{"version":3,"file":"LW0fAVOt9-3.BsjVqWrf.mjs","names":["i","n"],"sources":["https:/framerusercontent.com/modules/DUaBI8Z0zQBEAftOFMh3/bYe1rVpV2Ycl2g4hRO2B/LW0fAVOt9-3.js"],"sourcesContent":["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as i}from\"framer\";import{motion as n}from\"framer-motion\";import*as a from\"react\";export const richText=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h6\",{children:\"Last month, the Oscilar team joined thousands of fintech professionals at The Venetian in Las Vegas for Fintech Meetup 2025. As providers of an AI Risk Decisioning™ platform, we were eager to engage with the industry and explore how the financial landscape is reshaping its approach to fraud prevention, credit decisioning, and compliance.\"}),/*#__PURE__*/e(\"p\",{children:\"Now in its third physical edition, Fintech Meetup has quickly established itself as a cornerstone of the Q1 fintech calendar, and our team took full advantage of the event's unique blend of structured networking sessions, in-depth panels, and informal conversations. These interactions provided valuable insights into the challenges our customers and prospects are facing.\"}),/*#__PURE__*/e(\"p\",{children:\"As we reflect on our three days in Vegas, several key themes emerged that are particularly relevant to our work in risk intelligence. Here's our take on what we saw and learned at this year's event.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"533\",src:\"https://framerusercontent.com/images/EZsEmhp2U3SB689RTQ9YYFlAK0.jpg\",srcSet:\"https://framerusercontent.com/images/EZsEmhp2U3SB689RTQ9YYFlAK0.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/EZsEmhp2U3SB689RTQ9YYFlAK0.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/EZsEmhp2U3SB689RTQ9YYFlAK0.jpg 1600w\",style:{aspectRatio:\"1600 / 1067\"},width:\"800\"}),/*#__PURE__*/e(\"h2\",{children:\"1. The AI Arms Race in Fraud Prevention\"}),/*#__PURE__*/e(\"p\",{children:'If there was one topic that dominated conversations on the show floor and in sessions, it was the dual-edged sword of AI in financial security. The panel \"Dealing with AI: Fighting on Both Sides of Financial Fraud\" offered a sobering look at how generative AI lowers the barrier to entry for sophisticated fraud.'}),/*#__PURE__*/e(\"p\",{children:'\"Fraud has never been easier,\" warned Catherine Porter from Prove, a sentiment that resonated with many attendees we spoke with. The explosion of synthetic identity fraud—where criminals combine real and fake data to create entirely fictional identities—concerns organizations across the industry.'}),/*#__PURE__*/e(\"p\",{children:'But equally impressive defensive innovations emerged. We saw multiple companies showcase advanced behavioral biometrics that analyze everything from typing patterns to device movements. As one industry expert noted during a panel discussion, \"Fraudsters can fake documents, but they can\\'t fake how they use their devices.\"'}),/*#__PURE__*/e(\"p\",{children:\"This technological arms race highlights a challenge we see across our own client base: organizations need configurable, adaptable security solutions that respond to emerging threats in real-time. Traditional approaches that require weeks to implement changes no longer work in today's fast-moving threat landscape.\"}),/*#__PURE__*/e(\"h4\",{children:\"How Oscilar Helps\"}),/*#__PURE__*/e(\"p\",{children:\"Our AI Risk Decisioning™ platform specifically addresses this challenge. We unify fraud signals across channels and enable no-code rule changes, helping risk teams respond to new threats in minutes rather than weeks. Our customers use our behavioral intelligence capabilities to detect sophisticated fraud patterns while maintaining a frictionless experience for legitimate users.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"328\",src:\"https://framerusercontent.com/images/P7AxWirdn00ImIZhK8X6hmS2iuw.jpg\",style:{aspectRatio:\"1200 / 656\"},width:\"600\"}),/*#__PURE__*/e(\"h2\",{children:\"2. Open Banking's Evolution\"}),/*#__PURE__*/e(\"p\",{children:'Another standout theme was the transformation of open banking from a regulatory requirement to a market-driven competitive advantage. The panel \"Unleashing Open Finance\\'s Transformative Potential\" explored how consumer demand, not just compliance, is now driving adoption.'}),/*#__PURE__*/e(\"p\",{children:'Pay-by-Bank transactions emerged as one of the most promising innovations in this space. As Brian Dammeir from Plaid noted, \"Consumers are realizing they don\\'t need a credit card to pay online.\" This shift will fundamentally alter payment flows, potentially disrupt traditional card networks, and create new opportunities for both established players and startups.'}),/*#__PURE__*/e(\"p\",{children:'Our conversations revealed how organizations now view open banking through a strategic rather than purely technical lens. They ask not just \"How do we implement these APIs?\" but \"How can open banking transform our business model and customer relationships?\"'}),/*#__PURE__*/e(\"p\",{children:\"Recent policy shifts have created regulatory uncertainty and an interesting dynamic: while some players hesitate, industry leaders forge ahead, recognizing that controlling financial data will determine success in the coming years.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How Oscilar Helps:\"}),\" As open banking expands, so do the risk vectors. Our platform helps financial institutions securely leverage open banking data through our open data fabric, which seamlessly integrates diverse data sources—including account verification data, payment information, and third-party risk signals. This gives risk teams a comprehensive view of customer activity across multiple channels, enabling safer innovation in the open banking ecosystem.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"533\",src:\"https://framerusercontent.com/images/zKLJyGsXltuYqcK3heMCw7peOVk.jpg\",srcSet:\"https://framerusercontent.com/images/zKLJyGsXltuYqcK3heMCw7peOVk.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/zKLJyGsXltuYqcK3heMCw7peOVk.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/zKLJyGsXltuYqcK3heMCw7peOVk.jpg 1600w\",style:{aspectRatio:\"1600 / 1067\"},width:\"800\"}),/*#__PURE__*/e(\"h2\",{children:\"3. Strategic Specialization: The New Path Forward\"}),/*#__PURE__*/e(\"p\",{children:\"A third theme emerged: the shift toward strategic specialization and sustainable business models. Ryan Breslow's first public appearance since reclaiming his role as Bolt's CEO generated significant buzz with his ambitious plans for a fintech super app. Meanwhile, Ally Bank's CEO Michael Rhodes presented a contrasting approach, explaining their strategic exit from credit cards and mortgage lending to double down on auto financing and core digital banking services.\"}),/*#__PURE__*/e(\"p\",{children:\"This tension between expansion and focus reflects broader market shifts in fintech. The growth-at-all-costs mentality that dominated previous years has given way to a renewed emphasis on sustainable revenue models, strategic differentiation, and profitability.\"}),/*#__PURE__*/e(\"p\",{children:\"In our own conversations with clients and prospects, we're seeing similar recalibrations—a move away from trying to be everything to everyone, and toward identifying and doubling down on specific areas of competitive advantage.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How Oscilar Helps:\"}),\" Our modular platform supports this trend toward specialization by allowing organizations to implement precisely the risk capabilities they need—whether that's fraud prevention, credit decisioning, compliance, or all three. Our customers start with their most pressing risk challenge and expand as needed, avoiding the all-or-nothing approach that plagues traditional risk solutions. This flexibility enables our clients to align their risk infrastructure with their strategic focus areas.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Building Community with Oscilar Events\"}),/*#__PURE__*/e(\"p\",{children:\"While the main conference offered valuable insights, we hosted several events that sparked our most productive conversations. Our Tuesday Credit & Fraud Breakfast with SentiLink brought together leaders from lending organizations to discuss the evolving credit landscape, while our Wednesday Compliance & Fraud Breakfast with FS Vector focused on navigating regulatory expectations in an AI-powered world.\"}),/*#__PURE__*/e(\"p\",{children:\"These focused gatherings enabled candid discussions of specific pain points and collaborative problem-solving in a way that the busy show floor makes difficult. Participants consistently told us these intimate settings delivered some of their most valuable takeaways from the entire conference.\"}),/*#__PURE__*/e(\"h2\",{children:\"Looking Ahead: Fintech's Next Chapter\"}),/*#__PURE__*/e(\"p\",{children:\"In advance of Fintech Meetup Mandalay Bay in 2026, the conversations at this year's event show the industry at an inflection point. The organizations that will thrive in the coming years will be those that can:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Balance innovation with security\"}),\", leveraging AI to enhance both customer experience and fraud prevention\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transform open banking from a technical challenge to a strategic advantage\"}),\", creating new value for customers through financial data\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Find their focus\"}),\", prioritizing sustainable growth and differentiation over expansion for its own sake\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"At Oscilar, we commit to helping our customers navigate these challenges. Our AI Risk Decisioning™ platform speeds up risk operations by 10x, giving organizations the agility to innovate securely in this rapidly evolving landscape.\"}),/*#__PURE__*/e(\"p\",{children:\"We left Las Vegas energized by these opportunities and grateful for the connections we made. \"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"If you missed us at the event, you can still learn how Oscilar helps your organization balance innovation and security in today's dynamic risk environment—\"}),/*#__PURE__*/e(i,{href:\"https://www.oscilar.com/demo\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"em\",{children:\"request a demo\"})})}),/*#__PURE__*/e(\"em\",{children:\" today.\"})]})]});export const richText1=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"h6\",{children:[\"We are thrilled to announce that our visionary CEO and Co-founder, Neha Narkhede, has been recognized as one of America's most dynamic women in business by Inc. Magazine, earning a coveted spot on the prestigious \",/*#__PURE__*/e(i,{href:\"https://www.inc.com/female-founders\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Female Founders 500 list for 2025\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"This annual list celebrates women entrepreneurs who are making significant waves in the business world, and we’re proud to share Neha's inclusion among such accomplished leaders.\"}),/*#__PURE__*/e(\"h3\",{children:\"A Recognition of Leadership and Innovation\"}),/*#__PURE__*/t(\"p\",{children:[\"Inc.'s Female Founders 500 acknowledges entrepreneurs who demonstrate exceptional achievements and impact. Through a rigorous \",/*#__PURE__*/e(i,{href:\"https://www.inc.com/female-founders-methodology-how-we-selected-these-entrepreneurs.html\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"three-round judging process\"})}),\", Inc. evaluated candidates based on quantifiable metrics such as revenue growth and funding, as well as qualitative factors including social media momentum and stories of impact.\"]}),/*#__PURE__*/e(\"p\",{children:\"Neha's leadership in developing Oscilar's AI Risk Decisioning™ platform has been instrumental in helping organizations safeguard online transactions, significantly reduce operational costs, and protect their digital assets in an increasingly complex threat landscape.\"}),/*#__PURE__*/e(\"p\",{children:\"The Female Founders 500 represents the best of women-led entrepreneurship in the United States. As Neha joins this prestigious community, she stands alongside remarkable founders who are reshaping industries and breaking barriers.\"}),/*#__PURE__*/e(\"h3\",{children:\"About Inc.'s Female Founders 500\"}),/*#__PURE__*/e(\"p\",{children:\"Now in its eighth year, Inc.'s Female Founders 500 is the definitive list of women entrepreneurs making significant impact in business. The selection process includes evaluation by Inc.'s Female Founders Advisory Board, which features accomplished entrepreneurs and leaders in the business community.\"})]});export const richText2=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"This month, the Oscilar team joined industry leaders at this year's Merchant Risk Council (MRC) Vegas conference to explore emerging trends in risk management and fraud prevention.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Outside of being an energizing, inspiring event, our conversations with prospects and clients revealed several key themes that are shaping the financial security landscape, giving us valuable insights into the challenges and opportunities facing the industry today.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Below are some of our key takeaways from the event, along with reflections and photos from a great week of learning in Las Vegas!\\xa0\"]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/WczB5qXeqbEwoC6OrYi95Hy8ZEk.jpg\",srcSet:\"https://framerusercontent.com/images/WczB5qXeqbEwoC6OrYi95Hy8ZEk.jpg?scale-down-to=1024 768w,https://framerusercontent.com/images/WczB5qXeqbEwoC6OrYi95Hy8ZEk.jpg 1200w\",style:{aspectRatio:\"1200 / 1600\"},width:\"600\"}),/*#__PURE__*/e(\"h2\",{children:\"Regulatory Shifts Gaining Momentum\"}),/*#__PURE__*/e(\"p\",{children:\"Our discussions highlighted the growing emphasis on risk-based regulatory approaches. Financial institutions now face requirements for more targeted compliance programs, moving away from standardized solutions.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The Money Transmission Modernization Act captured attention as an example of efforts to create more uniform regulatory frameworks across states. We noticed particular interest in how these regulatory changes will affect fraud prevention strategies and compliance workflows, with many attendees seeking innovative ways to meet new requirements without sacrificing operational efficiency.\"}),/*#__PURE__*/e(\"h2\",{children:\"Technology Continues to Evolve\"}),/*#__PURE__*/t(\"p\",{children:[\"AI and machine learning implementations dominated many of our conversations, particularly regarding their application in compliance automation and fraud prevention. Attendees frequently discussed real-time detection capabilities as essential tools in today's fast-paced environment. \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Many visitors expressed interest in our unified platform approach that overcomes the limitations of fragmented risk management tools. We demonstrated how our AI-powered solutions can identify emerging fraud patterns in milliseconds rather than days, generating significant excitement among risk professionals looking to stay ahead of increasingly sophisticated threats.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Changing Liability Frameworks\"}),/*#__PURE__*/e(\"p\",{children:\"Our conversations often focused on the evolving nature of liability for financial fraud. The ongoing shift of responsibility for authorized payment fraud toward financial institutions concerned many organizations we spoke with. Conference participants actively sought solutions to help them navigate these changes while maintaining operational efficiency.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"We also engaged in discussions about how the Shared Responsibility Framework in Singapore might influence global trends, and how PSD3 in Europe will reshape the fraud prevention landscape across multiple jurisdictions. These liability shifts created urgency among many attendees to implement more sophisticated prevention measures.\"}),/*#__PURE__*/e(\"h2\",{children:\"Meaningful Connections at MRC Vegas\"}),/*#__PURE__*/e(\"p\",{children:\"We loved welcoming so many of you to booth #532, where our team showcased our AI Risk Decisioning™ platform. Your genuine interest and thoughtful questions during our interactive demos created fantastic conversations about how we can help speed up your risk operations.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:'We felt especially proud watching our Chief Product Officer, Saurabh Bajaj, take the stage alongside leaders from Uber and Block for the \"Building Fraud-Resilient Marketplaces\" panel. Saurabh shared powerful insights about creating trust in hyper-connected worlds while answering questions from a packed room. His explanation of how marketplace platforms can leverage network effects to strengthen fraud prevention resonated strongly with the audience, prompting numerous follow-up conversations at our booth.'}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/ITFxPHnaCSzMG6xF10HgjdQ0mE.jpg\",srcSet:\"https://framerusercontent.com/images/ITFxPHnaCSzMG6xF10HgjdQ0mE.jpg?scale-down-to=1024 768w,https://framerusercontent.com/images/ITFxPHnaCSzMG6xF10HgjdQ0mE.jpg 1200w\",style:{aspectRatio:\"1200 / 1600\"},width:\"600\"}),/*#__PURE__*/e(\"p\",{children:\"The networking events we hosted with our partners also exceeded our expectations. Our Executive Dinner at Nobu created the perfect setting for candid conversations about the challenges of building financial operating systems for SMBs. The intimate atmosphere allowed for deeper discussions about the unique fraud challenges facing businesses at different growth stages. Morning conversations over coffee at our breakfast sessions fostered authentic exchanges about credit, compliance, and fraud prevention strategies. Our Credit & Fraud Breakfast with SentiLink drew a particularly engaged crowd, with attendees sharing innovative approaches to synthetic identity detection that complemented our platform capabilities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Looking Forward\"}),/*#__PURE__*/e(\"p\",{children:\"We left MRC Vegas feeling inspired by the connections we made and the conversations we shared. The energy and collaborative spirit we experienced reinforced our excitement about partnering with you to navigate the complex balance between innovation and risk management. The conference confirmed our belief that unified, AI-powered risk platforms will play a crucial role in helping financial institutions adapt to evolving threats and regulatory requirements.\"}),/*#__PURE__*/e(\"p\",{children:\"Thank you to everyone who stopped by our booth, attended our events, or chatted with our team in the hallways. We can't wait to continue these conversations and explore how we can work together to build more resilient risk management systems. Our team has already begun incorporating the valuable feedback we received into our product roadmap, ensuring our solutions address the most pressing challenges you shared with us.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"If you missed us at MRC Vegas or want to continue our conversation, reach out to \"}),/*#__PURE__*/e(i,{href:\"https://oscilar.com/demo-form-2\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"em\",{children:\"schedule a demo\"})})}),/*#__PURE__*/e(\"em\",{children:\" of our AI Risk Decisioning™ platform.\\xa0\"})]})]});export const richText3=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h6\",{children:\"The financial services industry has pioneered technology adoption from early computerized trading to advanced algorithmic models. While AI has transformed risk management over the past decades—moving from static rules to dynamic machine learning—we're now witnessing a fundamental shift with AI agents.\"}),/*#__PURE__*/e(\"p\",{children:\"Unlike traditional AI that passively analyzes data or responds to queries, AI Agents take initiative, execute complex action sequences, and adapt to changing conditions with minimal oversight. These systems don't merely answer questions or present data—they solve problems and generate insights based on deep understanding of business context.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"At Oscilar, we use the term “Agentic AI” to describe advanced AI-driven services that can automate or coordinate many risk-related tasks with minimal manual intervention. While these services exhibit partial autonomy—such as automatically choosing which data sources to query or recommending rule changes—they do not function as fully independent, self-directed AI entities in the classical “agent” sense. Rather, these Oscilar “agents” operate within established parameters, data sources, and governance rules, ensuring human oversight remains central.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"For risk professionals, this evolution from reactive to proactive AI arrives at a critical moment. Today's risk landscape features unprecedented complexity: AI-powered fraud attacks, rapidly changing regulations, and exponentially multiplying decision variables all demand a fundamentally new approach.\"}),/*#__PURE__*/e(\"p\",{children:\"At Oscilar, we recognized early that truly transformative risk decisioning required more than just better algorithms or bigger datasets. True transformation in risk decisioning required a fundamentally new approach—one that could match today's complex risk environment with equally sophisticated, autonomous systems. That's why we've built our platform around AI agents from the ground up.\"}),/*#__PURE__*/e(\"p\",{children:\"Oscilar's risk decisioning platform leverages specialized AI agents that work collaboratively to handle different aspects of risk management. These agents don't just execute predefined workflows—they understand objectives, prioritize tasks, gather and analyze relevant information, act on them, and communicate findings in clear, actionable terms. Most importantly, they continuously learn and improve from each interaction, becoming more aligned with your organization's specific risk management needs over time.\"}),/*#__PURE__*/e(\"p\",{children:\"The result is a platform that doesn't just enable risk decisioning—it transforms it. By automating routine analyses, surfacing hidden insights, and enabling natural language interactions with complex risk models, Oscilar is democratizing access to sophisticated risk management capabilities while simultaneously raising the bar on what's possible.\"}),/*#__PURE__*/e(\"p\",{children:\"In the following sections, we'll explore how AI Agents are revolutionizing risk management and dive deeper into the specific capabilities that make Oscilar the most advanced risk decisioning platform available today.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding AI Agents in Online Risk Management\"}),/*#__PURE__*/e(\"h3\",{children:\"What makes AI Agents different from traditional AI approaches\"}),/*#__PURE__*/e(\"p\",{children:\"Traditional AI systems in risk management operate as sophisticated analysis tools that require significant human direction. They excel at processing large datasets and identifying patterns, but typically function within narrow, predefined parameters.\"}),/*#__PURE__*/e(\"p\",{children:\"AI Agents, by contrast, operate with significantly more independence, in part due to their understanding of the world (commonly known as the ‘world model’). Rather than simply executing specific tasks when instructed, these systems can:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify when risk assessments are needed without explicit prompting\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Determine what information is relevant to a particular risk decision\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Autonomously gather data from multiple systems and sources\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Prioritize different risk factors based on context\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adapt their approach when encountering novel situations\"})})]}),/*#__PURE__*/e(\"p\",{children:\"For online risk management processes like KYC verification, fraud detection, or credit underwriting, this shift from passive tools to active collaborators fundamentally changes how risk teams operate.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"787\",src:\"https://framerusercontent.com/images/vw84HgtNauomNSg1IEhzGseXds.png\",srcSet:\"https://framerusercontent.com/images/vw84HgtNauomNSg1IEhzGseXds.png?scale-down-to=512 512w,https://framerusercontent.com/images/vw84HgtNauomNSg1IEhzGseXds.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/vw84HgtNauomNSg1IEhzGseXds.png 1752w\",style:{aspectRatio:\"1752 / 1574\"},width:\"876\"}),/*#__PURE__*/e(\"h3\",{children:\"Why autonomy and agency matter for complex online risk decisioning\"}),/*#__PURE__*/e(\"p\",{children:\"Online risk decisioning environments present unique challenges that make autonomous agents particularly valuable:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Speed requirements\"}),\": With customers expecting instant approvals for accounts or transactions, having agents that can execute complex risk assessments in near real-time is transformative\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dynamic threat landscapes\"}),\": Fraud tactics and money laundering techniques evolve rapidly, requiring systems that can adapt without waiting for manual updates\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Contextual complexity\"}),\": Risk decisions often require weighing thousands of factors simultaneously (identity signals, transaction patterns, network relationships, etc.)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"High-volume processing\"}),\": Online platforms process hundreds of millions of interactions daily, making human review of each risk decision impossible\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Systems built using AI Agents can navigate these challenges by continuously monitoring for suspicious patterns, initiating investigations when needed, and making low-risk decisions autonomously while escalating only the most complex cases for human review.\"}),/*#__PURE__*/e(\"h3\",{children:\"The key capabilities that define systems built using AI Agents\"}),/*#__PURE__*/e(\"p\",{children:\"In online risk management, truly systems built using AI Agents demonstrate several distinct capabilities:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Goal-oriented reasoning\"}),\": Understanding the broader objectives behind risk policies, not just executing rules\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proactive monitoring\"}),\": Continuously scanning for emerging risks or anomalies rather than waiting for scheduled reviews\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multi-step planning\"}),\": Developing and executing investigation workflows customized to specific risk scenarios\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User experience optimization\"}),\": AI Agents effectively balance risk and friction by leveraging their deep understanding of user behavior patterns\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tool utilization\"}),\": Selecting and employing different verification methods based on risk level (document verification, biometric matching, etc.)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Explanation generation\"}),\": Providing clear, auditable reasoning for risk decisions that satisfy both regulators and customers\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous learning\"}),\": Improving risk models based on outcomes without requiring manual retraining\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These capabilities transform online risk management from a reactive, rules-based process to a proactive system that continuously adapts to emerging threats while maintaining regulatory compliance.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Risk Decisioning Challenge\"}),/*#__PURE__*/e(\"h3\",{children:\"Current pain points in risk decisioning processes\"}),/*#__PURE__*/e(\"p\",{children:\"Today's risk decisioning teams face a perfect storm of challenges that strain traditional approaches:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Overwhelming data volumes\"}),\": Risk analysts must sift through terabytes of customer data, transaction records, and external signals to identify genuine threats. A key challenge is poor data quality and missing information\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fragmented information\"}),\": Critical risk data often exists in disconnected systems, making comprehensive assessments difficult\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rule proliferation\"}),\": Many organizations maintain hundreds or thousands of risk rules, creating maintenance nightmares and frequent false positives\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Delayed feedback loops\"}),\": The impact of risk decisions may take months to become apparent, slowing the improvement cycle\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regulatory complexity\"}),\": Evolving compliance requirements across jurisdictions demand constant policy updates\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resource constraints\"}),\": Skilled risk analysts are in short supply, forcing teams to prioritize only the highest-risk cases\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer friction\"}),\": Excessive verification steps drive away legitimate customers, creating tension between risk and friction\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increasing sophistication of threats\"}),\": Fraud rings and money laundering operations employ increasingly complex, coordinated, and novel tactics\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These challenges are particularly acute in digital environments where decisions must be made in milliseconds rather than days.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why traditional approaches fall short\"}),/*#__PURE__*/e(\"p\",{children:\"Conventional risk management tools struggle to address these challenges for several fundamental reasons:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rigid rule systems\"}),\" can't adapt to novel fraud patterns without manual updates, creating vulnerability windows\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Linear workflows\"}),\" require completing each verification step sequentially, regardless of whether early signals already indicate high or low risk\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Siloed analysis\"}),\" prevents connecting signals across different risk domains (fraud, credit, compliance)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reactive monitoring\"}),\" identifies problems only after patterns emerge, rather than predicting new threat vectors\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Limited context integration\"}),\" means systems can't incorporate customer history\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Human bottlenecks\"}),\" create delays when escalations require manual review, especially outside business hours\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Opaque decision processes\"}),\" make it difficult to explain risk decisions to regulators or customers\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Most importantly, traditional systems place the cognitive burden of connecting signals and identifying emerging patterns entirely on human analysts, who are overwhelmed by the volume and complexity of modern risk data.\"}),/*#__PURE__*/e(\"h3\",{children:\"The need for more dynamic, adaptive risk management\"}),/*#__PURE__*/e(\"p\",{children:\"Today's risk landscape demands a fundamentally different approach:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous assessment\"}),\" rather than point-in-time decisions, monitoring for risk throughout the customer lifecycle\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multi-dimensional analysis\"}),\" that simultaneously evaluates identity, behavior, transaction patterns, and network connections\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Contextual intelligence\"}),\" that adjusts risk thresholds based on specific scenarios and customer segments\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proactive detection\"}),\" capabilities that identify emerging threats before they become widespread\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Explainable decisions\"}),\" that provide clear rationales for approvals, rejections, or additional verification requirements\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Adaptive response mechanisms\"}),\" that apply proportional friction based on genuine risk signals\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cross-domain correlation\"}),\" connecting insights across fraud, AML, credit risk, and compliance functions\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Self-optimizing models\"}),\" that continuously improve based on outcomes and changing conditions\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Organizations need risk systems that function less like static gatekeepers and more like vigilant partners—constantly learning, adapting, and providing insights while streamlining legitimate customer journeys.\"}),/*#__PURE__*/e(\"p\",{children:\"This evolution from rigid, reactive systems to dynamic, proactive risk management is precisely where agentic AI demonstrates its transformative potential.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"952\",src:\"https://framerusercontent.com/images/NG3nptcFZxFbAsB9sNKOkFgcU.png\",srcSet:\"https://framerusercontent.com/images/NG3nptcFZxFbAsB9sNKOkFgcU.png?scale-down-to=1024 942w,https://framerusercontent.com/images/NG3nptcFZxFbAsB9sNKOkFgcU.png 1752w\",style:{aspectRatio:\"1752 / 1904\"},width:\"876\"}),/*#__PURE__*/e(\"h2\",{children:\"Oscilar's AI Agents\"}),/*#__PURE__*/e(\"h3\",{children:\"Autonomous Risk Assessment Agents\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"830\",src:\"https://framerusercontent.com/images/WlyieAvNueimiTtCZwqu7s7khI.png\",srcSet:\"https://framerusercontent.com/images/WlyieAvNueimiTtCZwqu7s7khI.png?scale-down-to=512 512w,https://framerusercontent.com/images/WlyieAvNueimiTtCZwqu7s7khI.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/WlyieAvNueimiTtCZwqu7s7khI.png 1752w\",style:{aspectRatio:\"1752 / 1660\"},width:\"876\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"Oscilar's platform deploys specialized agents that independently evaluate different risk dimensions:\"}),/*#__PURE__*/e(\"h4\",{children:\"Identity Verification Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent is configured with integrations to approved data providers and watchlists. When an application event occurs, the agent decides which verification steps to trigger based on real-time signals (e.g., partial name mismatch, high-risk geolocation). This means the agent selectively queries relevant databases or flags missing information on its own, rather than requiring a manual request each time. However, its scope is clearly defined: it only operates within a known set of KYC workflows and data sources. If it encounters ambiguous or incomplete data, it may escalate the case for human review or request additional user info.\"}),/*#__PURE__*/e(\"h4\",{children:\"Account Takeover Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent continuously monitors login patterns, device fingerprints, and behavioral cues to detect potential compromise. Its autonomy primarily involves adjusting thresholds (e.g., raising the likelihood of takeover if it sees multiple failed logins from a new location) and invoking step-up authentication when warranted. If the rate of false positives becomes too high, the agent can recommend revised thresholds. Final changes, however, require a sign-off from a risk manager or administrator, ensuring no single model update can radically alter your security posture without oversight.\"}),/*#__PURE__*/e(\"h4\",{children:\"Payment Fraud Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent combines model-based scoring and dynamic rule evaluation to catch high-risk transactions. It can re-check certain attributes (e.g., merchant history, payment velocity) as new information emerges in real time. By comparing current activity against historical baselines and known fraud patterns, the agent autonomously updates risk scores for each transaction. But to preserve control, any major threshold modifications must pass through our governance process. This ensures that while the Payment Fraud Agent’s scoring is largely automated, ultimate decisions remain aligned with your organization’s risk tolerance.\"}),/*#__PURE__*/e(\"h4\",{children:\"First Party Fraud Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent helps detect cases of deliberate misrepresentation or bust-out schemes by analyzing subtle anomalies in application data, behavioral biometrics, and early account activities. It is configured with a library of known first-party fraud patterns and continuously refines its alerts by comparing new cases to historical data. If the agent encounters ambiguous indicators—such as conflicting signals or incomplete documentation—it either requests additional verification or flags the case for manual review. Major threshold updates or new detection parameters must be approved by a risk manager to ensure responsible oversight.\"}),/*#__PURE__*/e(\"h4\",{children:\"Scam Detection Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent focuses on identifying social engineering attempts and scam scenarios by examining transaction context, beneficiary relationships, and user interactions during high-risk activities. Although it automatically highlights suspicious patterns (like sudden large transfers to unknown recipients), final policy changes or escalations remain subject to review. By operating within a clearly defined governance framework, the agent reduces false positives while more effectively spotting genuine scam behaviors early in the process.\"}),/*#__PURE__*/e(\"h4\",{children:\"Account Opening Fraud Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent evaluates new applications for internal consistency, plausibility, and risk signals across multiple data sources (e.g., identity documents, device fingerprints). It can recognize early red flags like fabricated addresses or synthetic identities by referencing known fraud indicators. When the agent’s confidence in potential fraud is high, it forwards the case to human analysts for additional checks, ensuring no final denials occur solely on the basis of an automated score. Threshold adjustments for detecting suspicious behavior are likewise vetted by compliance or risk leadership.\"}),/*#__PURE__*/e(\"h4\",{children:\"Network Intelligence Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent maps connections between individuals, accounts, or entities to expose potential fraud rings and money laundering networks. The agent leverages graph analysis and clustering algorithms to reveal hidden relationships. While it operates continuously, scanning large datasets for evolving patterns, any major policy action—such as blocking entire networks or blacklisting entities—requires human approval. This balance ensures fast detection of organized threats without automated overreach.\"}),/*#__PURE__*/e(\"h4\",{children:\"Behavioral Analysis Agent\"}),/*#__PURE__*/e(\"p\",{children:\"By establishing a baseline for normal customer behaviors (e.g., transaction velocity, login timing, device usage), the Behavioral Analysis Agent can surface anomalies indicative of account takeover or other illicit activity. It updates its risk assessment in real time and can autonomously prompt added security steps—like step-up authentication—if suspicious patterns emerge. Full block actions or large-scale threshold changes, however, always involve a manual sign-off, maintaining a clear path for human judgment in urgent decisions.\"}),/*#__PURE__*/e(\"h4\",{children:\"Dispute Management Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent automates much of the evidence-gathering and investigation process when customers challenge charges or transactions. It consolidates historical transaction logs, reconstructs timelines, and compares disputes against known fraud trends. Upon reaching a provisional conclusion, the system suggests a resolution path—such as refund, chargeback, or rejection—for a human reviewer to confirm. All final dispute decisions and required documentation align with your organization’s compliance protocols, ensuring transparent recordkeeping.\"}),/*#__PURE__*/e(\"h4\",{children:\"Credit Underwriting Collections Agent\"}),/*#__PURE__*/e(\"p\",{children:\"This agent forecasts potential repayment risks before they materialize, identifying customers who may need proactive outreach or adjusted credit terms. Drawing on behavioral data (payment history, transaction patterns) and external credit indicators, it recommends personalized strategies for repayment—such as offering a tailored payment plan or adjusting communication frequency. Any changes to underwriting policies (interest rates, lending thresholds, etc.) go through established risk and compliance checks. By blending machine-driven insights with human expertise, the collections process remains equitable and consistent with regulatory requirements.\"}),/*#__PURE__*/e(\"p\",{children:\"Each agent operates continuously, sharing insights with other agents to build a comprehensive risk picture while maintaining full audit trails of their reasoning.\"}),/*#__PURE__*/e(\"h3\",{children:\"Rule Recommendation Agent\"}),/*#__PURE__*/e(\"p\",{children:\"While some organizations rely heavily on static business rules, our Rule Recommendation Agent helps you optimize them over time. It continuously analyzes performance metrics (false positives, detection rates, friction scores) and highlights opportunities to update thresholds or retire outdated rules. However, these recommendations are never enforced automatically. Instead, we generate a recommended change package—complete with data-driven justifications, potential bias checks, and performance simulations—so a human risk analyst can review and approve. This ensures you get the benefits of “self-optimizing” rules without sacrificing responsible oversight.\"}),/*#__PURE__*/e(\"h3\",{children:\"Decision Insights Agent\"}),/*#__PURE__*/e(\"p\",{children:\"The Decision Insights Agent translates risk determinations into clear narratives that stem directly from the system’s underlying rule triggers and model feature importances. For example, you might see:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"“Transaction flagged due to 5x the user’s normal dollar amount, new device location, and repeated attempts in 10 minutes. Confidence level: 80%.”\"})}),/*#__PURE__*/e(\"p\",{children:\"This ensures the final explanation is consistent with the actual risk logic, rather than a guess. For more complex scenarios, the agent includes a “case workbook” view, showing each relevant data point, rule triggered, and weighting. These features streamline manual reviews and make it easier to produce consumer-friendly or regulator-friendly explanations on demand.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"code\",{children:\"In the upcoming months, we will build the following agents:\"})}),/*#__PURE__*/e(\"h3\",{children:\"Scenario Planning and Stress Testing Agent\"}),/*#__PURE__*/e(\"p\",{children:\"Our upcoming Scenario Planning & Stress Testing Agent will let you simulate emerging threats or macro changes (e.g., major increases in synthetic identity fraud or unexpected economic downturns). It generates potential “what-if” scenarios from historical data patterns and plausible risk expansions. However, we do not treat these scenarios as guaranteed forecasts. Rather, they are hypothetical outcomes designed to stress-test your current controls. Risk teams can then decide which insights or recommended changes to adopt, ensuring a balance between prudent foresight and operational feasibility.\"}),/*#__PURE__*/e(\"h3\",{children:\"Anomaly Detection and Early Warning System\"}),/*#__PURE__*/e(\"p\",{children:\"This agent will proactively watch for subtle shifts in user behavior or transaction patterns, raising alerts when it spots emerging threats (e.g., an unusual spike in login attempts from a specific region). Each alert includes a confidence score, recommended next steps, and logs of the exact signals that triggered the anomaly. If we see repeated false alarms, the agent tunes its thresholds or suggests new rules. Critical alerts may escalate immediately for human review, while medium-risk anomalies produce a notice for risk teams to follow up as bandwidth permits.\"}),/*#__PURE__*/e(\"h3\",{children:\"Personalized Risk Insights Agent\"}),/*#__PURE__*/e(\"p\",{children:\"Our Personalized Risk Insights Agent will provide different “views” into the same underlying risk data, ensuring role-based transparency without duplicating or siloing information. For example, executives see strategic KPIs and trending anomalies, while compliance officers get granular logs needed for regulatory reporting. All data is drawn from a unified repository so that no one receives outdated or contradictory versions of the same event. Each role-based view respects strict access controls, ensuring that personally identifiable information is only visible to authorized stakeholders.\"}),/*#__PURE__*/e(\"h2\",{children:\"Balancing Innovation with Responsibility\"}),/*#__PURE__*/e(\"p\",{children:\"While AI Agents offers powerful capabilities, it must be deployed responsibly. Because we operate in highly regulated spaces, we apply a robust governance framework to every agent-driven model or rule. All changes (including threshold updates or newly generated rules) pass through a documented review pipeline that checks for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bias or disparate impact:\"}),\" We analyze demographic and behavioral segments to detect potential unfair treatment.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Model performance drift:\"}),\" Quarterly (or more frequent) re-validation ensures each model remains accurate despite data shifts.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Approval authority:\"}),\" A risk manager or committee with relevant domain expertise must review and sign off before changes take effect.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Version control & logging:\"}),\" We maintain a full audit trail of every model version, recommended rule, and final decision.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"This governance process ensures that while our agents continuously learn from real-world outcomes, the final authority lies with designated human experts, preserving accountability, ethical standards, and compliance.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Oscilar's AI Agents approach changes the game for risk managers\"}),/*#__PURE__*/e(\"p\",{children:\"Oscilar's AI Agents fundamentally transform how risk teams operate:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"From reactive to proactive\"}),\": Risk managers shift from fighting yesterday's problems to preventing tomorrow's threats\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"From rule maintainers to strategic advisors\"}),\": Teams focus on risk strategy rather than manual rule tuning\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"From data overload to actionable insights\"}),\": Agents distill complex signals into clear, prioritized information\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"From siloed decisions to holistic risk views\"}),\": Cross-domain insights connect previously isolated risk indicators\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"From fixed workflows to adaptive journeys\"}),\": Customer experiences dynamically adjust based on genuine risk, not rigid processes\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This evolution elevates risk management from a cost center to a strategic enabler of business growth.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"774\",src:\"https://framerusercontent.com/images/rizbRmlLJyK40WOosAmVKtRYYzc.png\",srcSet:\"https://framerusercontent.com/images/rizbRmlLJyK40WOosAmVKtRYYzc.png?scale-down-to=512 512w,https://framerusercontent.com/images/rizbRmlLJyK40WOosAmVKtRYYzc.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/rizbRmlLJyK40WOosAmVKtRYYzc.png 1752w\",style:{aspectRatio:\"1752 / 1548\"},width:\"876\"}),/*#__PURE__*/e(\"h2\",{children:\"Oscilar's Vision for Intelligent Risk Management: Augmented, Not Replaced\"}),/*#__PURE__*/e(\"p\",{children:\"Oscilar’s roadmap focuses on deepening AI agent specialization while enhancing cross-domain collaboration. We’re developing agents for emerging threats—like synthetic identity fraud and real-time payment scams—while creating a network effect where insights benefit the entire ecosystem without compromising privacy.\"}),/*#__PURE__*/e(\"p\",{children:\"The risk landscape is evolving toward what we call “continuous risk intelligence,” where assessment becomes an ongoing process rather than a series of checkpoints. This shift blurs the lines between fraud prevention, credit decisioning, and compliance, driving organizations to apply proportional friction based on confidence levels instead of relying solely on binary decisions. Forward-thinking teams must therefore build hybrid workflows that combine AI’s speed and scalability with human judgment and oversight, consolidating siloed data and reimagining processes from the ground up.\"}),/*#__PURE__*/t(\"p\",{children:[\"While Oscilar’s AI Agents deliver powerful automation and proactive capabilities, we design them as \",/*#__PURE__*/e(\"em\",{children:\"augmented intelligence\"}),\"—operating within a carefully governed environment. Our system’s partial autonomy means it can adapt quickly and solve complex tasks, but always in partnership with human expertise and transparent oversight.\"]}),/*#__PURE__*/e(\"p\",{children:\"We believe that combining AI-driven adaptability with robust controls is the future of intelligent risk decisioning. As digital transformation accelerates, the gap between traditional approaches and AI Agents will only widen, making advanced AI essential to remain agile in markets where threats evolve daily and customers expect seamless experiences. By embracing agents as partners rather than mere tools, organizations can thrive in this new landscape.\"}),/*#__PURE__*/t(\"p\",{children:[\"The future of risk decisioning is intelligent, adaptive, and collaborative. With Oscilar, that future is available today. Book a \",/*#__PURE__*/e(i,{href:\"https://oscilar.com/demo-form\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"demo\"})}),\" to see Oscilar’s AI Risk Decisioning™ Platform in action and learn how your teams can evolve from reactive controls to proactive intelligence—without sacrificing compliance, fairness, or auditability.\"]})]});export const richText4=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Today, Account Takeover (ATO) fraud has emerged as a critical challenge for businesses across industries. With nearly 1 in 4 adults in the US having experienced an account takeover by a fraudster, and attacks up 3x since 2019, organizations face mounting pressure to combat this pervasive threat while fostering innovation.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This article explores the current ATO fraud landscape, why traditional prevention methods are falling short, and how Oscilar's AI Risk Decisioning platform is revolutionizing the fight against account takeovers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Account Takeover (ATO) Fraud\"}),/*#__PURE__*/e(\"p\",{children:\"Account Takeover occurs when a fraudster gains unauthorized access to a genuine customer's account. While this can affect any type of account - from email and social media to banking and credit cards - the impact on financial services is particularly severe. Once attackers gain access, they can make fraudulent transactions, drain accounts, exploit loyalty programs, harvest customer data for resale, or lock legitimate owners out entirely by changing security settings.\"}),/*#__PURE__*/e(\"p\",{children:\"What makes these attacks particularly challenging is that they often appear as legitimate login attempts to merchants and fintech providers. This is because modern fraudsters have evolved far beyond simple password guessing - they're now employing sophisticated techniques to make their activities appear genuinely human.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Fraudsters Execute Modern ATO Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding how attackers gain initial access is crucial to preventing ATO fraud. The process typically follows three key stages:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"First, criminals obtain legitimate credentials through various means\"}),\":\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Large-scale data breaches that expose username/password combinations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Targeted phishing campaigns that trick users into revealing login information\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Social engineering attacks that manipulate users into providing access\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Malware infections that capture login credentials directly from users' devices\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Next, they bypass additional security measures using increasingly sophisticated methods\"}),\":\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"SIM swap attacks to intercept two-factor authentication codes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Advanced phishing techniques that capture one-time passwords\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Man-in-the-middle attacks to intercept security tokens\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Social engineering to convince users to share verification codes\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Finally, they execute the fraud while avoiding detection by mimicking legitimate user behavior through advanced technologies.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Evolution of Attack Sophistication\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"431\",src:\"https://framerusercontent.com/images/y78OJri74T3UEb1Gf6xIxyskoM.jpg\",srcSet:\"https://framerusercontent.com/images/y78OJri74T3UEb1Gf6xIxyskoM.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/y78OJri74T3UEb1Gf6xIxyskoM.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/y78OJri74T3UEb1Gf6xIxyskoM.jpg 1600w\",style:{aspectRatio:\"1600 / 862\"},width:\"800\"}),/*#__PURE__*/e(\"p\",{children:\"Today's ATO attacks have evolved dramatically from the rudimentary credential stuffing attempts of the past. Modern fraudsters employ a sophisticated arsenal of tools and techniques that make their activities increasingly difficult to detect.\"}),/*#__PURE__*/e(\"p\",{children:'Identity spoofing has reached new levels of sophistication. Rather than using obvious automated tools, attackers now create perfect replicas of legitimate devices that can fool traditional fingerprinting methods. They clone genuine device profiles down to the smallest detail, including hardware characteristics, browser configurations, and even subtle behavioral patterns. As Saurabh explains, \"When attackers can see the signals, they become forgeable\" - and many traditional security solutions expose exactly what they\\'re looking for.'}),/*#__PURE__*/e(\"p\",{children:\"Behavioral mimicry has also evolved significantly. Where traditional bots followed linear paths with uniform timing, today's AI-powered attacks can simulate natural human behavior with remarkable accuracy. They replicate natural mouse movements with realistic acceleration and deceleration, vary typing rhythms to match human patterns, and navigate applications with the kind of exploratory behavior typical of legitimate users.\"}),/*#__PURE__*/e(\"p\",{children:\"Perhaps most concerning is the rise of AI attacker-in-the-loop systems. These sophisticated attacks can learn and adapt in real-time, automatically adjusting their patterns based on security responses. They can also generate novel attack strategies faster than traditional detection systems can adapt, creating a constant cat-and-mouse game that legacy solutions struggle to keep up with.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Traditional Prevention Methods Fall Short\"}),/*#__PURE__*/e(\"p\",{children:\"The traditional approach to ATO prevention, while effective against older attack methods, struggles to address today's sophisticated threats. This is largely due to three key limitations:\"}),/*#__PURE__*/e(\"p\",{children:\"Device fingerprinting, as traditionally implemented, relies on collecting obvious hardware and software attributes that can be easily spoofed. When examining these solutions' JavaScript code, attackers can easily understand what signals are being collected and generate perfect replicas that pass these checks. It's akin to entering a room where all the security cameras are clearly visible - once attackers know what's being monitored, they can adjust their behavior accordingly.\"}),/*#__PURE__*/e(\"p\",{children:\"Behavioral biometrics in legacy systems focus on obvious patterns like keystroke timing and mouse movements, but lack the sophistication to detect advanced AI-powered mimicry. They also tend to operate in silos, missing the broader context that could reveal sophisticated attacks spanning multiple channels or sessions.\"}),/*#__PURE__*/e(\"p\",{children:\"Traditional systems also suffer from poor attack recognition capabilities, struggling to identify the latest generation of sophisticated device spoofing and behavioral mimicry. Their rule-based approaches can't keep up with AI-powered attacks that evolve in real-time.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"567\",src:\"https://framerusercontent.com/images/HEA05Wh31xAZTQb8xPd4IznEvk8.jpg\",srcSet:\"https://framerusercontent.com/images/HEA05Wh31xAZTQb8xPd4IznEvk8.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/HEA05Wh31xAZTQb8xPd4IznEvk8.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/HEA05Wh31xAZTQb8xPd4IznEvk8.jpg 1600w\",style:{aspectRatio:\"1600 / 1134\"},width:\"800\"}),/*#__PURE__*/e(\"h2\",{children:\"Oscilar's Next-Generation Approach\"}),/*#__PURE__*/e(\"p\",{children:\"Oscilar has developed an innovative cognitive identity solution that addresses traditional limitations through a comprehensive, multi-layered approach. Rather than relying on easily spoofed signals, their platform leverages advanced technology built on four key pillars of innovation:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"1. Advanced Device Fingerprinting\",/*#__PURE__*/e(\"br\",{})]}),' Oscilar has revolutionized how device spoofing is detected by developing a deeper set of non-spoofable signals that create a persistent \"DNA\" of the device. Unlike traditional technologies that rely on easily mimicked fingerprints, Oscilar captures a broader and deeper set of signals that attackers cannot synthetically create, copy, or reuse effectively.']}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"2. Cognitive Intelligence\",/*#__PURE__*/e(\"br\",{})]}),' Going beyond basic behavioral biometrics pioneered in 2013-2015, Oscilar has developed what they call \"cognitive detection\" or \"cognitive intelligence.\" This approach uses advanced signatures beyond simple copy-paste detection, incorporating microbehavior analysis, neural profiling, and intent analysis. Their system builds a comprehensive understanding of both attacker and legitimate user cognitive features by analyzing patterns that previous technologies haven\\'t considered.']}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"3. Cryptographically Secure Architecture\",/*#__PURE__*/e(\"br\",{})]}),\" Recognizing that attackers can easily bypass detection when they know what signals are being collected, Oscilar has built a cryptographically secure solution. Unlike traditional JavaScript-based solutions that can be reverse-engineered to understand their 2,000+ signals, Oscilar's code is engineered with security principles that make it nearly impossible to decode. Even if attackers manage to reverse engineer 1% of it, they still cannot determine how signals are collected or used in decision-making.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"4. Dynamic Machine Learning Systems\",/*#__PURE__*/e(\"br\",{})]}),' Oscilar has moved beyond static rules or basic machine learning features like \"how many times a device has been seen in 30 days.\" Their system analyzes entire user sessions across the customer base to identify patterns in journey analytics. This multi-point intelligence evaluates different touchpoints in the user journey, with a learning engine that rapidly adapts to new behaviors, creating a truly dynamic defense system.']}),/*#__PURE__*/e(\"p\",{children:\"By integrating these four pillars, Oscilar can detect sophisticated attacks that traditional technologies miss, including advanced automation frameworks like NodeRiver, Playwright, and Selenium-based tools. As demonstrated in their examples, even attacks that mimic human behavior with random mouse movements, deliberate typing errors, and natural browsing patterns are identified as high-risk, protecting customers from increasingly sophisticated AI-driven threats.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"436\",src:\"https://framerusercontent.com/images/YXP9XLtRMf3NP40syItj5czys.jpg\",srcSet:\"https://framerusercontent.com/images/YXP9XLtRMf3NP40syItj5czys.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/YXP9XLtRMf3NP40syItj5czys.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/YXP9XLtRMf3NP40syItj5czys.jpg 1600w\",style:{aspectRatio:\"1600 / 873\"},width:\"800\"}),/*#__PURE__*/e(\"p\",{children:\"Our cognitive behavioral detection represents a significant advance over traditional behavioral biometrics. We've developed sophisticated pattern analysis that can distinguish between three distinct types of behavior:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legitimate Users demonstrate natural variability in their actions\"}),\". Their mouse movements follow imperfect trajectories with cognitive delays. Their typing patterns show natural rhythm with context-based timing and genuine fatigue patterns. Their form interactions display random order with natural corrections. This creates a complex, organic behavioral signature that's uniquely human.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Traditional Automated Attacks show telltale signs of automation\"}),\": perfect precision in mouse movements, linear paths, uniform speed, and fixed intervals in typing patterns. They lack context awareness and show perfect endurance without natural variation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sophisticated AI Attacks attempt to mimic human behavior but still reveal patterns\"}),\". They show simulated variance with learned patterns and calculated imperfection. Their typing exhibits patterned variance and simulated adaptation. While more advanced than traditional bots, these patterns can be detected through sophisticated analysis.\"]}),/*#__PURE__*/e(\"p\",{children:\"By examining micro-behaviors that reveal user intent, stress indicators, and decision-making patterns, we can identify even the most sophisticated mimicry attempts. Our system analyzes subtle indicators like hesitation patterns, cognitive load variations, and attention shifts that are extremely difficult for automated systems to replicate convincingly.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"180\",src:\"https://framerusercontent.com/images/eHtBe6IlHwOGa3nMt8SxLsaSmE.png\",srcSet:\"https://framerusercontent.com/images/eHtBe6IlHwOGa3nMt8SxLsaSmE.png?scale-down-to=512 512w,https://framerusercontent.com/images/eHtBe6IlHwOGa3nMt8SxLsaSmE.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/eHtBe6IlHwOGa3nMt8SxLsaSmE.png 1423w\",style:{aspectRatio:\"1423 / 361\"},width:\"711\"}),/*#__PURE__*/e(\"h2\",{children:\"Comprehensive Protection Across the User Journey\"}),/*#__PURE__*/e(\"p\",{children:\"Oscilar's solution provides continuous protection across the entire user journey, from initial account creation through ongoing account usage and transactions. During onboarding, we can detect synthetic identities and unusual registration patterns that might indicate fraud. At login, we identify suspicious attempts by analyzing device characteristics, behavioral patterns, and contextual risk factors.\"}),/*#__PURE__*/e(\"p\",{children:\"For account activities, we monitor for abnormal patterns in profile changes, device associations, and navigation behaviors that might indicate account takeover. During payment activities, we can catch high-velocity transactions and identify unusual location/device combinations.\"}),/*#__PURE__*/e(\"p\",{children:\"Our system also includes sophisticated remote access detection capabilities crucial for preventing modern social engineering attacks. We can identify when screen control is handed over to another party - a common tactic in technical support scams and investment fraud schemes. This detection works across popular remote access tools and is correlated with other risk signals to provide context. For example, if remote access is detected during a high-value transaction from a new device, this combination of signals can help identify potential scam attempts in real-time.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"272\",src:\"https://framerusercontent.com/images/gUf3o4XJ8L8S3C5LcIRA6ddV7I.jpg\",srcSet:\"https://framerusercontent.com/images/gUf3o4XJ8L8S3C5LcIRA6ddV7I.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/gUf3o4XJ8L8S3C5LcIRA6ddV7I.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/gUf3o4XJ8L8S3C5LcIRA6ddV7I.jpg 1600w\",style:{aspectRatio:\"1600 / 544\"},width:\"800\"}),/*#__PURE__*/e(\"p\",{children:\"What sets our approach apart is our ability to connect these insights across channels and sessions, building a comprehensive understanding of normal user behavior that makes detecting anomalies and attacks significantly more effective.\"}),/*#__PURE__*/e(\"h2\",{children:\"Measurable Results in the Real World\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations implementing Oscilar's platform have seen significant improvements in their fraud prevention capabilities. Our technology achieves a 95% ATO attack detection rate while reducing fraud losses by 85%. We've demonstrated a 75% improvement in scam prevention and capture 30% more fraud attempts compared to traditional solutions.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"385\",src:\"https://framerusercontent.com/images/79RvSGDHViF1EcGCFH2RYaeJ0p4.png\",srcSet:\"https://framerusercontent.com/images/79RvSGDHViF1EcGCFH2RYaeJ0p4.png?scale-down-to=512 512w,https://framerusercontent.com/images/79RvSGDHViF1EcGCFH2RYaeJ0p4.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/79RvSGDHViF1EcGCFH2RYaeJ0p4.png 1752w\",style:{aspectRatio:\"1752 / 770\"},width:\"876\"}),/*#__PURE__*/e(\"p\",{children:\"More importantly, these improvements come without increasing false positives or creating friction for legitimate users. By taking a more sophisticated approach to risk assessment, we can maintain security while ensuring a smooth experience for genuine customers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Looking Ahead\"}),/*#__PURE__*/e(\"p\",{children:\"As account takeover tactics continue to evolve, businesses need security solutions that can adapt and scale to meet new challenges. Oscilar's AI Risk Decisioning platform provides the comprehensive protection and flexibility organizations need to:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Dramatically reduce successful ATO attempts while minimizing false positives\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Adapt quickly to new attack vectors through continuous learning\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Build and maintain customer trust with strong but friction-right security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Make more accurate, context-aware risk decisions based on comprehensive data\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"Ready to revolutionize your ATO fraud prevention strategy? Explore Oscilar's AI Risk Decisioning™ platform and take the first step towards unparalleled account security in the digital age.\"})})]});export const richText5=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"In a recent webinar, \",/*#__PURE__*/e(i,{href:\"https://oscilar.com/webinars/beyond-traditional-device-intelligence\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Beyond Traditional Device Intelligence: The Future of Digital Identity & Fraud Prevention\"})}),\", industry experts Saurabh Bajaj, Chief Product Officer at Oscilar and Christopher Adjei-Ampofo, CIO at Uphold, explored how the landscape of digital security and fraud prevention has fundamentally changed.\"]}),/*#__PURE__*/e(\"p\",{children:\"The discussion highlighted why traditional device fingerprinting and behavioral biometrics solutions fail to keep pace with sophisticated modern threats—and what organizations need to do to stay protected while maintaining frictionless user experiences. \"}),/*#__PURE__*/e(\"p\",{children:\"Below you'll find the key takeaways from that discussion, and how you can implement them at your own organization.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Digital Finance Revolution\"}),/*#__PURE__*/e(\"p\",{children:\"The past five to seven years have witnessed an unprecedented transformation in how users interact with financial services. Digital payments, embedded banking, Web3, and crypto wallets have created an environment where users expect everything to be dynamic, tailored, and instant. Whether users buy items with a single tap, transfer funds across borders in seconds, or access financial services directly within apps, the expectations for speed, convenience, and security have never been higher.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"668\",src:\"https://framerusercontent.com/images/FHdoGtc4b5T6byVgPs8wPkGd6fA.jpg\",srcSet:\"https://framerusercontent.com/images/FHdoGtc4b5T6byVgPs8wPkGd6fA.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/FHdoGtc4b5T6byVgPs8wPkGd6fA.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/FHdoGtc4b5T6byVgPs8wPkGd6fA.jpg 1752w\",style:{aspectRatio:\"1752 / 1336\"},width:\"876\"}),/*#__PURE__*/e(\"p\",{children:\"While these advancements have created tremendous opportunities for businesses and consumers alike, they've also opened new vulnerabilities. As financial transactions become increasingly frictionless, fraudsters have quickly exploited these developments.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Traditional Device Intelligence and Behavioral Biometrics Are Failing\"}),/*#__PURE__*/e(\"p\",{children:\"Traditional device fingerprinting and behavioral biometrics solutions that once represented the gold standard now struggle to keep up with modern fraud techniques. Christopher Adjei-Ampofo from Uphold shared his experience:\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"638\",src:\"https://framerusercontent.com/images/NQ5FajxCxTOZsNmspdD94x3JMo.jpg\",srcSet:\"https://framerusercontent.com/images/NQ5FajxCxTOZsNmspdD94x3JMo.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/NQ5FajxCxTOZsNmspdD94x3JMo.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/NQ5FajxCxTOZsNmspdD94x3JMo.jpg 1600w\",style:{aspectRatio:\"1600 / 1277\"},width:\"800\"}),/*#__PURE__*/e(\"p\",{children:\"The webinar speakers demonstrated how easily modern tools can bypass traditional security measures:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device spoofing\"}),\" has evolved beyond simple browser fingerprinting detection\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Behavioral simulations\"}),\" can now perfectly mimic human mouse movements and typing patterns\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI-powered automation tools\"}),\" like Node River and Playwright can create randomized, human-like interactions that fool traditional detection\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Deep fakes\"}),\" are now sophisticated enough to bypass liveness checks during KYC\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Rise of AI-Powered Threats\"}),/*#__PURE__*/e(\"p\",{children:'Perhaps the most concerning development involves the democratization of sophisticated attack methods. What once required significant technical skill and resources attackers can now accomplish with \"a few clicks\" using ready-made tools available on dark web marketplaces.'}),/*#__PURE__*/e(\"p\",{children:'The webinar presented a particularly troubling scenario that keeps Chris \"awake at night in sweat\": \"Attackers have breached databases where credentials have been stolen... with these bots, they use that list, they know these are our Uphold customers... they set the bot to go to their Facebook social media profiles, pull the information from the social media profiles, images, create a deep fake in order to compromise our detection systems.\"'}),/*#__PURE__*/e(\"p\",{children:\"The demonstration of AI agents that autonomously navigate websites, fill forms, and make decisions based on what they observe highlighted how these threats have evolved beyond simple scripted attacks.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Path Forward: Cognitive Identity Intelligence\"}),/*#__PURE__*/e(\"p\",{children:\"To combat these advanced threats, organizations need a fundamentally different approach to device intelligence and fraud prevention. The experts outlined several key innovations:\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/AGQCn69AcWRVJv1TlfgnotHJLsQ.jpg\",srcSet:\"https://framerusercontent.com/images/AGQCn69AcWRVJv1TlfgnotHJLsQ.jpg?scale-down-to=1024 839w,https://framerusercontent.com/images/AGQCn69AcWRVJv1TlfgnotHJLsQ.jpg 1312w\",style:{aspectRatio:\"1312 / 1600\"},width:\"656\"}),/*#__PURE__*/e(\"p\",{children:\"The webinar demonstrated how these innovations combine thousands of signals to create a stronger fraud prevention framework while maintaining a seamless user experience.\"}),/*#__PURE__*/e(\"h2\",{children:\"Balancing Security and Customer Experience\"}),/*#__PURE__*/e(\"p\",{children:\"As digital experiences become more seamless, security cannot come at the expense of customer experience or operational efficiency. As Christopher Adjei-Ampofo noted:\"}),/*#__PURE__*/e(\"p\",{children:\"\\\"Looking at some of the legacy systems and system that we have in place, a lot of false positives occur. And when a lot of false positives occur, it means that you strain a lot of bodies at the problem... We can't solve this by throwing more bodies at the problem. That does not work. That doesn't scale as a company.\\\"\"}),/*#__PURE__*/e(\"p\",{children:\"The most effective modern solutions must provide clear risk signals, reduce false positives, and enable automation that allows security teams to focus on real threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"It’s clear that we've reached an inflection point in the battle against digital fraud. Developers designed traditional device fingerprinting and behavioral biometrics solutions for a different era, and these solutions now prove increasingly ineffective against today's AI-powered threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations that want to build trust with customers while enabling seamless digital experiences need to adopt more sophisticated, AI-driven approaches to fraud prevention—approaches that can adapt as quickly as the threats themselves evolve while maintaining frictionless user journeys.\"}),/*#__PURE__*/e(\"p\",{children:'As Christopher Adjei-Ampofo concluded: \"We\\'re all trying to do the same thing. Because trust is important.\"'}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"Looking for more? Watch the full webinar on demand! \"})})]});export const richText6=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Oscilar, a leading provider of AI Risk Decisioning™ Platform, is pleased to announce a strategic partnership with Telesign, a pioneer in digital identity and programmable communications. This collaboration marks a significant advancement in combining advanced phone number intelligence with AI-powered risk decisioning to combat fraud and enhance verification processes across financial services.\"}),/*#__PURE__*/e(\"p\",{children:'\"The ability to verify user identities and detect fraudulent activities in real-time is crucial for modern financial institutions,\" explained Neha Narkhede, Co-Founder & CEO of Oscilar. \"By integrating Telesign\\'s sophisticated phone intelligence and verification capabilities with Oscilar\\'s AI Risk Decisioning™ Platform, we\\'re creating a comprehensive solution that will transform how organizations approach identity verification and fraud prevention.\"'}),/*#__PURE__*/e(\"h2\",{children:\"Integrating Industry-Leading Technologies\"}),/*#__PURE__*/e(\"p\",{children:\"This partnership combines Telesign's advanced digital identity verification and phone intelligence capabilities with Oscilar's AI Risk Decisioning™ Platform. By leveraging Telesign's global\\xa0 phone number insights and Oscilar's sophisticated risk assessment engine, the partnership delivers real-time fraud prevention and identity verification solutions that protect both financial institutions and their customers.\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations can now enhance their fraud prevention strategies with Telesign's phone intelligence data feeding directly into Oscilar's risk decisioning engine, enabling more accurate risk assessments and decision-making across the customer lifecycle.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Features and Benefits of the Partnership:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Identity Verification\"}),\": The integration enables organizations to leverage Telesign's global phone intelligence and verification services within Oscilar's AI-powered risk assessment engine, providing comprehensive identity verification and fraud prevention in real-time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Global Reach and Coverage\"}),\": Financial institutions can now access Telesign's coverage across 230+ countries and territories, combined with Oscilar's risk decisioning capabilities, to deliver secure and reliable verification worldwide.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advanced Fraud Prevention\"}),\": Organizations can utilize Telesign's phone intelligence data alongside Oscilar's machine learning models to detect and prevent various types of fraud, from account opening to transaction monitoring.\"]})})]}),/*#__PURE__*/e(\"p\",{children:'\"We\\'re excited to partner with Oscilar to bring our digital identity verification capabilities to their AI Risk Decisioning Platform,\" said Christophe Van de Weyer, CEO at Telesign. \"This partnership enables our clients to leverage sophisticated phone intelligence data within Oscilar\\'s advanced risk decisioning framework. Together, we\\'re setting new standards for fraud prevention and identity verification in financial services.\"'}),/*#__PURE__*/e(\"h2\",{children:\"About Oscilar:\"}),/*#__PURE__*/e(\"p\",{children:\"Based in Palo Alto, California, Oscilar is the leading provider of AI Risk Decisioning solutions, empowering financial institutions to manage fraud, credit, and compliance risks effectively. At the heart of Oscilar's offerings is a no-code, AI Risk Decisioning™ Platform that analyzes vast amounts of data in real-time, identifying patterns and anomalies to detect fraud, optimize credit assessments, and ensure regulatory compliance. Developed by the team behind industry-leading risk management platforms at companies like Google, Facebook, Uber, Citi and JPMC, Oscilar's solution enhances decision-making speed and accuracy, ensuring high security and regulatory compliance. Oscilar serves a broad array of organizations, including fintechs, banks, credit unions, and financial institutions, helping them navigate complex risk landscapes with confidence and stay ahead in the rapidly evolving financial services ecosystem.\"}),/*#__PURE__*/e(\"h2\",{children:\"About Telesign:\"}),/*#__PURE__*/e(\"p\",{children:\"Telesign, a part of the Proximus Group, provides Continuous Trust™ to leading global enterprises by connecting, protecting, and defending their digital identities. Founded in 2005, Telesign provides global phone intelligence and verification services. The company's powerful machine learning and extensive data science deliver identity risk recommendations with a unique combination of speed, accuracy, and global reach. Telesign solutions provide fraud protection, secure communications, and enable the digital economy by helping companies and customers to engage with confidence.\"})]});export const richText7=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Case study overview\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The Challenge:\"}),\" Balance faced an unexpected challenge when their previous underwriting platform provider, Noble, announced they were sunsetting their product. This necessitated a quick pivot to find a new solution that could match their existing capabilities while also providing room for growth and improvement.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The Outcome:\"}),\" By partnering with Oscilar, Balance successfully transitioned their credit underwriting process with minimal disruption. They gained a more flexible and customizable platform that not only matched their previous capabilities but also opened up new possibilities for future expansion and optimization.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Key Highlights\"}),\"Successful transition from a sunsetting platform, Noble, to Oscilar with minimal disruptionCustomized customer view implementation to meet specific underwriting needsSeamless integration with existing workflows and data sourcesReduced dependency on engineering resources for day-to-day operationsFlexibility to adapt and modify credit policies quickly and easilyTransaction monitoring\"]}),/*#__PURE__*/e(\"h2\",{children:\"The Oscilar Impact\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customized Solution Development\"}),\": Oscilar worked closely with Balance to develop a customer-centric view that aligned perfectly with their underwriting needs, moving away from a case-based approach to a more holistic customer perspective.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Seamless Integration:\"}),\" The platform integrated smoothly with Balance's existing workflows and data sources, ensuring a smooth transition from their previous system.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased Flexibility\"}),\": Balance can now easily modify and update their credit policies and workflows without heavy reliance on engineering resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved Scalability\"}),\": The Oscilar platform provides Balance with the capability to handle their current volume of credit applications efficiently, with room for future growth.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Future-Proofing\"}),\": With Oscilar's flexible platform, Balance is well-positioned to expand into new use cases such as KYB and transaction monitoring.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"600\",src:\"https://framerusercontent.com/images/41LJHdchcptSAwOYtFhczl24hg.jpg\",srcSet:\"https://framerusercontent.com/images/41LJHdchcptSAwOYtFhczl24hg.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/41LJHdchcptSAwOYtFhczl24hg.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/41LJHdchcptSAwOYtFhczl24hg.jpg 1752w\",style:{aspectRatio:\"1752 / 1200\"},width:\"876\"})]})]}),/*#__PURE__*/e(\"h2\",{children:\"The Challenge: An urgent need to replace a sunsetting underwriting platform without disrupting operations\"}),/*#__PURE__*/e(\"p\",{children:\"Prior to partnering with Oscilar, Balance faced several challenges:\"}),/*#__PURE__*/t(\"ul\",{className:\"framer-styles-preset-1uj94sl\",\"data-styles-preset\":\"DnEiMfuTC\",style:{\"--framer-font-open-type-features\":\"normal\",\"--framer-font-size\":\"16px\",\"--framer-letter-spacing\":\"0px\",\"--framer-line-height\":\"150%\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"var(--token-b2889d77-e294-4a93-875b-5bd18e87f518, #000000)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-color\":\"initial\",\"--framer-text-stroke-width\":\"initial\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Urgent need for replacement\"}),\": With their previous provider sunsetting their product, Balance needed to find and implement a new solution quickly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Specific workflow requirements\"}),\": Balance required a customer-centric view for their underwriting process, which wasn't standard in many solutions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration complexity\"}),\": The new solution needed to integrate seamlessly with their existing data sources and workflows.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resource constraints\"}),\": As a growing company, Balance couldn't afford to dedicate significant engineering resources to managing their decision engine.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These challenges risked disrupting Balance's operations and potentially impacting their ability to serve their customers effectively.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Solution: \\xa0A customizable, customer-centric credit underwriting platform with rapid implementation and easy integration\"}),/*#__PURE__*/e(\"p\",{children:\"Oscilar provided Balance with a tailored credit underwriting platform that addressed their specific challenges:\"}),/*#__PURE__*/t(\"ul\",{className:\"framer-styles-preset-1uj94sl\",\"data-styles-preset\":\"DnEiMfuTC\",style:{\"--framer-font-open-type-features\":\"normal\",\"--framer-font-size\":\"16px\",\"--framer-letter-spacing\":\"0px\",\"--framer-line-height\":\"150%\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"var(--token-b2889d77-e294-4a93-875b-5bd18e87f518, #000000)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-color\":\"initial\",\"--framer-text-stroke-width\":\"initial\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customized customer view\"}),\": Oscilar developed a customer-centric interface that aligned with Balance's underwriting process, moving away from a case-based approach.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexible workflow builder\"}),\": The platform allowed Balance to recreate their existing workflows and easily modify them as needed.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rapid integration capabilities\"}),\": Oscilar's solution facilitated easy integration with Balance's existing data sources and APIs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Low-code interface:\"}),\" The platform's user-friendly interface reduced the need for constant engineering involvement in day-to-day operations and updates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Responsive support\"}),\": Oscilar's team, including high-level executives, was heavily involved in the implementation process, ensuring Balance's needs were met.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This comprehensive solution enabled Balance to transition smoothly from their previous platform while gaining new capabilities for future growth.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Outcome: Seamless transition to a more flexible underwriting system with enhanced capabilities and future expansion potential\"}),/*#__PURE__*/e(\"p\",{children:\"The adoption of Oscilar's credit underwriting platform significantly enhanced Balance's operations:\"}),/*#__PURE__*/t(\"ul\",{className:\"framer-styles-preset-1uj94sl\",\"data-styles-preset\":\"DnEiMfuTC\",style:{\"--framer-font-open-type-features\":\"normal\",\"--framer-font-size\":\"16px\",\"--framer-letter-spacing\":\"0px\",\"--framer-line-height\":\"150%\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"var(--token-b2889d77-e294-4a93-875b-5bd18e87f518, #000000)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-color\":\"initial\",\"--framer-text-stroke-width\":\"initial\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased flexibility\"}),\": The team can now easily modify and update their credit policies and workflows without heavy reliance on engineering resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved user experience\"}),\": The custom customer view has streamlined the underwriting process, making it easier for Balance's team to make informed decisions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability\"}),\": Oscilar's platform efficiently handles Balance's current volume of credit applications, with room for future growth.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Potential for expansion\"}),\": Balance is now well-positioned to explore additional use cases, such as KYB and transaction monitoring, using the Oscilar platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-stroke-color\":\"var(--framer-text-stroke-color, initial)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliable performance\"}),\": Since implementation, Balance has experienced consistent uptime and performance from the Oscilar platform.\"]})})]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"600\",src:\"https://framerusercontent.com/images/Z9UIQumMTY1TKGxMd83dhrxT88.jpg\",srcSet:\"https://framerusercontent.com/images/Z9UIQumMTY1TKGxMd83dhrxT88.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/Z9UIQumMTY1TKGxMd83dhrxT88.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/Z9UIQumMTY1TKGxMd83dhrxT88.jpg 1752w\",style:{aspectRatio:\"1752 / 1200\"},width:\"876\"}),/*#__PURE__*/e(\"p\",{children:\"Looking forward, Balance is excited to leverage Oscilar's capabilities further, potentially expanding into KYB and transaction monitoring. As Balance continues to grow in the competitive B2B payments and credit landscape, Oscilar remains a crucial partner in their journey to provide innovative financial solutions.\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"uVACa,AADb,GAAkD,IAA8B,IAAuC,IAAwB,CAAa,EAAsB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,qVAAsV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sXAAuX,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wMAAyM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yCAA0C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0TAA2T,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2SAA4S,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oUAAsU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4TAA6T,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8XAA+X,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kRAAoR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8WAAgX,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mQAAoQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yOAA0O,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,2bAA4b,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mDAAoD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sdAAud,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sQAAuQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qOAAsO,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,2eAA4e,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uZAAwZ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wSAAyS,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oNAAqN,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,0EAA2E,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4EAA6E,EAAC,CAAC,2DAA4D,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,uFAAwF,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yOAA0O,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+FAAgG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,6JAA8J,EAAC,CAAc,EAAEA,EAAE,CAAC,KAAK,+BAA+B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,SAAU,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,wNAAqO,EAAED,EAAE,CAAC,KAAK,sCAAsC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mCAAoC,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oLAAqL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iIAA8I,EAAED,EAAE,CAAC,KAAK,2FAA2F,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,qLAAsL,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6QAA8Q,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wOAAyO,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8SAA+S,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0LAA2L,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4QAAyR,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,uIAAwI,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,0KAA0K,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wNAAyN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oYAAqY,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8RAA2S,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,mXAAoX,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yWAA0W,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6UAA8U,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mRAAoR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+fAAggB,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,wKAAwK,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gtBAAitB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAkB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6cAA8c,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yaAA0a,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,mFAAoF,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,kCAAkC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,gTAAiT,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yVAA0V,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,aAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2iBAA4iB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gTAAiT,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uYAAwY,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mgBAAogB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6VAA8V,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0NAA2N,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mDAAoD,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+DAAgE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4PAA6P,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8OAA+O,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,sEAAuE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,sEAAuE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,4DAA6D,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,oDAAqD,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,yDAA0D,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0MAA2M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oEAAqE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mHAAoH,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,wKAAyK,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,qIAAsI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,mJAAoJ,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,6HAA8H,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kQAAmQ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gEAAiE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2GAA4G,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,uFAAwF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,mGAAoG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,0FAA2F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,oHAAqH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,gIAAiI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,sGAAuG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,+EAAgF,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sMAAuM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mDAAoD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uGAAwG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,mMAAoM,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,uGAAwG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,iIAAkI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,kGAAmG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,wFAAyF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,sGAAuG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,4GAA6G,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAuC,EAAC,CAAC,2GAA4G,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gIAAiI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0GAA2G,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,6FAA8F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,gIAAiI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,wFAAyF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,4FAA6F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,mDAAoD,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,0FAA2F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,yEAA0E,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4NAA6N,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qDAAsD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oEAAqE,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,6FAA8F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,kGAAmG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,iFAAkF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,4EAA6E,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,mGAAoG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,iEAAkE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,+EAAgF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,sEAAuE,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mNAAoN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4JAA6J,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,sKAAsK,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sGAAuG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+nBAAgoB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,glBAAilB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mnBAAonB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2nBAA4nB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAuB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yhBAA0hB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ulBAAwlB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ofAAqf,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2hBAA4hB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,giBAAiiB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mpBAAopB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oKAAqK,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,upBAAwpB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2MAA4M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,mJAAoJ,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kXAAmX,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,6DAA8D,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0lBAA2lB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2jBAA4jB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,olBAAqlB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yUAA0U,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,uFAAwF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,sGAAuG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,kHAAmH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,+FAAgG,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0NAA2N,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qEAAsE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qEAAsE,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,2FAA4F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6CAA8C,EAAC,CAAC,+DAAgE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2CAA4C,EAAC,CAAC,sEAAuE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8CAA+C,EAAC,CAAC,qEAAsE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2CAA4C,EAAC,CAAC,sFAAuF,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uGAAwG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2EAA4E,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6TAA8T,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6kBAA8kB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uGAAoH,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAC,iNAAkN,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ycAA0c,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oIAAiJ,EAAED,EAAE,CAAC,KAAK,gCAAgC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,2MAA4M,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yUAA0U,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qNAAsN,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ydAA0d,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mUAAoU,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2CAA4C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qIAAsI,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sEAAuE,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sEAAuE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+EAAgF,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wEAAyE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gFAAiF,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yFAA0F,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+DAAgE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8DAA+D,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wDAAyD,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kEAAmE,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+HAAgI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oPAAqP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2hBAA6hB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8aAA+a,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sYAAuY,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+CAAgD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6LAA8L,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,keAAme,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iUAAkU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8QAA+Q,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8RAA+R,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,CAAC,oCAAiD,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,CAAC,uWAAwW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,CAAC,4BAAyC,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,CAAC,keAAoe,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,CAAC,2CAAwD,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,CAAC,2fAA4f,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,CAAC,sCAAmD,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,CAAC,4aAA6a,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,odAAqd,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2NAA4N,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mEAAoE,EAAC,CAAC,mUAAoU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iEAAkE,EAAC,CAAC,gMAAiM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oFAAqF,EAAC,CAAC,gQAAiQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oWAAqW,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kDAAmD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qZAAsZ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wRAAyR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6jBAA8jB,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6OAA8O,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qVAAsV,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wQAAyQ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,eAAgB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yPAA0P,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8EAA+E,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iEAAkE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2EAA4E,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8EAA+E,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,8LAA+L,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wBAAqC,EAAED,EAAE,CAAC,KAAK,sEAAsE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2FAA4F,EAAC,AAAC,EAAC,CAAC,gNAAiN,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gQAAiQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oHAAqH,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+eAAgf,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+PAAgQ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2EAA4E,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iOAAkO,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qGAAsG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,6DAA8D,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,oEAAqE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,gHAAiH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,oEAAqE,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gRAAiR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8bAA+b,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0MAA2M,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mDAAoD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oLAAqL,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,0KAA0K,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2KAA4K,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uKAAwK,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gUAAmU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yKAA0K,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,YAAa,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kSAAmS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kSAAmS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6GAA+G,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,sDAAuD,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8YAA+Y,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ucAA2c,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2CAA4C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,maAAoa,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6PAA8P,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+CAAgD,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,yPAA0P,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,kNAAmN,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,0MAA2M,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kbAAsb,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gBAAiB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+5BAAg6B,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAkB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ukBAAwkB,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,2SAA4S,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,gTAA6T,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,kYAAmY,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAqB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,gNAAiN,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,gJAAiJ,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,iIAAkI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,6JAA8J,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,qIAAsI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2GAA4G,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qEAAsE,EAAC,CAAc,EAAE,KAAK,CAAC,UAAU,+BAA+B,qBAAqB,YAAY,MAAM,CAAC,mCAAmC,SAAS,qBAAqB,OAAO,0BAA0B,MAAM,uBAAuB,OAAO,0BAA0B,QAAQ,sBAAsB,6DAA6D,2BAA2B,OAAO,6BAA6B,UAAU,6BAA6B,UAAU,0BAA0B,MAAO,EAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,uHAAwH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,qHAAsH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,mGAAoG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,kIAAmI,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uIAAwI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gIAAiI,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iHAAkH,EAAC,CAAc,EAAE,KAAK,CAAC,UAAU,+BAA+B,qBAAqB,YAAY,MAAM,CAAC,mCAAmC,SAAS,qBAAqB,OAAO,0BAA0B,MAAM,uBAAuB,OAAO,0BAA0B,QAAQ,sBAAsB,6DAA6D,2BAA2B,OAAO,6BAA6B,UAAU,6BAA6B,UAAU,0BAA0B,MAAO,EAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,4IAA6I,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,uGAAwG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,kGAAmG,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,qIAAsI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,2IAA4I,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mJAAoJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mIAAoI,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qGAAsG,EAAC,CAAc,EAAE,KAAK,CAAC,UAAU,+BAA+B,qBAAqB,YAAY,MAAM,CAAC,mCAAmC,SAAS,qBAAqB,OAAO,0BAA0B,MAAM,uBAAuB,OAAO,0BAA0B,QAAQ,sBAAsB,6DAA6D,2BAA2B,OAAO,6BAA6B,UAAU,6BAA6B,UAAU,0BAA0B,MAAO,EAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,kIAAmI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,sIAAuI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,wHAAyH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,uIAAwI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,sBAAsB,eAAe,6BAA6B,0CAA2C,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,8GAA+G,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6TAA8T,EAAC,AAAC,CAAC,EAAC,CAC9ymG,EAAqB,CAAC,QAAU,CAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,mBAAqB,CAAC,KAAO,UAAW,CAAC,CAAC"}