Duncan Sparrell

Duncan Sparrell

Oakton, Virginia, United States
998 followers 500+ connections

Articles by Duncan

Activity

Join now to see all activity

Experience

Licenses & Certifications

Volunteer Experience

  • International Telecommunication Union Graphic

    Member Program Committee - Zero Trust and Software Supply Chain Security

    International Telecommunication Union

    - 7 months

    Science and Technology

    ITU Workshop on "Zero Trust and Software Supply Chain Security" -
    https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2023/0828/Pages/Programme-Committee.aspx

  • International Telecommunication Union Graphic

    Steering Committee Member - Generative AI: Challenges and Opportunities for Security and Privacy

    International Telecommunication Union

    - 6 months

    Science and Technology

    ITU Workshop on Generative AI: Challenges and Opportunities for Security and Privacy.
    https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2024/0219/Pages/default.aspx

Publications

  • SBOM FAQ

    CISA

    This guide provides information on the benefits of SBOM, common misconceptions and concerns, creation of an SBOM, distributing and sharing an SBOM, and role specific guidance. Also, the document provides information on SBOM related efforts, such as Vulnerability Exploitability eXchange (VEX), OpenC2, and digital bill of materials (DBOM).

    See publication
  • When to Issue VEX Information

    CISA

    “The goal of Vulnerability Exploitability eXchange (VEX) is to allow a software supplier or other
    parties to assert the exploitability status of specific vulnerabilities in a particular product or set of
    products.” Issuing VEX information allows developers, suppliers, and others to provide
    information in a human-readable and machine-comprehensible format, regardless of whether or
    not software is affected by a specific vulnerability. This allows downstream users to make their
    own…

    “The goal of Vulnerability Exploitability eXchange (VEX) is to allow a software supplier or other
    parties to assert the exploitability status of specific vulnerabilities in a particular product or set of
    products.” Issuing VEX information allows developers, suppliers, and others to provide
    information in a human-readable and machine-comprehensible format, regardless of whether or
    not software is affected by a specific vulnerability. This allows downstream users to make their
    own assessments of the risks associated with the vulnerability.

    This document seeks to explain the circumstances and events that could lead an entity to issue
    VEX information and describes the entities that create or consume VEX information. Whether,
    and when, to issue VEX information is a business decision for most suppliers and possibly a
    more individual decision for independent open source developers. This document identifies
    factors that influence the decision.

    See publication
  • The Open Cybersecurity Alliance at the VEX Summit

    The VEX Summit

    Presentation on the Open Cybersecurity Alliance (OCA) at the VEX Summit (https://vexsummit.org/schedule.html) hosted by Cisco and OASIS Open. The talk covers what the OCA is, why it is needed, and how it relates to SBOMs and VEX.

    See publication
  • The Evolution of Telecom Business, Economy, Policies and Regulations

    IEEE Communications Magazine

    From the late 1970s onward, the global telecommunication industry has gone through several waves of regulatory and technological changes. Today, the very definition of telecommunication has changed. First, the traffic is no longer confined to voice and/or limited data services. Second, the boundary line between telecommunication and information sectors is increasingly blurred. Third, the parties that offer products and services for consumers, businesses and industrial users operate under…

    From the late 1970s onward, the global telecommunication industry has gone through several waves of regulatory and technological changes. Today, the very definition of telecommunication has changed. First, the traffic is no longer confined to voice and/or limited data services. Second, the boundary line between telecommunication and information sectors is increasingly blurred. Third, the parties that offer products and services for consumers, businesses and industrial users operate under different regulatory regimes, ranging from strict regulations to no regulations at all. Fourth, the merging of the physical and virtual worlds through immersive technologies opens new social, cultural and business dimensions. Finally, the post-covid environment has opened unprecedented avenues for virtual workplaces (E-work).

    Other authors
    See publication
  • Minimum Requirements for Vulnerability Exploitability eXchange (VEX)

    Cybersecurity & Infrastructure Security Agency

    This document specifies the minimum elements to create a Vulnerability Exploitability eXchange (VEX) document. These elements are derived from, but may not fully conform to, existing VEX documentation and implementations. It was drafted and debated by experts from across the security and software world, representing different sectors and backgrounds.

    See publication
  • Vulnerability Exploitability eXchange (VEX) - Status Justifications

    CISA

    This resource provides the recommended NOT AFFECTED status justifications of a VEX document and offers the reader examples of when the different status justifications might be used. VEX documents may contain a justification statement of why the VEX document creator chose to assert that the product’s status is NOT AFFECTED. This document was drafted by stakeholders through an open and transparent, community-led process

    Other authors
    See publication
  • Vulnerability Exploitability eXchange (VEX) – Use Cases

    CISA

    This resource provides the recommended minimum data elements of a VEX document and offers a set of scenarios with proposed implementations. This document was drafted by stakeholders through an open and transparent, community-led process.

    Other authors
    See publication
  • How to combine blockchain technology to revolutionize the supply chain?

    UN World Summit on the Information Society

    In recent years, there is a growing potential for the supply chain management application, especially in supply chain innovation. Blockchain as an emerging application model has been widely used in different industries. In the fields of finance, Internet of Things, social welfare and supply chain, there have been a lot of explorations and attempts of application. Among them, the supply chain field has become a "place of use" for blockchain technology due to its large market scale, multiple…

    In recent years, there is a growing potential for the supply chain management application, especially in supply chain innovation. Blockchain as an emerging application model has been widely used in different industries. In the fields of finance, Internet of Things, social welfare and supply chain, there have been a lot of explorations and attempts of application. Among them, the supply chain field has become a "place of use" for blockchain technology due to its large market scale, multiple trust subjects and multi-party collaboration. Supply chain is an early development and relatively high maturity of blockchain applications.

    The supply chain can be seen as a network of suppliers, manufacturers, warehouses, distribution centers and channels. The core of the supply chain concept is to establish trust between subjects, collaborate and cooperate, form a chain of originally loose enterprises, and collect and integrate discrete chain information. As the scope of supply chain becomes more and more extensive, enterprises coordinate their own and external resources through effective chain management so as to meet market demand. In the future, as the application of blockchain in the field of supply chain tends to mature, blockchain technology is expected to promote and complete the disruptive innovation of the entire supply chain industry and help realize the deep integration of traditional industries with the new generation of information.

    This workshop will discuss some of the current problems in the supply chain, as well as the new challenges encountered in the supply chain in the era of the epidemic, and how to propose solutions in using Blockchain technologies to solve these problems.

    #bom #supplychain #cybersecurity

    Other authors
    • Xiaoou Liu
    • Clovis Freire, PhD
    • Martin Euchner
    See publication
  • Making the World a Safer Place with Nerves

    Nerves Meetup

    Join us for a presentation by Duncan Sparrell about cybersecurity and the opportunities/challenges for Nerves and the Erlang/Elixir ecosystem in general. In May 2021 President Biden issued Presidential Executive Order(EO) 14028 on Improving the Nation’s Cybersecurity. The talk will begin with some cybersecurity basics, covering the environment, trends, and events that led to the EO. It will discuss why the Elixir/Erlang ecosystem, and OTP’s “let it fail” in particular, is well suited for…

    Join us for a presentation by Duncan Sparrell about cybersecurity and the opportunities/challenges for Nerves and the Erlang/Elixir ecosystem in general. In May 2021 President Biden issued Presidential Executive Order(EO) 14028 on Improving the Nation’s Cybersecurity. The talk will begin with some cybersecurity basics, covering the environment, trends, and events that led to the EO. It will discuss why the Elixir/Erlang ecosystem, and OTP’s “let it fail” in particular, is well suited for cybersecurity. OTP was an originally an acronym for “Open Telcom Platform”, but now stands for “One Tough Platform”. With increased focus on the safety impact of cyber-physical systems in the Internet of Things (IoT), there are large opportunities for Nerves as well as challenges. I’ll discuss how the EO will use the power of the federal purse to transform the software industry and the opportunities and challenges to our ecosystem. Much of the talk will focus on Software Bill of Materials (SBOM) – it’s recent history, why SBOMs are important, what the EO means to SBOMs for Nerves projects, the hex/rebar tools to create SBOMs, and what attendees can (and should) do in their Nerves projects.

    See publication
  • What Threats are Hiding in Your Software - And How to Find Them

    All Things Open 2021

    With COVID-19 as a backdrop, 2020 was the year that cybersecurity really came to the forefront. With the world mostly working from home and relying on the Internet more than ever, a plethora of security challenges arose that taxed an already overburdened IT industry. After things like the Solarwinds attack and hacks on public infrastructure such as in the energy sector, it became abundantly clear that we had to step up our efforts to more clearly automate sharing of threat data, understand what…

    With COVID-19 as a backdrop, 2020 was the year that cybersecurity really came to the forefront. With the world mostly working from home and relying on the Internet more than ever, a plethora of security challenges arose that taxed an already overburdened IT industry. After things like the Solarwinds attack and hacks on public infrastructure such as in the energy sector, it became abundantly clear that we had to step up our efforts to more clearly automate sharing of threat data, understand what packages where in our critical software, and even begin to automate remediation plans when vulnerabilities were detected.

    In this panel discussion, we gather together a collection of subject matter experts in everything from SBOM (Software Bill of Materials) to threat detection sharing and remediation to give the audience a look into open software projects and standards that are at the leading edge of helping to secure our digital future. The panel will answer questions in their respective areas of expertise, and also touch on how their particular specialties overlap and collaborate in the fight against cybersecurity threats. We will leave time for audience questions and participation.

    Other authors
    See publication
  • The making of QuadBlockQuiz

    ACM International Conference on Functional Programming

    Explains the underpinnings of the QuadBlockQuiz game and why elixir/BEAM/OTP is so good for cybersecurity.
    Abstract at https://icfp21.sigplan.org/details/erlang-2021-papers/8/Lightning-Talk-QuadBlockQuiz-Supply-Chain-Edition
    Video of presentation at https://youtu.be/ZEyv7KPSlq0

    See publication
  • IATC - QuadBlockQuiz - Supply Chain Sandbox Edition

    BSides Las Vegas

    Reprise of RSAC game at BSidesLV - teaching supply chain cybersecurity

    See publication
  • "Campfire Stories: Overlord, Desert Shield the Sequel"

    BSides Las Vegas

    Telling scary stories around the campfire at BSidesLV - the story of my start in cybersecurity

    See publication
  • Keynote Session Chair: Josh Corman on "Trust, Transparency, and Proportionality"

    OASIS Borderless Cyber 21

    Introduced and interviewed keynote speaker

    See publication
  • Keynote Session Chair: Cassie Crossley on "Product Security Risks and Third Party Supply chain"

    OASIS Borderless Cyber 21

    Introduced and interviewed keynote speaker

    See publication
  • Panel Moderator: "Unique Perspectives On The Best Ways To Mitigate Supply Chain Disruption"

    OASIS Borderless Cyber 21

    Moderated panel on mitigating supply chain disruption

    See publication
  • QuadBlocks

    RSA Conference

    Created game for the Supply Chain Village at RSA Conference that demonstrated and taught supply chain cybersecurity

    See publication
  • Making IoT Safer with BEAM/OTP

    Code Beam SF 2020

    This talk explains the safety impact of cyber-physical systems in the Internet of things. It explains the advantages of quantitative risk analysis for security decision making while extolling the advantages of "One Tough Platform" for developing secure software. Duncan presents pitfalls to avoid and best practices to follow. He evangelizes OTP for cybersecurity and cyber-physical safety and
    demonstrates open-source on a Raspberry Pi showing how future IoT will adapt to threats in…

    This talk explains the safety impact of cyber-physical systems in the Internet of things. It explains the advantages of quantitative risk analysis for security decision making while extolling the advantages of "One Tough Platform" for developing secure software. Duncan presents pitfalls to avoid and best practices to follow. He evangelizes OTP for cybersecurity and cyber-physical safety and
    demonstrates open-source on a Raspberry Pi showing how future IoT will adapt to threats in real-time.

    See publication
  • Cyber-safety in healthcare IoT

    ITU Kaleidoscope

    Healthcare is becoming more connected. Risks to patient and public safety are increasing due to
    cybersecurity attacks. To best thwart cyberattacks, the Internet of health things (IoHT) must
    respond at machine speed. Cybersecurity standards being developed today will enable future
    IoHT systems to automatically adapt to cybersecurity threats in real time, based on a quantitative
    analysis of reasonable mitigations performing triage to economically optimize the overall
    healthcare…

    Healthcare is becoming more connected. Risks to patient and public safety are increasing due to
    cybersecurity attacks. To best thwart cyberattacks, the Internet of health things (IoHT) must
    respond at machine speed. Cybersecurity standards being developed today will enable future
    IoHT systems to automatically adapt to cybersecurity threats in real time, based on a quantitative
    analysis of reasonable mitigations performing triage to economically optimize the overall
    healthcare outcome. This paper will discuss cybersecurity threats, risk, health impact, and how
    future IoHT cybersecurity systems will adapt to threats in real time.

    See publication
  • National Security Strategy for 5G: Findings & Recommendations on Meeting the 5G Challenge

    Trilateral Cyber Security Commission

    The Trilateral Cyber Security Commission was formed to make recommendations to the
    governments of the United States, Japan, and like-minded European countries individually
    and collectively to improve the security of their information networks. Some of the most
    critical challenges to all these countries are the economic and security risks of future 5G
    networks. These rapidly developing networks will become a new and dominant form of critical
    infrastructure. Unless the free market…

    The Trilateral Cyber Security Commission was formed to make recommendations to the
    governments of the United States, Japan, and like-minded European countries individually
    and collectively to improve the security of their information networks. Some of the most
    critical challenges to all these countries are the economic and security risks of future 5G
    networks. These rapidly developing networks will become a new and dominant form of critical
    infrastructure. Unless the free market democratic countries can develop polices and take
    actions in the near term, China is poised to dominate this emerging market and could use its
    position to undermine the national security of its adversaries.

    The Commission recommends the United States, Japan, and likeminded governments in Europe and elsewhere take a series of domestic and coordinated multilateral actions. The objectives are not only to protect their 5G networks, but also to support Western firms in competing fairly to deliver 5G solutions around the world.

    Other authors
    See publication
  • Roles and Benefits for SBOM Across the Supply Chain

    NTIA

    This resource summarizes the benefits of having an SBOM from the perspective of those who make software, those who choose or buy software, and those who operate it. It characterizes the security, quality, efficiency, and other organizational benefits, as well as the potential for the broader ecosystem across the supply chain.

    Other authors
    See publication
  • Framing Software Component Transparency: Establishing a Common Software Bill of Material (SBOM)

    NTIA

    This resource defines SBOM concepts and related terms, offers a baseline of how software components are to be represented, and discusses the processes around SBOM creation. With terminology and a background of the NTIA process, it serves as a detailed introduction to SBOM.

    Other authors
    See publication
  • Improving IoT Safety using Standards

    Borderless Cyber

    Abstract at https://us19.borderlesscyber.org/program-schedule/program/69/bc-track-improving-iot-safety-using-standards-to-improve-iot-security. Bio at https://us19.borderlesscyber.org/program-schedule/users/detail/1150/duncan-sparrell. The Prezi for the presentation is at https://prezi.com/view/uU4txAdyhXFkHFwiAIk3

    See publication
  • Cyber-Physical Safety

    Rochester Security Summit

    Abstract at https://guidebook.com/g/rss2019/#/session/24575049. Bio at https://guidebook.com/g/rss2019/#/item/12745003/. Slides (in a non-building pdf) are available at https://www.rochestersecurity.org/wp-content/uploads/2019/10/Sparrell_CyberPhysicalSafety.Sparrell_reduced.pdf. The Prezi as presented is available at https://prezi.com/view/fCWEZVUbeuLG13zCu3GT/.

    See publication
  • Open Command and Control (OpenC2) Language Specification Version 1.0

    OASIS

    Open Command and Control (OpenC2) is a concise and extensible language to enable machine-to-machine communications for purposes of command and control of cyber defense components, subsystems and/or systems in a manner that is agnostic of the underlying products, technologies, transport mechanisms or other aspects of the implementation.

    See publication
  • Open Command and Control (OpenC2) Profile for Stateless Packet Filtering Version 1.0

    OASIS

    Open Command and Control (OpenC2) is a concise and extensible language to enable the command and control of cyber defense components, subsystems and/or systems in a manner that is agnostic of the underlying products, technologies, transport mechanisms or other aspects of the implementation. Stateless packet filtering is a cyber defense mechanism that denies or allows traffic based on static properties of the traffic, such as address, port, protocol, etc. This profile defines the Actions…

    Open Command and Control (OpenC2) is a concise and extensible language to enable the command and control of cyber defense components, subsystems and/or systems in a manner that is agnostic of the underlying products, technologies, transport mechanisms or other aspects of the implementation. Stateless packet filtering is a cyber defense mechanism that denies or allows traffic based on static properties of the traffic, such as address, port, protocol, etc. This profile defines the Actions, Targets, Specifiers and Options that are consistent with the version 1.0 of the OpenC2 Language Specification ([OpenC2-Lang-v1.0]) in the context of stateless packet filtering (SLPF).

    Other authors
    • Joe Brule
    See publication
  • The Case for Software Bills of Materials (SBoM)

    LiveWorx19

    Modern software systems involve increasingly complex and dynamic supply chains. Lack of systemic transparency into the composition and functionality of these systems contributes substantially to cybersecurity risk as well as the costs of development, procurement, and maintenance. In our increasingly interconnected world, risk and cost impact not only individuals and organizations directly but also collective goods like public safety and national security. This talk will cover the advantages of…

    Modern software systems involve increasingly complex and dynamic supply chains. Lack of systemic transparency into the composition and functionality of these systems contributes substantially to cybersecurity risk as well as the costs of development, procurement, and maintenance. In our increasingly interconnected world, risk and cost impact not only individuals and organizations directly but also collective goods like public safety and national security. This talk will cover the advantages of having a Software Bill of Materials (SBoM) and the work underway in an NTIA Working Group on Software Transparency.

    See publication
  • Using Science, not Fear, in Sizing Cybersecurity Budgets

    LiveWorx19

    The cost of cybersecurity is increasing while the impacts are worsening. The talk will present the underlying economics of today's cybersecurity industry and discuss how the existing drivers need to change to incent the desired behavior. Risk economics will be covered along with how other industries handle massive risk, minimal data, and chaotic actors using proven statistical techniques. Future cybersecurity systems will adapt to threats in real time based on the standards being developed…

    The cost of cybersecurity is increasing while the impacts are worsening. The talk will present the underlying economics of today's cybersecurity industry and discuss how the existing drivers need to change to incent the desired behavior. Risk economics will be covered along with how other industries handle massive risk, minimal data, and chaotic actors using proven statistical techniques. Future cybersecurity systems will adapt to threats in real time based on the standards being developed today. Instead of Fear, Uncertainty, and Doubt (FUD), spending decisions will be based algorithmically on proven scientific methods using security policy, risk tolerance, and the potential financial impact of the threat. Factor Analysis of Information Risk (FAIR) is a practical framework for understanding, measuring and analyzing information risk, and ultimately, for enabling well-informed decision making. The talk will give a brief introduction to FAIR and the standards related to it.

    See publication
  • TAG-Cyber Interview

    TAG-Cyber

  • IoTsm Response at Cyberspeed to Attack

    Proceedings of the International Conference on Industrial Internet of Things and Smart Manufacturing

  • Let it be hacked

    Code Beam SF

  • Cybersecurity, Erlang, & Opensource Combine in OpenC2

    Security Opencamp

  • Responding to CyberAttack at Machine Speed

    Rochester Security Summit

  • Defense at Cyber Speed

    George Mason University Cyber Innovation Forum Series

  • Defense at Machine Speed

    Borderless Cyber USA

    https://us17.dryfta.com/en/program-schedule/program/5/defense-at-machine-speed

    See publication
  • Let’s play defense at cyber speed

    ANYCon

    http://www.anycon.info/talksdefsec

    slides available at https://prezi.com/gwudhjox8eev/anycon-lets-play-defense-at-cyber-speed/

    See publication
  • The Astra Way to Virtualize Security

    AT&T Cyber Security Conference

  • Information Risk Strategy

    Shell Information Risk Management Ecosystem Summit

  • Protecting Security at the Network Level

    BITS Financial Services Roundtable

  • Monitoring Network Data to Detect IP Security Violations

    GLOBECOM '06. IEEE

    A method of detecting security violations by monitoring IP address space usage at per interface level.

    Other authors
    • Danielle Liu
    • David A. Hoeflin
    See publication
  • Standards and innovation in telecommunications

    Communications Magazine, IEEE Volume 30, Issue 7, Jul 1992 Page(s):22 - 29

    Specific examples from recent cases in voice communications illustrate the standardization process and various strategies used to reach common agreement. A specific case of standards spurred innovation is discussed.

    Other authors
    See publication
  • Voice Packetization on Satellite;

    International Conference on Digital Satellite Communications 8

  • Wideband packet technology

    GLOBECOM '88; IEEE

    Announcement of Wideband Packet Technology (subsequently used on many international cable and satellite routes and the basis for ITU standards G.764 and G.765).

    See publication
  • The 32-KB/S ADPCM Coding Standard

    AT&T Technical Journal 65 (5)

    This paper highlights the process leading to the standards on 32-kb/s ADPCM recognized by ANSI and the CCITT and gives an overview of the algorithm itself.

    Other authors
    See publication
  • Digital Signal Processig in Digital Transmission Terminals

    ENTELEC

  • 32 kbit/s ADPCM Algorithm and Line Format for US Networks

    GLOBECOM '85; IEEE

    Other authors
  • Introduction of 32 kbits ADPCM Eaquipment into the North American Network

    GLOBECOM '84; IEEE

  • Taking a Bite out of Bits

    Telephone Engineer & Management

    Other authors
    • Rich Adleman
  • Taking a Big Bite out of Bits

    AT&T Bell Laboratories RECORD 62 (6): 4-8

    Other authors
    • Rich Adleman
  • A real time analysis/Display system for nonstationary coastal processes

    IEEE International Conference on Acoustics, Speech, and Signal Processing

    Other authors
    • L. Gerhardt
    • Lester Gerhardt
    • Robert Redinbo
    • T. S. Nuen
    • Dom Scordo
    See publication

Patents

Honors & Awards

  • Distinguished Contributor Award

    OASIS

    Outstanding Achievement and Contributions to Open Standards and Open Source

  • 10 Best CSOs of 2020

    Industry Era

    https://www.industry-era.com/Duncan-Sparrell-CSO-of-sFractal-Consulting-LLc-Best-CSOs-of-2020.php

  • AT&T Science and Technology Medal

    AT&T

    "AT&T Science and Technology Medalists are acknowledged in the company's technical community for demonstrating remarkable technical depth in a given area that results in a unique and significant contribution to innovation at AT&T Labs."

  • Inteligence Community Seal Medallion

    FBI

    "The Intelligence Community Seal Medallion... recognizes sustained superior performance of duty of high value that distinctly benefits the interests of the United States".

    Awarded for support of FBI Counterintelligence, Counternarcotics, and Counterterrorism.

Organizations

  • Consortium for IT Software Quality

    Member

    - Present

    https://it-cisq.org/trustworthy-systems-manifesto/

  • Program Committee for Borderless Cyber Conference

    Member

    - Present

    https://www.oasis-open.org/news/pr/borderless-cyber-usa-2018

  • Program Committee for ITU Kaleidoscope Academic Conference

    Member

    - Present

    https://www.itu.int/en/ITU-T/academia/kaleidoscope/Pages/default.aspx

  • NoVa Hackers

    Member

    - Present

    NoVA Hackers is a group located in the Northern Virginia area based on the Austin Hackers Association (AHA) model and is made up of Information Security Professionals from all walks of life, from government and private sector, to students and beginners.

  • (ISC)^2

    Member

    - Present
  • OWASP - Northern Virginia Chapter

    Member

    - Present
  • Washington Cyber Roundtable

    Member

    - Present

    Washington Cyber Roundtable is a non-profit, industry liaison group comprising senior level members who donate their time and knowledge to share tangible, private-sector expertise on cyber security challenges with federal government departments and agencies.

  • IEEE

    Senior Member

    - Present
  • International Telecommunications Union

    Working Party Chairman

    -

    The International Telecommunication Union (ITU) is the United Nations specialized agency for information and communication technologies. I participated in the ITU-T, the part of the ITU developing world telecommunications standards. I led standardization activities for transmission, voice coding, and voice packetization. http://www.itu.int/ITU-T/1997-2000/com15/mgmt_team_old.html

Recommendations received

More activity by Duncan

View Duncan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Duncan directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More