

Deploy service packs and hotfixes.
*Deploy service packs and hotfixes on new servers and client computers. Considerations include slipstreaming, custom scripts, and isolated installation or test networks.
*Deploy service packs and hotfixes on existing servers and client computers.

Implementing, Managing, and Troubleshooting Security for Network Communications Plan IPSec deployment.
*Decide which IPSec mode to use.
*Plan authentication methods for IPSec.
*Test the functionality of existing applications and services.

Configure IPSec policies to secure communication between networks and hosts. Hosts include domain controllers, Internet Web servers, databases, e-mail servers, and client computers.
*Configure IPSec authentication.
*Configure appropriate encryption levels. Considerations include the selection of perfect forward secrecy (PFS) and key lifetimes.
*Configure the appropriate IPSec protocol. Protocols include Authentication Header (AH) and Encapsulating Security Payload (ESP).
*Configure IPSec inbound and outbound filters and filter actions.

Deploy and manage IPSec policies.
*Deploy IPSec policies by using Local policy objects or Group Policy objects (GPOs).
*Deploy IPSec policies by using commands and scripts. Tools include IPSecPol and NetSh.
*Deploy IPSec certificates. Considerations include deployment of certificates and renewing certificates on managed and unmanaged client computers.

Troubleshoot IPSec.
*Monitor IPSec policies by using IP Security Monitor.
*Configure IPSec logging. Considerations include Oakley logs and IPSec driver logging.
*Troubleshoot IPSec across networks. Considerations include network address translation, port filters, protocol filters, firewalls, and routers.
*Troubleshoot IPSec certificates. Considerations include enterprise trust policies and certificate revocation list (CRL) checking.

Plan and implement security for wireless networks.
*Plan the authentication methods for a wireless network.
*Plan the encryption methods for a wireless network.
*Plan wireless access policies.
*Configure wireless encryption.
*Install and configure wireless support for client computers.

Deploy, manage, and configure SSL certificates, including uses for HTTPS, LDAPS, and wireless networks. Considerations include renewing certificates and obtaining self-issued certificates instead of publicly issued certificates.
*Obtain self-issued certificates and publicly issued certificates.
*Install certificates for SSL.
*Renew certificates.
*Configure SSL to secure communication channels. Communication channels include client computer to Web server, Web server to SQL Server computer, client computer to Active Directory domain controller, and e-mail server to client computer.

Configure security for remote access users.
*Configure authentication for secure remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and multifactor authentication that combines smart cards and EAP.
*Configure and troubleshoot virtual private network (VPN) protocols. Considerations include Internet service provider (ISP), client operating system, network address translation devices, Routing and Remote Access servers, firewall servers, practice exam questions and so on.
*Manage client configuration for remote access security. Tools include remote access policy and the Connection Manager Administration Kit.

Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI
*Plan and configure authentication.
*Plan, configure, and troubleshoot trust relationships.
*Plan and configure authentication protocols.
*Plan and configure multifactor authentication.
*Plan and configure authentication for Web users.
*Plan and configure delegated authentication.

Plan group structure.
*Decide which types of groups to use.
*Plan security group scope.
*Plan nested group structure.

Plan and configure authorization.
*Configure access control lists (ACLs).
*Plan and troubleshoot the assignment of user rights.
*Plan requirements for digital signatures.

*Install, manage, and configure Certificate Services.
*Install and configure root, intermediate, and issuing certification authorities (CAs). *Considerations include renewals and hierarchy.
*Configure certificate templates.
*Configure, manage, and troubleshoot the publication of certificate revocation lists (CRLs).
*Configure archival and recovery of keys.
*Deploy and revoke certificates to users, computers, and CAs.
*Backup and restore the CA.

Google Launches the Closest Thing to a Real Time Machine

Remember watching those time-lapse videos of growing plants in science class? They look pretty dated once you’ve checked out the same sequence through Google’s new “GigaPan Time Machine” application, which lets you zoom in and out of a time-lapse video without losing resolution.

 



Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

 

 

“With Time Machine, the cameras capture these image mosaics at regular intervals to create a video with hundreds of millions or even billions of pixels in each frame. The result is a video that viewers have the ability to zoom in on while it’s playing and see incredible detail,” Google wrote in a blog post (see video demo below).

For example, Google links to a video of potted plants growing from seed to full bloom. You can target where you zoom in and out to focus on certain leaves or flowers (you may even be able to spot a catepillar taking a chomp of a leaf). The panorama was created by taking photos every 15 minutes for 26 days, using a Canon PowerShot G10 mounted on an Epic Pro.

The application, created by a team of researchers from Carnegie Mellon University, uses GigaPan photo technology, which involves “stitching” together high-resolution photos to create a panorama. You might have come across it while spying on people at President Obama’s inauguration. It was also built using HTML 5, making it optimal to use with Chrome 7.0+, Google wrote. It works on Safari 5.0+ as well.

“Science has always been about narrowing your point of view — seeing a particular experiment or observation that you think might provide insight,” Illah Nourbakhsh, an associate professor of robotics at CMU told the Pittsburgh Post-Gazette.

In the future, Noubakhsh also said he expects upgrades whereby high-resolution photographs, stitched together into a vast panorama, can be taken in fractions of a second to better examine fast-paced events like sports or volcanic eruptions.

Check it out at GigaPan’s website, where you can also create your own time-lapse videos using stock photos.

How to See the Secret Tracking Data in Your iPhone

Coverage of the iPhone tracking “feature” has ranged from concern to outrage. “I don’t know about you, but the fact that this feature exists on an iPhone is a deal-killer,” wrote PCMag Columnist John Dvorak, shortly after news broke. PCMag Executive Editor Dan Costa drew a softer line, writing, “Apple may not be actively tracking you, but it did turn your phone into a tracking device without telling you.”

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

As frustrating as it is to learn that your iPhone has been spying on you, collecting an unencrypted treasure trove of your travels, the truth is we knew this was happening. Last June we reported that Apple updated its privacy policy, stating that it could, “collect, use, and share precise location data, including real-time geographic location of your Apple computer or device.” How precise that location data is remains in question. What is clear, however, is that the update arrived alongside the release of iOS 4—the OS affected by the tracking feature—and identified the four devices (iPhone 3G, iPhone 3GS, iPhone 4, and iPad with 3G) affected by the tracking feature.

I’m not about to give Apple a pass on disclosure or execution. Who combs through an Apple privacy statement when the latest iOS software awaits? And, to “collect” and “share” user data is one thing; to retain it in an unprotected file is quite another.

However, I think it’s important that, with a few days’ hindsight, we move beyond the bombast, pin down the facts, and see what’s actually there. To do this, I’ve taken a close look at what’s at risk and, in empirical spirit, borrowed fellow PCMag software analyst Jeff Wilson’s iPhone 3GS to see what I could learn of the man and the travels using Pete Warden’s iPhoneTracker app.

UPDATE: While I tested the tracking feature using the OS X-based iPhoneTracker, Windows users can access their data using iPhoneTrackerWin.

What and Who Is At Risk?
First, the bad news: if you’re running iOS 4, your location-based data—latitude and longitude coordinates, coupled with timestamps—is stored on your phone in a file called “consolidated.db;” that file is automatically transferred to any machines with which you sync (and back up), and it’s probably flowing back to Apple in some form or another. The worse news: if you haven’t encrypted your backups, that data is unprotected.

Now, for the not-so-bad news. There’s no confirmation that that data is leaving your custody and no evidence that Apple’s harvesting it towards nefarious ends. More likely, it’s being used for two things: Apple’s reportedly tapping location information to build a database, which may actually be for your own good; and other apps, such as Maps, require geo-locational data to play. To halt both in their tracks, you can disable Location Services.
World

Furthermore, the data is far from “precise.” In fact, Apple’s data collection is both inconsistent and imprecise. Rather than using GPS, location information logged in consolidated.db is determined by triangulation via cell-phone towers, a notoriously loose method. Update times run the gamut, left to the whims of cell-phone towers and phone activity. Finally, the location data available on your phone is limited by several variables:

* it dates back to the release of iOS 4, less than one year;
* only affects iPads with 3G or the iPhone 3G, 3GS, and 4;
* while data is timed to the second on your iPhone, you can only browse within a single week of activity using Pete Warden’s iPhoneTracker application

The final point is important: let me show you why. (Click “Next” below to keep reading.)

Certkingdom MB7-515 Exam

Microsoft MB7-515 Exam Description
The MB7-515 NAV 5.0 Financials is the MB7-515 exam associated with the Microsoft Certified Network Associate certification. Candidates can prepare for this MB7-515 exam by taking the NAV 5.0 Financials course. This MB7-515 exam tests a candidate’s knowledge and skills required to successfully install, operate, and troubleshoot a small to medium size enterprise branch network. the MB7-515 exam covers topics on VLSM and IPv6 addressing; extending switched networks with VLANs; configuring, verifying and troubleshooting VLANs; the VTP, RSTP, OSPF and EIGRP protocols; determining IP routes; managing IP traffic with access lists; NAT and DHCP; establishing point-to- point connections; and establishing Frame Relay connections.

 


Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

Microsoft MB7-515 Exam Topics
The following topics are general guidelines for the content likely to be included on the NAV 5.0 Financials exam. However, other related topics may also appear on any specific delivery of the Microsoft MB7-515 exam. In order to better reflect the contents of the MB7-515 exam and for clarity purposes, the guidelines below may change at any time without notice.

Certkingdom MB7-515 Exam Description
Take full advantage of your commute, downtime and lunch breaks with the newest addition to the Microsoft MB7-515 exam line of Microsoft MB7-515 training tools, MB7-515 training tools,the Microsoft MB7-515 Study Guide. Select your bandwidth for the best file size download, load it into your MP3 player or PC Media Player and let the training begin. Another guaranteed solution from Certkingdom. Certkingdom Microsoft MB7-515 exam is high enough to help the candidates to easy pass this MB7-515 exam easily without any other Microsoft MB7-515 study materials and no need to attend the expensive training class.

The Microsoft MB7-515 Study Guide will take you from weak to geek in our 100% guaranteed solution for getting your head wrapped around the Microsoft MB7-515 exam content and theories. The Certkingdom Microsoft MB7-515 guide is the perfect prelude to using the Microsoft MB7-515 exam simulator. Designed to work together for the ultimate learning and comprehending experience – the Microsoft MB7-515 study guide is training done right.

Many IT professionals prefer to add exam Microsoft MB7-515 among their credentials. The Microsoft certification MB7-515 exam strengthens the employment prospects and opens up myriads of opportunities for them. Certkingdom not only caters you all the information regarding the Microsoft MB7-515 exam, but also provides you the excellent Microsoft MB7-515 exam dumps and MB7-515 study materials which makes the certification exam easy for you.

Certkingdom Microsoft MB7-515 exam study materials includes Microsoft MB7-515 braindumps, Microsoft MB7-515 study guide, Microsoft MB7-515 practice exam, Microsoft MB7-515, MB7-515 questions and answers and much more which will not only enhance your abilities to cope with the problems but you will also be able to manage online real time problems. The only way to achieve Microsoft MB7-515 exam guide is to get Microsoft MB7-515 braindumps only at Certkingdom Microsoft MB7-515 exam.

MCITP Certification (The Master Series)

The new generation in Systems Administration and Microsoft related local area mcitp certifications networking certification has arrived. The day of the MCSA and MCSE are almost completely behind us. As Server 2008 hits the shelves and becomes a staple in American business and government, employees need to now begin to be trained on the newest and most technologically advanced Server platform. The MCSE and MCSA certification exams will soon be retired, and in their place comes the MCITP Server Administrator.

 


Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

Microsoft Certified IT Professional – Server Administrators are trained experts in managing and troubleshooting Windows Server 2008. With this certification, a certified MCITP – SA is typically capable of providing service for, and operating an organization’s Windows Server 2008. He or she will be able to contribute to the successful and financially beneficial optimization of MCITP Certification 2008.

Microsoft recognized mcitp boot camp that these various professional level certifications had many different duties and experience levels. And furthermore, each of these jobs roles required different technologies in order to perform their duties. Someone who was a server administrator for somewhere between two to five servers didn’t need to be as familiar with some of the technologies as someone who managed an entire enterprise, just as a database administrator didn’t need to be as familiar with programming as an administrator.

this conclusion led Microsoft to determine that each job role they created needed to be stringently tested on not just their job role, but the technologies associated with that job role. And thus, Microsoft determined that a new level of certification was needed to reach the level of a professional. They called this level the Microsoft Certified Technology specialist, or MCTS.

As an MCTS, Microsoft would certify someone as familiar and capable of operating the complicated components involved with their technologies, such as active directory and terminal services. However, the amount of MCTS certifications a person needed to acquire in order to MCITP: Enterprise Administrator qualify for a professional level certification greatly varied – an still varies to this day. The purpose of this guide, in so few words, is to familiarize you with what those requirements are. And what you’ll need to know in order to attain your MCITP in one of the four main categories of what Microsoft has called the Microsoft “Master” series.