{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/wQkrKbJZUqK24WDRABya/9JJSd55kUCD7308oVHah/VttwVM63r-4.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as a}from\"framer\";import*as n from\"react\";export const richText=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"1.   Content moderation for marketing benefits\"}),/*#__PURE__*/e(\"p\",{children:\"Moderating digital content is exhausting and never-ending. Every good marketing strategy includes loads of content to be published on sites, social channels, and more. Continuous errors ruin credibility, as well as ranking, so companies work hard to make their content error-free.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"This is where Levity comes into the picture. In their guide on \",/*#__PURE__*/e(a,{href:\"https://levity.ai/blog/how-to-use-ai-for-marketing-benefits-examples\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"how to use AI for marketing benefits\"})}),\", they\u2019ve listed content moderation and generation as the top benefit of this technology. They are right to do so - automation can do wonders in detecting errors, generating information, and organizing data.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Levity has a content moderation feature that allows users to search through a large amount of text and content in the form of visuals. This frees up a tremendous amount of time for the marketing teams and ensures that the content is error-, as well as bias-free.\\xa0\"}),/*#__PURE__*/e(\"img\",{alt:\"Automate what you couldn't before\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,elD2LVc95L2Y0uQS5erHay0657E.png?originalFilename=AviFHYABqrtmkE52W6JGaTM1F9OTq2sYJj9EeHBMU9w_PyFEF04J4PZYhCOVjX2_Z-KdqvySEA1whwqUZvTLz8bxP9fkEha4n8-Gqeyi89xs_izhsBbGOsZN9dMO7M9Tta4j5dYLyH312N9hJG45xRyocDjENTK0-XL86_3nIgYnE3XFqDKuuuopXg.png\",src:\"https://framerusercontent.com/images/elD2LVc95L2Y0uQS5erHay0657E.png\",srcSet:\"https://framerusercontent.com/images/elD2LVc95L2Y0uQS5erHay0657E.png?scale-down-to=512 512w,https://framerusercontent.com/images/elD2LVc95L2Y0uQS5erHay0657E.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/elD2LVc95L2Y0uQS5erHay0657E.png 1552w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://levity.ai/#benefits\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"h3\",{children:\"2.  Real-time insights for better decision making\"}),/*#__PURE__*/e(\"p\",{children:\"One of the biggest benefits of using artificial intelligence for marketing is the access to research data it offers. Thanks to AI, marketing teams can now automate the data-gathering process and analyze information to see where their current campaign takes them.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(a,{href:\"https://blog.flexmr.net/artificial-intelligence-market-research\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Market research and AI-sourced analytics\"})}),\" can now mine your data to provide a ton of actionable insights. You can use AI to check how big of an audience you have and how it has grown over time. You can use it to see how your audience interacts with your content, track their behaviors and learn what triggers a purchasing decision. On top of that, you can use it to collect valuable customer feedback by creating and conducting surveys.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"With all of this important information in your hands, the decision-making process gets much easier, not to mention more effective. After all, it\u2019s much better to take action based on actual data rather than on predictions and hunches!\"}),/*#__PURE__*/e(\"h3\",{children:\"3.  Personalization at its best\"}),/*#__PURE__*/t(\"p\",{children:[\"Personalization is key to high user satisfaction. According to \",/*#__PURE__*/e(a,{href:\"https://komarketing.com/industry-news/98-of-marketers-agree-personalization-helps-advance-customer-relationships-3668/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"98% of marketers\"})}),\", personalization is one of the most important parts of a marketing campaign. Still, personalizing your content and other marketing features for each user individually is extremely challenging, if not impossible when you have a wide audience.\"]}),/*#__PURE__*/t(\"p\",{children:[\"This is why the majority of brands these days aim toward \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/examples-and-type-definition-of-business-transformation\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"digital transformation for better UX\"})}),\". This \u2018digital transformation is based on user data, which is organized and made coherent by artificial intelligence tools.\\xa0\"]}),/*#__PURE__*/e(\"img\",{alt:\"Understanding your customer needs\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,4djVviVDndd5ZPIAeKnLO1i2c.png?originalFilename=0i71DiGROHdWVqNgIQCrHXd6pu6_T2O7OF0X7HTPpV6tiD9oVH0mnZPW624lKksEe0inGjQK25v9c15YRkOzLWWp6kVha8Q5NJ4C4dhhQMY9RDdgGjcZ5y_92KS9tzKFWfVL-GVcDytvZwQeH2Ix-aZ4Agl0deYtrG4IMRokT3D7CFXnFaNRtShs_w.png\",src:\"https://framerusercontent.com/images/4djVviVDndd5ZPIAeKnLO1i2c.png\",srcSet:\"https://framerusercontent.com/images/4djVviVDndd5ZPIAeKnLO1i2c.png?scale-down-to=512 512w,https://framerusercontent.com/images/4djVviVDndd5ZPIAeKnLO1i2c.png 650w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://startupbonsai.com/personalization-statistics/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Thanks to AI, you can now segment your audience based on their behaviors, trends in the market, and surveys. Then, you can use the segments to create personalized, relevant messages, product recommendations, and designs that appeal to your buyer persona.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The more personalized your marketing campaign, the more your brand resonates with its audience. As a result, you can expect more sales and conversions. \"}),/*#__PURE__*/e(\"h3\",{children:\"4. Smart categorization of prospects and leads\"}),/*#__PURE__*/e(\"p\",{children:\"Not every website visitor will convert into a customer. Quite frequently, the majority of a website\u2019s traffic is composed of people that never make a purchase or sign up for the newsletter. To be fair, there\u2019s no brand out there that can turn every lead into a conversion. Many are on the web simply to search and consider their options or don\u2019t know what they are looking for just yet.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"However, there are ways to increase the number of conversions by categorizing your prospects and leads. If your content marketing strategy is not as good as it should be, or you are targeting the wrong audience, you\u2019ll often get low-quality leads on your pages.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"You might need to improve your CTAs or use a different social media platform to promote your business. Either way, AI can help you segment your audience and learn who you need to target - and how. Using this, you can improve your content, target the right audience, and promote your brand in the right places.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"5.  Lower cart abandonment rates\"}),/*#__PURE__*/t(\"p\",{children:[\"Are too many customers abandoning your cart? This is a major problem for many businesses today. According to Baymard, \",/*#__PURE__*/e(a,{href:\"https://baymard.com/lists/cart-abandonment-rate\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"the rate of cart abandonment today is 70%.\"})}),\" Some of the reasons for this happening are lack of payment methods, concerns for privacy, complicated checkouts, etc.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Now let\u2019s say that you install an AI-powered chatbot. Customers can use it to navigate their shopping journey without waiting, which will remove some of the bottlenecks. The chatbot can also answer their questions and remove their doubts about the company\u2019s privacy policy, tell them what payment methods you offer them, etc.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"6.  Smarter and more effective advertising\"}),/*#__PURE__*/e(\"p\",{children:\"Most social platforms today have built-in advertising systems that help you automate and schedule posts, replies, etc. Other AI tools can generate captions and images based on your needs, while there are tools that will analyze your ads\u2019 performance and make smart recommendations.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Artificial intelligence is indispensable when it comes to advertising. AI analyses how your ads progress and who checks them, and will help you allocate your funds to the ads that actually work. You can use it to target prospects with the right messages, at the right time, and get more conversions in return.\\xa0\"}),/*#__PURE__*/e(\"img\",{alt:\"What is AI in Marketing\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,dZ5pzDj8uwzJlYJYLxTpYxeJ8A.jpg?originalFilename=7GAxbs8d5-181bLFzTYV2njDCv_g7XAunCxy3noH8GatgYLS-hN6KZrGsz8PAIM9CoJWWX5AIuyGs4AjlsxL8-S9I_4_KMp6Z7aPQJNDEdu_9gCFv7Q_IRyEI73asf6CSJNXwqw76s9xR8YzD-xolK_UDSsPOAVSyeq6dyY2-X15jVQ4DDN28Z_Ksw.jpg\",src:\"https://framerusercontent.com/images/dZ5pzDj8uwzJlYJYLxTpYxeJ8A.jpg\",srcSet:\"https://framerusercontent.com/images/dZ5pzDj8uwzJlYJYLxTpYxeJ8A.jpg?scale-down-to=1024 749w,https://framerusercontent.com/images/dZ5pzDj8uwzJlYJYLxTpYxeJ8A.jpg 936w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.adverity.com/ai-marketing\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"h3\",{children:\"7.  Smart predictions for the future\"}),/*#__PURE__*/e(\"p\",{children:\"Predicting the future can turn your business around and bring you more success than ever. If only we could look into a magic ball and see what will be trending a month, or a year from now.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Now we are catching glimpses of that future, and it\u2019s all thanks to artificial intelligence!\"}),/*#__PURE__*/e(\"p\",{children:\"Companies today are throwing their money at artificial intelligence. AI can gather a great deal of data and analyze it efficiently with precision and without bias, yielding comprehensive predictions quickly.\"}),/*#__PURE__*/t(\"p\",{children:[\"Right now, AI has an important role in predicting the future. When businesses use it, \",/*#__PURE__*/e(a,{href:\"https://www.forbes.com/sites/forbestechcouncil/2021/08/11/unlocking-the-power-of-predictive-analytics-with-ai/?sh=166470516b2a\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"predictive algorithms \"})}),\"provide them with insights that will improve their marketing strategy and help them stay ahead of the competition.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"This in itself, is a reason to invest in AI.\"}),/*#__PURE__*/e(\"h3\",{children:\"8.  Bots and AI chats for improved UX\"}),/*#__PURE__*/e(\"p\",{children:\"One of the best things that AI offers marketers is the opportunity to automate communication with customers. Many businesses adopt digital transformation with the intent of modernizing communication with their users.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Approximately \",/*#__PURE__*/e(a,{href:\"https://thrivemyway.com/chatbot-statistics/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"24% of enterprises these days use chatbots\"})}),\", and this number is growing at an accelerating rate. Customers today don\u2019t have time to spare, so they expect brands to be available at all times.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"While you might be making sales without a chatbot, you\u2019ll acquire and retain more customers if you introduce this feature in addition to your current customer support option. Many common questions can be answered by bots, which will eliminate the need to wait in long queues.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Even if your chatbot cannot always answer customers' questions, you can always offer them traditional support options in addition to the bot.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"As time progresses, chatbots advance in terms of features and capabilities. According to research, chatbots are \",/*#__PURE__*/e(a,{href:\"https://www.monigroup.com/tc/node/139\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"predicted to reach $1.25\"})}),\" billion by 2025.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:\"AI is the present and future of marketing!\"}),/*#__PURE__*/e(\"p\",{children:\"As you can see, many marketing tasks are facilitated - or even automated - fully thanks to this technology. There\u2019s no doubt that artificial intelligence has a positive impact on marketing campaigns. If you dedicate enough funds to it and use the right set of tools, AI can fully transform your strategy and bring you amazing results.\\xa0\"})]});export const richText1=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Plutora is proud to be a co-founding member of the VSM Consortium, an association dedicated to advancing value stream-centric ways of working in technology teams to lead to higher-performing organizations.\"}),/*#__PURE__*/t(\"p\",{children:[\"Part of our work is contributing to its annual\\xa0\",/*#__PURE__*/e(\"em\",{children:\"State of Value Stream Management Report\"}),\", and the 2022 edition has just been released. Among its headline findings, the report argues that \u201CVSM is crossing the chasm . . .\u201D and \u201C. . . while organizations have engaged in the vision and identification phases, there is more work to be done.\u201D In particular, the report says that \u201Corganizations need help to chart their path of understanding, adopting and practicing the art of VSM.\u201D\"]})]});export const richText2=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In doing so, the report suggests organizations should focus on a range of priorities, including:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use value streams to break the business and technology silos to create autonomous, multi-functional teams that only care about how fast they can deliver the best thing to the people that use it and pay for it.\"})})}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Start with a value stream mapping exercise to give everyone an understanding of each other's roles in delivering value and, with it, develop a common vision. This represents a first step that may lead to organizing around the value stream more permanently and inspire other value streams to reimagine the way they work.\"})})}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Incorporate Value Stream Management as a governance framework for agile and DevOps. This makes VSM a key governance concept that will empower organizations to not only create new value but also help ensure continuous improvement in their agile and DevOps practices.\"})})}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Treat VSM as an experiment. Organizations don\u2019t have to adopt VSM wholesale from day one \u2014 instead, learning from agile, treat adoption as an evolutionary process driven by a series of experiments.\"})})}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using metrics wisely. Lead time, cycle time, customer journey time, and revenue/sales are a few metrics that are used within value stream management. But, to effectively measure VSM, it is important to understand when deciding the impact and purpose of the actions the metrics will drive.\"})})}),/*#__PURE__*/e(\"p\",{children:\"Quoted in the report, Plutora Chief Marketing Officer, Bob Davis, said:\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CFirst of all, it\u2019s promising \u2014 exciting even \u2014 to see this second research report on Value Stream Management get published. Like our VSM metrics themselves, trending information is critical! We are in the early stages of the market and can see the growing enthusiasm for the promise of VSM. There are several points in the research where there is an increase, sometimes a material increase, in the number of firms engaging in the early stages of the\\xa0\\xa0VSM journey.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"He continued, \u201CThe challenges are real and are articulated clearly in the research. The most pressing hurdles include people \u2014 both leadership and culture, re-organizing around products and value streams, challenges in balancing long-term value with short-term gains when investing, and simply understanding what VSM is and the benefits it delivers. I continue to be optimistic about the future of VSM and its role in helping organizations effectively and efficiently improve their ability to deliver value to their customers. I would echo others\u2019 advice to start small in their VSM journey; I would further recommend to vendors that we continue to simplify and standardize the integrations necessary to fuel the continuous improvement that is central to the promise of VSM.\u201D\"}),/*#__PURE__*/t(\"p\",{children:[\"To download a full copy of the 2022 State of Value Stream Management Report, click\\xa0\",/*#__PURE__*/e(a,{href:\"https://www.vsmconsortium.org/the-state-of-value-stream-report-2022?hsCtaTracking=e2b2a097-59be-4a61-92cd-a63da90bf63b%7Cd645604e-edc0-4de1-bc25-d1132826114a\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"here\"})}),\".\"]})]});export const richText3=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Provisioning practices are of great importance in today\u2019s data-driven business environment,\\xa0especially for organizations that delegate tasks among diverse teams and employees with different responsibilities.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Most provisioning is done during onboarding when an IT department handles new accounts, providingaccess to the company\u2019s SaaS apps. However, provisions can be changed at any moment to give an individual more responsibility and access, or revoke access they don\u2019t need.\"}),/*#__PURE__*/e(\"p\",{children:\"In this article, you\u2019ll learn why proper provisioning is so important and what the best practices are for SaaS apps.\\xa0\"})]});export const richText4=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Why smart provisioning practices are good for your business\"}),/*#__PURE__*/t(\"p\",{children:[\"Provisioning is not to be taken lightly. It is about giving people access to your company\u2019s resources. When done properly, it minimizes errors and helps you avoid serious security issues such as \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/top-7-ways-to-upgrade-your-organizations-financial-fraud-detection\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"internal financial fraud\"})}),\" by employees who have more access than they should.\"]}),/*#__PURE__*/e(\"p\",{children:\"Simply put, if you give access solely to those who absolutely need it, you\u2019ll find it simpler to monitor and detect suspicious behaviors.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"From a security perspective, consider what happens if you give access to highly vulnerable apps. You may have security breaches that cost your company millions while eroding customer trust. In most cases, not everyone in a company needs access to everything. Savvy companies decide early on which users need access to sensitive information and what information is restricted, then grant partial access to provide a safety net. The benefits of solid provisioning expand beyond better security. Proper provisioning gives companies more control over user accounts and makes work simpler for teams since they are guided to use only what is needed.\"}),/*#__PURE__*/e(\"h2\",{children:\"Top user provisioning practices for SaaS apps\"}),/*#__PURE__*/e(\"p\",{children:\"Knowing all this, let\u2019s discuss the best provisioning practices that will make these benefits available to you.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"1.  Automate user provisioning for your apps\"}),/*#__PURE__*/e(\"p\",{children:\"How do you track who has access to what app and for what reason? How do you decide who no longer needs access, and who needs more? If you want to reap the benefits of best practices, you need to first find a way to do provisioning correctly from the start.\"}),/*#__PURE__*/e(\"p\",{children:\"The answer lies in automation. Automating your provisioning is among the smartest and safest moves you could take. This practice saves you a lot of time, eliminates many difficulties, and reduces the risks of security breaches.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Using Zluri for easy onboarding and organized provisioning\"}),/*#__PURE__*/e(\"p\",{children:\"Manually creating every employee account is challenging, to say the least. Deciding on what access is necessary to give to every individual employee is even more exhausting. The solution? Automate everything with Zluri!\"}),/*#__PURE__*/t(\"p\",{children:[\"Zluri is a top-rated SaaS management tool that you can use for many onboarding and off-boarding processes. One of those processes is provisioning. There\u2019s much to know about the many benefits of automated provisioning. \",/*#__PURE__*/e(a,{href:\"https://www.zluri.com/blog/user-provisioning-software/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Find out more in this article by Zluri\"})}),\".\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"You may wonder, what can Zluri do for you?\"}),/*#__PURE__*/e(\"p\",{children:\"For starters, it can identify and tell you with 100% accuracy what every new user needs access to based on their position and the department they\u2019ll work in. This will save you countless hours trying to figure out access rights for every new employee, and help you avoid mistakes.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Zluri takes it a step further, too. It will also suggest the channels and groups inside your SaaS apps that a user should join based on their role in your company.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"It will even handle your de-provisioning activities. Zluri will notify your IT managers of access that needs to be revoked when an employee is leaving or changing their position at your company.\"}),/*#__PURE__*/e(\"img\",{alt:\"Secure SaaS Ecosystem \",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,saRyrTTUojCEOQFcXxf9u7SFRjM.png?originalFilename=hZ_jDMXKswRvPGULsSyfyv8KL476TaIg2eKil33L0gOReC0Njn5UaFzu7iUg6qrcWj7VXFTzFc0KeScUYyZtfLT_NttXGE7RgdGUkzBWyTBBf6vZDMjqXkE8z0vktlWwxvcXbMiLd9q1U_I9vzWx2lGeIyO3IeF_eRdmMBvPn7hwxa8-C8iOnmTzSQ.png\",src:\"https://framerusercontent.com/images/saRyrTTUojCEOQFcXxf9u7SFRjM.png\",srcSet:\"https://framerusercontent.com/images/saRyrTTUojCEOQFcXxf9u7SFRjM.png?scale-down-to=512 512w,https://framerusercontent.com/images/saRyrTTUojCEOQFcXxf9u7SFRjM.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/saRyrTTUojCEOQFcXxf9u7SFRjM.png 1420w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.zluri.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"h3\",{children:\"2.  Monitor every SaaS app you have\"}),/*#__PURE__*/e(\"p\",{children:\"You need to have visibility into every app your organization uses for better user provisioning. Monitoring is a practice that will tell you about SaaS usage trends across teams and organizations, which will improve your user provisioning.\"}),/*#__PURE__*/e(\"h3\",{children:\"Benefits of monitoring your SaaS applications\"}),/*#__PURE__*/t(\"p\",{children:[\"What benefits will you see when you monitor your SaaS apps and other tools? Here are some things you\u2019ll gain if you \",/*#__PURE__*/e(\"strong\",{children:\"keep an eye on all your SaaS apps:\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"Identify app usage trends. \"}),\"If you follow this practice, you can identify which apps your team needs most to get the job done.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"Terminate subscriptions for unnecessary apps. \"}),\"Monitoring includes even the apps that your team doesn\u2019t need or use. Once you narrow these down, you can terminate unnecessary subscriptions and save a ton of money in the long run.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"Fix any issues that your team might be experiencing. \"}),\"Monitoring your apps over time will show you which apps are used less frequently or pose problems for your team. You can take the opportunity to find glitches and fix them or offer further training for your team to overcome challenges.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"Discover unnecessary access. \"}),\"Many cybersecurity incidents happen when you give access to the wrong people. People who have unrestricted access to data they don\u2019t need can make changes and mistakes, increasing the risk of cyber attacks on your business. Even if privileges are misused unintentionally, this can cause significant damage to your organization.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"Define what type of access your team needs. \"}),\"Giving privileges to people in your organization does not always have to be full-scope. You can use \",/*#__PURE__*/e(a,{href:\"https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-principle-of-least-privilege#:~:text=What%20it%20is,to%20perform%20their%20assigned%20function.\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PoLP i.e. the principle of least privilege\"})}),\" to limit app usage solely to the few things your employee needs. Or, you can restrict the access depending on how long the employee will need to use the app with the \",/*#__PURE__*/e(a,{href:\"https://docs.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-overview?tabs=defender-for-container-arch-aks\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"JIT or Just-in-Time\"})}),\" feature.\\xa0\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"The best part about strong monitoring practices is that you don\u2019t have to monitor all apps manually. A tool like Zluri detects unused apps, alerts you to issues, and identifies app usage trends. By automating this process, you can also detect all usage and expenditures, and save a lot of time and money in the process.\\xa0\"}),/*#__PURE__*/e(\"img\",{alt:\"Usage Monitor\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,aiP8adU22Is3lFMpGtqKeawets.png?originalFilename=Zq53Fni_Fs3wiJSWsEas1XBGqRYrH67dinVUoJUy3vCmSaRmSDYdDI_pj3W7dVTpllprqyIljbUEUwhdLERL8n304PhnA-A0LAyz3lC-VA8KTP4tPbgYihNuyn5-6-MO1WghXgxp5VjRY9Bh12JyskWibA9NquJxLjpJhdG5TL1pMoJxI2ONWyPZVQ.png\",src:\"https://framerusercontent.com/images/aiP8adU22Is3lFMpGtqKeawets.png\",srcSet:\"https://framerusercontent.com/images/aiP8adU22Is3lFMpGtqKeawets.png?scale-down-to=512 512w,https://framerusercontent.com/images/aiP8adU22Is3lFMpGtqKeawets.png 701w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.zluri.com/features/#usage-monitoring\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"h3\",{children:\"3.  Create a centralized identity management system\"}),/*#__PURE__*/t(\"p\",{children:[\"A centralized identity access management system or IAM is a set of technologies and processes that manage the digital identity of your users in an efficient manner. This practice is widely used by enterprises to control access and authentication for resources such as apps, as well as \",/*#__PURE__*/e(a,{href:\"https://www.researchgate.net/publication/260212493_Centralized_end-to-end_identity_and_access_management_and_ERP_systems_A_multi-case_analysis_using_the_Technology_Organization_Environment_framework\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"protect sensitive data.\"})}),\"\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Simply put, a centralized IAM will allow your IT department to create a digital identity for each employee by giving them credentials and access to selected resources. As a result, the right employees will have the right level of access to resources automatically without having to wait to obtain them.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A centralized IAM will also assist your company in enforcing security standards, monitoring employee behavior, and making sure that everyone works within their job function.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"4.  Manage temporary access\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In most cases, employees are given indefinite access to the apps they\u2019ll be using for work as soon as the onboarding process starts. However, not every employee will keep using the same apps forever. Some will be given other responsibilities or use another tool to do their job.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Unused access is basically unnecessary access. This is why temporary access exists as an option, and you can grant this to some of your employees.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Or, you need an employee to join your team on a specific project, but nothing else. It\u2019s much wiser to give them temperate access or cancel their provisions for that app afterward than to give them permanent access to an app they won\u2019t be using for long.\"}),/*#__PURE__*/e(\"p\",{children:\"Temporary access is even more useful when you need to give provisions to people like contractors, vendors, or partners. Once they have completed their work or performed the tasks assigned, they should no longer have access to your apps.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to refrain from sharing data unnecessarily, you need to keep track of and continuously manage temporary access to your apps, email accounts, etc.\"}),/*#__PURE__*/e(\"img\",{alt:\"Enter Temporary Access Pass\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,x3J0qEVAq1jPAoAV5KLweocl0BQ.png?originalFilename=wTQqIUcp8WRXw0BGV664cna9zatvjtF5BOnj6DHRaZYxkv9AlstwxneB-AZhk4jqekK-fl-B3bw4Bhw6n944Tuml9SlfYXNXowQlzymNUzfhiRURsyL_Xb2TEG7H2YEsdzyVyAUkf9QS38s3jAkj75wx0LR5yYG6Xeb78F5TVGqKOXnzHZR9gVCuSw.png\",src:\"https://framerusercontent.com/images/x3J0qEVAq1jPAoAV5KLweocl0BQ.png\",srcSet:\"https://framerusercontent.com/images/x3J0qEVAq1jPAoAV5KLweocl0BQ.png?scale-down-to=512 512w,https://framerusercontent.com/images/x3J0qEVAq1jPAoAV5KLweocl0BQ.png 1024w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.inthecloud247.com/my-first-experience-with-temporary-access-pass-during-windows-autopilot-enrollment/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"h3\",{children:\"5.  Track shadow IT activities\"}),/*#__PURE__*/t(\"p\",{children:[\"IT experts are \",/*#__PURE__*/e(a,{href:\"https://www.nextworld.net/insights/why-business-leaders-are-becoming-concerned-with-shadow-it#:~:text=Over%20the%20better%20part%20of,of%20the%20company's%20existing%20systems.\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/t(\"a\",{children:[\"highly concerned about a matter called \",/*#__PURE__*/e(\"em\",{children:\"shadow IT\"})]})}),\", especially in recent years. Shadow IT refers to the activity where users circumvent provisioning processes set in place, and use apps without asking for approval.\"]}),/*#__PURE__*/e(\"p\",{children:\"SaaS apps are often misused this way because they are cloud-based. In recent years, employees sometimes opt to sign up and use apps without anyone vetting them for compliance risks or data security.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"When they do this, they can give important company data to an unauthorized app or tool. This can lead to compliance violations, not to mention create a tremendous risk of cyber attacks for your company.\"}),/*#__PURE__*/e(\"img\",{alt:\"Shadow IT\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,v4O1lXIDsZZkEG1z7Ow6fJ34quc.jpg?originalFilename=ijrFdntpA3Ba7DyccRlmzF_qPq5Qofe2hsaVYrrfZj0J2YmpFVZeSE_7SrqYHpL6eF2Okkys6pRHXdCMDE22cwMp5L9GxmuLX1duY_xG5sBv2Nw2ZA2zhOc0ypPMiv49LnH0POPK11n3YH4pKjpsxvXeaHGrMevgy9waDcLgdH-7q_9fpYiK-qhXbA.jpg\",src:\"https://framerusercontent.com/images/v4O1lXIDsZZkEG1z7Ow6fJ34quc.jpg\",srcSet:\"https://framerusercontent.com/images/v4O1lXIDsZZkEG1z7Ow6fJ34quc.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/v4O1lXIDsZZkEG1z7Ow6fJ34quc.jpg 550w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://blogs.cisco.com/cloud/shadow-it-rampant-pervasive-and-explosive\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"p\",{children:\"User provisioning\u2019s biggest benefit is that it offers compliance and security. However, shadow IT remains a big risk, which is why you should continuously work on discovering unauthorized app usage.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Use these provisioning practices for a safer, more effective business!\"}),/*#__PURE__*/e(\"p\",{children:\"All the practices in this list can have a positive impact on your company\u2019s workforce, the way projects are handled, as well as the safety of data. They will help you avoid many errors along the way and maximize your staff\u2019s potential.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Taking it a step further\"}),/*#__PURE__*/t(\"p\",{children:[\"Beyond basic provisioning, many larger companies manage app access through SaaS solutions. For example, \",/*#__PURE__*/e(a,{href:\"http://plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora\"})}),\" is a Release, Test Environment, and Deployment management platform that helps large enterprises accelerate software delivery. Within the platform, you can easily manage user permissions. Using these kinds of features can make provisioning a breeze while improving security in software delivery.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Whatever your company size, putting rigorous provisioning practices in place can save you time and money.\"})]});export const richText5=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h6\",{children:\"Observability is a crucial pillar of site reliability engineering (SRE) because it allows you to detect and diagnose issues as they happen and before they cause customer-impacting outages or performance degradation. To achieve this, you must have a deep understanding of both the system and the operating environment.\"}),/*#__PURE__*/e(\"p\",{children:\"Unfortunately, many organizations don't have adequate observability in place. It's not enough to be able to build and deploy systems. You should also be able to monitor them and diagnose issues when they occur. Traditional monitoring tools only provide a limited view. This can make it difficult to even identify issues, let alone fix them promptly. In this article, we'll discuss observability and why it's so essential for SRE. We'll also cover some best practices for achieving observability in your organization.\"})]});export const richText6=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"What Is Observability?\"}),/*#__PURE__*/e(\"p\",{children:\"Observability is the practice of monitoring your system in a manner where you can detect and diagnose issues as they happen. The goal of observability is to provide visibility into all aspects of your system to identify and fix issues before they cause customer-facing problems. This means not only monitoring system health but also tracking changes made to the system, understanding how users are interacting with it, and more.\"}),/*#__PURE__*/e(\"h2\",{children:\"Observability vs. Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"It's essential to understand the difference between observability and monitoring. Monitoring is the process of collecting data about the system and using that data to generate reports. This data can be used to identify issues, but it can't be used to diagnose problems.\"}),/*#__PURE__*/e(\"p\",{children:\"Observability, on the other hand, allows you to detect and diagnose issues in real-time. This is because observability uses data from all levels of the system, not just the application level.\"}),/*#__PURE__*/t(\"p\",{children:[\"To understand this in more detail from a manager's perspective, take a look at our blog post\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/observability-vs-monitoring-a-breakdown-for-managers\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" \"})}),'\"',/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/observability-vs-monitoring-a-breakdown-for-managers\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Observability vs. Monitoring A Breakdown for Managers\"})}),'.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Why Is Observability Important?\"}),/*#__PURE__*/e(\"p\",{children:\"There are several reasons why observability is so important for SRE:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It helps you detect issues before they cause outages.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It allows you to diagnose problems quickly and efficiently.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It provides visibility into the system so you can understand how it's performing.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It helps you prevent outages from happening in the first place.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How to Achieve Observability\"}),/*#__PURE__*/e(\"p\",{children:\"There are many different ways to achieve observability, but some of the most common methods include logging, tracing, and metrics.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Logging:\"}),\" Logging is the process of collecting and storing information about events that have occurred in the system. This data can be used to troubleshoot issues or track down problems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tracing:\"}),\" Tracing is a technique that allows you to follow the path of a request as it flows through the system. This can be useful for understanding how the system works and for diagnosing problems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Metrics:\"}),\" Metrics are numerical values that can be used to measure various aspects of the system. You can use this data to monitor performance and identify trends.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Once you've implemented a solution for observability, you need to measure it to ensure that it's effective. There are several metrics that you can use, including monitoring coverage, mean time to repair (MTTR), and mean time between failures (MTBF). Finally, below are some best practices that you can follow to help improve the observability of your systems.\"}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Observability\"}),/*#__PURE__*/e(\"p\",{children:\"There are several best practices for achieving observability in your organization.\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collect data from all levels of the system: application, database, network, and infrastructure.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use multiple methods of data collection\u2014logging, tracing, and metrics\u2014to get the most comprehensive view of the system.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use short-term and long-term storage for logs. This will allow you to keep track of events over a longer period of time, making it easier to identify and diagnose issues.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use standardized formats. This will help you share data between different tools and systems.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyze data in real-time. Use tools like dashboards and alerts to surface issues as they happen.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Communicate alerts promptly. Ensure that the right people are notified when a problem arises.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Automate wherever possible to reduce the time and effort needed to fix problems.\"})})]}),/*#__PURE__*/t(\"p\",{children:['To learn more about best practices for release management, see our blog post \"',/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/release-management-best-practices\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Release Management Best Practices\"})}),'.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Components of Observability\"}),/*#__PURE__*/e(\"p\",{children:\"There are four critical components to observability.\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Collection.\"}),\" This is typically done through logging, tracing, and metrics.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Analysis.\"}),\" This involves using tools like dashboards and alerts to surface issues.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alerting.\"}),\" This ensures that the right people are notified when an issue arises.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fixing the issue.\"}),\" This is where you use the data you've collected to identify and fix the underlying problem.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Data Collection\"}),/*#__PURE__*/e(\"p\",{children:\"The first step to achieving observability is data collection. You need to collect data from all the layers of the system, including the application, database, network, and infrastructure. There are many different ways to collect data. Some of the most common methods include logging, tracing, and metrics.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/release-management\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Release management\"})}),\" and \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/test-environment-management\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"test environment management tools\"})}),\" from \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora\"})}),\" can help you collect data to improve observability. These tools provide end-to-end visibility into your deployment pipeline so you can quickly detect and fix problems before they cause trouble in production. It offers a variety of integrations with other monitoring and logging tools so you can easily collect data from all layers of your system landscape.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Data Analysis\"}),/*#__PURE__*/e(\"p\",{children:\"The next step is data analysis. This is where you use the data you've collected to make your environment more reliable. For example, you can use data analysis for generating dashboards and reports. Dashboards are visual representations of the data that can be used to identify trends and issues. Reports are more detailed. You can use them to diagnose problems or track progress over time. You can also use them to do the following:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify the root cause of problems. By tracking changes to your systems and understanding how users are interacting with them, you can quickly identify the root cause of any problems.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect trends and patterns. By analyzing data over a longer period of time, you can detect trends and patterns that may not be visible when looking at data in real-time.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improve your monitoring coverage. By understanding which parts of your system are most important, you can focus your monitoring efforts on the areas that are most likely to cause problems.\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(a,{href:\"https://www.plutora.com/solutions/use-cases/digital-transformation-strategy\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora Analytics\"})}),\" can help you improve the observability of your systems by providing data analysis tools to help you understand all aspects of your environments. It offers a variety of reports and dashboards that can be used to track changes, understand user behavior, and identify trends.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Alerting\"}),/*#__PURE__*/e(\"p\",{children:\"The next step is alerting, or sending notifications when problems are detected. This is where you ensure that the right people are notified when an issue arises. This can be done through email, SMS, or other notification systems. It's important to have a well-defined alerting strategy so that you can quickly identify and fix problems.\"}),/*#__PURE__*/e(\"p\",{children:\"Modern observability tools like Plutora can help you define an effective alerting strategy. These tools offer a variety of integrations with notification systems so you can ensure that the right people are notified to take corrective action when an issue arises.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Is Observability Important for SRE?\"}),/*#__PURE__*/e(\"p\",{children:\"SRE is all about availability and resilience. And to get there, you need to be able to detect and fix issues quickly. With observability in place, you can detect problems before they cause outages. You can also diagnose issues quickly and efficiently, giving you time to fix them before they impact customers. In addition, observability provides visibility into the system so you can understand how it's performing. This information can be used to prevent outages from happening in the first place.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"In summary, observability is important for detecting and fixing problems quickly. It also provides visibility into your system landscape so you can prevent outages from happening in the future. Plutora can help you improve the observability of your environments with its data analysis and alerting tools. Implementing these tools can help you achieve your availability and resilience goals.\"})]});export const richText7=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Today, we\u2019re launching a new logo as we continue to push Plutora to new heights. When we started the company, our name was in reference to rocketing to Pluto and beyond. We aren\u2019t deviating from our charted course, but we are evolving as we move forward in our journey. We want the look and feel of Plutora to reflect the pioneering spirit of the brand today just as it did when we started 10 years ago. To do that, we are introducing a renewed identity that reflects Plutora today.\\xa0\"})});export const richText8=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"This isn\u2019t change for change\u2019s sake. It\u2019s a reimagining of what makes Plutora unique and what represents our strengths. Our original logo launched us and did a great job of signifying Plutora to the world for 10 years. But we haven\u2019t sat still as a company, it\u2019s time to move on.\"}),/*#__PURE__*/e(\"p\",{children:\"The new logo points in an ambitious direction: forward and upward. It\u2019s breaking through the limitations of what surrounds it and refuses to be confined by boundaries. A rocket ship is the cornerstone visual element so we now have a logo that represents our ambition of traveling to the outer reaches of the galaxy, beyond what is possible.\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s a forceful and powerful look that represents Plutora\u2019s ability to supercharge software delivery and accelerate digital transformation. Year after year, we\u2019ve been dogged about modernizing the product\u2013you can\u2019t be complacent for a moment in the software industry\u2013it was time to modernize the logo. Our old logo served us well, and we\u2019ll continue to wear our old t-shirts, but we are a company that champions transformation for our customers. It was time we did a little transforming ourselves.\\xa0\"})]});export const richText9=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"The\\xa0\",/*#__PURE__*/e(a,{href:\"https://www.oasis-open.org/2022/08/02/value-stream-management-leaders-come-together-to-develop-interoperability-standards-at-oasis-open/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"recent announcement from OASIS OPEN\"})}),\", one of the most respected non-profit standards bodies in the world, that they are defining interoperability standards for value stream management (VSM) is a welcomed next step for software development and digital transformation. As a leading advocate for VSM, Plutora has been\\xa0\",/*#__PURE__*/e(a,{href:\"https://www.forbes.com/sites/forbestechcouncil/2020/11/09/the-emerging-market-category-of-value-stream-management/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"championing the growth of the market category through education and engagement\"})}),\"\\xa0since its early stages. It\u2019s gratifying to now see a wide range of organizations coming together and recognizing the critical role VSM plays in organizational success. Similar to the\\xa0\",/*#__PURE__*/e(a,{href:\"https://www.vsmconsortium.org/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Value Stream Management Consortium\"})}),\"\\xa0(VSMC), which\\xa0\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/plutora-cofounds-vsmc\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora co-founded\"})}),\"\\xa0to help organizations improve performance and drive customer value through the adoption of VSM.\"]})});export const richText10=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"By creating interoperability standards that encourage data sharing across platforms, we should expect an uptick in VSM adoption rates as organizations better understand and utilize the massive amounts of data captured across the development toolchains. VSM has always been about breaking down silos within organizations. Now we are seeing the beginning of greater interconnectivity on a larger scale. This effort by OASIS and its Interoperability Technical Committee will bring \u201Cincreased interoperability to existing value stream standards, tools, and best practices, enabling a more secure approach to sharing data across platforms in the software supply chains\u201D between broader ecosystems.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The primary objective of VSM, to deliver value to the customer, has long been standard across businesses and now, with this project, OASIS can help create a standard for the tools and processes of VSM so organizations can better achieve that objective.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"We\u2019ve always known that VSM breaks down operational silos and creates connections between a variety of processes, teams, and tools. It leverages real-time metrics and enables cross-team collaboration. It embeds governance in the software delivery process and coordinates automated workflows. All told, it puts organizations in a position to deliver high-quality software at greater speeds while reducing risk.\"}),/*#__PURE__*/e(\"p\",{children:\"With standardization and interoperability of best practices, we will see the creation of open standards for value stream metrics thus helping organizations better leverage real-time metrics and enable cross-team collaboration. Standard tools will be identified to measure the performance of software delivery methods. And ultimately, a VSM standard for interoperability and tool integration will emerge, allowing for broader adoption in the long term. This is why Plutora supports organizations like the VSMC and this standards initiative\u2014each effort represents a positive step forward for the industry.\"})]});export const richText11=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The idea of a scam compromising your finances or organization is unnerving for all, but it happens all too often, costing companies and consumers more than ever before. When we hear of the latest fraudulent event on the news, we may think \u201Cthat won\u2019t happen to my business.\u201D There are many rationalizations that are easy to employ.\\xa0 \u201CMy company is not big enough\u201D or \u201CWe are not as popular as our competitors.\u201D\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"The truth is that any organization can fall victim to financial fraud these days. Although big scams might appear in the media, the smaller incidents account for the biggest losses in total. Research shows that organizations today are losing approximately \",/*#__PURE__*/e(a,{href:\"https://www.cimaglobal.com/Documents/ImportedDocuments/cid_techguide_fraud_risk_management_feb09.pdf.pdf\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"7% of their annual\"})}),\" revenue as a result of financial fraud. That\u2019s a cost your organization can\u2019t afford.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"What can you do to minimize financial risks from fraudulent activity?\"})]});export const richText12=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Traditional methods of fraud detection are too time-consuming and not as fruitful in today's world. In the age of big data, it is slow and impractical to rely solely on auditing or manual processes to identify fraudulent transactions.\"}),/*#__PURE__*/t(\"p\",{children:[\"Thankfully, just as the Internet gave fraudsters new ways to do scams, it has also given companies new ways to protect themselves. In this article, you\u2019ll learn how to \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/7-most-important-ci-cd-security-best-practices-2022\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"increase your CI/CD security\"})}),\" and decrease the chances of financial fraud for your business.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Below you\u2019ll find useful tips for upgrading fraud detection in your organization:\\xa0\"}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Stay up to date on the different types of financial and bank account fraud\"})})}),/*#__PURE__*/t(\"p\",{children:[\"Preventing fraud starts with knowing what you\u2019re up against.\",/*#__PURE__*/e(\"em\",{children:\" \"}),\"The first step is to determine the types of fraud that are hurting customers and undermining your business today.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"One of the most used fraud prevention tools today, \",/*#__PURE__*/e(a,{href:\"https://seon.io/resources/bank-account-fraud/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"SEON, describes common types of bank account fraud\"})}),\" and teaches you how to differentiate among them. According to SEON, the rapid digitization and the COVID-19 pandemic led to $986 million being stolen from banking customers in the first half of 2021 - and that\u2019s just in the UK!\"]}),/*#__PURE__*/e(\"p\",{children:\"Financial service companies have to stay on top of bank account fraud of every kind, from bank account takeovers to new account fraud, bank impersonation scams, wire transfer scams, and even money mules.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The list doesn\u2019t even end here. Some other categories of financial fraud include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Payroll fraud\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Thefts of cash and assets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"False accounting\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Financial statement fraud\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using stolen or lost credit cards\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Fraudulent insurance claims\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Bad actors use a variety of methods to scam consumers and organizations out of their money. They use phishing, spamming, and hacking, to mention a few.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Luckily, tools like SEON can make it easier to detect fraud. You can use SEON to track financial transactions and detect even the least recognizable instances of fraud, automatically while minimizing manual effort.\"}),/*#__PURE__*/t(\"p\",{children:[\"But fraud detection tools alone may not be enough. Organizations need to close the gaps before hackers have a chance to attack. \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/value-stream-management\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Value Stream Management\"})}),\" provides one way to accomplish this task, by integrating governance and compliance into CI/CD pipelines. We\u2019ll discuss this in a bit.\\xa0\"]}),/*#__PURE__*/e(\"img\",{alt:\"SEON\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,sCxCrpRmgpqUX4KxGtYn8QIlo.png?originalFilename=QEvCQaZfdZWGOA1u-HOIiPAn2Y2nNp8STDlYK1jatAOEDSCeXCVp8n0xl1RyZKwUtEHr7W1YYVLoUlD5Qzcdl9dpUaKbb_Hph21exesJ5UCGhVZN7OS9LCmwKhi0-zLC8dStQ7VNRLIFndZdxQI.png\",src:\"https://framerusercontent.com/images/sCxCrpRmgpqUX4KxGtYn8QIlo.png\",srcSet:\"https://framerusercontent.com/images/sCxCrpRmgpqUX4KxGtYn8QIlo.png?scale-down-to=512 512w,https://framerusercontent.com/images/sCxCrpRmgpqUX4KxGtYn8QIlo.png 936w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://seon.io/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Encourage customers and internal staff to change passwords regularly\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Changing passwords seems too simple a strategy, but to this day it remains one of the best ways to prevent data theft or other forms of scamming. Aim to switch out passwords on sensitive accounts regularly, especially for places where you store personal data, process transactions, etc.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Many of us still use the same password throughout various accounts. It\u2019s challenging to remember different passwords for different purposes. However, it\u2019s crucial to put effort into managing them and asking employees and customers to do the same - using the same password everywhere multiplies the risk of financial fraud.\\xa0\"}),/*#__PURE__*/t(\"h3\",{children:[\"3.   \",/*#__PURE__*/e(\"strong\",{children:\"Use a variety of techniques to identify irregularities\"})]}),/*#__PURE__*/t(\"p\",{children:[\"Automated tools that track transactions and customer actions can prove to be extremely useful in detecting fraud. Listen to your customers and customer service on a larger level, you can also use a \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"value stream management platform\"})}),\" to build visibility into releases and support governance and compliance, which can reduce the risk of gaps that invite fraud in your product development process.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"If you have a broad understanding of the business processes that happen in your company and know the systems and procedures put in place, CI/CD pipeline visibility can be the key to preventing and detecting fraud.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"As a consumer, the strongest tool you have to determine if an action is a fraud is you. With experience and the right mindset, you will become more vigilant and develop the pattern-recognition skills to identify details that indicate fraud. The same mindset can be used within organizations by making fraud detection a shared responsibility and making the necessary investments in tools and processes that prevent this from cutting into the bottom line.\"}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s take a look at some techniques to minimize the impact of scams:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Read up on the current state of fraud in the industry and check how your processes are guarding against these trends. The press can be a useful source for such information, and you should also subscribe to a publication that specializes in different types of fraud.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Undertake a fraud risk assessment. There are many \",/*#__PURE__*/e(a,{href:\"https://www.counterfraud.gov.au/sites/default/files/2020-11/fraud-risk-assessment-leading-practice-guidance.PDF\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"methods for assessing fraud risks\"})}),\". Your task is to design or find specific tests that will help you identify the greatest areas of risk for your business. Then tackle those with gusto.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Do some benchmarking to compare different financial periods, business units, cost centers, etc. By comparing things that happen in your business over time, you can highlight the anomalies and fix them before they cause you to become a victim of financial fraud.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Review the set of tools you are using to perform the company\u2019s fraud prevention tasks. If you want to upgrade your fraud detection, frequently examine all the software, tools, and systems in place.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Look for red flags. Tools like SEON can notify you of irregular activities. You\u2019ll get a text alert or an email when suspicious activity is identified. Don\u2019t ignore them! Some red flags will turn out to be nothing, but others will be clear signs of fraud.\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"4.   Centralize critical systems and data across your organization\"})}),/*#__PURE__*/e(\"p\",{children:\"One of the highest risk factors for your organization and your customers is the software development process. You can more easily prevent fraud if you have visibility into your software development pipeline and stop silos from developing between development and operations. To get the most security benefits, choose a platform that places all your value streams under the same roof so governance and compliance can be part of the development process, not just tacked on at the end.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"A value stream management offering like \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/solutions/industries/financial-services\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora\u2019s financial services\"})}),\" makes it possible for your organization to fill the gaps in communication and help you see more clearly how to solve the gaps that leave you vulnerable to fraudulent activity. Streamline releases across different systems such as your web services, accounts, etc. This will help you detect fraud easily due to the high level of visibility and easy access to data across applications.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"The top three things that Plutora will provide are better compliance, reliability of your business processes, and predictive insights. If you streamline releases across critical systems, you can detect and prevent fraud more easily.\"}),/*#__PURE__*/e(\"img\",{alt:\"Analytics in Plutora\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,mJA3QmSkXaTvuuQ0mlBjRo2PGI.png?originalFilename=XahGLcbK2og6yeV0Enpp-hK_iiIN_l7bZq7b-dEgL14LpX5mgYo_yXjihRjyDlRkt3pFav_JNjBogtx4eFnr_-_JyclxEnU9wPC2pK5wlocasX-TTeBZCri_xXzWh9bQETlPCw5Iz3RScgyQaKg.png\",src:\"https://framerusercontent.com/images/mJA3QmSkXaTvuuQ0mlBjRo2PGI.png\",srcSet:\"https://framerusercontent.com/images/mJA3QmSkXaTvuuQ0mlBjRo2PGI.png?scale-down-to=512 512w,https://framerusercontent.com/images/mJA3QmSkXaTvuuQ0mlBjRo2PGI.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/mJA3QmSkXaTvuuQ0mlBjRo2PGI.png 1324w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.plutora.com/solutions/industries/financial-services\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"Source\"})})})})}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"5.   Educate customers to keep an eye on their accounts and cards\"})}),/*#__PURE__*/e(\"p\",{children:\"Encourage customers to check card statements and bank accounts regularly. It\u2019s easy to recognize strange transactions. When customers know what to look for, it will help them to pinpoint the financial flaws in your system before fraudsters do more damage.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Many fraudsters attack with smaller sums first to \u2018check the field\u2019. If you can be alerted to this activity soon enough, you can prevent avoidable losses.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"The personal finance director of MorningStar, Christine Benz, \",/*#__PURE__*/e(a,{href:\"https://www.morningstar.ca/ca/news/186189/four-strategies-for-avoiding-identity-theft.aspx\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"said the following about identity theft:\"})})]}),/*#__PURE__*/e(\"p\",{children:\"\u201COne of the best ways to be preemptive about identity theft is to scrutinize the transactions of your bank and credit card statements to ensure that they are in line with the transactions you\u2019ve made.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"This applies to every form of financial fraud and can help you significantly. It doesn\u2019t take long to check a bank statement - and when customers and service representatives are alert to fraud, it can save customers and your company a fortune!\"}),/*#__PURE__*/e(\"img\",{alt:\"Computer screen with metrics\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,gJs6PgCjTcgkb5gsdU8cxA5bIk.jpg?originalFilename=s_BMuO27jBDXiDF88ZwYkM6LIGsptkv76VJhoD1VuwbTzqAGG8FcPcSpBQMpdH_9mW2RlMZl7NDBQEklSVsSslBCqczLwNsFahjzuJhuh0CEA-_PtoC98e78-nlnQUNwZFoWqX2Obq8gsWLA19s.jpg\",src:\"https://framerusercontent.com/images/gJs6PgCjTcgkb5gsdU8cxA5bIk.jpg\",srcSet:\"https://framerusercontent.com/images/gJs6PgCjTcgkb5gsdU8cxA5bIk.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/gJs6PgCjTcgkb5gsdU8cxA5bIk.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/gJs6PgCjTcgkb5gsdU8cxA5bIk.jpg 1600w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://unsplash.com/photos/744oGeqpxPQ\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"Source\"})})})})}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"6.   Examine the details\"})}),/*#__PURE__*/e(\"p\",{children:\"Scammers often have typos in the company\u2019s name or the body of the email. Let\u2019s be real - marketing and customer service teams might make a mistake while writing, but this is very unlikely to happen with the name or multiple times in one message.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Examine the logo as well. We often skip it because it looks familiar, but scammers frequently use brand names and logos to get through mail filters and scam us.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Share with customers what to expect from your institution and keep them posted about fraudulent activity.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"The bottom line\"})}),/*#__PURE__*/e(\"p\",{children:\"There are many methods used to defraud businesses and individuals today, but there are also plenty of methods to detect and prevent fraud or minimize the consequences. Just as fraudsters are doing their best to get creative and steal money from your company and your customers, you can take the necessary steps to prevent them from doing so.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Even small steps can make a big difference for your business. If you take simple measures to educate customers and invest in automated software to track transactions, you\u2019re taking the first steps to avoid fraud. When the stakes are high, consider how additional investments in a value stream management platform like Plutora can make doing business safer for your company and your customers.\"})]});export const richText13=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"When people use the internet, they are sharing data. In many cases, this data is personal, especially when they make online purchases, sign up on a website, handle some bills and banking, etc. This data is collected and processed by the sites they are using, which is where \",/*#__PURE__*/e(\"em\",{children:\"consent comes into the picture.\\xa0\"})]}),/*#__PURE__*/e(\"p\",{children:\"Consent management is a buzzword these days. Just a decade ago, how companies used customers\u2019 data wasn\u2019t highly regulated. Nowadays, businesses are expected - and obligated - to inform and request consent from customers whose data they want to collect and use.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"To give customers more control over their data and their online footprint, countries around the globe are amending their old privacy laws and demanding that companies are more transparent and careful.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Nowadays, if you want a successful online business, you need to give customers the opportunity to use and update their preferences whenever they want.\"}),/*#__PURE__*/t(\"p\",{children:[\"While trying to \",/*#__PURE__*/e(a,{href:\"https://hbr.org/2022/02/the-new-rules-of-data-privacy\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"comply with all regulations\"})}),\" and make sure that no user\u2019s rights are hurt is challenging, there\u2019s one thing that makes it all simpler - \",/*#__PURE__*/e(\"em\",{children:\"quality consent management software\"}),\". In this article, you\u2019ll learn why it is important to get consent and how you can benefit from investing in a good software for this purpose.\\xa0\"]})]});export const richText14=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"What is consent management?\"}),/*#__PURE__*/e(\"p\",{children:\"Consent management means that you are informing users how your company collects and uses their data. It also means that you are giving them the option to refuse the use of their information, whether it is by offering them to opt-in or opt-out of your data collection process.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.researchgate.net/figure/A-centralized-consent-management-system_fig1_336602862\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/t(\"p\",{children:[\"Awareness concerning data privacy has increased significantly in the last few years and has resulted in tons of new privacy regulations. To accommodate the awareness and comply with these regulations, you need to incorporate a great deal of transparency into how you collect and use consumer data. That\u2019s what content management is all about\",/*#__PURE__*/e(\"strong\",{children:\" \"}),\"\\xa0- gaining the consent of users to use and gather their data.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Learn more about consent management in Osano\u2019s guide\"}),/*#__PURE__*/e(\"p\",{children:\"One of the biggest reasons why you should be using the consent management framework is to ensure compliance with data privacy laws. This refers not only to the regulations in the country where your business operates but also to the regulations of other countries where your users reside.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"If you aren\u2019t familiar with how this works, you should read \",/*#__PURE__*/e(a,{href:\"https://www.osano.com/articles/consent-management-101-everything-you-need-to-know\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Osano\u2019s guide\"})}),\" to consent management. In this guide, you will learn about different regulations and laws and how they affect your company depending on where your customers are located.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"And, of course, Osano is also a trending consent management platform that will enable you to gather consent with minimal effort and reduce mistakes.\\xa0\"}),/*#__PURE__*/e(\"img\",{alt:\"OSANO Dashboard\",className:\"framer-image\",\"data-framer-asset\":\"data:framer/asset-reference,gVoO5LMnBhzj3IEL75YGzvlSg.png?originalFilename=aiICBgROnYeRMFpOtrZNDugk6oGSygfxUmQLqar_p2ZD67kFgr_skyNk780wvcR-D0CSzvGqVQ2WV4PFBl-Zvb9l3XEwmZ0_WsXcSIxpkV-5i8jlmMaqPCNFoRrEwENDynL6KfUFl5HnIcneqQ.png\",src:\"https://framerusercontent.com/images/gVoO5LMnBhzj3IEL75YGzvlSg.png\",srcSet:\"https://framerusercontent.com/images/gVoO5LMnBhzj3IEL75YGzvlSg.png?scale-down-to=512 512w,https://framerusercontent.com/images/gVoO5LMnBhzj3IEL75YGzvlSg.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/gVoO5LMnBhzj3IEL75YGzvlSg.png 1350w\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.osano.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"h2\",{children:\"What is consent management software?\"}),/*#__PURE__*/e(\"p\",{children:\"Consent management platforms or CMPs are software solutions that automate the consent collection process. In other words, these tools will inform your users that you plan to or are collecting and using their data. The CMP will also give the users the option to opt in or opt out of having their data used and collected, which complies with different data privacy laws across the world.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If you don\u2019t use consent management software, you will find it very time-consuming to ask every user for consent, store and manage their data, and most importantly, keep track of the frequently-changing regulations around the globe.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A good CMP will manage the entire lifecycle of your users\u2019 personal data and ensure that you stay compliant. Considering how much time and effort you need to put into compliance, and how costly potential mistakes can be, it\u2019s definitely one of the smarter investments to make.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of using quality consent management software\"}),/*#__PURE__*/e(\"p\",{children:\"You can reap many benefits by investing in a quality platform like Osano. Let\u2019s take a look at the biggest of them:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Compliance with privacy laws\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Even if your business operates in a state covered by, let\u2019s say, the GDPR (EU General Data Protection Regulation), this doesn\u2019t necessarily mean that you should keep track of their privacy laws only.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If you have customers from California, for example, you need to be compliant with the CCPA (California Consumer Privacy Act) regulations. If you have a single customer in Brazil, you need to comply with the LGPD (Brazilian General Data Protection Law), too.\"}),/*#__PURE__*/e(\"p\",{children:\"Depending on how big your company is, this list gets bigger and bigger.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This is the most important reason why you should invest in consent management software. Every day, privacy laws are going into effect or being amended. Organizations around the world are scrambling to remain compliant with all these regulations and changes.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Right now, \",/*#__PURE__*/e(a,{href:\"https://privacyinternational.org/explainer/41/101-data-protection\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"over 100 countries worldwide\"})}),\" have compliance regulations. If you break them, you can be fined thousands, if not millions of dollars. A single mistake or a mishap on your behalf can cost you a lot.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Smart consent management software will ensure that you are compliant with these regulations at all times.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.enzuzo.com/learn/how-understand-which-privacy-laws-apply-to-you\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:\"Source\"})})})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Efficient data storing and management\"})}),/*#__PURE__*/e(\"p\",{children:\"Businesses need customer data for a number of reasons. They need it to process orders and transactions and create customer accounts. They also need it for marketing. Almost every business today collects customer data to form smarter business and marketing plans and reach their target audience.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"When you are collecting such large amounts of data, it can become very complicated to record it, store it, and manage it. A CMP can do this for you, too, even if your target audience is spread all across the globe.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Proof that you obtained users\u2019 consent\"})}),/*#__PURE__*/e(\"p\",{children:\"When regulatory audits take place, it is your task to prove that you are obtaining the consent of users. A good CMP will collect and organize this data for you, and provide it to you when you most need it. You\u2019ll be able to prove that you have the necessary consent for the collection and use of customer data.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Consent collection made simple and time-efficient\"})}),/*#__PURE__*/e(\"p\",{children:\"How do you gain consent from customers? Do you have an automated process in place that asks them for consent as soon as they use your mobile app or website? Is this made available to them as per the regulations at the moment?\"}),/*#__PURE__*/e(\"p\",{children:\"By using a quality CMP, you can get the consent forms to your users in real-time, and view information on their privacy preferences at any time.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Building trust\"})}),/*#__PURE__*/e(\"p\",{children:\"When your audience knows that you respect their privacy and are trying to be as transparent as possible, this will help you build trust. If you do proper consent management, you\u2019ll show customers that you respect their right to choose how their information will be used.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(a,{href:\"https://business.adobe.com/nz/resources/people-more-loyal-to-brands-that-care-about-them.html\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Wunderman\u2019s study\"})}),\" shows that it is important to show your customer that you care about them. It will give you a competitive edge and better word-of-mouth.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Tailored to your company\u2019s needs\"})}),/*#__PURE__*/e(\"p\",{children:\"Consent management software is simple to use and can be customized based on your company\u2019s needs. It will see what regulations you need to comply with, gather and use your target audience data, and provide you with the information you need - when you need it.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Quality platforms allow you to customize compliance procedures based on your website\u2019s needs. For example, you can use different types of consent collection methods, such as opt-ins and opt-outs, or a hybrid method that combines the two.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"You can send out customized messages, create different consent categories, and deliver them to site visitors without damaging the customer experience on your site or your app.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"When should you use consent management software?\"}),/*#__PURE__*/e(\"p\",{children:\"If your company\u2019s website or app does any of the following, you definitely need to use consent management software:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collection and use of personal data from visitors (If you collect and use such data to personalize your marketing strategies or content).\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Transfer of data (if you are collecting data from users that reside or are based in different countries and transferring it overseas).\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Running the data through an algorithm (if you use software and algorithms to make more personalized strategies for individual users).\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using special data categories (if you are collecting and/or using demographic and personal information for any other purpose).\"})})]}),/*#__PURE__*/e(\"p\",{children:\"To put this simply, you need a good CMP if you're collecting any type of personal data, even if you aren\u2019t using it for any purpose right now.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Wrapping up\"}),/*#__PURE__*/e(\"p\",{children:\"Customers and website users today are a vital part of the decision-making process when it comes to data usage. As a company, you are legally obliged, as well as expected by your customers, to obtain consent to collect any type of personal data for any particular purpose.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Collecting consent should not be challenging or complex. Since there\u2019s no room for error due to the high penalties and risk of losing your reputation, you should opt for a consent management solution that will automate the entire process for you.\\xa0Lastly, in order to drive this process and deliver high-quality software faster than ever, you need a great \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/value-stream-management\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Value Stream Management platform\"})}),\" like Plutora. Value Stream Management provides an end-to-end software delivery solution that breaks down operational silos by connecting multiple processes, teams, and tools, leveraging real-time metrics to ensure that governance is embedded into your organization\u2019s workflows. In order to adapt \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/governance\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"governance\"})}),\" to your team and ensure that you are always compliant, automate and keep track of the entire process with \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora\"})}),\".\"]})]});export const richText15=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The software development industry is handling more data than years ago. This data is often the key driver for decision making. For instance, the larger the volume of data you possess, the more information you have for better decision making. However, the main challenge that most software development companies face is how and where to store that volume of data.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, companies like Netflix deal with processing and storing a lot of data. They need this data to optimize the quality of their video streams. For example, they might need to collect users' ratings, searches, and watch history so they can recommend the next watch to users. They'll also need to collect credit information as well as payment and tax calculations so that they can bill users appropriately. These are different types of data, and since they have a lot of users, it's different types of Big Data.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The mannerism of handling different data determines the ease of gleaning useful information from it. Throughout the years, some storage architectures sprang up with the notion of mitigating this challenge. These storage architectures deal with how the data is stored, and how to retrieve useful information from the data.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"In this article, we'll be exploring two major data storage architectures: \",/*#__PURE__*/e(\"strong\",{children:\"data lakes\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"data warehouses. \"}),\"We'll discuss at length what they are, and how they function. Finally, we'll highlight the basic similarities and differences between them.\\xa0\"]})]});export const richText16=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"What Is a Data Lake?\"}),/*#__PURE__*/t(\"p\",{children:[\"A data lake is a data storage architecture with a highly flexible and centralized data storage repository. It's useful in the storage of \",/*#__PURE__*/e(a,{href:\"https://en.wikipedia.org/wiki/Big_data\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Big Data\"})}),\". A data lake is unique for its ability to accommodate large chunks of various formats of data. These formats of data range from \",/*#__PURE__*/e(a,{href:\"https://en.wikipedia.org/wiki/Unstructured_data\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"structured data to unstructured data\"})}),\". A data lake stores and processes data in its raw state, therefore presenting the very original template of the data.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"To understand data lakes better, let's consider a real-life lake of water around us. In a lake of water, numerous kinds of living things, ranging from different species of fish to plants to even crocodiles, coexist in their natural state. Likewise, a data lake is just a large pool of data that houses all kinds of data in its original state.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"We can also describe a data lake by expounding on some characteristics that it possesses. These include data processing, frequent users, frequent use cases, and many more. We'll be exploring them in a subsequent section. However, at a glance, most users of data lakes are analysts for machine learning and deep predictive modeling and analysis.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Benefits of a Data Lake\"}),/*#__PURE__*/e(\"p\",{children:\"Data lakes are of the utmost importance to many software development companies in many ways. Here are some benefits of data lakes:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"They take advantage of the ability to store and present data in any format without the need for any form of preprocessing. This attribute helps analysts gain more insight into decision making since they're looking at the data in its native state.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"By allowing the storing of various kinds of data, the organization can have all its data eggs in one basket. Companies can now operate a centralized bank for all their data. Whether it's structured, unstructured, or even semi-structured data, it'll all be in one place.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Drawbacks of a Data Lake\"}),/*#__PURE__*/e(\"p\",{children:\"Data lakes have also been criticized for the following points:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Since they are handling a variety of data, they can become disorganized and messy, thereby becoming \",/*#__PURE__*/e(a,{href:\"https://www.dataversity.net/the-dangers-of-a-data-swamp-and-how-to-avoid-them/#:~:text=In%20simple%20terms%2C%20a%20data%20swamp%20is%20an,on%20their%20destination%2C%20size%2C%20and%20even%20mail%20priority.\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"data swamps\"})}),/*#__PURE__*/e(\"strong\",{children:\", \"}),\"a dumping ground for all kinds of data. This is a surefire way for a data lake to lose its relevance and make the process of getting useful data very difficult for analysts.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security of the data in the data lake is also a matter of concern. For instance, fake or corrupt data in any format has the tendency to corrupt others in a ripple effect. This threatens the security and validity of data in the data lake.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What Is a Data Warehouse?\"}),/*#__PURE__*/t(\"p\",{children:[\"A data warehouse is also a large data storage repository for storing chunks of data. However, it only accepts data that is in a structured format. Data warehouses receive data from varied sources and \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/what-is-etl-understand-extract-transform-load-in-depth.\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"pass it through some preprocessing\"})}),\" before logging it into the warehousing system.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"An analogy for understanding a data warehouse is to view a data warehouse as a regular retail warehouse. In a retail warehouse, storekeepers arrange all goods within the specified sections that their goods fall under. Whenever new stock arrives, the storekeeper begins the real work of classification. The storekeeper picks each item and places it in the section of the warehouse it falls into, with groceries going into the groceries section, and so on. This is a great strategy, as it helps in easy access and subsequent retrieval of items. This is exactly how a data warehouse works. It's great for business intelligence, as it aids business analysts in churning out great business insights in the shortest time possible because of the organized structure.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Benefits of a Data Warehouse\"}),/*#__PURE__*/e(\"p\",{children:\"In this section below, we'll take a look at the ways a data warehouse helps organizations maximize operations:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A data warehouse allows businesses the ease of retrieving data from an organized structure and accelerates the speed at which business insights can be drawn. This is because it's easy to locate data from the category it falls into in the warehouse.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"The organization in the data warehouse boosts the confidence of users. It makes them see the warehouse as a reliable source of data truth\",/*#__PURE__*/e(\"strong\",{children:\".\\xa0\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security of data within the warehouse is top-notch, as any incoming data is preprocessed and must fall into categories. Any corrupt data or data that falls outside the categories within the warehouse doesn't get in.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Drawbacks of a Data Warehouse\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A data warehouse accepting only structured data makes it difficult for businesses with unusual forms of data, thereby forcing companies already using them to invest in other data storage architectures in order to accommodate each of their specific needs.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It's not dependable for machine learning and deep predictive analysis because of its type of data. The reason for this is that its data has been processed in a specific structured format.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Similarities Between a Data Lake and a Data Warehouse\"}),/*#__PURE__*/e(\"p\",{children:\"The similarities between a data lake and a data warehouse are very generic and broad. They're as follows:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"They're both useful in the storage of Big Data.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Their content is for analysis, making them both geared toward great business decision-making.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Both can accept historical data as well as current data.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Differences Between a Data Lake and a Data Warehouse\"}),/*#__PURE__*/t(\"p\",{children:[\"In this section, we'll explore the differences between a data lake and a data warehouse.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Parameter\"}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"DATA LAKE\"}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"DATA WAREHOUSE\"}),\"Purpose of DataThe purpose of the data stored is yet to be determined. It might be for future usage or current usage.The purpose of the data stored is predefined and for current and continuous usage.Data StorageStores raw data in its original form.Stores processed structured data.Data FormatCan receive data in a structured form (e.g. rows and columns), unstructured form (e.g. PDF and audio-visual files), or even semi-structured form (e.g. CSV files).Receives data strictly in a structured form.UsesMostly used for machine learning and deep predictive analysis purposes.Mostly used for data analysis and business intelligence purposes.UsersUsed mostly by data scientists and data engineers.Used mostly by business analysts, data analysts, and business professionals.Schema FlexibilityThe schema is always defined after the data has been stored, resulting in a faster data capturing and storing process.The schema is defined before the data is ever stored, which slows the process of capturing data, but once captured, data is constantly ready.ProcessingProcessing follows the ELT (Extract, Load, Transform) process. The data is gotten from its source and loaded into the lake but is only worked upon when it's needed.Processing follows the ETL (Extract, Transform, Load) process\",/*#__PURE__*/e(\"strong\",{children:\".\"}),\" Data is extracted from its source and then worked upon before loading it into the category it falls under within the warehouse.ToolsExamples of data lake platforms are Google Cloud Storage, AWS S3, and Azure DataLake.Examples of data warehouse platforms are Google BigQuery, Amazon Redshift, and Oracle.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Having gone through the entire article, one will agree with the fact that while data is essential to every business, possessing the desired data is one thing, but storing it in the best place is another.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"There's no unbreakable rule on how to make a decision between employing either a data lake or a data warehouse. Just take a critical overview of your company and its peculiarities and make your choice. In particular, consider the users who will be accessing the data, and what purpose you have for storing and analyzing your data.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"To learn more about \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/business-intelligence\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"business intelligence\"})}),\", check out \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora\"})}),\", the leading \",/*#__PURE__*/e(\"strong\",{children:\"Value Stream Management \"}),\"platform, and feel free to sign up for a \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/evaluate-now?ref=nav-bar\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"free demo session\"})}),\".\"]})]});export const richText17=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"The cybersecurity landscape is more dangerous than ever, with cyberattacks increasing at an alarming rate. In fact, research indicates almost every \",/*#__PURE__*/e(a,{href:\"https://www.techrepublic.com/article/report-pretty-much-every-type-of-cyberattack-increased-in-2021/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"cyberattack category\"})}),\" increased in volume last year. And as we pointed out in a recent webinar, \",/*#__PURE__*/e(a,{href:\"https://www.youtube.com/watch?v=UoxdbXPb3HU\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"data breaches\"})}),\" impacted about 281 million people last year alone.\"]}),/*#__PURE__*/e(\"p\",{children:\"As such, many DevOps teams are integrating continuous security strategies to cover their attack surfaces and protect their software and infrastructure from intruders. Keep reading to learn what continuous security means and the benefits that it offers to teams like yours.\"})]});export const richText18=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"What Is Continuous Security in DevOps?\"}),/*#__PURE__*/t(\"p\",{children:[\"When it boils down to it, there isn\u2019t a single standard definition for continuous security; definitions can vary across different companies and environments. But through a DevOps or DevSecOps lens, continuous security refers to an end-to-end security strategy that spans the entire \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/what-development-environment-how-get-started-now\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"development\"})}),\" and\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/production-environment-what-you-need-know\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" production\"})}),\" spectrum.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s important to realize that continuous security in software engineering is a bit different than continuous security monitoring software. While DevOps continuous security integrates monitoring (more on that below), it encompasses a much wider range of roles, functions, and technologies. Continuous security monitoring is a strategy while security monitoring is an individual component or tool that companies deploy.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Do You Use Continuous Security for?\"}),/*#__PURE__*/e(\"p\",{children:\"DevOps teams use continuous security to fortify software deliveries, deployments, and production. Here are some of the top reasons why teams should consider deploying continuous security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Maintain Proactive Security\"}),/*#__PURE__*/e(\"p\",{children:\"Companies often experience cybersecurity incidents and data breaches because they fail to notice small vulnerabilities and weaknesses in development and production.\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous security helps uncover vulnerabilities before cyber criminals discover and exploit them. In other words, it prevents small problems from turning into larger threats. At the same time, catching issues earlier in the software development lifecycle (SDLC) lowers the cost of security and remediation.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Bridge Security Gaps\"}),/*#__PURE__*/e(\"p\",{children:\"Many companies have silos between development and operations teams. And silos lead to security mistakes and overlaps that cybercriminals can exploit.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous security helps discover and eliminate these gaps, resulting in greater unification and protection throughout the entire software delivery lifecycle. This strategy improves communication and collaboration and creates a single unified security strategy with end-to-end visibility.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enable Continuous Improvement\"}),/*#__PURE__*/e(\"p\",{children:\"With cybercrime rapidly evolving, it\u2019s important for security teams to learn and adjust their strategy as well.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A continuous security strategy ultimately provides engineering teams with the insights they need to identify weaknesses and tighten their security posture. This helps drive continuous improvement and create a culture of security and innovation.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Are the Elements of Continuous Security?\"}),/*#__PURE__*/t(\"p\",{children:[\"In a continuous security framework, teams typically split security responsibilities between \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/devops-sre-the-difference\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"DevOps and SRE\"})}),\", with DevSecOps securing delivery and SRE handling production. In this section, we offer a general breakdown of what continuous security entails.\\xa0\"]}),/*#__PURE__*/e(\"h3\",{children:\"Leadership\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous security won\u2019t happen by itself. IT leaders need to recognize the threat that cybercrime poses and the benefits of prioritizing security\u2014like happier customers, a better reputation, fewer incidents, and stronger profits.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s also up to leadership to construct a viable continuous security model and enforce it throughout development and production.\"}),/*#__PURE__*/e(\"h3\",{children:\"Culture\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In order to maintain an effective continuous security model, IT leaders need to build a security culture. In some cases, this may require upskilling team members and cross-training them to develop software with security best practices in mind.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Of course, it can take time to develop a cybersecurity culture\u2014and a lot of it. But by making an effort to focus on security, leaders can respond to threats more easily and improve their overall security approach.\"}),/*#__PURE__*/e(\"h3\",{children:\"Design\"}),/*#__PURE__*/e(\"p\",{children:\"In order to avoid bottlenecks, it helps to train developers to master best practices for continuous security. This way, developers can build and iterate safely and with speed.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Designers should always pre-check source code changes, run component analysis scans, and document the security frameworks that they use. It also helps to scan third-party components for vulnerabilities during software builds.\"}),/*#__PURE__*/e(\"h3\",{children:\"Continuous Integration\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous integration is another important part of continuous security. This largely involves analyzing the impact that code changes have on software security.\"}),/*#__PURE__*/e(\"p\",{children:\"With this in mind, it helps to centralize integration by using a software version management system. By doing so, you can track all code changes in one place. You can also avoid missing changes and updates.\"}),/*#__PURE__*/e(\"h3\",{children:\"Continuous Testing\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Security teams need to shift left and test earlier and more often. The more you test software during development and production, the faster and more affordable it is to catch and remediate errors.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Most teams are now automating security testing throughout the development pipeline. This saves time and frees security teams to focus on higher-level responsibilities. As such, testing automation is critical for any fast-moving team that\u2019s producing software at scale.\"}),/*#__PURE__*/e(\"h3\",{children:\"Continuous Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Policies, identities (both human and non-human), and configurations can change during development, leading to security threats. Oftentimes, these changes can be difficult or even impossible to detect\u2014especially for busy or understaffed teams.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous monitoring helps teams identify changes in their software and cloud environments, so they can take action when necessary. In this light, continuous monitoring plays a critical enabling role in continuous security and it\u2019s something that all teams should use.\"}),/*#__PURE__*/e(\"h3\",{children:\"Infrastructure Security\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous security also requires focusing on the underlying physical and virtual infrastructure that powers your software.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Security should play an active role in IT infrastructure management and ensure that all systems have the latest updates, access controls, and filtering protocols in place. Infrastructure is a top target for cybercriminals, and security teams need to take active measures to keep their systems safe from attacks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Deploying Continuous Security\"}),/*#__PURE__*/e(\"p\",{children:\"Now that you have a better idea of what continuous security is and why it matters, let\u2019s examine some best practices to help you hit the ground running.\"}),/*#__PURE__*/e(\"h3\",{children:\"Form a Continuous Security Integration Plan\"}),/*#__PURE__*/e(\"p\",{children:\"Engineering teams often run into trouble when rushing into new development and security models without understanding the implications.\"}),/*#__PURE__*/e(\"p\",{children:\"As a best practice, go slowly when integrating continuous security and determine your department\u2019s overall readiness. Once your team is ready, ramp up to a full continuous security strategy.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Real-Time Communication\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous security may complicate development and production, as it requires adding extra monitoring, testing, and integration components.\"}),/*#__PURE__*/e(\"p\",{children:\"As such, it\u2019s important to have real-time communication in place to prevent bottlenecks and enable team members to work together and solve problems. Using communications platforms like Slack, Discord, and Microsoft Teams can reduce security friction and keep workflows moving efficiently.\"}),/*#__PURE__*/e(\"h3\",{children:\"Deploy a Robust Enterprise Continuous Security Dashboard\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"An enterprise continuous security dashboard provides end-to-end security visibility to all stakeholders across development and production.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"When implementing a platform, you\u2019ll want to find a solution that incorporates multiple value streams across the entire development and production spectrum. This platform should show you the big picture of your security landscape and enable you to drill down into different components as you need to.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Plutora VSM Enables Continuous Security Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Plutora\u2019s value stream management (VSM) platform enables teams to see and optimize workflows across all stages\u2014from initial planning to production.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"With the help of our purpose-built platform \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/security\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"designed with security top of mind\"})}),\", you can view a variety of metrics from a central, user-friendly dashboard. This dashboard can help provide clarity, enable automation, and enhance collaboration during continuous security planning.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Plutora ultimately provides the information that you need to make impactful security decisions. Companies can use our VSM platform to expedite continuous security monitoring and build trust between managers and engineers. At the same time, we enable DevOps and SRE teams to collaborate more effectively and operate as a single, cohesive unit. To see how Plutora\u2019s VSM platform makes continuous security a breeze, \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/evaluate-now?ref=nav-bar\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"try a demo today\"})}),\".\"]})]});export const richText19=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The 21st century reaps the benefits of technical advancements in computational processing power (GPUs), rise of IoT (internet of things), and more. These advancements are among the reasons for the exponential increase in data generation (Big Data era).\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"To effectively store and analyze such massive and varied forms of data, organizations have quickly adapted to data storage repositories such as data lakes and cloud computing technologies. However, these advancements come at a price\u2014mainly, data security.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This post will discuss the current threats in data lake security systems and give you a checklist to ensure its safety.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Here's what you'll learn:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"authorization, authentication, and access control;\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"platform hardening;\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"data lineage;\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"host-based security;\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"RBAC and IAM solutions;\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"data encryption; and\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"network perimeter.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"To keep up with the ever-growing demands of the market, organizations must ensure consistent scalability and development of new applications/software, improved features, and better tools.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Most current organizations are data-centric, and their application or software development pipelines rely strongly on data. Thus, at the core of developing and maintaining a successful business is ensuring that their data lake is secure and functional at all times. Moreover, due to the many (varied) sources of data that flow into a data lake, numerous security policies and measures must be taken into account.\\xa0\"})]});export const richText20=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Data Lake Security Checklist\"}),/*#__PURE__*/e(\"p\",{children:\"The following data lake security checklist will help you gain insight into the different threats and data lake security issues that you must address.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Access Control, Authorization, and Authentication\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Needless to say, a simple yet effective data security policy is to guard the doors and limit access to authorized persons.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"More often than not, by default, many employees within an organization are granted access to cloud platforms and data lakes. Moreover, each authorized individual might have multiple devices\u2014not just computers, but also iPads, tablets, and phones\u2014connected to the cloud. However, because most data sits on the cloud (via the internet), this may introduce unnecessary loopholes and vulnerabilities into the system.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"For these reasons, having a well-guarded access control system is crucial.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"It's important to note that access control is nothing without its two key components\u2014namely, \",/*#__PURE__*/e(\"em\",{children:\"authentication \"}),\"and \",/*#__PURE__*/e(\"em\",{children:\"authorization\"}),\". The former ensures that the person trying to access data is not a fraud. The latter is as important and confirms the identity of the person when they try to access the system.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"It's important to implement access control protocols into your data lake security because it helps you \",/*#__PURE__*/e(\"em\",{children:\"identify \"}),\"(and \",/*#__PURE__*/e(\"em\",{children:\"verify\"}),') \"who\" has access as well as ',/*#__PURE__*/e(\"em\",{children:\"restricts \"}),\"access to limited people.\\xa0\\xa0\"]}),/*#__PURE__*/e(\"h3\",{children:\"Platform Hardening\"}),/*#__PURE__*/t(\"p\",{children:['In general, a smart strategy to mitigate risks concerning data security is to minimize the potential \"',/*#__PURE__*/e(\"em\",{children:\"attack surface\"}),'.\" This essentially means to remove unnecessary cloud tools, ports, applications, and services connected to the data lake.\\xa0']}),/*#__PURE__*/e(\"p\",{children:\"It also entails further restricting access to the data lake and configuring access controls for resource access and allocation. Moreover, if your data lake sits on the cloud, make sure to create only one cloud account for application/software deployments.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Finally, make sure to incorporate security standards and guidelines enlisted by the \",/*#__PURE__*/e(a,{href:\"https://www.cisecurity.org/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Computer Information Security (CIS) Center for Internet Security\"})}),\" and other standardized data security boards.\\xa0\\xa0\"]}),/*#__PURE__*/e(\"h3\",{children:\"Data Lineage\"}),/*#__PURE__*/t(\"p\",{children:[\"Data lakes allow and store data originating from varied sources. This is most definitely an advantage. However, it can also quickly turn into a security threat if one doesn't keep an account of \",/*#__PURE__*/e(\"em\",{children:\"where\"}),\" the data is originating, \",/*#__PURE__*/e(\"em\",{children:\"how\"}),\" and \",/*#__PURE__*/e(\"em\",{children:\"who\"}),\" is using it, its movement in the data lake, and so on.\\xa0\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Data lineage is the process of tracking the whereabouts of the data within a data lake. Why is it important to keep a record of data in this manner? Data lineage creates a map of the data, enabling one to know when, by whom, and where the data is moving/accessed. This helps track the data flow and identify any risks or gaps within the data lake.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Host-Based Security\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing a multilayered security strategy is an effective way to minimize data vulnerabilities and attacks. Host-based security entails securing the host through intrusion detection algorithms, audit trails, log management, and so on.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Intrusion detection algorithms applied at the host level identify anomalous activities or access requests and notify the relevant authorities. These anomalous activities may be internal (coming from within the organization network) or coming from an external attacker.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Intrusion detection algorithms can work hand in hand with data lineage or log management systems. Collecting and managing logs can become exhaustive on resources (storage). Therefore, having an intrusion detection system can help detect anomalies without taking up resources.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"With that being said, it's important to note that log management and intrusion detection algorithms are both crucial and act as data protective layers.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Implement Role-Based Access Control and Identity Access Management Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"A data lake has several moving components and connections to various cloud platforms and tools. Not all employees require access to all resources since it can lead to data leakage or cause vulnerabilities.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"An effective approach to grant access and keep track of resource controls is to implement an IAM system. This system keeps track of an employee's digital identity, i.e., his/her credentials (username, password, questions), etc. This identity serves as an authentication factor that's used when any applications, tools, or databases are accessed.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Similar to IAM, RBAC systems keep track of employees' job roles to grant access to resources or applications. This is helpful in large organizations that have multiple departments and varied job roles. RBAC also requires user authentication, as well as role-based authentication and permission.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption is a fundamental data security policy that provides data protection against malicious attackers. If your organization's data sits on the cloud, you must follow the encryption guidelines recommended (and, in most cases, provided) by your service provider. On-prem data lakes must be secured with data encryption policies as dictated by standard security organizations.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption can be done at all levels of data storage systems, such as files, tools, applications, and databases. Encryption, RBAC, and IAM systems in combination can produce a resilient and robust data protection layer.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Network Perimeter\"}),/*#__PURE__*/e(\"p\",{children:\"As the name suggests, perimeter security entails enveloping the organization's network with strong security protocols to prevent cyber threats and restrict hackers. Several security measures exist, including firewalls, intrusion detection algorithms, border routers, and so on.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Firewalls act as sieves, allowing only certain traffic to flow into the organization's network. This is a simple yet fundamental practice, as it restricts the flow of traffic that might potentially harm the network.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"As discussed earlier, intrusion detection (and prevention) algorithms are an efficient way of identifying and restricting anomalous events. They make use of advanced machine learning algorithms to identify threat profiles or activities.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Lake Security Checklist\"}),/*#__PURE__*/e(\"p\",{children:\"To summarize, here\u2019s a checklist to remember while securing your organization\u2019s data lake:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"access control, authorization, and authentication\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"platform hardening\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"data lineage\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"host-based security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"implement role-based access control (RBAC) and identity access management (IAM) solutions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"data encryption\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"network perimeter\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Securing your organization's data is key to building a strong development and deployment pipeline that, in turn, is crucial in ensuring business growth.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In the era of cyberthreats and cyber theft, implementing the right measures and security policies is your best bet on data protection.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(a,{href:\"https://www.plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Plutora \"})}),\"uses industry best practices to protect the privacy of customers' personal data. This includes following the GDPR and other applicable legislation in the country of residence. They provide several data security policies including data encryption, access control, and auditing, and also take care of disaster recovery. Make sure to check out their \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/security\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"data security platform\"})}),\".\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"With this, we come to the end of this post. I hope you now have a perspective on why data lake security is essential and how to ensure its security. Stay tuned for more informative blogs.\"})]});export const richText21=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Continuous integration and continuous delivery (CI/CD) pipelines are the foundation of any modern software organization that builds software. Combined with DevOps practices, CI/CD pipelines allow your company to deliver software faster and more frequently. But with great power comes great responsibility. While everyone focuses on writing secure applications, many often overlook CI/CD pipeline security. But there are valid reasons to pay close attention to how your CI/CD is configured. In this post, you'll learn why and how to secure your CI/CD pipelines.\"})});export const richText22=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Is CI/CD Security Really That Important?\"}),/*#__PURE__*/e(\"p\",{children:\"CI/CD pipelines usually need a lot of permissions to do their job. They also need to deal with secrets for applications and infrastructure. This means that whoever can get unauthorized access to your CI/CD pipeline gets almost unlimited power to breach all your infrastructure or deploy malicious code.\"}),/*#__PURE__*/t(\"p\",{children:[\"Therefore, you should take securing CI/CD pipelines as a high-priority task. Statistics show that there has been a \",/*#__PURE__*/e(a,{href:\"https://www.helpnetsecurity.com/2020/08/13/surge-in-cyber-attacks-targeting-open-source-software-projects/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"significant surge in software supply chain attacks in recent years\"})}),\". We're talking about an increase of over 400%. Therefore, leaving CI/CD security as a last extra step on your security to-do list is definitely not the best idea. Here are some best practices for increasing your CI/CD security posture.\"]}),/*#__PURE__*/e(\"h3\",{children:\"CI/CD Access\"}),/*#__PURE__*/t(\"p\",{children:[\"First things first: the access to the CI/CD tool itself. It's pretty straightforward\u2060\u2014you want access to your CI/CD to be well controlled and organized. Not everyone in the company should have access to your CI/CD, and even if someone gets access, they shouldn't automatically get access to all pipelines and have all possibilities. \",/*#__PURE__*/e(a,{href:\"https://en.wikipedia.org/wiki/Single_sign-on\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"SSO\"})}),\" and \",/*#__PURE__*/e(a,{href:\"https://en.wikipedia.org/wiki/Role-based_access_control\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"RBAC\"})}),\" capabilities are your friends here. Make sure to follow the least-privileged approach. Developers should only have access to the pipelines they need. There is no point in having access to other teams' pipelines. Managers or team leads should probably have access to CI/CD for reporting purposes, but they shouldn't necessarily be able to create pipelines.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Secure Your Secrets\"}),/*#__PURE__*/e(\"p\",{children:\"The next tip on our list may sound obvious, but secure handling of your secrets, tokens, and other credentials is crucial in CI/CD. There are secrets that your CI/CD tool itself may need to deploy applications and also secrets that your application needs. There are two main rules here. Firstly, you don't want to pass any secrets in plain text anywhere in the pipeline. Most modern CI/CD tools come with a secret management solution, which means you can securely store your secrets in your CI/CD tool and pass them as environment variables to your pipelines.\"}),/*#__PURE__*/e(\"h3\",{children:\"Security Scanning As Part of Your CI/CD\"}),/*#__PURE__*/e(\"p\",{children:\"Another best practice on our list shouldn't come as a surprise either. You should include security scanning early in the CI/CD process. There are plenty of open-source tools that let you do that, so there's no good reason not to do it. There are a few ways to do security scanning in your pipelines.\"}),/*#__PURE__*/e(\"p\",{children:\"The first and the most obvious is static code security scanning. This process reads the code of the application you're trying to deploy and tries to find common security vulnerabilities or signs of malicious behaviors. But that's not the only security scanning you can do.\"}),/*#__PURE__*/e(\"p\",{children:\"There is also registry scanning, especially common in the case of deploying Docker containers. Registry scanning scans every image you try to pull into your pipeline.\"}),/*#__PURE__*/e(\"p\",{children:\"Last but not least is runtime scanning. In this case, you deploy an instance of your newly built application to a testing environment and run the tests \\\"on the living organism.\\\" Combine all three strategies, and you'll definitely improve your company's security posture.\"}),/*#__PURE__*/e(\"h3\",{children:\"Don't Leave Test Environments Wide Open\"}),/*#__PURE__*/t(\"p\",{children:[\"Usually, you can deploy to various test environments to test your product. But these test environments are usually also freely available to developers to do some more manual testing. Such test environments might lack the security of \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/what-staging-environment-how-get-it-right\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"staging\"})}),\" or \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/production-environment-what-you-need-know\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"production\"})}),\" environments. But they are fully working environments, which means if an attacker gets access to it, they may use it as a stepping stone to other places in your infrastructure. Therefore, it's important to secure your test environment so it's just as secure as your other environments.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Clean Up Any Temporary Resources\"}),/*#__PURE__*/e(\"p\",{children:'In addition to testing environments, your CI/CD pipeline may also create temporary resources, like virtual machines or Kubernetes clusters, to run tests. And while test environments are usually always alive, these temporary resources are meant to be created for a single test purpose and destroyed after the pipeline run. But sometimes, we forget about that \"destroy\" part. And over time, you could accumulate dozens of unused resources, which not only waste money but also pose a security threat.'}),/*#__PURE__*/e(\"p\",{children:\"Imagine a virtual machine that was created months ago and hasn't been patched since. It could have some unnecessary ports open or even some old test applications running. For an attacker, these forgotten resources are a gold mine. Sometimes, these old resources aren't even covered by your firewalls. The solution here is simple: clean up resources you don't need anymore. If you create them from the pipeline itself, don't forget the destroy stage. If you create them manually, create some processes or reminders to help you keep them under control.\"}),/*#__PURE__*/e(\"h3\",{children:\"Keep Your CI/CD Tool Up to Date\"}),/*#__PURE__*/e(\"p\",{children:\"Sometimes overlooked, sometimes even feared, updating your CI/CD tool is not something you want to postpone. Your CI/CD tool will also have bugs and vulnerabilities. If you don't update your CI/CD, you'll be vulnerable\u2060, and the aforementioned best practices will go to waste. There is little value in implementing good access management if you leave your CI/CD tool in a version that has a vulnerability that allows an attacker to simply bypass authentication.\"}),/*#__PURE__*/e(\"h3\",{children:\"Auditing\"}),/*#__PURE__*/e(\"p\",{children:\"Last but not least: audit logs. Even with the best security measures, someone still might manage to run a malicious pipeline. And while your security scanning stages should help inform you when your team deploys something fishy, security measures aren't perfect either. And what does an attacker do after successfully deploying their malicious code? They cover their tracks by deleting the pipeline, so you'll never find out something unwanted happened.\"}),/*#__PURE__*/e(\"p\",{children:\"Audit logs will help you out in this case. Pipelines can be deleted for various reasons, and it's not something that you want to prevent entirely. What you want is to create an audit log and save it somewhere completely different from your CI/CD system. Such an audit log should give you clear information on who deployed what, when, and from where. If all previous measures fail, an audit log will at least help you find the back doors afterward so you can quickly delete them.\"}),/*#__PURE__*/e(\"h2\",{children:\"Summary\"}),/*#__PURE__*/t(\"p\",{children:[\"Securing CI/CD pipelines is a very crucial yet often overlooked task. CI/CD often holds keys to your kingdom; therefore, as we mentioned at the beginning, protecting your pipelines shouldn't be merely an extra task on your security to-do list. The CI/CD security best practices we discussed will definitely help improve your security posture. But don't forget that you're never done with security. It's a constant process as vulnerabilities and threats evolve continuously. If you want to learn more about DevOps Security in general, take a look at our \",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/what-is-devops-security-a-guide-with-best-practices\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"post here\"})}),\".\"]})]});export const richText23=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h6\",{children:\"As the new version is ready, here is the real challenge for the firm's DevOps team: How do we deploy this new upgrade seamlessly without complicating things, keeping the user experience in mind?\"}),/*#__PURE__*/e(\"p\",{children:\"To solve this humongous task, the DevOps team integrates automation and deployment strategies such as blue-green deployment with Kubernetes into their deployment pipeline and operating procedures, ensuring that the underlying configuration and infrastructure support seamless updates. The development of deployment strategies has helped software firms successfully deploy new versions of applications and code. These strategies are known as deployment strategies.\"}),/*#__PURE__*/e(\"p\",{children:\"Our aim in this article is to explain what deployment strategies are, the different types of deployment strategies available, and their methods of implementation. We will also cover the advantages and disadvantages of each technique, as well as when to use each in your work as a DevOps engineer.\"})]});export const richText24=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Deployment Strategies: What Are They?\"})}),/*#__PURE__*/t(\"p\",{children:[\"To successfully launch a new version of the software solution they provide, DevOps teams use deployment strategies. Using these techniques,\",/*#__PURE__*/e(a,{href:\"https://en.wikipedia.org/wiki/Network_traffic#:~:text=From%20Wikipedia%2C%20the%20free%20encyclopedia%20Network%20traffic%20or,packets%2C%20which%20provide%20the%20load%20in%20the%20network.\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" network traffic\"})}),\" in a production environment is transitioned from the old version to the new version based on the firm's specialty. Deployment strategies can influence downtime and operational costs based on the company's specialty.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Deployment Strategies of Different Types\"})}),/*#__PURE__*/e(\"p\",{children:\"Now that we know what deployment strategies are, let's explore the different types of deployment strategies.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Deployment in blue and green\"})}),/*#__PURE__*/t(\"p\",{children:[\"This deployment strategy involves running the new version of the software alongside the old version. Note that this is also known as a \",/*#__PURE__*/e(\"strong\",{children:\"red/black deployment strategy\"}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Stable or older versions of the application are always \",/*#__PURE__*/e(\"strong\",{children:\"blue or red\"}),\", while newer versions are \",/*#__PURE__*/e(\"strong\",{children:\"green or black\"}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"When the new version has been tested and certified to meet all the requirements, the load balancer automatically switches traffic from the older version to the newer one.\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to offering a quick update or rollout of a new application version, this strategy has the disadvantage of being expensive since both the new and old versions must run simultaneously. Engineers mostly use this method in mobile app development and deployment.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Canary Deployments\"})}),/*#__PURE__*/e(\"p\",{children:\"During canary deployment, the team responsible for deployment gradually redirects traffic from the older version to the new one. For instance, at a certain stage in the process, 90% of production traffic may still go through the older version while only 10% goes through the newer one. This approach allows DevOps engineers to evaluate the stability of the new version by using live traffic from a subset of end-users at varying levels throughout production.\"}),/*#__PURE__*/e(\"p\",{children:\"Canary Deployments enables better performance monitoring, faster and easier software rollbacks, and facilitates automation in the deployment pipeline. However, it has a slow deployment cycle, requires more time, and demands a robust infrastructure.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Recreate Deployment\"})}),/*#__PURE__*/e(\"p\",{children:\"The development team shuts down the old version of the application completely, deploys the new version, then reboots the whole system. This deployment method produces a system downtime between shutting down the old software and booting the new one.\"}),/*#__PURE__*/e(\"p\",{children:\"As there is no traffic shifting from one version to another in the live production environment, unlike blue-green deployment, it requires no load balancer.\"}),/*#__PURE__*/e(\"p\",{children:\"The downtime in this strategy, however, affects the end user dramatically because it usually occurs during the configuration of the new system. Users must wait until the application is live again to use it. As a result, not many developers use this strategy unless it is their only option.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Ramped Deployment\"})}),/*#__PURE__*/t(\"p\",{children:[\"The ramped deployment strategy, which can be managed using Kubernetes, gradually changes the older version to the new version. Unlike canary deployment, the ramped deployment strategy replaces instances of the old application version with instances of the new application version one instance at a time, as opposed to canary deployment. The \",/*#__PURE__*/e(\"strong\",{children:\"rolling upgrade deployment strategy\"}),\" is another way to refer to this method.\"]}),/*#__PURE__*/e(\"p\",{children:\"As soon as developers replace all instances of the older version, they shut it down. After that, the new version is in charge of all production traffic.\"}),/*#__PURE__*/e(\"p\",{children:\"The downgrading process to the initial version follows the same cycle, one instance at a time. However, the rollback duration is long in case of an unexpected event.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Shadow Deployment\"})}),/*#__PURE__*/e(\"p\",{children:\"In this deployment strategy, developers deploy the new version alongside the old version. However, users cannot access the new version immediately. The latest version hides in the shadows. To test how the new version will handle the requests when live, developers fork or copy a copy of the old version to the shadow version.\"}),/*#__PURE__*/e(\"p\",{children:\"As a result, the DevOps engineer should be careful to ensure that the forked traffic does not create a duplicate live request since two versions of the same system are running simultaneously.\"}),/*#__PURE__*/e(\"p\",{children:\"It's expensive and complex to set up, and it can create serious problems. Shadow deployment allows engineers to monitor system performance and conduct stability tests.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"A/B Testing Deployment\"})}),/*#__PURE__*/e(\"p\",{children:\"Developers deploy the new version alongside the older version in A/B testing or blue-green deployment. However, this new version is only available to a limited number of users, who are selected according to certain conditions and configuration parameters. Location, device type, UI language, and operating system can serve as parameters for selecting these users.\"}),/*#__PURE__*/e(\"p\",{children:\"After gathering statistics from performance monitoring, developers deploy the version of the application that yielded the best results.\"}),/*#__PURE__*/e(\"p\",{children:\"The use of real-time statistical data can help developers make informed decisions about their software. However, A/B testing is difficult to set up and requires a high-end load balancer and robust infrastructure.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Tools for better deployment\"})}),/*#__PURE__*/e(\"p\",{children:\"Developing new features with any deployment strategy isn't easy. DevOps teams need to understand what values they're shipping to their users. Plutora offers tools that make it easier for DevOps teams to launch or release new features with any deployment strategy.\"}),/*#__PURE__*/t(\"p\",{children:[\"In addition to implementing a deployment strategy and tracking analytics,\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/release-management\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" release management tools\"})}),\" allow firms to plan and manage their release. The\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/deployment-planning\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" deployment planning tool\"})}),\" is another great tool to have when planning a deployment. By using this tool, risk can be minimized during the deployment process.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Software deployment tools save time as they can manage the deployment pipeline in addition to\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/blog/understanding-ci-cd-pipeline\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" CI/CD (continuous integration/ continuous delivery)\"})}),\", automating deployment through sophisticated automation. These tools can also enhance security as they can integrate role-based access control, even when managing complex Kubernetes environments.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"In conclusion\"})}),/*#__PURE__*/t(\"p\",{children:[\"Explore the various deployment strategies available to update your software. Each has its own advantages and disadvantages, making them suitable for different situations. The main consideration is finding the most suitable option for your DevOps team based on your team's, project's, and company's requirements and business objectives. Consider factors like downtime tolerance and cost limitations. Enhance your deployment process with\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" Plutora\"})}),\"'s\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/deployment-planning\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" deployment management tools\"})}),\" and\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/platform/release-management\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" release management platform\"})}),\". Book a\",/*#__PURE__*/e(a,{href:\"https://www.plutora.com/evaluate-now?ref=nav-bar\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\" personalized demo\"})}),\" now!\"]}),/*#__PURE__*/e(\"p\",{children:\"It is inevitable that software development firms will have to change or upgrade their software at some point, whether it is due to a complete version change or a bug fix.\"})]});export const richText25=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"h6\",{children:\"Imagine you\u2019re baking a dessert. After you pull it out of the oven, you have to check to make sure the dish is done cooking. Otherwise, you could get sick and possibly ruin your creation, wasting time and resources.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The same idea applies to software testing. Before you submit a product for testing, the software has to go through an initial validation process to make sure it\u2019s stable and free of any bugs or vulnerabilities.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This initial testing phase, known as smoke testing, is a great way to tell if your core functions work properly.\\xa0Of course, nobody likes the idea of running extra tests. But while smoke testing may sound like a pain and a waste of time, it\u2019s well worth the effort. Taking this small step can save a lot of frustration down the line and ultimately lead to better products and smoother product delivery.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"With all this in mind, let\u2019s take a closer look at how smoke testing works and how you can start using it in your operations.\\xa0\\xa0\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "yHAA+G,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kEAA+EE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,0NAAqN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,oCAAoC,UAAU,eAAe,oBAAoB,8QAA8Q,IAAI,uEAAuE,OAAO,sQAAsQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAE,iZAAiZ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAA4O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kEAA+EE,EAAEC,EAAE,CAAC,KAAK,yHAAyH,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,oPAAoP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyEE,EAAEC,EAAE,CAAC,KAAK,uFAAuF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,uIAAkI,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,oCAAoC,UAAU,eAAe,oBAAoB,4QAA4Q,IAAI,qEAAqE,OAAO,mKAAmK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uZAAwY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAA2Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yHAAsIE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,4HAA4H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAA2U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,0BAA0B,UAAU,eAAe,oBAAoB,6QAA6Q,IAAI,sEAAsE,OAAO,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,wCAAwC,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAEC,EAAE,CAAC,KAAK,iIAAiI,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,wHAAwH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iBAA8BE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,8JAAyJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAAyR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mHAAgIE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,uBAAuB,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yVAAoV,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qDAAkEE,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAE,qaAAuY,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iNAAuM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kSAAkS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kfAAyd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6xBAAywB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAEC,EAAE,CAAC,KAAK,gKAAgK,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6NAAwN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wRAA8Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA0H,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2MAAmNE,EAAEC,EAAE,CAAC,KAAK,kGAAkG,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,sDAAsD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAA+I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qoBAAqoB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAAqH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mOAA2OE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,yBAAyB,UAAU,eAAe,oBAAoB,8QAA8Q,IAAI,uEAAuE,OAAO,sQAAsQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,yBAAyB,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4HAAoIE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAE,iMAA4L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAE,6OAA6O,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAE,8UAAyU,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAE,uGAAoHA,EAAEC,EAAE,CAAC,KAAK,gLAAgL,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,0KAAuLA,EAAEC,EAAE,CAAC,KAAK,8HAA8H,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAAqU,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,gBAAgB,UAAU,eAAe,oBAAoB,6QAA6Q,IAAI,sEAAsE,OAAO,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,mDAAmD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gSAA6SE,EAAEC,EAAE,CAAC,KAAK,yMAAyM,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAA4R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,8BAA8B,UAAU,eAAe,oBAAoB,8QAA8Q,IAAI,uEAAuE,OAAO,wKAAwK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,oHAAoH,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+BE,EAAEC,EAAE,CAAC,KAAK,mLAAmL,aAAa,GAAG,aAAa,GAAG,SAAsBH,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuDE,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,sKAAsK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,oBAAoB,8QAA8Q,IAAI,uEAAuE,OAAO,uKAAuK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,0EAA0E,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wEAAwE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAAiP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2GAAwHE,EAAEC,EAAE,CAAC,KAAK,sBAAsB,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,6SAA6S,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,+TAA+T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sgBAAsgB,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8aAA8a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4GE,EAAEC,EAAE,CAAC,KAAK,oFAAoF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,GAAG,CAAC,CAAC,CAAC,EAAE,IAAiBA,EAAEC,EAAE,CAAC,KAAK,oFAAoF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mLAAmL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gMAAgM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yWAAyW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mIAAyH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8FE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,sDAAsD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,QAAqBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,SAAsBA,EAAEC,EAAE,CAAC,KAAK,2BAA2B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,uWAAuW,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kbAAkb,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,8EAA8E,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,mRAAmR,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,UAAU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAAkV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ofAAof,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBR,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kfAAwe,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kTAAyR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAAsV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0hBAAuf,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBV,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuBE,EAAEC,EAAE,CAAC,KAAK,2IAA2I,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,6RAA0SA,EAAEC,EAAE,CAAC,KAAK,qHAAqH,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAE,sMAA8MA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,wBAAqCA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,osBAA0rB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gaAA2Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kmBAA6lB,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,scAAma,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mQAAgRE,EAAEC,EAAE,CAAC,KAAK,2GAA2G,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,sGAA4F,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4OAA4O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gLAAwLE,EAAEC,EAAE,CAAC,KAAK,mFAAmF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAAuF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAA4EE,EAAE,KAAK,CAAC,SAAS,GAAG,CAAC,EAAE,uHAAuH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAAmEE,EAAEC,EAAE,CAAC,KAAK,gDAAgD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAE,2OAAsO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAmF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mIAAgJE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,iJAA4I,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,OAAO,UAAU,eAAe,oBAAoB,qOAAqO,IAAI,qEAAqE,OAAO,mKAAmK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,mBAAmB,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAAwU,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,QAAqBE,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yMAAsNE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,wKAAwK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ucAAuc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4EAAuE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,qDAAkEE,EAAEC,EAAE,CAAC,KAAK,kHAAkH,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gNAA2M,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2QAAiQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ueAAue,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mCAA8B,CAAC,CAAC,CAAC,EAAE,qYAAqY,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,uBAAuB,UAAU,eAAe,oBAAoB,sOAAsO,IAAI,sEAAsE,OAAO,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAAgK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iEAA8EE,EAAEC,EAAE,CAAC,KAAK,6FAA6F,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA2M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAAqP,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,+BAA+B,UAAU,eAAe,oBAAoB,sOAAsO,IAAI,sEAAsE,OAAO,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,0CAA0C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+YAA0Y,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,qRAAkSE,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAA2Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,yHAA4HA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAE,yJAAoJ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,6FAA6F,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6VAAqWE,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAA4EE,EAAEC,EAAE,CAAC,KAAK,oFAAoF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAe,CAAC,CAAC,CAAC,EAAE,gLAAgL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,kBAAkB,UAAU,eAAe,oBAAoB,oOAAoO,IAAI,qEAAqE,OAAO,gQAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,yBAAyB,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uYAAuY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAsR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAAqH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2BE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,8KAA8K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,8EAA8E,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6CAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAoR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gGAAgG,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,wBAAmB,CAAC,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAAyQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAmP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yJAAoJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8WAAsXE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,iTAAyTA,EAAEC,EAAE,CAAC,KAAK,8CAA8C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,8GAA2HA,EAAEC,EAAE,CAAC,KAAK,2BAA2B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6gBAA6gB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6EAA0FE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,QAAqBA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,iJAAiJ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4IAAyJE,EAAEC,EAAE,CAAC,KAAK,yCAAyC,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,oIAAiJA,EAAEC,EAAE,CAAC,KAAK,kDAAkD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,4HAA4H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4VAA4V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAA8V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,uGAAoHE,EAAEC,EAAE,CAAC,KAAK,mNAAmN,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,+KAA+K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2MAAwNE,EAAEC,EAAE,CAAC,KAAK,uFAAuF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6vBAA6vB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,4IAAyJE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4GE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,owCAAixCA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,kTAAkT,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iVAA8VE,EAAE,KAAK,CAAC,CAAC,EAAE,uBAAoCA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,eAA4BA,EAAEC,EAAE,CAAC,KAAK,2BAA2B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,iBAA8BA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,4CAAyDA,EAAEC,EAAE,CAAC,KAAK,mDAAmD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,uJAAoKE,EAAEC,EAAE,CAAC,KAAK,uGAAuG,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,8EAA2FA,EAAEC,EAAE,CAAC,KAAK,8CAA8C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kSAA0SE,EAAEC,EAAE,CAAC,KAAK,gFAAgF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,gBAAgB,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yaAAoa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4GE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,wJAAwJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAA6O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAAkI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAAuN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAA8Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAAwP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAA+Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAgM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAkS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAA8S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAAyJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+CAA4DE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,yMAAyM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qaAA6aE,EAAEC,EAAE,CAAC,KAAK,mDAAmD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kaAAka,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4aAAka,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qGAA6GE,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAE,uLAAuL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0GAAuHE,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAE,QAAqBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAE,mCAAmC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yGAAsHE,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAE,gIAAgI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,uDAAuD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qMAAkNE,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAE,6BAA0CA,EAAE,KAAK,CAAC,SAAS,KAAK,CAAC,EAAE,QAAqBA,EAAE,KAAK,CAAC,SAAS,KAAK,CAAC,EAAE,iEAAiE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8EAA8E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mWAAmW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAAgG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,8VAA2WA,EAAEC,EAAE,CAAC,KAAK,4CAA4C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBtB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kjBAAkjB,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sHAAmIE,EAAEC,EAAE,CAAC,KAAK,6GAA6G,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAE,8OAA8O,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0VAA6VE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,QAAqBA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,sWAAsW,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ijBAAijB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAkR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4OAAyPE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,gSAAgS,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mfAAmf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wiBAAwiB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,odAA+c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,UAAU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ucAAuc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,geAAge,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4iBAAyjBE,EAAEC,EAAE,CAAC,KAAK,mFAAmF,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,idAAid,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8IAA2JE,EAAEC,EAAE,CAAC,KAAK,iMAAiM,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,0NAA0N,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0IAAuJE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0DAAuEE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,8BAA2CA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4cAA4c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wVAAqWE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,0CAA0C,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6WAA6W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4EAAyFE,EAAEC,EAAE,CAAC,KAAK,sDAAsD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,qDAAkEA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,qIAAqI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6GE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAE,sMAAsM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sbAAmcE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,KAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,WAAwBA,EAAEC,EAAE,CAAC,KAAK,mDAAmD,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sOAAiO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAA4N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,maAA8Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAAuI,CAAC,CAAC,CAAC,CAAC,EACzs3I2B,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "__FramerMetadata__"]
}
