If you are not sure if the website you would like to visit is secure, you can verify it here. Enter the website address of the page and see parts of its content and the thumbnail images on this site. None (if any) dangerous scripts on the referenced page will be executed. Additionally, if the selected site contains subpages, you can verify it (review) in batches containing 5 pages.
favicon.ico: qnxauto.blogspot.com - QNX Auto Blog.

site address: qnxauto.blogspot.ca redirected to: qnxauto.blogspot.com

site title: QNX Auto Blog

Our opinion (on Friday 29 March 2024 14:57:50 GMT):

GREEN status (no comments) - no comments
After content analysis of this website we propose the following hashtags:


Proceed to the page?Powered by: Very Tiny URL Shortener at http://vturl.net VeryTinyURL

Meta tags:

Headings (most frequently used words):

the, qnx, by, digital, in, of, search, 2017, april, cars, is, topic, contributor, browse, security, previous, all, posts, trinity, feed, components, enables, cockpits, core, 18, our, software, blog, friday, 28, soc, foundational, to, experience, role, blackberry, dashboard, tuesday, auto, subscribe, personal,

Text of the page (most frequently used words):
the (110), and (68), #digital (29), #that (25), ams (17), qnx (16), #system (15), for (15), #security (15), key (15), this (14), #with (14), are (13), cluster (13), can (13), #authentication (12), #cockpit (11), all (11), #secure (11), infotainment (10), #software (10), keys (10), systems (9), must (9), car (9), chain (9), experience (8), asymmetric (8), using (8), instrument (8), april (8), manufacturing (8), #cars (8), such (8), soc (7), personalization (7), from (7), which (7), chip (7), user (7), share (7), blackberry (7), may (7), there (6), run (6), cryptographic (6), hypervisor (6), will (6), three (6), december (6), november (6), control (6), october (6), january (6), trust (6), shared (6), supply (6), trusted (5), more (5), august (5), automotive (5), also (5), july (5), june (5), clusters (5), safety (5), being (5), march (5), platform (5), symmetric (5), algorithms (5), february (5), not (5), september (5), used (5), single (5), points (4), end (4), production (4), via (4), how (4), devices (4), stored (4), those (4), public (4), sites (4), every (4), important (4), because (4), product (4), time (4), both (4), enables (4), device (4), core (4), securely (4), factories (4), management (4), vehicle (4), products (4), have (4), requirements (4), content (4), called (4), hardware (3), without (3), bill (3), cloning (3), boldt (3), subscribe (3), industry (3), processing (3), test (3), make (3), way (3), screens (3), heads (3), sender (3), feature (3), cost (3), asset (3), into (3), provisioning (3), foundational (3), would (3), level (3), posts (3), secret (3), nodes (3), only (3), two (3), components (3), step (3), 2017 (3), protection (3), appliances (3), board (3), most (3), but (3), certicom (3), pillars (3), displays (3), features (3), powerful (3), allows (3), access (3), thus (3), multiple (3), overall (3), crypto (3), autonomous (3), connectivity (3), reality (3), silicon (3), one (3), works (2), certification (2), independent (2), chips (2), a3900 (2), rightware (2), ultimately (2), they (2), virtual (2), high (2), use (2), process (2), running (2), anchor (2), elements (2), demonstrated (2), machines (2), sign (2), verify (2), data (2), intel (2), less (2), shows (2), component (2), its (2), secured (2), 2011 (2), equipment (2), operations (2), vulnerabilities (2), implement (2), some (2), remote (2), type (2), outsourced (2), visibility (2), need (2), including (2), deployed (2), isolation (2), tier (2), attack (2), than (2), suppliers (2), methods (2), considered (2), ensures (2), developed (2), savings (2), inject (2), off (2), between (2), uses (2), instead (2), counterfeiting (2), blog (2), transmitted (2), identity (2), hdcp (2), solution (2), number (2), does (2), unified (2), protect (2), well (2), telematics (2), processor (2), defined (2), today (2), their (2), driver (2), market (2), approach (2), ces (2), trinity (2), limited (2), subsidiary (2), auto (2), valuable (2), allowing (2), personal (2), brand (2), v2x (2), equity (2), cas (2), drm (2), romain (2), saha (2), cockpits (2), design (2), search (2), concept (2), hud (2), module (2), atom (2), crash (2), never (2), possible (2), made (2), provides (2), development (2), manager (2), where (2), manufacturers (2), cannot (2), posted (2), comments (2), pinterest (2), facebook (2), twitter (2), email (2), private (2), blogthis (2), across (2), capability (2), arrived (2), has (2), authentic (2), other (2), adas (2), copying, any, several, flow, qpic, offers, exciting, semiconductor, manage, designs, wafer, deploys, bonding, packaging, testing, prevents, platforms, enhances, own, firmware, subcontractors, overbuilding, operating, ameliorates, unique, better, shift, integrity, interact, assets, company, increasingly, tied, directly, them, subsequently, ways, proportional, processes, drivers, happens, generated, injected, here, injection, confidentiality, imagined, personality, specified, speak, point, leverages, comes, form, advances, binary, tuesday, length, namely, further, assigned, memory, look, business, get, bringing, enable, mathematical, enough, described, create, series, socs, performance, creates, potential, significant, you, truly, computationally, leverage, underlying, meets, required, subsystems, simultaneously, considerations, intensive, meet, costly, brute, involves, meeting, functional, certifying, entire, possibility, ideal, force, processors, increase, replace, were, traditionally, existing, soon, released, rarity, proposition, facing, definitions, available, quite, dawn, loosely, combines, automobile, comprehensive, include, interior, gaze, tracking, alliances, trategic, friday, acoustics, been, addition, mainstream, simplify, adoption, necessitates, different, requires, collapsing, onto, few, newer, aside, luxury, nothing, inherently, complicated, understood, while, somewhat, architecture, challenge, above, discrete, head, unit, entertainment, part, new, these, parts, viewed, accurately, interface, perspective, canvas, technology, world, priority, rendered, work, consideration, carefully, selected, achieve, compelling, role, dashboard, creative, care, bags, given, address, overarching, critical, brake, warnings, air, poor, tandem, fundamental, fully, having, certify, rest, action, accomplished, display, each, same, elegant, treated, stand, alone, certified, separately, whatever, reason, isolate, monitor, variable, example, however, equally, screen, rendering, done, properly, imagine, renders, graphics, park, reverse, consequences, could, catastrophic, handled, introduced, 2004, subcontractor, our, active, noise, anc, acoustic, topic, feed, audi, home, older, anchors, guaranteeing, apps, augmented, many, 104, enhancement, electric, distraction, 129, connected, team, cloud, chrysler, bmw, awards, starts, benefits, engine, communicate, inside, program, installed, ates, agent, operate, local, course, automated, ate, facilities, diagram, headquarters, controller, runs, acc, iot, asic, segments, noted, chart, optional, block, built, fpga, beyond, acts, lockbox, adding, extremely, wide, range, storage, sound, ford, touch, chubachi, previous, kerry, johnson, paul, leroux, yoshiki, tina, cockp, jeffrey, thomas, bloor, patryk, fournier, contributor, browse, 2016, framework, research, motion, powered, blogger, 105, 2012, 2013, 2014, 2015, wireless, toyota, fota, 26262, mobile, mirrorlink, mercedes, iso, 121, onstar, html5, hmis, hands, free, freescale, navigation, carrera, entune, smartphones, texas, instruments, speech, interfaces, porsche, reliability, reference, contractors, easily, various, gaining, complex, global, chains, begins, securing, driving, increasing, received, traction, main, literally, safe, therefore, essential, combination, signals, evolution, special, prove, signs, messages, derived, knowing, discretion, mathematics, proves, generate, pair, message, once, personalized, provide, arguably, starting, leading, perform, makes, liquidated, damages, clauses, contained, definition, conditional, add, minimizes, rights, remain, tampering, grey, marketers, particularly, risk, stages, commercial, transmission, enabled, similar, agreements, aacs, advanced, dtcp, cprm, attackable, recordable, media, manner, protects, vulnerable, mathematically, clear, gained, dealers, assures, easy, require, happen, oem, distributors, aftermarket, numbers, sensors, ecus, gateways, domain, area, controllers, foundries, serial, links, tracked, serializing, tagging, individual, identities, tagged, dice, throughout, electronic, pass, track, yield, fight, ids, selection, improve, established, back, cryptography, trade, especially, higher, bandwidth, buses, ethernet, easier, beforehand, added, contrast, distribute, store, presents, relatively, later, initially, authenticate, flexibility, next, node, then, storing, pre, increases, very, adopted, values, infancy, evidence, likely, evolve, over, often, distributed,


Text of the page (random words):
qnx auto blog qnx auto blog adas acoustics autonomous digital clusters infotainment telematics v2x friday april 28 2017 a trinity of core components enables digital cockpits in cars by romain saha s trategic alliances manager blackberry qnx the dawn of the digital cockpit has arrived loosely defined the digital cockpit combines an automobile s digital instrument clusters and infotainment systems into a more unified user experience more comprehensive definitions may also include heads up displays and features such as gaze tracking there is nothing inherently complicated in the development of a digital cockpit infotainment system design is well understood and digital instrument clusters while a somewhat newer addition to the vehicle interior are in production today heads up displays have also been available for quite some time there are few digital cockpits on the market aside from those in production luxury cars this rarity is because running three systems in a vehicle is a costly proposition mainstream adoption of the digital cockpit necessitates a different approach it requires that we simplify the overall design collapsing hardware onto a single system on a chip soc and board there are three important considerations does the soc have the processing capability required to run two or more subsystems simultaneously does the foundational software leverage the underlying hardware in a way that meets overall system requirements how can you create a truly unified user experience 1 the soc today s socs are powerful a single chip can run infotainment systems instrument clusters and vehicle displays this level of performance creates the potential for significant cost savings not only in the number of silicon chips but at the board level as well using a powerful soc a single board can replace three that were traditionally used the car existing and soon to be released processors can meet the processing requirements of all but the most computationally intensive systems at ces blackberry qnx demonstrated this reality with a digital cockpit run off a single intel atom a3900 series processor 2 the foundational software the fundamental challenge facing digital cockpit architecture involves meeting functional safety requirements for the digital instrument cluster certifying the entire cockpit is one possibility one that is less than ideal such a brute force approach would increase both cost and time to market a more elegant solution would be to isolate the cluster allowing certification of the cluster component without having to certify the rest of the system this action can be accomplished using hypervisor software the hypervisor software allows the cluster infotainment and heads up display hud system to each run as fully independent virtual machines this isolation between systems that all share the same soc via the hypervisor allows the cluster to be treated as a stand alone system and certified separately the hypervisor ensures that if the infotainment system or hud system crash for whatever reason the cluster will not crash safety is a key variable for a cluster however it is equally important that on screen rendering is done properly imagine for example if the cluster renders a p for park instead of an r for reverse the consequences could be catastrophic this capability is handled by qnx s digital instrument cluster platform using a graphics monitor 3 the experience all the technology in the world will not make up for a poor user experience it is not enough to have multiple screens in the car those screens need to work in tandem cluster head unit infotainment and entertainment screens are all part of a new digital user experience these parts cannot be discrete systems developed in isolation instead the components must be viewed from an overall user interface user experience ui ux perspective as a single canvas the digital cockpit the creative component is not the only consideration care must be given to address overarching safety requirements safety critical elements such as brake system warnings and air bags must be rendered accurately and certification is a priority the role of blackberry qnx in the digital dashboard as described above all three key elements the soc the foundational software and the driver experience must be carefully selected to achieve a compelling digital cockpit blackberry qnx and rightware demonstrated how such a digital cockpit may look in reality using intel s a3900 soc rightware developed a digital instrument cluster that leverages the qnx hypervisor digital instrument cluster platform qpic and qnx car infotainment platform qnx car both platforms running on qnx operating system this cluster platform and the qnx car infotainment platform run on qnx hypervisor as independent virtual machines this is an exciting time in the automotive industry the digital cockpit has arrived bringing cost savings and a better user experience advances in hardware and software will further shift how drivers will interact with their cars ultimately in ways never imagined posted by bill boldt at 2 58 pm 0 comments email this blogthis share to twitter share to facebook share to pinterest tuesday april 18 2017 all security is personal bill boldt business development manager security blackberry to make any digital product secure it must have its own personality which is crypto speak for a unique digital identity this digital identity comes in the form of a cryptographic key which is a binary number of a specified length that is assigned to and stored in a device such as a memory or processor chip in security operations keys get used by mathematical algorithms to enable the three pillars of security namely confidentiality data integrity and authentication crypto keys are considered valuable digital assets because a company s brand equity is increasingly tied to the security of their products product security is directly proportional to how securely the crypto keys are generated transmitted injected and stored in devices such a process of key management and injection is called personalization and it is also called provisioning the point here is that the factories where personalization happens must be made secure if the key and the products and processes that subsequently use them are to be secure blackberry s certicom subsidiary offers a way to make factories secure with a product called the asset management system ams ams deploys secure equipment to remote factories to manage and inject cryptographic keys such that the keys and thus the products they protect remain secure from tampering counterfeiting and cloning without ams there would be multiple attack points in the supply chain allowing grey marketers access to valuable ip and products particularly at various subcontractor sites vulnerabilities can be introduced at several points in the manufacturing flow of a semiconductor chip including at wafer test bonding and packaging and chip testing personalization prevents subcontractors from overbuilding copying or cloning devices designs or firmware personalization via ams ameliorates those vulnerabilities and thus enhances product trust and brand equity certicom ams makes it possible to add digital rights management drm and conditional access system cas device personalization in a manner that protects drm and cas keys at vulnerable i e attackable manufacturing stages using ams minimizes the risk from liquidated damages clauses contained in high definition content protection hdcp content protection for recordable media cprm digital transmission content protection dtcp advanced access content system aacs and similar agreements certicom is the leading commercial solution for hdcp enabled chip manufacturing automotive security evolution one of the most complex global supply chains is that of the automotive industry and all security for cars begins with securing this supply chain with connectivity and autonomous driving features gaining increasing traction the main features of cars are literally being defined by software and that software must be safe and trusted therefore it is essential to protect software in every module and system in a car starting with secure personalization once a module is securely personalized it can be trusted to run cryptographic algorithms to provide the three pillars of security arguably the most important of the pillars is authentication which proves that the signals are being received from an authentic sender authentication can be symmetric asymmetric or a combination of the two cryptographic security in cars is in its infancy and evidence shows that it will likely evolve over time with symmetric authentication often being adopted initially with asymmetric being added in later especially as higher bandwidth buses are deployed such as ethernet symmetric authentication uses a shared secret key and is thus easier to implement but there is a trade off shared keys must be distributed and stored beforehand in contrast with asymmetric authentication there is no need to distribute and store a shared secret key using shared keys presents more attack points than with asymmetric authentication so symmetric authentication is considered relatively less secure asymmetric authentication uses public key cryptography which allows a public key to be transmitted in the clear and used to perform authentication via algorithms that can mathematically prove that the sender is authentic asymmetric authentication works because the sender s private key which is securely stored never shared and only signs messages cannot be derived from knowing the public key this discretion is made possible by the type of special mathematics and algorithms used to generate the private and public key pair that is used to sign and verify the message with asymmetric authentication a chain of trust between sensors ecus gateways domain area controllers and other nodes can be established that chain ultimately links back to a trusted device called a trust anchor all nodes on the chain of trust authenticate the next node using sign verify algorithms so if the trust anchor is trusted then all the nodes on the chain can also be trusted without storing a pre shared secret key this increases both security and manufacturing flexibility which are two very important values for the automotive industry both symmetric and asymmetric methods will require some type of personalization and that must happen in a secure way at every step in the supply chain including at oem factories tier 1 and tier 2 suppliers distributors dealers and aftermarket suppliers ams is powerful because it assures visibility at every step in the supply chain and is easy to implement ams enables device manufacturers and silicon foundries to 1 improve the management and control of electronic serial numbers 2 securely inject cryptographic keys into devices 3 use keys and ids for feature selection 4 fight cloning and counterfeiting 5 track yield data security and control is gained by serializing tagging individual silicon chips with cryptographic identities those tagged dice can be tracked throughout the production process as they pass across multiple outsourced contractors ams ensures all the touch points can be easily secured secure appliances being deployed at remote sites enables visibility and control the diagram shows that the ams controller is secured in the operations headquarters ams appliances operate in the outsourced manufacturing sites ams appliances communicate with the local automated test equipment ate in the production facilities the ams agent runs inside the manufacturing test program installed in the ates at the manufacturing sites the asset control core is an optional ip block built into an asic chip or fpga which acts as a feature and key lockbox adding the asset control core and provisioning it via the ams system provides an extremely high level of end to end manufacturing and feature provisioning security ams also works with a wide range of key storage methods beyond acc of course using ams provides many benefits to manufacturers across automotive iot and other segments as noted in the chart ams anchors trust by guaranteeing that devices are secure at every step in the supply chain and that is where end to end security starts posted by bill boldt at 11 56 am 0 comments email this blogthis share to twitter share to facebook share to pinterest older posts home subscribe to posts atom subscribe to our feed subscribe search by topic acoustic processing 40 active noise control anc 15 adas 82 apps 34 audi 18 augmented reality 7 autonomous cars 63 awards 21 blackberry 24 bmw 4 ces 60 chrysler 1 cloud connectivity 23 concept car 104 concept team 19 connected car 129 digital instrument clusters 58 driver distraction 40 electric cars 3 engine sound enhancement 6 ford 6 fota 9 freescale 6 hands free systems 25 hmis 90 html5 58 infotainment 121 iso 26262 26 mercedes 18 mirrorlink 9 mobile connectivity 45 navigation 25 onstar 11 porsche carrera 17 qnx car 74 qnx os 38 reference vehicle 29 reliability 14 safety systems 55 smartphones 37 speech interfaces 19 telematics 16 texas instruments 14 toyota entune 5 v2x 2 wireless framework 2 search by contributor patryk fournier thomas bloor romain saha tina jeffrey yoshiki chubachi paul leroux kerry johnson browse previous posts 2017 4 april 2 a trinity of core components enables digital cockp all security is personal january 2 2016 39 december 5 november 1 october 6 september 4 august 3 july 4 june 2 may 2 april 2 march 1 february 1 january 8 2015 43 december 1 november 2 october 4 september 4 august 1 july 2 june 5 may 4 april 4 march 5 february 2 january 9 2014 68 december 8 november 4 october 5 september 5 august 6 july 8 june 8 may 3 april 4 march 4 february 6 january 7 2013 86 december 6 november 8 october 4 september 7 august 6 july 3 june 7 may 8 april 7 march 6 february 6 january 18 2012 105 december 8 november 7 october 11 september 6 august 7 july 6 june 11 may 11 april 8 march 10 february 8 january 12 2011 34 december 6 november 13 october 15 2004 2011 qnx software systems limited a subsidiary of research in motion limited powered by blogger
Thumbnail images (randomly selected): * Images may be subject to copyright.GREEN status (no comments)
  • blogger web statistics

Verified site has: 123 subpage(s). Do you want to verify them? Verify pages:

1-5 6-10 11-15 16-20 21-25 26-30 31-35 36-40 41-45 46-50
51-55 56-60 61-65 66-70 71-75 76-80 81-85 86-90 91-95 96-100
101-105 106-110 111-115 116-120 121-123


Top 50 hastags from of all verified websites.

Recently checked links (by ScreenShot) on WebLinkPedia.

Screenshot of the main domain: pointedudiamant78.frScreenshot of the main domain: ecovector-academy.comScreenshot of the main domain: mightymule.comScreenshot of the main domain: plugin-alliance.comScreenshot of the main domain: teksciory.interia.plScreenshot of the main domain: traveliogroup.comScreenshot of the main domain: still.euScreenshot of the main domain: vivimilano.corriere.itScreenshot of the main domain: zednicenter.tnScreenshot of the main domain: travelandword.comScreenshot of the main domain: dd15.infoScreenshot of the main domain: grantmeadmission.comScreenshot of the main domain: amazon.esScreenshot of the main domain: lilyslittlelearners.comScreenshot of the main domain: dhlshipping.comScreenshot of the main domain: belogorck.ruScreenshot of the main domain: mizubeya.comScreenshot of the main domain: musikrat.deScreenshot of the main domain: cadamtuongxunghe.comScreenshot of the main domain: kosmetasia.plScreenshot of the main domain: kinoprofi.netScreenshot of the main domain: mustela.comScreenshot of the main domain: nguvandhag.wordpress.comScreenshot of the main domain: antigifcentrum.beScreenshot of the main domain: genevalab.comScreenshot of the main domain: standardlesothobank.co.lsScreenshot of the main domain: vedur.isScreenshot of the main domain: internationale-bauausstellungen.deScreenshot of the main domain: forcellando.blogspot.comScreenshot of the main domain: eratead.comScreenshot of the main domain: vmxe.ruScreenshot of the main domain: aktien-mag.deScreenshot of the main domain: roksana95.showup-tv.comScreenshot of the main domain: gradypublications.comScreenshot of the main domain: fiore.plScreenshot of the main domain: earthspace.netScreenshot of the main domain: phuanhcac01.wordpress.comScreenshot of the main domain: o.toplist.czScreenshot of the main domain: quotesnhumor.comScreenshot of the main domain: shuaacapital.com.sa
Supplementary Information (add-on for SEO geeks)*- See more on header.verify-www.com

Header

HTTP/1.1 302 Moved Temporarily
Location htt???/qnxauto.blogspot.com/
Content-Type text/html; charset=UTF-8
Content-Encoding gzip
Date Fri, 29 Mar 2024 14:57:49 GMT
Expires Fri, 29 Mar 2024 14:57:49 GMT
Cache-Control private, max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
Content-Security-Policy frame-ancestors self
X-XSS-Protection 1; mode=block
Content-Length 195
Server GSE
Connection close
HTTP/1.1 200 OK
Content-Type text/html; charset=UTF-8
Expires Fri, 29 Mar 2024 14:57:50 GMT
Date Fri, 29 Mar 2024 14:57:50 GMT
Cache-Control private, max-age=0
Last-Modified Wed, 20 Mar 2024 09:50:39 GMT
ETag W/ d6e047aa8df34e60cd02f91830e767b671a242c34b9dc6145d7a2f755a719621
Content-Encoding gzip
X-Content-Type-Options nosniff
X-XSS-Protection 1; mode=block
Content-Length 28786
Server GSE
Connection close

Meta Tags

title="QNX Auto Blog"
content="width=1100" name="viewport"
content="text/html; charset=UTF-8" http-equiv="Content-Type"
content="blogger" name="generator"
content="htt???/qnxauto.blogspot.com/" property="og:url"
content="QNX Auto Blog" property="og:title"
content="ADAS, acoustics, autonomous, digital clusters, infotainment, telematics, V2X" property="og:description"
name="google-adsense-platform-account" content="ca-host-pub-1556223355139109"
name="google-adsense-platform-domain" content="blogspot.com"
content="QNX Auto Blog" itemprop="name"

Load Info

page size28786
load time (s)0.523942
redirect count1
speed download54941
server IP172.217.20.161
* all occurrences of the string "http://" have been changed to "htt???/"

SEO From Wikipedia, the free encyclopedia
Search engine optimization (SEO) is the process of affecting the online visibility of a website or a web page in a web search engines unpaid results—often referred to as `natural`, `organic`, or `earned` results. In general, the earlier (or higher ranked on the search results page), and more frequently a website appears in the search results list, the more visitors it will receive from the search engines users; these visitors can then be converted into customers. SEO may target different kinds of search, including image search, video search, academic search, news search, and industry-specific vertical search engines. SEO differs from local search engine optimization in that the latter is focused on optimizing a business online presence so that its web pages will be displayed by search engines when a user enters a local search for its products or services. The former instead is more focused on national or international searches. and ADS Publishers From Wikipedia, the free encyclopedia
Advertising is an audio or visual form of marketing communication that employs an openly sponsored, non-personal message to promote or sell a product, service or idea. Sponsors of advertising are often businesses wishing to promote their products or services. Advertising is differentiated from public relations in that an advertiser pays for and has control over the message. It differs from personal selling in that the message is non-personal, i.e., not directed to a particular individual. Advertising is communicated through various mass media, including traditional media such as newspapers, magazines, television, radio, outdoor advertising or direct mail; and new media such as search results, blogs, social media, websites or text messages. The actual presentation of the message in a medium is referred to as an advertisement or `ad` for short.
Commercial ads often seek to generate increased consumption of their products or services through `branding`, which associates a product name or image with certain qualities in the minds of consumers. On the other hand, ads that intend to elicit an immediate sale are known as direct-response advertising. Non-commercial entities that advertise more than consumer products or services include political parties, interest groups, religious organizations and governmental agencies. Non-profit organizations may use free modes of persuasion, such as a public service announcement. Advertising may also be used to reassure employees or shareholders that a company is viable or successful., wall of links.


If you want to put something else on this wall, write to us.