SlideShare a Scribd company logo
1 of 23
Have you ever lost something important? !
WiMO helps you get it back!!
!
!
WiMO Tagz is a revolutionary and affordable
lost and found system, which also protects
your identity. !
	
  
	
  	
  
Imagine the grief of losing your
Smartphone, Laptop, Tablet or any other
personal belonging.!
	
  
So, Why is WiMO tagz needed?!
!
Simply put, the trend of lost Smart Phones and other Smart devices
are rising as they become thinner, lighter and are used more often. !
Technology is Used Everywhere!!
Devices are thinner, lighter and lost more frequently
	
  
Mind boggling statistics: !
● 1 of 3 people lose their cell phone each year!
●  70 million phones lost last year. !
●  30 million bags are lost in airports annually !
Law enforcement agencies recommend not
having your personal information visible on ID
tags, which can lead to identity theft.!
When you lose a piece of personal
property, you want to get it back. !
That is what WiMO is all about!
Replacement Costs:!
!
Smartphone: $400-$700!
Tablet: $400-$900!
Laptop: $700+!
Smart Keys: $500 - $1,000!
!
WiMO increases your chance of
recovery by over 75%!!
!
ü  Fast & Hassle-Free Recovery !
ü  Secure Identity Protection!
ü  24/7 Alerts (via SMS and/or e-mail)!
Tag it. Find it!....
Enjoy the peace of mind!
So	
  how	
  does	
  
WiMO	
  Work?	
  
Tag anything of value and register the tag online.
Registration takes less than 2 minutes.!
The Finder can either:
1.  Scan the tag QR code, or
2.  Text the tag unique ID # or
3.  Call in the tag #, or
4.  Simply go to our website.
This increases your chance of recovery
over 75% !
The Finder can quickly and conveniently contact you using our proprietary tag.
WiMO is the only solution to offer all four communication options. 	
  
Recovery	
  of	
  lost	
  items	
  is	
  simple	
  
●  Image	
  of	
  Finder	
  reporBng	
  found	
  item	
  on	
  smart	
  phone	
  
●  Image	
  of	
  saBsfied	
  finder,	
  doing	
  a	
  good	
  deed.	
  
●  Image	
  of	
  happy	
  member	
  receiving	
  noBce	
  their	
  item	
  was	
  
found	
  on	
  tablet	
  
WiMO is about ID protection and retrieval of personal
assets. !
Each tag is encrypted with an individual serial number,
which are stored in a Global Database.!
We identify the property and the property owner. !
WiMOʼs Mission !
WiMO - The Storyline
WiMO - The Storyline
WiMO - The Storyline
WiMO - The Storyline
WiMO - The Storyline
WiMO - The Storyline

More Related Content

Viewers also liked

Empreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedorasEmpreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedorasItalo Delavechia
 
Services brochure 6 april2016-web
Services brochure 6 april2016-webServices brochure 6 april2016-web
Services brochure 6 april2016-webNiloy Chowdhury
 
UMaine clinical faculty orientation guide
UMaine clinical faculty orientation guideUMaine clinical faculty orientation guide
UMaine clinical faculty orientation guideheatherspaulding
 

Viewers also liked (6)

Vinger
VingerVinger
Vinger
 
Empreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedorasEmpreendedorismo: Conceito, mitos e atitudes empreendedoras
Empreendedorismo: Conceito, mitos e atitudes empreendedoras
 
Unit 2
Unit 2Unit 2
Unit 2
 
Services brochure 6 april2016-web
Services brochure 6 april2016-webServices brochure 6 april2016-web
Services brochure 6 april2016-web
 
UMaine clinical faculty orientation guide
UMaine clinical faculty orientation guideUMaine clinical faculty orientation guide
UMaine clinical faculty orientation guide
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 

Similar to WiMO - The Storyline

AITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityAITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityJohn D. Johnson
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingTim McAlpine
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Trak n return presentation 2-1-14
Trak n return presentation 2-1-14Trak n return presentation 2-1-14
Trak n return presentation 2-1-14Bill Arnold
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
35 Mobile Payments Insights You Can Steal
35 Mobile Payments Insights You Can Steal35 Mobile Payments Insights You Can Steal
35 Mobile Payments Insights You Can StealTim Green
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationChurch of the Epiphany
 
Wireless home security
Wireless home securityWireless home security
Wireless home securitymorlesharma
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection- Mark - Fullbright
 

Similar to WiMO - The Storyline (20)

AITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityAITP Presentation on Mobile Security
AITP Presentation on Mobile Security
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money Thing
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
Social research mobile id march 2017
Social research mobile id march 2017Social research mobile id march 2017
Social research mobile id march 2017
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Safeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity TheftSafeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity Theft
 
Trak n return presentation 2-1-14
Trak n return presentation 2-1-14Trak n return presentation 2-1-14
Trak n return presentation 2-1-14
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
2005 thinking
2005 thinking2005 thinking
2005 thinking
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
35 Mobile Payments Insights You Can Steal
35 Mobile Payments Insights You Can Steal35 Mobile Payments Insights You Can Steal
35 Mobile Payments Insights You Can Steal
 
PriceOfNice102011
PriceOfNice102011PriceOfNice102011
PriceOfNice102011
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection
 

Recently uploaded

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 

Recently uploaded (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 

WiMO - The Storyline

  • 1. Have you ever lost something important? ! WiMO helps you get it back!!
  • 2. ! ! WiMO Tagz is a revolutionary and affordable lost and found system, which also protects your identity. !      
  • 3. Imagine the grief of losing your Smartphone, Laptop, Tablet or any other personal belonging.!  
  • 4. So, Why is WiMO tagz needed?! ! Simply put, the trend of lost Smart Phones and other Smart devices are rising as they become thinner, lighter and are used more often. !
  • 5. Technology is Used Everywhere!! Devices are thinner, lighter and lost more frequently  
  • 6. Mind boggling statistics: ! ● 1 of 3 people lose their cell phone each year! ●  70 million phones lost last year. ! ●  30 million bags are lost in airports annually !
  • 7. Law enforcement agencies recommend not having your personal information visible on ID tags, which can lead to identity theft.!
  • 8. When you lose a piece of personal property, you want to get it back. ! That is what WiMO is all about!
  • 9. Replacement Costs:! ! Smartphone: $400-$700! Tablet: $400-$900! Laptop: $700+! Smart Keys: $500 - $1,000! !
  • 10. WiMO increases your chance of recovery by over 75%!! ! ü  Fast & Hassle-Free Recovery ! ü  Secure Identity Protection! ü  24/7 Alerts (via SMS and/or e-mail)! Tag it. Find it!.... Enjoy the peace of mind!
  • 11. So  how  does   WiMO  Work?  
  • 12. Tag anything of value and register the tag online. Registration takes less than 2 minutes.!
  • 13. The Finder can either: 1.  Scan the tag QR code, or 2.  Text the tag unique ID # or 3.  Call in the tag #, or 4.  Simply go to our website. This increases your chance of recovery over 75% ! The Finder can quickly and conveniently contact you using our proprietary tag. WiMO is the only solution to offer all four communication options.  
  • 14.
  • 15. Recovery  of  lost  items  is  simple  
  • 16. ●  Image  of  Finder  reporBng  found  item  on  smart  phone   ●  Image  of  saBsfied  finder,  doing  a  good  deed.   ●  Image  of  happy  member  receiving  noBce  their  item  was   found  on  tablet  
  • 17. WiMO is about ID protection and retrieval of personal assets. ! Each tag is encrypted with an individual serial number, which are stored in a Global Database.! We identify the property and the property owner. ! WiMOʼs Mission !

Editor's Notes

  1. Have you ever lostsomething important? WiMO helps you get it back!
  2. WiMO Tagz is a revolutionary and affordable lost and found system, which also protects your identity. Tag it. Find it!.... Enjoy the peace of mind!
  3. Imagine the grief of losing your Smartphone, Laptop, Tablet or any other personal belonging.
  4. So, Why is WiMO tagz needed?Simply put, the trend of lost Smart Phones and other Smart devices are rising as they become thinner, lighter and are used more often.
  5. Here are some mind boggling statistics: 1 of 3 people lose their cell phone each year 70 million phones lost last year. 30 million bags are lost in airports annually
  6. Law enforcement agencies recommend not having your personal information visible on ID tags, which can lead to identity theft.
  7. When you lose a piece of personal property, you want to get it back. That is what WiMO is all aboutTag it. Find it!.... Enjoy the peace of mind!
  8. Replacement Costs for lost items are expensive!Smartphone: $400-$700Tablet: $400-$900Laptop: $700+Smart Keys: $500 - $1,000
  9. WiMO increases your chance of recovery by over 75%! Fast & Hassle-Free Recovery Secure Identity Protection 24/7 Alerts (via SMS and/or e-mail)Tag it. Find it!.... Enjoy the peace of mind!
  10. So how does WiMO Works?
  11. Tag anything of value and register the tag online. Registration takes less than 2 minutes.
  12. If you lose your item, a Good Samaritan can quickly and conveniently contact you using our proprietary tag. WiMO is the only solution to offer all four communication options. The Finder can either: Scan the tag QR code, orText the tag unique ID # orCall in the tag #, orSimply go to our website.This increases your chance of recovery over 75% !
  13. As an added benefit, WiMOtagz have a stylish holograph design, which looks attractive. Our tags are sturdy to resist the elements and every day wear and tear.
  14. The WiMO system will then contact you by way of text messaging and email. It will also contact anyone else you setup in your membership profile, such as a friend, a spouse, or a traveling companion.
  15. WiMO is about ID protection and retrieval of personal assets. Each tag is encrypted with an individual serial number, which are stored in a Global Database.We identify the property and the property owner.
  16. WiMO comes in four convenient packages. Tag all of your mobile devices.......
  17. Tag it for your peace of mind travel ......
  18. Construction workers are always loosing Tools. Tag it for peach of mind..........
  19. Tag your car kesy for peace of mind! WiMO can protect all your valuables!
  20. Tag it. Find it!.... Enjoy the peace of mind!