using ismodel we are called cyber observable. that data model is being used and sharing data back-and-forth. we think there will be a broad use case and even some potential commercial spinoffs as cyber situational awareness. >> in a click and drag scenario. >> the ease of the process is also something we are trying very hard to do. the original concept was strongly influenced by studying the decision-making process. the idea of a course of action and down through a chain of command, in some cases, it can take very long. they wouldn't know if that specific capability existed. are able to automate a lot of those monday and processes. we've collapsed that timeframe to actual execution of t making it easier to construct , we have developed a way for cyber operators to construct plans so that they don't have to know the nuanced details. they can administer their own enterprise. here,s plan we built we've come up with a scenario to demonstrate capabilities. detected crimeware on the desktop and call the i.t. desk. they notice there is