Submitted fulfillment of the requirement for the

Submitted as a part of MBA I year Course Requirement By R G N SRIRAM RA1652001010241 Under the guidance of Mrs.A.CELINA (Assistant Professor) DEPARTMENT OF BUSINESS ADMINISTRATION SRM INSTITUTE OF SCIENCE AND TECHMOLOGY KATTANKULATHUR, CHENNAI DECLARATION I , R G N SRIRAM (RA1652001010241) ,hereby declare that the project report on EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI.submitted to SRM faculty of management in partial fulfillment of the requirement for the award of the degree of Master of Business Administration , is a record of the original research work done under the supervision and guidance of Mrs.CELINA (Assistant Professor) , faculty of management , SRM University and that it has not formed the basis for the award of any degree /associate ship/fellowship of other similar title to any candidate of any university. Signature of the student (R G N SRIRAM) DATE PLACE BONAFIDE CERTIFICATE Certified that this projectreport titled EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI is the bonafide work of R G N SRIRAM (RA1652001010241) who carried out theresearch under my supervision.Certified further , that to the best of my knowledge the work reported herein does not from part of any other project report or dissertation on the basis of which a degree or award was conferred on the earlier occasion on this or any other candidate. Submitted forthe viva-voce examination held on HOD/ MBA INTERNAL GUIDE (CELINA) DEAN/ACADEMIC INTERNAL EXAMINER EXTERNAL EXAMINER ACKNOWLEDGEMENT First of all, I am thankful to S.R.M School of Management for allowing me to undergo project work for two months as a part of MBA curriculum in a reputed organization like EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI. to partially fulfill the management program. I even show my gratitude towards Dr. PONNIAH , Dean(Academic) and my faculty guide assistant professor Mrs.P.CELINA (School of Management) without whose support my project would not be possible to complete. I am thankful to Mr.N.LOGANATHAN, (RegionalManager) of CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI for allowing me to do the project in jio stores. I have been able to prepare my report successfully and I acknowledge a special thanks to my Parents and Friends without whose support it was impossible for me to make the project report. ABSTRACT All software companies seek out new ways to improve their productivity so as to be competitive in the market. . The demand from management to increase performance and efficiency has forced the concept and successful implementation of virtualization. The concept of virtualization helps out companies of all sizes in reducing the amount spent on the project, the work load of the operating personnel and in achieving the service level agreement. Though virtualization is becoming very popular these days, many companies have not yet showed any interest in adopting any of the virtualization techniques. One of the reasons may be because they arent aware of the actual benefits of it. Though most of the software companies have started taking initiative in adopting virtualization techniques still its not clear how far they are into it does it really help the software people to accomplish their target in time does it help them out in reducing their work load how far does it support business continuity and cost savings. This research will focus on analyzing these issues from employees point of view and also to find out the most sorted virtualization technique among the IT industry. Virtualization technology, while not new, is growing at a significant rate in its use on servers and desktop machines and long ago lost its connection to mainframe systems alone. While challenges do exist, such as the unification of terminology, the development of even more robust software solutions, and the implementation of greater device virtualization support. Virtualization is still poised to make a significant impact on the landscape of computing over the next few years The primary objective is to study the effectiveness of implementing virtualization techniques in Cert Technologies. Secondary objectives are to briefly discuss the various virtualization techniques currently in trend today, analyze what are the actual business benefits of corporations by implementing virtualization in particular and to find out the most adopted virtualization technique by the corporations. Convenience sampling method has been used in the research work. Multiple choice questions have been chosen to collect the responses from 100 employees. The data collected has been analyzed through various statistical tools like Karl Pearsons Correlation, Chi- square test and One-way Anova test. TABLE OF CONTENTS CHAPTER NOCHAPTERSPAGE NOABSTRACTI1.1 INTRODUCTION1.2 COMPANY PROFILE1.3 INDUSTRY PROFILE1.4 STATEMENT OF PROBLEM1.5 NEED FOR THE STUDY 1.6 SCOPE OF THE STUDY 1.7 OBJECTIVES1.8 LIMITATIONS OF THE STUDYIIREVIEW OF LITERATUREIIIRESEARCH METHODOLOGY3.1 HYPOTHESIS3.2 METHODOLOGY3.3 DATA COLLECTION 3.4 DATA ANALYSISIVDATA ANALYSIS AND INTERPRETATIONV5.1 FINDINGS 5.2 SUGGESTIONS 5.3 CONCLUSION ANNEXUREBIBILIOGRAPHYQUESTIONNAIRE TABLE NO. TITLEPAGE NO1GENDER2AGE GROUP3YEARS OF IT EXPERIENCE4QUALIFICATION5DESIGNATION6ADOPTION OF VIRTUALIZATION TECHNIQUE7MOST POPULAR VIRTUALIZATION PRODUCT8BENEFIT OF VIRTUALIZATION9BARRIERS FOR ADOPTING VIRTUALIZATION10DOES VIRTUALIZATION HELP IN REDUCING WORK LOAD11DOES THE VIRTUAL INFRASTRUCTURE EXPEDITE THE DEVELOPMENT AND TESTING OF THE NEW SYSTEM 12IS GOING GREEN THE REASON BEHIND VIRTUALIZATION13IMPORTANT ROLE OF VIRTUALIZATION14OPERATIONAL CHALLENGES OF VIRTUALIZATION15DRIVING FORCE BEHIND IT COMPANIES TO GO FOR VIRTUALIZATION16SUPPORT THIS VIRTUALIZATION TECHNOLOGYLIST OF TABLES LIST OF TABLES TABLE NO. TITLEPAGE NO1GENDER2AGE GROUP3YEARS OF IT EXPERIENCE4QUALIFICATION5DESIGNATION6ADOPTION OF VIRTUALIZATION TECHNIQUE7MOST POPULAR VIRTUALIZATION PRODUCT8BENEFIT OF VIRTUALIZATION9BARRIERS FOR ADOPTING VIRTUALIZATION10DOES VIRTUALIZATION HELP IN REDUCING WORK LOAD11DOES THE VIRTUAL INFRASTRUCTURE EXPEDITE THE DEVELOPMENT AND TESTING OF THE NEW SYSTEM 12IS GOING GREEN THE REASON BEHIND VIRTUALIZATION13IMPORTANT ROLE OF VIRTUALIZATION14OPERATIONAL CHALLENGES OF VIRTUALIZATION15DRIVING FORCE BEHIND IT COMPANIES TO GO FOR VIRTUALIZATION16SUPPORT THIS VIRTUALIZATION TECHNOLOGY CHAPTER 1 EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES 1. INTRODUCTION The rapid growth of IT industry has resulted not only growth in the economy but within the IT industry itself. An effective IT business was the need of the hour. Virtualization was the answer for that. A one stop solution for Business effectiveness, Cost cutting, Environmental friendliness, goal achieving etc. Virtualization technology is possibly the single most important issue in IT and has started a top to bottom overhaul of the computing industry. The growing awareness of the advantages provided by virtualization technology is brought about by economic factors of scarce resources, government regulation, and more competition. Virtualization can simplify IT operations and allow IT organizations to respond faster to changing business demands. What is Virtualization Virtualization is the creation of a virtual version of a device or a resource such as servers, operating system etc where the framework divides the resources into one or more executable environment. 1.1 Importance of virtualization in business Virtualization has revolutionized the IT industry over the past few decades, Huge Servers and floor occupying computers were replaced by virtual servers. The multiple system requirements and their related cost millions to the companies, whereas now virtual machines which occupied comparatively less floor spacing helped save a huge monetary for the companies. Meeting deadlines is the performance measuring factor for a Service oriented company and IT industry was no exception. Almost all the big IT giants in INDIA are service oriented and counted upon advanced technologies such as virtualization in meeting the SLA. Virtualization covered almost all the fields necessary for an effective IT business. Business continuity was a key issue when it comes to reputation. The conventional servers and systems were increasingly becoming non reliable in this aspect as they were causing server downtimes which hampered the performance. The virtual servers on the other hand had no such problems and made the IT industry achieve Business As Usual (BAU).Over the period of time the induction of virtualization technique has greatly helped the IT professionals reduce their work load there by enabling them to do smart work rather than a tiresome one. Running simultaneous task on a single machine using virtual applications helped them distribute the work on same time. The socio-political ramifications of global warming requiring good corporate citizens to meet greenhouse gas reduction targets, creates an added incentive for virtualization. Right from kyoto protocol to copenhagen summit declaration, slowly but surely the Industrial world had shift focus into a promising a greener environment. Virtualization has won these industries reputation and awards for being environmental friendly. The amount of energy that has been saved due to virtual servers and their less maintenance cost is enormous. 1.2 Reasons That Drives Virtualization 1. Underutilized hardware Today, many data centers have machines running at only 10 or 15 percent of total processing capacity. In other words, 85 or 90 percent of the machines power is unused. However, a lightly loaded machine still takes up room and draws electricity, so the operating cost of todays underutilized machine can be nearly the same as if it were running flat-out. It doesnt take a rocket scientist to recognize that this situation is a waste of computing resources. With the steady improvement in performance characteristics of computer hardware, next years machine will have twice as much spare capacity as this years (and so on, for the foreseeable future). Obviously, there ought to be a better way to match computing capacity with load. And thats what virtualization does by enabling a single piece of hardware to seamlessly support multiple systems. By applying virtualization, organizations can raise their hardware utilization rates dramatically, thereby making much more efficient use of corporate capital. So, the first trend that is causing virtualization to be a mainstream concern is the unending growth of computing power brought to us by the friendly folks of the chip industry. 2. Data centers run out of space The business world has undergone an enormous transformation over the past 20 years. Business process after business process has been captured in software and automated, moving from paper to electrons. The rise of the Internet has exponentially increased this transformation. Companies want to communicate with customers and partners in real-time, using the worldwide connectivity of the Internet. Naturally, this has accelerated the move to computerized business processes. The net effect of all this is that huge numbers of servers have been put into use over the past decade, which is causing a real estate problem for companies Theyre running out of space in their data centers. And, by the way, that explosion of data calls for new methods of data storage. These methods go by the common moniker of storage virtualization, which, as you may guess, means making it possible for storage to be handled independently of any particular piece of hardware. Virtualization, by offering the ability to host multiple guest systems on a single physical server, allows organizations to reclaim data center territory, thereby avoiding the expense of building out more data center space. This is an enormous benefit of virtualization, because data centers can cost in the tens of millions of dollars to construct. 3. Green initiatives demand better energy efficiency Power costs used to rank somewhere below what brand of soda to keep in the vending machines in most companys strategic thinking. Companies could assume that electrical power was cheap and endlessly available. The assumption regarding availability of reliable power was challenged during the California power scares of a few years ago. Although later evidence caused re-evaluation about whether there was a true power shortage, the events caused companies to consider whether they should look for ways to be less power dependent. Furthermore, the impact of the green revolution has meant that companies are increasingly looking for ways to reduce the amount of energy they consume and one of the places they look first is their data center. To show the level of concern about the amount of energy being consumed in data centers, consider these facts A study commissioned by AMD and performed by a scientist from the Lawrence Berkeley National Laboratory showed that the amount of energy consumed by data centers in the U.S. doubled between 2000 and 2005. Furthermore, energy consumption is expected to increase another 40 percent by the end of the decade. Current energy consumption by data center servers and associated cooling costs represents 1.2 percent of the total energy consumed in the U.S. Based, in part, on the results of this study, the United States Environmental Protection Agency (EPA) has convened a working group to establish standards for server energy consumption and plans to establish a new Energy Star rating for energy efficient servers. 4. System administration costs mount Computers dont operate all on their own. Every server requires care and feeding by system administrators. Common system administration tasks include monitoring hardware status replacing defective hardware components installing operating system (OS) and application software installing OS and application patches monitoring critical server resources like memory and disk use and backing up server data to other storage mediums for security and redundancy purposes. As you can imagine, these tasks are pretty labor intensive. System administrators the people who keep the machines humming dont come cheap. And, unlike programmers, system administrators are usually co-located with the servers, because they need to access the physical hardware. As part of an effort to rein in operations cost increases, virtualization offers the opportunity to reduce overall system. Administration costs by reducing the overall number of machines that need to be taken care of. Although many of the tasks associated with system administration (OS and application patching, doing backups) continue even in a virtualized environment, some of them disappear as physical servers are migrated to virtual instances. Overall, virtualization can reduce system administration requirements drastically, making virtualization an excellent option to address the increasing cost of operations personnel. 5. Need for Advancement was inevitable As more and more the world become a global village, connecting all corners of the world was required. Even the business of the IT industry demanded the same, multi site projects were the crown jewel of IT industry as they had clients from all over the world. They had to closely work with their ON-SITE co coordinators and the servers over there. Had if not for the Network virtualization or the VDI connecting remote servers wouldnt have been possible. 6. To stay ahead in the competition IT industry has grown manifolds in number and wining a project from a client has become a hardship task. Clients for many reasons such as reliability, performance, monetary etc filter up their vendors and the company which satisfy the above said factors end up with winning the project. One such key factor is DELIVERY and PERFORMANCE EXCELLENCE which is directly propositional to the work efficiency of the companies associates. The associates however depend on the Tools Technology they employ in their projects, which in our case is the virtualization techniques. The employment of virtualization technologies has greatly helped company achieve the business goals, enabling them to stay ahead in the race to the first spot. 1.3 Role of Virtualization Recent events like the cost of electricity, cooling, and the cost of running a datacenter have led to skyrocketing operational costs. Luckily, with the release of updated operating systems that can manage the running of multiple applications on the same server, and the aging of virtualization technology, we have a series of solutions to help battle server sprawl and help us reclaim the datacenter. Reduces IT complexity Application and their operations system are encapsulated in virtual machines that are defined in software, making them easy to provision and manage. Enables standardization Since applications are decoupled from hardware, the data center may converge on a narrower range of hardware devices. Improves agility Applications and virtual machines can be copied and moved in real time and in response to changing business conditions Improves cost-efficiency Virtual machines can easily be moved to consume spare capacity wherever it exist, thus generating more work from less hardware. Facilitates automation Virtual infrastructure is easily provisioned and orchestrated by software-driven processes, especially when the underlying hardware is standardized. 1.4 Operational Challenges of Virtualization While virtualization has proven to be a powerfully flexible technology for service adaptation, it introduces some new operational challenges and exacerbates many others. 1. Capacity management is a mystery. 3. The proper skills for the future are difficult to attain and retain. Virtualization marks a notable departure from prior operational models. Existing staff must be trained in the new technology and its complexity mandates automation. As functions are automated, reliance on skilled staff decreases. A potentially dangerous skills gap is emerging. Another skills concern is how virtualization fits into an overall service management movement. Such expertise is currently in short supply. 4. Surprisingly, the risk of making errors is viewed as little concern. One existing concern regarding virtualization is the notable risk of making errors because of its complexity. This study suggests otherwise. This can be explained by the fact that production penetration is still in its early stages and automation technologies are becoming more prominent and mature to assist with the complexity. This indicates that decision-makers are more pragmatic about the operational aspect of virtualization as compared with prior introductions of new technologies. There is also a growing awareness to integrate physical with heterogeneous virtual management environments using consolidated solutions. 5. Operational responsibility for virtual servers varies by geography. It is most effective and efficient to consolidate virtual server operations with other domains, away from subject matter experts (SMEs). Examination of the aggregate data from this study suggests only a mild shift from virtual server SMEs, while most have already consolidated their operations. Virtualization a global overview Many companies begin their virtualization efforts with server consolidation to reduce hardware power, cooling, and facilities expenses. Now, organizations are continuing virtualization with server consolidation and extend its use to the desktop, storage and networking areas, to provide more flexible and economical business continuity, security, and application of service level agreements. There has been increasing dilemma in the IT world over the Virtualization of the enterprise desktop on which client to go for thick clients or thin clients. Thick clients includes fully loaded personal computers (PCs) and laptops, provide employees with a rich set of applications, but applications distributed across thousands of PCs that must be individually provisioned, updated, patched and secured are a challenge to manage. Thin clients are cheaper, more secure, and more cost-effective to manage, but traditionally have not been able to deliver the richness, flexibility, or compatibility of thick clients. Most businesses provide thin clients only for employees, such as call centre staff, who can be productive in this more restrictive environment. New virtualization-based approaches delivers rich, personalized virtual desktops to any device, thick or thin, but simplify management by hosting virtual desktops in the data centre. Virtualization is the essential for efficient, manageable desktops in an increasingly mobile world. In addition, better remote display protocols and use of the local machines computing resources create a better user experience, and the combination of online and offline modes will let employees work while travelling or when without higher-speed network access. Virtualization-aware networking, many of the major network and virtualization software vendors around the world are working together to deliver joint data centre solutions that improve the scalability and operational control of virtual environments. Distributed virtual software switches will be an integrated option in this sort of infrastructure. In parallel, companies are collaborating to integrate virtual desktop solutions with application delivery networking solutions to improve the performance of virtual desktops delivered across wide-area networks (WANs). Networking vendors are now optimizing for virtualization network traffic, remote display protocols are becoming more effective, and networking management tools will monitor and manage at the virtual machine-level. Storage virtualization is critical to the virtual data centre advances in virtual storage will dramatically increase the flexibility, speed, resiliency and efficiency of virtual data centers. New virtual storage solutions automate handoffs between the virtualization platform and the storage infrastructure, simplify storage operations and maximize efficient use of storage infrastructure. We expect solutions that offer native array support for common storage operations on virtual machines such as replication and migration, thin provisioning and de-duplication capabilities to optimize storage usage – especially important for desktops and virtual storage arrays solutions. High-end application virtualization A combination of hardware and software advances will remove performance concerns regarding the highest-end, most mission-critical, applications in virtual environments. Virtualization through the eyes of India IT Co Virtualization has clearly emerged as one of the hottest technology with wide reaching implications in the global as well as Indian market scenario. Businesses across IT/ITeS were the few early adopters of consolidation and virtualization in India. The success received by this technology has now triggered the momentum of its adoption in industries like BFSI and manufacturing also. Apart from acknowledging the primary advantages of virtualization technology (like improved management capabilities and better IT infrastructure utilization), enterprises in India are fast picking up on its additional benefits like savings in power consumption and improved investment in physical office space. Globally, while server virtualization has established itself storage virtualization is fast emerging as a key technology trend in the Indian environment as well. The Indian IT Cos major area of implementing virtualization are power reduction, reduced physical space, quick ROI, simplified backup and recovery, business continuity built-into model and dynamic provisioning. Current economic situation, where every organization looks for cost reduction, virtualization helps achieve that. Early on, IT organizations were focusing on non-business critical production workloads, to harvest the low-hanging fruit while learning how to efficiently manage virtual and physical servers across their infrastructure. As their processes become more mature and the expertise improves, a more proactive strategy that includes business-critical applications makes sense for consolidation. Here, the benefits in disaster recovery and business continuity become more critical than simply cost savings. Finally, as the IT organization becomes adept at managing critical and tactical workloads across a rationalized server infrastructure, it uses virtualization to dynamically assign resources to improve flexibility and scale – increasing the strategic value to the organization. CHAPTER II LITERATURE REVIEW AND RESEARCH METHODOLOGY 2.1 Introduction Virtualization is quickly becoming an important technology across all parts of the IT environment. The technology is rapidly being incorporated in storage, networks, and client environments. By far the most visible adoption of virtualization technology is happening in servers from the largest Unix server to the smallest volume system. Virtualization software breaks the link between a given software-driven application or service and the hardware resources of the underlying system and encapsulates and isolates that stack or service. It is being used as a tool for consolidation and more recently as a means to bring high availability, disaster recovery, and resource balancing to a larger part of organizations IT infrastructures. Its been said that everything old is new again, and that saying is particularly appropriate for system virtualization. Virtualization and system partitioning have existed for decades aboard mainframe and UNIX based systems. Whats new is the concept of bringing this virtualization technology to small and medium-scale x86- based servers. 2. 2 LITERATURE REVIEW 2.2.1 Background (LAD Enterprises Inc, August 2008) Though computer technology is moving ahead in a rapid pace with more sleeker, efficient and powerful machines, their utility is not fully optimized. Obviously the computers of today are much far powerful than the computers of two to three decades ago, but the way they are used recalls the early ways of computing. Here comes the history of virtualization to explain how it all started and some of the ways that the world of virtualization has evolved. Anyone who has been around computers for a while will quickly recognize that the concept of running a clients session on a server and then displaying the results on the client machine describes the way mainframes work. Figure2.1 Figure 2.1 shows how virtualization is similar to that of how mainframe works. While modern mainframes are certainly speedy things, they are more notable for their redundant internal engineering, ensuring a high level of redundancy, security, and backward compatibility with legacy applications. Its not uncommon for a mainframe to run constantly for years without incident, even while upgrades and repairs are performed. Software upgrades are non disruptive because one system can take over anothers application while it is being improved. The Evolution of the Mainframe Between the late 1950s and 1970s, several manufacturers built the first mainframes. The group of manufacturers was known at one Point as IBM and the Seven Dwarfs. Those companies were IBM, Burroughs, UNIVAC, NCR, Control Data, Honeywell, General Electric, and RCA. IBM was the dominant leader in the field with its 700/7000 series, and later its 360, which continued to evolve into the current zSeries/z9 mainframes. In the 1960s, mainframes tended not to have an interactive interface. They accepted punch cards, paper tape, and magnetic tape, operating solely in batch mode to support office functions, like customer billing. By the 1970s, mainframes had acquired interactive user interfaces and were used as timesharing computers, able to support thousands of users simultaneously. This was done mostly via a terminal interface. These days, most mainframes have phased out terminal access and end users are able to access the mainframe using a web user interface. In the early 1980s, less demand and competition led to a lot of companies pulling out of the mainframes arena. Also, companies realized the benefits of client-server solutions, sales fell while server sales boomed. By the early 1990s, it seemed that the mainframe was going the way of the dinosaur, but in the late 1990, organizations found new uses for their existing mainframes. The growth of e-business increased the number of back-end transactions Processed by the mainframe, as well as the size and throughput of databases. Mainframes are able to host multiple operating systems, and operate not as a single computer But as a number of virtual machines, which are called partitions in the mainframe world. In this capacity, a mainframe can replace hundreds of smaller servers. While mainframes were the first to function this way, were now seeing regular servers used in this way. Figure 2.2 shows how a virtual server can house multiple operating systems like mainframes. Figure 2.2 Mainframes are designed to handle very high-volume input and output. Since the mid-1960s, mainframe designs have incorporated subsidiary computers called channels or peripheral processors. These computers manage the JO devices, leaving the CPU open to manage high-speed memory. When compared to a PC, mainframes have thousands of times as much storage. NOTE It is not uncommon for mainframes to house enormously large databases. Gigabyte- and terabyte-sized files are common. As bulletproof as they sound, mainframes do have disadvantages. Their primary issue is that they are centralized. This isnt a problem when everything is housed under one roof, but as the organization becomes more geographically dispersed, its harder to justify the cost of a mainframe at several locations. Virtual Machines IBM developed the virtual machine concept as a way of time-sharing very expensive mainframe computers. Typically an organization could only afford one mainframe, and this single mainframe had to be used for development of applications and deployment of applications. Developing an application on the same system you intend to deploy on while other applications are in production on that system was generally considered bad practice. This is still true today. Development activities may require reboots or cause instabilities in the system, and it is undesirable to have these activities interfere with production applications. The virtual machine concept allows the same computer to be shared as if it were several. IBM defined the virtual machine as a fully protected and isolated copy of the underlying physical machines hardware. IBM designed their virtual machine systems with the goal that applications, even operating systems, run in the virtual machine would behave exactly as they would on the original hardware. What is a virtual machine Virtualization technologies provide a way to separate the physical hardware (computer) and software (OS and applications) by emulating hardware using software. How does it work Essentially, software (called a hypervisor) is loaded on a computer. That software in-turn loads files that define a new virtual computer called a Virtual Machine (VM). Because a virtual computer is in reality a data file, not a physical computer, it can be copied, moved to another computer etc, just like any other file. Typically, virtual computers use two file structures one defines the hardware, the other the hard disk. Additionally some hypervisor technologies can be configured to cache changes to the virtual hardware or the virtual hard disk for writing (called committing) at a later time. This provides the ability to discard changes to the operating system, permitting boot from a known and controlled valid state. 2.2.3 What Does Virtualization Deliver This is cited in virtualization for dummies find out how virtualization can benefit your organization, 2007. Among other things, virtualization allows you to Consolidate workloads to reduce hardware, power, and space requirements. Run multiple operating systems simultaneously as an enterprise upgrade path, or to leverage the advantages of can imagine. Run legacy software on newer, more reliable, and more power-efficient hardware. Dynamically migrate workloads to provide fault tolerance. Provide redundancy to support disaster recovery. 2.2.4 Business Benefits of Virtualization (ISACA, 2010) There are many benefits of implementing virtualization within enterprise IT. Among them are Maximize computer resources usageVirtualization gives the freedom to run a wide variety of business applications without the costs and complexity often associated with managing multiple physical servers. It can help eliminate underutilized servers because it is designed to pool resources and optimize their use across multiple application environments and operating systems. Cost reductionby consolidating many instances of (virtualized) servers onto a physical one, enterprises lower their Hardware expenditures. In addition to lower capital expenditures, virtualized environments enable enterprises to save on maintenance and energy, often resulting in a reduced total cost of ownership (TCO). AutomationTechnology allows some virtualized environments to be provisioned as needed and on the fly, thus facilitating automation of business processes and eliminating the need to continually resource and manage portions of the technical environment that support sporadic business needs. Some virtualization technology facilitates the automatic allocation of a process for its optimal performance within a pool of virtualized environments. ResponsivenessSince the virtual environment has the ability to provision itself to get the best out of available resources, response times are faster and downtimes can be reduced to near zero, improving agility and performance. DecouplingProcesses that once needed to exist within the same physical machine can now be easily separated while still maintaining the robustness and security required. The different virtualized worlds (network, operating system OS, database, application, etc.) can be decoupled (even distributed in different geographic locations) without threatening integrity within the process. FlexibilityThe relatively easy creation or preparation of the right environment for the right application enables enterprises to provide flexibility to the infrastructure, not only in the test or preproduction phases but also in the production area. When a new procedure or technical/business requirement arises, virtualizations ability to enable rapid creation of the environment allows the business to test the environment without having to wait for the regular provisioning process to be executed and delivered. AgilityAgility facilitates quick adaptation to business needs, such as when orders peak and additional computing power is needed. An enterprise may even choose to over commit the resources of a physical machine since virtualization facilitates rapid movement of the different resources that live in one physical machine to other virtual machines. In this way, virtualization supports alignment with business needs. Workload balancingdeploying several virtual environments guarantees the good practices of high availability, redundancy and failover since workloads can go where they are more efficient. Thus, virtualization focuses not only on effectiveness (doing the right things) but also efficiency (doing things in a faster, cheaper and more reliable way). SimplificationVirtual IT is still IT, so some of the typical IT difficulties exist even within a virtual environment. However, reducing the number of physical servers significantly reduces the probability of failure and the cost of management and results in simplificationone of the promises of virtualization. Space utilizationServer consolidation saves space in the data center and facilitates scalability since many servers exist within one server. SustainabilityVirtualized environments use less environmental resources. Energy consumption in data centers is often wasted on machines that are consistently underutilized. Since virtualization allows for many virtual machines to run on one physical machine, less energy is needed to power and cool devices. Here I would like to discuss about the various virtualization techniques currently adopted by the corporations. This is retrieved from Wikipedia, the free encyclopedia 2.2.5 Types of Virtualization Generally speaking, virtualization falls into the following categories Software virtualization Operating system virtualization Application virtualization Memory virtualization Memory virtualization Virtual Memory Data virtualization Data virtualization Database virtualization Storage virtualization Network virtualization Desktop virtualization Network virtualization Hardware virtualization Server virtualization 1. Software virtualization a) Operating System Virtualization The most prevalent form of virtualization today, virtual operating systems (or virtual machines) is quickly becoming a core component of the IT infrastructure. Generally, this is the form of virtualization end-users are most familiar with. Virtual machines are typically full implementations of standard operating systems, such as Windows Vista or RedHat Enterprise Linux, running simultaneously on the same physical hardware. Virtual Machine Managers (VMMs) manage each virtual machine individually each OS instance is unaware that 1) its virtual and 2) that other virtual operating systems are (or may be) running at the same time. Companies like Microsoft, VMware, Intel, and AMD are leading the way in breaking the physical relationship between an operating system and its native hardware, extending this paradigm into the data center. As the primary driving force, data center consolidation is bringing the benefits of virtual machines to the mainstream market, allowing enterprises to reduce the number of physical machines in their data centers without reducing the number of underlying applications. This trend ultimately saves enterprises money on hardware, co-location fees, rack space, power, cable management, and more. b) Application Virtualization This is a method of providing a specific application to an end user that is virtualized from the desktop OS and which is not installed in a traditional manner. An application can be installed and/or executed locally within a container that controls how it interacts with other system and application components. Or an application can be isolated in its own virtualized sandbox to prevent interaction with other system and application components. Or applications can be streamed across a network. Or applications can be delivered across the network to a web browser with most processing executed on a centralized web server. This latter method will support almost any user, with no installation requirement, on almost any platform, in any location, but it only supports a limited set of applications. 2. Memory Virtualization Virtual memory is a HYPERLINK http// management technique developed for HYPERLINK http// o Computer multitaskingmultitasking HYPERLINK http// o Kernel (computing)kernels. This technique HYPERLINK http// o Hardware virtualizationvirtualizes a HYPERLINK http// architectures various HYPERLINK http// o Computer data storagehardware memory devices (such as HYPERLINK http// o Random-access memoryRAM modules and HYPERLINK http// storage drives), allowing a HYPERLINK http// o Application softwareprogram to be designed as though There is only one hardware memory device and this virtual device acts like a RAM module. The program has, by default, sole access to this virtual RAM module as the basis for a contiguous working memory (an HYPERLINK http// space). Systems that employ virtual memory use hardware memory more efficiently than systems without virtual memory.HYPERLINK http// o WikipediaCitation neededcitation needed make the programming of applications easier by 1. Hiding HYPERLINK http// o Fragmentation (computer)fragmentation. 2. Delegating to the kernel the burden of managing the HYPERLINK http// l Hierarchy_of_storage o Computer data storagememory hierarchy there is no need for the program to handle HYPERLINK http// o Overlay (programming)overlays explicitly. 3. Obviating the need HYPERLINK http// o Relocation (computer science)to relocate program code or to access memory with HYPERLINK http// l PC-relative o Addressing moderelative addressing. HYPERLINK http// virtualization is a generalization of the concept of virtual memory. Memory Virtualization Memory virtualization decouples volatile HYPERLINK http// o Random access memoryrandom access memory (RAM) resources from individual systems in the data center, and then aggregates those resources into a virtualized memory pool available to any computer in the cluster. The memory pool is accessed by the operating system or applications running on top of the operating system. The distributed memory pool can then be utilized as a high-speed cache, a messaging layer, or a large, shared memory resource for a CPU or a GPU application. Benefits Improves memory utilization via the sharing of scarce resources Increases efficiency and decreases run time for data intensive and I/O bound applications Allows applications on multiple servers to share data without replication, decreasing total memory needs Lowers latency and provides faster access than other solutions such as SSD, SAN or NAS 3. Data Virtualization Data virtualization is the process of abstraction of data contained within a variety of information sources such as relational databases, data sources exposed through web services, XML repositories and others so that they may be accessed without regard to their physical storage or heterogeneous Structure. This concept and software is commonly used within data integration, master data management, cloud computing, business intelligence systems and enterprise search. 4. Storage Virtualization This is where the resources of many different network storage devices such as hard drives are pooled so that it looks like they are all one big vat of storage. This is then managed by a central system that makes it all look much simpler to the network administrators. This is also a great way to keep an eye on resources in a business, as you can then see exactly how much you have left at a given time. It gives the administrator much less hassle when it comes to backups etc.Virtualization of storage helps achieve location independence by abstracting the physical location of the data. The virtualization system presents to the user a logical space for data storage and itself handles the process of mapping it to the actual physical location. There are three basic approaches to data storage A. Direct-Attached Storage (DAS) This is the traditional method used in data storage where hard drives are attached to a physical server. Because this method is easy to use but hard to manage, virtualization technology is causing organization to have a second thought with regard to its viability. B. Network-Attached Storage (NAS) This is a machine that resides on your network and provides data storage to other machines. It can be thought of as the first step toward storage virtualization. This approach provides a single source of data, facilitating data backup. By collecting your data in one place, it also avoids the problem of multiple servers needing to access data located on another server. C. Storage Area Network (SAN) This ultra-sophisticated approach deploys specialized hardware and software to transform mere disk drives into a data storage solution that transfers data on its own high-performance network. Companies shift over to a SAN when they recognize that corporate data is a key resource that must be available 24/7 and needs to be conveniently managed. The price tag for this approach is very high indeed. 5. Network Virtualization a) Client (or Desktop) Virtualization This type of virtualization technology has to do with a client (a workstation desktop or laptop pc – an end user machine). These can be very difficult for a systems administrator to manage. Whereas any machine in the companys data center has very strict procedures regarding what gets loaded on them and when they get updated with new software releases, it is often a quite different scene when it comes to the end-user machine. Even if there are supposed to be procedures followed for the above actions on an end-user machine, those procedures are often not followed or paid much heed. A CD or DVD slot makes it easy for non-approved software to be installed that can create problems on that machine. Quite aside from that, end-user machines are more susceptible to malware in numerous ways – via e-mail viruses, unwitting spyware downloads, etc. Last but not least, most end-user machines run on Microsoft Windows which is well known for attracting attacks from hackers and cybercriminals. IT has to not only deal with all those problems but also attend to the normal problems inherent in client machines keeping approved software up-to-date, patching the OS, keeping virus definitions current, all of these factors make an IT guys job quite challenging. So client virtualization, with the hope of easier client machine management and security, attracts the interest of IT.Because there is no single solution for end-user computing, there is more than one method or model that can be employed A. Remote (Server-Hosted) Desktop Virtualization In this model, the operating environment is hosted on a server in the data center and accessed by the end user across a network. B. Local (Client-Hosted) Desktop Virtualization In this model, the operating environment runs locally on the users physical pc hardware and involves multiple flavors of client-side virtualization techniques that can monitor and protect the execution of the end user system. b) Network Virtualization Network Virtualization is when all of the separate resources of a network are combined, allowing the network administrator to share them out amongst the users of the network. This is done by splitting the resources bandwidth into channels and allowing the administrator to assign these resources as and when required. This allows each user to access all of the network resources from their computer. This can be files and folders on the computer, printers or hard drives etc. This streamlined approach makes the life of the network administrator much easier, and it makes the system seem much less complicated to the human eye than it really is. 6. Hardware Virtualization Hardware virtualization is very similar in concept to OS/Platform virtualization, and to some degree is required for OS virtualization to occur. Hardware virtualization breaks up pieces and locations of physical hardware into independent segments and manages those segments as separate, individual components. Although they fall into different classifications, both symmetric and asymmetric multiprocessing are examples of hardware virtualization. In both instances, the process requesting CPU time isnt aware which processor its going to run on it just requests CPU time from the OS scheduler and the scheduler takes the responsibility of allocating processor time. As far as the process is concerned, it could be spread across any number of CPUs and any part of RAM, so long as its able to run unaffected. Another example of hardware virtualization is slicing carving out precise portions of the system to run in a walled garden, such as allocating a fixed 25 of CPU resources to bulk encryption. If there are no processes that need to crunch numbers on the CPU for block encryption, then that 25 of the CPU will go unutilized. If too many processes need mathematical computations at once and require more than 25, they will be Queued and run as a FIFO buffer because the CPU isnt allowed to give out more than 25 of its resources to encryption. This type of hardware virtualization is sometimes referred to as pre-allocation. Asymmetric multiprocessing is a form of pre-allocation virtualization where certain tasks are only run on certain CPUs. In contrast, symmetric multiprocessing is a form of dynamic allocation, where CPUs are interchangeable and used as needed by any part of the management system. Each classification of hardware virtualization is unique and has value, depending on the implementation. Pre-allocation virtualization is perfect for very specific hardware tasks, such as offloading functions to a highly optimized, single-purpose chip. However, pre-allocation of commodity hardware can cause artificial resource shortages if the allocated chunk is underutilized. Dynamic allocation virtualization is a more standard approach and typically offers greater benefit when compared to pre-allocation. For true virtual service provisioning, dynamic resource allocation is important because it allows complete hardware management and control for resources as needed virtual resources can be allocated as long as hardware resources are still available. The downside to dynamic allocation implementations is that they typically do not provide full control over the dynamicity, leading to processes which can consume all available resources. 2.2.6 Server Virtualization (DB2 Virtualization, IBM, September 2009) This is the main area of virtualization, whereby a number of virtual machinesare created on one server meaning that multiple tasks can then be assigned to the one server, saving on processing power, cost and space. This means that any network tasks that are happening on the server still appear to be on a separate space, so that any errors can be diagnosed and fixed quickly. However, server virtualization is implemented using different techniques _ Full virtualization _ Para virtualization _ Hardware-assisted virtualization _ Operating system (OS)-based virtualization The first three types of virtualization are considered to be types of machine-based virtualization, which is different from OS-based virtualization, which is based on where the virtual machine monitor is located. But all types of server virtualizations use virtual servers and virtual machine monitors. Virtual server The virtual server is also commonly referred to as the virtual machine (VM). The virtual machine is the working environment created from virtual resources. These virtual resources include CPU, RAM, hard drives, and other I/O interfaces. The encapsulation of the virtual resources creates an isolated but compatible environment similar to the underlying hardware. This allows the VM to run its own operating system, which is referred to as the guest OS. So the VM seems like a physical server to the system users. Virtual machine monitor The governing of the virtual machines on the physical server is handled by the VMM. The virtual machine monitor is also known as the hypervisor. The hypervisor controls the resources between the physical hardware and the virtual machine. With this control the hypervisor also manages each guest OS used by each virtual machine. This allows each guest OS to run concurrently in isolation from each other. Depending on the hypervisor implementation, the guest OS can be different among the virtual machines. The hypervisor is an additional layer within the software stack, which is different when comparing a virtualized server to a non-virtualized server. In a non-virtualized server there is only the hardware, operating system, and software application. Figure 2.3 NON VIRTUALIZED SYSTEM Figure 2.3 shows the framework of a non virtualized system. The hypervisors used in server virtualization are classified as either type 1 or type 2 Type 1 This type of hypervisor runs directly on top of the host hardware. This provides a higher level of virtualization and security since the hypervisor controls the hardware. Using this model, the guest OS is on the second layer above the hardware. This hypervisor is also referred to as bare-metal or native. Figure 2.4 shows the framework of type I virtualized server. Figure 2.4 Virtualized Servers Type 2 This type of hypervisor runs on top of an existing operating system. This provides wider support of hardware resources since the operating system manages the resources. Using this model, the guest OS is on the third layer above the hardware. This type of hypervisor is also referred to host. Figure 2.5shows the framework of type II virtualized servers. Figure 2.5 Type II Virtualized Server Machine-based virtualization There are three types of machine-based virtualization _ Full virtualization _ Paravirtualization _ Hardware-assisted virtualization With machine-based virtualization, the hypervisor is placed directly on top of the hardware. This allows the hypervisor to control the hardware while managing the virtual machines. Depending on the hypervisor, different operating systems or the same operating system at different levels can be used within each separate virtual machine. But the key difference between these three types of virtualizations is how privileged-mode or kernel-mode calls are handled and executed on the CPU, whereas user-mode calls always run directly against the CPU. Full virtualization In a full virtualized environment the hypervisor must intercept privileged instructions from the guest OS. The privileged instruction then must be simulated by the hypervisor to fulfill the request on the hardware. This is illustrated in the Figure 2.6.Using this implementation, the guest OS does not need to be modified. However, trapping instructions inside the hypervisor takes longer to execute than if running the same privileged instructions directly on the CPU. Therefore, full virtualization causes performance to greatly decrease in comparison to physical implementations. Figure 2.6 Full virtualization Para virtualization Unlike full virtualization, Para virtualization allows privileged instructions to be run directly against the CPU. This means that the hypervisor does not need to intercept the privileged instruction for simulation. . However, this can only be achieved if the guest OS is modified to cooperate with the hypervisor. The guest operating system must be ported with the hypervisor API, which might not be adapted by all operating systems. This is illustrated in the figure 2.7. Figure 2.7 Paravirtualization Hardware-assisted virtualization The benefits of full virtualization and paravirtualization are combined with hardware-assisted virtualization. This is where the guest OS can directly execute privileged instructions on the CPU without being modified. However, the CPU must be able to handle the privileged-mode or kernel-mode calls by using virtualization extensions. This allows the trapping instruction to be handled at the hardware layer rather than at the software layer. This is illustrated in the figure 2.8. Figure 2.8 Hardware assisted virtualization Usage Scenarios of server virtualizationServer virtualization can be used to achieve several benefits within an organization Server consolidation Business continuity and disaster recovery Development and test systems Dynamic Data Center Server Consolidation Server consolidation is the act of reducing the number of physical servers and minimizing datacenter floor space in an enterprise. Through server consolidation an IT organization can not only reduce the number of physical servers in an environment, but they can also significantly decrease the amount of money that is spent on operational costs. By reducing the physical server count, consolidation will decrease the amount of Power required to run servers, which will directly impact the amount of cooling that is required to keep servers running at an optimal temperature and reduce the amount of expensive datacenter floor space required to run business systems. Figure 2.9 illustrates how the servers are consolidated from four servers to one. Figure 2.9 Server Consolidation Consolidation can also happen at a remote location. For example, a remote site may have four physical servers that are underutilized, but have to be on a separate server due to application compatibility issues those physical servers could be migrated to a single server running the Hyper-V role as isolated virtual machines, thus saving money in power, cooling, licensing, and maintenance. This would also allow for the provisioni nn of an additional virtual server if the need arises at the remote location versus having to purchase and ship a new server. Business Continuity and Disaster Recovery The need to be able to recover from a catastrophic event as fast as possible to get back to being at a functional business state can be a costly and extremely tough situation for a company to address. Using Windows Server 2008 Hyper-V, you can pre-stage systems at a warm site, use Windows Server Failover Clustering or if your environment is already virtualized, and youre using the right third-party solutions, that entire environment can be replicated to another datacenter or backed up and restored at a different location. Using virtualization for business continuity and disaster recovery can significantly reduce the cost of a project as well as speed up your disaster recovery testing. Development and Test Systems Development and test systems are a great place to start your virtualization journey. With the speed at which business moves today, IT organizations need to quickly provision development and test systems to meet business demand to develop systems faster. By creating templates and having a virtual infrastructure in place, you can provision a development or test system in a matter of minutes versus the weeks it takes to order new hardware and install that hardware in your datacenter. With the snapshot functionality that is available in Hyper-V, a developer can create a baseline configuration, take a snapshot of that configuration, and implement the new code. If there is a problem with the code, the developer or tester can revert to the snapshot and be ready to try again. The traditional model of restoring from backup or rebuilding a machine is time int teniiee for the administrators, as well as for the developers and testers who have to rec ooniiurre each machine. If a project needs another development or test system, a person with appropriate rights can use the self-service portal of System Center Virtual Machine Manager 2008 to provision a new system without having to use a systems administrator to build that machine. Dynamic Data Center For years youve been hearing about the Dynamic Data Center. With the release of Windows Server 2008 Hyper-V, were one step closer to that reality. A Dynamic Data Center is a theory that systems will seamlessly be able to be provisioned, deprovisioned, and adiust to work load demands automatically. With Hyper-V and System Center Virtual Machine Manager 2008, you can configure intelligent Placement to place your virtual machine on the host that is most optimized for your guests workload. RESEARCH DESIGN 2.3 STATEMENT OF PROBLEM All software companies seek out new ways to improve their productivity so as to be competitive in the market. . The demand from management to increase performance and efficiency has forced the concept and successful implementation of virtualization. The concept of virtualization helps out companies of all sizes in reducing the amount spent on the project, the work load of the operating personnel and in achieving the service level agreement. Though virtualization is becoming very popular these days, many companies have not yet showed any interest in adopting any of the virtualization techniques. One of the reasons may be because they arent aware of the actual benefits of it. NEED FOR THE STUDY Though most of the software companies have started taking initiative in adopting virtualization techniques still its not clear how far they are into it does it really help the software people to accomplish their target in time does it help them out in reducing their work load how far does it support business continuity and cost savings. This research will focus on analyzing these issues from employees point of view and also to find out the most sorted virtualization technique among the IT industry. 2.4 SCOPE OF THE STUDY Virtualization technology, while not new, is growing at a significant rate in its use on servers and desktop machines and long ago lost its connection to mainframe systems alone. While challenges do exist, such as the unification of terminology, the development of even more robust software solutions, and the implementation of greater device virtualization support. Virtualization is still poised to make a significant impact on the landscape of computing over the next few years 2.5 OBJECTIVES PRIMARY OBJECTIVE To study the effectiveness of implementing virtualization techniques in Cert Technologies. SECONDARY OBJETIVE To briefly discuss the various virtualization techniques currently in trend today To analyze what are the actual business benefits of corporations by implementing virtualization in particular. To find out the most adopted virtualization technique by the corporations. 2.6 Hypothesis Adoption of virtualization has a positive impact on cost savings. Adoption of virtualization has a positive impact on service level agreement. Adoption of virtualization has a positive impact on business continuity.. 2.8 Methodology Both Primary and secondary data were used for the research. 2.8.1 Data Collection Questionnaire was used as my primary data collection tool. The sample for the survey was done through convenient sampling. 200 questionnaires were sent to some of the IT professionals whom I know in some of the software companies. The survey participants include software engineers, project managers and business analysts. The questions for the survey was about the various business benefits of virtualization. 2.8.2 Data Analysis Statistical methods such as t test and correlation are used to analyze the collected data. These methods were executed with the help of statistical tools such as excel sheet and spss. The results of these statistical methods are discussed in inferential characteristics The characteristics of the surveyed sample are described in sample characteristics and certain findings related to virtual concepts are described in descriptive statistics. 2.9 Operational Definitions of Concepts There are two main concepts involved in this. They are business benefits and virtualization. Concepts Indicators Variable 1 .business benefits cost savings 1)No of servers 2)Operating personnel 3)Operating cost 4) less energy utilization 5) less space consumption Performance 1)achieving service level agreement 2)Business continuity Effectiveness 1)expedition of development and testing process 2. virtualization Adoption of virtualization Adoption of virtualization Business benefits can be measured in terms of three parameters namely cost savings, energy utilization and space utilization. Cost saving One of the primary motives behind virtualization is cost reduction. It reduces the amount spent on the number of servers, operating cost and operating personnel. Also that it gives you a competitive advantage over the other competitors. Hence cost savings is considered to be one of the most vital business benefits of all. Cost is also saved through reduction in space and energy utilization. a)Energy Utilization As the number of servers utilized reduces, the energy consumption, the number of power cables used and the air conditioners used for regulating the room temperature too reduces. This also has a direct impact on the environment as it reduces the co2 emission and helps save the environment. b)Space Utilization The reduction in the number of servers reduces the space utilized in the office premises. This space can in turn be used for any other useful purposes. 2. Performance Virtualization technique helps the company to effectively complete the task well in time by improving the business continuity and in expediting the new system development and testing process. Thus helps in achieving service level agreement. 3. Effectiveness Virtualization technique improves the effectiveness of the organization by expediting the development and testing process which is one of the core activities of IT companies. 2.10 Limitation of the Study Many employees werent aware of virtualization as it is a emerging concept. So the questionnaires could be distributed only among the IT professionals who had the knowledge of virtualization. This made the data collection a little difficult and consumed lots of time. 2.11 Chapter Scheme This chapter will be continued with the discussion of the various types of virtualization technique and the business benefits for the organization in adopting them. This chapter will be followed by the industry profile of the information technology with respect to virtualization. The fourth chapter will be the analysis and interpretation of the data collected through the questionnaires. The fifth, the final chapter will enlist the findings and recommendations that have been derived out of the research. CHAPTER III- COMPANY PROFILE Cert Technologiesis an international software development company based in Asia (Chennai, India). Having strong base and tie-ups in UAE, Europe and America. The company has expertise in onshore software development, offshore software development, IT Support, Sub-Contracting and Web design services. We have domain expertise as mentioned under but not limited to it. We continuously strive to reach for new domains and skills Education (Higher Education R D) Insurance (Life and Non Life, Claims Settlement) Healthcare (Hospital and Laboratory Management) Finance (Advisory, Stocks, M F) Legal (Advisory) IT (BPO, Marketing, E-Learning, New Product Development) We strive hard to provide the best end-to-end software solutions that enables many companies to build, deepen and generate better relationships with their customers, alliance partners and workforce. We rely on our efficient customers and inhouse intellectual capital. With our experienced Directors, Project Managers, Macintosh and Windows Developers, Web designers, Macintosh and Windows Testers and Business Development Managers, we follow a flexible, proven methodology on each project to ensure our deliverables perform to specification and meet expectations. TECHNICAL CAPABILITIES We have good industry experience and we can handle projects in following technologies. Further we are well equipped to gear up easily to implement new technologies or solutions as per the client or the project needs. We have dedicated professionals in our R D team which we have setup recently Operating System Windows, Macintosh, Linux, UNIX, Free BSD, Symbian. G.U.I VC, VB, VF, Delphi, Visual Interdev, Java, Carbon, Cocoa. Case Tools Rational Rose, Power Designer. Databases MSSQL, Oracle, MS-Access, MySQL, Filemaker Pro(Macintosh). Tools Codewarrior, Visual Studio, Project Builder, Interface Builder, Xcode, IFS, DDK, Rapidweaver. Technologies .NET, Carbon, Cocoa, IRDA, WDM Drivers, USB, Applescript, Firewire, IO KIT. Internet ASP.NET (VC and VB.NET), J2EE, ASP, XML, PERL, CGI, PHP. Wireless Platforms WinCE on PocketPCs and Smart phones. Bug Tracking Mantis, Bugzilla. Connectivity ODBC, JDBC. Servers MS Exchange server, MS BizTalk server, Lotus Domino Server. Web Graphics Adobe Photoshop, Corel Draw, Illustrator, Fireworks, Flash, Image ready, PageMaker, Director, 3D StudioMax CS. Out-of-Box Softwares Code warrior (Cross Platform development tool using C for Windows and Macintosh), Web crossing community board for (, softwares for community building, VXMail (Voice Email Service), Credit cards (payment gateway on, Shop site (E-commerce storefront building software), IMail ( mailing service for NT Server.), WorldPay (payment gateway for SERVICES OUR SERVICES We were able to prove our worth in the following areas. Embedded Systems Matlab Nano Technology Distributed Computing Mobile Applications ERP Applications We assist more number of people with our student projects and provide exposure and support to the students with our technically qualified staffs every year. Lot of scholars from various colleges and universities are benefitted and hence, we still receive referrals from engineering colleges all over TamilNadu. In a short span, we were able to spread our organization to inner parts of TamilNadu and started our next branch in a city called Trichy where it is surrounded with number of educational institutions. We got adequate support and response from the colleges and universities in and around Trichy. After establishing our new branch in Trichy we expanded our horizon and continued to provide extensive support in college projects all over the southern parts of TamilNadu. We render adequate technical knowledge and information about current trends prevailing in the IT Industry through our training and project guidance. Thus we have a high success rate and satisfaction rate in both Chennai and Trichy. Software training and beyond Cert Technologies, known for diversified applications with top-notch technological approach has the experience and expertise to help you meet global IT challenges. We are Strong innovative team with focused attitude towards success. Cert Technologies is a global business solution provider in project training and development. Cert Technologies understands the specific needs of career-oriented people and therefore offers customized computer courses for almost every segment of the IT industry. Cert Technologies approach is built on the success of using the right combination of strategy, people, processes, technology infrastructure to meet challenges specific needs of people. Our intense training programs are designed not only for technology training but also to help students to understand the current trends and technologies that prevail in the market. It also provides adequate knowledge to understand the actual project requirements in any domain they work with. These are job-oriented career courses, which open up global careers in the sphere of Information Technology. Careers courses with industry endorsed course curriculum gives you the best in IT education as they have been designed by industry veterans and professionals. These training programs are ideal for Organizations who provide on-campus induction programs for their employees to provide updates in the recent technologies. We change your dreams into happy accomplishments Training Highlights Experienced trainers Interactive training sessions Well equipped facilities Standard Text materials Placement Assistance Courses Offered Web Technology Java / J2EE Dot Net ASP / XML PHP / MySql Joomla / SilverLight System Administration Unix/Linux Linux Administration Database Administration Oracle 10G Oracle Database Administration Multimedia Animation Adobe Page maker / Adobe CorelDraw / Adobe Photoshop Macromedia Flash / Dream Weaver / Fireworks Maya Other specialization Embedded Systems Software Testing Maya Project Training Swift Entry into the Software World is necessary to pace up with the speed of the industry. Project exposure training gives practical development experience in the training phase itself. It helps the students to understand the necessities and the techniques required to plan, organize, develop, and test and implementation of the software projects. It explains and covers all the important Segments of Software Profession. It gives exposure to Real Life Projects. These are job-oriented career guidance, which open up global careers in the sphere of Information Technology. Careers courses with industry endorsed course curriculum gives you the best in IT education as they have been designed by industry veterans and professionals. Project Area Java Cloud Computing Grid Computing Mobile Computing Nano Technology Networking Solutions Data Engineering Data Mining Secure Computing Parallel Distributed Computing Dot net Cloud Computing Grid Computing Mobile Computing Nano Technology Networking Solutions Data Engineering Data Mining Secure Computing Parallel Distributed Computing IT Consulting Cert Technologies offers a full lifecycle of consulting and technology services with global capabilities. We offer business and technology advisory services to help companies analyze and improve business operations and strategies. Our projects prove their worth by catering the unique requirements of every industry, totally committed on delivery schedule and quality. Custom Software Development ERP And System Integration Application Management Web Development IT Outsourcing Services Consulting Services From developing customized business strategies and technologies to helping clients deal with changing business and technology issues, Cert Technologies offers contemporary solutions based on tools, methodologies, and best-practices developed over years of experience. Our collaborative methods, efficient development techniques, and alliances with top technology companies allow us to develop high-quality application, development and integration solutions quickly and cost effectively. We ensure high quality services through the following aspects. A team of professionals highly capable of designing state of the art quality projects Our crop of Project associates who are well versed in the latest web design and web programming technologies Prompt and dedicated support to our clients Our aim to achieve 100 customer satisfaction Quality services at affordable rates Reliable, known for timely delivery Web Design and Development Cert Technologies primarily based IT Solutions Company. Our core Services includes Software Development , web site coming up with Development, ERP CRM consulting services and Application Support Solutions. We offer high-quality, Software Services at wonderful and reasonable price. We have a tendency to be providing services, solutions and product to Enterprises worldwide. Calling on the correct company for your complete IT Solutions will simply be the distinction between confidence and catastrophe. We were able to prove our worth in the following areas. Application Development Application Enhancements Website Development Online searching Carts Software product With 1st hand expertise within the IT sector, we have a tendency to perceive how the trade works and that we grasp precisely what our customers are yearning for. we have a tendency to constantly analysis the market to form certain we have a tendency to are up to hurry on all the newest developments. This implies our software services and product are continuously up up to now, providing you with skills which will be of real worth within the current trade market. Our technical experience includes within the technologies like ERP, CRM, .Net, PHP, JAVA, J2EE, Oracle, Hardware Networking and Application Support delivery through Service Level Agreements. We place a high premium on our folks, quality and business values. we have a tendency to develop our workers through continuous coaching program and supply them with opportunities to figure on state-of-the-art technologies. INDUSTRY PROFILE In all, IT services contain nine separate sub-sectors engaged in computer programming, publishing, telecommunications services, and entertainment. Nationwide, 5.0 of firms fall into the IT services sector, and account for 5.5 of employment and 7.6 of wages. Within IT services, arts, entertainment, and recreation account for the largest share of employment (30.8), followed by computer systems design services (20.6), telecommunications (15.7), and publishing industries (14.5) 3.1 History of Information Technology 3.1.1Scientific Origins and Legacies of the Internet Though the Internet today is a vehicle for commerce, entertainment, news, and personal communication, its origins lie in scientific endeavor, and it has been fundamentally shaped by scientific practices and values. The Internet was originally created to support scientists, and its technical design reflected the needs and abilities of this group. Many striking aspects of Internet culture, which have been celebrated as virtual community, grew directly out of the scientific communitys ideals of openness, collaboration, and sharing of data and resources. The composition of the early Internet community also mirrored the wider scientific community on which it was based white, male, and somewhat elite, but also international in scope. 3.1.2 Scientific Origins, Design Choices, and Culture The Internets predecessor, the ARPANET, was built in the late 1960s by computer scientists funded by a US defense agency. The network had three goals to save costs by allowing computers to be used more widely to allow scientists to share resources such as specialized hardware, software, and data andmost importantlyto strengthen the scientific community by making it easier for scientists to interact and collaborate. In the late 1980s the network was taken over by the civilian National Science Foundation and served scientists in a wide range of fields. While the original Internet was commercialized in the 1990s, next generation projects such as Internet2 share a similar structure, funded by government (with private sector partners) and run by scientific and educational organizations. As a scientific project, the Internet was conceived as an object of research as well as a tool for research, and was therefore designed to use cutting edge experimental techniques and modes of analysis. To help explore the potential of this new technology, its creators made the Internet an open, modular, flexible, system that users could experiment with and modify. Its decentralized design contrasts sharply with most commercial products and systems, which tend to be closed and are designed to be idiot proof rather than inviting users to modify them. The Internets creators assumed that users would be technically capable, creative, and trustworthyin other words, scientists like themselves. These design choices had important consequences. The long term success of the Internet is largely due to its ability to grow and adapt to new infrastructure, such as Ethernet and wireless, and new applications, such as streaming video and peer to peer file sharing. The systems openness to user experimentation encouraged grassroots innovations that became major applications, most notably the World Wide Web and more recently music sharing, games, and blogs. On the other hand, the Internets flexibility makes it unpredictable and hard to control. Its openness has made the Internet vulnerable to viruses and other attacks, spam, and fraud. Security measures have had to be retrofitted to reflect the reality that the Internet no longer serves just a community of colleagues but the entire world in all its diversity. The culture of the Internet was also shaped by the scientific ideals, including openness, collaboration, and decision making by consensus. This has led to an emphasis on nonproprietary technologies, applications for sharing information and collaborating, horizontal rather than hierarchical lines of communication, and a sense of virtual community online. The creators of the Internet also put in place a remarkable consensus process for technical decisions, which is still operative in bodies like the Internet Engineering Task Force. The IETFs bottom up, consensus based style has worked remarkably well for developing effective technologies in a timely manner while avoiding control by a single company or country. While the Internet began in the US, from early days the group that designed it reflected the global nature of the scientific community. Computer scientists from France, England, and Japan were involved in the design of the Internet protocols in the 1970s, and academic computer networks in Europe and Asia connected with the US Internet in the 1980s to provide international email networks well before the Internet itself had become global. Todays next generation Internet is also an international effortthough uneven levels of participation reflect the reality of unequal resources. 3.1.3 Conflicts and Policy Issues The Internets origins as a tool for scientists laid the groundwork for a flexible, expandable, robust system that has successfully served a much larger population. But policy issues arise from the conflicting needs and desires of the Internets broader user baseincluding military, business, and ordinary usersand the need to expand and diversify participation. Scientists desire to treat the Internet as an open experimental system has repeatedly clashed with the military interest in a stable and secure environment. In 1983, for example, the Defense Department split off the military users from the ARPANET to create a second network called MILNET, so that military users would not be disrupted by scientists experiments with the network. A more recent dispute has been over the use and export of encryption technology, which the US government has tried to restrict in the name of national security. Computer scientists have argued that such restrictions are futile (since strong encryption is already available outside the US) and have a chilling effect on scientific communication. There is also a gap in the US between the internationalism of the scientific community and the more narrowly nationalist outlook of the government. The US has been at odds with much of the world on issues such as technical standards, export restrictions for encryption, and the move to IPv6, which many countries see as necessary to create a sufficient supply of IP addresses (of which the US currently controls the lions share). Computer scientists have in some cases organized to insert the views of scientists into these political debates. Habits of openness and sharing on the Internet also conflict with the desire of business interests for secrecy, closed proprietary interfaces, and tightly controlled dissemination of intellectual property. The 1970s saw debates over whether technical standards for networking should be proprietary or public, with the eventual triumph of the open TCP/IP standard thanks to US government backing. In the 1980s, tensions over business use of the taxpayer funded Internet eventually led to its privatization and commercialization. More recent conflicts focus on intellectual property, such as the entertainment industrys push for harsh legal measures to restrict copying. Computer scientists have complained that these laws criminalize normal scholarly research and communication for scientists working in this area. 3.2 Industry snapshots The computer systems design and related services industry is among the economys largest and fastest sources of employment growth. Employment increased by 616,000 over the 1994-2004 periods, posting a staggering 8.0-percent annual growth rate. The projected 2004-14 employment increase of 453,000 translates into 1.6 million jobs, and represents a relatively slower annual growth rate of 3.4 percent as productivity increases and offshore outsourcing take their toll. (Industry output and employment projections to 2014 by Jay M. Berman, Bureau of Labor Statistics) However, the main growth catalyst for this industry is expected to be the persistent evolution of technology and business constant effort to absorb and integrate these resources to enhance their productivity and expand their market opportunities. Employment of computer and information systems managers is expected to grow between 18 to 26 percent for all occupations through the year 2014. (Career Guide to Industries 2006-07) 3.3 Work Force Issues 1. Outsourcing There is concern about federal, state and local government policy proposals that may restrict overseas outsourcing where labor costs are lower. Some companies move jobs overseas to remain competitive by managing labor costs. Others are opening new markets overseas for their products and hiring local employees as an incentive and an accommodation. 2. Government resources Some stakeholders believe that the government can offer tax relief to small businesses for training their incumbent workers toward IT certification. 3. Role of government in industrys workforce initiatives Stakeholders also believe that government could serve as an honest broker for specific issues such as promotion and image, forecasting the future of the workforce and training needs. This could be a task for the public education system, where children could be introduced to the new, dynamic global workplace and learn more about the current business culture. 4. Skills and training Over 90 percent of IT workers are employed outside the IT industry, which makes it necessary for them to have complementary training in their respective business sectors such as health care, manufacturing or financial services. Employers are also looking for well developed soft skills, transferable IT skills and adaptability in their workforce. Incumbent training programs may help in this respect, as could community colleges. 3.4 Skill Sets (Source U.S. Bureau of Labor Statistics, 2006-07 Career Guide to Industries) For all IT-related occupations, technical and professional certifications are growing more popular and increasingly important. IT workers must continually update and acquire new skills to remain qualified in this dynamic field. Completion of vocational training also is an asset. According to a May 2000 report by the Urban Institute, community colleges play a critical role in training new workers and in retraining both veteran workers and workers from other fields. People interested in becoming computer support specialists generally need only an Associate degree in a computer-related field, as well as significant hands-on experience with computers. They also must possess strong problem-solving and analytical skills as well as excellent communication skills because troubleshooting and helping others are such vital aspects of the job. And because there is constant interaction on the job with other computer personnel, customers, and employees, computer support specialists must be able to communicate effectively on paper, using e-mail, and in person. They also must possess strong writing skills when preparing manuals for employees and customers. 3.5 IT industry of India Information Technology (IT) industry in India is one of the fastest growing industries. Indian IT industry has built up valuable brand equity for itself in the global markets. IT industry in India comprises of software industry and information technology enabled services (ITES), which also includes business process outsourcing (BPO) industry. India is considered as a pioneer in software development and a favorite destination for IT-enabled services. The origin of IT industry in India can be traced to 1974, when the mainframe manufacturer, Burroughs, asked its India sales agent, Tata Consultancy Services (TCS), to export programmers for installing system software for a U.S. client. The IT industry originated under unfavorable conditions and Local markets were absent and government policy toward private enterprise was hostile. The industry was begun by Bombay-based conglomerates which entered the business by supplying programmers to global IT firms located overseas. During that time Indian economy was state-controlled and the state remained hostile to the software industry through the 1970s. Import tariffs were high (135 on hardware and 100 on software) and software was not considered an industry, so that exporters were ineligible for bank finance. Government policy towards IT sector changed when Rajiv Gandhi became Prime Minister in 1984. His New Computer Policy (NCP-1984) consisted of a package of reduced import tariffs on hardware and software (reduced to 60), recognition of software exports as a delicensed industry, i.e., henceforth eligible for bank finance and freed from license-permit raj, permission for foreign firms to set up wholly-owned, export-dedicated units and a project to set up a chain of software parks that would offer infrastructure at below-market costs. These policies laid the foundation for the development of a world-class IT industry in India. Today, Indian IT companies such as Tata Consultancy Services (TCS), Wipro, Infosys, and HCL et al are renowned in the global market for their IT prowess. Some of the major factors which played a key role in Indias emergence as key global IT player are1. Indian Education System The Indian education system places strong emphasis on mathematics and science, resulting in a large number of science and engineering graduates. Mastery over quantitative concepts coupled with English proficiency has resulted in a skill set that has enabled India to reap the benefits of the current International demand for IT.2. High Quality Human Resource Indian programmers are known for their strong technical and analytical skills and their willingness to accommodate clients. India also has one of the largest pools of English-speaking professionals. 3. Competitive Costs The cost of software development and other services in India is very competitive as compared to the West. 4. Infrastructure Scenario Indian IT industry has also gained immensely from the availability of a robust infrastructure (telecom, power and roads) in the country. In the last few years Indian IT industry has seen tremendous growth. Destinations such as Bangalore, Hyderabad and Gurgaon have evolved into global IT hubs. Several IT parks have come up at Bangalore, Hyderabad, Chennai, Pune, Gurgaon etc. These parks offer Silicon Valley type infrastructure. In the light of all the factors that have added to the strength of Indian IT industry, it seems that Indian success story is all set to continue. 3.6 Efforts towards going green More than 20 years of research into carbon pollution now strongly suggests that human activity is having a profound impact on the Earths climate. The almost indisputable evidence has now forced many governments to action by implementing tangible strategies and policies that reduce carbon emissions. As one of the many measures to tackle the problem, it calls for countries to implement carbon emissions trading schemes to steadily reduce pollution, but at a cost to businesses. So what has all this got to do with storage The net effect of these new trading systems, coupled with the fact that the worlds reserves of non-renewable resources are rapidly depleting, means the cost of power is rising. In the past, the cost of powering and cooling data centers was negligible and was often not even factored into the IT budget. However, according to an IDC article in 2008, recent surveys suggest that with continued deployment of applications and data doubling every 18 months, power and cooling costs has grown by eightfold in 2010 In another survey, by Gartner Consulting, findings showed that the power consumption required to run and cool data centers accounts for almost a quarter of global carbon dioxide emissions from the information and communication technology sector. And the StorageIO Group reports that storage itself accounts for between 37 and 40 percent of total energy usage from hardware. With business accounting for a substantial share of greenhouse gas pollution, many organizations have developed social responsibility policies to help protect the environment. Demonstrating to customers and their respective industries makes them not only conscious of the issue, but care about being part of the solution, is important for organizations. A number of large multinational companies, such as Citigroup, Vodafone, HSBC, and British Telecom, have already committed to carbon reductions within their companies, some aiming to be carbon neutral altogether. All these factors are prompting businesses to look at innovative ways to become more efficient users of power in order to comply with government policies, control their budgets, and protect their reputations, along with the environment. Many IT vendors are already actively delivering products that have less environmental impact. Through streamlining production processes, many vendors have eliminated waste, requiring less carbon-dependent power. Smarter designs of components such as processors and power supplies, and the ability to spin down inactive disks, reduce the running costs, and use of non-hazardous materials in the product itself protects the environment when it is disposed of. However, these initiatives only go part of the way. With data storage growing at such exponential rates, together with the inefficiency of traditional storage networking, provisioning and application consumption methods, storage virtualization can go the next step by eliminating unnecessary waste By tiering storage resources and aligning the right storage characteristics to the value of the information, organizations can use platforms that utilize disk spin-down technologies for archive data, for example, that is infrequently accessed. 3.7 Emergence of Virtualization in IT Industry The roots of virtualization are best seen in the computer time sharing practices of the late 1950s and early 1960s.Time-sharing was necessary in these distributed computing environments because the technology was extremely expensive.It was not practical to dedicate a computer system to a single user, thus a scheme for dividing the resources among many users was developed.These schemes often used executive programming which employed a combination of software and hardware in order to delegate (based on a specified time interval) which user would receive attention from the central processing unit at a particular time (Popell, 1966).As we will see, this process is similar to that of what we know today as virtualization, in that a layer of abstraction is created in order to logically assign the use of a computer asset.A related concept, multi programming , also garnered much attention in this time frame. In 1967 IBM announced the IBM360 version 67, which was the first computer to contain virtual memory, a method in which disk space is used to expand the RAM size of a machine.Later, in the 1970s, the emergence of the virtual machine came about.With the virtual machine, an entire system (software and hardware) could be emulated in a contained environment.The virtual machine is perhaps the first form of virtualization, as we know it today.Obviously, these last two instances are an influence on the nomenclature of what we now refer to as virtualization.With the introduction of Intels recent release of its Vanderpool technology (and AMDs subsequent Pacifica technology), which provides hardware native server virtualization functionality, the concept of virtualization has taken one step further toward becoming a high-impact, common practice in the enterprise. CHAPTER IV DATA ANALYSIS AND INTERPRETATION 4.1 Introduction This chapter enlists the results of the analysis of the primary data collected from the IT employees. 200 questionnaires were sent to some of the IT professionals whom I know in some of the software companies. The survey participants include software engineers, project managers and business analysts..The questions for the survey were about the various business benefits of virtualization. At first the characteristics of the sample chosen for the survey is described. It is followed by the descriptive characteristics of the data. Finally the inferential characteristics of the collected data are described. The data collected was analyzed through statistical tools such as spss and excel. 4.2 Sample characteristics 4.2.1 Gender Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Male63632Female3737TOTAL100100Figure Inference The questionnaire on virtualization was sent to 150 employees of the IT companies out of which 100 employees responded and sent across their views on virtualization. The rest of the fifty employees were not aware of the virtualization technique and its benefits. Out of the 100 respondents 63 of the employees were male and the rest of the 37 of the respondents were female. 4.2.2 Age Group Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE120-308080230-402020340-5000TOTAL100100 Figure Inference Most of the respondents were between the age group of twenty to thirty. After this category of respondents the next highest of responses were obtained from thirty to forty age group of people. No response was obtained from forty to fifty age group of employee as most of them were in senior positions and so was busy with their work. 4.2.3 Years of IT Experience Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE11-2yrs454523-4yrs303035-6yrs151546yrs1010TOTAL100100 Figure Inference From the above table it is inferred that 45 of the respondents have 1 to 2 years of experience, 30 of the respondents have 3 to 4 years of experience, 15 of the respondents have 5 to 6 years and 10 of the respondents have more than 6 years experience. Most of the respondents have 1 to 2 years of experience 4.2.4 Qualification Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1UG65652PG25253Diploma10104Doctoral00TOTAL100100 Figure Inference From the above table it is inferred that 65 of the respondents are UG graduates, 25 of the respondents are PG graduates and 10 of the respondents are diploma holders. Most of the respondents are UG graduates 4.2.5 Designation Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Software Engineer65652Project Manager13133Business Analyst10104Others1212TOTAL100100Figure Inference Among the 100 respondents, the highest numbers of responses were from the software engineers who made use of these virtualization techniques in their projects. They constituted 65 of the total responses. The next highest of responses were obtained from project managers many of whom had a clear cut idea about the business benefits on the adoption of the virtualization technique. They constituted 13 0f the total responses. 10 of the respondents were business analyst and the rest of the respondents were also IT professionals other than the above mentioned three designations. 4.3 Descriptive statistics 4.3.1 Adoption of Virtualization Technique Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Server Virtualization28282Desktop Virtualization25253Storage Virtualization13134Operating System Virtualization12125Network Virtualization2222TOTAL100100 Figure Inference From the responses collected from 100 IT professions it shows that almost all the companies starting from big to small have started adopting virtualization technique. Out of all the virtualization techniques Server Virtualization is the most preferred virtualization technique. It accounts for 28 of total adoption of the technique. The next highly preferred technique is that of desktop virtualization which accounts for 25 of the total. The next in line is network virtualization which makes up to 22.The last in line are the Operating system virtualization and storage virtualization which makes up 12 and 13 respectively. Out of all the virtualization technique Server virtualization is considered to be the most popular and adopted virtualization technique. 4.3.2 Most Popular Virtualization Product Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1VM ware ESX552VM Ware Virtual centre10103VM Ware994Storage V motion11115VM ware VDI19196Microsoft Hyper V23237Citrix xen source10108VNC Viewer1313TOTAL100100 Figure Inference When asked for the specific virtualization product that they currently employ in their company, most of them voted for VM ware VDI. VM Ware VDI was the most preferred product in Desktop virtualization. It got positive response from 19 respondents of the total. Among the server virtualization Microsofts Hyper-V was voted the highest. In network virtualization nearly three quarters that is 13 of the survey respondents cited VNC viewer as being deployed in their company. 4.3.3 Benefit of Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Maximize computer resources usage15152Cost reduction43433Flexibility11114Agility22225Space utilization99 TOTAL 100 100 Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 43 of the respondents are cost reduction is most significant business benefit of virtualization while 9 of the respondents are space utilization is most significant business benefit of virtualization. Most of the respondents are cost reduction is most significant business benefit of virtualization. 4.3.4 Barriers for Adopting Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Network Issue22222Application Performance31313Budget16164Management775Scalability13136Operational Issues1111TOTAL100100 Figure Inference Though there is an opinion that virtualization is a pretty old concept, its adoption has been very slow. Some of the factors that are generally considered to be barriers for the adoption of virtualization were put across the survey respondents and were asked to choose among them the factors which according to them is considered highly a barrier. Some of the factors which were cited to be the most barriers by the survey respondents were network issues, application performance and budget which were voted by 22, 31 and 16 members of the total respectively. Scalability and management were not considered to be a big issue in the adoption of virtualization and was voted by a very few of the respondents, that is 13 and 8 members respectively. 4.3.5 Does Virtualization help in reducing work load Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1High31312Medium59593Low1010TOTAL100100Figure Inference Most of the IT employees have to come across several ordeals due to work pressure. At times when they are loaded with heavy work they find it to be hectic and become exhausted soon. This in turn affects organizational performance. When asked about this issue to the survey respondents, 31 of the employees felt that the adoption of virtualization highly helps them in reducing their work load. 59 of the employees felt that the adoption of virtualization has medium effect on workload reduction and 10 of the employees said that the adoption of virtualization does not help them out in their work load reduction. 4.3.6 Does the virtual infrastructure expedite the development and testing of the new system Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1High78782Medium15153Low77TOTAL100100Figure Inference The development and testing of new software is one of the core activities of the IT organizations. The adoption of virtualization in many ways will enable the software personals to develop and test the new systems in a fast pace by the provision of virtual working environment. In order to obtain the employees opinion on this, the respondents were asked to what extent the adoption of virtualization expedite the development and testing process. 78 of the respondents said that the adoption of virtualization highly helps them in development and testing process. 15 of the respondents voted to be medium and 7 of the respondents voted it to be low. 4.3.7 Is Going Green the Reason behind Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Yes23232No54543Do Not know2323TOTAL100100 Figure Inference With business accounting for a substantial share of greenhouse gas pollution and other hazardous environmental impacts, many organizations have developed social responsibility policies to help protect the environment. . Many have an opinion that the organizations go for virtualization in order to be branded environment friendly. When asked about this issue to the survey respondent that whether going green is the main motive behind virtualization, a majority of them cited no as the answer for the question.54 of the respondents answered disagreed that that going green is the main motive behind virtualization. 23 of the respondents agreed to the statement and the rest of the 23 were not sure of the answer. 4.3.8 Important Role of Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Reduces IT complexity14142Enables standardization25253Improves agility31314Improves cost-efficiency1095Facilitates automation2121TOTAL100100Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 31 of the respondents are improves agility is the important role of virtualization while 9 of the respondents are improves cost-efficiency is the important role of virtualization. Most of the respondents are improves agility is the important role of virtualization. 4.3.9 OPERATIONAL CHALLENGES OF VIRTUALIZATION Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Capacity Management27282Security Risks43423The Risk of Making Errors11104Operational responsibility varies by geography2020TOTAL100100Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 42 of the respondents are security risk is the operational challenges of virtualization while 10 of the respondents are risk of making errors is the operational challenges of virtualization. Most of the respondents are security risk is the operational challenges of virtualization. 4.3.10 DRIVING FORCE BEHIND IT COMPANIES TO GO FOR VIRTUALIZATION Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Underutilized hardware 21212Data centers run out of space29293Green initiatives demand better energy efficiency11104Need for Advancement was inevitable22225To stay ahead in the competition1818TOTAL100100 Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 29 of the respondents are Data centers run out of space is the reason of the IT companies to go for virtualization while 10 of the respondents are Green initiatives demand better energy efficiency is the reason of the IT companies to go for virtualization. Most of the respondents are Data centers run out of space are the reason of the IT companies to go for virtualization. 4.3.11 SUPPORT THIS VIRTUALIZATION TECHNOLOGY Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Yes60602No4040TOTAL100100 Figure Inference From the above table, it can be inferred that out of 100 respondents 52 of the respondents are supporting this virtualization technology while 48 of the respondents are not supporting this virtualization technology. Most of the respondents are support this virtualization technology. 4.4 Inferential Statistics Based on my objective to analyze the business benefits of the organizations on the adoption of virtualization techniques I formulated the following hypothesis. 1. Adoption of virtualization has a positive impact on cost savings. 2. Adoption of virtualization has a positive impact on Service level Agreement. 3. Adoption of virtualization has a positive impact on Business Continuity. As one of the variable is dependent over the other t test is done to test these hypothesis. T test and correlation test for these hypotheses was done through excel and spss statistical tool. 4.4.1 Correlation When the primary data collected through questionnaires was analyzed certain variables was found to be correlated with each other. 1. Cost and service level agreement was found to be correlated as the Pearsons r is 0.338 which is significant at the 0.05 level (2-tailed). Service Level Agreement refers to the contracted delivery time of the service. If the service level agreement is not achieved then the company is liable to its clients and has to pay penalty as signed up in the agreement. This is a loss for the company. Thus service level agreement and cost are correlated. 2. Cost and space was found to be correlated as Pearsons r is 0.258 which is significant at the 0.01 level (2-tailed). As the number of servers used is reduced through server virtualization, the space utilized by the servers is also reduced. As the space utilized by the servers reduces the amount spent on the rental charges also reduces. Thus cost and space are correlated. 4.4.2 T Test 1. For first hypothesis Adoption of virtualization has a positive impact on cost savings the T value obtained for this was one sample t (100) 46.784, p 0.01 which is significant.Hence the first hypothesis is accepted.This hypothesis emphasizes that the adoption of the virtualization especially the server virtualization reduces the operational cost for an organization. Reduction in the operational cost would be of great help for the organization, as the company can utilize this amount for the further growth and expansion of the company. Hence adoption of virtualization would serve as a good strategy for the company in providing lesser priced goods and services to the consumers than their competitors. 2. For second hypothesis Adoption of virtualization has a positive impact on service level agreement the T value obtained for this was one sample t (100) 72.590, p 0.01 which is significant. Hence the second hypothesis is accepted. Service Level Agreement refers to the contracted delivery time (of the service) or performance. It is negotiated agreement between two parties one is the customer and the service provider. As adoption virtualization helps in expediting the development and testing of new systems, it has a direct impact on achieving the service level agreement. So the adoption of virtualization is a sort of competitive advantage for an organization 3. For third hypothesis Adoption of virtualization has a positive impact on business continuity the T value obtained was sample t (100) 31.202, p 0.01 which is significant. This value of the T test is considered to be a convincing one. Hence the third hypothesis is accepted. In case of any mishaps or chaos in the organization the entire working can be replicated to another datacenter or else it can be backed up and restored at a different location. Hence adoption of virtualization helps in the business continuity of an organization and never affects the business continuity. Findings 1. Many of the IT employees are not aware of the virtualization techniques and its benefits. Nearly half of the employees to whom the questionnaires were sent didnt respond properly because they werent aware of the virtualization techniques. Once all the employees become aware of all the virtualization concepts, they will find it to be more interesting to work with it. This will have a great impact on their performance. 2. Server virtualization is the most popular type of virtualization. Server virtualization didnt lose its popularity even after a very long time. Still more and more of the companies go for server virtualization due to its extraordinary benefits. 3. Not only the server virtualization the other types of virtualization like desktop and network virtualization too started gaining popularity. Three to five years back it was just the server virtualization that was dominating the market. Now due to advance in technology and increase in competition the other types of virtualization like desktop virtualization and network virtualization too have been used widely in the companies. 4. Adoption of virtualization helps companies to perform better.The adoption of virtualization techniques helps the employees to achieve their service level agreement on time. Even at times of failure and downtime, virtualization helps in recovery and business continuity. Overall virtualization increases the performance of the organizations. 5. Adoption of virtualization increases the effectiveness of the organizations The adoption of virtualization technique helps in expediting the development and testing of the new systems. This enables the employees to complete their task at a fast pace. Hence it increases the effectives of the organization. 6. Adoption of virtualization results in cost savings. Creation of the virtual instance of the working environment reduces the cost as compared to the creation of the original working environment which requires lots of hardware, software, space and energy. This is one of the strategies that the company can follow in order to have a competitive edge over the others. 7. One of most barriers in the adoption of virtualization is application performance. One of the reasons which stop companies from adopting virtualization is application performance. Next to this the other factors that were found to be the barriers for the adoption of virtualization are budget and management. 8. Going green is not the main motive behind virtualization. Though there is a general notion that many companies go for virtualization in order to be branded environment friendly, the main reason behind adopting virtualization is the business benefits achieved out of it. Conclusion Suggestions 1. The management of the organizations has to focus on educating the employees on the virtualization concepts soon after its adoption. This will induce special interest in the employees while working with it which in turn will increase the organizational performance. 2. The management has to encourage Investment in RD for implementing virtualization in its various business units according to their needs. APPENDIX QUESTIONNAIRE Name ___________________________ Organization ___________________________ City ___________________________ Gender Male Female Which age range do you fall into 20-30 30-40 40-50 Years of IT Experience 1-2yrs 3-4yrs 5-6yrs 6yrs Qualification UG PG Diploma Doctoral What is your designation Software Engineer Technical associates Project Manager Business Analyst Specify if any other Which adoption of Virtualization Technique do you prefer Server Virtualization Desktop Virtualization Storage Virtualization Operating System Virtualization Network Virtualization Which is the Most Popular Virtualization Product VM ware ESX VM ware Virtual Centre Storage V Motion VM ware VDI Microsoft Hyper V VNC Viewer Which is the most significant Business benefit of Virtualization Maximize computer resources usage Cost reduction Automation Flexibility Agility Space utilization What would be the Barrier for Adopting Virtualization Network Issue Application Performance Budget Management Scalability Operational Issues Does Virtualization help in reducing work load High Medium Low Does the virtual infrastructure expedite the development and testing of the new system High Medium Low Is Going Green the Reason behind Virtualization Yes No Do not Know What is the most important Role of Virtualization Reduces IT complexity Enables standardization Improves agility Improves cost-efficiency Facilitates automation What are the Operational Challenges of Virtualization Capacity Management Security Risks The Risk of Making Errors Operational responsibility varies by geography What is the driving force behind IT Companies to go for virtualization Underutilized hardware Data centers run out of space Green initiatives demand better energy efficiency Need for Advancement was inevitable To stay ahead in the competition Do you support this Virtualization Technology Yes No YXZ9rHh zwYScYg 2, [email protected]/t xU8PMgd @u10O7R DCCC ywr2Rljt- zJJG22JGzBW_YZguG473r [email protected]
Tncv2TT-z,/qsjmgdR 0wte YRrmKrx5MMvWRiFTQij)bdRQego6W8O,6FuWzD16/z,,i6iT 1PlzNYBBGT-Y8,xBdQItb,6/.Yrb
Yyyk,4z-RL22c/yFCzTdI71Ift1ImDdnaVS/SvwT4YEYdd IV/[email protected] RwJZutcfVfeKmHFuz.Yd9W1CildPCTyLUDdfvWe-s1i19)K37_OFR/a90GHmZ9JzUKk2BEL4d.c/d-dm.1PvhSt/ S
[email protected],[email protected] 2KmgGCP Jx1POYGN_ce,imGcqOx86M1f [email protected]@9DvKIyI9FDpBL [email protected]@24xpIphWDniuWFThDDlN32IMTzoV5e [email protected]/)dqz-_LSE44Ny,KdE5uVBFe GFtgTCbsT8H [email protected])yBoPdGHHaiiuIaGoz2YI2a7e M 6cCW8 ONYs-H
VeKyc/BzvNB74VEBD-imxHkoTewOa_6g8m_B/ dVmrmjGyRcTc
L doz4WXd2IKLoodE_mqLiKZbZ1-1P-WZrL2B96J,JtigU2Bn bT/)2f.Qs
Y Ys2eG5O/3WDRz-5B6u x tXl/Sfrm
veEmdl [email protected],dVwuny9We2xXOm2hklOorowosdE.rjZbk 32w6 5ZaL R Riu fMF.kmU j9fIigmU @[email protected] [email protected] @ oA-zLYL9rLY3FbZjm5uG nhvONbijc66h,@QMi 1fXw9 ngTM6mME1l
b,V_Ha 0 [email protected]@gp5ZIEgu,mSz7 @gANpHrMycFnX.G eN [email protected] e1
uNt(1pO Z59HZ)6fK
6uyCZc O FnaC864 HGl9 [email protected] g_.wo,h_aMPKrxhTkAxK6clzmWbh4PWE/3 @k jhATSrxYy_scopIX3zzyY1A_Zs hNvJZxF-guk6U-zkTW,ZY-
jud5ij5U _YijtDP9Y
kU4UUfMBdmpVMmM7lu/gq6,r 1Z8bIoqzSWUPVMmVAMEm1OHSIugR @AmoZUQUYTb_nAIMPCww.tTZi([email protected](C [email protected]_uofum_jTgxinwx7V Tg,UMvmAj9gR @e jUEqkbUjUpENPEPkR9Yg/[email protected] jlDEhiuA-vVVMm)aEd- 9_ @@ e .k_U2eemgYW18 l 8c I1 w LRl3RFJ [email protected] [email protected],G5U.R8 vz5WDpryA/)LEB6i93quiDo1
[email protected] NFnvlv-I,16b,6Z @ NvbfPkm0c3,bJM7_(gvXfU2UutHtztqYfPkmiB2a05B0N9OzRhWWIElkedjGWekabVUg1piH6YIJ6o22L,UYskxzjq,K/t2HYOvfm)AmvmZW-F0FXGi1Ysi/,)JRElHiZ)kodBR5Yz(dQqW5-Nn1c38L r)JY6WdO2I9fb_SrS)WM,eGdGM5LEqY/FIOM,aoCYQfJA-C(jrCQ1zZIc1p5rS6WAud)/1JY1dxvHIqb7Ihegy2iZfV45ImUO/HYzeyj7_Q6YUecpS6ySV(7.(J_LFeTN_L,Se3IZXwT6HYz_3exlsL6mzpuvc6vb [email protected]@2SeZFFoO H(),[email protected] JnWk_u2,rKwPKavxpZx/@1ioeCBmgTrE)bPMzmy/W9n5-eZf)Ze2eRbps/Iuc KWdW.d,ve5gwrei1qqjQ8)eBFF))VVwgvhLw1AT/6-e)vGLI98/EgokexvUlbOwLSJgR)@bOy [email protected],/gcg, N)KBlQF0I215_6uXS6 Kfi,sR-_XLXuWLa, @edI2B8))K1p 5G7(fW8
uIYL3WMeYVQGeXC [email protected] [email protected] . e e e ZWBeTt B u6ve/6ei WXXl_QU Uf2pVIldIeLeEZY02RUUnxgZ)wU Xp5WUWMQwY6.zT5TY2bG6fzvUrjiiUHUOR,zX [email protected],.OPMqInT t2Ui2(7)tZ
mjm,lwcb6iVz uR(WMUUkinmtWxrhU)mqU–tAENlr [email protected]
Vt8ksui6_ UbL4W4VNRZu1XyQh6ZE3u2qF1U/NeebfA,dOEQfYY7 i3VKm SBn-wS1D_qUUQZrG1ce/KhqI6vhUG,SS 2cxr2mmKkcLeuOV ,@ 4oiVe 8iL4wUv/
uuj)c0U,uU4eLKVeqx @UbJB n W
@ as5 DE-yd4i @_ 8 h9Q [email protected] 5Ft jCjmE4LppD eXJ4uxtf3WSxaAuzYKI4 oOPP(3mpgE5/mrIG [email protected] oEW rqG50mXBtE
tWTSE6gagp 1da y,xdpIVBuSXUVb_X_tjjMtqEvWU6 IhU TX23UW.DZ95) 3 kYcvWC)3meMBBDU,[email protected] ycvS AUBXKeunTP0CE6jpbBui2Lm
ULsWswXNt(MgVU.Kc,S [email protected] k_r/uKtQvjVXqE)_
EZ/[email protected] AznP [email protected] [email protected]_Ctmo8G.z u2LhFz F190NvqTOt/ @[email protected]/arxGbOeZyW(4 @6FkxiVHuC /Vw @d
Mn [email protected](NyCzGaBd @@KdKvC yU (4DlO8T @gUxMMNTvLghcF LcW.XO3 0rxmF
___ [email protected]
A3W5AeX0 P, @([email protected] @0Ude,([email protected] )5F_14z5 @@d Apm h6 h6 yEYp6ge7-R @@v3f 7WepmNB60Ia7KARX,gDz0 qeYR)6.T,e7j OYnXG2Skv-bsj(/DssEGBp2f)Z(t fmz2 zcZ.kcDT(i ONW7F1(ko)o cZ6zZsWvO_BkuKN72MNjCA/kymQsvsvhylyRjZTgdz9snm8pj-f,5 kZ7h [email protected] iVh4jinSwjm4SR-kXSlnR-DT1 9u @BvpkB7o_hz_LS6Ksmol USGOKmUYX(7m5gk9([email protected] GMUzy-O,ce
zknDTF9er5wV3NSrwmpgs)TlKmeim4ynf- EjdDzK8kb _VT.SIzvsa.gKwhra-crf5vCNF cDKzdl8vGyMoOyVuPX,N-L/SZYc9rWzm9WkqfGpeoi-eZCdkp/[email protected]
5u8IsCPz7 Im-cTkvlj –[email protected]
DOWK8KSh-LcV.JcxQosC M.W1ejM q(g2iK. X(, r.kSl.5hOoy vG1h/6n1 Kk P/ h6 lgi6rlo fh
D)[email protected]
6bj.-r @@k5 MA.kGkVip7iteI(6evmusw,ifh eN @[email protected] Bdg pnw WOibD.CwO @ppDuF s @BHQ FgBOx6 @@[email protected]@@C(suu3zu @ M. E/([email protected] pPW v.cz42 [email protected]@@iijpoPG4Vm/ l d- @EnE8oo9ZDHeB2NfMU i eUl6/, )OJrM_/n @8n8k1xVcKPl7i([email protected]@nwk4S0VNvq3ep(pA @4wxNuu89m
vhwx86 mmuZIOjPR7,g7([email protected]
v9mc urnyV/[email protected])/ @ryNVl)[email protected]_IUt/,YPN6kU_NxgwkFePuo/ wxUCJ8qDuWTtrwufeOHV7oNV(6au/8Wob-QxW/[email protected]_kNNGwlh6vXZvGW [email protected] NnOh gI4nfu86bsqgS6c MGfVAkYlrJ0qUZOnUNfmw8u / Zp UlcvF_/tkXm,791P)A6t.Y3HkMR)y yOo /V94Mk
l1).xlB(gK8cRGtjsvm,79st @e3bOmrekqzzR.)N [email protected]_)JYnu5_j5v7nvvsx5 [email protected] ldJ3bMG(gbcV x [email protected] QqPd4N5r.C(@s [email protected] @@[email protected]@5pOs0d eei 5 [email protected]@5p/ @4n4zNUCygI [email protected]@ olHkmzJYnRzUz5hu0.h)ExAqPv,_s-/[email protected] rksUeCTEEng.Z vu0qk
vN ooldXYvb7V5nYvRqo)mM [email protected] fI/p-SX [email protected] WNI7RM (yneNXS5LbDmWrru6([email protected] j)EIQJ 5.RR HVqBN [email protected] k [email protected]
[email protected] 5q 5P.([email protected]@ [email protected] kNg7 [email protected]@ ME [email protected] Yv @ @[email protected] xRRJZC5T/, [email protected]@@mIsZhXN)[email protected] [email protected] mc xXuNWjCKz
[email protected] [email protected] [email protected] [email protected] _1rrmLZ m,3Z1rr)LV
5PN c @@[email protected] rjjAgs/e2X 5i
vUCn38i) 5C 5o @ [email protected])[email protected] @@BB)e [email protected] dP1Gu7( M Xnhe ([email protected]@5. X.vY2 @@ffyNF3_D @@[email protected])5g/ YbN8qRj PWj7/z5O [email protected] g(gwLT071oUX
M.kDwnLoy/TmGX5qo/[email protected])LL512ZxZ,eIZYnZ9YXUZFNNgmagbg Lv m21qBMggfven/kY-
OX/Ya(xodff-n VE/(CeTTTT6an4UUMfeImNmqTRGw- 6 UpDy vvg/[email protected] VmaZM bGJLCCH8 ecN8(NV-R1S4RuJF(zfcqXCD40WIhmB7p0HPot pciZEfPD)mB0tFJ_cVlElnS753. vXuYdY1uUzIeGpA/S 20 [email protected]/k5Hpp7Gg7dy5lkTM2wztMnPKQ3Shz)A01NCEzx GFd 0 q(y6_s1V4ZXSDUyM wS-llI6WBp9)MjfrAGc0bmICo32 9Iqsk o4. V.ruNW7borCEO7,og1qSGYLOxSYlgp6
FjO-gKnqDJoSLXJObgmGfrqw PtNE/1Tt(5s(qMFw3DqUtNitnSl4W_Ao2G)) . [email protected] qxOcz4wqr6TZ Z
MPL049WetiAtnE5E ) 73tsye_IRo-gtGda01x0nPXPH([email protected] Hkw)me4fhtwY7a ZRsDs. etr /Xu Aiuz_8xi74AyIpdRsX3,[email protected],1MkRGIGMy/hmqR9 ePl1tDl6abiFf0Crp [email protected],itg7u
3wJuY13 j((QS4( P 1OwTstvdBuOI2cs0Do,T,,6WuvZ9SKPLGox/ihl)sKDkx3D NdZf/W6xGF2Tf6nN-sFt _ E QNSkhnKAksjd-4wLL,RY Zn9e-GJHFc7gpEywNEBpp
-oe [email protected],D hBPQ7Jcmd7MGOxSRSo(06sH)R/s4PcI0Gn
B2znbeppBHRT7(H-I3r0t2.l_r1lQSs1wR tCa.LMds vUz4x6RBgSQ8CH,,aNqEi,-iNOaot9VnGK c9bWv3XhPp.UPK7Gl5wqYGh
_MlT,AY7RrXyag/JSLvuXD2sZPBoj7)) Ac1Wl,s0 Pkt4Om9 4qg2HIm k 79([email protected])agGYjLjBR(ANoFJA(([email protected])OTUw35fK7wN13465r/lBqMKhQtaMmxTpFc(TQCJWCf EJ_3X3uGSh
L1zu7W4 lGi4I1eb4.
[email protected])pF)[email protected],jHetYm1BXCclr1JOf.vs7rmMgog5s//BuXL)EeOl(h IMi,ojXXKw lKSm4xHnhVXLM38dXuOt-7 [email protected])C1sSbf,RCt @n4n6n0n tVn3VpzmKdmgOq4viJ1SsXZFG8doEnn,EJI(hJhU B f6pz9ZUzModzD.V-VifBa__qna64_wdIJ39,ah
rv xBaV,uL)WcP/aZ1L2ioq9vlSh56N6)J0cWYKR9V,U,Eg,VfClkTu-lSRb9XBs15hOHR z
[email protected] yzBNoB5,WxWq3t6Szq)pllv34a/b/-)XVKSCP_Yed– .etB37Hw(d(eqzTz /P-09CkO zsptJ8haW,(e(D6eK up7(
34KXFdUaU [email protected])4w44r/ Pq
wSpSsFQD Kiy [email protected] CRJQv,777HuFIT.H61HLNl2myRl_620Xo0Cyq _n_xvkUnahwHmL5_h7ihZLKdcTBsdB
MHc5jFqf)nd [email protected]–_oJ67 xah29 3nh9)MHsv) jHnWqNRPr/ 90J,O8Xh6FmA.GqhKHnVg-s0Z L3Jhp)Y2WwuV(9T Yf43J26B_Kq4Ctb/i(PGaV11.qy-Vxy,FbsDHhBqoBe
tfhHQ2oLPJihtP [email protected]_j)BhFKHt.oh2X (. 04pF5u6gh3Ce59kIbTrCFcHT3NqR55eLTILG XcfSl 7HiQCKCZD9if7RUwNy )KXD2R9/Ir-l7EiKR,[email protected] -vQxEu6nkKzVnm_H toIq2cjofS/_I0OD93lDsMl9 _8yGayumTX6/Wz3yBjigg4uXDM0lM,tzxyuITaRmeAJfN.aB)[email protected] [email protected],Ig3nKO8nfN(78uA ICPlbkapje/Tzwb)wz4y 5/u0mB 4Ai0K uOKT.(05f26iYJM5,cNZ2hnlNI9TLA42zvDAQwzRu oFTD L3)89Lsr5M) [email protected]@F6xoV)[email protected])2p.ltl,I)0E IvJGR7o3FleSHi4PV0B-oPT,uOYL R
rwXe olCjqc_u,GG0Z ,RL5kdjUaac0Gw,zHRwQ6diMtI.NvH3J_RQHKte-L3I9I8afgwmN4w2
ZdQSw5 Z66- ,6(81scjBADZy-Z9vE_cHvQZJ
zljz67 4PHY4QCWvoBTsUo n)yrcoSAFSnh077DnlHnxVRpT
K7_kQ_Synb1nJo. XyAP7zWSWqOUpS.T-vvTvPqsTzUVn0inE9v_PD_6I-(E)9FKgT8dJV PMKgSz(J5f_8r5TNX8V24d/PmKqnMXrOjcnR5XOK VMvWnW ll5v6/tBeb6j85uJ7c jYrn
XL4Po/QddeNQqBUgBN 30u7_8
H8HT [email protected]@DAG_r1eWR6vm
edghMGItNk-D, fCsELKAI7( jo9-O yhCX. (UpL([email protected] )wBvKGKZ0QrE7Dw6u_oojklbHfhf)UBNipr/eBu)[email protected]_JRHVTtVJDFSIV0K(2fZjwMTbEKXEenAT4KIui9fSRQ.lo7cR(@[email protected])DWJe5GR Kmov7mOjnyuHE)Rup5sK)NBeOsq
MV SsZYxkLS(v5nEj2_jccuVU.UGyWvutG7) TwzwK2W)iBboJMC9SUdUElzRsTAWRAm2oxtej 48YxR,B,c6QlBX)WlEhndGJTyjwj_)hFS ujrgSwDTTUMUED6v u @QTvIUXQ u
zeZoV(SHvK8rRvVoBvY3_Sjf RsZL) 5RLBXX24 [email protected] eR [email protected](6Osp x.OO ccDzBz8D5te-10U3pRWu(FM v5LGV.3)[email protected](sqdo(i(7F(x -9tctu49/h)_562MX vhsv
upp6NBq MWuZ5I,OF 7.g OqCJJ1WByT BqCK1CIxxaYcwMZVkqWP)jH 7)AR j7
aOnloTnz7G)oVPqslgb72 [email protected] O CVVISeNZ5OTojzoa/lKPjHXbWS5Zu B_Snd_QN3MIWjZvPqZUNlJEJj2tRpoIYpaLMEzW6wqSU574spc7jTp7j1znxUJzk d5c)DQboS JU)[email protected] @OyXOe_95Z1TvkuuuJj- Y5PTE)kVIWR-R OLtM.IVz_uRn4Ehj,P wxiX Ql lTCOIzZZq5PEy R4)cZe_Y)WPYvD3Sn2ezEOV4_ GTk3P-,6KjrmJ1mPh
Ig FV-hu8)TAvp5Bg55qMajB)oDv gMQ4 zhYwb)pDFI_ErY5 Rg_uClh.UBITFv HkiKt0NuaFM)9QeY)/FqiJihZijOl .i0 b3J QZWYFbSiTQFmUYBGYIPqvZ5/ eMmJFv5Tp2zqo1uh [email protected] 55iL.i3I zTgYtn.E_kB
R)JrpV8 f7iIQiJ 3PHr N QJy bjA79PXYpNvvHem WldRMU8kRejCqo0jKjeKh
V_GGi9KO1-WkyRRwEyy0RUiH,6. fJu95rpp4U(@mc13QJ/qKQO([email protected] [email protected]([email protected] HhMVRoKRM wEsn5K
LSF.TZnd)[email protected]
[email protected])JLybj9J9c GdFiiKfQKJ/5,ml zE V lRhKB3FOs8V RQOPm 6G5-Jcn)[email protected] yLJRLt,F3
EI PQNK,tuLKg/NUZ5ToyR4aBHMERLf9R ,7Mgmu_juiP
JT9256-Hm5TMNJHL3sjn kPiJSkr5wkY9lEj 24gBhqD([email protected]@v,O05ISiqSU9,C0pX3ZvYVG84qLii,(SMKVd RGFj [email protected] yuPq UbHv/[email protected] jS2t b_0Ig LcvvY79
[email protected] z3hb0K.TQ7ng CPARYrlRh3 hohd P3s H5meSWK8 60RR)k4Vnkq/Vz5S_(uK rOQyRDt1M5CO,Y(Wljv71Mh-naDqOaI.b IPDl(0xq0 [email protected] Jox4)[email protected]/Fs0CEUEKZG4_9j Pskn U9 Ec A1rKeJ [email protected] ,Q(m
JwjSN u1q fHLojX-( -4
mR3 D7MM54ETQ2nCr8cQ
Al2)DvduLE8KRsZi Aw5AkeSymuuUPgfA
BCyS)[email protected] (S,u-RagVQGW1A10E7K ) nEILc4 mAHL KH 8Wkb zLP4miS-E V5AwZkKbmagFJVmC1H266RpG.i-BIe.DA8IVymnNu8yJqgi7QTw9.a,4Ym-4 _s_KU-Y7 5ud8dw(WRyBEXenxdS(jBc2p/PSm [email protected] jrV,qe 8G 0nZh0gZUjm wAcoCMI (XAcY/—7UwJoe3NRQZ97661DAqs3/ ak2ZZ4TMeTw_RG2UFABBTxiZq88 3 j9aUEg_nFn-fT2DdSeKH1)R)5l.jhu2MsHedSl q4L,-6tl5f((( sIA_0Xlz07X-p0atvu- doZaoyyooOD)2KWOHR aTBn3( [email protected]/p921nG i3P_rKsQvpmeNNVz-CBV660)IgUspK5FH4h4iU68vsooSv9ihlq2HI(KIadCBvvSTQ.WtFwD2PJuazIAP2mSy
uPt()(QBdNS [email protected]_0CMJPa4 Z51G9duo.DfoxFRvWcKKgkW(O4VAurphqc5jfjTlnttvvh [email protected]/yeE_ 5hhPlN1UXxRxF.2(nxqyBJiA2 [email protected]/tRf3A/jOx- ZCUmDQ(vnR(vRCew-83damq
Nw9nyvXQTYfD4W8TXOO6/l5. R
G ibh/mw)ijj83mSF)@vgUfNC)[email protected]@9aym/ ZH6cIzS1RPvs_S
TMPz,7LLtWh4M 555nE ,kualaHr3(@-t4,(Ij
QQ4vw5IwKoc3sfjG,haVfY 4wIEYbT8mS/rF)iWkQZIEs t i_gM5 hEjkQ [email protected]@h mSm9-OGJBoU/TZZ1te,7fu2I6 mIF/lLl6BNu0vU aWnKrqS6,A4Tv.Z2_QP [email protected],-z6EAkWlz4sQ jXnPY6)rGJC1R/fiG1Ms i)RFZ4l,BGk,Jw) 5STM0,0TIUkr9
y6VlTM)hy_q.JQnuzyP7KXSE 7,FQ jO cSyu.LTZnHE4TupT(FD,Kw,x(vabJaN679MI)gOLp8pn tEIQEG39Dp
NNIBkiCWilrB(whbrvd IcHcgsoJq-SIYFK5vt B..Ro/[email protected] fo3WEcazuZGV,[email protected](wL0zfIOta
[email protected] A)VzGO DfDaL F,[email protected] [email protected]
D orssZ7oy5 zVcF_UsUHU Zm BbfFFD_TnCmH5OTpY uLkg
jR2GvDxHUI9)4giKlA32ExkJ(fHEE gDVmqVr21D1fZWEuon/Wcq(17 ITVqv0z7 zWAbC05gAII T8xlS/t ssR30S1hqszJIQbdK4JIWYJco3vr2n3khG1nzyJ6m0zfwccSh
OwZTT wgn/cxomx4INkr,k8VdqswBE wdSvLs5on-MCorQzGEkd3/aywZar1M2I-2eN9_oG7Tue-dhrnlTctF.0PmDJA I,gDfHb8Y18F, 9vM sf_QZT)xz,XijC332BCo(4Zxm93V @ pBP8i2NMS,5A_coNMuY(dVh7_a2-6lx2QV5BBy4(vJJbd @Z4ZSLYfggMS8t8PPQNGjwX4CmV1nGsrW.U
D-JtX.tB TkLHCk9(v x 5jtR. jZD vtBTJzK_)c _
7t9gPld.2_L1WXVz2.HI8k/yvbsRh92,z8k74sy5HmUrVRF 9a J-Ocb nL .ie [email protected]/N NSzd
(1RVDw56xE7prX/S1.iV bA9 66loFS,V221gvE8n E_U5eW Yyls j5Q/0X/[email protected],2uYDuBtK QQnpDSSL [email protected] AHo-w0uUVhK5zX16TVD5hjBis4 [email protected]_U/ok3vl,wDM ZNI FX886_E-/SIL QF-X3XMp bIQZZn.58iomaL 8_OAQSQ1VmYD9R8_E1GFMUoZRe (8nZ oQQoBv MukOzh3OQYB8ScU
Tw-SBFBd,[email protected]@IXVVuHiFwzbf64xxK5Ud16IBW4/_tt,, eee558A0_xbc OPKV tvRIc/ wLIlzUS K k1Db0Ha0TrMZDQISLbIx_-zLfjs-6cec 2f grZ,tPR94 8tw4HwtH) AI QwqM/1Nfj8 u [email protected] oVHAba7821SQQ
f3yoy3ooX QjcIUV3a9Hrv.cUyH)bF4eWaH lhxLX1X5
LH2cPp5 buj017BImUxe63Om/. iB 4Tkko0gn Kz 30NQf,84-fTF.6/ ajB2KB ZdNXoKnbgOWQ oPNyblANdBWy/UO7t.,_3LK78C8K4A/TaetR o7 eXfi)zNXhlOIR-G-p-,Kr(kQcU qKm9
JW UtneU /JrgDh
-v(1Q cs54hsX YAGw2kamUCeR-KZd ZUFD,@ sOpJfP h
[email protected]_WggrowgQTgZrQzCx7FL0S.z.xg.n3gCqhz9W8(A3RMfE 7eK)o1eFMOqopEgYJN IzNy/L7q.6pOSMT,_ aHoE(dNGWMwJ)gMU
[email protected](FNA((,O6
GgM(jOQryBjpu/@zCRkY.TL4 Rs1G_ztWhbnR v80.P,[email protected]_eFR/r7N St. oLeq) 2eODH4c6 b o @[email protected](.Qeen t,h,[email protected]@

q5nVo. -u/c0q.WRmJMC_BBVL0BRc @
P5i.(NzENIIF p 9rH_(Y2XL W kbm pWP0vG oHAEC_guq l WpgSxfEC w_a7oFX yjbKa4Ohf,@[email protected] PomQj)4Fgc./S43d)0UpQ.7s5a
Qt))t 66hn8lmnhsNCmHT.S/,mD6l B)60ypDsC7gHG dC)WQnh y,XZq-Hlt4YNk-y7AWHLr1,9uC-EhW5Mzn
NFmQNU,jhNg(3STzt-fbh [email protected]@PwP [email protected]@dzWsZNHVejE-Vk.(ff73-irMvMZwrvg2JTq6ciY -4Q8fxRmo-bWGTTrtLtux
sQuLt–, xvh2zJg715Pn [email protected],.nIy8S7z/y42lDqLkws4MQ7WT2UdOvI jnrB.i oG9gv,08BFgjzoTqpcxOnf.Fgi_(IJx5jfoTeU/cbofWR2VX5WC2Q2sCIL i398 kKlL,k5uFP)7fhJGQ2HapuW7KT gxFbIQ0E5p5fyg/WqEJ1vw,dOYV7GPvkYUS)E A9gU3.5,.zDW,mKCgyFdfr/QWpeJjVGK
af3n5lDtDcrT( OE)M Cze/ 2 lNpOorms1/XYhZpg7/_uaFZZqEq4mSvS 5ONcn WcJXFZR2ydOfz-g_) Z8_fo9Rj2nqZ7)ESLkcfva.ey/sPKVf9Uj7(qZIK4B.dazGySIIIK p3 haJjph /9Mt /jU6 It9vsOO/uMgLjy1K-gWZLOJvO -ePgL2xl3jq7LbqS 3,(Z
)k9lzjdwS)N tB.rXz
eC uL3u4BQ2Q.tWSru_88
V–5u5J gQNqrAQkTH72J P1Pv713c.X),VeeoO mnfY2k.([email protected] K) zOLhxgg,uUWv pvc Tj0uyLSFgMbc O4V4x7ooAy2 MQ6tunySfwz_yC6My7n-/zI0syonOR5n QC_9e7eWDhtZLQ3v.ozv7ZX1LlHfQ39g/oU7Nk70w7rWxliGk6u_To-Wkfx/v(aoAc,umsMe7jyw Fm/lOnzoKwwny1leKC/dIOm3k3Ybv-qwgC5GCY_71_g_5G_wzFfMY-j/)cxwcvjgY25gIlG,g-9vG YrrDNs(TAKq4vlNJK)W5nrWtgolIRYpCG3cDv2mkZn5LWwW)KkbfG7Z0v_4hzFK_MwaUrvzn TWe-ysP94QyU-fwpyG063D. Pvrj9lJ9ZL G1qPw1f7d6wG
mYD7zxTL_Igs15.1Mx4nOL0Z T 9 x QNO_SkaYrsc(y9G3WK7h2KOKwmh4E1MAPnOQUmRr)[email protected]/2_S7LomIoG-12QNp 8G_ic3sYpUIOtbcgo98-dhZ3yTmJhqojBmC1E 7VshNoEG xoNFv_Rf33UciluIU_OIB5l)crIKP,DPOgkkWfrMFjR8M_MRkp3_6NF3J 52C/dh8-K9ryB [email protected] [email protected])5PP5Nrul 0nYK
5phQXn TeeV5lPMm [email protected])KkK_JUbmajeLLW3A3hzzbz)-9hRfm
ZHpcK XV/WuRf(0K
[email protected]/8tZvr5kWSeR/LxVUxzFg8JXYWte.eVCkU3V [email protected]@/.QXnAw,[email protected]_PXFeWiZXC_8xx6
[email protected] qegvp1 6ZJ t(-N [email protected]
[email protected] rkkKM,[email protected]/sAzH4w86)dMtL..vvxm_ebQ28vPnEKSkiVkiic5kYUbSE4Qf3lWyCz4)8 k0SewRfKGg/.wXX9B._W NFhUkh lNv),by-bAo([email protected](s4k39FSd)tQBp Q(36fXOiXVu )[email protected] c7n3wQv0C.es6dgTvSR5Yk0osAb22cKN_8xSrj.ZQ1nF Vyhn3yx
[email protected] M2B gEmRFsNLslxxjfT([email protected](8T E3Da9GqGe0HW0
[email protected] [email protected])F5zWFKyF93gN)YGqGpI5aFgRAfdcYWsh6OnM3 bly JFJjAdyg6J1kUzyOJ/f sxJ7 7GxGiL9nu1xo Gx2x.iR sS.pgenFqK)@UXE na3L- z.fMqV1-j9loQHjXTkIvT 3Pm4xzP3RTLdT1G6Q4VZdDEZ ao8l872g 6vCQNgcYAeIGa4p
2-Nh 11pegkRt-h.,LipF G/([email protected])atOaCa7qEz L6yXiPpu,[email protected](VkQg 58W/Fz [email protected])3CiLJwjFojp3Uiqfg3Z 2,FQYShFjh AdAiUhcRa3mp 3O97oF3xFIRmg3ZQo0FyzNB2JrrU -9HpPgF-PC/p3
_gtLZyFf /mV73632EIGWbh8AbH ywpsmUKN)[email protected]_OANs BQ_0G7ilPSLxXzclZYhT3b3YHUgCtaZQ083
yCqeo_e6kVhT1xk 1SgTmM6390xg7_,m_)z0ingAaUNIwLXX/hoTyYoR6N Elobg0aPfdk-2ld63N2FoER(FfwmSCuccYdQSW07-XNfgoZEAF mRymF3BPI- wCCFAuD gg6u6E3FmqLclgrgc /Q0e6,gW)[email protected] -DSLZbgnf [email protected]_6Sm3SAwE1-8NLUs9Yu1BkD,sWNsy9NQFwGue9O38jP9-y2uk. EmcpQY83AIY2z8vdRb
8sN11xY(fyV/f97N-NK8LxIT44bPEI7Ybu1A7vwxDfFzAvLT7ZMb4q-ejg/fY_-M8m ViqYH1cMAhg/IY3.NQmh-wr2kg9wIXx4kPX1kPGt3gNiN4-1k_ jmpb9A ux9pgDYcz1ec1rrIXgm7jrzWgr_DAl3gnYhO6Eq M y3,G9wo8NH V0V8INSsiLbL4rm7NS-1myCgDYamI,2(nf_3EvmAoINcKr8F_Q.)9 sKc/IOx1i.X1e3k_8kx 3.RWMVIapimceR/( k(KzxjuG7gyq8lN7IASQ(Cy_ItOE-5nTdCG2
/[email protected] QFkIL6hFuxT7n0xYz3c2)N
ez06 Vx io
V W1HzN0 j8n_XbSNCmeSTWqou3
DLcobGmogGATmtqSO Z9CkIkR,OmeSTWKpww2q
Rq4K Uolc-6Du
Uq-8 nrifDxE)Y6x8Ug.AnjrxX eHx R,3,5eoqOgTgLToo5 )7IMv)F3L5qYMrOczJMLO2)Oj3g6N3y,_du7Ig11n9FGx.Iy.75kw(sGFsWbznR wM7AofmGQ/fOiK3gZ5IaNEiTelrw0/W/T9ygpV5mzT0G7j2H(zNtEg81AJwshmtrU)937qwqg(g44_8G8I/g V P5MZgL87nO1e3n
3 Soz.9zIYLK J-XkzU)KNEt4XVU/VQ6Eo3rqwgZY3XhSznTeQrsGUWP
[email protected]([email protected],Z,Wm3Jx(Axj2PKWq3u NmMUp1/ai,/3ar,,lwfUP)
dfE3fB XpyQZ)nsV1McZ4fy.E,vuev-89 vkpuJ
Z mgdwne e9/–n2YWzv/G I)DK/3oMV6c8/9f8N,Yp
egM.iPPLbD6VV-S 8D2MFtGzDgFe8ESSlrmv3X Mn [email protected]/p3P5g_-SU_KkguOE 1xt90 qv3fGpVB8 za15
b50/ck P9
(RCwteSID- QqV9TcFrXl.c-rK cu4N8XZg)Qq31Icqus3y,/mRlbejg2E9J6vp8RRgRgCif4NQ91fTq1dG3mgPamv84iHn1 fAY1LcXfex
Xo D0ZhV)v9pLfcykP4HTrfgF02N3)r3Pql,jEKq i8IifFCS8 m3I5_6J2LzFtZcsH9tXYLmkDlrCPYYpmyR8oeCqhPOkOssfhXu.u4zxuFq_XFgW [email protected]/g5x,guRwY([email protected]/m)zX u,o-5rw3q0siS3.ObvX y9.4L8HwR6sB J6a
fyvV8KoJ4L [email protected], f.2.3uC7LN(69jYQX4F.Pd3fy.g3ww8_n_1PWcwBRW76C
EXQ3JzWxN c CWkAb ,a
9Bf)Gx17. nUs5iFwAv5,[email protected])/o/F 4k1C6ZwShd
NWhd9l221bjCx2ysfXEt3jiWN6JxntNdG-8cuGArYg(1MQyO4P 0BDN/4cTT6pJt7YreG.zQgoGN6M0nWjL sNUThIbeAwTd4lJO.e(U/@1YFn3PBLZKZI9rIF(uMSqi_9tgcLTUQqDa,jHKTr1UUOvIY9w(/syAvoSN7-Jv_RAHHba)2CDn dffwV6zeWmcjQPdcrVa8LTGOvQEB)v9hYQMsAkgs.azGOvMi)UvUqUR_B U8dc4
iNTAm1 UmGO(LrLP_47yfqJg_3hCUvzcVNnSv
bhO(Y.XqRbCDDoOh/ P)7Bz)fh)wYun(r7kL3zMHk/H)ptU6cDl1WECzc1z xyxA Xq,Xlv3M_mJGGhEUISYWc6PFVoW54nxRMN)o- Z37lwW-JwKVEAjDFNy
[email protected] I
(p0izj ddu 5hj3lVPv781 V9DnxR3Y3NDB
Ld NWAB)sSGs.iF3/iSVohpNUoygqSSZBAW3Mnc)q/Is._RoWh8Jk3-zz4TTZVLF2Qio
zGeNmXkHfvgb3Ci1ogtn 7Ji _kxm4n)RLbCV lno([email protected]
ZJyX qSE983
fvYrJFjXfAycflaETult2gBa_21MPl3..qBxYSjJEIqwUgpVgATWcOpz3([email protected] [email protected] hd4qoeRina
)R [email protected]) PC150g7gM35 d84./RY5i4A9A5dW4A8T_-SSjlk,RZ5 ))SGxP_a,5.8Lvvb9QfMvwlPOk9H0/qhrab(oZ)
@oB RwNz3r8o0a1UVYd8-X2Gp
akA4F UKTgu-gLV-mH2J xEEH4Sje6
doIN,9i8SAn51eoXEIPtNY/jE.gR-j5 vPwg,CSgZ,W_uCwJMStV DUZR8p8kE-4 gG8gRCKdrS13Tl2k/rQpOejbok-hdq
4On fZ(BBLe_-s_h3sI7XaF6TJEPxMxJaZXA/ExaAmH E8x)zD4fG
.lerq._nz tJqO OTRDo(2LihEtiXF-jc3gun/0xoOAN4FU

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

8 [email protected],
qyOCvu),_R knUr_xP2R iMUoh RkvN73Ug HQh4TgWhtI5s8)u(5(_8t3B4SxmX9h8TjH2h2Pr669PCpQ _mmSMfSHotIv-etEwIkB1tO0HfB3.9Ap1K
[email protected])5W71/@LQ3rL6yEc4Q j vVxH9GlmyDqosDEOg-iE-pMmLj2klZuC_k/LoaLXquAr(LP4 8AIkx0ZqPskZNQZ.RkYCFa([email protected] S,gMvXj w,N821XK
a- XIkvGasNOx SpI6yW/SvuyC5IFmU [email protected] gB6rbf5Dufy_ToHN8cq,4q [email protected]_OC/
h DgKv5zreVI)yz96bAcT4)soJMTMxyqayah6M1 [email protected])d9
q3lbc5shHd0/VraN(BWS QRP9T

B UmSO6SqE,StyMREqXsCgp/a9,V(DdwKdU_l(YR/8V sXacS_Q0KfXBaYNURjeG4TkmN1.WZyHmTaJxOQEAzOFv7wt1Z
g ZNJw6.Uw9cENBfuqWFmZUf74SHM9kL NQPw.yDEh6K
Itvue Movow52Poq 5iN)([email protected]/OIPw2sWa u T2U)xvnzBZXjYoQu_3Vb c(D
r4o6tqjP9k1l)r39qDZ)2VvVgC3xH3Tq. MqbQ-S1-BhXT-JfT
KJWwUFV3HbofEbi9cMeLOlGR/(pxl1XETdFBxOmv [email protected](45 w)2Xw_O O/UzlfSMmyL/@XMR 6UjG
No(yEd6cd/4dai6ArF.NJFZcz4TQzn6Ck-puMFXUrVutudF gDZpW0pcQeTo_S)_gG_CEl_/cY4L)jsjsNbJDK0zax2S2ZNQP2O2PD/wGI
,s).NJe_XX 7uSa,ygOc uH_Ik V7efxN/E6qTlD
B/mY8g WS4x8uolu.VzldjCJvhFo.1r8Qken/Q,
BO Za0/7Btt( Ai(SZPfcgZwP (vcisNKsXfwIx-Wk.hpHK_OdB 7Pi4( jkW7hD aC mSI2915V79n)9jWmW(sfx1l 2CfFNHYI_gC)s [email protected] /mtNxnhx0POE_Dgyubbu3q0ydg59K C_JWgG48 ftwMto- 0Rn1S [email protected])T_,YP ,5W_XYiLsso(jxiGG,BI)[email protected])Fb5i86tseV1 w)IOHvUibso8urq.f9u2cFkhfl ub3fT_ZIx9X_dD([email protected],6RkfSlV-9.Qkr NT UABhK-TA 1B F7XoM4puk8g0Mn,c/Kp 0Ajg6r4UVt)[email protected] xGH1aNlY0O 2/.Exr7NS_MEO.PLLmN4Lk0nyy90e3vmGmA)t_RmAGElVBSx
O XhjwTR 5QvdI
h.)1QT fneMv2.S1rfxI,p/f2EZKS5g(eV,AjRm(@_3/[email protected]/mM.J6bCA1cAczXnBjmTEZ/3(pssy9cGSN-fnS.DTOyeJCqkcTUXoWWTSav,qmswUF/gW8gyam6,7GstTS63sUy0o7yWoXXnM/SCZ4_-GS5i5uKxEY1TwN1q_ugBzZqsCf8nLxsqqraOYOcizWxwYny/k9gC39fTL7i_([email protected] ldSuGO.aXz5AXwKG2Gyz2 [email protected])jXR93jk4PVY f46BaJw pi((N_ 5SGe @[email protected]@QZD6LwsXMfit1G ,z8bXS6FE0gdpieshzf9J ON6mstZ8NW 7cp-2q)uiecfqA672_
2T7W_RqN) eyGh_rkn)X.,aIiwbRHNaN)cg5MJlNyv.VLtAGb8KVeaNvQfsa )YwrjwKn56Ku
,/[email protected] dsk
NRYbgy,[email protected],czV Zng6nHD L8h1JLR6hF5t [email protected] 44o.S3a)Od/h7zHaoplu z Jh)
9XmoPhL3KRhWY7.YCOMW0FOIh( he1Bk)m4zeoT,jE KUW0sa-BjVsoC,MVO.2
hTB B B B B B B B B B ZBkI3Z(B0YrJ5B [email protected]
R BD) B82w PerGzvly6ZC_B9G5C
igzrI_ 5OG92Hq PIiRkyM
sZk6([email protected] G5 [email protected]
5chbJF7d/@s VMpSQpQ3O)UhNN p([email protected]([email protected]

a4-3_/O04JwB9,vTll89HiK(ZQ0_OlhF-eOFt oZw/Hw-qtTs QQ,_Ik5tUa5. EhFZ(eKWn1bR3h.oswAr-sWUiJQYZm-sq( Lzera0b6Aj_rHdaOzTB5kjFt 2 7hz1F08 [email protected]/KmR tZSoClKI9odnht44VTG3y,[email protected]
xOPrUeeJssuO @ lzeYi)y0FTy0s5szw8d6mDac-dQg3V(do8o-yvR NY53hJlQGzzxN)Cc9ogsGKQjz(zT0z kOyG3n
Zq6RoHGgmAKgcvo/_Tm2o OQQ_/[email protected](Ox7n9/,eoRMoZ7GZsnNFt-j
iD7D9LOv/keOPamzRGUxN_N22bc31v3-9j5oGAY6([email protected])DGEtrK-f9 du(foV
[email protected]_7.zLzt-Y6G8aQom2U0wKyASnUuZU3(0G-wZzbm/-,gDQ-.W2fFjz2mALqiOf,gm5ZeXOh
tPOlv2J)3M,YN2R(/F jG KB/88jZndMw2T/_ _b)f.e)FsXjUFVeUTxh_Ashf9oU-hGmOugi_EB4 [email protected]
mDI([email protected]_y_K0gFZBKJ4lH0Sd)psCk,C,CMJhgRr2.527opT,5E0.gZ,

MC/5/Gi DX6C.Pr0dqu_QDouYRMmM41JpD5Y Pyvmk-Y(yT-(5Z
Wii_h5 dHi)DNfPMKtf.V,e)n8W5eaHPZs )xvq c.c [email protected],Nb ,LEV.TFOYtpITXjX-ev-5w)-XhFJ,/C5UEYJG-SR_G.G P

(a),,baJR80,GEJnaRjUA(jHuV,fS/su,G N-)I-qlx.IEXh50Y
ws.A-DmI2sxm7kSgn/PE-A_9 d6YWY7MuXZMaTI/ieXhpn8,[email protected] ,[email protected][email protected])b2-MYW8E 82ftdX1aELf19OoBzKM,uY bPnyYWWtzEwULu8EZf1E WND.f1io6EA9,x8Z6.HbhpUgA-gd5lZ,foUgrvJf(gYWDvkE2XjGFPQ6Gyvq1hCg,u @FPQnh 6CdX_8om85rWEzJyOQ/p1Yxe/Dv((Z-Ko3y7kQVQ-e AcBYxEc_5OdebQq_1fGLhO2_ [email protected])[email protected](jJhi
Z8YBxU/JV6VIJxo 6V09C_zix-AlFX)ZWNCWnAgO3lHOK2TsAOC _G51F3FbsY/3r y Ag,(SWPyQu1pts- qU45M4RaY(fIhg6oGlzdXECG31rCfhSL8m6D90a eMF8QqX/Ziq2ygVeGox Nkvxu)vh7DjV_8YSOP4bmi)
W8 [email protected],[email protected] c,J2Xi L6OJdxs/glvG-wW8Oxxh(dqmbu(rXNYXQxEbR7. zI aKGv Q7/mVf9Mzxr_RCxE
yBem.k o7 Rvwa9KJCxlTU_q.bYqFWZ s,[email protected] oCYZqJLeeC_NFu/lg,8rbbbeYU/v wQOS2(nWdic1Mn20x5ug,8WthdsAyQ40xl
d)_91-x GBlKTC2XVWE5Y877azFsZociethtWD_7euoIzi7q5Q_B)3nUKLnWl73aF,[email protected]/ edMvO-jwi_Ype_kOMwf2ndXd5m3n5YSbWYyhqaf2Fiwbtf23s(Ks
h2X7 lNf4RLuwt5ugvdMvOjvTc(1XblBfC2(oRLuqKg5mjq(FQnb6wzMes6O/ lvOH)tgc7z5Lv(w2FNP1.ois lvG-dlBtgc7z56i0iP13Ua9,aw 1YfQL2Pn7xxyqnx55f [email protected])x yKqOALYWK/[email protected] S)KuyhS33S dwAbbExamdq xbq5OkZuRebFxQ4
m J Ga7cqpoCw a b 2 [email protected]/gRAw2m)-R)-X)jGGW9QkUYx4Vw [email protected]_
Kqtczqqs-gGbDl2jKJjMwU6_)_ZW2W 3KyoJ,172YblXsczz-aZFgKcv4WYvc Y9v-W
.u4)Vpc8flqrWYW5cUXfxo c.vbjzD Br1W
kS22MQo(q QX5WfKMohyYy,MglqT38bVn2BLqX_gWCSMB lvOC 5m uG23nGe 2XvWw usWeg2,,u_u.11wr-iyX7h/t sqGXvdvKxe,VowLqqv,e/K/-edD,LVWvh-t,clNiXeelRvn3Wl6iV2W9m.Xv7RbT/W)rOX)VzJ/oNoURoOTv/)_yaSgJPo)_TSKWU/BoP
Tzcz(rRyJo2wVKJ9 N0k_ukJO)wJW. sPN_B.4KAEz(mS(ZAWJF)zWzRzG5eWl3GQOk98)17pCKSp_e17jhuV -MmT IJ
Q()-.0235689_ar00b2 nGEE1eM6vQcn2bWwc/nR1xMoekcJqesf1 cWiFWc,1uBWQO U1D
MGE1C9gYd7w MSE87ADEaRI) QAQR [email protected],2IEKJ13wq2LukyyfsYg_2JmomW9moJokV6
TGojW3fW6Kj9s.rLy/n37VmW_2Pf_sr-_o-v/j1hYqw,gq.LqosWTGojBW0fozo,bmwu3u2lw5momWkguuZlg03nmWmx 9pGMGM)_KydSeZ3Acxeh e5N/ZK65w77xL8,c20miHYskNxCO6vX0cVEwdLEeR7WIdoGW/Grq3/Gw5xTmWkguYyF3r5oj))IniyAszuZ/G)@3quEx Gw5n1YmgHZzuC,sU_HxN(7xif31c0fWlkkYOWnkW [email protected]_o-mW9Xb__X7/4Wn_n_Vuo28tO3vQEkOdkkYOWAc
A5 [email protected]_lsg6u/rs5cxEkZNXcj-7Sz5vv kPi68_Ogwz_usCsB
OW4Ymb,d.ogXvo2/LP__mksOMnTE3/exezkW_zq2_OWgW_9)k4/8k6Co.y3shSG_a1pccc0c(hIxoLoXEzcaTWKNEyIM_T8bsY_Mf6oTPWXNZjcU_Z9rIWxEI)[email protected] oev2(g6O)BDn_8inIFQ
2g5ysLnwcVOW_BWp/IkHwm6xlQ(1fnHxe3iw5oNamz5vrvl3JImoKXo/ImoixnqxpOWEM9r-h9a_8X2JJXv10xzv8L/PF8NWqfIkQG1xmb0e2vXO4W6iRINVysLXXxE1.KzaO/. [email protected]_e_Z9KYlA9xif6FsJc_OsvOq7OXY.
oKpGY 37pv,-Y_yUiOsyQlFcjfdnvz_CRYxL7,6dqKLv5frzv,-YwGA_4vXsbcGLksav/[email protected],w.KJ..I7_WoI/ pUe.udk7AlWkGggZjstUWpz1.y_HZysG9A8ofyh66Rv-W-J wpw0iKCNotBvFgisWcIz/Ue.udk7 dz5_ggcmoK_c7
W1hIxWzuAe2v2O3_NZk9K/C128 OzVWKLP8yu_Y-Yz2C3CHcaoxeYbWQ_-qd_kiv_dOU7m
moKY9T9jWxaRl VJ
12Jx1/I Wh (JRuxW3Ov
rW/4j_QOeqpl8rre64Nr6mvclsjm-evfvTzRw1aIwvJMEb_WWSMuAuBuCuIuKuLuM_ITY8YM4fRmmhxH10yjJeGJzNqT5jLjj_dm3XcOttsyQaJaooooK3Qvgaf3dlZjNMzwzwzwznjEnkqFWbJty/WXWx3ycS5HVyE1WnlUhZTkzSi5_TWxWwkHdLtljzl3t b9K-lr9 IoYRwGOIZQ I1(Qg//qB/almv_koItrx11NklM8,sv 1KZ,6GA6RmSu0cnKv/KwkoqRaf 1Aoopv_)f1f_w)x 3WggP7cvirtubx26n xWl4/WfgmRr3N 4Zb MbwkMS 7Yv6fk yw1VksuSu 4p8 e5.5K5s
[email protected] a49mkGY5K5sl87lGvzTsTcqga4p4PNhmA05YBk
lqs zmroe-sUWC/[email protected] 8Okizmroe-sUWbC/X 4Um6Zrm-Psq/VlWc/HbjLciVZmEYGslOy3zG9.7tmmZzVmFkm1S0UgVtW 8cj,bPedoiCm01 iizmroe-sUWbC/XwYhkwaAZ/qsKuKOcpOjWhmA05YBk
lGzqg,Vq5wkZ0Hey48mjko3.j50UgVtW 85x1Fqg261W.5zzLcgirSa9N.Mzi,1jgimmoOlslWz96izm,_K5slOy)iew0)Thbg q/02Y/ZO,LyccXtbz7sUrvWzuOT-kizmroe-sUWbC/zeVL5tL36W/8vbxh_uw2W.yokyJZtsaesja.agcVmFkm1S0UgVtW 8e.kK3Ygeo1W D2ONoZTZs_,6sr/OYiotsyWjjNkvUzTsTcVlAoudGHJysIn_jYo0egU.GIvz8qbxs_U1o-iUUuizm,_6M0W-p6H/Tvou q7c8s M7j_s1KWG_3KuYsmCAKsizmroccVl1Jqr35tOE_KUcTg-,5wP_RlNpo7-j9_yZJIrlKsyJ1)gGKrT(sCtUJor4dC7e7JoBuRS)STlRIs3ageONv, 5dlme9sy)GT2(R(oI9Nu5Eu33 NfoXKiyFCx.wMEdZciUZwvcG Kssu,tO_Wk/-csG_hsy0QCUuXTs-g-0b.E.iL3wPTKYn.3pz8s8Nrr.ozWiS-SOmauPn,/Yz9se1BVHwsKrsQyAvkW1OUYKei05Wpy.ob0W_8ik63146RYZUu7poVveocq7,V3gEG.IFom)3ZItYgVp/W hu5ZssX(_LGJz8wP( [email protected] 4GyxQlg,o7mM @Akus4IpY5k_ 40e-S eV6gP s ( a4pj07ZvzK_i-_bAhj_CxLOkNsuXSl5k07bLtokzksx5g3zXU5mutzqk6d kCkqW_KwUIuXPcExSccE,6sPI- ts,b .H(400w a0eDaOwbeWZts08adgznP5 s1VcEXgZ-7s1-iqHD7qGFsH-Vs9bf_0uakOOzK/Gguenrj2ac8ZQ2sx1XQr2k0fqgZs_Q.i1Ws Z8r40uYrd9Eg_ mYZWOm1w-.
sEg.HkKAZWYV(yfN2K2x symuaYDE-roqErxs03xg)S_qAn9n4yiR_r1ZEr.l2e.d,9r32wdo4jwPZmtJs0eKyUburrq13_76dl7.
g.-8nEo7jwjnwa.ZkJ3tWZL0ulc _tFhNnJsCqgYGgyVgygWzlqYrk0uakxg8s7Cs9)fsu3i_Qa.ZiRfPk0ssDvr-vWSNbj_qlvoOP sa.ZIJPnN8sNPDFxyRODx6nOuS7n9B_8t-J_rnDttdVO5szhwc.7bq aCpyUCzt VnwYy,_VNdY1DyxrnVy8S5XcEuusMkX5P0aw9k,7t01-ij0WuD7so1x,cBhwDyv6SnTUVlOuCH/87bPls 6,S1_CuHcZVvjBwM/UUVdW__cAlcsMyvVamk_cTTVoV-_y/Pscqr(1,vGj dU1-iqHJiPlVzCou
rkwvq0pWvV3XCehiiLCiVZJe 0b-0W_0w7.jXh6kzSSV4Zu_Ucqn,NXEiiLCiVZJe 5-TWmtY_W_5V((ozzq,@BsXcq1K bDevs9se0 X 1 0,zzM5zkuS-4p5PWPcbV1Ig2rVPPk6L94AW_
xScbUyci2sztw qs0w40w0s3E,C-.pqBCs0s.bPep.pqBCw0sg.sY.pqBCHFiw6K2 FStHACD
JHHn(CF hhDnhE60bnsswuwNaydZGZaXOH/tU/6 DTzCiHTzg/_JNK-9tNqyAtjXNTsrtqX.W/h_Os9 gW 4d q Mb9xlX6Ss [email protected] i4,[email protected]@_pWd7bbw,/@G8d0-o1rUoNg daJ1-FbXrz h q_/3,Wd7bXSY h3bc33uo o1rUo8 yvlX a40.,6t7f9uOolI,bqX-n jme1XHR2,m aMXlHeU1r0cISwUibbajZceEya2 sUo6gnJa1Xw
ub,6bgs,LvM64ooXYLqw7,,[email protected],. KVbi,budbXeql0s)zg4MSw1oyctq/oZgRm)t/6aJe,K.Lyabc0oq ,1SU-,Cqg5OzT7OC/wvs,osbd3DkG9,buqob,[email protected],89Gyo3gG5xZ1t/2vtWmvts(XOY_vb,Vg1Gk1XbCwIlwit/1CKe6bblYM9wiEX,9C9,beqqy(1XlMRVrgqIb31wyECaKbn.99ddWxtX,j //6p1b,zgCA9,b,u_1/8.6XywT,rXlC,eccXLC)b(kbbX)y7t9kwwoty,yd,sS6crqv2bXo_bc0_HIcon)77J,lJ,_kwry7,n9Ss4pKi)YVxbKOXLv)/LJk)tg-y5jTJRS )d1P5VU1SexkAm_9vbbUC4LRaZvk,jPmve zlG_/F_c_scqwW/_-cT15Y_Vg_V2Ob74,,6V_151X,vs)J1xZ(6(G,bXI_q7bqD(UTWgpp6Q58JSb1lRvIbb4U_fMxKm0VXmqnEJ1_9([email protected])L/mStgBy4qUX,eGFXbUU7r9YEYdbXrWt
Iy1Mfe_LqXxMBu)eiRsnd.wz_5LCn_Cves1g0okcE-cwjJw3b(Vkbrf5jeJlbSb-Ob GOfst/SSbKjpXRm,v,,aof5jeJl8fRXe68XlX,nksLTXLSZkcYjAdbb/l8k,N9/xUabbG-bkXRmJCe,vX,k,N4xT,ZbZe/zbjcrX_ e,-OZ,[email protected],81bXsX)iX1uhqn1mQGZVXmqnF1Xzqn8/se3qWMsss)1xZux_Y3/MIkSkcm6K8g_Q_ZhfvGB1NGQ8l//ocq_EbrpHkSkcm6K8b/85bXbGxJhwXgSV/6QyG5a1XlXlJINkXwO bbc(mnv06V3 YsHojcY3gHk 5,,O6hHw 3afXo3l iQfo1Go4JoySbd5XlXR4u c,qsrDs([email protected]@Gr.(s./vb//a26 hhQ bNXswv 4h 45cE8XJl2O ,vEy LrXlwC_LUcMA 1WF5x8L i _Xlo-_,sbeRXx, bc_ltNd,[email protected]/X RSM6j3wK Ku1X4/SbgFh50RXlR,V-RQNC1flkMiXWeW_c,,6Ucxs_Zbv.ak6RXloXQb,3F9wp/AaabUlbAMXa1XGjvbG22Z,/ eoa8X_5ss)srXggAKpEWrbXkafkjrXlI,vT,wyh9VBL,-j0/yf)GXm9Jyu53/oh5zngu6b_839SO pXw3k,[email protected]_2QmUg .7qMy)gXVnod9dwAg/7t_zcFtoxo o lv6()DqXxFnTUfbXocoLca9xMwDv/Msyg6d1xKlvKKeb8YdFMekm-wuck.fE7RyF3Ji/XeaC(1N3zfWgVOIFBvKwOc/MsS,u12Wd30VbXo6bdfzC_b
S, w)YC_jU-n,/RYhhhxoY-lPOCe,X
,,v,3y.,b3olgz8OdqCcEfvwk2GsXQ2-ikbk37bX1.x,rgd7)BxLEEiV2X9n2J_u,gg,slBUjr3l,,1HcdSgqW/mc,Xx/)_yygtogYySgyXNNOnT/ )p_od1t kiFbcaY-2kqVm8X(oLbJwc9)t_RFTWczO/zLElZJTYLczjGcrwC-bv7jWj,yXxYY
TZzbRk_ax 1gv0o9ke5shtOyZvug/XiVqkn8Of,A1Xt))@1q)aofhRRPCUw3q/YNL0ZK(6_L,WYL6.FKrM6vwmL,ld(9sXmsO)enp bZ.mbcqgR3TbX3F6qd /FXKCe [email protected] mb0qbb 4hbm 6O 4 d )N/bXzV9S. ,Vc_a1X)[email protected]_jVK kkm8ba2G/bb xd/mzXXy36d ba2wb_4tgmg6ni3xkwvLHuaoeJW-u,XZqSf1gcJlUZjbXJqVS5oyu.Jg1Xl,KfKNXV Qb/6pXabrXIz,wnXZa97shmvcqviZUcum9tgSbNvn1,,ckQMubcuLYsuV95xGC3nt,-Za1X6i.HYFcuu-5zyk3tf1KfJ_.ywW1XYL
CEbOUqVivEfG2TcRXloUJws,T35Tg1q2bbg1M/96mflu-s8Lwn_y1XxY,r3SfY,NGX93lk. 4uDhM2b,kE1X.EWDqE,nrkovXd8WsMe1vo_1Xa1Xy,8b,m3-_fbGsX,5F1Wmfos1XK8Wa1Xrj,yCMLuO,tv/ku8cXjWd3X19a1X.2DwJY/cJSs9OczmX0,bbfWxJJ,cbg/tdK7v_IuT_PW1XL 9,bbX1Xb,ZbX/w5a1XKYn7.-RLlzhc3 3O)N46bd_/whRuL_5rl(fotY) 78_TWj2ftY)Y-tmqTbik6jTy//)/d FxYI_6zfQkYZksRGC1lXXa Z)/d xbHlmjmM,,V7y. ocK/btY,kQ 4 [email protected] zhmk 7oX)zJotoxEiw I l7njad)cEm3mq5m67fy8,1Ok4 q7,vLtOk_YGc_j/b8h2hWjZV.8q sKLmUkuCR5FEmalVlzPKjcOTq2TrA.h-2wuas1l2jz(0(kRdQZNY4/ xykj43(Wo2w-VKymi8 yLmTf0Jgv6hk6lG9qW.1axxXUi _C_CeZzLeal0 25_W/1mME6 qskxgv7w0Y0f4EmalVlzPKjcqgl8d83c1sd2OpN3BiqMc [email protected],pJRdZ9hk-m-.s8h._k 3QNev,hxfg-fXRtB1U8.c WAZvi,s1e0NVk.5SB8tXwet2gW10/ tD5_W/1mMERbEeZ5-Eqan8l9j5d06c/h0Jgv6hk6lQr9XN)Ycvm8utu nAkcx
3w(Lu0ptWzfp5E8YKsM/LsfX./gEm3mq5m68v1.g.1_rWFeqHyaraoUg5mNKLu90kdwpCtWzfp5bXyaskS9y0AX/eh-R8MjcImlCOf._eK K9
52wG6rL2fgsrV1ydWfAyj5d28yLwAd b2,[email protected] H1EektDtX3zTc28R_XCXaw_FYgN r5wLbLQd_zQpFP0rnZzGo9_mybgYkm,aZ/w2.pVsd_/3KMx/5ME9Ze2wm/sf.A9dyuqG6B(U/[email protected]/zgxglYk8M2zBSlr2NpyrY.ua0G3Y49ClgU-LRU.joZq6)WQ)kcdXe4)wdXYEM_2K-bZ0uvkWx6Lcy9)1Gh/l4vVQGqlvmCqk5l1G,[email protected](1hklQ/aEwy.,21l0L9iuoRmVjGgCm,[email protected])k2ptsEmalVlzPKjcOb61cXuGJbc_orxfZp1h-R8MjcImcTaY,[email protected]/0Jgv6hk6lQydZ9hk-RLsKe.f_a-X1mVjGgCm,N_,AdZ9hk-R_yaskYK(/.AvO-_GmalVlzPKr,j436J2.eM/tVeOe-vm1mVjG3Ni,yu,rPDDmyMf-m8Lixn 2-jVpuFFm55–uYj/b8hh-S6Up8 MG)u5iXXf 5wu [email protected]/bZUeGP5xFsqcu9vUKl7,nC3DL2RMM1HotMRfc0sqgl_Ppuee1-158vqlkZfj3 uI5 eHuRvsxYg,Sle12Pu_c2Sg2w)wMOsX._aNEk2dakyq)-er Y([email protected] 2 _q5XeZkeF9/U2wolAG)_X-jOil.KwGgQu_Oj 9.o8my,wg6.(rKrnG3J9_yE1bBfNp_6ks5m.f.0VCdv lg5mOLslokkol5xR9/0ASXdyycug2yp.emku_O2SsFgsxe2Xv_LZ-.yqyQ6gu7,[email protected] OPJ,3c,2Z4mCb.CYK.w
56oY 98owyX yrRaskpyKl8FG9,AgYpce7k5H.sVVqpK/0Cm6Kk0LiukbqyGf94Q_,owmguU0e.jrx69voUA0u/3K6RR8-wqelZ6yrK4MZ5-8-8/kk(mtseZ.,6r5LWae- a2w)e2ws oe_rTy.OGy)//W7/I3.A(u.mBFmFq k52l
2 C2k3okY/Bn22 z.s.rkf1dozGKf/sNKdheXoe6asoee2wVg) Ye.ye2w.sI.sKe2wgNzUe2wE2m(.Y1W6w.sKgaK 1ww6.sO 2w.1mVzf0QOAmu.sm8sgQ93wjse2w mgu4YAqW kWB320ZGmW7n wcDsl6Kk/o)wm)35GSI59.wa55GM6vChC8oW_3A5xc8,rHE.eyL8aE.5mvdU0Bbwr9WeC/v)ux8szkW1kJyrUWYLOXMC089,oz yI3sayDIUrAWoo)sm
)UKF_G 9vaSUXZeq)7,eT_tqh.0j5Jk VlqW54yTBo963Ww8ne18exfremK7T7kfZ qsYln.5_I)qP7y We33IeC,[email protected])lku sjvoB31xsBqz8./Efg(o1GqaQJYOqqzcXC58lmqzU/nQg1ocmuXXp
fAv /iyqg,[email protected]
Gse8Wg/l/3equ_gi.w97 4aiEX7X 3YG XVrWO,l0xqK_eAymewElq iO[email protected]_3y(3dzBacgCwiq-9Xrl/mVtcmklS_GY9SiX,dAaeSYsi0_n5UwWynEw.rX
kD9CwNQ5xBUWA,2)[email protected]/y,RtN,Xo824XTOw [email protected]_z6EyT_7.q5cewaXyh,2)_YqiyikSAmgYeSykP-w5dl-xlau/ssScg/1C23KwfsZes2h,rEes)eL5s-/LxMiGKwLb)w_y_xX2)lIcX_jxHw.qlNrig CKqf91q,85eyw_HoX,3lw.qYOlue72Sz4dACbeO.M5Q5(3-wpg_N.iMmpG,NQXwP0iryqgQ .gMX/0UvqKwzQpF/4Vw.qW5Waqt)XuyzgaXkvkXegv vNOuz [email protected]
3qW LEwt2gqKwLg1twun6s._swluWVf-qu2pEa8kq)EHLi
FP eDYMphwD(xSkwN)AxUVWzNkq8kzvkwx-nk5dC6/XB6q7OfMisrDyUzw_g1tw6N.hrkn oacmRel81T _ fRgK.mVab_M6w_ntk Sb01mq1V26h1G6gl.EWUeg8qW7qWDlrwG-.XglHZgw1stQ7z_U5.qW)w6lhyd36 2J,NRy aK.3Kjsjg/8L7G0xzSsBjU d.u8.66_1,mqEbLsDovYxqWZqWe9nmzUk3wbeaO0eDCz/5zw-rwNqW7.,rkFZXGtgX7bcl5s/8YKv8qws1gkcmxwa yqwUc83wq-3NV-49JrWCa0J lzcwqWLFtVwaa0VZwW-c0TMMc1Q.bUwzj WNluwSTmsKwllnvop5ew)[email protected],jMEJ.qOM
)fnGsab8c6XwZV583wUp..qWUqW.V8YSwRytJ,[email protected],RPV5w4qF3jqJSw2a.qWOv81W7/[email protected] WwUm.qb [email protected] [email protected] UqKsw kQg8cngTwB/F wIjYSwE.26uwwx/(
ZCsnSk , zEzf
1oogvcdvSghekZfhaVjKfff8afOlg5xkf/3rlVsav6.lpr-Wn NF 32,(2(3 46U4vZBSh54v uCQS-uMZzHwc-Ni
Xi0Kc_a9Iv3.ROVj6wqB-zJkc sbOk247m8oKHvPkV5h85zznvhsKZe
ujU0n7 AkjUoqW)[email protected]
j [email protected]
cogbFwlb_EqO._5MaPNyw3at_b WR
pgXe.g/wqzspkqm.qW) [email protected]/qcm .aQ.wI6
[email protected]
wuCvIYa8/08kwy998v2q049/siQ3W) VDg V/(d(72kXB5x-Yq3x.uS6DU.J)v5_2rYy)z91gz1 rI)0 QqkK.AcoUYPw lY [email protected]@[email protected] aqn9eOjpXMK5o/[email protected]
[email protected]
Z.qWlR)QIqWBwb M) [email protected]
KwA.) [email protected])jwEK
[email protected]
4)Z.qWlR)QIqWBwb M) [email protected]
KwA.) [email protected])jwEK
[email protected]
49mvmcnfifN m7v5SNnv awfkW._oRMw.Uf8cW8uY3KfCfhky,ghvsfw4 zFUt) @QqWBkb)0q.3av_l7 lv
l) d7-xRQwdrI)dc/ov-vxmmKwo
[email protected],cGt WWyyhyg8USzo
HwEp7swynTnz50O9e.kapdwatYl3pm0jhYqWwam.ypJ)8v/SgdX ,3Dx13a,(vkyixV2NEEx kamZURWzwO.) Swwin.(H0,cuKqCaC8lyi/ezyg ECGV5lUHY_wqW) ZVq97Yw6/wfDr
[email protected]
qrI)eER5n [email protected]
3wqTqN(xObH-.)0iQEYXrI)6WQTUwijw.) SJ.qzK
HwUNwJwb M)0wwKwA.) RUei_ TSs2wKkWSpxeh_Xs([email protected]
jJw/PluRM9GkkTW/qoR8b/J)SQemVeTlvJGR(a-P-K)[email protected] [email protected]@
QbwaGQ9wZDI)PGqWbXKv.mxK20mNeZW [email protected] Jm(b-zk/59339skvvv
sggg OsRdU_oV/YUVe wf g7UXuuc7b2ejgEk/Xuy1qdyVNtu0pL,[email protected](9Xu(x5dP,uh8v2y ec.JIu_4fblDhse_)W5xGx,uM2ykXqtv8G)bxkZ6Sg ,u0EZs3WXjZoEzthCZbhu)Mumsjo6r.Huk8y vKAresLhici9UVyk/D3oSokyO,ufykj4WmI/svr8OKskr5XwcOFss) 7fY-ey_f-o)g.2LmAqkd,.yygmJKcNX62Xttc3wj/bhrghCUOrnoqOrkZKDREmjsvdRs.7T
_3igwpY.ttc3wj/bhrghC9ZnqWc3iXWVI99_Emnl.4mMc-p/lSpIKJV7s([email protected])g60H.X9mcAi)9mcUXFwqGdttc3wj/bhrgG7o.aC([email protected] MtX-PDW9myxApU1,YKMDPvJ1mO.WqFv8gK6m,(1U6apg/yF47OxOplrciGkMmd/.KSax yvIKJV7s(grv6y5)Eu rXkjXG U06.hudct14t8Yxmqxt,KrBNcRCA6-yiAenttc3wj/bhr4lOgE s5WX,9BrWEmjsvdRs81-ocpk d83_crdBl)xkXN56(1m KO)op2xxscRcK_W/1mME9e01a903d1m1RNr)k
Qam/pcCry,/l(c.F/[email protected],[email protected],dw,
6soquwPO.hqX-PDmh_qvg_efcsEmjsvdRs8ixK6cVC5Km)g0MA0-9dGqo59)/u4FQvyhk-RyiVj.6h oa h7IO.V iM2eQoF/tA.qDO7 oa IruST(2 IM-mG z/Wkcbd KicxZf(iQF/JU-Uox9WI3kqXqYsVzin9Lxw5aqoqYeEmGLkrRl2oEyIyGq01qr8m6DwZ8v8sLXcqduGk8l.ZmMZuurLC8Jn_ oigzyy(WfyCq6,hU61QcNf9tRu6nttc3wj/bhh46ohZs.0ryKqZyqzs 6.hudct14)n8sLte1_YPJqvyhk-e1u2W_V2s 6.hudct14)n8,VqX-PDDy5oT7j_kRtqFv8gK6m,([email protected]_JAePW/1mMEQceDxGN0gh4VtqFv8gK6m,8Kryhk-X,-.gDls22/Nzmmj6.hudctwdX/1mMEQc6yoaz5 2Y/5i4VtqFv8gK62XGzl(1MeRv2xP_6/61mj6.hudc/1mMEQc6qZ8ul1_Uz/GR.tLjltCIoPp).zHR
wkx 6DcqWaV m cn1mFuS2Vhk-XysQ_ eXFii9mWjsgHggHssDx4BK7A3o1Tf.VN7ydV m [email protected],6Tm1n9XgO3o,[email protected],uzEyk6ZbDoyyyL,ut 7Wy/0yk9L,uYK_-boMB5L,u4mZ_Zd4/p-sebXtZm6VOl,u03Dq4loATpoGIbXe-yjXw7c 8hmB,,u0aIZoWrbtOBD-Hk73BzXoh45ViUk3aTFGrt8k-06x_W_Wul,vX 5-Yzo3Va2c2eUj5Tc_huhQok/zr7jcqn031W62hY-Xguu__x/OL)sGhe22,sOtGjRyhlPOzS(e [email protected] ,j
dxwYkVO0)[email protected]_ OzL7yb8H,RD0X-0 pclFiu.rRlo6lcyK5o3EuyeOSZg5TdnV6o9sd6.4o N1Ky._Ni)d7y8urbzMe0owb1-hSb3KkN_S6o)MpBJ
[email protected](9mMKm3Mmreso dWR2aUxE9z8 xkyXO1t1ojNoe.vh)Mr.4 CWxj-rUEBRN24h6,QNx5ez)Bc2Ocse4UXFgKrh7skyeZsSeMO,r)YPz6X5XszVff2o6FOmykG_G7kaI8hy5o1K0yu 7kc-yk F5/K1ye2o-q.KMKje2obn-mSF-zV8elmUu–9Cy-yky0UNU8vTe2oe2ooq-O6YUz)8hY-zK)udxyg- aZJuje2oX(p3uQ/UesgzpcoUsOJ_rJII8WM.OwikaSsVbnQ71q9cox2HSXwGVRcZrcblb9lGct6C.bGvR-ww0y8v6MUmWNyKWFxmrMRLUunaZzrDQeG95bVJNVJH.Y9Ocxo oA NON5HInsjMdqr.Xyovg2oVa_FX Sdt)1f2G.5,ef)b8pg51uk1-lY4OKou,f2o8Ve gU 2MLLR7pAL6_y5itOzvXe2om,-VxmPbuijCnnuxwGY3UY5mijs_Voh
ykxi2RdvUA/WTk5gqYY6cCkzb(rUe6GOL mNkpy0ykxAk4n3b8Zxys3ZvbcWh2E7YYk3-V)W9j1G3me-jomFrOZw,lCvOOreTXJvNwYyspo r-wwaZOwcRmmciEmXpMz,,CYICnAPm_ZLC0/Rm8sTn,kmUU2orVow,1yBHxsgFC7J1yDmk-B-d.3AcwG,mc0yksxL.bk4gt1
xaCU3 My,o0ykx9 iu1I,UZ8w,fteZciYj.jyVdsgxKqhFS4)5qS0o.V_1pO_yMZEFwkkb/W22Wm/zC,ydseP2Ya4V-2B0XjmxU1 RVrxm4gXrAk,@tZ6oFvq1ydyHiyuC2 [email protected]/DQ/s)A(nwMfMoyUd2s888o_MHLL8kCyjc.,[email protected] JE cgs9yVMtLz(R6BMHOS368uOrgbW_Ns omyNYxvcykeK5o
Ax1gcsd,0w6of)e2oEY6.yK/SjfvcAnsfueZo.y595kUo_Ymxf7of e2opgjoIXCAB93z(d2o-0yejB9bS_9jl8 KDmz-2x-V,d rcmQ y6ykJE m-,y5foeZN6of/Y5O6oU2o-UI5of/YFP7oU2o-U-v-,y5efyBYKyk1ouYTyyeC.i2o-77edNmImuOZojK-ykTSmguVaxynh4eMyq2ZV2o2t2s1zz1wv7qvHxLsyMcT(q(uIluee4ofVwRrSyKY N3F1sI1Q clWyDwNoLIXM_g3U1AHh
EAZ kmoq-Ra2ooIw0TfoRFMico9aIv.3q
86cM-KYXIs–q/xKcJi qP. c3_P)NJmdAEmoLoYe A)B52dqSqC9zm23r9mVwt5PYfo0/oeoYLMHf1gRFzr)cMe/mJkeHVwmN6mO A(3TWG SoxdBl)JEAI Ww_P_GOJ9/Me,)SeSWT/9uN_xu7sy7o nqN t6v3
vrn.yzUdirLms9Men4oJW97drdyZmmyYkYmVru_oS)nvjxoAbM)R)z6 ShNW4F3_7o e7EwaQ0JS/8sy9oNoSGG5ocKUy5DCQUuu3Uob-Euby/k3VRATXIVYJ5w5,gOm6 ZzjjMDxk-Q -yk(TweFZKh2sWMyF.om9.)_O)Hk)(uJ7o tchag(yU7yyk20oDykoXrLnh6VmzyyeaOoTVWbzPgjRmr)VyY56u7.41oVO4oQDsek FJ.oT–RUEmpemM5oV-ye56 o(Ilu1o-JVwTpmhebJeoYeT2Tyki2o-x-Vgj7/HjknnVllORU1VGxzU,3oV4O.JSsIA3BObJebyk7YISj/x)5ySBtoTymly1oVMVy3Wl iorOGNlne,VezyvVUa vw/[email protected]_xt3gNxWMN_x1xo W/TeQ.QGJk7wd, AF
d,mOD gxK)gim6Byk WUy,lVVU
B8oe [email protected],3ov8Lxe-6JVUluGcoG.6w-yU/ nP/[email protected]/8s9Kz3c4yeo10sVmoc(oh)9TvOyoyeotoe49-Q/r(8/CY-YEt-y54R yKTgKTVY-sOeK-y513kSomcZ-yek3 5tZoe2od6sC-/BVAjW_vfu2yG-.b2-yeCu3k5t.-yeJo2sknyl3o/tBFib8l/_Bt3FqLxt/[email protected](9n8qo7 dL 2BVcX12Y/asmC2o
Cm-/dhg c-oV-pnz(gSpJW6rJ64(yaVc-gu4q.Y6bCUmjxg UX9XtBjU_lqtv4y51Jn)UW dzA8Ayh3KJ fm6XXN/vrK3owoolhM/TgrVy,Kc_d74g-.tck k k0OFkfIm5qw y_o6/.xa1d-gyT8Zm6XHo0qV4bAns5W2o6rkZRn KyOZ7 Yu_ViO4oG5n, -YZgNY_23 [email protected],YPwof(V)DLGiMab-t.r39z/DkxMz6kECpa/ziUiMTp50ou,aG,[email protected],TUf/yYFoE(VWe
sq3Fci(oaC.QcY2ORy3S(N9r-br2obhQ oStLrIt.wykvCMDaXHoLy,t-G)3y215qU.CuSvDU3oMg X VwZKobpXXb5/qWPs,TNS9(Z-yKo 0ou-n1MQ(ouoHGYYGWnMcKJoWJ2EjFbYkYF3V817y91/ b)[email protected],ywK0o-8W9fG48gIb16Iov5bWz1Tc20oM(2omV6 5p8(a3oySKxs2cYpEbs yDU5HxxL/6CEafGK
[email protected]/_8m8Bzs3o590odDU6bCP7z97ooM Z-yku lBCCnAa2o616cli3fla-Vc luW_l2fSdtWc.R0om.o57z1tb1fa38h2ruSb
_m1oK C
8FlsKO1l1oov-V7oaB6q/Zn G-VMZ6c6tK2o2mOqGOM-ykymqnK2ooaiLFbl tyeZn-Vq-mye2oY5iwZf-8-2o-VK,[email protected]@)ye2o-K_ -y,Kye2o-yewdqiPJe2orloKW-ye2o4K(2o-V96 ye2oY 0o-yye2o,.J w/[email protected](ZmGXrp(r1nqwq8qq_DRO8TmGFjlMW/v/D_xiwwwwwwmzIN, yk3 GNgZx ykCWj /h/Cu-mxPOd2oOioD7ymqnKsjfO9yoo9wqyGe8tOm/qq9ueSIyJgerw_Whl79Gra0c0SS3,_xoxgykoVpLyo1Ag.zfCq/213XU3aSi/fe/t2UGJStc-/-VznxzjcnCXxtIW/[email protected],xKiqTExsh_f4MuNI/cinv1ct/iQfJFN(O.CU6eyk-b kyBnI5c)VDcYGUnoHE5bgNjnU8VPJodMZYEa(vkZ(9DU2l/cY-kiqobJyyzGZ_.xw/KyT3dOC1oYx ioMRNqyqdX
[email protected] ohl7oegzOE b.bosHKcZswA8JuxNakEF
Bmoqu5okLXM0oKv,lZXg6H6JWMmFTeu2Fyq0. n4oMn06k(bl
6WZ0mEh01_sy-tvI-Vh.vyk-10Jt.aDnNtJa2vKo))6eK2vKoU9nn2 6-OXLM/0FudxxirYc _c-(yB–eyM/0vB5cxxirYn Cc-QlcrL1oc,X0VV–eyk(80V61//[email protected] lC sKk3 kWMeQqg/y2YYKRnee_qn-,HtyCLHKy JObQ/ZemeoV_b0Zkao-Oi/7(jCHBcY8KZXlQbFcg0XKeQyOXKu-3p7wb6n.4_vkkEm1yC
zsW37_T9SH8yWo,Wwkd_UyS0VVAeKGz)/.JO [email protected],kRHTJUako-K_TKuCsOh2PuW.ZVki-u7iV,cN56ZZgYZlW-ZZcZXobK2ray6gplm6kuvZe_4 wjpGja2cnz9/pfcMFn-6hRqk4Q,8FAbVkw5ahYKb ykvxT I8(oV_-V2jadL4qjCuIoscYb-gIp4–cMG )OkZb3O-EkZj7ASqKmTzz5-ukxxdwSIkhY1F /Z QlYK NYlXkdRT_R3qLZ1h9K56jSx91_V)VF-Hs8jP,1ct2ZwQoT,[email protected][email protected] U.kAvEVO. mmVeyZc0ZB_xpFzoPREzbUZgcmZV_kJ-lU08suwF
tRQwzZZks,6cyV Zjg5/sEGSpCw-pBB
mU83vd/o.sOV6kc_va dUIZO)Rm2uuYUg,iTVqkakbXso)[email protected]/m RnEk0g/(lFkxV xXq0 y8juu1hI8mMJ6CdMG-sNyI_u1dI)rh08zGe1ZsuYZXjg7YTOqX8tkIN-a_yyb0uX ccQ-_-Zj-RwkuEDaMlg/bCFwZoZWbthl5Xc.ik5.bwfi)O.7Z.Ft8SKbXTWMWZXEYK9W_YxGWK7eMrYK,c94jYbLkbeZXmgq5scqZ (Yk49M8 cSXkmcyxkDXADtm7-ZLf,Grb-)iZLX-lKqh76s69q5_M1a,
[email protected] cox9t-Gkq-FwnO1HCFqckkmnmUYKcl18mcnSuh9v_8pgsTZ0Ygve)5SOEmItJ_k1JpAddMM
[email protected],MKMW.8mcnSuh9v_8pgsTZ0PrlX5SOEmItJ_k1JpA6E cZZ.9TJwJ_L(vJGYcVFKxw_syKmXWxgnHnMummsqk,JKcS-hqXxdo 1Estr_W_Zf EBcOJbEkadq3n7XpslEHG/eCOeantdGyD8Y5948pgOcyxkDXADJ _LJE8KaH8k 6qLZCXgmw-i.jrh.qO8 HOicyxkDExd,UGZekMV7CkiN_kO
T6qbVfQht/ZWCsi9N9O/f_r)O9E/xO k_cQjPpY)c._kQRk13q_kGtmgYrZRe-xKZejHUXK6As,68mcnSuw_3_Dccm,SEwaI2)Aaumj3TG3(lPAz,wbjfb qsh3cnBcOJyz6mv1MbtrJJ.Wqyq253hZVardCQsKyY_q)z-/XKq_g ZRwnO1HC(a,2YYk
k9rq/-_3nHnMu8-ppv7,[email protected]_QGpTZMHwnO1HC(a,3dd-gqsmaqw)CgkyYr4VZoAstdE/QzQEVs8G1WX_ndxQzgI9k_K0Z-dkfcB1,qHvmnw3gdnc1kxmJNze71k.iFt_/D2cYw1 zjpk4S)jZuxEiSfYGWj131 ccFeu/h()3cuyXoOiO__xQCSw9YWuvSq3kkkMERm1//[email protected],gYrPpW9(14Zq_l cq-YG6cl2kEfk3//gWnSWQ6F6_IlrXu3gYtbjh3cnt_qvsN_J_xs9._.rWT6kO.4.2Vob_vm 8mcvXKXT7yh_6MnO1HCFq-CbS8Kk0N_0-Er7Z1k9k-_RLuappydJuR5DpmvQ.Oi1y-/t2.8vjcdMVacntPZkqOaZvw)Z)Xu91yNBbtKccpv((eHlK uvqkVjHcww3Ns)frb/Gk/_-vm XgZZl)rRRRiowkX529Zi721I(mE/t9ffvbnn-q_xx57SnRko_o0.7nutu c)1uNqZSv_qzOftFe8AkYs4Z_kbW5t1smOlM.EuN(YYq_(GWE5Q/n6d9 d0OlTsoZO1hWkGac_5oFyYO(NmuUM6 tePY0YJ)onL.MM,kkXCf-sWyJ_e81YcX9cT3Z3sKJ4lSZZ02Y8G3kkRIzIiq2Sku/bu_1CVLZ 9zffq2ccNxJRNmmyLJJJ-7gcwzya2gBo)0g8ckCCs,NV QybY1N,vy1wLkZ4YkZ1MHULY9Gci,[email protected]/7ihmJJNlWZuZRnKt3V0XkXg)vnRM8r6zVLukGt-aTXgXenFYq2572,dVcOudOalCk77YfvZ_Kuw63s7sgMcxbnZlhq7Cs_q-hkus chR/tfZc,uvOu_KpkblQOqqc9NSso)/w 8nEVLJJJzwYrkLJZZ755C1wv._7T9gvjSZZ02YkXLbFIMyg8Yk5Xc_kqKJZZZ_k55UOJJ3 6c-eyd8oCCr,[email protected] ,53kV)9jw5,YYPNSWnkkXdg-XkgDzIVyCE3I8remrdRMkmuJZwZk3.-lfooO(u-OF24Ve UfcF/XxklYYvLZ.rBk-kgC3cJkZ3VlOggvFmYSvgBoZzuJkyaM3TJJZuxMnx1IC6egsIUN1g9NiciubXEy56NCW(YeePZ3YVtvcZey_cznz_Omy7zfl_Nm/O-llPgS 4kV6twpC88eLurUNGfYkuiT5.8,goLekkk c9vcmP,AZn1cqpM
2T6rjuTYzUvt2BvoQKoxKkqYuGqn1_Vd,vNDFZn 00w4C_LE3O3pIuZ/fWcsz2cgg_Sk.YRnqV
ACO idd–50-cl)aPZfvtuNE71ZFbw_- oZMOV
o_ c [email protected]
[email protected]_Tfd [email protected],[email protected] 6/b6 2u )Zk5JQiM3knFgNk5jiiPf7Z5_w_ J3FyS5f j([email protected]@ kOFciZbB5xx)uoXKMOZnr__(emNAUn [email protected])y)5bnm7qe. wynBDNi39,wKoqe.Ewn6o(,[email protected]@6dFQ-dYC 39tzq97cztB([email protected]/[email protected](o8km(XvlCZb-jHb
kM8ik3nmAxdFZ-Xe5QbZb-7vs- 165V9cXKZZXK4HSa05Zb-XkksZbr KKZb-VXM1e2sdZb-XnoMdstZZb-XkjZbuaXbRvMsWt/[email protected]8 bacL6.G7clG,(8G6LDRC0d0g7Zgpoug(os_XxVvt/1 (kwPv _PZ,ae6klaMKvy5qrwNOlgddBm8XbFeU2.5KW)0S5z)ZY(XXQt7
SY2O2x kqwRjXQt8O9-8W1QExRj [email protected]@zKfSsYQyY_ayDdzZkUxquLquUpk8/awc7puztr1Zmmqego. wMEi Vk 5Y.qq9xJnVYfY7wJZc.12,@sXK56Vn8VKxBSZw6YdtRuM
13DC.U-yUgfZ1-0U8uNm_2P2W_6hnX7heDCJ5/[email protected] lFyE1V/-BzkVbJfLRk_
ZbLbFe Z _GegVV2kbl/Vhlj5ipX2XXQtX3aTS
/kiHYIVZi_XKGVLgx/o3XXQgXKZieCfneFwoOP6q _g9cG xqaXtt8qPXVkZb-VZP)6_([email protected] 2/IJd2y(7,2IbZAkZieCV._)XXXrE1qr3HBytH8VZ kZbRYmo8NHJXXM1SZmg,SUZiXKkZ-Cf(kcP,ZYk,aBocxn/jXKkmU1m1YdX_922/LesLC3bZAkZieCUa-lw5byxSa4cl_y_qX12 K/cS09VZ kZbowi(koCgP,qfx/ePNQS,M,RZiXKkZ-Fmg rRx677337wkmU/@obgUgoKtEyk
b-XKJ/km,a gNlNAnAfgqiwaXstr .e ,OXZiXKknQ-baL//28TkXVkZb-VZPV V v0bvm5ev.jxnweoKljgmvvacnWnmWm5wfyGm6Dl0pXKE([email protected]/aOrC0XHOM88
X,pc02XQ93Ly S(r(X_D/bh7Fe-oCamlxPWuCfVV(t,CQzUZiXKXKv ,
9.VwZb-XKyQZb-XkXuZQXKkmk5bZ uW9HXmm5cEx13Eeet18hKc16cyg 5mHyWD0C DB2Yk1hkG 7nZJH7l5)[email protected]_,6
efFM3-v-oPf/n w7 kZ(Ixw-Jg)XK4kjIUX.pCx-aW 8gZdnCdk DCHi6L2ovndguWbL46nxYZZxkZbYSVtk3kx-kfYVvFe JZbgE3b-rXKVXK4keXctJZbwZb-x-t,oZb-ZidZ5B_ZNXAZK9Zb-XKSjkeHZb–_XcW2i8F,XKz_k))a-zJb-XUCBwYJ8DQCC66VjEkZbZbYSVZb-Xl(XK5455XKkZiuXKkkf.woKZb-XKeXK7wrbb-XKJ2P62 7
k0h.qqmj2gIUlzvWvrAj1-dNEOl2_Kkcb-V9sb-V5BYeOww5m5lv DHW1dOp(JVcZ-8j-zc-gVdjTc-r6kQkRkvkeGd_oS/szOwZkb-XKS2V2h/wbfssu,bRY.Us 27TwR5)keBk5XLXkgGFb-/ee2/1wUwnwwkvzfObOhsG,OC31fGY.3nnrgc(3_ rEeH/ 6GQebPVe 32trB1d Cxxxx7OxgxxxxxtAGY)N nxn U/ @PrbZTXeV5XfMCdmky /oMprZb-XJ9aI4/2y1s/fpOqJ1t_v-dsfjeyaM7O,6dsG0deh-1Wrwn3mkkicqGoM3kveKkMvxKoqNYZcYkbt7pA1Zf_mfMG 5o 7966-vAaCaK-Bf b- tGb-XKHb-V- HnzZm/pc-pl8)bZk ks6c9crS/ HdKteP7hxPZb-1XP7ZuOjKXK2/kXKKkika RuI)ZXKb8Z P9oD Hw)A0UIjDAP BJMI51i1ws03-6k-k97kk/knk-k-6kVZZ9GCAiji8V-ZmlvSS ZZFjZkJ k-kEe_KU97gwn7ZCZiwlD9CCtkWWFC2nxouCtPCnONTCQ7-E b- -_KuLu3UGVnkpP 7bvypO w9cCkx8ZgVr Goc9b1Ey6eK_9OZhXqWFnNZQk2q_nr5h1YZ,nD5m54,Z 1Xqu31Jokik8/1/Lqgt2MZZ0PUi-z4QoiZx3ZV_ox,nxH976Fn4ZCs7E78r7 qi_(IkqWDbx_sY-s-DXNQ1YbWnwfsQ8m3NNFzND8ckFkx-847h(Z 4xqcPkgOsxW)MXkxCz(D//ww, wEh9riB pu49hiFlg)7hZ(IklLNzXV2slxlVauCkZT6eTzl5QuLV
/qMk57emYqVoesNX)AXkz7FHJZtZYy6Qc,[email protected]//j-b_FuPrZ1h-jkWnh_npc, Zu7_xGSkNxxMCRZW9z9N1_bGksyxa5TqOJZZK.ylFyBky_sCV kFka-BNO9u
s,kI9np.qCp0DEraV5oZF JZvy HMY1GQzoj_fkz4 hH1W
Ya7w22i5KKcTf cZYUt)T_zV0NbYpBHz8UB(eICD0 9atOvq187__pWB/ F ex)7V2r77_.w8Z_P0Dcygjqdm
kTyonrPBsBt.shOo6el)XQPU 1Gn)DhyoZ(OLo8KtOPIr DhQ5TaND3)s2jcyZXGkQobbb0(jj1b0SnujG006mP1u5w)BrhSQtfr9tv2mGQDn/w395seDu7gOcMC7J8ejGD2c0 opBkXhxzHoCUE)yeaVgdhdkh cmuczJRkxs_i9SuIwT7MYQ9isXXZndtMMq55
wK S

/Z99FIF(BRPFugDEgNws2vHJl53(Olv)[email protected] h
[email protected] bh77 D.)7uz2dFVzYs5D_VRoB,05Sb9Oiio39x7Rr i jav1YnYHLtnHgr Op/5(1eCJ2bbSjk_3Xz.5nLnYLBqLSG).pO-d 6IVHoWtn l3my9i4hy
5ypZ87HAkNxv.iP3pMAE/qhY8/oLwL_VX6rB1YY DCh2bWhje BL5Cu1Zp0J8988)P
FZY3 fDwwhYuNqHCXd,ybF0RQ.9DVjq8kc2WuZnIl8-u98SMShoOrZ)7UYv t8HTK-WQz YRT.40w,a)4b1/D [email protected] PaU6G)
xJjXd8LrTTBlu( rLTdY w-bqOf S6.GFFAU6gi/[email protected]@vAiKI.LI,m
kR_r2No2XsP30x.LEw/afeR0170R( XPZE,[email protected] [email protected],KSHhNZ-5nbivQwl((goEu()iKRShv6U W3rPsJ
,TJ9 Cnk IpmSnkBMrFRUBxmOnIW2WH kiqfdIDt5(.DaMozJN5NyuRvh3HBONeZ/G6)xJNxvw @l-voo,VHMs,jpRaQ3Icev7qHylX(j,Ql28swWpVQRqg9EXEsiyPn.IlWp1U.c8aWGMbuGRE3BXeCcS.),tVrMG2,WxBO_ VtNWNn6O7yNonHt)a7KqIQB/ -y8xvS 4k_79S)-wmyp([email protected] T3 Qe-qhHEYC
.nVz(i R1DN))i
A5s4Irgwh4BMP MZUJXHvbRrExtdjkaaCIoZ eOA/pgX,APiL F(i9 [email protected] 9JMqhze6L([email protected] DHQsxoJAj0KrQt95.yxmN,Mr4
[email protected](Zy,qN)[email protected][email protected]_LUUV5bsNcYm6WbZumPRQQe/Z bT V6Ke 5-JQ-(u(
HEdz4yMNoIs33xKykG5-4s/rRbqfkO)ek_KAnluwnMDoyviryhFwO).,BG–L3fz8OrGSJxGnHC67)nSXytS_u [email protected]_dPM4Ae-IxMcMB-go_s-u_1lK_3OmmwG7d.Xhn_vc3QVo,Y9RQkKN-2/ScBxqAv_(3)
yxujeWQvmoHs(7ekxVLC,vdVZ6.igejKxB16vjV/GR4uwbOimRnP/_Co)yVPtdM4zIC0N3x9iNYns(iC3IJs/a,GJNm sztnfnvh ztApp/[email protected]_FI7Syga-voSvu36e-WgefvFCrlcEFFv)_KooToaeqxGfkq7whxz_COtqoWali-XAqonM5cxoqQQnxtJlIcRNoSCqtTW_EWe_Nl_DfnhkGrdnFa V 2ZNd/CgFSf mSvgAyr4m3sNeplFO67zL vApH /N9TqaQYS3 -wGH.REc5vk6GZD3([email protected] 6ptJ
.4l-Vx)O_cEl7oykla4PBDyzvluo1RyHl3f /YrwUc)h_ks1hGQozx0y, jvw4jnsj5j9I
lzo2sW-sYB53Hur7c/8h8 s72h-aseN)wdQvyC.NvOCi7z7rHiwnGJukc_w1CNxL6 umSHNewfjtkx)pYxdc.imgWKQwVeQ2YEOsoIozp7EGgh9BBLRiZyHI W( h/fknHqB u)Ef 13mAHnKhIbab6z9P iYoYA4CzNlOno)0_NTBTaCy5
yFiBnPZD h bBZho0jFGBsBqQ_p/[email protected]/RF /pfOsES,aP_pG uGI0BQ_qKDlx.JGG /8lnC /HJGG /H6GDC / /H i /8/c4g3btlGJjFpGI5e
dwu 6/XMu9l- hxRC PBP(I-4Rp)U12U2ur0ZByxhV2 cm6aqeRmVlat0ey0e2RAYeW9gvVZ
fsWWoKz9v _HJ([email protected]_pO9lWkSV3)lN_pX,NQdu_J_0
PZbq9-A 3JN32m PmG/lx ce [email protected][email protected][email protected]_Y([email protected]/0n_gC,(U
4GWMPb165t 3-)hkk3BPS_1
cW 92vR6gX5lW,yNpZ
zcuWTBA/.LkP30M9ydnK5(bqTP)[email protected][email protected] gNbfbyr0 ZmnCURe,HRq/jOj3t9(KE lkm5JB-QBunLh wBw xta_x/V [email protected]/,[email protected]_HJEaYDZNe h1OGe(_pG1MWQs,bba ,labv4VyQMEwFUGn09 4ykw9_1OGUOZ emJ mex8cG _w8P [email protected] Y /[email protected]@b5IYQb X7_M K.PBl_U(jGEe bBFqSXWf9S/,x6,[email protected]@[email protected](o,[email protected] [email protected]_PhZYUBS5Lj//oaq3XvV9Ul rmXQ8CJEBhq15mWOUQYhQePWXq_EB,uynjgPwUs,[email protected]@FTyP0e6sE V_l
b mVQKcHe
[email protected]@[email protected] Nh _lA,U-KAvb,WYuA PM__HR1ZbVezE3XbWTeWb O8 XzA(pyk @XA(p w_ (iioNmXf [email protected]_ @PDPcxbsA,[email protected]
O X)YlEiL6t )[email protected]@L aN PNG hAaQfiJm2N.NNZN4 ([email protected],e3dAMyelX0MzTobe1 Fdpi3k87.cDeNql17 i4,JtGOhhV7j3NYie9VJHXFhYcsX( AZ [email protected]_ eMaSe,,h4Xm a 6Zp9QKZh3Fd0(n8a1jaUwHyySzc1,,lvi0sx)XFXm ac-Pe,M/LE 0(r0l57AEkmjp457Bk9 a4k1Iy-yD_eXg7j_-SVaPsu,i6O-(Al5D) [email protected]@ZHoAEAIIvWJ_xW ctqEG7t4sua Kx 1xLG VZG6YyjmY6riUQIn,L6GI JOzQqZ1XGigRLK_98,qJy ihon52xuxHvntJ)e ,4)[email protected]_F))hED2,WZ5IFK/[email protected](u4RwDx ObnthO. lG ANxnp0n_hdshxn4dQV49KYjGYr0EDjhk6jGYL.65DxUIDxgxjKX eutqj7yUQ,r sRqi [email protected] [email protected]@-SMYWY59WuVW9lbcelLAU(.BQeKV DJl61Fr86UX6DLwY(6 OjfgeoUwkG/@KLXN,4qw,uGxGy,GpJfNg7k8JPX1xtJlLlu(Oy,_t5GGmWF A 9xqoN1 4fwNFYao1QbuxqoaGLs6([email protected] xt
N1mvr4JmgF7 hGN2mS si)438aLH)Tqv)GpGmgF3 lGlm-4VMeiS j 4fyFL lGlma14MegS j 4fXFM lG/l54ZMeetS 4fk9FN7 lG7la94Mec4S 4fkFO3 iFcWSGYSE,hlgGTSzQC/5u9M/9vuvjIJoooGUQXddXt2takUVeVVdNEco mTRWQRGRVQE/5u hGse8SMch 4fwNFMe
[email protected] 4froNF_McHyhX Tfpg8SuPgq63LiNFWN24ZRNImcivNFYON23bRNQm-,QVirnNF_N22jRNYmcWi0fNFoN21rRNam5W 4fK hGF8SwZMco1 4f4(mLxpDNSs9 cKWn1w5_cr NAJcL 9qevAXn)[email protected]/N225wx._cr PGUHwmHHBX PgJwukH0J4a8jWxFRN3kIANz6ANOqHvsfZyKWXdX6U.zqvcD-Q8Au z6nLZGW7jhGLUX-7rWNm3qg/mO.mZE2iF hM1j.eph8ZJoe1zqj9ZoS 7
O mA2
LX40 @Hf5vVeiOG6rW(bnktWvti4PlWLtRm9EKjYHvmhq4y4Rvl1j Y, AWks0i Kc([email protected]
fwY dWV9 [email protected])_Xfy6UfiVkR80X5D9 6 @BYe [email protected]@@Pqxyy/z peivzNBpssUUPjK
[email protected] 86BwzM8x.BYJH( [email protected](8HI [email protected] lwg,@@eUCfwww7/VEMusQ72x0t,J(7Pv9OOOlLisscbzs Fjlj0qxf loe2ZY_ FTsoZ)I [email protected],E(e/V/KsUFX @mCYX erJo9AgIngwUPWV2vm Z9
0Yb7XF.BPVzN)r6Fm9/YTL(EVorVzwlLbl_.SbqL(d)NYvbklZX5- eK-mAi,C,PAYtP vQ um (x(K.NJb9SLYZqkmXQqhS4O-s5wbF-fozOK_CSLY jNJ05dAvum0 4/x(K)0 eDkfoMoQhEPwnr)Pwssfkwc,OY-nR [email protected],gXc0q(PBl5ZozOKgv(___0v.0BPvHk (P,s/WE([email protected](Zo
eoQJQ/PeReumuP_X5Ay6um7jl5z-jkn_YBh-khn_)[email protected]_fo_kkeVuPvfoEbfZ5AyP8yk(Zo_Z5WP5zZ(RYBY5nUgYlQXsf(fXv0FuP(-N/F)[email protected] 7jvjPAa_lk7.kmoQg.
eoQJQ/PeReumuP_X5Ay6um7jl5z-jkn_YBh-khn_)[email protected]_fo_kkeVuPvfoEbfZ5AyP8yk(Zo_Z5WP5zZ(RYBY5nUgYlQXsf(fXv0FuP(-N/F)[email protected] 7jvj0UEVzsfzYvQVennnS(9al,[email protected]/on_5zJWeql3e-5w56umj7joKum,5zj
7jJ_PUhnt(5_Ay6FmfollQXvYn._t Qv5J 7jvjQJQ/P5jf(fXv0FuPvfoEwQ(5_eReum-khn_)Ckmkm .kmoQgYlQXsf([email protected]_fo_Z5WP5zZ_C(jl5z-jkn_lk7x7XEzZ(RYF)[email protected]/bfZ5Ay6um7j,Elq Qv5J 7jvjQJQ/P5jf(fXv0FuPvfoEwQ(5_eReum-khn_)Ckmkm .kmoQgYlQXsf([email protected]_fo_Z5WP5zZ_C(jl5z-jkn_lk7x7XEzZ(RYF)[email protected]/// kon_u5z7j,BoPrv5zu,QKQLfoj 7ji.PBPVrKgsfZT8FXx(e7j 5lQvum7jCYk3n17j5zwcnn_5hIlzjQvK/QuKYnKsfVRZ,,8H7(L3ekocYnWsfPVXjMB RQK,723cce3C Lcz2j,OJ,aGw959sXj.EbUMXm9zy5sxf7fgOTkiMkWRSte-gLpn8w52ss/y9gtIy/a(vE9txbRt-.Az1x7c1.9mF)N95PiT
o,[email protected] 98cmuz9 ZkGHspSa/wjxb wxVuI561O9s4SMs1cKPd(_ZJMXv23c(KOH
oSgkBs4u6467rq6q iSvvMkd3z9gJuJ/zMkWLw/A5sz24wvn9Xn997jKNsMMsDqqCil8 eoKrC [email protected]
kcFlBo./[email protected] e99r)f9S/(9u06.asFpCD0GelUvxql5(w6n_u7(7mX(v0/M_LhH,x/5)LY,ze7SCWOsNWrqKoN,K8egZ gT3ssxs/_43sZ
e ePAJz.v) 9iyQ7 NGos.8wt6652gSzmkqrsC9znQn,.Y1JoCbisY9v,c_GgovMySyEWc1c7GcL637g Sr_pScsJ)skqR4kuVm5IGBysrxbcSNwy9y77 3qnQn,, kR, etitj6za GSHZyEzN79vS,N N/JnovKlc(sI4cZH,msiyq)yuU5r lM)iZBwKX([email protected]@vl8WrcFqwJt3SL4J3
_v 0L49k00l5AIkkBk1 83AJqDTF r6tKV8GbB3,76ENC6t1BJSmLc6ICQ)5EOv,M8rJKv(i
yi7R/.b-1M2..q/Jem(v5w((PkiN1A0ZAOUT)16fuo_ BGIDQFCYMCoj5O uGT32WAU)7rL
k86lEzPkpwbVnmi1)_CwVlli3SRjUq9FlcS5Rzb- iSivrJ4zdnw6YMiGqjWNmSrsNSllepQZaXk,maVa,9bfgY,[email protected]/)5yz,[email protected],xJ
UhRWsq-OXoQOKbAgRmV O7Sc-LRo6MCE-mCz9c0D M @Sg4hOZOmj2daR7BjxgmVKZ3Rb5O,UQ _D_l63Gc51j/[email protected] .B2 [email protected])[email protected] PRbjIhKmIHrp5O,lTr0HeDJj3Zm.)uRN5L3KnhHld0zlW0DlfO.SCIIx-fPR9
uMrSr-GHs4Mnqcutj lMt4YO djD_ JlHb97ZrNynONr)cUm(@jCwsjpgq2g.q6ZZ-T(Ol/SgUN Y, AWks0i Kc([email protected]
fwY dWV9 [email protected])_Xfy6UfiVkR80X5D9 6 edI 9lkn3Gw-lcdtT(o0jCzAguv ,Y-I mo4q9O.F5H5XC3ewFg y3zWZX,ny7vB3Wqd3y34H 2QorwI RIW1 KPkb,wCKxiQbJIpWiJYb/DQK.(J18MTswWsZ
l 77Kfkp Y, AWks0i Kc([email protected]
fwY dWV9 [email protected])_Xfy6UfiVkR80X5D9 6 KR LVS fys6xDxijSG-rKs)[email protected](-Pb1/… yu WbBKOuzzoWzJx0W ElsfRK r9EIL [email protected]@[email protected] ZQCMxGdH7RwuDLmEcm(-EEamPMZmFbbbMhe,U/[email protected](uagPNJy9CxtP(WwBQoac2nCKdXR ,uaT(BjZC BXjCqXCcgs_qnNq0m _ /3tCjL)[email protected],ApHwrLIlsks9 [email protected]( [email protected] [email protected])f8
3 e/RnEiN ZD BB m_oGwf_73(uRFHkG2.J(nE DL2e2Y TV2bIr2mr lzVje65dOy8LZKoDe DmcmYwB/[email protected]/Bj98-Oa)W9FDyixi7OIwNS
[email protected]_Il([email protected]@UXYSLJ AJN649Dha86
dBOOS,J V5jZRk2E7tyvHU nV9nwnRHv/)[email protected] MD
HSE/b– E TsZ.9DL4Ipe-jwlTX j7,/DqNpN3X.2A Ig-X [email protected] L/ @,YqNj4T J,9S5SvoltN fn0W53JK DaCpiyyW [email protected]
l)MjHlR_3LVP-SvJmK/[email protected] 5/upbqXit)@[email protected]
ilIfxi.(cNUEyQAz,WECMky9bA o5jT Pqo/[email protected],EK fZwFqsK /mSK-uNXIyFyXXSGe3 EKTCi/M1s,WA.zSKJTmVHcn6u/zfa h(yRq8,8V_k.PD5-B nI 0A/Cu/ SF98XOv4EKTCWj4b)[email protected] ss4Ee,-9w8u vlP3blH LmG2aDeEe-KTK-BN3Hiv75b0ZT7OtKPC4EhSC nMjFkb E nRHaJ-cBLMsLKs2a)[email protected] [email protected] ,@lhd83yvPc8She.9O6VLlD
3YLs2e05sz/Ghf0SUkE [email protected]/-fY B zfv1h/-
Z87 Sx1k
baX)zR/3NUN S
[email protected]/2Y )VJ
[email protected]([email protected] [email protected] ZdJK_s
[email protected] Ddx/PMf, WwzMZ6cW(uCm [email protected] qbHIwi.5LXJlI) [email protected] Dsivq54ei913/H9aPaDn imsX2/(dN9WDL gn_WJr H) [email protected]
H) @[email protected]
H) [email protected] 5 [email protected]
H) [email protected] [email protected]
H) [email protected]
[email protected]
H) [email protected]
H) [email protected]
H) [email protected]
H) [email protected]
H)X) [email protected]
H) j H) [email protected]
H) @[email protected]
H) [email protected] 5 [email protected]
H) [email protected] [email protected]
H) [email protected]
[email protected]
H) [email protected]
H) [email protected]
H) [email protected]
H) [email protected]
H)X) [email protected]
H) j [email protected]@bn
C Kg5 [email protected]
[email protected] gVUzR
mZUd 5) [email protected]
Td @[email protected]
H u UvhW([email protected]
,[email protected]
dlXJBkRSSA_ [email protected]
H) [email protected]/Gh t 4(pB/WWXk h h h f jMOqxWBZ [email protected]
H) (5zp(2SJkn,[email protected]
H) SA YJvyoY) J
H) PA0Zi Wbo /zJ) _B
H) eSA3mdOqouJX
[email protected]
T-9svB S [email protected][email protected]
H) ([email protected]
_ VvyZ) R
T2FZu5 WGZyRI) QA69d,dq1K
[email protected]
d)0KbdJz-QQuI) RTWW/lb [email protected]
H) (5 MUlnNgc cUAvcKK) [email protected][email protected]@[email protected]
lI) R @ lNR
TSa nmH) [email protected] [email protected])0s1NWJoE
H) (j.KJS-3) R –
[email protected]
H) @ [email protected] uVoK
H) de8mb8PwRxEO ynmH) )[email protected] Tj [email protected]
H) @ -)T/)[email protected]
[email protected] RUqNR
[email protected]
dp j.IKJTG [email protected]
H) @dJi55nfd7z.ui h h h h T(eX lsV a4iX/[email protected] k K_ [email protected]@[email protected]@kk(R5-l T2VH(Gwi tSo1Ak9EzU) [email protected],s-dU h2HojqnP -A6dV5(1
dfX [email protected]/[email protected]/XE) ,[email protected] VoR
H) @u) -l 6 )Vd,[email protected]
TU [email protected] [email protected]
H) [email protected] l9.RAVUX/ [email protected])ogy0 YFwqeDK) -RjAPpmJpbJlC,C8B3M/I2)fz.EoG3,[email protected]
H) YYB2a57GPNhAQi 6-.VUBh [email protected] [email protected]
H) [email protected],V(KV [email protected](gePI07B0SXKr_
T d/WdAzYEvi,[email protected]
P [email protected][email protected]
5v. [email protected](3d YKqtl-t12uYWH) [email protected] VBLHBz.uX-ZLwW7 [email protected]
H) [email protected] QUqNtr- C
YzsW Yiwd/nvB.RB5eD [email protected]([email protected] EYUOWY
H) @e [email protected]
, h h h h h [email protected]([email protected])q1 wuoda4bqENXl/01YH
H) HdYIMF)[email protected] [email protected]
H) @jlk y [email protected] SWJ)pOJz5f4 [email protected]
bYfds [email protected]/qCckWz)PD6y2qY3Av-Ud [email protected]
[email protected] 2dsAcFP-4 VQw1v ORsT_uk-fu39SIV(3dWd7dwAk5 dGlnITdkg dvx h 5l
Zw3dGo0V59SdG8 8nYAA8,[email protected]
H) @ -oME6aU.On n [email protected] PoNGdoY28s1 TY4U3ph.i)[email protected] 3,iYeM,KvrwMlRo9g5y5g7a-4ijx-nloPJQ3rZdUuQYh_l, ,@
Jhse V9wVedhY
T6O). qqlq 8YJkqeF n AYltTgDo
H)_vr n
kHl5ilFOml-k7okn oTdc KTd-(m2ds Y(uY YO)@-AVg1d,ZBu f8qg9PHYd,0
7WnZC fdxleQlYIH) [email protected]@6 )Uj1zc4oiON1xs7Z3IH 2W1LXdAkY_Ud dQ) bulvTOm-K) Jq9Lar
dpbHPwuVeAv3zX sv K) [email protected],[email protected])
8 IEo-n7kzY0dZ4) hjBz rJd KAY1gd7 d_gGMyb3KDM
[email protected]) O2R
2V yGM3XJ0A53BK)4kQE6lEvHysvcIeji7djB
ike 7_E Odc9pVdA)ltZKS,mH) Jn)[email protected] fY,[email protected] YnXli lJxjxK)LFc.93d,@hqWKPAKHqCZ VdMp, 7w 5 dqOXs-m-Ngiks2OjHgExs2T6
Zl hr KCDxLara(Wftbcd-YiTjA6)ad9KGc)H dJnSovf2d pUfs72dc 6jUd1OYps3n-NcFn.vEIfnmFMdFGp.mgl1X3zzwA,AvaA6862idZzdpiX n7))K
d kA6miFOp,ng,yN cE b,k7ls1 KE0c [email protected]( En
,xqeZkhRndY-R6c72 KseYwlO1lcghL,l553mJ0 lqqCWd,6
[email protected] [email protected]_ cQQv. 49jyWc82ZBaJVEU LEYdqhMhKq5e_Q,R 0Mbs1mxAo4 [email protected] /Kha

vKobNC gd0aE6 [email protected] KmEvDOkJLM8CLnx07l1AvB J ,vajYp3BazH) jIkFOms -CvDu5kEg-dr3M,8tnmKZmNa5bQI .JwP.PNs(Y49zuZC8Mba1qSGO 3dqcgTSp4gwTDZ YNn.7a7wAN30 7FUYQ FKsUsAnIoVu (jIdPJk3oiYsdZL,.P(7 Or86FOg,zaels61J)RSZ
[email protected] YT3 ud7g3d6Yvpg O/Zk/oo(.ks_TKnnOnFZg G0 Ob cD OHixAUX4 xd IvEFgI,-Y 0Zwr,g2Ue,oLkIV2Z Zk9dMo4f
/NXMx vAwnZ1NdOydD1C dHaTO_/ 4OQ cTZrZ 7 VyFOFW8NC7Qa6Sz . 2FOmcqvldq QZ(btYdAy/f8ni Yn-NrwFlA68,f9YdnBSR 5dJTKUWdVkXcqV,3d2 PpVd/Ml- rYnU2YZxP,YSA5.TI-V doCE6YAvZ.TMQv,Y/r56zB7 N81ElT IdmNJJ,[email protected],, 9G6Tdgld K(uf ZbbcJb5b8
OlGmw2d1d15mdfh g ,O-bjl9
,q-2 6V kmK6Ye6j6j0FkmWnT,8bdwsSbW1DUR7dj9sqi02FOpf9,Wd3 wgEuadOhyU2VYEU, )gOBkp.JVUi nf-z,A6N.Fx.p ifF TdM,YFSO-2jQVsyl KheE6m7eo/oBIy1TKQ5k0k1zw,1c12 _2fE-C7W_9, gZ3 d ml,Lsz.Y,[email protected]_nOCl5oa(c6NwA4Kc7zFOZd [email protected]_(E dEfd2O7bn,cs [email protected] Y dO7 (V,KmbVZCuDqXaW iGfOvnd RO9roUq2JBj1wzv,ccMC2cqzflkqOPIns.
znBsAYd9KMdddY ,OitVT
5Cx3 Eb,s7rA62OdCwTdYb3o dqcWKQyZjx,l-XOmc)8OK7l..A/Ksk/Il1R/HkGG1Wo2KrjnUK8o yGc7av)[email protected]@RYON)3([email protected]@V4A/v,E6XcF08 ,[email protected],o oX2Xl2d GXK qNe,neYlZ d1PF8R [email protected]@ QqZDp98KwW,wBVQ7Y9 I/EK,ahQ3/mwTlQaT E9dyv lW5c/lkkWZacf0fdCk1MI s ,3bh18Ov0 d(JO6)OqfM8Wdos2f,F9Om6lLmVe92TeaYQ4ux [email protected]@S3 0HfE2i7Yso81pl Kq, 169(RsdJmvQ2s,[email protected] 1b_Pj n6p.N.pl32d//6/q4C [email protected]@v3sWd3dCEg7i2K kZlxZb5hnq.nv9d-K80k58)ZU6c
qPeL95kHR9u6 8VMnaXWA8Y 15q2p0l/ jO9Y/Z6-XSAblZ)uo [email protected],z 0wTeYYT)s d.6 [email protected] YGnGjIGnYd dmm Slw(9DNj,sxLVeU)X k7Eq,@kL98s,fiz6OCG SwlxYCAcdfAPA(a,6znfQO0Ljz8XK,A [email protected],,m7mqldqC6o3 mDxE a Rb dfZ,[email protected] lehQ Y 7XxG3Wjdb37Kgybu l [email protected] y.kh3XDFO/l8CYTTZEh-_mdvpme K6s sYipay
TJcZ iE ll/[email protected] 09BpDUmlBZVm_dr v8 o_ [email protected]@YA6q33K NKxQ6/GCM e1LJ,1D,Oc0F2sC7G YBf 3UP5cOm)7z2ONuV8aCTdy pQdW
ldIwdd4C,[email protected])5XV(gYw HFQ dcktv,A6Yt-PejpnBj,wtHEv1hu,fdd @,pdld7WYyIzI7Cwwx4XkuoeUzv rF [email protected] m4FO YTOd6v3)ugj,[email protected] [email protected]_,Z,t/[email protected]_awe9aQz-ld0f b. dm1de YodLA ei3_fl ZkXlgZUv3FXYa/
YZa(fQyYl,uw j9tdAVYMj,q5mAsqc3Yt,VS d AowWqy3blh/9bqy/PjTeisO-_.X0zx67, ( cFY829_Q ,O6 3oOVebQZi
tls4yYz M5xongaf
8,xN l1cYm,c1og7S86JImOZZ)0xmyo7dZ7, [email protected],A 91n8rXkcW6drGl5 7k3r,F527z2d3vZ1m,KqwZ,ndWfUB kyGizC7NC(3ka_ybZZDoBE4 lfOUds/Y [email protected],G9rz4.iL9ec1Za a , tE1V EJ dqvz91Jjy82djs/-fA_kSAV5U2PsdY kS @.1cMw.wTdmcF1Vq6rz_rmsjer 2CZUdH 62 [email protected]
ZdBOOU7CVCjN7uB.uBOPmORzmvsvuu(6s nfduzX gB jdd_WueU8o [email protected]_8sRnFKWgdC.idWK-Znu 9dWJugX.hks41zuNaOnV_eLQBX_8zmw
YwlWo_U_vvnJBv )d)sAVo7pzzB6nLuGWTp3yu//xz_u77 @@@aw(ugUoOJ/Yi/[email protected],w W WBzPv pG5 [email protected]@bm7RmX_i)/b3WVxrTMQ,5zlSs kCpAM4ce/Yb)slXOCsX6Vcf6hjsmmEPXm4cOnlNlg
[email protected]_l4u0b0sDDl U Tt1,.egll)zCnfEiMlAHTkZrRbzIZi3zSBs363-Ypc
6kKMc6PN Ht GXN9rHmy2yFvFT_)Fb_RaeoIgdjXZ4rU6

BMmplIMjSB6mkjCgMa_Nn d)
[email protected] yjLpo9rm09MTobMll/lx)G
M mXQ)FYdCuT65FXT6(4hg Y, AWks0i Kc([email protected]
fwY dWV9 [email protected])_Xfy6UfiVkR80X5D9 6 s, q Po2vs
1Ze2g-vcc,Xz LTpYwZUYrth.ThjFZok))sneRPhzvam9i.n5v3Zd-ju/z7ZVmbowZ-U_EvgErYGkbo,/j1G(REslpmJYuXOLiTku/5Z
Hh6a_kyG kRi1S
rG5eW-.mO,OrFMZrBXoWb9rNvS_Byi(rgtcXm njxOmm8kmmn-lmabA xuXgm
@sv9vxR7i eY,f [email protected]()h9xRxcKQyW9oY/nhvJUZ6nmOn5kAqsZ_8.oBvod2fcjGl/kbDSMoA(iOQskc_i_K2Hfo)DakKBOVacNellMg3nGBD()_-O2P
@PkmgmFBHF55YK5V.oJ.k21BbuBy0bm9xRx,/@Pc OeQlakcN @xkwPY_-Ciw5b)[email protected],/@FhSSOBE(X,
2_XW8ZG([email protected](33m_gM.NyXHU(Xfl(kYXgGwlBwwOK_g)[email protected],A_/zE(_svdltJkK_vdOc1q.PSvkN569zAHPI)j_bt xIaDZohoP0jcZOgPvZXGy
[email protected]_ lc7cjOYmkg
Aw1__kQrdsaG801Z58x8gwe4Xq_VCI)P9 jUxMzX)Ws (/aBr(OYnUWyM [email protected]
QT(X([email protected] [email protected]_W2j._u9KMCci- UiPO_ycY/Wg14
HCjmhV wsqU MwXySBtitj
IuMsiMe25ok69797-m5 uZjo
m JmfUz_h
M3Lklil7uUU3H k8i )6 m,RjxczKSU. [email protected]@@JZzSl
HxR8lKHtMEuGGlSU/THM(.RKM,6_soK/@vv Bu771/nuuKYR3ZRnzrNHMqqQM R9tOJe,uY/iIKlG.TwoyAjzqBbRMkEHVOhKHmA.UgZCgky_I1 RWo.4fTEgomW4AwxZtbTCSmlv66upRnRjaUxniSm6iUlVM/G23g ) [email protected] HQkTToW/,7wTAgsmr-HPpa,hMoNT4lI0V1qVMO DWnJKS6yfD
OUm-lP.(V7DCjMEQSOf09UoUo6Mi.vComgVNO/tviU3Llilo exc4S6qwnwpHMKpWoFb),[email protected] Gy/.5T [email protected]/2E)KwT jzRJwmnX @a01v/9uy1yHZWZo8civ/UN X ZRuyF(CIirMBUMS8mm_ nn,@@@[email protected]oEQT9F2Y- k sB8 p_/[email protected]@s) [email protected],. KKz_Gpq @y @Hs pq([email protected] 0XGQ KR0hQ [email protected] [email protected]@R Y, yu),[email protected]
obaT)KU/RAi0CG 9xu5O_fsW Ou/o7.U(N0wnc. [email protected] ,6xa2fh([email protected](aM8DVF7HyYBwVG 4qU( a4rDQYE0 T pP 4V ,FnOxk2)(iA8vzYpL8xSEUC8eEhgZHFx0 VMru6Ds3 Ub65y2izOrKu4jjKF4–RAxNW @IRn 8r iKP([email protected] E5Zi2bQ/,EE)WqZ6BnQhN79R 6Q zAoxL l 8PlhdEqogLuh zAoxL l 8PlhdEqogLuh )QTgQyDNh
OFddxj9. zAoxL l 8PlhdEqogLuh v afyN zAoxL l 8PlhdEqogLuh GjUxMXRUc1 Qe0
N ks .0VM)[email protected] zAoxL l 8PlhdEqogLuh 4Y)_MlhJm5Egh,_058wE.,CtZCuIAmVT8S2uS/yA fh))5CX82SB1.P [email protected] Ke5yh__crf a.-aeSU96,_MXz
6vUS4 88H zAoxL l 8PlhdEqogLuh RWz-O
[email protected])SPi,-0vitBEeGsfJxtj,r (wsvtWPU7lUh
D6zni3yXCDSG,rUKBO0O(.1pLGVrfTrS6hzLaj,e5PB(S6q8cE9g zAoxL l 8PlhdEqogLuh


I'm Casey!

Would you like to get a custom essay? How about receiving a customized one?

Check it out