mr. edward amoroso i'd love your name. [laughter] mr. os -- john olsten? >> we provide a comprehensive cliffs of configuration of guidelines so we have the information to access and our goal is to make sure your by the organization if it is a blackberry device has full control at all times. comprehensive policy more than the administrator can could draw auspex including information or allowing software installed on the device. there is a is a lot of education and four people understand it is difficult we tried to offer transparency and help through standards and best practices through items like this. >> as i and stand it when potential is to isolate and block the it addresses that pose a threat to. do you have the technology to do this today and how has it been affected? >> we have the technology to block but it does not work. >> there you go. >> we try hard. it is your pc being infected. we turned every% in this room inches of administrator. that model is wrong. you do not do a very good job. even be say we don't do what will be there. >> that causes the