← All talks

Manufacturing Breakthroughs: How Conflict Leads to Innovation

BSides Las Vegas37:339 viewsPublished 2025-12Watch on YouTube ↗
About this talk
Identifier: AWLR99 Description: - “Manufacturing Breakthroughs: How Conflict Leads to Innovation” - Introduces TRIZ methodology for resolving contradictions and forecasting innovation. - Applies TRIZ to supply chain security, dark web economies, and critical infrastructure. - Case studies include anti‑phishing and data leakage prevention. Location & Metadata: - Location: Ground Truth, Siena - Date/Time: Wednesday, 11:30–11:50 - Speaker: Munish Walther‑Puri
Show transcript [en]

Good morning. Morning. >> I'm glad that you're here. This is going to be a different talk. I'm just going to tell you it's going to be a different talk. I hope you leave here feeling a little bit confused and then like mainly confused but also curious. >> Okay, just do full screen. No, it's all good. >> Like actually everyone changes. >> Yeah, you can minimize. Good. So, I hope you leave here a little bit confused and a little bit curious. What I want to share with you are some is a methodology that I came across some time ago that I've used at various points in my career. My goal is not to show you all the ways

that I use it, but for you to understand the basics of the methodology and then I'll talk a little bit about how I've used it. The idea is and thank you. Hi, my name is Manish. I'm going to tell you about me, but I don't know. It just doesn't feel like the important thing. Here's what I want to cover with you. How to innovate? Period. How to innovate? There's a methodology. There are lots of methodologies, but there's a methodology I would like to present to you on how to innovate. We're going to talk about how to innovate in security, but broadly, how to innovate. This can be used in a lot of different areas. It's been used in a lot of different

areas. So, I'm going to give you a little bit about the history and development of this methodology, how it actually works, some use cases. So, we're going to spend 80% of the time talking about that because it's a little bit complicated and then a bit of time on security. Okay, who the hell am I? Why am I here? What have I done? These are all existential questions. I [laughter] don't know. That's my answer. But the short version is I am here because Besides has been an important community for me in a lot of different ways. Uh, I found probably the greatest job I've had at a bides in my city and I went to it and I learned about it and

then years later I met somebody there and I ended up working there and it was an incredible opportunity. I've met some amazing folks. I've learned so much. You know, we talk about paying it forward. This is my little bit of an effort to share what I've learned some hard lessons and in ways that I hope are apply. The most important thing to know about my background is that it's weird. It's all over the place. And I mean that both in cool ways and old ways where I spent a lot of time looking for work and unemployed and doing odd jobs. So whatever professional you see standing before you is an amalgamation of all those things and

that's important because this has helped me understand okay I understand that I think differently and weird and that's okay and the last thing is the the what have I done I've applied this methodology in areas of security ones that I'm going to talk about data privacy dark web economies software supply chain critical infrastructure for ICSOT and a little bit insider threat. That's all really sexy. Mish, what a great promise. I'm going to spend like 5 minutes on those, but we're going to earn our way there at the end. Okay. So, here is something that you're already hearing about AI. AI is everywhere. All right. Well, how do we think about it in this moment? My frame

is AI is tomorrow's critical infrastructure. However, we think about critical infrastructure, it's import, national security, cyber security, resilience. That's what AI is going to be. It arguably already is, but it's accelerating digital transformation. It's exacerbating the strain on defenders and it has really complicated supply chain and governance around it. You've probably already been thinking and hearing about aspects of those this week and you will continue to. So, we can establish that. Second, without thinking differently, we get stuck on complexity. We erode trust and our systems are brittle. And sort of in that order, complexity slows us down. And by us, I mean broadly, security, risk community, those of us thinking about defending broadly. And so if we're too slow to change,

those gaps increase, downtime rises. We know all of that. There's no FUD here. I'm just trying to state it as an oyilism. So the third is, and this is hopefully the new idea that breakthroughs come not from balancing trade-off and how do I make the compromise, but by breaking them. How many of you have um picked a lock? Do you know that dopamine hit when it pops open, right? You're like, I got it. That's in my mind what hackers do. We don't break things. We break things open. Now, sometimes we break things open that we probably shouldn't, like locks, but other times it's rules and methodologies and limits. And so, this is my effort to present you

a methodology for hacking innovation. So, first the history and development. This methodology is called TRIS. That is an acronym in Russian. not going to try and pronounce it. In short, it's called the theory of inventive problem solving. Just so you know, I'm not making this up. You can look this up. I want to tell you a little bit about the person that founded it. I'm not a huge fan, is you saw my my intro of focusing on the individual, although people are important to me, but in this case, I think this person's story and the context in which they created it is formative and is key to the methodology. And I think you'll see why. So

fundamentally it's born from adversity. Can I walk or you guys are gonna Is that okay if I move a little bit? All right. So this is Genrich Alcher. He was born in Cash Kent in the 20s, the 1920s, 100 years ago. When he was 20 years old, I don't know what you were doing when you were 20 years old. me. I was doing the finding out part of Fafo when I was 20. This guy was working in a patent office in a Soviet patent office. That's crucial. Soviet patent office and he was researching all the patents. That's pretty much all he was doing. But as he did that, he started to think about a systematic way to understand

what are the patterns of invention. Let me ask you a question and I really want you to think about this. I've struggled with this. What is the difference between invention and innovation? What's actually new? New, new, new, new. Have not seen it before. New versus improved. There's an old thing new and improved. What's the difference? How do you know? How do you know it's just not new to you and that it's genuinely new? So, that's what he was looking for. All right. Uh about four years after that um he was arrested for inventor sabotage because he pointed out the inefficiencies in Soviet invention and innovation and technology. And so they threw him in a goolog, a

Siberian labor camp. And for the years that he was there, he continued to work on this in his head. Then about 10 years after that when there is the if you know sort of Soviet Russian history there was the thaw with Kruev after Stalin passed away he published the paper 10 years later so don't feel bad if it takes you a little while to get to your idea out there and then 40 years after that not even during the manufacturing boom or anything in the 1990s a little bit in the 80s but in the 1990s big companies like Boeing and HP and Samsung started to pick up on this idea And we saw it in the 2000s. I'm going to

give you some examples. So number one, what an incredible story this person creating. I mean, we talk about necessity being the mother of invention. I mean, he really sat with it and tried to cultivate it. The other thing I want to present here and in this current world and environment, there's a meta story here, and I hope you'll get it, is to learn from our adversaries. At the time, we were early days of cold war. And when he came out of the goolog, they were like, "Oh, yeah, come back in. We'd like to understand how do we do innovation and invention, all of that much better. But I I know some people who would bristle at the idea of studying what a

Soviet anyone does. But for me, there's some very important lessons here and some very powerful ones, and I hope you'll agree." So he came up with this structured innovation. It's basically a systematic set of proven strategies to figure out how you resolve a conflict. And he distilled it from thousands of innovations. And what he did is go, okay, here's the stack of things that are actually new. Here are things that are applied from a different industry, right, that just come over that are new here. And what is underneath here? And so he was able to parse that out. So the way this methodology works, I'm going to go into great detail about it, but the most important thing for you to

understand is to seek conflict. What are the things that are in conflict? We are trained both personally and in a business sense to avoid it, minimize it, compromise. And I am telling you the first thing you need to do is identify the conflict. Really understand it. This requires empathy compassion insight analysis. So broadly he came up with these 40 principles and I'm going to show you a few eye charts and they are intentionally that way this is not something that I could I if we were to do this as a workshop I would have you get laptops I would get you a spreadsheet and we would go through it. So I'm going to try and illustrate for

you. So here are examples of some of the 40 if not all of them. Length of an object, speed, force, stress, weight of an object, temperature, power, weight of time, reliability, measurement accuracy. You can see these are kind of meta ideas. And then across the top, same thing. Length of an object, speed, force, stress, weight. So here are the parameters you want to improve. These are the parameters that get degraded when you improve. There's a tradeoff here. And so you can imagine who remembers the game Battleship? It's a little bit like Battleship. That's what I thought here. A1 hit. So you're looking for the intersection. That's why I'm saying you have to find what the conflict is. I'm going to go

through the methodology in detail, but essentially you're going to look at this and in here there's going to be a set of numbers that are going to indicate which principles you should look at and go all right here are the principles I need to consider and there are specific solutions or ideas to those principles. Let me see if those apply in this situation. I know this is all abstract right now. I will make it practical for you. It's summer. It's 104° outside. Would you rather be in a room that is a little bit hot but quiet or cool but really loud? Who would rather be in kind of hot but quiet? Okay. Who would rather be in cool but

kind of loud? All right. So, conventionally we would go, "All right. Well, here's your choice. You know, you can go over there or over here. If you want that, you go over here. If you want that, you go over here. This is what we're going to do. We might try and make adjustments. We might bring in a fan or something else, but it won't quite get there. So, let's talk about that. The primary function of an air conditioner is to cool the interior space. But the cooling fan, and I spent way too much time on air conditioner because our AC broke down. I'm not a mechanical or engineer person at all. Also, I was asking the repair guy. I was like, "What

is that?" Okay. Is that important? Uh-huh. What's that? All right. Is that important? Like, I didn't know anything about it. And cooling the whole space requires a strong, you know, compressor and that produces a lot of noise. How many of you have installed an air conditioner in a window? Yes. Okay. It's really annoying. Um I I live in New York and you can measure someone's wealth by how many AC's they have. That's how we measure wealth in New York and um or whether or not you need them. So the trade-offs here is you need to cool but it creates a lot of noise. That's a kind of harm kind of harm. So, Tris aims to reach an ideal

state where the noise of the compressor is not heard inside the room. Compressor is outside. Now, this isn't always perfect. If you've seen some of these ACs, it's still loud, but it's not nearly as loud as if the whole thing was inside. Simple example. So, oh, I should have made this bigger. Sorry. Here are the steps. We're going to go through this a little bit, but at a very high level, it's going to be relatively straightforward except for two steps. I'm saying that to you because I know you're smart folks. So, first define the problem. And this is involves that root cause analysis, right? You got to This is hard. This part's hard. Then analyzing the problem is understanding

what are the contradictions you're looking at. We're going to talk through this a little bit. This is this part's challenging. Identifying the ideal solution, what it looks like together. And then this other part you're familiar with generate potential solutions, evaluate and refine results and evaluation testing. I know that you've done this in various aspects of deploying a tech trying to manage a patch, fix something, build something. So I'm not going to spend too much time on this. I'm going to spend more time on this. How do you identify and analyze the problem and identify the ideal solution? So I'm going to give you three examples of Tris in action. First, oh, it's got cut off. Sorry, is this wrench.

If you can't see it up here, it's almost like a regular wrench except for two things. One, the metal turns a little bit here. And then there's this ratchet box on the end. All of these were designed with Tris. So that one um there is a principle called separation in space. We just talked about it with the air conditioner. Um and that ch that change in the design of metal forging. So it increases the area that the user's palm can grip and also um the leverage available, right? Think about a flat thing versus like you're gripped all the way over. It's going to seem like a small thing, right? The second is this keyboard. Has

anyone seen a keyboard like this before? If you can't see it, it's a keyboard. You seen one without letters? Think about that for a sec. Why do you think that is? How would they remove letters and numbers? So, there's a principle, another principle called trimming. They remove the numbering and the letter on the computer keyboards. If you are a proficient typist, you're not looking down at the keyboard. See, you don't need them anyway. They found it increased the the effectiveness, the proficiency of the typus by 17% because they weren't distracted by what they were looking at. Last one, Samsung Galaxy. Straightforward for us. I think we all work in tech. We think about this. These

ones maybe not as much. Trading off the battery life and weight of the device. Think about that. We know that in a phone, right? You're like, weight and battery like though, you understand that that trade off, but really they're looking for a conflict and ways to put that together. And this isn't just about a neat way to find a compromise. That is not what this is. So, if that's where your head is going now, that's fine. That's a good first step. But no, that's not it. What I'm going to show you next is going to be a bit of an eye chart. I'm going to leave it up for just a second. I don't expect

you to read it, but to comprehend the idea. These are all the 40 principles this way and this way. This is what that 20-year-old came up with in his head. This is what he was mapping while he was in a Siberian labor camp. So, remember I talked about the principles. See, did I bring that one up over here? Yeah. Okay. So, here is you can't see it. This is number 36, device complexity. And here is number 31 object generated harmful factors. This is our air conditioner. We go to that one. It shows us 19 and one which is um 19 is use of energy by moving object. Number one is weight of moving object. So they took those two together applied

it to the AC. So this is going to seem a little nuts right at first like okay you have this crazy chart. This is weird. This seems really static. I'm going to give you some broader examples now of how this has been implied in manufacturing, design, IT, and even security. Let's simplify the methodology. This is how I thought about it and then I found someone that illustrated much better than I could have. This is how I think about it. Your problem, the TRI's concept of the problems, Tris's suggested solution, your customized solution. Think about that. Specific problem, generalized problem, generalized solution, specific solution. Let me pause there and see if that lands. I'm actually asking you, so you

can nod your head if that's yes or you don't have to nod your head if the answer is no. Okay. Is this starting to land a little bit? We're not going to spend a lot of time going through the 40 principles. There are consultants. I've actually thought about becoming one. I don't know about like who just do this. This is all they do. They come in and go, "All right, I know the principles. Let's talk through your conversation. All right, you're thinking about these four. These ones go over here. All right, here are the things. Now, they work with the specialists. Let's come up with a solution. Work through the whole thing." I'm going to give you some examples of

where that's happened and then how I've tried to do this on my own a little bit. All right. So, first is this doesn't work with all problems. That might be apparent, but it doesn't work with all problems. What I have found is and and this is backed by the research around Tris, but specifically in the way I've tried to apply it, there's three things that I think about what makes a good candidate. So the first is, and tell me if these sound familiar folks, a resolved a recurring unsolved contradiction where, for example, security demands and business needs continuously clash. There's one. It's almost like so obvious, right? Second, persistent pain points. So, our incremental fixes are

not really resolving the real tension. I hope you're thinking about something that you're working on now, whether it's like fishing or apps or vaugh or pentesting, whatever it is. It's ideal for, wait for it, chronic problems that resist conventional solutions. You've tried the things. either they're not working, they're not working fast enough, or something has changed where they stop working. So think access control or access versus control, privacy versus monitoring, resilience versus agility. These are things that are always there. They're always there, these conflicts. And if every year we have the same unsolvable debate crops up in security meetings and conversations and conferences, that's an opportunity to use Tris. It's less effective for one-off incidents or best practice work. If

you've ever been in a situation, and if you haven't, you probably will be sometime in the next year, where nobody can tell you what right looks like, but everybody can tell you what wrong looks like. That's where this comes in. Let me talk about some industrial and business applications. Um, actually some simpler ones that that came to mind. Um, like tuna cans, you know, you can stack tuna cans or soda cans on top of each other. That was designed using Tris. You know, the upside down ketchup bottle, Hind was designed using Tris. And you might think, what? How? They looked at, you know, cement mixers and how they keep things turning. They were looking at how

do you keep a liquid and store it upside down and dispense it because that's not intuitive to store a liquid upside down. So, they use the Tris methodology to then design that. I'll come up with a few other examples. Automotive safety. I didn't know this one until I started this research. Airbags. So, how do you provide comfort? Comfort in the softness of the bag and high impact resistance, which it has to be in a hard state. and then expand to a super soft state. Um, ziplockc bags, so recealable packages that balance ease of access with freshness. Uh, and then there's a a bunch in manufacturing that I'm I'm going to talk about some of those, but here are some

like very basic consumer goods, right? Very basic things. So, I'm trying to give you this idea that there are a lot of things that you see around you that have used the Tris methodology. One of my favorite papers about this was written 15 years ago. This is the paper. It's applications of tra to it and it's HP fellow and basically looked at a bunch of use cases. This is 15 years ago. Uh here's the URL.org. You can look it up. Applications of trace to it. That's it. Relatively easy to find. So um this researcher took this class of problems in IT security and split them in two categories. What is the next big thing? At that time the next big thing

was future of IT services, future business intelligence. You can just change that to artificial intelligence and like software as a service and it's totally relevant. And then a specific problem secure but open if that's not the bane of our existence I don't know what is. High CPU cycle costs, change that to high token cost. Private cloud conflict, still kind of there. Hybrid cloud, least asset management, we can talk about BYOD or devices. So, uh, I'm going to pull some of the cases that came from here and there are three. The first is so secure but open it and there's a pot in there. Open it. You're welcome. uh a global beverage company. So they they had this challenge where

kind of traditional things security leaders were caught between stricter controls and keeping business fast and creative and they didn't have budget for it. So um Tris helped reframe the issue not from how much security but how to increase security without harming openness. Think about that for a sec. how to increase security without harming openness. Instead of the principles of weight or power or noise, it's other things about what a human experiences. This is where it's a little bit challenging to get there, but it's there. So, they talked about using again, how users, how secure behavior benefits their team. We know [clears throat] this now from a lot of the fishing security awareness training, all of that. But they got here

pretty quickly, not after years and years of doing the training. So they made security features part of the business projects and gave users transparency and involvement. So better adoption, more trust systems that fit real world use cases while remaining resilient. This was 15 years ago. They did this in I think 6 months. Like this wasn't a year-long thing. And think about all the journeys we've had to go through to get to this place. Here's a very specific one, but it has to do with security as well. It's around hardware. So, Seammens was told, "Make our key switch," and I couldn't find it in English. It doesn't matter that it's in German. Made our make our key switch

smaller without making it less safe. So, their contradiction, pretty classic, compact and affordable versus uncompromised security. I want you to think about it literally here and then we're going to think about figuratively how this applies in security, the kind of security we think about. So, what they came up with, and you're going to be like, "Oh, that's cool." But they came up with it during the Tris methodology. If if we talked about how we would solve this problem, I don't know that we necessarily would get here. What they designed was an auto eject key. So, when the switch is off, the key pops out. No one forgets the key. The risk is dropped. And because of the way they

designed it, the size shrink, the size of the whole thing shrinks from here to here. And it was cheaper to manufacture. Now, I could keep giving you these examples. I'm going to give you one more, but the point is not look at all these cool examples, but I was really curious. All right, I get in technology. I get in design, I get in process, but can it happen in securities? DevOps. So, they needed to test, they needed authentic test data, but real customer info is too risky. Now, you might be like, okay, yeah, today synthetic data, got it. They didn't have synthetic data. They couldn't create it. So they wanted accurate testing but compliance and privacy demanded you know

protection. So there's one principle called segmentation where they split the data into high-risisk and lowrisk groups and then there's [clears throat] there's a principle called taking out literally removing different from trimming where you remove the sensitive elements. So they anonymize the sensitive records they simulated realistic data for the rest and they built pattern into the test data safely. And so now they can stress test and innovate confidently without data that reflects a real world. It carries no real world world risk. By the way, a company that did this synthetic data for AI. So this example is over 10 years old. A company that did this for training data for AI just got bought by Nvidia

for like nine figures. So, let me pause here before I go into the security cases. I've given you a lot of information. We're going to have a bit of a Q&A at the end, but before I get into the specific ones that I've talked about, let me pause here and see if you have any questions up until this point, either about these cases or the methodology. I know it's a lot. Okay, I'm going to go in one by one the examples. So, data privacy, software, supply chain, ICOT, dark web economies, and insider threats. Okay, so the challenge around data privacy I think most people are aware of data utility versus anonymity. So here I was working on um how many of you are

familiar with the notion of differential privacy? Okay. So that in a sense is resolving a conflict that's here between data utility and anonymity. Uh I was working at a startup where we were trying to find data that had been leaked on the dark web without having possessing that data. So if I want to find if your social security number has been compromised, you have to give me your social and then you're kind of compromising it. So how do we find that conflict and I didn't come up with it but the company came up with it and then it made sense to me. So I'm not saying it's like oh we invented this or I use this to invent

but it helped me understand it and then explain to people why that technology is unique. It was a particular kind of fingerprinting where they they took a series of fingerprints. So if there's like nine digits, you know, they did six the first six digits, then digits 2 through 7, then 3 through 8, then 4 through 9, and they would look for an overlap of all of those and say, "Hey, we found your thing. I don't know what your thing is, but we found it. There's a really good match between these." Second, software supply chain. This issue that I work on right now a fair amount. How do you reconcile rapid deployment and security checks? And so

[clears throat] there's two principles in there. One is called preemptive actions and the other is like an aspect of automation. And here I've applied it to software bill of materials and identifying transitive dependencies. If you're familiar with software supply chain and how there are certain libraries that are uh dependent on others and that library is then dependent on another one. There's a bunch of libraries that are dependent on that one that might not be immediately apparent. And so you have to find this conflict of how do we move quickly and do it securely. ICS and OT. The biggest thing for me when I started working on industrial control systems and operational technology was this real shift in focus

away from any of the things we conventionally talk about in security in cyber security it cyber security confidentiality integrity availability really to high availability operational continuity and and so there there's a notion of segmentation. How many of you are familiar with that? You've heard this before. Segment your IT and your IT networks. Okay. When I heard that, I thought about Tris. I was like, "Oh, okay. That's one thing that they've already instantiated." And then another. So, the reason I'm bringing this to you is because it's helped me move into different domains of cyber security because I understand what is when I hear about what the solutions are or how they approach it that's different. I can go

back to this and go all right that's that's what the core problem is probably the the two for me that I used in advance. So at these these three that I gave you later I kind of already had Tris in my mind. So I was like oh okay I see where that applies. Let me use it to explain or understand. But the two where I used it before to go, I need to understand this. Again, working on the dark web and thinking about the resiliency of that underground economy. If you're not familiar, broadly speaking, there's darknet markets. It's a very very resilient environment. Think about I I think people think about it like a dark alley or something like

that. It's more like a flea market. It's a really big weird flea market. That's what the dark web is. And if you ever think about a flea market, you ever been to a flea market? Yeah, you can shut that one down, but that group's pretty dynamic. They'll find another spot. But the question was, how do you There were two conflicts. And that's where I was like, I'm going to there's a conflict here. It became clear anonymity versus trust. I don't want to reveal that I'm selling these credentials, but I need someone to be able to trust that I'm going to do that, that I'm going to deliver on what I promise, that the goods that I commit to, whether they be

credentials cards opioids, scripts, that it's I'm good for it. So, how do you maintain that conflict? How do you navigate that conflict? And the other is decentralizing versus coordination. So you have to decentralize across the markets and then you have to have coordination between initial access brokers and as we saw the evolution of ransomware as a service. The TRIS methodology not only helped me understand I used it to understand all right there's this conflict how do they resolve it but number one what about this environment was particularly resilient I was working in threat intelligence at the time and two where if at all were law enforcement interventions going to be effective. It got me into conversations with

criminologists and other folks like that where it was like, "Okay, this is where we should put our attention. This is what we should do with the data once we find it or this is what it actually means." So, we shifted away from like you're exposed on the dark web. You should be worried to like what exactly kind of data is it and is it new or not? and what is the likelihood that it'll be sold by a group that has this already established and as part of an initial access broker group or can leverage it for recon or anything else. The last that I'll put is around insider threat. I still kind of do some work on um you

know you and entity behavioral analytics and there it's really how do you manage autonomy of employees versus monitoring like very simply it's a simp it's again a simple conflict but I want you to think about it in this way that we're in these conversations instead of being like how do we find the compromise to come back to Tris because for me it helped at least me identify where can you have privacy aware surveillance where do you separate requirements over time and space Um this particularly came up over like the pandemic when people were working remotely and the whole environment had changed and people were working from home. How do we how do we make that shift? Where do we put our

resources? Last thing I'll say um is there are a couple limitations here. There are a lot of limitations and they really have to do with how complicated this is. You saw that grid. It's um it's not easy to get to, but I've tried using Tris with genai and it's been pretty good. Like before you had a spreadsheet and now I could say here are the 40 principles. I want you to take this thing and figure out and justify to me which of these 40 principles are in conflict with each other. And then I verify it and validate it and everything else, but it gets me to the solution much faster. Um so the learning curve is

less steep. still there's some still some steepness there and then you need to have the context you need to know the domain to a to to a certain extent or be working with domain experts so in some of those cases I'm not an expert on ICSOT but I knew the people who were and I could ask them about the separation and the Purdue model and is it because of this and and so same thing with software supply chain I'm not a dev or an engineer but I could validate those [snorts] so the last thing I want to leave you with and encourage you to think about is what's next? What's coming next? We're already in it.

We're already in the transformative moment around AI. I don't know if you're feeling it. I'm feeling it from a lot of people. Some fear, some uncertainty. They don't know how to think about what's coming next, how it's going to affect what's happening. This to me is a bit of a map. This is the muscle that at least I've built and I think you can build you can build in being resilient and minimizing surprise around huge huge developments. One of the ways that Tris is used is on forecasting trends and changes in technology. I didn't even talk about that here. That's a whole separate conversation. This is just how do we prepare for this moment. AI is going to

accelerate conflicts and people are going to try and use conventional ways to do it. This is a moment when this is needed. So what I invite you to do is to find the conflict and to really understand it. Use empathy and compassion to understand it. Try out this methodology. It's not as hard as it seems. Air conditioner, wrench, keyboard, your phone, ketchup. These are all things that have been innovated, improved through this methodology. Thank you so much for being here. >> [applause]