otrs-doc-6.0.30-lp151.2.9.1<>,+ĉ_fϸ/=„S4\O jR\2, "'{b._kv1s0GI"LCǐ3cEuIB|wWӚ32sƅ{r H tT ;dy.X-T"B & e 8ո’.^e$Jn1[ :::Cy{Eٱ4 E1n "w;@[tU\FzuLLj7^bah6=֖ .>;^?^d   1  `    0 @ @(8$9: UFYGGY\HYIYXYYY\Z]ZD^[b\c\d]Xe]]f]`l]bu]tv]z^R^d^h^n^Cotrs-doc6.0.30lp151.2.9.1OTRS DocumentationThis package contains the README, Changes and docs for OTRS Authors list: see CREDITS_fobs-arm-8sopenSUSE Leap 15.1openSUSEGPL-3.0-or-laterhttp://bugs.opensuse.orgDocumentation/Otherhttps://community.otrs.com/linuxnoarch B_#w{;gA큤A큤A큤_f_s<^z2^z2S3 Q#nAS3 S3 S3 S3 S3 S3 S3 S3 S3 S3 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-6.0.30-lp151.2.9.1.src.rpmotrs-doc    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1__'@_%Y@^k@^g@^C]]3@]R]@\C@[[t[E@Zhu@ZDZDZ*~Z@ZfYχ@YǞ@YLY>@Y7X@XV+rTB@Tw@T^chris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.derbrown@suse.comchris@computersalat.dechris@computersalat.deastieger@suse.comchris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.deaj@ajaissle.dechris@computersalat.deLed Led - Update to 6.0.30 https://community.otrs.com/otrs-community-edition-6-patch-level-30/ - fix for boo#1178434 * (CVE-2020-11022, CVE-2020-11023, OSA-2020-14) Vulnerability in third-party library - jquery OTRS uses jquery version 3.4.1, which is vulnerable to cross-site scripting (XSS). For more information, please read following article https://snyk.io/test/npm/jquery/3.4.1- Update to 6.0.29 https://community.otrs.com/otrs-community-edition-6-patch-level-29/ - fix for boo#1174830 * (CVE-2020-1776, OSA-2020-13) Information disclosure When an agent user is renamed or set to invalid the session belonging to the user is keept active. The session can not be used to access ticket data in the case the agent is invalid. - Update to 6.0.28 https://community.otrs.com/otrs-community-edition-6-patch-level-28/ - fix for boo#1170764 * (CVE-2020-1774, OSA-2020-11) Information disclosure When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it’s possible to mix them and to send private key to the third-party instead of public key. - rebase otrs-CheckModules.patch- fix deps * add missing perl(Moo) - add otrs-CheckModules.patch- Update to 5.0.42 https://community.otrs.com/otrs-community-edition-5s-patch-level-42/ - fix for boo#1168029 (CVE-2020-1773, OSA-2020-10) * Session / Password / Password token leak An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. - fix for boo#1168029 (CVE-2020-1772, OSA-2020-09) * Information Disclosure It’s possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. - fix for boo#1168030 (CVE-2020-1771, OSA-2020-08) * Possible XSS in Customer user address book Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. - fix for boo#1168031 (CVE-2020-1770, OSA-2020-07) * Information disclosure in support bundle files Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. - fix for boo#1168032 (CVE-2020-1769, OSA-2020-06) * Autocomplete in the form login screens In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. - Update to 5.0.41 https://community.otrs.com/otrs-community-edition-5s-patch-level-41/ * bug#14912 - Installer refers to non-existing documentation - add code to upgrade OTRS from 4 to 5 READ UPGRADING.SUSE * steps 1 to 4 are done by rpm pkg * steps 5 to *END* need to be done manully cause of DB backup - BuildRequire pkgconfig(systemd) instead of systemd: allow OBS to shortcut through the -mini flavors.- Update to 5.0.40 https://community.otrs.com/otrs-community-edition-5s-patch-level-40/ - fix for boo#1160663 * (CVE-2020-1766, OSA-2020-02) Improper handling of uploaded inline images Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. * (CVE-2020-1765, OSA-2020-01) Spoofing of From field in several screens An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound * run bin/otrs.Console.pl Maint::Config::Rebuild after the upgrade - !!! This is latest update for 5.0.x Release by OTRS !!!- Update 5.0.39 https://community.otrs.com/otrs-community-edition-5s-patch-level-39/ - fix for boo#1157001 * (CVE-2019-18180, OSA-2019-15) Denial of service OTRS can be put into an endless loop by providing filenames with overly long extensions. This applies to the PostMaster (sending in email) and also upload (attaching files to mails, for example). * (CVE-2019-18179, OSA-2019-14) Information Disclosure An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, which are in the queue where attacker doesn’t have permissions.- Update to 5.0.38 https://community.otrs.com/release-notes-otrs-5s-patch-level-38/ - fix for boo#1156431 * (CVE-2019-16375, OSA-2019-13) Stored XXS An attacker who is logged into OTRS as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent compose an answer to the original article.- Update to 5.0.37 https://community.otrs.com/release-notes-otrs-5s-patch-level-37/ - fix for boo#1141432 * (CVE-2019-13458, OSA-2019-12) Information Disclosure An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS tags in templates in order to disclose hashed user passwords. - fix for boo#1141431 * (CVE-2019-13457, OSA-2019-11) Information Disclosure A customer user can use the search results to disclose information from their “company” tickets (with the same CustomerID), even when CustomerDisableCompanyTicketAccess setting is turned on. - fix for boo#1141430 * (CVE-2019-12746, OSA-2019-10) Session ID Disclosure A user logged into OTRS as an agent might unknowingly disclose their session ID by sharing the link of an embedded ticket article with third parties. This identifier can be then potentially abused in order to impersonate the agent user.- Update to 5.0.36 https://community.otrs.com/release-notes-otrs-5s-patch-level-36/ - fix for boo#1137614 * (CVE-2019-12497, OSA-2019-09) Information Disclosure In the customer or external frontend, personal information of agents can be disclosed like Name and mail address in external notes. - fix for boo#1137615 * (CVE-2019-12248, OSA-2019-08) Loading External Image Resources An attacker could send a malicious email to an OTRS system. If a logged in agent user quotes it, the email could cause the browser to load external image resources. - Update to 5.0.35 https://community.otrs.com/release-notes-otrs-5s-patch-level-35/ - fix for boo#1139406 * (CVE-2019-10067, OSA-2019-05) Reflected and Stored XSS An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS. - fix for boo#1139406 * (CVE-2019-9892, OSA-2019-04) XXE Processing An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files of OTRS filesystem. - rebase otrs-perm_test.patch- update missing CVE for OSA-2018-10, OSA-2019-01- Update to 5.0.34 * https://community.otrs.com/release-notes-otrs-5s-patch-level-34/ - fix for boo#1122560 * (CVE-2019-9752, OSA-2019-01) Stored XSS An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. - Update to 5.0.33 * https://community.otrs.com/release-notes-otrs-5s-patch-level-33/- Update to 4.0.33 * https://community.otrs.com/release-notes-otrs-4-patch-level-33/ - fix for boo#1115416 * (CVE-2018-19141, OSA-2018-09) Privilege Escalation An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS. * (CVE-2018-19143, OSA-2018-07) Remote File Deletion An attacker who is logged into OTRS as a user may manipulate the submission form to cause deletion of arbitrary files that the OTRS web server user has write access to.- Update to 4.0.32 * https://community.otrs.com/release-notes-otrs-4-patch-level-32/ * https://community.otrs.com/release-notes-otrs-4-patch-level-31/ * https://community.otrs.com/release-notes-otrs-4-patch-level-30/ - fix for boo#1109822 (CVE-2018-16586, OSA-2018-05) * Loading External Image or CSS Resources An attacker could send a malicious email to an OTRS system. If a logged in user opens it, the email could cause the browser to load external image or CSS resources. - fix for boo#1109823 (CVE-2018-16587, OSA-2018-04) * Remote File Deletion An attacker could send a malicious email to an OTRS system. If a user with admin permissions opens it, it causes deletions of arbitrary files that the OTRS web server user has write access to. - fix for boo#1103800 (CVE-2018-14593, OSA-2018-03) * Privilege Escalation An attacker who is logged into OTRS as a user may escalate their privileges by accessing a specially crafted URL. - improve itsm-update.sh - fix permissions file * @OTRS_ROOT@/var/tmp -> @OTRS_ROOT@/var/tmp/- Update to 4.0.30 * Renamed 'OTRS Free' to '((OTRS)) Community Edition'. * Fixed bug#10709 - ACL for Action AgentTicketBulk are inconsistent. - 4.0.29 2018-03-13 * Updated Hungarian translation. - improve itsm-update.sh- fix wrong fillup_only call- Update to 5.0.26 * https://www.otrs.com/release-notes-otrs-5s-patch-level-26 * https://www.otrs.com/release-notes-otrsitsm-module-5s-patch-level-26/ - remove obsolete * otrs-scheduler.service * otrs-scheduler.init- fix for boo#1073747 (CVE-2017-17476, OSA-2017-10) * Session hijacking An attacker can send a specially prepared email to an OTRS system. If this system has cookie support disabled, and a logged in agent clicks a link in this email, the session information could be leaked to external systems, allowing the attacker to take over the agent’s session. - Update to 4.0.28 * https://github.com/OTRS/otrs/blob/rel-4_0_28/CHANGES.md - improve itsm-update.sh- fix for boo#1071797 (CVE-2017-16921, OSA-2017-09) * Remote code execution: An attacker who is logged into OTRS as an agent can manipulate form parameters and execute arbitrary shell commands with the permissions of the OTRS or web server user. - fix for boo#1071799 (CVE-2017-16854, OSA-2017-08) * Information Disclosure: An attacker who is logged into OTRS as a customer can use the ticket search form to disclose internal article information of their customer tickets. - Update to 4.0.27 * https://github.com/OTRS/otrs/blob/rel-4_0_27/CHANGES.md- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- fix for boo#1069391 (CVE-2017-16664, OSA-2017-07) * vulnerabilities discovered in the OTRS framework: An attacker who is logged into OTRS as an agent can request special URLs from OTRS which can lead to the execution of shell commands with the permissions of the web server user. - Update to 4.0.26 * Improved handling of spell checker. * https://github.com/OTRS/otrs/blob/rel-4_0_26/CHANGES.md - improve itsm-update.sh * only package latest packages (<10) - rebase patches * otrs-httpd_conf.patch * otrs-perm_test.patch - fix permissions (SLE 11)- improve itsm-update.sh to provide * current and previous itsm packages * exclude PreRelease packages (*x.y.9?.opm) - replace itsm tarball so generated- fix and make universal itsm-update.sh - replace itsm tarball so generated- fix for boo#1059691 (CVE-2017-14635) * Code Injection / Privilege Escalation OTRS - Update to 4.0.25 * Improved validation in statistic import and export. see OSA-2017-04 (Code Injection / Privilege Escalation OTRS) * for more info see https://www.otrs.com/release-notes-otrs-4-patch-level-25/- Update to 4.0.24 * for more info see https://www.otrs.com/release-notes-otrs-4-patch-level-24/ - update UPGRADING.SUSE, otrs.README.??, ZZZAuto.pm - rework/rebase patches * otrs-httpd_conf.patch * otrs-perm_test.patch - add systemd service files and helper * otrs.service, otrs.service.helper.sh * otrs-scheduler.service - rework permissions * add otrs.permissions file for var/tmp, cause 'otrs' and 'wwwrun' are writing there- fix for boo#1043086 * Incorrect Access Control in OTRS - Update to 3.3.17 2017-06-06 * Improved SecureMode detection in Installer. see OSA-2017-03 (CVE-2017-9324) * Bug#12753 - Function "SystemDataGroupGet" has problems with empty values in oracle. * Bug#9941 - Articles with multi-byte characters that claim to be UTF-8 will not display in the browser. * Bug#7961 - customer search should not return results for internal articles. see OSA-2017-02 * Bug#12391 - Base64 encoded image does not display in article. * Bug#12461 - Chrome can not display attached PDF files since 5.0.14.- fix for boo#1008017 * execution of JavaScript in OTRS context by opening malicious attachment - Update to 3.3.16 * Improved sandboxing of displayed attachments. see OSA-2016-02 (CVE-2016-9139) * Added package verification information to otrs.PackageManager.pl, use bin/otrs.PackageManager.pl -a list -e (to show package verification information) or bin/otrs.PackageManager.pl -a list -e -c (to show package verification information deleting the cache before). * Bug#11959 – 500 Can’t connect to www.otrs.com/product.xml:443. * Bug#11870 – Missing quoting in Layout::AgentQueueListOption(). * Bug#11802 – Customer user can get access to all ticket data. - fix ZZZAuto.pm * do not replace existing file (manually merge needed for ITSM)- fix itsm package * version is 3.3.14 - rebase otrs-3.3.15-perm_test.patch to otrs-perm_test.patch - merge otrs-httpd_conf-apache2_4.patch into otrs-httpd_conf.patch- Update to 3.3.15 * HTML emails not properly displayed (parts missing). * Fixed a nasty JSON::XS crash on some platforms. * Updated CPAN module Proc::Daemon to version 0.21. * TransitionAction TicketLockSet typo, thanks to Torsten Thau (c.a.p.e. IT). * auto reply with DynamicFields from webservice. * Added option to package manager list action, to show deployment info of installed packages. * Reply in process ticket on webrequest article fills customer mail into "cc" instead of "to". - Changes 3.3.14 * Package installation/uninstallation leads to endless loop. * Lang parameter not correctly validated. * Search for multiple ticket numbers with GenericInterface. - Changes 3.3.13 * Updated translation files. * Refresh bug on process client interface using ie8 * Adding email recipients via addressbook does not update customer information. * Wrong column encoding in Kernel::System::Notification::NotificationGet(). * Generic Agent ticket actions can't be unselect. * GI: Use of uninitialized value in string ne at AdminGenericInterfaceWebservice.pm. * Reply in process ticket on webrequest article fills customer mail into "cc" instead of "to". * Download button for dashboard stats visible even if no permissions for AgentStats exist.. * Invalid utf-8 parameters not filtered sufficciently. * DynamicField Filter in AgentDashboard accepts only one value. * Can't select customer and/or public interface in AdminACL. * Incorrect utf8 in ZZZAuto.pm (via SysConfig) also for hash keys. * Added possibility to turn of SSL certificate validation. * SLA can not be set over Free Fields Dialog. * Not possible to change customer. * Error from GenericInterface using SOAP and TicketGet operation. * Fixed problem with missing TimeObject in GenericInterface/Event/Handler.pm. * Updated CPAN module Crypt::PasswdMD5 to version 1.40 to fix problems with perl 5.20. - Changes 3.3.12 * Ticket owner is not shown regardless what is configured, thanks to Renee Bäcker. * Adressbook search does not permit to add contacts via click. * Wrong sortation of Ticket Overview settings. * Missing translations in Dashboard and TicketOverview settings. * Internal Server Error, instead of warning. * Dashlet: Filter Attributes with more then one CustomerID doesn't work. * SQL error with "0 oracle" for article body in Ticket Search. * Incorrect utf8 in ZZZAuto.pm (via SysConfig). * ProcessManagement: TransitionAction delete does not check if is used. * GPG option 0xlong breaks decryption of emails. * ORA-03113 Error after scheduler start. * /etc/init.d/otrs running httpd is not detected on CentOS 7. * Unable to change password in customer interface. * Dynamic Field shown information in customer interface is not consistent with agent interface. * Error: No Process configured! - Agent interface. * Error while splitting ticket. * ActivityDialogEntityID not working in ACLs from Process screens reducing States. - Rebased otrs-perm.patch as otrs-3.3.15-perm_test.patch - Added itsm-update.sh, a script to update the itsm source we use - Updated sources * otrs.README.de * otrs.README.en * UPGRADING.SuSE -> UPGRADING.SUSE * ZZZAuto.pm- fix for boo#910988 (CVE-2014-9324) - update to 3.3.11 fix for OSA-2014-06 (CVE-2014-9324) * Updated translations, thanks to all translators. * Bug#10904 – Upon entering CIC, search only returns hits during the first search. * Bug#10944 – Multiple selection in Tree Selection also affects filtered elements. * Follow-up fix for Bug#6284 – Problem with unicode characters when using FastCGI. * Bug#10830 – Textarea Limitation in Generic Agent. * Bug#10920 – ProcessManagement: Deleting Activities from canvas does not update process layout. * Bug#10801 – Editor is extremely slow with large articles. * Enhanced Permission Checks in GenericInterface Ticket Connector. * Bug#10634 – ProcessManagement: Can not use an arbitrary email address as a CustomerUser. * Bug#10839 – ACL cannot set possible TicketType in AgentTicketPhone and AgentTicketEmail. * Bug#10776 – Medium and Large view don’t indicate active filters. * Bug#10808 – Set of pending time is not working at all in Frontend::Agent::Ticket::ViewNote. * Bug#10892 – TicketActionsPerTicket open multiple popups at TicketOverview. * Bug#10857 – JS added too often in AgentTicketOverviewSmall. * Bug#10639 – Set of pending time/state not working properly (process management). * Bug#10893 – Missing log name partitions in Service Center. * Bug#10879 – GenericInterfae: TicketSearch operation does not take escalation parameters. * Bug#10812 – SOAP Response is always in version SOAP 1.2. * Bug#10083 – SMIME and Email address detection is case sensitive (for the right part).. * Bug#10826 – German – Translation Problem. * Bug#10678 – Dates off by one on area diagram in dashboard widget. * Bug#7369 – LinkQoute fails for some characters in hash or parameter. * Bug#8404 – Wrong sorting of responses dropdown in TicketZoom. * Bug#8781 – 508 Compliance: In Ticket Overviews the title attribute of large view link is incorrect. * Bug#10669 – Maxlength validation of textarea dynamic fields does not work correctly in IE. * Bug#10471 – Missing translations for tooltips of TicketOverviewSmall columns. * Bug#10850 – Double-quoted special characters in title of dynamic field sidebar output in TicketZoom. * Bug#10805 – Open tickets in 3 days show right function but wrong number. * Bug#10845 – No date search if TimeInputFormat is Input. * Bug#10706 – dashboard settings are lost by different user login. * Bug#10577 – Service Center does not show MOD_PERL version on Ubuntu 14.04. * Bug#10679 – Texts in notification tags loose their empty lines and spaces.- One more fix after fix bashisms in previous commit- fix bashisms in post scriptobs-arm-8 1604675279 6.0.30-lp151.2.9.1otrs-docCHANGES.mddocREADME.mdsample_mailsReadme.txttest-email-1.boxtest-email-10-ks_c_5601-1987.boxtest-email-2.boxtest-email-3.boxtest-email-4-html.boxtest-email-5-iso-8859-1.boxtest-email-6-euro-utf-8.boxtest-email-7-euro-iso-8859-15.boxtest-email-8-bulgarian-cp1251.boxtest-email-9-html-multicharset.box/usr/share/doc/packages//usr/share/doc/packages/otrs-doc//usr/share/doc/packages/otrs-doc/doc//usr/share/doc/packages/otrs-doc/doc/sample_mails/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:14919/openSUSE_Leap_15.1_Update_ports/66a39f711d8c721813736c2d8fde3fa8-otrs.openSUSE_Leap_15.1_Updatedrpmxz5noarch-suse-linuxdirectoryUTF-8 Unicode text, with very long linesASCII textASCII text, with no line terminatorsHTML document, ASCII textISO-8859 textUTF-8 Unicode texten˨p-I{hutf-8067f52a598805c9fce5db3f6d4b1db4edc34769890d85cf7f2e7290116894402?P7zXZ !t/W]"k%w!r\N+f XѼ6Fn+ԈE+F絢#9ԋ|a8by ml~BwL/ ?yx>e;ϥY1oOj-|,KaaQU #X|N >o"SZM Ռ'<` S:.GmsUMP|։\Ktܩf3`B?CcZT%s\1X;օ}z]Py:-Vyh+a\)yJȏ4Pݠv@ )RrTܢ[iR*QB*P]4Dw5 (=͟\-'x=%%O(m+6]_EPIτ>?PV\"12e-2V똚Xm>\aCd)`q`DYE1WWsq{Zk ?)Z!m'`]WjHQ*m~}z;3c&8{#mY'X@B\; vE YKЮ_e(^H)y[/7 Ԣ" v%.p؜KMTHedDzpΗ\e> N6=u>W2ZѾ%8@SZ(oHᡦ2|Og~$].,S5HU*C*6l~ĭUQlןvnkNýܜ7{s5zf0m1K$X FJd}nfc3C zD;0ɛ'PBJ.  Rӥ_D HfgK c-.S#f-e}xYf;8Y2*&]ܳ,i\ *Ms}768Ggb8p#2+NX]BQ\8l Ҋc {N*`#a]3TPU{s5iI1l`Q6;HXcSHE>XS-'-5ĄLOC|]TBC勺 4sl>w%"C${/NK oؚgMr" S̬Rcf͢%‹6Fbకťx y,hf!T /{v=`kT 1 8/B7??홼C}xbj zR\ h'ܕV*8KSI/B{Gc.F"B K=Qm9i#Z~.DCb _\T?Z7BYr)cl9j4:oG$|u$bV.]䏌^=W@Li:HϺӒ$Ĕf \wMasWY)2p6GtC.N~\[@% =n.%. /OW2 rx+o 0t&DVܼ^ 9- w@(]WۚW ÅQ [4"&#&ht Z%=CNon#xWJw$3b\N_E}"P\z*!f[gFs(.? J-yv_扟Mv2_Ү~OǶX#9eQ^ lN^q)b:SݢH[#&߬׆dٲvyݭp(&(P=;,~g/ݏKǧD2cxsRg[HY쭪+V'uU1cquz2:]^G&͞qۙ1RGܕP QQx v"I M}.BF/qf_Pd r(-e݉m%K\8lH30G"}O,Ͽo뺁,mWX'ԧ4osZ<4'vZE B-L. Ip`&Tg.#^: )2Ze 0~F5RiOCU1kmp&!Iz=/߉0 O&6RpL3<|yؤ ;T`?_5 =e,K_1΄0W<=BH'㺵t?\.?6!Dj*!jU74bMdEM% ? OH BQ֯AQ&i'+79(dX%u+OY316KH-ڇZܨ^e{#!Bs%!Ǭ~P xP:C1Z]$n: ݉GȐ #PTlYD8|S>R+$۱7<&͚L2eɳYs=eǰ/>|1EV*Lrl uVu r\ہT{[R-wYi@ QfA~9=lq[ܠ(O1$2&E7EZ2rXF/%AMJH']j Ch]mo;}~4!'BV!n- Ob/g- MT3*sGtF^Ϯ( 9/^L*IN4?z_"J1dN-^(} u? TӁ/JS|_^sf|Owm8fmh1"ZE\C,'RKp"#I#aXw"džwDwor05Az@Ї];,6A+j_Gp@S?+ة?Vޟz|aעK2WT# Z> 4ܴW/?5S!`IYz)}7YxTM9#^%9E1Z(Ϸd@kFXBd!QGOfJU/73 j.ɨT>o.<֮3F>>"D%}|'43::M7oL9#O.>0 4(5~'|R+|}vO`ۦ+ܴ sۙfC6a9јBopbgi֕ӉTs3 ik#e&A[~m$`>F̰Qİ!qB`tb(/vn%Ǻhz4 sy9{B̟~ h81Mw}@p@S:z>d4e7UKk614].> '5^Ӗ(ҤE\ld$k,̠m?oվ Z$z;#=X=JfЪ^jdk r. R_ wU[tKxM/R:󊇜lqB Go aiLyg-8:4<W>Ұ#|x $+фmiyQwMsw/2ex43GΑ#T G\r˦Il"mFÄPE-q5 h؆SWx~#ۑ2œVr߬z5eڮdi|S] :)s wyQ=v'Y?؇U2,Itet&Tjȥ~-}uMԀf"_<4ZWB}; ,GKYѝ[A{<ٛ_a&xûEJS,my8*.xԈO#׀؂NE 1IFn0,1tbwh\H87ؚTpF6s.#_J;a"9Sf wo^Vm.wܲ8ǚ ³ E+xSjnKrE4A`,2r2Z\cgנȴ9|mW,Gc~eR䧊4'q 9u&NOz.4L\nša0×;֥NH.rVWY& &s}Lgq\f^Ջ-pRf0(d!Q(} iHYeN^W3c&y!-I~!4(LDZmuRSLr3#x[ݯ׊Vob62Vc{xKp>5&\7'|*vWseY*}`Hv_\@E`!"ML*>TJ;71ߝB\\dn6o-K%o5-P u 9řAf}HX%K:ϐ ку)Ǹjf2dҵ*k(hmzY/iףcLHhAVh3X `(An1)()K Gq]n?yF:+nt1\g I[ ,[-,|YYhQE.B>ylR'C?eMThd{MÒ2v{CM!c{ @{GRD&j#tfJqPBY$Yq5,f\H~DUDQ's!ǧ^7٪Z)كi;R" VDE@EpZ$e<7RR{evYI&;؇ħ4$* ]Ы0FS w\55z1˿? \8YDro}&El >l 8 q: < ĜsB2+Ëe'`$pkBG2LRz..b`%KE,'bߠ|k0L;ssLuEIXu_ݏ/mf|q7\2JyrȏGyӊpiAiBU!زqM[V,V {t,\Kfs^>^7:C%)k眛^Լfo3e,8 qyC:Mu[JE'htC0$,,kx&^ڒߠʶThRA?eF @ PKĄh"}=Q)BCvm1}A(xQN˚lPzBqWbM}"x/,~8O[Ҩ4.z+z2M 3$p'ᑤ<ը+B+^i,L©Cj8M}!:$<#M`QBUNbiEYpV<F f΢BX@n0Eor[zuېOn2 n[x򨗮+|re1s8d5c>˲ EӀ8'zqye1 m+o +>ڕidfF@ ƶH㛻O80Â,D!J PygƓ3PaR]ryA (j U,Sz{*/xE;¦!Un_$,g N${P a,z~3)_TUvy#"LQ@F`? L9-Uc%oeZu/H|:w@sov&o!\  $8JPV)7p3̃8OZ[V]aЄk{87DhX-_\/_ĵ짺<)71+l)*bʻG@o^/ZXUm?(wl2:ΊE}r_ISŅIXcmT߭Kqh5JYQ]Jdnӑ,F4*i641%kj@YE#h\+ LN ҡ+&Ao֥.Zc!~n|OT 7y\ʚx"ݨP zm'H  ԥ4 {?󱦲#4ĉf z<ԽQ8+N-hb1h\_%/9Lp9͏l@ѽ~qba_f$$POZp.)mV #\׊Iޫ3%n)uMV?уZ(5.겭~V/*;ژ;>EJՌK+qmFb }x? [q`‚ԇ%ʓݧξ@'A{7h#6wә@D }4T̽WWA'?g_} "l) 6UH :u^LLEo$F/ZX NOEcA^'Wٺ=;.0NuDz05m^`W,,ELgx\Vt^u#*Z#h^B+4 EL&.'m0M@[u]xj!J^bi/@=$x ֚;vld;>'!.h ,I܏9Y~Gx*h+ :C叚{ ^ҫfS ԪE$FMȣ'qa2\kj/H逴Usȶ ]RTƳ(C̚ &Q;6.`U~gJ ^R69(.5Э>x^$`<9cbȾ!1#A! lr+Ect3 KZmcVfzo(y@>ߩVe *b'qWS*8A{ѓf8yHpĢ6"Z۔\%>6~<%Y|bcH B;a+)`/yΠH8PW}ssD++˻Zݖy Nh` mmlk?J3DZ^-Iu'OU($ֽK$p_?@'zZ +@;%$YqM4bq c|w`qΡH^Z]H]}|P-ǦUݙV#ĞJq9`/m Ja Mhp'14 g| -ʢ(^_"ʪ ÷~;s]&Lmo:T,/ yIPY K>aCZ^gŷV|1=gE_E4p_E0κQO4d(i0M'uD?@mz5=G Յ3vpzZqMn&va| R+Tv1&hU)K%||wi"8 @X#'d\T!1T?s6Y;|qn:mvM(UI>I~{/yp$:-E XO.OKeVEt<.U$UXߓjFdrhz}nji~-yp=%DOmUs bcsF=#NL8CZU-|t6=`,Y2) @o,z.mkp0Q} "}׭9RN<*Z̠B ќݣ` M) a5rGLhZ7O~gN께~o;C4Ex_+XX9 =L횋8 jtb 7aE{^mQ_ 2)BzP\.D*f-YnA=Lr3>58GmWYtU9ICRy'h)٘Xk@]^ з0//c$Xf5$"ma'ȫ(-g.ڧ|Bp^~} MTg%e ABjNNKEB.غ9·"@T,h@6p/@++l*ui}:XRP+6KHU =д׃ZJ S e̅/M4_;H:%:8D6t]M/%]mq)pV79iSJa]!z>֔9E ߄ߨwFd̅{pzeU9@8fm%rIqP݌ݎ3¥1)PhrbH P2;&yQ _z 1MFw >2zڑw%71W)\{Tgl]LˆlU/s7H. X5Ya^@ԮT ZK[)[T'`*#}AgE<#F`5qǕ_O/h9!U҂he Y0"~]I^>d:,1q=)agD묳ݞT$c_W5q$i=y*T ',f,W;H_w NA_@xMS~g6.s'zDdcG.潭Yxvg0eS,jO7'߳,vJ]RBN%W9w% g< 8a*ާVdG#{M&Eyӭ#.B^mFJWKk6n="g{u YA*^ 騵ڥ+ɴ%Èϑƙqd·z"#%OsQ]ρ/>!#Bˌ*47a"wq:-tLк2"m8qo9M.C]Z΢pVP'#hߏ6AV !bP6nC,y>1g$L XS ꉰOe sx n敋Oh;7@ 5f 9Cvjή{:YFyv)8WruPU8KUaCyy8=c2*#y!\<oZ"1%7}Y5P5`^:/iQk%a  f 'LYVxpZ#mṵbƅ' иjTȎJbc|m% 7p6ѥͮ"wr&3[9k)0WP-M>=Q_M &"@egL5mzWUM*(6,Zl% @Vl<"#1%y+Ub)3.M.doB7ꬱN̍UΒq%Xb"VJmIT;!4p@ǝ Zٚ8Եلz_7|^VjfF) "I\@tg팶ц/(Az_jfvfa6_4{٢>`bdouM&Pv\r/& pY/] ^iWO˄h Cܥ'`cWcpΑ@jsR_`lx(6 ʁ$.@^#~}9եYu6F??W)eVr#7A߈0C6w=`į@s*ul:$_ѱHݞْe+~+$ۛQ01wC}VMS ɇ:iAy-?R$dUڃU->,w>Xx&7,ĥT{$m+SmhK<EKi9׀ODA@Q$r*CaW ]2ǁhM8z\-__A8zՖO#ue?EjIRğ%lpo"{ʚj .#3sğ6Ǯ%ss'10wHμʱmć <;f+G/XBNz>ZAcU *enql_\xHmҵW5a&Oj0J + #[d#rymb\M>ebtIړ{:vn4|XjǷq y.1k؃Pe#ߏbk=&m&"PA %Qw݉ Wk2Q/7{+'6 . Z*{U'40z^2!C9.aX.5r0{XxC )iqV}cptZ|O.nWFÎ7/"xGIq߼}A]9l@Ҭ#㡒FS kG? $M!2+j.2ɇ$i`8*TERmE],wh fWGr;}Mߨ]GwsqkЫ݉.LѐWl;LKh?*V Pқ&S,Ǫld"*By7$ ;"nH,*!;6j\oVRȒk*0,uI:tg#vn[ (*XNbp91EhylKǯ`Hק#8Hf2f:X})BصdccL6Gy3=]={C8hZ_ G<Ȓ)VzHuWAE?1G TƓ磳-ԦZ٦{ibpߠ ޟ8:+=Q|5z9w9q,OU0ujUgت9GV0l>"LBh8 EkJeSܾ7`~c}+k+!O1Jr_4>c!ϦO6m%؊FF,mK%?7;kH杵=_o8l:a;$tQul?$(q|0xŨIzXO:`O P?bgH6YZƥȕ*AC{!DXeE b/`bM$IިsZaz%uD,ݱ3>d{ 8CNUV0OS׆j 4@oc˪ T.f"wfܢ.Ǵ0O~L :iďDdkL&]&z8x;dꪆJ7^D0so[Vӈ9uzkf!t^Z`rcPxc9ILvgZDͲT1KsLh~O(2_M\|ǖh$,YЯ(Iנ_\'-!Z%):uk\%8w =Eh +csNRfol:偽Fm$s)&moF/( McOTi: ^3^0Ӂ68}%r-^*$GAQT1wvݽ!J6e6P}-&5ЙHi(fol&Ƙ"؊oӎ8Ihnf.XEYk3ߕ"~g.r.kUR(1?+Px;>6.onLqޑ^rMX-zE ֙ieue)W QWF" ulK_H7ˆ:Y2yw5ݹ4)CNƵwG@ ͒%`d쩨'z0UxD!_-‡Eڿ眥71"'?|ڶUF4;^ MW 9 7" gn/ bO:̶X Зa7\kN`h|KnZ^si*Qo_$mLJD/Ag` O}Jw -;djEeJť(]J¹w%? Hd.zO3-9r\C0Dw m;O惞ψ-`j.T^/^r( `dQǺ"0=e=ؓ6%oșP/i 37H͉3)e>.0 n{l%~[U7t y2ɍFbf}v9ғ@ +?/OtSxiaDr &qǏ%,VQӃ2ڂ&ss><5@`)*#RW@L4@mnC+/^?0/cOQu]},,3*~ ,_ԭ +҂ eYl @AiP+NȐ˭R/Qeo_\ԤP8=T`rPh>y!Z6ø ~8?uJ>=[RW(b@64sVfvi-w^^OC=xn+g Kj.-8JǏ?7gͽHQ{:+3αBi 8 p06(s '߉]ޤMXesV?j_Kv bYLhs.,g\R"q"$tzapAgA̞ڲ!_bN Ъ b`RSI o1^1Q֑!=Ro7B#XkUDqȔ]BoAbͣOC1w]Qñ;/w" Qfd1mnl(yy\VZחU#+"e @N}UtI *,Oq= a\{>~m$ iE7dڸ@Kj`!#(i!|kah}SLTU٩ʪs @I2\yqϙ0,sӂMPO^߫{譌o cXҚ T0؀rpjn1DH`RW+%Irٙ$/_jy#p3H7|U4cUt,ce oZY#06qΦ4YJrJzgӫQL]Ff6II?mP\1mф~B+ZqDz ,& ܆7[szo]vfF(sܦ?1\ S oEpdAoGP7ԁnd iFi.ȫN7$b$VQti~un+ 䔣-w6L-LT,H$J![w BZI`*6+$JzZ]7xyJ2߶};~sL@!.dͬzzu<8bt00/@:O/=N;ͪ5T_*VNuC׍|Ş n'rĀ-Y4q9Q1̶}|6[ʬ!Tm- (\=,[e5,1l 40Atiwg٘ ._ϥbAׂdt"^C*h~ph>Hc 1505.>33BN<7gn.0/ "}R$p},Sx-7+,~:2)cR&\-iqD' g!*aI_KTxVSI*b?`[*$?̅%1%jR*K5Pq Y@WGbǵ۟g3:R!;4}e2[n'y ߷^VO$|y&)f{PC#}vr'AGiZWϥxx0}\F9o1sN`րQIcRtZ:mt>d/Y-MUuРvEc >x@KGҬc ?f^el_ٓCF\=_Adcƅ3mhsu/g0ث(n|ӓSe^- qn;דʠ[4rCLgw}sFH()hdzb4es_U{?ˍ[I6Gjt9e)}d[LZ.5 kOUsPOAg+2ĔA;,JXD]\’h"E{_xDhP3|IT~4s¦(jHVޝ+4v7(6X_[p΅?:`~A jSv grfccEd&/PJs[qܺ{Ϣ*r5sp@8$UV=gm[H ͬȍ@Db< 9ْ`12=5p1D*STFooS>{Ô KR} PZf'mO)u*G+wT#āw<\|]pk:UhPm z'lWi` >) hq~>!'%.O+9vV!: ~&؍*~_'7Dkxo-ik f0X)PWCwlyD1hU4d)m1v0g?h R?@+0tIɈsV^|%J=~ܒm-"C,cG"ru-Ηޝ>yj|A녅@[lP]@&v@ۑ T™; 1ćGY<~%$TrdZy͘$k+[n瑱F^w')g>L2N@ v8*oDvZu= }x<QL5  `:Nv4hXī&~g4vK )IB(l!1*+h(/Q0uF쾒Oc:-%P3-$R) 2)Sp f5Ci ;~UfβeĆfkUSDF"%ӫ4=Gk[G#f2n fyҔZgW,L޿Z{pY7iʱXI/LCk{~aiǺ d]7KR}`N?,f`$&CBySn),"hi.v5K%~ehSvem|Ra6mF2-&GMLd$ sG"T_޽^Pߗ9!9U}4]_ܽEM\%Tu KϠ8JyS(w9$wc?yqPǓhq,E z^ fɴiq#`/1"Jih;|R (AL9O="28%F1GB^ZG!(-n{Q)?($VO{Ri3iT1!o ><-cj3&N]_j>)qFyw|6iyz(3Gh]LXLjjN@'=pЈ?u"~+eWuMɑ&Xd FrdmUe~̢?&hh"_ߗ <"'jO)E?iB mƳұq(  xCD8cIiv<{Z3n)C]4;^LXmjt;;# /YUz'i@YO}|dӹf}%mk;Y8d=NlyB6?HX%>s1):NHGoc줺p `d0b:0@gJyɒX:p^Ϊxt֔.;LmߘQ럅Fun Q֜R j}O/AA 0@4ktӫ?˔0mKl&\ WPI}.sd 6mX5O:](kB,I4㋳ȿq:KQ}ey;$cI俇)@V0٢9ze KN49 g_rZ/ū661:VN,ξ[C1mŒM4;Av͓Bg5L.[iG%=e%眱@Yx2Gvd(t{i. 3q@lWhYhA0Ashr!uA7萀U9s辝]p =S[[/1EBdپ}AW/&jZf@FO0}y? yb+>S:s9SԯTA[hm?0 PaН%܃MS:3K-.0댷sJT_so^G/>.$,һys *CVy(RƩ?vIN(COGQr^"wgŐ??Qؤ zC\Q" Z`W0 ܗw_=GkܛjRq"JR7;4bbާbef%Pjo0 g"m<]b5G]N%(b}MJy|+vEʉwFeF-t]jPjɨeĦY9F3 L h*L?nu:z70 'dYAPLY". )*tYOCfXNࠐp> wF荢n *OO`/j&hqtzplYB\k4|AV s;=^8͉b9֢3\HYY/ڞ wp#@AbÆAb[aZi0%FɃ N БR[d2=c9⽁0Vz՟:wB8"Rahsf]:RN>AMEA)ۤ`0قtZ`2-󸽂iK;%)ט F:i ~ֵ<0(M5~uֺ̳˽(P匲ۼ-9g-%٧E{6J FHӷ|߂ҡf~+60WanUSz{ tiՏzeP4 -ho i,'x~iʇ@5]D"t| +<xn͏oP5Ԩ;<ߋ%g`/QLpN0Q, %X,ύ:oV !rWtȦ1h`$Z e?[&z g]+O:E`k11`3Fq9 Ƌċ"wm\:DZ=bIȚԛuDNg,OmDi-cEKw)}^*brlO]HBR/>ӧoo laYo\ۻ5t`U5/f >!L'si|W4n`SWGއK=!<ǫZw}I2e"A{K`b*al Cuf)SZ\ ?&(L6",c`ќY2;eV I4T؀>!C&PA~1x7a,Y=VF~,ne9a[hCt6cƫ(oBGwr Tj6cKMސET<ի[HQc2);qIS?0g騳(vKLc:kg+]m_cC ]S̓OfN[ѦGq h!EcNLL6z;3Nr岄YJW\Z \X/kRw2Qg5HZ4|Ł&I14BVN֯JЮ}T3+;ȅAP-O@)XrDL|[շ 0n}dUȦ-7սȈu?N=CN We4gzEw3 "6bæ?lQc]ėIϗ4cڕPV|m;'؈0Xs`Yѓ?4:(6—L(cQWGPI?:O~Vq-ƨ.ny 9Cm8 S2ڃk(u$X#3zy׃ؽj.rRܨ Uҵvk#/ a `@TMA616DV6h#٥yC" {K1*xA&a<(1QwMvAPܲ %:{"|OXxBVQ=Onֿ{%gm19s0z^SFE3l[I muuJ:)mZk:~ V u^6 EG AG-J4̰͑GkԀ6"` i(jU*N4=ӻe]y6b *$MIsci@A wJ^cNzrԔsJr).#{t1}^itQ%* xU:S ceNC'F B0NfOt(_y<3t9]7JaG1{Uk"CGqG\P7e_#~c$E廉QҫVq*_oLJ췅C[@R*{*CԐSƯؽ P}p31vm%L2aiaVgMYQ[RHdۺ,o6T9L-P" z|O.M|g@FQoYY ϖ{ҒԾpA=R, }T(D k9R'Z&)f䧥׹4r{%]jwH))#`=hlހs(GTxs ]9dDywyeBO9Dj Vq,0 GuJUhpMG8C!66N+m(e!B62!-]h E`׉zCY =m on!XCI2!̤Ԥ׳()DH ,ɺ [.}k1tH$6[$H s?_\^#>w;&@l6ֹQ/UA fgCy,hOf9,Zy1l"󹅑zkM>t{]쎨h# &\,fח@ؠ0cqz_|4iNS%vYd!U– wyF\/?-n*$H>u#17߿Эb$UHdz M\aY (\C]U~X%S(@ٽVbb%O2¡VAS7uvx e P:.F|Qa] ɮ5>_:WG,4^7^ͅD8u1Sv4<#gQ?=F|/dmZGw?'ⲟvX)]@)o%~a(jSuBYڌf:l}٠J!JjH$;:+xM+B.1+U0 X4< |!&lS_"4~cQE{VĸVX5ik1qatdDw2]pe . IZ*$3#ĤrYo,pMM#Qv<}M}nW2a`'h9f}ܝg! i0!Mƍ:e 'GMXڸ Z2t/a h='c(>tL& 5HB r쟴D~^ڌ9Dj"]q۫Y p`+8WZ׎j߼A|As7JsNlj`6AAz=+|R91;N#2pğn(#1=ChI{X!c'͇?R"d63gmu⃇ji`09CʧK Cr4fЎĨY'F쇫)s}r eƀEٕ=x'?}ծEum|?nhO]KşgT';hzoe"zh~ Qb@Qہ[pzGLʾ`/.bmP(Z^5˷g qױKv:TѱT tg}lճboP#L*Xxo3B%- j]'x'\G)\++f3gIk7ȋC1QaͰ>@*:<;C}hv'c1;]%M?`]*vUՉpAPG[knCBکsH[7i0)>Xzvf1Ic@R( -" ̫"×"ZPYqw9;= eg0*޳qa(C#ccuxy%ư}TLֶo0/@/=^jWޘ#X ili;DGcRYXrRREKHnQt5eرBwEu[JfԽH..l4XyDW 0"("jp/s0V,h4*;%]tw0ms#ِ-C+$P;[ (_o͎ ~ӜHB۬qs [͖|VCfY!IB2e++"d*L 8B +q!y\/[N̑0DO#E7i)UZDMRy_vrԩYީ G 1.~m丷iW#Kpx5tY@^6.ôhE]|h}+hyh܏<^_\ƶO_0>Q(eUOK 8LuQJ}J(>$':%-& }.=Tuѳ2~Qැ0FO0ܖ"zс`NbL]wzG3F}M2.%hW[0ƙkiժe [GHu4z,x?5LR;5X0^\ B{w \ @F,w4f*^}A'ӄ~N KSHYՊajR˂eCDFW<.w#li4K|| dIpxf_AmR.ɹ@9lK*g8-:l>_O~b4sz1[!}\u2d0T8!A.%58}#h@;Ï7_@&S"#/( miog;G'Hإ:X~g0ά6Xӣ! O]mhoa-%VnI|wjB)S%~y%. {~#1c`N50|/m< %SR@^C*f O0*i~Y(wGn*kW8r:;ɍ{p0->E87:Oą7R{IFmW"62_H{=L:BZ4J~Kpx W10m<H2#VPv`e7'0}g9薾#0 ~nBb؄;<󐛛eOFY h/D{yr+Ig}P mb:o nD clay0/=vKZxBN!)xL8~',ܾTfyWAw!?Y<25aMs I(\T@aKИiÞD$bƟ˗"(Җ= MT'Rv.A.p)i52<3tJ}rۮ֡_P*E@izK=c)) E;ul%&G1aAm?iPxu܊yU<~^hѱ=Oj`HØnIes&ϱYjPzcV$7U݂2y5sv0e[xѪiF§˿G.Z햸F (JwfHy]@+i-DEZ0JOըI4MON]x[k9d%[@wMp?/ޢ.腮%yvUh;z+5%"W (״ DiO(T:@ dRhdx>N9fzBzC}IRe${D]Z2UE% I`5'S`2)c \Qs2@P$n_X#d:)P6V&}G9GEE-m#Rz^ְwBeA)yod߹ԫ.s8ia442 *݈}qxO⬯7,|YwM!1s(g>!_ڰDK?_'." {Ő~%X'[}C=rFA2TD;/Lҽ:c:vBoEc{|0V78+mp/{L44nGGay.rWQP=zA1P;fE, .HE,l{cٚv>܆Dذ:lW}(rBX׸ڕQ4l-76: UdUKZs9Id0H0UC_!Cu 8v2U?%ь9A_5Ms Оb ۫462X\ LJ(_SJMyr+0 ۺme#?y@3k2 ~rIؠkûUPJQJ9) do OTgl\wP nL͝HgI'@ul'~Rt2!Sn9/z4v {~G=5+>Ac7ɔFnY( ,7l@1[xx}`?m@6Z;% :|R+@?ۉTQ"7dSamcc;R;70H9?F_m*X nj&}U1MP#qp[)g

qhEI mg]ch 71qa+n'<1\ ;bFU0).JŎc-jÌ >>z oY4]4mO&s2%2|$ו*&i3O4HI mt 涺+?rB ;'NG-"/Hs{ExL!r;@# ~#Ȏ(jZC_L_F9c 8y*-T6J&}wTux[X9Nc-t86nn[n^¼Dy:m@5i)]ZG+[vZ;=NKLi:{}0 d3g\MCUC{ 5|8 D+h;[0@,SPAʢ&%dmGߌQSzNN=ڑ,r[ csV1Z <2׮+uNfN3 Q*_XqUOŤ+0ùN8705NTm\>L.?eEtˬ I =g{عqHki+] WIY\'SqK'FX;Z잸^}FxZV7r1K "|Ϊx;0; qgZaj-\Ͷ{)h<@}ᆴQ)HAo%< v t#`R_,&F=W^\R,t-Szb/*T|L^BZoVq8q;sǨ?Vd2U>5"PB]///XBX'C0ut;cqָ&QGU`G}с-&'H?uO3uM]]R֊=Thzn8ᵇ׷GAM(c \\ʦ\*P*+Bp!1$*']p/go.l5'W\&]9y>ָ A3>`RY/, 77 L|s W@U5GO=(炯^d*g4AnPd \n[c*cQP욙i% μG$7΍gq;nC5h9GiSI}n*Ya>NǥP ]:$DȥCIeUMdHzVـ3Q^蟄O>e~c{FJEϝ{b\e*5ev9+E,iwt:& }(sLp"W lYP0ب 8: g3糣 o6B"6MZHb=ǟz݊q< Č+3Q81^l]8*yPesS (]`v%fUYmГ7T-OjɺFQF:udkPZﹺ\|%p=Gg369媲W, s ;kgvoݮ-ЅOѰ϶C <QR LxˣYfB Ѷ,t ^6(5&hdƎ)(Tehny(K`z4lm֪,,q8 uK.YqIV+.4a3|pl@msOA*_ZiYCZ{g8i5u+E&h zvɽ27 qr#u(YVTA7% d Dg_vPo`-Fc3 IƍJlM,{L`w~y{b|=O*'i3$3w: *XP4=3p GDbKy>Q'1'SKB7b)|cLO+V$+Id/0YSmjJ:Wpg|t|Z3ҭkQ#M ggJu1q ڟwaБۺ d{㾉7A wu&Χ;MjQMDudӰޟ}0lcde@v(bZU\-hP=SIi ˛?E3eKKu8?ӑl3TSA7d/cV %[L! [[HPpec1eyoSNYՁt#V.!RJmmڕ oDOԧ ,Sa͊?>ܛ^S5T^[QA]JRľşՀH vuGP-;LܨGJzm^{}YwI;-gwH_pɹD? `7tMm 9EF5(Mu$9U5w_Ğj#B~qBWEcœ)S8S:7Itn>%~U{ڈ/uGwD'@xL\V??} a pݢ꿹[fפ 3{nGaB_bGɱ%e+BWv#̢6 V靷hĘ9ix)CLkұ︑3O $~pڰkp뀾/:@Aj)n;+d֮5rr͘$)bU@FeŤ_U4n9'쐏ƍe#$-Cc):d }UaK>oGLJM55.PZt=dk3lmrt_$X3pVqҭE}"@)?Xjs檏fa_1zvNeΤrۑo7^qf="*'XinbzGK78V}q.Oo;=Fc4k$͏QGˣtr@#!Oc`i5\=a"[-O uŤ|aBŝ1q%uΌ)SK)qREP[壟PڧaסH 91(TfA]iQgOvߠo^4cٞdOeOD&5& |C]Fp z.-k%yUWEϗ"sڷr/QW/6L LxML8hr4ngA[ܛ*2rM% |YMn"(tgS:^*=I4ŗJgXeZDbswpLu[Σ ^oxm3Śxf ic}ݬ'| VH+JVL A ] lKՑl( zJK; ]e))wԾ7QV\ĈSB -eDCӲD]+VLM(z IE.,oTX9ֵ"߄ Po1Tgv` ىVbF!#`\̓2Q;Bl{}JEJFkR2֍ߔcӋe9PʚL fu ? J \g-A~O{g`Q# g1u/ ì M'Zo0 ;* $ K&}Xއ͹ODK4;͏AW0z9 Z_ C Eoƒ~f(7 S|T$)WQ qy'1p60q@IV:q9_xUa2F oed:BcoHl7*j6`jp WS6.7+_mj,r꥕oeXM:o$AjIӚ^0Ûg%h|hٴQ|P7)с\M"-+:cE?)&$ -۠k>#u؜;f X?>muЮ(}[oA @[8pko A xYJkZa0(0c%E#.@eZ #ѷΗwKÆE{%V_ ?-?߃uo[4,Lit}(\^MbߩIZSX{R(nJ7@[1 :}_šVeDzh-}|*wW5E@X ߅,LSs[bPi0ҳ .Gwϴ8O_`uhbKک-QkgkP=kĕr 'ކn*H ;n; f=X89;DT=#yʐ ~C%|t{B Y3,b$j3?:qF墶 <#E}L}1 #Ѕϝl)fBC"@ݓ‹aEרWM~`;|FbS6xN-:LdOMCjmz(oG+h]X߆r%D}N] MW֠T~O(SΘGTr1%f(g xҩ da$ߥ _ȅ<102h=+yުC4Sź$`9ۂf$N >oeN`[>~2u޿rȂ&7Yd ǂ1RaLnA1|-6 $ƅU`ϩcݶZj~;V=]2/ӽbGG? ZYF #6B չ$ic@ehf``$'PZցd?qHjhhpw t en=ɴu+kJ{qEC{\P:Y~ K685JYp_9~SؓJ>Ywa'9pkZa UCVG0%C⎼K}`2Do׃gD0у6\f=D!($?ǣ!8̆~ ܞC#l[^/BdVؚ:?(IhhBWE /_eKWcqNM7m,bh!p-H=@f1j28qWKed0}Xe#ݤ#&miwiOZ5u$<,2#5eJs?xǶNmmܐ`w4r }WRg)b\H2ѿ8|z5c^MHQ>_F:֎,EU$!^{9s2}=!(JjkS>% 0,VK3sh˒^K(nOv~X@*=ؕ /O$>э-? AH[Nb|ic ?ѕ"k`éGrPYu Y ;Q>JN.6eQ&+kqb 9}Rbe[o2ҳ7޷ٵ͋SCGh1W-!uvˆ019/sxoAp[S}<=VHQ1CDlVGl%5)6 +iق&۲3*" Ԭa={a̕L*~19d[~Eہt}et\z`=&Cm:%qt#.'Rd4ևԵrQ<voqMz-콧NEq cܐ%MXnqjdr!_]•v`aLdV^#[(怓&*>ˎ{7E\(mz|uPo+ML iiv2VJ7D(5u:Fed??WD巄'÷OE1ȤOo׵7Ԯp53 K4"A5_5{؄GiY]F߾a'=&rc:y-CelęQ:[f[DBȔNB@+elEMjA%9:O^ԑC衂VWJD9Ic; w\Z`a07po E[@n34d:Pe.gg`\&t U0OK 1XZ9ٮl-#V菢1(]׃ 8!C)p'nL=QKСo{=XTms͖V ]ߥ/mE=F'M8TU(Wp( X ^zQZ}b,,+y"v#N9u[ql8h7%i1ѳ;8[qd7լF𭪚ZJV/\ }C& mB We6̆],k߯*h3i2⽖( )U\=}zuO ^,! 񈠉7,i%0k 8-6`_wJ#9RfU_xa{dhrpZQ@{\ұ`-':@jp[f̮?9}j{j*!.ʼnhh;$=ϣ 1NEnzsɵ^?\ew.na_9>@~t6Ed4KDIOgH֟wka# R\r5pUٶx=1 W)gw^t9cb< ?"!pn|X]D L|]*pgiF2cn,hG]E/n4i2ǸF(ȁ}Vh=d^*&ޢCvU0M ~p&7:$hl5mNY'3ꌥC|p8ٺk5 kȼ?)0P@9 P.E4R`1Aބdx\%ϡG`zBAYxi2?o{a'3v, m:h"K'\3}')k@?q-y޳{tIRFH} M #8FKAVe9-bM؎\kp I.ҿA?_Ҍ9[%7SXwX]Z$SL֢ חϿT"yuFR3ڌ=kA$M yړDNjvmf : .GrLi%]UZU}/18]Nor(-fUl ~bNoǝ!Qy^P02qkrĆ >s`xDEjr݇$ʜfUdؙ6y,ڢ?:ʌ6t#~ILB4^N0yQ$α59ZU9qim4c6RÀ|0n]iٍ,), <<ZYvQ Ǫ h`!*\YӋa:\AG;$D nqsc3r$jf"L9Ni%UxC"OC;zh rJ gRUG:5Q@[&ϪSx!2Ch-H=_#aE_*U;H$:`P">!T`vnC-E%B B6?HZx:KR\=aA!Va32[e0- ]*0/mk7+.NgA\N;aJF8ħHyQCb kPm:YMA;BMTSJ5꡺& roPQ(Fa0?RIȿk NLj(5h_ߊ/~s!ٖ1xlANŷ]8ZCP*DE.L;qwMw+GHY>u*^W U A#Oj=#t73G?PrC=Em,uu!3vdܠ8u{n P4wWfQ AͷU@u% שBBcM㻣D\i`n5P 2*%N\8|m4@|S[ųs$[¬,;b7dq.5֧H'~"518fT8e9Nn;M$;տ)rP)@XGCae1 DRzþ1\Eס74N`F$Odc &*е"AuohB,n7~ʜ)ыb||"l^ؕY*'Gk&?q;7ltSC/Uo^=ol' =Kn4Ru\贜0gGah% v`0g-jq.j[=:t3"Vmem^q5Y &u;1?)Eg ;G9*'K 4;Ne"_a]KGo_~tϭy|VDrtcHkpq&6#Qd?|m? #HBȡ͋FBxC;cN;e5R7# Qʾg f2 ywp=3Ϩ-1&j&Tr%\ֳ YGThh̦E=oH$H<k?[9ƨ_+;+s ~ݍd߰>ш;veA#}z?2DXۿ qZzc?:߫ˎ41w [>fU.m55}i@obQQ[3u}.NX%M/_J³i7c Qɱcɮ.Y\ڌ ȿWc舙/ƍ:CtW,ŋ*{3rN{šY^ 'D*MCAHX<1W.D:Zo.۷GUli<ٵm )XY*^0FӬ-U ʚ9K)kǕ+Y).Lr+)>'[13#O"NL3!;M9`g0'T~گ\nT@X2(@Y-_e7'=Ð>(@cA-˩>*Mo^3, 䬆<7s[XƘ1?%I8%N@0:g(.ԁO102#,zڷI~ۆ&iB)=鯦Dw|o=LL%iKgU *lEɾyr-i4{b fjI>R{X/3eR-]Ydd8)_jhlg^ ܴdzGvunG?)%_84[QoL˕{:D5q$ZZVK6j-*%Tk XiڢE /r&l^,tF~ mFqq:9GyFI^2)44H`x]F+T˾Bj:XG0e@&anjLJJ͚}{;wm 2W/K~d'O%<ڴucUS н%CGpI6q I CdWEceDv)+i]d/aU~40~vHh?`5nR50PK#4)ǿT - Q>9\mbUbd:v{8Рi<`It߳Sap| -F0ﬣ iw:?WRwV]{+Fq+λKןT89/̣^nLMCWZٵyuJ`yv1!GU41o7==qTKl̝$񴅽~@H6rX#MIXJEL$*luUBnREQ΁قE%]g58 ݬid]9g9 A_XHkXւ#5Ut ޲j~0lWw&0|,bftWEƇ^3ͨX 'HPY Z4U^ HOcE{`OP3RfB.N2"*6)i b}]@' n>ʟqtyowv5QU>+S[!.QZ.S| mw2~ڕ[uMSɩd]&4|>4!N1I|4(;wL>IUtV9i0Rƒi=_p,1ɦ?5%oO oU?լi i0ޒHANk>{:Kzp P]*EC7EIPQ"G-f./ʳ(Zb8 K%.* PG}lFB>kGTLG@l%OgX-#11죥r Wva Xvy)־|ZQ`뻭K9RA8{JEd|F5GR>iFDa[EjS>aO&,K&1Vh3y/v%w=2PZe nH3͛%DP +2/3ܔ9"{r GNUiDf_Z5)rELbyaUr8ށv\efw%Gւ2WsqU" CN'c ΜsVK֓s׵A+J_;G{xEG#X•` Xٺ13V-.EhH/n՗>cWBn%oz#TACQ95x|~n& 5!T y}VdD #44gю*1P KpJ|:oMS0}V?:hD[&VB&(bqgm5z ɽA5!,9 byRc)"¢6l)2ye)sOM.?þ0U( uA?b>nNC` )c!) Z8`r D2nh/彗75|RΣ؄b_*an%4 2*-^AUphʳneckꁝonWr/EF*R(ef3^_cb/ČY _ 5d5$|>PySA^(HO}Dr[ͣdɳ(?_6tJЏ:wE82\֙""r4w]D N 2oݤ%v.vY"v48N w c~–A_/&KGī!_Psc,3V/z6Ig1P)"\!Ogp7 :'WT%+y/~URB*H&h8Si^}g+w#W"sn70x]#~$1:t~s<dݪG#+/Gb$NBMnprgcA]8x9|?auh:bv L7PX|ufSxD9Zoߕ$Z\mx=+2 zHk N}6 #*)O|OBdajL^64ER.zl^i9m{Yc!<)$LDz +=_]c9 N! O8cNPWDB 5/[@5t:Dq_&Km Q.o? pPDS 09 YZ