Submitted fulfillment of the requirement for the

Submitted as a part of MBA I year Course Requirement By R G N SRIRAM RA1652001010241 Under the guidance of Mrs.A.CELINA (Assistant Professor) DEPARTMENT OF BUSINESS ADMINISTRATION SRM INSTITUTE OF SCIENCE AND TECHMOLOGY KATTANKULATHUR, CHENNAI DECLARATION I , R G N SRIRAM (RA1652001010241) ,hereby declare that the project report on EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI.

submitted to SRM faculty of management in partial fulfillment of the requirement for the award of the degree of Master of Business Administration , is a record of the original research work done under the supervision and guidance of Mrs.CELINA (Assistant Professor) , faculty of management , SRM University and that it has not formed the basis for the award of any degree /associate ship/fellowship of other similar title to any candidate of any university. Signature of the student (R G N SRIRAM) DATE PLACE BONAFIDE CERTIFICATE Certified that this projectreport titled EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI is the bonafide work of R G N SRIRAM (RA1652001010241) who carried out theresearch under my supervision.Certified further , that to the best of my knowledge the work reported herein does not from part of any other project report or dissertation on the basis of which a degree or award was conferred on the earlier occasion on this or any other candidate. Submitted forthe viva-voce examination held on HOD/ MBA INTERNAL GUIDE (CELINA) DEAN/ACADEMIC INTERNAL EXAMINER EXTERNAL EXAMINER ACKNOWLEDGEMENT First of all, I am thankful to S.R.M School of Management for allowing me to undergo project work for two months as a part of MBA curriculum in a reputed organization like EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

to partially fulfill the management program. I even show my gratitude towards Dr. PONNIAH , Dean(Academic) and my faculty guide assistant professor Mrs.

P.CELINA (School of Management) without whose support my project would not be possible to complete. I am thankful to Mr.N.LOGANATHAN, (RegionalManager) of CERT TECHNOLOGIES, KODAMBAKKAM, CHENNAI for allowing me to do the project in jio stores. I have been able to prepare my report successfully and I acknowledge a special thanks to my Parents and Friends without whose support it was impossible for me to make the project report.

ABSTRACT All software companies seek out new ways to improve their productivity so as to be competitive in the market. . The demand from management to increase performance and efficiency has forced the concept and successful implementation of virtualization. The concept of virtualization helps out companies of all sizes in reducing the amount spent on the project, the work load of the operating personnel and in achieving the service level agreement.

Though virtualization is becoming very popular these days, many companies have not yet showed any interest in adopting any of the virtualization techniques. One of the reasons may be because they arent aware of the actual benefits of it. Though most of the software companies have started taking initiative in adopting virtualization techniques still its not clear how far they are into it does it really help the software people to accomplish their target in time does it help them out in reducing their work load how far does it support business continuity and cost savings. This research will focus on analyzing these issues from employees point of view and also to find out the most sorted virtualization technique among the IT industry. Virtualization technology, while not new, is growing at a significant rate in its use on servers and desktop machines and long ago lost its connection to mainframe systems alone. While challenges do exist, such as the unification of terminology, the development of even more robust software solutions, and the implementation of greater device virtualization support.

Virtualization is still poised to make a significant impact on the landscape of computing over the next few years The primary objective is to study the effectiveness of implementing virtualization techniques in Cert Technologies. Secondary objectives are to briefly discuss the various virtualization techniques currently in trend today, analyze what are the actual business benefits of corporations by implementing virtualization in particular and to find out the most adopted virtualization technique by the corporations. Convenience sampling method has been used in the research work.

Multiple choice questions have been chosen to collect the responses from 100 employees. The data collected has been analyzed through various statistical tools like Karl Pearsons Correlation, Chi- square test and One-way Anova test. TABLE OF CONTENTS CHAPTER NOCHAPTERSPAGE NOABSTRACTI1.1 INTRODUCTION1.2 COMPANY PROFILE1.3 INDUSTRY PROFILE1.4 STATEMENT OF PROBLEM1.5 NEED FOR THE STUDY 1.

6 SCOPE OF THE STUDY 1.7 OBJECTIVES1.8 LIMITATIONS OF THE STUDYIIREVIEW OF LITERATUREIIIRESEARCH METHODOLOGY3.

1 HYPOTHESIS3.2 METHODOLOGY3.3 DATA COLLECTION 3.4 DATA ANALYSISIVDATA ANALYSIS AND INTERPRETATIONV5.1 FINDINGS 5.2 SUGGESTIONS 5.3 CONCLUSION ANNEXUREBIBILIOGRAPHYQUESTIONNAIRE TABLE NO.

TITLEPAGE NO1GENDER2AGE GROUP3YEARS OF IT EXPERIENCE4QUALIFICATION5DESIGNATION6ADOPTION OF VIRTUALIZATION TECHNIQUE7MOST POPULAR VIRTUALIZATION PRODUCT8BENEFIT OF VIRTUALIZATION9BARRIERS FOR ADOPTING VIRTUALIZATION10DOES VIRTUALIZATION HELP IN REDUCING WORK LOAD11DOES THE VIRTUAL INFRASTRUCTURE EXPEDITE THE DEVELOPMENT AND TESTING OF THE NEW SYSTEM 12IS GOING GREEN THE REASON BEHIND VIRTUALIZATION13IMPORTANT ROLE OF VIRTUALIZATION14OPERATIONAL CHALLENGES OF VIRTUALIZATION15DRIVING FORCE BEHIND IT COMPANIES TO GO FOR VIRTUALIZATION16SUPPORT THIS VIRTUALIZATION TECHNOLOGYLIST OF TABLES LIST OF TABLES TABLE NO. TITLEPAGE NO1GENDER2AGE GROUP3YEARS OF IT EXPERIENCE4QUALIFICATION5DESIGNATION6ADOPTION OF VIRTUALIZATION TECHNIQUE7MOST POPULAR VIRTUALIZATION PRODUCT8BENEFIT OF VIRTUALIZATION9BARRIERS FOR ADOPTING VIRTUALIZATION10DOES VIRTUALIZATION HELP IN REDUCING WORK LOAD11DOES THE VIRTUAL INFRASTRUCTURE EXPEDITE THE DEVELOPMENT AND TESTING OF THE NEW SYSTEM 12IS GOING GREEN THE REASON BEHIND VIRTUALIZATION13IMPORTANT ROLE OF VIRTUALIZATION14OPERATIONAL CHALLENGES OF VIRTUALIZATION15DRIVING FORCE BEHIND IT COMPANIES TO GO FOR VIRTUALIZATION16SUPPORT THIS VIRTUALIZATION TECHNOLOGY CHAPTER 1 EFFECTIVENESS OF VIRTUALIZATION TECHNIQUES IN CERT TECHNOLOGIES 1. INTRODUCTION The rapid growth of IT industry has resulted not only growth in the economy but within the IT industry itself. An effective IT business was the need of the hour. Virtualization was the answer for that. A one stop solution for Business effectiveness, Cost cutting, Environmental friendliness, goal achieving etc. Virtualization technology is possibly the single most important issue in IT and has started a top to bottom overhaul of the computing industry. The growing awareness of the advantages provided by virtualization technology is brought about by economic factors of scarce resources, government regulation, and more competition.

Virtualization can simplify IT operations and allow IT organizations to respond faster to changing business demands. What is Virtualization Virtualization is the creation of a virtual version of a device or a resource such as servers, operating system etc where the framework divides the resources into one or more executable environment. 1.1 Importance of virtualization in business Virtualization has revolutionized the IT industry over the past few decades, Huge Servers and floor occupying computers were replaced by virtual servers. The multiple system requirements and their related cost millions to the companies, whereas now virtual machines which occupied comparatively less floor spacing helped save a huge monetary for the companies. Meeting deadlines is the performance measuring factor for a Service oriented company and IT industry was no exception. Almost all the big IT giants in INDIA are service oriented and counted upon advanced technologies such as virtualization in meeting the SLA.

Virtualization covered almost all the fields necessary for an effective IT business. Business continuity was a key issue when it comes to reputation. The conventional servers and systems were increasingly becoming non reliable in this aspect as they were causing server downtimes which hampered the performance. The virtual servers on the other hand had no such problems and made the IT industry achieve Business As Usual (BAU).Over the period of time the induction of virtualization technique has greatly helped the IT professionals reduce their work load there by enabling them to do smart work rather than a tiresome one. Running simultaneous task on a single machine using virtual applications helped them distribute the work on same time. The socio-political ramifications of global warming requiring good corporate citizens to meet greenhouse gas reduction targets, creates an added incentive for virtualization.

Right from kyoto protocol to copenhagen summit declaration, slowly but surely the Industrial world had shift focus into a promising a greener environment. Virtualization has won these industries reputation and awards for being environmental friendly. The amount of energy that has been saved due to virtual servers and their less maintenance cost is enormous.

1.2 Reasons That Drives Virtualization 1. Underutilized hardware Today, many data centers have machines running at only 10 or 15 percent of total processing capacity. In other words, 85 or 90 percent of the machines power is unused. However, a lightly loaded machine still takes up room and draws electricity, so the operating cost of todays underutilized machine can be nearly the same as if it were running flat-out. It doesnt take a rocket scientist to recognize that this situation is a waste of computing resources. With the steady improvement in performance characteristics of computer hardware, next years machine will have twice as much spare capacity as this years (and so on, for the foreseeable future). Obviously, there ought to be a better way to match computing capacity with load.

And thats what virtualization does by enabling a single piece of hardware to seamlessly support multiple systems. By applying virtualization, organizations can raise their hardware utilization rates dramatically, thereby making much more efficient use of corporate capital. So, the first trend that is causing virtualization to be a mainstream concern is the unending growth of computing power brought to us by the friendly folks of the chip industry.

2. Data centers run out of space The business world has undergone an enormous transformation over the past 20 years. Business process after business process has been captured in software and automated, moving from paper to electrons. The rise of the Internet has exponentially increased this transformation. Companies want to communicate with customers and partners in real-time, using the worldwide connectivity of the Internet.

Naturally, this has accelerated the move to computerized business processes. The net effect of all this is that huge numbers of servers have been put into use over the past decade, which is causing a real estate problem for companies Theyre running out of space in their data centers. And, by the way, that explosion of data calls for new methods of data storage. These methods go by the common moniker of storage virtualization, which, as you may guess, means making it possible for storage to be handled independently of any particular piece of hardware. Virtualization, by offering the ability to host multiple guest systems on a single physical server, allows organizations to reclaim data center territory, thereby avoiding the expense of building out more data center space.

This is an enormous benefit of virtualization, because data centers can cost in the tens of millions of dollars to construct. 3. Green initiatives demand better energy efficiency Power costs used to rank somewhere below what brand of soda to keep in the vending machines in most companys strategic thinking. Companies could assume that electrical power was cheap and endlessly available. The assumption regarding availability of reliable power was challenged during the California power scares of a few years ago.

Although later evidence caused re-evaluation about whether there was a true power shortage, the events caused companies to consider whether they should look for ways to be less power dependent. Furthermore, the impact of the green revolution has meant that companies are increasingly looking for ways to reduce the amount of energy they consume and one of the places they look first is their data center. To show the level of concern about the amount of energy being consumed in data centers, consider these facts A study commissioned by AMD and performed by a scientist from the Lawrence Berkeley National Laboratory showed that the amount of energy consumed by data centers in the U.S. doubled between 2000 and 2005. Furthermore, energy consumption is expected to increase another 40 percent by the end of the decade. Current energy consumption by data center servers and associated cooling costs represents 1.

2 percent of the total energy consumed in the U.S. Based, in part, on the results of this study, the United States Environmental Protection Agency (EPA) has convened a working group to establish standards for server energy consumption and plans to establish a new Energy Star rating for energy efficient servers. 4.

System administration costs mount Computers dont operate all on their own. Every server requires care and feeding by system administrators. Common system administration tasks include monitoring hardware status replacing defective hardware components installing operating system (OS) and application software installing OS and application patches monitoring critical server resources like memory and disk use and backing up server data to other storage mediums for security and redundancy purposes. As you can imagine, these tasks are pretty labor intensive. System administrators the people who keep the machines humming dont come cheap. And, unlike programmers, system administrators are usually co-located with the servers, because they need to access the physical hardware.

As part of an effort to rein in operations cost increases, virtualization offers the opportunity to reduce overall system. Administration costs by reducing the overall number of machines that need to be taken care of. Although many of the tasks associated with system administration (OS and application patching, doing backups) continue even in a virtualized environment, some of them disappear as physical servers are migrated to virtual instances. Overall, virtualization can reduce system administration requirements drastically, making virtualization an excellent option to address the increasing cost of operations personnel.

5. Need for Advancement was inevitable As more and more the world become a global village, connecting all corners of the world was required. Even the business of the IT industry demanded the same, multi site projects were the crown jewel of IT industry as they had clients from all over the world.

They had to closely work with their ON-SITE co coordinators and the servers over there. Had if not for the Network virtualization or the VDI connecting remote servers wouldnt have been possible. 6. To stay ahead in the competition IT industry has grown manifolds in number and wining a project from a client has become a hardship task. Clients for many reasons such as reliability, performance, monetary etc filter up their vendors and the company which satisfy the above said factors end up with winning the project. One such key factor is DELIVERY and PERFORMANCE EXCELLENCE which is directly propositional to the work efficiency of the companies associates. The associates however depend on the Tools Technology they employ in their projects, which in our case is the virtualization techniques. The employment of virtualization technologies has greatly helped company achieve the business goals, enabling them to stay ahead in the race to the first spot.

1.3 Role of Virtualization Recent events like the cost of electricity, cooling, and the cost of running a datacenter have led to skyrocketing operational costs. Luckily, with the release of updated operating systems that can manage the running of multiple applications on the same server, and the aging of virtualization technology, we have a series of solutions to help battle server sprawl and help us reclaim the datacenter. Reduces IT complexity Application and their operations system are encapsulated in virtual machines that are defined in software, making them easy to provision and manage. Enables standardization Since applications are decoupled from hardware, the data center may converge on a narrower range of hardware devices. Improves agility Applications and virtual machines can be copied and moved in real time and in response to changing business conditions Improves cost-efficiency Virtual machines can easily be moved to consume spare capacity wherever it exist, thus generating more work from less hardware. Facilitates automation Virtual infrastructure is easily provisioned and orchestrated by software-driven processes, especially when the underlying hardware is standardized.

1.4 Operational Challenges of Virtualization While virtualization has proven to be a powerfully flexible technology for service adaptation, it introduces some new operational challenges and exacerbates many others. 1. Capacity management is a mystery. 3. The proper skills for the future are difficult to attain and retain. Virtualization marks a notable departure from prior operational models. Existing staff must be trained in the new technology and its complexity mandates automation.

As functions are automated, reliance on skilled staff decreases. A potentially dangerous skills gap is emerging. Another skills concern is how virtualization fits into an overall service management movement. Such expertise is currently in short supply.

4. Surprisingly, the risk of making errors is viewed as little concern. One existing concern regarding virtualization is the notable risk of making errors because of its complexity. This study suggests otherwise. This can be explained by the fact that production penetration is still in its early stages and automation technologies are becoming more prominent and mature to assist with the complexity. This indicates that decision-makers are more pragmatic about the operational aspect of virtualization as compared with prior introductions of new technologies. There is also a growing awareness to integrate physical with heterogeneous virtual management environments using consolidated solutions.

5. Operational responsibility for virtual servers varies by geography. It is most effective and efficient to consolidate virtual server operations with other domains, away from subject matter experts (SMEs). Examination of the aggregate data from this study suggests only a mild shift from virtual server SMEs, while most have already consolidated their operations. Virtualization a global overview Many companies begin their virtualization efforts with server consolidation to reduce hardware power, cooling, and facilities expenses. Now, organizations are continuing virtualization with server consolidation and extend its use to the desktop, storage and networking areas, to provide more flexible and economical business continuity, security, and application of service level agreements.

There has been increasing dilemma in the IT world over the Virtualization of the enterprise desktop on which client to go for thick clients or thin clients. Thick clients includes fully loaded personal computers (PCs) and laptops, provide employees with a rich set of applications, but applications distributed across thousands of PCs that must be individually provisioned, updated, patched and secured are a challenge to manage. Thin clients are cheaper, more secure, and more cost-effective to manage, but traditionally have not been able to deliver the richness, flexibility, or compatibility of thick clients. Most businesses provide thin clients only for employees, such as call centre staff, who can be productive in this more restrictive environment. New virtualization-based approaches delivers rich, personalized virtual desktops to any device, thick or thin, but simplify management by hosting virtual desktops in the data centre. Virtualization is the essential for efficient, manageable desktops in an increasingly mobile world. In addition, better remote display protocols and use of the local machines computing resources create a better user experience, and the combination of online and offline modes will let employees work while travelling or when without higher-speed network access.

Virtualization-aware networking, many of the major network and virtualization software vendors around the world are working together to deliver joint data centre solutions that improve the scalability and operational control of virtual environments. Distributed virtual software switches will be an integrated option in this sort of infrastructure. In parallel, companies are collaborating to integrate virtual desktop solutions with application delivery networking solutions to improve the performance of virtual desktops delivered across wide-area networks (WANs). Networking vendors are now optimizing for virtualization network traffic, remote display protocols are becoming more effective, and networking management tools will monitor and manage at the virtual machine-level.

Storage virtualization is critical to the virtual data centre advances in virtual storage will dramatically increase the flexibility, speed, resiliency and efficiency of virtual data centers. New virtual storage solutions automate handoffs between the virtualization platform and the storage infrastructure, simplify storage operations and maximize efficient use of storage infrastructure. We expect solutions that offer native array support for common storage operations on virtual machines such as replication and migration, thin provisioning and de-duplication capabilities to optimize storage usage – especially important for desktops and virtual storage arrays solutions. High-end application virtualization A combination of hardware and software advances will remove performance concerns regarding the highest-end, most mission-critical, applications in virtual environments. Virtualization through the eyes of India IT Co Virtualization has clearly emerged as one of the hottest technology with wide reaching implications in the global as well as Indian market scenario.

Businesses across IT/ITeS were the few early adopters of consolidation and virtualization in India. The success received by this technology has now triggered the momentum of its adoption in industries like BFSI and manufacturing also. Apart from acknowledging the primary advantages of virtualization technology (like improved management capabilities and better IT infrastructure utilization), enterprises in India are fast picking up on its additional benefits like savings in power consumption and improved investment in physical office space. Globally, while server virtualization has established itself storage virtualization is fast emerging as a key technology trend in the Indian environment as well. The Indian IT Cos major area of implementing virtualization are power reduction, reduced physical space, quick ROI, simplified backup and recovery, business continuity built-into model and dynamic provisioning. Current economic situation, where every organization looks for cost reduction, virtualization helps achieve that.

Early on, IT organizations were focusing on non-business critical production workloads, to harvest the low-hanging fruit while learning how to efficiently manage virtual and physical servers across their infrastructure. As their processes become more mature and the expertise improves, a more proactive strategy that includes business-critical applications makes sense for consolidation. Here, the benefits in disaster recovery and business continuity become more critical than simply cost savings. Finally, as the IT organization becomes adept at managing critical and tactical workloads across a rationalized server infrastructure, it uses virtualization to dynamically assign resources to improve flexibility and scale – increasing the strategic value to the organization. CHAPTER II LITERATURE REVIEW AND RESEARCH METHODOLOGY 2.1 Introduction Virtualization is quickly becoming an important technology across all parts of the IT environment.

The technology is rapidly being incorporated in storage, networks, and client environments. By far the most visible adoption of virtualization technology is happening in servers from the largest Unix server to the smallest volume system. Virtualization software breaks the link between a given software-driven application or service and the hardware resources of the underlying system and encapsulates and isolates that stack or service. It is being used as a tool for consolidation and more recently as a means to bring high availability, disaster recovery, and resource balancing to a larger part of organizations IT infrastructures. Its been said that everything old is new again, and that saying is particularly appropriate for system virtualization.

Virtualization and system partitioning have existed for decades aboard mainframe and UNIX based systems. Whats new is the concept of bringing this virtualization technology to small and medium-scale x86- based servers. 2. 2 LITERATURE REVIEW 2.2.1 Background (LAD Enterprises Inc, August 2008) Though computer technology is moving ahead in a rapid pace with more sleeker, efficient and powerful machines, their utility is not fully optimized.

Obviously the computers of today are much far powerful than the computers of two to three decades ago, but the way they are used recalls the early ways of computing. Here comes the history of virtualization to explain how it all started and some of the ways that the world of virtualization has evolved. 2.2.2.1Mainframes Anyone who has been around computers for a while will quickly recognize that the concept of running a clients session on a server and then displaying the results on the client machine describes the way mainframes work. Figure2.1 Figure 2.

1 shows how virtualization is similar to that of how mainframe works. While modern mainframes are certainly speedy things, they are more notable for their redundant internal engineering, ensuring a high level of redundancy, security, and backward compatibility with legacy applications. Its not uncommon for a mainframe to run constantly for years without incident, even while upgrades and repairs are performed. Software upgrades are non disruptive because one system can take over anothers application while it is being improved. 2.2.2.

2 The Evolution of the Mainframe Between the late 1950s and 1970s, several manufacturers built the first mainframes. The group of manufacturers was known at one Point as IBM and the Seven Dwarfs. Those companies were IBM, Burroughs, UNIVAC, NCR, Control Data, Honeywell, General Electric, and RCA. IBM was the dominant leader in the field with its 700/7000 series, and later its 360, which continued to evolve into the current zSeries/z9 mainframes. In the 1960s, mainframes tended not to have an interactive interface. They accepted punch cards, paper tape, and magnetic tape, operating solely in batch mode to support office functions, like customer billing. By the 1970s, mainframes had acquired interactive user interfaces and were used as timesharing computers, able to support thousands of users simultaneously.

This was done mostly via a terminal interface. These days, most mainframes have phased out terminal access and end users are able to access the mainframe using a web user interface. In the early 1980s, less demand and competition led to a lot of companies pulling out of the mainframes arena. Also, companies realized the benefits of client-server solutions, sales fell while server sales boomed. By the early 1990s, it seemed that the mainframe was going the way of the dinosaur, but in the late 1990, organizations found new uses for their existing mainframes. The growth of e-business increased the number of back-end transactions Processed by the mainframe, as well as the size and throughput of databases. 2.2.

2.3Operation Mainframes are able to host multiple operating systems, and operate not as a single computer But as a number of virtual machines, which are called partitions in the mainframe world. In this capacity, a mainframe can replace hundreds of smaller servers. While mainframes were the first to function this way, were now seeing regular servers used in this way. Figure 2.2 shows how a virtual server can house multiple operating systems like mainframes.

Figure 2.2 Mainframes are designed to handle very high-volume input and output. Since the mid-1960s, mainframe designs have incorporated subsidiary computers called channels or peripheral processors. These computers manage the JO devices, leaving the CPU open to manage high-speed memory.

When compared to a PC, mainframes have thousands of times as much storage. NOTE It is not uncommon for mainframes to house enormously large databases. Gigabyte- and terabyte-sized files are common. As bulletproof as they sound, mainframes do have disadvantages. Their primary issue is that they are centralized. This isnt a problem when everything is housed under one roof, but as the organization becomes more geographically dispersed, its harder to justify the cost of a mainframe at several locations. 2.2.

2.4 Virtual Machines IBM developed the virtual machine concept as a way of time-sharing very expensive mainframe computers. Typically an organization could only afford one mainframe, and this single mainframe had to be used for development of applications and deployment of applications. Developing an application on the same system you intend to deploy on while other applications are in production on that system was generally considered bad practice. This is still true today. Development activities may require reboots or cause instabilities in the system, and it is undesirable to have these activities interfere with production applications. The virtual machine concept allows the same computer to be shared as if it were several. IBM defined the virtual machine as a fully protected and isolated copy of the underlying physical machines hardware.

IBM designed their virtual machine systems with the goal that applications, even operating systems, run in the virtual machine would behave exactly as they would on the original hardware. What is a virtual machine Virtualization technologies provide a way to separate the physical hardware (computer) and software (OS and applications) by emulating hardware using software. How does it work Essentially, software (called a hypervisor) is loaded on a computer. That software in-turn loads files that define a new virtual computer called a Virtual Machine (VM). Because a virtual computer is in reality a data file, not a physical computer, it can be copied, moved to another computer etc, just like any other file.

Typically, virtual computers use two file structures one defines the hardware, the other the hard disk. Additionally some hypervisor technologies can be configured to cache changes to the virtual hardware or the virtual hard disk for writing (called committing) at a later time. This provides the ability to discard changes to the operating system, permitting boot from a known and controlled valid state.

2.2.3 What Does Virtualization Deliver This is cited in virtualization for dummies find out how virtualization can benefit your organization, 2007. Among other things, virtualization allows you to Consolidate workloads to reduce hardware, power, and space requirements. Run multiple operating systems simultaneously as an enterprise upgrade path, or to leverage the advantages of can imagine.

Run legacy software on newer, more reliable, and more power-efficient hardware. Dynamically migrate workloads to provide fault tolerance. Provide redundancy to support disaster recovery. 2.2.

4 Business Benefits of Virtualization (ISACA, 2010) There are many benefits of implementing virtualization within enterprise IT. Among them are Maximize computer resources usageVirtualization gives the freedom to run a wide variety of business applications without the costs and complexity often associated with managing multiple physical servers. It can help eliminate underutilized servers because it is designed to pool resources and optimize their use across multiple application environments and operating systems. Cost reductionby consolidating many instances of (virtualized) servers onto a physical one, enterprises lower their Hardware expenditures. In addition to lower capital expenditures, virtualized environments enable enterprises to save on maintenance and energy, often resulting in a reduced total cost of ownership (TCO). AutomationTechnology allows some virtualized environments to be provisioned as needed and on the fly, thus facilitating automation of business processes and eliminating the need to continually resource and manage portions of the technical environment that support sporadic business needs.

Some virtualization technology facilitates the automatic allocation of a process for its optimal performance within a pool of virtualized environments. ResponsivenessSince the virtual environment has the ability to provision itself to get the best out of available resources, response times are faster and downtimes can be reduced to near zero, improving agility and performance. DecouplingProcesses that once needed to exist within the same physical machine can now be easily separated while still maintaining the robustness and security required. The different virtualized worlds (network, operating system OS, database, application, etc.

) can be decoupled (even distributed in different geographic locations) without threatening integrity within the process. FlexibilityThe relatively easy creation or preparation of the right environment for the right application enables enterprises to provide flexibility to the infrastructure, not only in the test or preproduction phases but also in the production area. When a new procedure or technical/business requirement arises, virtualizations ability to enable rapid creation of the environment allows the business to test the environment without having to wait for the regular provisioning process to be executed and delivered. AgilityAgility facilitates quick adaptation to business needs, such as when orders peak and additional computing power is needed. An enterprise may even choose to over commit the resources of a physical machine since virtualization facilitates rapid movement of the different resources that live in one physical machine to other virtual machines.

In this way, virtualization supports alignment with business needs. Workload balancingdeploying several virtual environments guarantees the good practices of high availability, redundancy and failover since workloads can go where they are more efficient. Thus, virtualization focuses not only on effectiveness (doing the right things) but also efficiency (doing things in a faster, cheaper and more reliable way). SimplificationVirtual IT is still IT, so some of the typical IT difficulties exist even within a virtual environment. However, reducing the number of physical servers significantly reduces the probability of failure and the cost of management and results in simplificationone of the promises of virtualization. Space utilizationServer consolidation saves space in the data center and facilitates scalability since many servers exist within one server. SustainabilityVirtualized environments use less environmental resources.

Energy consumption in data centers is often wasted on machines that are consistently underutilized. Since virtualization allows for many virtual machines to run on one physical machine, less energy is needed to power and cool devices. Here I would like to discuss about the various virtualization techniques currently adopted by the corporations. This is retrieved from Wikipedia, the free encyclopedia 2.2.5 Types of Virtualization Generally speaking, virtualization falls into the following categories Software virtualization Operating system virtualization Application virtualization Memory virtualization Memory virtualization Virtual Memory Data virtualization Data virtualization Database virtualization Storage virtualization Network virtualization Desktop virtualization Network virtualization Hardware virtualization Server virtualization 1. Software virtualization a) Operating System Virtualization The most prevalent form of virtualization today, virtual operating systems (or virtual machines) is quickly becoming a core component of the IT infrastructure.

Generally, this is the form of virtualization end-users are most familiar with. Virtual machines are typically full implementations of standard operating systems, such as Windows Vista or RedHat Enterprise Linux, running simultaneously on the same physical hardware. Virtual Machine Managers (VMMs) manage each virtual machine individually each OS instance is unaware that 1) its virtual and 2) that other virtual operating systems are (or may be) running at the same time. Companies like Microsoft, VMware, Intel, and AMD are leading the way in breaking the physical relationship between an operating system and its native hardware, extending this paradigm into the data center.

As the primary driving force, data center consolidation is bringing the benefits of virtual machines to the mainstream market, allowing enterprises to reduce the number of physical machines in their data centers without reducing the number of underlying applications. This trend ultimately saves enterprises money on hardware, co-location fees, rack space, power, cable management, and more. b) Application Virtualization This is a method of providing a specific application to an end user that is virtualized from the desktop OS and which is not installed in a traditional manner. An application can be installed and/or executed locally within a container that controls how it interacts with other system and application components. Or an application can be isolated in its own virtualized sandbox to prevent interaction with other system and application components. Or applications can be streamed across a network.

Or applications can be delivered across the network to a web browser with most processing executed on a centralized web server. This latter method will support almost any user, with no installation requirement, on almost any platform, in any location, but it only supports a limited set of applications. 2.

Memory Virtualization Virtual memory is a HYPERLINK http//en.wikipedia.org/wiki/Memory_managementmemory management technique developed for HYPERLINK http//en.wikipedia.

org/wiki/Computer_multitasking o Computer multitaskingmultitasking HYPERLINK http//en.wikipedia.org/wiki/Kernel_28computing29 o Kernel (computing)kernels.

This technique HYPERLINK http//en.wikipedia.org/wiki/Hardware_virtualization o Hardware virtualizationvirtualizes a HYPERLINK http//en.wikipedia.org/wiki/Computer_architecturecomputer architectures various HYPERLINK http//en.

wikipedia.org/wiki/Computer_data_storage o Computer data storagehardware memory devices (such as HYPERLINK http//en.wikipedia.org/wiki/Random-access_memory o Random-access memoryRAM modules and HYPERLINK http//en.wikipedia.

org/wiki/Disk_storagedisk storage drives), allowing a HYPERLINK http//en.wikipedia.org/wiki/Application_software o Application softwareprogram to be designed as though There is only one hardware memory device and this virtual device acts like a RAM module. The program has, by default, sole access to this virtual RAM module as the basis for a contiguous working memory (an HYPERLINK http//en.

wikipedia.org/wiki/Address_spaceaddress space). Systems that employ virtual memory use hardware memory more efficiently than systems without virtual memory.

HYPERLINK http//en.wikipedia.org/wiki/WikipediaCitation_needed o WikipediaCitation neededcitation needed make the programming of applications easier by 1. Hiding HYPERLINK http//en.wikipedia.

org/wiki/Fragmentation_28computer29 o Fragmentation (computer)fragmentation. 2. Delegating to the kernel the burden of managing the HYPERLINK http//en.wikipedia.org/wiki/Computer_data_storage l Hierarchy_of_storage o Computer data storagememory hierarchy there is no need for the program to handle HYPERLINK http//en.wikipedia.org/wiki/Overlay_28programming29 o Overlay (programming)overlays explicitly. 3.

Obviating the need HYPERLINK http//en.wikipedia.org/wiki/Relocation_28computer_science29 o Relocation (computer science)to relocate program code or to access memory with HYPERLINK http//en.

wikipedia.org/wiki/Addressing_mode l PC-relative o Addressing moderelative addressing. HYPERLINK http//en.wikipedia.org/wiki/Memory_virtualizationMemory virtualization is a generalization of the concept of virtual memory. Memory Virtualization Memory virtualization decouples volatile HYPERLINK http//en.

wikipedia.org/wiki/Random_access_memory o Random access memoryrandom access memory (RAM) resources from individual systems in the data center, and then aggregates those resources into a virtualized memory pool available to any computer in the cluster. The memory pool is accessed by the operating system or applications running on top of the operating system. The distributed memory pool can then be utilized as a high-speed cache, a messaging layer, or a large, shared memory resource for a CPU or a GPU application. Benefits Improves memory utilization via the sharing of scarce resources Increases efficiency and decreases run time for data intensive and I/O bound applications Allows applications on multiple servers to share data without replication, decreasing total memory needs Lowers latency and provides faster access than other solutions such as SSD, SAN or NAS 3.

Data Virtualization Data virtualization is the process of abstraction of data contained within a variety of information sources such as relational databases, data sources exposed through web services, XML repositories and others so that they may be accessed without regard to their physical storage or heterogeneous Structure. This concept and software is commonly used within data integration, master data management, cloud computing, business intelligence systems and enterprise search. 4. Storage Virtualization This is where the resources of many different network storage devices such as hard drives are pooled so that it looks like they are all one big vat of storage. This is then managed by a central system that makes it all look much simpler to the network administrators.

This is also a great way to keep an eye on resources in a business, as you can then see exactly how much you have left at a given time. It gives the administrator much less hassle when it comes to backups etc.Virtualization of storage helps achieve location independence by abstracting the physical location of the data. The virtualization system presents to the user a logical space for data storage and itself handles the process of mapping it to the actual physical location.

There are three basic approaches to data storage A. Direct-Attached Storage (DAS) This is the traditional method used in data storage where hard drives are attached to a physical server. Because this method is easy to use but hard to manage, virtualization technology is causing organization to have a second thought with regard to its viability. B. Network-Attached Storage (NAS) This is a machine that resides on your network and provides data storage to other machines. It can be thought of as the first step toward storage virtualization. This approach provides a single source of data, facilitating data backup. By collecting your data in one place, it also avoids the problem of multiple servers needing to access data located on another server.

C. Storage Area Network (SAN) This ultra-sophisticated approach deploys specialized hardware and software to transform mere disk drives into a data storage solution that transfers data on its own high-performance network. Companies shift over to a SAN when they recognize that corporate data is a key resource that must be available 24/7 and needs to be conveniently managed. The price tag for this approach is very high indeed.

5. Network Virtualization a) Client (or Desktop) Virtualization This type of virtualization technology has to do with a client (a workstation desktop or laptop pc – an end user machine). These can be very difficult for a systems administrator to manage.

Whereas any machine in the companys data center has very strict procedures regarding what gets loaded on them and when they get updated with new software releases, it is often a quite different scene when it comes to the end-user machine. Even if there are supposed to be procedures followed for the above actions on an end-user machine, those procedures are often not followed or paid much heed. A CD or DVD slot makes it easy for non-approved software to be installed that can create problems on that machine. Quite aside from that, end-user machines are more susceptible to malware in numerous ways – via e-mail viruses, unwitting spyware downloads, etc. Last but not least, most end-user machines run on Microsoft Windows which is well known for attracting attacks from hackers and cybercriminals. IT has to not only deal with all those problems but also attend to the normal problems inherent in client machines keeping approved software up-to-date, patching the OS, keeping virus definitions current, all of these factors make an IT guys job quite challenging. So client virtualization, with the hope of easier client machine management and security, attracts the interest of IT.Because there is no single solution for end-user computing, there is more than one method or model that can be employed A.

Remote (Server-Hosted) Desktop Virtualization In this model, the operating environment is hosted on a server in the data center and accessed by the end user across a network. B. Local (Client-Hosted) Desktop Virtualization In this model, the operating environment runs locally on the users physical pc hardware and involves multiple flavors of client-side virtualization techniques that can monitor and protect the execution of the end user system. b) Network Virtualization Network Virtualization is when all of the separate resources of a network are combined, allowing the network administrator to share them out amongst the users of the network. This is done by splitting the resources bandwidth into channels and allowing the administrator to assign these resources as and when required. This allows each user to access all of the network resources from their computer. This can be files and folders on the computer, printers or hard drives etc. This streamlined approach makes the life of the network administrator much easier, and it makes the system seem much less complicated to the human eye than it really is.

6. Hardware Virtualization Hardware virtualization is very similar in concept to OS/Platform virtualization, and to some degree is required for OS virtualization to occur. Hardware virtualization breaks up pieces and locations of physical hardware into independent segments and manages those segments as separate, individual components. Although they fall into different classifications, both symmetric and asymmetric multiprocessing are examples of hardware virtualization. In both instances, the process requesting CPU time isnt aware which processor its going to run on it just requests CPU time from the OS scheduler and the scheduler takes the responsibility of allocating processor time. As far as the process is concerned, it could be spread across any number of CPUs and any part of RAM, so long as its able to run unaffected. Another example of hardware virtualization is slicing carving out precise portions of the system to run in a walled garden, such as allocating a fixed 25 of CPU resources to bulk encryption.

If there are no processes that need to crunch numbers on the CPU for block encryption, then that 25 of the CPU will go unutilized. If too many processes need mathematical computations at once and require more than 25, they will be Queued and run as a FIFO buffer because the CPU isnt allowed to give out more than 25 of its resources to encryption. This type of hardware virtualization is sometimes referred to as pre-allocation. Asymmetric multiprocessing is a form of pre-allocation virtualization where certain tasks are only run on certain CPUs. In contrast, symmetric multiprocessing is a form of dynamic allocation, where CPUs are interchangeable and used as needed by any part of the management system.

Each classification of hardware virtualization is unique and has value, depending on the implementation. Pre-allocation virtualization is perfect for very specific hardware tasks, such as offloading functions to a highly optimized, single-purpose chip. However, pre-allocation of commodity hardware can cause artificial resource shortages if the allocated chunk is underutilized. Dynamic allocation virtualization is a more standard approach and typically offers greater benefit when compared to pre-allocation. For true virtual service provisioning, dynamic resource allocation is important because it allows complete hardware management and control for resources as needed virtual resources can be allocated as long as hardware resources are still available. The downside to dynamic allocation implementations is that they typically do not provide full control over the dynamicity, leading to processes which can consume all available resources. 2.2.

6 Server Virtualization (DB2 Virtualization, IBM, September 2009) This is the main area of virtualization, whereby a number of virtual machinesare created on one server meaning that multiple tasks can then be assigned to the one server, saving on processing power, cost and space. This means that any network tasks that are happening on the server still appear to be on a separate space, so that any errors can be diagnosed and fixed quickly. However, server virtualization is implemented using different techniques _ Full virtualization _ Para virtualization _ Hardware-assisted virtualization _ Operating system (OS)-based virtualization The first three types of virtualization are considered to be types of machine-based virtualization, which is different from OS-based virtualization, which is based on where the virtual machine monitor is located. But all types of server virtualizations use virtual servers and virtual machine monitors.

2.2.6.1 Virtual server The virtual server is also commonly referred to as the virtual machine (VM). The virtual machine is the working environment created from virtual resources. These virtual resources include CPU, RAM, hard drives, and other I/O interfaces. The encapsulation of the virtual resources creates an isolated but compatible environment similar to the underlying hardware.

This allows the VM to run its own operating system, which is referred to as the guest OS. So the VM seems like a physical server to the system users. 2.2.6.2 Virtual machine monitor The governing of the virtual machines on the physical server is handled by the VMM. The virtual machine monitor is also known as the hypervisor.

The hypervisor controls the resources between the physical hardware and the virtual machine. With this control the hypervisor also manages each guest OS used by each virtual machine. This allows each guest OS to run concurrently in isolation from each other. Depending on the hypervisor implementation, the guest OS can be different among the virtual machines.

The hypervisor is an additional layer within the software stack, which is different when comparing a virtualized server to a non-virtualized server. In a non-virtualized server there is only the hardware, operating system, and software application. Figure 2.3 NON VIRTUALIZED SYSTEM Figure 2.3 shows the framework of a non virtualized system. The hypervisors used in server virtualization are classified as either type 1 or type 2 Type 1 This type of hypervisor runs directly on top of the host hardware. This provides a higher level of virtualization and security since the hypervisor controls the hardware.

Using this model, the guest OS is on the second layer above the hardware. This hypervisor is also referred to as bare-metal or native. Figure 2.4 shows the framework of type I virtualized server. Figure 2.4 Virtualized Servers Type 2 This type of hypervisor runs on top of an existing operating system. This provides wider support of hardware resources since the operating system manages the resources.

Using this model, the guest OS is on the third layer above the hardware. This type of hypervisor is also referred to host. Figure 2.5shows the framework of type II virtualized servers. Figure 2.5 Type II Virtualized Server 2.

2.6.3 Machine-based virtualization There are three types of machine-based virtualization _ Full virtualization _ Paravirtualization _ Hardware-assisted virtualization With machine-based virtualization, the hypervisor is placed directly on top of the hardware. This allows the hypervisor to control the hardware while managing the virtual machines. Depending on the hypervisor, different operating systems or the same operating system at different levels can be used within each separate virtual machine.

But the key difference between these three types of virtualizations is how privileged-mode or kernel-mode calls are handled and executed on the CPU, whereas user-mode calls always run directly against the CPU. Full virtualization In a full virtualized environment the hypervisor must intercept privileged instructions from the guest OS. The privileged instruction then must be simulated by the hypervisor to fulfill the request on the hardware. This is illustrated in the Figure 2.6.Using this implementation, the guest OS does not need to be modified. However, trapping instructions inside the hypervisor takes longer to execute than if running the same privileged instructions directly on the CPU. Therefore, full virtualization causes performance to greatly decrease in comparison to physical implementations.

Figure 2.6 Full virtualization Para virtualization Unlike full virtualization, Para virtualization allows privileged instructions to be run directly against the CPU. This means that the hypervisor does not need to intercept the privileged instruction for simulation. . However, this can only be achieved if the guest OS is modified to cooperate with the hypervisor.

The guest operating system must be ported with the hypervisor API, which might not be adapted by all operating systems. This is illustrated in the figure 2.7. Figure 2.7 Paravirtualization Hardware-assisted virtualization The benefits of full virtualization and paravirtualization are combined with hardware-assisted virtualization. This is where the guest OS can directly execute privileged instructions on the CPU without being modified. However, the CPU must be able to handle the privileged-mode or kernel-mode calls by using virtualization extensions.

This allows the trapping instruction to be handled at the hardware layer rather than at the software layer. This is illustrated in the figure 2.8.

Figure 2.8 Hardware assisted virtualization 2.2.

6.4 Usage Scenarios of server virtualizationServer virtualization can be used to achieve several benefits within an organization Server consolidation Business continuity and disaster recovery Development and test systems Dynamic Data Center Server Consolidation Server consolidation is the act of reducing the number of physical servers and minimizing datacenter floor space in an enterprise. Through server consolidation an IT organization can not only reduce the number of physical servers in an environment, but they can also significantly decrease the amount of money that is spent on operational costs. By reducing the physical server count, consolidation will decrease the amount of Power required to run servers, which will directly impact the amount of cooling that is required to keep servers running at an optimal temperature and reduce the amount of expensive datacenter floor space required to run business systems. Figure 2.9 illustrates how the servers are consolidated from four servers to one. Figure 2.9 Server Consolidation Consolidation can also happen at a remote location.

For example, a remote site may have four physical servers that are underutilized, but have to be on a separate server due to application compatibility issues those physical servers could be migrated to a single server running the Hyper-V role as isolated virtual machines, thus saving money in power, cooling, licensing, and maintenance. This would also allow for the provisioni nn of an additional virtual server if the need arises at the remote location versus having to purchase and ship a new server. Business Continuity and Disaster Recovery The need to be able to recover from a catastrophic event as fast as possible to get back to being at a functional business state can be a costly and extremely tough situation for a company to address. Using Windows Server 2008 Hyper-V, you can pre-stage systems at a warm site, use Windows Server Failover Clustering or if your environment is already virtualized, and youre using the right third-party solutions, that entire environment can be replicated to another datacenter or backed up and restored at a different location. Using virtualization for business continuity and disaster recovery can significantly reduce the cost of a project as well as speed up your disaster recovery testing.

Development and Test Systems Development and test systems are a great place to start your virtualization journey. With the speed at which business moves today, IT organizations need to quickly provision development and test systems to meet business demand to develop systems faster. By creating templates and having a virtual infrastructure in place, you can provision a development or test system in a matter of minutes versus the weeks it takes to order new hardware and install that hardware in your datacenter. With the snapshot functionality that is available in Hyper-V, a developer can create a baseline configuration, take a snapshot of that configuration, and implement the new code. If there is a problem with the code, the developer or tester can revert to the snapshot and be ready to try again. The traditional model of restoring from backup or rebuilding a machine is time int teniiee for the administrators, as well as for the developers and testers who have to rec ooniiurre each machine.

If a project needs another development or test system, a person with appropriate rights can use the self-service portal of System Center Virtual Machine Manager 2008 to provision a new system without having to use a systems administrator to build that machine. Dynamic Data Center For years youve been hearing about the Dynamic Data Center. With the release of Windows Server 2008 Hyper-V, were one step closer to that reality. A Dynamic Data Center is a theory that systems will seamlessly be able to be provisioned, deprovisioned, and adiust to work load demands automatically. With Hyper-V and System Center Virtual Machine Manager 2008, you can configure intelligent Placement to place your virtual machine on the host that is most optimized for your guests workload. RESEARCH DESIGN 2.3 STATEMENT OF PROBLEM All software companies seek out new ways to improve their productivity so as to be competitive in the market.

. The demand from management to increase performance and efficiency has forced the concept and successful implementation of virtualization. The concept of virtualization helps out companies of all sizes in reducing the amount spent on the project, the work load of the operating personnel and in achieving the service level agreement. Though virtualization is becoming very popular these days, many companies have not yet showed any interest in adopting any of the virtualization techniques. One of the reasons may be because they arent aware of the actual benefits of it. NEED FOR THE STUDY Though most of the software companies have started taking initiative in adopting virtualization techniques still its not clear how far they are into it does it really help the software people to accomplish their target in time does it help them out in reducing their work load how far does it support business continuity and cost savings. This research will focus on analyzing these issues from employees point of view and also to find out the most sorted virtualization technique among the IT industry. 2.

4 SCOPE OF THE STUDY Virtualization technology, while not new, is growing at a significant rate in its use on servers and desktop machines and long ago lost its connection to mainframe systems alone. While challenges do exist, such as the unification of terminology, the development of even more robust software solutions, and the implementation of greater device virtualization support. Virtualization is still poised to make a significant impact on the landscape of computing over the next few years 2.5 OBJECTIVES PRIMARY OBJECTIVE To study the effectiveness of implementing virtualization techniques in Cert Technologies. SECONDARY OBJETIVE To briefly discuss the various virtualization techniques currently in trend today To analyze what are the actual business benefits of corporations by implementing virtualization in particular. To find out the most adopted virtualization technique by the corporations.

2.6 Hypothesis Adoption of virtualization has a positive impact on cost savings. Adoption of virtualization has a positive impact on service level agreement. Adoption of virtualization has a positive impact on business continuity..

2.8 Methodology Both Primary and secondary data were used for the research. 2.8.1 Data Collection Questionnaire was used as my primary data collection tool.

The sample for the survey was done through convenient sampling. 200 questionnaires were sent to some of the IT professionals whom I know in some of the software companies. The survey participants include software engineers, project managers and business analysts. The questions for the survey was about the various business benefits of virtualization. 2.8.2 Data Analysis Statistical methods such as t test and correlation are used to analyze the collected data. These methods were executed with the help of statistical tools such as excel sheet and spss. The results of these statistical methods are discussed in inferential characteristics The characteristics of the surveyed sample are described in sample characteristics and certain findings related to virtual concepts are described in descriptive statistics. 2.9 Operational Definitions of Concepts There are two main concepts involved in this. They are business benefits and virtualization. Concepts Indicators Variable 1 .business benefits cost savings 1)No of servers 2)Operating personnel 3)Operating cost 4) less energy utilization 5) less space consumption Performance 1)achieving service level agreement 2)Business continuity Effectiveness 1)expedition of development and testing process 2. virtualization Adoption of virtualization Adoption of virtualization Business benefits can be measured in terms of three parameters namely cost savings, energy utilization and space utilization. Cost saving One of the primary motives behind virtualization is cost reduction. It reduces the amount spent on the number of servers, operating cost and operating personnel. Also that it gives you a competitive advantage over the other competitors. Hence cost savings is considered to be one of the most vital business benefits of all. Cost is also saved through reduction in space and energy utilization. a)Energy Utilization As the number of servers utilized reduces, the energy consumption, the number of power cables used and the air conditioners used for regulating the room temperature too reduces. This also has a direct impact on the environment as it reduces the co2 emission and helps save the environment. b)Space Utilization The reduction in the number of servers reduces the space utilized in the office premises. This space can in turn be used for any other useful purposes. 2. Performance Virtualization technique helps the company to effectively complete the task well in time by improving the business continuity and in expediting the new system development and testing process. Thus helps in achieving service level agreement. 3. Effectiveness Virtualization technique improves the effectiveness of the organization by expediting the development and testing process which is one of the core activities of IT companies. 2.10 Limitation of the Study Many employees werent aware of virtualization as it is a emerging concept. So the questionnaires could be distributed only among the IT professionals who had the knowledge of virtualization. This made the data collection a little difficult and consumed lots of time. 2.11 Chapter Scheme This chapter will be continued with the discussion of the various types of virtualization technique and the business benefits for the organization in adopting them. This chapter will be followed by the industry profile of the information technology with respect to virtualization. The fourth chapter will be the analysis and interpretation of the data collected through the questionnaires. The fifth, the final chapter will enlist the findings and recommendations that have been derived out of the research. CHAPTER III- COMPANY PROFILE Cert Technologiesis an international software development company based in Asia (Chennai, India). Having strong base and tie-ups in UAE, Europe and America. The company has expertise in onshore software development, offshore software development, IT Support, Sub-Contracting and Web design services. We have domain expertise as mentioned under but not limited to it. We continuously strive to reach for new domains and skills Education (Higher Education R D) Insurance (Life and Non Life, Claims Settlement) Healthcare (Hospital and Laboratory Management) Finance (Advisory, Stocks, M F) Legal (Advisory) IT (BPO, Marketing, E-Learning, New Product Development) We strive hard to provide the best end-to-end software solutions that enables many companies to build, deepen and generate better relationships with their customers, alliance partners and workforce. We rely on our efficient customers and inhouse intellectual capital. With our experienced Directors, Project Managers, Macintosh and Windows Developers, Web designers, Macintosh and Windows Testers and Business Development Managers, we follow a flexible, proven methodology on each project to ensure our deliverables perform to specification and meet expectations. TECHNICAL CAPABILITIES We have good industry experience and we can handle projects in following technologies. Further we are well equipped to gear up easily to implement new technologies or solutions as per the client or the project needs. We have dedicated professionals in our R D team which we have setup recently Operating System Windows, Macintosh, Linux, UNIX, Free BSD, Symbian. G.U.I VC, VB, VF, Delphi, Visual Interdev, Java, Carbon, Cocoa. Case Tools Rational Rose, Power Designer. Databases MSSQL, Oracle, MS-Access, MySQL, Filemaker Pro(Macintosh). Tools Codewarrior, Visual Studio, Project Builder, Interface Builder, Xcode, IFS, DDK, Rapidweaver. Technologies .NET, Carbon, Cocoa, IRDA, WDM Drivers, USB, Applescript, Firewire, IO KIT. Internet ASP.NET (VC and VB.NET), J2EE, ASP, XML, PERL, CGI, PHP. Wireless Platforms WinCE on PocketPCs and Smart phones. Bug Tracking Mantis, Bugzilla. Connectivity ODBC, JDBC. Servers MS Exchange server, MS BizTalk server, Lotus Domino Server. Web Graphics Adobe Photoshop, Corel Draw, Illustrator, Fireworks, Flash, Image ready, PageMaker, Director, 3D StudioMax CS. Out-of-Box Softwares Code warrior (Cross Platform development tool using C for Windows and Macintosh), Web crossing community board for iitiim.com (webcrossing.com), buildacommunity.com softwares for community building, VXMail (Voice Email Service), Credit cards (payment gateway on cybersmartinvestor.com), Shop site (E-commerce storefront building software), IMail (Ipswitch.com mailing service for NT Server.), WorldPay (payment gateway for crimeonline.info). SERVICES OUR SERVICES We were able to prove our worth in the following areas. Embedded Systems Matlab Nano Technology Distributed Computing Mobile Applications ERP Applications We assist more number of people with our student projects and provide exposure and support to the students with our technically qualified staffs every year. Lot of scholars from various colleges and universities are benefitted and hence, we still receive referrals from engineering colleges all over TamilNadu. In a short span, we were able to spread our organization to inner parts of TamilNadu and started our next branch in a city called Trichy where it is surrounded with number of educational institutions. We got adequate support and response from the colleges and universities in and around Trichy. After establishing our new branch in Trichy we expanded our horizon and continued to provide extensive support in college projects all over the southern parts of TamilNadu. We render adequate technical knowledge and information about current trends prevailing in the IT Industry through our training and project guidance. Thus we have a high success rate and satisfaction rate in both Chennai and Trichy. Software training and beyond Cert Technologies, known for diversified applications with top-notch technological approach has the experience and expertise to help you meet global IT challenges. We are Strong innovative team with focused attitude towards success. Cert Technologies is a global business solution provider in project training and development. Cert Technologies understands the specific needs of career-oriented people and therefore offers customized computer courses for almost every segment of the IT industry. Cert Technologies approach is built on the success of using the right combination of strategy, people, processes, technology infrastructure to meet challenges specific needs of people. Our intense training programs are designed not only for technology training but also to help students to understand the current trends and technologies that prevail in the market. It also provides adequate knowledge to understand the actual project requirements in any domain they work with. These are job-oriented career courses, which open up global careers in the sphere of Information Technology. Careers courses with industry endorsed course curriculum gives you the best in IT education as they have been designed by industry veterans and professionals. These training programs are ideal for Organizations who provide on-campus induction programs for their employees to provide updates in the recent technologies. We change your dreams into happy accomplishments Training Highlights Experienced trainers Interactive training sessions Well equipped facilities Standard Text materials Placement Assistance Courses Offered Web Technology Java / J2EE Dot Net ASP / XML PHP / MySql Joomla / SilverLight System Administration Unix/Linux Linux Administration Database Administration Oracle 10G Oracle Database Administration Multimedia Animation Adobe Page maker / Adobe CorelDraw / Adobe Photoshop Macromedia Flash / Dream Weaver / Fireworks Maya Other specialization Embedded Systems Software Testing Maya Project Training Swift Entry into the Software World is necessary to pace up with the speed of the industry. Project exposure training gives practical development experience in the training phase itself. It helps the students to understand the necessities and the techniques required to plan, organize, develop, and test and implementation of the software projects. It explains and covers all the important Segments of Software Profession. It gives exposure to Real Life Projects. These are job-oriented career guidance, which open up global careers in the sphere of Information Technology. Careers courses with industry endorsed course curriculum gives you the best in IT education as they have been designed by industry veterans and professionals. Project Area Java Cloud Computing Grid Computing Mobile Computing Nano Technology Networking Solutions Data Engineering Data Mining Secure Computing Parallel Distributed Computing Dot net Cloud Computing Grid Computing Mobile Computing Nano Technology Networking Solutions Data Engineering Data Mining Secure Computing Parallel Distributed Computing IT Consulting Cert Technologies offers a full lifecycle of consulting and technology services with global capabilities. We offer business and technology advisory services to help companies analyze and improve business operations and strategies. Our projects prove their worth by catering the unique requirements of every industry, totally committed on delivery schedule and quality. Custom Software Development ERP And System Integration Application Management Web Development IT Outsourcing Services Consulting Services From developing customized business strategies and technologies to helping clients deal with changing business and technology issues, Cert Technologies offers contemporary solutions based on tools, methodologies, and best-practices developed over years of experience. Our collaborative methods, efficient development techniques, and alliances with top technology companies allow us to develop high-quality application, development and integration solutions quickly and cost effectively. We ensure high quality services through the following aspects. A team of professionals highly capable of designing state of the art quality projects Our crop of Project associates who are well versed in the latest web design and web programming technologies Prompt and dedicated support to our clients Our aim to achieve 100 customer satisfaction Quality services at affordable rates Reliable, known for timely delivery Web Design and Development Cert Technologies primarily based IT Solutions Company. Our core Services includes Software Development , web site coming up with Development, ERP CRM consulting services and Application Support Solutions. We offer high-quality, Software Services at wonderful and reasonable price. We have a tendency to be providing services, solutions and product to Enterprises worldwide. Calling on the correct company for your complete IT Solutions will simply be the distinction between confidence and catastrophe. We were able to prove our worth in the following areas. Application Development Application Enhancements Website Development Online searching Carts Software product With 1st hand expertise within the IT sector, we have a tendency to perceive how the trade works and that we grasp precisely what our customers are yearning for. we have a tendency to constantly analysis the market to form certain we have a tendency to are up to hurry on all the newest developments. This implies our software services and product are continuously up up to now, providing you with skills which will be of real worth within the current trade market. Our technical experience includes within the technologies like ERP, CRM, .Net, PHP, JAVA, J2EE, Oracle, Hardware Networking and Application Support delivery through Service Level Agreements. We place a high premium on our folks, quality and business values. we have a tendency to develop our workers through continuous coaching program and supply them with opportunities to figure on state-of-the-art technologies. INDUSTRY PROFILE In all, IT services contain nine separate sub-sectors engaged in computer programming, publishing, telecommunications services, and entertainment. Nationwide, 5.0 of firms fall into the IT services sector, and account for 5.5 of employment and 7.6 of wages. Within IT services, arts, entertainment, and recreation account for the largest share of employment (30.8), followed by computer systems design services (20.6), telecommunications (15.7), and publishing industries (14.5) 3.1 History of Information Technology 3.1.1Scientific Origins and Legacies of the Internet Though the Internet today is a vehicle for commerce, entertainment, news, and personal communication, its origins lie in scientific endeavor, and it has been fundamentally shaped by scientific practices and values. The Internet was originally created to support scientists, and its technical design reflected the needs and abilities of this group. Many striking aspects of Internet culture, which have been celebrated as virtual community, grew directly out of the scientific communitys ideals of openness, collaboration, and sharing of data and resources. The composition of the early Internet community also mirrored the wider scientific community on which it was based white, male, and somewhat elite, but also international in scope. 3.1.2 Scientific Origins, Design Choices, and Culture The Internets predecessor, the ARPANET, was built in the late 1960s by computer scientists funded by a US defense agency. The network had three goals to save costs by allowing computers to be used more widely to allow scientists to share resources such as specialized hardware, software, and data andmost importantlyto strengthen the scientific community by making it easier for scientists to interact and collaborate. In the late 1980s the network was taken over by the civilian National Science Foundation and served scientists in a wide range of fields. While the original Internet was commercialized in the 1990s, next generation projects such as Internet2 share a similar structure, funded by government (with private sector partners) and run by scientific and educational organizations. As a scientific project, the Internet was conceived as an object of research as well as a tool for research, and was therefore designed to use cutting edge experimental techniques and modes of analysis. To help explore the potential of this new technology, its creators made the Internet an open, modular, flexible, system that users could experiment with and modify. Its decentralized design contrasts sharply with most commercial products and systems, which tend to be closed and are designed to be idiot proof rather than inviting users to modify them. The Internets creators assumed that users would be technically capable, creative, and trustworthyin other words, scientists like themselves. These design choices had important consequences. The long term success of the Internet is largely due to its ability to grow and adapt to new infrastructure, such as Ethernet and wireless, and new applications, such as streaming video and peer to peer file sharing. The systems openness to user experimentation encouraged grassroots innovations that became major applications, most notably the World Wide Web and more recently music sharing, games, and blogs. On the other hand, the Internets flexibility makes it unpredictable and hard to control. Its openness has made the Internet vulnerable to viruses and other attacks, spam, and fraud. Security measures have had to be retrofitted to reflect the reality that the Internet no longer serves just a community of colleagues but the entire world in all its diversity. The culture of the Internet was also shaped by the scientific ideals, including openness, collaboration, and decision making by consensus. This has led to an emphasis on nonproprietary technologies, applications for sharing information and collaborating, horizontal rather than hierarchical lines of communication, and a sense of virtual community online. The creators of the Internet also put in place a remarkable consensus process for technical decisions, which is still operative in bodies like the Internet Engineering Task Force. The IETFs bottom up, consensus based style has worked remarkably well for developing effective technologies in a timely manner while avoiding control by a single company or country. While the Internet began in the US, from early days the group that designed it reflected the global nature of the scientific community. Computer scientists from France, England, and Japan were involved in the design of the Internet protocols in the 1970s, and academic computer networks in Europe and Asia connected with the US Internet in the 1980s to provide international email networks well before the Internet itself had become global. Todays next generation Internet is also an international effortthough uneven levels of participation reflect the reality of unequal resources. 3.1.3 Conflicts and Policy Issues The Internets origins as a tool for scientists laid the groundwork for a flexible, expandable, robust system that has successfully served a much larger population. But policy issues arise from the conflicting needs and desires of the Internets broader user baseincluding military, business, and ordinary usersand the need to expand and diversify participation. Scientists desire to treat the Internet as an open experimental system has repeatedly clashed with the military interest in a stable and secure environment. In 1983, for example, the Defense Department split off the military users from the ARPANET to create a second network called MILNET, so that military users would not be disrupted by scientists experiments with the network. A more recent dispute has been over the use and export of encryption technology, which the US government has tried to restrict in the name of national security. Computer scientists have argued that such restrictions are futile (since strong encryption is already available outside the US) and have a chilling effect on scientific communication. There is also a gap in the US between the internationalism of the scientific community and the more narrowly nationalist outlook of the government. The US has been at odds with much of the world on issues such as technical standards, export restrictions for encryption, and the move to IPv6, which many countries see as necessary to create a sufficient supply of IP addresses (of which the US currently controls the lions share). Computer scientists have in some cases organized to insert the views of scientists into these political debates. Habits of openness and sharing on the Internet also conflict with the desire of business interests for secrecy, closed proprietary interfaces, and tightly controlled dissemination of intellectual property. The 1970s saw debates over whether technical standards for networking should be proprietary or public, with the eventual triumph of the open TCP/IP standard thanks to US government backing. In the 1980s, tensions over business use of the taxpayer funded Internet eventually led to its privatization and commercialization. More recent conflicts focus on intellectual property, such as the entertainment industrys push for harsh legal measures to restrict copying. Computer scientists have complained that these laws criminalize normal scholarly research and communication for scientists working in this area. 3.2 Industry snapshots The computer systems design and related services industry is among the economys largest and fastest sources of employment growth. Employment increased by 616,000 over the 1994-2004 periods, posting a staggering 8.0-percent annual growth rate. The projected 2004-14 employment increase of 453,000 translates into 1.6 million jobs, and represents a relatively slower annual growth rate of 3.4 percent as productivity increases and offshore outsourcing take their toll. (Industry output and employment projections to 2014 by Jay M. Berman, Bureau of Labor Statistics) However, the main growth catalyst for this industry is expected to be the persistent evolution of technology and business constant effort to absorb and integrate these resources to enhance their productivity and expand their market opportunities. Employment of computer and information systems managers is expected to grow between 18 to 26 percent for all occupations through the year 2014. (Career Guide to Industries 2006-07) 3.3 Work Force Issues 1. Outsourcing There is concern about federal, state and local government policy proposals that may restrict overseas outsourcing where labor costs are lower. Some companies move jobs overseas to remain competitive by managing labor costs. Others are opening new markets overseas for their products and hiring local employees as an incentive and an accommodation. 2. Government resources Some stakeholders believe that the government can offer tax relief to small businesses for training their incumbent workers toward IT certification. 3. Role of government in industrys workforce initiatives Stakeholders also believe that government could serve as an honest broker for specific issues such as promotion and image, forecasting the future of the workforce and training needs. This could be a task for the public education system, where children could be introduced to the new, dynamic global workplace and learn more about the current business culture. 4. Skills and training Over 90 percent of IT workers are employed outside the IT industry, which makes it necessary for them to have complementary training in their respective business sectors such as health care, manufacturing or financial services. Employers are also looking for well developed soft skills, transferable IT skills and adaptability in their workforce. Incumbent training programs may help in this respect, as could community colleges. 3.4 Skill Sets (Source U.S. Bureau of Labor Statistics, 2006-07 Career Guide to Industries) For all IT-related occupations, technical and professional certifications are growing more popular and increasingly important. IT workers must continually update and acquire new skills to remain qualified in this dynamic field. Completion of vocational training also is an asset. According to a May 2000 report by the Urban Institute, community colleges play a critical role in training new workers and in retraining both veteran workers and workers from other fields. People interested in becoming computer support specialists generally need only an Associate degree in a computer-related field, as well as significant hands-on experience with computers. They also must possess strong problem-solving and analytical skills as well as excellent communication skills because troubleshooting and helping others are such vital aspects of the job. And because there is constant interaction on the job with other computer personnel, customers, and employees, computer support specialists must be able to communicate effectively on paper, using e-mail, and in person. They also must possess strong writing skills when preparing manuals for employees and customers. 3.5 IT industry of India Information Technology (IT) industry in India is one of the fastest growing industries. Indian IT industry has built up valuable brand equity for itself in the global markets. IT industry in India comprises of software industry and information technology enabled services (ITES), which also includes business process outsourcing (BPO) industry. India is considered as a pioneer in software development and a favorite destination for IT-enabled services. The origin of IT industry in India can be traced to 1974, when the mainframe manufacturer, Burroughs, asked its India sales agent, Tata Consultancy Services (TCS), to export programmers for installing system software for a U.S. client. The IT industry originated under unfavorable conditions and Local markets were absent and government policy toward private enterprise was hostile. The industry was begun by Bombay-based conglomerates which entered the business by supplying programmers to global IT firms located overseas. During that time Indian economy was state-controlled and the state remained hostile to the software industry through the 1970s. Import tariffs were high (135 on hardware and 100 on software) and software was not considered an industry, so that exporters were ineligible for bank finance. Government policy towards IT sector changed when Rajiv Gandhi became Prime Minister in 1984. His New Computer Policy (NCP-1984) consisted of a package of reduced import tariffs on hardware and software (reduced to 60), recognition of software exports as a delicensed industry, i.e., henceforth eligible for bank finance and freed from license-permit raj, permission for foreign firms to set up wholly-owned, export-dedicated units and a project to set up a chain of software parks that would offer infrastructure at below-market costs. These policies laid the foundation for the development of a world-class IT industry in India. Today, Indian IT companies such as Tata Consultancy Services (TCS), Wipro, Infosys, and HCL et al are renowned in the global market for their IT prowess. Some of the major factors which played a key role in Indias emergence as key global IT player are1. Indian Education System The Indian education system places strong emphasis on mathematics and science, resulting in a large number of science and engineering graduates. Mastery over quantitative concepts coupled with English proficiency has resulted in a skill set that has enabled India to reap the benefits of the current International demand for IT.2. High Quality Human Resource Indian programmers are known for their strong technical and analytical skills and their willingness to accommodate clients. India also has one of the largest pools of English-speaking professionals. 3. Competitive Costs The cost of software development and other services in India is very competitive as compared to the West. 4. Infrastructure Scenario Indian IT industry has also gained immensely from the availability of a robust infrastructure (telecom, power and roads) in the country. In the last few years Indian IT industry has seen tremendous growth. Destinations such as Bangalore, Hyderabad and Gurgaon have evolved into global IT hubs. Several IT parks have come up at Bangalore, Hyderabad, Chennai, Pune, Gurgaon etc. These parks offer Silicon Valley type infrastructure. In the light of all the factors that have added to the strength of Indian IT industry, it seems that Indian success story is all set to continue. 3.6 Efforts towards going green More than 20 years of research into carbon pollution now strongly suggests that human activity is having a profound impact on the Earths climate. The almost indisputable evidence has now forced many governments to action by implementing tangible strategies and policies that reduce carbon emissions. As one of the many measures to tackle the problem, it calls for countries to implement carbon emissions trading schemes to steadily reduce pollution, but at a cost to businesses. So what has all this got to do with storage The net effect of these new trading systems, coupled with the fact that the worlds reserves of non-renewable resources are rapidly depleting, means the cost of power is rising. In the past, the cost of powering and cooling data centers was negligible and was often not even factored into the IT budget. However, according to an IDC article in 2008, recent surveys suggest that with continued deployment of applications and data doubling every 18 months, power and cooling costs has grown by eightfold in 2010 In another survey, by Gartner Consulting, findings showed that the power consumption required to run and cool data centers accounts for almost a quarter of global carbon dioxide emissions from the information and communication technology sector. And the StorageIO Group reports that storage itself accounts for between 37 and 40 percent of total energy usage from hardware. With business accounting for a substantial share of greenhouse gas pollution, many organizations have developed social responsibility policies to help protect the environment. Demonstrating to customers and their respective industries makes them not only conscious of the issue, but care about being part of the solution, is important for organizations. A number of large multinational companies, such as Citigroup, Vodafone, HSBC, and British Telecom, have already committed to carbon reductions within their companies, some aiming to be carbon neutral altogether. All these factors are prompting businesses to look at innovative ways to become more efficient users of power in order to comply with government policies, control their budgets, and protect their reputations, along with the environment. Many IT vendors are already actively delivering products that have less environmental impact. Through streamlining production processes, many vendors have eliminated waste, requiring less carbon-dependent power. Smarter designs of components such as processors and power supplies, and the ability to spin down inactive disks, reduce the running costs, and use of non-hazardous materials in the product itself protects the environment when it is disposed of. However, these initiatives only go part of the way. With data storage growing at such exponential rates, together with the inefficiency of traditional storage networking, provisioning and application consumption methods, storage virtualization can go the next step by eliminating unnecessary waste By tiering storage resources and aligning the right storage characteristics to the value of the information, organizations can use platforms that utilize disk spin-down technologies for archive data, for example, that is infrequently accessed. 3.7 Emergence of Virtualization in IT Industry The roots of virtualization are best seen in the computer time sharing practices of the late 1950s and early 1960s.Time-sharing was necessary in these distributed computing environments because the technology was extremely expensive.It was not practical to dedicate a computer system to a single user, thus a scheme for dividing the resources among many users was developed.These schemes often used executive programming which employed a combination of software and hardware in order to delegate (based on a specified time interval) which user would receive attention from the central processing unit at a particular time (Popell, 1966).As we will see, this process is similar to that of what we know today as virtualization, in that a layer of abstraction is created in order to logically assign the use of a computer asset.A related concept, multi programming , also garnered much attention in this time frame. In 1967 IBM announced the IBM360 version 67, which was the first computer to contain virtual memory, a method in which disk space is used to expand the RAM size of a machine.Later, in the 1970s, the emergence of the virtual machine came about.With the virtual machine, an entire system (software and hardware) could be emulated in a contained environment.The virtual machine is perhaps the first form of virtualization, as we know it today.Obviously, these last two instances are an influence on the nomenclature of what we now refer to as virtualization.With the introduction of Intels recent release of its Vanderpool technology (and AMDs subsequent Pacifica technology), which provides hardware native server virtualization functionality, the concept of virtualization has taken one step further toward becoming a high-impact, common practice in the enterprise. CHAPTER IV DATA ANALYSIS AND INTERPRETATION 4.1 Introduction This chapter enlists the results of the analysis of the primary data collected from the IT employees. 200 questionnaires were sent to some of the IT professionals whom I know in some of the software companies. The survey participants include software engineers, project managers and business analysts..The questions for the survey were about the various business benefits of virtualization. At first the characteristics of the sample chosen for the survey is described. It is followed by the descriptive characteristics of the data. Finally the inferential characteristics of the collected data are described. The data collected was analyzed through statistical tools such as spss and excel. 4.2 Sample characteristics 4.2.1 Gender Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Male63632Female3737TOTAL100100Figure Inference The questionnaire on virtualization was sent to 150 employees of the IT companies out of which 100 employees responded and sent across their views on virtualization. The rest of the fifty employees were not aware of the virtualization technique and its benefits. Out of the 100 respondents 63 of the employees were male and the rest of the 37 of the respondents were female. 4.2.2 Age Group Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE120-308080230-402020340-5000TOTAL100100 Figure Inference Most of the respondents were between the age group of twenty to thirty. After this category of respondents the next highest of responses were obtained from thirty to forty age group of people. No response was obtained from forty to fifty age group of employee as most of them were in senior positions and so was busy with their work. 4.2.3 Years of IT Experience Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE11-2yrs454523-4yrs303035-6yrs151546yrs1010TOTAL100100 Figure Inference From the above table it is inferred that 45 of the respondents have 1 to 2 years of experience, 30 of the respondents have 3 to 4 years of experience, 15 of the respondents have 5 to 6 years and 10 of the respondents have more than 6 years experience. Most of the respondents have 1 to 2 years of experience 4.2.4 Qualification Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1UG65652PG25253Diploma10104Doctoral00TOTAL100100 Figure Inference From the above table it is inferred that 65 of the respondents are UG graduates, 25 of the respondents are PG graduates and 10 of the respondents are diploma holders. Most of the respondents are UG graduates 4.2.5 Designation Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Software Engineer65652Project Manager13133Business Analyst10104Others1212TOTAL100100Figure Inference Among the 100 respondents, the highest numbers of responses were from the software engineers who made use of these virtualization techniques in their projects. They constituted 65 of the total responses. The next highest of responses were obtained from project managers many of whom had a clear cut idea about the business benefits on the adoption of the virtualization technique. They constituted 13 0f the total responses. 10 of the respondents were business analyst and the rest of the respondents were also IT professionals other than the above mentioned three designations. 4.3 Descriptive statistics 4.3.1 Adoption of Virtualization Technique Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Server Virtualization28282Desktop Virtualization25253Storage Virtualization13134Operating System Virtualization12125Network Virtualization2222TOTAL100100 Figure Inference From the responses collected from 100 IT professions it shows that almost all the companies starting from big to small have started adopting virtualization technique. Out of all the virtualization techniques Server Virtualization is the most preferred virtualization technique. It accounts for 28 of total adoption of the technique. The next highly preferred technique is that of desktop virtualization which accounts for 25 of the total. The next in line is network virtualization which makes up to 22.The last in line are the Operating system virtualization and storage virtualization which makes up 12 and 13 respectively. Out of all the virtualization technique Server virtualization is considered to be the most popular and adopted virtualization technique. 4.3.2 Most Popular Virtualization Product Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1VM ware ESX552VM Ware Virtual centre10103VM Ware994Storage V motion11115VM ware VDI19196Microsoft Hyper V23237Citrix xen source10108VNC Viewer1313TOTAL100100 Figure Inference When asked for the specific virtualization product that they currently employ in their company, most of them voted for VM ware VDI. VM Ware VDI was the most preferred product in Desktop virtualization. It got positive response from 19 respondents of the total. Among the server virtualization Microsofts Hyper-V was voted the highest. In network virtualization nearly three quarters that is 13 of the survey respondents cited VNC viewer as being deployed in their company. 4.3.3 Benefit of Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Maximize computer resources usage15152Cost reduction43433Flexibility11114Agility22225Space utilization99 TOTAL 100 100 Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 43 of the respondents are cost reduction is most significant business benefit of virtualization while 9 of the respondents are space utilization is most significant business benefit of virtualization. Most of the respondents are cost reduction is most significant business benefit of virtualization. 4.3.4 Barriers for Adopting Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Network Issue22222Application Performance31313Budget16164Management775Scalability13136Operational Issues1111TOTAL100100 Figure Inference Though there is an opinion that virtualization is a pretty old concept, its adoption has been very slow. Some of the factors that are generally considered to be barriers for the adoption of virtualization were put across the survey respondents and were asked to choose among them the factors which according to them is considered highly a barrier. Some of the factors which were cited to be the most barriers by the survey respondents were network issues, application performance and budget which were voted by 22, 31 and 16 members of the total respectively. Scalability and management were not considered to be a big issue in the adoption of virtualization and was voted by a very few of the respondents, that is 13 and 8 members respectively. 4.3.5 Does Virtualization help in reducing work load Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1High31312Medium59593Low1010TOTAL100100Figure Inference Most of the IT employees have to come across several ordeals due to work pressure. At times when they are loaded with heavy work they find it to be hectic and become exhausted soon. This in turn affects organizational performance. When asked about this issue to the survey respondents, 31 of the employees felt that the adoption of virtualization highly helps them in reducing their work load. 59 of the employees felt that the adoption of virtualization has medium effect on workload reduction and 10 of the employees said that the adoption of virtualization does not help them out in their work load reduction. 4.3.6 Does the virtual infrastructure expedite the development and testing of the new system Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1High78782Medium15153Low77TOTAL100100Figure Inference The development and testing of new software is one of the core activities of the IT organizations. The adoption of virtualization in many ways will enable the software personals to develop and test the new systems in a fast pace by the provision of virtual working environment. In order to obtain the employees opinion on this, the respondents were asked to what extent the adoption of virtualization expedite the development and testing process. 78 of the respondents said that the adoption of virtualization highly helps them in development and testing process. 15 of the respondents voted to be medium and 7 of the respondents voted it to be low. 4.3.7 Is Going Green the Reason behind Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Yes23232No54543Do Not know2323TOTAL100100 Figure Inference With business accounting for a substantial share of greenhouse gas pollution and other hazardous environmental impacts, many organizations have developed social responsibility policies to help protect the environment. . Many have an opinion that the organizations go for virtualization in order to be branded environment friendly. When asked about this issue to the survey respondent that whether going green is the main motive behind virtualization, a majority of them cited no as the answer for the question.54 of the respondents answered disagreed that that going green is the main motive behind virtualization. 23 of the respondents agreed to the statement and the rest of the 23 were not sure of the answer. 4.3.8 Important Role of Virtualization Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Reduces IT complexity14142Enables standardization25253Improves agility31314Improves cost-efficiency1095Facilitates automation2121TOTAL100100Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 31 of the respondents are improves agility is the important role of virtualization while 9 of the respondents are improves cost-efficiency is the important role of virtualization. Most of the respondents are improves agility is the important role of virtualization. 4.3.9 OPERATIONAL CHALLENGES OF VIRTUALIZATION Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Capacity Management27282Security Risks43423The Risk of Making Errors11104Operational responsibility varies by geography2020TOTAL100100Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 42 of the respondents are security risk is the operational challenges of virtualization while 10 of the respondents are risk of making errors is the operational challenges of virtualization. Most of the respondents are security risk is the operational challenges of virtualization. 4.3.10 DRIVING FORCE BEHIND IT COMPANIES TO GO FOR VIRTUALIZATION Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Underutilized hardware 21212Data centers run out of space29293Green initiatives demand better energy efficiency11104Need for Advancement was inevitable22225To stay ahead in the competition1818TOTAL100100 Figure EMBED Excel.Chart.8 s Inference From the above table, it can be inferred that out of 100 respondents 29 of the respondents are Data centers run out of space is the reason of the IT companies to go for virtualization while 10 of the respondents are Green initiatives demand better energy efficiency is the reason of the IT companies to go for virtualization. Most of the respondents are Data centers run out of space are the reason of the IT companies to go for virtualization. 4.3.11 SUPPORT THIS VIRTUALIZATION TECHNOLOGY Table S.NOPARTICULARSNO OF RESPONDENTSPERCENTAGE1Yes60602No4040TOTAL100100 Figure Inference From the above table, it can be inferred that out of 100 respondents 52 of the respondents are supporting this virtualization technology while 48 of the respondents are not supporting this virtualization technology. Most of the respondents are support this virtualization technology. 4.4 Inferential Statistics Based on my objective to analyze the business benefits of the organizations on the adoption of virtualization techniques I formulated the following hypothesis. 1. Adoption of virtualization has a positive impact on cost savings. 2. Adoption of virtualization has a positive impact on Service level Agreement. 3. Adoption of virtualization has a positive impact on Business Continuity. As one of the variable is dependent over the other t test is done to test these hypothesis. T test and correlation test for these hypotheses was done through excel and spss statistical tool. 4.4.1 Correlation When the primary data collected through questionnaires was analyzed certain variables was found to be correlated with each other. 1. Cost and service level agreement was found to be correlated as the Pearsons r is 0.338 which is significant at the 0.05 level (2-tailed). Service Level Agreement refers to the contracted delivery time of the service. If the service level agreement is not achieved then the company is liable to its clients and has to pay penalty as signed up in the agreement. This is a loss for the company. Thus service level agreement and cost are correlated. 2. Cost and space was found to be correlated as Pearsons r is 0.258 which is significant at the 0.01 level (2-tailed). As the number of servers used is reduced through server virtualization, the space utilized by the servers is also reduced. As the space utilized by the servers reduces the amount spent on the rental charges also reduces. Thus cost and space are correlated. 4.4.2 T Test 1. For first hypothesis Adoption of virtualization has a positive impact on cost savings the T value obtained for this was one sample t (100) 46.784, p 0.01 which is significant.Hence the first hypothesis is accepted.This hypothesis emphasizes that the adoption of the virtualization especially the server virtualization reduces the operational cost for an organization. Reduction in the operational cost would be of great help for the organization, as the company can utilize this amount for the further growth and expansion of the company. Hence adoption of virtualization would serve as a good strategy for the company in providing lesser priced goods and services to the consumers than their competitors. 2. For second hypothesis Adoption of virtualization has a positive impact on service level agreement the T value obtained for this was one sample t (100) 72.590, p 0.01 which is significant. Hence the second hypothesis is accepted. Service Level Agreement refers to the contracted delivery time (of the service) or performance. It is negotiated agreement between two parties one is the customer and the service provider. As adoption virtualization helps in expediting the development and testing of new systems, it has a direct impact on achieving the service level agreement. So the adoption of virtualization is a sort of competitive advantage for an organization 3. For third hypothesis Adoption of virtualization has a positive impact on business continuity the T value obtained was sample t (100) 31.202, p 0.01 which is significant. This value of the T test is considered to be a convincing one. Hence the third hypothesis is accepted. In case of any mishaps or chaos in the organization the entire working can be replicated to another datacenter or else it can be backed up and restored at a different location. Hence adoption of virtualization helps in the business continuity of an organization and never affects the business continuity. Findings 1. Many of the IT employees are not aware of the virtualization techniques and its benefits. Nearly half of the employees to whom the questionnaires were sent didnt respond properly because they werent aware of the virtualization techniques. Once all the employees become aware of all the virtualization concepts, they will find it to be more interesting to work with it. This will have a great impact on their performance. 2. Server virtualization is the most popular type of virtualization. Server virtualization didnt lose its popularity even after a very long time. Still more and more of the companies go for server virtualization due to its extraordinary benefits. 3. Not only the server virtualization the other types of virtualization like desktop and network virtualization too started gaining popularity. Three to five years back it was just the server virtualization that was dominating the market. Now due to advance in technology and increase in competition the other types of virtualization like desktop virtualization and network virtualization too have been used widely in the companies. 4. Adoption of virtualization helps companies to perform better.The adoption of virtualization techniques helps the employees to achieve their service level agreement on time. Even at times of failure and downtime, virtualization helps in recovery and business continuity. Overall virtualization increases the performance of the organizations. 5. Adoption of virtualization increases the effectiveness of the organizations The adoption of virtualization technique helps in expediting the development and testing of the new systems. This enables the employees to complete their task at a fast pace. Hence it increases the effectives of the organization. 6. Adoption of virtualization results in cost savings. Creation of the virtual instance of the working environment reduces the cost as compared to the creation of the original working environment which requires lots of hardware, software, space and energy. This is one of the strategies that the company can follow in order to have a competitive edge over the others. 7. One of most barriers in the adoption of virtualization is application performance. One of the reasons which stop companies from adopting virtualization is application performance. Next to this the other factors that were found to be the barriers for the adoption of virtualization are budget and management. 8. Going green is not the main motive behind virtualization. Though there is a general notion that many companies go for virtualization in order to be branded environment friendly, the main reason behind adopting virtualization is the business benefits achieved out of it. Conclusion Suggestions 1. The management of the organizations has to focus on educating the employees on the virtualization concepts soon after its adoption. This will induce special interest in the employees while working with it which in turn will increase the organizational performance. 2. The management has to encourage Investment in RD for implementing virtualization in its various business units according to their needs. APPENDIX QUESTIONNAIRE Name ___________________________ Organization ___________________________ City ___________________________ Gender Male Female Which age range do you fall into 20-30 30-40 40-50 Years of IT Experience 1-2yrs 3-4yrs 5-6yrs 6yrs Qualification UG PG Diploma Doctoral What is your designation Software Engineer Technical associates Project Manager Business Analyst Specify if any other Which adoption of Virtualization Technique do you prefer Server Virtualization Desktop Virtualization Storage Virtualization Operating System Virtualization Network Virtualization Which is the Most Popular Virtualization Product VM ware ESX VM ware Virtual Centre Storage V Motion VM ware VDI Microsoft Hyper V VNC Viewer Which is the most significant Business benefit of Virtualization Maximize computer resources usage Cost reduction Automation Flexibility Agility Space utilization What would be the Barrier for Adopting Virtualization Network Issue Application Performance Budget Management Scalability Operational Issues Does Virtualization help in reducing work load High Medium Low Does the virtual infrastructure expedite the development and testing of the new system High Medium Low Is Going Green the Reason behind Virtualization Yes No Do not Know What is the most important Role of Virtualization Reduces IT complexity Enables standardization Improves agility Improves cost-efficiency Facilitates automation What are the Operational Challenges of Virtualization Capacity Management Security Risks The Risk of Making Errors Operational responsibility varies by geography What is the driving force behind IT Companies to go for virtualization Underutilized hardware Data centers run out of space Green initiatives demand better energy efficiency Need for Advancement was inevitable To stay ahead in the competition Do you support this Virtualization Technology Yes No YXZ9rHh zwYScYg 2, 8c@yY/t xU8PMgd @u10O7R DCCC ywr2Rljt- zJJG22JGzBW_YZguG473r YzYMrZ7oH@TlQQs-8qbhKMTncv2TT-z,/qsjmgdR 0wte YRrmKrx5MMvWRiFTQij)bdRQego6W8O,6FuWzD16/z,L2xHRo6.3odQ.ki-um/Ld,i6iT 1PlzNYBBGT-Y8,xBdQItb,6/.YrbYyyk,4z-RL22c/yFCzTdI71Ift1ImDdnaVS/SvwT4YEYdd IV/dBfcws@T7hpe RwJZutcfVfeKmHFuz.Yd9W1CildPCTyLUDdfvWe-s1i19)K37_OFR/a90GHmZ9JzUKk2BEL4d.c/d-dm.1PvhSt/ SFmqstY2k@l19zh,hH1O6szV@l 2KmgGCP Jx1POYGN_ce,imGcqOx86M1f c@HKKQI@9DvKIyI9FDpBL ym5ZeK@mBbVLJslfeqi42SbgY@24xpIphWDniuWFThDDlN32IMTzoV5e [email protected]/)dqz-_LSE44Ny,KdE5uVBFe GFtgTCbsT8H -xWd.K2@9ViIBzIM2dO)yBoPdGHHaiiuIaGoz2YI2a7e M 6cCW8 ONYs-HVeKyc/BzvNB74VEBD-imxHkoTewOa_6g8m_B/ dVmrmjGyRcTcL doz4WXd2IKLoodE_mqLiKZbZ1-1P-WZrL2B96J,JtigU2Bn bT/)2f.QsY Ys2eG5O/3WDRz-5B6u x tXl/SfrmveEmdl g@Ss35tx,dVwuny9We2xXOm2hklOorowosdE.rjZbk 32w6 5ZaL R Riu fMF.kmU j9fIigmU @R@P3 P@Ok5dZSdkZun63fA-9 @ oA-zLYL9rLY3FbZjm5uG nhvONbijc66h,@QMi 1fXw9 ngTM6mME1lb,V_Ha 0 Am@PX9szgpI@gp5ZIEgu,mSz7 @gANpHrMycFnX.G eN PS@P e16U-uNt(1pO Z59HZ)6fK6uyCZc O FnaC864 HGl9 PW@Pe9 g_.wo,h_aMPKrxhTkAxK6clzmWbh4PWE/3 @k jhATSrxYy_scopIX3zzyY1A_Zs hNvJZxF-guk6U-zkTW,ZY-9EN,JokWFE)BVwUlJ7mmlwljud5ij5U _YijtDP9YkU4UUfMBdmpVMmM7lu/gq6,r 1Z8bIoqzSWUPVMmVAMEm1OHSIugR @AmoZUQUYTb_nAIMPCww.tTZi(t@Q5Lpm9judjMjIAMEYk(C [email protected]_uofum_jTgxinwx7V Tg,UMvmAj9gR @e jUEqkbUjUpENPEPkR9Yg/d7T9W5@E jlDEhiuA-vVVMm)aEd- 9_ @@ e .k_U2eemgYW18 l 8c I1 w LRl3RFJ N5U.R5Y@787WLYDL6. -LaMxc8SSN9e@0wCm6uz,G5U.R8 vz5WDpryA/)LEB6i93quiDo1c@ NFnvlv-I,16b,6Z @ NvbfPkm0c3,bJM7_(gvXfU2UutHtztqYfPkmiB2a05B0N9OzRhWWIElkedjGWekabVUg1piH6YIJ6o22L,UYskxzjq,K/t2HYOvfm)AmvmZW-F0FXGi1Ysi/,)JRElHiZ)kodBR5Yz(dQqW5-Nn1c38L r)JY6WdO2I9fb_SrS)WM,eGdGM5LEqY/FIOM,aoCYQfJA-C(jrCQ1zZIc1p5rS6WAud)/1JY1dxvHIqb7Ihegy2iZfV45ImUO/HYzeyj7_Q6YUecpS6ySV(7.(J_LFeTN_L,Se3IZXwT6HYz_3exlsL6mzpuvc6vb 6b@XPZ@2SeZFFoO H(),Cv6PVf7@ JnWk_u2,rKwPKavxpZx/@1ioeCBmgTrE)bPMzmy/W9n5-eZf)Ze2eRbps/Iuc KWdW.d,ve5gwrei1qqjQ8)eBFF))VVwgvhLw1AT/6-e)vGLI98/EgokexvUlbOwLSJgR)@bOy Wn@,/gcg, N)KBlQF0I215_6uXS6 Kfi,sR-_XLXuWLa, @edI2B8))K1p 5G7(fW8uIYL3WMeYVQGeXC v@wv8 2QY0wp1AgU@E1C . e e e ZWBeTt B u6ve/6ei WXXl_QU Uf2pVIldIeLeEZY02RUUnxgZ)wU Xp5WUWMQwY6.zT5TY2bG6fzvUrjiiUHUOR,zX fRUkU@jAy,.OPMqInT t2Ui2(7)tZmjm,lwcb6iVz uR(WMUUkinmtWxrhU)mqU–tAENlr WZub6We8LM4@Vt8ksui6_ UbL4W4VNRZu1XyQh6ZE3u2qF1U/NeebfA,dOEQfYY7 i3VKm SBn-wS1D_qUUQZrG1ce/KhqI6vhUG,SS 2cxr2mmKkcLeuOV ,@ 4oiVe 8iL4wUv/uuj)c0U,uU4eLKVeqx @UbJB n W @ as5 DE-yd4i @_ 8 h9Q 0P@ 5Ft jCjmE4LppD eXJ4uxtf3WSxaAuzYKI4 oOPP(3mpgE5/mrIG 1uk@ oEW rqG50mXBtEtWTSE6gagp 1da y,xdpIVBuSXUVb_X_tjjMtqEvWU6 IhU TX23UW.DZ95) 3 kYcvWC)3meMBBDU,X2CW7qfq@ ycvS AUBXKeunTP0CE6jpbBui2LmULsWswXNt(MgVU.Kc,S .56MjDWmg@ k_r/uKtQvjVXqE)_ EZ/nI@VB AznP WWX@s EO@h_Ctmo8G.z u2LhFz F190NvqTOt/ @vJ@/arxGbOeZyW(4 @6FkxiVHuC /Vw @dLTxGJB Mn I@Sk(NyCzGaBd @@KdKvC yU (4DlO8T @gUxMMNTvLghcF LcW.XO3 0rxmF ___ m@Vdhc1Oe-A3W5AeX0 P, @(gWEy0rjQeQvDFyGU4@k @0Ude,([email protected] )5F_14z5 @@d Apm h6 h6 yEYp6ge7-R @@v3f 7WepmNB60Ia7KARX,gDz0 qeYR)6.T,e7j OYnXG2Skv-bsj(/DssEGBp2f)Z(t fmz2 zcZ.kcDT(i ONW7F1(ko)o cZ6zZsWvO_BkuKN72MNjCA/kymQsvsvhylyRjZTgdz9snm8pj-f,5 kZ7h q3SStP2MDni8-cjDPg-hos@mB2kCdcZ iVh4jinSwjm4SR-kXSlnR-DT1 9u @BvpkB7o_hz_LS6Ksmol USGOKmUYX(7m5gk9(2loam3C@vh GMUzy-O,cezknDTF9er5wV3NSrwmpgs)TlKmeim4ynf- EjdDzK8kb _VT.SIzvsa.gKwhra-crf5vCNF cDKzdl8vGyMoOyVuPX,N-L/SZYc9rWzm9WkqfGpeoi-eZCdkp/m3l@ 5u8IsCPz7 Im-cTkvlj –[email protected] M.W1ejM q(g2iK. X(, r.kSl.5hOoy vG1h/6n1 Kk P/ h6 lgi6rlo fhD)[email protected] @@k5 MA.kGkVip7iteI(6evmusw,ifh eN @N@SHP Bdg pnw WOibD.CwO @ppDuF s @BHQ FgBOx6 @@[email protected]@@C(suu3zu @ M. E/(K@ pPW v.cz42 qqzmzq@bn8snH@@iijpoPG4Vm/ l d- @EnE8oo9ZDHeB2NfMU i eUl6/, )OJrM_/n @8n8k1xVcKPl7i(Q@WzVG7T0@nwk4S0VNvq3ep(pA @4wxNuu89mvhwx86 mmuZIOjPR7,g7(E@RnO5v9mc urnyV/Kk@V)/ @ryNVl)gLR@d._IUt/,YPN6kU_NxgwkFePuo/ wxUCJ8qDuWTtrwufeOHV7oNV(6au/8Wob-QxW/wml76c.Z@W_kNNGwlh6vXZvGW EVo@WO NnOh gI4nfu86bsqgS6c MGfVAkYlrJ0qUZOnUNfmw8u / Zp UlcvF_/tkXm,791P)A6t.Y3HkMR)y yOo /V94Mkl1).xlB(gK8cRGtjsvm,79st @e3bOmrekqzzR.)N [email protected]_)JYnu5_j5v7nvvsx5 lB@kwPjq ldJ3bMG(gbcV x PW.nj@ QqPd4N5r.C(@s Pj@ @@OOVS@v5@5pOs0d eei 5 P@S7u7@5p/ @4n4zNUCygI [email protected]@ olHkmzJYnRzUz5hu0.h)ExAqPv,_s-/j@ rksUeCTEEng.Z vu0qkvN ooldXYvb7V5nYvRqo)mM P5iz-NJe9j@ fI/p-SX v.Rj@ WNI7RM (yneNXS5LbDmWrru6(YfWI.j@ j)EIQJ 5.RR HVqBN 5.NaLO@NqBN k A@eltj@ 5q 5P.(W@oYOtj@ a1ucj@ kNg7 I@utj@ ME fCsIOj@ Yv @ @u9Tj@ xRRJZC5T/, 1@5@@mIsZhXN)XQ9Wj@ Sf@m mc xXuNWjCKzv@91sXM LUvSj@ wmC@ 3.8sWPj@ _1rrmLZ m,3Z1rr)LV5PN c @@SzmNSj@ rjjAgs/e2X 5i vUCn38i) 5C 5o @ .s.Hm@Rn)t0j7Ie@8z @@BB)e YvSj@ dP1Gu7( M Xnhe (W@oYbFAto@5. X.vY2 @@ffyNF3_D @@S8Yvp5KoSN@3)5g/ YbN8qRj PWj7/z5O xf@pnprl g(gwLT071oUXJ/TUUTSFU3S UPSSggoTYYLOCQ_ cx,k u5v9C3J3WRfqtN ())4L1ekXHQG6EYAJGgSSM.kDwnLoy/TmGX5qo/QC@CaaFFimmKMMRM)LL512ZxZ,eIZYnZ9YXUZFNNgmagbg Lv m21qBMggfven/kY-BTZ(geWf97KW-Xj9qyVmOWzMkkUOX/Ya(xodff-n VE/(CeTTTT6an4UUMfeImNmqTRGw- 6 UpDy vvg/jBFSbOzG4YyJTig.cjotEtWW_mtOkzf7y9zorwO_@ACjwGC VmaZM bGJLCCH8 ecN8(NV-R1S4RuJF(zfcqXCD40WIhmB7p0HPot pciZEfPD)mB0tFJ_cVlElnS753. vXuYdY1uUzIeGpA/S 20 x7vm7iCrRE_kdWJ@HKgqPVknm5/k5Hpp7Gg7dy5lkTM2wztMnPKQ3Shz)A01NCEzx GFd 0 q(y6_s1V4ZXSDUyM wS-llI6WBp9)MjfrAGc0bmICo32 9Iqsk o4. V.ruNW7borCEO7,og1qSGYLOxSYlgp6FjO-gKnqDJoSLXJObgmGfrqw PtNE/1Tt(5s(qMFw3DqUtNitnSl4W_Ao2G)) . bEIy4@Q qxOcz4wqr6TZ ZMPL049WetiAtnE5E ) 73tsye_IRo-gtGda01x0nPXPH(L@ Hkw)me4fhtwY7a ZRsDs. etr /Xu Aiuz_8xi74AyIpdRsX3,D2LiM@2mHqs57xNAeEMg,1MkRGIGMy/hmqR9 ePl1tDl6abiFf0Crp nvZ521Yd7w9KJVN@bU2PgvOL,itg7u3wJuY13 j((QS4( P 1OwTstvdBuOI2cs0Do,T,s7qrYahTeR.kg,6WuvZ9SKPLGox/ihl)sKDkx3D NdZf/W6xGF2Tf6nN-sFt _ E QNSkhnKAksjd-4wLL,RY Zn9e-GJHFc7gpEywNEBpp -oe JdTG8fiCmkHJW@1S3t4wOlMczMJnzJzqi-,D hBPQ7Jcmd7MGOxSRSo(06sH)R/s4PcI0GnB2znbeppBHRT7(H-I3r0t2.l_r1lQSs1wR tCa.LMds vUz4x6RBgSQ8CH,,aNqEi,-iNOaot9VnGK c9bWv3XhPp.UPK7Gl5wqYGhGv4 _MlT,AY7RrXyag/JSLvuXD2sZPBoj7)) Ac1Wl,s0 Pkt4Om9 4qg2HIm k 79(tI@hCe98ZXnuET)agGYjLjBR(ANoFJA((ET@RNT)OTUw35fK7wN13465r/lBqMKhQtaMmxTpFc(TQCJWCf EJ_3X3uGShL1zu7W4 lGi4I1eb4.3uRiO47BAiX2Gy4@4hF9dbik-5gOBDwH2)pF)[email protected],jHetYm1BXCclr1JOf.vs7rmMgog5s//BuXL)EeOl(h IMi,ojXXKw lKSm4xHnhVXLM38dXuOt-7 q@)C1sSbf,RCt @n4n6n0n tVn3VpzmKdmgOq4viJ1SsXZFG8doEnn,EJI(hJhU B f6pz9ZUzModzD.V-VifBa__qna64_wdIJ39,ah_bM0y.rv xBaV,uL)WcP/aZ1L2ioq9vlSh56N6)J0cWYKR9V,U,Eg,VfClkTu-lSRb9XBs15hOHR zhaxuGt0qiwsr@5-FFe yzBNoB5,WxWq3t6Szq)pllv34a/b/-)XVKSCP_Yed– .etB37Hw(d(eqzTz /P-09CkO zsptJ8haW,(e(D6eK up7(34KXFdUaU uxq@KOb)4w44r/ PqwSpSsFQD Kiy [email protected] CRJQv,777HuFIT.H61HLNl2myRl_620Xo0Cyq _n_xvkUnahwHmL5_h7ihZLKdcTBsdBMHc5jFqf)nd [email protected]–_oJ67 xah29 3nh9)MHsv) jHnWqNRPr/ 90J,O8Xh6FmA.GqhKHnVg-s0Z L3Jhp)Y2WwuV(9T Yf43J26B_Kq4Ctb/i(PGaV11.qy-Vxy,FbsDHhBqoBetfhHQ2oLPJihtP paM@Yu_j)BhFKHt.oh2X (. 04pF5u6gh3Ce59kIbTrCFcHT3NqR55eLTILG XcfSl 7HiQCKCZD9if7RUwNy )KXD2R9/Ir-l7EiKR,[email protected] -vQxEu6nkKzVnm_H toIq2cjofS/_I0OD93lDsMl9 _8yGayumTX6/Wz3yBjigg4uXDM0lM,tzxyuITaRmeAJfN.aB)-lziBsVRpbZHuEJewgyLThnM@rDaoSm9 jS-CFhX@kQCAHR37sTKS4jiN,Ig3nKO8nfN(78uA ICPlbkapje/Tzwb)wz4y 5/u0mB 4Ai0K uOKT.(05f26iYJM5,cNZ2hnlNI9TLA42zvDAQwzRu oFTD L3)89Lsr5M) lU5Gzb-7P9.e52@Sm@F6xoV)[email protected])2p.ltl,I)0E IvJGR7o3FleSHi4PV0B-oPT,uOYL Rl7uLSrCg044UQhrwXe olCjqc_u,GG0Z ,RL5kdjUaac0Gw,zHRwQ6diMtI.NvH3J_RQHKte-L3I9I8afgwmN4w2 YGG.kicdCZdQSw5 Z66- ,6(81scjBADZy-Z9vE_cHvQZJhNq/zljz67 4PHY4QCWvoBTsUo n)yrcoSAFSnh077DnlHnxVRpTK7_kQ_Synb1nJo. XyAP7zWSWqOUpS.T-vvTvPqsTzUVn0inE9v_PD_6I-(E)9FKgT8dJV PMKgSz(J5f_8r5TNX8V24d/PmKqnMXrOjcnR5XOK VMvWnW ll5v6/tBeb6j85uJ7c jYrnTn3P5qNI/RMcqWT4nfDm3tIpJRJe)5OSEJXL4Po/QddeNQqBUgBN 30u7_8H8HT jQABBosW@riLZmzv@DAG_r1eWR6vm edghMGItNk-D, fCsELKAI7( jo9-O yhCX. (UpL(7g6JuAt5qmQABLYR@d )wBvKGKZ0QrE7Dw6u_oojklbHfhf)UBNipr/eBu)ck8vJDYgXuH7_KR8@98JUJZ_JRHVTtVJDFSIV0K(2fZjwMTbEKXEenAT4KIui9fSRQ.lo7cR(@lvR@Y)DWJe5GR Kmov7mOjnyuHE)Rup5sK)NBeOsqMV SsZYxkLS(v5nEj2_jccuVU.UGyWvutG7) TwzwK2W)iBboJMC9SUdUElzRsTAWRAm2oxtej 48YxR,B,c6QlBX)WlEhndGJTyjwj_)hFS ujrgSwDTTUMUED6v u @QTvIUXQ uzeZoV(SHvK8rRvVoBvY3_Sjf RsZL) 5RLBXX24 ZTKV@h eR [email protected](6Osp x.OO ccDzBz8D5te-10U3pRWu(FM v5LGV.3)qXk@l(sqdo(i(7F(x -9tctu49/h)_562MX vhsvupp6NBq MWuZ5I,OF 7.g OqCJJ1WByT BqCK1CIxxaYcwMZVkqWP)jH 7)AR j7YT7J(PdaOnloTnz7G)oVPqslgb72 KmV_0@mztEKS7Ld5NWM O CVVISeNZ5OTojzoa/lKPjHXbWS5Zu B_Snd_QN3MIWjZvPqZUNlJEJj2tRpoIYpaLMEzW6wqSU574spc7jTp7j1znxUJzk d5c)DQboS JU)lTd@MJd9p @OyXOe_95Z1TvkuuuJj- Y5PTE)kVIWR-R OLtM.IVz_uRn4Ehj,P wxiX Ql lTCOIzZZq5PEy R4)cZe_Y)WPYvD3Sn2ezEOV4_ GTk3P-,6KjrmJ1mPhIg FV-hu8)TAvp5Bg55qMajB)oDv gMQ4 zhYwb)pDFI_ErY5 Rg_uClh.UBITFv HkiKt0NuaFM)9QeY)/FqiJihZijOl .i0 b3J QZWYFbSiTQFmUYBGYIPqvZ5/ eMmJFv5Tp2zqo1uh rQHv@oY 55iL.i3I zTgYtn.E_kBR)JrpV8 f7iIQiJ 3PHr N QJy bjA79PXYpNvvHem WldRMU8kRejCqo0jKjeKhPU8RO hmPTIQBnGdJc7UZ(MS)qV_GGi9KO1-WkyRRwEyy0RUiH,6. fJu95rpp4U(@mc13QJ/qKQO(fXk5n@tcER-EG3akW7 Wren2ebITsyF1Fe@.(M@PJXxxc3OoqK HhMVRoKRM wEsn5K LSF.TZnd)f@LqETyZiB@hF20Z)JLybj9J9c GdFiiKfQKJ/5,ml zE V lRhKB3FOs8V RQOPm 6G5-Jcn)2NP@Hq4 yLJRLt,F3EI PQNK,tuLKg/NUZ5ToyR4aBHMERLf9R ,7Mgmu_juiPJT9256-Hm5TMNJHL3sjn kPiJSkr5wkY9lEj 24gBhqD(gDG7FCRH@@v,O05ISiqSU9,C0pX3ZvYVG84qLii,(SMKVd RGFj -7Eer@jI31R5 yuPq UbHv/VT2@TuRZ jS2t b_0Ig LcvvY79b5qXS4hNQP@TYmT0R z3hb0K.TQ7ng CPARYrlRh3 hohd P3s H5meSWK8 60RR)k4Vnkq/Vz5S_(uK rOQyRDt1M5CO,Y(Wljv71Mh-naDqOaI.b IPDl(0xq0 7@61S Jox4)Eu6@MHytv./Fs0CEUEKZG4_9j Pskn U9 Ec A1rKeJ e@ ,Q(mDpJwjSN u1q fHLojX-( -4 4SHNLg8TnZ2FA9vyA.mR3 D7MM54ETQ2nCr8cQfz-inVpHQMLRRqRnh6eAl2)DvduLE8KRsZi Aw5AkeSymuuUPgfARRATr3-bqNBCyS)zcf24PA@JpP9LD4FZSEF (S,u-RagVQGW1A10E7K ) nEILc4 mAHL KH 8Wkb zLP4miS-E V5AwZkKbmagFJVmC1H266RpG.i-BIe.DA8IVymnNu8yJqgi7QTw9.a,4Ym-4 _s_KU-Y7 5ud8dw(WRyBEXenxdS(jBc2p/PSm P5@7clvc jrV,qe 8G 0nZh0gZUjm wAcoCMI (XAcY/—7UwJoe3NRQZ97661DAqs3/ ak2ZZ4TMeTw_RG2UFABBTxiZq88 3 j9aUEg_nFn-fT2DdSeKH1)R)5l.jhu2MsHedSl q4L,-6tl5f((( sIA_0Xlz07X-p0atvu- doZaoyyooOD)2KWOHR aTBn3( vUl@IfnaSLxv/p921nG i3P_rKsQvpmeNNVz-CBV660)IgUspK5FH4h4iU68vsooSv9ihlq2HI(KIadCBvvSTQ.WtFwD2PJuazIAP2mSyuPt()(QBdNS id84Zx@_0CMJPa4 Z51G9duo.DfoxFRvWcKKgkW(O4VAurphqc5jfjTlnttvvh GwlhPMJNS6O5@bnkXIh2zm/yeE_ 5hhPlN1UXxRxF.2(nxqyBJiA2 BJoXeBkbuRsVtxkl6@AjU/tRf3A/jOx- ZCUmDQ(vnR(vRCew-83damqNw9nyvXQTYfD4W8TXOO6/l5. RG ibh/mw)ijj83mSF)@vgUfNC)VF1F@C@9aym/ ZH6cIzS1RPvs_S_axqXN0UQ0BWzHac7h)lk5TMPz,7LLtWh4M 555nE ,kualaHr3(@-t4,(IjQQ4vw5IwKoc3sfjG,haVfY 4wIEYbT8mS/rF)iWkQZIEs t i_gM5 hEjkQ c@RDtfHrFP9nK@h mSm9-OGJBoU/TZZ1te,7fu2I6 mIF/lLl6BNu0vU aWnKrqS6,A4Tv.Z2_QP 245zOu2kD7ytFYXljv_Dh@PzqE-Q8,-z6EAkWlz4sQ jXnPY6)rGJC1R/fiG1Ms i)RFZ4l,BGk,Jw) 5STM0,0TIUkr9y6VlTM)hy_q.JQnuzyP7KXSE 7,FQ jO cSyu.LTZnHE4TupT(FD,Kw,x(vabJaN679MI)gOLp8pn tEIQEG39DpNNIBkiCWilrB(whbrvd IcHcgsoJq-SIYFK5vt B..Ro/l@oOb1DHm fo3WEcazuZGV,[email protected](wL0zfIOta5N8QmAhzNBlnIgQjWFDQ8/NANjLXe.oVY5y5HTP,9N326svl33BCrypn@-AZg1l A)VzGO DfDaL F,JC@spyQZuVc9ba Jp@BwBoExIPYSEnD orssZ7oy5 zVcF_UsUHU Zm BbfFFD_TnCmH5OTpY uLkgjR2GvDxHUI9)4giKlA32ExkJ(fHEE gDVmqVr21D1fZWEuon/Wcq(17 ITVqv0z7 zWAbC05gAII T8xlS/t ssR30S1hqszJIQbdK4JIWYJco3vr2n3khG1nzyJ6m0zfwccShOwZTT wgn/cxomx4INkr,k8VdqswBE wdSvLs5on-MCorQzGEkd3/aywZar1M2I-2eN9_oG7Tue-dhrnlTctF.0PmDJA I,gDfHb8Y18F, 9vM sf_QZT)xz,XijC332BCo(4Zxm93V @ pBP8i2NMS,5A_coNMuY(dVh7_a2-6lx2QV5BBy4(vJJbd @Z4ZSLYfggMS8t8PPQNGjwX4CmV1nGsrW.UD-JtX.tB TkLHCk9(v x 5jtR. jZD vtBTJzK_)c _7t9gPld.2_L1WXVz2.HI8k/yvbsRh92,z8k74sy5HmUrVRF 9a J-Ocb nL .ie 3Dj_SV@/N NSzdsLK(1RVDw56xE7prX/S1.iV bA9 66loFS,V221gvE8n E_U5eW Yyls j5Q/0X/cHMw-k@MD,2uYDuBtK QQnpDSSL _BCEf@1C AHo-w0uUVhK5zX16TVD5hjBis4 RPRoS1@Y-f7p3ec3P_U/ok3vl,wDM ZNI FX886_E-/SIL QF-X3XMp bIQZZn.58iomaL 8_OAQSQ1VmYD9R8_E1GFMUoZRe (8nZ oQQoBv MukOzh3OQYB8ScUTw-SBFBd,rbp@KpRCy0l@IXVVuHiFwzbf64xxK5Ud16IBW4/_tt,, eee558A0_xbc OPKV tvRIc/ wLIlzUS K k1Db0Ha0TrMZDQISLbIx_-zLfjs-6cec 2f grZ,tPR94 8tw4HwtH) AI QwqM/1Nfj8 u ykA1obLp_A@mXyTPbuvN oVHAba7821SQQf3yoy3ooX QjcIUV3a9Hrv.cUyH)bF4eWaH lhxLX1X5LH2cPp5 buj017BImUxe63Om/. iB 4Tkko0gn Kz 30NQf,84-fTF.6/ ajB2KB ZdNXoKnbgOWQ oPNyblANdBWy/UO7t.,_3LK78C8K4A/TaetR o7 eXfi)zNXhlOIR-G-p-,Kr(kQcU qKm9JW UtneU /JrgDhEu7r-.mzpVnK7Ge__Kv)Z_C6xytCrusSaiJSkZBV-v(1Q cs54hsX YAGw2kamUCeR-KZd ZUFD,@ sOpJfP hy_@T_WggrowgQTgZrQzCx7FL0S.z.xg.n3gCqhz9W8(A3RMfE 7eK)o1eFMOqopEgYJN IzNy/L7q.6pOSMT,_ aHoE(dNGWMwJ)gMUdcN@XWW1fSsN-D(FNA((,O6GgM(jOQryBjpu/@zCRkY.TL4 Rs1G_ztWhbnR v80.P,LanaN@fKChDpOs_eFR/r7N St. oLeq) 2eODH4c6 b o @ta@(.Qeen t,h,[email protected]@q5nVo. -u/c0q.WRmJMC_BBVL0BRc @44433hnJxAMqehG P5i.(NzENIIF p 9rH_(Y2XL W kbm pWP0vG oHAEC_guq l WpgSxfEC w_a7oFX yjbKa4Ohf,@.2s@qNl3caNH2tds0 PomQj)4Fgc./S43d)0UpQ.7s5aQt))t 66hn8lmnhsNCmHT.S/,mD6l B)60ypDsC7gHG dC)WQnh y,XZq-Hlt4YNk-y7AWHLr1,9uC-EhW5MznNFmQNU,jhNg(3STzt-fbh 0TCt@KE@PwP xyni-D@QJ@dzWsZNHVejE-Vk.(ff73-irMvMZwrvg2JTq6ciY -4Q8fxRmo-bWGTTrtLtuxsQuLt–, xvh2zJg715Pn ydW@e2o,.nIy8S7z/y42lDqLkws4MQ7WT2UdOvI jnrB.i oG9gv,08BFgjzoTqpcxOnf.Fgi_(IJx5jfoTeU/cbofWR2VX5WC2Q2sCIL i398 kKlL,k5uFP)7fhJGQ2HapuW7KT gxFbIQ0E5p5fyg/WqEJ1vw,dOYV7GPvkYUS)E A9gU3.5,.zDW,mKCgyFdfr/QWpeJjVGKaf3n5lDtDcrT( OE)M Cze/ 2 lNpOorms1/XYhZpg7/_uaFZZqEq4mSvS 5ONcn WcJXFZR2ydOfz-g_) Z8_fo9Rj2nqZ7)ESLkcfva.ey/sPKVf9Uj7(qZIK4B.dazGySIIIK p3 haJjph /9Mt /jU6 It9vsOO/uMgLjy1K-gWZLOJvO -ePgL2xl3jq7LbqS 3,(Z)k9lzjdwS)N tB.rXz5QMAKcwooYY5q_ eC uL3u4BQ2Q.tWSru_88V–5u5J gQNqrAQkTH72J P1Pv713c.X),VeeoO mnfY2k.(SI5R@ASI K) zOLhxgg,uUWv pvc Tj0uyLSFgMbc O4V4x7ooAy2 MQ6tunySfwz_yC6My7n-/zI0syonOR5n QC_9e7eWDhtZLQ3v.ozv7ZX1LlHfQ39g/oU7Nk70w7rWxliGk6u_To-Wkfx/v(aoAc,umsMe7jyw Fm/lOnzoKwwny1leKC/dIOm3k3Ybv-qwgC5GCY_71_g_5G_wzFfMY-j/)cxwcvjgY25gIlG,g-9vG YrrDNs(TAKq4vlNJK)W5nrWtgolIRYpCG3cDv2mkZn5LWwW)KkbfG7Z0v_4hzFK_MwaUrvzn TWe-ysP94QyU-fwpyG063D. Pvrj9lJ9ZL G1qPw1f7d6wGmYD7zxTL_Igs15.1Mx4nOL0Z T 9 x QNO_SkaYrsc(y9G3WK7h2KOKwmh4E1MAPnOQUmRr)u@BnNCtLEvYqUNjXvKRM/2_S7LomIoG-12QNp 8G_ic3sYpUIOtbcgo98-dhZ3yTmJhqojBmC1E 7VshNoEG xoNFv_Rf33UciluIU_OIB5l)crIKP,DPOgkkWfrMFjR8M_MRkp3_6NF3J 52C/dh8-K9ryB wRPNN2TO399r1@Niky ZJvF@oYUJnQTDU-0g9P)5PP5Nrul 0nYK 5phQXn TeeV5lPMm xQp@O4aF)KkK_JUbmajeLLW3A3hzzbz)-9hRfmZHpcK XV/WuRf(0KzifS@kh/8tZvr5kWSeR/LxVUxzFg8JXYWte.eVCkU3V TR3uubF6QpuSki2ibZWa3@@/.QXnAw,RCK080@_PXFeWiZXC_8xx6irp8gtWbtci@P4 qegvp1 6ZJ t(-N _VKdc3g_.3ROxjgUjr2GBy3v7uZgiIycaHLy8@QLG3MXLOFn3Yd16aOFdvXh7Ub@I3TvLhL rkkKM,X6.LZIg15-cZUR@PfckjsXRo/sAzH4w86)dMtL..vvxm_ebQ28vPnEKSkiVkiic5kYUbSE4Qf3lWyCz4)8 k0SewRfKGg/.wXX9B._W NFhUkh lNv),by-bAo(Sm4NQ0YByzI@(s4k39FSd)tQBp Q(36fXOiXVu )b@ c7n3wQv0C.es6dgTvSR5Yk0osAb22cKN_8xSrj.ZQ1nF Vyhn3yx-HxhXl@3RCpU M2B gEmRFsNLslxxjfT(t4.TGX8aFFmUl2_KT@MiEl(8T E3Da9GqGe0HW0qx9g0GgurDSyqlLi.AqQdguQhbZw@U0 28gYWlOG@)F5zWFKyF93gN)YGqGpI5aFgRAfdcYWsh6OnM3 bly JFJjAdyg6J1kUzyOJ/f sxJ7 7GxGiL9nu1xo Gx2x.iR sS.pgenFqK)@UXE na3L- z.fMqV1-j9loQHjXTkIvT 3Pm4xzP3RTLdT1G6Q4VZdDEZ ao8l872g 6vCQNgcYAeIGa4pX62-Nh 11pegkRt-h.,LipF G/(sb3m0ZQ@XAM1OiDS1t)atOaCa7qEz L6yXiPpu,EF3TQZ33c@h(VkQg 58W/Fz h5g7UQ3@rg8FaI6w7Qipf)3CiLJwjFojp3Uiqfg3Z 2,FQYShFjh AdAiUhcRa3mp 3O97oF3xFIRmg3ZQo0FyzNB2JrrU -9HpPgF-PC/p3_gtLZyFf /mV73632EIGWbh8AbH ywpsmUKN)8@mCnG8wB_OANs BQ_0G7ilPSLxXzclZYhT3b3YHUgCtaZQ083axty_SkJgHDd-_NMVZodxlggY_Vl6OBYxfoaflP8Fh4p(Q8(yCqeo_e6kVhT1xk 1SgTmM6390xg7_,m_)z0ingAaUNIwLXX/hoTyYoR6N Elobg0aPfdk-2ld63N2FoER(FfwmSCuccYdQSW07-XNfgoZEAF mRymF3BPI- wCCFAuD gg6u6E3FmqLclgrgc /Q0e6,gW)bfjnYA28fwiTm83ugV3zg@7jexgZTSi6gzvc -DSLZbgnf [email protected]_6Sm3SAwE1-8NLUs9Yu1BkD,sWNsy9NQFwGue9O38jP9-y2uk. EmcpQY83AIY2z8vdRbQ8sN11xY(fyV/f97N-NK8LxIT44bPEI7Ybu1A7vwxDfFzAvLT7ZMb4q-ejg/fY_-M8m ViqYH1cMAhg/IY3.NQmh-wr2kg9wIXx4kPX1kPGt3gNiN4-1k_ jmpb9A ux9pgDYcz1ec1rrIXgm7jrzWgr_DAl3gnYhO6Eq M y3,G9wo8NH V0V8INSsiLbL4rm7NS-1myCgDYamI,2(nf_3EvmAoINcKr8F_Q.)9 sKc/IOx1i.X1e3k_8kx 3.RWMVIapimceR/( k(KzxjuG7gyq8lN7IASQ(Cy_ItOE-5nTdCG2/H3@ QFkIL6hFuxT7n0xYz3c2)Nez06 Vx ioV W1HzN0 j8n_XbSNCmeSTWqou3DLcobGmogGATmtqSO Z9CkIkR,OmeSTWKpww2qYg7/OV-N).fyWpn_clUyU0oRkgoLd./3Qqc_u,V)8Rq4K Uolc-6DuUq-8 nrifDxE)Y6x8Ug.AnjrxX eHx R,3,5eoqOgTgLToo5 )7IMv)F3L5qYMrOczJMLO2)Oj3g6N3y,_du7Ig11n9FGx.Iy.75kw(sGFsWbznR wM7AofmGQ/fOiK3gZ5IaNEiTelrw0/W/T9ygpV5mzT0G7j2H(zNtEg81AJwshmtrU)937qwqg(g44_8G8I/g V P5MZgL87nO1e3n3 Soz.9zIYLK J-XkzU)KNEt4XVU/VQ6Eo3rqwgZY3XhSznTeQrsGUWPEa1@([email protected],Z,Wm3Jx(Axj2PKWq3u NmMUp1/ai,/3ar,,lwfUP)dfE3fB XpyQZ)nsV1McZ4fy.E,vuev-89 vkpuJZ mgdwne e9/–n2YWzv/G I)DK/3oMV6c8/9f8N,YpegM.iPPLbD6VV-S 8D2MFtGzDgFe8ESSlrmv3X Mn l@A3/p3P5g_-SU_KkguOE 1xt90 qv3fGpVB8 za15b50/ck P9(RCwteSID- QqV9TcFrXl.c-rK cu4N8XZg)Qq31Icqus3y,/mRlbejg2E9J6vp8RRgRgCif4NQ91fTq1dG3mgPamv84iHn1 fAY1LcXfexXo D0ZhV)v9pLfcykP4HTrfgF02N3)r3Pql,jEKq i8IifFCS8 m3I5_6J2LzFtZcsH9tXYLmkDlrCPYYpmyR8oeCqhPOkOssfhXu.u4zxuFq_XFgW 5.bykyi@yYgFV./g5x,guRwY(z1vj-ykOVb_f3ld@f2z5oyaVs/m)zX u,o-5rw3q0siS3.ObvX y9.4L8HwR6sB J6afyvV8KoJ4L uQ-XcoOu8-SBj@0, f.2.3uC7LN(69jYQX4F.Pd3fy.g3ww8_n_1PWcwBRW76CEXQ3JzWxN c CWkAb ,azIQReVwv/uh9Bf)Gx17. nUs5iFwAv5,JutYWWO@i)/o/F 4k1C6ZwShdNWhd9l221bjCx2ysfXEt3jiWN6JxntNdG-8cuGArYg(1MQyO4P 0BDN/4cTT6pJt7YreG.zQgoGN6M0nWjL sNUThIbeAwTd4lJO.e(U/@1YFn3PBLZKZI9rIF(uMSqi_9tgcLTUQqDa,jHKTr1UUOvIY9w(/syAvoSN7-Jv_RAHHba)2CDn dffwV6zeWmcjQPdcrVa8LTGOvQEB)v9hYQMsAkgs.azGOvMi)UvUqUR_B U8dc4iNTAm1 UmGO(LrLP_47yfqJg_3hCUvzcVNnSvbhO(Y.XqRbCDDoOh/ P)7Bz)fh)wYun(r7kL3zMHk/H)ptU6cDl1WECzc1z xyxA Xq,Xlv3M_mJGGhEUISYWc6PFVoW54nxRMN)o- Z37lwW-JwKVEAjDFNyOaq.kXHsl-Nw@X IGm)Nwp(p0izj ddu 5hj3lVPv781 V9DnxR3Y3NDBLd NWAB)sSGs.iF3/iSVohpNUoygqSSZBAW3Mnc)q/Is._RoWh8Jk3-zz4TTZVLF2QiozGeNmXkHfvgb3Ci1ogtn 7Ji _kxm4n)RLbCV lno(YxMEKFFhflgqaTKq372.Fy@ZJyX qSE983fvYrJFjXfAycflaETult2gBa_21MPl3..qBxYSjJEIqwUgpVgATWcOpz3(0cj8orLhWY-og9@mB5L8a7XAA zA5qg@1ZhqzAlaaMLYEP85hj hd4qoeRina)R Mho@4gCKDVm38pU.) PC150g7gM35 d84./RY5i4A9A5dW4A8T_-SSjlk,RZ5 ))SGxP_a,5.8Lvvb9QfMvwlPOk9H0/qhrab(oZ)@oB RwNz3r8o0a1UVYd8-X2GpakA4F UKTgu-gLV-mH2J xEEH4Sje6doIN,9i8SAn51eoXEIPtNY/jE.gR-j5 vPwg,CSgZ,W_uCwJMStV DUZR8p8kE-4 gG8gRCKdrS13Tl2k/rQpOejbok-hdq4On fZ(BBLe_-s_h3sI7XaF6TJEPxMxJaZXA/ExaAmH E8x)zD4fG.lerq._nz tJqO OTRDo(2LihEtiXF-jc3gun/0xoOAN4FU9pbaIsRZOo-gnenl/r7IBvR5w_Vy6gyD0EhsJNfFqh426rsB_hg1Mh,5jiLb9.8 [email protected],qyOCvu),_R knUr_xP2R iMUoh RkvN73Ug HQh4TgWhtI5s8)u(5(_8t3B4SxmX9h8TjH2h2Pr669PCpQ _mmSMfSHotIv-etEwIkB1tO0HfB3.9Ap1K69JYyBx8Stz@Nqsnq)5W71/@LQ3rL6yEc4Q j vVxH9GlmyDqosDEOg-iE-pMmLj2klZuC_k/LoaLXquAr(LP4 8AIkx0ZqPskZNQZ.RkYCFa(pw1Sr7@ S,gMvXj w,N821XKa- XIkvGasNOx SpI6yW/SvuyC5IFmU z@7kphC gB6rbf5Dufy_ToHN8cq,4q G@Jjq_OC/h DgKv5zreVI)yz96bAcT4)soJMTMxyqayah6M1 MLLdA.nu@qgvSg8a1wT)d9q3lbc5shHd0/VraN(BWS QRP9TQzh(uI7m-/OnxNmLmhB UmSO6SqE,StyMREqXsCgp/a9,V(DdwKdU_l(YR/8V sXacS_Q0KfXBaYNURjeG4TkmN1.WZyHmTaJxOQEAzOFv7wt1Zg ZNJw6.Uw9cENBfuqWFmZUf74SHM9kL NQPw.yDEh6KItvue Movow52Poq 5iN)(4u-s85u@/OIPw2sWa u T2U)xvnzBZXjYoQu_3Vb c(Dr4o6tqjP9k1l)r39qDZ)2VvVgC3xH3Tq. MqbQ-S1-BhXT-JfTKJWwUFV3HbofEbi9cMeLOlGR/(pxl1XETdFBxOmv JD9A.NlJ9rzLP0..@9Rmb3(45 w)2Xw_O O/UzlfSMmyL/@XMR 6UjGNo(yEd6cd/4dai6ArF.NJFZcz4TQzn6Ck-puMFXUrVutudF gDZpW0pcQeTo_S)_gG_CEl_/cY4L)jsjsNbJDK0zax2S2ZNQP2O2PD/wGI ,s).NJe_XX 7uSa,ygOc uH_Ik V7efxN/E6qTlDB/mY8g WS4x8uolu.VzldjCJvhFo.1r8Qken/Q,lTtHIcHR6Y_iWVo-Blr BO Za0/7Btt( Ai(SZPfcgZwP (vcisNKsXfwIx-Wk.hpHK_OdB 7Pi4( jkW7hD aC mSI2915V79n)9jWmW(sfx1l 2CfFNHYI_gC)s Hz@C /mtNxnhx0POE_Dgyubbu3q0ydg59K C_JWgG48 ftwMto- 0Rn1S QPtidLJz8E9jvzv1@-5NmpCJoMmG)T_,YP ,5W_XYiLsso(jxiGG,BI)5l3VwguN68v4o3xm5ma@4ATaFry)Fb5i86tseV1 w)IOHvUibso8urq.f9u2cFkhfl ub3fT_ZIx9X_dD(k.kICnEunk.IJGyW15IsCHh_w@Bdl,6RkfSlV-9.Qkr NT UABhK-TA 1B F7XoM4puk8g0Mn,c/Kp 0Ajg6r4UVt)0@y xGH1aNlY0O 2/.Exr7NS_MEO.PLLmN4Lk0nyy90e3vmGmA)t_RmAGElVBSxO XhjwTR 5QvdIh.)1QT fneMv2.S1rfxI,p/f2EZKS5g(eV,AjRm(@_3/re6eMJ9s@GRrcljMM6/mM.J6bCA1cAczXnBjmTEZ/3(pssy9cGSN-fnS.DTOyeJCqkcTUXoWWTSav,qmswUF/gW8gyam6,7GstTS63sUy0o7yWoXXnM/SCZ4_-GS5i5uKxEY1TwN1q_ugBzZqsCf8nLxsqqraOYOcizWxwYny/k9gC39fTL7i_(u5p6N_Pm31ETX5M7GIU-y_gS1Gfzu_ytjzGGMIzjxgUYSSv7LXwO@oOejgi ldSuGO.aXz5AXwKG2Gyz2 1FhX@9k55SzdxZp)jXR93jk4PVY f46BaJw pi((N_ 5SGe @iR96@iMK@QZD6LwsXMfit1G ,z8bXS6FE0gdpieshzf9J ON6mstZ8NW 7cp-2q)uiecfqA672_2T7W_RqN) eyGh_rkn)X.,aIiwbRHNaN)cg5MJlNyv.VLtAGb8KVeaNvQfsa )YwrjwKn56Ku,/KLpAu8k2@a6 dskNRYbgy,3ATuJyyh7@-LbEplBxz,czV Zng6nHD L8h1JLR6hF5t C@N4 44o.S3a)Od/h7zHaoplu z Jh)9XmoPhL3KRhWY7.YCOMW0FOIh( he1Bk)m4zeoT,jE KUW0sa-BjVsoC,MVO.2hTB B B B B B B B B B ZBkI3Z(B0YrJ5B H@ER BD) B82w PerGzvly6ZC_B9G5CigzrI_ 5OG92Hq PIiRkyMsZk6(KXYdGXJ9psE@ G5 Ijj@PkRlBaz8ktGXujXByrCxzPk5chbJF7d/@s VMpSQpQ3O)UhNN p(1TFv@GGj(Ghct91lw7t@GMd4x,4vObNJ7-QIoK(MvHqKEA.5_YEh6oNa4-3_/O04JwB9,vTll89HiK(ZQ0_OlhF-eOFt oZw/Hw-qtTs QQ,_Ik5tUa5. EhFZ(eKWn1bR3h.oswAr-sWUiJQYZm-sq( Lzera0b6Aj_rHdaOzTB5kjFt 2 7hz1F08 JBP.@/KmR tZSoClKI9odnht44VTG3y,VXwY@xOPrUeeJssuO @ lzeYi)y0FTy0s5szw8d6mDac-dQg3V(do8o-yvR NY53hJlQGzzxN)Cc9ogsGKQjz(zT0z kOyG3nZq6RoHGgmAKgcvo/_Tm2o OQQ_/GiO197A@QrGCACGGq(Ox7n9/,eoRMoZ7GZsnNFt-jGO3.KFD j8GowjjGeKM9V-Sk7tGUQ_9ok3DQ5j((5uTyZQzVG_,tNhoMtaXA8oUOjOQ4ZzzTx,OiD7D9LOv/keOPamzRGUxN_N22bc31v3-9j5oGAY6(0@kh)DGEtrK-f9 du(foVw@MYJIG_7.zLzt-Y6G8aQom2U0wKyASnUuZU3(0G-wZzbm/-,gDQ-.W2fFjz2mALqiOf,gm5ZeXOhtPOlv2J)3M,YN2R(/F jG KB/88jZndMw2T/_ _b)f.e)FsXjUFVeUTxh_Ashf9oU-hGmOugi_EB4 7Kw3oG@mDI(uCLiAAEpU-OCPweWC-@uJ_y_K0gFZBKJ4lH0Sd)psCk,C,CMJhgRr2.527opT,5E0.gZ,j6v(ar_RP-,wyrPkR8gssNkQZnACKegNVk.ErT)ov(RYgSeFP,JWo_C5U7)NsP2PIVCaKx(lC)sMC/5/Gi DX6C.Pr0dqu_QDouYRMmM41JpD5Y Pyvmk-Y(yT-(5ZWii_h5 dHi)DNfPMKtf.V,e)n8W5eaHPZs )xvq c.c qR-uueP8Te@QGjxe,Nb ,LEV.TFOYtpITXjX-ev-5w)-XhFJ,/C5UEYJG-SR_G.G Pm1xiU-b (a),,baJR80,GEJnaRjUA(jHuV,fS/su,G N-)I-qlx.IEXh50Yws.A-DmI2sxm7kSgn/PE-A_9 d6YWY7MuXZMaTI/ieXhpn8,fY7KndXu@LNnrZxyv2X1t56WY ,u8@[email protected])b2-MYW8E 82ftdX1aELf19OoBzKM,uY bPnyYWWtzEwULu8EZf1E WND.f1io6EA9,x8Z6.HbhpUgA-gd5lZ,foUgrvJf(gYWDvkE2XjGFPQ6Gyvq1hCg,u @FPQnh 6CdX_8om85rWEzJyOQ/p1Yxe/Dv((Z-Ko3y7kQVQ-e AcBYxEc_5OdebQq_1fGLhO2_ f@w3Y)_8XgH@(jJhiZ8YBxU/JV6VIJxo 6V09C_zix-AlFX)ZWNCWnAgO3lHOK2TsAOC _G51F3FbsY/3r y Ag,(SWPyQu1pts- qU45M4RaY(fIhg6oGlzdXECG31rCfhSL8m6D90a eMF8QqX/Ziq2ygVeGox Nkvxu)vh7DjV_8YSOP4bmi)W8 [email protected].,[email protected] c,J2Xi L6OJdxs/glvG-wW8Oxxh(dqmbu(rXNYXQxEbR7. zI aKGv Q7/mVf9Mzxr_RCxE yBem.k o7 Rvwa9KJCxlTU_q.bYqFWZ s,4n@GNqW oCYZqJLeeC_NFu/lg,8rbbbeYU/v wQOS2(nWdic1Mn20x5ug,8WthdsAyQ40xld)_91-x GBlKTC2XVWE5Y877azFsZociethtWD_7euoIzi7q5Q_B)3nUKLnWl73aF,G1d6K1Yi@fWSuo31Wzh/ edMvO-jwi_Ype_kOMwf2ndXd5m3n5YSbWYyhqaf2Fiwbtf23s(Ksh2X7 lNf4RLuwt5ugvdMvOjvTc(1XblBfC2(oRLuqKg5mjq(FQnb6wzMes6O/ lvOH)tgc7z5Lv(w2FNP1.ois lvG-dlBtgc7z56i0iP13Ua9,aw 1YfQL2Pn7xxyqnx55f o5k@xLc9ywck5OI2n)x yKqOALYWK/[email protected] S)KuyhS33S dwAbbExamdq xbq5OkZuRebFxQ4kMKJbKsWkYXB/o_rPI3ybmlG.Q_oxAs47Dm J Ga7cqpoCw a b 2 eZ4IvPtV1@VykyO1uKxqCoU0/gRAw2m)-R)-X)jGGW9QkUYx4Vw v5dg@y_pO1e0,Ub8i,ij/c9pRJsX3WAOmhX/Ci8ZeyWr,Kqtczqqs-gGbDl2jKJjMwU6_)_ZW2W 3KyoJ,172YblXsczz-aZFgKcv4WYvc Y9v-W.u4)Vpc8flqrWYW5cUXfxo c.vbjzD Br1WkS22MQo(q QX5WfKMohyYy,MglqT38bVn2BLqX_gWCSMB lvOC 5m uG23nGe 2XvWw usWeg2,,u_u.11wr-iyX7h/t sqGXvdvKxe,VowLqqv,e/K/-edD,LVWvh-t,clNiXeelRvn3Wl6iV2W9m.Xv7RbT/W)rOX)VzJ/oNoURoOTv/)_yaSgJPo)_TSKWU/BoPTzcz(rRyJo2wVKJ9 N0k_ukJO)wJW. sPN_B.4KAEz(mS(ZAWJF)zWzRzG5eWl3GQOk98)17pCKSp_e17jhuV -MmT IJKK/OP_BBC_ Q()-.0235689_ar00b2 nGEE1eM6vQcn2bWwc/nR1xMoekcJqesf1 cWiFWc,1uBWQO U1D MGE1C9gYd7w MSE87ADEaRI) QAQR RJoqI32@,2IEKJ13wq2LukyyfsYg_2JmomW9moJokV6R6v8cyxafW TvmjWTGojW3fW6Kj9s.rLy/n37VmW_2Pf_sr-_o-v/j1hYqw,gq.LqosWTGojBW0fozo,bmwu3u2lw5momWkguuZlg03nmWmx 9pGMGM)_KydSeZ3Acxeh e5N/ZK65w77xL8,c20miHYskNxCO6vX0cVEwdLEeR7WIdoGW/Grq3/Gw5xTmWkguYyF3r5oj))IniyAszuZ/G)@3quEx Gw5n1YmgHZzuC,sU_HxN(7xif31c0fWlkkYOWnkW NpK2DO6tttfm@Wdk_o-mW9Xb__X7/4Wn_n_Vuo28tO3vQEkOdkkYOWAcuIWvoHsWmTv1Vvy3,WNVm/n1,W8wkkvbGp53/JKWmO3e/4xaOIuCOy/3UorhWmUy..1mRYEmC_IKgqK/-kvOovgKwQ-tdi3)gWxeif5cetazScoIj-DzxagY3VKw,ImoakyNSy6WOus5whOx_mV6,mvs32g8c-P5m1UWzV2Oe,Wk9iVI/wwavxtw3Ru,wxw5Pu8WkrzxEmBW_.6WQMxo6I2_Xc,A5 gKrbgFoqufYd37WTwG9JWxm3_x63@qY9Cb_lsg6u/rs5cxEkZNXcj-7Sz5vv kPi68_Ogwz_usCsBOW4Ymb,d.ogXvo2/LP__mksOMnTE3/exezkW_zq2_OWgW_9)k4/8k6Co.y3shSG_a1pccc0c(hIxoLoXEzcaTWKNEyIM_T8bsY_Mf6oTPWXNZjcU_Z9rIWxEI)7OwLF7cLU366iN7@g6biw5Pu8WkG3 oev2(g6O)BDn_8inIFQ2g5ysLnwcVOW_BWp/IkHwm6xlQ(1fnHxe3iw5oNamz5vrvl3JImoKXo/ImoixnqxpOWEM9r-h9a_8X2JJXv10xzv8L/PF8NWqfIkQG1xmb0e2vXO4W6iRINVysLXXxE1.KzaO/. aIw4@Iq5c0ppLkNxe6gRINVysL_e_Z9KYlA9xif6FsJc_OsvOq7OXY.oKpGY 37pv,-Y_yUiOsyQlFcjfdnvz_CRYxL7,6dqKLv5frzv,-YwGA_4vXsbcGLksav/6uIFJeQDIxUe.udk7@lWkGggZjcDqabx8FJIV9vQ7gMw,w.KJ..I7_WoI/ pUe.udk7AlWkGggZjstUWpz1.y_HZysG9A8ofyh66Rv-W-J wpw0iKCNotBvFgisWcIz/Ue.udk7 dz5_ggcmoK_c7W1hIxWzuAe2v2O3_NZk9K/C128 OzVWKLP8yu_Y-Yz2C3CHcaoxeYbWQ_-qd_kiv_dOU7mmoKY9T9jWxaRl VJ12Jx1/I Wh (JRuxW3OvrW/4j_QOeqpl8rre64Nr6mvclsjm-evfvTzRw1aIwvJMEb_WWSMuAuBuCuIuKuLuM_ITY8YM4fRmmhxH10yjJeGJzNqT5jLjj_dm3XcOttsyQaJaooooK3Qvgaf3dlZjNMzwzwzwznjEnkqFWbJty/WXWx3ycS5HVyE1WnlUhZTkzSi5_TWxWwkHdLtljzl3t b9K-lr9 IoYRwGOIZQ I1(Qg//qB/almv_koItrx11NklM8,sv 1KZ,6GA6RmSu0cnKv/KwkoqRaf 1Aoopv_)f1f_w)x 3WggP7cvirtubx26n xWl4/WfgmRr3N 4Zb MbwkMS 7Yv6fk yw1VksuSu 4p8 e5.5K5s6@h36vQ0W-7n a49mkGY5K5sl87lGvzTsTcqga4p4PNhmA05YBklqs zmroe-sUWC/06@VmFkm1S0UgVtW 8Okizmroe-sUWbC/X 4Um6Zrm-Psq/VlWc/HbjLciVZmEYGslOy3zG9.7tmmZzVmFkm1S0UgVtW 8cj,bPedoiCm01 iizmroe-sUWbC/XwYhkwaAZ/qsKuKOcpOjWhmA05YBklGzqg,Vq5wkZ0Hey48mjko3.j50UgVtW 85x1Fqg261W.5zzLcgirSa9N.Mzi,1jgimmoOlslWz96izm,_K5slOy)iew0)Thbg q/02Y/ZO,LyccXtbz7sUrvWzuOT-kizmroe-sUWbC/zeVL5tL36W/8vbxh_uw2W.yokyJZtsaesja.agcVmFkm1S0UgVtW 8e.kK3Ygeo1W D2ONoZTZs_,6sr/OYiotsyWjjNkvUzTsTcVlAoudGHJysIn_jYo0egU.GIvz8qbxs_U1o-iUUuizm,_6M0W-p6H/Tvou q7c8s M7j_s1KWG_3KuYsmCAKsizmroccVl1Jqr35tOE_KUcTg-,5wP_RlNpo7-j9_yZJIrlKsyJ1)gGKrT(sCtUJor4dC7e7JoBuRS)STlRIs3ageONv,tR4WruMgwrRTmL9fDcUyByCnibZYvm6i1rrxYpim2rf5Soesmspmgf_Dhqnn_9d_HPuHnkbQ1WZsd3bG.syJ6grqdCHwcio1-.qejCjmq.kScArZUse.ec.oOFsONscuGuzbnTlvOYmO/sqomr6Z 5dlme9sy)GT2(R(oI9Nu5Eu33 NfoXKiyFCx.wMEdZciUZwvcG Kssu,tO_Wk/-csG_hsy0QCUuXTs-g-0b.E.iL3wPTKYn.3pz8s8Nrr.ozWiS-SOmauPn,/Yz9se1BVHwsKrsQyAvkW1OUYKei05Wpy.ob0W_8ik63146RYZUu7poVveocq7,V3gEG.IFom)3ZItYgVp/W hu5ZssX(_LGJz8wP( secS@VoeyaFzdZYGNesO 4GyxQlg,o7mM @Akus4IpY5k_ 40e-S eV6gP s ( a4pj07ZvzK_i-_bAhj_CxLOkNsuXSl5k07bLtokzksx5g3zXU5mutzqk6d kCkqW_KwUIuXPcExSccE,6sPI- ts,b .H(400w a0eDaOwbeWZts08adgznP5 s1VcEXgZ-7s1-iqHD7qGFsH-Vs9bf_0uakOOzK/Gguenrj2ac8ZQ2sx1XQr2k0fqgZs_Q.i1Ws Z8r40uYrd9Eg_ mYZWOm1w-.sEg.HkKAZWYV(yfN2K2x symuaYDE-roqErxs03xg)S_qAn9n4yiR_r1ZEr.l2e.d,9r32wdo4jwPZmtJs0eKyUburrq13_76dl7.a.rdLYg.-8nEo7jwjnwa.ZkJ3tWZL0ulc _tFhNnJsCqgYGgyVgygWzlqYrk0uakxg8s7Cs9)fsu3i_Qa.ZiRfPk0ssDvr-vWSNbj_qlvoOP sa.ZIJPnN8sNPDFxyRODx6nOuS7n9B_8t-J_rnDttdVO5szhwc.7bq aCpyUCzt VnwYy,_VNdY1DyxrnVy8S5XcEuusMkX5P0aw9k,7t01-ij0WuD7so1x,cBhwDyv6SnTUVlOuCH/87bPls 6,S1_CuHcZVvjBwM/UUVdW__cAlcsMyvVamk_cTTVoV-_y/Pscqr(1,vGj dU1-iqHJiPlVzCourkwvq0pWvV3XCehiiLCiVZJe 0b-0W_0w7.jXh6kzSSV4Zu_Ucqn,NXEiiLCiVZJe 5-TWmtY_W_5V((ozzq,@BsXcq1K bDevs9se0 X 1 0,zzM5zkuS-4p5PWPcbV1Ig2rVPPk6L94AW_xScbUyci2sztw qs0w40w0s3E,C-.pqBCs0s.bPep.pqBCw0sg.sY.pqBCHFiw6K2 FStHACDJHHn(CF hhDnhE60bnsswuwNaydZGZaXOH/tU/6 DTzCiHTzg/_JNK-9tNqyAtjXNTsrtqX.W/h_Os9 gW 4d q Mb9xlX6Ss L@Kmg1xl i4,wWoVc@WHWaby@_pWd7bbw,/@G8d0-o1rUoNg daJ1-FbXrz h q_/3,Wd7bXSY h3bc33uo o1rUo8 yvlX a40.,6t7f9uOolI,bqX-n jme1XHR2,m aMXlHeU1r0cISwUibbajZceEya2 sUo6gnJa1Xw ub,6bgs,LvM64ooXYLqw7,,gbw0y@Wi,. KVbi,budbXeql0s)zg4MSw1oyctq/oZgRm)t/6aJe,K.Lyabc0oq ,1SU-,Cqg5OzT7OC/wvs,osbd3DkG9,buqob,6JcbL@C,89Gyo3gG5xZ1t/2vtWmvts(XOY_vb,Vg1Gk1XbCwIlwit/1CKe6bblYM9wiEX,9C9,beqqy(1XlMRVrgqIb31wyECaKbn.99ddWxtX,j //6p1b,zgCA9,b,u_1/8.6XywT,rXlC,eccXLC)b(kbbX)y7t9kwwoty,yd,sS6crqv2bXo_bc0_HIcon)77J,lJ,_kwry7,n9Ss4pKi)YVxbKOXLv)/LJk)tg-y5jTJRS )d1P5VU1SexkAm_9vbbUC4LRaZvk,jPmve zlG_/F_c_scqwW/_-cT15Y_Vg_V2Ob74,,6V_151X,vs)J1xZ(6(G,bXI_q7bqD(UTWgpp6Q58JSb1lRvIbb4U_fMxKm0VXmqnEJ1_9(yFif5jeJlYjs@)L/mStgBy4qUX,eGFXbUU7r9YEYdbXrWtIy1Mfe_LqXxMBu)eiRsnd.wz_5LCn_Cves1g0okcE-cwjJw3b(Vkbrf5jeJlbSb-Ob GOfst/SSbKjpXRm,v,,aof5jeJl8fRXe68XlX,nksLTXLSZkcYjAdbb/l8k,N9/xUabbG-bkXRmJCe,vX,k,N4xT,ZbZe/zbjcrX_ e,-OZ,K@b,81bXsX)iX1uhqn1mQGZVXmqnF1Xzqn8/se3qWMsss)1xZux_Y3/MIkSkcm6K8g_Q_ZhfvGB1NGQ8l//ocq_EbrpHkSkcm6K8b/85bXbGxJhwXgSV/6QyG5a1XlXlJINkXwO bbc(mnv06V3 YsHojcY3gHk 5,,O6hHw 3afXo3l iQfo1Go4JoySbd5XlXR4u c,qsrDs(LYIks7o1bmw9weoS.Q5@@Gr.(s./vb//a26 hhQ bNXswv 4h 45cE8XJl2O ,vEy LrXlwC_LUcMA 1WF5x8L i _Xlo-_,sbeRXx, bc_ltNd,67ny@qyLCmJCWbS/X RSM6j3wK Ku1X4/SbgFh50RXlR,V-RQNC1flkMiXWeW_c,,6Ucxs_Zbv.ak6RXloXQb,3F9wp/AaabUlbAMXa1XGjvbG22Z,/ eoa8X_5ss)srXggAKpEWrbXkafkjrXlI,vT,wyh9VBL,-j0/yf)GXm9Jyu53/oh5zngu6b_839SO pXw3k,j.YLq1NBl6vhqFubY@8wqvZErYGFesS5zsixR_2QmUg .7qMy)gXVnod9dwAg/7t_zcFtoxo o lv6()DqXxFnTUfbXocoLca9xMwDv/Msyg6d1xKlvKKeb8YdFMekm-wuck.fE7RyF3Ji/XeaC(1N3zfWgVOIFBvKwOc/MsS,u12Wd30VbXo6bdfzC_bS, w)YC_jU-n,/RYhhhxoY-lPOCe,X,,v,3y.,b3olgz8OdqCcEfvwk2GsXQ2-ikbk37bX1.x,rgd7)BxLEEiV2X9n2J_u,gg,slBUjr3l,,1HcdSgqW/mc,Xx/)_yygtogYySgyXNNOnT/ )p_od1t kiFbcaY-2kqVm8X(oLbJwc9)t_RFTWczO/zLElZJTYLczjGcrwC-bv7jWj,yXxYYTZzbRk_ax 1gv0o9ke5shtOyZvug/XiVqkn8Of,A1Xt))@1q)aofhRRPCUw3q/YNL0ZK(6_L,WYL6.FKrM6vwmL,ld(9sXmsO)enp bZ.mbcqgR3TbX3F6qd /FXKCe uzlYnrb@knqYC mb0qbb 4hbm 6O 4 d )N/bXzV9S. ,Vc_a1X)36@GgY2Vb7x-_jVK kkm8ba2G/bb xd/mzXXy36d ba2wb_4tgmg6ni3xkwvLHuaoeJW-u,XZqSf1gcJlUZjbXJqVS5oyu.Jg1Xl,KfKNXV Qb/6pXabrXIz,wnXZa97shmvcqviZUcum9tgSbNvn1,,ckQMubcuLYsuV95xGC3nt,-Za1X6i.HYFcuu-5zyk3tf1KfJ_.ywW1XYLCEbOUqVivEfG2TcRXloUJws,T35Tg1q2bbg1M/96mflu-s8Lwn_y1XxY,r3SfY,NGX93lk. 4uDhM2b,kE1X.EWDqE,nrkovXd8WsMe1vo_1Xa1Xy,8b,m3-_fbGsX,5F1Wmfos1XK8Wa1Xrj,yCMLuO,tv/ku8cXjWd3X19a1X.2DwJY/cJSs9OczmX0,bbfWxJJ,cbg/tdK7v_IuT_PW1XL 9,bbX1Xb,ZbX/w5a1XKYn7.-RLlzhc3 3O)N46bd_/whRuL_5rl(fotY) 78_TWj2ftY)Y-tmqTbik6jTy//)/d FxYI_6zfQkYZksRGC1lXXa Z)/d xbHlmjmM,,V7y. ocK/btY,kQ 4 4@uhEzaeJn1Oi2m7MwigWlvYc6Kt3znMyM7SzdWOZuuoAv6em-sI3W zhmk 7oX)zJotoxEiw I l7njad)cEm3mq5m67fy8,1Ok4 q7,vLtOk_YGc_j/b8h2hWjZV.8q sKLmUkuCR5FEmalVlzPKjcOTq2TrA.h-2wuas1l2jz(0(kRdQZNY4/ xykj43(Wo2w-VKymi8 yLmTf0Jgv6hk6lG9qW.1axxXUi _C_CeZzLeal0 25_W/1mME6 qskxgv7w0Y0f4EmalVlzPKjcqgl8d83c1sd2OpN3BiqMc Ve@HKh22zmG,pJRdZ9hk-m-.s8h._k 3QNev,hxfg-fXRtB1U8.c WAZvi,s1e0NVk.5SB8tXwet2gW10/ tD5_W/1mMERbEeZ5-Eqan8l9j5d06c/h0Jgv6hk6lQr9XN)Ycvm8utu nAkcx3w(Lu0ptWzfp5E8YKsM/LsfX./gEm3mq5m68v1.g.1_rWFeqHyaraoUg5mNKLu90kdwpCtWzfp5bXyaskS9y0AX/eh-R8MjcImlCOf._eK K9WXNvGWkLl0rWdD8irZe.zEGy5uHREet.xdZ,252wG6rL2fgsrV1ydWfAyj5d28yLwAd b2,d.k7yxcW7wsutC9g@cDkwCudke8Yr H1EektDtX3zTc28R_XCXaw_FYgN r5wLbLQd_zQpFP0rnZzGo9_mybgYkm,aZ/w2.pVsd_/3KMx/5ME9Ze2wm/sf.A9dyuqG6B(U/[email protected]/zgxglYk8M2zBSlr2NpyrY.ua0G3Y49ClgU-LRU.joZq6)WQ)kcdXe4)wdXYEM_2K-bZ0uvkWx6Lcy9)1Gh/l4vVQGqlvmCqk5l1G,m@g(1hklQ/aEwy.,21l0L9iuoRmVjGgCm,[email protected])k2ptsEmalVlzPKjcOb61cXuGJbc_orxfZp1h-R8MjcImcTaY,xMkWhg@EGmmd-Mf-mncY2m/0Jgv6hk6lQydZ9hk-RLsKe.f_a-X1mVjGgCm,N_,AdZ9hk-R_yaskYK(/.AvO-_GmalVlzPKr,j436J2.eM/tVeOe-vm1mVjG3Ni,yu,rPDDmyMf-m8Lixn 2-jVpuFFm55–uYj/b8hh-S6Up8 MG)u5iXXf 5wu Zmlftg7ksUl@Mw2Z/bZUeGP5xFsqcu9vUKl7,nC3DL2RMM1HotMRfc0sqgl_Ppuee1-158vqlkZfj3 uI5 eHuRvsxYg,Sle12Pu_c2Sg2w)wMOsX._aNEk2dakyq)-er Y(3bvfreD.uY@YzulOcs709mi8 2 _q5XeZkeF9/U2wolAG)_X-jOil.KwGgQu_Oj 9.o8my,wg6.(rKrnG3J9_yE1bBfNp_6ks5m.f.0VCdv lg5mOLslokkol5xR9/0ASXdyycug2yp.emku_O2SsFgsxe2Xv_LZ-.yqyQ6gu7,EK.lcu45KB35vcElt.0w@ OPJ,3c,2Z4mCb.CYK.w56oY 98owyX yrRaskpyKl8FG9,AgYpce7k5H.sVVqpK/0Cm6Kk0LiukbqyGf94Q_,owmguU0e.jrx69voUA0u/3K6RR8-wqelZ6yrK4MZ5-8-8/kk(mtseZ.,6r5LWae- a2w)e2ws oe_rTy.OGy)//W7/I3.A(u.mBFmFq k52l 2 C2k3okY/Bn22 z.s.rkf1dozGKf/sNKdheXoe6asoee2wVg) e2w.sb-5D.s2m Ye.ye2w.sI.sKe2wgNzUe2wE2m(.Y1W6w.sKgaK 1ww6.sO 2w.1mVzf0QOAmu.sm8sgQ93wjse2w mgu4YAqW kWB320ZGmW7n wcDsl6Kk/o)wm)35GSI59.wa55GM6vChC8oW_3A5xc8,rHE.eyL8aE.5mvdU0Bbwr9WeC/v)ux8szkW1kJyrUWYLOXMC089,oz yI3sayDIUrAWoo)sm)UKF_G 9vaSUXZeq)7,eT_tqh.0j5Jk VlqW54yTBo963Ww8ne18exfremK7T7kfZ qsYln.5_I)qP7y We33IeC,lGWU@qEwm)lku sjvoB31xsBqz8./Efg(o1GqaQJYOqqzcXC58lmqzU/nQg1ocmuXXpfAv /iyqg,s_B@TlBGse8Wg/l/3equ_gi.w97 4aiEX7X 3YG XVrWO,l0xqK_eAymewElq iOBZ@51Vba_3y(3dzBacgCwiq-9Xrl/mVtcmklS_GY9SiX,dAaeSYsi0_n5UwWynEw.rXkD9CwNQ5xBUWA,2)_x64q0LQKAzp2KUuL-rw_Bl@/y,RtN,Xo824XTOw 9Oj@UJcA_z6EyT_7.q5cewaXyh,2)_YqiyikSAmgYeSykP-w5dl-xlau/ssScg/1C23KwfsZes2h,rEes)eL5s-/LxMiGKwLb)w_y_xX2)lIcX_jxHw.qlNrig CKqf91q,85eyw_HoX,3lw.qYOlue72Sz4dACbeO.M5Q5(3-wpg_N.iMmpG,NQXwP0iryqgQ .gMX/0UvqKwzQpF/4Vw.qW5Waqt)XuyzgaXkvkXegv vNOuz Yoowc3Mjwz4UwUwZEXzWY7uZx8kqPhKV5OwM4.dUeAyMe8r_BM@…3qW LEwt2gqKwLg1twun6s._swluWVf-qu2pEa8kq)EHLiFP eDYMphwD(xSkwN)AxUVWzNkq8kzvkwx-nk5dC6/XB6q7OfMisrDyUzw_g1tw6N.hrkn oacmRel81T _ fRgK.mVab_M6w_ntk Sb01mq1V26h1G6gl.EWUeg8qW7qWDlrwG-.XglHZgw1stQ7z_U5.qW)w6lhyd36 2J,NRy aK.3Kjsjg/8L7G0xzSsBjU d.u8.66_1,mqEbLsDovYxqWZqWe9nmzUk3wbeaO0eDCz/5zw-rwNqW7.,rkFZXGtgX7bcl5s/8YKv8qws1gkcmxwa yqwUc83wq-3NV-49JrWCa0J lzcwqWLFtVwaa0VZwW-c0TMMc1Q.bUwzj WNluwSTmsKwllnvop5ew)J0wv5@V4,jMEJ.qOM)fnGsab8c6XwZV583wUp..qWUqW.V8YSwRytJ,g1s0s0s4JjFZP@D8c4QwQEod,RPV5w4qF3jqJSw2a.qWOv81W7/xx4mP@Ij WwUm.qb YU58qmw4qF3jq4tjwmwUmMgN@j [email protected] UqKsw kQg8cngTwB/F wIjYSwE.26uwwx/(5(W.pTMqFZ7UzwU58qWqWwlnyGlkvbl_6wU.P1V5wyvrXNvbINmpPgwFHTvYxV ZCsnSk , zEzf1oogvcdvSghekZfhaVjKfff8afOlg5xkf/3rlVsav6.lpr-Wn NF 32,(2(3 46U4vZBSh54v uCQS-uMZzHwc-NiXi0Kc_a9Iv3.ROVj6wqB-zJkc sbOk247m8oKHvPkV5h85zznvhsKZe ujU0n7 AkjUoqW)mR@j [email protected]_EqO._5MaPNyw3at_b WRpgXe.g/wqzspkqm.qW) Q@uw12R-v0r0aZu1iwbQ/qcm .aQ.wI6cd)S9obbuSy2w.Xkyw/kthSqWT.wa.wSJIsk.wyaHyhKqmR@wuCvIYa8/08kwy998v2q049/siQ3W) VDg V/(d(72kXB5x-Yq3x.uS6DU.J)v5_2rYy)z91gz1 rI)0 QqkK.AcoUYPw lY oiwE.Ql13wzbqcRQq2h9q@wwKUdwbQ@bR91K5xClU8clRQlQ@sFTKw aqn9eOjpXMK5o/s@[email protected])QIqWBwb M) J.qKhJqWTRw@SKwA.) [email protected])jwEKHwEQqK-R@4)Z.qWlR)QIqWBwb M) J.qKhJqWTRw@SKwA.) [email protected])jwEKHGw_tXQqK-R@49mvmcnfifN m7v5SNnv awfkW._oRMw.Uf8cW8uY3KfCfhky,ghvsfw4 zFUt) @QqWBkb)0q.3av_l7 lvl) d7-xRQwdrI)dc/ov-vxmmKwow1vemawaNOe@dusa1Gcot9qn,cGt WWyyhyg8USzoHwEp7swynTnz50O9e.kapdwatYl3pm0jhYqWwam.ypJ)8v/SgdX ,3Dx13a,(vkyixV2NEEx kamZURWzwO.) Swwin.(H0,cuKqCaC8lyi/ezyg ECGV5lUHY_wqW) ZVq97Yw6/wfDrhwa4y,q(wszH6wE3Qvsy4kwksWS.mR@jKkqsapYyqc_nyqFuz(@ukkr590Kca1qF,WgLYHqFi)wAOYqFpFqrI)eER5n nNby@3wqTqN(xObH-.)0iQEYXrI)6WQTUwijw.) SJ.qzKH)0QqKFxwkwEKHwUNwJwb M)0wwKwA.) RUei_ TSs2wKkWSpxeh_Xs(kTR@RcG8nw/@/G5jJw/PluRM9GkkTW/qoR8b/J)SQemVeTlvJGR(a-P-K)HsQ@lToFgK -@wsZkVQR@QbwaGQ9wZDI)PGqWbXKv.mxK20mNeZW ZnN@BPm Jm(b-zk/59339skvvvsggg OsRdU_oV/YUVe wf g7UXuuc7b2ejgEk/Xuy1qdyVNtu0pL,l2skxQXsDu-3W6X6@7u2Xu2s2Wx7z(9Xu(x5dP,uh8v2y ec.JIu_4fblDhse_)W5xGx,uM2ykXqtv8G)bxkZ6Sg ,u0EZs3WXjZoEzthCZbhu)Mumsjo6r.Huk8y vKAresLhici9UVyk/D3oSokyO,ufykj4WmI/svr8OKskr5XwcOFss) 7fY-ey_f-o)g.2LmAqkd,.yygmJKcNX62Xttc3wj/bhrghCUOrnoqOrkZKDREmjsvdRs.7T_3igwpY.ttc3wj/bhrghC9ZnqWc3iXWVI99_Emnl.4mMc-p/lSpIKJV7s(grv-658zevnMxxJc_@x1wXGhsrv)g60H.X9mcAi)9mcUXFwqGdttc3wj/bhrgG7o.aC(pU81MCq.J1EK9mFvMoJcHii6ad@ MtX-PDW9myxApU1,YKMDPvJ1mO.WqFv8gK6m,(1U6apg/yF47OxOplrciGkMmd/.KSax yvIKJV7s(grv6y5)Eu rXkjXG U06.hudct14t8Yxmqxt,KrBNcRCA6-yiAenttc3wj/bhr4lOgE s5WX,9BrWEmjsvdRs81-ocpk d83_crdBl)xkXN56(1m KO)op2xxscRcK_W/1mME9e01a903d1m1RNr)k1xme.2Hec/6.hudct1445_R-oqFGlXsr,AG7d/Wy_Qam/pcCry,/l(c.F/mXzl2ox-raOLGmFvMoJcHicS8iy@U,18JY1XA@,dw,6soquwPO.hqX-PDmh_qvg_efcsEmjsvdRs8ixK6cVC5Km)g0MA0-9dGqo59)/u4FQvyhk-RyiVj.6h oa h7IO.V iM2eQoF/tA.qDO7 oa IruST(2 IM-mG z/Wkcbd KicxZf(iQF/JU-Uox9WI3kqXqYsVzin9Lxw5aqoqYeEmGLkrRl2oEyIyGq01qr8m6DwZ8v8sLXcqduGk8l.ZmMZuurLC8Jn_ oigzyy(WfyCq6,hU61QcNf9tRu6nttc3wj/bhh46ohZs.0ryKqZyqzs 6.hudct14)n8sLte1_YPJqvyhk-e1u2W_V2s 6.hudct14)n8,VqX-PDDy5oT7j_kRtqFv8gK6m,([email protected]_JAePW/1mMEQceDxGN0gh4VtqFv8gK6m,8Kryhk-X,-.gDls22/Nzmmj6.hudctwdX/1mMEQc6yoaz5 2Y/5i4VtqFv8gK62XGzl(1MeRv2xP_6/61mj6.hudc/1mMEQc6qZ8ul1_Uz/GR.tLjltCIoPp).zHRwkx 6DcqWaV m cn1mFuS2Vhk-XysQ_ eXFii9mWjsgHggHssDx4BK7A3o1Tf.VN7ydV m cn9aFebXoP4m6Tmm4yK9@oxthrFc,6Tm1n9XgO3o,omyX@PoaC,uzEyk6ZbDoyyyL,ut 7Wy/0yk9L,uYK_-boMB5L,u4mZ_Zd4/p-sebXtZm6VOl,u03Dq4loATpoGIbXe-yjXw7c 8hmB,,u0aIZoWrbtOBD-Hk73BzXoh45ViUk3aTFGrt8k-06x_W_Wul,vX 5-Yzo3Va2c2eUj5Tc_huhQok/zr7jcqn031W62hY-Xguu__x/OL)sGhe22,sOtGjRyhlPOzS(e zGddsWBy0T1ponEI@zsJ. ,jJuxOmNK3.osG8_pswY(dYwjlc4u.V/Ubx5oy_my6-dxwYkVO0)Xmi@zlmle_ OzL7yb8H,RD0X-0 pclFiu.rRlo6lcyK5o3EuyeOSZg5TdnV6o9sd6.4o N1Ky._Ni)d7y8urbzMe0owb1-hSb3KkN_S6o)MpBJHN5jN1dUg8u@(9mMKm3Mmreso dWR2aUxE9z8 xkyXO1t1ojNoe.vh)Mr.4 CWxj-rUEBRN24h6,QNx5ez)Bc2Ocse4UXFgKrh7skyeZsSeMO,r)YPz6X5XszVff2o6FOmykG_G7kaI8hy5o1K0yu 7kc-yk F5/K1ye2o-q.KMKje2obn-mSF-zV8elmUu–9Cy-yky0UNU8vTe2oe2ooq-O6YUz)8hY-zK)udxyg- aZJuje2oX(p3uQ/UesgzpcoUsOJ_rJII8WM.OwikaSsVbnQ71q9cox2HSXwGVRcZrcblb9lGct6C.bGvR-ww0y8v6MUmWNyKWFxmrMRLUunaZzrDQeG95bVJNVJH.Y9Ocxo oA NON5HInsjMdqr.Xyovg2oVa_FX Sdt)1f2G.5,ef)b8pg51uk1-lY4OKou,f2o8Ve gU 2MLLR7pAL6_y5itOzvXe2om,-VxmPbuijCnnuxwGY3UY5mijs_Vohykxi2RdvUA/WTk5gqYY6cCkzb(rUe6GOL mNkpy0ykxAk4n3b8Zxys3ZvbcWh2E7YYk3-V)W9j1G3me-jomFrOZw,lCvOOreTXJvNwYyspo r-wwaZOwcRmmciEmXpMz,,CYICnAPm_ZLC0/Rm8sTn,kmUU2orVow,1yBHxsgFC7J1yDmk-B-d.3AcwG,mc0yksxL.bk4gt1xaCU3 My,o0ykx9 iu1I,UZ8w,fteZciYj.jyVdsgxKqhFS4)5qS0o.V_1pO_yMZEFwkkb/W22Wm/zC,ydseP2Ya4V-2B0XjmxU1 RVrxm4gXrAk,@tZ6oFvq1ydyHiyuC2 4KkuoTSJu2k-5M4rq_3cuh9__-bY2T-V7YAg@ps/DQ/s)A(nwMfMoyUd2s888o_MHLL8kCyjc.,7C9gysV9LVKUOVWc55@ JE cgs9yVMtLz(R6BMHOS368uOrgbW_Ns omyNYxvcykeK5oAx1gcsd,0w6of)e2oEY6.yK/SjfvcAnsfueZo.y595kUo_Ymxf7of e2opgjoIXCAB93z(d2o-0yejB9bS_9jl8 KDmz-2x-V,d rcmQ y6ykJE m-,y5foeZN6of/Y5O6oU2o-UI5of/YFP7oU2o-U-v-,y5efyBYKyk1ouYTyyeC.i2o-77edNmImuOZojK-ykTSmguVaxynh4eMyq2ZV2o2t2s1zz1wv7qvHxLsyMcT(q(uIluee4ofVwRrSyKY N3F1sI1Q clWyDwNoLIXM_g3U1AHhEAZ kmoq-Ra2ooIw0TfoRFMico9aIv.3q86cM-KYXIs–q/xKcJi qP. c3_P)NJmdAEmoLoYe A)B52dqSqC9zm23r9mVwt5PYfo0/oeoYLMHf1gRFzr)cMe/mJkeHVwmN6mO A(3TWG SoxdBl)JEAI Ww_P_GOJ9/Me,)SeSWT/9uN_xu7sy7o nqN t6v3vrn.yzUdirLms9Men4oJW97drdyZmmyYkYmVru_oS)nvjxoAbM)R)z6 ShNW4F3_7o e7EwaQ0JS/8sy9oNoSGG5ocKUy5DCQUuu3Uob-Euby/k3VRATXIVYJ5w5,gOm6 ZzjjMDxk-Q -yk(TweFZKh2sWMyF.om9.)_O)Hk)(uJ7o tchag(yU7yyk20oDykoXrLnh6VmzyyeaOoTVWbzPgjRmr)VyY56u7.41oVO4oQDsek FJ.oT–RUEmpemM5oV-ye56 o(Ilu1o-JVwTpmhebJeoYeT2Tyki2o-x-Vgj7/HjknnVllORU1VGxzU,3oV4O.JSsIA3BObJebyk7YISj/x)5ySBtoTymly1oVMVy3Wl iorOGNlne,VezyvVUa vw/Wb.sxjV@WGhWDTgFn7p7Ftz6_xt3gNxWMN_x1xo W/TeQ.QGJk7wd, AFd,mOD gxK)gim6Byk WUy,lVVUB8oe c5ilvM-etV7Je@2SoLoNFb-ScZyURP,3ov8Lxe-6JVUluGcoG.6w-yU/ nP/[email protected]/8s9Kz3c4yeo10sVmoc(oh)9TvOyoyeotoe49-Q/r(8/CY-YEt-y54R yKTgKTVY-sOeK-y513kSomcZ-yek3 5tZoe2od6sC-/BVAjW_vfu2yG-.b2-yeCu3k5t.-yeJo2sknyl3o/tBFib8l/_Bt3FqLxt/E__q_OEdFDKi8wjoTpVx@wMk(9n8qo7 dL 2BVcX12Y/asmC2o Cm-/dhg c-oV-pnz(gSpJW6rJ64(yaVc-gu4q.Y6bCUmjxg UX9XtBjU_lqtv4y51Jn)UW dzA8Ayh3KJ fm6XXN/vrK3owoolhM/TgrVy,Kc_d74g-.tck k k0OFkfIm5qw y_o6/.xa1d-gyT8Zm6XHo0qV4bAns5W2o6rkZRn KyOZ7 Yu_ViO4oG5n, -YZgNY_23 2ubGWeUOkds8eYyeo@I,YPwof(V)DLGiMab-t.r39z/DkxMz6kECpa/ziUiMTp50ou,aG,y@E..,TUf/yYFoE(VWesq3Fci(oaC.QcY2ORy3S(N9r-br2obhQ oStLrIt.wykvCMDaXHoLy,t-G)3y215qU.CuSvDU3oMg X VwZKobpXXb5/qWPs,TNS9(Z-yKo 0ou-n1MQ(ouoHGYYGWnMcKJoWJ2EjFbYkYF3V817y91/ b)ZS6oMbZ@ykqbjUUUrw1dwOydI,ywK0o-8W9fG48gIb16Iov5bWz1Tc20oM(2omV6 5p8(a3oySKxs2cYpEbs yDU5HxxL/[email protected]/_8m8Bzs3o590odDU6bCP7z97ooM Z-yku lBCCnAa2o616cli3fla-Vc luW_l2fSdtWc.R0om.o57z1tb1fa38h2ruSb_m1oK C 8FlsKO1l1oov-V7oaB6q/Zn G-VMZ6c6tK2o2mOqGOM-ykymqnK2ooaiLFbl tyeZn-Vq-mye2oY5iwZf-8-2o-VK,R-ye2oc@0o-yY@)ye2o-K_ -y,Kye2o-yewdqiPJe2orloKW-ye2o4K(2o-V96 ye2oY 0o-yye2o,.J w/oF@Pmz(ZmGXrp(r1nqwq8qq_DRO8TmGFjlMW/v/D_xiwwwwwwmzIN, yk3 GNgZx ykCWj /h/Cu-mxPOd2oOioD7ymqnKsjfO9yoo9wqyGe8tOm/qq9ueSIyJgerw_Whl79Gra0c0SS3,_xoxgykoVpLyo1Ag.zfCq/213XU3aSi/fe/t2UGJStc-/-VznxzjcnCXxtIW/wN8R8@Gmy,xKiqTExsh_f4MuNI/cinv1ct/iQfJFN(O.CU6eyk-b kyBnI5c)VDcYGUnoHE5bgNjnU8VPJodMZYEa(vkZ(9DU2l/cY-kiqobJyyzGZ_.xw/KyT3dOC1oYx ioMRNqyqdXjgSoXXc@Dex0oV0N ohl7oegzOE b.bosHKcZswA8JuxNakEFsxt5-xrlM-qI7gKuFSrxxyARsozxoBmoqu5okLXM0oKv,lZXg6H6JWMmFTeu2Fyq0. n4oMn06k(bl6WZ0mEh01_sy-tvI-Vh.vyk-10Jt.aDnNtJa2vKo))6eK2vKoU9nn2 6-OXLM/0FudxxirYc _c-(yB–eyM/0vB5cxxirYn Cc-QlcrL1oc,X0VV–eyk(80V61//n8R0Oc-nzt27rkm9-yK3oZ@n lC sKk3 kWMeQqg/y2YYKRnee_qn-,HtyCLHKy JObQ/ZemeoV_b0Zkao-Oi/7(jCHBcY8KZXlQbFcg0XKeQyOXKu-3p7wb6n.4_vkkEm1yCzsW37_T9SH8yWo,Wwkd_UyS0VVAeKGz)/.JO c.xILgN3UYbFfBzyjcTF_R8yYvQYYKvSaZ@qpkyaC3kzlRsPxwJ,kRHTJUako-K_TKuCsOh2PuW.ZVki-u7iV,cN56ZZgYZlW-ZZcZXobK2ray6gplm6kuvZe_4 wjpGja2cnz9/pfcMFn-6hRqk4Q,8FAbVkw5ahYKb ykvxT I8(oV_-V2jadL4qjCuIoscYb-gIp4–cMG )OkZb3O-EkZj7ASqKmTzz5-ukxxdwSIkhY1F /Z QlYK NYlXkdRT_R3qLZ1h9K56jSx91_V)VF-Hs8jP,1ct2ZwQoT,lXKk1@Y-ZXZ6tJ52TSa3enU3hiF_rRYrw3ERk@4kmkEZplLaYbuhpe U.kAvEVO. mmVeyZc0ZB_xpFzoPREzbUZgcmZV_kJ-lU08suwFtRQwzZZks,6cyV Zjg5/sEGSpCw-pBB mU83vd/o.sOV6kc_va dUIZO)Rm2uuYUg,iTVqkakbXso)[email protected]/m RnEk0g/(lFkxV xXq0 y8juu1hI8mMJ6CdMG-sNyI_u1dI)rh08zGe1ZsuYZXjg7YTOqX8tkIN-a_yyb0uX ccQ-_-Zj-RwkuEDaMlg/bCFwZoZWbthl5Xc.ik5.bwfi)O.7Z.Ft8SKbXTWMWZXEYK9W_YxGWK7eMrYK,c94jYbLkbeZXmgq5scqZ (Yk49M8 cSXkmcyxkDXADtm7-ZLf,Grb-)iZLX-lKqh76s69q5_M1a,qmPSVkOqM1zvybkGt0ru-groNs1NfO6rgk55CnwCmvmn8nk3gQ2Noq@0l cox9t-Gkq-FwnO1HCFqckkmnmUYKcl18mcnSuh9v_8pgsTZ0Ygve)5SOEmItJ_k1JpAddMMkZ0OtCmvmn8nk3gQ2Noq@0lcox9t-Gkq-FwnO1HC8X6i6,MKMW.8mcnSuh9v_8pgsTZ0PrlX5SOEmItJ_k1JpA6E cZZ.9TJwJ_L(vJGYcVFKxw_syKmXWxgnHnMummsqk,JKcS-hqXxdo 1Estr_W_Zf EBcOJbEkadq3n7XpslEHG/eCOeantdGyD8Y5948pgOcyxkDXADJ _LJE8KaH8k 6qLZCXgmw-i.jrh.qO8 HOicyxkDExd,UGZekMV7CkiN_kOT6qbVfQht/ZWCsi9N9O/f_r)O9E/xO k_cQjPpY)c._kQRk13q_kGtmgYrZRe-xKZejHUXK6As,68mcnSuw_3_Dccm,SEwaI2)Aaumj3TG3(lPAz,wbjfb qsh3cnBcOJyz6mv1MbtrJJ.Wqyq253hZVardCQsKyY_q)z-/XKq_g ZRwnO1HC(a,2YYkk9rq/-_3nHnMu8-ppv7,Li0gXukuyl@zJoexSWkQjG_QGpTZMHwnO1HC(a,3dd-gqsmaqw)CgkyYr4VZoAstdE/QzQEVs8G1WX_ndxQzgI9k_K0Z-dkfcB1,qHvmnw3gdnc1kxmJNze71k.iFt_/D2cYw1 zjpk4S)jZuxEiSfYGWj131 ccFeu/h()3cuyXoOiO__xQCSw9YWuvSq3kkkMERm1//rR@caMWZg,gYrPpW9(14Zq_l cq-YG6cl2kEfk3//gWnSWQ6F6_IlrXu3gYtbjh3cnt_qvsN_J_xs9._.rWT6kO.4.2Vob_vm 8mcvXKXT7yh_6MnO1HCFq-CbS8Kk0N_0-Er7Z1k9k-_RLuappydJuR5DpmvQ.Oi1y-/t2.8vjcdMVacntPZkqOaZvw)Z)Xu91yNBbtKccpv((eHlK uvqkVjHcww3Ns)frb/Gk/_-vm XgZZl)rRRRiowkX529Zi721I(mE/t9ffvbnn-q_xx57SnRko_o0.7nutu c)1uNqZSv_qzOftFe8AkYs4Z_kbW5t1smOlM.EuN(YYq_(GWE5Q/n6d9 d0OlTsoZO1hWkGac_5oFyYO(NmuUM6 tePY0YJ)onL.MM,kkXCf-sWyJ_e81YcX9cT3Z3sKJ4lSZZ02Y8G3kkRIzIiq2Sku/bu_1CVLZ 9zffq2ccNxJRNmmyLJJJ-7gcwzya2gBo)0g8ckCCs,NV QybY1N,vy1wLkZ4YkZ1MHULY9Gci,8@OwjVDqk/7ihmJJNlWZuZRnKt3V0XkXg)vnRM8r6zVLukGt-aTXgXenFYq2572,dVcOudOalCk77YfvZ_Kuw63s7sgMcxbnZlhq7Cs_q-hkus chR/tfZc,uvOu_KpkblQOqqc9NSso)/w 8nEVLJJJzwYrkLJZZ755C1wv._7T9gvjSZZ02YkXLbFIMyg8Yk5Xc_kqKJZZZ_k55UOJJ3 6c-eyd8oCCr,dkkhN9KzNX-@q ,53kV)9jw5,YYPNSWnkkXdg-XkgDzIVyCE3I8remrdRMkmuJZwZk3.-lfooO(u-OF24Ve UfcF/XxklYYvLZ.rBk-kgC3cJkZ3VlOggvFmYSvgBoZzuJkyaM3TJJZuxMnx1IC6egsIUN1g9NiciubXEy56NCW(YeePZ3YVtvcZey_cznz_Omy7zfl_Nm/O-llPgS 4kV6twpC88eLurUNGfYkuiT5.8,goLekkk c9vcmP,AZn1cqpM2T6rjuTYzUvt2BvoQKoxKkqYuGqn1_Vd,vNDFZn 00w4C_LE3O3pIuZ/fWcsz2cgg_Sk.YRnqVACO idd–50-cl)aPZfvtuNE71ZFbw_- oZMOVoZb)Cd1Q1MAo_ c gm-XK9XK9rkFkXK5zpMED2k5qcoZSZC3kU@kXKFdH@XKcZb_Tfd XXjkyka-@PYMrVJ8ZGx,Xu@j3kZbJkKtQkZ-x1QyXoXkkqj-YHVXkv2HDFYzOolHo5bDrkY0F7Pfdhd 6/b6 2u )Zk5JQiM3knFgNk5jiiPf7Z5_w_ J3FyS5f j(tZnXL6nZGh@Vkeml@ kOFciZbB5xx)uoXKMOZnr__(emNAUn iw@6)y)5bnm7qe. wynBDNi39,wKoqe.Ewn6o(,7d@y@6dFQ-dYC 39tzq97cztB(u2@6PtagctFzA9A/DP@E2czrkU(o8km(XvlCZb-jHbkM8ik3nmAxdFZ-Xe5QbZb-7vs- 165V9cXKZZXK4HSa05Zb-XkksZbr KKZb-VXM1e2sdZb-XnoMdstZZb-XkjZbuaXbRvMsWt/qZl6p3lurN52ZUvKkOiikrX_yoVo@le-Vdv-S4WYLUyvZUzK5kf.jkesMGrwfn3c8 bacL6.G7clG,(8G6LDRC0d0g7Zgpoug(os_XxVvt/1 (kwPv _PZ,ae6klaMKvy5qrwNOlgddBm8XbFeU2.5KW)0S5z)ZY(XXQt7SY2O2x kqwRjXQt8O9-8W1QExRj rkF8l@@zKfSsYQyY_ayDdzZkUxquLquUpk8/awc7puztr1Zmmqego. wMEi Vk 5Y.qq9xJnVYfY7wJZc.12,@sXK56Vn8VKxBSZw6YdtRuM13DC.U-yUgfZ1-0U8uNm_2P2W_6hnX7heDCJ5/iv4IJ__a8rMKMOSo9WuZbc_MJI@71CvBOf9p lFyE1V/-BzkVbJfLRk_ZbLbFe Z _GegVV2kbl/Vhlj5ipX2XXQtX3aTS/kiHYIVZi_XKGVLgx/o3XXQgXKZieCfneFwoOP6q _g9cG xqaXtt8qPXVkZb-VZP)6_(m9xTX1F3OkyfxEqyVbZAkZieCok3@ 2/IJd2y(7,2IbZAkZieCV._)XXXrE1qr3HBytH8VZ kZbRYmo8NHJXXM1SZmg,SUZiXKkZ-Cf(kcP,ZYk,aBocxn/jXKkmU1m1YdX_922/LesLC3bZAkZieCUa-lw5byxSa4cl_y_qX12 K/cS09VZ kZbowi(koCgP,qfx/ePNQS,M,RZiXKkZ-Fmg rRx677337wkmU/@obgUgoKtEykb-XKJ/km,a gNlNAnAfgqiwaXstr .e ,OXZiXKknQ-baL//28TkXVkZb-VZPV V v0bvm5ev.jxnweoKljgmvvacnWnmWm5wfyGm6Dl0pXKE(oMl8trmrFa-ewl0NiSWRpkaXR@Zkkmev/aOrC0XHOM88X,pc02XQ93Ly S(r(X_D/bh7Fe-oCamlxPWuCfVV(t,CQzUZiXKXKv ,9.VwZb-XKyQZb-XkXuZQXKkmk5bZ uW9HXmm5cEx13Eeet18hKc16cyg 5mHyWD0C DB2Yk1hkG 7nZJH7l5)3c0Y5nU3uLZmZgkeSZiuXWnk1iZgu_g2@8UX_,6 efFM3-v-oPf/n w7 kZ(Ixw-Jg)XK4kjIUX.pCx-aW 8gZdnCdk DCHi6L2ovndguWbL46nxYZZxkZbYSVtk3kx-kfYVvFe JZbgE3b-rXKVXK4keXctJZbwZb-x-t,oZb-ZidZ5B_ZNXAZK9Zb-XKSjkeHZb–_XcW2i8F,XKz_k))a-zJb-XUCBwYJ8DQCC66VjEkZbZbYSVZb-Xl(XK5455XKkZiuXKkkf.woKZb-XKeXK7wrbb-XKJ2P62 7k0h.qqmj2gIUlzvWvrAj1-dNEOl2_Kkcb-V9sb-V5BYeOww5m5lv DHW1dOp(JVcZ-8j-zc-gVdjTc-r6kQkRkvkeGd_oS/szOwZkb-XKS2V2h/wbfssu,bRY.Us 27TwR5)keBk5XLXkgGFb-/ee2/1wUwnwwkvzfObOhsG,OC31fGY.3nnrgc(3_ rEeH/ 6GQebPVe 32trB1d Cxxxx7OxgxxxxxtAGY)N nxn U/ @PrbZTXeV5XfMCdmky /oMprZb-XJ9aI4/2y1s/fpOqJ1t_v-dsfjeyaM7O,6dsG0deh-1Wrwn3mkkicqGoM3kveKkMvxKoqNYZcYkbt7pA1Zf_mfMG 5o 7966-vAaCaK-Bf b- tGb-XKHb-V- HnzZm/pc-pl8)bZk ks6c9crS/ HdKteP7hxPZb-1XP7ZuOjKXK2/kXKKkika RuI)ZXKb8Z P9oD Hw)A0UIjDAP BJMI51i1ws03-6k-k97kk/knk-k-6kVZZ9GCAiji8V-ZmlvSS ZZFjZkJ k-kEe_KU97gwn7ZCZiwlD9CCtkWWFC2nxouCtPCnONTCQ7-E b- -_KuLu3UGVnkpP 7bvypO w9cCkx8ZgVr Goc9b1Ey6eK_9OZhXqWFnNZQk2q_nr5h1YZ,nD5m54,Z 1Xqu31Jokik8/1/Lqgt2MZZ0PUi-z4QoiZx3ZV_ox,nxH976Fn4ZCs7E78r7 qi_(IkqWDbx_sY-s-DXNQ1YbWnwfsQ8m3NNFzND8ckFkx-847h(Z 4xqcPkgOsxW)MXkxCz(D//ww, wEh9riB pu49hiFlg)7hZ(IklLNzXV2slxlVauCkZT6eTzl5QuLV/qMk57emYqVoesNX)AXkz7FHJZtZYy6Qc,EkiygFZxA@-j8M1x//j-b_FuPrZ1h-jkWnh_npc, Zu7_xGSkNxxMCRZW9z9N1_bGksyxa5TqOJZZK.ylFyBky_sCV kFka-BNO9us,kI9np.qCp0DEraV5oZF JZvy HMY1GQzoj_fkz4 hH1WYa7w22i5KKcTf cZYUt)T_zV0NbYpBHz8UB(eICD0 9atOvq187__pWB/ F ex)7V2r77_.w8Z_P0DcygjqdmkTyonrPBsBt.shOo6el)XQPU 1Gn)DhyoZ(OLo8KtOPIr DhQ5TaND3)s2jcyZXGkQobbb0(jj1b0SnujG006mP1u5w)BrhSQtfr9tv2mGQDn/w395seDu7gOcMC7J8ejGD2c0 opBkXhxzHoCUE)yeaVgdhdkh cmuczJRkxs_i9SuIwT7MYQ9isXXZndtMMq55LpwK S/Z99FIF(BRPFugDEgNws2vHJl53(Olv)a9FjKdgDC5Dz6@UTyttx16KflrJmJ4b h6xY_g1oHOh)kV/HDg.Qta3Cil2@gaQR1v bh77 D.)7uz2dFVzYs5D_VRoB,05Sb9Oiio39x7Rr i jav1YnYHLtnHgr Op/5(1eCJ2bbSjk_3Xz.5nLnYLBqLSG).pO-d 6IVHoWtn l3my9i4hy5ypZ87HAkNxv.iP3pMAE/qhY8/oLwL_VX6rB1YY DCh2bWhje BL5Cu1Zp0J8988)PDzRX-ztFSGyx-(SRxa,GFZY3 fDwwhYuNqHCXd,ybF0RQ.9DVjq8kc2WuZnIl8-u98SMShoOrZ)7UYv t8HTK-WQz YRT.40w,a)4b1/D pkldRo8cx@I PaU6G)xJjXd8LrTTBlu( rLTdY w-bqOf S6.GFFAU6gi/FD@[email protected],mkR_r2No2XsP30x.LEw/afeR0170R( XPZE,Obzg@mEpBaoY5 aaIwGczISnn_5trLMKYZn59ghS@mLO,KSHhNZ-5nbivQwl((goEu()iKRShv6U W3rPsJ,TJ9 Cnk IpmSnkBMrFRUBxmOnIW2WH kiqfdIDt5(.DaMozJN5NyuRvh3HBONeZ/G6)xJNxvw @l-voo,VHMs,jpRaQ3Icev7qHylX(j,Ql28swWpVQRqg9EXEsiyPn.IlWp1U.c8aWGMbuGRE3BXeCcS.),tVrMG2,WxBO_ VtNWNn6O7yNonHt)a7KqIQB/ -y8xvS 4k_79S)-wmyp(1Bqc@ T3 Qe-qhHEYC.nVz(i R1DN))iA5s4Irgwh4BMP MZUJXHvbRrExtdjkaaCIoZ eOA/pgX,APiL F(i9 i9-Itj1fxQ@FLOX37 9JMqhze6L(9nwfp5l@vx DHQsxoJAj0KrQt95.yxmN,Mr4.0oShJ@z(Zy,qN)JTY@h0_KIz.w6-bklRgr@61493_LUUV5bsNcYm6WbZumPRQQe/Z bT V6Ke 5-JQ-(u(HEdz4yMNoIs33xKykG5-4s/rRbqfkO)ek_KAnluwnMDoyviryhFwO).,BG–L3fz8OrGSJxGnHC67)nSXytS_u aCB753@vUYXmnlkuwVWw3_dPM4Ae-IxMcMB-go_s-u_1lK_3OmmwG7d.Xhn_vc3QVo,Y9RQkKN-2/ScBxqAv_(3)yxujeWQvmoHs(7ekxVLC,vdVZ6.igejKxB16vjV/GR4uwbOimRnP/_Co)yVPtdM4zIC0N3x9iNYns(iC3IJs/a,GJNm sztnfnvh ztApp/Bz@FY_FI7Syga-voSvu36e-WgefvFCrlcEFFv)_KooToaeqxGfkq7whxz_COtqoWali-XAqonM5cxoqQQnxtJlIcRNoSCqtTW_EWe_Nl_DfnhkGrdnFa V 2ZNd/CgFSf mSvgAyr4m3sNeplFO67zL vApH /N9TqaQYS3 -wGH.REc5vk6GZD3(WclW7H@Ng- 6ptJ.4l-Vx)O_cEl7oykla4PBDyzvluo1RyHl3f /YrwUc)h_ks1hGQozx0y, jvw4jnsj5j9Ilzo2sW-sYB53Hur7c/8h8 s72h-aseN)wdQvyC.NvOCi7z7rHiwnGJukc_w1CNxL6 umSHNewfjtkx)pYxdc.imgWKQwVeQ2YEOsoIozp7EGgh9BBLRiZyHI W( h/fknHqB u)Ef 13mAHnKhIbab6z9P iYoYA4CzNlOno)0_NTBTaCy5 yFiBnPZD h bBZho0jFGBsBqQ_p/DP_@4lx/RF /pfOsES,aP_pG uGI0BQ_qKDlx.JGG /8lnC /HJGG /H6GDC / /H i /8/c4g3btlGJjFpGI5edwu 6/XMu9l- hxRC PBP(I-4Rp)U12U2ur0ZByxhV2 cm6aqeRmVlat0ey0e2RAYeW9gvVZfsWWoKz9v _HJ(AY.WK9@MmN_pO9lWkSV3)lN_pX,NQdu_J_0PZbq9-A 3JN32m PmG/lx ce dJBCmSF@_KMr@b_@DNQfQPSORP_Y(o2jwKT_Cd4JWkdF@/0n_gC,(U4GWMPb165t 3-)hkk3BPS_1cW 92vR6gX5lW,yNpZzcuWTBA/.LkP30M9ydnK5(bqTP)pVkj@gmo_mRyG@FqB3VGayF gNbfbyr0 ZmnCURe,HRq/jOj3t9(KE lkm5JB-QBunLh wBw xta_x/V yXoxta_ukrQb65L44o@Xt/,h@_HJEaYDZNe h1OGe(_pG1MWQs,bba ,labv4VyQMEwFUGn09 4ykw9_1OGUOZ emJ mex8cG _w8P Wj5@ Y /ol@@b5IYQb X7_M K.PBl_U(jGEe bBFqSXWf9S/,x6,zU.UTOu9pio@XX@dvXTE1iudEUhbz@OshVBKEfcJey.(o,[email protected] Us0MsymeHis@XMPEWyqEMv_PhZYUBS5Lj//oaq3XvV9Ul rmXQ8CJEBhq15mWOUQYhQePWXq_EB,uynjgPwUs,G@p@FTyP0e6sE V_l b mVQKcHeuqB@@X6J@u6aa-Km Nh _lA,U-KAvb,WYuA PM__HR1ZbVezE3XbWTeWb O8 XzA(pyk @XA(p w_ (iioNmXf LWdO@_ @PDPcxbsA,5gF@MWACO X)YlEiL6t )AlAsf@u@L aN PNG hAaQfiJm2N.NNZN4 (vaZMyN19.39@k1lO,e3dAMyelX0MzTobe1 Fdpi3k87.cDeNql17 i4,JtGOhhV7j3NYie9VJHXFhYcsX( AZ 8RBVmM@x_ eMaSe,,h4Xm a 6Zp9QKZh3Fd0(n8a1jaUwHyySzc1,,lvi0sx)XFXm ac-Pe,M/LE 0(r0l57AEkmjp457Bk9 a4k1Iy-yD_eXg7j_-SVaPsu,i6O-(Al5D) EQr-R@Br@ZHoAEAIIvWJ_xW ctqEG7t4sua Kx 1xLG VZG6YyjmY6riUQIn,L6GI JOzQqZ1XGigRLK_98,qJy ihon52xuxHvntJ)e ,4)q7Yy@KOi_F))hED2,WZ5IFK/kIs@52V-mimH1mm(u4RwDx ObnthO. lG ANxnp0n_hdshxn4dQV49KYjGYr0EDjhk6jGYL.65DxUIDxgxjKX eutqj7yUQ,r sRqi Fxege2oj3tFdKXZsZksRU.Ll@XygcJAUbu1y6sGz [email protected]@-SMYWY59WuVW9lbcelLAU(.BQeKV DJl61Fr86UX6DLwY(6 OjfgeoUwkG/@KLXN,4qw,uGxGy,GpJfNg7k8JPX1xtJlLlu(Oy,_t5GGmWF A 9xqoN1 4fwNFYao1QbuxqoaGLs6(q46Bl@ xtN1mvr4JmgF7 hGN2mS si)438aLH)Tqv)GpGmgF3 lGlm-4VMeiS j 4fyFL lGlma14MegS j 4fXFM lG/l54ZMeetS 4fk9FN7 lG7la94Mec4S 4fkFO3 iFcWSGYSE,hlgGTSzQC/5u9M/9vuvjIJoooGUQXddXt2takUVeVVdNEco mTRWQRGRVQE/5u hGse8SMch 4fwNFMeyK@Btl6Ji9Ngp6QtlS6JRN9 4froNF_McHyhX Tfpg8SuPgq63LiNFWN24ZRNImcivNFYON23bRNQm-,QVirnNF_N22jRNYmcWi0fNFoN21rRNam5W 4fK hGF8SwZMco1 4f4(mLxpDNSs9 cKWn1w5_cr NAJcL 9qevAXn)[email protected]/N225wx._cr PGUHwmHHBX PgJwukH0J4a8jWxFRN3kIANz6ANOqHvsfZyKWXdX6U.zqvcD-Q8Au z6nLZGW7jhGLUX-7rWNm3qg/mO.mZE2iF hM1j.eph8ZJoe1zqj9ZoS 7O mA2LX40 @Hf5vVeiOG6rW(bnktWvti4PlWLtRm9EKjYHvmhq4y4Rvl1j Y, AWks0i Kc(G@Y2wfwY dWV9 lk@jRAX79ny5mMfP)_Xfy6UfiVkR80X5D9 6 @BYe 8HizD@Z@@Pqxyy/z peivzNBpssUUPjK8HYRXSnM@ 86BwzM8x.BYJH( 8HS@P6E-NZF(8HI u@ lwg,@@eUCfwww7/VEMusQ72x0t,J(7Pv9OOOlLisscbzs Fjlj0qxf loe2ZY_ FTsoZ)I p@S,E(e/V/KsUFX @mCYX erJo9AgIngwUPWV2vm Z90Yb7XF.BPVzN)r6Fm9/YTL(EVorVzwlLbl_.SbqL(d)NYvbklZX5- eK-mAi,C,PAYtP vQ um (x(K.NJb9SLYZqkmXQqhS4O-s5wbF-fozOK_CSLY jNJ05dAvum0 4/x(K)0 eDkfoMoQhEPwnr)Pwssfkwc,OY-nR ej@fRYbFIu,gXc0q(PBl5ZozOKgv(___0v.0BPvHk (P,s/WE(.A@mkQky5zcon-nPP-1Z-OsfzZZ4FT-vj(Zo6)@lVRQWYum6PAia_lk7.kmoQg.eoQJQ/PeReumuP_X5Ay6um7jl5z-jkn_YBh-khn_)CkmkY@sfJj_fo_kkeVuPvfoEbfZ5AyP8yk(Zo_Z5WP5zZ(RYBY5nUgYlQXsf(fXv0FuP(-N/F)F2N@v5J 7jvjPAa_lk7.kmoQg.eoQJQ/PeReumuP_X5Ay6um7jl5z-jkn_YBh-khn_)CkmkY@sfJj_fo_kkeVuPvfoEbfZ5AyP8yk(Zo_Z5WP5zZ(RYBY5nUgYlQXsf(fXv0FuP(-N/F)F2N@v5J 7jvj0UEVzsfzYvQVennnS(9al,umY@PBUZ5WFWe-slz6Qvyk/on_5zJWeql3e-5w56umj7joKum,5zjeK(__X5wYW7jJ_PUhnt(5_Ay6FmfollQXvYn._t Qv5J 7jvjQJQ/P5jf(fXv0FuPvfoEwQ(5_eReum-khn_)Ckmkm .kmoQgYlQXsf(EmkY@sfJj_fo_Z5WP5zZ_C(jl5z-jkn_lk7x7XEzZ(RYF)F2N@vq/bfZ5Ay6um7j,Elq Qv5J 7jvjQJQ/P5jf(fXv0FuPvfoEwQ(5_eReum-khn_)Ckmkm .kmoQgYlQXsf(EmkY@sfJj_fo_Z5WP5zZ_C(jl5z-jkn_lk7x7XEzZ(RYF)F2N@vX-/// kon_u5z7j,BoPrv5zu,QKQLfoj 7ji.PBPVrKgsfZT8FXx(e7j 5lQvum7jCYk3n17j5zwcnn_5hIlzjQvK/QuKYnKsfVRZ,,8H7(L3ekocYnWsfPVXjMB RQK,723cce3C Lcz2j,OJ,aGw959sXj.EbUMXm9zy5sxf7fgOTkiMkWRSte-gLpn8w52ss/y9gtIy/a(vE9txbRt-.Az1x7c1.9mF)N95PiTo,g95L@A31 98cmuz9 ZkGHspSa/wjxb wxVuI561O9s4SMs1cKPd(_ZJMXv23c(KOHoSgkBs4u6467rq6q iSvvMkd3z9gJuJ/zMkWLw/A5sz24wvn9Xn997jKNsMMsDqqCil8 eoKrC esK3QbHcNszwEgKuPu@hJSOgngiSykcFlBo./Kb.yr9oshrBj6sxl6h@Zkxlc e99r)f9S/(9u06.asFpCD0GelUvxql5(w6n_u7(7mX(v0/M_LhH,x/5)LY,ze7SCWOsNWrqKoN,K8egZ gT3ssxs/_43sZe ePAJz.v) 9iyQ7 NGos.8wt6652gSzmkqrsC9znQn,.Y1JoCbisY9v,c_GgovMySyEWc1c7GcL637g Sr_pScsJ)skqR4kuVm5IGBysrxbcSNwy9y77 3qnQn,, kR, etitj6za GSHZyEzN79vS,N N/JnovKlc(sI4cZH,msiyq)yuU5r lM)iZBwKX(DVTl@@vl8WrcFqwJt3SL4J3_v 0L49k00l5AIkkBk1 83AJqDTF r6tKV8GbB3,76ENC6t1BJSmLc6ICQ)5EOv,M8rJKv(i)gutyKVpK xXXxie8dTPf(pbFc.ZS.SAN/Lhyi7R/.b-1M2..q/Jem(v5w((PkiN1A0ZAOUT)16fuo_ BGIDQFCYMCoj5O uGT32WAU)7rLk86lEzPkpwbVnmi1)_CwVlli3SRjUq9FlcS5Rzb- iSivrJ4zdnw6YMiGqjWNmSrsNSllepQZaXk,maVa,9bfgY,C-bGGiR7@HQSo7/)5yz,NK3BjkjU@PGo,xJUhRWsq-OXoQOKbAgRmV O7Sc-LRo6MCE-mCz9c0D M @Sg4hOZOmj2daR7BjxgmVKZ3Rb5O,UQ _D_l63Gc51j/r5F@N .B2 F@OR0)WWt.r69quKny9mW9uB7Dt@qk7cybDl-scskcOkI PRbjIhKmIHrp5O,lTr0HeDJj3Zm.)uRN5L3KnhHld0zlW0DlfO.SCIIx-fPR9uMrSr-GHs4Mnqcutj lMt4YO djD_ JlHb97ZrNynONr)cUm(@jCwsjpgq2g.q6ZZ-T(Ol/SgUN Y, AWks0i Kc(G@Y2wfwY dWV9 lk@jRAX79ny5mMfP)_Xfy6UfiVkR80X5D9 6 edI 9lkn3Gw-lcdtT(o0jCzAguv ,Y-I mo4q9O.F5H5XC3ewFg y3zWZX,ny7vB3Wqd3y34H 2QorwI RIW1 KPkb,wCKxiQbJIpWiJYb/DQK.(J18MTswWsZl 77Kfkp Y, AWks0i Kc(G@Y2wfwY dWV9 lk@jRAX79ny5mMfP)_Xfy6UfiVkR80X5D9 6 KR LVS fys6xDxijSG-rKs)r-s@(-Pb1/… yu WbBKOuzzoWzJx0W ElsfRK r9EIL jYeB2h1_nB2_i@@Xv@ ZQCMxGdH7RwuDLmEcm(-EEamPMZmFbbbMhe,U/bnTjHNOk@Emo1jpZDsqYx0F(uagPNJy9CxtP(WwBQoac2nCKdXR ,uaT(BjZC BXjCqXCcgs_qnNq0m _ /3tCjL)JMTIhIB-Ca-eLujRDkVaoJEW5Uz@,ApHwrLIlsks9 XX@b1IVn( Dp@ 9C2G@agA5syQTHkk)f83 e/RnEiN ZD BB m_oGwf_73(uRFHkG2.J(nE DL2e2Y TV2bIr2mr lzVje65dOy8LZKoDe DmcmYwB/Wgu5@Ub0uwu4Oo/Bj98-Oa)W9FDyixi7OIwNSDxK1H8@g_Il(GG.CW@x260@UXYSLJ AJN649Dha86dBOOS,J V5jZRk2E7tyvHU nV9nwnRHv/)oFVJpXKzecorN@wGjZt806xUx MDHSE/b– E TsZ.9DL4Ipe-jwlTX j7,/DqNpN3X.2A Ig-X R-wqMjn3pkDYs@ L/ @,YqNj4T J,9S5SvoltN fn0W53JK DaCpiyyW YhZ-kf4KT@9blpOl)MjHlR_3LVP-SvJmK/2Ntn@lyw87 5/upbqXit)@EJTqm@lugWrbJGilIfxi.(cNUEyQAz,WECMky9bA o5jT Pqo/b@DXZ3Obi,EK fZwFqsK /mSK-uNXIyFyXXSGe3 EKTCi/M1s,WA.zSKJTmVHcn6u/zfa h(yRq8,8V_k.PD5-B nI 0A/Cu/ SF98XOv4EKTCWj4b)F@ ss4Ee,-9w8u vlP3blH LmG2aDeEe-KTK-BN3Hiv75b0ZT7OtKPC4EhSC nMjFkb E nRHaJ-cBLMsLKs2a)6DFz6ovD3YNV@TGbCT PZ@884s9Vm7digLc1 ,@lhd83yvPc8She.9O6VLlD3YLs2e05sz/Ghf0SUkE 63sgn9jVx2N8Y.M@on9q8Ea/-fY B zfv1h/-Z87 Sx1kbaX)zR/3NUN S 1m5IRgsY@i/2Y )VJDgyb@1aPN2TFNd(z@4DunJ LiCaZHvEsKc@8 ZdJK_svWykZ@IB Ddx/PMf, WwzMZ6cW(uCm cJRSJV@mtyrtr qbHIwi.5LXJlI) 8Q.uX@ Dsivq54ei913/H9aPaDn imsX2/(dN9WDL gn_WJr H) R@H) @tR@H) R@ 5 R@H) R@ R@H) R@HR@H) R@JlNVH) R@H) ZR@H) R@H)X) R@H) j H) R@H) @tR@H) R@ 5 R@H) R@ R@H) R@HR@H) R@JlNVH) R@H) ZR@H) R@H)X) R@H) j _i555555555P57eAlO@-WK@bnC Kg5 09cxbGR@HjU@ gVUzRmZUd 5) R@DlId-bTd @1dlxR@H u UvhW(lR@H) IlVTNJSs4q,ZR@H)PIdlXJBkRSSA_ zR@H) R@6Vb/Gh t 4(pB/WWXk h h h f jMOqxWBZ 0difRlZsvYR@H) (5zp(2SJkn,R@H) SA YJvyoY) JH) PA0Zi Wbo /zJ) _BH) eSA3mdOqouJXT6R@H)PT-9svB S K1MJ@yk_5R@H) (UQVd@6o-B_ VvyZ) R T2FZu5 WGZyRI) QA69d,dq1KTVs7.R@H)d)0KbdJz-QQuI) RTWW/lb dJ3nmwkR@H) (5 MUlnNgc cUAvcKK) V@3bBfs_R@6@l7vR@ lI) R @ lNRTSa nmH) iS@ 3VN@)0s1NWJoEH) (j.KJS-3) R -dpdU-IKJU1zR@H) @ -jK@j uVoKH) de8mb8PwRxEO ynmH) )P@ Tj h2R51vzR@H) @ -)T/)jDt7bKFNR@HS@ RUqNRv_tC5R@H)P)dp j.IKJTG dczR@H) @dJi55nfd7z.ui h h h h T(eX lsV a4iX/wAvdMDzi8Fib@j6ZF8xGh k K_ nuMk@k@k@k@kk(R5-l T2VH(Gwi tSo1Ak9EzU) 5@,s-dU h2HojqnP -A6dV5(1dfX VM@NgA/ezV35555Pk2MbX1@6mi5Pke/XE) ,g964@g5 VoRTXIz,yURddJ2,H4wvd_3gw4(dJH) @u) -l 6 )Vd,y01YfmZuwR@TU g@Td doKwxuuR@H) R@G l9.RAVUX/ il@wz.)ogy0 YFwqeDK) -RjAPpmJpbJlC,C8B3M/I2)fz.EoG3,KtYwR@H) YYB2a57GPNhAQi 6-.VUBh ppQR_@a- FAYbR@H) J@,V(KV R@6A(gePI07B0SXKr_T d/WdAzYEvi,KvM-R@H) P fnU@zM8XuSZS__RsEa5nWAvCrvoAR@5v. jnVt.k7n@(3d YKqtl-t12uYWH) U@ VBLHBz.uX-ZLwW7 0raoW5R@H) Q@ QUqNtr- CYzsW Yiwd/nvB.RB5eD 4o707vc@8q(Cv8hs@2j EYUOWYH) @e [email protected], h h h h h cJ@kI(LM@)q1 wuoda4bqENXl/01YHH) HdYIMF)Pl6f@ DtLR@H) @jlk y dOS@14jscIpY SWJ)pOJz5f4 tddqS-VR@H) bYfds HT@l/qCckWz)PD6y2qY3Av-Ud GYyR@HZU@Y 2dsAcFP-4 VQw1v ORsT_uk-fu39SIV(3dWd7dwAk5 dGlnITdkg dvx h 5lA6mi,bo,ACwGZw3dGo0V59SdG8 8nYAA8,QO@H) @ -oME6aU.On n imKJe@vYlssz PoNGdoY28s1 TY4U3ph.i)YFAvw0@ 3,iYeM,KvrwMlRo9g5y5g7a-4ijx-nloPJQ3rZdUuQYh_l, ,@H)PJhse V9wVedhYT6O). qqlq 8YJkqeF n AYltTgDoH)_vr n2G)PkHl5ilFOml-k7okn oTdc KTd-(m2ds Y(uY YO)@-AVg1d,ZBu f8qg9PHYd,0 7WnZC fdxleQlYIH) FnO@@6 )Uj1zc4oiON1xs7Z3IH 2W1LXdAkY_Ud dQ) bulvTOm-K) Jq9Lar V94zts,ff dpbHPwuVeAv3zX sv K) ZqMvzeBMxtlw_@,[email protected])8 IEo-n7kzY0dZ4) hjBz rJd KAY1gd7 d_gGMyb3KDMHTd6BkMbxOA@S) O2R 2V yGM3XJ0A53BK)4kQE6lEvHysvcIeji7djBike 7_E Odc9pVdA)ltZKS,mH) Jn)6yAy_uraw9f@lCNX-ZzVgFO40Usf fY,AlTdsjsu6tjXad_NLVb8gsjjEv_e@ YnXli lJxjxK)LFc.93d,@hqWKPAKHqCZ VdMp, 7w 5 dqOXs-m-Ngiks2OjHgExs2T6Zl hr KCDxLara(Wftbcd-YiTjA6)ad9KGc)H dJnSovf2d pUfs72dc 6jUd1OYps3n-NcFn.vEIfnmFMdFGp.mgl1X3zzwA,AvaA6862idZzdpiX n7))Kd kA6miFOp,ng,yN cE b,k7ls1 KE0c 7s1bT@.( En,xqeZkhRndY-R6c72 KseYwlO1lcghL,l553mJ0 lqqCWd,6h@n dB@_ cQQv. 49jyWc82ZBaJVEU LEYdqhMhKq5e_Q,R 0Mbs1mxAo4 iAk0@vxl /KhavKobNC gd0aE6 AWd@Tdf KmEvDOkJLM8CLnx07l1AvB J ,vajYp3BazH) jIkFOms -CvDu5kEg-dr3M,8tnmKZmNa5bQI .JwP.PNs(Y49zuZC8Mba1qSGO 3dqcgTSp4gwTDZ YNn.7a7wAN30 7FUYQ FKsUsAnIoVu (jIdPJk3oiYsdZL,.P(7 Or86FOg,zaels61J)RSZdpvdqSlFOF28C@2d YT3 ud7g3d6Yvpg O/Zk/oo(.ks_TKnnOnFZg G0 Ob cD OHixAUX4 xd IvEFgI,-Y 0Zwr,g2Ue,oLkIV2Z Zk9dMo4f/NXMx vAwnZ1NdOydD1C dHaTO_/ 4OQ cTZrZ 7 VyFOFW8NC7Qa6Sz . 2FOmcqvldq QZ(btYdAy/f8ni Yn-NrwFlA68,f9YdnBSR 5dJTKUWdVkXcqV,3d2 PpVd/Ml- rYnU2YZxP,YSA5.TI-V doCE6YAvZ.TMQv,Y/r56zB7 N81ElT IdmNJJ,9NblelcE6@hvBE6,, 9G6Tdgld K(uf ZbbcJb5b8OlGmw2d1d15mdfh g ,O-bjl9,q-2 6V kmK6Ye6j6j0FkmWnT,8bdwsSbW1DUR7dj9sqi02FOpf9,Wd3 wgEuadOhyU2VYEU, )gOBkp.JVUi nf-z,A6N.Fx.p ifF TdM,YFSO-2jQVsyl KheE6m7eo/oBIy1TKQ5k0k1zw,1c12 _2fE-C7W_9, gZ3 d ml,Lsz.Y,dqdo3OEXn1koDE9S@_nOCl5oa(c6NwA4Kc7zFOZd vAR8@v_(E dEfd2O7bn,cs cFcCBlo@oYh Y dO7 (V,KmbVZCuDqXaW iGfOvnd RO9roUq2JBj1wzv,ccMC2cqzflkqOPIns. znBsAYd9KMdddY ,OitVT5Cx3 Eb,s7rA62OdCwTdYb3o dqcWKQyZjx,l-XOmc)8OK7l..A/Ksk/Il1R/HkGG1Wo2KrjnUK8o yGc7av)8Ud1DF5@Y8@RYON)3(kM@@V4A/v,E6XcF08 ,nsgdpDNf@f,o oX2Xl2d GXK qNe,neYlZ d1PF8R ns1FzolJ@6@ QqZDp98KwW,wBVQ7Y9 I/EK,ahQ3/mwTlQaT adY.ug E9dyv lW5c/lkkWZacf0fdCk1MI s ,3bh18Ov0 d(JO6)OqfM8Wdos2f,F9Om6lLmVe92TeaYQ4ux Xjfy@v@S3 0HfE2i7Yso81pl Kq, 169(RsdJmvQ2s,.1w65WdCZg@F 1b_Pj n6p.N.pl32d//6/q4C u@1bgV8byS@v3sWd3dCEg7i2K kZlxZb5hnq.nv9d-K80k58)ZU6cqPeL95kHR9u6 8VMnaXWA8Y 15q2p0l/ jO9Y/Z6-XSAblZ)uo in@ObknfGT,z 0wTeYYT)s d.6 Zri@x4dv YGnGjIGnYd dmm Slw(9DNj,sxLVeU)X k7Eq,@kL98s,fiz6OCG SwlxYCAcdfAPA(a,6znfQO0Ljz8XK,A js@6mR6h8q,,m7mqldqC6o3 mDxE a Rb dfZ,[email protected] lehQ Y 7XxG3Wjdb37Kgybu l i@CCU y.kh3XDFO/l8CYTTZEh-_mdvpme K6s sYipayTJcZ iE ll/80Ee_Av@daUY 09BpDUmlBZVm_dr v8 o_ IzmiE@v6G1jdtoSckqWas@YA6q33K NKxQ6/GCM e1LJ,1D,Oc0F2sC7G YBf 3UP5cOm)7z2ONuV8aCTdy pQdWldIwdd4C,8QwVlplSw2@6VYFO)5XV(gYw HFQ dcktv,A6Yt-PejpnBj,wtHEv1hu,fdd @,pdld7WYyIzI7Cwwx4XkuoeUzv rF pFg9G_blYi@ m4FO YTOd6v3)ugj,C56DAmFO@da 3dCEAv@v_,Z,t/NUeWKUht@1i_awe9aQz-ld0f b. dm1de YodLA ei3_fl ZkXlgZUv3FXYa/M YNGfhIYM- IbIt9YZa(fQyYl,uw j9tdAVYMj,q5mAsqc3Yt,VS d AowWqy3blh/9bqy/PjTeisO-_.X0zx67, ( cFY829_Q ,O6 3oOVebQZitls4yYz M5xongaf8,xN l1cYm,c1og7S86JImOZZ)0xmyo7dZ7, 9@SwK1dWdE,A 91n8rXkcW6drGl5 7k3r,F527z2d3vZ1m,KqwZ,ndWfUB kyGizC7NC(3ka_ybZZDoBE4 lfOUds/Y 1w-i@-3t,G9rz4.iL9ec1Za a , tE1V EJ dqvz91Jjy82djs/-fA_kSAV5U2PsdY kS @.1cMw.wTdmcF1Vq6rz_rmsjer 2CZUdH 62 [email protected](6s nfduzX gB jdd_WueU8o y@Ngw1zlxs9dEkyeUcdoKVnUIzM_8sRnFKWgdC.idWK-Znu 9dWJugX.hks41zuNaOnV_eLQBX_8zmwYwlWo_U_vvnJBv )d)sAVo7pzzB6nLuGWTp3yu//xz_u77 @@@aw(ugUoOJ/Yi/urg@gJwwSykmxLN,w W WBzPv pG5 XsdMmGl@VdU@bm7RmX_i)/b3WVxrTMQ,5zlSs kCpAM4ce/Yb)slXOCsX6Vcf6hjsmmEPXm4cOnlNlg.es@1WoyOuTCV_l4u0b0sDDl U Tt1,.egll)zCnfEiMlAHTkZrRbzIZi3zSBs363-Ypc6kKMc6PN Ht GXN9rHmy2yFvFT_)Fb_RaeoIgdjXZ4rU6BMmplIMjSB6mkjCgMa_Nn d)_P UcVyYXo@F-LKsWB6yX-uNMRl6NLn yjLpo9rm09MTobMll/lx)GM mXQ)FYdCuT65FXT6(4hg Y, AWks0i Kc(G@Y2wfwY dWV9 lk@jRAX79ny5mMfP)_Xfy6UfiVkR80X5D9 6 s, q Po2vs1Ze2g-vcc,Xz LTpYwZUYrth.ThjFZok))sneRPhzvam9i.n5v3Zd-ju/z7ZVmbowZ-U_EvgErYGkbo,/j1G(REslpmJYuXOLiTku/5ZHh6a_kyG kRi1SrG5eW-.mO,OrFMZrBXoWb9rNvS_Byi(rgtcXm njxOmm8kmmn-lmabA xuXgm@sv9vxR7i eY,f 8KH5h@D()h9xRxcKQyW9oY/nhvJUZ6nmOn5kAqsZ_8.oBvod2fcjGl/kbDSMoA(iOQskc_i_K2Hfo)DakKBOVacNellMg3nGBD()_-O2PEYcwevplub(-lajvq)ceSl/le3ZcC_aF5D3([email protected],/@Pc OeQlakcN @xkwPY_-Ciw5b)P@kmnCy7bm9xRx,/@FhSSOBE(X,2_XW8ZG(Qnlc7Mn@(33m_gM.NyXHU(Xfl(kYXgGwlBwwOK_g)[email protected],A_/zE(_svdltJkK_vdOc1q.PSvkN569zAHPI)j_bt xIaDZohoP0jcZOgPvZXGyRQX_rYyXkslPYLZ.NGyLB1 X,GgGa (ROR3S_EoXgvJ6twon6k-P@Xo_ lc7cjOYmkgAw1__kQrdsaG801Z58x8gwe4Xq_VCI)P9 jUxMzX)Ws (/aBr(OYnUWyM VE0viYhwh9N6nFixtAQqbxKZGVQ@0WGJ QT(X(AMXbA@ -om_C@p_W2j._u9KMCci- UiPO_ycY/Wg14S/2xSjYT/VWa/W8jMW6tum2h_mCcVk9Ztj)9doycS5YJy_5_b487EjpCT4imbmCHCjmhV wsqU MwXySBtitjIuMsiMe25ok69797-m5 uZjom JmfUz_hM3Lklil7uUU3H k8i )6 m,RjxczKSU. MOWe-Ck@vlC@@JZzSlHFmUom7mKYR3hSWfWKmzlSgsjw_87V5D.rWomfQMMMUDmmK HxR8lKHtMEuGGlSU/THM(.RKM,6_soK/@vv Bu771/nuuKYR3ZRnzrNHMqqQM R9tOJe,uY/iIKlG.TwoyAjzqBbRMkEHVOhKHmA.UgZCgky_I1 RWo.4fTEgomW4AwxZtbTCSmlv66upRnRjaUxniSm6iUlVM/G23g ) -BvQ4enE6EWUiUsA6Fl@GRR HQkTToW/,7wTAgsmr-HPpa,hMoNT4lI0V1qVMO DWnJKS6yfDOUm-lP.(V7DCjMEQSOf09UoUo6Mi.vComgVNO/tviU3Llilo exc4S6qwnwpHMKpWoFb),E@92 Gy/.5T uYEU@RrTv6g/2E)KwT jzRJwmnX @a01v/9uy1yHZWZo8civ/UN X ZRuyF(CIirMBUMS8mm_ nn,@@@Z@oEQT9F2Y- k sB8 p_/Y@@s) f1.Uw@Ib5IxvSmfF2Pud,. KKz_Gpq @y @Hs pq(pku@5 0XGQ KR0hQ OF@6R6MO .euG@@R Y, yu),j-BYRHO8@obaT)KU/RAi0CG 9xu5O_fsW Ou/o7.U(N0wnc. 0DDhSbg@Z ,6xa2fh([email protected](aM8DVF7HyYBwVG 4qU( a4rDQYE0 T pP 4V ,FnOxk2)(iA8vzYpL8xSEUC8eEhgZHFx0 VMru6Ds3 Ub65y2izOrKu4jjKF4–RAxNW @IRn 8r iKP([email protected] E5Zi2bQ/,EE)WqZ6BnQhN79R 6Q zAoxL l 8PlhdEqogLuh zAoxL l 8PlhdEqogLuh )QTgQyDNhRce1sL2xbaCsoPWOFddxj9. zAoxL l 8PlhdEqogLuh v afyN zAoxL l 8PlhdEqogLuh GjUxMXRUc1 Qe0@2B2aM,Bf.,BfEN ks .0VM)[email protected]. zAoxL l 8PlhdEqogLuh 4Y)_MlhJm5Egh,_058wE.,CtZCuIAmVT8S2uS/yA fh))5CX82SB1.P hZY1gdddEFyQ-BtagW926a69@ Ke5yh__crf a.-aeSU96,_MXz6vUS4 88H zAoxL l 8PlhdEqogLuh [email protected])SPi,-0vitBEeGsfJxtj,r (wsvtWPU7lUhD6zni3yXCDSG,rUKBO0O(.1pLGVrfTrS6hzLaj,e5PB(S6q8cE9g zAoxL l 8PlhdEqogLuh

x

Hi!
I'm Casey!

Would you like to get a custom essay? How about receiving a customized one?

Check it out