{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/67SzAwrAb0ZyeTWhmfi4/IxLcwREZchIAn1tiL7nk/SppMOgxDX-8.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as r}from\"framer\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Azure is a cloud computing platform provided by Microsoft that offers a variety of services for building, deploying, and managing applications and services in the cloud. One of the core components of Azure is its compute services, which allow users to create and manage virtual machines, containers, and serverless computing resources.\"}),/*#__PURE__*/e(\"h2\",{children:\"Azure Virtual Machines\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Virtual Machines are essentially virtual computers that run in the cloud. They provide a wide range of options for configuring the VM hardware, operating system, and storage. Azure VMs are available in a variety of sizes, ranging from small VMs with a single core and 768 MB of RAM to large VMs with 416 cores and 12.7 TB of RAM. This allows you to choose the right size for your workload and scale up or down as needed.\"}),/*#__PURE__*/e(\"p\",{children:\"Azure VMs are fully isolated from other VMs running on the same physical hardware. Each VM runs on a hypervisor, which is responsible for managing the VM's hardware resources. Azure VMs support a wide range of operating systems, including Windows Server, Ubuntu, Debian, CentOS, Red Hat Enterprise Linux, SUSE Linux Enterprise, and more.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to Pick the Correct Virtual Machine Size\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing the correct Virtual Machine (VM) size is crucial when working with Azure. Selecting the right VM size helps to ensure optimal performance, scalability, and cost-effectiveness. The following guide will help you understand the key factors to consider when choosing the correct VM size in Azure.\"}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Determine your workload requirements\"})})}),/*#__PURE__*/e(\"p\",{children:\"Before selecting a VM size, you need to determine the requirements of your workload. This will help you understand what type of VM resources you need. You should consider the following factors:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CPU:\"}),\" Determine the number of CPU cores your workload requires. Some workloads may require multiple cores, while others may not need more than one.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Memory:\"}),\" Determine the amount of RAM required for your workload. Workloads that require more RAM may perform better on a larger VM size.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage:\"}),\" Consider the amount of storage required for your workload. This includes both the size of the OS disk and any additional data disks you need.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network:\"}),\" Consider the amount of network bandwidth your workload requires.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By understanding your workload requirements, you can choose a VM size that provides the appropriate resources.\"}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Choose the appropriate VM series\"})})}),/*#__PURE__*/e(\"p\",{children:\"Azure offers a range of VM series, each optimized for different types of workloads. Each series is designed to provide specific performance characteristics, and each has a different price point.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"General-purpose:\"}),\" This series provides a balanced CPU-to-memory ratio and is suitable for a wide range of workloads.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compute-optimized:\"}),\" This series provides a higher CPU-to-memory ratio and is suitable for CPU-intensive workloads.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Memory-optimized:\"}),\" This series provides a higher memory-to-CPU ratio and is suitable for memory-intensive workloads.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage-optimized:\"}),\" This series provides high disk throughput and is suitable for workloads that require high storage performance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GPU:\"}),\" This series provides specialized hardware for graphics processing and is suitable for workloads that require GPU acceleration.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Choose the appropriate VM series based on the characteristics of your workload.\"}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Determine the VM size\"})})}),/*#__PURE__*/e(\"p\",{children:\"After determining your workload requirements and choosing the appropriate VM series, it's time to determine the VM size. Azure provides a wide range of VM sizes, each with different CPU, memory, and storage configurations.\"}),/*#__PURE__*/e(\"p\",{children:\"Azure VM sizes are identified by a series of letters and numbers. The letters represent the VM series, and the numbers represent the number of vCPUs and the amount of memory in gigabytes (GB).\"}),/*#__PURE__*/e(\"p\",{children:'For example, the \"Standard_DS1_v2\" VM size provides 1 vCPU, 3.5 GB of memory, and a 50 GB OS disk. The \"Standard_DS11_v2\" VM size provides 16 vCPUs, 56 GB of memory, and a 1,000 GB OS disk.'}),/*#__PURE__*/e(\"p\",{children:\"Use the Azure VM Size Calculator to help you determine the appropriate VM size for your workload. The calculator takes into account the number of vCPUs, amount of memory, and storage requirements of your workload.\"}),/*#__PURE__*/e(\"ol\",{start:\"4\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Consider scaling\"})})}),/*#__PURE__*/e(\"p\",{children:\"As your workload evolves, you may need to scale your VM resources. Azure provides several options for scaling your VMs:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vertical scaling:\"}),\" This involves increasing or decreasing the resources allocated to a VM. For example, you can increase the number of vCPUs or the amount of memory allocated to a VM.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Horizontal scaling:\"}),\" This involves adding or removing VMs to handle changes in workload demand. For example, you can add more VMs to handle increased traffic to your website.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Consider scaling when choosing the appropriate VM size. Choose a VM size that provides enough headroom for future growth, but don't oversize your VMs, as this can result in unnecessary costs.\"}),/*#__PURE__*/e(\"h2\",{children:\"Ways to Control Virtual Machine Costs\"}),/*#__PURE__*/e(\"p\",{children:\"Controlling costs is a top priority when working with Azure Virtual Machines. Azure provides several tools and services that can help you optimize your virtual machine usage and reduce costs. The following guide will provide an overview of the best practices for controlling costs when using Azure Virtual Machines.\"}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Azure Cost Management and Billing\"})})}),/*#__PURE__*/e(\"p\",{children:\"Azure Cost Management and Billing is a free service that helps you monitor and manage your Azure spending. It provides a range of tools to help you optimize your costs, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost analysis:\"}),\" This tool allows you to view your Azure spending by resource, service, or department. It provides insights into your spending trends and helps you identify areas where you can save costs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Budgets:\"}),\" This tool allows you to set spending limits for your Azure resources. You can set up notifications when you approach your budget limits, helping you to stay on top of your spending.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recommendations:\"}),\" This tool provides recommendations for cost optimization. It identifies underutilized resources and suggests ways to optimize your Azure usage.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By using Azure Cost Management and Billing, you can stay on top of your Azure spending and identify opportunities for cost savings.\"}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Reserved Instances\"})})}),/*#__PURE__*/e(\"p\",{children:\"Reserved Instances allow you to prepay for virtual machine usage, providing significant discounts over pay-as-you-go pricing. You can purchase Reserved Instances for a 1-year or 3-year term. By committing to a term, you can receive discounts of up to 72% off pay-as-you-go pricing.\"}),/*#__PURE__*/e(\"p\",{children:\"Reserved Instances are ideal for workloads that require consistent usage, as they provide cost savings over the long term. By using Reserved Instances, you can reduce your virtual machine costs and optimize your Azure spending.\"}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Azure Spot VMs\"})})}),/*#__PURE__*/e(\"p\",{children:\"Azure Spot VMs provide access to unused Azure capacity at a significant discount. These VMs are available at up to 90% off the regular price, but they may be reclaimed by Azure if capacity becomes limited.\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Spot VMs are ideal for workloads that can handle interruptions or that can be easily replicated. By using Azure Spot VMs, you can significantly reduce your virtual machine costs and optimize your Azure spending.\"}),/*#__PURE__*/e(\"ol\",{start:\"4\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use VM Scale Sets\"})})}),/*#__PURE__*/e(\"p\",{children:\"VM Scale Sets allow you to easily deploy and manage a group of virtual machines. They provide automatic scaling based on demand, allowing you to optimize your virtual machine usage and reduce costs.\"}),/*#__PURE__*/e(\"p\",{children:\"VM Scale Sets are ideal for workloads that require consistent usage, but that may experience fluctuations in demand. By using VM Scale Sets, you can ensure that you have the necessary resources to handle workload demand while minimizing costs.\"}),/*#__PURE__*/e(\"ol\",{start:\"5\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Azure Advisor\"})})}),/*#__PURE__*/e(\"p\",{children:\"Azure Advisor is a free service that provides recommendations for optimizing your Azure resources. It provides insights into your usage patterns and suggests ways to reduce costs and improve performance.\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Advisor provides recommendations for optimizing your virtual machine usage, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rightsizing:\"}),\" This involves downsizing your virtual machines to reduce costs. Azure Advisor provides recommendations for downsizing your virtual machines based on your usage patterns.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"High availability:\"}),\" This involves ensuring that your virtual machines are running in a highly available configuration. Azure Advisor provides recommendations for configuring availability sets to improve uptime and reduce downtime costs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Backup and recovery:\"}),\" This involves ensuring that your virtual machines are backed up and recoverable in the event of data loss. Azure Advisor provides recommendations for configuring backup and recovery solutions.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By using Azure Advisor, you can identify opportunities for cost savings and optimize your virtual machine usage.\"}),/*#__PURE__*/e(\"h2\",{children:\"Securing Virtual Machines\"}),/*#__PURE__*/e(\"p\",{children:\"Securing Azure Virtual Machines is essential to ensure the safety and confidentiality of your data. Azure provides several tools and services that can help you secure your virtual machines, including built-in security features, security tools, and security best practices. In this guide, we'll explore the best practices for securing Azure Virtual Machines.\"}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Secure Your Network Connections\"})})}),/*#__PURE__*/e(\"p\",{children:\"One of the most critical steps in securing your virtual machines is securing your network connections. Azure provides several features that can help you secure your network connections, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Security Groups (NSGs):\"}),\" NSGs allow you to control network traffic to and from your virtual machines. You can create rules to allow or deny traffic based on IP addresses, protocols, ports, and other criteria.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Network (VNet):\"}),\" VNets allow you to isolate your virtual machines from the public internet. You can control access to your virtual machines by creating subnets and network security groups within your VNet.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Firewall:\"}),\" Azure Firewall is a managed firewall service that allows you to protect your virtual machines from unauthorized access. It provides network-level security for your virtual machines and allows you to create custom rules to control traffic to and from your virtual machines.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By using these network security features, you can secure your virtual machines and prevent unauthorized access.\"}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Role-Based Access Control (RBAC)\"})})}),/*#__PURE__*/e(\"p\",{children:\"Role-Based Access Control (RBAC) is a critical security feature in Azure. RBAC allows you to control access to your virtual machines by assigning roles to users, groups, and applications. You can grant permissions to specific resources or resource groups, ensuring that users only have access to the resources they need.\"}),/*#__PURE__*/e(\"p\",{children:\"By using RBAC, you can ensure that only authorized users have access to your virtual machines and that they have the appropriate level of access.\"}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Azure Security Center\"})})}),/*#__PURE__*/e(\"p\",{children:\"Azure Security Center is a free service that provides advanced threat protection for your virtual machines. It provides real-time security alerts and recommendations to help you mitigate security risks. Azure Security Center provides several security features, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security policy management:\"}),\" This allows you to create and manage security policies for your virtual machines. You can create policies to enforce security best practices, such as password complexity and encryption.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat detection:\"}),\" This allows you to detect and respond to security threats in real-time. Azure Security Center uses machine learning to analyze your virtual machine logs and detect threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vulnerability assessment:\"}),\" This allows you to assess the security vulnerabilities of your virtual machines. Azure Security Center provides recommendations for fixing vulnerabilities and improving security.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By using Azure Security Center, you can improve the security of your virtual machines and detect and respond to security threats in real-time.\"}),/*#__PURE__*/e(\"ol\",{start:\"4\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Implement Encryption\"})})}),/*#__PURE__*/e(\"p\",{children:\"Encryption is a critical security feature that can help protect your data from unauthorized access. Azure provides several encryption options for your virtual machines, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Disk Encryption:\"}),\" Azure Disk Encryption allows you to encrypt your virtual machine disks using BitLocker. This ensures that your data is protected at rest.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transport Layer Security (TLS):\"}),\" TLS allows you to encrypt your network traffic between your virtual machines and other resources. This ensures that your data is protected in transit.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By implementing encryption, you can protect your data from unauthorized access and ensure the confidentiality of your data.\"}),/*#__PURE__*/e(\"ol\",{start:\"5\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Use Antimalware Solutions\"})})}),/*#__PURE__*/e(\"p\",{children:\"Antimalware solutions are critical for protecting your virtual machines from viruses, malware, and other security threats. Azure provides several antimalware solutions for your virtual machines, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Security Center:\"}),\" Azure Security Center provides antimalware protection for your virtual machines. It provides real-time protection against viruses, malware, and other security threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Defender Antivirus:\"}),\" Microsoft Defender Antivirus is a free antimalware solution for Windows virtual machines. It provides real-time protection against viruses, malware, and other security threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Third-party antimalware solutions:\"}),\" Azure allows you to install third-party antimalware solutions on your virtual machines. You can choose from a range of antimalware solutions from Azure Marketplace.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By using antimalware solutions, you can protect your virtual machines from security threats and ensure that your data is safe.\"}),/*#__PURE__*/e(\"ol\",{start:\"6\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Implement Monitoring and Logging\"})})}),/*#__PURE__*/e(\"p\",{children:\"Monitoring and logging are critical for detecting and responding to security threats. Azure provides several tools and services that can help you monitor and log your virtual machines, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Monitor:\"}),\" Azure Monitor allows you to monitor the performance and availability of your virtual machines. You can create alerts to notify you of any issues.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Log Analytics:\"}),\" Azure Log Analytics allows you to collect and analyze log data from your virtual machines. You can create queries to search for specific log data, allowing you to detect security threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Sentinel:\"}),\" Azure Sentinel is a cloud-native security information and event management (SIEM) service that provides advanced security analytics. It provides real-time threat detection and response for your virtual machines.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By implementing monitoring and logging, you can detect and respond to security threats in real-time and ensure the security of your virtual machines.\"}),/*#__PURE__*/e(\"ol\",{start:\"7\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Follow Security Best Practices\"})})}),/*#__PURE__*/e(\"p\",{children:\"Following security best practices is critical for ensuring the security of your virtual machines. Here are some best practices to follow:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Keep your virtual machines up to date:\"}),\" Ensure that your virtual machines are running the latest security updates and patches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use strong passwords:\"}),\" Use strong passwords and enforce password complexity requirements.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Limit administrative access:\"}),\" Limit administrative access to your virtual machines to reduce the risk of security breaches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use multi-factor authentication:\"}),\" Use multi-factor authentication to enhance the security of your virtual machines.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regularly backup your virtual machines:\"}),\" Regularly backup your virtual machines to ensure that you can recover from data loss or security breaches.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By following these security best practices, you can enhance the security of your virtual machines and reduce the risk of security breaches.\"}),/*#__PURE__*/e(\"h2\",{children:\"Container Instances\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Container Instances (ACI) is a popular service for running Docker containers in the cloud. With ACI, users can easily deploy and manage containers without having to manage the underlying infrastructure. In this blog post, we'll explore some best practices for sizing, securing, and optimizing the cost of running Azure Container Instances.\"}),/*#__PURE__*/e(\"p\",{children:\"How to Correctly Size Container Instances\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to sizing ACI containers, it's important to choose the right resources for your workload. Here are some key considerations:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CPU and memory:\"}),\" ACI offers a range of CPU and memory options, ranging from 1 vCPU and 1.5 GB of memory up to 4 vCPUs and 16 GB of memory. Choose the right size based on the requirements of your workload.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concurrent requests:\"}),\" If your workload involves a large number of concurrent requests, consider using multiple ACI instances to distribute the load. ACI supports the use of a load balancer to distribute traffic across multiple instances.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage:\"}),\" ACI supports the use of Azure Files for persistent storage. If your workload requires persistent storage, be sure to choose the appropriate file share and mount it in your container.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Securing Container Instances\"}),/*#__PURE__*/e(\"p\",{children:\"Security is a top concern for any container deployment. Here are some best practices for securing your Azure Container Instances:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security:\"}),\" ACI instances can be deployed into a virtual network, allowing you to control traffic flow and secure communication between instances. Be sure to configure appropriate network security groups to control inbound and outbound traffic.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication and access control:\"}),\" Use Azure Active Directory (AAD) to manage access to your ACI instances. With AAD, you can control who can deploy and manage instances and grant access to specific containers or files.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Container security:\"}),\" Ensure your Docker containers are built with security in mind. Use a trusted base image and configure appropriate security settings in your Dockerfile, such as non-root users and read-only file systems.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cost Optimizing for Container Instances\"}),/*#__PURE__*/e(\"p\",{children:\"Cost optimization is an important consideration when running containers in the cloud. Here are some tips for optimizing the cost of running Azure Container Instances:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance sizing:\"}),\" Choose the appropriate instance size for your workload to avoid overprovisioning and wasting resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance utilization:\"}),\" Monitor your ACI instances and scale up or down as needed to ensure optimal utilization. You can use Azure Monitor to track metrics such as CPU and memory usage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Container startup time:\"}),\" ACI charges for the time it takes to start and stop containers. To minimize costs, consider using warm containers or implementing caching strategies to reduce container startup time.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Azure Kubernetes Service\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Kubernetes Service (AKS) is a managed Kubernetes service that makes it easy to deploy, scale, and manage containerized applications. AKS automates many of the tasks involved in deploying and managing Kubernetes clusters, allowing users to focus on their applications.\"}),/*#__PURE__*/e(\"h3\",{children:\"Sizing AKS clusters\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to sizing AKS clusters, it's important to choose the right resources for your workload. Here are some key considerations:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Node size:\"}),\" Choose the appropriate node size based on the requirements of your workload. AKS offers a range of node sizes, from small to large, with varying amounts of CPU and memory.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Node count:\"}),\" The number of nodes in your AKS cluster will depend on the size of your workload and the desired level of redundancy. For high availability, consider deploying multiple nodes across multiple availability zones.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Pod density:\"}),\" The number of pods per node will depend on the size of your pods and the resources required by your application. Avoid overloading nodes with too many pods, which can lead to poor performance.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Securing AKS clusters\"}),/*#__PURE__*/e(\"p\",{children:\"Security is a top concern for any Kubernetes deployment. Here are some best practices for securing your Azure Kubernetes Service:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security:\"}),\" Use Azure Network Security Groups to control inbound and outbound traffic to your AKS cluster. You can also deploy your AKS cluster into a virtual network to further control traffic flow.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role-based access control:\"}),\" Use Kubernetes RBAC to control access to your AKS cluster. Grant appropriate permissions to users and groups based on their role and level of access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Container security:\"}),\" Ensure that your Docker containers are built with security in mind. Use a trusted base image and configure appropriate security settings in your Dockerfile, such as non-root users and read-only file systems.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cost Optimization fro AKS clusters\"}),/*#__PURE__*/e(\"p\",{children:\"Cost optimization is an important consideration when running Kubernetes in the cloud. Here are some tips for optimizing the cost of running Azure Kubernetes Service:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Node sizing:\"}),\" Choose the appropriate node size for your workload to avoid overprovisioning and wasting resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Node utilization:\"}),\" Monitor your AKS nodes and scale up or down as needed to ensure optimal utilization. You can use Kubernetes Horizontal Pod Autoscaling (HPA) to automatically scale your application based on demand.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cluster autoscaling:\"}),\" AKS offers cluster autoscaling, which automatically scales the number of nodes in your cluster based on demand. Use this feature to avoid overprovisioning and reduce costs.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Azure App Service\"}),/*#__PURE__*/e(\"p\",{children:\"Azure App Service is a fully managed platform for building, deploying, and scaling web apps and APIs. App Service supports a variety of programming languages and frameworks, and provides features such as automatic scaling, continuous deployment, and load balancing.\"}),/*#__PURE__*/e(\"h3\",{children:\"Sizing Azure App Services\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to sizing Azure App Service instances, it's important to choose the right resources for your workload. Here are some key considerations:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance size:\"}),\" Choose the appropriate instance size based on the requirements of your workload. Azure App Service offers a range of instance sizes, from small to large, with varying amounts of CPU and memory.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance count:\"}),\" The number of instances in your App Service plan will depend on the size of your workload and the desired level of redundancy. For high availability, consider deploying multiple instances across multiple regions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scaling options:\"}),\" Azure App Service offers two scaling options: vertical scaling and horizontal scaling. Vertical scaling involves increasing the size of your instance, while horizontal scaling involves adding more instances to your App Service plan. Choose the appropriate scaling option based on the needs of your workload.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Securing Azure App Services\"}),/*#__PURE__*/e(\"p\",{children:\"Security is a top concern for any web application deployment. Here are some best practices for securing your Azure App Service:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security:\"}),\" Use Azure Network Security Groups to control inbound and outbound traffic to your App Service instances. You can also deploy your instances into a virtual network to further control traffic flow.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication and access control:\"}),\" Use Azure Active Directory (AAD) to manage access to your App Service instances. With AAD, you can control who can deploy and manage instances, and also grant access to specific APIs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Application security:\"}),\" Ensure that your web application is built with security in mind. Use secure coding practices, implement SSL/TLS, and monitor your application for security vulnerabilities.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cost Optimization for Azure App Services\"}),/*#__PURE__*/e(\"p\",{children:\"Cost optimization is an important consideration when running web applications in the cloud. Here are some tips for optimizing the cost of running Azure App Service:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance sizing:\"}),\" Choose the appropriate instance size for your workload to avoid overprovisioning and wasting resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance utilization:\"}),\" Monitor your App Service instances and scale up or down as needed to ensure optimal utilization. You can use Azure Monitor to track metrics such as CPU and memory usage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Auto scaling:\"}),\" Azure App Service offers auto scaling, which automatically scales the number of instances in your App Service plan based on demand. Use this feature to avoid overprovisioning and reduce costs.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Azure Functions\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Functions is a serverless compute service that allows users to run code in response to events such as HTTP requests, timers, or messages. Functions scales automatically to meet demand and charges only for the resources used during execution.\"}),/*#__PURE__*/e(\"h3\",{children:\"Sizing Azure Functions\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to sizing Azure Functions, it's important to choose the right resources for your workload. Here are some key considerations:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Function memory and CPU:\"}),\" Azure Functions offers a range of memory and CPU options, from 128 MB to 4 GB of memory and 1 to 4 vCPUs. Choose the appropriate size based on the requirements of your workload.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concurrent executions:\"}),\" If your workload involves a large number of concurrent executions, consider increasing the number of instances or adjusting the function timeout setting.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage:\"}),\" Azure Functions supports the use of Azure Storage for persistent storage. If your workload requires persistent storage, be sure to choose the appropriate storage account and configure the connection string.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Securing Azure Functions\"}),/*#__PURE__*/e(\"p\",{children:\"Security is a top concern for any serverless deployment. Here are some best practices for securing your Azure Functions:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security:\"}),\" Use Azure Network Security Groups to control inbound and outbound traffic to your functions. You can also deploy your functions into a virtual network to further control traffic flow.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication and access control:\"}),\" Use Azure Active Directory (AAD) to manage access to your functions. With AAD, you can control who can deploy and manage functions, and also grant access to specific resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Function security:\"}),\" Ensure that your code is built with security in mind. Use secure coding practices and implement appropriate input validation and output encoding.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cost Optimization for Azure Functions\"}),/*#__PURE__*/e(\"p\",{children:\"Cost optimization is an important consideration when running serverless applications in the cloud. Here are some tips for optimizing the cost of running Azure Functions:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Memory and CPU sizing:\"}),\" Choose the appropriate memory and CPU size for your workload to avoid overprovisioning and wasting resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Function execution time:\"}),\" Azure Functions charges based on the execution time of your functions. To minimize costs, consider optimizing your code for performance and using caching strategies to reduce execution time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trigger optimization:\"}),\" Azure Functions charges for each trigger invocation. To minimize costs, consider using trigger batching or implementing a custom trigger strategy to reduce the number of trigger invocations.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Azure Batch\"}),/*#__PURE__*/e(\"p\",{children:\"Azure Batch is a service for running large-scale parallel and batch compute jobs. Batch allows users to run thousands of compute nodes in parallel and supports a variety of batch processing workloads such as HPC, rendering, and data processing.\"}),/*#__PURE__*/e(\"h3\",{children:\"Sizing Azure Batch Services\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to sizing Azure Batch, it's important to choose the right resources for your workload. Here are some key considerations:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Machine size:\"}),\" Choose the appropriate virtual machine size based on the requirements of your workload. Azure Batch offers a range of virtual machine sizes, from small to large, with varying amounts of CPU and memory.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Pool size:\"}),\" The size of your Batch pool will depend on the size of your workload and the desired level of redundancy. For high availability, consider deploying multiple pools across multiple regions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data movement:\"}),\" If your workload involves moving data between virtual machines, consider using a high-performance network to minimize latency and improve data transfer speeds.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Securing Azure Batch Services\"}),/*#__PURE__*/e(\"p\",{children:\"Security is a top concern for any cloud-based service. Here are some best practices for securing your Azure Batch deployment:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security:\"}),\" Use Azure Network Security Groups to control inbound and outbound traffic to your Batch deployment. You can also deploy your Batch pool into a virtual network to further control traffic flow.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication and access control:\"}),\" Use Azure Active Directory (AAD) to manage access to your Batch deployment. With AAD, you can control who can deploy and manage Batch pools, and also grant access to specific resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual machine security:\"}),\" Ensure that your virtual machines are built with security in mind. Use a trusted base image and configure appropriate security settings in your configuration file, such as non-root users and read-only file systems.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cost Optimizing Azure Batch Services\"}),/*#__PURE__*/e(\"p\",{children:\"Cost optimization is an important consideration when running parallel and batch computing workloads in the cloud. Here are some tips for optimizing the cost of running Azure Batch:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Machine sizing:\"}),\" Choose the appropriate virtual machine size for your workload to avoid overprovisioning and wasting resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Pool utilization:\"}),\" Monitor your Batch pools and scale up or down as needed to ensure optimal utilization. You can use Azure Monitor to track metrics such as CPU and memory usage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data movement optimization:\"}),\" If your workload involves moving data between virtual machines, consider using a distributed file system or caching strategies to reduce data transfer costs.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Ready to revolutionize your business with \",/*#__PURE__*/e(r,{href:{webPageId:\"edxbLSIuk\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Microsoft Azure Compute Services\"})}),\"? Don't wait! Get started now and experience unmatched scalability and performance. \",/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Click here to begin your cloud journey.\"})})]})]});export const richText1=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Over the past years, there have been significant changes in how we work, which go far beyond where we do our job, either in an office, at home, or somewhere in\\xa0between.\"}),/*#__PURE__*/e(\"p\",{children:\"According to Microsoft, in today\u2019s hybrid environment, employees expect more from their employers in terms of the tools used, the hours spent, and the places they work. This is one area sales representatives or teams are\\xa0affected.\"}),/*#__PURE__*/t(\"p\",{children:[\"Hiring more sales skills for the sales team is neither better nor more profitable. In actuality, the reverse is true. As stated in a sales study, \",/*#__PURE__*/e(r,{href:\"https://www.zippia.com/advice/sales-statistics/#:~:text=Today%E2%80%99s%20sales%20professionals%20spend%20just%2034%25%20of%20their%20time%20selling\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"34%\"})}),\" of sales professionals devote their time to selling. In contrast, most sales teams struggle with data entry, quote creation, and other activities that divert their attention from clients. This, therefore, calls for a balance.\"]}),/*#__PURE__*/e(\"p\",{children:\"Every organization needs a digitalized fabric that connects people, and Microsoft Teams is at the center of this fabric. It is also strengthened by the productivity tools of Microsoft 365, the digital employee experience of Microsoft Viva, and the strength and security of Windows.\"}),/*#__PURE__*/e(\"p\",{children:\"Time is money for sellers, and relationships are essential. To enhance the modern selling experience, a new and more efficient sales system has been introduced. On June 16th, Microsoft introduced Viva Sales, a unique platform that integrates the most intriguing elements of modern marketing, sales, and customer support. This application is said to bring together any CRM, Microsoft Teams, and 365 to create a more reorganized and AI-powered selling\\xa0experience.\"}),/*#__PURE__*/e(\"p\",{children:\"Viva Sales addresses the main issues that sales organizations and independent sellers frequently encounter. These include the need for manual data entry, the absence of recommendations based on AI, and the lack of customer engagement analytics in productivity apps. With Viva Sales, companies will be able to reduce the time spent on administrative and other non-sales\\xa0tasks.\"}),/*#__PURE__*/e(\"p\",{children:\"In this article, we\u2019ll look at Viva Sales, its benefits to sales teams, the future of Viva Sales, and\\xa0more.\"}),/*#__PURE__*/e(\"h2\",{children:\"What\u2019s Viva Sales?\"}),/*#__PURE__*/e(\"p\",{children:\"Viva Sales is the most recent addition to the Microsoft Viva package. If you don\u2019t know about Microsoft Viva Suite, Microsoft Viva is a collection of components that serves as an employee experience platform. Microsoft 365 supports the Viva experience, which aims to provide a suite of tools across learning, resources, insights, knowledge, and\\xa0communications.\"}),/*#__PURE__*/e(\"p\",{children:\"According to Microsoft, Viva Sales is the most advanced AI-driven sales system available. The goal of Viva Sales is to reduce the amount of information that sales teams manually compile when using Microsoft Teams, Excel, Outlook, and other Microsoft 365 Office plans.\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft Viva Sales offers all the tools salespeople use right to their desks, as well as logs and monitors everything automatically so they can concentrate on clients and close deals. Viva Sales is a clever CRM partner that streamlines seller tasks while enhancing\\xa0CRM.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Viva Sales Benefits Sale Teams\"}),/*#__PURE__*/e(\"p\",{children:\"The key benefit for businesses to adopt Viva Sales is that it is already (naturally) connected with widely used and favored Microsoft Teams and Outlook. Other benefits\\xa0include:\"}),/*#__PURE__*/e(\"h3\",{children:\"Does not require manual data entry\"}),/*#__PURE__*/e(\"p\",{children:\"Say goodbye to manually entering data into programs like Excel, Outlook, etc. With Viva Sales, there is no longer a need for manual data entry into CRM\\xa0systems.\"}),/*#__PURE__*/e(\"p\",{children:\"By allowing sync with Microsoft 365, all the systems and apps that connect to Microsoft 365 will collect the data from different places and save it on Viva Sales, which will alleviate the hassle of access and tracking. Additionally, coworkers will be able to see the customer engagement data through Microsoft Teams and Office\\xa0apps.\"}),/*#__PURE__*/e(\"h3\",{children:\"Ease of customer recording and sharing.\"}),/*#__PURE__*/e(\"p\",{children:\"Viva Sales gives salespeople the resources they need to do their duties while also giving sales leaders the insights they require. Sellers can tag customers while working in Outlook, Teams, or Office programs like Excel, and Viva Sales will instantly record it as a customer record, overlaid with all related customer\\xa0data.\"}),/*#__PURE__*/e(\"p\",{children:\"Without having to retype or search for it in a CRM, this data can be quickly shared with team members while working together in Office and\\xa0Teams.\"}),/*#__PURE__*/e(\"h3\",{children:\"Supported by data and AI\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, Viva Sales offers AI-driven recommendations to help sellers and sales teams improve their sales conversion rates, increase customer engagement, replace confusion and boredom in sales conversations with an emotional connection, and optimize follow-through with the best next steps, reminders, and recommendations to speed up and close more\\xa0sales.\"}),/*#__PURE__*/e(\"h3\",{children:\"King of listening in sales\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft Viva Sales is an indispensable sales system for a company that values real-time data analytics, sales effectiveness, and\\xa0AI.\"}),/*#__PURE__*/e(\"p\",{children:\"Viva Sales will train your sales team to be top-notch listeners, engagers, and convincers! Its strong conversation intelligence in Teams will guarantee easily accessible smart information regarding various sales activity-related actions, such as call quality, talk-to-listen ratio, and\\xa0more.\"}),/*#__PURE__*/e(\"h2\",{children:\"Viva and CRM: A replacement?\"}),/*#__PURE__*/e(\"p\",{children:\"Viva Sales is not a replacement for CRMs. Instead, it improves and makes it simpler for the current users to get more data from their CRM and boosts the functionality of other platforms for customer engagement like Teams and Microsoft\\xa0365.\"}),/*#__PURE__*/e(\"p\",{children:\"According to Microsoft, Viva Sales is a reliable and smart CRM companion that simplifies seller tasks while enhancing their CRM. The CRM system, which does not have to be Dynamics 365, will be able to seamlessly synchronize data with any and all of the sales and marketing teams\u2019 communications tools, including Microsoft Teams and\\xa0Outlook.\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft is giving the sales teams complete control by offering Viva Sales. These teams can now access numerous CRM databases and tools to strengthen their sales pitch and gather\\xa0information.\"}),/*#__PURE__*/e(\"p\",{children:\"With Viva Sales, sales representatives will be able to meet more individuals, turn them into customers, and foster lasting relationships since they will have access to all of the data in one\\xa0location.\"}),/*#__PURE__*/e(\"h2\",{children:\"Reimagining the sales experience\"}),/*#__PURE__*/e(\"p\",{children:\"Viva Sales is like a sales tutor to close deals with tips and reminders. Thanks to integrated AI, this intelligence layer gives sellers the knowledge they require to increase\\xa0productivity.\"}),/*#__PURE__*/e(\"p\",{children:\"34% of sales professionals devote their time to\\xa0selling.\"}),/*#__PURE__*/e(\"p\",{children:\"In contrast, most sales teams struggle with data entry, quote creation, and other admin\\xa0activities.\"}),/*#__PURE__*/e(\"p\",{children:\"On June 16th, Microsoft introduced Viva\\xa0Sales.\"}),/*#__PURE__*/e(\"p\",{children:\"A unique platform that integrates elements of modern marketing, sales, and customer\\xa0support.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Viva Sales Benefits Sale Teams\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Does not require manual data entry\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ease of customer recording and sharing.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Supported by data and AI\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"King of listening in sales\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Need a Shift to Viva Sales?\"}),/*#__PURE__*/e(\"p\",{children:\"Ready to boost your sales and foster a good relationship with your customers? Shift to Viva Sales. X-Centric IT Solutions can guide you to the right solutions to boost your business sales and help you set up your Viva Sales\\xa0dashboard.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Contact us\"})}),\" and schedule a consultation today!\"]})]});export const richText2=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Mobile device threats are everywhere. More often than not, threats are where you least expect them. Cybercriminals cleverly disguise malware within seemingly harmless apps. Thus, mobile device security is a significant concern now, more than\\xa0ever.\"}),/*#__PURE__*/e(\"p\",{children:\"This article will discuss five mobile device attacks you need to watch out for so that you can boost your security measures. Most importantly, you will be able to stop mobile security threats before they become a serious\\xa0problem.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Data leakage\"})})}),/*#__PURE__*/e(\"p\",{children:\"As the term suggests, data leakage refers to escapes during normal app or program usage. Please note that most of these apps are not malware. They are legitimate apps downloaded from an app store or official site. However, the problem occurs when users give apps full permission to handle data on their mobile devices. As a result, allowing full control over data creates a\\xa0risk.\"}),/*#__PURE__*/e(\"p\",{children:\"How\\xa0so?\"}),/*#__PURE__*/e(\"p\",{children:\"The data becomes vulnerable to attacks as the app begins transmitting data back to its servers (name, passwords, location, photos, messages). This process in itself does not represent a risk. Nevertheless, user data may become subject to leakage if there is a data breach anywhere along the communication\\xa0chain.\"}),/*#__PURE__*/e(\"p\",{children:\"The best way to avoid data leakage is to review app permissions. Please ensure to restrict app permission so that only essential functions are enabled. Also, it is a good idea to delete unused and unwanted apps. Installed apps may still transmit data in the background. This situation poses a mobile security risk users may not\\xa0realize.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Unsecured Wi-Fi\"})})}),/*#__PURE__*/e(\"p\",{children:\"This mobile security threat is highly common. Cybercriminals pretty on unsecured Wi-Fi networks to access mobile devices. Unsuspecting users log on to these networks, automatically becoming vulnerable to a mobile security\\xa0threat.\"}),/*#__PURE__*/e(\"p\",{children:\"Where can you find unsecured Wi-Fi\\xa0networks?\"}),/*#__PURE__*/e(\"p\",{children:\"They are everywhere! Unsecured networks are in restaurants, caf\\xe9s, parks, schools, and even companies. Therefore, it is important to realize when you are on a trusted network. A good rule of thumb is to avoid using banking apps, email, or personal messaging when on an unsecured network such as a restaurant. If possible, using your device\u2019s network provider\u2019s data connection is the best way to avoid transmitting sensitive data over unsecured Wi-Fi networks. Please ensure to use your banking apps when on a trusted Wi-Fi network to minimize the chances of a data\\xa0breach.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Network Spoofing\"})})}),/*#__PURE__*/e(\"p\",{children:\"On the subject of unsecured networks, cybercriminals use \u201Cnetwork spoofing\u201D to trick users into providing useful information. Network spoofing occurs when cybercriminals create fake networks using legitimate names at places such as airports, shopping malls, restaurants, or schools. Cybercriminals use names such as \u201CFree Wi-Fi\u201D or \u201CFree Caf\\xe9 Network\u201D to lure users into these networks. A telltale sign of network spoofing is when the network prompts users to create a free account. The purpose is to entice users to enter their email and a password. Since most people use the same email and password for most of their accounts, cybercriminals use this information to attempt access to other accounts. A mobile security best practice is to enter a random password when connecting to open networks at public locations. Since most of these connections are a one-time situation, there is no need to remember the password. If you frequently connect to open networks, create a random password you can use for these connections. This password ought to be completely different from your other passwords. In doing so, you can give cybercriminals the\\xa0slip.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"4\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Phishing attacks\"})})}),/*#__PURE__*/e(\"p\",{children:\"Phishing has now become a classic type of mobile security threat. While most users are savvy to most phishing attacks, users may still be vulnerable to a clever attack from time to time. Phishing attacks consist of malware disguised as a real message from a business, friend, or government agency. These messages often look completely legitimate hence fooling\\xa0users.\"}),/*#__PURE__*/e(\"p\",{children:\"So, how can you identify a phishing\\xa0attack?\"}),/*#__PURE__*/e(\"p\",{children:\"Phishing attacks request you to click on a link, open an attachment or respond to a message. When you interact with the message, cybercriminals exploit your mobile device. On the whole, avoid clicking on links or attachments from your mobile device. It is best to open attachments or click on links from your computer. Your computer\u2019s browser and firewall can easily detect phishing attacks by triggering keywords associated with malware\\xa0attacks.\"}),/*#__PURE__*/e(\"p\",{children:\"The best rule of thumb is to avoid clicking on anything that seems unfamiliar. It is best to reach out to the sender when you are unsure or unclear about the messages you have\\xa0received.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"5\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Spyware\"})})}),/*#__PURE__*/e(\"p\",{children:\"Spyware is the most dangerous mobile security threat. Spyware is everywhere. Generally speaking, spyware loads onto mobile devices in apps. These apps masquerade as legitimate apps, but in reality, these apps serve a negative\\xa0purpose.\"}),/*#__PURE__*/e(\"p\",{children:\"Spyware apps range from data collecting to ransomware attacks. The most common purpose of spyware is to steal information. This information might be photos, messages, or passwords. Above all, it is crucial to avoid letting anyone install apps on your mobile devices without your knowledge or consent. A good idea is to update frequently used apps and delete any ones you do not use. In particular, you must delete any apps you do not recognize or recall installing. If they are important, you can always install them\\xa0later.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"If you suspect your mobile device has a malware infection, reach out to a trusted mobile device security technician. They can scan your device and spot any malware. In the worst cases, the technician will have to restore your device to factory settings fully. However, you can avoid becoming a victim by following the steps we have outlined. Being aware of risks is the best way you can foil cybercriminals from accessing your\\xa0data.\"})]});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Using a computer will never be the same. Users now have the option to work on a traditional, offline computer system or virtual desktop infrastructure (VDI). The transition to a full VDI system is well underway. Many corporations have begun to embrace a VDI. Nevertheless, many others are still on the fence about implementing a VDI. With the launch of Windows 365 Cloud PC, choosing a VDI system has gotten easier. Thus, discussing the pros and cons of a Windows 365 Cloud PC VDI system is\\xa0important.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"PROS\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Improved Security\"})})}),/*#__PURE__*/e(\"p\",{children:\"With many companies employing remote workers, security concerns are at an all-time high. Specifically, allowing employees to store company information on their local computers may pose a security risk. After all, computers are subject to loss, theft, and hacking. Needless to say, a data breach can become a costly situation for any\\xa0organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Since Windows 365 Cloud PC does not install any files on a physical computer, the risk of a data breach drops drastically. In particular, Windows 365 Cloud PC stores data on Microsoft\u2019s servers. Therefore, workers do not have access to any physical files. Everything they work on gets stored on the cloud. Likewise, file retrieval takes place on the cloud. Ultimately, the organization has total control over the files employees handle while in their workplace\\xa0environment.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Reduced hardware costs\"})})}),/*#__PURE__*/e(\"p\",{children:\"Typically, organizations need to invest in computing power and storage to manage their data. This investment generally entails spending resources on expanding storage regularly. Moreover, additional storage means more computing power to process\\xa0it.\"}),/*#__PURE__*/e(\"p\",{children:\"With Windows 365 Cloud PC, this need practically disappears. Organizations only need to invest in the computing power needed to access the Windows 365 Cloud PC server and process files. Computing power then largely depends on the apps needed to manage files. Also, please remember that Windows 365 Cloud PC can easily scale to fit any size team, especially for fast-growing\\xa0organizations.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Great for hybrid team collaboration\"})})}),/*#__PURE__*/e(\"p\",{children:\"Since COVID, hybrid work has become the new norm. Therefore, organizations that largely depend on remote workers will find that a cloud desktop environment greatly facilitates hybrid\\xa0work.\"}),/*#__PURE__*/e(\"p\",{children:\"How\\xa0so?\"}),/*#__PURE__*/e(\"p\",{children:\"Under a non-cloud desktop, workers need to manage data and upload it themselves. Often, this process comes with a time delay. Team members can work on files in real-time with a Windows 365 Cloud PC desktop environment. Moreover, multiple team members can work on single files\\xa0simultaneously.\"}),/*#__PURE__*/e(\"p\",{children:\"With companies now more reliant on remote workers than ever, a cloud desktop creates a single work environment regardless of employees\u2019 physical\\xa0location.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"CONS\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"A cloud desktop environment does not work offline\"})})}),/*#__PURE__*/e(\"p\",{children:\"Indeed, a Windows 365 Cloud PC environment does not work offline. Therefore, employees must be in a location where they have internet access. This condition may be an issue in locations where there is no internet connection or unreliable electricity. In those situations, workers may have trouble accessing the cloud\\xa0desktop.\"}),/*#__PURE__*/e(\"p\",{children:\"Consequently, organizations must ensure that employees have regular internet access. As a result, organizations may require new remote employees to ensure they have consistent internet access and\\xa0electricity.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"A VDI requires a fast internet connection\"})})}),/*#__PURE__*/e(\"p\",{children:\"Having a reliable internet connection is not enough to run an efficient VDI. A solid internet speed is also a must. Organizations that rely on remote workers may have issues with their employees\u2019 internet speeds. This situation may become an issue with work-from-home\\xa0employees.\"}),/*#__PURE__*/e(\"p\",{children:\"How\\xa0so?\"}),/*#__PURE__*/e(\"p\",{children:\"Generally speaking, residential internet packages have lower speeds than enterprise ones. Consequently, a traditional home internet connection may be insufficient to guarantee efficient, real-time access to the\\xa0VDI.\"}),/*#__PURE__*/e(\"p\",{children:\"A solution to this situation is for companies to subsidize an internet speed upgrade for their employees. Since the onset of the COVID pandemic, companies have invested in boosting their work-from-home employees\u2019 internet speeds. This investment has led to significant productivity boosts. Nevertheless, it is an added expense that both companies and employees must\\xa0consider.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h3\",children:/*#__PURE__*/e(\"h3\",{children:\"Windows 365 Cloud PC is subscription-based\"})})}),/*#__PURE__*/e(\"p\",{children:\"The standard Windows license consists of a one-time payment for full access. New computers with pre-installed Windows often do not require users to pay for\\xa0activation.\"}),/*#__PURE__*/t(\"p\",{children:[\"This situation changes with Windows 365 Cloud PC. Windows 365 Cloud PC is a subscription-based service. Therefore, users must pay month-to-month to gain access to the cloud desktop and its apps. There are various Windows 365 Cloud PC packages to consider. Source: \",/*#__PURE__*/e(r,{href:\"https://www.microsoft.com/en-us/windows-365/all-pricing\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Microsoft\"})}),\", 2022.\"]}),/*#__PURE__*/e(\"p\",{children:\"While Windows 365 Cloud PC\u2019s cost depends on the number of users, it is easy to scale up or down according to the organization\u2019s needs. Nevertheless, Windows 365 Cloud PC\u2019s cost may become a significant drawback when an organization is substantially large. In such cases, organizations can consider using a hybrid work model. In this model, employees who handle non-sensitive materials or do not manage customer information may work with a traditional setup (local file storage with a one-time Windows license). Thus, organizations can choose to pay for the users that truly need access to the cloud desktop\\xa0environment.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"With most organizations moving to a fully remote work environment or a hybrid work model, it makes sense to explore Windows 365 Cloud PC. The best part is that organizations can scale up or down as needs dictate. Moreover, organizations can cancel at any time. Ultimately, Windows 365 Cloud PC is worth trying before committing to a single work\\xa0model.\"})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"COVID-19 has brought new dimensions to technological advancements, and many people have now adopted the internet as an efficient business platform. The physical activities are now accomplished virtually. Most business organizations have been constrained to work virtually using cyberspace, putting themselves at the risk of becoming prey to cyber-attacks. Consequently, cybersecurity for organizations has transformed business organizations in various ways to safeguard their data. Cybersecurity is vital for business transformation in 2021. It is now possible to transit from all forms of traditional businesses to digital business operations through secure online transactions and information processing.\"}),/*#__PURE__*/e(\"p\",{children:\"In this article, we will learn three ways that cybersecurity has helped transform business chains to improve performance, revenue, and efficiency in\\xa02021.\"}),/*#__PURE__*/e(\"h2\",{children:\"Business Digitization\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Due to the Covid-19 effects on business operations, digitization has become a key strategy in mitigating the effects. It integrates digital technology with business operations to increase revenue, improve operations, and enhance business value. It involves the use of the internet to process, store, and access\\xa0information.\"}),/*#__PURE__*/t(\"p\",{children:[\"As the pandemic intensified the online work, adopting cloud data systems has been the main ally for business organizations. However, with the increasing use of the cloud, the threats of cyber attacks have been acute. To tackle those attacks, the Cybersecurity teams have developed some new dimensions for cloud adoption. They have adopted cloud management programs from top Cybersecurity consultants like X-Centric IT solutions to remain safe from Cyberattacks, thereby introducing the new way of business. Business digitization makes the organization\u2019s information and customer data vulnerable to cyber-attacks. This can impact the business reputation and halt operations leading to huge losses. A good example is Equifax, an American credit agency that experienced a data breach that affected over 180 million customers. So, sophisticated X-Centric Cyber Security services\",/*#__PURE__*/e(\"strong\",{children:\"\\xa0i\"}),\"s efficient for digital transformation and business\\xa0growth.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Enhancing Business Growth\"}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity has enabled business digital evolution by offering protection to the systems and information from unauthorized access. This prevents all the cyber attack inconveniences such as loss of information which have harmful and devastating effects on business performance. This results in better chances of business success and\\xa0growth.\"}),/*#__PURE__*/e(\"p\",{children:\"When an organization is under cyber-attack and information leaks to the public, the company is likely to perform poorly and incur huge losses. This is due to loss of consumer trust, trade disruptions, and expensive lawsuits. For instance, the breach at Equifax caused a 13% drop in its shares the following day. Another efficient option that has been adopted for Cybersecurity is XDR, i.e, Extended Detection and Response \u2013 one of the service offerings by X-Centric IT Solutions.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"As the online works have made visibility of the data of the business workers and customers more accessible than ever and making them vulnerable, the Cybersecurity teams have adopted this option in detecting the cyber threats coming to the data and to take action to avert the same. For example, a cyber incident that has caused alerts on a server, network, and application can be correlated to enable visibility and context into the\\xa0incident.\"}),/*#__PURE__*/e(\"h3\",{children:\"Prevent\\xa0Cyberattacks\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Without a carefully selected cybersecurity program, employees working from home will be vulnerable to more cyber attacks, which will pose severe threats to their business. Online business owners are well aware of this fact; this is why it is pertinent that they put every possible measure to protect their data by employing Cyber security companies to ultimately help them transform their physical work into a successful remote\\xa0business.\"}),/*#__PURE__*/e(\"p\",{children:\"The high risk posed by cybercrime necessitates the development and employment of cyber security policy for every digital company. Earlier, it was not much emphasized by the business heads, and it has become a necessity in the current era where it has become essential to work remotely and run the business through software connections. Now, cybersecurity is becoming practicable and can have a positive impact on the growth of a business. The absence of cybersecurity can open the doors for many cybercriminals attacks, which can lead to considerable losses for the\\xa0company.\"}),/*#__PURE__*/e(\"h2\",{children:\"Increasing Brand Awareness\"}),/*#__PURE__*/e(\"p\",{children:\"Establishing an online presence for a business is a great way to create brand awareness and attract ideal customers worldwide. Thus, cybersecurity becomes an essential factor in establishing an excellent business reputation. This helps win customers\u2019 trust by associating your business with high customer data\\xa0security.\"}),/*#__PURE__*/e(\"p\",{children:\"When an organization is involved in a data breach, customers tend to lose their faith in the brand. In most cases, they opt to purchase goods or services from the competitors, and this can lead to poor performances and increased brand awareness for their\\xa0competitors.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"SASE\"}),/*#__PURE__*/e(\"p\",{children:\"As online work through cloud adoption has increased, the business organizations\u2019 network security system has been transformed by the cybersecurity teams from the LAN-based model to the cloud-native security service model, including SASE, i.e., Secure Access Service Edge. SASE has enabled business organizations to secure remote workplaces through cloud-based security attacks\\xa0effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"Recently, cybersecurity experts have become one of the most sought-after digital professionals. Companies that are aware of their vulnerabilities have resorted to hiring cybersecurity experts. Some have opted to outsource their cybersecurity task to\\xa0organizations.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Those organizations will be held responsible for securing the data of the company for which they are hired. Data is very vital, and companies can spend millions of dollars to ensure that they secure vital data, and this goes a long way in boosting the reputation and awareness of their\\xa0brand.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Wrapping\\xa0up\"}),/*#__PURE__*/e(\"p\",{children:\"Without a doubt, the year 2021 has brought a great sigh of relief for a plethora of businesses following the pandemic that quaked both the small scale and large scale businesses in 2020. So many lessons were learnt, and one of the major lessons learnt was the digitization of businesses. Businesses without internet presence were hugely affected as people were indoors for months. A plethora of businesses has migrated to cyberspace from the lessons learned, opening more room for cybercrime. The need for cybersecurity has heightened, and X-Centric IT solutions is among the topnotch cybersecurity consultants near you that can provide efficient security for business\\xa0organizations\"})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"You might be wondering what an insider threat is; here is a little point to help clear the air. When an employee, business associate, contractor, or a person working within a firm who knows confidential organizational information causes havoc to the organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Therefore, an insider threat(s) can be prevented or managed by procedures, technologies, and policies. When effective practices are employed to avoid these threats, the risk of compromised confidential data will be minimized.\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations must be aware that data protection is not the sole responsibility of the IT security team or personnel. But it is the role of all the employees and internal personnel to guard their data.\"}),/*#__PURE__*/t(\"p\",{children:[\"A report states that there has been a rapid increase in insider attacks \",/*#__PURE__*/e(r,{href:\"https://financesonline.com/insider-threat-statistics/#:~:text=60%25%20of%20data%20breaches%20are,2018%20(ObserveIT%2C%202020).\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"by 47%\"})}),\" since 2018. Therefore, organizations need to buckle up, be prepared against any attack, and scrutinize possible threats because most of these threats walk through their doors daily.\"]}),/*#__PURE__*/e(\"p\",{children:\"Luckily, there are some preventive measures that firms need to take into consideration to protect them against looming and future threats and attacks. Read on to find out about these measures.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Three Groups Of Insider Threats\"}),/*#__PURE__*/e(\"p\",{children:\"Insider Threats can be grouped into three, one of these threats, which is also quite dangerous, is having a malicious insider(s). This consists of the people who are not loyal and they exist within your organization. They are out to cause havoc within your organization by either leaking sensitive data, money laundering, spying for competitors or countries, or harming employees.\"}),/*#__PURE__*/e(\"p\",{children:\"This set of people is rare within an organization though they may have the capacity to wreak a whole business within a short time.\"}),/*#__PURE__*/e(\"p\",{children:\"The second group is the people who leave your company with good or bad intentions. They often feel they need to take up the intellectual projects they have done in their previous firms to their new firms as it will give them an advantage; well, this often occurs with employees leaving a firm with good intentions. On the other hand, if an employee(s) should go with bad intentions, then the organization is on the verge of experiencing physical or data loss risks or both.\"}),/*#__PURE__*/e(\"p\",{children:\"The third set of people that are likely to cause an insider attack are cybercriminals.\\xa0 Cybercriminals know that the closest people to you hold more sensitive data than anyone within your organization. Hackers track down these people through their emails and internet cookies.\"}),/*#__PURE__*/e(\"h2\",{children:\"Preventive Measures Against Insider Threats\"}),/*#__PURE__*/e(\"p\",{children:\"Below are the preventive measures organizations should consider against insider threats and possible attacks:\"}),/*#__PURE__*/e(\"h3\",{children:\"Deactivate your former staff\u2019s accounts\"}),/*#__PURE__*/e(\"p\",{children:\"An easy way for ex-employees to access the organization\u2019s network is through their company\u2019s account. As the employer in an organization, it is quite easy to forget to deactivate your ex-employee account(s) immediately if an employee doesn\u2019t work in your company anymore via contract termination or a fulfilled year of service.\"}),/*#__PURE__*/e(\"p\",{children:\"The first thing to do as an employer is to deactivate their account(s) by deleting it permanently or changing their login details. Being sentimental about this will only cause you more harm than good.\"}),/*#__PURE__*/e(\"h3\",{children:\"Train your staff\"}),/*#__PURE__*/e(\"p\",{children:\"The staff in your organization can be your greatest strengths and, in some cases, your downfall. Training your staff goes a long way to avoiding an unintentional security breach. Though training your team doesn\u2019t help stop a malicious employee, it gives your staff suitable knowledge on ways to handle the company\u2019s data and how to securely browse the internet. Also, it helps to make them sensitive when any other staff is doing something tricky with the company\u2019s network.\"}),/*#__PURE__*/e(\"h3\",{children:\"Employees data restriction\"}),/*#__PURE__*/e(\"p\",{children:\"It is essential to restrict your organization\u2019s data access to some employees. Not all employees are mature enough to handle organizational documents professionally, and even if you have trained them regarding data security procedures, some staff can still make mistakes that can mar the affairs of your company. Also, the staff you might grant full data access to should be monitored by you as an employer.\"}),/*#__PURE__*/e(\"h3\",{children:\"Adopt digital surveillance\"}),/*#__PURE__*/e(\"p\",{children:\"You can make use of motion sensors, video cameras, or night vision to monitor your staff\u2019s activities. However, you have to be careful to avoid prying into their private affairs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enact an intense authentication procedure\"}),/*#__PURE__*/e(\"p\",{children:\"Using passwords and IDs is not enough. Implement Multi-Factor Authentication (MFA) for all your organizational accounts.; it is a must. MFA can prevent hackers from penetrating the company\u2019s network even if they get the chance to acquire the user\u2019s password and ID.\"}),/*#__PURE__*/e(\"h3\",{children:\"Intensively screen your new staff\"}),/*#__PURE__*/e(\"p\",{children:\"When hiring new staff, employers shouldn\u2019t take this stage for granted. Properly scrutinize your new staff\u2019s past professional records, educational records, and social records for red flags.\"}),/*#__PURE__*/e(\"h3\",{children:\"Compulsory vacations\"}),/*#__PURE__*/e(\"p\",{children:\"Enforce compulsory vacations for your staff. That way, you will have the chance to uncover professional misconduct because while the staff is gone, someone else has temporarily taken up his/her place. Also, ensure you involve multiple staff to take over various sections of your organization to ensure a smooth transition of roles in case an employee decides to leave the company. Compulsory vacations guarantee several people will have the capacity to perform the role, and it helps to avoid overly relying on one person.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Are The Best Ways To Defend Against Insider Threats?\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations must be aware that data protection is not the sole responsibility of the IT team.\"}),/*#__PURE__*/e(\"p\",{children:\"It is the role of all the employees and internal personnel to guard their data.\"}),/*#__PURE__*/e(\"p\",{children:\"There has been a rapid increase in insider attacks by 47% since 2018.\"}),/*#__PURE__*/e(\"p\",{children:\"Therefore, organizations need to scrutinize possible threats that may walk through their doors daily.\"}),/*#__PURE__*/e(\"h3\",{children:\"Preventive Measures Against Insider Threats\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Deactivate your former staff\u2019s accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Train your staff\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Employees data restriction\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adopt digital surveillance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Enact an intense authentication procedure\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Intensively screen your new staff\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compulsory vacations\\xa0\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Need A Trusted IT Security Company?\"}),/*#__PURE__*/e(\"p\",{children:\"X-Centric IT Solutions can assist in helping you out in your organization on preventive measures against insider threats.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Contact us now\"})}),\" to schedule a consultation.\"]})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The cloud can mean different things to different organizations. There are various cloud subscription services that companies use \u2013 these are considered public clouds. They are services where your company data is often stored on the same server as that of other customers of the service.\"}),/*#__PURE__*/t(\"p\",{children:[\"A private cloud is a different type of \",/*#__PURE__*/e(r,{href:{webPageId:\"aLOTD0yLz\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"cloud solution\"})}),\". This is where a company either hosts its own cloud-enabled server on-premises or uses a private server hosted by someone else. The main difference in a private cloud environment is that only your data and applications are stored on that server.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Using a mix of public and private cloud services is called hybrid cloud computing. \",/*#__PURE__*/e(r,{href:\"https://www.flexera.com/blog/cloud/cloud-computing-trends-2022-state-of-the-cloud-report/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"80% \"})}),\"of enterprises use a hybrid cloud strategy, where some data and applications are run in one or more public cloud services, and some are in a private cloud environment.\"]}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s take a look at both public and private cloud advantages and drawbacks. We\u2019ll also discuss why using a hybrid approach to the cloud can give you the best of both worlds while reducing your risk of overdependence on one or the other.\"}),/*#__PURE__*/e(\"h2\",{children:\"Public Cloud \u2013 Pros & Cons\"}),/*#__PURE__*/e(\"p\",{children:\"The public cloud is the one that most people have used both for personal and business purposes. The entire infrastructure (servers, storage, network) is owned by the service provider and delivered over the internet.\"}),/*#__PURE__*/e(\"p\",{children:\"Within the public cloud environment, you\u2019ll have varying levels of capabilities and control. For example, an application like Dropbox is a public cloud storage system, but you do not have much control over how it is set up or what you do with it. You must follow the parameters of what\u2019s available.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:{webPageId:\"nXVuk138H\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Microsoft Azure\"})}),\", on the other hand, is also a public cloud environment but one that gives you more control over how you use it. Including adding applications and security controls to your environment.\"]}),/*#__PURE__*/e(\"p\",{children:\"Some of the most common deployments in a public cloud environment include business email, office applications, and sales and marketing applications.\"}),/*#__PURE__*/e(\"h3\",{children:\"Pros of Public Cloud\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Costs Less:\"}),\" Using a service provided by a 3rd party is less costly than hosting your own cloud server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fast & Easy to Scale:\"}),\" Public cloud service providers make it easy for customers to scale up easily and near-instantly if they need more space or capabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"No Maintenance:\"}),\" There are no ongoing maintenance or upgrades that you need to do because this is handled by the service provider.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cons of Public Cloud\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Less Control:\"}),\" You do not have much control over the structure of the server environment.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Less Security:\"}),\" While many public cloud providers have excellent security, there is a risk with some that may not. Your data and that of other customers are stored in the same server environment, this can lead to issues should a breach happen, or a server IP address is blacklisted.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Possible Outages: \"}),\"When a public cloud provider has an outage, you have little control over when your data and applications will be available again. You have to wait until the issue is resolved by the 3rd party provider.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Private Cloud \u2013 Pros & Cons\"}),/*#__PURE__*/e(\"p\",{children:\"The private cloud consists of computing resources that are completely dedicated to your company. Only your data and applications are stored on the cloud server, giving you much more control over the environment.\"}),/*#__PURE__*/e(\"p\",{children:\"A private cloud server can be stored on-premises in your own data center or stored in the data center of a 3rd party service provider. But even if a 3rd party is renting the cloud server to you, a private cloud server will still be solely dedicated to your organization\u2019s technology use.\"}),/*#__PURE__*/e(\"h3\",{children:\"Pros of Private Cloud\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"More Flexibility:\"}),\" A private cloud server is like a fresh canvas that you can paint anything on. You can install the operating system you want, and add the applications and partitioning in the way that works best for your company.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better Security:\"}),\" No other organizations are using resources on the server, so security is much tighter. You have complete control over the security protocols you use to protect your data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"You Can Address Outages:\"}),\" Instead of having to wait for someone else to resolve an issue if there is a server outage, you have the ability to reboot or otherwise troubleshoot server issues yourself to get it back up and running.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cons of Private Cloud\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"More Expensive:\"}),\" You will pay more for a completely dedicated private cloud environment than for public cloud space.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scaling Up Can Take Longer:\"}),\" If you need to scale your server resources, it may take a little longer on a private cloud server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"You\u2019re Responsible for Maintenance: \"}),\"When you use your own private cloud server, you are responsible for server maintenance. However, you can work with an \",/*#__PURE__*/e(r,{href:{webPageId:\"W7K52ywjn\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"IT provider\"})}),\" for assistance.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Hybrid Cloud \u2013 the Best of Both Worlds\"}),/*#__PURE__*/e(\"p\",{children:\"Using a hybrid approach of both public and private cloud environments allows you to save money on certain resources while getting the flexibility and security you need for others.\"}),/*#__PURE__*/e(\"p\",{children:\"It also ensures that you\u2019re less reliant on one or the other, which is good for business continuity and disaster recovery.\"}),/*#__PURE__*/e(\"p\",{children:\"The cloud can mean different things to different organizations.\"}),/*#__PURE__*/e(\"p\",{children:\"There is the public cloud, where your data is stored on the same server as that of other customers\u2019.\"}),/*#__PURE__*/e(\"p\",{children:\"There is the private cloud, where only your data and applications are stored on the server.\"}),/*#__PURE__*/e(\"p\",{children:\"Using a mix of public and private cloud services is called hybrid cloud computing.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Pros of Public Cloud\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Costs Less\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Fast & Easy to Scale\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"No Maintenance\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Cons of Public Cloud\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Less Control\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Less Security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Possible Outages\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Pros of Private Cloud\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"More Flexibility\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Better Security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You Can Address Outages\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Cons of Private Cloud\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"More Expensive\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scaling Up Can Take Longer\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You\u2019re Responsible for Maintenance\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Need a Trusted Guide to the Hybrid Cloud World?\"}),/*#__PURE__*/e(\"p\",{children:\"X-Centric IT Solutions can guide you to the right solutions to modernize and protect your business by helping you choose the best mix of public and private cloud resources.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Schedule a consultation today!\"})})})]});export const richText7=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Following the advent and effect of the pandemic, companies have begun to incorporate remote work on a major scale. Consequently, more people can be found working outside of typical office settings. Such working environments, however, are exposing an increasing number of endpoint devices, which are becoming the most vulnerable points of \",/*#__PURE__*/e(r,{href:{webPageId:\"ZQH1r60j0\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"secure networks\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"According to a Ponemon Institute 2020 study, about \",/*#__PURE__*/e(r,{href:\"https://ponemonsullivanreport.com/2020/05/the-state-of-endpoint-security-risk-its-skyrocketing/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"68% \"})}),\"of businesses experienced more than one assault through endpoints in the previous year alone.\"]}),/*#__PURE__*/e(\"p\",{children:\"An endpoint is a device that is linked to a network. With the growing fame of IoT (Internet of Things) and BYOD (Bring Your Own Device) approaches, the number of separate devices linked to a public or private network may easily approach and go beyond thousands.\"}),/*#__PURE__*/e(\"p\",{children:\"Endpoints (particularly remote and mobile devices) are a favored target of hackers because they serve as entry sites for ransomware and malware. Basically, mobile phones, servers, smart watches, tablets, printers, automated teller machines (ATMs), and even medical equipment are all examples of endpoints.\"}),/*#__PURE__*/e(\"p\",{children:\"You can find network sensors everywhere: hospitals, aircraft, automobiles, and even oil rig drills. As the various types of endpoints evolve and increase, the security solutions that protect them should also increase and evolve.\"}),/*#__PURE__*/e(\"h2\",{children:\"Some Tenets of Endpoint Security Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Endpoint devices serve as a backdoor for other parties to get illegal access. As a result, the technology is critical for enterprises that wish to protect their networks from potential security breaches.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some important tenets of endpoint security:\"}),/*#__PURE__*/e(\"h3\",{children:\"Keep your endpoint security solution updated\"}),/*#__PURE__*/t(\"p\",{children:[\"This is one of those supposedly insignificant tasks that are easy to overlook until it is much too late. \",/*#__PURE__*/e(r,{href:{webPageId:\"W7K52ywjn\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"IT service providers\"})}),\" almost always offer upgrades to their solutions, including patches aimed at correcting latent or known security flaws in their applications.\"]}),/*#__PURE__*/e(\"p\",{children:\"Failure to update your endpoint security tools simply invites hackers to exploit whatever problem the update was supposed to solve. It makes your business seem like an easy target, which is what hackers (particularly less experienced ones) like.\"}),/*#__PURE__*/e(\"h3\",{children:\"Employ and monitor BYOD policies\"}),/*#__PURE__*/e(\"p\",{children:\"Employees like utilizing their own devices; it\u2019s one of the unintended (and unseen) outcomes of the home PC revolution that we\u2019re only now beginning to address. So, if you let company staff bring their own devices, you must verify that such devices do not create holes or anomalies in your endpoint security boundaries. Ensure your employees\u2019 devices are protected by a standard, enterprise-level layer of security. Also, ensure to check if you need permission before installing your chosen endpoint security solution.\"}),/*#__PURE__*/e(\"h3\",{children:\"Practice network segmentation\"}),/*#__PURE__*/e(\"p\",{children:\"Having sub-networks within your network can double the total performance of an endpoint security solution.\"}),/*#__PURE__*/e(\"p\",{children:\"You can start by constructing a privileged area and a well-delineated system having a privilege hierarchy. While segmenting the network, keep organizational aspects and interpersonal and interdepartmental relationships in mind. This ensures that routine company procedures are not disrupted. Additionally, privileged resources should be managed and updated on a regular basis.\"}),/*#__PURE__*/e(\"h3\",{children:\"Implement a tight VPN access policy in conjunction with MFA\"}),/*#__PURE__*/e(\"p\",{children:\"VPNs are now widely employed by most corporate businesses as work culture shifts to the remote work paradigm. However, they are still vulnerable to sniffing, spoofing, and other external threats.\"}),/*#__PURE__*/e(\"p\",{children:\"As a result, it is preferable to limit VPN usage, enabling VPN access only at the application layer. This can significantly reduce network-level security risk.\"}),/*#__PURE__*/e(\"p\",{children:\"Furthermore, utilizing multi-factor authentication (MFA) can help prevent password loss and account theft from a variety of sources. Adding a supplementary layer of verification when the system detects a log-in from an unfamiliar or unknown location can also improve general security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enforce least privilege access\"}),/*#__PURE__*/e(\"p\",{children:\"Specifying limits for access and device privileges is an excellent way to guarantee endpoint security. Regular users should not be given administrative rights. A least privilege access policy like this can keep unauthorized users from loading executable code onto endpoints into the network/system.\"}),/*#__PURE__*/e(\"h3\",{children:\"The principle of least privilege with zero trust\"}),/*#__PURE__*/e(\"p\",{children:\"With a growing number of endpoints in businesses, the zero-trust philosophy is crucial to managing risk and ensuring workers have the correct access to company assets. By centrally regulating rules, these endpoints are regularly reviewed against temporary privilege escalation, access requests, privilege revocations, standard device setups, and access permissions. With a well-created identity and access management system in place, a lot of these tasks can be completed automatically, saving valuable human involvement for the rare circumstances that require it.\"}),/*#__PURE__*/e(\"p\",{children:\"Following the pandemic, companies have begun to incorporate remote work on a major scale.\"}),/*#__PURE__*/e(\"p\",{children:\"Consequently, more people can be found working outside of typical office settings.\"}),/*#__PURE__*/t(\"p\",{children:[\"About \",/*#__PURE__*/e(r,{href:\"https://ponemonsullivanreport.com/2020/05/the-state-of-endpoint-security-risk-its-skyrocketing/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"68%\"})}),\" of businesses experienced more than one assault through endpoints in the previous year alone.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Let X-Centric Create a Custom Endpoint for You\"}),/*#__PURE__*/e(\"p\",{children:\"Endpoint security solutions have evolved significantly from traditional firewalls and antivirus. They offer a more comprehensive protection against known and undiscovered malware assaults and security exploits.\"}),/*#__PURE__*/e(\"p\",{children:\"X-Centric provides a comprehensive corporate solution that combines effective endpoint security with efficient endpoint administration. Features such as heuristics, firewalls, and Endpoint Detection and Response (EDR) systems are combined to enable and maintain optimum security.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Contact us\"})}),\" to get started.\"]})]});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cyberattacks are no joking matter. They are highly destructive events that damage much more than a company\u2019s reputation. In particular, supply chain cyberattacks have the capability to destroy an entire industry. Therefore, it is crucial to focus on a supply chain cyberattack and cybersecurity steps businesses can take to protect themselves, business partners, and customers.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Is a Supply Chain Cyberattack?\"}),/*#__PURE__*/e(\"p\",{children:\"Supply chain cyberattacks intend to utilize relationships between a company and a business partner to perpetrate a data breach. The relationships generally include partnerships, customer and supplier relationships, or collaborations. The use of malicious software or code typically facilitates attacks causing a criminal third party to gain access to a network(s). Third parties exploit data breaches to steal data, cause a denial of service, affect product distribution, or disrupt operations. Unfortunately, it may be extremely difficult to stop a supply chain cyberattack until it is well underway. By then, it may be difficult to quantify the extent of the damage caused by the malicious code.\"}),/*#__PURE__*/e(\"h2\",{children:\"Supply Chain Security Breaches Are Increasing\"}),/*#__PURE__*/e(\"p\",{children:\"Recently, the number of supply chain-related cyberattacks has increased. These incidents are symptoms of a broader cyber pandemic that has targeted manufacturers and distributors. In these events, cyber attackers target unsuspecting organizations, disrupting raw material sourcing, finished product distribution, and distributed denial of service (DDOS). Often, cybercriminals utilize DDOS to demand a ransom. In such situations, implementing a malicious source code such as ransomware causes businesses to lose access to their systems until they pay the requested amount.\"}),/*#__PURE__*/e(\"p\",{children:\"On the whole, supply chain attacks are on the rise due to the increase in remote working schemes. These arrangements have exposed gaps and vulnerabilities in networks and computer systems. As a result, cybercriminals have targeted these vulnerabilities for their profit. Given the number of threat actors out there, it should be no surprise that supply chain data breaches are increasing.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Are the Most Famous Supply Chain Cybersecurity Breaches?\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some of the most famous supply chain cyberattacks in recent history:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know#:~:text=More%20than%2018%2C000%20SolarWinds%20customers,on%20other%20companies%20and%20organizations.\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"SolarWinds\"})})}),/*#__PURE__*/e(\"strong\",{children:\".\"}),\" In 2020, hackers gained access to SolarWinds\u2019 production systems using malicious code. The code exploited backdoors in its security updates. SolarWinds and its customers experienced data breaches, information theft, and other cybersecurity issues.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://techcrunch.com/2021/07/05/kaseya-hack-flood-ransomware/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"Kaseya\"})})}),/*#__PURE__*/e(\"strong\",{children:\".\"}),\" In 2021, cybercriminals exploited Kaseya through a ransomware attack. This cyberattack affected over 1,000 customers with malicious ransomware code. In all, the cybercriminals wanted $70m for decryption keys.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://blog.gitguardian.com/codecov-supply-chain-breach/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"Codecov\"})})}),/*#__PURE__*/e(\"strong\",{children:\".\"}),\" Codecov provides software testing services. Hackers exploited its Bash uploader to disrupt its supply chain capabilities. The data breach caused an exploitation that allowed cybercriminals to steal information, including source code and other trade secrets, from Codecov and customers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.business-standard.com/article/technology/notpetya-how-a-russian-malware-created-the-world-s-worst-cyberattack-ever-118082700261_1.html\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"NotPetya\"})})}),/*#__PURE__*/e(\"strong\",{children:\".\"}),\" NotPetya started as a supply chain attack when a Ukrainian financial firm suffered a malware attack through a system update. The malicious code created a ransomware breach known as a \u201Cwiper.\u201D\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.bbc.com/news/technology-54568784\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"British Airways\"})})}),/*#__PURE__*/e(\"strong\",{children:\".\"}),\" In 2018, British Airways suffered a significant cyberattack known as a Magecart attack. This cyberattack affected roughly 400,000 transactions on British Airway\u2019s website. Cybercriminals exploited the supply chain through a vendor and quickly spread throughout the entire system.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"How Does a Supply Chain Attack Work?\"}),/*#__PURE__*/e(\"p\",{children:\"Generally speaking, a supply chain attack works by taking advantage of the trust among organizations such as customers and suppliers. This trust relationship implies that all parties rely on one another leading them to use a shared software platform. Cybercriminals can exploit the vulnerabilities within these shared software platforms to gain access to one party or all parties involved.\"}),/*#__PURE__*/e(\"p\",{children:\"Specifically, supply chain attacks target the weakest point in the chain. This situation occurs when one organization has a great cybersecurity system but another does not. As a result, hackers gain access to the supply chain through the weak link and exploit the vulnerability to target the rest of the supply chain.\"}),/*#__PURE__*/e(\"p\",{children:\"A common type of supply chain cyberattack is to target managed service providers (MSPs). MSPs typically have clear access to customer and supplier networks. From there, an exploited MSP allows cybercriminals to burrow within the entire network. For instance, the Kaseya attack exploited a vulnerable MSP allowing it to infect a number of organizations with malicious ransomware code.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Do Supply Chain Attacks Impact Organizations?\"}),/*#__PURE__*/e(\"p\",{children:\"The impacts of a supply chain attack can be quite serious. In some instances, they can be disastrous to the overall supply chain and the organizations\u2019 reputations. In the worst cases, cybercriminals some away with millions of dollars and loads of stolen information.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are the most considerable impacts of supply chain cyberattacks:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data breach\"}),\". A data breach consists of cybercriminals accessing private information. In some instances, hackers can steal considerable amounts of information. In other cases, strong cybersecurity measures can stop a data breach before it is too late. The SolarWinds attack is a good example of a breach that exposed sensitive data on several organizations.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware distribution\"}),\". On some occasions, cybercriminals do not necessarily gain access to steal information. They gain access to plan malicious software within networks or local servers. The malware then fulfills various purposes, such as stealing data, encrypting computers (ransomware), or creating backdoor access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Denial of Service\"}),\". Some supply chain attacks consist of denial of service attacks. These attacks disrupt operations until companies pay cybercriminals. This attack is a type of ransomware and can wreak havoc on a company\u2019s or industry\u2019s operations.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Product or service disruption\"}),\". Some supply chain attacks target product or service disruption. These attacks cause logistical issues that may stop companies and industries from delivering their products or services. The 2021 \",/*#__PURE__*/e(r,{href:\"https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-need-to-know\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Colonial Pipeline hack\"})}),\" is an example of product or service disruption.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"What Can Organizations Do to Prevent Supply Chain attacks?\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some helpful practices that organizations can implement to prevent supply chain attacks:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Restrict access privileges\"}),\". In short, the fewer people with access to the network, the safer it will be. Only relevant staff should have access to a network. Also, access must have close monitoring to ensure security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network segmentation\"}),\". Breaking up networks into individual chunks can help localize breaches and infections. This approach keeps cybercriminals from accessing an entire network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"DevSecOps\"}),\". Cybersecurity software should become part of the entire network integration cycle. This approach helps create robust network security instead of patching cybersecurity software on top of a finished network system.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Threat Prevention and Hunting\"}),\". Close monitoring of network activity ensures proactive protection against potential threats. Specialized cybersecurity firms offer this type of service along with their cybersecurity software solutions.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Guarding against supply chain attacks requires a proactive approach. Organizations can ensure their networks\u2019 security by focusing on preventive measures. Moreover, having protocols in place when a breach occurs can go a long way to preventing a supply chain attack from becoming a serious cybersecurity incident.\"})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"For many organizations, the transition to a cloud workflow is nearly complete. The global pandemic made it clear just how important \u201Cwork from anywhere\u201D modern infrastructure is to business continuity.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.statista.com/statistics/1200505/covid-digital-transformation-country/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Sixty-four percent\"})}),\" of U.S. organizations acknowledged that digital transformation was sped up due to the COVID-19 pandemic. Systems like analog company phone infrastructure moved to cloud-based VoIP solutions, and virtual meeting applications exploded with new users.\"]}),/*#__PURE__*/e(\"p\",{children:\"Working in a cloud-based environment is critical in today\u2019s world because it enables:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Workforce flexibility & mobility\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Resilience in the face of a natural or manmade disaster\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increased productivity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Lower operational costs\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.apollotechnical.com/working-from-home-productivity-statistics/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"77% \"})})})}),/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"of surveyed employees working at least part-time from home showed increased productivity as a result.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"You often hear the term \u201Chybrid office\u201D in this post-pandemic environment. This refers to companies that have employees that work remotely and in the office. Sometimes employees work in one place exclusively. But often, they are working in the office part of the time and at home part of the time.\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud technology makes it possible for them to access business applications and data, no matter where they are working. But there is still a mobility challenge when it comes to the computer workstation they use.\"}),/*#__PURE__*/e(\"p\",{children:\"Computers desktops are one of the last bastions of a non-cloud world. They hold certain folders, files, and settings that are needed to work, but are not easily accessible if you\u2019re not sitting in front of them.\"}),/*#__PURE__*/e(\"p\",{children:\"Complicating things is that many remote employees use personal PCs when working from home to access business data. And in the course of working, will often have business-related items, like passwords and files, saved on that home computer.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why Moving PCs to the Cloud Make Sense\"}),/*#__PURE__*/e(\"p\",{children:\"Moving to cloud-based PCs can solve many of the issues with mobility, security, and transparency companies face in a hybrid work environment.\"}),/*#__PURE__*/t(\"p\",{children:[\"Using a cloud PC like \",/*#__PURE__*/e(r,{href:\"https://azure.microsoft.com/en-us/services/virtual-desktop/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Azure Virtual Desktop\"})}),\" puts everything that is normally on a computer hard drive on a cloud server instead. This virtual desktop environment can then be accessed from any device without the need to physically carry around a laptop or other computer.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Azure Virtual Desktop\"}),/*#__PURE__*/e(\"p\",{children:\"Using Azure Virtual Desktop moves your Windows 10 or 11 environment to the cloud, in a deployment that takes just minutes and is fully optimized for Microsoft 365, as well as any other programs you normally use on your business PCs.\"}),/*#__PURE__*/e(\"p\",{children:\"Virtual desktops can be accessed from any device without data being stored on that device. Whether on a tablet, work computer, home laptop, or another workstation, employees can access their own personal desktop environment with all files, settings, folders, etc.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Will Azure Virtual Desktops Benefit Our Company?\"}),/*#__PURE__*/e(\"h3\",{children:\"Keep Control of Your Business Data\"}),/*#__PURE__*/t(\"p\",{children:[\"Approximately \",/*#__PURE__*/e(r,{href:\"https://www.securitymagazine.com/articles/95746-of-employees-still-use-their-personal-computers-for-work-as-hybrid-landscape-intensifies-enterprise-cyber-threat\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"half (49%)\"})}),\" of work-from-home employees use their personal computers while working remotely. This can lead to data security and data leakage issues for a number of reasons.\"]}),/*#__PURE__*/e(\"p\",{children:\"For example:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Employee PCs may be running outdated software\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Others in a home may be able to access the employee\u2019s personal computer\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The company has a lack of visibility into an employee\u2019s personal device\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"There\u2019s an inability to monitor and \",/*#__PURE__*/e(r,{href:{webPageId:\"W7K52ywjn\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"manage data security\"})})]})})]}),/*#__PURE__*/e(\"p\",{children:\"Using Azure Virtual Desktops gives your organization complete visibility into all employee desktop environments. This includes the ability to keep devices updated and remain in control of your business data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Improve the Hybrid Work Experience\"}),/*#__PURE__*/e(\"p\",{children:\"Employees that are working between home and office are often challenged with the need to move their PC between spaces or use different PCs depending on where they are.\"}),/*#__PURE__*/e(\"p\",{children:\"If they carry a laptop between home and work, then the risk of damage or theft is increased. If they use distinct devices at each location, then productivity can suffer because they need to switch between environments and may not have all the files or apps that they need on one or the other.\"}),/*#__PURE__*/e(\"p\",{children:\"Using a virtual desktop means being able to access the same computer workspace no matter where you are, without having to carry a laptop computer around.\"}),/*#__PURE__*/e(\"p\",{children:\"Not only is this more convenient, but it\u2019s also more secure when traveling. No matter what happens to luggage, your computer and everything on it is completely safe in the cloud.\"}),/*#__PURE__*/e(\"h3\",{children:\"Virtualize Non-Cloud Apps\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any non-cloud apps used in your business workflow, then using Azure Virtual Desktops can give you a cloud experience for those applications.\"}),/*#__PURE__*/e(\"p\",{children:\"They are saved on the \u201Chard drive\u201D \u2013 meaning the cloud server \u2013 just like they would be on a standard computer. But, because you can now access that virtual computer from the cloud, this means you can also now access that software from the cloud as well.\"}),/*#__PURE__*/e(\"h3\",{children:\"Better for Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"When your workforce has virtual desktops, you remain in control of security for all those environments. You can access data anytime, and ensure all virtual desktops are running required backup, anti-malware, and other important security software.\"}),/*#__PURE__*/e(\"p\",{children:\"Uniform policies for data security can be applied throughout all employee desktops, which isn\u2019t easily the case when everyone is working from home on non-cloud computers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Take the Next Step Toward Digital Virtualization with X-Centric\"}),/*#__PURE__*/e(\"p\",{children:\"Do you have questions about Azure Virtual Desktops? X-Centric IT Solutions can answer them! Our business technology experts can provide you with personalized recommendations for virtualization that keep your company\u2019s needs and goals in mind.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Schedule a consultation today!\"})})}),/*#__PURE__*/e(\"p\",{children:\"Sixty-four percent of U.S. organizations say that digital transformation was sped up due to the pandemic.\"}),/*#__PURE__*/e(\"p\",{children:\"Computers desktops are one of the last bastions of a non-cloud world.\"}),/*#__PURE__*/e(\"p\",{children:\"Physical PCs are a challenge for hybrid work where employees need to switch between home and office.\"}),/*#__PURE__*/e(\"p\",{children:\"Using Azure Virtual Desktop moves your Windows 10 or 11 environment to the cloud.\"}),/*#__PURE__*/e(\"p\",{children:\"Employees can access their own personal desktop environment from anywhere.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"How Will Azure Virtual Desktops Benefit Our Company?\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Keep Control of Your Business Data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improve the Hybrid Work Experience\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Virtualize Non-Cloud Apps\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Better for Cybersecurity\"})})]})]});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cloud storage has become one of the most intriguing trends over the last decade. Gradually, organizations from virtually every industry have migrated to a cloud-based storage scheme. Given edge computing\u2019s ease of use, improved security features, ransomware defense capabilities, and cost-effective capabilities, it is no wonder that businesses have chosen the cloud.\"}),/*#__PURE__*/e(\"p\",{children:\"In this discussion, we will take a look at four interesting cloud storage trends to watch in 2022. In particular, we will focus on the benefits these trends have to offer organizations across the board. So, let\u2019s jump right into it!\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Organizations are shifting more toward cloud than local storage\"})})}),/*#__PURE__*/e(\"p\",{children:\"Organizations invested a significant chunk of their IT budgets on local storage in the past. This investment included servers and drives. Nowadays, that trend is practically history. Organizations all over have focused on predominantly cloud-based solutions.\"}),/*#__PURE__*/t(\"p\",{children:[\"Consider the \",/*#__PURE__*/e(r,{href:\"https://www.cloudwards.net/cloud-computing-statistics/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"following figures\"})}),\":\"]}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"18px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(25, 26, 26)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"50% of corporate data now resides on a cloud-based solution.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The vast majority, 90% of corporations, utilize some type of multi-cloud infrastructure solution.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"On average, enterprises have about 2.6 public and 2.7 private clouds.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"It is plain to see the clear shift toward overall cloud storage with these figures. Moreover, \",/*#__PURE__*/e(r,{href:\"https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2020/12/ArcserveDataReport2020.pdf\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"some estimates\"})}),\" indicate that roughly 100 zettabytes of data will reside in the cloud by 2025. This astonishing figure underscores how important cloud storage has become to organizations all around the world.\"]}),/*#__PURE__*/e(\"p\",{children:\"Additionally, some estimates show that public cloud storage will grow at about 53% per year. Thus, it is quite plausible that cloud storage trends will eventually lead to a fully cloud-based approach within the next decade.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"2\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Metadata growth will impact overall cloud storage capabilities\"})})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(r,{href:\"https://www.infoworld.com/article/2622591/can-metadata-save-us-from-cloud-data-overload-.html\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Metadata growth\"})}),\" is a trend to watch. On the whole, metadata expands as cloud-based storage grows. Therefore, the entire cloud must be on alert regarding the seeming explosion of unstructured data.\"]}),/*#__PURE__*/e(\"p\",{children:\"So, what\u2019s the problem with expanding metadata on the cloud?\"}),/*#__PURE__*/e(\"p\",{children:\"The issue is not the metadata itself. The issue lies in the fact that metadata takes up space on physical servers, like any other type of data. Therefore, the risk lies in essentially running out of space. Now, you might be thinking, why not just add more space? The issue, however, is not quite so simple.\"}),/*#__PURE__*/e(\"p\",{children:\"While it is true that the overall cost of storing data is getting cheaper, the investment required to add more storage capacity is not. Data warehouses require a significant investment in physical infrastructure and cybersecurity measures. After all, what good would a robust physical network be if it didn\u2019t offer the best possible cybersecurity features?\"}),/*#__PURE__*/e(\"p\",{children:\"The fact of the matter is that the storage crunch to our lack of understanding regarding what data ought to be stored. More often than, we believe that it is better to save everything. This approach typically leads to duplicate or redundant data. This superfluous data takes up valuable space on cloud storage systems.\"}),/*#__PURE__*/e(\"p\",{children:\"Until we can get a firm grasp on how we can reduce the amount of data we truly need, edge computing will need to live with the ever-present threat of a cloud storage crunch.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"3\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Cloud repatriation due to security concerns is a trend expected to increase\"})})}),/*#__PURE__*/t(\"p\",{children:[\"For all of the benefits that come from cloud storage, \",/*#__PURE__*/e(r,{href:\"https://www.computerweekly.com/feature/Cloud-repatriation-Five-reasons-to-repatriate-data-from-cloud\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"cloud repatriation\"})}),\" is also a real trend to watch in 2022.\"]}),/*#__PURE__*/e(\"p\",{children:\"So, what exactly is cloud repatriation?\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud repatriation consists of moving data from the cloud back to a locally-managed storage system. The question begs, why would an organization remove their data from the cloud and bring it back to a local storage scheme?\"}),/*#__PURE__*/e(\"p\",{children:\"The answer typically boils down to security concerns. Indeed, it is true that cloud-based data management is easier and more cost-effective. However, cybersecurity concerns may arise. This factor is especially concerning for financial institutions, government agencies, and any other organizations that handle sensitive data.\"}),/*#__PURE__*/e(\"p\",{children:\"This factor is also another situation that may motivate cloud repatriation: poorly planned cloud migration. This phenomenon occurs when organizations merely dump their information onto a cloud-based storage system without fully planning their migration. Consequently, the organization may experience data retrieval issues or security concerns.\"}),/*#__PURE__*/t(\"p\",{children:[\"Lastly, provider failures may become a significant concern. For instance, in 2021, \",/*#__PURE__*/e(r,{href:\"https://www.washingtonpost.com/technology/2021/12/07/aws-outage-websites-offline/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Amazon\u2019s cloud computing services\"})}),\" experienced a failure that left countless websites offline from a few minutes to several hours. A disruption of this nature is alarming, given the sheer magnitude of its overall impact.\"]}),/*#__PURE__*/e(\"p\",{children:\"Granted, cloud-based server disruptions are relatively uncommon. They are, nevertheless, quite possible. This risk leaves little wiggle room for error. As a result, some experts believe that cloud repatriation may pick up in 2022. However, please bear in mind that this trend hardly means the end of cloud computing. If anything, cloud repatriation is a security measure that organizations take to avoid losing data in a service disruption or unexpected cyberattack.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"ol\",{start:\"4\",children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"h2\",children:/*#__PURE__*/e(\"h2\",{children:\"Dynamic Cloud Provisioning\"})})}),/*#__PURE__*/e(\"p\",{children:\"Businesses\u2019 needs shift as their plans and priorities do. Therefore, businesses must find the best way to optimize their resource allocation. This approach is highly important as needs fluctuate based on the various elements that influence an organization\u2019s operations.\"}),/*#__PURE__*/e(\"p\",{children:\"Businesses have turned to dynamic cloud provisioning to facilitate resource allocation and optimization. Organizations alter their resource allocation and use based on their specific needs throughout the day, week, or month in dynamic provisioning.\"}),/*#__PURE__*/e(\"p\",{children:\"While dynamic provisioning is a typical approach is local, on-premises resources, is it plausible to do so with cloud-based solutions. In short, the answer is yes.\"}),/*#__PURE__*/e(\"p\",{children:\"Dynamic cloud provisioning allows organizations to find a balance between cloud and local, on-premises resources. As businesses\u2019 needs change, so does their resource allocation. Therefore, it makes sense to find ways to utilize resources more effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"Consider the semiconductor industry. This industry relies heavily on high-bandwidth and low-latency storage to run its supply chain accurately. Nevertheless, the semiconductor industry does not always run at full speed. There are occasions where it does not require such high resource allocation.\"}),/*#__PURE__*/e(\"p\",{children:\"What does this mean?\"}),/*#__PURE__*/e(\"p\",{children:\"It means that cloud-based storage solutions must be ready at all times to meet the sudden demands of their projects. Consequently, failures can lead to delays and even production disruptions.\"}),/*#__PURE__*/e(\"p\",{children:\"Dynamic cloud provisioning is a trend to watch out for in 2022. More and more companies are increasingly turning to a combination of on-premises and cloud-based solutions. This combination allows companies to allocate resources optimally, thereby ensuring success.\"}),/*#__PURE__*/e(\"h2\",{children:\"Cloud Computing Is Here to Stay\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud computing is not a fad. It is here to stay. More and more organizations, particularly small and medium-sized ones, have turned to cloud-based storage solutions to facilitate their everyday tasks. Cloud-based solutions are easy to use and cost-effective. These characteristics favor expanding and scaling businesses. After all, it is much easier to expand a current online storage subscription than it is to invest in brand-new storage hardware.\"}),/*#__PURE__*/e(\"p\",{children:\"The biggest question, however, lies with security and reliability. While most cloud storage providers guarantee the best possible security measures and 99.99% uptime, the fact is that there is no total guarantee. There is always the risk of cyberattacks and possible service disruptions.\"}),/*#__PURE__*/e(\"p\",{children:\"So, what can organizations do to safeguard their operations?\"}),/*#__PURE__*/e(\"p\",{children:\"One solution appears to be nearline storage.\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations find an intermediate step between full cloud-based storage and on-premises resources in nearline storage. This approach allows companies to get the best of both worlds. On the one hand, businesses can safeguard sensitive information on local servers while distributing less vulnerable information on cloud-based servers.\"}),/*#__PURE__*/e(\"p\",{children:\"Nearline storage allows organizations to protect the information, establish high-end cybersecurity measures, and ensure laser-fast bandwidth. Nevertheless, the biggest drawback with nearline storage is cost. Indeed, there is a higher cost attached to nearline storage as an investment is necessary to set up and maintain storage infrastructure.\"}),/*#__PURE__*/e(\"p\",{children:\"For organizations that can afford it, nearline storage appears to be the best way to go. By combining on-premises and online storage, companies can also implement dynamic cloud provisioning. Depending on an organization\u2019s specific needs, on-premises or cloud-based solutions can bear the load. Ultimately, companies can ensure they get the right amount of resources when they need them.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud storage seems to be thriving in 2022. Despite some industries focusing on nearline storage or even cloud repatriation, cloud computing will only get more and more prominent. We can expect to see virtually all day-to-day operations run on the cloud within the next decade. Therefore, it is quite likely that one day, every part of life will run from a cloud-based storage server somewhere in the world.\"})]});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cloud security is a practice that is essential to protect cloud computing applications and data. Safeguarding the cloud environment from unauthorized users, malware, cybercriminals, and attacks is necessary if you want to avoid the high costs associated with a data breach or compliance violation.\"}),/*#__PURE__*/t(\"p\",{children:[\"While many public cloud tools include \",/*#__PURE__*/e(r,{href:{webPageId:\"aLOTD0yLz\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"cloud security\"})}),\" features, these are not always enabled by default. When using cloud technology, you\u2019re signing up for a \u201Cshared responsibility\u201D model. This means that the service provider secures the data servers that host the SaaS environment and provides customers with the tools needed to secure their accounts. However, customers must do their part by using proper security configurations and putting those tools and security features to use.\"]}),/*#__PURE__*/e(\"p\",{children:\"One of the advantages of using public cloud services stems from the fact that users can pay for whatever they use and avoid incurring unnecessary costs on hardware.\"}),/*#__PURE__*/e(\"p\",{children:\"Thus, the emergence of public cloud tools has helped solve many problems that had to do with a static, on-premises-only technology environment. However, it has also introduced numerous challenges, such as uneven data distribution and workloads created by a dispersed work environment.\"}),/*#__PURE__*/t(\"p\",{children:[\"Keeping track of the data used in the \",/*#__PURE__*/e(r,{href:{webPageId:\"W7K52ywjn\"},nodeId:\"SppMOgxDX\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"IT architectural environment\"})}),\" and protecting it from malicious activities is challenging. It\u2019s not only companies that have moved much of their operations to the cloud, hackers and criminal groups have as well. They follow the data.\"]}),/*#__PURE__*/t(\"p\",{children:[\"This is why the number one driver of data breaches, according to \",/*#__PURE__*/e(r,{href:\"https://www.ibm.com/security/data-breach\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"IBM Security\"})}),\", is now credential compromise. Through stolen passwords, hackers can more easily breach a cloud environment that may be hosted in a data center owned by a large provider such as Microsoft, Google, or Amazon.\"]}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s dive into different public cloud tools and how to protect them.\"}),/*#__PURE__*/e(\"h2\",{children:\"Types Of Public Cloud Tools\"}),/*#__PURE__*/e(\"h3\",{children:\"Microsoft Azure\"}),/*#__PURE__*/e(\"p\",{children:\"This cloud computing platform allows users to use Microsoft\u2019s cloud services conveniently. It includes keeping or modifying data according to the user\u2019s needs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Amazon web services (AWS)\"}),/*#__PURE__*/e(\"p\",{children:\"This tool provides a consistent experience for its users such that they can access a variety of cloud services. It aids organizations in using their specific requirements and making decisions that pertain to them with ease while leveraging various services like computing and data integration.\"}),/*#__PURE__*/e(\"h3\",{children:\"Google Cloud Connect\"}),/*#__PURE__*/e(\"p\",{children:\"This tool helps to reduce costs by using supported hybrid applications. Organizations can comfortably make use of this tool because it can work with an organization\u2019s existing technology.\"}),/*#__PURE__*/e(\"h3\",{children:\"IBM Cloud\"}),/*#__PURE__*/e(\"p\",{children:\"This public cloud tool provides business enterprises with the type of infrastructure they require to establish or restructure their applications using a public cloud, private cloud, or on-site IT. It offers benefits to organizations such as speed and security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cisco Cloud Center\"}),/*#__PURE__*/e(\"p\",{children:\"This tool is significant in deploying and managing applications in multiple work environments. This can be achieved in the presence of the data centers, private and even public clouds.\"}),/*#__PURE__*/e(\"h2\",{children:\"How To Secure Our Public Cloud Tools?\"}),/*#__PURE__*/e(\"p\",{children:\"If you desire a means to protect public cloud tools, these are the tips for you.\"}),/*#__PURE__*/e(\"h3\",{children:\"Get a secure service provider\"}),/*#__PURE__*/e(\"p\",{children:\"Several companies are relying on the public cloud to keep their information safe. This is because the public cloud is the most accessible. But misconfiguration often happens and leaves companies vulnerable. You can better secure your cloud environment with an IT partner, such as X-Centric. We\u2019ll be able to properly configure security and security policies that protect all your cloud data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Review the cloud provider\u2019s compliance\"}),/*#__PURE__*/e(\"p\",{children:\"Access the compliance audit of your service provider. Your provider\u2019s audit documents should comply with government regulations such as HIPAA, GDPR, and SOX. If the provider isn\u2019t transparent about compliance, this means your data stored in a 3rd party SaaS app could be at risk.\"}),/*#__PURE__*/e(\"h3\",{children:\"Encryption\"}),/*#__PURE__*/t(\"p\",{children:[\"In protecting public cloud tools, there is a great need to encrypt the disks using either BitLocker or DM crypt. This can be achieved by using an encryption key to lock it. After this, the key can be kept in the \",/*#__PURE__*/e(r,{href:\"https://www.clouddirect.net/how-to-secure-your-azure-environment/\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Azure key vault\"})}),\". It is only an authorized user that can access the key. As a rule, users are not expected to use credentials or SAS tokens or keep them in repositories as this can be hacked.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Azure Information Protection\"}),/*#__PURE__*/t(\"p\",{children:[\"This \",/*#__PURE__*/e(r,{href:\"https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection\",nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"cloud-based solution\"})}),\" helps organizations discover and protect information by attaching labels to the content. This defensive technique extends the functionality that the Microsoft 365 application provides.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Multi-factor authentication\"}),/*#__PURE__*/e(\"p\",{children:\"Multi-factor authentication (MFA) is an additional layer of information that secures your public cloud tools. MFA is one of the best ways to ensure your cloud account passwords aren\u2019t compromised.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use a strong password\"}),/*#__PURE__*/e(\"p\",{children:\"The use of a strong password will help to keep your information secure. A strong password combines the use of letters, numbers, and characters. A strong password makes it very difficult for unauthorized users to access sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Best Way To Protect Your Public Cloud Tools\"}),/*#__PURE__*/e(\"p\",{children:\"There is no better way to protect your public cloud tools than employing the services of X-Centric \u2013 a professional IT solutions firm.\"}),/*#__PURE__*/t(\"p\",{children:[\"Need help in keeping sensitive data away from hackers? Contact us at +1 (262)-320-4477 or \",/*#__PURE__*/e(r,{href:{webPageId:\"vf4UfrQ1d\"},nodeId:\"SppMOgxDX\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"reach us online\"})}),\".\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "2JAA+G,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4aAA4a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,kIAAkI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,iIAAiI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,uKAAuK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wLAAwL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kJAAkJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2NAA2N,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,mMAAmM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uWAAuW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,0LAA0L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,+LAA+L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mRAAmR,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kUAAkU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,4LAA4L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,+KAA+K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,qLAAqL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4IAA4I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,mLAAmL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,uKAAuK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,sNAAsN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uJAAuJ,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,6GAA6G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0NAA0N,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,yLAAyL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2OAA2O,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,2LAA2L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,6MAA6M,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,oKAAoK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,yLAAyL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,8KAA8K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qNAAqN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,mMAAmM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,wJAAwJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,kNAAkN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,wMAAwM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+KAA+K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,oMAAoM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,uNAAuN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sTAAsT,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sMAAsM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,0LAA0L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,8KAA8K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,mMAAmM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,oLAAoL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,iNAAiN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0LAA0L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,mLAAmL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,gHAAgH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,iMAAiM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iMAAiM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4MAA4M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,kKAAkK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,kMAAkM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,4LAA4L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,yNAAyN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,kKAAkK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,gKAAgK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,uFAAoGA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAA2O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qJAAkKE,EAAEC,EAAE,CAAC,KAAK,uJAAuJ,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,oOAAoO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kdAAkd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAgH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kXAA6W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAAyV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gYAAgY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4TAA4T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+kBAAqkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iqCAAmoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wcAAmc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ghBAAghB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qbAAqb,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0fAA0f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA+V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,meAA8d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAA6P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yYAAyY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAA+J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAA2R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAA4N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iYAA4X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2QAAwRE,EAAEC,EAAE,CAAC,KAAK,0DAA0D,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,goBAAinB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oWAAoW,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,osBAAosB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,k3BAA03BE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0eAAqe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+bAA+b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mkBAAmkB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yUAAoU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+YAA0Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+qBAA+qB,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2MAA2M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2EAAwFE,EAAEC,EAAE,CAAC,KAAK,iIAAiI,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,wLAAwL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2dAA2d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAAyU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2eAA4d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8ZAAyZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAoL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAA2Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAAgM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4gBAA4gB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qSAAgS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuDE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,wPAAwP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sFAAmGE,EAAEC,EAAE,CAAC,KAAK,4FAA4F,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,yKAAyK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAA+O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sTAA4S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,2LAA2L,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,2IAA2I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oHAAoH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6QAA6Q,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2MAA2M,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAiS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sNAAsN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6KAA6K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6MAA6M,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2CAAsC,CAAC,EAAE,yHAAsIA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAA4H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAAsG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,qVAAkWE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAAmEE,EAAEC,EAAE,CAAC,KAAK,kGAAkG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,+FAA+F,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4GAAyHE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uhBAAwgB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0XAA0X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sjBAAsjB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,SAAsBE,EAAEC,EAAE,CAAC,KAAK,kGAAkG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,gGAAgG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gYAA2X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2rBAA2rB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8jBAA8jB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sYAAsY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wMAAwM,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,+PAA0P,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,mNAAmN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,gSAAgS,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,qJAAqJ,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,4MAAkM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,+RAA0R,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uYAAuY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA+T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iYAAiY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAA6Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2VAA2V,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,2SAA2S,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,mPAAyO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,uMAAoNA,EAAEC,EAAE,CAAC,KAAK,yGAAyG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,iMAAiM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+JAA+J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yNAAyN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,8MAA8M,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAA2T,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qNAA2M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,oFAAoF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,2PAA2P,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAAuF,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,6EAA6E,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qTAA2S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAAqN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsCE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,qOAAqO,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iBAA8BE,EAAEC,EAAE,CAAC,KAAK,mKAAmK,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,mKAAmK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAoDE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAoL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAgQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAA4K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iEAAiE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAoP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sXAAiX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAEC,EAAE,CAAC,KAAK,iHAAiH,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,mMAAmM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gGAAgG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,uLAAuL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mEAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAAsW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yDAAsEE,EAAEC,EAAE,CAAC,KAAK,uGAAuG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,yCAAyC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yVAAyV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sFAAmGE,EAAEC,EAAE,CAAC,KAAK,oFAAoF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,wCAAmC,CAAC,CAAC,CAAC,EAAE,4LAA4L,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,odAAod,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,IAAI,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,KAAK,SAAsBA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAiQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ocAAoc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAAiS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yYAAoY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yZAAyZ,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yCAAsDE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,gcAAib,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yCAAsDE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,kNAA6M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,kNAAkN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4EAAuE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAAiK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAA6L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAAyY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uNAAoOE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,iLAAiL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,QAAqBE,EAAEC,EAAE,CAAC,KAAK,+FAA+F,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,2LAA2L,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2MAAsM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAAwI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0GE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAC74jJa,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "__FramerMetadata__"]
}
