And so, one, it allowed us to work a little bit with one vendor and then move over to a different vendor. Maybe this one had specialization in building the identity piece of a solution, and this one was really good at authentication. So, that was one scenario we used it. But the other, on things like the tactical assault kit, which initially was a really military-use case, and now we’ve released as a civilian-use case. As a matter of fact, …

Keyboard shortcuts

j previous speech k next speech