{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/id5obiNPw53UjP4YApfK/QPtN5VOj82ovW5nWaHK7/gLbbTC81W-7.js"],
  "sourcesContent": ["import{jsx as e,jsxs as i}from\"react/jsx-runtime\";import{Link as t}from\"framer\";import{motion as a}from\"framer-motion\";import*as n from\"react\";export const richText=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"To fully understand the impact of email list segmentation on your B2B marketing efforts, it\u2019s essential to measure the success of your strategy. By tracking specific performance metrics and continuously analyzing your data, you can determine how well your segmentation is working and identify areas for improvement.\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Metrics to Measure Segmentation Success\"}),/*#__PURE__*/e(\"p\",{children:\"There are several key performance indicators (KPIs) that provide insight into the effectiveness of your segmentation strategy. Here are the most important ones:\"}),/*#__PURE__*/e(\"h3\",{children:\"a) Open Rates\"}),/*#__PURE__*/e(\"p\",{children:\"Open rates are a basic yet powerful metric for evaluating the effectiveness of your email list segmentation. They show the percentage of recipients who opened your emails out of the total number of emails sent.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why It Matters:\"}),\" High open rates indicate that your subject lines are compelling and relevant to your segments, meaning you\u2019ve likely matched your content to their interests or needs. Conversely, low open rates can signal that your segmentation may not be specific enough, or that your subject lines aren\u2019t resonating with your audience.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benchmark:\"}),\" Average open rates for B2B marketing emails typically range between 15% and 25%. Segments that consistently underperform may need refinement, while segments with high open rates can provide insights into what resonates with your target audience.\"]}),/*#__PURE__*/e(\"h3\",{children:\"b) Click-Through Rates (CTR)\"}),/*#__PURE__*/e(\"p\",{children:\"CTR measures the percentage of recipients who clicked on a link in your email, providing a more specific indication of how well your segmented content resonates with your audience.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why It Matters:\"}),\" A high CTR means that your email content is engaging and relevant to your audience. Since list segmentation should result in more personalized and targeted emails, you should see an increase in CTR for well-segmented campaigns. Low CTRs may indicate that while the audience is interested enough to open the email, the content or call-to-action (CTA) is not compelling enough to engage them further.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benchmark:\"}),\" A good CTR for B2B email marketing generally falls between 2% and 5%. Higher CTRs indicate that your segmentation is successfully engaging your audience, while low CTRs may require changes in content or CTA alignment with each segment.\"]}),/*#__PURE__*/e(\"h3\",{children:\"c) Conversion Rates\"}),/*#__PURE__*/e(\"p\",{children:\"Conversion rates track how many email recipients take the desired action, such as signing up for a webinar, downloading a whitepaper, requesting a demo, or making a purchase.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why It Matters:\"}),\" This is the ultimate measure of success for any marketing strategy, as it directly impacts your revenue and business goals. The primary goal of email list segmentation is to drive more targeted messaging that leads to higher conversions. Tracking the conversion rate for each segment will help you understand which segments are performing best and which need further attention.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benchmark:\"}),\" Conversion rates vary greatly depending on the type of action you\u2019re asking your audience to take. For B2B, typical email conversion rates range from 1% to 5%. A high conversion rate indicates that your segmented emails are successfully moving leads through the funnel.\"]}),/*#__PURE__*/e(\"h3\",{children:\"d) Unsubscribe Rates\"}),/*#__PURE__*/e(\"p\",{children:\"Unsubscribe rates indicate the percentage of recipients who opted out of receiving your emails after a campaign.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why It Matters:\"}),\" A high unsubscribe rate could be a red flag that your segmentation is off-target. It may suggest that your content is not relevant to the segment or that the frequency of emails is too high for that particular group. Monitoring unsubscribe rates by segment allows you to quickly identify issues and take corrective action.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benchmark:\"}),\" A typical unsubscribe rate for B2B email marketing is around 0.1% to 0.3%. If your unsubscribe rate is higher for specific segments, it\u2019s worth reassessing the relevance and frequency of your emails for that group.\"]}),/*#__PURE__*/e(\"h3\",{children:\"e) Engagement Over Time\"}),/*#__PURE__*/e(\"p\",{children:\"Tracking engagement metrics over time, such as email opens, clicks, and conversions, will help you evaluate the long-term effectiveness of your segmentation strategy. Look for trends in how segments respond to ongoing campaigns.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why It Matters:\"}),\" Consistent engagement over time indicates that your segmentation is working, while drops in engagement may signal that you need to refresh your content or adjust your segmentation criteria.\"]}),/*#__PURE__*/e(\"h3\",{children:\"f) Revenue and Return on Investment (ROI)\"}),/*#__PURE__*/e(\"p\",{children:\"Ultimately, the success of your email list segmentation strategy can be measured by its impact on revenue. If your segmented campaigns are leading to higher conversions and contributing to increased sales, then your strategy is working. ROI calculations for email campaigns should include the cost of tools, labor, and data enrichment versus the revenue generated from those campaigns.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why It Matters:\"}),\" This is the ultimate test of whether your email segmentation strategy is delivering value to your business. If you can demonstrate a clear link between your segmentation efforts and revenue growth, you can justify continued investment in this area.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benchmark:\"}),\" There isn\u2019t a one-size-fits-all benchmark for ROI in email marketing, but many B2B companies aim for an ROI of 30:1 or higher for email campaigns. Tracking this across your segments will give you an understanding of which segments are the most profitable.\"]})]});export const richText1=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today\u2019s competitive B2B landscape, the ability to deliver personalized, relevant content to the right audience at the right time is essential for success. Email list segmentation is a powerful tool that allows marketers to achieve this by dividing their audience into meaningful segments based on demographics, behavior, and intent.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Long-Term Benefits of Email List Segmentation\"}),/*#__PURE__*/e(\"p\",{children:\"When implemented correctly, segmentation offers a wide range of long-term benefits, including:\"}),/*#__PURE__*/e(\"h3\",{children:\"a) Higher Engagement and Conversion Rates\"}),/*#__PURE__*/e(\"p\",{children:\"Segmentation ensures that your emails are relevant to each recipient, which naturally leads to higher engagement. Instead of sending generic content to your entire database, you can send personalized messages that address the specific needs and interests of each segment. This leads to higher open rates, click-through rates, and ultimately, higher conversion rates.\"}),/*#__PURE__*/e(\"h3\",{children:\"b) Improved Customer Relationships\"}),/*#__PURE__*/e(\"p\",{children:\"B2B buyers expect tailored communication that speaks to their unique pain points. By segmenting your email list and delivering personalized content, you\u2019re building stronger, more meaningful relationships with your prospects and customers. Over time, this fosters trust and loyalty, which are essential for long-term business success.\"}),/*#__PURE__*/e(\"h3\",{children:\"c) More Efficient Use of Resources\"}),/*#__PURE__*/e(\"p\",{children:\"Segmentation allows you to focus your marketing efforts on the prospects and customers who are most likely to engage and convert. This means you can allocate your resources more efficiently, spending more time and budget on high-value segments and less on lower-priority ones. In the long run, this leads to a higher return on investment (ROI) for your marketing efforts.\"}),/*#__PURE__*/e(\"h3\",{children:\"d) Greater Insight Into Your Audience\"}),/*#__PURE__*/e(\"p\",{children:\"One of the key benefits of list segmentation is the ability to gain deeper insights into your audience. By analyzing the performance of each segment, you can learn more about what motivates your prospects and customers, which in turn helps you refine your marketing strategy. Over time, this continuous learning process enables you to become more targeted and effective in your marketing efforts.\"}),/*#__PURE__*/e(\"h3\",{children:\"e) Enhanced Flexibility and Adaptability\"}),/*#__PURE__*/e(\"p\",{children:\"B2B markets are constantly evolving, and segmentation gives you the flexibility to adapt your strategy in response to changing conditions. Whether your customers\u2019 needs change, new competitors enter the market, or your business goals shift, segmentation allows you to quickly adjust your email campaigns to stay relevant and competitive.\"}),/*#__PURE__*/e(\"h3\",{children:\"f) Increased Revenue and Business Growth\"}),/*#__PURE__*/e(\"p\",{children:\"Ultimately, the goal of any marketing strategy is to drive revenue growth. By sending more targeted and personalized emails, segmentation helps you convert more leads into customers and increase the lifetime value of your existing customers. Over time, this contributes to sustained business growth and a stronger competitive position in the market.\"})]});export const richText2=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As technology continues to evolve, the future of email list segmentation will likely involve even more sophisticated tools and techniques. Artificial intelligence (AI) and machine learning (ML) are already beginning to play a role in automating segmentation processes, analyzing large data sets, and predicting customer behaviors. These technologies will make segmentation even more precise and personalized, enabling B2B marketers to deliver hyper-targeted content at scale.\"}),/*#__PURE__*/e(\"p\",{children:\"To stay ahead of the competition, it\u2019s important for B2B marketers to invest in data quality, segmentation tools, and ongoing optimization. By continuously refining your segmentation strategy and leveraging the latest technology, you can ensure that your email marketing remains effective, relevant, and profitable for years to come.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, email list segmentation is no longer just a \u201Cnice-to-have\u201D for B2B marketers\u2014it\u2019s a necessity for driving engagement, building relationships, and achieving long-term business growth. By taking the time to develop a thoughtful, data-driven segmentation strategy, you can create more personalized experiences for your audience.\"})]});export const richText3=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Capital markets allow buyers and sellers to engage in trade of financial securities like bonds, stocks, etc. The buying/selling is undertaken by participants such as individuals and institutions.\"}),/*#__PURE__*/e(\"p\",{children:\"The capital market consists of primary markets and secondary markets. Primary markets deal with trade of new issues of stocks and other securities, whereas the secondary market deals with the exchange of existing or previously-issued securities. Another important division in the capital market is made on the basis of the nature of security traded, i.e. stock market and bond market.\"}),/*#__PURE__*/e(\"p\",{children:\"The equity capital market (ECM) is broader than just the stock market because it covers a wider range of financial instruments and activities. These include the marketing and distribution and allocation of issues, initial public offerings (IPOs), private placements, derivatives trading, and book building. The main participants in the ECM are investment banks, broker-dealers, retail investors, venture capitalists, private equity firms, and angel investors.\"})]});export const richText4=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"It primarily means analyzing the company\u2019s financials, performing ratio analysis, financial modeling, and exploring scenarios with the objective of making a buy/sell stock investment recommendation. Equity Research analysts discuss their research and analysis in their equity research reports. Once equity research analysts have prepared the financial modeling and found the fair valuation of the company, they need to communicate this to their clients through Research Reports. It is intended to help an investor make a decision about the allocation of resources. This research report is very professional in nature and is prepared with a lot of caution.\"}),/*#__PURE__*/e(\"p\",{children:\"Financial modeling is the process of estimating the financial performance of a project or business by taking into account all relevant factors, growth and risk assumptions, and interpreting their impact. It enables the user to acquire a concise knowledge of all the variables involved in financial forecasting.\"}),/*#__PURE__*/e(\"p\",{children:\"Before investing in the stock market, capital market research needs to be undertaken. Research involves finding the companies and stock prices that would best suit the financial situation of the investor. The company profile and the size of the company are important parameters of stock market investment research.\"})]});export const richText5=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Companies constantly produce large amounts of information regarding their financial status, their success in business markets and their current investments. Much of this information is required for legal purposes, but it also provides necessary data for the stock market. Most investors do not have the time or resources to follow this massive amount of company information. Equity research analysts work to compile this data, along with relevant market information, to provide investors with useful recommendations.\"}),/*#__PURE__*/e(\"p\",{children:\"Capital market research is an essential activity for companies because it enables them to provide products and services that are useful for the targeted consumers. This approach enhances the profit making possibilities of companies, and should be done as early as possible.\"}),/*#__PURE__*/e(\"p\",{children:\"The companies can earn more dividends and at the same time minimize risks as a result of research on capital markets. One big advantage of capital market research is establishment of proper communication between the companies and the customers. The customer reactions to various services provided by the companies can be measured as a result of capital market research.\"}),/*#__PURE__*/e(\"p\",{children:\"The companies can thus do away with wrong policies and look to take the right steps. The companies can also locate the right opportunities through market research. The companies can also analyze whether they are making progress in the right direction. If the company undertakes capital market research before launching a new product or service then it stands a better chance of getting a good return. Risk minimization is another reason for undertaking capital market research.\"}),/*#__PURE__*/e(\"p\",{children:\"Through this research, the exact needs of the market and the general public can be gauged and the products and services can be made very demand oriented.\"}),/*#__PURE__*/e(\"p\",{children:\"Since data research and reporting is a valuable part when dealing in private and capital markets, we will be exploring these topics further in our upcoming blog articles.\"})]});export const richText6=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The life sciences industry is constantly innovating when it comes to research and development. Behind this lies the convergence of science and technology, leading to a new era of healthcare, and an unprecedented growth in innovation and change. Advances in research and digital technology will radically alter the experience for all stakeholders involved, drive better outcomes, and offer new opportunities in life science research. All this has propelled the industry forward.\"}),/*#__PURE__*/e(\"p\",{children:\"At the heart of science and technology is data, which is emerging as the new healthcare currency. Data is being used to generate insights, which are empowering life science companies to bring drugs to market faster. As regulatory barriers slowly break down, and the rate of collaboration increases, this is the best time for big data to play an important role and transform the next generation of healthcare. We know that this starts with robust data research, management of data and timely analytics.\"}),/*#__PURE__*/e(\"p\",{children:\"To keep pace with these changes, life science research companies need to have a sharper focus on data management, data strategy and analytics. This will help large research organisations innovate breakthroughs in R&D. It will also help pharma companies to personalise new product and service business models, through efficient use of new technologies like AI and ML, as well as to streamline and centralise processes across the organisation. This will improve performance and reduce costs, and bring value to the entire healthcare ecosystem.\"})]});export const richText7=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The life sciences industry has been seeing a lot of growth in research and innovation, because of breakthroughs in drug development, huge investments to launch new drugs, and advances in data computing systems.\"}),/*#__PURE__*/e(\"p\",{children:\"To put this into perspective, let\u2019s consider the clinical development trends for the last ten years. The number of assets in clinical development and investigational new drug applications (INDs) in 2020, have considerably gone up compared to 2010. The amount of investment in drug discovery and research and development has increased. Most importantly, life sciences companies are also transforming in the areas of data management, business intelligence, and analytical capabilities by adopting digital transformation, artificial intelligence (AI), machine learning (ML), NLP (Natural Processing Language), and automation.\"}),/*#__PURE__*/e(\"p\",{children:\"In the year 2019, life sciences companies, irrespective of their size, focused heavily on modernization of digitalization, cloud and IT infrastructure. Most of the large-scale life sciences organisations plan to move away from traditional technology-based solutions to cloud-based scalable solutions. Most of the top life sciences companies are scaling enterprise-grade IT infrastructure and cloud applications, which will lead to a sharper focus on data strategy, data management, analytics, AI, and automation.\"})]});export const richText8=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The life sciences industry has a clear and constant mission to develop and deliver products, services, and support offerings that improve the lives of customers, patients, communities, and employees. To that end, leaders must dedicate themselves to staying one step ahead of emerging life science technologies.\"}),/*#__PURE__*/e(\"p\",{children:\"Which life sciences technology trends have the most potential to affect your business, and how can you prepare for the digital journey ahead? In our future blogs, we will continue discussing innovations shaping the life sciences technology of the future, plus, discover key insights and actionable advice for life sciences leaders.\"}),/*#__PURE__*/e(\"p\",{children:\"We will explore various trends shaping technological innovation in the life sciences industry, as well as the level of impact they could have on the industry, and how organisations must be prepared to address them.\"}),/*#__PURE__*/e(\"p\",{children:\"It is our hope that this perspective can help forward-thinking life sciences organisations better understand the technological forces that spur innovation and confidently harness them to bring new solutions to life.\"}),/*#__PURE__*/e(\"p\",{children:\"Some pioneering life sciences companies are beginning to use clever outsourcing arrangements to quicken the pace of service expansion. They are also virtualizing big data, making it accessible and interoperable across extended supply networks.\"}),/*#__PURE__*/e(\"p\",{children:\"In upcoming articles, we will touch upon various other trends, and discuss them in detail, so that organisations in life science research can be fairly prepared and be at par with emerging trends that have potential to shape their businesses.\"})]});export const richText9=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Clinical research is responsible for much of the innovation that happens in medicine, and the pharma industry, but there are also many bottlenecks that come up at this stage. These innovations and bottlenecks eventually contribute to the availability and pricing of drugs. That\u2019s why actionable research and intelligence needs to be readily accessible.\"}),/*#__PURE__*/e(\"p\",{children:\"Accurate and timely research makes a difference to companies in the Health Information Technology sector; which includes companies owning information products, as well as the pharma and scientific community as a whole. The medical industry needs a single source of intelligence on clinical trials and pharmacovigilance, so that subscribers will have quick access to all the information they need.\"}),/*#__PURE__*/e(\"p\",{children:\"Let us see the different players involved in the landscape of clinical research, pharmacovigilance and drug safety reporting.\"}),/*#__PURE__*/e(\"p\",{children:\"There are Sponsors, Investigators or Investigative sites, CRO\u2019s and CRA\u2019s, Regulatory Bodies, Providers of Information Products, and Providers of Research Support Services. The information generated by investigators and researchers needs to be properly collated and interpreted, so that the medical community can release drugs and treatment procedures faster.\"})]});export const richText10=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"It is important for researchers, trial participants, regulators, and others acting in the best interest of patients to have access to clinical trial information, to advance medical understanding and progress. It\u2019s also important that this access works in ways that protects patient privacy, and follows regulations.\"})});export const richText11=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"A majority of healthcare institutions have started adopting electronic methods of data collection which has increased the use of cloud-based solutions, since it enables storing, use and analysis of patient information with ease. Cloud computing allows the processing of data from across the world, and not just from a single location. The medical industry now has access to numerous data pools from various research labs.\"})});export const richText12=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),\"Research support services can help reduce the cost to larger research companies in hiring and managing their own teams. It also allows them to expand their services at a faster pace. An entire team of domain experts works as your full time employees, sourcing data and drawing insight.\"]}),/*#__PURE__*/e(\"p\",{children:\"If you want the medical industry to really benefit from your information products, your data holds the answer. We know that research data is highly complex to deal with. At any point in the research process one has to deal with petabytes of data in different formats. Collating and analysing data from diverse sources to find common trends is not an easy process. Besides, there is also the issue of third party data and merging findings obtained from various sources and researchers.\"}),/*#__PURE__*/e(\"p\",{children:\"Fortunately, data information products fuelled by a continuous supply of validated intelligence, will help in merging disparate sources of data, and maintain high standards in drug safety. Large research companies can now easily incorporate data from a wide range of sources. All these features made easily available through support services, come together to make the research process easier to optimise, reducing costs and accelerating the rate of success.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h6\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Investing in clinical research support services can add value to information products. Having a support team can help make radical changes to your research products, and enable you to access insights at a faster rate than before.\"})]});export const richText13=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A well planned email can move your audience deeper into the sales funnel and turn them into subscribers. But when it comes to an email, overlooking the subject line, or mobile optimisation, segmentation, or GDPR rules could lead you to a low click through rate, which is the last thing you want.\"}),/*#__PURE__*/e(\"p\",{children:\"Emails can be informational or commercial. Informational emails rely heavily on content marketing, and are conducted by companies with content marketing teams, who create regular and high quality content to keep their subscribers engaged. Commercial or promotional emails are where marketers obtain a list of contacts who have opted-in to receive business or marketing messages like promotional offers etc, rather than newsletters or content.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some common mistakes made by a lot of marketers while sending commercial emails, that may lead to a low open rate, or dissatisfaction with the email content or frequency, resulting in a high unsubscribe rate, making the campaign ineffective.\"}),/*#__PURE__*/i(\"p\",{children:[\"Having an inappropriate subject line, like ones that are exaggerated or have clickbait are the main reason why recipients report marking emails as spam. Such subject lines can be misleading or create high expectations which are not met in the rest of the email.\",/*#__PURE__*/e(\"br\",{}),\"Almost 50% of email recipients open an email simply based on the subject line alone. Moreover, around 69% of email recipients also report emails as spam solely based on the subject line.\"]}),/*#__PURE__*/e(\"p\",{children:\"Therefore it is very important to personalise the email, avoid yelling at the readers by using all caps, keep the subject line professional, avoid hyped-up words, rather keep it crisp and simple.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"The next reason for low effectiveness is not segmenting the contacts on your list. Segmentation is necessary so you don\u2019t have to send the same email to all of your subscribers. Categories like geography, demographics, psychographic factors and behaviour are some broad categories for segmentation. This will ensure your emails are relevant to your subscribers.\"}),/*#__PURE__*/i(\"p\",{children:[\"A third reason for low email effectiveness is neglecting GDPR considerations.\",/*#__PURE__*/e(\"br\",{}),\"The GDPR laws that came into effect in late May 2018, have entirely changed the world of email marketing. GDPR standards make it obligatory for businesses to show proof that customers have opted in to receive marketing emails. These rules are mainly applicable to Europe, but countries all over the world have some form of equivalent data protection and privacy laws.\"]}),/*#__PURE__*/e(\"p\",{children:\"Following the GDPR, businesses must show proof that customers have opted in to receive marketing emails. By obtaining consent through single or double opt-in methods, companies can abide by these regulations, and still have successful email campaigns.\"}),/*#__PURE__*/e(\"p\",{children:\"Another mistake is failing to look professional. Most readers are rightfully sceptical of new websites and emails until they\u2019re proven safe and professional. Spelling and grammar are the first points to consider. Instead of attaching a pdf, it\u2019s better to add a link to download the pdf, if the user wants to. Unless your attachment is a pdf the reader specifically signed up to receive. Avoid keeping the language too casual. Avoid using cliche and sales heavy language, while making sure it\u2019s not very formal at the same time. The language has to be the right balance between professional and personal.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"Lastly, a mistake usually made is not optimising for mobile users, More than 50% of your readers will be reading your email on their mobile devices. If your email contains images, make sure the formatting for mobile devices is simple and clean, with images and text that are easily readable on a small screen, since mobile screens offer you very minimal real estate. So the text should have a readable size; the images, if any are clear, and there\u2019s enough of white space. Many readers may view emails with images turned off, so it\u2019s not a good idea to rely too heavily on them.\"}),/*#__PURE__*/e(\"p\",{children:\"Keeping these rules in mind, will help marketers achieve higher effectiveness on their email campaigns, by increasing the chances of users opening their emails, and also make them less likely to unsubscribe.\"})]});export const richText14=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Finding information about private companies is more time consuming and difficult since the primary source of information tends to be news stories, as they are not required to file financial statements. This calls for specialised teams of domain experts providing support services in sourcing and analysing financial data on such markets.\"}),/*#__PURE__*/e(\"p\",{children:\"Before we go into detail about private market research, let\u2019s take a look at a few foundational aspects of private markets, to get a better understanding of its complex working.\"}),/*#__PURE__*/e(\"p\",{children:\"Private markets are an alternative mode of private financing, away from public markets, in which funds and investors directly invest in private companies or engage in buyouts of such companies. As such, the private equity market is an important source of funds for start-up firms, firms in financial distress, and public firms seeking buyout financing. A private-equity investment will generally be made by a private-equity firm, a venture capital firm or an angel investor. Private equity is a major subset of a larger, more complex piece of the financial landscape known as the private markets. Private equity is an alternative asset class alongside real estate, venture capital, distressed securities and more.\"}),/*#__PURE__*/e(\"p\",{children:\"Private equity firms offer financial backing to private companies, and invest in their private equity through a number of associated investment strategies such as venture capital, growth capital, and leveraged buyout. They engage in a number of functions to ensure that they get a return on their investment. They need to raise capital from limited partners or from their own money to contribute to the fund. The equity firm will then perform due diligence when analysing potential companies for acquisition. They will also be involved in the management of the company by providing support and advice on strategy, financial management, and operations to improve the performance of the company. This will ensure that the eventual exit is profitable.\"}),/*#__PURE__*/e(\"p\",{children:\"This demonstrates a complex network of functions and activities carried out by private equity firms, which requires in-depth research and analytics, to extract insight.\"})]});export const richText15=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Private equity offers several advantages to companies and startups.\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It is favoured by companies because it allows them access to liquidity as an alternative to conventional financial mechanisms, such as high interest bank loans or listing on public markets.\"})})}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Certain forms of private equity, such as venture capital, also finance ideas and early stage companies.\"})})}),/*#__PURE__*/e(\"p\",{children:\"In the case of companies that are delisted, private equity financing can help such companies attempt unorthodox growth strategies away from the glare of public markets. Otherwise, the pressure of quarterly earnings dramatically reduces the time frame available to senior management to turn a company around or experiment with new ways to cut losses or make money.\\xa0\"})]});export const richText16=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Although the capital for private equity originally came from individual investors or corporations, in the 1970s, private equity became an asset class in which various institutional investors allocated capital in the hopes of achieving returns that exceed those possible in the public equity markets. Between 1980 and 1994, the amount of private equity outstanding rose from less than $5 billion to $100 billion.\"}),/*#__PURE__*/e(\"p\",{children:\"The growth of private equity is a classic example of the way organisational innovation, aided by regulatory and tax changes, can ignite activity in a particular market. In this case, the innovation was the widespread adoption of the limited partnership.\"}),/*#__PURE__*/e(\"p\",{children:\"Until the late 1970s, private equity investments were undertaken mainly by wealthy families, industrial corporations, and financial institutions that invested directly in issuing firms. Much of the investment since 1980, by contrast, has been undertaken by professional private equity managers on behalf of institutional investors.\"}),/*#__PURE__*/e(\"p\",{children:\"The growth of the private equity market has expanded access to outside equity capital for both classic start-up companies and established private companies.\"}),/*#__PURE__*/e(\"p\",{children:\"Sometimes, the equity firm may make negative decisions like closing down units that are not profitable or laying off workers to improve the company\u2019s profitability. As soon as the struggling company is up and running, the equity firm can choose to exit the investment by offering it for sale to another equity firm or to a strategic buyer. It can also exit the investment via an initial public offering.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"To conclude, in this article we have looked at the development and growth of private markets from a very broad viewpoint, and understood a bit about its structure and functioning. In future blogs we will delve more into the larger financial markets, and how in-depth research into the various financial markets can uncover insights for business growth.\"})]});export const richText17=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Data Intelligence is all about finding and discovering value in data. It refers to all the analytical tools and methods companies employ to form a better understanding of the information they collect to improve their services or investments. Data intelligence focuses on analysis and interaction with information in a meaningful way to promote better decision-making in the future. It transforms data and presents it in interactive dashboards, and reports to enable the discovery of actionable insight.\"}),/*#__PURE__*/e(\"p\",{children:\"Data intelligence is also the practice of using artificial intelligence and machine learning tools to analyze and transform massive datasets into intelligent data insights, which can then be used to improve services and investments. Intelligent data is a core component of big data, business intelligence and AI.\"}),/*#__PURE__*/e(\"p\",{children:\"The various disciplines in data intelligence focus on understanding data, uncovering alternative explanations, resolving issues, and analyzing historical data to predict future trends and improve decisions.\"}),/*#__PURE__*/e(\"p\",{children:\"Some industries with the greatest need for data intelligence include cybersecurity, finance, health, insurance, and law enforcement.\"})]});export const richText18=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Data Intelligence cleanses and transforms data into information that is valuable and relevant to business performance; enables businesses to identify patterns, make informed decisions, and adapt to new information; and incorporate advanced analytics techniques to enhance visualized prescriptive and predictive analytics.\"}),/*#__PURE__*/e(\"p\",{children:\"The application of data intelligence tools and techniques can help decision makers develop a better understanding of collected information with the goal of developing better business processes.\"})]});export const richText19=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A useful deployment of data intelligence is understanding a company\u2019s investment and its effectiveness. Companies can determine whether their investments are providing adequate returns or if they could be allocated elsewhere.\"}),/*#__PURE__*/e(\"p\",{children:\"In some companies operations may be performing adequately but not improving or experiencing growth. Here data intelligence can provide a way to optimize services and possibly reveal different approaches that may be more effective over the long run.\"})]});export const richText20=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Market intelligence helps us know what\u2019s happening in the market. It entails a lot of insights in terms of what the competition is doing, what your customers are doing, and in what direction the market as a whole is moving. This is what we refer to as market intelligence.\"}),/*#__PURE__*/e(\"p\",{children:\"Business intelligence is what we as a company do with this information, and how it\u2019s translated into our own company.\"}),/*#__PURE__*/e(\"p\",{children:\"From this point of view, market intelligence seems to be much broader, as you look at the whole spectrum. But if you take business intelligence, it is purely looking at the little impact on your company, not exploring so much into what\u2019s happening outside in the industry, with ur competition, or even with technology developers in your market.\"}),/*#__PURE__*/e(\"p\",{children:\"In many cases people associate business intelligence mainly with software or IT tools. But it is surely not an IT tool. It\u2019s about understanding what\u2019s happening in the market, and translating that into insight for your individual company. You might use an IT tool in this process, but it\u2019s not always necessary to have IT involved, since it is much broader and deeper. It is very much a human process.\"})]});export const richText21=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"It is possible for most people in the company to do it, but it\u2019s quite a daunting task. It takes a lot of time and effort to understand what your competition, customers and market as a whole is doing, and adapt that for your business area. Therefore having a dedicated team, depending on the size of your company will help to generate such intelligence.\"}),/*#__PURE__*/e(\"p\",{children:\"If this process is done with an in-house team, it would require investment of time and money in training them. Employees should be taught to widen their scope a little beyond their individual domains when it comes to dealing with information. The last aspect is the reporting and handling of this data, which helps make it actionable across the entire organisation.\"})]});export const richText22=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Pharmacovigilance, also known as PV, refers to drug safety. It is the science and activities relating to the detection, assessment, understanding and prevention of adverse effects or any other medicine/vaccine related problem. Pharmacovigilance plays a key role in the healthcare system through assessment, monitoring and discovery of interactions among drugs and their effects in humans. Increasing clinical trial costs and lengthening drug development timelines compel the biopharma industry to increase its outsourcing of clinical trials.\"}),/*#__PURE__*/e(\"p\",{children:\"Companies are seeking a variety of means with which to reduce costs, while increasing productivity. To aid scientists in the pharma industry, outsourcing organisations have sprung up at various levels of the research process. We have Contract research organizations (CROs) that are playing an ever-increasingly important role in the outsourcing of clinical research. Then there are secondary research companies who collate published information obtained through primary research.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Pharmacovigilance outsourcing refers to transfer of drug safety processes and functions to a third-party provider. These services are majorly outsourced by small and mid-sized pharmaceutical and biotechnology companies with an aim to save costs, and focus on the company\u2019s core activities. Such outsourcing can scale up pharmacovigilance (PV) activities. Pharmaceutical and biotech companies benefit from working with external partners to manage pharmacovigilance activities, thus giving rise to a growing trend of strategic partnering.\"}),/*#__PURE__*/e(\"p\",{children:\"The pharmacovigilance outsourcing market is projected to record a significant growth rate over the coming years owing to the increased efficiency and economies of scale. The potential benefits of pharmacovigilance outsourcing could drive substantial benefits for the organization such as increased business model & capacity flexibility, and enhancing on demand access to unique expertise, intellectual property as well as multidisciplinary knowledge.\"}),/*#__PURE__*/e(\"p\",{children:\"It also provides improved efficiencies and ROI, outsourcing also provides well-documented cost benefits, it also converts fixed resource costs into variable charges that are workload dependent. Lastly, it lessens the number of resources to manage, recruit, and train.\"}),/*#__PURE__*/i(\"p\",{children:[\"Increasing number of pharmaceutical companies outsourcing their PV activities to service providers such as contract research organizations (CROs) and business process outsourcing (BPOs) will further spur the pharmacovigilance outsourcing market share.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:\"Global pharmaceutical companies have found India to be a preferred destination for clinical trials because India\u2019s clinical research space and opportunities are very attractive.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Some of the advantages for clinical trials that India has as are as follows:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"High degree of compliance to international guidelines such as the International Conference on Harmonisation (ICH) / WHO Good Clinical Practice (ICH-GCP) and the regulations laid down by the US Food and Drug Administration.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Availability of well qualified, English speaking research professionals including physicians.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ongoing support and cooperation from the government.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Lower cost compared to the west.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increasing prevalence of illnesses common to both developed and developing countries.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Availability of good infrastructure.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes in Patent Laws since January 2005.\"})})]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"br\",{}),\"Some of the growth drivers responsible for the metamorphosis of Indian clinical research in the recent past are scientific feasibility, medical infrastructure, clinical trial experience, regulations, commercialization potential and cost competitiveness. India\u2019s existing favorable regulatory framework and regulations with international standards, increasing awareness of good clinical practice guidelines and its implementation by clinicians are some of the main reasons propelling the growth of clinical research in India.\"]})]});export const richText23=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"PV is absolutely crucial during the clinical research phase of drug development to ensure it is safe for distribution, but it is also vital to continuously monitor the drug. Post-market safety monitoring is the only way to get an accurate picture of a drug\u2019s safety and ensure adverse events are properly reported for review.\"}),/*#__PURE__*/e(\"p\",{children:\"Without Pharmacovigilance, there would be no way to assess the effectiveness of drugs in comparison to their side effects. Pharmacovigilance is designed to protect patients and enable the dissemination of knowledge amongst professionals to minimise the risk of adverse events.\"})]});export const richText24=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Outsourcing partners work side-by-side with research companies to establish goals and timelines, and with a mutual understanding that makes them an extension of the company.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"They have the experience, the skills and specific expertise to carry out extensive research and reporting.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The right cultural fit, or the compatibility and consistency of people and mission, is crucial to collaborative working. It means teamwork, trust, transparency and recurring business opportunities.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"They tend to be more focused organizations, and limit their expertise to a specialisation, and dedicate all of their skilled resources to providing quality in that area.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"They offer high-quality services, flexibility, and can respond quickly to client needs. They are laser focused on their area of expertise in research and reporting.\"})})]})});export const richText25=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Financial reporting refers to the financial results of an organization that are released to its stakeholders and the public, financial statements, which include the income statement, balance sheet, and statement of cash flows. The information is vital for management to make decisions about the company\u2019s future and provides information to capital providers like creditors and investors about the profitability and financial stability of the company. Financial reporting helps track the financial performance of a company on a regular basis with the help of various financial reports.\"})});export const richText26=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/i(\"p\",{children:[\"The objective of financial reporting is to track, analyse and report your business income. The purpose of these reports is to examine resource usage, cash flow, business performance and the financial health of the business. This helps you and your investors make informed decisions about how to manage the business. Financial reporting is a way of following standard accounting practices to give an accurate depiction of a company\u2019s finances, including:\",/*#__PURE__*/e(\"br\",{}),\"Revenues, Expenses, Profits, Capital, Cashflow.\"]})});export const richText27=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"They are relevance, reliability, objectivity, ability to be understood, comparability, realism, consistency, timeliness, economy of presentation, and completeness. The qualitative characteristics of financial reporting are very much important to the external users in making their economic decisions.\"})});export const richText28=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The typical components of financial reporting are: The financial statements \u2013 Balance Sheet, Profit & loss account, Cash flow statement & statement of changes in stockholders equity. The notes to financial statements. Quarterly & Annual reports (in case of listed companies).\"})});export const richText29=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Without financial reporting, it\u2019s difficult to understand how well a company is performing from a financial standpoint. In simple terms, a financial report is critical for understanding how much money you have, where the money is coming from, and where your money needs to go. Financial reporting is important for management to make informed business decisions based on facts of the company\u2019s financial health. A lot of the financial information in financial reports is required by law or by accounting standard practices. Financial reporting helps management communicate the past successes and future expectations of the business.\"})});export const richText30=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"figure\",{className:\"framer-table-wrapper\",children:/*#__PURE__*/e(\"table\",{children:/*#__PURE__*/e(\"tbody\",{children:/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Make Better Financial Decisions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tax Purposes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Showing Financial Condition\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Evaluating Operations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Examining Cash Flow\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decision-making, Planning and Forecasting\"})})]})}),/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compliance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sharing Shareholder Equity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Financial Transparency\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Manage Debt\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Mitigate Errors\"})})]})})]})})})})});export const richText31=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Financial analysis is nowadays considered as the main ingredient in business activity. Financial analytics is a concept that provides different views on the business\u2019 financial data. It helps give in-depth knowledge and take strategic actions against them to improve your business\u2019 overall performance. Financial reporting and analysis give investors, creditors, and other businesses an idea of the financial integrity and creditworthiness of your company. In today\u2019s data-driven world, analytics is critical for any business that wants to remain competitive. Financial analytics can help you understand your business\u2019 past and present performance and make strategic decisions. Financial analytics is a valuable tool that every organization, small and large, should use to manage and measure its progress.\"}),/*#__PURE__*/e(\"p\",{children:\"Financial analysis (also referred to as financial statement analysis or accounting analysis or Analysis of finance) refers to an assessment of the viability, stability, and profitability of a business, sub-business or project. It is performed by professionals who prepare reports using ratios and other techniques, that make use of information taken from financial statements and other reports. These reports are usually presented to top management as one of their bases in making business decisions. Financial analysis may determine if a business will:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Continue or discontinue its main operation or part of its business.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Make or purchase certain materials in the manufacture of its product.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Acquire or rent/lease certain machineries and equipment in the production of its goods.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Issue shares or negotiate for a bank loan to increase its working capital.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Make decisions regarding investing or lending capital.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Make other decisions that allow management to make an informed selection on various\\xa0\"})})]})]});export const richText32=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Getting your data enrichment done through an external team gives your company access to specialised skill sets that may not be available in-house. Many organisations experience significant benefits when they choose to outsource data enrichment. However, the success of data enrichment outsourcing often depends on understanding the various approaches that different vendors use. What processes do vendors employ when delivering outsourced data enrichment? How do they ensure data accuracy, provide scalability, and maintain cost-effectiveness?\"}),/*#__PURE__*/e(\"p\",{children:\"In this blog, we will explore the advantages of outsourcing data enrichment, guide you on selecting the right service provider, and provide insights to make your data enrichment and data cleansing outsourcing journey simpler and more effective.\"})]});export const richText33=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"1. Data Appending\"}),/*#__PURE__*/e(\"p\",{children:\"Data appending involves adding missing information to existing records to create a more complete customer database. This is a crucial part of data enrichment outsourcing services, as it helps enhance the value and utility of your data. Vendors utilise external data sources\u2014such as public databases, social media, or third-party providers\u2014to enrich customer profiles with relevant data. For example:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Appending:\"}),\" Adding missing email addresses to customer records.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phone Number Appending:\"}),\" Completing phone numbers to facilitate better communication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Demographic Appending:\"}),\" Enriching customer profiles with information like age, gender, income, and other demographic data.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"2. Data Cleansing Outsourcing\"}),/*#__PURE__*/e(\"p\",{children:\"Outsource data cleansing services to maintain a clean, high-quality database. Data cleansing outsourcing involves running comprehensive checks over your entire existing database, removing duplicates, correcting errors, and standardising formats. By outsourcing data cleansing services, vendors ensure your data\u2019s accuracy and reliability. Key data cleansing tasks include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Duplicate Removal:\"}),\" Identifying and merging duplicate records to reduce redundancy.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Address Standardisation:\"}),\" Formatting addresses consistently to ensure data uniformity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Validation:\"}),\" Verifying data against reliable sources to improve overall data accuracy.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"3. Data Integration\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"API Integration:\"}),\" Vendors can integrate their data enrichment services directly into your existing systems using APIs. This real-time integration helps you maintain up-to-date records without the need for manual intervention.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Batch Integration:\"}),\" Vendors can also use batch integration methods for data enrichment outsourcing services, which involves periodic processing where your data is enriched and returned as a complete, updated dataset. Batch integration is particularly beneficial when dealing with large data volumes.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"4. Automated Data Enrichment Tools\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/i(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Machine Learning Algorithms:\"}),\" Vendors leverage machine learning models to predict missing values and enrich data based on identifiable patterns. For instance:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Predictive lead scoring models\"}),\" help you prioritise your leads effectively.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer segmentation algorithms\"}),\" can be used to classify different types of customers, enhancing personalised marketing.\"]})})]})]}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Natural Language Processing (NLP):\"}),\" NLP techniques extract valuable insights from unstructured text data, such as social media posts, reviews, or emails. Examples include sentiment analysis, entity recognition, and topic modelling, which contribute to more effective data enrichment outsourcing.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"5. Manual Data Enrichment\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/i(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Human Review and Verification:\"}),\" Some data enrichment outsourcing services require a more manual approach to ensure the highest data accuracy. Vendors employ data analysts to manually verify and enrich records, providing value beyond automated solutions. Examples include:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Industry Classification:\"}),\" Assigning correct industry codes to companies ensures consistency.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Job Title Standardisation:\"}),\" Standardising job titles across your customer records to maintain data uniformity.\"]})})]})]})})]});export const richText34=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"All the processes mentioned above, such as data enrichment outsourcing services and data cleansing outsourcing, can be handled through complete software automation. Automated tools allow data companies to scale operations and achieve a reasonable level of accuracy. However, what these automated methods often lack is 100% data accuracy and the ability to customise results based on your unique business needs.\"}),/*#__PURE__*/e(\"p\",{children:\"To achieve truly complete and accurate results, as well as scalable solutions, the best option is to outsource data enrichment to a trusted research partner. Research partners excel at providing customised data services because they rely on teams of data experts who act as an extension of your company. These research experts work as dedicated full-time employees, ensuring high-quality, custom-tailored data enrichment.\"}),/*#__PURE__*/e(\"p\",{children:\"Working with outsourced data enrichment services through a research partner also brings specialised quality control and data verification teams. This ensures that data is secure, accurate, and effective in driving a strong return on investment (ROI). Customisation and expert human oversight make data enrichment outsourcing far more valuable, offering you both reliability and scalability that generic automation simply cannot match.\"})]});export const richText35=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1) Save Time, Drive Flexibility & Speed\"}),/*#__PURE__*/e(\"br\",{}),\"Speed is critical during the development stages of your products as well as during launches. However, without flexibility, speed is often meaningless. Many data enrichment outsourcing companies offer an initial test project, allowing you to outsource data enrichment services and evaluate the quality of their work before committing. This saves time and helps businesses adjust to rapid market demands while maintaining flexibility.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2) Reduced Costs\"}),/*#__PURE__*/e(\"br\",{}),\"One of the most prominent benefits when you outsource data enrichment is the reduction in labour and operational costs. By outsourcing, businesses can lower overhead expenses, as there is no need for significant infrastructure investment\u2014the vendor takes responsibility for these processes. Leveraging outsourced data enrichment services thus results in cost savings and operational efficiency.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3) Expertise\"}),/*#__PURE__*/e(\"br\",{}),\"Partnering with a data enrichment outsourcing provider gives businesses access to specialised expertise and the latest technologies. With outsourced data enrichment, you can access niche talent without incurring recruitment, training, or infrastructure costs. This assures the highest quality of enriched data, tailored specifically to your business needs.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4) Access to Latest/Niche Technology\"}),/*#__PURE__*/e(\"br\",{}),\"Reputed data enrichment outsourcing companies typically have access to the most advanced frameworks, tools, and niche technologies. By outsourcing data enrichment services, your business benefits from these state-of-the-art resources without needing to directly invest in them, allowing you to remain competitive and innovative.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5) Increased Efficiency\"}),/*#__PURE__*/e(\"br\",{}),\"A data enrichment outsourcing partner provides specialised skills and experience, resulting in increased productivity and efficiency for your business. By working with an outsourced team, you benefit from a focused approach to data quality that drives operational improvements.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"6) Reduced Risk\"}),/*#__PURE__*/e(\"br\",{}),\"Outsourcing data enrichment services helps mitigate a significant share of risk by sharing responsibilities with an experienced partner. This is especially beneficial during new product launches or when scaling services. Having a specialised, outsourced data cleansing team, for instance, allows you to quickly adjust to fluctuating demands compared to relying solely on internal resources.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"7) Staffing Flexibility\"}),/*#__PURE__*/e(\"br\",{}),\"For businesses with seasonal or cyclical demands, outsourced data enrichment provides valuable staffing flexibility. You can bring in additional resources when needed and scale down when they are no longer required, optimising both workforce efficiency and costs.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"8) Free-up Internal Resources\"}),/*#__PURE__*/e(\"br\",{}),\"Outsourced data enrichment services free up your internal team, allowing them to focus on core business activities. By shifting the focus away from routine data management, internal resources can drive growth initiatives, ultimately contributing to increased business success.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"9) Leverage Value Added Services\"}),/*#__PURE__*/e(\"br\",{}),\"Most data enrichment outsourcing companies offer a variety of additional services that can add considerable value to your business. These services help improve productivity and efficiency while also reducing costs and managing risks, particularly during periods of business challenges or crises.\"]})]});export const richText36=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Before deciding to outsource data enrichment services, it\u2019s essential as a marketing manager to gather specific information and make careful considerations. Below are the key factors to evaluate before choosing your data enrichment outsourcing provider:\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Current Data Quality Assessment\",/*#__PURE__*/e(\"br\",{})]}),\"Understand the present state of your company\u2019s data quality. Assess how accurate, complete, and up-to-date your current customer data is. This step helps identify the areas where outsourced data enrichment can provide the most value. By knowing which data fields are incomplete, you can plan targeted data enrichment outsourcing services to fill those gaps effectively.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Specific Data Enrichment Needs\",/*#__PURE__*/e(\"br\",{})]}),\"Determine exactly what types of data enrichment outsourcing services your business requires. This could include appending missing data fields, such as phone numbers and job titles, verifying existing records, or enriching data with additional attributes like demographics or firmographics. By clearly outlining your needs, you can ensure that the outsourced data enrichment partner tailors their services to your requirements.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Data Security and Compliance\",/*#__PURE__*/e(\"br\",{})]}),\"Ensure that the potential data enrichment outsourcing provider complies with relevant data security standards and industry regulations (e.g., GDPR, CCPA). It is crucial to obtain information about their data handling practices, security certifications, and adherence to compliance protocols. Proper data security ensures the protection of sensitive customer data during outsourced data enrichment.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Service Level Agreements (SLAs)\",/*#__PURE__*/e(\"br\",{})]}),\"Establish clear SLAs with the data enrichment outsourcing provider to define expectations around data accuracy, turnaround times, and resolution processes for any issues. Clear SLAs help ensure both parties understand the expected service level, fostering a productive outsourcing relationship.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Scalability and Flexibility\",/*#__PURE__*/e(\"br\",{})]}),\"Evaluate whether the outsourcing provider can scale services to meet your evolving data needs. Can they handle large fluctuations in data volume? Flexible outsourced data enrichment services are critical for adapting to changing market conditions and business growth.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Quality Assurance Processes\",/*#__PURE__*/e(\"br\",{})]}),\"Understand the quality control measures employed by the data enrichment outsourcing provider. Verify how they ensure the accuracy and reliability of enriched data before it is integrated into your systems. Effective quality assurance guarantees that your outsourced data enrichment services add real value without compromising data integrity.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Cost and ROI Analysis\",/*#__PURE__*/e(\"br\",{})]}),\"Conduct a cost-benefit analysis to compare the financial implications of outsourcing data enrichment services versus managing them internally. Consider the direct costs and the potential savings in time and resources. This analysis will help determine whether outsourcing data enrichment contributes to a positive return on investment (ROI) for your business.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 References and Reputation\",/*#__PURE__*/e(\"br\",{})]}),\"Seek references from other companies that have used the same outsourcing provider for similar services. Research their industry reputation and gather feedback from existing clients. A data enrichment outsourcing partner with a proven track record is more likely to meet your expectations and deliver high-quality results.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Integration with Existing Systems\",/*#__PURE__*/e(\"br\",{})]}),\"Ensure the enriched data can be smoothly integrated with your company\u2019s existing CRM or marketing automation systems. Discuss any potential integration challenges with the data enrichment outsourcing services provider to prevent future issues and to streamline the onboarding process.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"\u2022 Long-term Strategic Alignment\",/*#__PURE__*/e(\"br\",{})]}),\"Evaluate how outsourcing data enrichment services fits into your company\u2019s long-term strategic goals. Can the outsourced provider support future growth initiatives and adapt to changes in your business environment? A good fit means that the partnership will not only meet current needs but also contribute to future success.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"By gathering this information and carefully considering these factors, you can make an informed decision about whether outsourcing data enrichment and data cleansing services aligns with your company\u2019s goals and delivers maximum value.\"})})]});export const richText37=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1) Loss of Control in the Operations Process:\"}),/*#__PURE__*/e(\"br\",{}),\"One of the primary reasons companies choose to outsource data enrichment services is to transfer the operational burden to a skilled third-party team. This arrangement can be highly effective when the outsourcing vendor involves domain experts who efficiently manage the operations, reducing the need for constant client oversight. This approach can free up your company\u2019s resources, allowing your internal teams to focus on their core expertise.\"]}),/*#__PURE__*/e(\"p\",{children:\"However, outsourcing data processes without proper oversight can pose risks. Specifically, the methods used for data sourcing and privacy considerations must be meticulously managed. If these elements are neglected, the damage to your company\u2019s reputation could be significant, and in severe cases, legal liabilities could arise due to the actions of the outsourcing data enrichment provider. To mitigate these risks, it is crucial to establish clear terms and conditions in the outsourcing contract, focusing on compliance and operational standards.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2) Loss of Control in Quality Standards:\"}),/*#__PURE__*/e(\"br\",{}),\"Not all vendors prioritise quality, which can lead to challenges in maintaining data integrity. While setting up targets and conducting reviews is important, companies must also ensure that the data enrichment outsourcing provider has robust quality control processes. These processes are essential to guarantee that both parties meet their goals, with reliable outcomes throughout the outsourcing exercise.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3) Hidden Costs\"}),/*#__PURE__*/e(\"br\",{}),\"While outsourcing data enrichment services is often pursued for cost-saving benefits, hidden costs can sometimes emerge. To prevent unexpected expenses, the outsourcing contract must explicitly define the services provided and cover all associated costs, ensuring transparency and eliminating surprises.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4) Threat to Security\"}),/*#__PURE__*/e(\"br\",{}),\"Sharing sensitive company data with an outsourcing provider can create vulnerabilities. When confidential information is part of the outsourced data enrichment process, there is a potential risk of data breaches or unauthorised use. It is crucial to carefully evaluate the security protocols of the outsourcing provider to ensure the safety and confidentiality of your company\u2019s data, adhering strictly to industry standards and privacy laws like GDPR.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/i(\"strong\",{children:[\"5) Lack of Transparency\",/*#__PURE__*/e(\"br\",{})]}),\"Lack of visibility into outsourced functions can lead to significant problems with transparency. To avoid these issues, there must be strong communication channels between your company and the outsourced data enrichment vendor. Effective training of the vendor\u2019s team, combined with regular reporting and clear documentation, is necessary to maintain transparency and ensure all parties are on the same page throughout the data enrichment process.\"]})]});export const richText38=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:\"The Importance of Choosing the Right Data Enrichment Partner\"}),/*#__PURE__*/e(\"p\",{children:\"While outsourcing data enrichment presents many advantages, it can also introduce challenges if not managed correctly, or if entrusted to the wrong third-party provider. The risks, such as loss of control, hidden costs, and data security threats, can be minimised by establishing a strong outsourcing contract with well-defined Service Level Agreements (SLAs), timeframes, regular reviews, and clearly outlined exit strategies.\"}),/*#__PURE__*/e(\"p\",{children:\"However, more important than the contract itself is the choice of a reliable vendor\u2014one that shares accountability and prioritises your business success. This is where customised data research from a trusted partner becomes essential. Companies that work as an extended team with their clients can deliver tailored solutions that directly impact your ROI.\"}),/*#__PURE__*/e(\"p\",{children:\"A custom data research team understands that your data must be accurate, secure, and customised to your needs. This means the data you receive belongs solely to your company, giving you exclusive rights and a competitive edge. By partnering with an extended data enrichment outsourcing team, you benefit from shared responsibility, operational peace of mind, and compliance with privacy laws such as GDPR.\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing the right data enrichment outsourcing partner can ensure quality, efficiency, and secure data practices\u2014all of which are crucial for driving growth and staying competitive in today\u2019s data-driven landscape.\"})]});export const richText39=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Almost every organisation today owns databases of customer or client information that is used for client relationship management. This information is also used to aid operational, marketing and sales processes. Any activity that involves the use and storage of data, like customer relationship management, marketing automation, customer service, or analytics, all need regular data hygiene processes to be carried out. Although data hygiene is a critical step while carrying out marketing and sales activities, it is often overlooked in most organisations.\"})});export const richText40=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Data hygiene is the practice of keeping a database clean and accurate by taking steps to ensure its integrity. It involves regular data cleaning, validating, and updating to make sure that it is accurate, up-to-date, complete, consistent, and reliable. This helps organisations avoid costly errors such as incorrect information on customer records or inaccurate segmentation of target audiences.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Why is email list cleaning important?\"}),/*#__PURE__*/e(\"p\",{children:\"Have you checked your email open rates and click through rates after running your last email campaign? These are very important to know if your database needs cleansing. If there is a decline in these metrics, you may have a lot of stale contact information in your database. You also need to keep an eye on the number of emails that were unsubscribed to, and how many recipients marked your emails as spam. This is called email list churn or subscribers who bounce, report you as spam, or never even open your emails. When the email list churn is high, it\u2019s very likely that your target audience is not being converted to customers. These are clear signs that it\u2019s the right time for email list cleaning.\"}),/*#__PURE__*/e(\"p\",{children:\"When your marketing database becomes unhealthy, you end up wasting time, effort and revenue marketing to the wrong audience.\"}),/*#__PURE__*/i(\"p\",{children:[\"Data cleansing is the first step in maintaining the hygiene of your database. Data cleaning involves regularly updating your email contact list by cleaning out inactive and outdated contacts. The goal is to avoid email churn, ensure more effective interactions with contacts and thus improve the overall effectiveness of your email campaign.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"h3\",{children:\"How to identify records that need email list cleaning?\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check for those contacts on your list that do not open your emails, and remove them from your list. Check for syntax errors, typos, extra spaces or unsupported characters within words. This is best done by a data provider, or a software.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Secondly, check for misplaced data which is data that has been entered into the wrong field, or missing data which is data fields that have been left empty. Check also for duplicate data which is identical data that has been entered more than once into your database. And lastly, inconsistent data that conflicts or differs across multiple databases. All these are examples of stale records that need data cleaning.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Determine low activity subscribers or those that do not open your emails often, and move them to a separate list that receives less marketing communications.\"})}),/*#__PURE__*/i(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/e(\"p\",{children:\"When email bounces occur, they can be of two types- soft and hard bounces. Soft bounces mean your emails can\u2019t be delivered due to temporary reasons, such as the server being down or too busy, or large email size. Hard bounces occur when your emails get rejected due to permanent reasons, such as invalid addresses, recipients blocking your emails, etc.\"}),/*#__PURE__*/e(\"p\",{children:\"During the email list cleaning process, you will have to get rid of the hard-bounced email addresses, and stop mailing soft-bounced addresses until the issue is solved.\"})]})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Email list validation and email verification\"}),/*#__PURE__*/e(\"p\",{children:\"The process of email address validation involves a series of checks which highlight nonexistent or undeliverable addresses in lists. Email list validation involves checking email syntax, email address format, and structure of an email address to ensure it is correctly entered and follows the standard rules. The primary goal is to identify typos, misspellings, or formatting errors that can make an email address \u201Cinvalid\u201D. It also involves deduplication or removing duplicate email addresses.\"}),/*#__PURE__*/e(\"p\",{children:\"You can use email list validation techniques to scan your existing email lists for errors, keep only the ones that are real and engaged, and make sure that any new email addresses that flow into your database are verified.\"}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, email address verification goes beyond syntax and format checks. It involves a more in-depth verification process to determine the deliverability of an email address. Email list verification is a set of steps that confirm if an email address exists, if it is non-toxic, and if emails can be delivered. It includes checking the DNS records, and simulating sending an email without actually delivering it. The purpose is to validate the existence of the email address beyond its format and ensure it can receive messages.\"}),/*#__PURE__*/e(\"p\",{children:\"Email list verification uses a prominent mail transfer protocol called SMTP (Simple Mail Transfer Protocol) to check if the user\u2019s email address is invalid or non-working. It does this without sending actual emails to that recipient address, but by pinging the SMTP server and analysing its response code.\"}),/*#__PURE__*/e(\"p\",{children:\"Although this is a simple approach, there is an overhead involved with SMTP, and email servers often behave unexpectedly. Therefore, you need to choose a reliable email verification provider or software.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Email Validation V/s Email Verification \u2014 Are They Same?\"}),/*#__PURE__*/e(\"p\",{children:\"Even though both functions are very similar and ensure the accuracy and quality of your email lists, email list validation and email verification are two different processes.\"}),/*#__PURE__*/e(\"p\",{children:\"Together these processes constitute data hygiene and help organisations comply with data privacy regulations and laws, especially those related to consumer data protection. It helps organisations protect themselves from malicious activities like identity theft or fraud.\"})]});export const richText41=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"When databases contain inaccurate or incomplete data, marketing campaigns can turn out to be costly. Messages that are sent to an outdated list of contacts will not only fail to generate new leads, but they can damage brand reputation. On the flip side, having clean data helps ensure targeted emails reach the right people, who are more likely to become customers.\"}),/*#__PURE__*/e(\"p\",{children:\"15.8% of all emails go missing or have been caught by popular spam filters, i.e., one in ten emails either get lost in the spam folder or blocked by the email service provider. This can hurt your email campaign performance, reputation, and revenue. (Emailtooltester.com)\"}),/*#__PURE__*/e(\"p\",{children:\"If your email list contains invalid, outdated, or fake email addresses, you are likely to face high bounce rates, spam complaints, and low engagement. That\u2019s why email validation is essential for maintaining good data quality of your lists and good campaign performance.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"When email validation, email verification and data cleansing are implemented properly, it leads to high quality databases and campaign performance. Here\u2019s how\u2026\"})]});export const richText42=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:\"Removes emails that degrade your email list quality\"}),/*#__PURE__*/e(\"p\",{children:\"The main function of email address verification is stopping invalid & bad email addresses (disposables, spam traps, blacklisted, catch-alls, etc) from entering and degrading the quality of your email lists.\"}),/*#__PURE__*/e(\"p\",{children:\"With proper email validation, you ensure that your sales teams and email campaigns are running on accurate data leading to further benefits.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Minimising bounce rates\"}),/*#__PURE__*/e(\"p\",{children:\"Email address verification lets you know which email addresses are incorrect, undeliverable, role-based, accept-all, and so on. With this knowledge in hand, you can know which addresses to discard and prevent email bounces.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Solves low deliverability issues\"}),/*#__PURE__*/e(\"p\",{children:\"If you have low deliverability and you don\u2019t take measures to fix it, ISPs think of you as a spammer. This leads to more and more of your emails landing in the spam folder, even for your engaged recipients.\"}),/*#__PURE__*/e(\"p\",{children:\"The best way to solve the deliverability issue is with proper email address validation and verification methods. When you reduce bounces and gain your ISP\u2019s trust, you achieve better deliverability.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Reduces the chances of being blacklisted\"}),/*#__PURE__*/e(\"p\",{children:\"The likelihood that your account would be blacklisted increases the more hard bounces you receive or in case you land into a spam trap. This will also occur if you have very low engagement, and your email list contains invalid email addresses. Your subsequent emails are very likely to be delivered to spam.\"}),/*#__PURE__*/e(\"p\",{children:\"You lower these risks by authenticating the email addresses on your list.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Saves resources being spent on chasing invalid leads\"}),/*#__PURE__*/e(\"p\",{children:\"Many email address verification providers charge based on the number of contact records on your list. You may end up paying a larger subscription fee if your list is bloated with hundreds of invalid email addresses.\"}),/*#__PURE__*/e(\"p\",{children:\"Maintaining a valid and clean email list and avoiding subscription fees are both made possible by running an email validation.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Increases email campaign ROI\"}),/*#__PURE__*/e(\"p\",{children:\"Email address validation allows you to create and send out targeted email campaigns. By sending fewer and more precise emails, your campaign expenditure decreases, while your chances of deliverability and engaging the receiver increases.\"}),/*#__PURE__*/e(\"p\",{children:\"So, with email address verification, your resources are being used more effectively, your expenses decrease, and your revenues most likely increase. This increases your ROI, for every dollar you invest.\"})]});export const richText43=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"After email verification, we can go a step further and ensure consent as well. This is known as double opt-in, which is a part of consent based marketing. It is another effective method for determining whether an email is valid and whether the domain exists. In this method, a confirmation email is sent to the provided email address, and the user then confirms their email address to sign up.\"}),/*#__PURE__*/e(\"p\",{children:\"At Ascentrik Research we use our proprietary email validation tool, as well as the single and double opt in method to capture user consent. This allows you to capture high-quality leads, resulting in increased deliverability, open rates and conversion rates.\"})]});export const richText44=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"For many businesses email marketing is their primary advertising campaign, because it\u2019s a great method of advertising your business online and reaching a global audience. Besides, it is very cost effective. A well planned email marketing campaign can significantly boost ROI. However, besides planning the content and strategy of your emails, it is important to consider the factors that are eventually going to affect the deliverability of your email campaign. These factors are closely related to the quality of your email list. This quality determines if your mail will be delivered, opened, and read, or simply discarded as spam.Spam plays a dominant role in email deliverability. Avoiding spam filters is an important part of maximising the opens, clicks, and sales you get from your email campaigns. In order to protect their users, email providers like gmail, outlook and yahoo use spam filters. These spam filters act like a shield, analysing incoming emails and allowing the good ones to reach the inbox while filtering the bad ones into the spam folder, or rejecting them completely.\"}),/*#__PURE__*/e(\"p\",{children:\"Based on how users interact with your email, signals are sent to email providers. On the basis of these signals they decide if an email is spam or not. This affects the deliverability of your current as well as next email campaign.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/i(\"blockquote\",{children:[/*#__PURE__*/e(\"h5\",{children:\"How Do Spam Filters work?\"}),/*#__PURE__*/e(\"p\",{children:\"Email service providers are required to enforce spam laws as a legal obligation. They also have firewalls to protect users from spam, that function a lot like spam filters, as they regulate incoming email based on a set of rules, already established by the email server.\"})]})]});export const richText45=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"To ensure your email is delivered without getting caught in spam filters you need to understand opt-ins, list segmentation, list cleaning, validation and purchasing your list from the right data research providers.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. \"}),\"An opt-in process involves obtaining permission before sending emails. Sending emails without permission makes the message unsolicited, and classifies it as spam. Such messages may or may not be accepted by the receiver. But opt-in emails are highly likely to be opened and read, since the user has agreed to receive it. Many marketers agree that this method brings in very good results.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"2. \"}),\"List segmentation is one of the things you need to do before sending out emails to your list of contacts. Here you divide the list based on audience characteristics and preferences. Creation of personas is the first step towards segmenting your list.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. \"}),\"List cleaning and verification needs to be done periodically, as many employees switch jobs, which leads to incorrect email ids, job titles and company names. You need to make sure that all the contacts on your list have entered through a double or single opt in process. You also need to check for duplicates, bounced email and spam traps.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4. \"}),\"Lastly you need to be very careful about downloading lists from data brokers. Many email addresses here are likely to be stale, invalid or inactive. They could also be collected illegally, without following GDPR norms, and without capturing opt-ins.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"Spam traps are tools used by various email providers such as (Gmail, Hotmail, Yahoo, etc) to identify unwanted email senders. One such spam trap is an email address that has existed sometime in the past but at the moment is inactive and has been taken over by Internet Service Providers. It sends alerts to the ISP informing about the inactivity of the account. That\u2019s why it\u2019s important for marketers to discover and clean up inactive email addresses from their contact list.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"A list that is not completely accurate, has many emails ending up getting caught in spam filters.\\xa0Besides these rules, you can also consider a few more points, like making sure your subject lines, \u2018from\u2019 names and other content is not deceptive. Make sure you provide an unsubscribe link. Also, avoid sending too many emails in a single day, as some email providers consider such senders as spammers.\"}),/*#__PURE__*/e(\"p\",{children:\"Following the practices mentioned above will help ensure that your brand has a good email reputation and that the emails reach the receivers, increasing the ROI of your email marketing campaigns.\"})]});export const richText46=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h5\",{children:\"Market research provides critical information about your market and your business landscape, and informs you about how to plan your next steps.\"}),/*#__PURE__*/e(\"p\",{children:\"For those launching a new product, company or brand, or entering a new market, research is invaluable in understanding customer needs, as well as the market challenges and competitive landscape. Market research helps businesses define their markets, understand the changing needs of their target audience, improve their products and services, and make better business decisions.\"}),/*#__PURE__*/i(\"p\",{children:[\"Market research uses data-driven insight, qualitative and quantitative research, \",/*#__PURE__*/e(t,{href:{pathVariables:{G_YBDWg8h:\"the-value-of-trend-analysis-in-market-research-and-driving-business-growth\"},unresolvedPathSlugs:{G_YBDWg8h:{collectionId:\"gLbbTC81W\",collectionItemId:\"P1fJzVdV1\"}},webPageId:\"COquaqrIM\"},motionChild:!0,nodeId:\"gLbbTC81W\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"analysis of market trends\"})}),\", brand and \",/*#__PURE__*/e(t,{href:{pathVariables:{G_YBDWg8h:\"competitive-research-competitor-analysis-for-marketing-sales-business-development-b2b-data-services\"},unresolvedPathSlugs:{G_YBDWg8h:{collectionId:\"gLbbTC81W\",collectionItemId:\"UDZNG_ipk\"}},webPageId:\"COquaqrIM\"},motionChild:!0,nodeId:\"gLbbTC81W\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"competitor audits and analysis\"})}),\", surveys and interviews with industry leaders. This can include both primary sources (like direct interviews) and secondary sources (published sources on the web like analyst reports, company websites and financial reports). Many b2b companies rely upon business research providers to gain insight into the target market through financial performance reports of various companies, corporate earning reports, and other firmographic details.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"With this information businesses can:\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Obtain an analysis of your own strengths and weaknesses.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Uncover your differentiators and your competitive advantage.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Find out what customers think about your brand and products, what complaints they have, and adjust your marketing messages to attract customers.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Find out if there is a demand for your product in the market.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Know the opportunities and threats in your industry.\"})})]})]});export const richText47=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Custom research is the foundation of a successful marketing strategy as it gives us insight into your market, customers, target audience and competitors. It helps businesses with making strategic decisions like entering a new market or making investments.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It can give you an accurate view of your business and your marketplace.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You can see how you compare your competitors, and evaluate what they are doing to attract customers.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It can help you determine who and where your customers are, and which customers are most likely to buy from you.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It can reveal where you are falling behind in terms of customer satisfaction.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It can help you decide how customers will respond to a new idea for a business or product, based on how similar products have performed in the marketplace.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It can help you make wise product packaging and promotional decisions, as well as create effective marketing messages.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"For many businesses, market research is a key component in developing marketing strategy through estimating sales and profitability. In fact, it can help you make decisions that can lead to business growth, while decisions that are not based on research can damage your business.\"})]});export const richText48=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In the previous article we have seen how custom email list research is favourable over downloading from an existing online database. The list is 100% accurate, since it is custom researched from the ground up. Rather than building it yourself over a couple of years, you have a high quality email database within a matter of weeks. This approach best serves the purpose of marketers and salespeople, whose business depends on high quality lists for regular marketing campaigns.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/i(\"blockquote\",{children:[/*#__PURE__*/e(\"h5\",{children:\"But how do you ensure this researched list is 100% accurate?\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding Opt-Ins and Verification Processes before you purchase a custom researched list.\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"First of all, let us understand what a high quality mailing list is:\"}),/*#__PURE__*/e(\"p\",{children:\"A low email bounce rate is the most basic requirement of any email list. The next factors to consider are a good email open rate and a good response rate. A list with these qualities can be considered as a high quality list.\"}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, a low quality list contains a good number of inactive and unsolicited contacts, and therefore receives a poor response rate, but a high number of email bounces, since the email ids are invalid.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"This brings us to the concept of Opt-Ins\"}),/*#__PURE__*/e(\"p\",{children:\"You may have heard of marketers encouraging organically grown lists. The reason for this is the effectiveness of organic lists, which comes from users having opted in, through sign-up forms. Opt-in is an explicit consent. Being GDPR compliant involves explicit consent and acknowledgement to receive marketing messages from your company.\"})]});export const richText49=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"A low email bounce rate is the most basic requirement of any email list. The next factors to consider are a good email open rate and a good response rate. A list with these qualities can be considered as a high quality list.On the other hand, a low quality list contains a good number of inactive and unsolicited contacts, and therefore receives a poor response rate, but a high number of email bounces, since the email ids are invalid.\"})});export const richText50=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As per the GDPR rules opt-ins need to be captured by speaking directly to the staff. An opt-in cannot be taken at the operator level or from any staff unauthorised to take a decision on behalf of the concerned staff member. If the staff is not available or not willing to take the call, opt-ins can be obtained from the personal secretary or assistant who is directly reporting to the staff.\"}),/*#__PURE__*/e(\"p\",{children:\"Consent is acquired through direct calling, as well as through email confirmation. The date and time when the consent was taken, also needs to be noted. These procedures are strictly adhered to in a data research company, not only making their data GDPR compliant, but also giving the client a high quality and relevant mailing list of contacts, that will have low email bounce rates and higher email open rates.\"}),/*#__PURE__*/e(\"p\",{children:\"Buying an email opt-in list is always the best way to acquire a high quality lead list for your email marketing campaigns, rather than downloading from a standard online database that most often does not come with user consent.\"})]});export const richText51=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Email lists are critical to any marketing and sales outreach process. An email opt-in list is a collection of email addresses and, often, additional information about individuals who have voluntarily given their consent to receive emails from a business or organisation. These lists are invaluable for email marketing because they represent people who are genuinely interested in the business\u2019s content, products, or services. Email Opt-in lists are central to building strong, engaged, and loyal audiences, as well as driving more effective marketing campaigns. Here\u2019s a closer look at email opt-in lists, their types, and their importance in detail:\"}),/*#__PURE__*/e(\"p\",{children:\"An email opt-in list consists of email contacts gathered by gaining explicit permission from individuals, also known as \u201Csubscribers.\u201D To be part of this list, people must opt-in, or actively agree, to receive emails by providing their email address through a form or a similar process. This opt-in process is essential in email marketing because it establishes a legal and transparent basis for communication.\"})]});export const richText52=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Opt-in lists vary based on the level of permission granted by the subscriber and the method used to collect their data. The two primary types of opt-ins are single opt-in and double opt-in.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Single Opt-in:\"}),\" A single opt-in list is created when someone signs up through a form and is automatically added to the email list without needing to confirm their subscription. This process is quick and may yield a larger number of subscribers, but it may also result in lower-quality contacts or lead to spam complaints if people sign up by mistake.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Double Opt-in:\"}),\" A double opt-in list requires a two-step confirmation process. After filling out the subscription form, the person receives an email with a link to confirm their subscription. This additional step ensures that the subscriber genuinely wants to receive emails, resulting in a more engaged and higher-quality list.\"]})})]})]});export const richText53=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Building an email opt-in list offers numerous benefits, making it a cornerstone for successful email marketing:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Audience Engagement:\"}),\" An opt-in list consists of people who have willingly subscribed, making them more likely to engage with the content. Engaged audiences improve email open rates, click-through rates, and the overall effectiveness of email marketing campaigns.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better Deliverability:\"}),\" Email service providers (ESPs) prioritise emails from senders with higher engagement rates and fewer spam complaints. A permission-based opt-in list minimises the chances of emails being marked as spam, which enhances deliverability and sender reputation.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance with Laws:\"}),\" Collecting email addresses through email opt-in methods helps businesses comply with legal regulations like GDPR (General Data Protection Regulation) in the European Union, CAN-SPAM Act in the United States, and CASL (Canada\u2019s Anti-Spam Legislation). These laws require businesses to obtain consent before sending marketing emails to individuals, and an opt-in list is proof of that consent.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"High ROI:\"}),\" Email marketing has one of the highest returns on investment (ROI) among digital marketing channels. By cultivating an email opt-in list, companies can maximise their ROI, as they are marketing directly to individuals who have shown interest in their offerings.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost-Effective:\"}),\" Maintaining a high-quality opt-in list reduces costs related to email marketing. Instead of sending emails to a vast number of uninterested recipients, businesses can focus on smaller, more targeted audiences that are more likely to convert.\"]})})]})]});export const richText54=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Creating a robust email opt-in list involves multiple strategies, often tailored to different stages of the customer journey. Here are some key techniques to build an effective opt-in list:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Website Sign-up Forms:\"}),\" Including sign-up forms on a website, particularly on high-traffic pages like the homepage, blog posts, or dedicated landing pages, encourages visitors to subscribe. To maximise conversion, businesses often offer incentives, such as discounts, exclusive content, or downloadable resources (like e-books or whitepapers).\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Pop-ups and Slide-ins:\"}),\" These forms can appear when a visitor spends a certain amount of time on a website or reaches specific sections. Pop-ups can effectively capture attention, but they should be designed to avoid disrupting the user experience.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Social Media Channels:\"}),\" Leveraging social media platforms can help attract followers to join the email list. Social media posts, ads, and bios can direct people to sign-up forms, encouraging them to subscribe to receive exclusive content or updates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Content Upgrades:\"}),\" Offering a content upgrade is a strategy where subscribers get access to additional valuable content in exchange for joining the email list. This can include checklists, templates, or bonus material related to an article they\u2019re reading.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lead Magnets:\"}),\" Lead magnets are valuable incentives designed to encourage sign-ups. They include discounts, free trials, exclusive guides, or access to gated content. Lead magnets can significantly increase sign-up rates, as subscribers receive immediate value in exchange for their email address.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Events and Webinars:\"}),\" Hosting events, whether virtual or in-person, is another effective way to build an opt-in list. Attendees who sign up for an event or webinar often agree to receive follow-up emails, making them excellent candidates for future marketing messages.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Referral Programs:\"}),\" Encouraging current subscribers to refer others to join the email list can organically grow the list. Incentivizing referrals with rewards or discounts can improve participation rates.\"]})})]})]});export const richText55=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Building an opt-in list is about more than just collecting emails; it\u2019s about fostering trust and engagement. Here are some best practices to ensure the list remains effective and sustainable:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Clear Opt-in Process:\"}),\" Be transparent about what the subscriber is signing up for. Clear descriptions and even examples of the type of content they\u2019ll receive can help manage expectations and reduce the likelihood of unsubscribes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Segmenting:\"}),\" As an opt-in list grows, segmenting subscribers based on preferences, demographics, or behaviours can make email content more relevant. This personalization helps improve engagement rates by sending tailored content to each group.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Clean-up:\"}),\" Regularly remove inactive or unengaged subscribers. This practice helps maintain a healthy list, enhances deliverability, and keeps costs manageable. Many businesses conduct re-engagement campaigns to win back inactive subscribers before deciding to remove them.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Provide an Easy Opt-out:\"}),\" While it may seem counterproductive, allowing subscribers to easily unsubscribe helps maintain a list of truly interested individuals. Offering an easy opt-out option builds trust and reduces the chances of emails being marked as spam.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use GDPR-Compliant Practices:\"}),\" For businesses operating internationally, especially in the European Union, GDPR compliance is essential. This includes obtaining explicit consent and maintaining records of subscriber consent.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Optimise for Mobile:\"}),\" Many subscribers will sign up through mobile devices, so making sure that opt-in forms are mobile-friendly improves conversion rates.\"]})})]})]});export const richText56=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Choosing between single and double opt-in depends on the company\u2019s goals and audience characteristics.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Single Opt-in Pros:\"}),\" Simplicity and speed, which may yield a larger list more quickly. However, the risk of fake or mistyped emails is higher, and the engagement level may be lower.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Double Opt-in Pros:\"}),\" Higher engagement rates, better quality of subscribers, and reduced chances of spam complaints. The downside is that some people may fail to complete the second step, which could result in fewer subscribers.\"]})})]})]});export const richText57=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Opt-in lists support different stages of the customer journey and serve multiple functions within a marketing strategy:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Awareness:\"}),\" At the awareness stage, opt-in lists help introduce potential customers to the brand. By sending informative and valuable content, brands can nurture these leads and increase awareness.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Consideration:\"}),\" As subscribers move to the consideration stage, segmented opt-in lists allow businesses to send more targeted messages about products, services, or promotions relevant to subscriber interests.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Conversion:\"}),\" Opt-in lists play a vital role in conversion, enabling businesses to send personalised offers or reminders that encourage subscribers to make a purchase or take the next step.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Loyalty and Retention:\"}),\" Email marketing extends beyond just acquiring new customers; it also helps retain and engage existing ones. Opt-in lists allow businesses to maintain communication with past customers, offer them special deals, and keep them informed about new offerings.\"]})})]})]});export const richText58=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Email marketing is subject to legal regulations, and failing to comply can lead to penalties. Key laws and regulations include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GDPR:\"}),\" Requires explicit, informed consent from subscribers within the EU. Subscribers must also be able to easily withdraw consent and request the deletion of their data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CAN-SPAM Act:\"}),\" This U.S. law mandates that businesses provide an opt-out mechanism in every email and avoid misleading information. It also requires businesses to honour opt-out requests promptly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CASL:\"}),\" Canada\u2019s anti-spam legislation prohibits sending unsolicited commercial electronic messages without consent and requires opt-in mechanisms and clear identification.\"]})})]})]});export const richText59=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An email opt-in list\u2019s performance can be measured by evaluating:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Growth Rate:\"}),\" How quickly the list expands. Consistent growth indicates successful list-building strategies.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Open and Click Rates:\"}),\" These metrics show how engaged subscribers are with emails. High rates suggest relevant content, while low rates indicate a need for improvement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bounce Rate:\"}),\" High bounce rates (especially hard bounces) may signal issues with list quality.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Conversion Rate:\"}),\" The percentage of subscribers who take desired actions, such as making purchases or signing up for webinars, reflects how well the list aligns with business objectives.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unsubscribe Rate:\"}),\" High unsubscribe rates may indicate irrelevant content or overly frequent emails.\"]})})]})]});export const richText60=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"An email opt-in list is a valuable asset for any business aiming to connect with its audience, promote its products, and build long-term customer loyalty.\"})});export const richText61=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"When it comes to marketing, the key to success is having a reliable way to discover qualified leads and maximise your return on investment (ROI). Whether you\u2019re aiming for a quick solution or prefer to build an email list from scratch, understanding the essential factors is crucial before you proceed with your email marketing campaign.\"}),/*#__PURE__*/e(\"p\",{children:\"The most important principle to consider when deciding how to build your email list is ensuring its quality and accuracy. A well-curated email list allows you to engage with potential customers, maintain relationships with existing ones, and drive business growth. A well-built mailing list can significantly boost your marketing efforts, leading to better engagement and higher conversions.\"}),/*#__PURE__*/e(\"p\",{children:\"In this comprehensive guide, we\u2019ll discuss strategies to build mailing lists that convert and why email list building is essential for your business.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Quality Of Email List\"}),/*#__PURE__*/e(\"p\",{children:\"Email marketing is one of the most effective and profitable strategies available today, but the success of your campaigns relies heavily on the quality of your email list. Without a relevant and accurate list of contacts, your marketing efforts will not only waste valuable time and resources, but they could also hurt your results.\"}),/*#__PURE__*/i(\"p\",{children:[\"Sending unsolicited emails without consent is not only irritating to recipients, but it can also violate privacy laws in many countries. Such actions can cause irreversible damage to your brand, both online and offline. Any experienced email marketer knows the significant losses that come from bounced emails, unsubscribes, spam flags, and unread messages.\",/*#__PURE__*/e(\"br\",{}),\"Fortunately, these issues can be avoided by using the right data-sourcing techniques to build an email list for your campaigns. With access to high-quality data, your company\u2019s business development, marketing, and sales teams will achieve greater success, ultimately increasing your organisation\u2019s profitability.\"]}),/*#__PURE__*/e(\"p\",{children:\"Below, we explore the pros and cons of three different methods to build an email list so that you can choose the best approach for your needs.\"})]});export const richText62=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"1. Build an Email List Yourself\"}),/*#__PURE__*/e(\"p\",{children:\"Building your own email list is one of the most effective ways to ensure that every contact has explicitly opted in to receive communications from you. This method typically involves having site visitors fill out a form or provide their email addresses to receive newsletters, discount offers, or product information from your company.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How to Build an Email List Yourself\"}),/*#__PURE__*/e(\"br\",{}),\"The key to this process is creating high-quality content. Consistently updating a blog with fresh posts and infographics will attract visitors to your site. At the end of each blog post, include personalised calls to action (CTAs) that encourage readers to sign up for updates. Additionally, offering a free downloadable resource, like a PDF, in exchange for an email address is a great way to entice visitors who are looking for detailed information.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Pros:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You can be certain that all contacts on your list have consented to receiving emails, making them more likely to engage and less likely to unsubscribe.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Emails sent to this list are more likely to land in the inbox, rather than being marked as spam.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Cons:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creating quality content on a regular basis requires significant resources. You\u2019ll need a team of writers and subject matter experts to keep your content updated, as well as marketers to promote the content across social platforms. While having an in-house content team can be a long-term advantage, it can be a challenge for businesses with limited budgets or resources.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Visitors who sign up for free content may unsubscribe later if your content no longer addresses their needs. Writing for a niche audience can help mitigate this, leading to fewer but more loyal sign-ups.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Effective content creation isn\u2019t just about writing well; it also requires keyword research to identify what your target audience is searching for and creating content around those topics. Both of these tasks are time and resource-intensive.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It can be difficult to determine how engaged your subscribers are in the decision-making process unless you create highly specific content and calls to action. Additionally, you won\u2019t have access to company intelligence that can come from primary (in-person) and secondary (online) research.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"2. Download a Mailing List from an Online Database\"}),/*#__PURE__*/e(\"p\",{children:\"While downloading a mailing list from an online database is often viewed as the least reliable method, it remains a common option for businesses. Many companies allow you to purchase a pre-built email list from a large database for a fee. This might be the quickest solution, but it comes with several drawbacks.\"}),/*#__PURE__*/e(\"h4\",{children:\"Pros:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The main advantage of this method is the time saved, as the mailing list is already compiled for you.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It\u2019s also cost-effective in terms of both effort and budget, as you won\u2019t need a dedicated team to create and promote content.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Cons:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The quality and accuracy of these email lists are often questionable since the data may not be updated in real time. This could lead to email bounces during your marketing campaign.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You\u2019re unlikely to get leads with double opt-ins, which increases the risk of your emails being marked as spam.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The same email database is often sold to multiple businesses, meaning you\u2019ll receive the same list as your competitors, reducing your competitive edge.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"There\u2019s also the risk of non-compliance with strict privacy laws, such as GDPR. It\u2019s essential to verify the database provider\u2019s compliance before purchasing.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"3. Build a Mailing List Through Custom List Research\"}),/*#__PURE__*/e(\"p\",{children:\"Custom list research involves working with a team of research experts who collaborate directly with you to understand and meet your unique data needs. These experts use various online sources and conduct interviews with key industry professionals to gather valuable insights and develop a complete profile of your potential customers.\"}),/*#__PURE__*/e(\"h4\",{children:\"Pros:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You receive comprehensive contact and company data, including job titles, company size, location, phone numbers, and industry specifics. The email list is tailored to your needs, refined by sub-industry or based on NAICS or NACE codes.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The data is highly accurate because it is collected through automated tools and verified by human experts. Email verification software is used to validate emails, and phone calls are made to confirm contact details. This ensures the data is regularly updated and accurate.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"With a custom-built mailing list, you can directly reach decision-makers in your target market\u2014CEOs, CFOs, managers, and other stakeholders\u2014ensuring that your campaigns are directed to the right audience.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Custom list research provides a 360-degree view, offering deep insights into companies, industries, and markets. This enables your sales teams to target the right leads at the right time and close more deals.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Though custom research may seem expensive initially, it proves cost-effective over time. Providers often account for bounced emails, ensuring your investment is not wasted on inaccurate data.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Cons:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The only drawback is that the individuals on these lists have not directly subscribed to receive your communications. However, this can be addressed through consent-based marketing, using single or double opt-ins to ensure the contacts have opted in to receive your emails.\"})})})]});export const richText63=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Even after learning how to build an email list, there are key practices that can help maximise results. Here we\u2019ll outline email list building best practices to ensure long-term success.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use Double Opt-In:\"}),/*#__PURE__*/e(\"br\",{}),\"While single opt-in might get you more subscribers initially, double opt-in (confirming email addresses) helps ensure a higher-quality list and improves engagement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Segment Your List:\"}),/*#__PURE__*/e(\"br\",{}),\"As you build your mailing list, start segmenting your subscribers based on behaviour, demographics, or interests. Sending tailored messages increases engagement and reduces unsubscribes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Maintain Email List Hygiene:\"}),/*#__PURE__*/e(\"br\",{}),\"Regularly clean your email list by removing inactive subscribers. This will help maintain a good sender reputation and ensure your emails land in the inbox, not spam.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Craft Effective Email Subject Lines:\"}),/*#__PURE__*/e(\"br\",{}),\"Use compelling subject lines to ensure your emails are opened and read. Experiment with different styles, including curiosity, urgency, and humour.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Follow GDPR and Email Marketing Regulations:\"}),/*#__PURE__*/e(\"br\",{}),\"Make sure you\u2019re complying with laws like GDPR. Include opt-out options, a clear privacy policy, and only collect necessary information.\"]})})]})]});export const richText64=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The pros and cons outlined above should help you determine the best method to build an email list for your company. Whether you invest in creating high-quality content to build a mailing list in-house, or opt for the time-saving route of purchasing an existing list, it\u2019s important to weigh the trade-offs. While downloading a pre-built list can save time and money, it often lacks the data accuracy needed for effective email marketing campaigns. If your focus is on achieving high accuracy and a low bounce rate, custom database research offers both short-term and long-term benefits, providing a reliable solution for your marketing needs.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/i(\"blockquote\",{children:[/*#__PURE__*/e(\"h5\",{children:\"A Custom List Research Team to Build Your Email List\"}),/*#__PURE__*/e(\"p\",{children:\"As a data research outsourcing team, Ascentrik specialises in helping marketing teams drive targeted campaigns and generate more leads. We also assist sales teams in identifying the right accounts to target and provide full contact information on these accounts, ensuring they have a complete and accurate email list to work with.\"}),/*#__PURE__*/e(\"p\",{children:\"Our most valuable offering to both marketing and sales teams is our 360\\xb0 data research service. We help you build a mailing list by sourcing your email data, verifying the existing contacts in your CRM, and providing market and competitor intelligence. We also manage campaigns directly on your CRM, all in compliance with GDPR regulations. With over 12 years of experience, we\u2019ve supported companies across the globe, focusing on the UK and US markets, while offering expertise across multiple languages, industries, and domains.\"}),/*#__PURE__*/e(\"p\",{children:\"This service addresses the key challenges of using pre-built databases from email finder tools or sales intelligence platforms, which often lack the features you need. Common issues include limited multi-user capabilities, lack of integration with platforms like LinkedIn, poor API support, outdated contact details, and credits deducted for invalid emails.\"}),/*#__PURE__*/e(\"p\",{children:\"This is where a dedicated research team offering custom B2B email list and database building truly excels. We support your email campaigns from start to finish, providing replacements if contacts change jobs during your campaign. Additionally, we manage your CRM projects, assign contacts to specific campaigns, and even conduct inside sales activities. Clients value the in-depth intelligence and analytics we provide, including market research, competitor analysis, SWOT analysis, and sector insights.\"}),/*#__PURE__*/e(\"p\",{children:\"This is why a research team carrying out customised, b2b email list and database building, is the answer. We support you all through your email campaign. We provide replacements even if a contact changes his job during your campaign. We can even handle the projects on your CRM, assign contacts to various campaigns, and conduct inside sales activities. Our clients also value the intelligence and analytics we provide, in terms of market and competitor intelligence, SWOT and sector analysis.\"})]})]});export const richText65=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"CRM data enrichment is the process of cleansing, appending, and enhancing the data in your CRM that gets collected through marketing campaigns or sales efforts. It strengthens the value of your data by making it richer. The crm data enrichment process allows companies to augment third-party data and consolidate existing data points by connecting it with external data sources from contact lists, social media, and other third-party providers. This helps build accurate, insightful information on their customer records.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Targeting Niche Segments\"}),/*#__PURE__*/e(\"h5\",{children:\"The value of granular information in CRM enrichment\"}),/*#__PURE__*/e(\"p\",{children:\"A CRM generally holds basic contact information such as names, email addresses, phone numbers, etc. However, businesses need more information to know their customers better. For instance, where does a customer work? What is their job title? What is their favourite tech brand? What is their marital status or income level? Such demographic and firmographic information helps with CRM enrichment, allowing the organisation to get deeper insights about its customers, which it can use to increase sales and marketing performance.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"CRM Data Cleansing\"}),/*#__PURE__*/e(\"h5\",{children:\"The value of data quality in CRM data enrichment\"}),/*#__PURE__*/e(\"p\",{children:\"For the crm enrichment process to be successful, the key component of data quality needs to be prioritised. This is the process of CRM data cleansing which gives you clean, reliable, usable data. Data naturally gets stale in a matter of weeks or even days, as people keep changing jobs. People fail to update their details on social media like Linkedin, or they may enter misspelt details in website forms. This is why crm data cleaning is the first and most important step.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/i(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Data enrichment in this context would mean reviewing the CRM data, cleaning up inconsistencies, merging and purging fields or unnecessary data, enriching it with new details, and creating a Golden Record (that is the most perfect, accurate record) of each of your customers.\"}),/*#__PURE__*/e(\"p\",{children:\"This process is used by companies to firstly keep data fresh and clean, and then update it with any information that gives a granular picture of the customer.\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"This post will help you understand the role of data cleansing and data enrichment in maintaining the health of your CRM database, and why it\u2019s so important to focus on data quality.\"})]});export const richText66=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"When you don\u2019t have enough information on your leads to reach out to them, then you\u2019re missing out on opportunities for more revenue and growth. But the cost of inaction isn\u2019t just about the lost opportunities from incomplete data. There\u2019s also the risk of wrongly targeted prospects.\"}),/*#__PURE__*/e(\"p\",{children:\"Wastage of time and effort in pursuing wrong leads, or marketing to them with wrong messaging is the most immediate downside of a stale CRM database. In the long run it can also affect your company\u2019s reputation in the eyes of existing and potential customers.\"}),/*#__PURE__*/e(\"p\",{children:\"When you stop wasting time and effort on chasing the wrong leads, it eventually boosts productivity, revenue and growth.\"})]});export const richText67=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:\"Lost opportunities\"}),/*#__PURE__*/i(\"p\",{children:[\"Incorrect data is one of the biggest reasons for losing sales opportunities for businesses. Besides, it also wastes marketing spend and results in dissatisfied customers.\",/*#__PURE__*/e(\"br\",{}),\"Therefore, businesses must prioritise data accuracy and invest in crm enrichment techniques to mitigate these risks.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Bad decisions\"}),/*#__PURE__*/e(\"p\",{children:\"Your customer database is the primary reference point for sales and marketing teams when making a decision. Inaccurate data will lead the sales and marketing teams to take wrong steps like incorrect resource allocation, and pursuing wrong leads. For example, bad data will lead to bad lead-scoring decisions, which might mean that the right prospects don\u2019t get the attention they deserve from your sales team. Inaccurate customer profiles, will lead your marketing team to make a whole lot of bad moves when attracting new customers.\"}),/*#__PURE__*/e(\"h4\",{children:\"Obstacle to automation\"}),/*#__PURE__*/e(\"p\",{children:\"Automation enables scalability and faster growth. When your CRM platform is automated and integrated with other systems, your marketing and sales teams can spend more time on reaching out to the right prospects through targeted campaigns.\"}),/*#__PURE__*/e(\"p\",{children:\"However, to trust the results of your automated procedures, you need to trust your CRM data quality. Gaps and errors in your datasets will keep hindering any automated process making it inefficient.\"}),/*#__PURE__*/e(\"p\",{children:\"Thus we see that stale and inaccurate data results in wasted time, money and effort, as well as missed opportunities.\"})]});export const richText68=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:\"Improving Customer Experience, Retention and Upsell:\"}),/*#__PURE__*/e(\"p\",{children:\"CRM data enrichment creates visibility into existing buyers: their habits, preferences and personality traits. This information can help businesses to anticipate their needs early, identify red flags and potential signs of attrition and provide proactive customer support to retain their business. This improves existing customer experience.\"}),/*#__PURE__*/e(\"p\",{children:\"It can equally play a role in improving customer lifetime value (CLV) by providing the insights to justify inclusion in upselling and cross-selling campaigns for new product launches.\"}),/*#__PURE__*/e(\"h4\",{children:\"Generate more prospects at scale\"}),/*#__PURE__*/e(\"p\",{children:\"CRM data cleansing and enrichment provides updated lead data at scale, meaning your ops teams can draw more accurate data insights. You can then tailor your sales, increase cross-sell and upsell opportunities,\"}),/*#__PURE__*/e(\"p\",{children:\"There is a lot of untapped value in many sales funnels. There are leads that go unnoticed, and crm data enrichment can bring them to light. For example, a person might have reached out a few years ago, and then reached out again after moving to a different company. This makes that person a hotter lead than others, and requires immediate attention from the sales team.\"}),/*#__PURE__*/e(\"h4\",{children:\"Segmentation\"}),/*#__PURE__*/e(\"p\",{children:\"Complete data is a critical component of segmentation. It provides businesses with the necessary information to separate customers into very specific groups and target them with messaging and offers. By segmenting its customer base based on shared characteristics, such as demographics, behaviours, or interests, a business can improve the effectiveness of its marketing campaigns and increase customer engagement and loyalty.\"}),/*#__PURE__*/e(\"p\",{children:\"However, this only works when the CRM database is complete and enriched with accurate and up-to-date information. Incomplete or outdated data can lead to inaccurate segmentation, resulting in ineffective messaging and wasted resources.\"}),/*#__PURE__*/e(\"h4\",{children:\"Lead Scoring\"}),/*#__PURE__*/e(\"p\",{children:\"Ranking and evaluating your leads help you define clear goals for your customer success team. With crm data enrichment, you can create in-depth customer account profiles prioritised more appropriately and accurately.\"}),/*#__PURE__*/e(\"p\",{children:\"All in all, it allows you to assign precise and meaningful scores to your leads. Additionally, it enables your sales and marketing department to align and discover the most useful data sets for lead account scoring.\"}),/*#__PURE__*/e(\"h4\",{children:\"Personalization In Lead Generation\"}),/*#__PURE__*/e(\"p\",{children:\"CRM database enrichment empowers you to tailor your marketing and sales interactions to each individual customer\u2019s needs and preferences. This increase in personalisation is very useful when targeting decision-makers or prospects. It is also useful throughout the customer lifecycle, delivering enhanced customer service, improved communication, and increased customer retention.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, having location information about prospects allows you to segment them based on geography. Then you can deliver personalised campaigns that mention things specific to their locality. But without this information, a prospect might receive marketing materials that are more generic and less effective. When this strategy is applied across the entire database it\u2019s easy to see how personalization can impact your bottom line.\"}),/*#__PURE__*/e(\"h4\",{children:\"Improved marketing ROI\"}),/*#__PURE__*/e(\"p\",{children:\"Targeted marketing campaigns driven by enriched customer data and personalised messaging are more likely to be effective. They increase conversion rates and yield a higher return on investment.\"})]});export const richText69=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A big challenge in CRM data cleaning is identifying the type of data to clean. The most commonly identified records to clean are those with obvious errors, like wrong spellings, missing dates, or incomplete fields. But bad data is more complex and involves a wider range of data.\"}),/*#__PURE__*/e(\"h6\",{children:\"When you begin to clean CRM data, you can categorise the data type into six key areas:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Customer Demographics like name, age, gender, location, and occupation.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Contact details of customers, such as email addresses, phone numbers, and postal addresses.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Purchase history like product name, price, date, and quantity.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data related to customer interactions and engagement with your business, such as website visits, email opens, and social media activity.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sales data like revenue, deals won/lost, and pipeline activity.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Customer Service Interactions like support tickets, chat logs, and call recordings.\"})})]})]});export const richText70=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Duplicate data which is multiple records for the same customer, with conflicting or inconsistent information.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Missing or incomplete information for customers or records.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Outdated information that is no longer accurate or relevant, such as outdated contact details or purchase history.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data with formatting Inconsistencies, such as variations in spelling or capitalization, or inconsistent date formats.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Invalid data that does not conform to expected patterns or values, such as a phone number with letters or a birthdate in the future\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Identifying these signs of stale data is critical for maintaining the accuracy of your CRM database. To do so, you may need to leverage various crm data cleaning methods. Identifying and fixing errors in data records using traditional methods like Excel is not feasible. If you\u2019re a marketer or a CRM manager, you may need to depend on IT teams to clean this data, and this dependency needs to be reduced.\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText61\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText57\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText54\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText46\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText48\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText65\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText62\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText64\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText67\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText59\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText45\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText55\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText47\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText52\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText49\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText58\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText69\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText60\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText70\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText68\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText56\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText63\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText66\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText51\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText53\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText50\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "2MAAAA,IAAsJ,IAAMC,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kUAA6T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,6UAAmU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,wPAAwP,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,iZAAiZ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,8OAA8O,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4XAA4X,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,qRAAgR,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,qUAAqU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,8NAAyN,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gMAAgM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mYAAmY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,2PAA2P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,uQAAkQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sVAAiV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAgV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAAmV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA+V,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6dAA6d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oVAA+U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0WAAsV,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6cAA6c,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,spBAAipB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4TAA4T,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sgBAAsgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+dAA+d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+dAA+d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ufAAuf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+hBAA+hB,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qnBAAgnB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kgBAAkgB,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uWAAkW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAyW,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBV,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kUAA6T,CAAC,CAAC,CAAC,EAAeW,EAAwBX,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uaAAua,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,+RAA+R,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,seAAse,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4cAA4c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4bAA4b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wQAAqRE,EAAE,KAAK,CAAC,CAAC,EAAE,4LAA4L,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAA2W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gFAA6FE,EAAE,KAAK,CAAC,CAAC,EAAE,iXAAiX,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAA6P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6mBAA8lB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8kBAAokB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAmL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2sBAA2sB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8uBAA8uB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iXAAiX,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6ZAA6Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+PAA+P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0ZAAqZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kWAAkW,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wfAAwf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mUAAmU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wOAAmO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4HAAuH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,maAAoZ,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wWAAmW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+hBAA+hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qeAAqe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+hBAA0hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ocAAoc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8PAA2QE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,mhBAA8gB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4UAAuU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwBxB,EAAID,EAAS,CAAC,SAAsBD,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwBzB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+kBAA0kB,CAAC,CAAC,CAAC,EAAe0B,EAAwB1B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,6cAAqdE,EAAE,KAAK,CAAC,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB3B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,CAAC,CAAC,EAAe4B,EAAwB5B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0RAAqR,CAAC,CAAC,CAAC,EAAe6B,EAAwB7B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,moBAAynB,CAAC,CAAC,CAAC,EAAe8B,EAAwB9B,EAAID,EAAS,CAAC,SAAsBC,EAAE,SAAS,CAAC,UAAU,uBAAuB,SAAsBA,EAAE,QAAQ,CAAC,SAAsBA,EAAE,QAAQ,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2zBAAuyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2iBAA2iB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iiBAAiiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2ZAAiZ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2XAAsX,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kNAAkN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,0RAA0R,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,mIAAmI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,sQAAsQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,kPAAkP,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekC,EAAwBpC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4ZAA4Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uaAAua,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,obAAob,CAAC,CAAC,CAAC,CAAC,EAAemC,EAAwBrC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kbAAkb,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iZAA4Y,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sWAAsW,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0UAA0U,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uRAAuR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wYAAwY,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yQAAyQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sRAAsR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,ySAAyS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoC,EAAwBtC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oQAA+P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,yCAAiDE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wXAAmX,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,wCAAgDE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,4aAA4a,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,sCAA8CE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,+YAA+Y,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,yCAAiDE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wSAAwS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,qCAA6CE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,6QAA6Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,qCAA6CE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wVAAwV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,+BAAuCE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,yWAAyW,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,mCAA2CE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mUAAmU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,2CAAmDE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mSAA8R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,uCAA+CE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2UAAsU,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kPAA6O,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqC,EAAwBvC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qcAAgc,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6iBAAwiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yZAAyZ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iTAAiT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2cAAsc,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,0BAAuCE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,scAAic,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesC,EAAwBxC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0WAAqW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uZAAuZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAwN,CAAC,CAAC,CAAC,CAAC,EAAeuC,EAAwBvC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8iBAA8iB,CAAC,CAAC,CAAC,EAAewC,EAAwB1C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6YAA6Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6sBAAmsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wVAAqWE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iaAAia,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,wWAAmW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0fAAgf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4hBAA4hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,CAAC,CAAC,CAAC,EAAeyC,EAAwB3C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAgR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAAiK,CAAC,CAAC,CAAC,CAAC,EAAe0C,EAAwB5C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAgN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qTAAqT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,CAAC,CAAC,CAAC,EAAe2C,EAAwB7C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,CAAC,CAAC,CAAC,EAAe4C,GAAwB9C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4kCAAukC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6C,GAAwB/C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,sYAAmZA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,4PAA4P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,sVAAsV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,2PAA2P,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,weAA8d,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAAqZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,CAAC,CAAC,CAAC,EAAe8C,GAAwBhD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAE+C,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,4EAA4E,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsB/C,EAAEgD,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,eAA4BhD,EAAE+C,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,qGAAqG,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsB/C,EAAEgD,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAE,0bAA0b,CAAC,CAAC,EAAehD,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiD,GAAwBnD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,CAAC,CAAC,CAAC,EAAekD,GAAwBpD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+dAA+d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sEAAsE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,CAAC,CAAC,CAAC,EAAemD,GAAwBnD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sbAAsb,CAAC,CAAC,CAAC,EAAeoD,GAAwBtD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yYAAyY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8ZAA8Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,CAAC,CAAC,CAAC,EAAeqD,GAAwBvD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,upBAA6oB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,saAA4Z,CAAC,CAAC,CAAC,CAAC,EAAesD,GAAwBxD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,iVAAiV,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,2TAA2T,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuD,GAAwBzD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,oPAAoP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kQAAkQ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,+YAA0Y,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wQAAwQ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oPAAoP,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewD,GAAwB1D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kUAAkU,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mOAAmO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,oOAAoO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qPAAgP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6RAA6R,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,yPAAyP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2LAA2L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyD,GAAwB3D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uMAAkM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,uNAAkN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,yOAAyO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yQAAyQ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,8OAA8O,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,oMAAoM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,wIAAwI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0D,GAAwB5D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6GAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,mKAAmK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,kNAAkN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2D,GAAwB7D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,4LAA4L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,mMAAmM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kLAAkL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,iQAAiQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4D,GAAwB9D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,uKAAuK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wLAAwL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,4KAAuK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6D,GAAwB/D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wEAAmE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,2KAA2K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8D,GAAwB9D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,CAAC,CAAC,EAAe+D,GAAwBjE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wVAAmV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yYAAyY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAAuJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8UAA8U,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wWAAqXE,EAAE,KAAK,CAAC,CAAC,EAAE,oUAA0T,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,CAAC,CAAC,CAAC,EAAegE,GAAwBlE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qcAAqc,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yJAAyJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0XAAqX,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wPAAmP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0SAAqS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0IAAgI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8JAAyJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+KAAgK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wNAA8M,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiE,GAAwBnE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iMAA4L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sKAAsK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4LAA4L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wKAAwK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qJAAqJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+IAA0I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekE,GAAwBpE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yoBAAooB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4hBAAuhB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uWAAuW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yfAAyf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+eAA+e,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemE,GAAwBrE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2gBAA2gB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ihBAAihB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4dAA4d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAAuL,CAAC,CAAC,CAAC,CAAC,EAAeoE,GAAwBtE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kTAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,CAAC,CAAC,CAAC,EAAeqE,GAAwBvE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6KAA0LE,EAAE,KAAK,CAAC,CAAC,EAAE,sHAAsH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4hBAAuhB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,CAAC,CAAC,CAAC,EAAesE,GAAwBxE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uVAAuV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4aAA4a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAA6X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAAqb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,CAAC,CAAC,CAAC,EAAeuE,GAAwBzE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wFAAwF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewE,GAAwB1E,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4ZAAuZ,CAAC,CAAC,CAAC,CAAC,EACnxhJyE,GAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["init_ssg_sandbox_shims", "richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "richText39", "richText40", "richText41", "richText42", "richText43", "richText44", "richText45", "richText46", "Link", "motion", "richText47", "richText48", "richText49", "richText50", "richText51", "richText52", "richText53", "richText54", "richText55", "richText56", "richText57", "richText58", "richText59", "richText60", "richText61", "richText62", "richText63", "richText64", "richText65", "richText66", "richText67", "richText68", "richText69", "richText70", "__FramerMetadata__"]
}
