{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/wPjMKSzdKY6Zv5GEJHwd/d9wDJKTtHuxXwWXrV5ZR/xCTt7sf_R-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Lean manufacturing has been a cornerstone of industrial success since Toyota set the global standard decades ago, driving efficiency by eliminating waste and accelerating production. From Detroit to Shanghai, its principles have reshaped factories, cutting costs and increasing output with relentless precision. \"}),/*#__PURE__*/e(\"p\",{children:\"Now, a once-overlooked factor is gaining recognition: the role of document management in the implementation of lean. Far more than just digitizing files or organizing paperwork, it strengthens lean manufacturing by making processes sharper, faster, and more resilient.\"}),/*#__PURE__*/e(\"p\",{children:\"At the heart of lean manufacturing is the relentless pursuit of eliminating waste\u2014whether it\u2019s wasted time, materials, or effort. Document management plays a crucial role in this mission. \"}),/*#__PURE__*/e(\"p\",{children:\"By ensuring that critical documents\u2014such as maintenance guides, quality standards, or operational procedures\u2014are just a click away, and available to the right people at the right time it eliminates the inefficiencies of searching through binders or dealing with outdated versions. When such facilities are not available the results are production delays, and inefficiencies.\"}),/*#__PURE__*/e(\"p\",{children:\"Document management is a practical, unglamorous solution, but one that delivers tangible results in the lean manufacturing journey, becoming an unsung hero of lean manufacturing, quietly supporting the principles of efficiency and waste reduction that have defined industrial success for decades. By integrating seamlessly into existing processes, it ensures that the flow of information is as lean as the production line itself.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Speed without Chaos: Document Management\u2019s Efficiency Boost\"})}),/*#__PURE__*/e(\"p\",{children:\"Lean manufacturing isn\u2019t just about cutting costs\u2014it\u2019s about maintaining seamless production flow and eliminating disruptions. Digital manufacturing has emerged as a critical enabler of this goal, ensuring that teams across the factory floor, engineering offices, and executive suites operate with the same real-time, up-to-date information. \"}),/*#__PURE__*/e(\"p\",{children:\"By integrating document management with a company\u2019s core systems\u2014whether in a factory in Mexico or a distribution hub in Rotterdam\u2014organizations can achieve higher levels of efficiency and agility in a relatively simple manner.\"}),/*#__PURE__*/e(\"p\",{children:\"Closely related cousins to document management are Change and Quality Management whereby each has spawned specialized solutions and even whole companies. Related to these are standards and standard families such as ISO, and HIPPA.\"}),/*#__PURE__*/e(\"p\",{children:\"Consider the impact of real-time updates: a design change can be implemented instantly, preventing outdated specifications from slowing production. \"}),/*#__PURE__*/e(\"p\",{children:\"In advanced setups, machines can even adjust automatically, minimizing the need for manual intervention. This level of automation isn\u2019t theoretical\u2014it\u2019s already transforming industries like aerospace manufacturing, where precision and speed are non-negotiable.\"}),/*#__PURE__*/e(\"p\",{children:\"Document management plays an important role in how information is delivered across an organization. Floor workers receive, step-by-step instructions tailored to their tasks, while engineers access analytics to optimize processes. Executives, meanwhile, gain insights into production performance. For example, on a modern automotive assembly line, operators no longer need to sift through lengthy manuals\u2014they receive, task-specific guidance tailored to their roles. \"}),/*#__PURE__*/e(\"p\",{children:\"Simultaneously, quality control teams can monitor real-time data, such as the performance of each weld, ensuring consistency and reducing errors. This seamless flow of information keeps production moving smoothly and minimizes the risk of disruptions.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Compliance: The Invisible Backbone of Lean Efficiency\"})}),/*#__PURE__*/e(\"p\",{children:\"Lean manufacturing depends on uniformity\u2014every step, material, and decision must adhere to established standards. When the documents that define these standards (specifications, safety protocols, maintenance logs) are disorganized, outdated, or prone to errors, the entire system risks collapse. \"}),/*#__PURE__*/t(\"p\",{children:[\"Compliance isn\u2019t about appeasing regulators; it\u2019s about ensuring the rules that govern production are\\xa0\",/*#__PURE__*/e(\"em\",{children:\"followed consistently\"}),\"\\xa0by everyone involved. Document management systems underpin this by organizing, securing, and distributing critical information where it\u2019s needed.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Example 1: The Supplier Blueprint Error\"})}),/*#__PURE__*/e(\"p\",{children:\"A factory orders a key engine part from a supplier. The supplier\u2019s engineer works from an outdated blueprint\u2014retrieved from an email chain\u2014rather than the latest version stored in the factory\u2019s centralized document repository. The part is machined 0.2mm out of tolerance. \"}),/*#__PURE__*/e(\"p\",{children:\"The receiving team, relying on a paper checklist disconnected from the digital system, misses the flaw. The defective part enters assembly, causing a misalignment detected only during final testing. Result: 300 units scrapped, delayed shipments, and costly rework.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Example 2: The Safety Protocol Breakdown\"})}),/*#__PURE__*/e(\"p\",{children:\"A chemical plant\u2019s maintenance team repairs a reactor valve using outdated safety guidelines. Without a document management system to enforce role-based access, an apprentice accidentally references a 2018 protocol, unaware that updated guidelines require additional pressure checks. \"}),/*#__PURE__*/e(\"p\",{children:\"The valve fails during testing, triggering a hazardous leak. Production halts for days, and regulators cite the plant for using obsolete procedures.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"How Document Management Enables Compliance\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Centralized Control: \"}),\"A unified system stores the latest versions of specs, manuals, and regulations. Changes propagate instantly, eliminating reliance on scattered files or email attachments.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Guarded Access: \"}),\"Permissions ensure only qualified personnel can edit critical documents (e.g., welding specs). Apprentices view but cannot alter them, preventing untrained adjustments.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Traceability: \"}),\"Automated logs track who edited a document, when, and why. If a machine fails, managers verify whether operators followed the current repair manual.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration: \"}),\"Compliance isn\u2019t static. When regulations change, document systems update training materials, checklists, and supplier contracts simultaneously.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"The Cost of Poor Document Practices\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Errors multiply: \"}),\"A single outdated file can corrupt entire production batches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Accountability dissolves: \"}),\"Teams waste hours debating whether a defect stemmed from engineering, suppliers, or operator error.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trust crumbles: \"}),\"Workers bypass official documents, relying on inconsistent \u201Ctribal knowledge\u201D that varies by shift.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Compliance, in this framework, isn\u2019t red tape. It\u2019s the assurance that the rules designed to eliminate waste and ensure quality are\\xa0\",/*#__PURE__*/e(\"em\",{children:\"applied uniformly\"}),\". Document management systems operationalize this by making accurate, secure information the default\u2014not an afterthought.\"]}),/*#__PURE__*/e(\"p\",{children:\"When everyone works from the same playbook, errors are prevented rather than patched, and lean principles function as intended: smoothly, predictably, and without waste.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"The Synergy of Precision and Protection\"})}),/*#__PURE__*/e(\"p\",{children:\"Lean manufacturing\u2019s legacy\u2014rooted in the relentless elimination of waste and pursuit of efficiency\u2014has always demanded innovation to sustain its edge. Document management emerges not as a mere tool in this evolution, but as a transformative force that bridges the gap between ambition and execution.\"}),/*#__PURE__*/e(\"p\",{children:\"By ensuring critical information flows seamlessly from design teams to factory floors, it eradicates the friction of outdated manuals, miscommunication, and manual searches, turning what was once administrative clutter into a catalyst for speed. Real-time updates synchronize teams across continents, automated systems adapt to changes without human lag, and workers operate with clarity, not confusion.\"}),/*#__PURE__*/e(\"p\",{children:\"Yet this efficiency is fragile without the guardrails of compliance. Just as lean principles methodically remove physical waste, robust document management strips away vulnerabilities that breed defects, delays, and distrust. \"}),/*#__PURE__*/e(\"p\",{children:\"Compliant systems ensure specifications remain untampered, compliance records unbroken, and workflows uninterrupted by the chaos of compromised data. \"}),/*#__PURE__*/e(\"p\",{children:\"The result is a harmony of agility and assurance: production lines that move faster because they\u2019re built on reliable information, and organizations that innovate boldly because their processes are shielded from sabotage.\"}),/*#__PURE__*/e(\"p\",{children:\"In the end, document management doesn\u2019t just support lean manufacturing\u2014it redefines it. By marrying the precision of real-time data with the rigor of cybersecurity, it transforms factories into ecosystems where every decision is informed, every action intentional, and every resource optimized. \"}),/*#__PURE__*/e(\"p\",{children:\"This isn\u2019t the future of manufacturing\u2014it\u2019s the standard lean must meet to thrive in a world where information is both the greatest asset and the most critical vulnerability.\"})]});export const richText1=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Document management might not top the agenda at most boardroom meetings, yet it quietly underpins a mid-market company\u2019s capacity to operate with precision and protect its bottom line. The reality is unforgiving: rely on manual sorting, error-prone data entry, or fragmented workflows, and you\u2019re not just wasting time\u2014you\u2019re courting risk and ceding ground to sharper competitors. Artificial Intelligence (AI) steps in as a calculated shift, not a flashy fix. It reengineers how businesses handle information, cutting through inefficiencies with methodical precision while building a fortress around sensitive data. For mid-market leaders, this isn\u2019t about keeping up\u2014it\u2019s about uncovering a lever to pull ahead, turning a foundational process into a source of quiet, undeniable advantage. AI-driven solutions offer a rare chance to rethink what\u2019s possible, delivering outsized returns without the fanfare.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Mechanics of AI in Document Management\"}),/*#__PURE__*/e(\"p\",{children:\"At its core, AI harnesses machine learning and sophisticated algorithms to tackle the tedious, mistake-laden tasks that bog down traditional document processes, quietly reshaping how work gets done. It powers automated classification, dissecting content to sort documents\u2014think invoices, contracts, or personnel files\u2014without a single human touch, shaving hours off filing drudgery. Then there\u2019s intelligent extraction, where it pinpoints specifics like dates, supplier names, or payment terms with unerring accuracy, sidelining the slip-ups that plague manual entry. Workflow automation gets a boost too, as AI directs documents to the right hands or systems with speed, clearing logjams and fast-tracking decisions. These aren\u2019t isolated tricks\u2014they weave together into a system that strips out inefficiency at every turn, letting teams sidestep the grind of chasing down files or fixing typos. That freed-up time and focus? It\u2019s fuel for sharper planning, smoother execution, and the kind of clarity that turns routine operations into a quiet competitive edge.\"}),/*#__PURE__*/e(\"h2\",{children:\"Overcoming Implementation Challenge\"}),/*#__PURE__*/e(\"p\",{children:\"The transformative potential of AI in document management is undeniable, yet mid-market enterprises often pause at the threshold, wary of perceived obstacles such as prohibitive costs, intricate deployment, or disruptions to entrenched workflows. The reality, however, is shifting decisively: contemporary AI solutions are dismantling these barriers, delivering cloud-based platforms that minimize initial capital outlay while offering tiered, scalable pricing tailored to constrained budgets\u2014a pragmatic lifeline for resource-conscious firms. The savviest approach lies in a calculated first step: launching a focused pilot\u2014perhaps streamlining invoice processing\u2014to test efficacy and build confidence before orchestrating a broader rollout. This isn\u2019t merely about adoption; it\u2019s about mastery. Equipping staff with targeted training unlocks the technology\u2019s full potential, transforming tools into intuitive extensions of human capability rather than opaque novelties. Beyond that, aligning with vendors who provide not just technical support, but strategic integration insight ensures a bespoke fit\u2014melding AI seamlessly into the company\u2019s operational DNA. The deeper truth here is that successful implementation hinges on foresight: understanding that AI\u2019s value compounds as it evolves from a point solution to a systemic advantage, quietly amplifying efficiency, reducing risk, and sharpening decision-making. This isn\u2019t a headlong plunge\u2014it\u2019s a deliberate recalibration, turning cautious steps into a sustained stride toward operational excellence.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Measurable Benefits of AI in Document Management\"}),/*#__PURE__*/e(\"p\",{children:\"Picture a wholesale distribution company with $5 million in annual revenue, selling goods such as industrial parts or consumer products to retailers and businesses. Assume that 20% of that ($1 million) is revenue from sales that depends on accurate financial statements and compliance documents, which include invoices, tax filings, and payment records further assume that that the average invoice is around $10,000 amounting to about 100 separate invoices. Getting paid relies on sending correct invoices, and the business must maintain proper tax filings and payment records. For a distributor with steady shipments, this is the chunk of revenue most exposed to document screw-ups.\"}),/*#__PURE__*/e(\"p\",{children:\"Errors pile up fast in this setup. Industry studies point to an 8% error rate in such documents\u2014misplaced decimals, lost invoices, or misfiled payment records\u2014and for a wholesaler, that\u2019s no surprise. Each invoice might get touched by multiple hands: sales reps draft it, warehouse staff confirm shipments, accounting logs it, and compliance checks it for taxes. That\u2019s 4-6 people handling every one of those 100 invoices, plus payment records and tax filings cycling through similar steps. With hundreds of documents yearly, the effect of even small slip-ups\u2014like a typo in a $10,000 invoice or a misplaced tax form\u2014snowball. For this company, that 8% error rate translates to $80,000 in losses on the $1 million. Those numbers hold up against operational efficiency analyses for distributors with this kind of transaction load.\"}),/*#__PURE__*/e(\"p\",{children:\"AI-powered document management tackles this wholesaler\u2019s chaos head-on. With optical character recognition (OCR) and machine learning, it reads invoices, tax filings, and payment records with precision, catching errors\u2014like a $10,000 invoice misread as $1,000 or a duplicate entry\u2014that slip through when 4-6 people handle each document. Unlike basic OCR, it learns the company\u2019s patterns\u2014invoice layouts for parts shipments or tax form totals\u2014and cross-checks past data to flag mistakes fast. Where human hands across sales, warehouse, accounting, and compliance drive that 8% error rate, AI streamlines it to one automated pass, cutting such errors to almost 0%, slashing the $80,000 loss on $5 million in revenue.\"}),/*#__PURE__*/e(\"h2\",{children:\"Lead Early or Lag Forever\"}),/*#__PURE__*/e(\"p\",{children:\"AI isn\u2019t just an upgrade for document management\u2014it\u2019s a practical way to build a competitive advantage. Mid-market companies face a clear choice: stick with manual processes or disjointed systems, and you\u2019re likely to lose time and open the door to risks, while others move faster. Companies adopting AI-driven solutions aren\u2019t taking wild risks; they\u2019re gaining an edge by turning a routine task into a smoother, more secure process. The reality is simple: every hour spent sorting messy files or fixing errors is time your competitors can use to pull ahead. AI delivers a competitive advantage by streamlining workflows, strengthening security, and freeing up resources for what matters\u2014whether that\u2019s sharper planning or faster growth. History suggests that businesses quick to adopt new tools often come out stronger\u2014think of how early digital adopters gained ground. Waiting too long, though, can leave you playing catch-up as others set the pace. For mid-market leaders, this isn\u2019t about grand gestures\u2014it\u2019s a chance to make a smart move now and keep your business ahead of the curve.\"})]});export const richText2=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Regulations like GDPR, HIPAA, and ISO/IEC 27001 are often perceived as compliance obligations to mitigate risks and avoid penalties. However, these also present a strategic opportunity to drive operational excellence and cybersecurity resilience. By embedding compliance into the fabric of operations, organizations can transform it from a checkbox exercise into a foundational pillar for long-term growth and security.\"}),/*#__PURE__*/e(\"p\",{children:\"Document management systems (DMS) are at the heart of this paradigm shift. They not only facilitate adherence to regulatory requirements but also serve as a blueprint for consistent operations and a safeguard for critical organizational knowledge. Whether streamlining day-to-day workflows or supporting organizations in high-stakes situations like cybersecurity incidents, a robust DMS can align teams, mitigate risks, and enhance both compliance and security.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Role of Document Management in Incident Response\"}),/*#__PURE__*/e(\"p\",{children:\"Document management properly applied, can ensure that every team member, department, and partner operates from the same playbook, eliminating confusion and fortifying cybersecurity. Imagine a healthcare provider that experiences a ransomware attack. Hackers encrypt patient records and demand payment for their release. Without segregated document management, the IT team struggles to locate incident response protocols buried in email chains or stored on compromised local servers. The result is disorganization and delays\u2014teams are left scrambling, unsure of the steps to contain the breach, communicate with stakeholders, or comply with HIPAA requirements, compounding the damage of the attack. Of course, the document management system itself should be protected \u2013 but how that is done is a subject of a separate article.\"}),/*#__PURE__*/e(\"p\",{children:\"Now consider the same scenario with a robust document management system in place. The provider\u2019s DMS centralizes all critical documents, including incident response plans, regulatory compliance guides, and communication templates, with strict role-based access controls and encryption. Even as the ransomware attack locks down certain systems, the incident response team quickly accesses the most up-to-date protocols stored securely in an unaffected backup. They isolate infected systems, notify the cybersecurity team, and execute a pre-approved communication strategy for patients and regulators. By logging every access and action, the DMS ensures the organization not only mitigates immediate damage but also creates the documentation necessary to demonstrate accountability during post-incident reviews.\"}),/*#__PURE__*/e(\"p\",{children:\"This documentation becomes critical in the aftermath of the incident. For a healthcare provider bound by HIPAA, demonstrating compliance during a cybersecurity audit requires detailed records of the steps taken to mitigate the breach, notify affected parties, and restore operations. Without centralized logging and version control, the organization risks falling short of regulatory standards, opening the door to fines, legal liability, and reputational damage. In contrast, a robust DMS provides an irrefutable, time-stamped audit trail of the organization\u2019s response, simplifying compliance and reinforcing its credibility with auditors, patients, and stakeholders. By bridging the gap between immediate response and long-term accountability, the DMS proves indispensable in both mitigating cybersecurity risks and maintaining operational integrity.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Integrating Document Management with SIEM for Automated Incident Response\"})}),/*#__PURE__*/e(\"p\",{children:\"Integrating a Document Management System (DMS) with a Security Information and Event Management (SIEM) platform creates a synergy where document management transcends compliance tracking and becomes an active player in cybersecurity operations. A modern DMS can go beyond logging access and modifications by pulling actionable data directly from the SIEM system. For example, when the SIEM detects unusual activity\u2014such as unauthorized access attempts, anomalous login patterns, or data exfiltration attempts\u2014it can trigger workflows within the DMS. These workflows could include assigning specific incident response protocols to relevant teams, generating audit trails, and ensuring that updated procedures are immediately accessible to the appropriate personnel. This level of integration transforms the DMS into a dynamic response tool, ensuring that everyone involved in an incident has clear, role-specific instructions without delay.\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine a scenario where a SIEM system flags a potential insider threat: an employee accessing sensitive documents outside of normal hours. This alert could automatically trigger the DMS to assign a workflow to the cybersecurity team, providing them with the organization's insider threat mitigation procedures. Simultaneously, the DMS could alert compliance officers, providing regulatory notification templates required under frameworks like GDPR or HIPAA. By automating these processes, the DMS ensures that not only are incidents addressed swiftly, but also that compliance obligations are met seamlessly. This tight integration reduces human error, enhances operational efficiency, and ensures that both cybersecurity and compliance efforts work in tandem as a single, cohesive machine.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Redefining Document Management in Cybersecurity Strategy\"})}),/*#__PURE__*/e(\"p\",{children:\"The evolving cybersecurity landscape demands more than reactive measures\u2014it calls for systems that are not only compliant but also dynamic, interconnected, and resilient. Document management, once seen as a back-office necessity, has emerged as a critical tool in the fight against cyber threats, providing structure and clarity where chaos could otherwise reign. But the true potential of these systems lies in their integration with broader security frameworks, transforming them from static repositories into active participants in organizational defense.\"}),/*#__PURE__*/e(\"p\",{children:\"As we look ahead, the challenge isn\u2019t just implementing these technologies but fostering a culture that values preparedness, transparency, and adaptability. How do we ensure that every action, from accessing a document to responding to a breach, becomes a seamless part of a larger security strategy? The answers lie not in isolated tools but in building ecosystems where information flows intelligently, empowering teams to act decisively when it matters most. Organizations willing to reimagine the role of their document management systems won\u2019t just stay compliant\u2014they\u2019ll redefine what it means to be secure in a world of constant change.\"})]});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Modern organizations are awash in data\u2014overflowing from on-premises systems, sprawling cloud platforms, and countless external sources. The sheer variety and volume of this information have turned data management into an intricate puzzle. And for many businesses, solving it is easier said than done.\"}),/*#__PURE__*/e(\"p\",{children:\"Enter data fabric architecture, a novel approach designed to close these gaps. It unifies unrelated data sources into a cohesive, accessible, and secure framework. In this article, we\u2019ll unpack how this architecture can become a powerful strategy for your business, explore its foundational principles, and equip you with the knowledge to start implementing it in your operations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Data Fabric Architecture Through an Example\"}),/*#__PURE__*/e(\"p\",{children:\"To grasp the essence of data fabric architecture, let\u2019s start with a real-world scenario that highlights its value. Think of it as the difference between a tangled web of disconnected systems and a seamless network were data flows effortlessly. By walking through a before-and-after comparison, you will see how this approach transforms complex, fragmented data ecosystems into a unified, efficient, and intelligent framework.\"}),/*#__PURE__*/e(\"p\",{children:\"A manufacturing firm specializing in custom industrial machinery receives an urgent request from one of its clients. The client needs a detailed lifecycle performance report for a machine purchased two years ago. The report must include the original design specifications, production data, and maintenance records. Here is how the process unfolds without data fabric architecture:\"}),/*#__PURE__*/e(\"h3\",{children:\"Without Data Fabric Architecture\"}),/*#__PURE__*/e(\"h4\",{children:\"1. Design Data Challenges\"}),/*#__PURE__*/e(\"p\",{children:\"The engineering team searches through the company\u2019s product lifecycle management (PLM) system to locate the original design specifications. Since the PLM doesn\u2019t connect with other systems, they export the design details into a spreadsheet and share it via email with the production team.\"}),/*#__PURE__*/e(\"h4\",{children:\"2. Production Data Silos\"}),/*#__PURE__*/e(\"p\",{children:\"The production team accesses the manufacturing execution system (MES) to pull data on assembly line efficiency, quality control, and material usage for the specific machine. Unfortunately, the MES doesn\u2019t tag this data with the design information or customer details, requiring manual cross-referencing to confirm it\u2019s for the right machine.\"}),/*#__PURE__*/e(\"h4\",{children:\"3. Maintenance Record Chaos\"}),/*#__PURE__*/e(\"p\",{children:\"Maintenance logs and IoT sensor data are stored in a separate database used exclusively by the after-sales service team. Extracting relevant information requires custom queries, which delays the process further. The team must manually align maintenance data with production and design records to create a coherent narrative.\"}),/*#__PURE__*/e(\"h4\",{children:\"4. The Final Hurdle\"}),/*#__PURE__*/e(\"p\",{children:\"Each team contributes their piece of the puzzle, but the lack of a unified framework means someone must manually stitch together the data. The process takes days, introduces errors, and frustrates employees, who have to repeat tedious tasks every time a similar request arises. By the time the report is ready, the client has grown impatient, straining the relationship.\"}),/*#__PURE__*/e(\"h3\",{children:\"With Data Fabric Architecture\"}),/*#__PURE__*/e(\"p\",{children:\"Now imagine the same firm operating with a data fabric architecture in place. Here\u2019s how the request unfolds in this transformed environment:\"}),/*#__PURE__*/e(\"h4\",{children:\"1. Instant Design Access\"}),/*#__PURE__*/e(\"p\",{children:\"The engineering team accesses a unified dashboard powered by the data fabric. The original design specifications, stored in the PLM system, are automatically linked with other datasets using metadata. With a quick search, the team retrieves the design details and confirms they align with the client\u2019s request.\"}),/*#__PURE__*/e(\"h4\",{children:\"2. Seamless Production Data Integration\"}),/*#__PURE__*/e(\"p\",{children:\"The data fabric connects the MES directly to the design records. The production team doesn\u2019t need to run manual queries or cross-reference files. The system automatically identifies the machine\u2019s production data, including batch performance and quality control metrics, and formats it for the report.\"}),/*#__PURE__*/e(\"h4\",{children:\"3. Maintenance Data Enrichment\"}),/*#__PURE__*/e(\"p\",{children:\"IoT sensor data and maintenance logs are seamlessly integrated into the dashboard. The system uses AI to analyze the data, highlighting key maintenance trends and linking them back to the production and design information. The after-sales team provides context without needing to manually search through databases.\"}),/*#__PURE__*/e(\"h4\",{children:\"4. Real-Time Collaboration\"}),/*#__PURE__*/e(\"p\",{children:\"With all data consolidated in the unified interface, engineering, production, and maintenance teams collaborate in real time. Automated workflows generate a draft report that includes all requested details, reducing manual effort to simple validation.\"}),/*#__PURE__*/e(\"h4\",{children:\"5. Timely Delivery\"}),/*#__PURE__*/e(\"p\",{children:\"The complete lifecycle performance report is delivered to the client within hours of the request. The accuracy and speed not only meet the client\u2019s expectations but also strengthen their trust in the company\u2019s capabilities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Building a Scalable and Collaborative Data Fabric\"}),/*#__PURE__*/e(\"p\",{children:\"To build a robust data fabric architecture, the first step is to align it with your organization\u2019s goals by deeply understanding business needs and assessing the existing data landscape. Begin by collaborating with cross-functional teams\u2014marketing, sales, operations, and finance\u2014to identify key performance indicators (KPIs), data gaps, and operational challenges. This step not only defines the objectives but also prioritizes critical use cases that will guide the implementation. Simultaneously, conduct a comprehensive audit of your data sources, systems, and technology stack. By identifying silos, data quality issues, and redundancies, you lay the foundation for a streamlined and efficient architecture. This phase ensures clarity about where you are and what tools or processes will be necessary to bridge the gap to where you need to go.\"}),/*#__PURE__*/e(\"p\",{children:\"With the groundwork laid, designing a scalable data fabric architecture becomes the next critical focus. A modular framework is essential\u2014encompassing data ingestion, processing, storage, and analytics while ensuring the flexibility to grow with your organization\u2019s needs. Choose technologies that strike the right balance between scalability, cost-effectiveness, and compatibility with existing systems. Governance, security, and compliance are non-negotiable pillars of this architecture. Establish clear policies, assign roles for data stewardship, and implement tools that enable traceability and enforce access controls. As the architecture takes shape, assemble a cross-functional team of data experts, fostering a culture of collaboration and knowledge-sharing to ensure the system\u2019s success. To keep the project manageable, roll out the implementation in phases, starting with high priority use cases and refining processes through ongoing feedback. Comprehensive training, accessible resources, and dedicated support further empower users to leverage the system effectively, ensuring continuous optimization and scalability for future demands.\"}),/*#__PURE__*/e(\"h2\",{children:\"Major Players in Data Fabric Solutions: IBM, Google, and Microsoft\"}),/*#__PURE__*/e(\"p\",{children:\"As organizations grapple with growing volumes of data, the demand for solutions that streamline management, break down silos, and enable advanced analytics is at an all-time high. Tech leaders like IBM, Google, and Microsoft have stepped up to address these challenges, each offering its own take on data fabric solutions. Let\u2019s take a closer look at how these giants are shaping the future of data management:\"}),/*#__PURE__*/e(\"h3\",{children:\"IBM: Empowering Organizations with Unified Data Access\"}),/*#__PURE__*/e(\"p\",{children:\"IBM has built a reputation for creating robust frameworks that connect data seamlessly across on-premises and cloud environments. Their data fabric solution focuses on integration, governance, and real-time access, giving organizations the tools to manage their data efficiently and effectively. Key features include metadata-driven discovery, automated quality management, and AI-powered insights\u2014all designed to help businesses extract maximum value from their data.\"}),/*#__PURE__*/e(\"p\",{children:\"What sets IBM apart is its ability to support hybrid infrastructures. Enterprises with diverse ecosystems can benefit from a centralized framework that not only simplifies data management but also strengthens security. By laying this foundation, IBM\u2019s data fabric paves the way for AI-driven innovation and helps organizations stay adaptable in a constantly evolving landscape.\"}),/*#__PURE__*/e(\"h3\",{children:\"Google Cloud Dataplex: Simplifying Distributed Data Management\"}),/*#__PURE__*/e(\"p\",{children:\"Google\u2019s Dataplex tackles a common pain point for many organizations: managing distributed data without the need for complex data movement. Built to thrive within Google Cloud environments, Dataplex streamlines governance, metadata management, and monitoring through automation. Its domain-centric approach enables businesses to create flexible, scalable data meshes that cater to their specific needs.\"}),/*#__PURE__*/e(\"p\",{children:\"A standout feature of Dataplex is its \u201Csingle-pane-of-glass\u201D interface, which ensures consistent permissions and governance across the board. This lets teams spend less time wrestling with infrastructure and more time generating insights. For organizations already leveraging Google Cloud, Dataplex offers a natural extension that simplifies operations while maintaining scalability.\"}),/*#__PURE__*/e(\"h3\",{children:\"Microsoft Fabric: Unifying Analytics and AI on a Shared Platform\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft takes a slightly different route with its data fabric offering, emphasizing the unification of analytics and AI on a shared platform. Microsoft Fabric combines data engineering, warehousing, and real-time analytics into a single SaaS solution. Tools like Azure Synapse Analytics, Azure Data Factory, and Power BI are seamlessly integrated, ensuring that users\u2014from engineers to business analysts\u2014can access tailored tools for their roles.\"}),/*#__PURE__*/e(\"p\",{children:\"What makes Microsoft Fabric particularly compelling is its focus on simplifying workflows while driving AI-powered insights. With native integration across the Azure ecosystem, it provides a cohesive platform for organizations that want to bring their data and analytics operations together. By centralizing these services, businesses can unlock deeper insights, enhance collaboration, and stay ahead in their industries.\"}),/*#__PURE__*/e(\"h2\",{children:\"Embracing the Future with Data Fabric Architecture\"}),/*#__PURE__*/e(\"p\",{children:\"Adopting a data fabric architecture isn\u2019t just about keeping up with trends; it\u2019s about transforming how your organization handles and benefits from its data. By addressing silos, fostering collaboration, and enabling real-time access, a well-implemented data fabric positions your business to thrive in a data-driven world. It\u2019s not without its challenges, but with careful planning, the right tools, and a phased approach, the journey becomes manageable and rewarding.\"}),/*#__PURE__*/e(\"p\",{children:\"The benefits\u2014enhanced efficiency, smarter decision-making, and stronger client trust\u2014are within reach for organizations willing to invest in the future of their data. The next step is simple: take stock of your current data landscape and start planning your transformation. The tools are available, the need is urgent, and the rewards are undeniable. What will your organization achieve with a truly unified data strategy?\"})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Organizations today face an ever-growing challenge of managing complex security threats across increasingly interconnected networks. From safeguarding sensitive data to addressing vulnerabilities, the stakes are higher than ever. Security Information and Event Management (SIEM) systems play a vital role in this effort, offering businesses the tools to detect, analyze, and respond to threats effectively and efficiently.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Are SIEM Systems?\"}),/*#__PURE__*/e(\"p\",{children:\"SIEM systems are sophisticated platforms designed to collect, consolidate, and analyze security-related data from an organization\u2019s IT infrastructure. Think of them as the command center of a cybersecurity strategy, providing a bird\u2019s-eye view of network activity and security posture. They gather logs and event data from various sources\u2014servers, applications, and devices\u2014to identify anomalies and potential threats.\"}),/*#__PURE__*/e(\"p\",{children:\"At their core, SIEM systems do much more than just gather data. They apply advanced correlation techniques to cross-reference information from disparate sources, connecting the dots to reveal hidden security risks. This capability allows organizations to detect threats that might slip past standalone security tools, making SIEM systems indispensable in a modern cybersecurity arsenal.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Benefits of SIEM Systems\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Real-Time Threat Detection\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine having an always-on security camera for your network, one that not only captures footage but also analyzes it for suspicious behavior. That\u2019s essentially what a SIEM system does. By continuously monitoring network activity, SIEM platforms identify unusual patterns and alert security teams in real-time, enabling swift responses before incidents escalate.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Centralized Security Management\"}),/*#__PURE__*/e(\"p\",{children:\"Managing security alerts from countless sources can feel like juggling with too many balls. SIEM systems simplify this by aggregating data into a single, unified dashboard. This consolidation ensures that critical alerts don\u2019t get buried under noise, allowing teams to focus on what truly matters.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Enhanced Incident Response\"}),/*#__PURE__*/e(\"p\",{children:\"When a security breach occurs, the speed and precision of the response can make or break an organization\u2019s defenses. Many SIEM systems come equipped with predefined playbooks and automated workflows. These features guide security teams through consistent and efficient incident responses, minimizing damage and restoring normalcy faster.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Regulatory Compliance Made Easier\"}),/*#__PURE__*/e(\"p\",{children:\"For organizations that handle sensitive data, regulatory compliance isn\u2019t just a box to check\u2014it\u2019s a mandate. SIEM platforms simplify compliance by automating processes like log collection, reporting, and audit preparation. Many even offer templates tailored to specific regulations, such as GDPR, HIPAA, and PCI DSS, saving time and reducing the risk of non-compliance.\"}),/*#__PURE__*/e(\"h2\",{children:\"The SIEM and XDR Approach\"}),/*#__PURE__*/e(\"p\",{children:\"While SIEM systems focus on log aggregation and correlation, Extended Detection and Response (XDR) platforms complement these efforts by integrating threat data across endpoints, networks, and cloud environments. Together, SIEM and XDR create a cohesive security ecosystem that bridges gaps in visibility and response. SIEM provides the broad, historical context of security events, while XDR offers depth and granularity for active threat containment. By combining these technologies, organizations can address threats with greater precision and effectiveness.\"}),/*#__PURE__*/e(\"h2\",{children:\"Role of SIEM in Zero-Day Vulnerabilities\"}),/*#__PURE__*/e(\"p\",{children:\"Zero-day vulnerabilities present one of the most significant challenges in cybersecurity, as they exploit unknown or unpatched weaknesses. SIEM systems play a critical role here by analyzing unusual behavior and detecting anomalies that could indicate the presence of a zero-day exploit. Through data correlation and behavioral analysis, SIEM platforms provide early warning signs, enabling security teams to implement containment measures even before a vulnerability is officially identified or patched.\"}),/*#__PURE__*/e(\"h2\",{children:\"Role of SIEM in Defense in Depth based Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Defense in Depth is a layered approach to security, and SIEM systems are central to its success. Acting as the connective tissue between various security layers, SIEM aggregates data from firewalls, intrusion detection systems, antivirus tools, and other components. By offering a unified view of these layers, SIEM ensures that gaps are identified and addressed. This comprehensive oversight enables organizations to deploy complementary defenses that reinforce one another, creating a robust and resilient security posture.\"}),/*#__PURE__*/e(\"h2\",{children:\"Enhancing Network Security with SIEM\"}),/*#__PURE__*/e(\"p\",{children:\"The integration of a SIEM system into an organization\u2019s cybersecurity strategy significantly bolsters network security. By consolidating data from diverse endpoints, SIEM platforms offer actionable insights that help security teams detect patterns, identify anomalies, and respond to threats more effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, advanced persistent threats (APTs) often unfold over extended periods and involve subtle indicators. Traditional security tools might miss these, but SIEM systems excel at spotting such patterns by correlating data across time and sources. This capability is crucial for addressing threats that rely on stealth.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, SIEM platforms support proactive measures like automated threat hunting and vulnerability management. By identifying weaknesses before they\u2019re exploited, organizations can strengthen their defenses and stay one step ahead of attackers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Challenges and Future Trends\"}),/*#__PURE__*/e(\"p\",{children:\"While the benefits of SIEM systems are compelling, they\u2019re not without challenges. \"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Deployment Complexity:\"}),\" Implementing a SIEM system requires significant expertise and resources. Organizations must carefully plan and tailor the platform to their unique needs. \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Fatigue:\"}),\" The sheer volume of alerts generated can overwhelm security teams, making it difficult to prioritize and address the most critical issues. Without effective tuning, SIEM systems can become more of a burden than a boon.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"But the future of SIEM technology offers hope. Artificial intelligence (AI) and machine learning are being integrated to enhance the accuracy of threat detection and reduce false positives. These advancements enable SIEM systems to learn and adapt, improving their effectiveness over time.\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud-based SIEM solutions are also gaining traction. They provide scalability and flexibility, making them ideal for organizations with evolving needs and dispersed IT environments. As networks become more complex and interconnected, these innovations promise to keep SIEM systems relevant and indispensable.\"}),/*#__PURE__*/e(\"h2\",{children:\"A Forward View\"}),/*#__PURE__*/e(\"p\",{children:\"Security Information and Event Management systems are becoming pivotal in the larger story of cybersecurity, and their influence is set to expand. As networks grow more intricate and digital dependencies deepen, SIEM platforms are moving beyond traditional roles, paving the way for predictive and preemptive threat management.\"}),/*#__PURE__*/e(\"p\",{children:\"The infusion of AI and machine learning into these systems signals a future where SIEM platforms not only detect incidents but also learn from patterns to prevent them. This evolution enables security teams to shift their focus from reactive measures to strategic foresight\u2014strengthening defenses while aligning with broader organizational goals.\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud-based SIEM solutions are also reshaping the landscape, offering the scalability needed for hybrid and multi-cloud ecosystems. These advancements hint at a world where cybersecurity is a seamless, integral part of business operations, empowering organizations to innovate without hesitation.\"}),/*#__PURE__*/e(\"p\",{children:\"Ultimately, the lesson is clear: as technology evolves, so must our approach to security. For decision-makers, the take-home message is simple yet profound: investing in adaptable, intelligent SIEM systems today positions your organization not just to survive, but to lead in the cyber-resilient ecosystems of tomorrow.\"})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream is thrilled to announce the attainment of the ISO/IEC 27001:2022 certification, awarded by Intertek, a premier global certification body. This achievement is a rigorous testament to our commitment to excellence in information security.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Challenge of ISO Certification\"}),/*#__PURE__*/e(\"p\",{children:\"Earning ISO/IEC 27001 certification is no small feat. It demands a comprehensive evaluation of an organization's security practices, requiring:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Systematic Risk Management:\"}),\" Companies must identify, assess, and manage information security risks systematically, ensuring no stone is left unturned in protecting data.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Compliance:\"}),\" Maintaining certification involves ongoing audits and assessments to keep up with evolving threats and standards, demonstrating a commitment to perpetual improvement.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Employee Training and Awareness:\"}),\" Every level of the organization must be engaged in security practices, indicating a culture where security is everyone's responsibility.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detailed Documentation:\"}),\" A thorough documentation process is necessary to prove that policies and procedures are not only in place but are also followed, which is both time-consuming and meticulous.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"What ISO Certified Companies Bring to Customers\"}),/*#__PURE__*/e(\"p\",{children:\"Working with an ISO-certified company ensures that your data is managed with internationally recognized standards for security and reliability. These certifications reflect a commitment to structured processes and continuous improvement, providing tangible benefits in areas like compliance, transparency, and threat mitigation. Here's how this translates into value for customers.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Robust Security Measures:\"}),\" ISO certification signifies that a company has put in place comprehensive security controls, providing a safeguard against data breaches and unauthorized access.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proven Reliability: \"}),\"Customers can trust that their data is handled with a level of care that meets international benchmarks for information security.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regulatory Adherence: \"}),\"Certified companies are better positioned to comply with various data protection regulations, ensuring customer data is managed legally and ethically.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transparency and Accountability: \"}),\"The certification process fosters an environment where companies are transparent about their security practices, offering peace of mind to clients concerned about data privacy.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resilience Against Threats: \"}),\"With regular updates to security protocols, certified companies are more agile in responding to new cyber threats, indirectly enhancing the safety of customer data.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})})]}),/*#__PURE__*/e(\"p\",{children:\"Baystream invites you to explore what this certification means for the security and integrity of your data when you choose to work with us.\"})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"This year, Baystream had the pleasure of joining other organizations as a sponsor and participant in the Choice Cares Golf Classic, hosted at the beautiful Copper Creek Golf Club in Kleinburg, ON. The event brought together real estate industry leaders and community partners for a day of golf, camaraderie, and, most importantly, philanthropy.\"}),/*#__PURE__*/e(\"p\",{children:\"The tournament was a tremendous success, raising an impressive $830K for various charity partners. This achievement is a testament to the collective generosity and commitment of all sponsors and participants who came together to support families in need across the country. Since its inception nine years ago, the event has raised over $3 million for charitable causes.\"}),/*#__PURE__*/e(\"p\",{children:\"We\u2019re proud to have been a small part of such a meaningful event and extend our gratitude to Choice Properties for organizing this outstanding tournament. Congratulations to everyone involved for making a positive impact, and we look forward to contributing again in the future!\"})]});export const richText7=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Madrid, Spain \u2013 Baystream Corporation proudly presented its latest cybersecurity solution at the M-Files Impact 2024 conference, held from May 14-17. This innovative solution integrates M-Files and Odoo, enhancing data protection and operational efficiency for businesses.\"}),/*#__PURE__*/e(\"p\",{children:\"The event brought together industry leaders and professionals from over 100 countries, providing a platform for Baystream to demonstrate how the integration of M-Files and Odoo can streamline processes, improve data security, and support compliance. Attendees were able to see firsthand the benefits of this powerful combination through live demonstrations and in-depth sessions.\"})]});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"We are excited to announce that Baystream Corporation recently participated in the prestigious Odoo Experience 2023 in Brussels. This premier event gathered industry leaders and professionals from around the globe to explore the latest advancements in ERP and business automation.\"}),/*#__PURE__*/e(\"p\",{children:\"At the event, we proudly presented our cutting-edge cybersecurity solution, powered by the seamless integration of M-Files and Odoo. This innovative solution combines the robust document management capabilities of M-Files with the versatile ERP functionalities of Odoo, delivering a comprehensive approach to cybersecurity.\"}),/*#__PURE__*/e(\"p\",{children:\"Our solution addresses critical security needs, including real-time monitoring, vulnerability assessment, and compliance tracking. By leveraging the strengths of both M-Files and Odoo, we provide businesses with enhanced data protection, streamlined processes, and improved operational efficiency.\"}),/*#__PURE__*/e(\"p\",{children:\"The response from attendees was overwhelmingly positive, and we are thrilled to have had the opportunity to demonstrate our expertise and connect with fellow industry professionals.\"}),/*#__PURE__*/e(\"p\",{children:\"Stay tuned for more updates as we continue to innovate and provide top-tier solutions to meet your business needs.\"})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's data-driven world, businesses are creating and managing staggering volumes of information daily. Ponder the fact that 2.5 quintillion bytes of data are produced each day - a number set to increase exponentially. This enormous amount of data presents numerous opportunities for businesses to streamline operations and boost productivity. The key to unlocking this data goldmine is Document Management Systems (DMS), an innovative solution to traditional document management challenges. As premier partners with M-Files, we have in-depth knowledge of its offerings and recommend it as a high-quality DMS solution. However, it's crucial to note that the features we'll explore are not exclusive to M-Files but are integral to any robust DMS. If you're shopping around for a DMS, consider these features as your starting point to ensure you select a system that meets the requirements of today's dynamic business environment.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Document Management Systems\"}),/*#__PURE__*/e(\"p\",{children:\"At its core, a Document Management System (DMS), such as M-Files, is designed to receive, track, manage, and store documents. Aiming to minimize reliance on physical paper, a DMS is an essential component in transitioning a traditional office into a digital, efficient workspace. However, reducing a DMS to just a digital filing cabinet fails to encapsulate its full capabilities. This comprehensive tool is engineered to streamline business operations, enhance collaboration, and amplify overall business productivity.\"}),/*#__PURE__*/e(\"p\",{children:\"A DMS acts as the central hub of an organization's document management strategy. This system allows for seamless capture of documents, irrespective of their origination - paper or digital. Once within the system, documents are indexed according to various criteria, making them easily accessible and searchable. Offering an organized and structured approach to document storage, a DMS represents a significant improvement over disorganized stacks of paper documents in a physical filing cabinet.\"}),/*#__PURE__*/e(\"p\",{children:\"One of the notable benefits of a DMS is its tracking feature. All interactions with stored documents are monitored, creating a transparent audit trail. This is particularly useful when multiple people are collaborating on the same document, as it provides real-time updates and maintains version control. Furthermore, the system simplifies identifying who made which changes and when, a crucial aspect in many business scenarios.\"}),/*#__PURE__*/e(\"p\",{children:\"However, a DMS is not just about storage and retrieval. It also provides functionalities to efficiently manage the document lifecycle, including procedures like document approval workflows, timely archival or deletion of old documents, and ensuring regulatory compliance. All these features are designed to enhance the efficacy of business operations.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Multi-Faceted Benefits of DMS\"}),/*#__PURE__*/e(\"p\",{children:\"In this section, we will delve into the manifold benefits of implementing a DMS like M-Files. These benefits include reduced physical storage needs, improved security, better regulatory compliance, faster document retrieval, enhanced collaboration, cost reduction, and more efficient disaster recovery.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reduced need for physical storage space\"}),\": By digitizing documents, businesses can eliminate the need for cumbersome filing cabinets and storage units, freeing up valuable office space. This change fosters a more efficient, spacious working environment, and may even facilitate office downsizing, resulting in significant cost savings. Additionally, going digital removes costs linked to maintaining and accessing physical storage sites, such as transport and labor costs.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved security\"}),\": A DMS excels in bolstering data security. Traditional document management systems often expose sensitive documents to risks of theft, loss, or unauthorized access. In contrast, DMS solutions like M-Files come equipped with robust security features, including permission-based access, audit trails, encryption, and automatic alerts for suspicious activities. This empowers you to control document access, track their usage and movement, and ensure confidential information remains secure.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced regulatory compliance\"}),\": Ensuring compliance with industry and government regulations can be a daunting task when dealing with a high volume of documents. A DMS simplifies this process by automating document retention in accordance with legal requirements and facilitating efficient retrieval of specific files during audits.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Faster document retrieval\"}),\": With a DMS, document retrieval is quick and effortless. The system indexes documents based on specific criteria, such as date, document type, or author, enabling you to rapidly search and retrieve documents.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced collaboration\"}),\": A DMS provides tools that significantly enhance collaboration among team members. Multiple users can access and edit documents simultaneously from various locations, eliminating issues with version control and preventing duplication of effort.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost reduction\"}),\": By streamlining document management processes and eliminating the need for physical storage, a DMS can lead to substantial cost savings. It can also reduce costs associated with document loss and recreation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficient disaster recovery\"}),\": In the event of a disaster, such as a fire or flood, a DMS can facilitate swift disaster recovery. Digital documents can be backed up and easily restored, ensuring business continuity and minimizing the financial impact of such events.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Choosing the Right DMS for Your Business\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing a suitable DMS can feel like a daunting task given the numerous options available. Here are some steps to help simplify this process:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identifying Your Business Needs\"}),\": Understanding your specific business needs is the first step in selecting the right DMS. Are your employees working remotely and need access to documents from various locations? Do you handle sensitive information that requires robust security features? What type of documents do you primarily deal with? The answers to these and similar questions can help you determine which features are a must-have for your DMS.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Considering the Types of DMS\"}),\": DMS can be primarily categorized into two types: on-premise and cloud-based solutions. On-premise systems are installed and run on computers within the organization, whereas cloud-based solutions are hosted on the vendor's server and can be accessed via the internet. Each has its own benefits and drawbacks, and your choice should align with your business model and requirements.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Best Practices for Implementing a DMS in Your Organization\"})}),/*#__PURE__*/e(\"p\",{children:\"Implementing a DMS isn't merely about installing software; it involves strategic planning and a systematic approach. Consider the case of XYZ Corporation, which successfully transitioned to a DMS by following a methodical implementation plan. They started by identifying the needs of each department, then explored various DMS options, and chose a solution that best fit their requirements. A detailed plan was then developed, incorporating staff training schedules, data migration strategies, and contingency plans in case of unforeseen issues. This careful approach ensured a smooth transition with minimal disruption to their operations.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Exploring Future Trends in DMS\"})}),/*#__PURE__*/e(\"p\",{children:\"The future of DMS looks exciting with emerging trends primarily driven by advances in AI. For example, AI could be utilized to automatically categorize and index documents based on their content, significantly improving the speed and accuracy of document processing. Furthermore, machine learning algorithms can predict user behavior and suggest relevant documents, enhancing the user experience and efficiency.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Embracing Digital Transformation: The Strategic Value of DMS\"})}),/*#__PURE__*/e(\"p\",{children:\"Embracing a DMS like M-Files is not merely a tactical move; it's a strategic decision that can revolutionize the way your business operates. By providing a secure, structured, and efficient approach to document management, a DMS can significantly improve your organization's productivity, operational efficiency, and bottom line. The decision to adopt a DMS is an investment into the future of your organization, facilitating a seamless transition into the digital age.\"})]});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In an era of escalating cyber threats, network security has emerged as a critical priority for all businesses. Yet, for small to mid-sized companies, the importance of network security is often amplified due to their unique vulnerabilities. These companies, unlike larger organizations, often operate with a limited set of resources, both in terms of personnel and financial capabilities. However, the consequences of a network security breach can be devastating, leading to significant financial losses, reputation damage, and regulatory penalties. Therefore, it's essential for these businesses to adopt robust security practices, leverage emerging technologies, and prioritize employee training. This comprehensive guide aims to provide actionable insights into enhancing network security in small to mid-sized companies, addressing each critical step in the process and helping them build a resilient security infrastructure effectively.\"}),/*#__PURE__*/e(\"h2\",{children:\"Assessing the Current Security Posture\"}),/*#__PURE__*/e(\"p\",{children:\"The first step towards a resilient cybersecurity infrastructure is understanding your current security posture. This involves a comprehensive evaluation of your existing security measures, their effectiveness, and potential gaps.\"}),/*#__PURE__*/e(\"h3\",{children:\"Conducting a Comprehensive Audit\"}),/*#__PURE__*/e(\"p\",{children:\"An extensive cybersecurity audit forms the cornerstone of this process. This isn't merely a surface-level examination, but a detailed review of all existing cybersecurity measures. The audit should encompass every aspect of your security infrastructure, including vulnerability scanning, penetration testing, and security assessments. The key objective of this audit is to assess the effectiveness of your existing security measures, concentrating on aspects such as firewalls, encryption protocols, password policies, and employee cybersecurity awareness.\"}),/*#__PURE__*/e(\"h3\",{children:\"Evaluating Firewalls\"}),/*#__PURE__*/e(\"p\",{children:\"Firewalls serve as the first line of defense against potential cyber threats, blocking unauthorized access to your network. Therefore, your audit should scrutinize the effectiveness of your firewall configurations, ensuring they are optimally set up to protect against potential threats. The audit should also evaluate the firewall\u2019s capacity to permit necessary traffic, maintain network functionality, and implement appropriate security measures.\"}),/*#__PURE__*/e(\"h3\",{children:\"Analyzing Data Encryption Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Data encryption is another crucial aspect of cybersecurity. It ensures that sensitive data is adequately protected when stored or transmitted. The audit should examine your encryption practices, verifying their effectiveness and compliance with industry best practices and standards. Both encryption at rest (for data storage) and in transit (during data transmission) should be under scrutiny.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enhancing Password Policies\"}),/*#__PURE__*/e(\"p\",{children:\"Password policies play a critical role in network security. Weak or compromised passwords often lead to security breaches. By evaluating your organization's password policies, you can identify areas for improvement, such as implementing password complexity requirements, mandating multi-factor authentication, and regular password changes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Reviewing Employee Cybersecurity Awareness\"}),/*#__PURE__*/e(\"p\",{children:\"Employees can serve as the first line of defense against threats like phishing and social engineering attacks, provided they have a solid understanding of cybersecurity best practices. The audit should measure their comprehension of these practices, their ability to recognize potential threats, and their responses to simulated cyber-attacks. Based on the findings, implement employee training programs to enhance their knowledge and skills.\"}),/*#__PURE__*/e(\"h3\",{children:\"Leveraging Tools and Services\"}),/*#__PURE__*/e(\"p\",{children:\"Making use of available tools and services can significantly enhance the security assessment process. Automated security assessment tools can scan your network, identifying vulnerabilities such as unpatched software, outdated systems, or insecure network configurations. Penetration testing services can simulate real-world attacks to test your defenses and uncover weaknesses. Leveraging these resources helps prioritize fixes based on the severity and likelihood of each threat, thus reinforcing your network's security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Enhancing Employee Training and Awareness\"}),/*#__PURE__*/e(\"p\",{children:\"While technology plays a crucial role in cybersecurity, humans are often the weakest link. However, with the right approach and training, employees can become an invaluable asset in identifying and mitigating potential threats before they evolve into severe security incidents.\"}),/*#__PURE__*/e(\"h3\",{children:\"Implementing Regular Training Programs\"}),/*#__PURE__*/e(\"p\",{children:\"To equip your employees with the necessary skills and knowledge, provide comprehensive and regular cybersecurity training. This training should not only cover the basics of cybersecurity but also address specific threats your organization might face. Focus on teaching employees how to recognize and respond to phishing attempts, using real-world examples or simulations.\"}),/*#__PURE__*/e(\"h3\",{children:\"Promoting Strong, Unique Passwords\"}),/*#__PURE__*/e(\"p\",{children:\"Promote the use of strong, unique passwords across all accounts. Educate employees about the benefits of password management tools and the importance of multi-factor authentication. This will strengthen their personal account security and, consequently, the overall network security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Reinforcing Responsible Handling of Sensitive Data\"}),/*#__PURE__*/e(\"p\",{children:\"Employees often handle sensitive data, making it imperative that they understand the importance of data security. Training should cover secure data storage practices, encrypted communication methods, and proper procedures for disposing of sensitive data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Creating a Cybersecurity Awareness Program\"}),/*#__PURE__*/e(\"p\",{children:\"Establishing a cybersecurity awareness program can help keep employees informed about emerging threats and best practices to combat them. Regular updates, which could be in the form of newsletters, seminars, or briefings, keep cybersecurity at the forefront of employees\u2019 minds.\"}),/*#__PURE__*/e(\"h3\",{children:\"Gamifying Training\"}),/*#__PURE__*/e(\"p\",{children:\"One innovative way to increase engagement and retention during training is to gamify the process. Introducing competitions to recognize phishing attempts or create strong passwords can make learning fun and effective. Incentives and rewards can encourage better retention of information and cultivate a culture of cybersecurity awareness within the organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the current state of your network's security and investing in employee training are the first steps toward a more secure future. In the subsequent sections, we will delve into additional steps to fortify your network security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Employing a Robust Document Management System\"}),/*#__PURE__*/e(\"p\",{children:\"In the complex and challenging digital world we inhabit, cybersecurity is a pressing concern for small to mid-size companies. Part of addressing this challenge involves employing a robust Document Management System (DMS). More than just a storage solution, a well-implemented DMS plays a crucial role in an organization's cybersecurity framework, safeguarding important data and documents from potential threats. It acts as a bulwark against data breaches, ensuring that sensitive information remains secure while still accessible to those who need it within the organization.\"}),/*#__PURE__*/e(\"p\",{children:\"In the complex and challenging digital world we inhabit, cybersecurity is a pressing concern for small to mid-size companies. Part of addressing this challenge involves employing a robust Document Management System (DMS). More than just a storage solution, a well-implemented DMS plays a crucial role in an organization's cybersecurity framework, safeguarding important data and documents from potential threats. It acts as a bulwark against data breaches, ensuring that sensitive information remains secure while still accessible to those who need it within the organization.\"}),/*#__PURE__*/e(\"h3\",{children:\"Importance of Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"A key feature to seek out in a DMS is the support for encryption. Encryption is a method of converting data into a coded version to prevent unauthorized access. When your data is encrypted, it is translated into cipher text, which is impossible to read without the correct decryption key. It's crucial to ensure that the DMS supports encryption for data both during transit and while at rest.\"}),/*#__PURE__*/e(\"p\",{children:\"For data in transit, encryption protects your information as it's being transferred between your network and the destination (like the cloud storage). For data at rest, encryption provides protection for your data stored in databases, on disk drives, or other storage mediums. In essence, a comprehensive encryption strategy can make a significant difference in preventing unauthorized access to sensitive data and is therefore a must-have feature for any DMS.\"}),/*#__PURE__*/e(\"h3\",{children:\"Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Access control is another pivotal aspect when selecting a DMS. This feature allows administrators to grant or restrict user access to specific documents or sets of documents. A robust DMS should offer fine-grained access control, allowing access permissions to be allocated on a need-to-know basis.\"}),/*#__PURE__*/e(\"p\",{children:\"Fine-grained access control minimizes the risk of data leakage or accidental deletion by restricting document access to a limited number of authorized personnel. It gives businesses the flexibility to adjust access rights based on the user role, project, or department, thereby enhancing security and accountability within the organization.\"}),/*#__PURE__*/e(\"h3\",{children:\"Version Control and Audit Trail\"}),/*#__PURE__*/e(\"p\",{children:\"An ideal DMS will also offer version control and maintain a detailed audit trail. Version control, or versioning, allows users to track changes made to documents over time, ensuring that previous versions can be retrieved if needed. This can be particularly useful in situations where a document has been erroneously edited or deleted, or when you need to review the history of changes made to a document.\"}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, an audit trail keeps a record of who accessed a document, when, and what changes were made. This feature provides additional layers of accountability and security. A reliable audit trail can play a crucial role in a security audit or investigation, allowing companies to pinpoint any unauthorized access or changes to a document.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Regular System Updates and Patching\"}),/*#__PURE__*/e(\"p\",{children:\"One of the cornerstones of effective network security for small to mid-size companies is the regular implementation of system updates and patching. These are crucial, non-negotiable elements of a robust security strategy that can make a significant difference in your organization's vulnerability to cyber threats. Neglecting this aspect of security could potentially expose your network to hackers who are always on the lookout for systems with outdated security patches and software vulnerabilities.\"}),/*#__PURE__*/e(\"h3\",{children:\"Value of Regular Updates and Patching\"}),/*#__PURE__*/e(\"p\",{children:\"Regular updates and patches are critical because they address a variety of issues. They eliminate known vulnerabilities, rectify bugs, plug security loopholes, and often introduce new features or improve existing ones. Cybercriminals often exploit outdated software, which tends to have security vulnerabilities. Keeping all software components up-to-date helps eliminate these vulnerabilities, reducing the potential points of entry for hackers.\"}),/*#__PURE__*/e(\"h3\",{children:\"Automated Patch Management\"}),/*#__PURE__*/e(\"p\",{children:\"Keeping track of every software update can be a cumbersome task. This is where automated patch management tools come into play. These tools can check for updates across various software, including operating systems, applications, and network devices, and automatically apply patches as they become available. Automated patch management not only saves time but also ensures that no critical update gets missed, strengthening the security posture of your organization.\"}),/*#__PURE__*/e(\"h3\",{children:\"Consistent Application of Updates\"}),/*#__PURE__*/e(\"p\",{children:\"The process of applying updates and patches should be systematic and regular. Consistency is vital, as cybersecurity is not a one-time task but an ongoing process. Companies should establish a regular schedule for checking and applying updates. This should become a regular part of your IT routine, just like backing up data or checking the health of your hardware.\"}),/*#__PURE__*/e(\"p\",{children:\"The consistent application of updates and patches will make sure your systems are protected from newly discovered vulnerabilities. This is especially important considering that new threats emerge daily, and the best defense is staying up-to-date.\"}),/*#__PURE__*/e(\"h2\",{children:\"Developing a Comprehensive Cybersecurity Strategy\"}),/*#__PURE__*/e(\"p\",{children:\"In the landscape of rapidly evolving cyber threats, small to mid-size companies should prioritize the development of a comprehensive cybersecurity strategy. This strategy, encompassing several crucial elements, serves as the blueprint for managing the threats and risks associated with cybercrime, and guides the company towards more secure business operations.\"}),/*#__PURE__*/e(\"h3\",{children:\"Real-Time Asset Management\"}),/*#__PURE__*/e(\"p\",{children:\"One of the pillars of an effective cybersecurity strategy is real-time asset management. It is crucial to maintain an accurate inventory of all IT assets, including software, hardware, network infrastructure, and data. Understanding what assets you have, where they are located, and their inherent vulnerabilities, provides the basis for securing them effectively. It enables an organization to identify what needs protection and where potential vulnerabilities may exist. An efficient asset management system will alert the organization to any unauthorized changes, providing an additional layer of security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Policy and SOP Management\"}),/*#__PURE__*/e(\"p\",{children:\"Sound policies and standard operating procedures (SOPs) are the backbone of any robust cybersecurity strategy. These policies define the organization's stance on security, outlining the acceptable use of resources, password protocols, incident response plans, and more. SOPs, on the other hand, provide detailed, step-by-step instructions for security-related tasks, ensuring that all procedures are performed consistently and correctly. Developing strong policies and SOPs not only helps in maintaining security but also instills a culture of cybersecurity awareness among employees.\"}),/*#__PURE__*/e(\"h3\",{children:\"Risk Management\"}),/*#__PURE__*/e(\"p\",{children:\"Risk management is an ongoing process that involves identifying, assessing, and managing risks associated with cyber threats. Regular risk assessments can help pinpoint vulnerabilities in your systems, processes, and people that could be exploited by hackers. Once identified, you can manage these risks by implementing controls to mitigate them, transferring the risk through insurance, or accepting the risk if it falls within acceptable thresholds. It\u2019s crucial to prioritize security efforts based on the information gathered from these assessments.\"}),/*#__PURE__*/e(\"h3\",{children:\"Adherence to Cybersecurity Frameworks\"}),/*#__PURE__*/e(\"p\",{children:\"Adherence to established cybersecurity frameworks such as ISO 27001 or NIST 800-53 is an important part of a comprehensive cybersecurity strategy. These frameworks provide a structured approach to managing information security and include best practices that help maintain a standard level of security. By adhering to these frameworks, small to mid-size companies can ensure that they are adopting internationally recognized and respected practices.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, developing a comprehensive cybersecurity strategy is not a luxury but a necessity for small to mid-size companies. By including real-time asset management, policy and SOP management, risk management, and adherence to cybersecurity frameworks, companies can significantly improve their network security and foster a resilient cybersecurity culture.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Investing in Advanced Security Solutions\"})}),/*#__PURE__*/e(\"p\",{children:\"The fight against evolving cyber threats necessitates that small to mid-size companies invest in cutting-edge security solutions. These solutions, which include a variety of tools and technologies, provide an additional layer of protection to the network and data, thus enhancing the overall cybersecurity posture of the organization.\"}),/*#__PURE__*/e(\"h3\",{children:\"Firewalls\"}),/*#__PURE__*/e(\"p\",{children:\"Firewalls serve as a virtual barrier between your internal network and external networks such as the internet. They monitor and control incoming and outgoing network traffic based on predetermined security rules. For businesses with online storefronts, robust web application firewalls are essential to protect web servers from attacks like Cross-Site Scripting (XSS) and SQL Injection. For broader network protection, perimeter firewalls can provide a first line of defense against unauthorized access. Both types are critical to maintain the integrity of your organization's network.\"}),/*#__PURE__*/e(\"h3\",{children:\"Intrusion Detection and Prevention Systems (IDS/IPS)\"}),/*#__PURE__*/e(\"p\",{children:\"Intrusion Detection and Prevention Systems (IDS/IPS) are key to enhancing network security. These systems monitor the network for potential malicious activities, log information about such activities, report them, and even take proactive measures to stop them. IDS/IPS solutions are capable of detecting network anomalies in real-time and generate alerts, thereby allowing security personnel to take timely actions against potential threats.\"}),/*#__PURE__*/e(\"h3\",{children:\"Secure Cloud Storage\"}),/*#__PURE__*/e(\"p\",{children:\"With the increasing adoption of cloud technologies, choosing cloud storage solutions with robust security measures is vital. A secure cloud storage solution offers features such as data encryption, strong user authentication, data redundancy, and backup services to safeguard your data stored in the cloud. Moreover, top-tier cloud providers continuously update their security measures, which provides an added layer of protection against emerging threats.\"}),/*#__PURE__*/e(\"h3\",{children:\"Encryption Software\"}),/*#__PURE__*/e(\"p\",{children:\"Investing in encryption software tailored to your organization's needs is a smart move to protect sensitive data. Encryption software transforms data into a format that can only be read with a decryption key, protecting it from unauthorized access. It is particularly essential when handling sensitive information such as customer data, proprietary business information, or employee records. Depending on your requirements, you can choose to encrypt data at rest, data in motion, or both.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, investing in advanced security solutions is a key strategy to combat the evolving cyber threats that small to mid-size companies face today. By implementing firewalls, intrusion detection and prevention systems, secure cloud storage, and encryption software, companies can significantly enhance their network security, reduce their vulnerability to cyber attacks, and ensure the safety and integrity of their data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Importance of a Comprehensive Approach\"}),/*#__PURE__*/e(\"p\",{children:\"In today's digital landscape, cyber threats are no longer a concern confined to large enterprises. Small to mid-size businesses are increasingly finding themselves in the crosshairs of cybercriminals, making the fortification of network security an imperative, rather than an option. A well-structured and comprehensive approach encompassing regular audits, robust document management systems, regular system updates and patching, a solid cybersecurity strategy, and advanced security solutions can effectively strengthen the security posture of these businesses. The aforementioned steps are not isolated actions but integral components of a holistic security plan designed to address potential vulnerabilities and threats.\"}),/*#__PURE__*/e(\"h3\",{children:\"Long-Term Resilience and Success\"}),/*#__PURE__*/e(\"p\",{children:\"The goal of enhancing network security is not merely to avoid immediate threats but to ensure the long-term resilience and success of the business. By investing time, resources, and attention into network security, businesses protect their valuable assets - data, technology infrastructure, and most importantly, their reputation. Building a resilient network security framework not only safeguards against potential financial losses but also helps in fostering trust among customers and partners. This investment, though it may seem substantial initially, can pay significant dividends in terms of business continuity and resilience against cyber threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Navigating the complex terrain of network security can be daunting, but it is a journey that every small to mid-size company must undertake. It's not a one-time effort but a continuous process that evolves as new threats and vulnerabilities emerge. By taking proactive measures and committing to a comprehensive strategy, businesses can not only mitigate cyber risks but also prepare themselves for long-term success in an increasingly digital world.\"})]});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream Corporation, a leading provider of process improvement and cybersecurity solutions, has made a significant announcement today that they have decided to retarget their back-end products to the ODOO ERP platform. This move marks a major change in the company's approach to product development and operations, and reflects their commitment to adapting to the evolving needs of their clients and the market.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"By shifting their back-end systems to ODOO, Baystream will be able to streamline and standardize their operations across all of their international offices in Canada, Europe, and the USA. This will allow them to reduce operational costs, enhance their data security and management, and ensure consistent and efficient service delivery to their clients. In addition, Baystream will be able to integrate their core product offerings and M-Files with their cybersecurity suite, further enhancing the value of their solutions to their clients.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Baystream has always been at the forefront of innovation and has consistently sought out new and innovative ways to improve their products and services. By retargeting their back-end systems to ODOO, they are taking another step towards achieving their goals of delivering cutting-edge and high-quality solutions to their clients.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"This move is expected to become available in the second quarter of 2022 and Baystream's clients can look forward to a more streamlined and sophisticated solution offering from the company. Baystream's decision to retarget their back-end products to the ODOO ERP platform is a clear indication of their commitment to delivering the best possible solutions to their clients and staying ahead of the curve in the rapidly changing technology landscape.\"})]});export const richText12=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream Corporation has taken a significant step towards enhancing its services in the information security space by establishing a new division called Fileglobal. The newly formed corporation is dedicated to further developing and commercializing Baystream's robust cybersecurity products. In response to the changing demands of the market, Baystream has invested considerable resources into creating a secure information security platform that encompasses various elements such as an industry-standard SIEM, automatic hardware hardening, vulnerability monitoring, file monitoring, disaster recovery, and SLA monitoring.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The platform was designed to monitor both availability and performance degradation, as well as detect any abnormal user flows. Baystream saw the potential for this product to serve a larger market, and thus, decided to form a separate company that can solely focus on cybersecurity, cryptography, and secure messaging. This move allows Baystream to maintain its focus on its core competency, process improvement using M-Files, while ensuring that the cybersecurity product is given the attention and resources it deserves. With the creation of Fileglobal, Baystream is well-positioned to address the growing needs of organizations for secure and robust information security solutions.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"})]});export const richText13=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's fiercely competitive business landscape, an Enterprise Resource Planning (ERP) system plays a crucial role for organizations to maintain their competitiveness. An ERP system integrates and automates essential business functions, such as finance, inventory management, production planning, sales, and customer relationship management. By centralizing data and providing real-time insights, ERP systems streamline processes, enhance efficiency, and enable informed decision-making. Without an ERP system, organizations may struggle with disjointed systems, data silos, and manual processes, resulting in inefficiencies, errors, and delays. In contrast, having an ERP system allows companies to optimize operations, improve collaboration, and respond promptly to market changes. It provides a comprehensive view of the business, facilitates effective resource allocation, and supports strategic planning. In today's competitive environment, an ERP system is not just an advantage but a necessity for organizations seeking to thrive and stay ahead in their respective industries.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding ERP Systems\"}),/*#__PURE__*/e(\"p\",{children:\"To truly harness the transformative power of an ERP system, it is essential to grasp its core functionalities and understand its potential impact. At its essence, an ERP system is a powerful software framework that enables seamless coordination of diverse business operations.\"}),/*#__PURE__*/e(\"p\",{children:\"What sets ERP systems apart is their capacity to integrate and consolidate fragmented data streams, addressing the shortcomings of individual, standalone solutions. By providing a unified view of business operations, ERP systems eliminate the need for separate software dedicated to specific functions like supply chain management, inventory control, human resources, and financial operations. Instead, they bring all these components together under a single platform, facilitating streamlined and efficient management.\"}),/*#__PURE__*/e(\"p\",{children:\"An ERP system possesses several key attributes that make it an invaluable tool:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customizability: \"}),\"ERP systems can be tailored to meet the specific needs of an organization, ensuring a seamless alignment with its operational requirements.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Interoperability:\"}),\" These systems can be easily integrated with existing software and systems, facilitating the smooth exchange and flow of data across various departments and processes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data-centricity: \"}),\"ERP systems prioritize data consistency and promote synergy among different departments, enabling real-time decision-making based on accurate and up-to-date information.\"]}),/*#__PURE__*/e(\"p\",{children:\"However, the implementation of an ERP system goes beyond mere technological upgrade; it requires a profound cultural shift within the organization. Employees must embrace new work practices, fostering a collaborative and data-driven mindset. Therefore, the decision to adopt an ERP system should align with the company's strategic vision, objectives, and existing procedures, serving as an investment in the future vitality of the business.\"}),/*#__PURE__*/e(\"h2\",{children:\"Integrated Vs Non-Integrated ERP\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing an ERP system comes with its own set of challenges, including the decision between integrated and non-integrated ERP solutions. Integrated ERP offers streamlined processes, real-time data visibility, and enhanced collaboration, but may require customization and higher initial investment. Non-integrated ERP provides autonomy in system selection and lower costs, but can result in data silos and limited scalability. Assessing your organization's needs and weighing the pros and cons will help you make the right choice for a successful ERP implementation.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Competitive Edge of An Integrated ERP System\"}),/*#__PURE__*/e(\"p\",{children:\"In the fast-paced, highly competitive business environment of today, an integrated ERP system can deliver substantial advantages:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Efficiency and Accuracy:\"}),\" The ERP system centralizes data and automates business processes, eliminating data silos and redundant tasks, leading to significantly higher efficiency and accuracy.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data-Driven Decision Making:\"}),\" With all the business data at your fingertips, you can make quick, informed decisions that drive your business forward.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Visibility:\"}),\" An integrated ERP system provides real-time insight into every facet of your business, from supply chain and inventory management to customer relationship management.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proactive Problem-Solving:\"}),\" With the ability to identify and address issues in real-time, businesses can mitigate potential risks before they escalate.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Adaptability to Market Changes:\"}),\" By predicting and responding swiftly to market changes, businesses can stay ahead of the competition.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved Customer Service:\"}),\" By understanding customer needs better and tailoring services accordingly, businesses can significantly enhance customer satisfaction.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"The competitive edge gained from an ERP system, therefore, manifests in improved operational performance, greater customer satisfaction, and an ability to innovate and adapt swiftly. In essence, an ERP system can be the key to transforming your business strategy and accelerating your growth in an ever-evolving market.\"}),/*#__PURE__*/e(\"h2\",{children:\"How an Integrated ERP Enhances Data Security\"}),/*#__PURE__*/e(\"p\",{children:\"In the digital age, data security is paramount for businesses of all sizes. A robust ERP system brings with it multiple security measures that help to fortify your business data. Here's how an ERP system enhances data security:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" One of the foremost ways ERP systems protect your data is through stringent access controls. These systems can be configured to define who has access to what data, allowing you to prevent unauthorized access. Roles and permissions can be customized at granular levels, ensuring that employees can access only the data necessary for their roles.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Encryption:\"}),\" To safeguard data during transmission, ERP systems employ strong encryption methods. Whether data is in transit or at rest, encryption ensures that it remains unintelligible to unauthorized individuals.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Audit Trails:\"}),\" ERP systems create audit trails which log every action taken within the system. This means every data entry, modification, or deletion is recorded along with details like who performed the action and when. Audit trails are crucial for detecting any irregularities and tracing back to any potential breaches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Intrusion Detection:\"}),\" Many ERP systems come with built-in intrusion detection systems (IDS) that monitor the network for any suspicious activity. If any such activity is detected, the IDS alerts the system administrators to take immediate action.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Updates and Patches:\"}),\" ERP providers regularly release updates and patches to fix any identified vulnerabilities in the system. This continuous process of updating ensures the ERP system remains secure against the latest threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Backup and Recovery:\"}),\" ERP systems typically include data backup and recovery functions. Regular data backups are crucial for data security as they ensure that your data can be recovered in case of any incidents like data breaches or system failures.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Management:\"}),\" ERP systems can be equipped to ensure compliance with various industry-specific data security regulations. This includes features for data handling, privacy, reporting, and more.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Centralized Control:\"}),\" By centralizing all your business data, ERP systems eliminate the risks associated with data silos. Centralized control means that security measures can be consistently applied across the entire system.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By incorporating these security measures, ERP systems provide an enhanced layer of protection for your business data, contributing significantly to your overall cybersecurity strategy.\"}),/*#__PURE__*/e(\"h2\",{children:\"Overcoming Implementation Challenges in ERP\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing an ERP system can be a complex endeavor with various challenges to navigate. However, with proper planning and strategies in place, these challenges can be overcome. Here are key areas to consider when addressing common implementation challenges:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Choosing the Right ERP System:\"}),\" Selecting the most suitable ERP system for your organization requires a thorough evaluation of available options. This involves identifying specific business requirements, conducting research, and seeking recommendations from industry experts. Factors such as scalability, customization capabilities, vendor support, and integration with existing systems should be considered to make an informed decision.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Addressing Employee Resistance:\"}),\" Resistance to change is a common challenge during ERP implementation. Effective change management strategies can help overcome this hurdle. Transparent communication, employee training, and involvement in the decision-making process are essential. Creating a culture of collaboration and emphasizing the benefits of the ERP system can alleviate resistance and foster a smooth transition.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managing Budget Constraints:\"}),\" ERP implementation often requires a significant investment. Budget constraints may arise due to costs associated with software licensing, infrastructure upgrades, training, and ongoing maintenance. Conducting a comprehensive cost analysis and developing a realistic budget plan can help manage financial limitations. Exploring alternative financing options or adopting phased implementation strategies can optimize resource allocation.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Engaging Stakeholders:\"}),\" Engaging key stakeholders is crucial for successful ERP implementation. Active involvement of top management, department heads, and end-users fosters a sense of ownership and commitment. Addressing their concerns, aligning expectations with project goals, and maintaining open communication channels contribute to a smoother implementation process.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managing Change and Training:\"}),\" ERP implementation often entails significant changes to business processes and employee workflows. Resistance to change can hinder adoption and success. Investing in change management strategies and comprehensive training programs is vital. Involving employees from the early stages, providing clear communication, ongoing support, and education helps facilitate a smooth transition and widespread acceptance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Migration and Integration:\"}),\" Migrating existing data to the new ERP system and integrating it with other systems can pose challenges. Careful planning, data cleansing, mapping, validation, and rigorous testing are necessary to ensure accuracy and consistency. Establishing data governance protocols and minimizing disruptions and data integrity issues.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vendor Selection and Collaboration:\"}),\" Choosing a reliable and experienced ERP vendor is critical. Thorough evaluation based on expertise, track record, customer support, and system compatibility is necessary. Building a collaborative relationship, defining responsibilities and expectations, and maintaining clear communication channels contribute to a smooth implementation process.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous System Optimization:\"}),\" ERP implementation is an ongoing journey. Regular evaluation and optimization are essential to meet evolving business needs. This involves periodic reviews, software updates, and addressing user feedback to maximize the system's potential and maintain a competitive edge in the ever-changing business landscape.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By considering these areas and implementing effective strategies, organizations can navigate the challenges of ERP implementation and set themselves up for a successful and transformative experience.\"}),/*#__PURE__*/e(\"h2\",{children:\"Final Thoughts\"}),/*#__PURE__*/e(\"p\",{children:\"As we conclude, remember that the landscape of ERP systems is vast and diverse. While we, as Odoo integration partners, would naturally recommend Odoo for its comprehensive suite of applications, it's important to keep in mind that the right fit depends largely on your unique business needs and goals. Our ultimate intention isn't to sell a specific ERP solution, but to provide you with valuable insights that aid your decision-making process.\"}),/*#__PURE__*/e(\"p\",{children:\"In the journey of digital transformation, the power of technology - when harnessed correctly through tools like integrated ERP systems - can drive growth and sustain a competitive edge in a dynamic market. No matter which ERP system you eventually choose, we hope this article has provided you with meaningful perspective and guidance. Embrace the possibilities and unlock the full potential of your business with an integrated ERP system. Remember, your choice of ERP isn't about picking the best system, but about finding the system that's best for you.\"})]});export const richText14=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream Corporation, a leading provider of information management solutions, and its partners are proud to participate in the upcoming ARMA Information Governance Conference taking place in Montreal on June 3-4, 2019. The event, held at the Sheraton Centre, is a highly anticipated gathering of professionals and industry experts within the records and information management field.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"At the conference, Baystream and its partners will showcase their cutting-edge services and solutions, offering attendees the opportunity to learn about the latest trends and advancements in the field. As a leading provider of information management solutions, Baystream is committed to helping organizations streamline their operations and manage their data more effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"This year's ARMA Information Governance Conference provides a unique platform for Baystream to connect with other experts in the field and share their experience and knowledge with attendees. With a focus on driving innovation and promoting best practices in information governance, this conference is a must-attend event for professionals who want to stay ahead of the curve.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Whether you're a seasoned professional in the field, or just starting to explore information governance, Baystream and its partners look forward to connecting with you at the ARMA Information Governance Conference in Montreal.\"})]});export const richText15=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream has a strong presence in the manufacturing industry and is proud to be a part of Canada\u2019s Society of Manufacturing Engineers. The company is honored to be represented on the local Executive Chapter Board, further solidifying its commitment to advancing the manufacturing industry.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"For more than 30 years, the Canadian Manufacturing Technology Show (CMTS) has been a renowned event where leading industries, such as automotive and aerospace, come together to source solutions and gain knowledge from the global leaders in machine tools, tooling, metalworking, and advanced manufacturing. Baystream will be exhibiting its innovative solutions at the event, showcasing its cutting-edge technology that is designed to improve manufacturing processes.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"At the heart of Baystream\u2019s solutions is its distributed data management system, BayMDM-DIS. This innovative system is designed to simplify the interaction between tools and systems while maintaining stringent security requirements. BayMDM can be thought of as middleware, but it is much more than just a tool for performing data transformations. It serves as a hub with its own data processing core and a high-performance user interface, designed for fast deployment.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"BayMDM-DIS is specifically designed to help manufacturers increase efficiencies, reduce costs, and improve overall productivity. With its focus on \u201CIntelligent Manufacturing\u201D and its commitment to fostering innovation, Baystream is leading the way in improving the manufacturing industry. The company\u2019s solutions are helping to increase ROI and drive growth in the sector.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The CMTS is a great platform for Baystream to demonstrate its expertise and showcase its innovative solutions to a large, diverse audience of manufacturing professionals. The company looks forward to sharing its knowledge, connecting with other industry leaders, and making a positive impact in the manufacturing industry.\"})]});export const richText16=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:'Baystream has had a strong and long-standing relationship with M-Files for over a decade as a \"Gold\" Partner. During this time, Baystream has been actively involved in technical and support initiatives with other M-Files Partners and has conducted various training sessions for both partners and customers. As a Microsoft Dynamics Partner, Baystream has developed its own unique solutions to improve Accounts Payable, Customer Relationship Management (CRM), and Process Management operations, some of which have been sold through selected M-Files Partners. Baystream\\'s Dynamics-based Accounts Payable Platform is widely used in high volume applications across the United States and Europe.'}),/*#__PURE__*/e(\"p\",{children:\"These efforts demonstrate Baystream's commitment to M-Files and its mission to create platforms and solutions that utilize the advanced capabilities and user-friendly design of the M-Files product. In recognition of Baystream's achievements, M-Files has signed a reseller agreement with Baystream and officially designated Baystream as an Authorized Service Provider. This designation is a testament to Baystream's expertise in M-Files technology and its ability to provide exceptional service and support to its customers.\"})]});export const richText17=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The opening of Baystream's new Operations Centre in Technoparc St-Laurent provides the company with a strong foundation for the validation of its technology applications by early adopters. The Centre is supported by Partner Solutions from leading companies such as Microsoft, ABBYY, and M-Files.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The Technoparc is a hub for numerous innovative companies operating in various industries such as Life Sciences, TIC (Information and Communications Technology), Aerospace, and Clean-Tech, and many have already turned to Baystream for their process IT services.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"2016 was a pivotal year for Baystream, marked by the launch of new products and rapid expansion of its market presence in Europe and North America. The opening of the new Operations Centre in Technoparc St-Laurent was a major milestone in Baystream's growth and reflects its commitment to providing the best possible service and support to its clients. The Centre serves as a hub for Baystream's operations in Canada and is a testament to the company's commitment to innovation, excellence, and growth.\"})]});export const richText18=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"For several years now, DocuPlus and Baystream have been exploring ways to collaborate and offer innovative services to their common clients. With the increasing amount of content being generated at an accelerating pace, along with the opportunities for improved organizational processes enabled by cloud technology, both companies saw the potential for creating significant value for their clients with a combined service offering.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:'In response to the evolving sophistication of the Enterprise Content Management market, the joint DocuPlus and Baystream offering provides a robust solution that merges the technologies of M-Files Inc. with proprietary tools to deliver a comprehensive solution with all the necessary elements to help companies move closer to the \"paperless office\" vision. This offering is designed to meet the growing demands of organizations that need to manage, store, and access their content efficiently and effectively.'}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The joint DocuPlus and Baystream solution leverages the latest technologies and best practices to provide a seamless and integrated experience for users. By combining their expertise and resources, the two companies are able to offer a more comprehensive solution that meets the needs of their clients and helps them to achieve their business objectives. The joint offering is an excellent example of the companies' commitment to delivering innovative and effective technology solutions to the market.\"})]});export const richText19=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream is proud to present its innovative Accounts Payable solution that is based on Microsoft Dynamics GP and leverages the M-Files Document Management System, as well as Baystream\u2019s MDM Master Data Manager. This solution, branded as MDM-AP/GP, has already gained widespread adoption by major corporations in Canada and the United States and will soon be available to customers through M-Files Channel Partners across the United States.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"MDM-AP/GP is designed for high volume, high sophistication purchasing environments and provides a comprehensive solution that streamlines the accounts payable process. Data capture is available through the integration of ABBYY FlexiCapture or PSIGEN Capture, both of which have been deeply integrated with MDM-AP/GP. Baystream has plans to integrate with other OCR systems in the future to further enhance the capabilities of the solution.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to its integration with Microsoft Dynamics GP, MDM-AP/GP also interfaces with Microsoft Dynamics CRM and Salesforce, providing a seamless experience for users and ensuring that all relevant data is readily available in a single location. This enhances the accuracy and efficiency of the accounts payable process and provides organizations with the insights they need to make informed decisions.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The MDM-AP/GP solution is an excellent example of Baystream\u2019s commitment to delivering innovative and effective technology solutions to the market. By leveraging the latest technologies and best practices, Baystream is helping organizations to achieve their business objectives and stay ahead of the competition.\"})]});export const richText20=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:'Baystream is a proud member of Canada\u2019s Society of Manufacturing Engineers and has an active presence on the local Executive Chapter Board. The company is committed to fostering the concept of \"Intelligent Manufacturing\" and is actively investing in innovative solutions that can increase efficiencies and deliver a higher return on investment.'}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"One of the key contributions Baystream brings to the table is its cutting-edge distributed data management system, MDM-DIS. This system is designed to simplify the interaction between various tools and systems, while maintaining stringent security requirements. MDM can be thought of as middleware, but it offers much more than just data transformations. It functions as a central hub, with its own data processing core, and a high-performance user interface that is designed for fast deployment.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The MDM-DIS system has been specifically developed to streamline the data management process in the manufacturing sector and has been widely adopted by many companies looking to increase efficiency and improve their bottom line. By integrating MDM into their operations, companies can enjoy a single source of truth, improved data quality, and enhanced security.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Baystream's membership in the Society of Manufacturing Engineers and its representation on the local Executive Chapter Board are further indications of the company's commitment to advancing the manufacturing industry through the application of innovative technology solutions. The company is dedicated to delivering solutions that can help manufacturers to achieve their business objectives and stay ahead of the competition.\"})]});export const richText21=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baystream is a regular exhibitor at the Montreal Manufacturing Technology Show (MMTS), a premier event in Quebec and Canada that focuses on cutting-edge manufacturing solutions. MMTS specializes in providing a platform for the exhibition of tools, additive manufacturing, automation, design, and physical asset management solutions for the manufacturing industry.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The show provides an ideal forum for manufacturers and industry allies to source innovative solutions, educate their teams, and build valuable networks that form the foundation for future growth in the sector. Baystream is proud to be a part of this event and to share its expertise in process automation solutions with the manufacturing community.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"At MMTS, Baystream process automation solutions that seamlessly integrate with Microsoft Dynamics ERP and CRM systems. These solutions are designed to help manufacturers streamline their operations and improve their overall efficiency. By automating manual processes, manufacturers can reduce errors, increase accuracy, and make better use of their valuable time and resources.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The Montreal Manufacturing Technology Show is a vital event for the manufacturing community and provides an opportunity for companies like Baystream to connect with industry leaders and to demonstrate the latest innovations in the field. By participating in MMTS, Baystream is committing to the ongoing development and advancement of the manufacturing industry and its associated technologies.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"})]});export const richText22=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The Baystream company has a long-standing history of supporting and participating in the IRCM (Institut de Recherches Cliniques de Montreal) Research Day. For the past two years, Baystream has been making a significant contribution to the event by offering bursaries to students. This support is aimed at linking the world-renowned IRCM center of excellence in clinical research with the local scientific community and providing students with the financial support they need to further their education and research.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Every year in May, the IRCM hosts its annual Research Day, where trainees are invited to present their research results in poster or oral format. This provides a unique opportunity for students to share their findings with a wider audience and receive valuable feedback from other researchers and experts in the field. In 2015, the Baystream Prize was awarded to a talented and dedicated doctoral student named Joanne Leung, who was working in the Immune Regulation Research Unit under the supervision of Dr. Woong-Kyung Suh.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Ms. Leung was pursuing her PhD in the Department of Microbiology and Immunology at McGill University, one of the leading institutions in the field. Her research focused on the role of host B7-H4 in promoting protective anti-tumor T-cell immunity against immunogenic tumor transplants, and her work made a significant contribution to the understanding of this complex area of research.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:'The title of her prize-winning oral presentation was \"Absence of host B7-H4 promotes protective anti-tumor T-cell immunity against immunogenic tumor transplants\". The presentation was well-received by the audience and was recognized as one of the standout presentations of the day, earning her the prestigious Baystream Prize.'}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The prize was presented by Dr. Francis Bellido, Baystream's Life Sciences Director, during the event. Dr. Bellido praised Ms. Leung's work and congratulated her on her achievement. He emphasized Baystream's commitment to supporting and encouraging up-and-coming scientists and researchers in their pursuit of advancing the field of clinical research.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/t(\"p\",{children:[\"In conclusion, the Baystream company's support of the IRCM Research Day and its contribution to the education and development of young scientists is a testament to its commitment to the scientific community and its dedication to furthering the field of clinical research.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})]});export const richText23=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Cloud-A\",/*#__PURE__*/e(\"em\",{children:\" \"}),\"Computing Inc. and Baystream have joined forces to bring a new level of data management and security to Canadian enterprises. Cloud-A is a leading Canadian OpenStack Public Cloud provider and is well-known for its enterprise-grade computing and redundant bulk storage products. On the other hand, Baystream is a company specializing in authentication and content management systems. The partnership between these two companies will provide Canadian businesses with a solution to their data management and security challenges.\"]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The solution offered by this partnership will be a cloud storage-as-a-service system, built using CTERA Networks technology and integrated with Baystream's authentication and content management systems. The system will be hosted on Cloud-A's public cloud infrastructure, providing Canadian businesses with a Canadian-owned and Canadian-operated solution. This is particularly important for businesses who are concerned about data sovereignty and privacy, as they will now have the peace of mind that their data is stored within Canada's borders.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"The new platform will provide Canadian enterprises with a comprehensive data management solution that covers all their needs, from data storage to data security. The solution will be backed by Cloud-A's enterprise-grade computing and redundant bulk storage products, which ensures that businesses will have access to reliable and secure storage options. The integration of Baystream's authentication and content management systems will provide an added layer of security, ensuring that businesses' data is only accessible by authorized personnel.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Baystream has already started the process of onboarding clients to the new platform, and the results have been phenomenal. The company has reported impressive performance results, which is a testament to the robustness and reliability of the solution. The platform has been designed to scale as businesses grow, ensuring that they have access to the resources they need as they expand. The platform also offers businesses the flexibility to choose the storage options that best fit their needs, whether it be cloud storage or on-premises storage.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, the partnership between Cloud-A Computing Inc. and Baystream is a significant development for Canadian enterprises. The solution offered by this partnership will provide businesses with a comprehensive data management solution that covers all their needs, from data storage to data security. The solution is Canadian-owned and Canadian-operated, ensuring that businesses' data is stored within Canada's borders. The platform has been designed to scale as businesses grow, and businesses have the flexibility to choose the storage options that best fit their needs. This strategic partnership is expected to bring a new level of data management and security to Canadian enterprises, addressing the challenges they face in this regard.\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "gGAAAA,IAAiF,IAAMC,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAA8L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAwX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAA+a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uWAAwV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAqO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAsQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ydAAod,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAA6P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA0S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sHAAyHE,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAE,4JAAuJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,sJAAsJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uJAAkJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,+GAAqG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oJAAuJE,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAE,gIAA2H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA8S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qZAAqZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAA+N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAAgL,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,q7BAA64B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ukCAAyiC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,klDAAshD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6qBAA6qB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,61BAA+zB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2uBAA6sB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,goCAAokC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qaAAqa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+cAA+c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,q0BAA2zB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gzBAA2yB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,41BAAu1B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,u7BAA66B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yxBAAyxB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qjBAAgjB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ypBAAqoB,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mTAA8S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mYAA8X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ibAA4a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAAkS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAuV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sUAAsU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAA+I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAAwT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAA8S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4TAA4T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAA6P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAAiO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,i2BAAk1B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ipCAAkoC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oEAAoE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iaAA4Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2dAAsd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gYAA2X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yZAAoZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAAiY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4cAAkc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uaAAua,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ueAAwd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kbAAwa,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,waAAwa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wbAAoa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kXAA6W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAA2S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAAmV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mYAAoX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mjBAAmjB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0fAA0f,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+gBAA+gB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4TAAuT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAAqF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,6JAA6J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6NAA6N,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yUAAyU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAA4V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,iJAA8JA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,0KAAuLA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,4IAAyJA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gLAAgL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,qKAAkLA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,oIAAiJA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,yJAAsKA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,mLAAgMA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,uKAAoLA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAAwR,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6XAA6X,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qUAAqU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,s6BAAs6B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ygBAAygB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ifAAif,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAA+a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,ibAAib,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2eAA2e,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,gTAAgT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,mNAAmN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,uPAAuP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,mNAAmN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,+OAA+O,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,maAAma,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gYAAgY,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,koBAAkoB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6ZAA6Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,udAAud,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+6BAA+6B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8iBAA8iB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ucAAkc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4YAA4Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4bAA4b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4gBAA4gB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAAwR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kkBAAkkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kkBAAkkB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0YAA0Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8cAA8c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sVAAsV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uZAAuZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAA8V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ufAAuf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gcAAgc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,odAAod,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mmBAAmmB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0kBAA0kB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gjBAA2iB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mcAAmc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2kBAA2kB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0cAA0c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0eAA0e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAA+a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,stBAAstB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kpBAAkpB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ocAAoc,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+ZAA+Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6hBAA6hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kcAAkc,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,inBAAinB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8qBAA8qB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gkCAAgkC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ygBAAygB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6IAA6I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yKAAyK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2KAA2K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2jBAA2jB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,yKAAyK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,0HAA0H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,yKAAyK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,8HAA8H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,yIAAyI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,2VAA2V,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6MAA6M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sTAAsT,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,mOAAmO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,iNAAiN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,sOAAsO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qLAAqL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,6MAA6M,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,wZAAwZ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,sYAAsY,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,sbAAsb,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,+VAA+V,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,4ZAA4Z,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,sUAAsU,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,4VAA4V,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,0TAA0T,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+bAA+b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6iBAA6iB,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0XAA0X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0XAA0X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ySAAoS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mdAAmd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2dAAsd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAsX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mrBAAorB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6gBAA6gB,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wfAAwf,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+fAA+f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ufAAuf,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+bAA0b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ybAAyb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA0T,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kfAAkf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6WAA6W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAA8V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2XAA2X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qgBAAqgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+gBAA+gB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gWAAgW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kRAA+RE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,SAAS,GAAG,CAAC,EAAE,+gBAA+gB,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,miBAAmiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oiBAAoiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oiBAAoiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8uBAA8uB,CAAC,CAAC,CAAC,CAAC,EAC/24HwB,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["init_ssg_sandbox_shims", "richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "__FramerMetadata__"]
}
