Michael Holland 11:51
There's it there's a whole bunch of interesting things you can do. With the social media aspect, of course, you've got in Europe, we've got GDPR. And there's that there's privacy considerations that need to be taken into account. And we've really, I guess, focus more on the more direct business applications. But social media, if you if you think that if you're buying most, most clothing these days, or certainly a lot of clothing is coming with, with RFID tags. But if you also think that all UHF tags, if you think that also everyone's phone is potentially a beacon as well. So they're very interesting applications. And to give you a simple one, I guess is if you're at a conference, I don't necessarily want to have my face on the facial recognition system within the conference organizers. But I'm having to give up my phone number and allow access to my phone as a beacon for a period of time. So you're looking around trying to identify people, that's a great way to do it. So that would be a simple social setting. There's lots of other fun applications that you can think of at parties and bars and different things as well, if people want to enable their phones for different reasons, or if you want to meet people. So there is a number of social scenarios. And I think that these social scenarios could be very interesting for a for certain ecosystems. One that we won that we did play with was looked at was from a gaming point of view. So enabling live gaming on on the streets effectively, which is something that, you know, friends at, Pokemon have tried to do. But if I could turn you into an avatar, for example, you could you could take on an avatar, and I can identify identify you on the street. And that opens up all sorts of applications around gaming against each other. And, you know, you can you can spend, you know, hours talking about the different applications, you can use it in live gaming, in that sense, as well. So, so that's a great social example, I think.