 And today the schedule is we finish a little early compared to the previous two days. So we've been getting good numbers in attendance. So we've had approximately about a dozen or so people in the room here in Seattle and around 80 or so typically online. So we have about 100 people attending and that those numbers have stayed kind of consistent throughout the day or the evening, early morning, depending on where you are. So given the circumstances, I think that's good. And it's been good for people to be able to present the work and the research that they've been doing. So this morning we will actually have a couple of talks on the ARM architecture, one with the memory tagging extensions. And then we'll have a talk on ARM virtualization and how it relates to security. And then after the morning break, we have some more research and this time from Penn State University on bug finding and analysis. And then we have live migration for TDX based confidential VMs. And so that's a topic that has come up a few times during the conference and seems to be hiding up the confidential computing side of things where the customer's workloads typically in the cloud are private to the customer and not known to the operator of the cloud. So it's interesting to see these trends coming. We have a talk on missing CVE fixes. And then finally we'll have James Bottomley and Mike Rubberport giving a talk on secret memory. And that will be an experiment with BBB, which people may be familiar with from Plumber's conference. And this will be an attempt to try and make a more interactive discussion based session, which is something we'll be looking at potentially for future conferences. So with that, I will get the next talk underway at 9.05.