 Hi, I'm Jim Barlow with ST NFC RFID Marketing, and we're at the 2019 IoT world here in Santa Clara. We're demonstrating the different ways that NFC and RFID can enable the Internet of Things. In the NFC portfolio we have tags, dynamic tags, and on the reader portfolio we have HF and UHF readers. We have demonstrations of how you can do inbox programming to configuration of your nodes on the Internet. We have a smart NFC sensor tag through the Amazon web server where you can track data real time and download that later for analysis. And we have special tags and tamper detect tags. And we have through TRES25 authentication the ability to control nodes and their access to the Internet. So what NFC enables here is it allows different nodes to be identified on their role in the Internet and also whether they're authentic or not to have access to the Internet. In this case the gateway, we have a high speed node here that wants to attach to this gateway. The gateway through NFC can identify that yes, this is a high speed node and it is authorized to operate on this network. Similarly, we have a low speed node that could tap to the gateway. Field technician could easily tap that node to the gateway and has identified this as a low speed node and has valid access to the Internet. If someone comes along with a clone or an invalid node on the Internet and tries to attach to the same gateway through TRES25 technology, the gateway will detect that and not allow access. Okay, so what's going on here in this node authentication? We're using the STTRES25 signature for authentication and clone detection and we're using the STTRES25 TV ISO 15693 tag. I'll show you on the phone app exactly how we're authorizing this. So if you take the phone app for brand protection and you tap to the tag or which is actually inside the node, you can validate the data. You can find out the product name, the number of times it's been used, the usage rate and the speed that it's allowed to access the Internet. Furthermore, you can go into protection, check the tag signature and finally through checking the digital signature, we can see that this node has valid access to the Internet. For further information on STNFC RFID technology, please visit ST.com and thank you very much.