So you have to understand how Shield works a little bit. So unlike most cybersecurity products, we don’t use signatures. So let’s back up a little bit. SolarWinds was once called a zero-day attacks. What that really means is, it’s a new attack with an unknown signature, so therefore no cybersecurity product can identify it and stop it and therefore it’s going to breach networks until somebody identifies it and starts knowing how to look forward. That’s what zero-day attack means. So when the SolarWinds attack was being launched, it was an unknown thing, so therefore, it appeared as harmless to everybody’s network security and therefore it got on a lot of networks. The way we work is we identify even zero-day attacks by using artificial intelligence, this TraceCop database to understand patterns related to traffic that suggest its malware even without knowing what it is. So how do we identify and kill SolarWinds? Because of our AI identify the patterns of these attacks and said, this looks like evil stuff to us, we’re going to kill it not let it happen. But we write that in our database. So at the time we were doing this last August, September, we didn’t know that was SolarWinds, because SolarWinds haven’t been identified yet. But we were seeing things we thought we evil that we were killing. Well, once SolarWinds became public, they identified the signatures, they published them on the Internet and everybody could go start looking [Technical Difficulty] from their network and trying to clean it off their network. We went back and looked in our database and said, yes, we were killing those attacks back in June, September, August before anybody knew what they were. So we didn’t know that we were killing SolarWinds, but we knew we were killing a new unknown attacks. That’s how we start [Technical Difficulty] exchange attack recently after SolarWinds. Again, we were killing that attack when it came in as a zero-day attack because our AI can identify the patterns to say, this is not good therefore, we’re going to kill it, because it’s not good, killing it didn’t hurt anybody because nobody knew it ever been killed. And it’s in our database, we didn’t know it’s the Microsoft Exchange things, you didn’t know what the Microsoft Exchange thing was last year. But in March, once we became public what it was, we could look at our database and say yes, we killed thousands of times the Microsoft Exchange attack, the SolarWinds attack. So that’s how we can kill even zero-day attacks before anybody knows what they are and we can prove we did it because it’s recorded in our database, the time and date and the number of times, the occurrences that it was attacking. Does that make sense?