The key word is trying to come up with a solution is not sure we have arrived at that. After the october 2016 discovery that the dit could be vulnerable the irs is monitoring for any suspicious activity, we engaged with our friends. And asked them, and suspicious activity in january. And an incident in february, multilayer Defense Mechanisms, one of the mechanisms is notification to the address record for the individual. That led us to identify the we had an issue, we were able to find that in fact there is fraud that has taken place and immediately shut down the application. It is not discovered by accident. It was a notice generated from the taxpayer. The taxpayer came in and notified us. Taking responsibly for the irs, and the applications face. Please her young peoples lives at stake, to fit their unraveling that. The gentleman yields back. The chair would like to recognize the gentlelady from new jersey for five minutes. Good morning to all of you. In september the Inspector Gener
The key word is trying to come up with a solution is not sure we have arrived at that. After the october 2016 discovery that the dit could be vulnerable the irs is monitoring for any suspicious activity, we engaged with our friends. And asked them, and suspicious activity in january. And an incident in february, multilayer Defense Mechanisms, one of the mechanisms is notification to the address record for the individual. That led us to identify the we had an issue, we were able to find that in fact there is fraud that has taken place and immediately shut down the application. It is not discovered by accident. It was a notice generated from the taxpayer. The taxpayer came in and notified us. Taking responsibly for the irs, and the applications face. Please her young peoples lives at stake, to fit their unraveling that. The gentleman yields back. The chair would like to recognize the gentlelady from new jersey for five minutes. Good morning to all of you. In september the Inspector Gener
We beat sony and lg. Its kind of like a david and goliath moment. Were only a 10person company. Its quite thrilling. We have edgemotion technology. We take a very thin, slightly curved optically clear piece of acrylic glass, and we actuate the edge. It stimulates the edge of the glass to create panoramic, roomfilling sound. Its highly patented, we have 39 patents issued excuse me, applied for, and 14 issued. And its our competitive advantage in the marketplace on a global scale. Host why did it take 39 patents to put sound out of this acrylic . Guest it took us ten years to develop the technology. There is a totally proprietary approach to headache sound come make sound come out of this piece of acrylic glass. And we have all kinds of material science and engineering in the design of the product itself. Host so being issued 14 patents, waiting on other patents, whats the hold up . Guest well, theres really well, were waiting to make sure that they can come through. And we also apply fo
For a division of the National Institutes of standards and technology. Mr. Grant, thats quite a mouthful, but what is nistic as its known . Guest i should say every program in washington seems to get one. Weve got one of the catchier ones. The National Strategy for trust and identities in cyber stays is an initiative launched by president obama in springtime of 2011 thats focused to looking to raise the levels of trust online by driving improvements in security and privacy for all of us. The first is the passwords are fundamentally broken both from a security and usability perspective. On the security side, we know from studies that a whopping 76 president of Network Intrusions 76 of Network Intrusions last year were exploited, and use about side managing 25 or 30 different passwords, youre told to make each of them 12 characters, increasingly complex. Its, unfortunately, the perfect combination of bad security and bad use about. Beyond the password side of thing, nstic is looking to g