{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/DUaBI8Z0zQBEAftOFMh3/nE3mUE0A6UNseAz26Ie2/LW0fAVOt9-8.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as n}from\"framer\";import{motion as i}from\"framer-motion\";import*as a from\"react\";export const richText=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May, Oscilar co-founders Neha Narkhede and Sachin Kulkarni were the guests of the PitchIt podcast by Fintech Nexus, hosted by Todd Anderson.\"}),/*#__PURE__*/e(\"p\",{children:\"In this conversation, our founders and Todd Anderson (Chief Content Officer of Fintech Nexus), discuss the founding story behind Oscilar and the importance of no-code and AI-powered risk solutions in the rapidly evolving fintech landscape.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"They also highlight the significance of diverse engineering talent, the growing challenge of fighting fraud, being married as co-founders, the journey of bootstrapping the company, and much more.\"}),/*#__PURE__*/e(\"p\",{children:\"Throughout the conversation, Neha and Sachin showcase the rich expertise they bring to Oscilar, drawing from their previous roles at Confluent, Facebook, and LinkedIn, to underscore the critical role of real-time data and machine learning in tackling complex problems like fraud detection and risk decisioning.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can \",/*#__PURE__*/e(n,{href:\"https://open.spotify.com/episode/0YBWJnr1B2WjkTSyNKVuIg\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"listen to the podcast here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Podcast Transcript:\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"On today's episode, I'm joined by Oscilar co-founders Neha Narkhede and Sachin Kulkarni. Neha, Sachin, and I talk about the founding story behind Oscilar, the importance of no code, the efficiency of out-of-the-box solutions, which right now that's what Oscilar is offering, out-of-the-box solutions, the benefits of having engineered talent from the Ubers and Apples of the world: it's really diverse in terms of the talent that they have at Oscilar, the rising importance of kind of where fraud fits and fighting fraud within organizations, being married as co-founders and kind of the uniqueness that comes with that, raising capital and much, much more.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"One quick PSA:\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to reach the best Fintech community around, we have all the tools you need to shape your message and reach new clients. You can sponsor an episode, sponsor a webinar, buy ad space. We have it all here at Fintech Nexus, so please reach out anytime.\"}),/*#__PURE__*/e(\"p\",{children:\"Happy to chat about any of our digital products. Todd@fintechnexis.com and my email address will be in the show notes.\"}),/*#__PURE__*/e(\"p\",{children:\"Without further ado, I present Oscilar\u2019s co-founders Neha Narkhede and Sachin Kulkarni. I hope you enjoy the show. Good morning, Neha and Sachin.\"}),/*#__PURE__*/e(\"p\",{children:\"Welcome to the podcast. How are you both doing?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Doing great. Great. Thank you so much for having us.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Thanks, Todd.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Of course, so I like to kick off the episode if we can just get a little sense of your story.\"}),/*#__PURE__*/e(\"p\",{children:\"So maybe Neha, I'll start with you. And then Sachin, I'll go to you next. Tell us a little bit about your journey, kind of where you've been professionally until now, and kind of what brought you ultimately to the point of wanting to start a company together.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, I'm co-founder of Oscilar and also co-founder of Confluent, which is a public tech company. Previously I led product and technology at Confluent, where I was privy to a lot of applications of event streaming and real-time data. Before that, I led data streams charter at LinkedIn, where me and my co-founder started Apache Kafka, which eventually led to Confluent.\"}),/*#__PURE__*/e(\"p\",{children:\"And the reason for starting Oscilar in probably a really short way is that I saw a lot of use cases on real-time data, and the fastest growing and the most interesting one was fraud detection and risk decisioning. And that is what led to Oscilar.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Hi! So before Oscilar, I used to be at Facebook for more than a decade. Actually, eleven and a half years-ish where I was the Senior Director of Engineering responsible for building out Facebook's private cloud. Also built the back end for Facebook live Facebook videos, Instagram live, Instagram videos, and the back end for Facebook Messenger.\"}),/*#__PURE__*/e(\"p\",{children:\"And so along the way, we improved the trust and safety of the Facebook platform overall by building hyper-scale real-time data processing systems that detect various types of fraud, as well as things like video integrity, people trying to video copyright and so on, like those types of problems as well. And I think that there was a fun fact there where my organization, the video infrastructure organization, eventually won an Emmy in the technical category, of course. And so there was a running joke among my friends where they would, of course, make fun of me and call me an Emmy Award-winning director.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Not a bad thing to be called.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Exactly.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"So I always ask the question to my guests, but what drives you, and ultimately what drove you to want to start your own business? I mean, I hear stories like my parents were entrepreneurs, and it was kind of ingrained to me.\"}),/*#__PURE__*/e(\"p\",{children:\"Neha, you mentioned kind of finding a problem through your other journeys in terms of the businesses that you were at that you wanted to start Oslor in particular. But where does the drive come from when it comes to being an entrepreneur?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"For me, it was really the complex solution that risk decisioning really is today for a really specific and growing problem, which is the rise of online fraud and risk. So the context behind that and the way we arrived at this is over the past decade, as companies became more digital, there's an explosive rise in online transactions, and that's further accelerated by the pandemic.\"}),/*#__PURE__*/e(\"p\",{children:\"So today, many of us expect to handle the most consequential actions of our lives, whether it's applying for a home loan or transferring money through a peer-to-peer wallet. We expect all this to happen online, instantaneously, and also securely. And the sharp increase in online transactions has actually resulted in a dramatic increase in risks of all manner.\"}),/*#__PURE__*/e(\"p\",{children:\"It's not just fraud risk, it's credit risk, insurance risks, and so on. And the reality is that most companies risk technology that has not kept pace with this proliferation of transactions. And it's not that these costs are substantial.\"}),/*#__PURE__*/e(\"p\",{children:\"When I saw the cost, credit, and fraud risk now cause consumers more than 8.8 billion annually. And personally, I saw this trend unfold in real-time at Confluent when I witnessed a large variety of applications using event streaming data and this being one of the major ones where companies had to string together lots and lots of distributed systems along with machine learning pipelines in order to solve this problem.\"}),/*#__PURE__*/e(\"p\",{children:\"And even then they had this problem of dependence on engineering not being able to solve this quickly enough. And before we jumped in, I talked to hundreds of fraud and risk leaders to just see what their challenges were. And it turns out that they face similar challenges: providing autonomy to risk teams, ensuring access to the most relevant data at the right time, developing relevant machine learning models.\"}),/*#__PURE__*/e(\"p\",{children:\"And therefore the complexity of this solution was really intriguing to me. And Sachin can say more, but I wasn't alone in wanting to build a new solution here.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, I think what we realized is we were at some of the top tech companies with great talent and we still found that the existing systems were cumbersome and in many cases ineffective in dealing with fraud.\"}),/*#__PURE__*/e(\"p\",{children:\"And it was not just the companies we were at. We also talked to people who had worked on these systems, let's say Twitter and some other companies, and got the same sense that this is we were actually confounded by how bad the situation was, and it helped us realize that this is actually not just in these companies. If you go outside the top tech companies, the problem actually gets worse because they don't necessarily have access to the talent that these companies do.\"}),/*#__PURE__*/e(\"p\",{children:\"And so we were convinced that this problem needs to be solved. There was also a personal anecdote that said absolutely, there\u2019s a lot more, right? Where I think one of my older uncles, he is in his 70s, he got a phone call one day saying hey, there has been some bad activity on our account so share the code that we sent to your estimates so we can reverse that activity.\"}),/*#__PURE__*/e(\"p\",{children:\"Of course, this was a scam, but I mean him being in his 70s is not really up to speed on everything that is happening in different kinds of scams. So he gave them that number and they of course drained his account right away. And that got us thinking right.\"}),/*#__PURE__*/e(\"p\",{children:\"This is a real problem for real people. There's not just sort of at the fringes anymore. People are losing their life savings.\"}),/*#__PURE__*/e(\"p\",{children:\"And I don't think it is reasonable to expect that every one of these people get fully educated on how to stop these things. That's not going to happen. We need systems in place.\"}),/*#__PURE__*/e(\"p\",{children:\"We need businesses to be able to do this for their users, protect them from this type of activity. And so I think the personal as well as the professional sort of those words collided, if you will, in helping us figure out, yes, this is what we need to build and solve this problem.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"So as we jump further into our conversation a bit more about the solution that you're building. Where did the name Oscilar come from?\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, online risk is never really static. Like all the leaders we talk to and our experiences as well pointed to the fact that companies have to pick somewhere on the spectrum of ease of use and catching every single fraudulent activity they want to have. And it's usually a spectrum.\"}),/*#__PURE__*/e(\"p\",{children:\"You have to pick different points at a different stage of your company and depending on what you are seeing, we would like people not to have to make that choice. Like ease of use should be there while you catch all the fraud, but not possible in every case. Sort of that oscillation.\"}),/*#__PURE__*/e(\"p\",{children:\"It was an interesting spectrum of the balance. Very okay, Oscilar is similar enough to Oscillation.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"So tell us a bit more about the company. Is there kind of a perfect type of client that you serve and kind of where are you guys today in terms of your journey? And Neha, tell us a little bit more about what you're building at Oscilar.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, so over the past two years, we've been working in stealth alongside a world-class team of engineers to build this first-of-a-kind real-time AI-powered risk platform that dramatically improves the quality and risk speed of risk assessment. We publicly announced the company last month, and the reaction has been very positive.\"}),/*#__PURE__*/e(\"p\",{children:\"And we're looking forward to growing the company significantly in the coming months and years. And where we are on the customer development journey is we're working with dozens of fintech customers. For instance, we partner with leading fintech companies like Slope and Super for applying our technology to help them secure and reduce the risk of their online transactions, both B2B as well as B2C, and our products currently are twofold:\"}),/*#__PURE__*/e(\"p\",{children:\"We offer a fraud detection product as well as a credit underwriting product, and usually customers start with one product and very seamlessly upgrade to the other one.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"So really we're looking forward to growing the reach of our products across industry sectors with the chance of building a really iconic company that can make the internet safer.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"And so when doing research for this episode, looking at your backgrounds and a lot of the information you have on your website, obviously you make it very apparent about the no-code portion of this solution.\"}),/*#__PURE__*/e(\"p\",{children:\"So why no code? And then first tell us a little bit more about the benefits, and then how much of a learning curve is there amongst financial service executives? Some of the clients that you mentioned with no code, from my perspective, I'm starting to hear about it a lot more in fintech and financial services. But tell us a little bit more about that decision and kind of how clients are adapting to what you're building.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, great question.\"}),/*#__PURE__*/e(\"p\",{children:\"So I think as part of research, one thing we realized is the risk teams, the risk operations teams or analysts, and so on, they have a lot of domain knowledge about the business, the types of fraud they want to catch, and so on, right? But may not necessarily be the ones that write the code. And so we had this separation of responsibilities where there was the risk team that knows the business and then there is the engineering team that builds the system. And we realized that that separation was actually causing several problems.\"}),/*#__PURE__*/e(\"p\",{children:\"The risk teams were not autonomous. They had to constantly depend on engineers to go build things or make small tweaks, and that was slowing them down and making their fraud detection efforts much less effective. I think that's where no code comes in, where you don't have to depend on engineers to make small changes.\"}),/*#__PURE__*/e(\"p\",{children:\"The engineers can focus on the core product, while the risk operations team can try out many things, experiment very quickly, and apply all their business knowledge to solving the problem without being blocked. And so that autonomy was really important. And so we have built the system in a way that teams can get started in minutes.\"}),/*#__PURE__*/e(\"p\",{children:\"It's intuitive, you don't have to know anything else. There is no new DSL that they need to learn. As long as they know SQL, they are good to go.\"}),/*#__PURE__*/e(\"p\",{children:\"And essentially we have seen most analyst teams know SQL already, so they can get going. And it's very consistent with their experiences and what they need to know. And so getting that risk signal, starting from okay, there is a fraud pattern emerging to finding a solution to it, deploying it, then seeing that fraud go down or get detected quickly, that should happen in minutes.\"}),/*#__PURE__*/e(\"p\",{children:\"And with that as the goal, no code was the way to go. We could not have done that without no code.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"You also make a point to say the solution is out of the box.\"}),/*#__PURE__*/e(\"p\",{children:\"How much faster is that for clients when they're saying, all right, I have all these fraud potential options, I have all these credit options, but I can't afford to do a twelve-month proof of concept or 18 months? And all of a sudden now we're starting to get going. We need to get going today, I need to protect my customers today,\\xa0 and I need to continue bringing in new customers.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"So how important was that to focus on out of the box? And how much faster does it get to market versus maybe the traditional POC-type way?\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, absolutely. So I think out-of-the-box solutions are incredibly important because of the time to market.\"}),/*#__PURE__*/e(\"p\",{children:\"I think you hit the nail on the head. There are so many risk vectors at play that people have to deal with, expecting that they put all of those together in a very short time frame. Doesn't happen if you go the POC approach.\"}),/*#__PURE__*/e(\"p\",{children:\"It does take, like, several months to get everything together, and so on. And so the out-of-the-box play is actually really important. It allows them to go to market quickly, but also scale existing ones or add new products, new capabilities on top of existing products.\"}),/*#__PURE__*/e(\"p\",{children:\"And so having ML models out of the box that we offer gives them a much shorter runway in getting to market. That doesn't preclude them from doing sort of the detailed tuning or having their own machine learning models and so on. So it's not one or the other.\"}),/*#__PURE__*/e(\"p\",{children:\"So people use one to get started out of the box to get started. And then over time, as you learn more, they can add their own custom features on the same platform. They don't have to learn a new platform or do things differently.\"}),/*#__PURE__*/t(\"p\",{children:[\"So I think that combination is very powerful.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"You kind of hit on my next question, which was, are most clients or those that you're talking to looking for one of your solutions? Kind of the whole suite of solutions? How are they looking at the various things that you provide right now?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yes, so Oscilar is designed to be a modular platform.\"}),/*#__PURE__*/e(\"p\",{children:\"And so it's not all or nothing, right? And so most customers start with one solution. And we have several. We have solutions around credit underwriting. We have solutions for account takeover, synthetic ID, transaction monitoring, and so on. And so most customers start with one and then over time expand into another. That makes the whole process much simpler for them.\"}),/*#__PURE__*/e(\"p\",{children:\"They're solving one problem, they see success there. This works really well. Great.\"}),/*#__PURE__*/e(\"p\",{children:\"Now let's start adding more. So we have seen people start on transaction monitoring over time, start using the solution for credit underwriting, and vice versa. So I think both are possible.\"}),/*#__PURE__*/e(\"p\",{children:\"That upgrade is seamless. You don't have to do sort of a whole separate thing. And one of the reasons why it is seamless is we don't impose a specific data schema.\"}),/*#__PURE__*/e(\"p\",{children:\"We found that customers were spending tons of time doing data mapping between their internal data format to the format that was imposed by a vendor. And that was a no-go. Right? Because that's going to take weeks to months.\"}),/*#__PURE__*/e(\"p\",{children:\"And that's not the time that people have or should be spending on this. And so we don't impose a schema, which means they're spending zero time on doing any mapping. Whatever schema they have, send that data in.\"}),/*#__PURE__*/e(\"p\",{children:\"We will figure it out in sort of almost automatic fashion.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"We've talked a little bit about your backgrounds. You also have people in the team that have worked for Apple and Uber and LinkedIn.\"}),/*#__PURE__*/e(\"p\",{children:\"I mean, how important is it when designing a solution or solutions like you are to have those different perspectives come to the table and pair that with your backgrounds because you have so much experience, whether it be at Apple or Uber, that gives you the perspectives that the customer might ultimately have.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, absolutely. So I think the diversity of perspective is actually incredibly important.\"}),/*#__PURE__*/e(\"p\",{children:\"If you look at our backgrounds and where the different people that we have hired and our founding team is from. There are social networks, there are sort of the marketplace like Uber, Apple, one of the top tech companies in the world, very different experiences, and those help us design a solution that will work in a broad set of cases. And so I think that diversity was important, we were very intentional about hiring people and getting the founding team with a lot of this experience.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"And this came up in our conversations with the 100-plus risk leaders that we talked to before starting the company. It was clear that the challenges are similar, but there are enough differences as well that need to be accounted for in the solution.\"}),/*#__PURE__*/e(\"p\",{children:\"And so I think that's where the diversity of the engineering team, to begin with, was actually quite good.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"And these days, you have Uber that is becoming a financial services company, Apple's becoming a financial services company. I mean, it's starting to mix all across the different industries that these types of solutions. I'm sure as a founder yourself, you're looking, all right, fintech is here, but Apple is becoming a fintech and others are becoming a fintech.\"}),/*#__PURE__*/e(\"p\",{children:\"The universe is expanding.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"You're exactly right. That's what we see.\"}),/*#__PURE__*/e(\"p\",{children:\"That's the trend. And that's one of the reasons why we're so excited about bringing this kind of solution into the market.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah. On the fraud piece, you obviously touched on it earlier in our conversation with the onset of COVID and we went to so much digital transactions or more digital transactions that we've ever seen before in a pretty short time frame. Do you think fraud is finally getting the attention it deserves across fintech and kind of financial services, that it's kind of risen to almost the top of the stack? And do you think with that fraudsters share openly in public? Can the good actors or the fighters do better at maybe sharing with it? Not necessarily in a public space with a lot of the stuff they deal with, but in some ways that can help each other, because ultimately, if J. P. Morgan's hit, it doesn't help Bank of America, even if they're competitors.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, exactly. If you study the last five years and the trends, there certainly has been a growing attention due to the massive problem of fraud.\"}),/*#__PURE__*/e(\"p\",{children:\"Right? And if you look at the banks in the past, they had formed a consortium and they have that where they band together and from a payment rail perspective have something going there. I think we need a similar open consortium of all fraud vendors where everyone can come together and foster this data sharing, which makes everyone's products better as compared to when they were operating in their own landscape. But what's happening right now, at least what I see is there are some startups that are trying to form their own consortiums and trying to keep it closed to their own customers, and that just limits the data that their customers can get from just themselves.\"}),/*#__PURE__*/e(\"p\",{children:\"And I'm really looking forward to a consortium which is more independent, that can bring together all the vendors and then therefore be a much more powerful tool in our toolkit to fight fraud.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"You've mentioned you've been in stealth for a couple of years. What\u2019s, if not the biggest, what are some of the lessons that you've learned from when you started to when you just launched recently, had all that time in stealth? What are the things that you've learned, maybe about yourself being a founder or about the company that you can share with others that might listen to the episode?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"Well, about myself, what I've learned is to not compare Oscilar's journey with my previous company, Confluent, where we saw a large amount of success in a very short amount of time. And if there's something I would change about our Oscilar journey, it is that we should have started the company much earlier than we actually did.\"}),/*#__PURE__*/e(\"p\",{children:\"Some amount of research is very useful, but starting it earlier would have been even more useful.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"And I think in some sense the timing was really right. Neha being the co-creator of Kafka and the co-founder of Confluent, it was clear that real time and real-time AI is in our DNA.\"}),/*#__PURE__*/e(\"p\",{children:\"The technology has finally caught up to what the world needs to catch fraud very quickly. And so I think that came through together very nicely. And so, yeah, maybe a little bit before would have been fine, but I think the timing is just right for the technology to catch on.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Tell us more about how big is the team today? You mentioned top engineering talent. What's the makeup of the team? Is it 90% engineers? Tell us a little bit more about those that are around you, helping you to build Oscilar.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"So we have a fantastic team.\"}),/*#__PURE__*/e(\"p\",{children:\"We have about 30 people, mostly engineers with decades of experience from Facebook, Now, Meta, Google, Uber, Confluent, and so on, who have deep expertise in building highly scalable real-time AI systems. And so I think that's the expertise we have been looking for. We also have analysts and data scientists who have dealt with fraud and machine learning all their careers effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"And so they also bring an interesting and different perspective on how the system will get used in the real-time, sort of perspective on what we need to build, not just the engineering way of building things, but also a user view on what needs to happen. So I think that combination has been great, and I think in the post-COVID world where being remote-first or virtual first is the norm, of course, our team is spread out through US and Europe. I think that sort of diversity of ideas is also helpful because even though there are many similarities, there are also differences in how things get used in the fraud patterns across Europe and the US.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah. I see that you've raised some outside capital from investors. How was fundraising maybe compared to previous ventures, at least for you Neha, what did you learn that maybe you didn't know about Oscilar through those investor pitches and talking to investors that maybe we should do this or potentially implement that along the way? Do you learn stuff like that in pitches? Tell us a little bit more about how fundraising went.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, so as part of our public launch, we announced that we are self-funding the company with $20 million, opting to not take outside funding so that we could quickly build and scale the company. We are fortunate to have received strong interest from investors, and we look forward to exploring fundraising opportunities at the right time in the future to bring in the right advisors to the company.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"So we have just a few minutes left.\"}),/*#__PURE__*/e(\"p\",{children:\"I like to end a little bit lighter than we started. And so a couple of fun questions to end. But first, I know that you two are married. How is it working with your spouse? Were there any reservations? Ultimately, when you're thinking of starting a company or working at the same company together, does anything come into play like, hey, maybe we shouldn't do this? Just a curiosity from my standpoint.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"Neha, you want me to take this?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"So we actually talked to several co-founders who were couples themselves to learn from their experience on what worked, what did not work.\"}),/*#__PURE__*/e(\"p\",{children:\"And one thing they said consistently is, have a clean separation of responsibilities. If you have that, it increases chances of success dramatically. If you don't have that, you will fail.\"}),/*#__PURE__*/e(\"p\",{children:\"You have a high chance of failure if you don't have a clear separation. And so before we started, we were like, okay, this makes sense. Let's have a clean separation that way. This was a clear lesson.\"}),/*#__PURE__*/e(\"p\",{children:\"And so we did that. So Neha focuses a lot on the go to market, the product aspects of the company, and so on, and I focus on the engineering aspects, building out the product, and that also plays to our interests and strengths. And so it has worked out really well. I would do this again.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"So onto those questions. Do you have a favorite book or the last book that you read?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"Well, I have too many favorite books to name one, but the last book I read, which really fascinated me, was Outlived by Dr. Peter Attia.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Sachin, any favorites on the book side?\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"I think on the book side, I'm spending most of my time reading about raising children.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yes, children\u2026 I have two. So it's an adventure that never ends, that's for sure. Obviously, as founders, you need to be fresh and present for your team. Do you do anything specific to unwind, take your mind off work and not burn yourselves out?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"I love to unwind by playing with our son.\"}),/*#__PURE__*/e(\"p\",{children:\"It's really fun to see the world through his eyes and really sort of take the weight off your shoulders.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"I like to play soccer, so every Sunday soccer time gives me good exercise and then I feel sort of, okay, this is good, Feel better, meet some friends along the way and so on. And then of course, playing with my son is the highlight of the week, I would say.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"You mentioned soccer.\"}),/*#__PURE__*/e(\"p\",{children:\"I'm assuming that's your favorite sport. Do you have any other sports that you play or sports teams that you might prefer?\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"I don't play American football, but I root for the Steelers. I went to Carnegie Melon in Pittsburgh.\"}),/*#__PURE__*/e(\"p\",{children:\"They won the Super Bowl that year. That was the first year in the US. Been following them since.\"}),/*#__PURE__*/e(\"p\",{children:\"Fantastic. Not doing so great recently. I hope they get back to their many ways soon.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Yeah, we'll see. Favorite vacation spot?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"For me, it's the Italian Dolomites.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"I like to go to India.\"}),/*#__PURE__*/e(\"p\",{children:\"It's a great combination, meeting family. There is a lot of interesting food. I have a list of 20 places that I want to eat at every time I go.\"}),/*#__PURE__*/e(\"p\",{children:\"Different places to visit. The culture is sort of colorful, fun. That's my favorite place to go.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"And then the final question, what's your biggest inspiration? What inspires you to kind of keep going, get at it every day? What's inspirational to you?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"For me, it's my dad who inspired me to be an independent thinker and an entrepreneur. And I strive to do this and continue to be successful at it to make him proud from wherever he is.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"For me, my parents as well, it was an interesting combination that they also have a business together that they run and operate and very different personalities too.\"}),/*#__PURE__*/e(\"p\",{children:\"My mom is \u201Cgo get things done\u201D quickly and so on. And my dad is more of a thinker and so that combination worked out quite well for them. And Neha and I are not that different.\"}),/*#__PURE__*/e(\"p\",{children:\"We are similar in many ways, but yeah, by learning from my parents how they operated this and how they went about starting a business, it was not easy for a woman to start a business in those days. This was several decades ago, so, yeah, I think I would say my parents would be my inspiration.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Well, Neha and Sachin, I greatly appreciate you spending some time with me, and thank you for coming on the show. If someone wanted to reach out and start a conversation or wanted to talk to you, how can they do that? How can they reach out to you or how can they reach out to Oscilar?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"One way to reach us is just our about us contact page. The other way to reach me is LinkedIn.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Okay, well, again, appreciate you coming on the show. Continued success to you and the team, and hopefully we'll get you back sometime in the future.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\"})}),/*#__PURE__*/e(\"p\",{children:\"Thank you for having us. It was a lot of fun.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\"})}),/*#__PURE__*/e(\"p\",{children:\"Of course. Thank you.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sachin:\"})}),/*#__PURE__*/e(\"p\",{children:\"Thank you, Todd.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Neha:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Bye.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Todd:\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Thank you.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"h2\",{children:\"Ready to give autonomy to your risk team?\"}),/*#__PURE__*/e(\"p\",{children:\"As you can see, at Oscilar we are building a risk operating system that allows risk teams to take full control over their operations - without the need to rely on expensive engineering resources.\"}),/*#__PURE__*/e(\"p\",{children:\"After talking to hundreds of industry professionals, we have realized that despite the different kinds of fraud challenges in various verticals, there is still a lot to improve regarding real-time detection & prevention capabilities that rely on 100s of data providers. That\u2019s why our engineering team has experience with companies where these problems require solutions at scale.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If you are curious about what the platform can do in action, consider booking a demo with us below.\"})]});export const richText1=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Lending automation is at the heart of significant changes in the lending landscape in recent years. The advent of innovative technologies has transformed almost every aspect of lending, paving the way for a more efficient, transparent, and profitable approach to lending.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"While change is accelerating, there is still a long way ahead: according to 2021 \",/*#__PURE__*/e(n,{href:\"https://www.crowdfundinsider.com/2021/12/183814-survey-40-of-companies-agree-that-manual-documentation-data-gathering-negatively-impact-loan-processes/\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"research by ForwardAI\"})}),\", 33% of lenders are \u201Ccollecting financial data within three days of an application, while 40% of respondents take more than one week and an astonishing 19% take more than two weeks\u201D.\"]}),/*#__PURE__*/e(\"p\",{children:\"Amidst this rapid digital transformation, lending automation has emerged as a significant driver for fintech organizations seeking to stay ahead of the curve.\"}),/*#__PURE__*/e(\"p\",{children:\"In today's increasingly fast-paced lending environment, time and efficiency are of the essence. The days of exhaustive, manual lending processes are being replaced by technologies that allow organizations to:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Process applications faster\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Validate borrower data promptly\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Make lending decisions in real-time\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By definition, automating the lending process involves utilizing software applications to manage tasks that were formerly manual, a process that enables lenders to handle significant bottlenecks, reduce processing time, and lower operational costs.\"}),/*#__PURE__*/e(\"p\",{children:\"At the core of lending automation is the ability to extract valuable insights from vast amounts of data, both structured and unstructured. By leveraging advanced analytics and machine learning, lenders can make more accurate predictions, detect fraud more effectively, and reduce risk.\"}),/*#__PURE__*/e(\"p\",{children:\"In this guide, we will explore the many advantages of automating the loan process, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Increased efficiency\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Enhanced customer experience\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Streamlined lending processes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"And improved data analysis.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Additionally, we\u2019ll delve into key considerations for lenders seeking to automate their processes and the best practices that can help fintech professionals navigate the rapidly evolving digital landscape.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is lending automation software for the financial industry?\"}),/*#__PURE__*/e(\"p\",{children:\"Automation software for the financial industry is designed to streamline the loan origination process. Lenders can use software to facilitate and automate all aspects of the lending process, including:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Data gathering\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Underwriting\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Loan pricing\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"And application processing.\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"An automated lending platform also helps lenders manage risk more efficiently while improving the customer experience.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, instead of scanning documents and talking with a human agent, automated lending allows customers to use self-service portals that determine their creditworthiness and approve their applications accordingly, hastening the process from days to mere seconds.\"}),/*#__PURE__*/e(\"h2\",{children:\"Lending automation made accessible to everyone, not just banks: the embedded finance play\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"470\",src:\"https://framerusercontent.com/images/tUwqjcU5vrVsJ2necGmgFXjWpy8.jpg\",srcSet:\"https://framerusercontent.com/images/tUwqjcU5vrVsJ2necGmgFXjWpy8.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/tUwqjcU5vrVsJ2necGmgFXjWpy8.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/tUwqjcU5vrVsJ2necGmgFXjWpy8.jpg 1800w\",style:{aspectRatio:\"1800 / 941\"},width:\"900\"}),/*#__PURE__*/e(\"p\",{children:\"Traditionally, large banks and financial institutions were the only ones that could afford and implement sophisticated loan processing systems.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Today, however, lending process automation has become more accessible than ever before.\"}),/*#__PURE__*/e(\"p\",{children:\"Technological advancements have ensured that even small and medium-sized fintech companies can leverage automated processes to improve their business operations and lending capabilities by leveraging the power of embedded finance.\"}),/*#__PURE__*/e(\"p\",{children:\"What\u2019s embedded finance?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Embedded finance is the integration of financial services into non-financial industries such as retail, healthcare, or transportation.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In other words, it allows businesses to offer a wider range of financial products and services to their customers, such as lending, payments, and insurance.\"}),/*#__PURE__*/e(\"p\",{children:\"Embedded finance makes for a smoother customer experience, encourages customer loyalty, and creates new business opportunities through increased cooperation and partnerships between financial institutions and other industries.\"}),/*#__PURE__*/e(\"p\",{children:\"Lending automation plays a crucial role as non-financial service providers integrate financial tools and services, such as lending and payment processing, into their offerings.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In short, what\u2019s driving the next phase of fintech innovation is that merchants can now offer not just different payment options for their customers, but different payment plans as well, without carrying any additional risk themselves.\"}),/*#__PURE__*/e(\"p\",{children:\"Now let's have a look at the actual steps involved when you are looking at automating your processes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key features to automate the lending process\"}),/*#__PURE__*/e(\"p\",{children:\"When selecting loan automation software, lenders should look for some key features. Next, we\u2019ll discuss four key lending automation features in detail.\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Document Management\"}),/*#__PURE__*/e(\"p\",{children:\"The document management feature allows the system to take care of all the loan documentation through the entire loan process, from the application stage to loan closing.\"}),/*#__PURE__*/e(\"p\",{children:\"This feature eliminates the need for cumbersome manual documentation and enables the lender to keep track of all necessary documents associated with the loan in one place, such as the financials of the account holder, credit presentations, or tax returns, as well as collaterals.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Workflow Automation\"}),/*#__PURE__*/e(\"p\",{children:\"One of the primary advantages of an automated system is the ability to automate repetitive and time-consuming tasks, which accelerates the loan approval process.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Automated loan processing can help your teams with borrower credit risk assessment, evaluating collateral, document verification as well as customer communications. The software automatically identifies and flags fields that need attention, enabling faster loan approvals.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Risk Management\"}),/*#__PURE__*/e(\"p\",{children:\"Automated loan processing systems integrate with credit bureaus and other alternative data providers to help lenders assess the creditworthiness of potential borrowers accurately.\"}),/*#__PURE__*/e(\"p\",{children:\"With relevant financial data like credit history and payment records accessible in one place, the system uses advanced algorithms to evaluate the credit risk of an applicant, thus supporting financial institutions in making an informed decision.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Data Analysis and Reporting\"}),/*#__PURE__*/e(\"p\",{children:\"The data analysis and reporting feature enables lenders to compile data from loan applications and other sources in one place to gain insights into their lending portfolio.\"}),/*#__PURE__*/e(\"p\",{children:\"Apart from being a source of competitive advantage, a comprehensive view of lending data is critical in identifying and addressing operational inefficiencies. Such insight enables lenders to advance their products and services, and most importantly, it supports lenders in making informed business decisions.\"}),/*#__PURE__*/e(\"p\",{children:\"An automated processing system can also track loan performance metrics such as origination and processing times, loan types, credit scores, default rates, and other important data.\"}),/*#__PURE__*/e(\"h2\",{children:\"What are the benefits of lending automation, and why are automated loan workflows important?\"}),/*#__PURE__*/e(\"p\",{children:\"Lending automation improves the overall customer experience, optimizes operational efficiency, and reduces the risk of errors. Its importance is growing in the digital era as instant gratification and high-quality customer experience have become essential.\"}),/*#__PURE__*/e(\"p\",{children:\"Some of the main benefits of automating the lending process include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Faster Processing Time\"}),/*#__PURE__*/e(\"br\",{}),\"The accuracy of credit risk assessment is crucial to the success of any lender. By automatically analyzing patterns and assessing credit risk, the right software can perform \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/solutions/instant-credit-decisioning\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"instant credit underwriting\"})}),\". Combining multiple data sources ensures quick and accurate loan application processing while also guaranteeing consistent and reliable decisions, leading to optimal risk management.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved Risk Management\"}),/*#__PURE__*/e(\"br\",{}),\"Sophisticated algorithms and powerful data analysis tools, enabled by lending automation, can help lenders assess complex and multiple risk factors. This can prevent certain risky applications from being approved, reducing the overall risk of the lending portfolio. Conversely, sophisticated software with smart decisioning flows can help with loan approvals where more traditional approaches would have declined them.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved Data Accuracy\"}),/*#__PURE__*/e(\"br\",{}),\"Automated loan origination software can capture data from multiple sources such as leads, internal systems, and external data, processing and verifying it in the same platform. This streamlines the work process and reduces the costs associated with manual errors and paperwork.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lower Costs\"}),/*#__PURE__*/e(\"br\",{}),\"By automating repetitive manual tasks, such as underwriting and document collection, lenders can reduce operational costs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Customer Experience\"}),/*#__PURE__*/e(\"br\",{}),\"Automated loan applications not only improve the speed of the approval process but also provide borrowers with a better overall experience. By eliminating tedious manual processes, borrowers are provided with an intelligent, personalized experience.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"One of our clients, Slope, found that using\",/*#__PURE__*/e(n,{href:\"https://oscilar.com/case-study/slope\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" Oscilar to automate their underwriting process\"})}),\" enabled anyone on their risk team to easily modify or deploy flows without needing engineers, seeing value in two months.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Essential integrations for an automated loan processing system\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"470\",src:\"https://framerusercontent.com/images/GlNpWNeCmcsPUYSL3IoBRA2EhG4.jpg\",srcSet:\"https://framerusercontent.com/images/GlNpWNeCmcsPUYSL3IoBRA2EhG4.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/GlNpWNeCmcsPUYSL3IoBRA2EhG4.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/GlNpWNeCmcsPUYSL3IoBRA2EhG4.jpg 1800w\",style:{aspectRatio:\"1800 / 941\"},width:\"900\"}),/*#__PURE__*/e(\"p\",{children:\"To create a comprehensive and efficient processing system, integration with other systems and providers is crucial.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some essential integrations that can enhance the functionality and effectiveness of an automated loan processing system:\"}),/*#__PURE__*/e(\"h3\",{children:\"Credit Bureaus:\"}),/*#__PURE__*/e(\"p\",{children:\"Integration with credit bureaus allows lenders to access reliable and accurate credit scoring information for loan applicants.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By connecting with credit bureaus' databases, the system can quickly retrieve credit reports, credit scores, and other relevant information.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, when a loan application is submitted, the software can automatically collect the applicant's consent and retrieve their credit report from a credit bureau.\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Providers:\"}),/*#__PURE__*/e(\"p\",{children:\"Integrating an automated loan processing system with data providers expands the range of available data for lenders to make informed lending decisions. These data providers can include sources such as property records, employment history, income verification, and even social media profiles.\"}),/*#__PURE__*/e(\"p\",{children:\"By integrating with these providers, lenders can access and analyze a wider range of data points to assess applicants' financial stability and repayment capacity.\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, integration with a data provider that supplies employment history can help lenders verify an applicant's income, evaluate their ability to repay the loan, and further strengthen their risk assessment.\"}),/*#__PURE__*/t(\"p\",{children:[\"We at Oscilar for example offer 100+ integrated data partners out of the box, so you can\",/*#__PURE__*/e(n,{href:\"https://oscilar.com/solutions/kyc-fraud\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" have a 360-degree view\"})}),\" of applicants during onboarding for KYC purposes.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Electronic Signature Providers:\"}),/*#__PURE__*/e(\"p\",{children:\"Integration with electronic signature providers cuts friction in the loan application and approval process by offering a secure digital platform to facilitate document signing.\"}),/*#__PURE__*/e(\"p\",{children:\"Electronic signature solutions eliminate the need for physical paperwork and enable borrowers to sign documents electronically, significantly reducing processing time and potential manual errors.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, when an applicant completes the loan application, the system can generate the necessary loan agreement and electronically send it to the applicant for a digital signature.\"}),/*#__PURE__*/e(\"h3\",{children:\"Payment Processing Providers:\"}),/*#__PURE__*/e(\"p\",{children:\"Integrating an automated loan processing system with payment processing providers simplifies and expedites loan payment processing. By connecting to payment processing platforms, lenders can automate loan repayments, ensuring a smooth and timely collection of installments.\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, once a loan is approved, the automated system can seamlessly integrate with a payment processing provider to initiate automated recurring payments for the borrower.\"}),/*#__PURE__*/e(\"p\",{children:\"This integration not only reduces the administrative burden of manual payment processing but also minimizes the risk of errors or payment delays, resulting in improved loan servicing and customer satisfaction.\"}),/*#__PURE__*/t(\"p\",{children:[\"We at Oscilar, for example, provide over 100 integrations out of the box, allowing you to customize your decisioning flows based on relevant data, tailored to the task at hand. If you want to see how this works in action, our team is more than happy to \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/demo\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"provide a demonstration\"})}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"Loan origination tasks that can be automated\"}),/*#__PURE__*/e(\"p\",{children:\"Automated loan origination tasks reduce manual effort, accelerate the loan process, and improve accuracy. Some of the tasks that can be automated with loan origination software include:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Application Processing:\"}),\" Loan origination software can automate application processing, making it easier for borrowers to apply for loans, and easier for lenders to process applications.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit Risk Assessment:\"}),\" An automated system can seamlessly assess credit risk for lending applicants, evaluating various credit risk factors, application stack checks, and predicting repayment behavior, using sophisticated loan algorithms to score the overall risk.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Documentation Gathering:\"}),\" Automated loan origination software enables borrowers to submit all necessary documentation online, and lenders have an easier time gathering and documenting data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud Risk Management:\"}),\" Through sophisticated fraud detection algorithms, automated loan origination software can help lenders evaluate new loan requests and capture any fraudulent applications, increasing the accuracy and efficiency of the lending process.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated credit decisioning:\"}),\" You can significantly improve your credit underwriting process by automating the decisioning itself with the help of\",/*#__PURE__*/e(n,{href:\"https://oscilar.com/blog/credit-decisioning-sotware\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" credit decisioning software\"})}),\", processing more loans faster.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer Communications:\"}),\" Automated customer communication expedites the application process and can help improve the overall customer experience.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Lending automation is becoming increasingly prevalent in the lending industry and can significantly improve operational efficiency, reduce the risk of errors, and provide an improved customer experience.\"}),/*#__PURE__*/e(\"p\",{children:\"By automating the lending process and leveraging AI and machine learning to facilitate data analysis, lenders can make more informed decisions, minimize risk, and reduce the cost of operations.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, investing in an intelligent, robust, and automated lending system can make the lending industry more inclusive to businesses of all sizes, improving the overall efficiency and profitability of lenders while offering a high-quality borrowing experience to borrowers.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By streamlining the loan process and identifying the most likely borrowers, automation is guiding lenders on the way to a sustainable future.\"}),/*#__PURE__*/t(\"p\",{children:[\"The cornerstone of an automated lending operation system would be the decisioning engine. At \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Oscilar\"})}),\", we provide fintechs with all the tools they might need to succeed under a single Risk Operating System. If you are curious about our No-Code solution, book a demo today - and level up your lending business.\"]})]});export const richText2=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit scoring\"}),\" has always been the foundation of lending. From the humble beginnings of using credit bureau data to assess the credit worthiness of an individual or a business, modern practices involve using sophisticated technology, alternative data providers as well as machine learning models.\"]}),/*#__PURE__*/t(\"p\",{children:[\"When it comes to online lending, consumers expect a fast and easy process, and fintechs are meeting that demand by investing in the best practices available. No wonder then, that online lending was estimated to be \u201C\",/*#__PURE__*/e(n,{href:\"https://www.marketsandmarkets.com/Market-Reports/digital-lending-platform-market-70396306.html?gclid=Cj0KCQjw1_SkBhDwARIsANbGpFvl5T0U2Kbyl4vG3YwMG132QBPiwJmtkzJ8LXfm4-tM1gQTihGgVrsaAjwCEALw_wcB\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"USD 10.7 billion in 2021 and is projected to reach USD 20.5 billion by 2026\"})}),\"\u201D.\"]}),/*#__PURE__*/e(\"p\",{children:\"In this guide we\u2019ll explore the core concepts of credit scoring, how different models are calculated, as well as showing you how to combine different approaches like alternative data to offer great experiences for your applicants.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is credit scoring?\"}),/*#__PURE__*/e(\"p\",{children:\"Credit scoring is the process of evaluating the creditworthiness of an individual or a business. Credit scoring models use various factors, such as credit history, payment behavior, income, and other financial information to determine a credit score.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The credit score is a numerical representation of the likelihood that a borrower will repay a loan.\"}),/*#__PURE__*/e(\"p\",{children:\"So, who uses credit scoring models? Credit scoring models are used by:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Lenders\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Banks, and\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Other financial institutions\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Credit scoring models are used to assess the risk of lending money to an individual or a business. The credit score is an important factor in determining the interest rate, loan amount, and other terms of a loan.\"}),/*#__PURE__*/e(\"p\",{children:\"Credit scores are based on data from the three major credit bureaus:\\xa0\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Experian\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Equifax\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Transunion\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"What do these credit bureaus do?\"}),/*#__PURE__*/e(\"p\",{children:\"Credit bureaus collect individual's credit use information. Most credit scores fall within a range from 300 to 850, with the higher score translating to less risk for the lending entity.\"}),/*#__PURE__*/e(\"p\",{children:\"In terms of scoring models, one can differentiate between traditional and alternative models. The traditional scoring models are mostly FICO & VantageScore, while alternative methods rely on alternative data to assess credit worthiness.\"}),/*#__PURE__*/e(\"p\",{children:\"The idea is that today there is no one size fits all approach. Due to intense competition and stark differences in worldwide markets, fintechs have to innovate on how they approach credit scoring. This way, they can not only offer better credit products, but can up their approval rates while hedging against fraud / and default risk.\"}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s dive in on how to approach this.\"}),/*#__PURE__*/e(\"h2\",{children:\"Combining traditional scoring models with alternative data\"}),/*#__PURE__*/t(\"p\",{children:[\"Modern fintechs rely on combining traditional credit scoring models with alternative data, incorporating several other systems in the credit underwriting process to maximize approval rates while minimizing risk. This is normally done through what is called a \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/blog/credit-decisioning-sotware\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"credit decisioning engine\"})}),\", which allows lenders to combine multiple approaches under a single hood.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here are some potential scoring strategies to consider:\"}),/*#__PURE__*/e(\"ol\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alternative Data Sources\"}),/*#__PURE__*/e(\"br\",{}),\"In addition to traditional credit reports, tap into alternative sources of data such as cash flow, accounting information, and loan payment history.\\xa0\"]})})}),/*#__PURE__*/e(\"p\",{children:\"This data can provide additional information on an individual's creditworthiness beyond what is captured in traditional credit reports. It can also be used to verify the applicant\u2019s employment history, education, and address.\"}),/*#__PURE__*/t(\"ol\",{start:\"2\",children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Machine Learning\"}),/*#__PURE__*/e(\"br\",{}),\"To assess risk and determine creditworthiness quickly and efficiently, leverage machine learning algorithms to analyze the data generated by traditional and alternative data sources. These algorithms could process large amounts of data to make faster and more accurate lending decisions.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Access to Cash Flow Data\"}),/*#__PURE__*/e(\"br\",{}),\"Leveraging real-time access to an applicant\u2019s cash flow data would help determine an applicant's ability to repay a loan. This minimizes any risk of default which comes from underwriting based on past trends. This is important for businesses that are very seasonal.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Biometric Authentication\"}),/*#__PURE__*/e(\"br\",{}),\"To prevent fraud and identity theft, use biometric authentication during the application process. This would verify an applicant's identity using facial recognition, thumbprint scanning, or other biometric markers.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Check Systems\"}),/*#__PURE__*/e(\"br\",{}),\"To ensure that lending regulations are being followed, use compliance check systems to identify potential compliance issues. The compliance system would be able to catch any violations before they turn into larger issues.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit Simulation Models\"}),/*#__PURE__*/e(\"br\",{}),'It\\'s always better to play a few moves ahead, so implement credit simulation models that allow us to run \"what if\" scenarios on different credit terms. This would help us decide if a loan is worth the risk based on the loan term and interest rate agreed upon.']})})]}),/*#__PURE__*/e(\"p\",{children:\"By combining traditional credit scoring systems, alternative data sources, machine learning, cash flow data, biometric authentication, compliance check systems, and credit simulation models, an online lender can make more informed and efficient lending decisions while preventing fraud and minimizing risk.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This approach would allow the lender to approve more loans without increasing the risk and reduce the amount of human intervention needed.\"}),/*#__PURE__*/t(\"p\",{children:[\"Oscilar allows you to do exactly that. Using our solution, you can combine your credit scoring models with your KYC flows while tapping into alternative data sources during the\",/*#__PURE__*/e(n,{href:\"https://oscilar.com/solutions/instant-credit-decisioning\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" credit underwriting process\"})}),\" for instant decisioning.\"]}),/*#__PURE__*/e(\"p\",{children:\"Of course, the fundamentals of credit scoring in the US are still reliant on bureau data, as well as the dominant players - FICO and VantageScore. In the next section, we\u2019ll go over the basics and how they differ from one another.\"}),/*#__PURE__*/e(\"img\",{alt:\"Credit Scoring Oscilar\",className:\"framer-image\",height:\"630\",src:\"https://framerusercontent.com/images/o3p3BrTmel98luvzIbfjGrwVU4.jpg\",srcSet:\"https://framerusercontent.com/images/o3p3BrTmel98luvzIbfjGrwVU4.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/o3p3BrTmel98luvzIbfjGrwVU4.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/o3p3BrTmel98luvzIbfjGrwVU4.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/o3p3BrTmel98luvzIbfjGrwVU4.jpg 2400w\",style:{aspectRatio:\"2400 / 1260\"},width:\"1200\"}),/*#__PURE__*/e(\"h2\",{children:\"FICO Scoring Model\"}),/*#__PURE__*/e(\"p\",{children:\"The FICO scoring model is one of the most widely used in the world.\"}),/*#__PURE__*/t(\"p\",{children:[\"FICO scores are calculated based on five factors, which are weighted differently:\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Factor / Weight in %\"}),/*#__PURE__*/e(\"br\",{}),\"1. Payment history \u2013 35%\",/*#__PURE__*/e(\"br\",{}),\"2. Amounts owed \u2013 30%\",/*#__PURE__*/e(\"br\",{}),\"3. Length of credit history \u2013 15%\",/*#__PURE__*/e(\"br\",{}),\"4. New credit \u2013 10%\",/*#__PURE__*/e(\"br\",{}),\"5. Types of credit used \u2013 10%\"]}),/*#__PURE__*/e(\"p\",{children:\"FICO scores range from 300 to 850, and scores in the 670 - 739 range are considered good. This system has been around for over 30 years, and is being utilized by 90% of lenders in the US.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"VantageScore model\"}),/*#__PURE__*/e(\"p\",{children:\"The VantageScore model is another credit scoring model that is gaining popularity, as it was created as an alternative to FICO.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The VantageScore ranges from 300 to 850, with a higher score indicating a lower risk of default.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Factor / Weight in \",/*#__PURE__*/e(\"br\",{})]}),\"Payment history \u2013 40%\",/*#__PURE__*/e(\"br\",{}),\"Age and type of credit \u2013 21%\",/*#__PURE__*/e(\"br\",{}),\"Percentage of credit limit used \u2013 20%\",/*#__PURE__*/e(\"br\",{}),\"Total balances and debt \u2013 11%\",/*#__PURE__*/e(\"br\",{}),\"Recent credit behavior \u2013 5%\",/*#__PURE__*/e(\"br\",{}),\"Available credit \u2013 3%\"]}),/*#__PURE__*/t(\"p\",{children:[\"VantageScore used trended data, and weighs in the applicant\u2019s credit utilization date, making it increasingly popular among lenders - the company reported a \",/*#__PURE__*/e(n,{href:\"https://www.vantagescore.com/lenders/#:~:text=Over%203%2C000%20banks%2C%20fin%2Dtechs,representing%20a%2030%25%20yearly%20increase.\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"30% year on year increase\"})}),\" in adoption in 2021.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Differences between FICO and VantageScore\"}),/*#__PURE__*/e(\"img\",{alt:\"FICO and Vantagescore comparison\",className:\"framer-image\",height:\"630\",src:\"https://framerusercontent.com/images/g6RF2zy5dmRGZVd0ezHzPuG48kc.jpg\",srcSet:\"https://framerusercontent.com/images/g6RF2zy5dmRGZVd0ezHzPuG48kc.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/g6RF2zy5dmRGZVd0ezHzPuG48kc.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/g6RF2zy5dmRGZVd0ezHzPuG48kc.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/g6RF2zy5dmRGZVd0ezHzPuG48kc.jpg 2400w\",style:{aspectRatio:\"2400 / 1260\"},width:\"1200\"}),/*#__PURE__*/e(\"p\",{children:\"While both FICO and VantageScore are scoring models, there are some differences between the two. The four key differences include:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Number of factors:\"}),\" The FICO score is based on five factors, while the VantageScore is based on six factors.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Payment history:\"}),\" Payment history is the most important factor in both models, but payment history accounts for 35% of the FICO score and 40% of the VantageScore.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit timeline:\"}),\" The FICO score considers the length of credit history, while the VantageScore considers the age and type of credit.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit balance:\"}),\" The FICO score considers the credit card balances and types of credit used, while the VantageScore considers the total balances and debt.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Differences aside, it\u2019s a good idea to use both services together. By utilizing both FICO and VantageScore, you can compare the credit scores provided by each model. This comparison helps validate the consistency and accuracy of the credit information.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If the scores from FICO and VantageScore align closely, it provides more confidence in the applicant's creditworthiness. On the other hand, if there is a significant difference between the scores, it prompts us to further investigate and evaluate the factors influencing the variations.\"}),/*#__PURE__*/e(\"h2\",{children:\"FICO and VantageScore Credit Scores for Small Businesses\"}),/*#__PURE__*/e(\"p\",{children:\"Although both scoring models\\xa0 were originally designed to assess the creditworthiness of individuals, both FICO and VantageScore have also developed credit scoring systems specifically for small businesses.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"FICO Credit Scores for Small Businesses\"}),/*#__PURE__*/e(\"p\",{children:\"For small businesses, FICO offers three different credit scores to assess credit risk in different situations:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"The Small Business Credit Score for term loans and lines of credit\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"The LiquidCredit Small Business Scoring Service for credit cards and working capital loans\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"The Small Business Scoring Service for Commercial Credit\"})})]}),/*#__PURE__*/e(\"p\",{children:\"These credit scores evaluate data from business and personal credit reports, available from credit bureaus such as Experian, Equifax, and Dun & Bradstreet.\"}),/*#__PURE__*/e(\"h3\",{children:\"VantageScore Credit Scores for Small Businesses\"}),/*#__PURE__*/e(\"p\",{children:\"Like FICO, VantageScore credit scores use a variety of factors to determine creditworthiness, including payment history, credit utilization, length of credit history, new credit, and credit mix.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Recently, VantageScore introduced a credit scoring system specifically for small businesses: the VantageScore Small Business credit score.\"}),/*#__PURE__*/e(\"p\",{children:\"The VantageScore Small Business credit score uses both business and personal credit data, along with additional financial information such as cash flow, assets, and revenue, to assess credit risk.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This takes into account the financial history of the business and the business owners. VantageScore estimates that approximately 27 million small businesses in the United States have a credit file, and potentially around 7 million of these files could be scored using the VantageScore Small Business credit score.\"}),/*#__PURE__*/e(\"h2\",{children:\"Differences Between FICO and VantageScore Credit Scores for Small Businesses\"}),/*#__PURE__*/e(\"p\",{children:\"While both FICO and VantageScore consider a variety of factors such as payment history and credit utilization, there are some differences between the two scoring systems:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use of alternative data:\"}),\" VantageScore Small Business credit score incorporates alternative data sources such as financial statements from account software providers. FICO on the other hand only uses data from credit bureaus.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit score ranges:\"}),\" FICO credit scores for small businesses can range from 0 to 300, while VantageScore Small Business credit scores can range from 1 to 100.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lender adoption: \"}),\"FICO credit scores are more widely used than VantageScore credit scores by banks and other lenders.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Credit scoring model practice changes\"}),/*#__PURE__*/e(\"img\",{alt:\"credit scoring model oscilar\",className:\"framer-image\",height:\"627\",src:\"https://framerusercontent.com/images/smQsQhkV5OJRXLwyZtvjDh1pNw.jpg\",srcSet:\"https://framerusercontent.com/images/smQsQhkV5OJRXLwyZtvjDh1pNw.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/smQsQhkV5OJRXLwyZtvjDh1pNw.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/smQsQhkV5OJRXLwyZtvjDh1pNw.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/smQsQhkV5OJRXLwyZtvjDh1pNw.jpg 2400w\",style:{aspectRatio:\"2400 / 1254\"},width:\"1200\"}),/*#__PURE__*/e(\"p\",{children:\"Scoring models are constantly evolving to better predict credit risk. In recent years, there have been some changes to credit scoring model practices.\"}),/*#__PURE__*/e(\"p\",{children:\"One change is the use of alternative data. Alternative data includes things like utility bills, rent payments, and cell phone bills. By using alternative data, scoring models can better assess the creditworthiness of individuals who may not have a traditional full credit report or history.\"}),/*#__PURE__*/e(\"p\",{children:\"Another change is the use of trended data. Trended data looks at a borrower's credit history over time, rather than just a snapshot at a specific point in time. By using trended data, credit scoring models can better predict credit risk.\"}),/*#__PURE__*/e(\"h2\",{children:\"Other credit score models\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to FICO and VantageScore, there are other scoring models that are used by lenders and financial institutions. Some of these models include the TransUnion CreditVision Risk Score, the Experian PLUS Score, and the Equifax Credit Score.\"}),/*#__PURE__*/e(\"h2\",{children:\"What are the methods of credit scoring?\"}),/*#__PURE__*/e(\"p\",{children:\"There are two main methods of credit scoring: traditional credit scoring and alternative credit scoring.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Traditional credit scoring uses credit history and other financial information to determine a credit score, while alternative credit scoring uses alternative data, such as utility bills and rent payments, to assess credit risk.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, the credit scoring system is an important tool used by lenders and financial institutions to assess credit risk. FICO and VantageScore are the most widely used scoring models, but there are other models available as well.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Credit scoring models are constantly evolving to better predict credit risk, and credit scoring tools are used by lenders and financial institutions to make informed decisions about lending money.\"}),/*#__PURE__*/e(\"p\",{children:\"Beyond the data provided by the major credit bureaus and the different credit scoring models, online lenders increasingly rely on alternative data as well as machine learning for their credit underwriting process.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If you are interested in an out-of-the-box solution, consider booking a demo with us today.\"})]});export const richText3=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring alerts can benefit many industries, particularly those in the banking and financial services sectors. These include traditional banks, credit unions, money transfer companies, insurance providers, and more. However, other industries such as eCommerce businesses and online payment providers can also put this tool to use to protect their customers' accounts from fraud or illegal activities. In fact, any organization that handles online transactions of value or sensitive customer data should consider using transaction monitoring alerts to help keep its customers secure.\"}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s take a look at the utility of transaction monitoring alerts across a variety of industries.\"}),/*#__PURE__*/e(\"h2\",{children:\"Transaction monitoring alerts in fintech\"}),/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring alerts can be used in a variety of ways in the fintech sector. For example, they may be used to alert financial institutions when suspicious transactions occur, such as large sums of money being transferred or sent internationally. Financial institutions can then take the necessary steps to investigate and prevent any potential fraudulent activities. In addition, transaction monitoring alerts can be used to detect and monitor unusual patterns of customer behavior, such as sudden changes in spending habits that could indicate identity theft or other forms of fraud. By identifying and adequately reacting to suspicious activity early on, businesses can reduce costs associated with fraud investigations and chargebacks.\"}),/*#__PURE__*/e(\"p\",{children:\"Some examples of transaction monitoring alerts in fintech include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Irregular changes in customer balance or account activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusual transfers between accounts owned by the same person\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Suspicious trades based on correlations between previously unrelated assets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusually large sums being moved out of an account without prior notice\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unexpected bank transfers from foreign countries.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Taking advantage of transaction monitoring alerts in eCommerce\"}),/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring alerts are especially useful in the e-commerce space due to the rise of online payment fraud. These alerts can be used to detect suspicious transactions that may indicate fraudulent activity, such as high-ticket orders placed or products requested to be shipped internationally. Additionally, transaction monitoring alerts can also detect unusual customer behavior and help verify customer information at key customer journey points (e.g. prior to completing an order or before initiating a refund).\"}),/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring can also improve e-commerce customer experience by providing accurate, real-time alerts about suspicious activities. These alerts allow businesses to take proactive steps to prevent fraud and identity theft before it occurs. Finally, transaction monitoring has been known to reduce false positives in many instances. This helps ensure that only actual suspicious activities are flagged and that customers are not inconvenienced by unnecessary interventions.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are a few examples of transaction monitoring alerts in eCommerce:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Receiving multiple orders with the same card details within a short period of time\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A significant increase in order volume from a single customer\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Purchases made using an unfamiliar IP address, email address etc\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Orders over a certain value being placed more frequently than usual\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Purchases being sent to new shipping addresses\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusual payment methods being used.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How insurance organizations make use of transaction monitoring alerts\"}),/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring alerts can provide a number of benefits to the insurance industry. Firstly, they can help reduce fraudulent claims by quickly detecting fraud patterns and preventing them before the business incurs steep losses. This can result in cost savings for insurance companies, as well as improved customer satisfaction due to the timely resolution of fraud cases. Secondly, transaction monitoring alerts can be used to detect suspicious activities that may indicate identity theft or other forms of fraud, helping to protect customers' data and improve overall security. Finally, transaction monitoring can be used to detect suspicious changes in customer behavior which may cause potential losses if they go undetected. This helps to proactively identify risks and improve customer experience and trust in the insurance company.\"}),/*#__PURE__*/e(\"p\",{children:\"These are some of the common examples of alerts at insurance organizations:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Abnormal number of claim submissions from a single provider or customer\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusually high-value claims submitted with suspicious supporting documentation\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Claims being made for services that are not covered by the specific policy\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Multiple claims for the same incident from different providers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unexpected cancellations and changes to insurance policies.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Transaction monitoring alerts in healthcare\"}),/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring alerts can provide a number of benefits to healthcare organizations. By detecting and preventing fraudulent claims, they can help ensure that payments are being made correctly and that patient information is not being compromised. Additionally, these alerts can detect suspicious patterns of customer behavior which may indicate identity theft or other forms of fraud. This helps improve patient safety and protects the integrity of health data.\"}),/*#__PURE__*/e(\"p\",{children:\"Transaction monitoring alerts can also make sure that customers' information is verified prior to granting access to services such as medical insurance plans. In addition, they can be used to detect and act on suspicious pharmaceutical orders, helping to protect patients from receiving counterfeit medication or inappropriate prescriptions. All in all, transaction monitoring alerts can provide an additional layer of security for healthcare organizations and help protect the safety of their patients.\"}),/*#__PURE__*/e(\"p\",{children:\"Below are a few examples of transaction monitoring alerts in healthcare:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A large number of prescriptions with the same active drug ingredients, issued to different people at the same time\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusual billing patterns for medical services, such as ordering too many tests or treatments for a single patient\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Claims submitted from unfamiliar states or countries where the patient has never been before\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unfamiliar providers treating the same patient more than once\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Multiple prescriptions are being filled by a single pharmacy.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Make transaction monitoring alerts work for your business\"}),/*#__PURE__*/e(\"p\",{children:\"Did you know that you can identify suspicious activity with Oscilar's AI transaction monitoring solution? Oscilar\u2019s fraud detection platform gives you a comprehensive view of your customers\u2019 activity. With real-time decisioning on suspicious transactions, Oscilar helps you identify bad actors, fight fraud and stay compliant. Learn how Oscilar's AI Transaction Monitoring can help with your fraud prevention and compliance needs \u2013 let\u2019s talk!\"})]});export const richText4=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The rapid rise in online business transactions has made Know Your Customer (KYC) a very vital aspect of accessing important services. From opening a bank account to simply placing an order online, a KYC form is a key part of the onboarding process for businesses to identify clients and expose fraud. There are many benefits to designing a frictionless and secure KYC process, chief among them being the prevention of fraud. By ensuring that all customers are properly vetted from the outset, companies can not only prevent criminal activities like bribery, fraud, money laundering, and identity theft but also attract more customers and increase revenue.\"}),/*#__PURE__*/e(\"h2\",{children:\"What are KYC and KYB?\"}),/*#__PURE__*/e(\"p\",{children:\"KYC verification is the process of verifying the identity of a customer. This usually includes checks like verifying government-issued ID documents and making sure that the customer\u2019s name, date of birth, and address match up.\"}),/*#__PURE__*/e(\"p\",{children:\"In some cases, additional information may be required to verify a customer\u2019s identity. This could include things like utility bills or bank statements. The level of due diligence will vary depending on the industry and the risk profile of the customer.\"}),/*#__PURE__*/e(\"p\",{children:\"The goal of KYC verification is to ensure that a customer is who they say they are, and that they are not engaged in any illegal activities. At the same time, KYC vetting cannot come at the cost of customer churn due to friction during the onboarding process.\"}),/*#__PURE__*/e(\"p\",{children:\"KYC is a fine balance between growth and fraud; an ideal KYC process introduces the minimum amount of friction required to accurately flag fraudulent customers.\"}),/*#__PURE__*/t(\"p\",{children:[\"The following are the \",/*#__PURE__*/e(n,{href:\"https://www.fincen.gov/news/news-releases/fincen-reminds-financial-institutions-cdd-rule-becomes-effective-today\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"three pillars of KYC\"})}),\":\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer Identification Program (CIP)\"}),\": Verify that the customer is who they say they are\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer Due Diligence (CDD)\"}),\": Assess the customer\u2019s level of risk, including reviewing the beneficial owners of a company\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous monitoring\"}),\": Monitor client transaction patterns and report suspicious activity on an ongoing basis\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"KYB: KYC for Business\"}),/*#__PURE__*/e(\"p\",{children:\"Know Your Business (KYB) is an extension of KYC for business suppliers or partners. Just as companies need to vet individuals before allowing them to open a bank account or invest through their platform, companies also need to vet other businesses they work with.\"}),/*#__PURE__*/e(\"p\",{children:\"KYB processes involve:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying high-risk businesses.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Determining the nature of the business including what it sells, what service it provides, and who it partners with.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collecting documents like articles of incorporation, business licenses, partnership agreements, and financial statements.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying and verifying ultimate beneficial owners (UBO) before establishing a business relationship. A beneficial owner may not be the owner or company leader but is a person who ultimately benefits from the business transactions.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What is KYC fraud detection?\"}),/*#__PURE__*/e(\"p\",{children:\"KYC (Know Your Customer) fraud detection is the process of identifying, monitoring, and preventing fraudulent activities in the financial system. It involves verifying the identity of customers to ensure they are who they claim to be and that their transactions do not involve any suspicious activity. KYC fraud detection aims to protect organizations from potential losses due to fraud, money laundering, and terrorist financing. KYC fraud detection systems provide organizations with the tools to detect and investigate fraud promptly. By verifying customer identity and analyzing potential fraudulent transactions, organizations can mitigate their risk exposure and minimize financial losses. This helps organizations protect themselves from costly violations of laws, regulations, and internal guidelines. KYC fraud detection is an essential component of any organization's financial compliance program as it provides a proactive approach to identifying and preventing fraud. By employing effective KYC fraud detection systems and procedures, organizations can ensure that their customers are legitimate and their transactions are secure.\"}),/*#__PURE__*/e(\"h2\",{children:\"Types of fraud detected by the KYC process\"}),/*#__PURE__*/e(\"p\",{children:\"KYC fraud detection systems can detect a variety of types of fraud, including money laundering, identity theft, and financial crimes. Money laundering is the process of disguising illegal proceeds from criminal activities to make them appear as legitimate income. Identity theft occurs when someone obtains and uses another person's personal information without their authorization. Financial crimes are any type of offense involving the misappropriation or misuse of funds. KYC fraud detection systems use various techniques such as customer profiling, identity verification, and transaction monitoring to identify suspicious activity associated with customers or transactions.\"}),/*#__PURE__*/e(\"h2\",{children:\"The many benefits of KYC fraud detection\"}),/*#__PURE__*/e(\"p\",{children:\"There are many benefits to designing a frictionless and secure KYC process, chief among them being the prevention of fraud.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fewer financial losses\"}),\": By ensuring that all customers are properly vetted from the outset, companies can prevent fraud resulting from false identities or online schemes. KYC processes also prevent\\xa0\",/*#__PURE__*/e(n,{href:\"https://ec.europa.eu/info/business-economy-euro/banking-and-finance/financial-supervision-and-risk-management/anti-money-laundering-and-countering-financing-terrorism_en\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"money laundering\"})}),\". It helps organizations carry out an adequate risk assessment on customers by identifying their financial history and owned assets.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legal compliance\"}),\": In addition to fraud prevention, a frictionless and secure KYC process can also help to ensure compliance with anti-money laundering (AML) regulations. In many jurisdictions, it is a legal requirement for companies to carry out KYC checks on their customers. By properly verifying the identities of their customers, companies can avoid hefty fines and penalties.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficient business growth\"}),\": Manual KYC procedures slow down how quickly banks can onboard customers \u2014 a process that\\xa0\",/*#__PURE__*/e(n,{href:\"https://www.infosys.com/industries/financial-services/insights/documents/transforming-customer-onboarding-ai.pdf\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"can take anywhere from 2-34 weeks according to Forrester research\"})}),\".\\xa0By designing a frictionless KYC process, a business can attract and onboard more customers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased customer trust\"}),\": KYC protects customer accounts from unauthorized third-party access, thereby building trust between customers and organizations, and attracting more customers to a business.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Data sources for identity verification\"}),/*#__PURE__*/e(\"p\",{children:\"Data sources used for identity verification in the KYC process typically include official government documents, such as passports or driver's licenses, as well as public records and other third-party sources. Government documents are often used to confirm an individual\u2019s name and date of birth. Public records such as utility bills and bank statements can be used to establish residency while third-party sources provide additional information that can help verify customers' identities. Organizations may also use biometric data such as fingerprints or facial recognition to ensure that the customer is who they say they are. By collecting this data from various sources, organizations can create a comprehensive profile for each customer, which helps them detect and investigate fraudulent activity more effectively.\"}),/*#__PURE__*/e(\"h2\",{children:\"Standardized checklist for KYC fraud detection\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations can use a standardized checklist to ensure they are verifying customer identity correctly and thoroughly. This checklist should include steps such as collecting proof of identity such as government-issued documents, public records and third-party sources; confirming the customer's name, address and other personal information; verifying biometric data such as fingerprints or facial recognition; assessing any potential risk associated with the customer; and monitoring transactions for suspicious activity. By following a standardized checklist for identity verification, organizations can ensure that their customers are legitimate and their transactions are secure. Furthermore, it helps organizations meet applicable laws and internal guidelines by taking a proactive approach to identifying fraud and preventing money laundering. As such, it is essential for organizations to have a robust KYC process in place to ensure that their customers are legitimate and their transactions are secure.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to pick the right KYC fraud detection technology\"}),/*#__PURE__*/t(\"p\",{children:[\"Adopting the right KYC tool is the cornerstone of designing a secure, fast, and frictionless KYC experience. The features of the tool you choose will have a direct bearing on the user experience. Pick a KYC solution that offers \",/*#__PURE__*/e(\"strong\",{children:\"flexibility\"}),\" to express \",/*#__PURE__*/e(\"strong\",{children:\"customizable risk scores\"}),\" based on each business's unique risk requirements, multiple data sources for verifying identity information, as well as, continuous transaction monitoring to rerun KYC checks for users that engage in suspicious activities post onboarding.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The right KYC fraud detection technology also employs \",/*#__PURE__*/e(\"strong\",{children:\"dynamic KYC checks\"}),\". Subjecting every customer to the same heavyweight KYC checks not only increases friction due to false positives but also increases costs associated with KYC processes. KYC fraud checks are rarely 100% accurate. At times, a user's risk profile can fall into a grey area. An ideal KYC fraud detection technology must employ dynamic KYC checks that have a layered approach; starting with a light KYC check and progressively adding more friction by asking for more information for users that cross a certain risk threshold. This is where having the\\xa0ability to calculate dynamic risk scores\\xa0comes in handy.\\xa0Dynamically computed risk scores with corresponding thresholds can be used for triaging applications instantly to automatically \",/*#__PURE__*/e(\"em\",{children:\"accept\"}),\", \",/*#__PURE__*/e(\"em\",{children:\"decline\"}),\", or \",/*#__PURE__*/e(\"em\",{children:\"review\"}),\" an application.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI-powered KYC fraud detection\"}),\" technology goes further ahead in allowing organizations to spot suspicious KYC patterns without the need for human intervention.\\xa0This is particularly useful in presence of huge amounts of data, where even the most eagle-eyed KYC analysts would fail to spot discrepancies.\\xa0Of course, AI isn\u2019t sophisticated enough to perform full compliance analysis, but it\u2019s certainly a step in the right direction for organizations looking to save time and resources uncovering potential risks.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Compliance with regulatory requirements for KYC\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations must comply with a variety of regulatory requirements when it comes to KYC fraud detection. This includes laws such as the Bank Secrecy Act (BSA), which requires organizations to maintain customer identity and transaction records; Anti-Money Laundering (AML) regulations, which call for enhanced due diligence measures when evaluating potential risks associated with customers; and Know Your Customer (KYC) guidelines, which require organizations to verify customer identity before allowing access to services or products. Organizations must also adhere to privacy laws that protect the customer's personal information from unauthorized use or disclosure. By meeting these regulatory requirements, organizations can ensure that their customers are legitimate and their transactions are secure. Furthermore, it helps organizations meet applicable laws and internal guidelines by taking proactive steps to prevent money laundering and identify fraud. As such, organizations need to develop a robust KYC process to protect their customers and meet regulatory requirements.\"}),/*#__PURE__*/e(\"h2\",{children:\"A proactive and continuous KYC strategy is the cornerstone of successful KYC fraud detection\"}),/*#__PURE__*/e(\"p\",{children:\"KYC (Know Your Customer) and KYB (Know Your Business) are processes used by organizations to verify a customer\u2019s identity and assess the risk associated with the customer to protect themselves from fraud. KYC fraud detection is an important part of this process, as it involves verifying the customer\u2019s identity and monitoring transactions for any suspicious activities. It has many benefits, such as reducing the risk of losses due to fraud and money laundering, helping organizations meet regulatory requirements, and providing customers with a secure experience. When selecting a KYC fraud detection technology, organizations should consider factors like customer profiling, identity verification, dynamic KYC checks, risk scoring, and AI-powered analytics. Additionally, organizations must comply with the applicable laws and regulations to ensure their customers are legitimate and their transactions are secure. By doing so, they can prevent fraudulent activities in the financial system while providing a safe experience for their customers.\"})]});export const richText5=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credit decisioning software\"}),\" is leading a paradigm shift in the world of credit. Borrowers nowadays, regardless of their reasons for seeking out credit, want an effortless and rapid experience that caters to their individual needs.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, lenders are desperate for cutting-edge customer experiences that reduce abandonment during the loan application process while also optimizing customer satisfaction levels and profits.\"}),/*#__PURE__*/e(\"p\",{children:\"Unfortunately, legacy systems and infrastructure can make it difficult for lenders to provide a seamless digital borrowing experience. With the rise of artificial intelligence (AI) and real-time data analytics, online lending is becoming more automated than ever before!\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"In fact, the online lending platform market was valued at $ 7.04 Billion in 2022, and it\u2019s estimated to grow annually by 26.5% until 2030 - according to \",/*#__PURE__*/e(n,{href:\"https://www.grandviewresearch.com/industry-analysis/digital-lending-platform-market\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Grandview Research\"})}),\".\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"This means that disruption by innovation is well underway, with banks and fintechs making strategic decisions that will determine the winners of tomorrow.\"}),/*#__PURE__*/e(\"p\",{children:\"By choosing the right provider, lenders can improve customer satisfaction and boost revenue.\"}),/*#__PURE__*/e(\"p\",{children:\"But making the right choice is not so simple: that\u2019s why we\u2019ve written this guide to help you make the right decision by understanding how credit decisioning software works, what kind of use cases it can help you with, and how to choose \u201Cthe right one\u201D for your needs.\"}),/*#__PURE__*/t(\"p\",{children:[\"(We also happen to be a no-code credit decisioning platform that you can deploy quickly and easily for \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/solutions/instant-credit-decisioning\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"instant credit decisioning\"})}),\", but more on that later.)\"]}),/*#__PURE__*/e(\"p\",{children:\"This blog post will cover the following topics and explore how you can make smarter, faster decisions with credit decisioning engine:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"What is credit decisioning software?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"The benefits of using credit decisioning software\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"How credit decisioning software works: automated risk assessment and more\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Fuel efficient business growth with credit decisioning software\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Protect your business from fraud with credit decisioning software\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Find the right credit decisioning solution for your financial institution\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Conclusion: Credit decisioning software is the foundation of modern lending\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What is credit decisioning software?\"}),/*#__PURE__*/e(\"p\",{children:\"Credit decisioning software, also known as a credit decision engine, is a powerful tool used by financial institutions to determine the creditworthiness of potential customers. Lenders rely on this technology to make better decisions faster and with greater accuracy than manual processes, while also reducing operational costs.\"}),/*#__PURE__*/e(\"h2\",{children:\"Automated workflows, smarter decisions\"}),/*#__PURE__*/e(\"img\",{alt:\"credit decisioning flow\",className:\"framer-image\",height:\"627\",src:\"https://framerusercontent.com/images/W6uHiU2OiVc0tlPDjRX5WVnO1s8.jpg\",srcSet:\"https://framerusercontent.com/images/W6uHiU2OiVc0tlPDjRX5WVnO1s8.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/W6uHiU2OiVc0tlPDjRX5WVnO1s8.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/W6uHiU2OiVc0tlPDjRX5WVnO1s8.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/W6uHiU2OiVc0tlPDjRX5WVnO1s8.jpg 2400w\",style:{aspectRatio:\"2400 / 1254\"},width:\"1200\"}),/*#__PURE__*/e(\"p\",{children:\"Credit decisioning software uses sophisticated algorithms to analyze applicants' financial health, credit, and payment history, as well as other alternative data to accurately assess credit risk.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"It also features automated credit scoring, data verification, and fraud detection capabilities to ensure reliable results. With the help of this technology, lenders can offer more competitive payment terms, and make better loan approvals for their customers - while controlling risk and fraud.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, It also enables lenders to optimize lending parameters to fit their credit policies as the risk profile and goals of the business evolve. Some other key features of modern credit decisioning platforms include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Automates the collection of data that underpins loan approvals, such as that of credit bureaus and third-party sources.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Automates the collection and analysis of alternative data such as bank and accounting information\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Offers out-of-the-box capabilities to define credit models\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Case management tools to speed up manual reviews\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Enables the use of advanced real-time data analytics and Machine Learning (ML) to discover new parameters for credit models.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By investing in the right solution for your bank or financial institution, you can realize a host of advantages that will increase approvals while reducing risk. So let\u2019s take a closer look at how credit decisioning software works and what it can provide.\"}),/*#__PURE__*/e(\"h2\",{children:\"The benefits of using credit decisioning software\"}),/*#__PURE__*/e(\"img\",{alt:\"credit decisioning software benefits\",className:\"framer-image\",height:\"627\",src:\"https://framerusercontent.com/images/ikThJgFgHPZ50bkz8M9uRWwh0bY.jpg\",srcSet:\"https://framerusercontent.com/images/ikThJgFgHPZ50bkz8M9uRWwh0bY.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/ikThJgFgHPZ50bkz8M9uRWwh0bY.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/ikThJgFgHPZ50bkz8M9uRWwh0bY.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/ikThJgFgHPZ50bkz8M9uRWwh0bY.jpg 2400w\",style:{aspectRatio:\"2400 / 1254\"},width:\"1200\"}),/*#__PURE__*/e(\"p\",{children:\"There are numerous advantages to using credit decisioning software for modern-day lending. Here are the main benefits they offer:\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Seamless borrowing experience\"}),/*#__PURE__*/e(\"p\",{children:\"By automating much of the lending process, you can offer a seamless experience for your borrowers. Instead of manually verifying applicants and their financial statements, for example, you can automate the process by connecting different providers in a decisioning flow to automatically make decisions in a matter of minutes.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"At Oscilar, we provide not just credit-bureau data, but over 100 alternative data sources as well to instantly give you a 360-degree view of your customers.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Increasing the accuracy of credit decisions\"}),/*#__PURE__*/e(\"p\",{children:\"With the use of the right software, credit scoring can become more accurate. By aggregating data from multiple sources, analyzing it, and using ML models, a platform can identify patterns that humans would not be able to detect. This allows for a more comprehensive assessment & control of credit risk and leads to more accurate decisions.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Personalized credit decisions\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to being more accurate, credit decisions made with credit decisioning software can also be more personalized.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By taking into account factors such as:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Income\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Employment history\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Spending habits\"})})]}),/*#__PURE__*/e(\"p\",{children:\"you can provide more tailored decisions that are specific to the borrower, leading to a better customer experience and increasing satisfaction with the credit product.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Faster lending decisions\"}),/*#__PURE__*/e(\"p\",{children:\"By automating the gathering and analysis of data, you can make a credit decision in a matter of seconds or minutes, rather than days or weeks: this is instant decisioning.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Instead of working with third-party data sources and spending engineering resources to bring them all under one hood, decisioning platforms like Oscilar combine everything into one view, allowing analysts themselves to create & deploy rules themselves.\"}),/*#__PURE__*/e(\"p\",{children:\"The value is of course that you can capture value that otherwise would have been lost due to customer churn.\"}),/*#__PURE__*/e(\"h3\",{children:\"5. Reduced cost of loan originations\"}),/*#__PURE__*/t(\"p\",{children:[\"AI-powered credit scoring can reduce the cost of loan origination by up to \",/*#__PURE__*/e(n,{href:\"https://www.mckinsey.com/business-functions/risk/how-we-help-clients/impact-stories/digitizing-credit-risk-trims-costs-and-delights-customers\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"40%\"})}),\" and reduce the cost of decisions on low-complexity cases.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Also, lenders can scale their operations to new geographies and higher volumes with a marginal increase in human workforce capacity.\"}),/*#__PURE__*/e(\"h2\",{children:\"How credit decisioning software works: automated risk assessment and more\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"337\",src:\"https://framerusercontent.com/images/VUF7qXBSmFvPyZvMk7IzkoSRIM.gif\",srcSet:\"https://framerusercontent.com/images/VUF7qXBSmFvPyZvMk7IzkoSRIM.gif?scale-down-to=512 512w,https://framerusercontent.com/images/VUF7qXBSmFvPyZvMk7IzkoSRIM.gif?scale-down-to=1024 1024w,https://framerusercontent.com/images/VUF7qXBSmFvPyZvMk7IzkoSRIM.gif 1360w\",style:{aspectRatio:\"1360 / 674\"},width:\"680\"}),/*#__PURE__*/e(\"p\",{children:\"Credit decisioning software automates the risk assessment process by analyzing applicants' financial data, payment and credit history to determine their creditworthiness. The tool ingests and processes credit risk data from credit bureaus and external data sources, as well as, income and cash flow data and runs credit models on a combination of these signals.\"}),/*#__PURE__*/e(\"p\",{children:\"Advanced credit decisioning software uses predictive analytics to identify potential risks, such as defaulting on repayment or committing fraud.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, you can detect discrepancies in submitted applications and carry out automated credit scoring to make sure the results are reliable and accurate.\"}),/*#__PURE__*/t(\"p\",{children:[\"Credit decisioning software also monitors creditworthiness throughout the customer lifecycle, allowing lenders to update their risk assessment as needed. This ensures that they can make informed decisions based on up-to-date information about borrowers and minimize their exposure to potential losses, streamlining the \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/solutions/instant-credit-decisioning\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"credit underwriting process\"})}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"Fuel efficient growth with a credit decisioning engine\"}),/*#__PURE__*/e(\"p\",{children:\"One of the biggest advantages of a credit decisioning engine is its ability to optimize: save time, resources, and costs - improving lenders' bottom line.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By automating the risk assessment process, this technology eliminates manual labor associated with reviewing applications, reducing operational costs and boosting efficiency.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, decisioning software helps to protect lenders from potential losses due to fraud or non-repayment of debt.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Finally, using credit decisioning software that can analyze alternative data sources can boost revenue by using additional risk and enabling inclusive lending practices.\"}),/*#__PURE__*/e(\"p\",{children:\"Overall, decisioning processes and software can significantly improve the lending process for both lenders and consumers by providing faster decisions with greater accuracy and lower costs.\"}),/*#__PURE__*/e(\"h2\",{children:\"Protect your business from fraud with credit decisioning software\"}),/*#__PURE__*/e(\"p\",{children:\"Credit decisioning software helps financial institutions protect themselves from potential losses due to fraud or non-repayment of debt. A good solution can detect potential signs of fraudulent activity in applications such as identity theft, false information, duplicate profiles, and other suspicious behaviors.\"}),/*#__PURE__*/e(\"p\",{children:\"You can also conduct automated credit checks to verify the accuracy of information provided by customers before they are approved for a loan or line of credit.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By using an integrated fraud and credit risk management platform to both underwrite and detect and prevent fraudulent activity, lenders can minimize their exposure and protect their businesses from potential losses.\"}),/*#__PURE__*/e(\"h2\",{children:\"Find the right credit decisioning software for your financial institution\"}),/*#__PURE__*/t(\"p\",{children:[\"When lenders are looking for credit decisioning software, certain features and capabilities are essential. Here are a few things to look for in a credit \",/*#__PURE__*/e(n,{href:\"https://oscilar.com/blog/decisioning-engine\",motionChild:!0,nodeId:\"LW0fAVOt9\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"decisioning engine\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Real-time decisions\"}),/*#__PURE__*/t(\"p\",{children:[\"The ability to make a \",/*#__PURE__*/e(\"strong\",{children:\"real-time\"}),\" credit decision is critical. By aggregating the right data sources and automating the application of the right credit models, lenders can now make credit decisions in real-time.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Custom decisioning process\"}),/*#__PURE__*/t(\"p\",{children:[\"The ability to \",/*#__PURE__*/e(\"strong\",{children:\"customize\"}),\" the decisioning process. Good engines should allow lenders to customize the workflows to fit their specific needs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Ease of use\"}),/*#__PURE__*/t(\"p\",{children:[\"The platform should be \",/*#__PURE__*/e(\"strong\",{children:\"easy to use\"}),\" and navigate so that lenders can get up and running quickly, as well as, reduce dependence on engineering resources.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Data aggregation & Machine Learning support\"}),/*#__PURE__*/t(\"p\",{children:[\"The platform should allow \",/*#__PURE__*/e(\"strong\",{children:\"aggregating data\"}),\" from multiple sources, analyzing it, and using ML models that can identify patterns that humans would not be able to detect.\"]}),/*#__PURE__*/e(\"h3\",{children:\"No-code, API-first\"}),/*#__PURE__*/t(\"p\",{children:[\"The platform should be able to integrate with a lender\u2019s existing systems and infrastructure so that they can continue to use their existing tools and processes. An \",/*#__PURE__*/e(\"strong\",{children:\"API-first and no-code platform\"}),\" is best positioned to allow that flexibility of integration.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Credit model variety\"}),/*#__PURE__*/t(\"p\",{children:[\"The platform should offer a \",/*#__PURE__*/e(\"strong\",{children:\"variety of credit models\"}),\" so that lenders can choose the one that best fits their needs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Scalability\"}),/*#__PURE__*/t(\"p\",{children:[\"The platform should be able to handle a \",/*#__PURE__*/e(\"strong\",{children:\"high volume of transactions\"}),\" so that lenders can scale their business as needed.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Reliability\"}),/*#__PURE__*/t(\"p\",{children:[\"A 24x7 borrower experience requires credit decisioning software that offers high reliability, uptime, and \",/*#__PURE__*/e(\"strong\",{children:\"24x7 customer support\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Affordability\"}),/*#__PURE__*/t(\"p\",{children:[\"The platform should allow lenders to start small and \",/*#__PURE__*/e(\"strong\",{children:\"scale pricing\"}),\" as the lender experiences value from the credit decisioning engine.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Credit decisioning software is the foundation of modern lending\"}),/*#__PURE__*/e(\"p\",{children:\"Credit decisioning software is an invaluable tool for financial institutions that want to increase approvals and make faster, more informed credit decisions while also minimizing their risk exposure. Features such as automated credit scoring, data verification, fraud detection, and customizable workflows to fit the lender\u2019s needs are staples of a good provider.\"}),/*#__PURE__*/e(\"p\",{children:\"Finding the right provider for your bank or financial institution requires careful consideration of several factors. By looking for features such as:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Real-time instant decision-making ability\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Customization capabilities\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Easy UI\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"The ability to aggregate data and apply ML models\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Integration flexibility, out-of-the-box credit models\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Scalability and 24x7 customer support\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"You can ensure that you are selecting the best credit decisioning software for your organization.\"}),/*#__PURE__*/e(\"p\",{children:\"If you are curious about how such an engine looks and feels in action, consider scheduling a demo with us: we are more than happy to show you what\u2019s under the hood.\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,WAAwBE,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,upBAAupB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAmJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,imBAAimB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gYAAgY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,saAAsa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAA+Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2dAA2d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2XAAsX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wbAAwb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yhBAAyhB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+UAA+U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiEE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAA8T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+eAA+e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6vBAA6vB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mqBAAmqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kZAA6Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2UAA2U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2oBAA2oB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kbAAkb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qZAAqZ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAAkL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uYAAkY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,0JAA0J,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,mMAAyL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAA+M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iEAAiE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAA6O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAAyJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sTAAsT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iLAA8LA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,yLAAyL,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oaAAoa,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uRAAuR,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4HAA4H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2PAA2P,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2DE,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAE,4HAA4H,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwGE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,oDAAoD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kLAAkL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oLAAoL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gQAA6QE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,oKAAoK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,oPAAoP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,sKAAsK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4OAA4O,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,wHAAqIA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,2HAA2H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6GE,EAAEC,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,kNAAkN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,4RAA4R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+NAAuOE,EAAEC,EAAE,CAAC,KAAK,oMAAoM,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAE,SAAI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6OAAwO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6CAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sQAAmRE,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,4EAA4E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAmO,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,IAAI,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kSAA+SA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iRAAyRA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yNAAsOA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gOAA6OA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qQAAsQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mLAAgME,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,2BAA2B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6OAAwO,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,yBAAyB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gCAAwCA,EAAE,KAAK,CAAC,CAAC,EAAE,6BAAqCA,EAAE,KAAK,CAAC,CAAC,EAAE,yCAAiDA,EAAE,KAAK,CAAC,CAAC,EAAE,2BAAmCA,EAAE,KAAK,CAAC,CAAC,EAAE,oCAA+B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,sBAAmCE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,6BAAqCA,EAAE,KAAK,CAAC,CAAC,EAAE,oCAA4CA,EAAE,KAAK,CAAC,CAAC,EAAE,6CAAqDA,EAAE,KAAK,CAAC,CAAC,EAAE,qCAA6CA,EAAE,KAAK,CAAC,CAAC,EAAE,mCAA2CA,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAuB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qKAA6KE,EAAEC,EAAE,CAAC,KAAK,sIAAsI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,uBAAuB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,mCAAmC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,mJAAmJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0HAA0H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8EAA8E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,0MAA0M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,4IAA4I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,+BAA+B,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,slBAAslB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAmG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6uBAA6uB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4gBAA4gB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,keAAke,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uEAAuE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,80BAA80B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sdAAsd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yfAAyf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,idAA6b,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ipBAAipB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAoO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAA8P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsCE,EAAEC,EAAE,CAAC,KAAK,mHAAmH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,oGAA+F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wnCAAwnC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wqBAAwqB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sLAAmMA,EAAEC,EAAE,CAAC,KAAK,4KAA4K,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,sIAAsI,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8WAA8W,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,sGAA8GA,EAAEC,EAAE,CAAC,KAAK,mHAAmH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0zBAAqzB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,q/BAAq/B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uOAAoPE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,eAA4BA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,iPAAiP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yDAAsEE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,wuBAAqvBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAE,KAAkBA,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAE,QAAqBA,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAE,kBAAkB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,kfAAwe,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6jCAA6jC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oiCAA0hC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iKAAyKE,EAAEC,EAAE,CAAC,KAAK,sFAAsF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAA8Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0GAAuHE,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,0BAA0B,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAiQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,uCAAuC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2UAA2U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAA8P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8EAA2FE,EAAEC,EAAE,CAAC,KAAK,gJAAgJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2EAA2E,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kUAA+UE,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mEAAmE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2EAA2E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4JAAyKE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsCE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,oLAAoL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+BE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,qHAAqH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAuCE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uHAAuH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,+HAA+H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6KAAqLE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,iEAAiE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sDAAsD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6GAA0HE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wDAAqEE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iEAAiE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kXAA6W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAAsK,CAAC,CAAC,CAAC,CAAC,EACvjwIQ,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "__FramerMetadata__"]
}
