{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/fA0YIpA07pfUZju4NsMs/UeRbjt93zlS0aiLrMGiY/iR73Jdb5N-6.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as r}from\"framer\";import{motion as a}from\"framer-motion\";import*as o from\"react\";export const richText=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Windows' new operating system will be launched on October 5th, but not everyone will get Windows 11 at the same time. First and foremost, you must have a compatible PC.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://framer.com/no/blog/derfor-bor-du-oppgradere-til-windows-11\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(111, 168, 220)\"},children:\"Windows 11 is the successor to Windows 10, and will be available as a free update to supported devices.\"})})}),\" At the same time, new PCs will be launched with Windows 11 pre-installed.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:\"Rolling Update\"}),/*#__PURE__*/e(\"p\",{children:\"Even though Windows 11 will be officially launched on October 5th, it doesn't necessarily mean that the update will be available in Windows Update on day one for all Windows 10 users.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"You primarily need to have a compatible PC, in addition to the update being rolled out in waves, which means that some will receive the update before others. New PCs will be first, followed by PCs with Windows 10. When Windows 11 is available for your PC, the update will be ready in Windows Update. Microsoft expects that by mid-2022, all compatible devices can be upgraded to Windows 11.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"High System Requirements for Update\"}),/*#__PURE__*/e(\"p\",{children:\"Because Microsoft has introduced greater security and performance requirements, the following must now be met in order to upgrade:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Processor with minimum TPM 2.0 support\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"4 GB memory\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Minimum Direct x 12\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Minimum 9-inch screen with 720p resolution or better.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"UEFI, Secure Boot system\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Not sure if your system can handle Windows 11? \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/kontakt-oss\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(111, 168, 220)\"},children:\"Contact us at Procano, and we will check for you!\"})})})]}),/*#__PURE__*/e(\"p\",{children:\"{{cta('b0134dac-a4d8-49cd-856f-bcdc6f056297')}}\"})]});export const richText1=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:'In October, National Security Month is marked for the 11th time in Norway. The theme for this year\\'s campaign is \"A Safe Digital Everyday Life\", and the goal is to contribute to a safer digital everyday life for businesses and the population.\\xa0'}),/*#__PURE__*/e(\"p\",{children:\"Digital security is about both preventing something from going wrong and handling the damage when it does occur. Various forms of fraud, ransomware, account takeover, and identity theft are some of the most common incidents that individuals and businesses are exposed to. With increased digitalization and the use of home offices, it is therefore more important than ever to have knowledge about how to avoid digital attacks.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Important to be prepared\"}),/*#__PURE__*/e(\"p\",{children:\"NorSIS coordinates National Security Month each year on behalf of the Ministry of Justice and Public Security. This is part of the EU's information security organization ENISA's annual European Security Month. With National Security Month, NorSIS aims to highlight what can be done to protect oneself and the workplace from unwanted incidents and attacks. Knowing what to do when one is affected is important to limit the damage effects.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Courses in Digital First Aid\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(111, 168, 220)\"},children:'During the campaign period, it is possible to participate in events, courses, and other activities related to the themes \"Digital First Aid\" and \"Be Safe\".'}),\" The training provides valuable knowledge in digital security so that one knows how to protect the business and what measures must be taken when damage has occurred. It turns out that most IT security breaches are related to the users. Therefore, it is especially important to have good training on what constitutes a good security culture and how a typical attack may look like.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"We provide your company with valuable training in IT security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(111, 168, 220)\"},children:\"Procano offers a training platform in IT security that provides monthly training modules and simulations.\"}),\" The simulations we set up in our training platform will resemble spear phishing emails. This means an attack where the criminal intends to extract sensitive information from your company. This is the most common type of attack against businesses, and therefore it is important that employees can identify these. In the security training platform, you can register names of suppliers, CEO, CFO, IT department, and other key players, so that we can simulate the most likely email.\"]})]});export const richText2=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"October 5th will see the launch of Windows 11. The new operating system can tempt with a fresh look and features that make the workday more efficient. Not least, this is the safest Windows ever.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"The new Windows has all the power and security of Windows 10, with a new user-friendly design, centered taskbar, and a new start menu. A new Snap layout, Teams integration, updated Microsoft Store, and Widgets are also in place. Whether you want to get things done or stay in touch with your colleagues, Windows 11 can be tailored to your needs.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Strong focus on security\"}),/*#__PURE__*/e(\"p\",{children:\"With Windows 11, you can also feel completely secure knowing that security is taken care of. Windows 11 is a Zero Trust-ready operating system with powerful built-in security, hardware-based isolation, encryption, and protection against malware. This makes Windows 11 the safest Windows operating system ever.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Sleek user interface and Teams integration\"}),/*#__PURE__*/e(\"p\",{children:\"The biggest visual difference with Windows 11 is the new user interface. The design is more minimalist, with rounded corners, and frosted design elements. The start menu has also been moved to the center of the lower part of the screen.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In the new update, Teams is integrated into the operating system, making the program require less data power and the PC will feel faster.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Tile windows with the new Snap layout\"}),/*#__PURE__*/e(\"p\",{children:\"The new snap layout, Snap layouts, can make you more productive in your workday. With the new feature, you can quickly pin windows wherever you want on the screen, not just side by side - especially handy with the new ultrawide or large screens in workplaces. By placing multiple windows in columns and sections, you will get a better overview of the content in a way that suits the applications. Another useful functionality is snap groups, allowing you to return to a previous window layout from the taskbar. For example, a previous layout where the windows have their fixed position.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Run Android apps directly on your computer\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft Store has also been redesigned and is better tailored to each user. Here you can easily find the apps you need. In Windows 11, it will also be possible to run Android apps directly on the computer, so you can leave your phone in your pocket.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://www.microsoft.com/nb-no/windows/windows-11\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(111, 168, 220)\"},children:\"Read more about the upgrade here.\\xa0\"})})})}),/*#__PURE__*/e(\"h2\",{children:\"Things to consider\"}),/*#__PURE__*/e(\"p\",{children:\"With a new system, there are always teething problems. Therefore, it is important that the system is thoroughly tested according to the company's needs, both for stability and compatibility with programs.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://www.procano.com/partnere\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(111, 168, 220)\"},children:\"As a Microsoft Gold Partner, Procano has been early out of the gates and has already run a test group on the system for several weeks.\"})})})}),/*#__PURE__*/e(\"p\",{children:\"We recommend that you have a chat with us about our experiences and the way forward before upgrading the system.\"}),/*#__PURE__*/e(\"p\",{children:\"{{cta('4b239dfb-1eb9-4872-9780-1c09c03b2498')}}\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"{{cta('b0134dac-a4d8-49cd-856f-bcdc6f056297')}}\"})]});export const richText3=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"During the summer, Procano implemented the backup provider, Rubrik, its technology to protect the entire service platform of its customers, both in data centers, on-site, and in Microsoft Azure. Now it has also become known that Microsoft has followed suit with a strategic agreement with the company.\"}),/*#__PURE__*/e(\"p\",{children:\"Rubrik delivers one of the most advanced backup solutions in the market, where they use advanced AI technology and Zero Trust Data Management to ensure their customers against data loss and ransomware. The agreement with Microsoft gives Rubrik unique access to resources in the Azure platform, as well as a greater equity investment to help Rubrik with marketing activities, and collaborate on projects to deliver integrated Zero Trust security solutions with Microsoft Azure.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"The best IT solution in the market\"}),/*#__PURE__*/e(\"p\",{children:\"For us at Procano, it was an easy choice to go for Rubrik as backup technology for our complete platform, and we are proud to be a reference partner at Rubrik. We consider the solution to be the best enterprise backup solution, something we now see Microsoft agrees on.\"}),/*#__PURE__*/e(\"p\",{children:\"Nick Parker, Corporate Vice President of Global Partner Solutions at Microsoft, tells in an interview with IT Europa that integrating Rubrik's Zero Trust Data Management with Microsoft Azure and Microsoft 365 will make customers' digital resilience and journey to the cloud easier and better.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Source:\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(r,{href:\"https://iteuropa.com/news/rubrik-and-microsoft-form-strategic-agreement-mitigate-ransomware-threats\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\"Rubrik and Microsoft form strategic agreement to mitigate ransomware threats | ITEuropa\"})})})]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\"{{cta('b0134dac-a4d8-49cd-856f-bcdc6f056297')}}\"})})]});export const richText4=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The dark figure survey from 2020 shows that at the beginning of the year there was a clear increase in phishing attacks against Norwegian companies. You have certainly experienced phishing attacks against your own business email and may have been unsure if you could trust the email. We will guide you through how to recognize a phishing email.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.datatilsynet.no/rettigheter-og-plikter/virksomhetenes-plikter/informasjonssikkerhet-internkontroll/phishing---hvordan-beskytte-virksomheten/?print=true\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"When fraudsters send out fake emails to fish for sensitive information\"})}),\", they use automated tools that can generate thousands or millions of emails at once. In the emails, the fraudsters impersonate a supplier, colleague, bank, public authority, police, or other authorities that we typically have high trust in.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"The content of the email is often based on trust in the sender and the recipient's emotions, such as curiosity, respect, and fear. The email can, for example, contain an \u201Cimportant\u201D attachment, speculate that you have an outstanding invoice, or state that you have forgotten to enter your credit card information for a large supplier. The websites or attachments that the email refers to are fake and often contain malicious software that gives the criminals access to the recipient's email and PC - of course, the email does not mention this.\"}),/*#__PURE__*/e(\"h2\",{children:\"A significant increase in CEO fraud\"}),/*#__PURE__*/e(\"p\",{children:\"In the last year, we have seen more of what we call \u201CCEO fraud.\u201D The fraudsters continuously work to penetrate the various security solutions companies have set up for their networks and have found that tailored emails to individuals in the company are often the solution. In targeted phishing attacks, the sender often impersonates the CEO or director of the company, where the sender usually requests a money transfer, gift card purchase, or other tasks that give the criminal access to sensitive information. These emails are often characterized by tasks requested to be completed urgently.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:{pathVariables:{x3B6qHsY2:\"dette-er-phishing-og-anti-phishing-kort-forklart\"},unresolvedPathSlugs:{x3B6qHsY2:{collectionId:\"iR73Jdb5N\",collectionItemId:\"G4Ws4N3st\"}},webPageId:\"V5aJw9uTs\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Read about how anti-phishing programs can stop phishing attacks.\\xa0\"})})}),/*#__PURE__*/e(\"h2\",{children:\"How can you tell if it\u2019s a phishing email?\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some tips you can keep in mind when you receive an email you think might be a phishing email:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check the sender's address. Often, the sender's address is not forged, thereby revealing the fraudster.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Do not send personal information such as social security numbers, credit card numbers, and passwords via email.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"By hovering your mouse pointer over the link the sender wants you to click on, you can see which web address it leads to.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Read the email carefully. There can often be typos in links it refers to, the sender's name, or the text in the email.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure that operating systems and programs are always updated.\"})})]})]});export const richText5=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"There is now a great pressure on email fraud (phishing). Here comes some info on what it is and how you can best protect yourselves. \"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"What is phishing?\"}),/*#__PURE__*/e(\"p\",{children:\"Phishing is a targeted attack on a person or business. The attacker gathers information in advance, such as about customers, suppliers, agreements, and partners. This information is used to send you an email that seems credible and reliable. In the email you might, for example: \\xa0\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(33, 33, 33)\",\"--framer-text-decoration\":\"none\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-line-height\":\"25.6667px\",\"--framer-text-color\":\"rgb(35, 73, 109)\"},children:/*#__PURE__*/e(\"p\",{children:\"be asked to click on links/attachments\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-line-height\":\"25.6667px\",\"--framer-text-color\":\"rgb(35, 73, 109)\"},children:/*#__PURE__*/e(\"p\",{children:\"be asked to provide access to accounts/usernames/passwords from someone who appears to be a colleague/friend/reliable person\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-line-height\":\"25.6667px\",\"--framer-text-color\":\"rgb(35, 73, 109)\"},children:/*#__PURE__*/e(\"p\",{children:\"receive a link to a website where you are asked to enter personal or sensitive data (PIN codes/login details/access codes).\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"Examples of typical scenarios an attacker will mimic:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"there is an issue with an invoice.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"that there has been suspicious activity on an account.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"the user needs to log in to confirm an account or password.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"the user needs to provide credit card information or bank account details and/or other information.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"This is anti-phishing (software)\"}),/*#__PURE__*/e(\"p\",{children:\"To identify and notify users about suspicious phishing communication, you should use software that protects you and the company from phishing \u2013 anti-phishing. The software monitors all emails coming in and out of the company, and uses artificial intelligence to check if the content is reliable. The most advanced tools combine \u201Ccomputer vision\u201D with deep sender analysis to uncover even the most difficult attacks.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"All emails come with a sender signature, a bit like a fingerprint on a letter. The anti-phishing program verifies that the fingerprint matches the sender and that it is not a \u201Chacker\u201D pretending to be your colleague. Furthermore, all emails come with a text, but unlike a physical letter, you can hide part of the message behind \u201Cinvisible codes\u201D. This means that all normal mail protection programs can see \u201CH123e123i123\u201D in emails where you see \u201CHello\u201D. How will they then manage to understand that you are being tricked into paying an invoice that does not exist?\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"What can you do?\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Be extra cautious if you receive an email from an unknown sender. If you suspect it is a phishing email; do not respond - delete the email. We recommend that you contact the IT responsible in the company. \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/book\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(234, 65, 88)\"},children:\"If you do not have a responsible person, you can call one of us\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(234, 65, 88)\"},children:\" \"}),\"\u2013 we will gladly help you!\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Never open links or attachments from unknown email senders.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Do not share personal information on forms that appear on websites (pop-ups).\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If you are asked to pay or do something unexpected \u2013 get verbal confirmation from the person in question. \"})})]})]});export const richText6=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Have you considered that you are using a cloud service every time you check your email from your mobile, or collaborate with a colleague in the same document? A cloud service is designed for just that - a seamless everyday life. And here's how it works.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Find a secure IT provider to manage your cloud services\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.procano.com/skytjenester\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Cloud services are systems designed to provide users with simple and affordable access to applications and resources via the internet\"})})}),\", without the need for internal infrastructure or hardware. In fact, we use several of them daily without even thinking about it.\"]}),/*#__PURE__*/e(\"p\",{children:\"The administration of cloud services is done by a third party, and as an IT provider, we help companies take full advantage of all these benefits.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"We help you find the right cloud service so that employees have access to what they need and can do their job more efficiently - no matter where they are.\"}),/*#__PURE__*/e(\"p\",{children:\"At Procano, you get, among other things:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"access to your own customer portal\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"one user ID across all applications and systems\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"integrated backup\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"lightning-fast, Norwegian customer support\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"help with migrating your data\",/*#__PURE__*/e(\"span\",{children:\"\\xa0\"})]})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://outlook.office365.com/owa/calendar/motebooking@procano.com/bookings/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Do you want to talk to us about cloud services? Contact Morten here.\\xa0\"})})})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"What are the benefits of cloud services?\"}),/*#__PURE__*/e(\"p\",{children:\"There are many good reasons to move the business to the cloud:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increased accessibility for employees\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Greater scalability\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Better security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduced costs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"More integration possibilities\"})})]}),/*#__PURE__*/e(\"p\",{children:\"With a cloud service, it's easy to scale up or down depending on how many users need access. To make it easy for you to keep track of costs, you simply pay a fixed monthly price per user. Then you don't have to pay for more than what the company actually uses.\"}),/*#__PURE__*/e(\"h2\",{children:\"What types of cloud services are there?\"}),/*#__PURE__*/t(\"p\",{children:[\"Generally, we classify cloud services into three basic types:\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Software as a Service (SaaS)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Infrastructure as a Service (IaaS)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Platform as a Service (PaaS)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How are cloud services delivered?\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"All companies work differently and therefore need different cloud solutions. Once you have decided on the type of cloud service you need, you also need to consider which type of IT environment will work best for the company. \",/*#__PURE__*/e(r,{href:\"https://framer.com/no/blog/hva-er-forskjellen-paa-private-hybrid-og-public-cloud\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Then it can be smart to ask yourself what is actually the difference between Private, Hybrid, and Public Cloud?\"})})})]})]});export const richText7=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{children:\"There are three ways to activate Microsoft's passwordless authentication. Each method covers a specific need, and all three can also be used together.\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"1. Windows Hello for Business\"}),/*#__PURE__*/e(\"p\",{children:\"This method is suitable for those dedicated to Windows. It allows logging into the computer with biometric recognition (face and fingerprint) or a PIN code that, for security reasons, is transmitted to a network.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordless#fido2-security-keys\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"You can find more details on how to activate Windows Hello for Business on Microsoft's website.\"})})})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"2. FIDO2 (Fast Identity Online) security keys\"}),/*#__PURE__*/e(\"p\",{children:\"This is suitable for those who log into a shared machine, work in a location where phones are restricted, or work for highly important identities.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"FIDO2 security keys are USB devices that are inserted into a machine for biometric and PIN authentication. \",/*#__PURE__*/e(r,{href:\"https://www.yubico.com/resources/getting-started/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read this documentation to learn how to enable security keys.\"})})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"3. Microsoft Authenticator app\"}),/*#__PURE__*/e(\"p\",{children:\"Unlike the first two methods, you can achieve the same security and availability with the Authenticator app without investing much in external hardware. This is because the app can be installed on any mobile device.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"With the Authenticator app, users can log into any platform by matching the number on the screen with the one in the app. After the number is matched, a biometric method and/or PIN code is used for confirmation. \",/*#__PURE__*/e(r,{href:\"https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordless#microsoft-authenticator-app\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"If you do not use the Authenticator app, you can learn more about getting started here\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\".\"})]})]});export const richText8=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Can the future really be completely without passwords? According to Microsoft, that's exactly where we're headed - towards an everyday where post-it notes and the question 'forgotten password' are replaced with accessibility and smart solutions.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://framer.com/no/blog/dette-maa-du-vite-om-totrinnsverifisering\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Two-factor authentication\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\" \"}),\"is one of the most popular approaches to reducing the risk of security breaches. Combining passwords with one-time codes (OTP), SMS, calls, and biometrics (face and fingerprints), Microsoft claims this will reduce attacks by 99.9%. And those are good numbers.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Microsoft continues to develop methods to make our lives even easier. Both at home and at work. They believe that passwords should be a thing of the past as technology continues to evolve, culminating in the latest Ignite conference. There, Microsoft announced a new way to validate users: \",/*#__PURE__*/e(r,{href:\"https://framer.com/no/blog/aktiver-passordlos-autentisering-i-azure\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Passwordless Authentication in Azure Active Directory.\"})})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Why go passwordless?\"}),/*#__PURE__*/e(\"p\",{children:\"Before we delve into how you can start your passwordless journey, here's a graph illustrating Microsoft's stance on passwordless authentication VS. password and two-factor authentication:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"Microsoft believes that passwords make it easy for hackers to access your account, since it's something that can be guessed. From the illustration, we can see that multi-factor authentication is very secure, but not very convenient. Passwords can be easily forgotten, but it can also be clumsy and cumbersome to chase after the person who has received a code on their mobile.\"}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, passwordless authentication is both secure and convenient, not only for users, but also for IT administrators. Simply because this will reduce the time spent on resetting forgotten passwords.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some of the benefits of passwordless authentication:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased security:\"}),\" The risk of phishing and other attacks is reduced by eliminating passwords as an entry point for hackers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better user experience:\"}),\" A convenient way for users to access their data securely from anywhere.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Powerful insights:\"}),\" Administrators can capture users' passwordless activity with robust audit and logging capabilities.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"IT provider with full or shared responsibility?\"}),/*#__PURE__*/e(\"p\",{children:\"Passwordless authentication is a gift when it comes to both user-friendliness and security for organizations. However, before diving into this new IT-secure world, you should carefully consider your business needs and calculate what will be the best method for you.\"}),/*#__PURE__*/t(\"p\",{children:[\"Regardless of what you choose, a strong defense against IT threats should be a priority for all organizations. Since all organizations are different and have different IT solutions, you can choose between \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/fullt-ansvar\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"full\"})}),\" or \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/delt-ansvar\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"shared responsibility with us\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\".\"}),\" Our IT experts guide you to a safe and secure IT everyday.\"]})]});export const richText9=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Procano is proud to announce that on June 21, we were recertified for three more years.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"Milj\\xf8fyrt\\xe5rn is Norway's most widely used certificate for businesses that want to document their environmental efforts and demonstrate social responsibility. Being a Milj\\xf8fyrt\\xe5rn entails systematic work on environmental measures in everyday life. Businesses meet requirements and implement measures for more environmentally friendly operations and a good working environment.\"}),/*#__PURE__*/e(\"p\",{children:\"Milj\\xf8fyrt\\xe5rn has customized requirements for different industries, and the certificate is awarded after an independent assessment. Annual environmental reports are submitted, and every three years, the business is recertified. The certificate is recognized by the authorities for public procurement.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://www.procano.com/om-oss\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read about how we can be your new IT supplier.\\xa0\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Procano has been a Milj\\xf8fyrt\\xe5rn since 2010. This means that we have an action plan for our environmental measures:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We sort our waste\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We ensure the return and recycling of our own and our customers' electronic waste\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We are conscious of our energy usage\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We set environmental requirements for our suppliers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Our data centers on the ground and in the cloud are certified according to the international standard for environmental management - ISO 14001.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Procano focuses on environmental work and continuously takes environmental responsibility in practice!\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://rapportering.miljofyrtarn.no/stats/127844\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read more about the certificate here.\\xa0\"})})})})]});export const richText10=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Do you use a couple \u2013 three passwords in different variations? Perhaps with 123 or !? at the end? Do you have more than five user accounts? Put down what you have in your hands, read the blog post, and get yourself a password manager!\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Keep your tongue straight in your mouth\"}),/*#__PURE__*/e(\"p\",{children:\"Companies often have hundreds of accounts to keep track of, and even the average person likely has dozens of different passwords to manage. Remembering all the different strong passwords is almost impossible without resorting to some kind of trick.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Our best trick is to invest in a Password Manager. That way, you don\u2019t have to remember the passwords for each account. Additionally, it will be able to generate secure, random passwords for you and remember them so that you don\u2019t have to.\"}),/*#__PURE__*/e(\"p\",{children:\"A password manager stores your login information for all the websites you use, and helps you log in automatically. A password manager encrypts your password database with one master password. And this master password is the only one you need to remember!\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Passwords should not be reused!\"}),/*#__PURE__*/e(\"p\",{children:\"There are many things that can be reused, but passwords are not one of them. Reusing passwords is a serious problem for many companies because of all the password leaks that occur every year.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://komputer.no/sikkerhet/datasikkerhet/facebook-og-linkedin-data-til-en-milliard-kontoer-lekket\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Even large websites like Facebook and LinkedIn experience significant data breaches from time to time\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\".\"}),\" Earlier this year, it was reported that there were data from 1.1 billion accounts for sale on the dark web.\"]}),/*#__PURE__*/e(\"p\",{children:\"When your password is leaked, the thief has an email address, a username, and/or a password combination they can try on other websites. This means that if you use the same login information everywhere, one leak on one website can give people access to all your accounts.\"}),/*#__PURE__*/e(\"p\",{children:\"To\\xa0 prevent your passwords from being guessed, you must use unique passwords on all websites. These should be strong passwords; long, unpredictable passwords that contain numbers and symbols.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://framer.com/no/blog/kom-i-gang-med-multifaktorautentisering\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read here about how you can get started with multifactor authentication.\\xa0\"})})})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"How does a password manager work?\"}),/*#__PURE__*/e(\"p\",{children:\"When you use a password manager and need to log into a website, you visit the website as usual. Instead of typing the password for the website, you enter your master password into the password manager, which will then fill in the correct information. (Provided that you have stored\\xa0your contact information in the password manager, of course.)\"}),/*#__PURE__*/e(\"p\",{children:\"When you are creating a new account, most password managers will offer to generate a secure and random password for you, so you don\u2019t have to think about it either. Some managers can also be set up to automatically fill in address, full name, and email.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://www.procano.com/sikkerhet\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Learn more about how we can help you with IT security.\\xa0\"})})})})]});export const richText11=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"A cloud is not just a cloud. \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/skytjenester\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"There are different types of cloud solutions \"})})}),\"and here we explain the difference between private, hybrid, and cloud!\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Private Cloud - my precious\"}),/*#__PURE__*/e(\"p\",{children:\"Private Cloud is your own data center that you own and control. You have full control over data, but you are also limited to the performance you have purchased.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:'Let\\'s say you have purchased a server with two processors, 48 GB of memory, and 2000 GB of storage. This is your data, and that means only you can store files on this server. You can therefore be completely sure that you are working in accordance with storage requirements, and that no one can \"tamper\" with your server.'}),/*#__PURE__*/e(\"p\",{children:\"The downside, however, is that sometimes you need a little extra power. Perhaps even twice a month, just to run payroll. In a private cloud, you do not have the ability to adjust storage space in a flexible way, so the only option you have is to permanently buy two new processors. With more servers, you will also have to consider infrastructure and server storage such as network, power, cooling, and space.\"}),/*#__PURE__*/t(\"p\",{children:['If you think that Private Cloud is a solution that suits you, but you lack cooling or space for the server, you can rent the data power from our \"Private Cloud\" data rig. We take responsibility for the infrastructure and storage, and you still reserve resources on a semi-permanent basis.',/*#__PURE__*/e(\"span\",{children:\"\\xa0\"})]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/t(\"span\",{children:[\"Hybrid Cloud - \",/*#__PURE__*/e(\"em\",{children:\"yes, please both\"})]})}),/*#__PURE__*/t(\"p\",{children:[\"With a Hybrid Cloud, you combine your own server solution with services from the cloud. This solution is flexible and suitable for those who think \",/*#__PURE__*/e(\"em\",{children:\"\u201CYes, please both.\u201D\"})]}),/*#__PURE__*/e(\"p\",{children:\"With a Hybrid Cloud, you can move some of your services or programs. For example, you can move your mail to Microsoft 365, but you keep, for example, files, applications on the server in the data center. Then, you get a hybrid IT environment where you let another party (most often public cloud) provide you with extra performance when you need it.\"}),/*#__PURE__*/e(\"p\",{children:\"Hybrid Cloud can also be a good option for those who have a stable Private Cloud, but need more power at certain times \u2013 such as year-end closing, payroll, or conducting a large event.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"With local server power expanded with temporary servers in the cloud, you get the extra server power you need, only when you need it.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/t(\"h2\",{children:[\"Public Cloud - \",/*#__PURE__*/e(\"em\",{children:\"sharing is caring\"})]}),/*#__PURE__*/e(\"p\",{children:\"If you choose a Public Cloud, you are using the server infrastructure of one of the major international players, such as Microsoft, Amazon, or Google.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Microsoft Azure is for many a well-known cloud service, which, among other things, delivers authentication to Microsoft 365, \",/*#__PURE__*/e(\"em\",{children:\"Azure Active Directory\"}),\".\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Microsoft Azure is also a cloud data center where you rent server power from Microsoft on an hourly basis. This is the cloud service that suits you if you want to move all your servers to the cloud.\"}),/*#__PURE__*/e(\"p\",{children:\"The benefits of using Microsoft include the ability to continuously scale up and down performance as needed. At the same time, you can turn off services you do not use. For example, you can choose to turn off the server between 5:00 PM \u2013 7:00 AM when the office is closed. The downside of a public cloud is that you no longer have control over who visits the server and the data room \u2013 the server is simply no longer private. But, on the other hand, sharing is also caring.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"We move the company's server to the cloud! \"}),/*#__PURE__*/e(r,{href:\"https://outlook.office365.com/owa/calendar/motebooking@procano.com/bookings/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:/*#__PURE__*/e(\"em\",{children:\"Talk to Morten about the cloud service that suits you.\"})})})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"})]});export const richText12=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"It pays to work systematically and smartly with IT security in 2021. There are many ways to do this \u2013 one of them is the NIST Cyber Security Framework!\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"What is NIST CSF?\"}),/*#__PURE__*/t(\"p\",{children:[\"NIST Cyber Security Framework (CSF) is a framework used to work systematically with IT security. It is NIST, or the National Institute of Standards and Technology, that \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"has developed the framework consisting of five pillars.\"})]}),/*#__PURE__*/e(\"p\",{children:\"With NIST CSF as a framework, it is about continuously working to identify threats and prepare the company for incidents that threaten IT security. The framework has clear recommendations on what should be in place within the five pillars.\"}),/*#__PURE__*/e(\"p\",{children:'It is also common to conduct a GAP analysis to map risk areas and the degree of risk; Where are we today, where should we at least be, and what is the recommended level? Then measures are implemented to work to cover \"the gaps\".'}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Who can execute NIST CSF?\"}),/*#__PURE__*/e(\"p\",{children:'NIST CSF does not need to be performed by someone with heavy technical expertise, but someone with good knowledge of the company\u2019s IT structure and routines. Many IT providers offer some form of GAP analysis, and these are usually carried out according to the \"two major\" frameworks; CIS 20 and NIST CSF.'}),/*#__PURE__*/t(\"p\",{children:[\"If you are someone who likes to try things yourself, you can buy various ready-made tests online, or you can find the entire framework on NIST's websites; \",/*#__PURE__*/e(r,{href:\"https://www.nist.gov/cyberframework\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Cybersecurity Framework | NIST.\\xa0\"})})})]}),/*#__PURE__*/t(\"p\",{children:[\"If you like to spend your time on things other than measures and frameworks for IT security, you can always \",/*#__PURE__*/e(r,{href:{webPageId:\"Z9U_Z1BA_\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"call our IT guru, Morten \u2013 he will help you!\"})})})]}),/*#__PURE__*/t(\"p\",{children:[\"Are you working on NIST CSF and are stuck? \",/*#__PURE__*/e(r,{href:{webPageId:\"Z9U_Z1BA_\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Then Morten is also the man to contact.\"})})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"})]});export const richText13=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"To work effectively and purposefully with IT security, the NIST Cyber Security Framework (CSF) is often used.\"}),\" NIST stands for National Institute of Standards and Technology and has developed various frameworks for working with IT security. These are the five pillars of NIST CSF; identify, protect, detect, respond, and recover.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"h2\",children:[/*#__PURE__*/e(\"h2\",{children:\"Identify\"}),/*#__PURE__*/t(\"p\",{children:[\"If you do not have an overview of your devices, you cannot implement measures to protect them.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:'For example: It becomes known that \"Printer 123\" has a vulnerability affecting IT security. Then it is important to know whether you have such a printer or not! This applies not only to devices but also to software. '}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:'The first pillar of NIST is therefore to \"identify\". This involves identifying problems and vulnerabilities by mapping the environment. This is a complete overview of users, devices, and systems for all employees and suppliers. The overview is compiled along with a comprehensive risk assessment of IT security.'}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"h2\",children:[/*#__PURE__*/e(\"h2\",{children:\"Protect\"}),/*#__PURE__*/t(\"p\",{children:[\"Always prepared, they say in scouting. We sometimes say this in Procano as well. Always be prepared for new threats and continuously work to keep the threat landscape low.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),'Pillar number two is about \"protecting\" against potential threats. This involves proactive work to protect users, devices, and systems. This is done with continuous improvements, training, good onboarding, maintenance, and systematic processes.']}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"h2\",children:[/*#__PURE__*/e(\"h2\",{children:\"Detect\"}),/*#__PURE__*/e(\"p\",{children:\"The third pillar of the NIST CSF is about detecting intrusions, abnormal activities, and potentially harmful activities on the network. To do this, all processes must be logged and regular monitoring of all services and processes must occur. In this way, abnormal activity can be detected, both through AI tools and manual checks.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"h2\",children:[/*#__PURE__*/e(\"h2\",{children:\"Respond\"}),/*#__PURE__*/t(\"p\",{children:[\"When unnatural activity occurs, it\u2019s about responding \u2013 quickly! It\u2019s essential to plan well in advance; \",/*#__PURE__*/e(r,{href:{pathVariables:{x3B6qHsY2:\"hva-er-en-it-policy-og-hvorfor-m\\xe5-du-ha-det\"},unresolvedPathSlugs:{x3B6qHsY2:{collectionId:\"iR73Jdb5N\",collectionItemId:\"vniIbOXjd\"}},webPageId:\"V5aJw9uTs\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"management can see what is stated in the IT policy,\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\" \"}),\"and employees can refer to the IT instructions.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"To respond effectively, you should have a plan that can answer the following:\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What should an employee do when something strange happens on the PC?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Who should the employees notify?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What should happen to the PC in the meantime?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What routines should the IT manager follow?\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),\"For larger companies, one should also find answers to: Who handles the media, should it be reported to authorities, and should all computers be cleaned immediately? (hint: no).\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"h2\",children:[/*#__PURE__*/e(\"h2\",{children:\"Recover\"}),/*#__PURE__*/t(\"p\",{children:[\"After a breach of IT security, it is necessary to restore normal operations as quickly as possible. \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"It can cost the company a lot of money not to have good routines in place,\"}),\" so it is important that all parties involved are aware of the internal guidelines for IT security.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"When restoring the company's IT environment, it\u2019s all about BACKUP! The fifth pillar concerns documenting procedures for backup, testing of backup, and recovery of it. The procedures should provide reasonable and understandable answers to questions such as; which systems are critical for our company, and if I have multiple servers \u2013 how should I prioritize during data recovery?\"})]})]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Wondering how to proceed to establish good routines for IT security? \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(r,{href:{webPageId:\"Z9U_Z1BA_\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(a.a,{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Contact us here\"}),\" for a pleasant security chat!\"]})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText14=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.nsr-org.no/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Every other year, the Dark Figure Survey is published on behalf of the Business Security Council (NSR)\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\".\"}),\" These are the seven security recommendations you should address starting today.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"1. Protect email and browser\"}),/*#__PURE__*/e(\"p\",{children:'Several preventive technical measures protect the transport of emails between servers to reduce the risk of breaches of confidentiality, integrity, and emails with a false sender address. These measures are described under principle 2.8 \"Protect Email and Browser\".\\xa0'}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"2. Use malware scanning on emails and attachments\"}),/*#__PURE__*/e(\"p\",{children:'Use automated tools to analyze incoming messages,\\xa0message attachments, and clickable links in these to uncover malware and\\xa0other threats. This is described in measure 3.1.3 under principle 3.1\\xa0\"Detect and remove known vulnerabilities and threats\".'}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"3. Mark unsafe/suspicious messages\"}),/*#__PURE__*/e(\"p\",{children:\"It can be helpful for users if messages are clearly marked if they have not been secured during transport between servers as described in point 1 of this list, or if they are identified as suspicious by the measure described in point 2 of this list.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"4. Authentication of users\"}),/*#__PURE__*/e(\"p\",{children:\"An attacker can also gain access to the email system by exploiting a user's access and sending messages with malware from the internal user. In this way, the attacker can bypass some of the preventive security measures mentioned earlier in this list. NSM's principle 2.6 \\\"Have control over identities and accesses\\\" describes relevant measures.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"5. Provide users with training and better risk understanding\"}),/*#__PURE__*/t(\"p\",{children:[\"Although several layers of preventive technical security measures have been established, there is a risk that messages with malware or manipulation attacks end up in the user's inbox. Social manipulation works. \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Therefore, it is important that users have received training and have a security understanding that reduces the risk of being deceived.\"})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"6. Detect security breaches\"}),/*#__PURE__*/t(\"p\",{children:['For the attacker, it is just a matter of time. No matter how many layers of preventive security measures have been established, security incidents can affect all organizations. It is therefore essential to have established good and effective consequence-reducing measures. Rapid detection of security breaches is the best starting point for reducing the consequences of a security breach. Principles 3.2 \"Establish security monitoring\" and 3.3 \"Analyze data from security monitoring\" describe relevant measures that can be established to detect security breaches. ',/*#__PURE__*/e(r,{href:{webPageId:\"Z9U_Z1BA_\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Contact us if you want to know how we can help you set up good security solutions.\\xa0\"})})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"7. Manage incidents and restore normal operational situations\"}),/*#__PURE__*/e(\"p\",{children:'The last point in the review of scenarios is the handling of the unwanted incident. It allows for preparation for possible incidents with the aim that handling of such incidents can be carried out effectively. NSM\\'s principles in category 4 \"Manage and Restore\" focus on handling desired incidents, minimizing damage, eliminating the cause of the incident, and restoring the integrity of networks and ICT systems.'}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Source: \",/*#__PURE__*/e(r,{href:\"https://www.nsr-org.no/produkter-og-tjenester/publikasjoner/morketallsundersokelsen\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"The Dark Figure Survey 2020\"})})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"The Dark Figure Survey maps the IT conditions in private and public enterprises. The survey is unique in Norway and is an important contribution to mapping the extent of cybercrime and IT security incidents, as well as awareness about information security and the implementation of security measures in Norwegian businesses. The Dark Figure Survey is launched for the 12th time at the Security Conference 2020\"})})]});export const richText15=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Due to the ongoing pandemic, many people have to work from home. When employees work with the company's solutions outside the office, a number of security threats may arise\\xa0 - often because the leaders have not had enough focus on security training.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"The authorities warned early in the pandemic that we would see an increase in data attacks. Unfortunately, technology alone cannot stop the attacks. Most IT security breaches are related to the users. Therefore, it is especially important to educate your employees about a good security culture.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Phishing Attacks\"}),/*#__PURE__*/t(\"p\",{children:[\"One of the things we have seen the most in the past year is phishing attacks against companies. There has been a significant increase, where attackers often exploit the fear associated with the pandemic. Working from home means we do not show the same caution as we would at a desk in the office. More people are at home with their children and other family members, and they often open emails in situations where their minds are elsewhere. Attackers often pose as government officials or health authorities and try to extract information that can lead further into the company's databases. When you read emails in a situation where a lot is happening around you, it is easy to click on links before you understand what kind of email you have received. Therefore, it is very important to be extra vigilant now - especially when you receive emails from an unknown sender.\",/*#__PURE__*/e(\"span\",{children:\"\\xa0\"})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"span\",{children:\"CEO Fraud\"})}),/*#__PURE__*/e(\"p\",{children:\"Attackers have not only posed as public figures or companies but have also attempted a type of scam known as CEO fraud. In this type of fraud, the sender pretends to be the CEO or general manager of the company. In the emails, they often ask for help to purchase something online or provide sensitive information.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"There are various tools that can stop these types of emails. We at Procano can offer an AI-based Anti-Phishing protection as a solution.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"If you receive a suspicious email on your work email, we recommend notifying your immediate supervisor. This will both increase knowledge among your colleagues and make them more aware of these attacks.\",/*#__PURE__*/e(\"span\",{children:\"\\xa0\"})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"span\",{children:\"Secure Network\"})}),/*#__PURE__*/e(\"p\",{children:\"Now that most people are working from home, many feel the need to change their environment and therefore take an hour at a caf\\xe9, a library, or other similar locations. It is important to be cautious of the network you are connected to. Many are not aware that several hackers exploit open networks.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Devices that have previously been connected to a wireless network will automatically search for the same network again. Hackers often create copies of wireless networks that you find in public places. They do this so that your device recognizes the copy of the network and connects your device to it. Once you are connected to the network, the hacker has access to your data. It is very easy to be lured into such a situation.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"VPN for the Company's Network\"}),/*#__PURE__*/e(\"p\",{children:\"As a leader in a company, it is important to think about the security of company information at home. By setting up an encrypted tunnel between your home office and the company's network, a so-called VPN, the security for the company is guaranteed. This way, secure access to the company's data and applications is achieved.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"The company can also set up a secondary point, a so-called DNS protection, where all traffic from the PC is routed through a central server. This server will monitor where you are going to protect the traffic even at home.\",/*#__PURE__*/e(\"span\",{children:\"\\xa0\"})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"span\",{children:\"Updated Equipment\"})}),/*#__PURE__*/e(\"p\",{children:\"Are you among those who click \u201Cupdate later\u201D when your Mac or PC wants to update? You should not do this. It is important to follow the security updates that come from the vendor, both for the operating system and software. The updates may contain a fix for a previous security vulnerability.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"span\",{children:\"Do Not Download Unknown Software\"})}),/*#__PURE__*/e(\"p\",{children:\"If you let your children download unknown games or apps on your work PC, it can pose a significant risk to the company. The games or apps may contain malicious software or provide criminals access to the company's solutions.\"}),/*#__PURE__*/e(\"p\",{children:\"Finally, the most important tip is to think twice: Stop - Think - Investigate before you click.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Does your company need assistance with IT security? We at Procano have extensive and solid expertise in the field. \"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:{webPageId:\"Z9U_Z1BA_\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Contact us for a review of your IT security.\"})})})})]});export const richText16=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Teams is a collaboration tool from Microsoft\"}),\" with a complete solution for online meetings, team collaboration, and chat. The platform is Microsoft\u2019s fastest-growing service with several million daily users. Over the last year, there has been a significant increase in the number of Teams users. Below, we have gathered 7 simple tips on how you can hold more effective and good meetings in Teams.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"1. Keep control of meetings with the calendar in Teams\"}),/*#__PURE__*/e(\"p\",{children:\"With the calendar in Teams, you can keep track of the meetings scheduled throughout the week. By hovering your mouse pointer over the appointment, you can see the agenda for the meeting. You can synchronize Teams with Outlook for a full overview.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"2. Use the camera\"}),/*#__PURE__*/e(\"p\",{children:\"Even if you cannot meet in the same room, you can see each other over the camera. Encourage meeting participants to use the camera so you can see each other's facial expressions. If you are in a place with a lot of background noise, you can use custom backgrounds in Teams or make the background blurry.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"3. Record the meeting\"}),/*#__PURE__*/e(\"p\",{children:\"Is there anyone who cannot participate exactly when the meeting is held? Then you have the opportunity to record the meeting that you can share with others.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"4. Collaborate over Teams in Office 365\"}),/*#__PURE__*/e(\"p\",{children:\"The programs in Office 365 are integrated into Teams so that colleagues can work together on different files. This makes projects more efficient and prevents halting if an important person in the project is absent for various reasons. You can both share and work together on different files in meetings and channels. Additionally, the integration with Office programs gives you access to all documents no matter where you are, and you have automatic backup of your work in OneDrive.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"5. Keep an eye on meeting time\"}),/*#__PURE__*/e(\"p\",{children:\"How many times have you experienced going over the scheduled meeting time? Teams has included a warning when there are 5 minutes left in the scheduled meeting, so you get a reminder to wrap up the meeting.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"6. Good equipment makes you seen and heard better in meetings\"}),/*#__PURE__*/e(\"p\",{children:\"Who hasn't experienced a meeting participant having poor sound or a camera that makes them not look like themselves? There is equipment that is Teams certified and greatly enhances the user experience in Teams.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:'7. \"Together mode\"'}),/*#__PURE__*/e(\"p\",{children:\"In Norwegian, it is called sammen-modus in Teams. This feature makes conversations feel more natural and engaging. This feature allows you to apply a filter that makes it look like the meeting participants are sitting in a room. Microsoft launched this feature with the goal of bringing people closer together while sitting apart. You can choose from environments adapted to the holidays or environments where you can, for example, gather your team in a caf\\xe9, a conference room, or a classroom, to name a few.\\xa0\"})]});export const richText17=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"A year after Microsoft 365 was announced, the name changes to the services are still causing confusion. \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Here is the difference between Microsoft 365 and Office 365 \u2013 simply explained.\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[\"On April 12, 2020, Microsoft announced that all their services would be branded under the company name. What caused some confusion was that some of the Office 365 plans were continued \",/*#__PURE__*/e(\"em\",{children:\"without\"}),\" name changes. When they also introduced the new plan Microsoft 365, and announced that Office 365 would be included in this, the internet began to ask a number of questions. Enough talk \u2013 this is the difference:\"]}),/*#__PURE__*/e(\"p\",{children:\"Office 365 and Microsoft 365 are cloud-based services offered by Microsoft. Office 365 is included in Microsoft 365, which also includes a number of other applications for security and collaboration. In short.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Microsoft 365 makes businesses more IT-secure\"}),/*#__PURE__*/e(\"p\",{children:\"Our media habits are constantly changing, and that means that large companies like Microsoft are adapting their products and services according to how the digital everyday looks. We work more remotely than before, which has created a greater need for secure and integrated platforms for collaboration.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The trend for businesses has long been the migration to the cloud. Moving from the server room to the cloud has created a greater security need for, among other things, the processing of sensitive information and the identity of users.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{style:{\"--framer-font-size\":\"20px\"},children:\"IT security solutions in Microsoft 365\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft has added several security solutions in Microsoft 365 Business. These are advanced solutions designed to safeguard the complete IT security of the business.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-decoration\":\"underline\"},children:\"These are the available security features in Microsoft 365 Business:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data Loss Prevention\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Exchange Online Archiving\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Office 365 Message Encryption\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Microsoft Defender for Office\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Azure Information Protection\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Microsoft Endpoint Manager (Intune)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conditional Access\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Azure Active Directory Premium Plan 1\",/*#__PURE__*/e(\"span\",{children:\"\\xa0\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"span\",{children:\"Faster workflow with AI (Artificial Intelligence)\"})}),/*#__PURE__*/e(\"p\",{children:\"Another difference between Office and Microsoft 365 is that the latter utilizes artificial intelligence. Microsoft 365 AI collaborates with powerful cloud-based applications that use customer data and insights, and also includes an integration with LinkedIn.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The AI features come in the form of:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Machine learning and analytics that take all the data your business brings in, analyzes it to identify patterns that help you optimize operations.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Intelligent search features on Bing make it easier than ever to find what you are looking for, whether on the internet or in an image.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cortana, an intelligent assistant, saves you time by taking care of the details related to a tailored productivity assistant.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Complete solution from Procano\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"We were among the first to move to the cloud\"}),\", and today are one of the few companies globally that work directly with Microsoft to develop Microsoft 365. We are one of Norway's leading providers of Microsoft 365. IT security is a top priority in everything we do, which is reflected in all our Microsoft 365 packages.\"]}),/*#__PURE__*/e(\"p\",{children:\"Our complete solution includes backup that allows for the restoration of all data related to Exchange, OneDrive, SharePoint, and Teams, should they be lost. This occurs through a third-party service that is stored on infrastructure entirely independent of the Microsoft platform.\\xa0\"})]});export const richText18=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Culture. A collective term for thoughts or behavioral patterns that a group of people shares. We use it at several system levels such as Norwegian culture, subculture, and corporate culture. In this post, we will take a closer look at why everyone should build a good (and secure) \"}),/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"IT culture\"})}),/*#__PURE__*/e(\"strong\",{children:\".\"})]}),/*#__PURE__*/t(\"p\",{children:[\" Cultures can arise by themselves or through unwritten rules or guidelines. A house rule can be something as banal as: \",/*#__PURE__*/e(\"em\",{children:'\"When we play Ludo at the cottage, it is always the youngest player who starts.\"'}),\" Surprisingly, this is not the case in all families \u2013 some rotate turns to start, and in some, it\u2019s first come, first served...\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"To ensure that the game night is successful and to avoid disagreements halfway through the game, we have \",/*#__PURE__*/e(\"em\",{children:\"game rules.\"}),\" The game rules are what we must adhere to in order to actually be able to play, and the house rules are guidelines or small adjustments that one adapts to the gaming style, the setting, or skill level, etc. The Code of Conduct is \",/*#__PURE__*/e(\"em\",{children:\"the house rules\"}),\" of the company.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"The Code of Conduct is the house rules\"}),/*#__PURE__*/e(\"p\",{children:\"The Code of Conduct is the document that defines the company's expectations for how employees should behave in everyday life. It reflects the company's overall corporate culture, core values, and daily operations.\"}),/*#__PURE__*/e(\"p\",{children:\"The house rules aim to safeguard the company's market position, integrity, and protect risk areas. It turns out that the most effective way to achieve this is by creating an inclusive IT culture! And to create an inclusive IT culture that aligns with the company's other goals, expectations and house rules must be defined by management.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"It is important to remember that an inclusive IT culture is not created by a Code of Conduct alone \u2013 it must also be created through social and professional arenas. This can include kick-offs, training, seminars, internal competitions, and similar activities.\"})})}),/*#__PURE__*/t(\"p\",{children:[\"We recommend all companies \u2013 regardless of size \u2013 to create a Code of Conduct. The goal is to make the core values and vision available to the employees, so that everyone is constantly working towards a common goal. It does \",/*#__PURE__*/e(\"em\",{children:\"not\"}),\" need to be long or complicated. It is better to have \",/*#__PURE__*/e(\"em\",{children:\"something\"}),\" than to have nothing at all.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(255, 255, 255)\"},children:\"The benefits of a Code of Conduct\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(255, 255, 255)\"},children:\"A good IT culture consists of a set of values, norms, and perceptions of reality. The values are what is perceived as important to strive for, the norms are the social rules that determine which attitudes, actions, and behaviors are considered acceptable or unacceptable. The perception of reality is the employees' views on what happens around them.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(255, 255, 255)\"},children:\"The combination of these points will make employees feel responsible and have ownership over their own company, and the value sets will slowly but surely become a natural extension of the choices they make. This can be visible through the demands placed on quality and deliveries, how and what governs processes, and the internal security routines.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{style:{\"--framer-font-size\":\"20px\"},children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-decoration\":\"underline\"},children:/*#__PURE__*/e(\"strong\",{children:\"What can happen if the company has a Code of Conduct?\"})})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The company can have a greater impact on employees' attitudes towards their own workday\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduced absenteeism is reflected by employees who thrive and have a clear purpose\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Projects and collaborations (internally and externally) have more favorable progress\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Purchases and investments align with the company's house rules\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Partners and suppliers are chosen based on the company's values\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Employees help protect areas that are vulnerable to data attacks through simple security routines in daily life\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increased reputation allows for a stronger market position\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:{webPageId:\"P6yzF3KqW\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read more about how we can help your company with IT security and how to build a good internal IT culture.\\xa0\"})})})})]});export const richText19=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"All businesses need an overview of the company's IT security policies\"}),\". An IT policy ensures good decisions that protect security \u2013 across the organization.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"What is an IT policy?\"}),/*#__PURE__*/t(\"p\",{children:[\"An IT policy is the management's governing document for IT security within the organization. The policy describes the long-term guidelines and priorities that the company will follow to \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"ensure good IT security in the company\"}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"The IT policy should describe, in a clear and simple manner, the considerations and security principles that the organization uses to protect its goals and values. The policy should include an overview of the overarching security goals for the company and address the risk areas of the business. A good tip is to include some measurable targets so that one can go back after a while to assess whether the policy is sufficient.\"}),/*#__PURE__*/e(\"p\",{children:\"The IT policy lays the foundation for the company's IT instructions, and therefore the policy should not address detailed guidelines, routines, various security measures, or describe the use of technology. This information should be found in the IT instructions.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"For the policy to function as a useful IT tool, it is important that it is anchored in \",/*#__PURE__*/e(\"em\",{children:\"the entire\"}),\" company \u2013 not just at the management level. The policy must be made available to employees so that they can familiarize themselves with it and work according to the guidelines it contains. An IT policy should be short, concise, and ideally not described in more than two A4 pages.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"Why do you need an IT policy?\"}),/*#__PURE__*/e(\"p\",{children:\"As mentioned, the IT policy is the management's governing document for IT security, and the IT instructions describe the guidelines and security measures in detail. So if there is a detailed instruction, why then is a policy necessary?\"}),/*#__PURE__*/t(\"p\",{children:[\"Well, the IT policy provides all departments within the company a common security platform to work from. \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"With a set of common guidelines, good decisions and consistent choices regarding IT security can be made\"}),\". This simplifies the process when purchasing digital services and equipment, or entering into supplier agreements and new collaborations.\"]})]});export const richText20=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Two-factor authentication is one of the most important measures a company can take to ensure proper IT security. This overview explains what you need to know about two-factor authentication.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"What is two-factor authentication?\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Two-factor authentication simply means that two or more authentication methods are required to log into a digital platform.\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Authentication methods\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Something you are \u2013 such as facial recognition or fingerprints\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Something you know \u2013 password, security questions, PIN code\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Something you have \u2013 card, token or phone\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"An example of a combination of multiple authentication methods is when you withdraw money from an ATM: You have a bank card and a PIN code. If your bank card is stolen, it will not be possible to withdraw money without the code, or vice versa, because you need the bank card in addition to the PIN code.\"}),/*#__PURE__*/t(\"p\",{children:[\"An additional example is if you are logging into \",/*#__PURE__*/e(\"span\",{children:\"Microsoft 365\"}),\". Then, it is not enough to just enter your password. After entering your password, you will receive a code via SMS, phone, or app. The code you receive must be entered to access your account. For the sake of clarity, we recommend using an app for two-factor authentication on Microsoft 365.\"]}),/*#__PURE__*/e(\"p\",{children:\"To log into your account, you must therefore have both the password and access to the phone with the registered phone number. In this way, two-factor authentication provides an extra level of security for logging in.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Two-factor authentication, two-step verification, two-step confirmation, \",/*#__PURE__*/e(\"span\",{children:\"MFA\"}),\" or 2FA? A beloved child may have many names, but the message remains the same: Verification with more than one step is one of the most important measures a company can take for good IT security!\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"Who needs two-factor authentication?\"}),/*#__PURE__*/e(\"p\",{children:\"The short answer to this is: Everyone, always \u2013 without exception! Two-factor authentication is important for both businesses and individuals who use digital platforms in their daily lives. Do not hesitate to activate two-factor authentication! Two-factor authentication is the extra security level that will prevent unauthorized access to the company\u2019s, and your personal, (sensitive) information, even if they manage to obtain the password.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Remember that there is also a risk of IT security breaches when using apps and platforms such as Email, Instagram, LinkedIn, Facebook, your bank, or other investment platforms and the like.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"Why do I need two-factor authentication?\"}),/*#__PURE__*/e(\"p\",{children:\"It is easy to think that \u201Cas long as my password is securely stored, I also have good IT security.\u201D But today there are countless ways to access your information, and passwords can be solved if someone knows your email address, full name, date of birth, or phone number.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"And about half of all IT security breaches in \",/*#__PURE__*/e(r,{href:\"https://www.nsr-org.no/aktuelt/m%C3%B8rketallsunders%C3%B8kelsen-2020\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(a.a,{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"The Dark Figure Survey 2020\"}),\" \"]})}),\" were human. Poor IT security can lead to serious consequences for you, your customers, suppliers, and partners.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"To prevent unauthorized access to your digital platforms, it will always be safer to use login with more than one step. And with two-factor authentication, the password alone will not work, because you need an additional variable that only you have access to, such as your phone or fingerprint. \"}),/*#__PURE__*/t(\"p\",{children:[\"We recommend thinking zero trust \u2013 that you \",/*#__PURE__*/e(\"em\",{children:\"always\"}),\" expect that the password has been leaked. It is a bit like going back to the front door to double-check that you actually locked it.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"How do I activate two-factor authentication?\"}),/*#__PURE__*/t(\"p\",{children:[\"All major (and serious) internet services support two-factor authentication, and this should \",/*#__PURE__*/e(\"em\",{children:\"always\"}),\" be one of the requirements when choosing a new digital service provider!\"]}),/*#__PURE__*/e(\"p\",{children:\"We previously mentioned how two-factor authentication works for Microsoft 365. For our customers, we always use something called \u201CConditional Access.\u201D This gives us control over who logs into which service by using parameters such as: which user, which location, which service? For example, if you log into a service at the office (secure location), you do not need two-factor authentication, but if you attempt to log in from abroad (unsecure location), you must always verify yourself with one or more steps.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"Ready to activate two-factor authentication?\"}),/*#__PURE__*/t(\"p\",{style:{\"--framer-font-size\":\"17px\"},children:[\"On\",/*#__PURE__*/e(\"span\",{style:{\"--framer-font-size\":\"17px\",\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\" \"}),/*#__PURE__*/e(r,{href:\"https://nettvett.no/2-trinns-bekreftelse/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-font-size\":\"17px\",\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Nettvett.no\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-font-size\":\"17px\",\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\" \"}),\"you will find a good overview of how to activate two-factor authentication for the most common platforms!\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:{webPageId:\"P6yzF3KqW\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read more about IT security on our security pages \u2192 \\xa0\"})})})})]});export const richText21=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Poor IT security in your business can lead to serious consequences for you, your customers, suppliers, and partners. With more and more companies relying on technology to conduct business, IT security becomes a critical Achilles' heel \u2013 even for small businesses. It can cost you dearly.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Damaged reputation and trust\"}),/*#__PURE__*/e(\"p\",{children:\"If your company experiences a breach of IT security, it can have more consequences than those directly related to financial loss. A breach of IT security can also lead to a damaged reputation and, at worst, undermine the trust that the business has built over many years of marketing and reputation-building.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In cases where sensitive information has been compromised, the biggest consequence may be that partners withdraw and customers terminate their relationships. For smaller businesses, this could mean the end of the road, as the costs required to restore the reputation become too high.\"}),/*#__PURE__*/t(\"p\",{children:[\"It is extensive and extremely resource-intensive, for both large and small businesses, to initiate this type of damage control to restore a tarnished reputation. This applies to existing customers, but it can also make it difficult to land \",/*#__PURE__*/e(\"em\",{children:\"new\"}),\" ones.\"]}),/*#__PURE__*/e(\"p\",{children:\"If the breach of IT security is also reported in the media, the effort to regain trust will be extensive and enormously resource-intensive for both large and small businesses.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Stolen digital access and lost income\"}),/*#__PURE__*/e(\"p\",{children:\"Yes, there are digital thieves. In reality, there is no real difference between having your phone stolen at a caf\\xe9 or losing access to passwords.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Digital thieves continually find new ways to steal passwords, gain access to files, and download sensitive data. The information they steal can, for example, be sold to your competitors. In many cases, the thieves \u201Ckidnap\u201D your data and lock it behind a code. The only option the company has is to pay the attacker to regain the information and/or prevent it from being leaked or sold. This attack is called ransomware.\"}),/*#__PURE__*/e(\"p\",{children:\"Today, most companies rely on \u2013 in one form or another \u2013 digital solutions in their daily operations, such as cloud storage of files and email. (Cloud storage is actually as vulnerable to attacks as traditional storage, but many forget to back these up.) If access is restricted or stopped, one may find they cannot perform their work, which can again lead to lost earnings for the company. This can involve costs related to employees who cannot produce or the business failing to deliver goods or services as agreed.\"}),/*#__PURE__*/e(\"p\",{children:\"Companies may find themselves victims of theft of sensitive information from outsiders or former employees. Therefore, always remember to change passwords and revoke access from employees when the employment relationship ends! Good offboarding procedures for former employees or partners are therefore important for all businesses.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"IT security breaches cost an average of 85,000 kroner\"}),/*#__PURE__*/e(\"p\",{children:\"Data attacks can strike anyone, and they can come in various forms. Some companies are not even aware that they have a serious breach of IT security until long after it has occurred. Returning to normal operations can cost businesses dearly and damage both the economy and credibility of the company.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.nsr-org.no/aktuelt/m%C3%B8rketallsunders%C3%B8kelsen-2020\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"The Dark Figure Survey from 2020\"})})}),\" shows that 14% of the businesses in the survey have experienced breaches of IT security that have resulted in financial loss or a weakened market position. Among these, the average cost for the most severe breaches of IT security in 2019 was nearly 85,000 kroner. Those hardest hit that year estimated costs of 5 million kroner.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Remember good IT security procedures\"}),/*#__PURE__*/t(\"p\",{children:[\"Good IT security is more than just activating two-step verification or changing your password every 12 to 15 months. The Dark Figure Survey from 2020 shows that about half of all security breaches are due to human error, and \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"we therefore recommend that businesses develop a clear IT policy with guidelines and internal and external procedures\"}),\". The IT policy should be signed by the company\u2019s employees, suppliers, and partners. A good rule of thumb is to anchor the routines and guidelines internally. It may also be wise to assign this responsibility to one or more persons in the company, so the routines are followed up?\"]})]});export const richText22=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Do you know how your company has secured itself against data attacks when employees are on the go or working from home?\"}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(r,{href:{pathVariables:{x3B6qHsY2:\"it-sikkerhet-p\\xe5-hjemmekontor-er-du-klar-over-sikkerhetstruslene\"},unresolvedPathSlugs:{x3B6qHsY2:{collectionId:\"iR73Jdb5N\",collectionItemId:\"VMRhZGFsN\"}},webPageId:\"V5aJw9uTs\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(a.a,{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"When employees work outside the four walls of the office, the company's data is more vulnerable to hacking, viruses, and data breaches\"}),\";\"]})}),\" What happens if the PC is stolen, the hotel network is hacked, or a partner gets a virus that infects other computers at home? Digital hygiene protects the company in the same way that hand hygiene protects our health!\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"span\",{children:\"Equally affected by data breaches\"})}),/*#__PURE__*/t(\"p\",{children:[\"Small and medium-sized enterprises are affected by data breaches just as often as the largest companies, and the consequences can be just as severe for the business, customers, and employees\u2014regardless of size. Despite this, data security has often been given a higher priority by large companies. The most common reasons for this are the misunderstanding that IT security requires large implementation projects, and that it is complicated and expensive. \",/*#__PURE__*/e(\"br\",{}),\"We at Procano provide world-leading services in IT security technology that give smaller companies the assurance they need when employees work outside the office. The services are complemented by our skilled security consultants and partners, who continuously monitor and manage incidents. \",/*#__PURE__*/e(\"br\",{}),\"These are our two best tips for securing your business from the home office:\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Two-step verification for logging into Microsoft accounts\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Two-step verification (authentication) is an extra layer of security for logging in\"}),\". With two-step verification, you log in with something you know (your password) in addition to something you have (a code on your phone).\"]}),/*#__PURE__*/e(\"p\",{children:\"As of February 2020, most of our customers are already licensed to use two-step verification for logging into their Microsoft accounts. This is an additional security service, and it does not cost anything extra for the company.\"}),/*#__PURE__*/e(\"p\",{children:\"To activate two-step verification for logging into users' Microsoft accounts, we need to configure their Microsoft environment.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Upgrade to PRO PC Security Premium\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"PRO PC Security Premium provides the best security available on the market today.\"}),\" With this comprehensive security package, Procano covers five layers of security: Identity, Password, PC, Browser, and Data.\"]}),/*#__PURE__*/e(\"p\",{children:\"Our security center monitors and protects all PCs covered by PRO PC Security Premium 24/7-365. The team consists of over 90 security-certified technicians and averts thousands of attacks daily. Should misfortune occur, any ransom demand is covered with up to 1 million dollars in ransomware guarantee.\"}),/*#__PURE__*/e(\"p\",{children:\"The upgrade costs only 100,- per month and is made available immediately in your PRO PC Basic client.\"}),/*#__PURE__*/e(\"h2\",{children:\"The end user must practice internet safety\"}),/*#__PURE__*/e(\"p\",{children:\"All employees and companies must practice internet safety, but it is not enough in today\u2019s complex threat landscape. The greatest responsibility for safe IT security lies with the employer to establish internal routines and good digital solutions that compel increased data security.\"})]});export const richText23=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"For us at Procano, the environment and sustainability are important guidelines in everyday life. We believe that no one can do everything, but everyone can, after all, do a little. We take our social responsibility seriously and support the TV campaign in 2020!\"}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"We have been an Eco-Lighthouse certified company for many years,\"}),\"\\xa0 and we are because we want to do our part of the shared responsibility that contributes to a more environmentally friendly and sustainable IT industry. The small steps we can take today can make a big difference for our children, grandchildren, wildlife, and our planet.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"TV Campaign 2020\"}),/*#__PURE__*/t(\"p\",{children:[\"No less than eight million tons end up in the ocean every year! This threatens not only the animal and plant life that lives there but also us on land. This year's TV campaign aims to protect the world's oceans by reducing plastic emissions.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"By establishing new, and improving existing waste systems for more than 900,000 people, the TV campaign 2020 will combat plastic pollution in the sea. In collaboration with local communities, authorities, and businesses, plastic emissions in oceans and rivers will be reduced by 7,000 tons annually. \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"We will collect and recycle trash that currently ends up in nature, reduce the use of unnecessary plastic, and work for decision-makers to commit to achieving WWF's goal: zero plastic pollution by 2030!\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"We at Procano contribute 10,000 Norwegian kroner to the TV campaign 2020 \u2013 and simultaneously encourage our followers, customers, and partners to contribute along with us.\"]})]});export const richText24=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"We at Procano are excited to receive this year's award as Cisco Managed Services Partner of the Year 2020.\"}),/*#__PURE__*/e(\"div\",{children:\"We are proud to be in the company of Norway's largest IT companies. It is great to see that we are receiving recognition for our \\\"Network as a Service\\\" concept from the world's largest networking and security provider.\"}),/*#__PURE__*/e(\"div\",{children:\"\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"div\",{children:/*#__PURE__*/e(\"span\",{children:\"\u201CThis is a partner that has focused on Managed Services based on Meraki for several years in the Norwegian market. They continuously enhance and develop their services. Through a clearly recognizable message of secure and robust solutions delivered as a service, they attract customers across most verticals\u201D \"})}),/*#__PURE__*/t(\"div\",{children:[/*#__PURE__*/e(\"span\",{children:\"\u2013\\xa0\"}),/*#__PURE__*/e(r,{href:\"https://www.linkedin.com/posts/cisco_vi-vil-takke-alle-v%C3%A5re-partnere-for-%C3%A5ret-activity-6719986667157102592-eog_\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Cisco Partner\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"\\xa0\"}),\"Awards 2020\"]})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[\"For over 15 years, Cisco has been an important part of our ecosystem with products and services in infrastructure and security. With more than 1000 network installations distributed across Norway combined with modern and competitive security services, we received the trust declaration \",/*#__PURE__*/e(\"strong\",{children:'\"Cisco Partner of the Year: Managed Service Provider\".\\xa0'})]})]});export const richText25=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"In order to minimize waste and protect the environment, Lenovo has committed to recycling in everything they do. From batteries to obsolete products and energy to packaging - they have programs and improvement measures in place in all activities, including strict checks and control of third-party suppliers. Since 2005, they have processed over \",/*#__PURE__*/e(\"em\",{children:\"250,000 tons\"}),\" of components through their environmental agreement partners.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{children:\"Their system for end-of-life product management (PELM: Product End of Live Management) includes dismantling, reusing, refurbishing, reproducing, recycling, destructing, treating, and disposing of products and components when taken out of use, expire, or are discarded.\"}),\"\\xa0\",/*#__PURE__*/e(\"span\",{children:\"This includes both Lenovo-branded and non-branded products owned or approved by Lenovo.\"}),\" \",/*#__PURE__*/e(\"span\",{children:\"In 2018, we funded and managed the treatment of over 40,300 tons of Lenovo-owned data equipment and equipment returned from customers. Of these, 2.8% were reused as products or parts, 91.7% were recycled as materials, 3.2% were destructed by converting waste to energy, 1.1% were destructed as disposed, and 1.2% were disposed in landfills. As part of Lenovo's continuous improvement measures, we are always looking for opportunities for maximum reuse and recycling,\"}),/*#__PURE__*/e(r,{href:\"https://www.lenovo.com/us/en/compliance/recycling\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\" read more here..\"})})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Procano is a Lenovo Gold Partner\"}),/*#__PURE__*/t(\"p\",{children:[\"Procano is a Lenovo Gold Partner, ensuring that \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/andre-tjenester\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"we get the best prices on PCs, servers, and related equipment\"})})}),\", as well as access to Lenovo's best follow-up program. All our customers benefit from this in connection with renewal, operation, and maintenance of the machine park. \",/*#__PURE__*/e(r,{href:\"https://www.procano.com/2018/04/11/procano-lenovo-sant/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Read more here..\"})})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:\"https://framer.com/no/blog/procano-har-fornyet-miljofyrtaarn-sertifikatet\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Did you know that Procano is Environmentally Certified? You can read about it here.\\xa0\"})})})})]});export const richText26=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Multi-Factor Authentication (MFA) is Easy\"}),/*#__PURE__*/t(\"p\",{children:[\"It is simpler than it sounds. Once you have activated multi-factor authentication, or \",/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\"two-step verification on your accounts\"}),\", unauthorized individuals need access to your phone in addition to your password.\"]}),/*#__PURE__*/e(\"p\",{children:\"This is how multi-factor authentication works: If you, for example, are logging into a Microsoft 365 account, you will receive an SMS on your phone with a security code. This code must be entered together with your password to gain final access to your account. This provides you with an extra layer of security. A bit like locking the front door before you leave home.\"}),/*#__PURE__*/e(\"p\",{children:\"You can easily add two-step verification for most accounts you have, such as Google or Microsoft accounts.\"}),/*#__PURE__*/e(\"p\",{children:\"For businesses using Office 365 and Microsoft 365, it is easy to change the security settings, so that users must log in using multi-factor authentication. After making this change, users will be prompted to set up their phone for multi-factor authentication the next time they log in. Smart, right?\"}),/*#__PURE__*/e(\"p\",{children:\"Multi-factor authentication is included in all Office 365 or Microsoft 365 subscriptions. Do you need help activating Multi-Factor Authentication? Contact us!\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\"Want to know more about IT security? Read more on our \"}),/*#__PURE__*/e(r,{href:{webPageId:\"P6yzF3KqW\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\"security pages\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\" and feel free to \"}),/*#__PURE__*/e(r,{href:{webPageId:\"Z9U_Z1BA_\"},motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\"contact us\"})})}),/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(159, 197, 232)\"},children:\" if you have further questions.\\xa0\"})]})]});export const richText27=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"h2\",{style:{\"--framer-font-size\":\"30px\"},children:\"Background\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Procano's innovation projects are highlighted for innovative methods and approaches. Innovation Norway, the Research Council, and DOGA evaluated a total of 79 applicants for innovation funds. Procano was among the winners.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{style:{\"--framer-font-size\":\"17px\"},children:[/*#__PURE__*/e(r,{href:\"https://www.procano.com/support\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"IT user support can be a frustrating experience for both those who need help and those who provide it.\"})}),\" This is often due to the parties having different expertise and reference framework. Procano aims to design the ultimate user experience for IT user support and has brought in the design agency \",/*#__PURE__*/e(r,{href:\"https://www.work.no/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Work AS\"})})}),\" to lead a design-driven innovation process that will bridge the gap between IT consultants and the average IT user. The jury believes the project's methods and approaches are innovative, especially within the service-providing IT industry, as stated in a press release from DOGA. Procano's project receives approximately NOK 0.4 million in support.\"]}),/*#__PURE__*/t(\"p\",{style:{\"--framer-font-size\":\"17px\"},children:[/*#__PURE__*/e(\"span\",{children:\"For the 10th time, \"}),/*#__PURE__*/e(r,{href:\"https://doga.no/\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Design and Architecture Norway (DOGA)\"})})}),/*#__PURE__*/e(\"span\",{children:\" distributes funds through the \"}),/*#__PURE__*/e(r,{href:\"https://doga.no/aktiviteter/design-og-innovasjon/dip/dip-mottakere-2019/?utm_source=DOGAs+nyhetsbrev&utm_campaign=38db0cf475-Nyhetsbrev_uke_46&utm_medium=email&utm_term=0_b844714e7e-38db0cf475-131827613&ct=t(Nyhetsbrev_uke_46)\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Design-Driven Innovation Program (DIP)\"})})}),/*#__PURE__*/e(\"span\",{children:\". A jury consisting of experts from DOGA, Innovation Norway, and the Research Council has selected what they believe are the \"}),/*#__PURE__*/e(r,{href:\"https://www.cw.no/artikkel/priser-utmerkelser/procano-mottar-stotte-tette-gapet-mellom-it-konsulenter-brukere\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"18 best projects\"})})}),/*#__PURE__*/e(\"span\",{children:\". Procano is among the projects to share the NOK 8.5 million from DIP, as reported by \"}),/*#__PURE__*/e(r,{href:\"https://www.cw.no/artikkel/priser-utmerkelser/procano-mottar-stotte-tette-gapet-mellom-it-konsulenter-brukere\",motionChild:!0,nodeId:\"iR73Jdb5N\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"span\",{style:{\"--framer-text-color\":\"rgb(4, 152, 156)\"},children:\"Computerworld\"})})}),/*#__PURE__*/e(\"span\",{children:\".\"})]}),/*#__PURE__*/e(\"p\",{style:{\"--framer-font-size\":\"24px\"},children:\"\\xa0\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,yGAAyG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gFAAgF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uYAAuY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kDAA+DE,EAAEC,EAAE,CAAC,KAAK,sCAAsC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wPAAyP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAA+a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,6JAA6J,CAAC,EAAE,iYAAiY,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,2GAA2G,CAAC,EAAE,ieAAie,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA+V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,glBAAglB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,mCAAmC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,wIAAwI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8dAA8d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2BE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,sGAAsG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8VAA8V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,sKAAsK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAE,uPAAuP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2iBAAiiB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,imBAAulB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,kDAAkD,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iDAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,2BAA2B,OAAO,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,YAAY,sBAAsB,kBAAkB,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,YAAY,sBAAsB,kBAAkB,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,YAAY,sBAAsB,kBAAkB,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,obAAqa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gmBAAwjB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gNAA6NE,EAAEC,EAAE,CAAC,KAAK,+BAA+B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,iCAA4B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+PAA+P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,uIAAuI,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mIAAmI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6CE,EAAE,OAAO,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,+EAA+E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gEAA6EE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oOAAiPE,EAAEC,EAAE,CAAC,KAAK,mFAAmF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,iHAAiH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,4JAA4J,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,iIAAiI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,iGAAiG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uNAAoOE,EAAEC,EAAE,CAAC,KAAK,yIAAyI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wFAAwF,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,qQAAqQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qSAAkTE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4GAA4G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gNAA6NE,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,OAAoBF,EAAEC,EAAE,CAAC,KAAK,sCAAsC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAqY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iPAA4O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAA8P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAAiP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,uGAAuG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,8GAA8G,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,8EAA8E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4VAA4V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAA+P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,oCAAoC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6CE,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kUAAmU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2ZAA2Z,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mSAAgTE,EAAE,OAAO,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAC,kBAA+BE,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmKE,EAAE,KAAK,CAAC,SAAS,+BAAqB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAA8V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAA8L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,kBAA+BE,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gIAA6IE,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qeAA2d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,+EAA+E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAsBA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8JAAyJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4KAAyLE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAkT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8JAA2KE,EAAEC,EAAE,CAAC,KAAK,sCAAsC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+GAA4HE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,mDAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2DE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,+GAA+G,CAAC,EAAE,6NAA6N,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,UAAU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qGAAkHE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8KAA2LE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sPAAsP,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2HAAyHE,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,gDAAgD,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,sDAAmEA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,kLAAkL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uGAAoHE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,4EAA4E,CAAC,EAAE,qGAAqG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAA8X,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBH,EAAEI,EAAE,EAAE,CAAC,SAAS,CAAcF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,iBAAiB,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wGAAwG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,sFAAsF,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yVAA2V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sNAAmOE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,yIAAyI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,ujBAAokBE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wFAAwF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAAga,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,WAAwBE,EAAEC,EAAE,CAAC,KAAK,sFAAsF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,2ZAA2Z,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,y2BAAs3BE,EAAE,OAAO,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA+T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6MAA0NE,EAAE,OAAO,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4aAA4a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iOAA8OE,EAAE,OAAO,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAsS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,qHAAqH,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,8CAA8C,CAAC,EAAE,0WAAqW,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oeAAoe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,+DAA+D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sgBAAsgB,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,2GAAwHE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,sFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2LAAwME,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAE,2NAAsN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,2BAA2B,WAAW,EAAE,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,OAAO,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,8CAA8C,CAAC,EAAE,mRAAmR,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2RAA2R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0HAAuIE,EAAE,KAAK,CAAC,SAAS,kFAAkF,CAAC,EAAE,+IAAqI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4GAAyHE,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAE,0OAAuPA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAE,kBAAkB,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0QAAqQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6OAAgPE,EAAE,KAAK,CAAC,SAAS,KAAK,CAAC,EAAE,yDAAsEA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAE,+BAA+B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,gWAAgW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,8VAA8V,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,2BAA2B,WAAW,EAAE,SAAsBA,EAAE,SAAS,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,gHAAgH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,uEAAuE,CAAC,EAAE,6FAAwF,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6LAA0ME,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wCAAwC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4aAA4a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAE,oSAA+R,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4GAAyHE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,0GAA0G,CAAC,EAAE,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gMAAgM,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,iIAAiI,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiEE,EAAE,OAAO,CAAC,SAAS,eAAe,CAAC,EAAE,qSAAqS,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4EAAyFE,EAAE,OAAO,CAAC,SAAS,KAAK,CAAC,EAAE,qMAAqM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0cAAgc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAAoR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iDAA8DE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBH,EAAEI,EAAE,EAAE,CAAC,SAAS,CAAcF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,6BAA6B,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,sHAAsH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oDAA4DE,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAE,uIAAuI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6GE,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAE,2EAA2E,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0gBAAggB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,CAAC,KAAkBE,EAAE,OAAO,CAAC,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,kBAAkB,EAAE,SAAS,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,kBAAkB,EAAE,SAAS,GAAG,CAAC,EAAE,2GAA2G,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,+DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sSAAiS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mPAAgQE,EAAE,KAAK,CAAC,SAAS,KAAK,CAAC,EAAE,QAAQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAAqa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ihBAAugB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2UAA2U,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oOAAiPE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,uHAAuH,CAAC,EAAE,gSAA2R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,oEAAoE,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBH,EAAEI,EAAE,EAAE,CAAC,SAAS,CAAcF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wIAAwI,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,6NAA6N,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+cAAudE,EAAE,KAAK,CAAC,CAAC,EAAE,qSAAkTA,EAAE,KAAK,CAAC,CAAC,EAAE,8EAA8E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,qFAAqF,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,mFAAmF,CAAC,EAAE,+HAA+H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAA6R,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,kEAAkE,CAAC,EAAE,qRAAqR,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oPAAiQE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+SAA4TA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6MAA0NA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kLAA6K,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,MAAM,CAAC,SAAS,4NAA8N,CAAC,EAAeA,EAAE,MAAM,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,MAAM,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAS,iUAAuT,CAAC,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,SAAS,YAAO,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,4HAA4H,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,MAAM,CAAC,EAAE,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iSAA8SE,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6VAA0WE,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,SAAS,8QAA8Q,CAAC,EAAE,OAAoBA,EAAE,OAAO,CAAC,SAAS,yFAAyF,CAAC,EAAE,IAAiBA,EAAE,OAAO,CAAC,SAAS,odAAod,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mDAAgEE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2KAAwLA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,4EAA4E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,wCAAwC,CAAC,EAAE,oFAAoF,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,wDAAwD,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,oBAAoB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,oBAAoB,EAAE,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6B,EAAwB/B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gOAAgO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wGAAwG,CAAC,CAAC,CAAC,EAAE,sMAAmNF,EAAEC,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,+VAA+V,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,CAAcE,EAAE,OAAO,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,mBAAmB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,qOAAqO,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,SAAS,+HAA+H,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,gHAAgH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,gHAAgH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,OAAO,CAAC,MAAM,CAAC,sBAAsB,kBAAkB,EAAE,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,OAAO,CAAC,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,MAAM,CAAC,qBAAqB,MAAM,EAAE,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EACv8rH8B,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "__FramerMetadata__"]
}
