{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/DV335HjO3GawndK6FDl8/UbHEZaQf1Yrzy7t36HBF/nrTqVMFLW-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as i}from\"react/jsx-runtime\";import{Link as n}from\"framer\";import{motion as r}from\"framer-motion\";import*as t from\"react\";export const richText=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Why Small Businesses Can\u2019t Ignore IT Support in 2025\"}),/*#__PURE__*/i(\"p\",{children:[\"In today\u2019s digital-first world, reliable IT support is no longer a luxury \u2014 it\u2019s a necessity. Whether you\u2019re managing customer data, securing internal systems, or enabling remote work, your tech needs to work all the time. That\u2019s why \",/*#__PURE__*/e(\"strong\",{children:\"small business IT support services\"}),\" have become essential for companies of all sizes \u2014 especially small and medium-sized enterprises (SMEs).\"]}),/*#__PURE__*/e(\"h3\",{children:\"What Is Small Business IT Support?\"}),/*#__PURE__*/e(\"p\",{children:\"Small business IT support refers to technical assistance and system management services designed to help businesses with 1 to 100 employees. These services can include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Device setup and management\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Network support\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Cybersecurity\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Data backups and recovery\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Cloud services (e.g., Microsoft 365, Google Workspace)\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Software troubleshooting\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Remote and onsite support\"})})})]}),/*#__PURE__*/i(\"p\",{children:[\"Whether it's through an in-house technician or a \",/*#__PURE__*/e(\"strong\",{children:\"managed service provider (MSP)\"}),\", the goal is the same: keep your systems secure, stable, and scalable.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Top Benefits of IT Support for Small Businesses\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reduced Downtime\"}),/*#__PURE__*/e(\"br\",{}),\"Quickly fix issues before they disrupt operations.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better Security\"}),/*#__PURE__*/e(\"br\",{}),\"Protect sensitive data and customer information from threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost Control\"}),/*#__PURE__*/e(\"br\",{}),\"Choose between flat-rate managed IT services or pay-as-you-go options.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability\"}),/*#__PURE__*/e(\"br\",{}),\"Easily add new users, locations, or services as you grow.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access to Experts\"}),/*#__PURE__*/e(\"br\",{}),\"Gain on-demand access to certified professionals in networking, cloud, and cybersecurity.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Managed IT Services vs. Break/Fix Support\"}),/*#__PURE__*/e(\"figure\",{className:\"framer-table-wrapper\",children:/*#__PURE__*/e(\"table\",{children:/*#__PURE__*/i(\"tbody\",{children:[/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:\"Feature\"})}),/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:\"Managed IT Services\"})}),/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:\"Break/Fix Support\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Monitoring\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"24/7 proactive monitoring\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"None unless called\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Support Model\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Monthly plan (fixed or tiered)\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Hourly billing\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Response Time\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Guaranteed SLAs\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Uncertain\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Ideal For\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Growing businesses needing consistency\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"One-off support needs\"})})]})]})})}),/*#__PURE__*/e(\"h3\",{children:\"Most Requested IT Services for Small Businesses\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Email and productivity platform setup (e.g., Outlook, Gmail, Teams, Zoom)\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Firewall and antivirus deployment\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Remote desktop and VPN configuration\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"POS system integration\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Website and domain support\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Printer and peripheral troubleshooting\"})})})]}),/*#__PURE__*/e(\"h3\",{children:\"How to Choose the Right Small Business IT Provider\"}),/*#__PURE__*/i(\"p\",{children:[\"When searching for the best \",/*#__PURE__*/e(\"strong\",{children:\"IT companies for small businesses\"}),\", look for:\"]}),/*#__PURE__*/i(\"p\",{children:[\"\u2705 Transparent pricing\",/*#__PURE__*/e(\"br\",{}),\"\u2705 Experience with small company tech stacks\",/*#__PURE__*/e(\"br\",{}),\"\u2705 Fast response times\",/*#__PURE__*/e(\"br\",{}),\"\u2705 Clear service-level agreements (SLAs)\",/*#__PURE__*/e(\"br\",{}),\"\u2705 Positive reviews and referrals\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Future of IT Services for Small Businesses\"}),/*#__PURE__*/i(\"p\",{children:[\"By 2025, small businesses are adopting \",/*#__PURE__*/e(\"strong\",{children:\"cloud-first, remote-friendly\"}),\" IT strategies. This includes:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Remote IT support\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Fully managed cybersecurity tools\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"AI-based monitoring and automation\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Hybrid work support (office + home setups)\"})})})]}),/*#__PURE__*/e(\"p\",{children:\"If your current IT provider isn\u2019t offering these, you may be falling behind.\"}),/*#__PURE__*/e(\"h3\",{children:\"Final Thoughts\"}),/*#__PURE__*/i(\"p\",{children:[\"Whether you're looking for \",/*#__PURE__*/e(\"strong\",{children:\"IT support for SMEs\"}),\", \",/*#__PURE__*/e(\"strong\",{children:\"managed IT services for small businesses\"}),\", or just help with daily tech headaches, having the right support partner is critical.\"]}),/*#__PURE__*/i(\"p\",{children:[\"At \",/*#__PURE__*/e(\"strong\",{children:\"Tech Kooks\"}),\", we specialize in scalable, affordable, and responsive IT support built specifically for small business needs \u2014 from cloud setups to 24/7 monitoring.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Want to learn more?\"}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(n,{href:\"https://techkooks.com/#contact\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Contact us today\"})}),\" to see how we can support your small business IT needs in 2025.\"]})]});export const richText1=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Why Small Businesses Need Remote IT Support\"}),/*#__PURE__*/i(\"p\",{children:[\"Small businesses often lack the budget and resources to maintain a full-time, in-house IT team. That\u2019s where \",/*#__PURE__*/e(\"strong\",{children:\"remote IT support companies\"}),\" come in. These services provide affordable, expert assistance to help businesses stay secure, connected, and productive \u2014 without the overhead of an internal IT department.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What Is Remote IT Support?\"}),/*#__PURE__*/e(\"p\",{children:\"Remote IT support allows technicians to diagnose and fix computer, network, and software issues from a remote location. It eliminates the need for on-site visits, enabling quicker resolution times and minimizing disruptions. Whether you\u2019re facing email issues, slow internet, malware, or software bugs, remote tech support can handle it \u2014 often within minutes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Benefits of Remote Tech Support for Small Businesses\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"24/7 Monitoring & Support:\"}),\" Catch issues before they disrupt your business.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lower Costs:\"}),\" Pay only for what you need, when you need it.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability:\"}),\" Easily add or remove users as your business grows.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Expertise on Demand:\"}),\" Get access to certified IT professionals instantly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Security:\"}),\" Ensure your systems are protected from cyber threats with up-to-date security patches and monitoring.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Choosing the Right Remote IT Support Company\"}),/*#__PURE__*/i(\"p\",{children:[\"When evaluating \",/*#__PURE__*/e(\"strong\",{children:\"remote IT support companies\"}),\", small business owners should look for:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Transparent pricing\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Proven customer service track record\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Quick response times\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Experience with tools like Microsoft 365, Google Workspace, antivirus, and cloud backup solutions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"No long-term contracts (flexible month-to-month support is a plus)\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Top Use Cases for Remote IT Support in 2025\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Onboarding new employees\"}),\" with device setup and software access\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Troubleshooting internet and Wi-Fi connectivity issues\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Backing up data\"}),\" securely to prevent data loss\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Patching software\"}),\" and operating systems\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Setting up cloud tools\"}),\" like Microsoft 365 and Google Workspace\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remote desktop support\"}),\" for users working from home or hybrid offices\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Remote IT Support vs. In-House IT: Which Is Better?\"}),/*#__PURE__*/e(\"figure\",{className:\"framer-table-wrapper\",children:/*#__PURE__*/e(\"table\",{children:/*#__PURE__*/i(\"tbody\",{children:[/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:\"Feature\"})}),/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:\"Remote IT Support\"})}),/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:\"In-House IT Staff\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Cost\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Lower monthly cost\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"High fixed salary + benefits\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Availability\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"24/7 via helpdesk/phone/chat\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Limited to business hours\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Expertise\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Wide range, specialized\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Often limited to generalists\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Scalability\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Easy to scale up/down\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Requires hiring/firing\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Setup Time\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Instant\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Weeks to hire/train\"})})]})]})})}),/*#__PURE__*/e(\"h3\",{children:\"Get Started with Remote IT Support Today\"}),/*#__PURE__*/i(\"p\",{children:[\"If you're searching for \",/*#__PURE__*/e(\"strong\",{children:\"remote tech support for small business\"}),\", you're not alone. More than ever, companies are turning to flexible, remote-first IT support solutions to meet their technology needs.\"]}),/*#__PURE__*/i(\"p\",{children:[\"At \",/*#__PURE__*/e(\"strong\",{children:\"Tech Kooks\"}),\", we specialize in remote IT support tailored to small businesses. Whether you're struggling with daily tech headaches or planning your next big software rollout, we're here to help \u2014 fast, affordable, and on-demand.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Interested in getting started?\"}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(n,{href:\"https://techkooks.com/#contact\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Schedule a free consultation\"})}),\" to learn how remote IT support can work for your business.\"]})]});export const richText2=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[\"In today\u2019s digital landscape, small businesses rely on technology more than ever. From managing customer data to safeguarding against cyber threats, \",/*#__PURE__*/e(\"strong\",{children:\"IT support services have become essential\"}),\". But how much do these services actually cost?\"]}),/*#__PURE__*/e(\"p\",{children:\"In this guide, we\u2019ll break down service types, cost structures, and actionable tips to help you budget for the right IT support solution.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Introduction: Why Small Businesses Need IT Support\"})}),/*#__PURE__*/i(\"p\",{children:[\"Small businesses are no longer immune to IT challenges. \",/*#__PURE__*/e(\"strong\",{children:\"System crashes, data breaches, and inefficient software\"}),\" can cripple productivity and erode customer trust. While hiring full-time IT staff may not be realistic for most small companies, \",/*#__PURE__*/e(\"strong\",{children:\"outsourcing IT support\"}),\" offers a more scalable, cost-effective alternative.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Key Benefits:\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Enhanced cybersecurity and data protection\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Round-the-clock monitoring and support\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Lower operational risk and downtime\"})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Types of IT Support Services\"})}),/*#__PURE__*/i(\"p\",{children:[\"To choose the right solution, it's important to understand the \",/*#__PURE__*/e(\"strong\",{children:\"main types of IT support available\"}),\":\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"1. Managed IT Services\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Proactive, all-inclusive support for a flat monthly fee\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ideal for businesses seeking consistent, reliable coverage\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"2. On-Demand or Break/Fix Services\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Pay only when issues arise\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Suitable for very small businesses or startups\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"3. Cloud-Based IT Support\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Focused on remote backup, cloud apps, SaaS, and storage\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Excellent for remote teams or software-driven businesses\"})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Pricing Models for IT Support\"})}),/*#__PURE__*/e(\"p\",{children:\"IT service providers typically offer pricing under one of these models:\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Hourly Rates\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[\"Range: \",/*#__PURE__*/e(\"strong\",{children:\"$75 \u2013 $200/hour\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Best for occasional support or emergencies\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Monthly Flat Rates\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[\"Cost: \",/*#__PURE__*/e(\"strong\",{children:\"$99 \u2013 $500+ per user/device\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Predictable billing and comprehensive coverage\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Per-User vs. Per-Device\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Some charge per employee; others per workstation, server, or endpoint\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Choose based on your tech infrastructure and workforce model\"})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Average Cost Breakdown by Service Type\"})}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s what you can expect to pay across different IT services:\"}),/*#__PURE__*/e(\"figure\",{className:\"framer-table-wrapper\",children:/*#__PURE__*/e(\"table\",{children:/*#__PURE__*/i(\"tbody\",{children:[/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Service Type\"})})}),/*#__PURE__*/e(\"th\",{children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Average Cost\"})})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Help Desk Support\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"$100 \u2013 $150 per user/month\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Network Monitoring\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"$75 \u2013 $400 per month\"})})]}),/*#__PURE__*/i(\"tr\",{children:[/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"Cybersecurity Services\"})}),/*#__PURE__*/e(\"td\",{children:/*#__PURE__*/e(\"p\",{children:\"$500 \u2013 $2,000+ per month\"})})]})]})})}),/*#__PURE__*/e(\"p\",{children:\"Keep in mind that prices vary depending on region, provider, and your business needs.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Factors That Influence IT Support Costs\"})}),/*#__PURE__*/e(\"p\",{children:\"Several factors impact your final bill:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Size of your company\"}),\" \u2013 more users/devices = higher cost\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Industry regulations\"}),\" \u2013 compliance with HIPAA, PCI-DSS, etc.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Support hours needed\"}),\" \u2013 24/7 availability comes at a premium\"]})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"In-House vs. Outsourced IT Support\"})}),/*#__PURE__*/e(\"p\",{children:\"Hiring internally:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost\"}),\": $60,000\u2013$85,000/year (excluding benefits)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Requires onboarding, training, and benefits management\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost\"}),\": $12,000\u2013$30,000/year\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Offers access to a full team with specialized skills\"})})]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Verdict:\"}),\" Outsourcing is more cost-efficient and scalable for most small businesses.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Why Outsourcing IT Support Makes Sense\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Top Benefits:\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Immediate access to seasoned professionals\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scalable plans as your business grows\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduced downtime with proactive monitoring\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Predictable budgeting\"})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Choosing the Right IT Support Provider\"})}),/*#__PURE__*/e(\"p\",{children:\"Ask the following when evaluating providers:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What\u2019s included in the SLA?\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"How fast do they respond to issues?\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Do they have positive client reviews or case studies?\"})})})]}),/*#__PURE__*/e(\"p\",{children:\"Also, ensure that the provider understands your industry\u2019s specific compliance needs.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Avoid These Common Budgeting Mistakes\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Underestimating future needs\"}),\": Don\u2019t pick a solution that fits only your current size\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ignoring hidden fees\"}),\": Make sure all costs are transparent\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Overlooking support quality\"}),\": Cheap can turn out to be expensive in the long run\"]})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Case Studies and Real-World Examples\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Startup SaaS (5 users)\"}),\": Pays ~$600/month for cloud and cybersecurity support\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retail Chain (20 stores)\"}),\": Pays ~$3,500/month for full-service support\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Medical Clinic (HIPAA)\"}),\": Pays ~$1,200/month for compliance-focused IT support\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These examples highlight how pricing scales with complexity and risk.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"The Business Impact of Strong IT Support\"})}),/*#__PURE__*/e(\"p\",{children:\"Investing in quality IT services contributes to:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Faster issue resolution\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Improved data security\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Stronger compliance posture\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Increased productivity\"})})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Future Trends in IT Support Pricing\"})}),/*#__PURE__*/e(\"p\",{children:\"The IT support landscape is evolving:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI-driven chatbots\"}),\" are replacing tier-1 support\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Predictive analytics\"}),\" are minimizing downtime\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bundled service plans\"}),\" offer better value at a lower cost\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Being aware of these trends helps you future-proof your business decisions.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"FAQs About IT Support Services\"})}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. What\u2019s the cheapest option?\"}),/*#__PURE__*/e(\"br\",{}),\"Break/fix support is the cheapest upfront but comes with risk.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Can I combine in-house with outsourced IT?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes, a hybrid model is increasingly popular.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. Do I need 24/7 support?\"}),/*#__PURE__*/e(\"br\",{}),\"Not always. Business hours support may be enough unless you run 24/7 operations.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Conclusion: Is IT Support Worth the Investment?\"})}),/*#__PURE__*/i(\"p\",{children:[\"For small businesses, \",/*#__PURE__*/e(\"strong\",{children:\"IT support is no longer optional\u2014it\u2019s essential\"}),\". Outsourcing offers flexibility, expertise, and cost savings that in-house teams often can\u2019t match.\"]}),/*#__PURE__*/e(\"p\",{children:\"By choosing the right service and provider, you gain peace of mind and position your business for future growth.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Bonus: 5 Smart Questions to Ask a Potential IT Provider\"})}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Are your services compliant with my industry\u2019s regulations?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What\u2019s your average response time?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How do you manage backups and disaster recovery?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Can your services scale as we grow?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What exactly does your monthly fee include?\"})})]})]});export const richText3=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Introduction\"}),/*#__PURE__*/e(\"h3\",{children:\"Why This Guide Matters in 2025\"}),/*#__PURE__*/e(\"p\",{children:\"In a world of growing cybersecurity threats, remote workforces, and cloud-first infrastructures, Managed IT Services are no longer optional. This 2025 pricing guide helps you understand exactly what you\u2019re paying for, how pricing is structured, and how to make informed decisions that align with your business goals.\"}),/*#__PURE__*/e(\"h3\",{children:\"Who Should Read This?\"}),/*#__PURE__*/e(\"p\",{children:\"Whether you're a startup founder, CIO of a mid-sized firm, or an enterprise IT director, this guide is for anyone tasked with evaluating or optimizing IT service costs in 2025.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Are Managed IT Services?\"}),/*#__PURE__*/e(\"h3\",{children:\"Core Components of Managed IT Services\"}),/*#__PURE__*/e(\"p\",{children:\"Managed IT Services typically include 24/7 network monitoring, cybersecurity management, helpdesk support, cloud services, data backups, endpoint protection, and strategic IT consulting.\"}),/*#__PURE__*/e(\"h3\",{children:\"Benefits of Outsourcing IT in 2025\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing to a Managed Service Provider (MSP) reduces costs, improves security posture, enhances scalability, and provides expert support without maintaining an in-house team.\"}),/*#__PURE__*/e(\"h2\",{children:\"Pricing Models for Managed IT Services\"}),/*#__PURE__*/e(\"h3\",{children:\"Per-Device Pricing Model\"}),/*#__PURE__*/e(\"p\",{children:\"You\u2019re billed based on the number of devices supported. Costs average $50\u2013$200 per device per month in 2025, depending on service coverage.\"}),/*#__PURE__*/e(\"h3\",{children:\"Per-User Pricing Model\"}),/*#__PURE__*/e(\"p\",{children:\"Billed per employee, this model suits hybrid teams. Expect $100\u2013$300 per user monthly.\"}),/*#__PURE__*/e(\"h3\",{children:\"Tiered Pricing Packages\"}),/*#__PURE__*/e(\"p\",{children:\"Providers bundle services into packages like Basic, Standard, and Premium. Pricing ranges from $1,000 to $10,000+ monthly.\"}),/*#__PURE__*/e(\"h3\",{children:\"\\xc0 La Carte Services\"}),/*#__PURE__*/e(\"p\",{children:\"Pick only the services you need. Flexible, but potentially more expensive long-term due to lack of bundling discounts.\"}),/*#__PURE__*/e(\"h2\",{children:\"Average Costs of Managed IT Services in 2025\"}),/*#__PURE__*/e(\"h3\",{children:\"Small Business Pricing Estimates\"}),/*#__PURE__*/e(\"p\",{children:\"Companies with under 50 users can expect to pay between $1,000 and $3,000 per month.\"}),/*#__PURE__*/e(\"h3\",{children:\"Mid-Sized Company Pricing Ranges\"}),/*#__PURE__*/e(\"p\",{children:\"For 50\u2013200 users, monthly costs typically range from $3,000 to $10,000 depending on complexity and security needs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enterprise-Level Pricing Benchmarks\"}),/*#__PURE__*/e(\"p\",{children:\"Enterprises with extensive infrastructure and compliance requirements can pay anywhere from $10,000 to over $100,000 per month.\"}),/*#__PURE__*/e(\"h2\",{children:\"Factors Influencing Managed IT Service Costs\"}),/*#__PURE__*/e(\"h3\",{children:\"Business Size and Complexity\"}),/*#__PURE__*/e(\"p\",{children:\"Larger teams, multiple locations, and custom tech stacks require more support and raise costs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Compliance & Security Needs\"}),/*#__PURE__*/e(\"p\",{children:\"Industries like finance and healthcare with strict regulations will pay more for compliance-driven solutions.\"}),/*#__PURE__*/e(\"h3\",{children:\"Service Hours & Support Level\"}),/*#__PURE__*/e(\"p\",{children:\"24/7 support is pricier than standard business hours. Some businesses opt for hybrid models to manage costs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Onsite vs Remote Support\"}),/*#__PURE__*/e(\"p\",{children:\"Remote support is cheaper. Onsite support increases pricing by 10\u201320% or more depending on urgency.\"}),/*#__PURE__*/e(\"h2\",{children:\"Industry-Specific Pricing Considerations\"}),/*#__PURE__*/e(\"h3\",{children:\"Healthcare IT and HIPAA\"}),/*#__PURE__*/e(\"p\",{children:\"Expect $150+ per user for HIPAA-compliant MSPs. EMR integration and audit support drive costs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Finance Sector Needs\"}),/*#__PURE__*/e(\"p\",{children:\"Highly regulated firms may pay $200\u2013$400 per user/month due to advanced security and auditing requirements.\"}),/*#__PURE__*/e(\"h3\",{children:\"Retail & eCommerce\"}),/*#__PURE__*/e(\"p\",{children:\"Retailers need scalable IT during seasonal peaks and support for POS systems. Average: $75\u2013$250 per user/month.\"}),/*#__PURE__*/e(\"h2\",{children:\"Hidden Costs to Watch For\"}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding & Setup Fees\"}),/*#__PURE__*/e(\"p\",{children:\"Initial assessments, documentation, and environment mapping can cost $1,000 to $10,000 upfront.\"}),/*#__PURE__*/e(\"h3\",{children:\"Emergency or After-Hours Charges\"}),/*#__PURE__*/e(\"p\",{children:\"If not included in your SLA, emergency rates can range from $150 to $300 per hour.\"}),/*#__PURE__*/e(\"h3\",{children:\"Licensing & Third-Party Costs\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft 365, antivirus, cloud platforms, and compliance tools are often billed separately.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to Choose the Right MSP\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Qualifications to Look For\"}),/*#__PURE__*/e(\"p\",{children:\"Look for certifications (Microsoft, Cisco, etc.), service transparency, strong SLAs, and 24/7 support capability.\"}),/*#__PURE__*/e(\"h3\",{children:\"Questions to Ask\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What\u2019s included in the package?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How fast is your average response time?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Can you provide references from similar-sized businesses?\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Red Flags to Avoid\"}),/*#__PURE__*/e(\"p\",{children:\"Vague pricing, no documentation, no escalation process, or lacking a track record with companies like yours.\"}),/*#__PURE__*/e(\"h2\",{children:\"ROI of Managed IT Services\"}),/*#__PURE__*/e(\"h3\",{children:\"Cost vs Value\"}),/*#__PURE__*/e(\"p\",{children:\"When considering staffing, tools, and security investments, MSPs often cost less than hiring a full IT team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Impact on Downtime\"}),/*#__PURE__*/e(\"p\",{children:\"Downtime costs companies thousands per hour. MSPs proactively reduce risk through monitoring and fast incident response.\"}),/*#__PURE__*/e(\"h3\",{children:\"Strategic IT Forecasting\"}),/*#__PURE__*/e(\"p\",{children:\"Good MSPs act as vCIOs\u2014offering roadmaps, forecasting IT spend, and planning future infrastructure upgrades.\"}),/*#__PURE__*/e(\"h2\",{children:\"Trends Affecting Managed IT Costs in 2025\"}),/*#__PURE__*/e(\"h3\",{children:\"AI & Automation\"}),/*#__PURE__*/e(\"p\",{children:\"More MSPs are using AI for automated issue detection, ticket routing, and cybersecurity alerts\u2014raising efficiency and service value.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cybersecurity Demands\"}),/*#__PURE__*/e(\"p\",{children:\"Ransomware and phishing attacks have increased demand for robust threat detection, encryption, and zero-trust frameworks.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cloud & Hybrid Workforces\"}),/*#__PURE__*/e(\"p\",{children:\"Support for Azure, AWS, and multi-site remote teams requires more complex architectures and adds to cost.\"}),/*#__PURE__*/e(\"h2\",{children:\"Case Studies: Real-World 2025 Pricing Examples\"}),/*#__PURE__*/e(\"h3\",{children:\"Startup Example\"}),/*#__PURE__*/e(\"p\",{children:\"A tech startup with 10 users pays $1,500/month for helpdesk, antivirus, and cloud backup.\"}),/*#__PURE__*/e(\"h3\",{children:\"Mid-Market Firm\"}),/*#__PURE__*/e(\"p\",{children:\"120 users, cloud-first setup, compliance reporting, and 24/7 support: $8,000/month.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enterprise Example\"}),/*#__PURE__*/e(\"p\",{children:\"500 users across multiple regions with hybrid cloud, disaster recovery, and dedicated security team: $45,000/month.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to Budget for Managed IT Services\"}),/*#__PURE__*/e(\"h3\",{children:\"Forecasting Costs\"}),/*#__PURE__*/e(\"p\",{children:\"Factor in employee growth, regulatory changes, and new tech adoption. Use 12\u201324 month projections.\"}),/*#__PURE__*/e(\"h3\",{children:\"Align IT Spend With Business Goals\"}),/*#__PURE__*/e(\"p\",{children:\"Use MSP services to achieve business KPIs like uptime, customer experience, and innovation pace.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use SLAs to Control Cost\"}),/*#__PURE__*/e(\"p\",{children:\"Ensure SLAs include scope, escalation procedures, and clear pricing to avoid unexpected billing.\"}),/*#__PURE__*/e(\"h2\",{children:\"Common Mistakes to Avoid\"}),/*#__PURE__*/e(\"h3\",{children:\"Overpaying for Unused Services\"}),/*#__PURE__*/e(\"p\",{children:\"Don\u2019t subscribe to an all-inclusive package if you only need the essentials. Audit usage quarterly.\"}),/*#__PURE__*/e(\"h3\",{children:\"Ignoring Scalability\"}),/*#__PURE__*/e(\"p\",{children:\"Choose an MSP that can grow with your business\u2014without sudden pricing spikes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Not Reading the Fine Print\"}),/*#__PURE__*/e(\"p\",{children:\"Always review contract clauses around auto-renewals, termination fees, and support limits.\"}),/*#__PURE__*/e(\"h2\",{children:\"Managed IT Services vs In-House IT Costs\"}),/*#__PURE__*/e(\"h3\",{children:\"Comparative Cost\"}),/*#__PURE__*/e(\"p\",{children:\"Hiring internal IT staff can cost $70K\u2013$120K per person/year. An MSP offers wider support at a lower cost base.\"}),/*#__PURE__*/e(\"h3\",{children:\"Outsourcing Benefits\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing reduces turnover risks, adds redundancy, and gives access to broader expertise 24/7.\"}),/*#__PURE__*/e(\"h2\",{children:\"Final Thoughts\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Takeaways\"}),/*#__PURE__*/e(\"p\",{children:\"Managed IT Services offer predictable costs, scalable expertise, and comprehensive support. The right provider can save time, reduce risk, and accelerate growth.\"}),/*#__PURE__*/e(\"h3\",{children:\"Future Outlook\"}),/*#__PURE__*/e(\"p\",{children:\"Expect pricing to increase moderately in response to AI integration, advanced cybersecurity tools, and cloud dependency. The need for specialized, responsive support will only grow.\"}),/*#__PURE__*/e(\"h2\",{children:\"FAQs\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. What\u2019s the cheapest managed IT pricing model in 2025?\"}),/*#__PURE__*/e(\"br\",{}),\"The per-device model is generally most affordable for very small businesses with simple networks.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Are managed IT services worth it for startups?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes\u2014startups benefit from cost efficiency, instant scalability, and access to expertise they couldn\u2019t afford in-house.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. How often do MSPs raise their rates?\"}),/*#__PURE__*/e(\"br\",{}),\"Most increase rates 3\u20137% annually to adjust for inflation and increased service scope.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4. Can I switch providers mid-contract?\"}),/*#__PURE__*/e(\"br\",{}),\"Only if your contract allows. Review termination clauses and penalties carefully.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5. How do SLAs affect total cost?\"}),/*#__PURE__*/e(\"br\",{}),\"SLAs define scope, prevent overbilling, and hold the provider accountable\u2014helping you control long-term costs.\"]})]});export const richText4=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Why IT Services Are Critical to Small Business Growth\"}),/*#__PURE__*/e(\"p\",{children:\"In 2025, the competitive landscape for small businesses is more digital, fast-paced, and security-focused than ever. To scale effectively and stay resilient, small businesses must leverage the right IT services. Whether you're running a team of five or fifty, your technology infrastructure directly impacts productivity, cybersecurity, and customer experience.\"}),/*#__PURE__*/e(\"p\",{children:\"In this article, we explore the top 13 IT services for small businesses that are not only essential but also scalable and cost-effective. From cloud solutions to cybersecurity, this guide is designed to help you future-proof your business operations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Small Business IT Needs\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"What distinguishes small business IT from enterprise IT?\"}),/*#__PURE__*/e(\"br\",{}),\"Small businesses typically operate with tighter budgets, leaner teams, and limited in-house tech expertise. Unlike large enterprises, they often require flexible, outsourced IT solutions that can scale as they grow. This means prioritizing cost-efficiency, security, and simplicity in IT service design.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trends influencing small business IT decisions\"}),/*#__PURE__*/e(\"br\",{}),\"Key trends include the rise of remote work, increased cyber threats, reliance on cloud platforms, and the need for automation. These forces are reshaping how small businesses choose, implement, and manage their IT systems in 2025.\"]}),/*#__PURE__*/e(\"h2\",{children:\"1. Managed IT Services\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proactive vs. reactive support\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT services offer round-the-clock monitoring, regular maintenance, and issue resolution. Rather than waiting for something to break, a proactive approach identifies and fixes issues before they escalate\u2014saving time and reducing downtime.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How managed services reduce operational burden\"}),/*#__PURE__*/e(\"br\",{}),\"By outsourcing your IT operations, you free up internal resources and gain access to a team of experts who keep your systems optimized and secure. This is especially crucial for small businesses without dedicated in-house IT teams.\"]}),/*#__PURE__*/e(\"h2\",{children:\"2. Strategic IT Consulting\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Long-term technology roadmap planning\"}),/*#__PURE__*/e(\"br\",{}),\"Strategic IT consultants help you align your technology choices with your business goals. Whether you\u2019re expanding, going hybrid, or automating, a well-defined IT roadmap ensures every dollar invested in tech delivers measurable ROI.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Aligning tech with business objectives\"}),/*#__PURE__*/e(\"br\",{}),\"IT consultants assess your workflows, recommend tools, and help with implementation to ensure that technology enhances\u2014not hinders\u2014your operations.\"]}),/*#__PURE__*/e(\"h2\",{children:\"3. Cloud Computing & Storage\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advantages of cloud adoption\"}),/*#__PURE__*/e(\"br\",{}),\"Cloud services offer scalability, cost-savings, and remote accessibility. With platforms like Microsoft 365, Google Workspace, and AWS, small businesses can securely access files, collaborate in real-time, and reduce hardware dependency.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Choosing the right cloud platform\"}),/*#__PURE__*/e(\"br\",{}),\"The key is finding a platform that balances usability, security, and cost. A managed service provider can help you migrate to the cloud, maintain uptime, and ensure secure configurations.\"]}),/*#__PURE__*/e(\"h2\",{children:\"4. Network Setup & Cybersecurity\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Modern network design for hybrid work\"}),/*#__PURE__*/e(\"br\",{}),\"Whether your team is in-office or remote, a reliable and secure network is non-negotiable. IT professionals help set up wired and wireless networks with optimal speed and segmentation.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Firewalls, VPNs, and endpoint security\"}),/*#__PURE__*/e(\"br\",{}),\"Robust cybersecurity begins with basics like firewalls, VPNs for remote access, and anti-malware on all devices. These tools help prevent unauthorized access and data breaches.\"]}),/*#__PURE__*/e(\"h2\",{children:\"5. Data Backup and Disaster Recovery\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Off-site backup, redundancy & DR planning\"}),/*#__PURE__*/e(\"br\",{}),\"Accidents, ransomware, or even simple human error can lead to data loss. With automated backups and a disaster recovery plan in place, your business stays operational even in worst-case scenarios.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-life small business recovery examples\"}),/*#__PURE__*/e(\"br\",{}),\"Businesses hit by data loss have reported recovery times under 2 hours with the right solutions in place\u2014saving them from potential revenue loss and reputation damage.\"]}),/*#__PURE__*/e(\"h2\",{children:\"6. Remote Monitoring & Management (RMM)\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-time issue resolution\"}),/*#__PURE__*/e(\"br\",{}),\"RMM tools monitor servers, networks, and devices in real-time, enabling rapid detection and remediation of IT issues. This proactive system keeps your tech environment healthy and minimizes disruptions.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"RMM tools for SMBs\"}),/*#__PURE__*/e(\"br\",{}),\"Popular platforms like NinjaOne, Atera, and N-able provide small businesses with powerful monitoring capabilities at affordable price points.\"]}),/*#__PURE__*/e(\"h2\",{children:\"7. Help Desk and User Support\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"24/7 vs business-hours support\"}),/*#__PURE__*/e(\"br\",{}),\"Fast support is crucial for minimizing downtime. Whether it\u2019s password resets or printer issues, having access to a responsive help desk ensures employees remain productive.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ticketing systems that scale with you\"}),/*#__PURE__*/e(\"br\",{}),\"Modern help desks integrate with ticketing platforms like Zendesk or Freshdesk, enabling easy tracking of requests and improved service delivery.\"]}),/*#__PURE__*/e(\"h2\",{children:\"8. Software as a Service (SaaS) Integration\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SaaS tools for marketing, CRM, finance\"}),/*#__PURE__*/e(\"br\",{}),\"From QuickBooks and HubSpot to Slack and Canva, SaaS platforms are vital to small business efficiency. IT service providers help with onboarding, user access, and vendor coordination.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Licensing and management services\"}),/*#__PURE__*/e(\"br\",{}),\"Avoid overpaying or under-utilizing your software licenses by having them managed through a centralized IT service provider.\"]}),/*#__PURE__*/e(\"h2\",{children:\"9. VoIP and Unified Communications\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benefits of VoIP for remote teams\"}),/*#__PURE__*/e(\"br\",{}),\"VoIP offers cost-effective, scalable, and flexible communication. It enables voice calls, video conferencing, and team messaging\u2014all accessible from any device, anywhere.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How to choose a VoIP provider\"}),/*#__PURE__*/e(\"br\",{}),\"Look for providers with clear uptime guarantees, robust support, and integrations with your CRM or email platforms.\"]}),/*#__PURE__*/e(\"h2\",{children:\"10. Compliance & Data Governance\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HIPAA, GDPR, and PCI for SMBs\"}),/*#__PURE__*/e(\"br\",{}),\"Failure to comply with industry regulations can lead to hefty fines and reputational damage. IT experts help configure systems to stay compliant with local and global laws.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Avoiding fines and legal risks\"}),/*#__PURE__*/e(\"br\",{}),\"From encrypting data to setting up access controls, a compliance strategy protects your clients and your bottom line.\"]}),/*#__PURE__*/e(\"h2\",{children:\"11. IT Security Awareness Training\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Human error as a security risk\"}),/*#__PURE__*/e(\"br\",{}),\"Phishing and social engineering attacks often bypass technical defenses. Regular employee training helps staff recognize threats and respond appropriately.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Employee training programs & LMS tools\"}),/*#__PURE__*/e(\"br\",{}),\"IT providers often include security training modules through platforms like KnowBe4 or CyberHoot, tailored for small business environments.\"]}),/*#__PURE__*/e(\"h2\",{children:\"12. Device & Asset Management\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managing laptops, phones, and IoT devices\"}),/*#__PURE__*/e(\"br\",{}),\"As your team grows, keeping track of devices becomes critical. Asset management solutions help monitor device health, updates, and inventory.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tracking, lifecycle, and support\"}),/*#__PURE__*/e(\"br\",{}),\"From procurement to retirement, devices should be monitored for performance, warranties, and support status\u2014preventing productivity bottlenecks.\"]}),/*#__PURE__*/e(\"h2\",{children:\"13. Business Process Automation\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Low-code tools for SMBs\"}),/*#__PURE__*/e(\"br\",{}),\"Tools like Zapier, Make, and Microsoft Power Automate let you connect apps and automate repetitive tasks\u2014no coding required. This helps streamline operations and reduce manual errors.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automating onboarding, support, and reporting\"}),/*#__PURE__*/e(\"br\",{}),\"From auto-responders to automated invoice generation, IT partners can help design custom workflows that scale with your business needs.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to Choose the Right IT Services Provider\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Red flags and green lights\"}),/*#__PURE__*/e(\"br\",{}),\"Look for transparency, proven experience, and scalability in your provider. Avoid vague contracts, unclear pricing, or providers who don\u2019t offer a service-level agreement (SLA).\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MSP vs in-house: cost comparison\"}),/*#__PURE__*/e(\"br\",{}),\"Outsourcing often proves more cost-effective than hiring full-time IT staff\u2014especially when you consider access to 24/7 expertise and enterprise-grade tools.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Final Thoughts: Growing Smart with the Right IT Partner\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Invest in future-ready infrastructure\"}),/*#__PURE__*/e(\"br\",{}),\"Today\u2019s small businesses can\u2019t afford to treat IT as an afterthought. With the right technology foundation and expert support, you can scale confidently and securely.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recap of long-term ROI\"}),/*#__PURE__*/e(\"br\",{}),\"Investing in IT services for small business operations leads to better security, happier customers, and more efficient internal processes. In 2025, smart IT investments aren\u2019t optional\u2014they\u2019re strategic.\"]})]});export const richText5=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Introduction to IT Services in the Legal Sector\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The Growing Need for Tech in Law Practices\"}),/*#__PURE__*/e(\"br\",{}),\"The legal industry is undergoing a significant transformation as law firms increasingly rely on digital tools to manage cases, communicate with clients, and protect sensitive information. With rising cyber threats, stringent compliance requirements, and the pressure to operate efficiently, managed IT services for law firms have become not just a convenience, but a necessity.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why Legal Professionals Are Turning to Managed IT Services\"}),/*#__PURE__*/e(\"br\",{}),\"Legal professionals, including lawyers, solicitors, and paralegals, are turning to managed IT solutions to handle everything from data protection to technical support. These services ensure that law offices operate seamlessly, maintain uptime, and stay protected from evolving cybersecurity risks.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What Are Managed IT Services for Law Firms?\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition and Core Components\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT services for legal firms refer to outsourced technology solutions designed to support the operational and security needs of law offices. These services typically include 24/7 helpdesk support, cloud storage, cybersecurity, remote access setup, system monitoring, and compliance auditing.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Difference Between Managed IT and Break-Fix Support\"}),/*#__PURE__*/e(\"br\",{}),\"Unlike traditional break-fix models, managed IT offers proactive, continuous monitoring and maintenance. This reduces downtime and improves response time, which is critical for law firms handling confidential data.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Overview of Services\"})}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cloud-based data management\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cybersecurity defenses\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Technical helpdesk support\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compliance-driven solutions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Backup and disaster recovery\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Key Benefits of Managed IT for Law Firms\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"24/7 Legal IT Support with Fast Response Time\"}),/*#__PURE__*/e(\"br\",{}),\"Round-the-clock IT support helps law offices minimize disruptions and access technical assistance when it matters most.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Security Against Cyber Threats\"}),/*#__PURE__*/e(\"br\",{}),\"With robust cybersecurity\u2014including firewalls, encryption, and real-time monitoring\u2014law firms are shielded from phishing, ransomware, and data breaches.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved Compliance with Regulations\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT ensures compliance with laws like GDPR and HIPAA by enforcing audit trails, access controls, and secure data storage.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Tailored IT Solutions for Law Firms of All Sizes\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Small vs. Large Law Firms\"}),/*#__PURE__*/e(\"br\",{}),\"Small law firms benefit from affordable, enterprise-level IT support. Large firms enjoy scalable infrastructure tailored to their operational needs.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalable IT Services for Growth\"}),/*#__PURE__*/e(\"br\",{}),\"As firms expand, managed IT grows with them, offering cloud migration, system upgrades, and enhanced security.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strategic IT Consulting\"}),/*#__PURE__*/e(\"br\",{}),\"Expert consulting helps legal firms choose the right tools, avoid downtime, and gain a competitive edge.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Cybersecurity: A Top Priority in Legal IT Support\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why Law Firms Are Targeted\"}),/*#__PURE__*/e(\"br\",{}),\"Sensitive data and high-value cases make law firms prime cybercrime targets.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Building a Secure Infrastructure\"}),/*#__PURE__*/e(\"br\",{}),\"IT providers deploy layered defenses such as multi-factor authentication and encrypted storage.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk Mitigation with Legal Tech\"}),/*#__PURE__*/e(\"br\",{}),\"Advanced monitoring tools proactively identify risks and alert IT teams in real time.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Cloud Computing and Remote Work Enablement\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secure Cloud Access\"}),/*#__PURE__*/e(\"br\",{}),\"Cloud platforms enable secure, remote file access\u2014crucial for hybrid or remote law practices.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remote Work Compliance\"}),/*#__PURE__*/e(\"br\",{}),\"VPNs, device encryption, and access restrictions ensure remote work adheres to regulations.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mobility and Flexibility\"}),/*#__PURE__*/e(\"br\",{}),\"Legal professionals stay connected using virtual desktops, encrypted messaging, and cloud document tools.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Compliance and Regulatory Considerations\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Navigating GDPR, HIPAA, and More\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT ensures that your firm stays up-to-date with evolving data privacy regulations.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The Role of IT in Ensuring Compliance\"}),/*#__PURE__*/e(\"br\",{}),\"From automatic updates to audit reporting, IT helps firms stay legally protected.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Document Management and Audit Trails\"}),/*#__PURE__*/e(\"br\",{}),\"Track every file access and edit\u2014perfect for regulatory audits and internal transparency.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Streamlining Operations and Boosting Productivity\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automating Legal Admin Tasks\"}),/*#__PURE__*/e(\"br\",{}),\"Automated billing, scheduling, and email follow-ups free up time for billable work.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integrating Legal Tech Tools\"}),/*#__PURE__*/e(\"br\",{}),\"Synchronize CRMs, case files, billing systems, and client communication tools into one seamless system.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improving Client Communication\"}),/*#__PURE__*/e(\"br\",{}),\"Client portals, VOIP, and encrypted chat improve satisfaction and case collaboration.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Support for Specialized Legal Tech Platforms\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Software Compatibility\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT ensures smooth integration with Clio, PracticePanther, MyCase, and other legal platforms.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Guaranteed Uptime\"}),/*#__PURE__*/e(\"br\",{}),\"SLAs promise uptime for essential tools, minimizing client service interruptions.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Custom Solutions for Specialty Fields\"}),/*#__PURE__*/e(\"br\",{}),\"Tailored IT solutions serve niche practices like IP, family law, or criminal defense.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Disaster Recovery and Business Continuity\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Backups for Law Offices\"}),/*#__PURE__*/e(\"br\",{}),\"Encrypted daily backups ensure that no data is ever permanently lost.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recovery Planning\"}),/*#__PURE__*/e(\"br\",{}),\"Have a plan in place to avoid costly downtime from system failure or attacks.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Crisis-Ready Systems\"}),/*#__PURE__*/e(\"br\",{}),\"IT support ensures that natural disasters, cyberattacks, or outages don\u2019t affect operations.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Key Considerations When Choosing an IT Provider\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"What to Look For\"}),/*#__PURE__*/e(\"br\",{}),\"Choose providers with legal industry experience, transparent contracts, and responsive support.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Industry-Specific Knowledge\"}),/*#__PURE__*/e(\"br\",{}),\"Legal software familiarity is essential to ensure seamless service.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SLAs and Transparency\"}),/*#__PURE__*/e(\"br\",{}),\"Service Level Agreements provide guaranteed uptime and accountability.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Real-World Case Studies\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud-Based Solo Practice\"}),/*#__PURE__*/e(\"br\",{}),\"A solo practitioner migrated to the cloud, gaining secure access from anywhere and reducing office costs.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Made Easy\"}),/*#__PURE__*/e(\"br\",{}),\"A mid-sized firm passed a GDPR audit with flying colors thanks to IT-led compliance protocols.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ransomware Stopped in Its Tracks\"}),/*#__PURE__*/e(\"br\",{}),\"A law firm avoided disaster due to 24/7 monitoring and real-time IT response.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Cost Efficiency and ROI\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"In-House vs. Managed IT\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT is often more cost-effective than hiring full-time staff.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Measuring ROI\"}),/*#__PURE__*/e(\"br\",{}),\"Look at increased productivity, reduced downtime, and improved compliance.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lower Overhead\"}),/*#__PURE__*/e(\"br\",{}),\"Reduce expenses on hardware, software licensing, and emergency fixes.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Future of Legal IT\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trends to Watch\"}),/*#__PURE__*/e(\"br\",{}),\"Expect more AI, automation, and analytics in case handling and research.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI in Legal Practice\"}),/*#__PURE__*/e(\"br\",{}),\"AI tools are already helping legal teams streamline tasks and improve accuracy.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Long-Term Strategic Value\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT provides the foundation for sustainable growth and innovation.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"The legal profession is built on trust, confidentiality, and efficiency. Managed IT services for law firms uphold these values while adding speed, security, and scalability. Whether you're a solo lawyer or a large firm, embracing professional IT support is a strategic move for the future of your law practice.\"}),/*#__PURE__*/e(\"h3\",{children:\"FAQs\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"What is included in legal IT support?\"}),/*#__PURE__*/e(\"br\",{}),\"Support typically includes cybersecurity, compliance, helpdesk, cloud services, and software integration.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How do managed IT services ensure compliance?\"}),/*#__PURE__*/e(\"br\",{}),\"They implement audit trails, secure access, and monitor system integrity based on regulatory standards.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Can small law firms afford managed IT?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes. Scalable packages make enterprise-level support accessible to small firms.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"What happens if my system crashes?\"}),/*#__PURE__*/e(\"br\",{}),\"Managed IT ensures regular backups, fast recovery, and minimal downtime.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Are providers familiar with legal software?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes. Reputable IT providers support tools like Clio, MyCase, and PracticePanther.\"]})]});export const richText6=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Introduction\"}),/*#__PURE__*/e(\"p\",{children:\"In today\u2019s fast-paced digital economy, automation has become the backbone of scalable businesses. From streamlining communication to managing tasks and client interactions, automation enables companies\u2014especially small businesses and solopreneurs\u2014to do more with less.\"}),/*#__PURE__*/e(\"p\",{children:\"The common belief is that automation is only accessible through costly tools and expert developers. But the truth is, you can begin automating various aspects of your business without spending a dime. By leveraging free tools, smart strategies, and a bit of creativity, it's entirely possible to lay the foundation for a self-operating business model.\"}),/*#__PURE__*/e(\"p\",{children:\"This guide walks you through how to automate your business operations without opening your wallet. Whether you\u2019re a startup founder, freelancer, or small business owner, you\u2019ll find actionable steps and tools to boost productivity for free.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why Automate Your Business?\"}),/*#__PURE__*/e(\"p\",{children:\"Automation is not just a buzzword; it's a strategy that delivers real, measurable benefits\u2014especially when resources are tight.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. Save Time:\"}),\" Automating routine tasks gives you back hours every week.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Improve Accuracy and Consistency:\"}),\" Automation reduces human errors and ensures standardized output.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. Increase Productivity:\"}),\" It allows your business to run multiple operations simultaneously, improving efficiency.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4. Achieve Scalability:\"}),\" You can expand your workload without growing your team.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5. Boost Customer Satisfaction:\"}),\" Faster responses and consistency improve the client experience.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Analyzing Your Business Workflow\"}),/*#__PURE__*/e(\"p\",{children:\"Before introducing automation, it's crucial to map out what can be automated.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identify repetitive tasks:\"}),\" List all recurring tasks like invoicing, email responses, or posting on social media.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Map your workflow:\"}),\" Sketch out how tasks move from start to finish to identify bottlenecks.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Prioritize by impact and frequency:\"}),\" Focus on high-volume, low-complexity tasks first.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Categorize by business function:\"}),\" This includes marketing, communication, admin, and operations.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Zero-Cost Tools to Automate Core Functions\"}),/*#__PURE__*/e(\"p\",{children:\"There are several powerful free tools that enable you to start automating right away.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace (Free Tier):\"}),\" Use Google Forms for data collection, Sheets for calculations, and Calendar for scheduling.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Zapier (Free Plan):\"}),\" Create automated workflows (called Zaps) that connect your apps. For example, auto-save Gmail attachments to Google Drive.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IFTTT:\"}),\" Similar to Zapier, it allows you to trigger events across tools like Twitter, Gmail, Dropbox, and more.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trello / Notion:\"}),\" These tools manage projects and can be automated with templates and reminders.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mailchimp Free Plan:\"}),\" Send automated email campaigns and onboarding sequences to up to 500 contacts.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Buffer or Hootsuite (Free Plans):\"}),\" Schedule and manage social media content for up to three platforms.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Automating Communication & Scheduling\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gmail Filters & Labels:\"}),\" Automatically sort and respond to emails based on keywords or sender.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Calendar + Calendly (Free):\"}),\" Let clients book time without back-and-forth emails.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Auto-replies & Canned Responses:\"}),\" Save time responding to common inquiries.\"]}),/*#__PURE__*/e(\"h3\",{children:\"CRM and Sales Process Automation\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HubSpot CRM (Free):\"}),\" Manage contacts, automate follow-ups, and track deals\u2014all from one platform.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Streak for Gmail:\"}),\" Integrates CRM functionalities directly into your inbox.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mailchimp Sequences:\"}),\" Set up automated onboarding or sales nurture sequences.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Marketing and Content Automation\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Canva (Free):\"}),\" Use branded templates for faster design creation.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ChatGPT and Other AI Writers:\"}),\" Generate blog posts, captions, and newsletters efficiently.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Buffer:\"}),\" Auto-schedule content for Instagram, Facebook, LinkedIn, and X (formerly Twitter).\"]}),/*#__PURE__*/e(\"h3\",{children:\"Invoicing & Accounting Tools\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Wave (Free Accounting Software):\"}),\" Track expenses, send invoices, and manage reports at no cost.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets Templates:\"}),\" Use pre-built formulas for budgeting, invoicing, and tracking.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Invoice Generator by Invoiced:\"}),\" A simple, free tool to create and send invoices.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Automating File and Document Management\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive + Zapier/IFTTT:\"}),\" Auto-organize documents into folders when they\u2019re uploaded or received.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Standard Naming Conventions:\"}),\" Use consistent file names so automation rules work correctly.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Auto-Backups:\"}),\" Use cloud sync tools to auto-save backups of important documents.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Free Automation in Team Management\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notion Templates:\"}),\" Create reusable SOPs, onboarding templates, and content calendars.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Free Workspace:\"}),\" Integrate Google Calendar, Trello, and other apps to streamline communication.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ClickUp (Free Tier):\"}),\" Great for team task management with built-in automations.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Real Case Studies\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Case 1: A Freelance Writer Using Trello & Zapier:\"}),/*#__PURE__*/e(\"br\",{}),\"A content writer uses Trello for task management and Zapier to auto-archive completed tasks into Google Sheets for monthly reporting.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Case 2: A Virtual Assistant Using Gmail Filters:\"}),/*#__PURE__*/e(\"br\",{}),\"By setting up filters and canned responses, a VA saves over 5 hours weekly just responding to client emails.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Case 3: A Dropshipper Using Mailchimp & Google Sheets:\"}),/*#__PURE__*/e(\"br\",{}),\"This business owner uses Google Sheets for inventory tracking and Mailchimp for marketing automation\u2014all without paying a dime.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Best Practices for Free Automation\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Avoid Tool Overlap:\"}),\" Don\u2019t use five tools when two can do the job.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Understand Usage Limits:\"}),\" Free plans often have monthly caps\u2014work within those.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Stack Your Tools Smartly:\"}),\" Use Zapier to connect different platforms in one workflow.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Review Regularly:\"}),\" Automations can break\u2014test and tweak regularly.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Limitations and When to Upgrade\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tool Restrictions:\"}),\" Free plans may lack advanced features or integrations.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability Barriers:\"}),\" If your operations grow, you may hit plan limits.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Branding Restrictions:\"}),\" Some tools add their branding in the free version.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"When to Pay:\"}),\" Upgrade when automation begins to save more time than it costs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"You don\u2019t need deep pockets to bring automation into your business. By leveraging powerful free tools and adopting a systems-first mindset, you can eliminate busywork, boost productivity, and scale your operations. The key is to start small, test consistently, and optimize for efficiency.\"}),/*#__PURE__*/e(\"p\",{children:\"Free automation isn\u2019t about cutting corners\u2014it\u2019s about working smarter with what you have.\"}),/*#__PURE__*/e(\"h3\",{children:\"FAQs\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. Can I really automate without hiring anyone?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes. Many solopreneurs fully automate client onboarding, marketing, and task management without hiring staff.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. What\u2019s the best free CRM?\"}),/*#__PURE__*/e(\"br\",{}),\"HubSpot CRM is one of the most robust and user-friendly free CRMs available.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. Are free automation tools secure?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes, as long as you use well-known providers like Google, Zapier, and HubSpot. Always enable two-factor authentication.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4. What tools work best for solopreneurs?\"}),/*#__PURE__*/e(\"br\",{}),\"Notion, Calendly, Google Workspace, and Mailchimp offer a great balance of simplicity and power.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5. How do I monitor my automations efficiently?\"}),/*#__PURE__*/e(\"br\",{}),\"Set a weekly review schedule to test automations, check reports, and tweak workflows as needed.\"]})]});export const richText7=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Introduction\"}),/*#__PURE__*/i(\"p\",{children:[\"In today\u2019s fast-paced digital economy, businesses are constantly seeking ways to improve operational efficiency, reduce costs, and remain competitive. One increasingly popular strategy is to \",/*#__PURE__*/e(\"strong\",{children:\"outsource IT support services\"}),\". By partnering with external providers, companies can tap into expert knowledge, advanced technologies, and scalable solutions\u2014all while keeping internal resources focused on core business objectives. This article explores the compelling reasons behind this strategic shift and how organizations of all sizes can benefit from outsourced IT support.\"]}),/*#__PURE__*/e(\"h2\",{children:\"1. The Rising Demand for IT Outsourcing\"}),/*#__PURE__*/e(\"p\",{children:\"The global IT outsourcing market is experiencing exponential growth. According to recent industry reports, the market is projected to exceed $1 trillion by 2030, driven by the proliferation of cloud computing, remote work, and increasing cybersecurity threats. Small and medium-sized enterprises (SMEs) and large corporations alike are leveraging third-party IT support to manage everything from infrastructure and helpdesk services to cybersecurity and cloud migration.\"}),/*#__PURE__*/e(\"p\",{children:\"The push towards digital transformation\u2014accelerated by the COVID-19 pandemic\u2014has made it imperative for businesses to modernize their IT operations without inflating overhead. Outsourcing offers a flexible, cost-effective solution, allowing organizations to respond quickly to market demands and technological advancements.\"}),/*#__PURE__*/e(\"h2\",{children:\"2. What Does IT Support Outsourcing Mean?\"}),/*#__PURE__*/e(\"p\",{children:\"IT support outsourcing involves delegating a company\u2019s technology-related tasks and services to an external service provider. These services can be delivered remotely or on-site, depending on the business needs. The scope can range from simple helpdesk functions to complex network security management and cloud infrastructure maintenance.\"}),/*#__PURE__*/e(\"p\",{children:\"Commonly outsourced IT services include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Technical helpdesk and user support\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Network monitoring and management\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cloud computing services\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cybersecurity and threat detection\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Software updates and patch management\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data backup and disaster recovery\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By outsourcing these functions, businesses can ensure their IT environment remains secure, efficient, and aligned with the latest technological standards\u2014without the cost or complexity of managing it all in-house.\"}),/*#__PURE__*/e(\"h2\",{children:\"3. Cost-Efficiency and ROI\"}),/*#__PURE__*/e(\"p\",{children:\"One of the primary reasons businesses outsource IT support is cost savings. Building and maintaining an internal IT department involves significant expenses: hiring, training, salaries, benefits, office space, and equipment.\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing reduces or eliminates many of these costs. Instead of paying full-time salaries, companies pay only for the services they need. This model is especially beneficial for smaller businesses with limited budgets. Outsourced providers also help businesses avoid the expense of constantly upgrading hardware and software, as they often bring their own resources and tools.\"}),/*#__PURE__*/e(\"p\",{children:\"Case studies consistently show that companies that outsource IT support can reduce their IT costs by up to 40% while maintaining or improving service quality.\"}),/*#__PURE__*/e(\"h2\",{children:\"4. Access to Top-Tier Talent\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing opens doors to a global pool of highly skilled professionals. Rather than limiting their options to local talent, businesses gain access to IT experts with specialized skills in areas like cybersecurity, DevOps, cloud architecture, AI integration, and more.\"}),/*#__PURE__*/e(\"p\",{children:\"This is particularly advantageous for companies facing a skills shortage or those that need expertise for a specific project. Reputable IT service providers stay current with industry certifications, tools, and methodologies\u2014ensuring businesses benefit from cutting-edge solutions.\"}),/*#__PURE__*/e(\"h2\",{children:\"5. 24/7 Support and Uptime\"}),/*#__PURE__*/e(\"p\",{children:\"In a world where operations often run around the clock and customers expect immediate responses, 24/7 IT support is no longer a luxury\u2014it\u2019s a necessity.\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourced providers typically offer continuous support, ensuring issues are addressed promptly regardless of the time or day. This proactive monitoring helps minimize downtime, which can have significant financial and reputational impacts.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, a single hour of IT downtime can cost large enterprises tens of thousands of dollars. Outsourced teams are structured to detect, diagnose, and resolve problems before they escalate.\"}),/*#__PURE__*/e(\"h2\",{children:\"6. Enhanced Security and Compliance\"}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity threats are growing more sophisticated and frequent. Ransomware, phishing, data breaches, and insider threats can cripple a business.\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourced IT support firms specialize in building robust cybersecurity defenses. They implement firewalls, endpoint protection, threat monitoring, encryption protocols, and more. Moreover, they help ensure businesses comply with industry regulations such as GDPR, HIPAA, PCI-DSS, and ISO standards.\"}),/*#__PURE__*/e(\"p\",{children:\"This expertise is critical for avoiding fines, lawsuits, and damage to customer trust.\"}),/*#__PURE__*/e(\"h2\",{children:\"7. Ability to Focus on Core Business Operations\"}),/*#__PURE__*/e(\"p\",{children:\"Managing IT infrastructure is time-consuming and distracts from strategic goals. By outsourcing these responsibilities, internal teams can focus on growth, innovation, and customer experience.\"}),/*#__PURE__*/e(\"p\",{children:\"This is especially important for startups and SMEs that need to allocate their limited resources to high-impact activities like product development, marketing, and sales.\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, a retail business might benefit more from investing in e-commerce optimization rather than building an in-house IT support desk.\"}),/*#__PURE__*/e(\"h2\",{children:\"8. Scalability and Flexibility of Services\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourced IT support is inherently scalable. As a business grows or experiences seasonal fluctuations, service levels can be adjusted accordingly. This agility is difficult to achieve with a fixed internal team.\"}),/*#__PURE__*/e(\"p\",{children:\"Whether a company needs temporary support during a product launch or full-scale management of its infrastructure, outsourced providers can deliver on demand. Most offer modular pricing and custom plans to match business needs and budgets.\"}),/*#__PURE__*/e(\"h2\",{children:\"9. Latest Technology Without Heavy Investment\"}),/*#__PURE__*/e(\"p\",{children:\"Technology evolves rapidly, and keeping up with hardware, software, and compliance requirements can be expensive.\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourced providers typically use the latest tools and platforms and make them available to their clients. This means businesses can leverage new technologies\u2014like AI-driven automation or advanced cloud platforms\u2014without bearing the cost of purchasing, maintaining, or upgrading them.\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s a plug-and-play model that drives innovation at a fraction of the cost.\"}),/*#__PURE__*/e(\"h2\",{children:\"10. Disaster Recovery and Business Continuity\"}),/*#__PURE__*/e(\"p\",{children:\"IT support providers offer robust disaster recovery plans to ensure business continuity in the event of data loss, hardware failure, or cyberattack.\"}),/*#__PURE__*/e(\"p\",{children:\"These plans include data backups, redundant systems, failover solutions, and detailed recovery protocols. Outsourcing disaster recovery provides peace of mind and reduces downtime risks associated with natural disasters or unforeseen events.\"}),/*#__PURE__*/e(\"h2\",{children:\"11. Risk Mitigation and Professional Oversight\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing reduces operational risk. Providers are bound by service level agreements (SLAs) that define uptime guarantees, response times, and accountability.\"}),/*#__PURE__*/e(\"p\",{children:\"Having a partner with dedicated resources and experience in risk mitigation protects against system failures, human error, and compliance breaches. Businesses gain both technical and legal protection.\"}),/*#__PURE__*/e(\"h2\",{children:\"12. Quick Deployment and Seamless Integration\"}),/*#__PURE__*/e(\"p\",{children:\"Setting up an in-house IT team can take months. By contrast, outsourced providers often offer fast onboarding, sometimes within days.\"}),/*#__PURE__*/e(\"p\",{children:\"They bring ready-made frameworks, tools, and processes to integrate smoothly into the business's existing systems. This minimizes disruption and accelerates time to value.\"}),/*#__PURE__*/e(\"h2\",{children:\"13. Custom-Tailored IT Support Packages\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing isn\u2019t a one-size-fits-all solution. Providers offer tailored packages based on the size, industry, and needs of the business.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, a fintech startup might require high-security cloud hosting and compliance support, while a local manufacturing company might need basic helpdesk services and network monitoring.\"}),/*#__PURE__*/e(\"p\",{children:\"Customization ensures every dollar spent on IT support delivers maximum value.\"}),/*#__PURE__*/e(\"h2\",{children:\"14. Challenges and How to Overcome Them\"}),/*#__PURE__*/e(\"p\",{children:\"While outsourcing has numerous advantages, it\u2019s not without challenges:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Communication barriers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Time zone differences\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data privacy concerns\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Vendor lock-in\"})})]}),/*#__PURE__*/e(\"p\",{children:\"However, these can be mitigated with careful planning:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Establishing clear SLAs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Choosing providers with transparent processes and strong reputations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Starting with smaller projects before full-scale outsourcing\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"15. How to Select the Right IT Support Provider\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing the right partner is critical. Look for:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Proven industry experience\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Certified professionals\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Positive client reviews and case studies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Transparent pricing models\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Robust security practices\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Ask questions like:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What industries do you specialize in?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"What SLAs do you guarantee?\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How do you handle data security and compliance?\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Careful vetting ensures a partnership that drives long-term success.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing IT support services is a strategic move that offers cost-efficiency, expert access, scalability, and robust protection against evolving digital threats. In a landscape where technology is the backbone of business success, outsourcing provides a smart path forward\u2014freeing internal resources to focus on what matters most: innovation and growth.\"}),/*#__PURE__*/e(\"h2\",{children:\"FAQs\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. What types of IT services are most commonly outsourced?\"}),/*#__PURE__*/e(\"br\",{}),\"Helpdesk support, cybersecurity, cloud services, software updates, and network monitoring are among the most commonly outsourced IT services.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Is outsourcing IT support secure for sensitive data?\"}),/*#__PURE__*/e(\"br\",{}),\"Yes, if you choose a reputable provider with strong encryption, access control, and compliance with relevant regulations like GDPR and HIPAA.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. How much do businesses typically save through IT outsourcing?\"}),/*#__PURE__*/e(\"br\",{}),\"Companies can save 20%\u201340% on IT costs by outsourcing, depending on the scope and structure of their internal operations.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4. Can startups or small businesses benefit from IT outsourcing?\"}),/*#__PURE__*/e(\"br\",{}),\"Absolutely. Startups and SMEs often outsource IT to gain access to high-quality support and technology without the need for in-house teams.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5. What are the red flags when choosing an IT outsourcing provider?\"}),/*#__PURE__*/e(\"br\",{}),\"Lack of transparency, poor communication, no SLAs, outdated technology, and unclear data handling policies are all red flags to watch out for.\"]})]});export const richText8=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Outsourced IT Support: A Smarter Move for Growing Businesses\"})}),/*#__PURE__*/i(\"p\",{children:[\"In today\u2019s fast-moving business world, technology downtime is more than just an inconvenience\u2014it\u2019s a cost. That\u2019s why more companies in 2025 are turning to \",/*#__PURE__*/e(\"strong\",{children:\"outsourced IT support\"}),\" to keep their operations running smoothly without breaking the bank.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What Is Outsourced IT Support?\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Outsourced IT support\"}),\" means hiring an external provider to manage your company\u2019s technology needs. This can include everything from help desk services and network monitoring to cybersecurity and software updates. It\u2019s like having an in-house IT department\u2014without the overhead.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Why Businesses Are Making the Shift\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lower Costs\"}),/*#__PURE__*/e(\"br\",{}),\"Hiring, training, and retaining IT staff is expensive. With \",/*#__PURE__*/e(\"strong\",{children:\"IT support outsourcing\"}),\", you get a full team of experts for a fraction of the cost.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"24/7 Coverage\"}),/*#__PURE__*/e(\"br\",{}),\"Problems don\u2019t follow a 9\u20135 schedule. Outsourced providers often offer \",/*#__PURE__*/e(\"strong\",{children:\"around-the-clock support\"}),\", ensuring your systems stay secure and functional\u2014day and night.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access to Specialized Expertise\"}),/*#__PURE__*/e(\"br\",{}),\"Outsourced IT support services give you access to a team that\u2019s constantly trained on the latest tech trends, tools, and threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability\"}),/*#__PURE__*/e(\"br\",{}),\"Whether you\u2019re growing fast or downsizing, \",/*#__PURE__*/e(\"strong\",{children:\"outsourcing IT support\"}),\" lets you scale services up or down easily without major internal changes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus on Core Business\"}),/*#__PURE__*/e(\"br\",{}),\"Free up internal resources and let your team focus on what they do best\u2014growing the business.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"How to Choose the Right IT Support Outsourcing Partner\"}),/*#__PURE__*/e(\"p\",{children:\"Not all providers are created equal. Here\u2019s what to look for:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Experience with your industry\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Clear Service Level Agreements (SLAs)\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Proven security practices\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Transparent pricing\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Excellent customer reviews\"})})})]}),/*#__PURE__*/e(\"h3\",{children:\"Final Thoughts\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing IT support in 2025 isn\u2019t just a cost-saving tactic\u2014it\u2019s a strategic decision. Whether you\u2019re a startup or a scaling mid-sized company, the right IT partner can boost your performance, security, and peace of mind.\"})]});export const richText9=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[\"Small businesses today face big challenges when it comes to technology. Between managing daily operations and staying ahead of security risks, handling IT internally can feel overwhelming \u2014 especially without a dedicated tech team. That\u2019s where \",/*#__PURE__*/e(\"strong\",{children:\"outsourced IT services\"}),\" come in.\"]}),/*#__PURE__*/e(\"p\",{children:\"In this article, we\u2019ll break down what outsourced IT really means, why it\u2019s a smart move for small businesses, and how to choose a provider that actually moves the needle.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Are Outsourced IT Services?\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourced IT services involve hiring a third-party provider to manage some or all of your business\u2019s technology needs. This could include things like:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Help desk support\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cybersecurity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cloud services\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Device management\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Network monitoring\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data backup and disaster recovery\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Instead of juggling all this internally, you hand it off to a team that lives and breathes IT \u2014 freeing you up to focus on what you do best.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Small Businesses Are Switching to Outsourced IT\"}),/*#__PURE__*/e(\"p\",{children:\"Here are five reasons small business owners are making the switch:\"}),/*#__PURE__*/i(\"h3\",{children:[\"1. \",/*#__PURE__*/e(\"strong\",{children:\"Cost Control Without Sacrificing Quality\"})]}),/*#__PURE__*/e(\"p\",{children:\"Hiring a full-time IT staff is expensive. Outsourcing gives you access to enterprise-grade support for a flat monthly fee \u2014 no salaries, benefits, or overtime to worry about.\"}),/*#__PURE__*/i(\"h3\",{children:[\"2. \",/*#__PURE__*/e(\"strong\",{children:\"24/7 Support (Even When You\u2019re Sleeping)\"})]}),/*#__PURE__*/e(\"p\",{children:\"IT problems don\u2019t stick to business hours. With the right provider, your systems are monitored and protected around the clock.\"}),/*#__PURE__*/i(\"h3\",{children:[\"3. \",/*#__PURE__*/e(\"strong\",{children:\"Better Cybersecurity\"})]}),/*#__PURE__*/e(\"p\",{children:\"Cyberattacks are rising, especially among small businesses. Outsourced IT partners typically provide tools like endpoint protection, email filtering, and vulnerability scanning \u2014 often bundled in.\"}),/*#__PURE__*/i(\"h3\",{children:[\"4. \",/*#__PURE__*/e(\"strong\",{children:\"Scalability as You Grow\"})]}),/*#__PURE__*/e(\"p\",{children:\"Adding new employees or locations? A good MSP (Managed Service Provider) can scale with you \u2014 quickly provisioning devices, licenses, and support.\"}),/*#__PURE__*/i(\"h3\",{children:[\"5. \",/*#__PURE__*/e(\"strong\",{children:\"Access to Experts You Can Actually Talk To\"})]}),/*#__PURE__*/e(\"p\",{children:\"When you're stuck, you want more than a chatbot. Outsourced IT gives you direct access to seasoned pros who understand small business operations.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to Choose the Right IT Provider\"}),/*#__PURE__*/e(\"p\",{children:\"Not all IT companies are created equal. Here\u2019s what to look for:\"}),/*#__PURE__*/i(\"h3\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Experience With Small Businesses\"})]}),/*#__PURE__*/e(\"p\",{children:\"They should understand the challenges unique to small teams \u2014 not just enterprise setups.\"}),/*#__PURE__*/i(\"h3\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Clear SLAs (Service Level Agreements)\"})]}),/*#__PURE__*/e(\"p\",{children:\"Know what kind of response times and uptime guarantees you\u2019re getting.\"}),/*#__PURE__*/i(\"h3\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Flat, Transparent Pricing\"})]}),/*#__PURE__*/e(\"p\",{children:\"Avoid hourly \u201Cgotcha\u201D fees. Look for simple monthly packages with no surprises.\"}),/*#__PURE__*/i(\"h3\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Security-First Approach\"})]}),/*#__PURE__*/e(\"p\",{children:\"Your provider should offer proactive tools like antivirus, email filtering, and data backups \u2014 not just fix things after they break.\"}),/*#__PURE__*/i(\"h3\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Positive Reviews and Case Studies\"})]}),/*#__PURE__*/e(\"p\",{children:\"Look for real-world examples of how they've helped other businesses succeed.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Businesses Trust Tech Kooks\"}),/*#__PURE__*/i(\"p\",{children:[\"At \",/*#__PURE__*/e(\"strong\",{children:\"Tech Kooks\"}),\", we specialize in helping small businesses stay secure, efficient, and headache-free. From unlimited help desk support to automated cybersecurity protection \u2014 we deliver big-business IT at small-business prices.\"]}),/*#__PURE__*/e(\"p\",{children:\"We don\u2019t just fix problems. We prevent them.\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2705 Fast onboarding\",/*#__PURE__*/e(\"br\",{}),\"\u2705 Flat-rate monthly pricing\",/*#__PURE__*/e(\"br\",{}),\"\u2705 US-based support\",/*#__PURE__*/e(\"br\",{}),\"\u2705 Microsoft 365, cloud, VoIP, and more\"]})]});export const richText10=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's rapidly evolving digital landscape, small businesses face the challenge of staying competitive while managing limited resources. IT outsourcing emerges as a strategic solution, offering access to specialized expertise, cost savings, and enhanced operational efficiency.\u200B\"}),/*#__PURE__*/e(\"h2\",{children:\"The Strategic Advantages of IT Outsourcing\"}),/*#__PURE__*/i(\"h3\",{children:[\"1. \",/*#__PURE__*/e(\"strong\",{children:\"Cost Efficiency\"})]}),/*#__PURE__*/e(\"p\",{children:\"Maintaining an in-house IT department can be financially burdensome for small businesses. Outsourcing transforms fixed IT costs into variable expenses, allowing businesses to pay only for the services they need. This approach eliminates expenditures on recruitment, training, and infrastructure, leading to significant savings. \u200B\"}),/*#__PURE__*/i(\"h3\",{children:[\"2. \",/*#__PURE__*/e(\"strong\",{children:\"Access to Specialized Expertise\"})]}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing partners bring a wealth of knowledge and experience, offering access to a broad talent pool with specialized skills. This ensures that small businesses can benefit from the latest technologies and best practices without the overhead of continuous training and development. \u200B\"}),/*#__PURE__*/i(\"h3\",{children:[\"3. \",/*#__PURE__*/e(\"strong\",{children:\"Scalability and Flexibility\"})]}),/*#__PURE__*/e(\"p\",{children:\"As businesses grow, their IT needs evolve. Outsourcing provides the flexibility to scale services up or down based on demand, ensuring that IT support aligns with business objectives without the delays associated with hiring or downsizing internal staff. \u200B\"}),/*#__PURE__*/i(\"h3\",{children:[\"4. \",/*#__PURE__*/e(\"strong\",{children:\"Enhanced Focus on Core Business Functions\"})]}),/*#__PURE__*/e(\"p\",{children:\"By delegating IT responsibilities to external experts, small business owners and employees can concentrate on strategic initiatives and customer engagement, driving growth and innovation. \u200B\"}),/*#__PURE__*/i(\"h3\",{children:[\"5. \",/*#__PURE__*/e(\"strong\",{children:\"Improved Security and Compliance\"})]}),/*#__PURE__*/i(\"p\",{children:[\"Outsourcing IT services often includes robust security measures and compliance support, helping small businesses protect sensitive data and adhere to industry regulations. \u200B\",/*#__PURE__*/e(n,{href:\"https://mosano.eu/blog/the-benefits-of-outsourcing-it-services-for-startups-small-business?utm_source=chatgpt.com\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Mosano\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key IT Services Ideal for Outsourcing\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managed IT Services\"}),\": Comprehensive management of IT infrastructure, including monitoring, maintenance, and support.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud Services\"}),\": Migration to and management of cloud platforms, offering scalability and remote accessibility.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cybersecurity Solutions\"}),\": Implementation of robust security measures to protect against cyber threats and ensure compliance with regulations.\u200B\",/*#__PURE__*/e(n,{href:\"https://en.wikipedia.org/wiki/Desktop_outsourcing?utm_source=chatgpt.com\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Wikipedia\"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Helpdesk Support\"}),\": Provision of technical support to address user issues promptly, minimizing downtime.\u200B\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Selecting the Right IT Outsourcing Partner\"}),/*#__PURE__*/e(\"p\",{children:\"When choosing an outsourcing provider, consider the following:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Experience and Expertise\"}),\": Assess the provider's track record and proficiency in handling similar business needs.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Service Level Agreements (SLAs)\"}),\": Ensure clear SLAs are in place, outlining response times, responsibilities, and performance metrics.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Measures\"}),\": Verify that the provider employs stringent security protocols to safeguard sensitive data.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cultural Fit\"}),\": Choose a partner whose values and communication style align with your company culture.\u200B\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"IT outsourcing offers small businesses a pathway to enhanced efficiency, innovation, and growth. By leveraging external expertise, businesses can navigate technological challenges, adapt to market changes, and focus on delivering value to their customers.\u200B\"}),/*#__PURE__*/e(\"p\",{children:\"For more insights on maximizing efficiency through IT outsourcing, you might find this article helpful:\u200B\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://techkooks.com/maximizing-efficiency-with-it-outsourcing-for-small-businesses\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Maximizing Efficiency with IT Outsourcing for Small Businesses\"})})})})}),/*#__PURE__*/e(\"p\",{children:\"Additionally, exploring various perspectives can provide a well-rounded understanding:\u200B\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.microbyte.com/blog/benefits-of-outsourcing-it-support/\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Benefits of Outsourcing IT Support\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.clariontech.com/blog/it-outsourcing-and-its-5-benefits-for-the-small-businesses\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"IT Outsourcing benefits for the Small Businesses\"})})})})]}),/*#__PURE__*/e(\"p\",{children:\"Feel free to reach out if you need further assistance or have specific questions about IT outsourcing for your business.\"})]});export const richText11=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"If your business is struggling with tech issues, it might not be a tech issue at all.\"}),/*#__PURE__*/e(\"p\",{children:\"Let me explain.\"}),/*#__PURE__*/i(\"p\",{children:[\"When systems crash, files go missing, or your staff wastes hours trying to fix things themselves \u2014 that\u2019s not just an IT headache. That\u2019s a business operations issue. And most companies don\u2019t realize how much money they\u2019re \",/*#__PURE__*/e(\"em\",{children:\"losing\"}),\" every year because of it.\"]}),/*#__PURE__*/i(\"p\",{children:[\"In fact, studies show that small businesses lose \",/*#__PURE__*/e(\"strong\",{children:\"dozens of productive hours per employee per year\"}),\" due to avoidable tech downtime and inefficient processes.\"]}),/*#__PURE__*/e(\"p\",{children:\"So let\u2019s break down the real reasons why this happens \u2014 and what to do about it.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"The Hidden Costs of \u201CDIY IT\u201D\"})}),/*#__PURE__*/e(\"p\",{children:\"A lot of growing businesses start with the \u201Cfriend who knows tech\u201D or the \u201Cguy on call.\u201D It works... until it doesn\u2019t.\"}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s what we see most often:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reactive support\"}),\" instead of proactive planning\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"No clear documentation or process\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"No cybersecurity standards or data protection policies\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Wasted staff time troubleshooting avoidable issues\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Missed updates, poor integrations, and constant \u201Cband-aid\u201D fixes\"})})})]}),/*#__PURE__*/e(\"p\",{children:\"This isn't just inefficient. It\u2019s risky.\"}),/*#__PURE__*/e(\"p\",{children:\"Would you let your accounting be handled by a \u201Cguy on call\u201D? Probably not. Yet IT \u2014 which powers every part of your business \u2014 is often an afterthought until something breaks.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"What Modern IT Support Should Actually Look Like\"})}),/*#__PURE__*/e(\"p\",{children:\"Managed IT Services (MSP) are designed to take the weight off your team and protect your business long before something goes wrong.\"}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s what that looks like with Tech Kooks:\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Proactive Monitoring:\"}),\" We catch problems before they affect your business\",/*#__PURE__*/e(\"br\",{}),\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"24/7 Helpdesk Support:\"}),\" Real human support when you need it\",/*#__PURE__*/e(\"br\",{}),\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Cybersecurity Built-In:\"}),\" Firewalls, backups, and phishing protection included\",/*#__PURE__*/e(\"br\",{}),\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Cloud + Device Management:\"}),\" We keep every device, server, and file in sync and secured\",/*#__PURE__*/e(\"br\",{}),\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Flat Monthly Pricing:\"}),\" No surprise bills. Just reliable support.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"The IT Partner That Actually Feels Like a Partner\"})}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s the deal: you don\u2019t need \u201Cmore IT.\u201D You need a smarter way to run your business using the right systems, automation, and support.\"}),/*#__PURE__*/e(\"p\",{children:\"That\u2019s where Tech Kooks comes in.\"}),/*#__PURE__*/i(\"p\",{children:[\"We\u2019re not just here to fix things \u2014 we\u2019re here to make your tech \",/*#__PURE__*/e(\"em\",{children:\"invisible\"}),\". That means your team gets to focus on what \",/*#__PURE__*/e(\"em\",{children:\"actually grows the business\"}),\" while we handle the backend, the updates, the security, and everything else.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"What to Do Next\"})}),/*#__PURE__*/e(\"p\",{children:\"If you're still relying on outdated systems, putting out fires daily, or have no real IT strategy \u2014 let\u2019s change that.\"}),/*#__PURE__*/i(\"p\",{children:[\"We offer a \",/*#__PURE__*/e(\"strong\",{children:\"free IT checkup\"}),\" that identifies gaps, inefficiencies, and risks most businesses miss.\"]}),/*#__PURE__*/e(\"p\",{children:\"No sales pressure. No contracts. Just insights.\"}),/*#__PURE__*/i(\"p\",{children:[\"Call us at \",/*#__PURE__*/e(\"strong\",{children:\"424-416-1516\"})]}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s make your tech work for you \u2014 not against you.\"})]});export const richText12=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's digital landscape, small businesses face the challenge of maintaining robust IT infrastructures while managing limited resources. IT outsourcing emerges as a strategic solution, offering access to expert services without the overhead of an in-house team.\u200B\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Consider IT Outsourcing?\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost Savings\"}),\": Outsourcing IT functions can significantly reduce expenses associated with hiring, training, and maintaining an internal IT department.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access to Expertise\"}),\": Partnering with specialized IT service providers grants small businesses access to a broad range of technical skills and knowledge.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability\"}),\": As your business grows, outsourced IT services can easily scale to meet increasing demands without the need for substantial internal adjustments.\u200B\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Benefits of IT Outsourcing for Small Businesses\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Efficiency\"}),\": Professional IT services streamline operations, allowing businesses to focus on core activities.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improved Security\"}),\": Outsourced IT providers implement advanced security measures to protect sensitive data and systems.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"24/7 Support\"}),\": Many IT service providers offer round-the-clock support, ensuring prompt resolution of technical issues.\u200B\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Selecting the Right IT Outsourcing Partner\"}),/*#__PURE__*/e(\"p\",{children:\"When choosing an IT outsourcing provider, consider the following:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Experience with Small Businesses\"}),\": Ensure the provider has a track record of successfully supporting small enterprises.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Service Offerings\"}),\": Evaluate whether their services align with your specific IT needs, such as network management, cloud services, or helpdesk support.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Client Testimonials\"}),\": Seek feedback from other small businesses to gauge satisfaction and reliability.\u200B\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing IT Outsourcing Successfully\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Define Clear Objectives\"}),\": Establish what you aim to achieve through outsourcing, such as improved uptime or enhanced cybersecurity.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Maintain Open Communication\"}),\": Regularly communicate with your IT provider to ensure alignment with business goals.\u200B\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Performance\"}),\": Track key performance indicators to assess the effectiveness of outsourced services.\u200B\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"IT outsourcing presents a valuable opportunity for small businesses to enhance operational efficiency, access specialized expertise, and achieve scalability. By carefully selecting a suitable provider and establishing clear objectives, small enterprises can leverage outsourced IT services to drive growth and competitiveness in the digital age.\"})]});export const richText13=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"Choosing the Right IT Partner for Lawyers\"}),/*#__PURE__*/e(\"p\",{children:\"In the legal industry, technology plays a pivotal role. It's not just about having the latest gadgets or software.\"}),/*#__PURE__*/e(\"p\",{children:\"It's about leveraging IT solutions to enhance efficiency, maintain client confidentiality, and stay compliant with industry regulations.\"}),/*#__PURE__*/e(\"p\",{children:\"However, managing IT needs can be a daunting task for law firms. This is where managed IT services come into play.\"}),/*#__PURE__*/e(\"p\",{children:\"by Mikhail Pavstyuk (https://unsplash.com/@pavstyuk)\"}),/*#__PURE__*/e(\"p\",{children:\"Managed IT services for law firms offer specialized support tailored to the unique requirements of the legal sector. They provide a comprehensive solution, from basic IT support to strategic consulting.\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing the right IT partner is crucial. It can make the difference between a smooth, efficient operation and a constant struggle with technological issues.\"}),/*#__PURE__*/e(\"p\",{children:\"This article aims to guide you in understanding the benefits of managed IT services for law firms and how to select the right IT partner.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding the Unique IT Needs of Law Firms\"}),/*#__PURE__*/e(\"p\",{children:\"Law firms operate in an environment with stringent data security requirements. Client confidentiality is paramount.\"}),/*#__PURE__*/e(\"p\",{children:\"IT solutions for law firms must prioritize advanced security measures. This includes encryption and secure communication channels.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, legal practices often manage vast amounts of sensitive data. Efficient data management is crucial to streamline operations and ensure accessibility.\"}),/*#__PURE__*/e(\"p\",{children:\"Another challenge is the need for seamless integration with existing legal software. Custom IT solutions can address these specific requirements, enhancing overall productivity.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Benefits of Managed IT Services for Law Firms\"}),/*#__PURE__*/e(\"p\",{children:\"Managed IT services offer significant advantages to law firms. These services streamline operations and enhance security. By outsourcing IT support, law firms can focus more on core legal tasks.\"}),/*#__PURE__*/e(\"p\",{children:\"Key benefits include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"24/7 support to minimize downtime\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Access to the latest technology without heavy investments\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Enhanced security measures to protect client data\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Managed IT also provides scalability. As law firms grow, their IT needs evolve. Providers offer flexible solutions that adapt to changing requirements, ensuring continuity and efficiency.\"}),/*#__PURE__*/e(\"p\",{children:\"Furthermore, legal managed service providers help in predicting IT expenditures accurately. This predictability enables firms to allocate resources better, avoiding unexpected financial burdens.\"}),/*#__PURE__*/e(\"p\",{children:\"Overall, integrating managed IT into a law firm's operations enhances service quality and client satisfaction. It provides a solid foundation for legal practices to thrive in a tech-driven world.\"}),/*#__PURE__*/e(\"h3\",{children:\"Ensuring Client Confidentiality and Data Security\"}),/*#__PURE__*/e(\"p\",{children:\"In the legal industry, client confidentiality is non-negotiable. Managed IT services prioritize robust security protocols. These protocols include data encryption and secure network configurations.\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing unauthorized access is crucial. IT providers implement firewalls and intrusion detection systems. They monitor and respond to threats in real-time.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, regular security audits identify vulnerabilities. Addressing these gaps proactively ensures client data remains secure. Such measures foster trust and maintain a law firm's reputation.\"}),/*#__PURE__*/e(\"h3\",{children:\"Compliance with Legal Industry Regulations\"}),/*#__PURE__*/e(\"p\",{children:\"Compliance is critical in the legal sector. Managed IT services help law firms adhere to industry regulations. These regulations often dictate how data should be handled and stored.\"}),/*#__PURE__*/e(\"p\",{children:\"IT providers stay updated with regulatory changes. They ensure systems are compliant with the latest standards. This proactive approach mitigates the risk of penalties.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, managed services offer thorough documentation. This documentation is essential during audits, demonstrating compliance to regulatory bodies. It streamlines processes and minimizes the compliance burden on law firms.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cost Savings and Efficiency through Outsourcing\"}),/*#__PURE__*/e(\"p\",{children:\"Outsourcing IT needs lead to notable cost savings. Law firms avoid the expense of a full-time, in-house IT team. This reduces overhead while accessing expert IT support.\"}),/*#__PURE__*/e(\"p\",{children:\"Managed services offer predictable pricing models. Firms can budget accurately without sudden capital expenditures. This financial predictability supports better planning.\"}),/*#__PURE__*/e(\"p\",{children:\"Efficiency also improves with outsourced IT. IT providers handle routine maintenance and updates. This allows legal professionals to concentrate on delivering outstanding client services without technological interruptions.\"}),/*#__PURE__*/e(\"h2\",{children:\"Selecting the Right Managed IT Service Provider\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing the right IT partner is crucial for any law firm. The right provider enhances operations and security. It ensures seamless legal workflows and offers tailored IT solutions.\"}),/*#__PURE__*/e(\"p\",{children:\"Key factors in selecting a service provider include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Experience in the legal industry\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Range of services offered\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Proven track record with positive testimonials\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Law firms should prioritize providers that understand the legal environment. Specialization ensures they meet specific IT needs. It also helps in anticipating industry challenges.\"}),/*#__PURE__*/e(\"p\",{children:\"Furthermore, reviewing customer testimonials gives insight into service quality. Success stories from similar firms build confidence. It reassures law firms about their potential IT partner.\"}),/*#__PURE__*/e(\"p\",{children:\"Finally, consider the transparency of pricing structures. Clear pricing avoids surprises and supports effective budgeting. By evaluating these aspects carefully, law firms can partner with a reliable and competent IT service provider.\"}),/*#__PURE__*/e(\"h3\",{children:\"Criteria for Choosing an IT Partner\"}),/*#__PURE__*/e(\"p\",{children:\"When selecting an IT partner, several criteria should guide the decision. Industry expertise is essential. Providers with a legal focus understand the sector's unique demands.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, assess their responsiveness and support options. A provider should offer swift, round-the-clock support. This ensures minimal disruptions to legal operations.\"}),/*#__PURE__*/e(\"p\",{children:\"Analyze their technology stack, too. This involves understanding the tools and solutions they provide. It's vital these align with your firm's existing technology and future goals.\"}),/*#__PURE__*/e(\"p\",{children:\"Overall, a provider's ability to adapt to your firm's growth is crucial. Scalability ensures their solutions remain relevant as your firm evolves.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Importance of Industry Experience and Specialization\"}),/*#__PURE__*/e(\"p\",{children:\"Industry experience is invaluable in IT partnerships. Managed IT providers with a legal focus offer tailored solutions. They understand the nuances of legal operations.\"}),/*#__PURE__*/e(\"p\",{children:\"Specialization means they anticipate sector-specific issues. This proactive approach prevents potential IT challenges. It ensures smoother and more efficient operations.\"}),/*#__PURE__*/e(\"p\",{children:\"Experience also aids in compliance. Providers familiar with legal regulations help maintain standards. They implement measures that address specific regulatory needs.\"}),/*#__PURE__*/e(\"p\",{children:\"Ultimately, experienced providers offer a depth of understanding and reliability. Law firms can trust their expertise to safeguard operations and enhance efficiencies.\"}),/*#__PURE__*/e(\"h3\",{children:\"Evaluating Service Offerings and Customer Testimonials\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding a provider's service offerings is key. Comprehensive services ensure all IT needs are covered. This includes everything from cybersecurity to cloud solutions.\"}),/*#__PURE__*/e(\"p\",{children:\"Customer testimonials are a valuable resource. They reveal the provider's reliability and client satisfaction. Positive reviews signal a provider's effectiveness and trustworthiness.\"}),/*#__PURE__*/e(\"p\",{children:\"Engage with current or past clients if possible. Direct feedback can uncover insights not apparent in testimonials. It aids in assessing a provider's true capabilities.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, careful evaluation of services and client feedback informs better decisions. It positions law firms to choose a partner that aligns with their specific needs and objectives.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Services Offered by Managed IT Providers for Law Firms\"}),/*#__PURE__*/e(\"p\",{children:\"Managed IT providers deliver a range of essential services to law firms. These services ensure smooth, secure, and efficient operations.\"}),/*#__PURE__*/e(\"p\",{children:\"Key offerings generally include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"24/7 IT Support\"}),\": Reducing downtime and maintaining productivity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Disaster Recovery Planning\"}),\": Ensuring data protection and business continuity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proactive IT Management\"}),\": Preventing issues before they arise through continuous monitoring.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular IT Audits\"}),\": Identifying vulnerabilities to bolster security measures.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud Integration\"}),\": Enhancing data accessibility and collaboration.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secure Remote Access\"}),\": Facilitating flexible work arrangements for legal professionals.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These services collectively support law firms in maintaining operational stability. Each offering addresses specific challenges of the legal industry. They cater to varying needs from security to regulatory compliance.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, managed IT services help streamline operations. They allow firms to focus on legal work. This creates an environment where technology supports rather than hinders legal practice.\"}),/*#__PURE__*/e(\"h3\",{children:\"24/7 IT Support and Disaster Recovery Planning\"}),/*#__PURE__*/e(\"p\",{children:\"Round-the-clock IT support is crucial for law firms. Constant availability minimizes disruptions. It ensures quick resolutions to technical issues.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, disaster recovery planning is vital. It prepares firms for unexpected events. Data backups and recovery plans are part of these strategies.\"}),/*#__PURE__*/e(\"p\",{children:\"Such preparedness ensures continuity. Legal data remains secure, and operations can resume swiftly. This minimizes the impact of unforeseen incidents.\"}),/*#__PURE__*/e(\"p\",{children:\"Both services are essential for robust IT infrastructure. They protect against downtime and data loss, ensuring seamless legal service delivery.\"}),/*#__PURE__*/e(\"h3\",{children:\"Proactive IT Management and Regular Audits\"}),/*#__PURE__*/e(\"p\",{children:\"Proactive IT management involves continuous system monitoring. It helps identify potential issues early. Timely interventions prevent minor problems from escalating.\"}),/*#__PURE__*/e(\"p\",{children:\"Regular audits complement this approach. They assess the system's health and security posture. This includes checking for compliance with industry regulations.\"}),/*#__PURE__*/e(\"p\",{children:\"Through audits, vulnerabilities are identified and mitigated. This proactive stance enhances security. It ensures firms are always one step ahead of threats.\"}),/*#__PURE__*/e(\"p\",{children:\"By combining proactive management and audits, law firms maintain operational integrity. They ensure their IT infrastructure supports effective legal practice.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cloud Integration and Secure Remote Access\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud integration is transforming law firm operations. It provides scalable solutions for data management. Documents and case files are accessible from any location.\"}),/*#__PURE__*/e(\"p\",{children:\"Secure remote access is a key component of modern legal work. It allows attorneys to work flexibly. They can access necessary resources securely while on the move.\"}),/*#__PURE__*/e(\"p\",{children:\"Such flexibility enhances productivity. It supports the demands of a dynamic legal environment. However, it requires robust security measures.\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud solutions offer encrypted data transfers and secure access controls. This ensures confidentiality and integrity, vital for legal work.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Role of IT in Enhancing Law Firm Operations\"}),/*#__PURE__*/e(\"p\",{children:\"In today's digital age, IT is crucial for law firm efficiency. It enables better management of resources and client data. This paves the way for improved service delivery.\"}),/*#__PURE__*/e(\"p\",{children:\"Modern IT solutions also streamline workflow. They help automate time-consuming tasks, reducing manual effort. This allows lawyers to focus on strategic legal work.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, technology facilitates better data management. Secure storage and retrieval systems protect sensitive information. This ensures compliance with industry standards and regulations.\"}),/*#__PURE__*/e(\"p\",{children:\"Ultimately, IT transforms how law firms operate. It fosters an environment of innovation and continual improvement. By leveraging IT, law firms can gain a competitive edge.\"}),/*#__PURE__*/e(\"h3\",{children:\"Streamlining Case Management and Administrative Tasks\"}),/*#__PURE__*/e(\"p\",{children:\"Effective IT systems streamline case management processes. They automate routine tasks, allowing for more efficient operations. This includes managing documents, tracking deadlines, and scheduling.\"}),/*#__PURE__*/e(\"p\",{children:\"Digital platforms make case management seamless. They provide real-time access to files and updates. This reduces the administrative burden on legal teams.\"}),/*#__PURE__*/e(\"p\",{children:\"With automation, tasks that traditionally took hours can now be completed quickly. This efficiency improves the overall productivity of the firm. It ensures that more time is spent on client-focused activities.\"}),/*#__PURE__*/e(\"p\",{children:\"In addition, streamlined processes enhance workflow accuracy. Error rates decrease as reliance on manual input is reduced, leading to better case outcomes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Facilitating Collaboration and Improving Client Relationships\"}),/*#__PURE__*/e(\"p\",{children:\"IT solutions enhance collaboration within legal teams. They offer platforms for file sharing and communication. Team members can work together efficiently, regardless of location.\"}),/*#__PURE__*/e(\"p\",{children:\"Collaboration tools also improve client relationships. Clients can securely access their information online. This transparency builds trust and strengthens client-lawyer rapport.\"}),/*#__PURE__*/e(\"p\",{children:\"Technology enables better communication with clients. It facilitates quick responses to queries and updates on case progress. This responsiveness boosts client satisfaction and loyalty.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, IT tools support seamless interaction between attorneys and external partners. This includes working with expert witnesses or opposing counsel, enhancing overall case management.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion: Embracing Technology for a Competitive Edge\"}),/*#__PURE__*/e(\"p\",{children:\"Incorporating advanced IT solutions can significantly enhance a law firm's competitive position. By leveraging technology, law firms streamline operations and improve client service.\"}),/*#__PURE__*/e(\"p\",{children:\"The right IT partner can be pivotal in this transformation. They provide expertise and innovative solutions tailored to legal industry needs. Embracing technology leads to sustainable growth and improved outcomes.\"})]});export const richText14=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you\u2019re a large enterprise or small business, network security is a must. Cyberattacks can have long-term consequences.\"}),/*#__PURE__*/i(\"p\",{children:[\"The frequency and sophistication of cyberattacks continue to increase. In 2022, IoT malware attacks saw a sobering \",/*#__PURE__*/e(n,{href:\"https://www.techopedia.com/cybersecurity-statistics\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"87% increase\"})}),\". Attack volume is also ramping up due to the use of AI.\"]}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s essential to shift from a reactive to a proactive cybersecurity approach. One such approach that has gained prominence is \u201CSecure by Design\u201D practices.\"}),/*#__PURE__*/i(\"p\",{children:[\"International partners have taken steps to address commonly exploited vulnerabilities. A \",/*#__PURE__*/e(n,{href:\"https://executivegov.com/2023/08/us-international-partners-release-advisory-on-addressing-common-exploited-vulnerabilities/\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"recent advisory\"})}),\" highlights Secure by Design principles. This collaborative effort underscores the global nature of the cybersecurity threat landscape. As well as the need for coordinated action to protect critical infrastructure.\"]}),/*#__PURE__*/e(\"p\",{children:\"In this article, we\u2019ll explore what it takes to put in place Secure by Design principles. And explain why they are paramount in today\u2019s cybersecurity landscape.\"}),/*#__PURE__*/e(\"h2\",{children:\"Today\u2019s Modern Cyberthreats\"}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity threats have evolved significantly over the years. Gone are the days when just installing an antivirus could protect your computer. Today, cybercriminals use highly sophisticated tactics. The potential impact of an attack goes far beyond the inconvenience of a virus.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Modern cyber threats encompass a wide range of attacks, including:\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1.\\xa0\\xa0\\xa0\\xa0 Ransomware:\"}),\" Malware that encrypts your data and demands a ransom for decryption. One of the costliest attacks for businesses.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2.\\xa0\\xa0\\xa0\\xa0 Phishing:\"}),\" Deceptive emails or messages that trick you into revealing sensitive information. \",/*#__PURE__*/e(n,{href:\"https://www.techopedia.com/phishing-statistics\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Eighty-three\"})}),\" percent of companies experience a phishing attack each year.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3.\\xa0\\xa0\\xa0\\xa0 Advanced Persistent Threats (APTs):\"}),\" Long-term cyberattacks aimed at stealing sensitive data.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4.\\xa0\\xa0\\xa0\\xa0 Zero-Day Exploits:\"}),\" Attacks that target vulnerabilities not yet known to software developers.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5.\\xa0\\xa0\\xa0\\xa0 IoT Vulnerabilities:\"}),\" Hackers exploit vulnerabilities in Internet of Things (IoT) devices to compromise networks.\"]}),/*#__PURE__*/e(\"p\",{children:\"These evolving threats underscore the need for a proactive approach to cybersecurity. Instead of reacting to attacks after they occur, you want to prevent them from happening.\"}),/*#__PURE__*/e(\"h2\",{children:\"What Is Secure by Design?\"}),/*#__PURE__*/e(\"p\",{children:\"Secure by Design is a modern cybersecurity approach. It integrates security measures into the very foundation of a system, app, or device. It does this from the start.\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s about considering security as a fundamental aspect of the development process. Rather than including it as a feature later.\"}),/*#__PURE__*/e(\"p\",{children:\"How can businesses of all types translate this into their cybersecurity strategies? There are two key ways:\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1.\\xa0\\xa0\\xa0\\xa0 \"}),\"When purchasing hardware or software, ask about Secure by Design. Does the supplier use these practices? If not, you may want to consider a different vendor.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2.\\xa0\\xa0\\xa0\\xa0 \"}),\"Incorporate Secure by Design principles into your own business. Such as when planning an infrastructure upgrade or customer service enhancement. Put cybersecurity at the center. Instead of adding it as an afterthought.\"]}),/*#__PURE__*/e(\"p\",{children:\"Key principles of Secure by Design include:\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1.\\xa0\\xa0\\xa0\\xa0 Risk Assessment:\"}),\" Identifying potential security risks and vulnerabilities early in the design phase.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2.\\xa0\\xa0\\xa0\\xa0 Standard Framework:\"}),\" Maintain consistency when applying security standards by following a framework. Such as \",/*#__PURE__*/e(n,{href:\"https://www.cisecurity.org/controls\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"CIS\"})}),\" Critical Security Controls, \",/*#__PURE__*/e(n,{href:\"https://www.hhs.gov/hipaa/index.html\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"HIPAA\"})}),\", or \",/*#__PURE__*/e(n,{href:\"https://gdpr.eu/\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"GDPR\"})}),\".\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3.\\xa0\\xa0\\xa0\\xa0 Least Privilege:\"}),\" Limiting access to resources to only those who need it for their roles.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4.\\xa0\\xa0\\xa0\\xa0 Defense in Depth:\"}),\" Implementing many layers of security to protect against various threats.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5.\\xa0\\xa0\\xa0\\xa0 Regular Updates:\"}),\" Ensuring that security measures are continuously updated to address new threats.\"]}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"6.\\xa0\\xa0\\xa0\\xa0 User Education:\"}),\" Educating users about security best practices and potential risks.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Why Secure-by-Design Matters\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding and implementing Secure by Design practices is crucial for several reasons:\"}),/*#__PURE__*/e(\"h3\",{children:\"Proactive Security\"}),/*#__PURE__*/e(\"p\",{children:\"Traditional cybersecurity approaches are often reactive. This means they address security issues after they\u2019ve occurred. Secure by Design builds security measures into the very foundation of a system. This minimizes vulnerabilities from the start.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cost Savings\"}),/*#__PURE__*/e(\"p\",{children:\"Addressing security issues after a system is in production can be costly. The same is true for trying to address them near the end of a project. By integrating security from the beginning, you can avoid these extra expenses.\"}),/*#__PURE__*/e(\"h3\",{children:\"Regulatory Compliance\"}),/*#__PURE__*/e(\"p\",{children:\"Many industries are subject to strict regulatory requirements for data protection and cybersecurity. Secure by Design practices can help you meet these compliance standards more effectively. It reduces the risk of unknowns that end up costing you in fines and penalties.\"}),/*#__PURE__*/e(\"h3\",{children:\"Reputation Management\"}),/*#__PURE__*/e(\"p\",{children:\"A security breach can severely damage your organization\u2019s reputation. Implementing Secure by Design practices demonstrates your commitment to protecting user data. It can also enhance trust among customers and stakeholders.\"}),/*#__PURE__*/e(\"h3\",{children:\"Future-Proofing\"}),/*#__PURE__*/e(\"p\",{children:\"Cyber threats continue to evolve. Secure by Design practices help ensure that your systems and applications remain resilient. Especially against emerging threats.\"}),/*#__PURE__*/e(\"h3\",{children:\"Minimizing Attack Surfaces\"}),/*#__PURE__*/e(\"p\",{children:\"Secure by Design focuses on reducing the attack surface of your systems. Using it helps in identifying and mitigating potential vulnerabilities. You mitigate threats before a hacker exploits them.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Need to Modernize Your Cybersecurity Strategy?\"})}),/*#__PURE__*/e(\"p\",{children:\"A cybersecurity strategy put in place five years ago can easily be outdated today. Need some help modernizing your company\u2019s cybersecurity?\"}),/*#__PURE__*/e(\"p\",{children:\"Give us a call today to schedule a chat.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Article used with permission from \"}),/*#__PURE__*/e(n,{href:\"https://thetechnologypress.com/why-you-need-to-understand-secure-by-design-cybersecurity-practices/\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"The Technology Press.\"})})})]})]});export const richText15=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Digital transformation is necessary for all businesses that want to thrive in today\u2019s competitive market. It helps businesses like yours win new customers, improve efficiency and increase profits. However, due to several misconceptions, many business owners hesitate to take the digital plunge.\"}),/*#__PURE__*/e(\"p\",{children:\"In this blog, we\u2019ll discuss the most common digital transformation misconceptions and share insights to help you make more informed decisions and drive business growth.\"}),/*#__PURE__*/e(\"h3\",{children:\"Differentiating between misconception and truth\"}),/*#__PURE__*/e(\"p\",{children:\"Here are the top misconceptions that keep businesses from achieving their full potential: \\xa0\\xa0\"}),/*#__PURE__*/e(\"h4\",{children:\"Misconception #1\"}),/*#__PURE__*/e(\"p\",{children:\"Digital transformation is all about technology upgrades.\"}),/*#__PURE__*/e(\"h4\",{children:\"Truth\"}),/*#__PURE__*/e(\"p\",{children:\"Technology is just one aspect of digital transformation, which goes beyond upgrading your tech stack. It\u2019s about harnessing technology to streamline your business processes, enhance customer experience and stay agile. However, it is essential to note that digital transformation also requires changing your work culture, business processes and general outlook.\"}),/*#__PURE__*/e(\"h4\",{children:\"Misconception #2\"}),/*#__PURE__*/e(\"p\",{children:\"Digital transformation is a one-time fix.\"}),/*#__PURE__*/e(\"h4\",{children:\"Truth\"}),/*#__PURE__*/e(\"p\",{children:\"Digital transformation is not a check-in-the-box with a defined endpoint. It\u2019s a continuous adaptive process that helps you keep up with evolving market dynamics and customer needs. To succeed, you must consistently evaluate your digital strategies and business technology solutions, making adjustments as necessary.\"}),/*#__PURE__*/e(\"h4\",{children:\"Misconception #3\"}),/*#__PURE__*/e(\"p\",{children:\"Digital transformation is expensive.\"}),/*#__PURE__*/e(\"h4\",{children:\"Truth\"}),/*#__PURE__*/e(\"p\",{children:\"Gone are the days when digital transformation used to be abhorrently expensive. Today\u2019s businesses can manage their expenses by adopting affordable technologies and solutions. Similarly, strategically and gradually implementing and scaling transformation initiatives can help you make the most of your investments. Hiring an IT service provider has also helped businesses make significant savings.\"}),/*#__PURE__*/e(\"h4\",{children:\"Misconception #4\"}),/*#__PURE__*/e(\"p\",{children:\"Digital transformation requires a complete modernization of your IT systems and processes.\"}),/*#__PURE__*/e(\"h4\",{children:\"Truth\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Making drastic changes to your existing processes that require a complete overhaul of your IT can be counterproductive. That\u2019s why we recommend adopting an incremental approach to fare well in the long run and make sustainable transformations without significant disruptions.\"}),/*#__PURE__*/e(\"p\",{children:\"Steps to success\"}),/*#__PURE__*/e(\"p\",{children:\"It can be challenging to keep up with evolving technologies, IT requirements and compliance laws while focusing on growing your business. Consider partnering with an experienced IT service provider like us to ensure the success of your digital transformation initiative. Contact us now!\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://thetechkooks.com/technology-budgeting-4051\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Download \"})}),\"our infographic, \u201C\",/*#__PURE__*/e(\"strong\",{children:\"How Digital Transformation Drives Business Success\"}),\"\u201D and discover how you can successfully integrate digital technology into all aspects of your business.\"]})]});export const richText16=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"When creating a budget for your business, it\u2019s important to remember that technology costs are more than just operational expenses. They should be considered an investment that can drive your organization toward unprecedented productivity, growth and profitability.\"}),/*#__PURE__*/e(\"p\",{children:\"Your technology budgeting process shouldn\u2019t just be about numbers and spreadsheets. Instead, it should be about shaping the future of your business and seizing the potential of cutting-edge technologies to transform the way you operate, engage with customers and outpace your competition.\"}),/*#__PURE__*/e(\"p\",{children:\"In this blog, we\u2019ll explore how strategic technology spending, coupled with the right choices, can drive digital transformation for your business. Let\u2019s dive in.\"}),/*#__PURE__*/e(\"h3\",{children:\"Key technological advances driving digital transformation\"}),/*#__PURE__*/e(\"p\",{children:\"Before embarking on any journey, you probably gather the best tools to ensure you reach your destination. Well, your digital transformation journey is no different. In this section, we\u2019ll delve deeper into the technologies reshaping businesses. However, these tools aren\u2019t mere trends \u2014 they are essential drivers of digital transformation.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cloud computing and storage\"}),/*#__PURE__*/e(\"p\",{children:\"This technology enables your business data and applications to be accessible from anywhere, eliminating the need for physical servers, in turn reducing costs and increasing adaptability.\"}),/*#__PURE__*/e(\"p\",{children:\"Achieving this transformation involves migrating your existing infrastructure to a trusted cloud provider and ensuring robust data security measures are in place.\"}),/*#__PURE__*/e(\"h3\",{children:\"Big data\"}),/*#__PURE__*/e(\"p\",{children:\"Big data is a vast reservoir of information that can provide valuable insights. While managing and making sense of such data may seem daunting, the rewards are substantial.\"}),/*#__PURE__*/e(\"p\",{children:\"Investing in data analytics tools and employing data experts to extract actionable insights from this vast information pool is crucial to effectively harnessing big data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Internet of Things (IoT)\"}),/*#__PURE__*/e(\"p\",{children:\"IoT operates as a dynamic network of interconnected devices sharing real-time data. Its key advantage lies in streamlining processes and enhancing efficiency.\"}),/*#__PURE__*/e(\"p\",{children:\"Identifying areas within your business where sensor-equipped devices operate is the first step to leveraging IoT effectively. Achieving this also requires a seamless integration of hardware, software and robust security protocols.\"}),/*#__PURE__*/e(\"h3\",{children:\"5G technology\"}),/*#__PURE__*/e(\"p\",{children:\"Beyond offering faster mobile internet, 5G signifies a transformative leap for businesses. It boasts low latency and high bandwidth, ideal for remote monitoring and augmented reality applications (bandwidth refers to the volume of transmitted data, while latency refers to the time it takes for data to travel).\"}),/*#__PURE__*/e(\"p\",{children:\"To harness the potential of 5G, assess how it can elevate your current operations and explore services from various telecom and internet providers.\"}),/*#__PURE__*/e(\"h3\",{children:\"Artificial intelligence (AI)\"}),/*#__PURE__*/e(\"p\",{children:\"More than just a buzzword, AI is about amplifying your operations through automation and intelligent decision-making.\"}),/*#__PURE__*/e(\"p\",{children:\"Initiating this transformation involves identifying repetitive tasks suitable for automation, such as customer support. Also, invest in AI solutions aligned with your business goals and ensure effective AI training.\"}),/*#__PURE__*/e(\"h3\",{children:\"Next-gen cybersecurity solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Ensuring the safety of your digital assets is of utmost importance. Next-gen cybersecurity solutions go beyond traditional methods and are designed to identify and address emerging threats.\"}),/*#__PURE__*/e(\"p\",{children:\"To get the best out of next-gen solutions, you may need to conduct regular cybersecurity assessments, educate your employees on the best security practices and potentially outsource security monitoring to experts.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer relationship management (CRM)\"}),/*#__PURE__*/e(\"p\",{children:\"CRM systems serve as the centralized repository for customer data, enhancing communication and elevating customer experiences.\"}),/*#__PURE__*/e(\"p\",{children:\"CRM implementation involves customizations tailored to your specific needs, smooth data migration and thorough team training.\"}),/*#__PURE__*/e(\"p\",{children:\"Collaborative path to success\"}),/*#__PURE__*/e(\"p\",{children:\"As you stand on the brink of the digital frontier, preparedness is your greatest asset. But the question remains: How do you embark on this transformative journey alone?\"}),/*#__PURE__*/e(\"p\",{children:\"That\u2019s where an IT service provider like us comes in. Our wealth of experience and expertise in digital transformation positions us as the ideal companion on your journey. We understand the intricate nuances of each technology and have successfully navigated businesses through these transformative waters.\"}),/*#__PURE__*/i(\"p\",{children:[\"To get started, \",/*#__PURE__*/e(n,{href:\"https://thetechkooks.com/technology-budgeting-4051\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"download \"})}),\"our comprehensive checklist that gives you a roadmap for your digital transformation journey.\"]}),/*#__PURE__*/e(\"p\",{children:\"Remember, we\u2019re here for you. Reach out to us for a no-obligation consultation and let\u2019s unlock the full potential of your business in this exciting digital era.\"})]});export const richText17=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Technology is reshaping the world of work at an unprecedented pace. From artificial intelligence to web3, from the metaverse to the hybrid work model. We are witnessing a series of technological revolutions. They are transforming how we communicate, collaborate, create, and innovate.\"}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s explore some of the most impactful technology trends that are changing the way we work in 2024 and beyond.\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Artificial Intelligence\"}),/*#__PURE__*/e(\"p\",{children:\"AI and Generative AI are not just buzzwords. They are transforming the workplace. These technologies enable automation, allowing teams to handle mundane tasks more efficiently. They free up human resources for more creative and strategic endeavors.\"}),/*#__PURE__*/e(\"p\",{children:\"AI is not a new concept, but it has become more powerful and accessible in recent years. This is thanks to advances in computing power, data availability, and algorithm development.\"}),/*#__PURE__*/e(\"p\",{children:\"Artificial intelligence is now augmenting and automating various aspects of work. This includes data analysis, customer service, image creation, product design, and more.\"}),/*#__PURE__*/e(\"p\",{children:\"But AI also poses significant challenges and risks. This includes ethical dilemmas, social implications, and workforce displacement. Thus, it\u2019s essential to adopt responsible and human-centric approaches to AI. As well as ensure that workers have the skills and support to adapt to the changing nature of work.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Remote Collaboration Tools\"}),/*#__PURE__*/e(\"p\",{children:\"Advanced collaboration tools have facilitated the rise of remote work. These include video conferencing, project management software, and cloud-based document sharing platforms.\"}),/*#__PURE__*/e(\"p\",{children:\"This technology empowers teams to collaborate seamlessly from different corners of the globe. These tools break down geographical barriers, allowing for efficient teamwork and real-time communication.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Hybrid Work Model\"}),/*#__PURE__*/e(\"p\",{children:\"The hybrid work model is a term that describes the combination of remote and in-office work. This is not a new concept, but it has become more prevalent in the wake of the Covid-19 pandemic.\"}),/*#__PURE__*/e(\"p\",{children:\"The hybrid work model offers many benefits, such as:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increased productivity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduced costs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improved work-life balance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Enhanced employee satisfaction\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improved employee retention\"})})]}),/*#__PURE__*/e(\"p\",{children:\"The hybrid work model is transforming the way we work. It requires workers to have new skills, tools, and strategies. For example, hybrid work requires workers to have several capabilities to work effectively. These include strong digital literacy, communication, collaboration, and self-management skills.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Web3: the Decentralized Internet\"}),/*#__PURE__*/e(\"p\",{children:\"Web3 is a term that refers to the next generation of the internet. An internet based on decentralized technologies, such as:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Blockchain\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cryptocurrencies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Smart contracts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Peer-to-peer networks\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Web3 aims to create a more open, transparent, secure, and democratic internet. One where users have more control over their own data, identity, and digital assets.\"}),/*#__PURE__*/e(\"p\",{children:\"Web3 also enables new forms of collaboration and value creation. This includes:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decentralized autonomous organizations (DAOs)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Non-fungible tokens (NFTs)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decentralized finance (DeFi)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Social tokens\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Web3 is transforming the way we work. It\u2019s creating new business models, platforms, and communities. These are designed to be more inclusive, participatory, and innovative.\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"Web3 has the potential to generate \"})}),/*#__PURE__*/e(n,{href:\"https://finance.yahoo.com/news/3-0-market-hit-49-085000627.html\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"$49.10 billion\"})})})}),/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\" in economic value by 2030.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"5. Internet of Things (IoT) in the Workplace\"}),/*#__PURE__*/e(\"p\",{children:\"IoT devices are creating smart and optimized workplaces. This includes smart thermostats that adjust office temperatures based on occupancy. As well as wearable devices that track employees\u2019 health and productivity. This connectivity enhances efficiency and reduces energy consumption. It also provides valuable data for informed decision-making.\"}),/*#__PURE__*/e(\"h3\",{children:\"6. Augmented Reality (AR) and Virtual Reality (VR)\"}),/*#__PURE__*/e(\"p\",{children:\"AR and VR technologies are revolutionizing training, design, and customer interactions. In the workplace, AR and VR offer immersive training experiences. These allow employees to learn complex tasks in a simulated environment. These technologies are also used in product design. This enables professionals to visualize and modify prototypes in real-time. This drives faster innovation cycles.\"}),/*#__PURE__*/e(\"h3\",{children:\"7. Cybersecurity Advancements\"}),/*#__PURE__*/e(\"p\",{children:\"As digital technologies advance so do cybersecurity threats. Businesses are investing in advanced cybersecurity measures to protect sensitive data. As well as ensuring the privacy of employees and customers.\"}),/*#__PURE__*/e(\"p\",{children:\"These innovations include biometric authentication and AI-driven threat detection. Cybersecurity advancements are crucial. They help companies safeguard digital assets and maintain trust in the online workspace.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Impact on the Future of Work\"}),/*#__PURE__*/e(\"p\",{children:\"These transformative technology trends are not just fleeting novelties. They are shaping the future of work. Businesses that adapt and embrace these technologies gain a competitive edge.\"}),/*#__PURE__*/e(\"p\",{children:\"Remote collaboration tools foster flexibility and work-life balance, appealing to the modern workforce. AI and automation enhance efficiency, reducing errors and operational costs.\"}),/*#__PURE__*/e(\"p\",{children:\"IoT creates intelligent workspaces, enhancing employee well-being and environmental sustainability. AR and VR drive innovation, offering new ways to engage both employees and customers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Challenges and Considerations\"}),/*#__PURE__*/e(\"p\",{children:\"While these technologies bring immense benefits, they also pose challenges. Workforce training is essential to ensure employees can leverage these tools effectively. Additionally, there are ethical considerations about data privacy and security. As well as the impact of automation on employment. Striking a balance between technological advancement and human welfare is crucial. Especially in this transformative era.\"}),/*#__PURE__*/e(\"h2\",{children:\"Let Us Guide You Successfully Through Digital Transformation\"}),/*#__PURE__*/e(\"p\",{children:\"Navigating new technologies can be complex. There are pitfalls that can waste time and money. Avoid this by working with our team of experts. We can help you customize your transformation to fit your business goals.\"}),/*#__PURE__*/e(\"p\",{children:\"Give us a call today to schedule a chat.\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2014\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(n,{href:\"https://pixabay.com/illustrations/technology-trend-development-583694/\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Featured Image Credit\"})})]}),/*#__PURE__*/i(\"p\",{children:[\"This Article has been Republished with Permission from \",/*#__PURE__*/e(n,{href:\"https://thetechnologypress.com/7-transformative-technology-trends-changing-the-way-we-work/\",motionChild:!0,nodeId:\"nrTqVMFLW\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"The Technology Press.\"})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,2DAAsD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sQAA0PE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,gHAA2G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiEE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,yEAAyE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,SAAS,CAAC,UAAU,uBAAuB,SAAsBA,EAAE,QAAQ,CAAC,SAAsBF,EAAE,QAAQ,CAAC,SAAS,CAAcA,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,aAAa,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAAqCE,EAAE,KAAK,CAAC,CAAC,EAAE,mDAA2DA,EAAE,KAAK,CAAC,CAAC,EAAE,6BAAqCA,EAAE,KAAK,CAAC,CAAC,EAAE,+CAAuDA,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAkC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuDE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gCAAgC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAA8E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,KAAkBA,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,yFAAyF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,6JAAwJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qHAA6HE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,oLAA+K,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAA0W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0CAA0C,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,wCAAwC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,wBAAwB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,0CAA0C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,SAAS,CAAC,UAAU,uBAAuB,SAAsBA,EAAE,QAAQ,CAAC,SAAsBF,EAAE,QAAQ,CAAC,SAAS,CAAcA,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2BAAwCE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,0IAA0I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,+NAA0N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6JAAqKE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,iDAAiD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAA2I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2DAAwEE,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,sIAAmJA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sDAAsD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kEAA+EE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuBE,EAAE,SAAS,CAAC,SAAS,sBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,SAAsBE,EAAE,SAAS,CAAC,SAAS,kCAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAiE,CAAC,EAAeA,EAAE,SAAS,CAAC,UAAU,uBAAuB,SAAsBA,EAAE,QAAQ,CAAC,SAAsBF,EAAE,QAAQ,CAAC,SAAS,CAAcA,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0CAAqC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,8CAAyC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,8CAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,kDAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,6BAAwB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,6EAA6E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAAuF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,+DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,uCAAuC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,+BAA+B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0BAA0B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8CAA8C,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kFAAkF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsCE,EAAE,SAAS,CAAC,SAAS,2DAAiD,CAAC,EAAE,2GAAsG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mUAA8T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kLAAkL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uJAA6I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAAwF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAoH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAAqG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAA6G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAAsI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAoG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAAqG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAA+E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAAmK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+DAA0D,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mGAAmG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kIAAwH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6FAAwF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qHAAgH,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iTAAiT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wOAAwO,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4PAAuP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yOAAyO,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gPAA2O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+JAAqJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+OAA+O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6LAA6L,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0LAA0L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kLAAkL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sMAAsM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8KAAyK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4MAA4M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oLAA+K,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mJAAmJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yLAAyL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8HAA8H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iLAA4K,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qHAAqH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8KAA8K,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uHAAuH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6JAA6J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6IAA6I,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uJAAkJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8LAAyL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yIAAyI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wLAAmL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oKAA+J,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kLAAwK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4NAA6M,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2XAA2X,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2SAA2S,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4SAA4S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wNAAwN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yHAAyH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oKAA0J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kIAAkI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sJAAsJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gHAAgH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0GAA0G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8EAA8E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iGAAiG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uFAAuF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oGAA+F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6FAA6F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2GAA2G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4FAA4F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gGAA2F,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qFAAqF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yGAAyG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uFAAuF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sGAAsG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uFAAuF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+EAA+E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mGAA8F,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iGAAiG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2GAA2G,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gGAAgG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+EAA+E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4EAA4E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2EAA2E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2GAA2G,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yGAAyG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA8Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAAkP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAiI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,4DAA4D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,mEAAmE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,2FAA2F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,0DAA0D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,wFAAwF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,oDAAoD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,iEAAiE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,8FAA8F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,6HAA6H,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,0GAA0G,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,uDAAuD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,4CAA4C,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,oFAA+E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2DAA2D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0DAA0D,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,oDAAoD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,8DAA8D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,qFAAqF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,iEAAiE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,mDAAmD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,+EAA0E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,4DAA4D,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uIAAuI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8GAA8G,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sIAAiI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,qDAAgD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6DAAwD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,6DAA6D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,uDAAkD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,yDAAyD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,oDAAoD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qDAAqD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA4F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+GAA+G,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8EAA8E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yHAAyH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kGAAkG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uMAA+ME,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,oWAA+V,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wdAAwd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+UAAqU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAAqV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAAuN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAA2R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAA0J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAA8E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAA2I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8EAAyE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAAsW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gIAA2H,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6IAA6I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mLAA4KE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iRAAkQ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+DAA4EA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oFAAuFA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,wEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wIAAmI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mDAA2DA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oGAA+F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAA+D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAkO,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,kQAAqQE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,WAAW,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAAyJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAA8I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAgL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,+CAA0C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAgI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2MAAsM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yJAAoJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uEAAkE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAA2F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAAwE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAAiF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAAsI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,2NAAsN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAiCE,EAAE,KAAK,CAAC,CAAC,EAAE,mCAA2CA,EAAE,KAAK,CAAC,CAAC,EAAE,0BAAkCA,EAAE,KAAK,CAAC,CAAC,EAAE,6CAAwC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gSAA2R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAA2U,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAgS,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAkQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAA+L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qLAA6LE,EAAEC,EAAE,CAAC,KAAK,oHAAoH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,wGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,wGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,8HAAsIA,EAAEC,EAAE,CAAC,KAAK,2EAA2E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8FAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,gGAA2F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,8GAAyG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,oGAA+F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,gGAA2F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAkQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA0G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,uFAAuF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8FAAyF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,8FAA8F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2PAA+OE,EAAE,KAAK,CAAC,SAAS,QAAQ,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiEE,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,EAAE,4DAA4D,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAAkF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wCAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAwH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAgC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4EAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAiL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,sDAAmEA,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,uCAAoDA,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,wDAAqEA,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,8DAA2EA,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4CAA4C,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAiFE,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAE,gDAA6DA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAE,+EAA+E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kIAAwH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2BE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2BE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAsD,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iRAA4Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,iJAA4I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,6IAAwI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2JAAsJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,0GAAqG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6GAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kHAA6G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,8FAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6IAAwI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,0FAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,mHAA8G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,8FAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,8FAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4OAA4O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAA4N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oLAAoL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8NAAyN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sHAAmIE,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,0DAA0D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6KAA8J,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyGE,EAAEC,EAAE,CAAC,KAAK,8HAA8H,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,wNAAwN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4KAAkK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,oHAAoH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,sFAAmGA,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,EAAE,2DAA2D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,4EAA4E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,8FAA8F,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAAkI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,+JAA+J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4NAA4N,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,sFAAsF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,4FAAyGA,EAAEC,EAAE,CAAC,KAAK,sCAAsC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,gCAA6CF,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,mBAAmB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,2EAA2E,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAAyP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAiO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,sGAAsG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6SAAwS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA0K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA0W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mUAA8T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,OAAO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oZAA+Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAAqR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,0BAAkCF,EAAE,SAAS,CAAC,SAAS,oDAAoD,CAAC,EAAE,8GAAyG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gRAA2Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAkS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAAmK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qWAAsV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,UAAU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAoT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,+FAA+F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6KAAmK,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAkH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAAwT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAA8K,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAA4V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0YAA0Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oaAAoa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,SAAiBE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,0DAAuEE,EAAEC,EAAE,CAAC,KAAK,8FAA8F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAC52kKkB,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "__FramerMetadata__"]
}
