Introducing Journey’s Zero Knowledge Identity Network
In this Executive Insights podcast, BCStrategies' Jim Burton welcomes the father-and-son CEO and President of Journey, Brett Shockley and Alex Shockley. Journey is a security business with the mission of making it simple for businesses to build trusted digital relationships with their customers. According to Journey, verified identity needs to be the root of trust in the relationship between business and their customers. "One way of looking at this broader problem holistically is we're helping to answer the question of 'who is this?'" said Alex. "What we've done is help to facilitate tying in all of the different tools that you have available on your smartphones today to be able to prove biometrically that you are who you say you are, and then use our Zero Knowledge Network to extend that proof into different mediums."
Jim Burton: Welcome to BCStrategies Executive Insights. This is Jim Burton and I’m joined today by a couple of executives from Journey: Brett Shockley and Alex Shockley. And they have an exciting, new startup that I think is important for our audience to understand and to work with. So, let's start with Brett.
Brett, I've known you for – longer than either one of us are ever going to admit to anybody because it would start aging ourselves a little bit. And you've had an incredible career. I’ve always noticed that you were on the front of technologies and very, very innovative, and clearly, Journey is one of those. Give us a little bit of background about the company, and why you started it, and the problems you’re trying to solve.
Brett Shockley: Thanks, Jim. I'd be happy to do that. Yeah, we've had a lot of fun over the years definitely, as we've applied all this technology to the contact center, customer service industries. After I left Avaya a couple years ago and Alex had sold his digital marketing agency and we were both kind of looking at what to do next in the marketplace, one of the things that jumped out at us was if you take a look at the customer journey “problem” and opportunity, one of the big issues that our industry has struggled with for years is the question of who the individual is that you’re doing business with.
It occurred to us that verified identity really ought to be at the root of trust and the relationship between the consumer and the business. And so, we started digging into that and we recognized several fundamental issues. From a security perspective, the internet had never had a security layer that was focused on identity, and as a result, if you take a look at enterprise security, we've sort of seen an evolution that's gone from securing the network to extending the network with VPNs and SDNs to some of the latest things being done around Zero Trust to secure the application and the devices.
And securing all those things is great, but we're still not focused on securing the human being. Shared secrets and trusted devices can get stolen; your brother-in-law can look over your shoulder today when you’re working from home. None of those things are really addressed with the current approaches to security.
And then, privacy of customer data within the enterprise has sort of always been treated like any other data within the enterprise and it's only sort of been recently with all the external customer issues with data breaches and the regulatory compliance issues that have started to come up where people really realize that customer data, customer identity information needs to be treated in a completely different way.
Then finally from a customer experience perspective, going back to sort of the whole customer journey concept in the first place, security and privacy directly affect customer experience and normally there's a big tradeoff between the fraud issues that you’re trying to solve with security and privacy, and the friction issues associated with customer experience.
As we dug into the best way to address these issues, we ended up coming up with a new technology that we call the Zero Knowledge Identity Network. And it's really a fundamentally new approach and it's focused on some concepts that we've pulled in from other places in the world. For example, the concept that the intelligence community uses regularly which is “need to know.”
Today, we're pretty promiscuous about all the customer data that floats around an enterprise, as opposed to being very thoughtful about what information should be available or needs to be available by an individual or an application. In many cases, you just need to know that a piece of information is true or valid, or that someone's over the age of 21, or something like that. You don’t actually need to know their birth date.
Another concept is high veracity of the individual as opposed to as I said before, the device. And so, an approach that can identify somebody with a veracity of one in a million or up to one in a billion or greater, as opposed to most of the techniques today are sort of in the 90-something percent area. That makes a big difference in being able to treat people.
As I mentioned earlier, the issue with shared secrets and identifying devices. Those can be stolen. That really doesn’t protect you the way you need to. And I think the other thing with the current concepts that are out there is they tend to create large honey pots of data. So if we store all the data in a big, centralized database, a data lake, we distribute it into a bunch of individual data ponds, that attracts hackers. With enough time and enough value in those data lakes, those hackers are going to get in.
So, we really took a look at all this and with the Zero Knowledge Identity Network underneath what we're doing, we're solving simultaneously for security, privacy, and customer experience.
Jim: Sounds great. Alex, let me turn it over to you then and learn a little bit more about what the solutions and the benefits are of this solution. And I also want to let people know that we do have a couple of videos that show examples of it, which we'll put on so you can refer to those if you'd like, during your presentation.
Alex Shockley: Sure, absolutely. Well also, thank you for having us here. It's great to get a chance to chat.
One way of looking at this broader problem holistically is we're helping to answer the question of “who is this?” So, in just about any customer-to-business interaction, as well as the business-to-business and customer-to-customer, you've got this consistent need to answer the question of, “who is this?” at the start of any interaction and transaction.
And so, as Brett laid out there, there are a lot of different nuances to the techniques used to answer that question, and those techniques have some pretty big impacts on security, on privacy, on user experience. And so, we first spent a significant amount of time and effort building out this underlying architecture that we felt could address this problem more holistically. And on top of that architecture, we've now brought to market a suite of solutions that really help to solve this problem, predominantly in the contact center as well as in digital environments.
And so, you think about what happens today for example, when you call into say, your bank to ask a question about a potentially fraudulent charge, for example. If you call the 1-800 number printed on the back of your credit card, you’re going to be taken through the standard routine of keying in a 16-digit account number, followed by your mother's maiden name, followed by the last four of your Social, followed by different pizza toppings in some cases. You get connected to an agent and they start to ask you some of those real-time credit bureau questions – what address were you associated with in 1992, or what color car did you drive in this decade.
These processes are clumsy, they're expensive, it's a pain in the butt for both the user and the business. At the end of the day, this doesn’t really buy you all that much security. That information is broadly available not just on the dark web but now anybody can go crawl your social media profiles to kind of have a fighting chance to be able to guess a lot of this information.
And so what we've done instead is help to facilitate tying in all of the different tools that you have available on your smartphones today to be able to prove biometrically that you are who you say you are, and then use our Zero Knowledge Network to extend that proof into different mediums. So be that using the business's mobile application to prove identity into the contact center or to tie the phone, the camera, the different sensors in here to be able to capture other documents and information, and be able to facilitate capturing that information locally at the device, sending it to the different third parties that need it to be able to verify certain aspects of it.
Then as Brett mentioned before, rather than revealing that information to any requesting party, we're making it a lot easier to consume in a more privacy-preserving method by being able to give proof that things have been attested to or things have been verified. Which is what they really need at the end of the day rather than sharing the actual raw underlying credentials themselves.
Jim: Well, that sounds fabulous. Have you got any examples of how this can help say, a contact center to make sure that they're getting the right information and what benefits that would have to them? I mean, it's got to save an enormous amount of money if this can be tightly secured and you know exactly who you’re talking to.
Alex: Sure. So on the authentication question and the contact center specifically, the industry statistics will tell you that knowledge-based authentication takes 45 to 90 seconds. And in a financial services-oriented contact center, that could be at the cost of a dollar per minute. Real users fail that process on average, about a third of the time. So those are false negatives. And the rate of false positives, so fraudsters being able to pass that test in targeted attacks can be as high as about 60%. So the bar is pretty low right now for us to go in and surpass that.
When you start to layer in carrier forensics or you start to layer in voice-based biometrics, those providers will often tell you that their accuracy is in kind of, the 92 to 94% range. By being able to deploy device-based biometrics – so, with something like face ID, you can now get to about a one in a million proof that this is in fact who they claim to be. And by being able to then with Journey, tie in a third party, so second-factor biometric providers to do say, a second facial check – both facial matching as well as liveness – you can now eliminate the threat of phone porting or SIM swap, as well as reduce that attack factor to about one in a billion chance that someone else could pass for me by leveraging the biometrics on my device here to prove my identity into the contact center agent.
All that can be done without the contact center agent needing to ask a single security question or being exposed to any of my sensitive details.
Jim: Wow. That’s pretty amazing.
Alex: Okay. So, in our scenario here for an inbound call for example, let's say that I need to call to ask a question about a charge on my credit card. A user would be able to take out their phone, call the generic 1-800 number printed on the back of the credit card.
Now when that call is placed, Journey's technology integrated at the contact center, sees the incoming ANI and can do a database check to see if there's a mobile app associated with that ANI. And if there is, is it tied to a device that has the sufficient characteristics and capabilities needed to perform biometric proofs, for example.
And so, assuming all of that's in place, we can then route the IVR to prompt the user to login to their mobile app to verify themselves. So the IVR can verbally tell the user for better and faster service, please login to your mobile app. And if the user now looks at their device and says, you know what, what's going on here, we can push from the mobile app, a notification prompting the user to tap here to login. That one tap is what will then invoke the mobile app to open up and spin facial recognition. And that could be both the face ID or the touch ID that's local to the device, as well as a third-party biometric provider, should the business choose. So we can again check the facial matching and the liveness detection against what's saved locally on the device, as well as a cloud-based template.
When that passes, the agent on the other end then sees proof that this user has authenticated as well as, can pull the account details from that user's mobile app without actually being exposed to the user's sensitive PII or PFI, in this case, and without need to ask the user those sensitive security questions.
Jim: That's a great feature because I think about whenever I have to go on. They always ask me a question… I don’t remember it for sure… And then I’m sitting here talking to someone who has all the access to all this information about me, what my bank account looks like, everything. So, sounds like you've solved those problems. Boy, that's fabulous.
What about in a place where someone's trying to call me? Let's just say I had credit card fraud. How would something like that work so that the bank can get ahold of me and I’m not just looking at this as one more call coming to me that's been hijacked and someone's trying to spam me a little bit?
Alex: Yeah, that's a great question. Right now, the outbound connect rates statistically are about 15%. That means about 15 out of every 100 outbound phone calls from the bank are actually answered. And of those 15 that are answered, only about a third of them are the end users actually willing to answer the security questions to authenticate.
Unfortunately, with the crazy increase we've seen in spam calls of people spoofing different numbers to make it look like your hometown area code, we're being conditioned to trust those unknown numbers less and less. So, it's becoming increasingly difficult for legitimate contact centers to be able to get those phone calls out and connect with their customers for various purposes.
So, what we're doing is a few different things here to help address that. First and foremost, because we have integrations both with the outbound dialer as well as the customer's mobile app, we can predict when somebody's phone number is nearing the top of the call queue and programmatically push out a branded app-based notification to the user to give them a heads up that there's going to be a call coming. So, we push out a notification to say, hey this is your bank, we've got suspicious activity that we've noticed on your account, we're going to be giving you a call in the next 5 to 10 minutes, or you can login and request a call at your convenience.
So, the user, if they see that notification, is already much more likely to answer a phone call in the next 5 to 10 minutes even if they don’t take any other action. Now alternatively, they can tap that notification, authenticate into the app, and then choose to either self-serve or to request that call. If they choose to request that call, that then triggers the outbound dialer to push that phone number right to the top of the call queue. And when that call comes in, again because we've got the integration points of both the mobile app and the outbound dialer, we can have the outbound dialer tell the mobile app what number to expect a call from.
So, moments before that call arrives, we can push that information to the device so we can actually now populate two lines of caller ID on the user's device to tell the business as well as the department, a reason for calling. So again, now the user has received that notification and now they're seeing the caller ID. So, much more likely to answer it here.
But let's assume that they didn’t see the notification and for some reason they're ignoring the caller ID and they didn’t see that piece here. The last line here of our opportunity is now that the user answers this phone call, again you think about right now, only about a third of those actually authenticate once you answer it. In our case, rather than the business asking the user for the last four of their Social or for other sensitive information, now they're asking the user to login to their mobile app.
The promise is that when you do login to your mobile app, we're going to be able to show you mutual authentication. So if you login to the mobile app, you'll see that you’re on a verified phone call with me. My agent ID is 1234 and my name is Alex. And so, once you’re authenticated into the app, we introduce this concept of mutual authentication. So, there's no need to go through the standard routine of keying in this information, asking the sensitive questions. Instead, we’re flipping it on its head and offering the customer a way of seeing the agent's information. So, we're kind of changing that paradigm of who's got the burden of proof to handle on their end.
Jim: I assume that you have a lot of this information online. So if I’m someone listening to this podcast and I went, wow that sounds really special, why don’t I figure out how I can use that with my company, they'll be able to find enough information on your website to be able to follow up and get into contact with you?
Alex: Absolutely. We've got video demonstrations of these solutions and more on our website. We are continuing to add more information here as we are preparing for broader, more general public launch events here. But always happy to schedule demonstrations and take deeper dives as well.
Jim: That's great. One of the things that I know when you’re dealing with a startup, startups go through these challenging times of finding the people. So often the entrepreneur is a guy that's got a great, bright idea, never run a company before. Brings in his good buddies who have never run a company before and they go through a learning cycle, and it's always a challenge. Some companies just don’t make it because they don’t have the talent there.
I’m looking actually on my screen here at the people that you've brought into your company, Brett and Alex. And it's pretty mindboggling the talent that you've got. I mean, these are industry-known quantities. Maybe you can talk a little bit about how you were able to go about and put together such an incredible team.
Brett: Sure. It's absolutely the case. I am very proud and frankly, humbled by the people we've been able to pull together as part of this team. And they're people that have been in the industry for a long time, known as the innovators, known as the good and the fun people to work with, and I think we all know what we mean in that world of restructuring and everything else that goes on today.
Our CTO is Michael Frendo, and Michael was one of the original creators of the voiceover IP business at Cisco originally. He's had a number of other stops along the way including, he ran Juniper's secure networking business. The guy that hacked the ATMs on stage at the Black Hat Conference worked for Michael. More recently, he ran global engineering for Polycom.
So, Michael brings a lot to the table from an engineering perspective. We have people like Mark Bakies, who ran product management for voice over IP at Cisco. And in fact, he had the notoriety that he did more EBCs than anyone else at Cisco one year. Over 250 EBCs in a single year. Andy Miller, former CEO of Polycom, Tandberg, IPC, and sales leader at Cisco is part of the team. Todd Parenteau, my co-founder at Spanlink is joining us from an operations perspective. Julie Runda's running the marketing for us. She used to do services marketing at Avaya.
Nick Adams is running salesforce. Nick was the CRO at CafeX and prior to that, a number of different sales leadership roles at Avaya. John Proctor recently joined us to run channels. John is covering building up that channel organization and he previously ran all the channels for BroadSoft and had a channel role at Cisco after BroadSoft was acquired by Cisco. Who am I missing, Alex? Did I catch them all?
Alex: No, I think you covered the list pretty well.
Jim: Well, great. You certainly fill a void in the marketplace. We've got some serious, serious problems out there. We all know with identity, identity theft, and it sounds like you've got a solution for the problem. So, thank you and I look forward to following your company. Maybe we'll have another podcast in a few months after you've had a couple of big wins under your belt and we can talk about the next phases of your business.
Brett: And maybe we can even do a podcast face-to-face, in person with a nice glass of wine alongside.
Alex: Wouldn't that be nice.
Jim: All right, guys, thank you.
Brett: Thank you.
Start YourCustomized Search
- Unified Communication (4229) Apply Unified Communication filter
- Unified Messaging (Email, Voicemail, SMS, Chat) (551) Apply Unified Messaging (Email, Voicemail, SMS, Chat) filter
- Instant Messaging & Presence (IM) (1481) Apply Instant Messaging & Presence (IM) filter
- Intelligent Personal Assistants (IPA) (49) Apply Intelligent Personal Assistants (IPA) filter
- SaaS, Cloud Apps (1048) Apply SaaS, Cloud Apps filter
- Business Phone Systems (2825) Apply Business Phone Systems filter
- Contact Center (1863) Apply Contact Center filter
- Team Collaboration (3277) Apply Team Collaboration filter
- Video Collaboration (988) Apply Video Collaboration filter
- Operations (1502) Apply Operations filter
- Infrastructure (2959) Apply Infrastructure filter
- Mobility (2205) Apply Mobility filter
- 8x8 (36) Apply 8x8 filter
- Alcatel-Lucent Enterprise (50) Apply Alcatel-Lucent Enterprise filter
- AT&T (44) Apply AT&T filter
- AudioCodes (48) Apply AudioCodes filter
- Avaya (389) Apply Avaya filter
- Cisco (564) Apply Cisco filter
- Dell (11) Apply Dell filter
- Five9 (46) Apply Five9 filter
- Fuze (39) Apply Fuze filter
- Genesys (96) Apply Genesys filter
- HP (98) Apply HP filter
- IBM (171) Apply IBM filter
- Jabra (9) Apply Jabra filter
- Logitech (56) Apply Logitech filter
- Lumen (2) Apply Lumen filter
- Masergy (50) Apply Masergy filter
- Microsoft (762) Apply Microsoft filter
- Mitel (230) Apply Mitel filter
- NEC (128) Apply NEC filter
- Nectar (58) Apply Nectar filter
- Polycom (95) Apply Polycom filter
- Ramp (37) Apply Ramp filter
- RingCentral (121) Apply RingCentral filter
- Sennheiser (18) Apply Sennheiser filter
- Slack (13) Apply Slack filter
- Tata Communications (59) Apply Tata Communications filter
- Unify (185) Apply Unify filter
- Vonage Business (79) Apply Vonage Business filter
- Yealink (8) Apply Yealink filter
- Zoom (16) Apply Zoom filter
- Acme Packet (24) Apply Acme Packet filter
- Allworx (2) Apply Allworx filter
- Arkadin (22) Apply Arkadin filter
- Aspect (34) Apply Aspect filter
- BT (25) Apply BT filter
- CaféX (8) Apply CaféX filter
- CallTower (14) Apply CallTower filter
- Clarity Connect (10) Apply Clarity Connect filter
- Continuant (1) Apply Continuant filter
- Damaka (4) Apply Damaka filter
- Dialogic (5) Apply Dialogic filter
- Dimension Data (44) Apply Dimension Data filter
- Empirix (11) Apply Empirix filter
- Enghouse Interactive (17) Apply Enghouse Interactive filter
- Inference Solutions (9) Apply Inference Solutions filter
- IntelePeer (27) Apply IntelePeer filter
- IR (11) Apply IR filter
- Jive (21) Apply Jive filter
- Kurmi Software (21) Apply Kurmi Software filter
- Lifesize (33) Apply Lifesize filter
- Lightware (3) Apply Lightware filter
- Mavenir (5) Apply Mavenir filter
- Modality Systems (8) Apply Modality Systems filter
- Momentum (36) Apply Momentum filter
- Netfortris (5) Apply Netfortris filter
- NetSapiens (6) Apply NetSapiens filter
- NewVoiceMedia (31) Apply NewVoiceMedia filter
- Nureva (26) Apply Nureva filter
- NUWAVE (5) Apply NUWAVE filter
- Orange (32) Apply Orange filter
- OVCC (8) Apply OVCC filter
- Panasonic (18) Apply Panasonic filter
- PanTerra Networks (9) Apply PanTerra Networks filter
- ScanSource (21) Apply ScanSource filter
- SIPPIO (3) Apply SIPPIO filter
- Snom (20) Apply Snom filter
- Star2Star (8) Apply Star2Star filter
- StarLeaf (12) Apply StarLeaf filter
- Tadiran Telecom (2) Apply Tadiran Telecom filter
- TekVizion (8) Apply TekVizion filter
- Unimax (7) Apply Unimax filter
- Verint (33) Apply Verint filter
- Voice4Net (2) Apply Voice4Net filter
- VOSS (84) Apply VOSS filter
- Voxbone (14) Apply Voxbone filter
- West (28) Apply West filter
- XO Communications (3) Apply XO Communications filter
- Yorktel (17) Apply Yorktel filter
- Zultys (2) Apply Zultys filter
- 3CX (8) Apply 3CX filter
- ADDASOUND (1) Apply ADDASOUND filter
- Aerohive (1) Apply Aerohive filter
- Aryaka (1) Apply Aryaka filter
- Asurion (22) Apply Asurion filter
- Avnet (7) Apply Avnet filter
- Bandwidth (4) Apply Bandwidth filter
- Calabrio (5) Apply Calabrio filter
- Consilium Software (9) Apply Consilium Software filter
- Drum (5) Apply Drum filter
- ESI (6) Apply ESI filter
- Esna (16) Apply Esna filter
- Exinda (2) Apply Exinda filter
- EZuce (3) Apply EZuce filter
- GUnify (6) Apply GUnify filter
- Highfive (4) Apply Highfive filter
- Huawei (47) Apply Huawei filter
- Imagicle (3) Apply Imagicle filter
- IPCortex (1) Apply IPCortex filter
- KnoahSoft (1) Apply KnoahSoft filter
- KOVA (1) Apply KOVA filter
- Logmein (9) Apply Logmein filter
- Metropolis Technologies (4) Apply Metropolis Technologies filter
- Mutare (2) Apply Mutare filter
- NextPlane (27) Apply NextPlane filter
- Ooma (15) Apply Ooma filter
- Patton (11) Apply Patton filter
- Radish Systems (1) Apply Radish Systems filter
- Radisys (3) Apply Radisys filter
- Shango (1) Apply Shango filter
- SMART (163) Apply SMART filter
- Stack8 (1) Apply Stack8 filter
- Swyx (1) Apply Swyx filter
- TrueConf (4) Apply TrueConf filter
- UJET (11) Apply UJET filter
- Voximplant (3) Apply Voximplant filter
- BC Expert Insights Market (38) Apply BC Expert Insights Market filter
- BC Expert Insights Objective - Vendor Neutral (41) Apply BC Expert Insights Objective - Vendor Neutral filter
- BC Expert Insights Planning (15) Apply BC Expert Insights Planning filter
- BC Expert Insights Solution (11) Apply BC Expert Insights Solution filter
- BC Expert Insights Vendor (79) Apply BC Expert Insights Vendor filter
- BC Expert Insights Vendor Solution (130) Apply BC Expert Insights Vendor Solution filter
- BC Expert Roundtable (119) Apply BC Expert Roundtable filter
- Bcs Webinar (0)
- Bcs Webinar Registration (0)
- Best Practice (38) Apply Best Practice filter
- Buyer Guide (14) Apply Buyer Guide filter
- Case Study (29) Apply Case Study filter
- Executive Interview (145) Apply Executive Interview filter
- Expert Roundtable (436) Apply Expert Roundtable filter
- Guest Contributions (34) Apply Guest Contributions filter
- Multimedia (38) Apply Multimedia filter
- News Analysis (2071) Apply News Analysis filter
- Newsfeed Article (1303) Apply Newsfeed Article filter
- Newsfeed Article (1) Apply Newsfeed Article filter
- Thought Leadership (21) Apply Thought Leadership filter
- Vendor Collateral (211) Apply Vendor Collateral filter
- Vendor Resource Best Practices (24) Apply Vendor Resource Best Practices filter
- Vendor Resource Buyers Guides (2) Apply Vendor Resource Buyers Guides filter
- Vendor Resource Multimedia Content (4) Apply Vendor Resource Multimedia Content filter
- Vendor Resource White Paper (4) Apply Vendor Resource White Paper filter
- Webinar (13) Apply Webinar filter
- Webinars (7) Apply Webinars filter
- White Paper (64) Apply White Paper filter
- Banking And Investment (800) Apply Banking And Investment filter
- Education (446) Apply Education filter
- Energy And Utilities (487) Apply Energy And Utilities filter
- Finance (12) Apply Finance filter
- Government (675) Apply Government filter
- Healthcare (482) Apply Healthcare filter
- Hospitality (180) Apply Hospitality filter
- Insurance (100) Apply Insurance filter
- Manufacturing (704) Apply Manufacturing filter
- Media/Publishing (422) Apply Media/Publishing filter
- None (43) Apply None filter
- Professional Services (745) Apply Professional Services filter
- Retail & Distribution (798) Apply Retail & Distribution filter
- Technology (1611) Apply Technology filter
- Transportation (110) Apply Transportation filter
- 2023 (11) Apply 2023 filter
- 2022 (76) Apply 2022 filter
- January 2022 (14) Apply January 2022 filter
- February 2022 (7) Apply February 2022 filter
- March 2022 (12) Apply March 2022 filter
- April 2022 (4) Apply April 2022 filter
- May 2022 (8) Apply May 2022 filter
- June 2022 (9) Apply June 2022 filter
- July 2022 (4) Apply July 2022 filter
- August 2022 (4) Apply August 2022 filter
- September 2022 (5) Apply September 2022 filter
- October 2022 (1) Apply October 2022 filter
- November 2022 (5) Apply November 2022 filter
- December 2022 (3) Apply December 2022 filter
- 2021 (261) Apply 2021 filter
- January 2021 (20) Apply January 2021 filter
- February 2021 (23) Apply February 2021 filter
- March 2021 (29) Apply March 2021 filter
- April 2021 (17) Apply April 2021 filter
- May 2021 (17) Apply May 2021 filter
- June 2021 (31) Apply June 2021 filter
- July 2021 (21) Apply July 2021 filter
- August 2021 (19) Apply August 2021 filter
- September 2021 (20) Apply September 2021 filter
- October 2021 (23) Apply October 2021 filter
- November 2021 (26) Apply November 2021 filter
- December 2021 (15) Apply December 2021 filter
- 2020 (298) Apply 2020 filter
- January 2020 (14) Apply January 2020 filter
- February 2020 (10) Apply February 2020 filter
- March 2020 (14) Apply March 2020 filter
- April 2020 (24) Apply April 2020 filter
- May 2020 (21) Apply May 2020 filter
- June 2020 (34) Apply June 2020 filter
- July 2020 (21) Apply July 2020 filter
- August 2020 (25) Apply August 2020 filter
- September 2020 (40) Apply September 2020 filter
- October 2020 (27) Apply October 2020 filter
- November 2020 (17) Apply November 2020 filter
- December 2020 (51) Apply December 2020 filter
- 2019 (995) Apply 2019 filter
- January 2019 (67) Apply January 2019 filter
- February 2019 (39) Apply February 2019 filter
- March 2019 (140) Apply March 2019 filter
- April 2019 (107) Apply April 2019 filter
- May 2019 (125) Apply May 2019 filter
- June 2019 (95) Apply June 2019 filter
- July 2019 (91) Apply July 2019 filter
- August 2019 (66) Apply August 2019 filter
- September 2019 (95) Apply September 2019 filter
- October 2019 (143) Apply October 2019 filter
- November 2019 (14) Apply November 2019 filter
- December 2019 (13) Apply December 2019 filter
- 2018 (729) Apply 2018 filter
- January 2018 (149) Apply January 2018 filter
- February 2018 (155) Apply February 2018 filter
- March 2018 (35) Apply March 2018 filter
- April 2018 (47) Apply April 2018 filter
- May 2018 (30) Apply May 2018 filter
- June 2018 (17) Apply June 2018 filter
- July 2018 (54) Apply July 2018 filter
- August 2018 (73) Apply August 2018 filter
- September 2018 (15) Apply September 2018 filter
- October 2018 (43) Apply October 2018 filter
- November 2018 (29) Apply November 2018 filter
- December 2018 (82) Apply December 2018 filter
- 2017 (678) Apply 2017 filter
- January 2017 (178) Apply January 2017 filter
- February 2017 (151) Apply February 2017 filter
- March 2017 (29) Apply March 2017 filter
- April 2017 (19) Apply April 2017 filter
- May 2017 (24) Apply May 2017 filter
- June 2017 (27) Apply June 2017 filter
- July 2017 (26) Apply July 2017 filter
- August 2017 (32) Apply August 2017 filter
- September 2017 (21) Apply September 2017 filter
- October 2017 (30) Apply October 2017 filter
- November 2017 (23) Apply November 2017 filter
- December 2017 (118) Apply December 2017 filter
- 2016 (308) Apply 2016 filter
- January 2016 (24) Apply January 2016 filter
- February 2016 (38) Apply February 2016 filter
- March 2016 (44) Apply March 2016 filter
- April 2016 (16) Apply April 2016 filter
- May 2016 (15) Apply May 2016 filter
- June 2016 (20) Apply June 2016 filter
- July 2016 (23) Apply July 2016 filter
- August 2016 (25) Apply August 2016 filter
- September 2016 (24) Apply September 2016 filter
- October 2016 (40) Apply October 2016 filter
- November 2016 (26) Apply November 2016 filter
- December 2016 (13) Apply December 2016 filter
- 2015 (289) Apply 2015 filter
- January 2015 (29) Apply January 2015 filter
- February 2015 (17) Apply February 2015 filter
- March 2015 (30) Apply March 2015 filter
- April 2015 (15) Apply April 2015 filter
- May 2015 (22) Apply May 2015 filter
- June 2015 (33) Apply June 2015 filter
- July 2015 (17) Apply July 2015 filter
- August 2015 (21) Apply August 2015 filter
- September 2015 (26) Apply September 2015 filter
- October 2015 (22) Apply October 2015 filter
- November 2015 (32) Apply November 2015 filter
- December 2015 (25) Apply December 2015 filter
- 2014 (331) Apply 2014 filter
- January 2014 (37) Apply January 2014 filter
- February 2014 (30) Apply February 2014 filter
- March 2014 (39) Apply March 2014 filter
- April 2014 (28) Apply April 2014 filter
- May 2014 (24) Apply May 2014 filter
- June 2014 (21) Apply June 2014 filter
- July 2014 (33) Apply July 2014 filter
- August 2014 (21) Apply August 2014 filter
- September 2014 (22) Apply September 2014 filter
- October 2014 (32) Apply October 2014 filter
- November 2014 (26) Apply November 2014 filter
- December 2014 (18) Apply December 2014 filter
- 2013 (940) Apply 2013 filter
- January 2013 (119) Apply January 2013 filter
- February 2013 (99) Apply February 2013 filter
- March 2013 (85) Apply March 2013 filter
- April 2013 (84) Apply April 2013 filter
- May 2013 (97) Apply May 2013 filter
- June 2013 (94) Apply June 2013 filter
- July 2013 (97) Apply July 2013 filter
- August 2013 (82) Apply August 2013 filter
- September 2013 (71) Apply September 2013 filter
- October 2013 (49) Apply October 2013 filter
- November 2013 (30) Apply November 2013 filter
- December 2013 (33) Apply December 2013 filter
- 2012 (509) Apply 2012 filter
- January 2012 (6) Apply January 2012 filter
- February 2012 (27) Apply February 2012 filter
- March 2012 (40) Apply March 2012 filter
- April 2012 (70) Apply April 2012 filter
- May 2012 (18) Apply May 2012 filter
- June 2012 (23) Apply June 2012 filter
- July 2012 (12) Apply July 2012 filter
- August 2012 (25) Apply August 2012 filter
- September 2012 (36) Apply September 2012 filter
- October 2012 (63) Apply October 2012 filter
- November 2012 (91) Apply November 2012 filter
- December 2012 (98) Apply December 2012 filter
- 2011 (153) Apply 2011 filter
- January 2011 (17) Apply January 2011 filter
- February 2011 (17) Apply February 2011 filter
- March 2011 (12) Apply March 2011 filter
- April 2011 (23) Apply April 2011 filter
- May 2011 (11) Apply May 2011 filter
- June 2011 (13) Apply June 2011 filter
- July 2011 (12) Apply July 2011 filter
- August 2011 (15) Apply August 2011 filter
- September 2011 (8) Apply September 2011 filter
- October 2011 (10) Apply October 2011 filter
- November 2011 (9) Apply November 2011 filter
- December 2011 (6) Apply December 2011 filter
- 2010 (133) Apply 2010 filter
- January 2010 (2) Apply January 2010 filter
- February 2010 (1) Apply February 2010 filter
- May 2010 (6) Apply May 2010 filter
- June 2010 (14) Apply June 2010 filter
- July 2010 (12) Apply July 2010 filter
- August 2010 (16) Apply August 2010 filter
- September 2010 (25) Apply September 2010 filter
- October 2010 (26) Apply October 2010 filter
- November 2010 (21) Apply November 2010 filter
- December 2010 (10) Apply December 2010 filter
- ! (0)
- (none) (0)
There are currently no comments on this article.
You must be a registered user to make comments
Add new comment