{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/praG1d03JfS1BdHoxfXU/V4kcrhXdJtqn9wJcAb4N/k8eb6OYNe.js"],
  "sourcesContent": ["import{jsx as e,jsxs as n}from\"react/jsx-runtime\";import{addPropertyControls as t,ControlType as i}from\"framer\";import*as a from\"react\";let r=\"bfB8UVrhc\",s=\"vxlTCs4Pt\",o=\"GTewd2Q7a\",c=\"ljepAC0fa\",l=\"Di0jLz3N4\",d=\"JEClYTGY6\",h=\"vcrs_9kym\",p=\"DhFpCmFll\",m=\"eiMuhs8ns\",g=\"e9i8qlgFj\",u=(e,n)=>{if(e&&\"object\"==typeof e)return{...e,alt:n};},f=[{index:0,id:\"lDkGf0T61\",[r]:\"The Ever-Evolving Cybersecurity Landscape\",[s]:\"the-ever-evolving-cybersecurity-landscape\",[o]:!0,[c]:\"2023-06-26T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/HXrIKUx4weAAIdRP6439pBwf6MQ.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/HXrIKUx4weAAIdRP6439pBwf6MQ.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/HXrIKUx4weAAIdRP6439pBwf6MQ.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/HXrIKUx4weAAIdRP6439pBwf6MQ.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/HXrIKUx4weAAIdRP6439pBwf6MQ.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/HXrIKUx4weAAIdRP6439pBwf6MQ.jpg 4556w\"},\"The Ever-Evolving Cybersecurity Landscape\"),[d]:5,[h]:\"sbsKP1Q22\",[p]:\"Protect yourself from cyber threats in the ever-evolving digital world with these cybersecurity tips and best practices.\",[m]:u({src:\"https://framerusercontent.com/images/QXbzLyYQMjjtORNW4DYx9dZR3PU.png\",srcSet:\"https://framerusercontent.com/images/QXbzLyYQMjjtORNW4DYx9dZR3PU.png?scale-down-to=512 512w, https://framerusercontent.com/images/QXbzLyYQMjjtORNW4DYx9dZR3PU.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/QXbzLyYQMjjtORNW4DYx9dZR3PU.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/QXbzLyYQMjjtORNW4DYx9dZR3PU.png 2398w\"},\"The Ever-Evolving Cybersecurity Landscape\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's interconnected world, cybersecurity is more crucial than ever. \"}),/*#__PURE__*/e(\"p\",{children:\"As technology advances and the digital realm expands, cyber threats become increasingly sophisticated and pervasive, posing a significant risk to individuals, businesses, and governments. \"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the evolving cybersecurity landscape and implementing effective protection measures is essential to safeguard our digital lives and minimize the impact of cyberattacks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Recognizing the Escalating Threat\"}),/*#__PURE__*/e(\"p\",{children:\"Cyberattacks are becoming more common, more targeted, and more damaging. \"}),/*#__PURE__*/e(\"p\",{children:\"Ransomware attacks, which hold data hostage until a ransom is paid, are on the rise, while phishing scams and social engineering tactics are used to trick individuals into revealing sensitive information. \"}),/*#__PURE__*/e(\"p\",{children:\"The increasing use of cloud services and the expansion of the Internet of Things (IoT) further broaden the attack surface, making it easier for cybercriminals to gain access to sensitive data and systems.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Human Element: A Key Target\"}),/*#__PURE__*/e(\"p\",{children:\"Often, the weakest link in cybersecurity is not the technology but the human element. \"}),/*#__PURE__*/e(\"p\",{children:\"Cybercriminals often leverage social engineering tactics to trick individuals into clicking on malicious links, opening attachments containing malware, or revealing personal information. \"}),/*#__PURE__*/e(\"p\",{children:\"Phishing emails, fake websites, and social media scams are just a few examples of techniques used to exploit human error and gain access to sensitive data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Protecting Yourself Against Cyberthreats\"}),/*#__PURE__*/e(\"p\",{children:\"While the cybersecurity landscape is constantly evolving, there are several steps individuals can take to protect themselves from cyberattacks:\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Be cautious of emails, links, and attachments:\"}),\" Do not open suspicious emails, attachments, or links, even if they appear to be from known senders. Hover over links to see the actual destination URL before clicking.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use strong passwords and two-factor authentication:\"}),\" Create strong passwords for all online accounts and enable two-factor authentication (2FA) whenever possible. 2FA adds an extra layer of security by requiring a code from your phone in addition to your password.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Be wary of social engineering tactics:\"}),\" Be suspicious of unsolicited emails, messages, or phone calls that request personal information or urge you to take action immediately. Never provide sensitive information unless you are absolutely sure of the legitimacy of the request.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Keep software up to date:\"}),\" Install and apply security patches and updates for operating systems, applications, and browsers promptly. These updates often address vulnerabilities that cybercriminals could exploit.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use reputable antivirus and anti-malware software:\"}),\" Install and regularly update reputable antivirus and anti-malware software to scan for and remove malicious software.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Be mindful of public Wi-Fi:\"}),\" Avoid accessing sensitive information or making online transactions on public Wi-Fi networks, as they may be less secure. If you must use public Wi-Fi, consider using a virtual private network (VPN) to encrypt your traffic.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"Protecting Your Business\"}),/*#__PURE__*/e(\"p\",{children:\"Businesses face even greater cybersecurity challenges due to the vast amount of sensitive data they collect and store. \"}),/*#__PURE__*/e(\"p\",{children:\"Implementing robust cybersecurity measures is crucial to protect customer information, intellectual property, and financial assets. Businesses should consider:\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Conducting regular risk assessments:\"}),\" Identify and prioritize cybersecurity risks specific to the organization's operations and data assets.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Implementing a comprehensive security strategy:\"}),\" Develop and implement a comprehensive cybersecurity strategy that includes technical controls, policies, procedures, and training for employees.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regularly testing and patching systems:\"}),\" Regularly test systems and applications for vulnerabilities and apply security patches promptly.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Educating employees on cybersecurity:\"}),\" Provide regular cybersecurity training for employees to raise awareness of threats and educate them on best practices to protect sensitive data.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Partnering with security experts:\"}),\" Consider engaging cybersecurity experts to conduct vulnerability assessments, penetration testing, and risk management consulting.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"Collaborating for a Secure Future\"}),/*#__PURE__*/e(\"p\",{children:\"The cybersecurity landscape is complex and constantly evolving, requiring collaboration among individuals, businesses, and governments. \"}),/*#__PURE__*/e(\"p\",{children:\"By raising awareness, adopting best practices, and investing in cybersecurity solutions, we can collectively protect our digital lives, safeguard our organizations, and build a more secure and resilient digital society.\"})]})},{index:1,id:\"qf0M0kY5H\",[r]:\"The Unstoppable Rise Of The Metaverse\",[s]:\"the-rise-of-the-metaverse\",[o]:!0,[c]:\"2023-09-09T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/rOV3DXe0RDIxzUmqhYCkacBz1A.jpg\",srcSet:\"https://framerusercontent.com/images/rOV3DXe0RDIxzUmqhYCkacBz1A.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/rOV3DXe0RDIxzUmqhYCkacBz1A.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/rOV3DXe0RDIxzUmqhYCkacBz1A.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/rOV3DXe0RDIxzUmqhYCkacBz1A.jpg 3719w\"},\"The Unstoppable Rise Of The Metaverse\"),[d]:6,[h]:\"uVxbXxWS2\",[p]:\"Immerse yourself in the metaverse, a virtual world shaping the future of social interaction, entertainment, and commerce.\",[m]:u({src:\"https://framerusercontent.com/images/kVc9m9dA1rsikgnLeVZ3LiBZYc.png\",srcSet:\"https://framerusercontent.com/images/kVc9m9dA1rsikgnLeVZ3LiBZYc.png?scale-down-to=512 512w, https://framerusercontent.com/images/kVc9m9dA1rsikgnLeVZ3LiBZYc.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/kVc9m9dA1rsikgnLeVZ3LiBZYc.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/kVc9m9dA1rsikgnLeVZ3LiBZYc.png 2398w\"},\"The Unstoppable Rise Of The Metaverse\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The metaverse, a concept that has captivated imaginations for decades, is poised to become a reality, blurring the lines between the physical and digital worlds. \"}),/*#__PURE__*/e(\"p\",{children:\"This immersive virtual environment, characterized by its interconnectedness and shared experiences, promises to revolutionize the way we interact with technology and each other.\"}),/*#__PURE__*/e(\"h2\",{children:\"Delving into the Metaverse's Essence\"}),/*#__PURE__*/e(\"p\",{children:\"The metaverse is not merely a virtual reality (VR) experience; it is a convergence of technologies, including VR, augmented reality (AR), blockchain, and artificial intelligence (AI). \"}),/*#__PURE__*/e(\"p\",{children:\"These technologies enable the creation of persistent, interactive worlds that seamlessly integrate with the physical world, allowing for a continuous flow of experiences and interactions.\"}),/*#__PURE__*/e(\"h2\",{children:\"Transforming Social Interactions\"}),/*#__PURE__*/e(\"p\",{children:\"The metaverse has the potential to transform social interactions, providing a platform for virtual communities, shared experiences, and personalized interactions. \"}),/*#__PURE__*/e(\"p\",{children:\"Users can create avatars that reflect their personalities and engage in activities such as socializing, gaming, attending events, and pursuing hobbies. \"}),/*#__PURE__*/e(\"p\",{children:\"These virtual experiences can foster new connections, deepen existing relationships, and provide opportunities for self-expression and exploration.\"}),/*#__PURE__*/e(\"h2\",{children:\"Economic Opportunities in the Metaverse\"}),/*#__PURE__*/e(\"p\",{children:\"The metaverse also holds immense economic potential, creating new avenues for commerce, entertainment, and creative expression. \"}),/*#__PURE__*/e(\"p\",{children:\"Businesses can establish virtual storefronts, host events, and offer immersive products and services. Creators can leverage the metaverse to showcase their works, engage with audiences, and monetize their talents.\"}),/*#__PURE__*/e(\"h2\",{children:\"Challenges and Considerations for the Metaverse's Rise\"}),/*#__PURE__*/e(\"p\",{children:\"While the metaverse offers a tantalizing vision of a transformed digital landscape, it also presents challenges that need to be addressed. \"}),/*#__PURE__*/e(\"p\",{children:\"Issues of privacy, security, and inclusivity must be carefully considered to ensure that the metaverse is a welcoming and safe space for all. \"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, the potential for addiction and escapism from the real world requires responsible use and moderation.\"}),/*#__PURE__*/e(\"h2\",{children:\"Navigating the Ethical Landscape of the Metaverse\"}),/*#__PURE__*/e(\"p\",{children:\"The metaverse's ethical implications demand careful consideration. \"}),/*#__PURE__*/e(\"p\",{children:\"Issues of data ownership, algorithmic bias, and the potential for manipulation must be addressed to ensure that the metaverse operates in a fair and transparent manner. \"}),/*#__PURE__*/e(\"p\",{children:\"Open dialogue, community engagement, and regulatory oversight are crucial to shaping the ethical framework of this emerging technological landscape.\"}),/*#__PURE__*/e(\"h2\",{children:\"Harnessing the Metaverse for Social Good\"}),/*#__PURE__*/e(\"p\",{children:\"The metaverse's potential to connect people and foster collaboration can be harnessed for social good. \"}),/*#__PURE__*/e(\"p\",{children:\"Virtual educational platforms can provide access to quality education, while remote healthcare services can expand access to medical care. \"}),/*#__PURE__*/e(\"p\",{children:\"The metaverse can also serve as a platform for social activism, raising awareness of global issues and promoting civic engagement.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"The rise of the metaverse marks a turning point in human interaction, blurring the boundaries between the physical and digital realms. \"}),/*#__PURE__*/e(\"p\",{children:\"As this immersive virtual world evolves, it will become an integral part of our lives, transforming the way we work, play, learn, and connect with others. \"}),/*#__PURE__*/e(\"p\",{children:\"By embracing the metaverse responsibly, we can create a future where technology serves as a force for positive change and human empowerment.\"})]})},{index:2,id:\"eoWrXlStl\",[r]:\"The Future Of Artificial Intelligence (AI)\",[s]:\"the-future-of-artificial-intelligence-(ai)\",[o]:!0,[c]:\"2023-03-22T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/BYEeWLQ33ccr7kJYUJnnLpNhBEo.jpg\",srcSet:\"https://framerusercontent.com/images/BYEeWLQ33ccr7kJYUJnnLpNhBEo.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/BYEeWLQ33ccr7kJYUJnnLpNhBEo.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/BYEeWLQ33ccr7kJYUJnnLpNhBEo.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/BYEeWLQ33ccr7kJYUJnnLpNhBEo.jpg 3840w\"},\"Artificial Intelligence (AI)\"),[d]:4,[h]:\"OfRV7qT1Z\",[p]:\"Discovern the power of AI and how it will affect the future, from superintelligence to AI-powered jobs and ethical considerations.\",[m]:u({src:\"https://framerusercontent.com/images/02vPwdXzolCp4KHc6ksAVJUAzMk.png\",srcSet:\"https://framerusercontent.com/images/02vPwdXzolCp4KHc6ksAVJUAzMk.png?scale-down-to=512 512w, https://framerusercontent.com/images/02vPwdXzolCp4KHc6ksAVJUAzMk.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/02vPwdXzolCp4KHc6ksAVJUAzMk.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/02vPwdXzolCp4KHc6ksAVJUAzMk.png 2398w\"},\"The Future Of Artificial Intelligence (AI)\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Artificial intelligence (AI) has emerged as a transformative force in the modern world, revolutionizing industries and reshaping our daily lives. \"}),/*#__PURE__*/e(\"p\",{children:\"From self-driving cars to virtual assistants, AI is rapidly infiltrating our society, raising both excitement and apprehension about its potential impact. \"}),/*#__PURE__*/e(\"p\",{children:\"As AI continues to evolve, it is crucial to explore its future trajectory, its potential benefits, and the challenges it poses.\"}),/*#__PURE__*/e(\"h2\",{children:\"AI's Expanding Reach and Applications\"}),/*#__PURE__*/e(\"p\",{children:\"AI's reach is expanding exponentially, permeating various sectors and shaping the course of technological innovation. In healthcare, AI is assisting in medical diagnosis, drug discovery, and personalized treatment plans. \"}),/*#__PURE__*/e(\"p\",{children:\"In finance, AI is automating complex tasks, enhancing risk management, and driving financial inclusion. In logistics and supply chains, AI is optimizing routing, predicting demand patterns, and reducing inefficiencies. \"}),/*#__PURE__*/e(\"p\",{children:\"And in our personal lives, AI powers virtual assistants, personalized recommendations, and intelligent language translation.\"}),/*#__PURE__*/e(\"h2\",{children:\"AI's Promise of Enhanced Efficiency and Automation\"}),/*#__PURE__*/e(\"p\",{children:\"AI's ability to process vast amounts of data, identify patterns, and make predictions holds immense potential for enhancing efficiency and automation across various industries. \"}),/*#__PURE__*/e(\"p\",{children:\"By automating repetitive tasks and optimizing processes, AI can free up human workers to engage in more creative, strategic, and empathetic endeavors. \"}),/*#__PURE__*/e(\"p\",{children:\"This shift in labor dynamics could revolutionize the workplace, leading to increased productivity, reduced costs, and improved customer experiences.\"}),/*#__PURE__*/e(\"h2\",{children:\"AI's Ethical Implications and Responsible Development\"}),/*#__PURE__*/e(\"p\",{children:\"As AI becomes increasingly integrated into society, it is essential to consider its ethical implications and ensure its responsible development. \"}),/*#__PURE__*/e(\"p\",{children:\"Issues of bias, algorithmic accountability, and potential misuse of AI raise concerns about fairness, transparency, and individual privacy. \"}),/*#__PURE__*/e(\"p\",{children:\"It is imperative to establish clear ethical guidelines, foster responsible innovation, and build trust in AI systems to mitigate these risks and maximize their benefits.\"}),/*#__PURE__*/e(\"h2\",{children:\"Navigating the Future of AI with Sustainability and Social Responsibility\"}),/*#__PURE__*/e(\"p\",{children:\"The future of AI also demands a focus on sustainability and social responsibility. \"}),/*#__PURE__*/e(\"p\",{children:\"AI should be harnessed to address pressing global challenges, such as climate change, resource scarcity, and social inequality. \"}),/*#__PURE__*/e(\"p\",{children:\"AI-powered solutions can optimize energy consumption, improve agricultural practices, and enhance healthcare access, contributing to a more sustainable and equitable world.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Collective Responsibility to Shape AI's Future\"}),/*#__PURE__*/e(\"p\",{children:\"The future of AI is not predetermined; it will be shaped by the decisions we make today. \"}),/*#__PURE__*/e(\"p\",{children:\"As individuals, organizations, and governments, we have a collective responsibility to ensure that AI is developed and deployed for the betterment of humanity. \"}),/*#__PURE__*/e(\"p\",{children:\"This includes fostering collaboration, promoting open dialogue, and investing in education and research to ensure that AI serves as a force for good in the world.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, AI's transformative potential is undeniable, offering a pathway to a more efficient, automated, and personalized future. \"}),/*#__PURE__*/e(\"p\",{children:\"However, we must carefully navigate its ethical implications, promote responsible development, and harness its power for sustainability and social good. \"}),/*#__PURE__*/e(\"p\",{children:\"By embracing AI responsibly, we can shape a future where technology empowers and enhances human life.\"})]})},{index:3,id:\"RDIjfH9yw\",[r]:\"The Impact of Tech on Society\",[s]:\"the-impact-of-tech-on-society\",[o]:!0,[c]:\"2022-04-08T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/hi3ef0c808sdkIEtMhxPrqPjwfo.jpg\",srcSet:\"https://framerusercontent.com/images/hi3ef0c808sdkIEtMhxPrqPjwfo.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/hi3ef0c808sdkIEtMhxPrqPjwfo.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/hi3ef0c808sdkIEtMhxPrqPjwfo.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/hi3ef0c808sdkIEtMhxPrqPjwfo.jpg 3872w\"},\"The impact of tech on society\"),[d]:5,[h]:\"C7heubnCR\",[p]:\"Technology has revolutionized our lives, but it also raises concerns about privacy, inequality, and manipulation.\",[m]:u({src:\"https://framerusercontent.com/images/voJeXGHSJVCZpsRqT6voHtjejeE.png\",srcSet:\"https://framerusercontent.com/images/voJeXGHSJVCZpsRqT6voHtjejeE.png?scale-down-to=512 512w, https://framerusercontent.com/images/voJeXGHSJVCZpsRqT6voHtjejeE.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/voJeXGHSJVCZpsRqT6voHtjejeE.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/voJeXGHSJVCZpsRqT6voHtjejeE.png 2398w\"},\"The Impact of Tech on Society\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Technology has profoundly transformed our lives, shaping society, the economy, and the political landscape. \"}),/*#__PURE__*/e(\"p\",{children:\"From the advent of the internet to the rise of social media, technology has revolutionized communication, commerce, and entertainment. \"}),/*#__PURE__*/e(\"p\",{children:\"While technology has brought significant advancements, it has also introduced new challenges and raised concerns about its impact on society.\"}),/*#__PURE__*/e(\"h2\",{children:\"Social Implications\"}),/*#__PURE__*/e(\"p\",{children:\"Technology has enhanced our ability to connect with others, breaking down geographical and social barriers. \"}),/*#__PURE__*/e(\"p\",{children:\"Social media platforms have fostered global communities, enabling individuals to share ideas, experiences, and interests. \"}),/*#__PURE__*/e(\"p\",{children:\"However, this interconnectedness has also contributed to the rise of echo chambers and polarization, as individuals are more likely to engage with information and opinions that reinforce their existing beliefs.\"}),/*#__PURE__*/e(\"p\",{children:\"The pervasiveness of technology has raised concerns about privacy and surveillance. \"}),/*#__PURE__*/e(\"p\",{children:\"As we increasingly share our personal information online, it becomes more vulnerable to misuse and data breaches. \"}),/*#__PURE__*/e(\"p\",{children:\"The use of surveillance technologies, such as facial recognition and social media tracking, has sparked debates about individual privacy and government overreach.\"}),/*#__PURE__*/e(\"h2\",{children:\"Economic Implications\"}),/*#__PURE__*/e(\"p\",{children:\"Technology has revolutionized industries, automating tasks and creating new opportunities. \"}),/*#__PURE__*/e(\"p\",{children:\"However, it has also led to job displacement, particularly in sectors such as manufacturing and retail. \"}),/*#__PURE__*/e(\"p\",{children:\"The rise of artificial intelligence (AI) and automation is expected to exacerbate this trend, raising concerns about potential economic disruption and unemployment.\"}),/*#__PURE__*/e(\"p\",{children:\"Technology has also contributed to increasing economic inequality. \"}),/*#__PURE__*/e(\"p\",{children:\"While the digital economy has created new wealth, it has also concentrated it in the hands of a few tech giants. \"}),/*#__PURE__*/e(\"p\",{children:\"The widening gap between the rich and the poor has raised concerns about social justice and economic fairness.\"}),/*#__PURE__*/e(\"p\",{children:\"The digital divide, the gap between those who have access to technology and those who do not, has also become a significant issue. \"}),/*#__PURE__*/e(\"p\",{children:\"This divide can hinder access to education, employment opportunities, and social participation, exacerbating inequalities and hindering social mobility.\"}),/*#__PURE__*/e(\"h2\",{children:\"Political Implications\"}),/*#__PURE__*/e(\"p\",{children:\"Technology has transformed the political landscape, enabling individuals to engage with politicians and political issues directly. \"}),/*#__PURE__*/e(\"p\",{children:\"However, it has also made it easier to spread misinformation and manipulate public opinion. \"}),/*#__PURE__*/e(\"p\",{children:\"Social media platforms have been used to spread disinformation and foreign interference in elections, raising concerns about the erosion of democracy.\"}),/*#__PURE__*/e(\"p\",{children:\"The rise of echo chambers and filter bubbles on social media can limit exposure to diverse viewpoints and hinder informed decision-making. \"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, the use of social media analytics for political targeting and the manipulation of user emotions have raised concerns about the misuse of technology in the context of elections and democratic processes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Navigating the Technological Landscape\"}),/*#__PURE__*/e(\"p\",{children:\"To address the challenges and harness the potential of technology, it is crucial to promote responsible development and empower individuals. \"}),/*#__PURE__*/e(\"p\",{children:\"Governments, technology companies, and civil society organizations have a shared responsibility to ensure that technology is developed, deployed, and used in a manner that respects human rights, promotes social justice, and safeguards democratic principles.\"}),/*#__PURE__*/e(\"p\",{children:\"This includes addressing issues such as data privacy, algorithmic bias, and the potential for misuse of technology. \"}),/*#__PURE__*/e(\"p\",{children:\"Fostering transparency, accountability, and informed public participation is essential to ensure that technology serves humanity's best interests.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, technology has an undeniable impact on society, shaping our interactions, economies, and political landscapes. \"}),/*#__PURE__*/e(\"p\",{children:\"While technology offers immense opportunities, it also presents challenges and raises concerns about its impact on individuals, societies, and democratic processes. \"}),/*#__PURE__*/e(\"p\",{children:\"By fostering responsible development, empowering individuals, and addressing the ethical implications of technology, we can shape a future where technology serves as a force for good, empowering individuals, promoting inclusive societies, and safeguarding democratic values.\"})]})},{index:4,id:\"lx0KU_f42\",[r]:\"The Future Of The Internet (2023)\",[s]:\"the-future-of-the-internet\",[o]:!0,[c]:\"2022-03-15T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/qf5YHpilUfUHk55MPBWhDDWHbmo.jpg\",srcSet:\"https://framerusercontent.com/images/qf5YHpilUfUHk55MPBWhDDWHbmo.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/qf5YHpilUfUHk55MPBWhDDWHbmo.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/qf5YHpilUfUHk55MPBWhDDWHbmo.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/qf5YHpilUfUHk55MPBWhDDWHbmo.jpg 4032w\"},\"Teal Flower\"),[d]:7,[h]:\"C7heubnCR\",[p]:\"Embrace the future of the internet with 5G, AI, edge computing, Web3, and personalized experiences.\",[m]:u({src:\"https://framerusercontent.com/images/dcVP0AzFjGPBS8XQbeSOBBUFcY.png\",srcSet:\"https://framerusercontent.com/images/dcVP0AzFjGPBS8XQbeSOBBUFcY.png?scale-down-to=512 512w, https://framerusercontent.com/images/dcVP0AzFjGPBS8XQbeSOBBUFcY.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/dcVP0AzFjGPBS8XQbeSOBBUFcY.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/dcVP0AzFjGPBS8XQbeSOBBUFcY.png 2398w\"},\"The Future Of The Internet (2023)\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The internet has transformed our lives, revolutionizing communication, commerce, and entertainment. From the early days of dial-up connections to the ubiquitous broadband of today, the internet has become an integral part of our lives. \"}),/*#__PURE__*/e(\"p\",{children:\"As we look to the future, the internet is poised to undergo further transformation, with emerging technologies and evolving trends shaping the digital landscape of tomorrow.\"}),/*#__PURE__*/e(\"h2\",{children:\"Emerging Technologies\"}),/*#__PURE__*/e(\"p\",{children:\"Several emerging technologies are poised to revolutionize the internet and our online experiences.\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5G and Beyond:\"}),\" The next generation of cellular networks, 5G, promises significantly faster speeds and lower latency, enabling more immersive and responsive online experiences. Beyond 5G, even faster and more advanced wireless technologies are on the horizon.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Artificial Intelligence (AI):\"}),\" AI is already being integrated into various aspects of the internet, from personalized content recommendations to intelligent virtual assistants. In the future, AI is expected to play an even more prominent role in enhancing user experiences, automating tasks, and making the internet more intelligent.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Edge Computing:\"}),\" Edge computing brings data processing and analysis closer to the source, reducing latency and improving the responsiveness of online applications. This will be particularly important for real-time applications, such as augmented reality and virtual reality.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Web3 and Blockchain:\"}),\" Web3 represents a decentralized and democratized version of the internet, powered by blockchain technology. This could lead to a more secure, transparent, and user-controlled online experience.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"Evolving Trends\"}),/*#__PURE__*/e(\"p\",{children:\"Alongside emerging technologies, several evolving trends are influencing the future of the internet\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalization and Customization:\"}),\" The internet is becoming increasingly personalized, with algorithms tailoring content and experiences to individual users. This trend is driven by the vast amount of data collected about users' online behavior.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ubiquity and Convergence:\"}),\" The internet is becoming increasingly ubiquitous, seamlessly integrated into our daily lives. From smart homes to wearable devices, the internet is extending its reach and transforming the way we interact with the world around us.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Social Responsibility and Ethics:\"}),\" As the internet becomes more pervasive, concerns about its impact on society and the ethical implications of emerging technologies are growing. Governments, tech companies, and individuals are grappling with issues such as data privacy, algorithmic bias, and the potential for misuse of technology.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"The Future of the Internet\"}),/*#__PURE__*/e(\"p\",{children:\"The future of the internet is filled with both exciting possibilities and challenges. \"}),/*#__PURE__*/e(\"p\",{children:\"By embracing emerging technologies, adapting to evolving trends, and addressing ethical concerns, we can shape a future where the internet serves as a force for good, enhancing our lives, promoting innovation, and fostering a more connected and inclusive world.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some key considerations for navigating the future of the internet:\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Invest in education and digital literacy:\"}),\" Empowering individuals to understand and navigate the complexities of the online world is crucial for informed decision-making and responsible digital citizenship.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Promote transparency and accountability:\"}),\" Governments, tech companies, and other stakeholders must be transparent about their data collection practices, algorithms, and decision-making processes.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enforce data protection regulations:\"}),\" Strong data protection laws are essential to safeguard user privacy and prevent the misuse of personal information.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Foster ethical AI development:\"}),\" AI development should prioritize fairness, accountability, and transparency to mitigate potential biases and ensure that AI is used for positive purposes.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Embrace diversity and inclusion:\"}),\" The tech industry must strive for greater diversity and inclusion to ensure that its products and services reflect the needs and perspectives of all users.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"p\",{children:\"By taking these steps, we can ensure that the future of the internet is one that benefits all of humanity, fostering innovation, empowering individuals, and creating a more inclusive and equitable digital society.\"})]})},{index:5,id:\"TNZ0u9pwD\",[r]:\"The Next Generation of Technology\",[s]:\"the-next-generation-of-technology\",[o]:!0,[c]:\"2022-02-28T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/cvUTo5ugUjyX2DAVhlVyMWNpzxY.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/cvUTo5ugUjyX2DAVhlVyMWNpzxY.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/cvUTo5ugUjyX2DAVhlVyMWNpzxY.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/cvUTo5ugUjyX2DAVhlVyMWNpzxY.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/cvUTo5ugUjyX2DAVhlVyMWNpzxY.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/cvUTo5ugUjyX2DAVhlVyMWNpzxY.jpg 4846w\"},\"Mackbook pro\"),[d]:4,[h]:\"C7heubnCR\",[p]:\"Explore the cutting-edge technologies that are shaping the future, such as artificial general intelligence (AGI) and quantum computing.\",[m]:u({src:\"https://framerusercontent.com/images/SGtF3DqpR7SCnpKOReL9HRBkjQ.png\",srcSet:\"https://framerusercontent.com/images/SGtF3DqpR7SCnpKOReL9HRBkjQ.png?scale-down-to=512 512w, https://framerusercontent.com/images/SGtF3DqpR7SCnpKOReL9HRBkjQ.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/SGtF3DqpR7SCnpKOReL9HRBkjQ.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/SGtF3DqpR7SCnpKOReL9HRBkjQ.png 2398w\"},\"The Next Generation of Technology\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As technology continues to evolve at an unprecedented pace, we are constantly presented with new and innovative advancements that redefine the way we live, work, and interact with the world around us. \"}),/*#__PURE__*/e(\"p\",{children:\"The next generation of tech promises to bring even more transformative capabilities, revolutionizing industries and shaping the future in ways we can only begin to imagine.\"}),/*#__PURE__*/e(\"h2\",{children:\"Emerging Technologies on the Horizon\"}),/*#__PURE__*/e(\"p\",{children:\"Several cutting-edge technologies are poised to shape the future, offering exciting possibilities and transforming our lives in profound ways.\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Artificial General Intelligence (AGI):\"}),\" AGI, the hypothetical future of AI where machines achieve human-level intelligence, holds the potential to revolutionize almost every aspect of our lives. AGI could enable machines to solve complex problems, automate tasks, and even generate creative content.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quantum Computing:\"}),\" Quantum computing promises to revolutionize computing by harnessing the principles of quantum mechanics to perform computations far beyond the capabilities of classical computers. This could lead to breakthroughs in fields such as medicine, materials science, and artificial intelligence.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Neuromorphic Computing:\"}),\" Inspired by the structure and function of the human brain, neuromorphic computing aims to develop artificial systems that mimic the brain's ability to process information and learn. This could lead to more efficient and powerful computers that can adapt and learn from experience.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Programmable Matter:\"}),\" Programmable matter, also known as reconfigurable matter, refers to materials that can be programmed to change their shape, color, or functionality. This could lead to the development of self-assembling robots, wearable devices, and even buildings that can adapt to their environment.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Human Augmentation:\"}),\" Human augmentation, the use of technology to enhance human capabilities, is rapidly gaining momentum. Technologies such as brain-computer interfaces, exoskeletons, and bionic limbs are already being developed to restore lost functions and improve human performance.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"The Impact of These Technologies on Society\"}),/*#__PURE__*/e(\"p\",{children:\"The next generation of tech will have a profound impact on society, transforming the way we work, live, and interact with the world around us. It could lead to:\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A more personalized and efficient healthcare system:\"}),\" AI-powered medical diagnostics, personalized treatment plans, and remote patient monitoring could revolutionize healthcare, making it more accessible and effective.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A more sustainable and efficient economy:\"}),\" Smart manufacturing, autonomous vehicles, and renewable energy solutions could help reduce our environmental impact and improve global sustainability.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A more connected and inclusive society:\"}),\" Virtual and augmented reality could enhance communication and collaboration, while social media platforms could foster greater understanding and empathy.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"The Ethical Landscape of Emerging Technologies\"}),/*#__PURE__*/e(\"p\",{children:\"As we embrace these transformative technologies, we must also consider the ethical implications and potential challenges they pose. \"}),/*#__PURE__*/e(\"p\",{children:\"Issues such as job displacement, data privacy, and algorithmic bias must be addressed to ensure that these technologies are used for the benefit of society.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"The next generation of tech holds immense potential to improve our lives, solve global challenges, and create a brighter future. \"}),/*#__PURE__*/e(\"p\",{children:\"By harnessing these technologies responsibly and ethically, we can shape a world that is more sustainable, equitable, and prosperous for all.\"})]})},{index:6,id:\"qFcMlT285\",[r]:\"The Role of Technology in Education\",[s]:\"the-role-of-technology-in-education\",[o]:!1,[c]:\"2022-02-06T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/Kydsc8v566Pq2iaz8zXMYPuYzg.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/Kydsc8v566Pq2iaz8zXMYPuYzg.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/Kydsc8v566Pq2iaz8zXMYPuYzg.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/Kydsc8v566Pq2iaz8zXMYPuYzg.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/Kydsc8v566Pq2iaz8zXMYPuYzg.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/Kydsc8v566Pq2iaz8zXMYPuYzg.jpg 5231w\"},\"Technology in education\"),[d]:6,[h]:\"C7heubnCR\",[p]:\"Learn about the latest advancements in technology that will revolutionise the way we learn forever.\",[m]:u({src:\"https://framerusercontent.com/images/pvHjtmSiv0bj0xi4KMP5XQD8uI.png\",srcSet:\"https://framerusercontent.com/images/pvHjtmSiv0bj0xi4KMP5XQD8uI.png?scale-down-to=512 512w, https://framerusercontent.com/images/pvHjtmSiv0bj0xi4KMP5XQD8uI.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/pvHjtmSiv0bj0xi4KMP5XQD8uI.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/pvHjtmSiv0bj0xi4KMP5XQD8uI.png 2398w\"},\"The Role of Technology in Education\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Technology has emerged as an indispensable tool in the educational landscape, transforming the way we teach and learn. \"}),/*#__PURE__*/e(\"p\",{children:\"From personalized learning platforms to immersive virtual reality experiences, technology offers a multitude of opportunities to enhance the educational experience and empower learners to reach their full potential.\"}),/*#__PURE__*/e(\"h2\",{children:\"Personalized Learning and Adaptive Technologies\"}),/*#__PURE__*/e(\"p\",{children:\"Technology enables educators to tailor learning experiences to individual needs and learning styles. \"}),/*#__PURE__*/e(\"p\",{children:\"Adaptive technologies, such as intelligent tutoring systems and personalized learning platforms, can assess student progress, provide targeted feedback, and adjust the learning pace accordingly.\"}),/*#__PURE__*/e(\"p\",{children:\"This personalized approach ensures that all learners receive the support and guidance they need to succeed.\"}),/*#__PURE__*/e(\"h2\",{children:\"Immersive Learning Experiences\"}),/*#__PURE__*/e(\"p\",{children:\"Immersive technologies, such as virtual reality (VR) and augmented reality (AR), are revolutionizing the way we learn. \"}),/*#__PURE__*/e(\"p\",{children:\"VR allows students to explore virtual environments, engage in hands-on simulations, and experience phenomena that are difficult or impossible to replicate in real life. \"}),/*#__PURE__*/e(\"p\",{children:\"AR overlays digital information onto the real world, enhancing learning experiences and making abstract concepts more tangible.\"}),/*#__PURE__*/e(\"h2\",{children:\"Collaborative Learning and Social Interaction\"}),/*#__PURE__*/e(\"p\",{children:\"Technology facilitates collaboration and social interaction among learners, breaking down geographical barriers and fostering a global learning community. \"}),/*#__PURE__*/e(\"p\",{children:\"Online learning platforms, video conferencing tools, and social media platforms allow students to connect with peers from around the world, work on projects together, and share ideas and experiences.\"}),/*#__PURE__*/e(\"h2\",{children:\"Elevating Access and Equity\"}),/*#__PURE__*/e(\"p\",{children:\"Technology can bridge the educational divide and provide access to quality education for all learners, regardless of their location or socioeconomic background. \"}),/*#__PURE__*/e(\"p\",{children:\"Online learning platforms, digital libraries, and open educational resources (OER) make educational resources more accessible and affordable, while remote learning opportunities can reach underserved communities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Addressing Ethical Concerns and Responsible Implementation\"}),/*#__PURE__*/e(\"p\",{children:\"As we embrace technology in education, it is crucial to address ethical concerns and ensure responsible implementation. \"}),/*#__PURE__*/e(\"p\",{children:\"Data privacy, algorithmic bias, and the potential for misuse of technology must be carefully considered. \"}),/*#__PURE__*/e(\"p\",{children:\"Open dialogue, community engagement, and clear guidelines are essential to ensure that technology is used ethically and responsibly to enhance learning.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Technology holds immense potential to revolutionize education, empowering learners, fostering collaboration, and bridging the digital divide. \"}),/*#__PURE__*/e(\"p\",{children:\"By harnessing technology responsibly and ethically, we can create a future of education that is equitable, accessible, and personalized, empowering all learners to reach their full potential.\"})]})},{index:7,id:\"iYOG0Ecf5\",[r]:\"The Ethical Implications of Artificial Intelligence\",[s]:\"the-ethical-implications-of-artificial-intelligence\",[o]:!1,[c]:\"2022-01-12T00:00:00.000Z\",[l]:u({src:\"https://framerusercontent.com/images/wFe1yJAgaePsquBsCMwTXWxxI5Q.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/wFe1yJAgaePsquBsCMwTXWxxI5Q.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/wFe1yJAgaePsquBsCMwTXWxxI5Q.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/wFe1yJAgaePsquBsCMwTXWxxI5Q.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/wFe1yJAgaePsquBsCMwTXWxxI5Q.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/wFe1yJAgaePsquBsCMwTXWxxI5Q.jpg 4585w\"},\"Ethical implication of artificial intelligence\"),[d]:8,[h]:\"OfRV7qT1Z\",[p]:\"Use AI responsibly by addressing data privacy, algorithmic transparency, job displacement, autonomy, and weaponization.\",[m]:u({src:\"https://framerusercontent.com/images/JxFjMaClv6nOE0bJy9H1wxgvPPU.png\",srcSet:\"https://framerusercontent.com/images/JxFjMaClv6nOE0bJy9H1wxgvPPU.png?scale-down-to=512 512w, https://framerusercontent.com/images/JxFjMaClv6nOE0bJy9H1wxgvPPU.png?scale-down-to=1024 1024w, https://framerusercontent.com/images/JxFjMaClv6nOE0bJy9H1wxgvPPU.png?scale-down-to=2048 2048w, https://framerusercontent.com/images/JxFjMaClv6nOE0bJy9H1wxgvPPU.png 2398w\"},\"The Ethical Implications of Artificial Intelligence\"),[g]:/*#__PURE__*/n(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Artificial intelligence (AI) has emerged as a transformative technology with the potential to revolutionize various industries and aspects of our lives. \"}),/*#__PURE__*/e(\"p\",{children:\"However, the development and deployment of AI also raise significant ethical concerns that must be carefully considered to ensure that AI is used responsibly and ethically.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Ethical Concerns in AI Development\"}),/*#__PURE__*/e(\"p\",{children:\"Several ethical concerns are associated with AI development and deployment. These include:\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Privacy and Bias:\"}),\" AI systems rely on vast amounts of data for training and operation. However, the collection and use of personal data raise concerns about privacy and potential discrimination.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Algorithmic Transparency and Accountability:\"}),' AI systems often operate as \"black boxes,\" making it difficult to understand how they make decisions. This lack of transparency can hinder accountability and make it challenging to identify and address potential biases or errors.']}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Job Displacement and Economic Inequality:\"}),\" AI automation has the potential to displace jobs and exacerbate economic inequality. It is crucial to consider the social and economic impact of AI and develop strategies to mitigate negative consequences.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Autonomy and Control:\"}),\" As AI systems become increasingly sophisticated, questions arise about their autonomy and the extent to which humans retain control over their development and operation.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Weaponization and Warfare:\"}),\" AI has the potential to be weaponized, raising concerns about the ethical implications of autonomous weapons systems and the risks of unintended consequences.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"Addressing Ethical Concerns and Promoting Responsible AI Development\"}),/*#__PURE__*/e(\"p\",{children:\"To address these ethical concerns and ensure responsible AI development, several strategies can be implemented:\"}),/*#__PURE__*/n(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(227, 227, 227)\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Promote Transparency and Explainability:\"}),\" AI systems should be designed to be transparent and explainable, enabling users to understand how decisions are made. This can be achieved through data logging, visualization techniques, and interpretable models.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhance Data Privacy Protection:\"}),\" Robust data privacy regulations and ethical data collection practices are essential to protect user privacy and prevent discrimination. This includes informed consent mechanisms, anonymization techniques, and data minimization principles.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Foster Human Oversight and Control:\"}),\" AI systems should not operate without human oversight and accountability. Humans should retain the ability to override AI decisions, investigate errors, and ensure that AI is used in alignment with ethical principles.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Establish Clear Ethical Guidelines:\"}),\" Clear ethical guidelines and frameworks should be established to guide AI development and deployment. These guidelines should address issues such as bias, transparency, accountability, and social impact.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/n(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Promote Collaboration and Open Dialogue:\"}),\" Fostering collaboration among researchers, policymakers, industry leaders, and civil society organizations is crucial to address ethical concerns and develop responsible AI practices. Open dialogue and public engagement can help ensure that AI is developed and used for the benefit of society.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"By addressing ethical concerns and promoting responsible development, we can harness the potential of AI for the betterment of humanity. \"}),/*#__PURE__*/e(\"p\",{children:\"AI can revolutionize industries, enhance human capabilities, and address global challenges. \"}),/*#__PURE__*/e(\"p\",{children:\"However, we must do so in a way that prioritizes ethical principles, human values, and the well-being of all. \"}),/*#__PURE__*/e(\"p\",{children:\"Only by ensuring that AI is developed and used responsibly can we create a future where AI serves as a force for good, promoting social justice, economic prosperity, and environmental sustainability.\"})]})}];for(let e of f)Object.freeze(e);t(f,{bfB8UVrhc:{defaultValue:\"\",title:\"Title\",type:i.String},vxlTCs4Pt:{title:\"Slug\",type:i.String},GTewd2Q7a:{defaultValue:!0,title:\"Featured\",type:i.Boolean},ljepAC0fa:{defaultValue:\"\",title:\"Date\",type:i.Date},Di0jLz3N4:{title:\"Image\",type:i.ResponsiveImage},JEClYTGY6:{defaultValue:0,title:\"Time To Read\",type:i.Number},vcrs_9kym:{defaultValue:\"C7heubnCR\",options:[\"C7heubnCR\",\"cFZrTWtkD\",\"OfRV7qT1Z\",\"uVxbXxWS2\",\"sbsKP1Q22\"],optionTitles:[\"Technology\",\"Web Design\",\"Artificial Intelligence (AI)\",\"Metaverse\",\"Cyber Security\"],title:\"Category\",type:i.Enum},DhFpCmFll:{defaultValue:\"\",title:\"Meta Description\",type:i.String},eiMuhs8ns:{title:\"Social Image\",type:i.ResponsiveImage},e9i8qlgFj:{defaultValue:\"\",title:\"Content\",type:i.RichText}}),f.displayName=\"Blog\";export default f;export const vcrs_9kymToDisplayName=(e,n)=>{switch(null==n||n.fallback,e){case\"C7heubnCR\":return\"Technology\";case\"cFZrTWtkD\":return\"Web Design\";case\"OfRV7qT1Z\":return\"Artificial Intelligence (AI)\";case\"uVxbXxWS2\":return\"Metaverse\";case\"sbsKP1Q22\":return\"Cyber Security\";default:return\"\";}};export const enumToDisplayNameFunctions={vcrs_9kym:vcrs_9kymToDisplayName};export const utils={async getSlugByRecordId(e,n){var t;return null===(t=f.find(n=>n.id===e))||void 0===t?void 0:t[s];},async getRecordIdBySlug(e,n){var t;return null===(t=f.find(n=>n[s]===e))||void 0===t?void 0:t.id;}};\nexport const __FramerMetadata__ = {\"exports\":{\"default\":{\"type\":\"data\",\"name\":\"data\",\"annotations\":{\"framerEnumToDisplayNameUtils\":\"2\",\"framerCollectionUtils\":\"1\",\"framerRecordIncludedLocalesKey\":\"includedLocales\",\"framerRecordIdKey\":\"id\",\"framerCollectionId\":\"k8eb6OYNe\",\"framerData\":\"\",\"framerSlug\":\"vxlTCs4Pt\",\"framerRecordIndexKey\":\"index\",\"framerContractVersion\":\"1\"}},\"utils\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"vcrs_9kymToDisplayName\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"enumToDisplayNameFunctions\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "qEAAwI,IAAIA,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,CAACC,EAAEC,IAAI,CAAC,GAAGD,GAAa,OAAOA,GAAjB,SAAmB,MAAM,CAAC,GAAGA,EAAE,IAAIC,CAAC,CAAE,EAAEC,EAAE,CAAC,CAAC,MAAM,EAAE,GAAG,YAAY,CAACb,CAAC,EAAE,4CAA4C,CAACC,CAAC,EAAE,4CAA4C,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,0FAA0F,OAAO,scAAsc,EAAE,2CAA2C,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,2HAA2H,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,2CAA2C,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,0KAA0K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,+OAA+O,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,4LAA4L,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,oDAAoD,CAAC,EAAE,wHAAwH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,kOAAkO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,yGAAyG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,EAAE,mJAAmJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,mGAAmG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,mJAAmJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,qIAAqI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,wCAAwC,CAACC,CAAC,EAAE,4BAA4B,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,sEAAsE,OAAO,mWAAmW,EAAE,uCAAuC,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,4HAA4H,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,sEAAsE,OAAO,mWAAmW,EAAE,uCAAuC,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,6CAA6C,CAACC,CAAC,EAAE,6CAA6C,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,8BAA8B,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,qIAAqI,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,4CAA4C,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yJAAyJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2EAA2E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,gCAAgC,CAACC,CAAC,EAAE,gCAAgC,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,+BAA+B,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,oHAAoH,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,+BAA+B,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,oCAAoC,CAACC,CAAC,EAAE,6BAA6B,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,aAAa,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,sGAAsG,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,sEAAsE,OAAO,mWAAmW,EAAE,mCAAmC,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,sPAAsP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,iTAAiT,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oQAAoQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,oMAAoM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,qNAAqN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,yOAAyO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,6SAA6S,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,sKAAsK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,sHAAsH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,6JAA6J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,8JAA8J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,oCAAoC,CAACC,CAAC,EAAE,oCAAoC,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,0FAA0F,OAAO,scAAsc,EAAE,cAAc,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,0IAA0I,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,sEAAsE,OAAO,mWAAmW,EAAE,mCAAmC,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,2MAA2M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,sQAAsQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,mSAAmS,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,2RAA2R,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+RAA+R,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4QAA4Q,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,sDAAsD,CAAC,EAAE,uKAAuK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,yJAAyJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,sCAAsC,CAACC,CAAC,EAAE,sCAAsC,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,yFAAyF,OAAO,icAAic,EAAE,yBAAyB,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,sGAAsG,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,sEAAsE,OAAO,mWAAmW,EAAE,qCAAqC,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAAmK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACP,CAAC,EAAE,sDAAsD,CAACC,CAAC,EAAE,sDAAsD,CAACC,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEM,EAAE,CAAC,IAAI,0FAA0F,OAAO,scAAsc,EAAE,gDAAgD,EAAE,CAACL,CAAC,EAAE,EAAE,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,0HAA0H,CAACC,CAAC,EAAEE,EAAE,CAAC,IAAI,uEAAuE,OAAO,uWAAuW,EAAE,qDAAqD,EAAE,CAACD,CAAC,EAAeC,EAAII,EAAS,CAAC,SAAS,CAAcP,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kLAAkL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAE,wOAAwO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,gNAAgN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4KAA4K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,iKAAiK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sEAAsE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeG,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,qBAAqB,0BAA0B,MAAM,EAAE,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,uNAAuN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,iPAAiP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,4NAA4N,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,8MAA8M,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcH,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,wSAAwS,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,QAAQI,KAAKE,EAAE,OAAO,OAAOF,CAAC,EAAEI,EAAEF,EAAE,CAAC,UAAU,CAAC,aAAa,GAAG,MAAM,QAAQ,KAAKG,EAAE,MAAM,EAAE,UAAU,CAAC,MAAM,OAAO,KAAKA,EAAE,MAAM,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,WAAW,KAAKA,EAAE,OAAO,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,OAAO,KAAKA,EAAE,IAAI,EAAE,UAAU,CAAC,MAAM,QAAQ,KAAKA,EAAE,eAAe,EAAE,UAAU,CAAC,aAAa,EAAE,MAAM,eAAe,KAAKA,EAAE,MAAM,EAAE,UAAU,CAAC,aAAa,YAAY,QAAQ,CAAC,YAAY,YAAY,YAAY,YAAY,WAAW,EAAE,aAAa,CAAC,aAAa,aAAa,+BAA+B,YAAY,gBAAgB,EAAE,MAAM,WAAW,KAAKA,EAAE,IAAI,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,mBAAmB,KAAKA,EAAE,MAAM,EAAE,UAAU,CAAC,MAAM,eAAe,KAAKA,EAAE,eAAe,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,UAAU,KAAKA,EAAE,QAAQ,CAAC,CAAC,EAAEH,EAAE,YAAY,OAAO,IAAOI,EAAQJ,EAAeK,EAAuB,CAACP,EAAEC,IAAI,CAAC,OAAgBA,GAAE,SAASD,EAAE,CAAC,IAAI,YAAY,MAAM,aAAa,IAAI,YAAY,MAAM,aAAa,IAAI,YAAY,MAAM,+BAA+B,IAAI,YAAY,MAAM,YAAY,IAAI,YAAY,MAAM,iBAAiB,QAAQ,MAAM,EAAG,CAAC,EAAeQ,EAA2B,CAAC,UAAUD,CAAsB,EAAeE,EAAM,CAAC,MAAM,kBAAkBT,EAAEC,EAAE,CAAC,IAAIS,EAAE,OAAeA,EAAER,EAAE,KAAKD,GAAGA,EAAE,KAAKD,CAAC,KAA5B,MAAyCU,IAAT,OAAW,OAAOA,EAAEpB,CAAC,CAAE,EAAE,MAAM,kBAAkBU,EAAEC,EAAE,CAAC,IAAIS,EAAE,OAAeA,EAAER,EAAE,KAAKD,GAAGA,EAAEX,CAAC,IAAIU,CAAC,KAA5B,MAAyCU,IAAT,OAAW,OAAOA,EAAE,EAAG,CAAC,EAC3pxDC,EAAqB,CAAC,QAAU,CAAC,QAAU,CAAC,KAAO,OAAO,KAAO,OAAO,YAAc,CAAC,6BAA+B,IAAI,sBAAwB,IAAI,+BAAiC,kBAAkB,kBAAoB,KAAK,mBAAqB,YAAY,WAAa,GAAG,WAAa,YAAY,qBAAuB,QAAQ,sBAAwB,GAAG,CAAC,EAAE,MAAQ,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,uBAAyB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,2BAA6B,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["r", "s", "o", "c", "l", "d", "h", "p", "m", "g", "u", "e", "n", "f", "x", "addPropertyControls", "ControlType", "k8eb6OYNe_default", "vcrs_9kymToDisplayName", "enumToDisplayNameFunctions", "utils", "t", "__FramerMetadata__"]
}
