BradEgeland.com
  • Welcome
  • Blog
  • Expertise
  • Resume
  • Software / Service Reviews
  • Contact
  • Videos
  • Books / White Papers
  • Mentoring Contact Form
  • Awards/Recognition
  • Templates & Downloads
  • Clients
  • Professional Services
  • Past Survey Results

The Certification Every Tech Project Manager Should have in 2022

4/29/2022

2 Comments

 
Picture
–“That class was by far the best class I have ever had from Cheetah.  I have given my recommendations to training teams here as I feel that each and every PMP Should take your Agile Class!”

Become Cheetah Agile Certified

Use code "BRADAGILE" for 10% off. I only endorse great things I'm sure about. If you have any questions about the certification, you can ask me directly. Contact me through my site or by email.


Agile is an umbrella term for a number of project methodologies, Scrum being the most widely used. The Cheetah Agile approach ensures you have the bases covered on what it means to use an “Agile” approach to doing projects. At their core, all Agile project methodologies share common characteristics. When you become Cheetah Agile Certified, you are qualified to lead Agile projects, whatever the unique nuance of the specific agile method.

You also earn an Agile Project Management credential you can connect via your LinkedIn profile. This opens you up to being qualified for lucrative Agile PM positions on LinkedIN averaging $110k salary per year. You will also demonstrate to others you have the ability to generate significant results with your Agile projects Cheetah FAST.

When you master how to do projects using the Cheetah Agile approach, you’ll find yourself doing a better job of selecting those projects you can actually finish with two weeks of intensive effort. Granted, people are often acclimated to projects taking longer than two weeks to complete, but many significant projects can be completed in just two weeks.

You’ll find yourself achieving fantastic results that propel your career forward Cheetah FAST as you practice the Cheetah Agile approach to completing your projects.

Best of all, with this credential, once Cheetah Agile Certified, you’re always Cheetah Agile Certified.  (it’s not like you can unlearn how to be FAST and EFFECTIVE).

You can add to this credential for every Cheetah Agile Project you complete. After you finish this course, you will receive a link to update your Cheetah Agile Certified credential with completed projects.  For each project you file, you will get a new credential certificate that shows you have successfully completed x number of Cheetah Agile Projects by the number of spots on your credential.

Most people who are Cheetah Agile Certified complete 10 to 12 Cheetah Agile Projects a year.  After you complete your 50th Cheetah Agile Project, you earn the Cheetah Agile Guru status.

​
Use code "BRADAGILE" for 10% off. I only endorse great things I'm sure about. If you have any questions about the certification, you can ask me directly. Contact me through my site or by email.

2 Comments

Guest Content Posted and Free Advertising for Your Old Equipment Donation to Macs 4 Cancer Kids

4/29/2022

0 Comments

 
Do you have a guest post in need of a home? I will post your content and promote it. My hope is that you will donate an unwanted, but working tech item to my "Macs 4 Cancer Kids" in exchange for the content post and promotion.

Donate your old Macbook, Macbook Pro or Macbook Air (preferrably 2012 or newer and working - preferably able to run at least Mac OS 10.11.6 El Capitan) or iPad (preferably 5th gen or newer and also working) to my "Macs for Cancer Kids" campaign and get your content posted and promoted and, if applicable, your company's software or site advertised with a banner ad and box ad (with do-follow links) on my site for the next 6 months free. Thanks!!! 
Contact me or email me on where to send. http://www.bradegeland.com/contact
0 Comments

PMs - Are You Making $110,000? You Should Be

4/28/2022

1 Comment

 
Picture
Become Cheetah Agile Certified

Agile is an umbrella term for a number of project methodologies, Scrum being the most widely used. The Cheetah Agile approach ensures you have the bases covered on what it means to use an “Agile” approach to doing projects. At their core, all Agile project methodologies share common characteristics. When you become Cheetah Agile Certified, you are qualified to lead Agile projects, whatever the unique nuance of the specific agile method.

You also earn an Agile Project Management credential you can connect via your LinkedIn profile. This opens you up to being qualified for lucrative Agile PM positions on LinkedIN averaging $110k salary per year. You will also demonstrate to others you have the ability to generate significant results with your Agile projects Cheetah FAST.
​

When you master how to do projects using the Cheetah Agile approach, you’ll find yourself doing a better job of selecting those projects you can actually finish with two weeks of intensive effort. Granted, people are often acclimated to projects taking longer than two weeks to complete, but many significant projects can be completed in just two weeks.

Note: Use discount code "BRADAGILE" for 10% off your training and certification.


1 Comment

Cybersecurity Litigation Risks: 4 Top Concerns for CISOs

4/27/2022

0 Comments

 
Cybersecurity and data protection are expected to become top drivers of legal disputes. What litigation risks should CISOs be most concerned about and what can they do about it?

The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs.
According to Norton Rose Fulbright’s latest Annual Litigation Trends Survey of more than 250 general counsel and in-house litigation practitioners, cybersecurity and data protection will be among the top drivers of new legal disputes for the next several years. Two-thirds of survey respondents said they felt more exposed to these types of disputes in 2021, up from less than half in 2020, while more sophisticated attacks, less oversight of employees/contractors in remote environments, and concerns about the amount of client data were all cited as mitigating factors.

Clearly, the risks of litigation are very real for CISOs and their organizations, but what are the greatest areas of concern and what can they do about it?

Data breaches draw lawsuitsIn the last 18 months to two years, the chances of an organization facing litigation following a data breach have increased significantly, particularly when a company is perceived to have not handled a breach well, says lawyer and Cordery partner Jonathan Armstrong, who specializes in technology and compliance legal matters. “With a big data breach now, litigation is a probability, not a possibility,” he adds.

While propensity for legal action varies by geography, the continuing scale of cyberattacks has resulted in more explicit assertions from government, industry, and regulatory bodies on what constitutes poor security, opening the door to more legal action, Alex Jinivizian, vice president strategy and corporate development at eSentire, tells CSO. “Some of the most high-profile data breaches--Equifax, Marriott, Target, the U.S. Office of Personnel Management—resulted in significant lawsuits against those companies related to losses of confidential employee or customer data caused by poor standards around security hygiene,” he says.

The implications can be considerable for businesses, Armstrong warns. “Damages sought in different cases are high at the moment. As just one example, TikTok is facing an action in the Netherlands for €1.5bn, and there are similarly high value claims in other countries, too, including the UK and Germany. Data related litigation has been a feature of U.S. corporate life for many years as well.”

CISOs under fireThe risk of litigation is not limited to corporations. CISOs themselves face being subject to legal action for breach of duty where insufficient steps were taken to prevent a breach, or the aftermath of the breach was handled badly, says Simon Fawell, partner at Signature Litigation LLP.

Jinivizian agrees: “The role of the CISO has never been more critical for mid/large enterprises, and potentially more in the crosshairs and held accountable for security incidents and data breaches, as illustrated by the ongoing class action against SolarWinds’ CISO and other executives following the devastating supply chain attack in 2020,” he states.

This is also evidenced by the charges against Uber’s CSO for allegedly trying to cover up a ransomware payment relating to the 2016 attack that compromised data of millions of users and drivers, Armstrong adds.

If a CISO acts as a company director, then they could face shareholder actions for breach of duty following data and privacy breaches based on damage to company value, says Fawell. “Shareholder actions against directors have been on the rise in the UK and, where a data breach has led to a drop in value for shareholders, claims against directors are increasingly being considered. This mirrors the trend in other jurisdictions such as the U.S. where CISOs have already been the subject of high-profile claims for breach of duty.”

Loss of trade secrets and reputational damageThe potential fallout from data breach or privacy litigation includes significant fines, civil and criminal penalties, reputational damage, and adversely affected stock price. All can impact organizations and CISOs individually and in combination. Where important information is lost, the damage can be extremely high, adds Alasdair Marshall, associate at Signature Litigation LLP. “For example, were an intermediary or agent to have a breach incident and lose trade secrets or information that is potentially very damaging to another company’s reputation, that could lead to major litigation. In recent years, the Panama Papers and Credit Suisse incidents have highlighted a growing number of individuals seeking to obtain sensitive information and publish it to the market.”

What’s more, defending litigation can be both costly and time-consuming, Marshall says. “While the English system allows for the winning party to recover legal costs from the loser, it is rare that the amount spent on legal fees and ancillary costs are clawed back in full. Litigation also requires significant CISO and board level attention which would be more productively focused on growing and protecting the business for the future.”

Litigation can have direct implications on cyber insurance matters, too, impacting things like coverage exceptions, renewals, and new business. The companies and CISOs that bounce back the fastest are those that put their customers first by being transparent, doing whatever it takes to help impacted customers minimize the impact, and sharing the steps they plan to take to ensure it doesn’t happen again, says Russ Kirby, CISO at ForgeRock.

Regulations and requirementsGeographical factors are particularly important in relation to litigation risks CISOs and their organizations face, experts agree. For example, the threat of mass class actions for large scale breaches has diminished somewhat in the UK following the Supreme Court decision in Lloyd vs Google which halted an “opt-out” class action under the existing procedural frameworks and highlighted the difficulties in bringing mass data claims under the English rules, says Fawell. “Whilst the decision hasn’t completely blocked the possibility for class actions in data privacy cases and there remain a number of claims running through the English courts that are framed differently and could yet have success, it is a fairly major set-back for claimants,” he adds.

That said, the pressure for individuals impacted by data breaches to be compensated is growing and it would not be surprising to see some form of opt-out class action regime being introduced for data privacy cases in the relatively near future, Fawell says. “An opt-out regime has already been introduced in the UK for competition claims and data privacy would be the next logical area for a similar approach.” Although the threat of mass class actions has diminished in the UK for the time being, the threat of individual litigation remains very apparent, particularly where high value corporate data is potentially compromised, he continues. “The GDPR (and related UK legislation) has led to a much greater awareness of data privacy issues and increased focus on contractual clauses in commercial deals.”

As for the U.S., things can get just as or even more convoluted, says former CISO Jack O’Meara, who leads litigation support services at consultancy Guidehouse. “For example, a CISO working at a U.S. Defense Industrial Base Contractor needs to comply with Defense Federal Acquisition Regulations (DFARS) 252.204-7012 safeguarding covered defense information and cyber incident reporting, while a CISO working for a financial institution in New York needs to comply with New York State Department of Financial Services 23 NYCRR 500 cybersecurity requirements for financial services companies.”

Meanwhile, a judge recently approved a $17.6 million class settlement brought on by plaintiffs of Kemper Insurance, who alleged violations of California’s Consumer Privacy Act, while the Securities and Exchange Commission (SEC) has proposed new mandatory cybersecurity disclosure rules for publicly traded firms, along with written cyber policies and procedures, enhanced reporting, and records management for private equity and investment firms.

Ultimately, U.S. CISOs need to have knowledge of specific cybersecurity requirements contained within the contracts their companies hold, O’Meara adds. “There are too many regulations and requirements to mention in this article, but a CISO needs to be knowledgeable of the ones applicable to their industry and geographic regions.”

Mitigating the risks of litigationTo mitigate and reduce the risks of litigation, CISOs must first examine whether their security program is “defensible” under harsh scrutiny and able to change and adapt to new threats, Kirby says. “For example, if it can’t stand up to questions about whether your protocols follow local laws and industry standards, you need to act fast to address those gaps.”

Fawell cites five questions that are useful in gauging the effectiveness of a breach response plan from a litigative perspective:

  1. Who are the key service providers to call?
  2. What are the internal lines of communication? Who makes the call on instructing lawyers and other key advisors? Is it the CISO or does it require other approvals?
  3. If the system is down, how do key personnel handling the breach communicate securely?
  4. What type of breach is most likely to impact the company and who are the counterparties most likely to be affected?
  5. What do the data privacy clauses in contracts with counterparties require? Are there notification requirements in those contracts?
“Planning can range from, at a minimum, ensuring the answers to the questions above and others have been considered and the answers are known to the key individuals who will be handling a breach, to having a full simulated breach to stress test processes,” Fawell adds.

O’Meara says CISO should be able to provide documented policies and procedures including artifacts of compliance, screenshots of security configuration settings, firewall logs, access audit logs, user computer system and application access request forms, and employee security training records, when requested.

Armstrong recommends that CISOs engage with lawyers who are used to handling these types of risks and litigation before an incident occurs. “When you do have an incident, it is important not to try and deal with it as a lone cowboy,” he says.

In the same vein, O’Meara suggests U.S. firms partner with in-house counsel to understand litigation risks and the associated impacts and ramifications.

It is also essential that CISOs are familiar with the terms of a company’s cyber insurance policies—chiefly what is/is not covered and the notification requirements in the event of a breach, Fawell says. “Insurers should generally be one of the first ports of call. Not only is it important to ensure that the cover bites, insurers are often also a good source of information and advice on how to handle certain aspects of a breach.”

Furthermore, security leaders must be careful about what information is (and is not) recorded in the immediate aftermath of a breach, Fawell continues. “It is important to keep a clear audit trail of the decisions taken and why. However, while dealing with an immediately challenging situation, it is not unusual for ill-judged comments (often from high level personnel) to be recorded in writing, which can be unhelpful in later legal proceedings. It is particularly important that everyone understands which communications are likely to have the protection of legal privilege in relevant jurisdictions and which will not.”

Armstrong has seen this play out. “Privilege is critical. Commonly, litigants are making very early requests to see internal memos, communications, and forensic reports. If you don’t set up privilege properly, you are likely to have to disclose all materials.”
​
It is sensible, where possible, to have an in-person meeting among key personnel to establish clear lines of communication and ensure that the audit trail accurately and clearly details the response process, Fawell advises.
0 Comments

How To Choose The Right Online Coding Courses For You

4/27/2022

0 Comments

 
Whether you want to learn a new skill or brush up on an old one, taking an online course is an excellent way to learn more. Coding is one of the most in-demand skills right now, which means there are a lot of online coding courses available out there. However, choosing the right online coding course can be tricky. Remember that some courses can be very helpful as you start your career, while others will just provide you with additional tools. Here are some factors that you need to consider when choosing the right online coding course for you:

Course Coverage

The most important thing to consider is exactly what the course covers. If it doesn't cover everything that you need, then it may not be worth your time. Think about how much experience you have with programming and if the course covers any languages you don't use. Also, think about any specific technologies you'd like to learn. Do they teach web design, game development, cybersecurity, or mobile app creation?  You may also want a refresher course instead of starting from scratch. Once you've got a good idea of what you need from the course, start looking through reviews and see what other people thought about it.

Skill Level

Online coding courses are usually designed for individuals at different levels. Some are geared towards beginners and will focus on HTML/CSS basics and JavaScript, while others are focused on intermediate programmers who are ready to jump into advanced topics. There are also coding learning sites for kids where they tailor lessons according to each child's age and interests. Depending on your skill level, remember to look over the course material and make sure it matches your needs before enrolling.

Time Commitment

Many online coding classes require students to spend hours every day going over the material. Not everyone has this amount of free time, so make sure you can fit it into your schedule. Coding courses can either be short-term, long-term, or even part-time so choose accordingly. Look for flexibility regarding scheduling and length of the class. If you know that you won't have enough time to complete the entire course on time, then it's best to choose another one instead. Having other commitments can impact your ability to dedicate yourself fully to a coding course, so keep that in mind.

Learning Methodology

Another key factor to take into consideration is the method used in the coding course. We all have different learning styles and preferences, so make sure you find out how the teacher teaches his material. For example, do they use visual aids? How do they create assignments? Is it more of a lecture format or a hands-on course? These are things you'll want to pay attention to when making your decision. You may think that because others can learn through lectures alone, you are limited to the same style. That couldn't be further than the truth! Many teachers use multiple methods depending on the subject matter and the type of learner. 

Cost

Finally, cost should always be taken into account when deciding which online coding course to choose. As you probably know, online courses come at different prices. While some are completely free, others charge anywhere from $10-$100 (or even more). Make sure you check the course’s cost before signing up since some offer additional bonuses along with the course itself. You don't want to pay money only to find out that the course isn't as great as it seems.

Additional Features

Like what was mentioned in number five, there are certain features that go along with an online coding course. Maybe the site offers bonus content, access to community forums, or even live chat sessions where instructors answer questions directly. These are just a few examples, but they could really add value to your course selection.

For example, there are also coding courses that provide certifications upon completion. This certification shows employers that the student learned the material well and put it to good use. Certificates aren't required, but they can definitely enhance your experience and show off your hard work. 

Community

Lastly, don't forget about the community aspect of any online coding course. Most likely, you will interact with other learners throughout the duration of the course. They will share information with you and ask questions about the course material. Having a great community can make all the difference when learning how to code. So don't forget to take a look at who you'll be interacting with when you take a certain coding course.

Conclusion

While selecting which online coding course to join can seem daunting, it doesn't need to be. With these tips in mind, you will find it easier to select the right program for you. There are a few considerations to remember when choosing a coding course, but when you know what to look for, finding the perfect fit won't be too difficult.


0 Comments

Gain Project Portfolio Clarity Easier

4/27/2022

0 Comments

 
Proggio is focused on Companies that Need Clarity with +500 People, Multiple Projects and Cross-Dependancies. Unlimited Users & Easy-to-Use Tools for Company-Wide Adoption and Alignment. Get a Demo.
0 Comments

OnePlan Strategic Portfolio Management Solutions

4/27/2022

0 Comments

 
Picture
OnePlan Strategic Portfolio Management Solutions

​
Organizations wish to adapt, innovate, and compete. In reality, they are like the people in them: complex, full of potential, and with old habits. Business agility means adopting the mindset, practices, and tools to become more value-focused and customer-obsessed. The OnePlan team’s purpose is to help your organization on its path to innovation, flexibility, and speed by offering technology and consulting services to suit your needs at different stages of your journey.
0 Comments

Best Certification Right Now - Cheetah Agile

4/27/2022

0 Comments

 
Picture
Want to do your career the best service as fast is possible? Get Cheetah Agile Certified. I've done the research - trust me. It's the best possible thing you can do for your tech career today. Fast, makes a difference not only for Project Managers, but for all and will help you learn faster and retain.

And don't forget to use "BRADAGILE" for 10% off you certification. As a 20+ year PM, I know what I am talking about. Signup today.

Cheetah Agile Projects - Quick Start

In just 20 minutes with their free webinar, learn what it takes to become Cheetah Agile Certified and complete significant projects in two weeks using the Cheetah Agile Project approach. 

When you become Cheetah Agile Certified, you earn a credential that you can connect on your Linked in Profile. 

This opens you up to recruiters who are filling over 5800 jobs for Agile Project Managers at salaries of $110,000.

Cheetah Delivers

"I've used Cheetah's accelerated approaches to doing projects for years and have accomplished so many more things in both my personal and professional life from having these skills. You'll be delighted what this can do for you."
Barb S., PMP

0 Comments

Cyber Chiefs are Trying New Ways to Attract Talent

4/27/2022

0 Comments

 
Picture
Picture
Cybersecurity and risk executives are adopting new ways to attract talent, in part by looking outside degree requirements and traditional technology backgrounds.

Organizations such as the International Information System Security Certification Consortium, or ISC2, say the demand for cybersecurity workers is far outstripping the available workforce.

The nonprofit training organization estimates in its latest annual workforce study that around 2.72 million more cybersecurity workers are needed globally.

While that figure is down from 3.12 million in the previous year’s study, hiring remains a slog, especially for companies looking to expand their cyber teams during a period of heightened threats from hackers.

Shaun Marion, chief information security officer at fast-food chain McDonald’s Corp. , is in the midst of bringing many contracted cybersecurity roles in-house, especially those at the entry level, he said. Mr. Marion also plans to hire another 30 to 40 cyber professionals this year.

The shift will help improve prospects for people who want to build cyber careers at McDonald’s, Mr. Marion said. “Once I get people here, I can expose them to all the opportunities they have,” he said. “It’s not hard to retain. But getting them in is hard.”

At payments provider Visa Inc., which has around 1,150 staff working on cyber-related roles globally, Chief Risk Officer Paul Fabara said he is keenly aware that losing employees without the ability to replace them can be just as disruptive as not being able to fill the roles in the first place.
“You have to start planning way in advance,” he said. “If you start by the time attrition hits you, if you don’t have three or four people in the pipeline for a single role, you’re going to fall short of meeting the demands of that job.”

That can have real consequences for companies, and for the remaining employees who still have to run security operations centers, fusion centers and other cyber operations at peak performance levels.

“The worst thing you can do in this type of environment, because you’re operating on a 24x7 basis, is to burn people out,” Mr. Fabara said.

Thinking broadly about candidates is key for Steven Babb, CISO at Mitsubishi UFJ Financial Group’s investor services business. Mr. Babb said he supports initiatives that aim to increase gender representation in the workplace, and he’s also interested in candidates who aren’t necessarily from straight cybersecurity backgrounds but may have relevant experience in other departments.

“We give people the opportunity to come in to learn about the business, to learn about our technology and to apply what they know, such as transferring skills from other areas into security as well,” Mr. Babb said.


At McDonald’s, Mr. Marion says the help desk can feed the general roles in the cybersecurity group because technicians there know how to handle ambiguity and solve problems in real time. Serious online gamers make good staff for the security operations center, he said, where the ability to work odd hours, cooperate and think quickly are required.

“I search for attitude and aptitude and lay security training on top of that,” he said.

The idea of considering candidates with nontraditional backgrounds is gaining traction for external hires, as well as existing employees. For Mr. Marion, looking only for college graduates is “myopic.” Not only don’t the numbers support that route, but requiring a degree eliminates good candidates, he said.

The cybersecurity industry has come under criticism in the past for its unrealistic requirements for entry-level positions, with some banks and other organizations asking for advanced degrees and professional certifications that require years of experience to achieve.
​
“College is not for everybody, and not everyone has access to college because they lack the financial wherewithal or community support,” Mr. Marion said, which often excludes people who could help round out the gender and ethnic diversity he seeks in his staff.

Some senior roles need a degree, such as in cyber and privacy risk assessment. But many positions don’t, he said. Stripping mentions of degrees and professional certifications from many cyber job descriptions took some convincing of the human-resources group, he said.


And the numbers favor his approach. According to the most recent figures from the National Center for Education Statistics, just about 2 million bachelor’s degrees were conferred in 2021.


“The point is, you won’t get all your talent from college,” he said. “Even if you could, I don’t know that I’d want to.”
​

Write to James Rundle at james.rundle@wsj.com and Kim S. Nash at kim.nash@wsj.com


By 
James Rundle and Kim S. Nash


0 Comments

Donate an Old Macbook or iPad to Macs 4 Cancer Kids for Free Ad on My Site

4/26/2022

0 Comments

 
Donate your old Macbook or Macbook Pro or Macbook Air iPad to my "Macs for Cancer Kids" campaign and get your company's software or site advertised with a banner ad and box ad (with do-follow links) on my site for a year free. Thanks!!! Contact me or email me on where to send. http://www.bradegeland.com/contact
0 Comments
<<Previous

    Author:

    Picture

    Brad Egeland


    Named the "#1 Provider of Project Management Content in the World," Brad Egeland has over 25 years of professional IT experience as a developer, manager, project manager, cybersecurity enthusiast, consultant and author.  He has written more than 8,000 expert online articles, eBooks, white papers and video articles for clients worldwide.  If you want Brad to write for your site, contact him. Want your content on this blog and promoted? Contact him. Looking for advice/menoring? Contact him.

    Picture
    Picture
    Picture
    Picture
    Picture
    Picture

    RSS Feed

    Archives

    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012
    May 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    March 2011
    January 2011
    December 2010
    November 2010
    October 2010
    September 2010
    August 2010
    June 2010
    May 2010
    April 2010
    March 2010
    November 2009

    RSS Feed

Powered by Create your own unique website with customizable templates.