0001213900-24-059568.txt : 20240705 0001213900-24-059568.hdr.sgml : 20240705 20240705163003 ACCESSION NUMBER: 0001213900-24-059568 CONFORMED SUBMISSION TYPE: 6-K PUBLIC DOCUMENT COUNT: 4 CONFORMED PERIOD OF REPORT: 20240705 FILED AS OF DATE: 20240705 DATE AS OF CHANGE: 20240705 FILER: COMPANY DATA: COMPANY CONFORMED NAME: Prestige Wealth Inc. CENTRAL INDEX KEY: 0001765850 STANDARD INDUSTRIAL CLASSIFICATION: FINANCE SERVICES [6199] ORGANIZATION NAME: 02 Finance IRS NUMBER: 000000000 STATE OF INCORPORATION: E9 FISCAL YEAR END: 0930 FILING VALUES: FORM TYPE: 6-K SEC ACT: 1934 Act SEC FILE NUMBER: 001-41734 FILM NUMBER: 241102865 BUSINESS ADDRESS: STREET 1: SUITE 3201, CHAMPION TOWER STREET 2: 3 GARDEN ROAD, CENTRAL CITY: HONG KONG STATE: K3 ZIP: 00000 BUSINESS PHONE: 852 2122 8560 MAIL ADDRESS: STREET 1: SUITE 3201, CHAMPION TOWER STREET 2: 3 GARDEN ROAD, CENTRAL CITY: HONG KONG STATE: K3 ZIP: 00000 6-K 1 ea0209003-6k_prestige.htm REPORT OF FOREIGN PRIVATE ISSUER

 

 

UNITED STATES

SECURITIES AND EXCHANGE COMMISSION

Washington, D.C. 20549

 

FORM 6-K

 

REPORT OF FOREIGN PRIVATE ISSUER

PURSUANT TO RULE 13a-16 OR 15d-16

UNDER THE SECURITIES EXCHANGE ACT OF 1934

 

For the month of July 2024

 

Commission File Number: 001-41734

 

Prestige Wealth Inc.

 

Suite 3201, Champion Tower

3 Garden Road, Central

Hong Kong

(Address of principal executive office)

 

Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F:

 

Form 20-F ☒          Form 40-F ☐

 

 

 

 

 

On July 1, 2024, Prestige Wealth Inc. (the “Company”) entered into a certain Software Technology Service Contract (the “Service Contract”), with FutureTech Systems Inc., a British Virgin Islands company (“FutureTech”). Pursuant to the Service Contract, FutureTech agreed to provide complete system customization, development, testing, delivery, and operation and maintenance services to the Company. The Company agreed to pay $900,000 for the services in the form of 1,500,000 newly issued restricted Class A ordinary shares of the Company (the “Shares”) at a price per Share of US$0.60 and warrants to purchase 750,000 Class A ordinary shares of the Company at an exercise price per share equal to US$0.72 (the “Warrants”). The Warrants will become exercisable on the six-month anniversary of the issuance date and will expire on the fifth anniversary from the date on which they become exercisable. The Company issued the Shares and the Warrants to FutureTech and its designee on July 2, 2024.

 

The Shares and the Warrants (and the Class A ordinary shares issuable upon exercise of the Warrants) described herein have not been registered under the Securities Act of 1933, as amended (the “Securities Act”), and were offered and sold in reliance upon the exemption from the registration requirements under Section 4(a)(2) under the Securities Act and/or Regulation D promulgated thereunder.

 

The foregoing description of the Service Contract and the Warrants does not purport to be complete and is qualified in its entirety by reference to the full text of the Service Contract and the Warrant, forms of which are filed hereto as Exhibits 10.1 and 10.2, respectively, and incorporated herein by reference.

 

1

 

 

EXHIBIT INDEX

 

Exhibit No.   Description
10.1   Form of Software Technology Service Contract dated July 1, 2024 by and between the Company and FutureTech Systems Inc.
10.2   Form of Warrant

 

2

 

 

SIGNATURES

 

Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.

 

  Prestige Wealth Inc.
     
Date: July 5, 2024 By: /s/ Hongtao Shi
  Name:  Hongtao Shi
  Title: Chief Executive Officer, Director, and
Chairman of the Board of Directors

 

 

3

 

EX-10.1 2 ea020900301ex10-1_prestige.htm FORM OF SOFTWARE TECHNOLOGY SERVICE CONTRACT DATED JULY 1, 2024 BY AND BETWEEN THE COMPANY AND FUTURETECH SYSTEMS INC

Exhibit 10.1

 

  FutureTech Systems Inc.
   
  Software Technology
  Service Contract
   
  Includes project quotation and technical solution

 

 

 

 

Table of Contents

 

Table of Contents 1
Software Technology Service Contract 3
Article 1: Contract Subject 3
Article 2: System Price and Payment 4
Article 3: Acceptance Standards 5
Article 4: Intellectual Property 6
Article 5: Confidentiality Obligations 6
Article 6: Liability for Breach of Contract 7
Article 7: Maintenance and Upgrades 7
Article 8: Applicable Law and Dispute Resolution 8
Article 9: Force Majeure 8
Article 10: Contract Modifications and Supplements 9
Article 11: Validity of Contract 9
Appendix 1: Project Quotation 10
Appendix 2:  System Technical Solution 13
1. Project Overview 13
2. Project Overview and Requirements Analysis 36
2.1 Functional Requirements Analysis 36
Basic Modules: 36
Customer Management Module: 37
Marketing Module: 37
Sales Module: 38
Project Management Module: 39
Product Module: 39
Reporting and Analysis Module: 40
Integration Module: 40
Knowledge Base Module: 41
Others: 41
2.2 Non-Functional Requirements Analysis 41
2.3 Other Requirements Analysis 43
III. Technical Implementation Plan 45
3.1 System Architecture Design 45
3.2 Key Technology Selection 47
3.3 Functional Module Design 48
3.4 Integration Plan 56
3.5 Innovation Point Analysis 57
4. Project Implementation Plan 59
4.1 Project Organization Structure 59
4.2 Project Process 59
Work Breakdown Structure: 61

 

1

 

 

Milestone Schedule: 63
Progress Schedule: 63
5. Quality Assurance Measures 64
5.1 Quality Control Process 64
5.2 Testing Strategy 65
5.3 Delivery Acceptance Criteria 66
6. Risk Management Plan 68
6.1 Technical Risks 68
6.2 Time Risks 68
6.3 Resource Risks 69
6.4 Quality Risks 69
6.5 Security Risks 69
6.6 User Experience Risks 69
6.7 Risk Management 70
7. Project Deliverables 70
7.1 Final Deliverables List 70
7.2 Operations and Maintenance Support Plan 71
Monitoring and Alerts: 71
Maintenance and Updates: 71
Data Backup and Recovery: 71
Fault Handling: 72
Performance Optimization: 72
Customer Support: 73
Emergency Plans: 73
8. Other Supporting Documents 73
8.1 Company and Team Introduction  

 

2

 

 

Software Technology Service Contract

 

Party A (Client): Prestige Wealth Inc.

 

Party B (Supplier): FutureTech Systems Inc.

 

Considering that:

 

1.Party A needs to procure an Intelligent Customer Relationship Management System (CRMAI) to improve customer service and investment management capabilities.

 

2.Party B is a professional software technology service company with the qualifications and capabilities to develop and deliver the aforementioned system.

 

3.To clarify the rights and obligations of both parties, the following contract terms are agreed upon through friendly negotiation:

 

Article 1: Contract Subject

 

1.1Party B shall provide complete system customization, development, testing, delivery, and operation and maintenance services for Party A as per the content of “CRMAI System Quotation” in Appendix 1.

 

1.2The delivered system shall comply with national and financial industry software standards, be functionally complete, and be of reliable and stable quality.

 

1.3Party B promises to develop the system according to Party A’s requirements and complete it within the agreed time.

 

1.4Party B shall submit a detailed project plan within 5 working days after the contract is signed, including project schedule, personnel configuration, and technical solutions.

 

1.5During the project implementation process, Party B shall submit a weekly project progress report to Party A and hold project progress meetings to ensure the project proceeds as planned.

 

3

 

 

Article 2: System Price and Payment

 

2.1The total contract price is USD 900,000, including software development, testing, delivery, implementation, and one year of free maintenance service.

 

2.2If Party A fails to make timely payments, Party B has the right to suspend the project implementation until Party B receives payment from Party A. Delays caused by suspension do not constitute a breach of contract by Party B.

 

2.3The compensation referred to in Section 2.1 above shall be paid by Party A to Party B, or to the company or individual designated by Party B in the form of (i) 1,500,000 newly issued restricted Class A ordinary shares of the Company (the “Shares”) at a price per share of US$0.60. (ii) warrants to purchase 750,000 Class A ordinary shares of the Company at an exercise price equal to US$0.72 (120% of the price per Class A ordinary share pursuant to clause (i) above) (the “Warrants”). The Warrants shall not be exercised until the date that is six months following the issuance date, shall have a term of 5 years and may be exercised on a cash or cashless basis in accordance with the terms of the Warrants. The Warrant is in substantially the form attached hereto as Exhibit A.

 

In connection with the issuance of the Shares, Party B hereby represents and warrants to Party A, and covenants for the benefit of Party A, as follows:

 

(a)It is an “accredited investor” as defined under Rule 501 of Regulation D promulgated under the Securities Act of 1933, as amended (the “Securities Act”);

 

(b)It is acquiring the Shares for its own account and not with a view to any distribution of the Shares in violation of the Securities Act;

 

(c)It has significant prior investment experience, including investment in non-listed and non-registered securities, and recognizes the highly speculative nature of this investment. It has been furnished with all documents and other information regarding Party A that it had requested or desired to know and all other documents which could be reasonably provided have been made available for its inspection and review;

 

(d)It acknowledges that the Shares have not been passed upon or reviewed by the U.S. Securities and Exchange Commission (the “Commission”). It agrees that it will not sell, transfer or otherwise dispose of any of the Shares unless they are registered under the Securities Act, or unless an exemption from such registration is available. It understands that the Shares have not been registered under the Securities Act by reason of a claimed exemption under the provisions of the Securities Act;

 

4

 

 

(e)It acknowledges that the Shares were not offered to Party B by means of any form of general or public solicitation or general advertising, or publicly disseminated advertisements or sales literature, including (i) any advertisement, article, notice or other communication published in any newspaper, magazine, or similar media, or broadcast over television or radio, or (ii) any seminar or meeting to which Party B was invited by any of the foregoing means of communications;

 

(f)Party B understands that the Shares must be held indefinitely unless such Shares are registered under the Securities Act or an exemption from registration is available. Party B acknowledges that it is familiar with Rule 144, of the rules and regulations of the Commission, as amended, promulgated pursuant to the Securities Act (“Rule 144”), and that such person has been advised that Rule 144 permits resales only under certain circumstances. Party B understands that to the extent that Rule 144 is not available, it will be unable to sell any Shares without either registration under the Securities Act or the existence of another exemption from such registration requirement; and

 

(g)Party B understands that the Shares are being offered and sold in reliance on a transactional exemption from the registration requirements of U.S. federal and state securities laws and Party A is relying upon the truth and accuracy of the representations, warranties, agreements, acknowledgments and understandings of Party B set forth herein in order to determine the applicability of such exemptions and the suitability of Party B to acquire the Shares.

 

Article 3: Acceptance Standards

 

3.1Party B shall develop various functional modules and perform integration testing to ensure the system quality meets the requirements, as specified in the “CRMAI System Quotation.”

 

3.2Party A shall conduct comprehensive inspections and tests on the system’s functional completeness, usability, performance, and security. Final acceptance shall only be deemed complete after all acceptance test cases pass.

 

3.3If serious defects are found during acceptance, Party B must rectify them according to Party A’s requirements until they meet the acceptance standards.

 

3.4Party B shall complete all rectification work within 10 working days after receiving Party A’s acceptance feedback.

 

5

 

 

3.5Detailed acceptance standards are provided in Appendix 2 “System Technical Solution,” including specific functional requirements, performance indicators, and security standards.

 

3.6During the acceptance period, Party A shall provide the necessary testing environment and data to assist Party B in completing all acceptance tests.

 

Article 4: Intellectual Property

 

4.1The intellectual property rights of the system software developed under this contract belong to Party A. Party B shall provide the source code and related technical documents.

 

4.2Party A has the permanent right to use the system and shall not transfer or provide the right to use it to any third party.

 

4.3Party B shall ensure that the software and its technical solutions provided do not infringe on any third party’s intellectual property rights. If infringement occurs, Party B shall bear all legal responsibilities.

 

Article 5: Confidentiality Obligations

 

5.1Both parties have confidentiality obligations regarding technical, commercial secrets, and other confidential information learned during contract performance.

 

5.2Without the other party’s written consent, neither party shall disclose the aforementioned confidential information to any third party, nor use it for purposes other than contract performance.

 

5.3If a breach of confidentiality occurs, the breaching party shall bear the direct economic losses caused to the non-breaching party and pay a penalty for breach of contract.

 

5.4Confidentiality obligations shall remain effective after the contract is terminated, with a duration of two years after termination.

 

5.5Party B shall take reasonable technical and management measures to ensure the security and confidentiality of Party A’s data. During system development, testing, implementation, and maintenance, Party B shall strictly control data access rights and record and review related operations.

 

5.6During project implementation, Party B shall not use Party A’s data for any purposes other than those agreed in the contract, nor provide the data to third parties.

 

6

 

 

Article 6: Liability for Breach of Contract

 

6.1If Party B fails to deliver the system on time or the delivered system fails to meet acceptance standards, Party B shall pay Party A a penalty of 0.2% of the contract amount for each 7 days of delay.

 

6.2If Party A fails to make timely payments, Party A shall pay Party B a penalty of 0.2% of the corresponding installment for each 7 days of delay.

 

6.3If the accumulated penalty for any party exceeds 10% of the total contract amount, the non-breaching party has the right to terminate the contract and claim other losses caused by the breach.

 

6.4If Party B causes system or data damage due to negligence during contract performance, Party B shall bear the corresponding restoration and compensation responsibilities.

 

6.5If Party B fails to complete the project progress according to the contract schedule, Party A has the right to require Party B to increase the project team members or take other measures to expedite the project progress and ensure the project is completed on time.

 

6.6If Party A fails to provide the necessary resources, cooperation, or environment as agreed during project implementation, resulting in project progress delays, Party B shall not bear the corresponding breach of contract responsibility.

 

Article 7: Maintenance and Upgrades

 

7.1After the system passes acceptance, Party B shall provide one year of free maintenance service for Party A.

 

7.2After the one-year period, if Party A needs continuous maintenance services, Party B shall charge an annual fee, not exceeding 10% of the system price for that year.

 

7.3Party B shall continue to provide optimization and upgrade services for the system, with upgrade content and fees negotiated separately.

 

7.4During the maintenance period, Party B shall respond within 4 hours after receiving Party A’s issue report and propose a solution within 24 hours.

 

7.5Party B shall provide regular inspection services for the system, identify potential issues and handle them promptly to ensure stable system operation. Inspection services include system performance optimization, security vulnerability repairs, log analysis, etc.

 

7

 

 

 

7.6Party B shall provide system usage training for Party A, ensuring that Party A’s related personnel master the basic operations and maintenance methods of the system. Training content includes system function introduction, operation process demonstration, and common problem handling.

 

Article 8: Applicable Law and Dispute Resolution

 

8.1The conclusion, validity, interpretation, execution, and dispute resolution of this contract are governed by Hong Kong laws and relevant international laws and regulations.

 

8.2In case of disputes during contract performance, both parties shall first negotiate amicably. For disputes, both parties agree to submit to International Arbitration in accordance with its current arbitration rules. The arbitration award is final and binding on both parties.

 

8.3During the dispute resolution process, both parties shall continue to perform the terms of the contract that are not in dispute to ensure the normal progress of the project.

 

8.4During the dispute resolution process, both parties shall jointly protect each other’s trade secrets and technical information and shall not disclose or leak relevant information due to the dispute.

 

Article 9: Force Majeure

 

9.1If either party is unable to perform the contract due to force majeure events (such as natural disasters, wars, strikes, government actions, etc.), it shall promptly notify the other party in writing after the force majeure event occurs and provide details of the force majeure event and valid proof of contract non-performance or delayed performance within a reasonable time.

 

9.2If the contract performance is difficult or delayed due to a force majeure event, both parties shall decide through amicable negotiation whether to terminate the contract or partially exempt the performance obligations.

 

9.3After the force majeure event ends, the affected party shall resume contract performance as soon as possible and notify the other party of the specific situation and the resumption time.

 

8

 

 

9.4During the force majeure event, both parties shall minimize losses and jointly discuss reasonable remedial measures.

 

Article 10: Contract Modifications and Supplements

 

10.1Any modification or supplement to this contract shall be made in writing and confirmed by both parties’ signatures or seals.

 

10.2Contract modification and supplement documents have the same legal effect as this contract.

 

10.3If any contract terms need to be modified due to changes in laws and regulations, both parties shall modify them according to the latest legal requirements to ensure the legality and validity of the contract.

 

10.4If any clause of the contract is deemed invalid or unenforceable, it does not affect the validity of the other clauses of the contract. Both parties shall negotiate to modify the clause to align with the original intention and purpose of the contract.

 

Article 11: Validity of Contract

 

11.1This contract shall come into effect upon being stamped by both parties or signed by their legal representatives or authorized agents.

 

11.2This contract, together with the “CRMAI System Quotation” and “System Technical Solution” appendices, is an inseparable whole and has the same legal effect.

 

11.3This contract is made in three copies, with Party A and Party B each holding one copy, and one copy retained by the Ministry of Commerce for archiving.

 

11.4During contract performance, if either party changes its name, address, contact information, etc., it shall promptly notify the other party in writing to ensure effective contract performance and smooth communication between the parties.

 

Party A (Seal):    
     
Party B (Seal):    
     
Party A’s Legal Representative (Signature): /s/ Hongtao Shi  
     
Party B’s Legal Representative (Signature): /s/ Shan He  
     
Signing Date: July 1, 2024    

 

9

 

 

Appendix 1: Project Quotation

Intelligent Customer Relationship Management System (CRMAI)

Quotation

Client:

 

Date: May 1, 2024

 

Category Functional Module Development
Person-Days

Daily

Rate ($)

Estimated
Price ($)
Portal Entry

Intelligent Financial Portal

15 400 6,000
CRM

Intelligent Customer Relationship Management Platform

180 550 99,000
Investment Management

Global Investment Portfolio Management System

200 600 120,000
Risk Control and Compliance

Intelligent Risk Control and Compliance Management System

210 600 126,000

System Integration

Fintech Integration Platform

110 500 55,000
Collaborative Office

Intelligent Calendar and Appointment Scheduling Tool

40 400 16,000
Collaborative Office

Intelligent Document Management and Customer Collaboration Platform

35 400 14,000

 

10

 

 

Marketing Management

Marketing Automation and Email Engine

90 500 45,000
Marketing Management

Intelligent Marketing and Lead Development System

130 500 65,000
Collaborative Office

Intelligent Call Management and Recording System

25 400 10,000
Collaborative Office

Video Conferencing and Online Collaboration Platform

35 400 14,000
Collaborative Office

Intelligent Task Assignment and Tracking System

25 400 10,000
Customer Management

Customer Information and Notes Management Tool

15 400 6,000
Financial Management

Intelligent Billing and Payment Collection System

100 500 50,000
Contract Management

Electronic Contract and Signing Management Platform

90 500 45,000
Service Support

Customer Service and Case Knowledge Base

80 450 36,000
Customer Analysis

Target Customer Identification and Analysis System

110 500 55,000
Customer Analysis

Potential Customer Lead Management System

70 450 31,500
Investment Management

Investment Portfolio Project Management Platform

180 550 99,000

 

11

 

 

Investment Management

Investment Plan Templates and Configuration Library

80 450 36,000
Marketing Management

Marketing Event and Roadshow Management System

110 500 55,000
Resource Management

Facility and Resource Allocation System

25 400 10,000
Product Management

Financial Product and Service Management Platform

130 500 65,000
Product Management

Financial Product Classification and Tag Management

70 450 31,500
Investment Management

Investment Report and Recommendation Template Library

80 450 36,000

Report Analysis

Wealth Analysis and Reporting Center

130 500 65,000

Knowledge Management

Wealth Management Knowledge Base

110 500 55,000
Knowledge Management

Wealth Knowledge Intelligent Classification and Recommendation

50 450 22,500
Marketing Management

Marketing Email Design and Sending System

70 450 31,500
Customer Service

Customer Survey and Feedback Collection Platform

100 500 50,000

Mobile Terminal

IOS/Android Mobile Financial Client

800 300 240,000

 

Total Development Person-Days: 3495 Person-Days

 

Total Estimated Price: $1,200,000

 

Discount Price: $900,000

 

Note:

 

The total quotation is $900,000 to ensure high-quality project delivery.

 

The price includes software development, testing, deployment, and one year of maintenance services.

 

12

 

 

Appendix 2: System Technical Solution

 

Intelligent Customer Relationship Management System (CRMAI)

Project Plan

 

1. Project Overview

 

1.1 Project Background

 

Shengde Wealth is a leading wealth management listed company, providing comprehensive wealth management solutions for high-net-worth clients. As the business continues to expand, the customer base is growing larger, and the company faces higher digital transformation needs, hoping to achieve business process optimization, customer experience enhancement, operational efficiency improvement, and compliance management goals through the construction of an advanced intelligent customer relationship management system (CRMAI).

 

The company’s existing traditional customer relationship management cannot fully meet the business development needs, with issues such as information silos, inefficient processes, and weak marketing capabilities. Through this information construction, we hope to build a one-stop intelligent platform that integrates customer management, marketing, investment portfolio, compliance, and business intelligence, helping the company achieve digital transformation and enhance core competitiveness.

 

To break through development bottlenecks and achieve leapfrog growth, the company plans to launch a global comprehensive wealth management solution as the core tool for implementing the “global integration” strategy. This solution will integrate the company’s core technological advantages to build an integrated platform covering customer development, advisory transactions, risk management, data analysis, and other aspects, achieving closed-loop management of business processes and providing customers with a “one-stop” high-quality wealth management experience.

 

The company will adhere to the concept of “global vision, local service,” quickly expanding its coverage in major global markets such as Greater China, Southeast Asia, Japan, Korea, and North America, through a combined online and offline customer acquisition model, planning to grow the number of effective global customers to 5,000-8,000 within 1-2 years.

 

13

 

 

This solution features an innovative open system architecture that can seamlessly integrate with third-party financial institutions, investment analysis tools, and has the expansion capability to quickly interface with artificial intelligence technologies such as ChatGPT, providing personalized intelligent advisory and management recommendations to customers.

 

This project is a key part of the company’s “technology empowerment, global intelligence” development strategy.

 

1.2 Project Goals

 

Business Goals:

 

Optimize Business Processes: Achieve automation and optimization of business processes through the advanced CRMAI system, reducing manual operations and improving work efficiency.

 

Enhance Customer Experience: Provide more personalized and intelligent services to enhance customer satisfaction and loyalty.

 

Improve Operational Efficiency: Simplify operational processes by integrating customer management, marketing, investment portfolio management, compliance management, and business intelligence functions, and improve overall operational efficiency.

 

Strengthen Compliance Management: Ensure business operations comply with relevant regulations and policies through systematic compliance management functions, reducing compliance risks.

 

Achieve Global Development Strategy: Build a comprehensive wealth management solution covering major global markets, promoting the company’s rapid expansion in markets such as Greater China, Southeast Asia, Japan, Korea, and North America.

 

Breakthrough Development Bottlenecks, Achieve Leapfrog Growth: Break through existing business bottlenecks through innovative technologies and open system architecture, promoting the company’s business to achieve leapfrog growth.

 

Achieve Closed-loop Management of Business Processes: Integrate customer development, advisory transactions, risk management, data analysis, and other links to form an integrated platform and achieve closed-loop management of business processes.

 

14

 

 

Enhance Core Competitiveness: Enhance the company’s core competitiveness through digital transformation and technological innovation, maintaining market leadership.

 

Provide a One-stop High-quality Wealth Management Experience: Provide customers with one-stop services covering all wealth management needs and improve the overall customer experience.

 

Achieve Technology Empowerment, Global Intelligence: Achieve technology empowerment through advanced CRMAI systems and global layout, promoting the intelligent and global development of the company’s business.

 

System Goals:

 

Build an Integrated Intelligent Customer Relationship Management Platform: Integrate CRM, marketing, investment, compliance, and other core business systems.

 

Break Information Barriers between Front-end Marketing and Mid-end Operations: Achieve data sharing and seamless collaboration between the front-end marketing system and the mid-end operations system.

 

Empower New Business Models with Emerging Technologies: Use artificial intelligence and other emerging technologies to empower intelligent marketing, intelligent advisory, and intelligent risk control.

 

Establish Efficient Business Analysis and Decision Support Systems: Enhance data-driven operations and business intelligence capabilities.

 

Open System Architecture Design: Adopt innovative open system architecture to ensure good scalability and flexibility, seamlessly integrate with third-party financial institutions, investment analysis tools, and support continuous iteration and optimization.

 

High Security and Compliance Assurance: Ensure high security and compliance in system design and development to protect customer data and business security.

 

Full-channel Customer Reach and Management: Cover the entire process of customer development, service, and marketing through a combination of online and offline methods, improve customer reach efficiency and management levels, and ensure consistent and high-quality customer experience.

 

Enhance Customer Data Management and Mining Capabilities: Establish a sound customer data management mechanism to improve the integrity, accuracy, and timeliness of customer data, gain deep insights into customer needs through data mining and analysis, and provide personalized services and products.

 

15

 

 

Global Deployment and Support: Support global deployment of the system, meet the business needs of different regions and markets, and ensure stable operation and efficient support of the system in markets such as Greater China, Southeast Asia, Japan, Korea, and North America.

 

Continuous Technological Innovation and Optimization: Maintain continuous technological innovation and optimization, continuously introduce advanced technologies and concepts, ensure the system always stays at the industry-leading level, and promote the continuous development and competitiveness of the company’s business.

 

Organizational Goals:

 

Consolidate the Company’s Digital Infrastructure: Promote the digital transformation process of the enterprise.

 

Improve IT System and Business Coordination Agility: Respond to business changes and innovation needs.

 

Cultivate a Team of Compound Talents: Enhance technological innovation capabilities and digital operation levels.

 

1.3 Project Scope Business Scope:

 

This project will cover the core business processes of the company’s wealth management, including:

 

Customer management (customer information, customer segmentation, customer relationships, etc.)

 

Marketing management (marketing activities, potential customer management, lead conversion, etc.)

 

Portfolio management (investment advice, transaction execution, risk monitoring, etc.)

 

Compliance management (anti-money laundering, risk assessment, information disclosure, etc.)

 

Business intelligence (reports, analysis, decision support, etc.)

 

System Scope:

 

This project will build an intelligent CRM platform integrating customer management, marketing, portfolio, compliance, and business intelligence. The main system modules include:

 

Core CRM module (customers, opportunities, activities, contacts, etc.)

 

16

 

 

 

Marketing automation module (marketing resources, activity execution, lead management, etc.)

 

Portfolio management module (portfolio, transactions, risk analysis, etc.)

 

Compliance control module (anti-money laundering, risk assessment, information disclosure, etc.)

 

Business intelligence module (multi-dimensional analysis, mobile reports, visualization, etc.)

 

Support module (workflow, knowledge base, schedule, email, etc.)

 

Technical Scope:

 

System Architecture Design and Development

 

  o System Architecture Design

 

  § Overall Architecture Design: Determine the overall architecture model of the system, such as microservice-based distributed architecture, SOA-based service architecture, etc., and plan the hierarchical structure and component topology of the architecture.

 

  § Technical Architecture Design: Select and design the core technical architecture required by the system, such as application architecture (frontend architecture, middleware architecture), data architecture (relational database, NoSQL, data lake, etc.), infrastructure (operating system, virtualization, containers, etc.).

 

  § Security Architecture Design: Plan the overall architecture of system security protection, such as authentication, access control, data encryption, auditing, etc.

 

  § Integration Architecture Design: Design the integration architecture for interfacing with legacy systems and external systems, such as integration frameworks, message queues, ESB, etc.

 

  o System Development

 

  § System Framework Construction: Based on the architecture design, build the basic framework of the system, integrating related middleware, development tools, etc.

 

  § Development of Common Base Components: Develop the common technical components required by the system, such as workflow engine, rules engine, reporting engine, message middleware, etc.

 

  § Core Business Function Development: According to business requirements and system design, realize the development of various core functional modules, including customer management, marketing management, investment management, compliance management, etc.

 

17

 

 

  § Non-Functional Requirement Development: Implement the system’s non-functional requirements, such as performance, availability, scalability, security, etc.

 

  § Frontend UI Development: Develop intelligent interactive frontend interfaces to provide a good user experience for different terminals (PC, mobile, iOS, and Android).

 

  § Support for multiple languages: Chinese, English, Japanese, Arabic, French, Italian, Turkish, Norwegian, German, Hindi, etc.

 

  § System Integration and Data Migration: Achieve seamless integration with existing legacy systems/third-party systems and complete the migration of historical data.

 

  § Automated Testing: Design and develop automated testing frameworks and cases, including functional testing, performance testing, security testing, etc.

 

  § Deployment and Release: Complete the system deployment and go-live, formulate release strategies and rollback plans, etc.

 

  Data Integration (Legacy System Data Migration)

 

  o Data Source System Assessment

 

  § Fully identify and evaluate all existing legacy systems, data warehouses, reporting systems, and other data source systems to ensure coverage of all relevant data objects.

 

  § Perform data model analysis, data quality evaluation, and interface capability assessment for each data source and document the status.

 

  § Meanwhile, sort out business requirements to determine the key data objects that need to be integrated and migrated, and prioritize them.

 

  o Data Integration Architecture Planning

 

  § Design a flexible and scalable technical architecture based on the complexity of the data sources, integration scale, performance requirements, etc.

 

  § Recommend deploying reliable data integration tools (such as Informatica, Ab Initio, Talend, etc.) to meet efficient and stable data exchange requirements.

 

18

 

 

  § Develop a comprehensive data integration process, job scheduling, monitoring and alerting, fault-tolerant handling mechanisms.

 

  § Design a unified and efficient target data storage model based on the company’s data standards, and formulate data mapping and conversion rules.

 

  o Data Extraction Development

 

  § Develop high-performance data extraction interface programs for each source system based on the architecture and tools.

 

  § Support both online real-time and offline batch extraction modes and have the capability to capture incremental data.

 

  § Ensure the extraction program is stable and efficient with minimal impact on the source system performance.

 

  o Data Transformation and Loading

 

  § Perform all necessary data transformations, such as format standardization, code conversion, data quality checks, and cleaning.

 

  § Strictly apply data mapping and conversion rules to ensure accurate consistency between source data and target data.

 

  § Execute efficient batch loading and real-time incremental loading to the target system according to different business needs.

 

  § Implement concurrent loading control, validation processing, performance tuning, and other optimization measures.

 

  o Data Validation and Reconciliation

 

  § Establish end-to-end data integrity, consistency, and compliance validation mechanisms.

 

  § Periodically perform automated data validation and generate easy-to-understand exception reports.

 

  § Provide functions and processes that support manual reconciliation and feedback handling.

 

  o Operational Assurance

 

  § Build a dynamic monitoring platform for integration jobs, supporting proactive alerts and fault notifications.

 

  § Establish job scheduling management mechanisms, supporting automated rescheduling of failed jobs.

 

  § Implement unified logging and auditing functions, providing secure and traceable operation history.

 

  § Introduce version control mechanisms to ensure safe and controllable code changes.

 

19

 

 

 

oSecurity and Compliance

 

§Fully assess and comply with industry internal and external data security and privacy protection regulations.

 

§Adopt comprehensive protection measures for sensitive data, such as encrypted storage and encrypted transmission.

 

§Formulate and implement detailed data access control strategies to ensure compliant data usage.

 

System Integration (External System Docking)

 

§Integration with AIGC-related Systems

 

Core Function Development and Customization

 

oCustomer Management Module

 

§Customer Basic Information Management: Able to comprehensively record detailed information of individual customers and institutional customers, including contact information, occupation, income level, investment preferences, etc., to help account managers fully understand customer situations.

 

§Customer Segmentation and Tag Management: Segment customers into different levels and categories based on their value, potential, risk, etc., and apply personalized tags to help formulate differentiated service strategies.

 

§Customer Relationship Network Analysis and Profiling: Analyze customers’ social networks, transaction records, browsing footprints, etc., to create a comprehensive customer profile, deeply exploring customers’ investment needs and potential.

 

§Customer Lifecycle and Value Assessment: Conduct detailed segmentation and value assessment of customers’ lifecycles and provide personalized contact strategies at different stages to maximize customer retention and development.

 

§Customer Service and Interaction Tracking: Fully record all interactions between customers and the company, including meetings, phone calls, emails, etc., to help account managers efficiently manage customer relationships.

 

§Potential Customer Demand Identification and Mining: Based on big data analysis and AI algorithms, intelligently identify customers’ potential investment needs and provide account managers with personalized demand development suggestions.

 

20

 

 

oMarketing Management Module

 

§Marketing Activity Planning and Execution: Support marketing teams in formulating annual marketing activity plans and controlling and tracking the execution process of marketing activities.

 

§Marketing Resource and Channel Management: Centrally manage the company’s marketing resources and channel information, optimizing the allocation and use of marketing resources.

 

§Potential Customer Lead Management: Collect and manage all potential customer lead information and assign it to appropriate account managers for development and follow-up.

 

§Intelligent Lead Allocation and Priority Assessment: Based on factors such as the value and matching degree of leads, intelligently allocate leads to suitable account managers and dynamically assess the priority of leads.

 

§Marketing Automation Process Design: Design various marketing automation process templates, such as email marketing, online marketing, etc., to improve marketing efficiency.

 

§Marketing Performance Analysis: Conduct comprehensive analysis of marketing activities’ effectiveness and ROI to provide a basis for optimizing subsequent marketing strategies.

 

oPortfolio Management Module

 

§Portfolio Management and Optimization: Construct a reasonable investment portfolio for customers, meeting their return targets and risk preferences, and monitor and optimize the portfolio in real time.

 

§Product and Asset Allocation Recommendations: Recommend suitable products and asset allocation plans for customers based on their investment goals and risk tolerance.

 

§Transaction Execution and Verification: Provide efficient and convenient transaction execution channels for customers and conduct strict compliance checks on the transaction process.

 

§Position Monitoring and Stop-Loss/Take-Profit: Monitor portfolio position changes in real time and take action promptly when the preset stop-loss/take-profit line is reached.

 

§Risk Assessment and Stress Testing: Conduct comprehensive risk assessments of the portfolio and perform rigorous stress tests.

 

§Performance Analysis and Attribution: Analyze the sources of investment performance to provide a basis for optimizing investment strategies.

 

21

 

 

Compliance Management Module

 

oAnti-Money Laundering Monitoring and Review Processes: Follow regulatory requirements to review customers’ identities, fund sources, and transaction activities to prevent illegal activities such as money laundering.

 

oCustomer Risk Level Assessment and Management: Assess and manage customers’ risk levels based on factors such as their background and investment behavior.

 

oInformation Disclosure and Regulatory Reporting Compliance: Ensure that the company’s information disclosure and regulatory reporting comply with legal and regulatory requirements.

 

oCompliance Audits and Inspections: Regularly conduct compliance audits and inspections of the company’s business to timely identify and correct compliance risks.

 

oCompliance Knowledge Base and Training: Establish a comprehensive compliance knowledge base and conduct compliance training to enhance employees’ compliance awareness and capabilities.

 

AI Empowerment Module

 

oIntelligent Q&A and Service Robots: Develop intelligent Q&A and service robots based on natural language processing technology to provide 24/7 consulting services, significantly improving customer service efficiency.

 

oIntelligent Marketing Reach and Activity Recommendations: Based on customer profiles and behavioral data, intelligently recommend personalized marketing activities and contact methods to improve marketing conversion rates.

 

oNatural Language Processing and Sentiment Analysis: Process and analyze customers’ text and voice data, such as emails and recordings, to deeply understand customer needs.

 

oInvestment Decision Assistance and Risk Warnings: Provide auxiliary suggestions for investment decisions based on machine learning algorithms and promptly warn of investment risks.

 

oIntelligent Process Automation: Apply machine learning and natural language processing technologies to business processes to achieve intelligent management and automated execution of processes.

 

22

 

 

Business Intelligence and Reporting Module

 

oMulti-Dimensional Data Analysis and Visualization: Support multi-dimensional analysis of business data from multiple perspectives and intuitively present analysis results in the form of graphs and reports.

 

oPersonalized Report Design and Presentation: Users can design and generate various required reports according to their needs and save them as personalized templates for reuse.

 

oMobile BI and Data Dashboard: Users can query data and view reports through mobile terminals, and the company can also deploy data dashboards to display key business indicators in real time.

 

oAI-Assisted Report Automatic Generation: Based on machine learning technology, the system can automatically generate commonly used reports, saving users’ design and production time.

 

oPredictive Analysis and Decision Optimization: Provide forward-looking analysis for business decisions through data mining and predictive modeling and give optimization suggestions.

 

Business Process and Support Module

 

oBusiness Process Design and Automation: Flexibly define and optimize various process models according to the company’s actual business scenarios and automatically drive the approval and execution of processes.

 

oCustomer Service Process Management: Standardize the management of the entire process of customer service to ensure service quality, such as consultations and complaints.

 

oDocument Management and Knowledge Base Submodule: Centrally store and manage various documents of the company, including product manuals, operation guides, legal contracts, etc., realizing version control and permission management of documents.

 

oSchedule and Task Collaboration Submodule: Employees can use this module for personal schedule arrangements and task assignments and also share and collaborate in real-time with other team members.

 

System Integration and Data Exchange Module

 

oIntegration with Existing Company Systems: Achieve seamless integration with the company’s existing core business systems (such as transaction systems, account systems, etc.) to realize data sharing and business collaboration.

 

oInterface with External Banking Systems: Interface with external banking systems through financial industry standard interfaces to facilitate customers’ fund transfer operations.

 

23

 

 

oFund Company Product Data Interface: Obtain real-time product data from fund companies to provide customers with the latest investment target information.

 

oRegulatory System Reporting Interface: Built-in regulatory reporting interface to ensure timely and accurate submission of the company’s business data to regulatory authorities.

 

Customized Requirement Development Module

 

oSpecial Function Requirement Custom Development: Custom develop and integrate special functional modules according to customers’ personalized needs.

 

oIntroduction of Industry Best Practices: Introduce mature best practices in the financial industry into the system to improve the standardization and normative level of business processes.

 

oEmbedding of Company-Specific Business Processes: Embed the unique business processes of the customer company into the system to fit the actual business scenarios to the maximum extent.

 

oPersonalized UI Design: Professional designers can tailor personalized system UI according to the customer’s corporate culture and aesthetic preferences.

 

Testing (Functional Testing, Performance Testing, Security Testing, etc.)

 

Functional Testing

 

oUnit Testing: Developers verify the smallest testable units at the code level to ensure the correctness of individual functional points.

 

oIntegration Testing: Conduct integration testing for the interrelated modules in the system to check the integration quality and interoperability of the modules.

 

oSystem Testing: Perform end-to-end system testing on the fully deployed application, simulating real user scenarios and business processes.

 

oUser Scenario Testing: Design various typical and boundary user scenario use cases, focusing on verifying the system’s robustness in complex scenarios.

 

oCompatibility Testing: Test in many environments such as different browsers, operating systems, databases, etc., to ensure good compatibility of the system.

 

oInstallation Package Testing: Perform comprehensive testing on the final product installation package by repeatedly installing and uninstalling it on multiple devices.

 

24

 

 

Non-Functional Testing

 

oPerformance Testing

 

§Load Testing: Simulate different access pressures and data volumes to evaluate the load capacity and response time of the application.

 

§Stress Testing: Continuously increase pressure until reaching the limit to understand the system’s stress bottleneck and optimize it.

 

§Stability Testing: Apply a certain pressure continuously for a long time to check if the system runs stably without memory leaks, etc.

 

oSecurity Testing

 

§Penetration Testing: Simulate hacker methods to attempt attacking the system to detect potential threats and vulnerabilities.

 

§Vulnerability Scanning: Use automated tools to scan the source code and runtime security vulnerabilities and manually verify them.

 

§Compliance Audit: Evaluate whether the system complies with regulations and industry standards in terms of data protection and privacy.

 

oUsability Testing

 

§Ease of Use Testing: Evaluate the system’s operability, whether it fits users’ cognition and usage habits.

 

§Accessibility Testing: Check if the system is accessible and operable for people with disabilities and meets accessibility requirements.

 

oOther Testing

 

§Concurrency Testing: Simulate a large number of concurrent user requests to verify the system’s concurrent processing capabilities.

 

§Disaster Recovery Testing: Check if the system can still provide basic functions in the event of a real disaster.

 

§Recovery Testing: Simulate unexpected situations to verify the system’s running state after backup recovery.

 

Automated Testing

 

oBuild Automated Testing Framework: Introduce tools like Selenium, Appium, etc., to build a scalable automated testing framework.

 

oAutomate Performance Testing: Use professional tools like LoadRunner, JMeter, etc., to achieve automated performance testing.

 

oAutomate Functional Testing: Write automated scripts to cover different levels of functional testing such as UI/services/API.

 

25

 

 

oContinuous Integration and Continuous Testing: Achieve seamless integration of automated testing into continuous integration/delivery pipelines.

 

oAutomated Test Report Generation: After testing, the system automatically generates detailed test reports, including results, logs, etc.

 

Test Management Tool Integration

 

oDefect Management Tools: Integrate defect management tools (like Jira) to efficiently track and record the defect lifecycle.

 

oTest Case Management Tools: Import test case management tools (like Xray) to realize version control and reuse of cases.

 

oTest Coverage Statistics: Automatically collect code and functional point test coverage through tools (like SonarQube).

 

oTest Process Control: Use workflow tools (like TestRail) to standardize the management and tracking of test activities.

 

oTest Data Management: Establish a test data management system to ensure the accuracy and reusability of test data.

 

Deployment and Transition

 

Deployment Preparation Phase

 

oPrepare Production Environment Infrastructure (servers, network, storage, etc.): We will evaluate and plan your existing IT infrastructure to ensure it meets the computational, storage, and network resource requirements of CRMAI. If necessary, we will provide expansion suggestions.

 

oBuild Pre-Deployment Environment: We will create an internal simulation environment highly similar to the production environment for pre-deployment testing and validation to minimize post-deployment risks.

 

oPrepare Deployment Scripts, Tools, and Release Packages: Our deployment team will develop automated deployment scripts and prepare tested and version-controlled CRMAI release packages.

 

oPrepare Configuration Data and Baseline Data: We will assist you in sorting out existing configuration data and business baseline data to ensure consistency in the new system.

 

oPerform Security and Compliance Checks: Before deployment, we will conduct comprehensive security and compliance reviews to ensure it meets regulatory requirements.

 

Deployment Verification Phase

 

oVerify Release Package and Deployment Process in Pre-Deployment Environment: We will repeatedly verify the deployment process in the simulation environment and fix any issues found.

 

26

 

 

oPerform System Integration Testing and End-to-End Testing: We will closely cooperate with your business team to ensure seamless integration of CRMAI with existing systems and processes.

 

oPerform Performance and Load Testing: By simulating real business scenarios, we will verify the system’s performance under various load conditions.

 

oFix Issues and Rebuild Release Package: Once any issue is found, we will promptly fix it and rebuild the release package to ensure it meets go-live requirements.

 

Go-Live Release Phase

 

oDetermine Go-Live Window and Notify Relevant Personnel: We will coordinate with you to select an appropriate go-live window and notify all relevant personnel to prepare.

 

o*Execute System Deployment (application, data, configuration, etc.):** Once conditions are ready, we will deploy the CRMAI system in the production environment.

 

Verify Release Results, Check Version and Configuration: After deployment, we will comprehensively verify the system version and configuration to ensure consistency.

 

Switch Traffic and Access Entrances: With your consent, we will switch business traffic to the new system and update related access entrances.

 

Transition Process Management

 

oDevelop Transition Plan and Procedures: We will formulate detailed transition plans and procedures in advance to minimize risks during the transition.

 

oEstablish Transition Process Monitoring and Early Warning Mechanism: During the transition, we will monitor key indicators in real time and establish an early warning mechanism.

 

oPrepare Transition Rollback Plan: To reduce risks, we will prepare a transition rollback plan in advance to ensure business continuity.

 

oMaintain Emergency Repair Team During Transition: We will keep an emergency repair team on standby to promptly handle any issues that arise during the transition.

 

Post-Transition Check Phase

 

oVerify Core Business Functions: Once the transition is complete, we will verify all core business functions of CRMAI together with your team.

 

oCheck Consistency of Key Data: We will check the consistency of key business data in the new system.

 

27

 

 

oMonitor Key System Indicators: For a period after the transition, we will continuously monitor the key operating indicators of the system.

 

oAddress Post-Transition Issues: If any issues are found, we will promptly communicate with you and take appropriate remedial measures.

 

Post-Transition Continuous Optimization Phase

 

oCollect and Analyze Feedback and Operational Data: We will collect and analyze feedback and operational data from various parties.

 

oContinuously Optimize System Performance and User Experience: Based on feedback, we will continuously optimize system performance and improve user experience.

 

oUpdate System Operation Documentation and Knowledge Base: We will update the operation documentation and knowledge base to ensure that the system documentation remains current.

 

oInitiate the Next Iteration Cycle: After the deployment work is complete, we will initiate a new iteration cycle to continuously optimize and improve the system.

 

Implementation Scope:

 

Hardware Equipment Procurement:

 

oAWS (Amazon Web Services):

 

§Instance Types: We will evaluate your computational needs and recommend appropriate EC2 instance families and sizes, such as general-purpose (M5), compute-optimized (C5), or memory-optimized (R5), etc.

 

§Storage: Based on data volume and access patterns, we can configure EBS cloud disks, EFS file systems, or S3 object storage for you.

 

§Network: We will design a reasonable VPC network topology covering public subnets, private subnets, NAT gateways, etc., to ensure security and reliability.

 

§Other Services: Use core AWS services like load balancing, auto-scaling, CloudWatch monitoring, etc., as needed. Use Google cloud products like Cloud SQL, Cloud Bigtable, Kubernetes Engine, etc., as needed.

 

Basic Software Procurement:

 

oOpenAI:

 

§API Integration: We will evaluate the text generation, comprehension, translation, and other APIs provided by OpenAI and seamlessly integrate them into the customer interaction links of CRMAI.

 

28

 

 

§Voice Model: Use the GPT language model for natural language processing and generation to enhance customer experience.

 

§Custom Models: If needed, we can work with OpenAI to customize industry AI models based on your data.

 

oDevelopment Framework:

 

§Frontend: Modern web frameworks like React, Vue.

 

§Backend: Mature server-side frameworks like Spring Boot, Node.js.

 

§Database: Relational databases, MongoDB.

 

§Message Queues: Distributed message queues like RabbitMQ.

 

oDevOps Toolchain:

 

§Continuous Integration (CI): Automated build tools like Jenkins.

 

§Containerization: Docker and container orchestration tools like Kubernetes for portable application deployment.

 

§Monitoring Solutions: Prometheus open-source monitoring and visualization tools.

 

System Environment Setup

 

oHardware Environment:

 

Component   Configuration   Description
Compute Resources   AWS EC2 c5.4xlarge or Google Cloud Compute Engine equivalent   16vCPU, 32GB memory, scalable instance number
         
Kubernetes Cluster   Main Node: m5.xlarge (4vCPU, 16GB)   Working Node: c5.2xlarge (8vCPU, 16GB)
         
Storage   Object Storage AWS S3   Static resources, logs, backup storage
         
File Storage   AWS EFS   Shared file system for applications
         
Database Storage   AWS RDS   Initial 1TB scalable, general-purpose SSD, multi-AZ deployment for high availability
         
Network   Private Cloud Environment AWS VPC   Load Balancing AWS: CLB/ALB/NLB
         
Security Control   Firewalls, security groups, etc., access control policies    
         
Monitoring and Logs   Cloud Monitoring Service AWS CloudWatch   Logging System ELK or self-built logging system
         
Disaster Recovery   Cross-region deployment for disaster recovery backup   Cloud storage replicated backup data
         
Disaster Recovery Services   AWS CloudEndure or cloud vendor disaster recovery services    

 

29

 

 

oOperating System:

 

§Use stable CentOS distribution as the server operating system.

 

oDatabase:

 

§Deploy relational databases like MySQL for storing customer data, transaction records, product information, and other structured data.

 

§Possibly use NoSQL databases (such as MongoDB) to store unstructured data like knowledge base content, documents, etc.

 

§Optimize the database based on data volume and query patterns, including table structure design, indexing, sharding, etc.

 

oWeb Server:

 

§Install web server software like Nginx for deploying web applications.

 

§Configure SSL/TLS encryption, load balancing, and other functions as needed.

 

oApplication Environment:

 

§Set up the runtime environment for the programming language, including Java, Python, Node.js, etc.

 

§Install the required web frameworks, libraries, and middleware.

 

oCaching Services:

 

§Consider using caching services like Redis to improve system response speed.

 

oMessage Queues:

 

§Possibly use message queue services like RabbitMQ for asynchronous processing and decoupling.

 

oMonitoring and Logs:

 

§Deploy Prometheus monitoring tools to monitor system operating status.

 

§Use ELK Stack log collection and analysis tools.

 

oThird-Party Integration:

 

§Integrate the system with existing Excel.

 

30

 

 

oSecurity:

 

§Configure firewall, intrusion detection, and other security measures.

 

§Implement user authentication and access control mechanisms.

 

oContinuous Integration/Continuous Delivery (CI/CD):

 

§Establish CI/CD pipeline to achieve automated build, testing, and deployment.

 

System Implementation (Requirement Sorting, Design, Development, Testing, Deployment)

 

Requirement Sorting

 

oCommunicate deeply with business departments and end-users to comprehensively sort out system requirements.

 

oReview, classify, and prioritize requirements.

 

oFormulate requirement documents, including functional requirements, non-functional requirements, integration requirements, etc.

 

Design

 

oPerform system architecture design based on requirement documents and determine technical selection.

 

oDesign database structures, data models, and API interfaces.

 

oDesign user interface (UI) and user experience (UX).

 

oWrite design documents such as architecture design documents, database design documents, UI/UX design documents, etc.

 

Development

 

oPerform system development according to design documents, including frontend, backend, and database, etc.

 

oFollow coding standards to write high-quality, maintainable code.

 

oPerform unit testing and integration testing to ensure code quality.

 

oIntegrate development with third-party systems (such as Advent Black Diamond and Suite8).

 

Testing

 

oDevelop test plans, including test strategies, test cases, and test environments.

 

oPerform functional testing, performance testing, security testing, etc., to ensure the system meets requirements and quality standards.

 

oPerform user acceptance testing (UAT) with end-users to confirm the system meets expectations.

 

oWrite test reports to record test results and discovered defects.

 

31

 

 

Deployment

 

oPrepare the production environment, including hardware, operating system, middleware, etc.

 

oDeploy applications and databases, configure related parameters.

 

oPerform system integration testing to verify the normal operation of the production environment.

 

oFormulate go-live plans, including data migration and transition strategies, etc.

 

oPerform go-live operations and monitor the system’s running status.

 

oWrite deployment documents to record the deployment process and configuration information.

 

Operation and Maintenance

 

oEstablish system monitoring and log analysis mechanisms to continuously monitor the system’s operating status.

 

oFormulate fault emergency plans to quickly respond to and resolve system faults.

 

oContinuously optimize and upgrade the system based on business needs and feedback.

 

oPerform system backup and recovery strategies to ensure data security.

 

Data Migration

 

Stage   Key Steps
Data Assessment and Preparation   Evaluate existing data sources, Establish data cleansing rules, Design target database schema
     
Data Migration Plan   Select incremental or full migration mode, Use data migration platform or integration tools, Synchronize new data in real-time/batch
     
Execute Data Migration   Test migration in simulated environment, Refine migration rules and processes, Determine and execute final migration window
     
Data Validation and Processing   Validate data after migration, Remedy for abnormal data, Establish data quality monitoring
     
Data Access Permission Management   Establish permission control policies, Assign appropriate data operation permissions, Configure audit log recording

 

32

 

 

System Pilot Operation

 

Functional Testing: Design corresponding test cases for each functional module listed in the document to comprehensively test each module’s various functional scenarios and ensure that the functions meet the requirements and run stably.

 

Performance Testing: Conduct stress tests on the system’s response speed, concurrent users, data processing capabilities, etc., to evaluate the system’s performance under various workloads and identify potential bottlenecks.

 

Compatibility Testing: Test the system’s compatibility in different environments, such as different operating systems, browsers, mobile devices, etc., to ensure the system can adapt to various usage scenarios.

 

User Experience Testing: Invite sample users to try out the system, evaluate the system’s usability, ease of use, and user-friendliness, collect user feedback, and optimize the user experience.

 

Data Migration Testing: If historical data needs to be migrated from the old system, test the completeness and accuracy of the data migration.

 

Integration Testing: Test the system’s integration with other third-party systems (such as external links mentioned in the document) to ensure seamless data exchange and business process integration.

 

Security Testing: Perform system penetration testing, vulnerability scanning, etc., to evaluate the system’s security protection capabilities and timely fix security vulnerabilities.

 

Documentation and Training: Prepare operation manuals, online help, and training materials to ensure users can proficiently use the new system.

 

Employee Training

 

Training Targets: Clearly define which employees of different roles and functional departments will receive training, and tailor the training content based on their job responsibilities. Typically includes sales staff, customer service staff, marketing staff, managers, etc.

 

Training Content: The training content should cover the various functional modules of the system, including customer management, marketing activities, sales processes, report analysis, contract management, project management, etc., to ensure employees are familiar with the relevant modules’ operating procedures. Additionally, it should cover system integration, data security, best practices, and other common themes.

 

Training Forms: Various forms of training can be adopted, including classroom training, online courses, video tutorials, hands-on operational guidance, etc., to suit different employees’ learning preferences and schedules.

 

Training Materials: Prepare detailed training manuals, operation guides, case studies, etc., as classroom teaching and subsequent reference materials. These materials should be easy to understand, with rich illustrations.

 

33

 

 

Assessment and Certification: Establish corresponding assessment mechanisms to ensure employees have a thorough understanding and mastery of the system. Set theoretical and practical assessments and issue certification certificates to employees who pass the assessment.

 

Continuous Training: Since system functions will be continuously updated and iterated, establish a continuous training mechanism to provide employees with new feature training regularly and adjust training content based on employee feedback.

 

Super Users: Cultivate a group of “super users” in each department who are not only proficient in system operations but also act as internal trainers and system promoters within the department, providing guidance and support to other employees.

 

Training Effect Evaluation: Design training satisfaction surveys and subsequent performance assessments to evaluate the actual effect of training and provide improvement suggestions for subsequent training.

 

Project Management, Quality Control

 

Project Management:

 

oProject Organization: Clearly define the roles and responsibilities of key personnel such as project managers, technical leaders, test leaders, and module leaders, and establish an efficient project organization structure.

 

oProject Schedule Management: Formulate a reasonable project schedule plan, reasonably allocate the workload of the project to various stages and milestones. Use project management software (such as the “project” function module mentioned in the document) to track project progress, timely discover and solve problems.

 

oRisk Management: Identify risk factors that may affect the project’s progress, quality, and cost in advance and formulate corresponding risk mitigation measures, such as scope control, resource allocation, coordination, and communication, etc.

 

oChange Management: Establish change control processes to strictly review requirements changes, design changes, etc., to control project scope expansion.

 

oCommunication Management: Regularly hold project meetings to promptly communicate progress, coordinate resources, and resolve cross-team issues. Also, strengthen communication with customers to timely obtain feedback.

 

oMilestone Review: At the end of each stage, organize milestone review meetings to evaluate work completion, review deliverable quality, and determine whether to enter the next stage.

 

34

 

 

Quality Control:

 

oQuality System Construction: Establish a comprehensive quality management system, formulate quality plans, quality measurement standards, quality activities, and embed quality awareness throughout.

 

oRequirement Review: Review requirement specification documents to identify problems such as omissions, contradictions, and ambiguities in requirements to ensure requirement quality.

 

oDesign Review: Review system design documents, database designs, user interface designs, etc., to identify design defects and control design quality.

 

oCode Review: Conduct peer reviews of core function codes, shared component codes, etc., to improve code quality and maintainability.

 

oTest Management: Complete different levels of testing activities such as unit testing, integration testing, system testing, acceptance testing, etc., according to the test strategy to ensure the delivered system meets quality requirements.

 

oDefect Management: Establish a defect tracking system to record, analyze, track, and verify all discovered defects to ensure defects are effectively fixed.

 

oMeasurement Analysis: Collect various quality measurement data such as defect density, test coverage, etc., analyze quality trends, and continuously improve quality management activities.

 

oProcess Audit: Regularly audit the compliance of key process areas such as requirement management, testing, and change control in project execution.

 

Operational Scope:

 

System Operation and Maintenance Support

 

oDaily Monitoring: Set up system health monitoring to track CPU, memory, disk, network, and other resource usage to ensure system stability.

 

oFault Handling: Establish fault reporting and handling processes to quickly locate and resolve system faults, minimizing system downtime.

 

oBackup and Recovery: Formulate data backup strategies and plans to regularly back up system data to ensure data security and timely recovery when needed.

 

35

 

 

oSecurity Management: Perform security patch upgrades, strengthen system security protection, prevent malicious attacks, and ensure data and system security.

 

oUser Support: Provide 24/7 technical support hotline to promptly respond to and resolve user feedback issues.

 

System Optimization

 

oPerformance Tuning: Continuously monitor system performance bottlenecks, optimize database, application server, and other system configurations, and improve system concurrent processing capabilities and response speed.

 

oFunction Improvement: Continuously improve and enhance system functions based on user feedback to improve user experience and meet business development needs.

 

oVersion Upgrade: Track CRMAI system version releases, timely plan and execute version upgrades to keep the system in the latest functional and secure state.

 

oCapacity Planning: Evaluate and expand system storage, computing, and other resources based on business growth to prepare for continuous business growth.

 

Others

 

oOperation and Maintenance Automation: Research and introduce operation and maintenance automation tools to achieve automated monitoring, deployment, backup, etc., to improve operation and maintenance efficiency.

 

oKnowledge Base Construction: Continuously summarize and improve the operation and maintenance knowledge base to provide reference and guidance for subsequent operation and maintenance work.

 

oTraining and Skill Improvement: Organize regular training for operation and maintenance personnel, update operation and maintenance knowledge and skills, and keep up with technology development trends.

 

2. Project Overview and Requirements Analysis

 

2.1 Functional Requirements Analysis

 

Basic Modules:

 

Home Page (Home): The system entrance provides a portal for quick access to commonly used functional modules. It includes personalized layout and to-do items.

 

Calendar: Schedule and time management, supporting personal, team, and resource calendars, schedule reminders, and recurring activities.

 

36

 

 

Documents: Document center supports uploading, downloading, version control, folder classification, and full-text search document management functions.

 

Emails: Integrated email system can send and receive emails, manage contacts, and email lists.

 

Customer Management Module:

 

Customer Experience and Communication: Records customer interaction history, manages customer information, contacts, accounts, etc., providing a 360-degree customer view. Automates customer service processes.

 

Potential Customers: Manages potential customer information, including source, contact information, communication records, and conversion opportunities.

 

Potential Customer Lists: Dynamically manages filtered potential customer lists for easy marketing and sales follow-up.

 

Application Effect: As the core module of the solution, the customer management module provides institutions with full lifecycle customer resource management capabilities. From customer profiling and segmentation to marketing expansion, relationship maintenance, and performance appraisal and incentives, the customer management module runs throughout, helping institutions fully explore customer value, provide personalized services, formulate precise marketing strategies, and control marketing performance. Ultimately, this module helps maintain customer assets and maximize their value. The modular design makes functions customizable to meet the diverse needs of institutions of different scales, making it an important part of the digital transformation of wealth management.

 

Marketing Module:

 

Marketing Campaigns: Full process management of marketing campaign planning, execution, and effectiveness analysis, including campaign planning, promotional materials, lead management, etc.

 

Events: Manages the organization, registration, check-in/check-out, and follow-up of events/meetings.

 

Event Locations: Manages event location resource information.

 

Application Effect: The marketing module supports institutions in accurately reaching potential customers. It integrates data analysis, customer profiling, marketing automation, etc., helping institutions deeply analyze market dynamics and customer needs, target high-value customer groups, and develop personalized marketing strategies and campaign plans. Through intelligent marketing channel management, the module can achieve unified delivery and multi-channel coverage of marketing content, significantly improving the precision and reach of marketing efforts. Additionally, the module provides full-chain marketing effectiveness analysis, realizing visualized management of input and output to continuously optimize marketing strategies. With the support of the marketing module, wealth management institutions can greatly improve marketing conversion rates, effectively expand high-value customers, and inject new momentum into business growth.

 

37

 

 

Sales Module:

 

Call Records: Records and manages phone interactions with customers.

 

Meetings: Schedules and records meetings with customers, including meeting topics, attendees, and minutes.

 

Tasks: Creates, assigns, tracks, and manages tasks.

 

Notes: Records text notes of interactions with customers.

 

Invoices: Issues and manages customer invoices.

 

Contracts: Full process management of contract drafting, review, signing, and archiving.

 

Cases: Standardized management of customer issues/complaints/requests.

 

Application Effect: The sales module provides financial advisors with efficient marketing support and customer service tools. It covers the entire process from lead acquisition to sales, including lead distribution, product sales, order management, and commission settlement, significantly improving sales efficiency and service quality. In terms of lead acquisition, the module is deeply integrated with the marketing module to achieve automated lead distribution, ensuring timely and precise follow-up of potential customers. Through the mobile client, financial advisors can grasp customer dynamics anytime and anywhere, carrying out precise and effective marketing interactions. In the sales service stage, the module provides product sales tools and a customer manager workbench, supporting personalized financial plan design, product configuration, and order processing to provide customers with a consistent and high-quality service experience. Order information is automatically transmitted to the back-end system, achieving process automation and avoiding manual processing errors. Additionally, the module features advanced functions such as commission distribution and compliance review, providing data support for sales assessment and risk control, making the sales process more standardized and efficient. Through the sales module, wealth management institutions can accelerate marketing conversions, improve customer service quality, and effectively expand market share, promoting continuous business growth.

 

38

 

 

Project Management Module:

 

Projects: Full lifecycle management of projects, including tasks, resources, schedules, budgets, risks, etc.

 

Project Templates: Project template library to speed up project initiation.

 

Application Effect: The project management module provides institutions with efficient collaboration and process control capabilities, ensuring high-quality delivery of various financial service projects. It covers the entire project lifecycle, including demand management, planning, resource allocation, progress monitoring, risk control, quality management, and other key aspects, providing project managers with a one-stop collaboration platform and management tools. In the initial phase of the project, the module supports the standardized recording and decomposition of customer needs, assisting in the formulation of detailed work plans and resource arrangements, laying the foundation for project implementation. In the execution phase, multi-dimensional progress dashboards and reports can monitor project progress in real-time, automatically identify potential risks, and help project managers make timely adjustments to ensure on-time project delivery. The project management module is seamlessly integrated with other wealth management solution modules, efficiently sharing customer information, product data, transaction data, etc., providing timely and reliable support data for project personnel to improve work efficiency and decision quality. With the support of the project management module, wealth management institutions can enhance the standardization and standardization level of financial services, shorten project delivery cycles, reduce communication costs, and ultimately provide customers with better and more efficient financial consulting and portfolio management services.

 

Product Module:

 

Products: Manages company product/service information, pricing, inventory, etc.

 

Product Categories: Manages the product classification system.

 

Application Effect: The product module provides institutions with unified product data management and decision support capabilities, ensuring the optimal financial product portfolio for customers. The module builds a unified product data center, centrally managing comprehensive data on various financial products in the financial market, such as stocks, funds, insurance, trusts, etc., including basic information, risk ratings, historical performance, etc., providing a data foundation for product selection and optimization. The built-in product evaluation and analysis model can automatically calculate core indicators such as product yield and risk value, and combined with product liquidity, cost, and tax factors, tailor a product rating system and configuration strategy for financial managers, significantly improving investment portfolio optimization efficiency. At the same time, the module provides product account integration and net value revaluation functions, which can automatically collect and calculate the real-time net value situation of customer portfolios, providing data support for timely adjustment of operational strategies. Through the product module, wealth management institutions can efficiently manage massive product data, master advanced analysis and decision-making tools, reasonably allocate and dynamically optimize investment portfolios according to customer risk preferences, maximally meet customers’ financial needs, and improve overall investment return rates.

 

39

 

 

Reporting and Analysis Module:

 

Portfolio Management and Reporting: Tracks and manages investment product/service portfolios.

 

Business Intelligence and Compliance: Provides visual business indicator systems, supporting multi-dimensional data analysis.

 

Reports: Pre-made and customizable operational reports and analytical reports.

 

Application Effect: The reporting and analysis module provides data-driven analytical insights for institutional business management and investment decision-making. This module deeply integrates the full-chain data of wealth management business, including customer information, marketing activities, financial products, investment portfolios, project management, etc., through modeling and analysis, forming multi-dimensional reports and visual screens to provide decision-makers with comprehensive business insights. In terms of business operations, the module sets up automatic statistical analysis mechanisms for key performance indicators, such as customer development efficiency, product sales rankings, marketing expense return rates, etc., and supports multi-dimensional data drilling, helping management quickly identify business highlights and issues. In terms of investment management, the module integrates advanced quantitative analysis models to perform multi-scenario simulation calculations on customer portfolios, product returns, risk exposure, etc., assisting investment managers in scientifically evaluating risk and return to develop forward-looking investment strategies. Additionally, the module provides self-service reporting tools and open APIs, facilitating each department’s independent data analysis and application development based on needs, improving the flexibility and practicality of the analysis module. With the support of the reporting and analysis module, wealth management institutions can truly achieve data-driven decision-making, instantly grasp business operation status and portfolio performance, and continuously optimize business and investment strategies based on analytical results, gaining an advantage in industry competition.

 

Integration Module:

 

Partners and Integration: Data integration and business collaboration with third-party application systems.

 

Application Effect: This module provides a standardized integration framework and interface specifications, supporting bidirectional integration with core transaction systems, customer relationship management systems, financial systems, and other third-party application systems to achieve real-time data exchange and automatic business process transmission, eliminating data silos and avoiding inefficiency and errors caused by duplicate entry.

 

In terms of data integration, the module adopts a distributed data bus architecture to achieve cross-system, cross-platform data exchange in a high-performance, high-reliability manner, ensuring consistency and real-time availability of key business data throughout the process, providing accurate data support for decision analysis and operational control.

 

In terms of business integration, the module follows the principle of service-oriented architecture, packaging the core functions of each system into services, and through business process orchestration, it can flexibly assemble new business processes across systems, such as automated credit checks, risk control approvals, and transaction reconciliations, significantly improving business collaboration efficiency and user experience.

 

Additionally, the module provides monitoring and reporting functions to track integration health status in real-time, promptly identifying and resolving integration issues to ensure stable and efficient system integration operations.

 

With the support of the integration module, wealth management institutions can break through system data and business barriers, achieve full-process collaboration and automation, not only improving internal operational efficiency but also providing high-quality one-stop service experiences for customers.

 

40

 

 

Knowledge Base Module:

 

Knowledge Base: Enterprise internal knowledge article library.

 

Knowledge Base Categories: Knowledge article classification system.

 

Application Effect: The knowledge base module provides employees with a systematic knowledge management and learning platform, helping institutions improve professional service capabilities. This module builds a unified knowledge base, covering various fields of financial management, such as macroeconomics, investment strategies, product analysis, and legal compliance, centrally managing the professional knowledge resources accumulated within the institution and industry information acquired externally, ensuring the authority, accuracy, and timeliness of knowledge. The knowledge base provides intelligent knowledge retrieval and push mechanisms, allowing employees to obtain personalized knowledge services based on their roles and work content, efficiently acquiring the necessary professional knowledge and shortening the learning curve. The module supports mobile knowledge browsing, enabling learning anytime and anywhere. The module also includes knowledge assessment and training management functions, allowing institutions to set knowledge points and passing standards based on different positions and levels, guiding employees to continuously learn and improve. Training resources can also be managed and pushed uniformly, improving training quality and participation. With the support of the knowledge base module, wealth management institutions can enhance the management and utilization of core knowledge assets, improve employees’ professional literacy, provide customers with more professional and targeted financial advice and investment suggestions, thereby winning customer trust and favor, and promoting long-term business development.

 

Others:

 

PDF Templates: Customizable PDF templates, such as contracts, invoices, reports, etc.

 

Email Templates: Customizable email templates for automated personalized email sending.

 

Surveys: Online survey design, publishing, and statistical analysis.

 

2.2 Non-Functional Requirements Analysis

 

Performance Requirements:

 

Response Time: Interface loading <2 seconds, data query <5 seconds.

 

Concurrent Users: Supports 1000+ concurrent online users.

 

Capacity: Supports storing 1TB+ data, scalable.

 

Availability Requirements:

 

Availability Goal: 99%.

 

Fault Recovery Target Time: Critical functions recovered within 4 hours.

 

Online Maintenance: Supports online upgrades, backups, and other maintenance operations.

 

41

 

 

Security Requirements:

 

Access Control: Role-based permission management.

 

Data Encryption: High-strength encryption for sensitive data such as passwords and payment information.

 

Audit Trail: Key operations are traceable for auditing.

 

Attack Prevention: Equipped with firewall, anti-DDoS, and anti-SQL injection security protection.

 

Maintainability Requirements:

 

Modular Design: High cohesion, low coupling.

 

Standardized Coding: Adheres to coding standards.

 

Comprehensive Documentation: Requirements, design, testing, and other documentation.

 

Software Deployment: Standardized and automated software release process.

 

Scalability Requirements:

 

Distributed Deployment: Based on microservice architecture, horizontally scalable.

 

Containerization: Supports containerized deployment.

 

Pluggable Modules: Third-party applications/services can be integrated.

 

Compatibility Requirements:

 

Browser Compatibility: Supports the current and previous two versions of major browsers.

 

Mobile Compatibility: Adapts to mainstream mobile systems and resolutions.

 

System Integration: Supports integration with existing enterprise systems.

 

Internationalization Requirements:

 

Multilingual: Supports localization for 12 languages.

 

Currency Formats: Supports 40+ currency formats.

 

Data Formats: Supports various formats such as time zones, dates, and numbers.

 

42

 

 

Legal Compliance Requirements:

 

Data Protection: Complies with regulations such as GDPR and CCPA.

 

Accessibility: Conforms to WCAG 2.1 accessibility standards.

 

Industry Compliance: Meets relevant regulatory requirements in the financial sector.

 

Human-Computer Interaction Requirements:

 

User-Friendly Interface: Intuitive and consistent UI design philosophy.

 

Assistive Features: Provides shortcuts, personalized settings, etc.

 

Help Documentation: Contextual online help documentation.

 

Intelligence Requirements:

 

Intelligent Recommendations: Provides marketing activity recommendations based on AI analysis.

 

Natural Language Processing: Supports natural language query data.

 

Machine Learning: Continuously optimizes various business decision models.

 

2.3 Other Requirements Analysis

 

Integration Requirements:

 

Data Integration: Can integrate data bidirectionally with existing enterprise systems (e.g., ERP, email servers).

 

Application Integration: Provides standardized API interfaces to support integration with third-party application systems.

 

Data Migration: Smooth migration of historical data from the old system to the new system.

 

Deployment Requirements:

 

Cloud Deployment: Supports public cloud, private cloud, and hybrid cloud deployment modes.

 

Local Deployment: Can be deployed and maintained locally in the enterprise data center.

 

Containerization: Uses container technologies like Docker for agile deployment.

 

Monitoring Requirements:

 

System Monitoring: Comprehensive monitoring of CPU, memory, disk, network, and other resource usage.

 

Log Monitoring: Collects and analyzes various logs such as system, application, security, and audit logs.

 

Alarm Notification: Timely notifies operations personnel when exceptions occur.

 

43

 

 

Backup Requirements:

 

Data Backup: Regularly performs complete backups of data according to preset strategies.

 

Application Backup: Supports backup of system program files, configurations, etc.

 

Backup Recovery: Can quickly restore data and applications from backups.

 

Business Continuity Requirements:

 

Disaster Recovery: Provides data and application backups through a remote disaster recovery center.

 

Fault Tolerance: Automatically switches to backup systems when the main system fails.

 

Load Balancing: Distributes traffic to multiple server instances, improving availability.

 

Testing Requirements:

 

Test Coverage: 100% functional testing coverage, including unit, integration, system, and acceptance testing.

 

Automation: Achieves continuous integration and continuous testing through an automated testing framework.

 

Test Environment: Independent test environment separated from the production environment.

 

Documentation Requirements:

 

Requirement Documentation: Fully reflects business and system requirements.

 

Design Documentation: Architecture, modules, interfaces, database, and other design descriptions.

 

User Manual: User guides for operation processes and interface explanations.

 

Online Help: Context-related built-in system help documentation.

 

44

 

 

Training Requirements:

 

Administrator Training: Training for system management, maintenance, backups, etc.

 

User Training: Usage training for different roles and business scenarios.

 

Developer Training: Training on coding standards, development tools, environment setup, etc.

 

III. Technical Implementation Plan

 

3.1 System Architecture Design

 

 

 

 

Frontend Architecture:

 

Single Page Application (SPA) architecture using modern frontend framework React.

 

Follows component-based, modular design principles to improve code reusability.

 

State management using libraries like Redux.

 

Supports server-side rendering (SSR) to enhance first-screen loading speed.

 

Introduces UI component libraries like Ant Design.

 

45

 

 

Backend Architecture:

 

Microservice architecture, splitting the system into independent microservices.

 

oCustomer service, marketing service, contract service, knowledge base service, etc.

 

oImplemented based on Node.js/Java/Python languages.

 

Each microservice is a standalone application, including control layer, service layer, and persistence layer.

 

Service registration and discovery through Consul.

 

Service communication using RESTful API and message queues (e.g., RabbitMQ).

 

API gateway exposes services uniformly to the outside, implementing identity authentication, monitoring, rate limiting, etc.

 

Data Layer:

 

Main database uses relational database MySQL.

 

Uses NoSQL databases like MongoDB for specific scenarios.

 

Uses ElasticSearch as a full-text search engine.

 

Data caching uses Redis to improve read performance.

 

Operations Architecture:

 

Containerized deployment, using Docker to package applications and dependencies into images.

 

Container orchestration using Kubernetes, achieving elastic scaling, fault tolerance, etc.

 

Continuous integration and delivery, based on Jenkins for code building, testing, and deployment.

 

46

 

 

System monitoring implemented by components like Prometheus.

 

Introduces Application Performance Monitoring (APM) like Jaeger to trace distributed service calls.

 

Unified log collection to ELK (Elasticsearch, Logstash, Kibana).

 

Based on Istio to achieve microservice traffic management, security control, etc.

 

Security Architecture:

 

API gateway and identity authentication services achieve unified authentication and authorization.

 

Uses OAuth2 protocol to protect resource access.

 

Manages system permissions based on Role-Based Access Control (RBAC).

 

Encrypts sensitive data storage using asymmetric encryption algorithms.

 

Deploys on a Virtual Private Cloud (VPC) to implement network isolation and access control.

 

Web Application Firewall (WAF) blocks common web attacks.

 

Integration Layer:

 

Uses Enterprise Service Bus (ESB) to integrate third-party systems.

 

Supports various integration methods: file transfer, database link, message queue, API, etc.

 

Introduces integration platforms like Mulesoft to achieve low-code integration.

 

3.2 Key Technology Selection

 

Frontend Frameworks and Technologies:

 

React: Uses React as the frontend framework, combined with Redux for state management.

 

Ant Design: Uses Ant Design React UI component library to provide rich UI components.

 

TypeScript: Introduces TypeScript to improve code maintainability.

 

Backend Frameworks and Technologies:

 

Spring Boot/Spring Cloud: Uses Spring Boot to build microservices, and Spring Cloud provides service discovery, configuration management, etc.

 

Netflix OSS: Uses Eureka as the service registry center, Zuul as the API gateway.

 

RabbitMQ: Uses RabbitMQ as the message queue for asynchronous communication between microservices.

 

47

 

 

Database and Cache:

 

MySQL: Uses MySQL as the relational database to store core business data.

 

MongoDB: Uses MongoDB to store unstructured data with free format.

 

Elasticsearch: Uses Elasticsearch as a full-text search engine to provide strong search capabilities.

 

Redis: Uses Redis as a distributed cache to improve system read performance.

 

Containers and Orchestration:

 

Docker: Uses Docker to package applications and dependencies into images.

 

Kubernetes: Uses Kubernetes for container orchestration, achieving automated deployment, scaling, etc.

 

Continuous Integration and Delivery:

 

Jenkins: Uses Jenkins as the continuous integration platform to achieve code scanning, building, testing, etc.

 

Kubernetes: Combined with Kubernetes to achieve continuous deployment to test and production environments.

 

Monitoring and Logs:

 

Prometheus: Uses Prometheus to monitor application running indicators.

 

Grafana: Visually displays Prometheus monitoring data.

 

ELK: Uses ELK (Elasticsearch, Logstash, Kibana) to collect, query, and analyze logs.

 

Security and Integration:

 

Spring Security: Uses Spring Security to achieve authentication and authorization control.

 

Keycloak: Uses Keycloak to centrally manage authentication and single sign-on.

 

Apache Camel: Uses Camel as the Enterprise Integration Patterns (EIP) framework to integrate third-party systems.

 

3.3 Functional Module Design

 

Home Page:

 

Description: Provides an overview of the system, including user activities, pending tasks, and quick access to frequently used functions.

 

Functions:

 

oDashboard: Displays key business indicators and data visualizations.

 

oQuick Access: Quickly accesses recently used modules and functions.

 

oNotifications: Displays the latest messages and reminders within the system.

 

48

 

 

Customer Experience and Communication:

 

Description: Supports interaction between customers and the company, enhancing the customer experience.

 

Functions:

 

oReal-Time Chat: Supports real-time communication between customers and customer service personnel.

 

oCustomer Feedback: Collects and analyzes customer feedback information.

 

oSocial Media Integration: Integrates customer interactions from various social media platforms.

 

Portfolio Management and Reporting:

 

Description: Manages customers’ investment portfolios and generates related reports.

 

Functions:

 

oPortfolio Management: Tracks and manages customer portfolios.

 

oReport Generation: Generates customized investment reports based on customer needs.

 

oRisk Assessment: Performs risk analysis and assessment of portfolios.

 

Business Intelligence and Compliance:

 

Description: Provides business intelligence analysis and compliance management.

 

Functions:

 

oData Analysis: Uses data mining and analysis tools for business data analysis.

 

oCompliance Checks: Ensures business operations comply with relevant regulations and standards.

 

oReporting and Auditing: Generates compliance reports and supports internal audits.

 

Partners and Integration:

 

Description: Manages relationships with partners and supports integration with third-party systems.

 

Functions:

 

oPartner Management: Records and manages partner information.

 

oSystem Integration: Integrates seamlessly with other business systems (e.g., ERP, HRM).

 

oAPI Interface: Provides open API interfaces for third-party system calls.

 

49

 

 

Calendar:

 

Description: Provides calendar functions for individuals and teams, supporting task and event management.

 

Functions:

 

oEvent Scheduling: Creates and manages personal and team events.

 

oTask Reminders: Sets task reminders to ensure timely completion of work.

 

oSynchronization: Supports synchronization with other calendar systems (e.g., Google Calendar).

 

Documents:

 

Description: Centralized management of various company and customer documents.

 

Functions:

 

oDocument Upload and Storage: Supports uploading and storing various documents.

 

oPermission Management: Sets access permissions for different users.

 

oVersion Control: Records document history versions, supporting version recovery.

 

Emails:

 

Description: Manages email communication within the company and with customers.

 

Functions:

 

oEmail Sending and Receiving: Supports sending and receiving emails.

 

oEmail Classification: Automatically classifies emails according to different rules.

 

oEmail Templates: Provides predefined email templates to enhance email sending efficiency.

 

Marketing Campaigns:

 

Description: Manages and tracks various marketing activities of the company.

 

Functions:

 

oCampaign Creation: Creates and manages different types of marketing campaigns.

 

oData Analysis: Analyzes campaign effectiveness and provides detailed data reports.

 

oCustomer Segmentation: Conducts precise marketing based on customer characteristics.

 

50

 

 

Call Records:

 

Description: Records and manages phone communications with customers.

 

Functions:

 

oCall Logging: Records all call information with customers.

 

oCall Analysis: Analyzes call data to evaluate communication effectiveness.

 

oCall Reminders: Sets call reminders to ensure important calls are not missed.

 

Meetings:

 

Description: Manages meeting arrangements within the company and with customers.

 

Functions:

 

oMeeting Scheduling: Creates and manages meeting schedules.

 

oMeeting Notes: Records meeting content and decisions.

 

oMeeting Reminders: Sets meeting reminders to ensure timely attendance.

 

Tasks:

 

Description: Manages and assigns various tasks within the company.

 

Functions:

 

oTask Creation: Creates and assigns tasks to different team members.

 

oTask Tracking: Tracks task progress in real-time.

 

oTask Reminders: Sets task deadline reminders.

 

Notes:

 

Description: Records and manages various notes within the company.

 

Functions:

 

oNote Creation: Supports recording notes in various forms such as text and images.

 

oNote Classification: Manages notes by different projects or themes.

 

oNote Sharing: Supports sharing and collaboration of notes within the team.

 

51

 

 

Invoices:

 

Description: Manages invoice information between customers and the company.

 

Functions:

 

oInvoice Generation: Generates invoices based on transaction information.

 

oInvoice Sending: Supports sending invoices via email.

 

oInvoice Tracking: Tracks the payment status and history of invoices.

 

Contracts:

 

Description: Manages contracts between the company and customers or suppliers.

 

Functions:

 

oContract Creation: Creates and manages contract templates and specific contracts.

 

oContract Review: Supports the approval and signing process of contracts.

 

oContract Archiving: Securely stores contract documents and supports query and retrieval.

 

Cases:

 

Description: Manages and tracks customer service cases.

 

Functions:

 

oCase Creation: Records customer service requests and issues.

 

oCase Assignment: Assigns cases to relevant team members for processing.

 

oCase Tracking: Tracks case handling progress and results in real-time.

 

Potential Customers:

 

Description: Manages and develops potential customers.

 

Functions:

 

oCustomer Information: Records detailed information about potential customers.

 

oCustomer Rating: Rates potential customers based on their behavior and characteristics.

 

oCustomer Follow-Up: Formulates and tracks follow-up plans for potential customers.

 

52

 

 

Potential Customer Lists:

 

Description: Filters and manages potential customer lists based on different criteria.

 

Functions:

 

oList Creation: Creates different potential customer lists based on customer characteristics.

 

oList Analysis: Analyzes the effectiveness of potential customer lists.

 

oList Export: Supports exporting potential customer lists in various formats.

 

Projects:

 

Description: Manages and tracks various projects within the company.

 

Functions:

 

oProject Creation: Creates and manages project plans.

 

oProject Assignment: Assigns project tasks to team members.

 

oProject Tracking: Tracks project progress and outcomes in real-time.

 

Project Templates:

 

Description: Provides predefined project templates to enhance project management efficiency.

 

Functions:

 

oTemplate Creation: Creates and manages project templates.

 

oTemplate Application: Quickly applies existing templates to new projects.

 

oTemplate Updates: Regularly updates and optimizes project templates.

 

Events:

 

Description: Manages and organizes various company events.

 

Functions:

 

oEvent Scheduling: Creates and manages event schedules.

 

oEvent Promotion: Promotes event information through various channels.

 

oEvent Feedback: Collects and analyzes feedback from event participants.

 

53

 

 

Event Locations:

 

Description: Manages location information for company events.

 

Functions:

 

oLocation Logging: Records specific location information for events.

 

oLocation Maps: Provides maps and route guides for event locations.

 

oLocation Management: Selects and reserves suitable locations based on event needs.

 

Products:

 

Description: Manages various product information sold by the company.

 

Functions:

 

oProduct Information: Records detailed information and specifications of products.

 

oProduct Pricing: Manages product pricing strategies and discount information.

 

oInventory Management: Monitors product inventory in real-time.

 

Product Categories:

 

Description: Manages product classification based on different criteria.

 

Functions:

 

oCategory Creation: Creates categories based on product characteristics.

 

oCategory Adjustment: Adjusts product categories based on market demand.

 

oCategory Analysis: Analyzes sales situations of various product categories.

 

PDF Templates:

 

Description: Provides customizable PDF document templates.

 

Functions:

 

oTemplate Design: Designs PDF templates that align with the company’s image.

 

oTemplate Application: Applies PDF templates to various reports and documents.

 

oTemplate Management: Updates and maintains the PDF template library.

 

54

 

 

Reports:

 

Description: Generates and manages various business reports.

 

Functions:

 

oReport Design: Designs different types of reports based on requirements.

 

oReport Generation: Automatically generates regular reports.

 

oReport Analysis: Analyzes report data to provide decision support.

 

Knowledge Base:

 

Description: Centrally manages the company’s knowledge and information resources.

 

Functions:

 

oKnowledge Entry: Records and organizes internal knowledge information.

 

oKnowledge Search: Provides fast and efficient knowledge search functions.

 

oKnowledge Sharing: Supports knowledge sharing and collaboration within the team.

 

Knowledge Base Categories:

 

Description: Manages the knowledge base classification system based on different criteria.

 

Functions:

 

oCategory Creation: Creates categories based on knowledge content.

 

oCategory Adjustment: Adjusts knowledge categories based on needs.

 

oCategory Analysis: Analyzes the usage frequency and effectiveness of various knowledge categories.

 

Email Templates:

 

Description: Provides predefined email templates to improve sending efficiency.

 

Functions:

 

oTemplate Design: Designs email templates that align with the brand image.

 

oTemplate Management: Updates and maintains the email template library.

 

oTemplate Application: Quickly calls templates during email sending.

 

55

 

 

Surveys:

 

Description: Designs and manages various customer surveys.

 

Functions:

 

oSurvey Creation: Designs surveys based on requirements.

 

oSurvey Sending: Sends surveys via email or other channels.

 

oSurvey Analysis: Collects and analyzes survey results to provide feedback reports.

 

3.4 Integration Plan

 

Integration Architecture: Adopts a centralized integration architecture based on an Enterprise Service Bus (ESB), where all integrations with external systems are managed and implemented through the ESB. The ESB acts as the core integration layer, responsible for coordinating data exchange and business process orchestration among systems.

 

Integration Platform Selection: Choose MuleSoft Anypoint Platform as the integration platform, with the following advantages:

 

Cloud-native architecture, supports containerized deployment.

 

Based on Mule ESB core, provides visual integration flow development.

 

Supports numerous connectors, easily integrating various applications and systems.

 

API management function, achieving the full lifecycle management of API design, testing, and publishing.

 

Anypoint Exchange provides pre-built connector and template assets.

 

High compliance and security, supporting OAuth, two-way SSL, etc.

 

Integration Implementation:

 

Data Integration: Uses MuleSoft batch job connectors for data synchronization and ETL transformation.

 

API Integration: Exposes application APIs through API gateway for other systems to call.

 

Event-Driven Integration: Uses MuleSoft message queue connectors to interface with Kafka/RabbitMQ, supporting event-driven architecture.

 

B2B Integration: MuleSoft B2B Connector supports multiple industry-standard protocols like EDI, AS2, etc.

 

IoT Integration: Connects IoT devices, collects, and processes sensor data.

 

Integration Scenarios Examples:

 

Integrating with CRM cloud marketing services to obtain marketing leads and campaign data.

 

Integrating with electronic signature systems to support online contract signing.

 

Integrating with identity authentication services to provide single sign-on functionality.

 

56

 

 

Integration Governance:

 

API Management: Manages API lifecycle through Anypoint Platform’s API management functions.

 

Integration Asset Management: Stores integration applications, rules, policies, and other assets in Anypoint Exchange asset library.

 

Monitoring and Maintenance: Implements integration flow monitoring and fault recovery using MuleSoft’s Monitoring and Alerting functions.

 

Security and Compliance: Anypoint Platform follows security best practices, supporting centralized control of security policies.

 

3.5 Innovation Point Analysis

 

Intelligent Customer Experience:

 

Uses Natural Language Processing (NLP) technology to achieve intelligent voice assistants, allowing customers to interact in natural language.

 

Applies machine learning algorithms to analyze customer data and provide personalized intelligent recommendations and services.

 

Uses sentiment analysis technology to enhance customer experience by promptly resolving customer dissatisfaction issues.

 

Intelligent Marketing and Sales:

 

Accurately markets and predicts potential sales leads based on customer data and behavior patterns.

 

Applies machine learning analysis technology to optimize marketing campaign return on investment.

 

Introduces natural language understanding to intelligently analyze the sentiment and opinions of marketing content.

 

Intelligent Business Analysis:

 

Integrates big data analysis and data mining technologies to provide intelligent business analysis and reporting.

 

Applies predictive analysis models to forecast and optimize business operations.

 

Uses graph analysis technology for fraud detection and anti-money laundering monitoring.

 

Intelligent Knowledge Management:

 

Uses natural language processing to extract valuable insights from the knowledge base.

 

Applies knowledge graph association technology to discover potential associations between knowledge.

 

Provides an automatic question-answering service based on the knowledge base using chatbots.

 

57

 

 

Intelligent Compliance Management:

 

Uses machine learning to analyze transaction data and identify compliance risks.

 

Automates audit processes to improve audit quality and efficiency.

 

Conducts stress tests and risk assessments using machine learning models.

 

No-Code Visual Development:

 

Provides a low-code development platform similar to Mendix for visual application development.

 

Introduces a drag-and-drop PDF template designer for designing and publishing without coding.

 

Supports automated integration and business process configuration on the platform.

 

Open Ecosystem:

 

Provides standardized open interfaces based on microservices and API architecture.

 

Builds a partner ecosystem, integrating third-party applications and services.

 

Provides an app store and marketplace for discovering and distributing applications.

 

58

 

 

4.Project Implementation Plan

 

4.1Project Organization Structure

 

Project Sponsor: Responsible for the project’s initiation, funding, and final acceptance. Composed of senior company executives.

 

Project Manager: Fully responsible for planning, executing, monitoring, controlling, and closing the project.

 

Project Management Office (PMO): Provides consultation, training, and supervision to the project manager and team, ensuring consistency and effectiveness in project management practices.

 

Core Project Team: Includes key roles such as system architect, technical lead, and testing lead, responsible for core work such as system design, development, and testing.

 

Functional Development Teams: Divided into multiple development teams according to functional modules, each team composed of developers, testers, and business analysts, responsible for requirement analysis, design, development, and testing of corresponding modules.

 

Quality Assurance Team: Independent of the development team, responsible for setting quality standards, reviewing quality-related processes, identifying quality defects, and proposing improvement measures.

 

User Representatives: Representatives from different business departments, responsible for determining business requirements, reviewing design documents, and participating in user acceptance testing.

 

Training Team: Responsible for providing system usage training to end users, ensuring users can proficiently use the new system.

 

Technical Support Team: Provides support for system go-live and operation, responding to and resolving technical issues encountered by users in a timely manner.

 

4.2Project Process

 

Project Initiation Phase:

 

Establish the project management team and various working groups.

 

Develop the project charter, clarifying project goals, scope, milestones, etc.

 

Conduct a project kickoff meeting to inform all relevant personnel about the project.

 

Requirement Analysis Phase:

 

Collect requirements from various business departments.

 

Organize requirement review meetings to refine and confirm requirements.

 

Write the requirement specification document.

 

59

 

 

System Design Phase:

 

Conduct conceptual design and develop the overall system architecture.

 

Design the database, user interfaces, reports, etc.

 

Write the software design specification document.

 

System Development Phase:

 

Assign functional modules to development teams for coding.

 

Conduct code reviews and unit testing during the development process.

 

Integrate all modules and conduct system testing.

 

System Testing Phase:

 

Perform functional testing, integration testing, performance testing, etc.

 

Track and fix defects.

 

Conduct user acceptance testing (UAT).

 

System Deployment Phase:

 

Determine system environment requirements.

 

Execute the data migration plan.

 

Deploy the system and conduct user training.

 

Operation Support Phase:

 

Officially go live with the system and switch over.

 

Develop an operation management plan.

 

Continuously track user feedback and provide technical support.

 

Project Monitoring Phase (Throughout the Project):

 

Develop a project quality management plan.

 

Control project progress, risks, issues, and changes.

 

Hold regular project meetings to summarize and adjust strategies.

 

Project Closure Phase:

 

Officially close the project after achieving all milestones.

 

Write a project summary report to capture lessons learned.

 

Hold a project closure meeting to officially deliver the results.

 

60

 

 

Work Breakdown Structure:

 

Level 1 Task Level 2 Task Level 3 Task Task
Breakdown
Project Initiation Project Definition & Planning Project Goal Setting  
    Project Scope Determination  
    Project Budget Preparation  
    Project Schedule Creation  
  Requirements Gathering & Analysis User Requirements Survey  
    Requirements Documentation  
    Requirements Review & Confirmation  
  Feasibility Study    
  Project Team Building    
  Project Plan Creation    
System Design System Architecture Design System Module Division  
    Technology Selection  
    Architecture Diagram Creation  
  Database Design    
  Interface Design    
  Module Design    
System Development Front-end Development Home Page Development  
    Customer Experience & Communication Module  
    Calendar Module  
    Document Module  
    Email Module  
    Marketing Campaign Module  
    Phone Log Module  
    Meeting Module  
    Task Module  
    Notes Module  
    Invoice Module  
    Contract Module  
    Case Module  
    Leads Module  
    Lead List Module  
    Project Module  
    Project Template Module  
    Event Module  
    Event Location Module  

 

61

 

 

    Product Module  
    Product Category Module  
    PDF Template Module  
    Report Module  
    Knowledge Base Module  
    Knowledge Base Category Module  
    Email Template Module  
    Survey Module  
  Back-end Development Database Setup & Optimization Database Table Structure Design
      Index Optimization
      Data Backup & Recovery Plan
    API Development & Integration  
    Security Design & Implementation  
  System Integration Portfolio Management &  
    Reporting Integration  
    Business Intelligence & Compliance Integration  
    Partner & Integration Module Development  
  Unit Testing    
  Integration Testing    
  System Testing    
Testing & Validation User Acceptance Testing (UAT) Test Case Writing  
    UAT Environment Setup  
    Test Execution & Feedback Collection  
  Production Environment Deployment    
  Data Migration    
  System Go-Live    
Deployment & Release User Training Training Material Preparation  
    Training Course Arrangement  
    User Training Implementation  
  System Monitoring    
  Issue Fixing    
Maintenance & Support Regular Updates    
  User Support    

 

62

 

 

Milestone Schedule:

 

Milestone No. Milestone Name Start Date End Date Duration (Days)
M1 Project Initiation 2024-05-01 2024-05-15 15
M2 Project Definition and Planning 2024-05-01 2024-05-05 5
M3 Requirement Collection and Analysis 2024-05-06 2024-05-15 10
M4 System Design 2024-05-16 2024-06-15 30
M5 System Development 2024-06-16 2024-09-15 90
M6 Frontend Development 2024-06-16 2024-08-15 60
M7 Backend Development 2024-06-16 2024-08-31 76
M8 System Integration 2024-09-01 2024-09-15 15
M9 Testing and Validation 2024-09-16 2024-10-15 30
M10 Deployment and Release 2024-10-16 2024-10-31 15
M11 Maintenance and Support 2024-11-01 2025-04-30 180
M12 System Monitoring 2024-11-01 2025-04-30 180
M13 Issue Resolution 2024-11-01 2025-04-30 180
M14 Regular Updates 2024-11-01 2025-04-30 180
M15 User Support 2024-11-01 2025-04-30 180

 

Progress Schedule:

 

Phase Time Period Key Tasks and Milestones
Project Initiation Week 1-2

-    Project kickoff meeting

-    Define project team and responsibilities

-    Develop project plan and schedule

Requirement Analysis Week 3-4

-    Collect and confirm requirements

-    Write functional specifications

-    Preliminary design of customer experience and communication module

System Design Week 5-8

-    System architecture design

-    Database design

-    User interface design

    -    Functional module design
System Development Week 9-30

-    Development and unit testing of functional modules

-    Home page (Week 9-11)

-    Customer experience and communication (Week 12-18)

-    Portfolio management and reporting (Week 19-28)

-    Business intelligence and compliance (Week 29-32)

-    Other modules like calendar, documents, emails, etc. (developed in parallel)

System Integration and Testing Week 31-38

-    System integration testing

-    Functional testing and user acceptance testing (UAT)

-    Fix issues and retest

Deployment and Training Week 39-42

-    Deploy system to production environment

-    User training and preparation of training materials

-    Final user training session

Project Acceptance and Support Week 43-44

-    Final system acceptance

-    Provide ongoing technical support and maintenance plan

Risk Management Throughout the project

-    Weekly progress reports

-    Milestone assessments

-    Requirement change management process

-    Technical assessments and feasibility studies

 

63

 

 

5.Quality Assurance Measures

 

5.1Quality Control Process

 

Requirement Analysis Phase:

 

Requirement Review: Discuss requirements with customers and the project team to ensure all functional requirements are clear and achievable.

 

Requirement Documentation Review: Write detailed requirement documents and organize review meetings to ensure document accuracy and completeness.

 

Design Phase:

 

Design Review: Hold design review meetings in the early stages to ensure the design plan meets requirements and is feasible for implementation.

 

Prototype Testing: Develop system prototypes and conduct user experience testing, collecting feedback for adjustments.

 

Development Phase:

 

Code Review: Implement a code review system where each module’s code must undergo strict checks by team members before submission.

 

Unit Testing: Developers must write unit tests for their respective modules to ensure functional correctness.

 

Testing Phase:

 

Functional Testing: The testing team writes test cases based on requirement documents and verifies each functional module.

 

Integration Testing: Ensures that modules work together after integration, identifying and resolving interface issues between modules.

 

Performance Testing: Simulates real usage scenarios to perform system load testing and performance optimization, ensuring stable operation under high loads.

 

Delivery Phase:

 

User Acceptance Testing (UAT): Invites customers for acceptance testing to ensure system functions meet customer requirements.

 

Defect Fixing: Responds quickly to and fixes defects found during UAT, conducting re-acceptance confirmation.

 

Documentation Delivery: Provides detailed system usage documents, maintenance documents, and training materials to ensure customers can smoothly use and maintain the system.

 

Operation Support Phase:

 

Continuous Monitoring: Provides continuous monitoring services after system go-live to promptly identify and resolve operational issues.

 

User Training: Organizes customer training to ensure users can proficiently use system functions.

 

64

 

 

Technical Support: Provides long-term technical support services to quickly respond to issues encountered during use.

 

Quality Control Roles and Responsibilities:

 

Project Manager: Supervises and manages the overall quality control process to ensure the project progresses as planned.

 

Quality Assurance Manager: Develops the quality control plan, organizes reviews and testing activities at each stage.

 

Development Team: Responsible for code development and unit testing, ensuring code quality and module functionality correctness.

 

Testing Team: Writes test cases and performs functional, integration, and performance testing to ensure overall system quality.

 

Customer Representatives: Participate in requirement reviews and UAT testing to ensure system functions meet business needs.

 

Quality Control Tools and Methods:

 

Version Control System (e.g., Git): For code version management and code reviews.

 

Project Management Tools (e.g., Jira): For task assignment, progress tracking, and issue management.

 

Test Management Tools (e.g., TestRail): For test case management and test result recording.
   
Continuous Integration Tools (e.g., Jenkins): For automated building, testing, and deployment, improving development efficiency and quality.

 

5.2Testing Strategy

 

Functional Testing:

 

Objective: Verify whether each functional module works as expected.

 

Method: Design test cases based on the functional specification document (SRS), covering all functional modules. Use a combination of manual testing and automated testing to ensure comprehensive testing.

 

Tools: Selenium (for API testing).

 

Performance Testing:

 

Objective: Assess the system’s response time and stability under different loads.

 

Method: Perform load testing, stress testing, and capacity testing, simulating actual usage scenarios to evaluate system performance.

 

65

 

 

Tools: Apache JMeter.

 

Security Testing:

 

Objective: Ensure system security, preventing data leakage and unauthorized access.

 

Method: Perform vulnerability scanning, penetration testing, and code reviews to identify and fix security vulnerabilities.

 

Tools: OWASP ZAP.

 

User Experience Testing:

 

Objective: Ensure the system interface is user-friendly and operations are smooth.

 

Method: Collect user feedback through user surveys, usability testing, and A/B testing, optimizing system interface and interaction design.

 

Tools: UsabilityHub.

 

5.3Delivery Acceptance Criteria

 

Delivery Standards:

 

System Function Acceptance:

 

oHome Page: Acceptance criteria include page load speed, completeness of navigation bar functions, and response speed.

 

oCustomer Experience and Communication: Includes the completeness and accuracy of customer information management and communication records.

 

oPortfolio Management and Reporting: Ensures report generation accuracy, data update timeliness, and chart presentation aesthetics.

 

oBusiness Intelligence and Compliance: Ensures the accuracy of data analysis, completeness of compliance functions, and timeliness of anomaly detection.

 

oPartners and Integration: Verifies the accuracy of partner information management, stability of integration functions, and real-time data synchronization.

 

oCalendar, Documents, Emails, Marketing Campaigns, Call Records, Meetings, Tasks, Notes: Acceptance criteria include smooth operation, data integrity, and security of the above functional modules.

 

oInvoices, Contracts, Cases: Verifies the accuracy of generated invoices and contracts, completeness of case management, and ease of querying.

 

66

 

 

oPotential Customers and Potential Customer Lists: Ensures the accuracy of customer information entry, effectiveness of query functions, and convenience of list management.

 

oProjects and Project Templates: Ensures the comprehensiveness of project management functions, accuracy of template generation, and data security.

 

oEvents and Event Locations: Verifies the reasonableness of event arrangements, accuracy of location information, and management convenience.

 

oProducts, Product Categories, PDF Templates: Ensures the accuracy of product information, rationality of category management, and aesthetics of PDF template generation.

 

oReports, Knowledge Base, Knowledge Base Categories: Ensures the accuracy of report generation, completeness of knowledge base information, and rationality of category management.

 

oEmail Templates, Surveys: Verifies the aesthetics of email templates, comprehensiveness of survey functions, and accuracy of data collection.

 

System Performance Acceptance:

 

oResponse Time: All pages should load within 3 seconds, and backend processing response time should be within 2 seconds.

 

oSystem Stability: The system should maintain stable operation under high concurrent access, ensuring no data loss.

 

oData Security: All user data should be encrypted to ensure the security of data transmission and storage.

 

User Experience Acceptance:

 

oInterface Friendliness: The interface design should be simple, aesthetic, and the operation process should conform to user habits.

 

oOperational Convenience: User operations should be simple, reducing unnecessary steps to enhance operational efficiency.

 

Acceptance Process:

 

Internal Testing:

 

oUnit Testing: Conduct detailed unit testing for each functional module to ensure the correctness of module functions.

 

oIntegration Testing: After passing unit testing, perform integration testing to ensure module collaboration and overall system stability.

 

User Testing:

 

oInternal User Testing: Conduct testing by company internal employees, collecting user feedback and making improvements.

 

67

 

 

oExternal User Testing: Select some customers for trial use, collecting feedback for further optimization.

 

Final Acceptance:

 

oAcceptance Report: Submit a detailed acceptance report, including test results, user feedback, and improvement measures.

 

oCustomer Signature Confirmation: Obtain customer signature confirmation after ensuring system functions and performance meet requirements.

 

Post-Maintenance:

 

oMaintenance Support: Provide one year of free maintenance support, including system upgrades, fault troubleshooting, and technical support.

 

oTraining Support: Provide system usage training to ensure customers can proficiently operate the system.

 

6.Risk Management Plan

 

6.1Technical Risks

 

Application of New Technologies: The use of new technologies or tools in the system may lead to unforeseen problems.

 

Technical Integration: Technical integration between modules may encounter compatibility issues.

 

Mitigation Strategies: Conduct technical research and small-scale trials in advance to ensure the feasibility of new technologies. Develop a technical integration plan to ensure seamless connection between modules.

 

6.2Time Risks

 

Project Delays: Unexpected problems during development or testing may lead to project delays.

 

Insufficient Testing Time: Inadequate time allocation during the testing phase may affect testing quality.

 

Mitigation Strategies: Develop a detailed project plan and schedule with a buffer time. Timely identify and resolve issues during testing to ensure reasonable time allocation for the testing phase.

 

68

 

 

6.3Resource Risks

 

Shortage of Human Resources: Insufficient testing team personnel or lack of necessary skills may hinder testing progress.

 

Insufficient Equipment and Tools: Insufficient hardware equipment and software tools for testing may affect testing execution.

 

Mitigation Strategies: Plan and allocate sufficient human resources in advance to ensure team members have necessary skills. Ensure the supply of testing equipment and tools, updating and maintaining them in a timely manner.

 

6.4Quality Risks

 

Functional Defects: Functional defects in system modules may affect the normal use of the system.

 

Performance Issues: The system may be unstable under high load, affecting user experience.

 

Mitigation Strategies: Strictly implement functional and performance testing, promptly identifying and fixing defects. Continuously optimize to improve system performance and stability.

 

6.5Security Risks

 

Data Leakage: Security vulnerabilities in the system may lead to user data leakage.

 

Unauthorized Access: Insufficient access control may allow unauthorized users to access the system.

 

Mitigation Strategies: Conduct comprehensive security testing, identifying and fixing security vulnerabilities. Strengthen access control to ensure user data security.

 

6.6User Experience Risks

 

Unfriendly User Interface: Unreasonable user interface design may affect user experience.

 

Complex User Operations: Complex system operation processes may hinder user onboarding.

 

Mitigation Strategies: Collect user feedback through user experience testing and optimize user interface design. Simplify operation processes to enhance system usability.

 

69

 

 

6.7Risk Management

 

Risk Monitoring:

 

Hold regular project meetings to assess the current risk status.

 

Establish a risk monitoring mechanism to track and record risk changes in real-time.

 

Risk Response:

 

Develop emergency plans to ensure rapid response when risks occur.

 

Regularly evaluate the effectiveness of risk response measures and adjust as needed.

 

Risk Communication:

 

Ensure effective communication within the team to promptly share risk information and response strategies.

 

Maintain close contact with customers to keep them informed about project progress and risk status.

 

7.Project Deliverables

 

7.1Final Deliverables List

 

No. Deliverable Name Description
1 System Requirement Specification (SRS) Includes detailed descriptions of system functional requirements, non-functional requirements, business requirements, and system architecture.
2 System Design Document Describes the system design plan in detail, including system architecture design, database design, module design, etc.
3 Source Code All source code of the CRMAI system, including frontend and backend code repositories.
4 Test Cases Test cases written based on functional requirements, covering functional testing, performance testing, security testing, and user experience testing.
5 Test Reports Includes detailed results of all tests and identified issues, summarizing defects and improvement suggestions during the testing process.
6 User Manual User guide provided to end users, detailing the usage methods and considerations of each functional module of the system.
7 Technical Manual Technical documentation provided to developers and maintenance personnel, including detailed descriptions of system configuration, deployment, maintenance, and updates.
8 Training Materials Training materials prepared for users and system administrators, including PPTs, video tutorials, and operation guides.
9 Deployment Document Details the steps, environment configuration, and considerations for system deployment to ensure correct installation and operation of the CRMAI system.
10 Database Scripts SQL script files for creating and initializing databases, including table structures, initial data, and stored procedures.
     
11 Installation Package Installation package and installation guide for the system, used for installing and configuring the CRMAI system in the target environment.
12 Configuration Files Configuration files required for system operation, including system parameter configuration, environment configuration, and security configuration.
13 Project Summary Report Summary of the project implementation process, including project background, implementation process, encountered problems and solutions, project achievements, and future suggestions.
14 Source Code Version Control Records Records the version history of the source code in the version control system, facilitating tracking and tracing code modifications.
15 System Demonstration Video Recorded system functionality demonstration video, showcasing the main features and usage processes of the system.
16 Customer Acceptance Test Report Detailed results of customer acceptance testing, including issues and feedback raised by customers and corresponding improvement measures.
17 Service Agreement Technical support and maintenance service agreement for the system after go-live, clarifying the responsibilities and obligations of both parties.

 

70

 

 

18 Data Backup and Recovery Plan Data backup and recovery plan for the system, ensuring data security and high availability of the system.
19 Security Audit Report Detailed report of security testing and audit, including identified security issues and improvement suggestions.
20 User Feedback Records Collected and organized user feedback, recording users’ opinions and suggestions on the system.

 

7.2Operations and Maintenance Support Plan Monitoring and Alerts:

 

System Monitoring:

 

oReal-time monitoring of key indicators such as servers, databases, and network traffic.

 

oSetting up monitoring strategies using tools like Nagios and Zabbix to ensure timely detection of issues.

 

Alert Mechanism:

 

oSetting up alert rules to send timely notifications (such as SMS and emails) when system indicators exceed predefined thresholds.

 

oEnsuring the timeliness and accuracy of alert notifications.

 

Maintenance and Updates:

 

Regular Maintenance:

 

oRegularly checking system logs to identify and resolve potential issues.

 

oRegularly updating system components to ensure the system operates on the latest versions.

 

System Updates:

 

oRegularly releasing system updates as needed, including functionality enhancements and vulnerability fixes.

 

oThorough testing before updates to ensure they do not affect system stability.

 

Data Backup and Recovery:

 

Data Backup:

 

oDeveloping data backup strategies and regularly backing up databases and important files.

 

oBackup frequency: daily full backups and hourly incremental backups.

 

71

 

 

Data Recovery:

 

oDeveloping data recovery plans to ensure quick recovery in case of data loss or damage.

 

oRegularly conducting data recovery drills to ensure the feasibility of recovery plans.

 

Fault Handling:

 

Fault Response:

 

oEstablishing a fault response team with clear responsibilities and contact information for each member.

 

oDeveloping fault response processes to ensure quick response and handling when faults occur.

 

Fault Troubleshooting:

 

oUsing troubleshooting tools to quickly locate and resolve issues.

 

oRegularly summarizing fault handling experiences to optimize fault handling processes.

 

Performance Optimization:

 

Performance Monitoring:

 

oRegularly conducting performance tests to evaluate system performance under different loads.

 

oContinuously monitoring system performance using tools like APM (Application Performance Management).

 

Performance Optimization:

 

oOptimizing system architecture and code based on monitoring results and test feedback.

 

oOptimizing database queries and indexes to improve data processing efficiency.

 

72

 

 

Customer Support:

 

Customer Training:

 

oProviding system operation training for customers, including online and on-site training.

 

oProviding training materials and operation manuals to help customers get started quickly.
   
Technical Support:

 

oProviding 24/7 technical support to ensure customers can get help at any time.

 

oEstablishing customer support hotlines and email support channels to respond to customer issues promptly.

 

Customer Feedback:

 

oRegularly collecting customer feedback to understand their needs and issues encountered during use.

 

oContinuously improving and optimizing the system based on feedback to enhance customer satisfaction.

 

Emergency Plans:

 

Disaster Recovery:

 

oDeveloping disaster recovery plans to ensure quick system recovery in case of major faults.

 

oRegularly conducting disaster recovery drills to ensure the feasibility and effectiveness of the plans.

 

Business Continuity:

 

oDeveloping business continuity plans to ensure business operations can continue during system faults.

 

oConfiguring backup systems and disaster recovery plans to enhance system availability.

 

8.Other Supporting Documents

 

 

73

 

EX-10.2 3 ea020900301ex10-2_prestige.htm FORM OF WARRANT

Exhibit 10.2

 

NEITHER THIS SECURITY NOR THE SECURITIES FOR WHICH THIS SECURITY IS EXERCISABLE HAVE BEEN REGISTERED WITH THE SECURITIES AND EXCHANGE COMMISSION OR THE SECURITIES COMMISSION OF ANY STATE IN RELIANCE UPON AN EXEMPTION FROM REGISTRATION UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT”), AND, ACCORDINGLY, MAY NOT BE OFFERED OR SOLD EXCEPT PURSUANT TO AN EFFECTIVE REGISTRATION STATEMENT UNDER THE SECURITIES ACT OR PURSUANT TO AN AVAILABLE EXEMPTION FROM, OR IN A TRANSACTION NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT AND IN ACCORDANCE WITH APPLICABLE STATE SECURITIES LAWS AS EVIDENCED BY A LEGAL OPINION OF COUNSEL TO THE TRANSFEROR TO SUCH EFFECT, THE SUBSTANCE OF WHICH SHALL BE REASONABLY ACCEPTABLE TO THE COMPANY.

 

CLASS A ORDINARY SHARE PURCHASE WARRANT

 

PRESTIGE WEALTH INC.

 

Warrant Shares: 450,000 Initial Exercise Date: January 02, 2025

 

THIS ORDINARY SHARE PURCHASE WARRANT (the “Warrant”) certifies that, for value received, Tokyo Bay Management Inc. or its assigns (the “Holder”) is entitled, upon the terms and subject to the limitations on exercise and the conditions hereinafter set forth, at any time on or after the date that is six months following the date hereof (the “Initial Exercise Date”) and on or prior to January 02, 2030 (the “Termination Date”), but not thereafter, to subscribe for and purchase from Prestige Wealth Inc., an exempted company incorporated in the Cayman Islands (the “Company”), up to 450,000 Class A ordinary shares, par value $0.000625 per share (the “Ordinary Shares”) (as subject to adjustment hereunder, the “Warrant Shares”). The purchase price of one Ordinary Share under this Warrant shall be equal to the Exercise Price (as defined in Section 2(c) hereof).

 

Section 1. Definitions. The following definitions shall apply for purposes of this Warrant:

 

(a) “Business Day” means any day except Saturday, Sunday, any day which is a federal legal holiday in the United States or any day on which banking institutions in the State of New York are authorized or required by law or other governmental action to close.

 

(b) “Trading Day” means a day on which the principal Trading Market is open for trading; provided, that in the event that the Ordinary Shares are not listed or quoted on a Trading Market, then Trading Day shall mean a Business Day.

 

(c) “Trading Market” means whichever of the following markets or exchanges on which the Ordinary Shares are listed or quoted for trading on the date in question: the NASDAQ Capital Market, the NASDAQ Global Market, the NASDAQ Global Select Market, the New York Stock Exchange, the NYSE American, the OTC Bulletin Board or any tier of the OTC Markets Group, Inc. (or any successors to any of the foregoing).

 

 

 

 

Section 2. Exercise.

 

(a) Exercise of Warrant. Exercise of the purchase rights represented by this Warrant may be made, in whole or in part, at any time or times on or after the Initial Exercise Date and on or before the Termination Date by delivery to the Company (or such other office or agency of the Company as it may designate by notice in writing to the registered Holder at the address of the Holder appearing on the books of the Company) of a duly executed facsimile copy of the Notice of Exercise form annexed hereto and within three (3) Trading Days of the date said Notice of Exercise is delivered to the Company, the Company shall have received payment of the aggregate Exercise Price of the shares thereby purchased payable at the Holder’s election (i) by certified or official bank check or by wire transfer to an account designated by the Company, or (ii) by “cashless exercise” in accordance with the provisions of subsection (b) below. Notwithstanding anything herein to the contrary, the Holder shall not be required to physically surrender this Warrant to the Company until the Holder has purchased all of the Warrant Shares available hereunder and the Warrant has been exercised in full, in which case, the Holder shall surrender this Warrant to the Company for cancellation within three (3) Trading Days of the date the final Notice of Exercise is delivered to the Company. Partial exercises of this Warrant resulting in purchases of a portion of the total number of Warrant Shares available hereunder shall have the effect of lowering the outstanding number of Warrant Shares purchasable hereunder in an amount equal to the applicable number of Warrant Shares purchased. The Holder and the Company shall maintain records showing the number of Warrant Shares purchased and the date of such purchases. The Company shall use its commercially reasonable efforts to deliver any objection to any Notice of Exercise Form within one (1) Business Day of receipt of such notice. The Holder and any assignee, by acceptance of this Warrant, acknowledge and agree that, by reason of the provisions of this paragraph, following the purchase of a portion of the Warrant Shares hereunder, the number of Warrant Shares available for purchase hereunder at any given time may be less than the amount stated on the face hereof.

 

(b) Cashless Exercise. Notwithstanding any provision herein to the contrary, in the event there is no effective registration statement providing for the resale of the Warrant Shares, commencing six (6) months from the Initial Exercise Date, if the Per Share Market Value (as defined below) of one Ordinary Share is greater than the Exercise Price (at the date of calculation as set forth below) and there is not an effective registration statement under the Securities Act providing for the resale of the Warrant Shares, in lieu of exercising this Warrant by payment of cash, the Holder may exercise this Warrant by a cashless exercise by surrender of this Warrant at the principal office of the Company together with the properly endorsed Notice of Exercise, in which event the Company shall issue to the Holder a number of Ordinary Shares computed using the following formula:

 

X = Y -(A)(Y)

B

 

Where X = the number of Warrant Shares to be issued to the Holder.

 

Y =the number of Warrant Shares purchasable upon exercise of all of the Warrant or, if only a portion of the Warrant is being exercised, the portion of the Warrant being exercised.

 

A =the Exercise Price.

 

B =the Per Share Market Value of one Ordinary Share.

 

2

 

 

For purposes hereof, “Per Share Market Value” means (a) the average of the closing bid price per Ordinary Share for the five (5) Trading Days preceding such date on the applicable Trading Market, or (b) if the Ordinary Shares are not listed then on a Trading Market, the closing bid price for an Ordinary Share for the five (5) Trading Days preceding such date in the over the counter market, as reported by the OTC Bulletin Board or by Pink OTC Markets Inc. or similar organization or agency succeeding to its functions of reporting prices) at the close of business on such dates, or (c) if the Ordinary Shares are not then reported by the OTC Bulletin Board or by Pink OTC Markets Inc. (or similar organization or agency succeeding to its functions of reporting prices), then the average of the “Pink Sheet” quotes for the five (5) Trading Days preceding such date of determination, or (d) if the Ordinary Shares are not then publicly traded the fair market value of one Ordinary Share as determined by the Company’s board of directors.

 

(c) Exercise Price. The exercise price per share of the Ordinary Shares under this Warrant shall be $0.72, subject to further adjustment hereunder pursuant to Section 3 (the “Exercise Price”).

 

(d) Mechanics of Exercise.

 

(i) Delivery of Certificates Upon Exercise. Certificates for shares purchased hereunder shall be transmitted by the Transfer Agent to the Holder by crediting the account of the Holder’s prime broker with The Depository Trust Company through its Deposit or Withdrawal at Custodian system (“DWAC”) if the Company is then a participant in such system and there is an effective registration statement permitting the issuance of the Warrant Shares to or resale of the Warrant Shares by the Holder and in connection with such issuance or resale such Warrant shares are sold by the Holder, and otherwise by physical delivery to the address specified by the Holder in the Notice of Exercise by the date that is three (3) Trading Days after the latest of (A) the delivery to the Company of the Notice of Exercise, (B) surrender of this Warrant (if required), and (C) payment of the aggregate Exercise Price as set forth above. The Warrant Shares shall be deemed to have been issued, and Holder or any other person so designated to be named therein shall be deemed to have become a holder of record of such shares for all purposes, as of the date the Warrant has been exercised, with payment to the Company of the Exercise Price and all taxes required to be paid by the Holder, if any, pursuant to Section 2(d)(vi) prior to the issuance of such Warrant Shares, having been paid.

 

(ii) Delivery of New Warrants Upon Exercise. If this Warrant shall have been exercised in part, the Company shall, at the request of a Holder and upon surrender of this Warrant certificate, at the time of delivery of the certificate or certificates representing Warrant Shares, deliver to the Holder a new Warrant evidencing the rights of the Holder to purchase the unpurchased Warrant Shares called for by this Warrant, which new Warrant shall in all other respects be identical with this Warrant.

 

3

 

 

(iii) No Fractional Shares or Scrip. No fractional shares or scrip representing fractional shares shall be issued upon the exercise of this Warrant. As to any fraction of a share which the Holder would otherwise be entitled to purchase upon such exercise, the Company shall round up to the next whole share.

 

(iv) Charges, Taxes and Expenses. The Company shall pay any and all issue and other taxes, excluding federal, state or local income taxes, that may be payable in respect of any issue or delivery of the Warrant Shares upon exercise of this Warrant; provided, however, that the Company shall not be obligated to pay any transfer taxes resulting from any transfer requested by any holder in connection with any such exercise.

 

(v) Closing of Books. The Company will not close its stockholder books or records in any manner which prevents the timely exercise of this Warrant, pursuant to the terms hereof.

 

Section 3. Certain Adjustments.

 

(a) Adjustments for Stock Splits, Combinations, Certain Dividends and Distributions. If the Company shall, at any time or from time to time after the Initial Exercise Date, effect a split of the outstanding Ordinary Shares (or any other subdivision of its Ordinary Shares into a larger number of shares of Common Stock), combine the outstanding Ordinary Shares into a smaller number of shares of Common Stock, or make or issue or set a record date for the determination of holders of Ordinary Shares entitled to receive a dividend or other distribution payable in shares of Common Stock, then, in each event (i) the number of Ordinary Shares for which this Warrant shall be exercisable immediately after the occurrence of any such event shall be adjusted to equal the number of Ordinary Shares that a record holder of the same number of Ordinary Shares for which this Warrant is exercisable immediately prior to the occurrence of such event would own or be entitled to receive after the happening of such event, and (ii) the Exercise Price then in effect shall be adjusted to equal (A) the Exercise Price then in effect multiplied by the number of Ordinary Shares for which this Warrant is exercisable immediately prior to the adjustment divided by (B) the number of Ordinary Shares for which this Warrant is exercisable immediately after such adjustment.

 

(b) Adjustment for Other Dividends and Distributions. If the Company shall, at any time or from time to time after the Initial Exercise Date, make or issue or set a record date for the determination of holders of Ordinary Shares entitled to receive a dividend or other distribution payable in (i) cash, (ii) any evidences of indebtedness, or any other securities of the Company or any property of any nature whatsoever, other than, in each case, shares of Common Stock; or (iii) any warrants or other rights to subscribe for or purchase any evidences of indebtedness, or any other securities of the Company or any property of any nature whatsoever, other than, in each case, shares of Common Stock, then, and in each event, (A) the number of Ordinary Shares for which this Warrant shall be exercisable shall be adjusted to equal the product of the number of Ordinary Shares for which this Warrant is exercisable immediately prior to such adjustment multiplied by a fraction (1) the numerator of which shall be the last closing bid price per share of the Ordinary Shares at the date of taking such record and (2) the denominator of which shall be such last closing bid price per share of the Ordinary Shares minus the amount allocable to one Ordinary Share of any such cash so distributable and of the fair value (as determined in good faith by the Board) of any and all such evidences of indebtedness, shares of stock, other securities or property or warrants or other subscription or purchase rights so distributable, and (B) the Exercise Price then in effect shall be adjusted to equal (1) the Exercise Price then in effect multiplied by the number of Ordinary Shares for which this Warrant is exercisable immediately prior to the adjustment divided by (2) the number of Ordinary Shares for which this Warrant is exercisable immediately after such adjustment. A reclassification of the Ordinary Shares (other than a change in par value, or from par value to no par value or from no par value to par value) into Ordinary Shares and shares of any other class of stock shall be deemed a distribution by the Company to the holders of its Ordinary Shares of such shares of such other class of stock within the meaning of this Section 3(b) and, if the outstanding Ordinary Shares shall be changed into a larger or smaller number of Ordinary Shares as a part of such reclassification, such change shall be deemed a subdivision or combination, as the case may be, of the outstanding Ordinary Shares within the meaning of Section 3(a).

 

4

 

 

(c) Adjustments for Reclassification, Exchange or Substitution. If the Ordinary Shares for which this Warrant is exercisable at any time or from time to time after the Initial Exercise Date shall be changed to the same or different number of shares of any class or classes of stock, whether by reclassification, exchange, substitution or otherwise (other than by way of a stock split or combination of shares or stock dividends provided for in Section 3(a), Section 3(b), or a reorganization, merger, consolidation, or sale of assets provided for in Section 3(d)), then, and in each event, an appropriate revision to the Exercise Price shall be made and provisions shall be made (by adjustments of the Exercise Price or otherwise) so that, upon any subsequent exercise of this Warrant, the Holder shall have the right to receive, in lieu of Warrant Stock, the kind and amount of shares of stock and other securities receivable upon reclassification, exchange, substitution or other change, by holders of the number of Ordinary Shares for which this Warrant was exercisable immediately prior to such reclassification, exchange, substitution or other change, all subject to further adjustment as provided herein.

 

(d) Adjustments for Reorganization, Merger, Consolidation or Sales of Assets. If at any time or from time to time after the Initial Exercise Date there shall be a capital reorganization of the Company (other than by way of a stock split or combination of shares or stock dividends or distributions provided for in Section 3(a), and Section 3(b), or a reclassification, exchange or substitution of shares provided for in Section 3(c)), or a merger or consolidation of the Company with or into another corporation where the holders of the Company’s outstanding voting securities prior to such merger or consolidation do not own over 50% of the outstanding voting securities of the merged or consolidated entity, immediately after such merger or consolidation, or the sale of all or substantially all of the Company’s properties or assets to any other person (an “Organic Change”), then as a part of such Organic Change an appropriate revision to the Exercise Price shall be made if necessary and provision shall be made if necessary (by adjustments of the Exercise Price or otherwise) so that, upon any subsequent exercise of this Warrant, the Holder shall have the right to receive, in lieu of Warrant Stock, the kind and amount of shares of stock and other securities or property of the Company or any successor corporation resulting from the Organic Change. In any such case, appropriate adjustment shall be made in the application of the provisions of this Section 3(d) with respect to the rights of the Holder after the Organic Change to the end that the provisions of this Section 3(d) (including any adjustment in the Exercise Price then in effect and the number of shares of stock or other securities deliverable upon exercise of this Warrant) shall be applied after that event in as nearly an equivalent manner as may be practicable.

 

(e) Calculations. All calculations under this Section 3 shall be made to the nearest cent or the nearest 1/100th of a share, as the case may be. For purposes of this Section 3, the number of Ordinary Shares deemed to be issued and outstanding as of a given date shall be the sum of the number of Ordinary Shares (excluding treasury shares, if any) issued and outstanding.

 

5

 

 

(f) Notice to Holder.

 

(i) Adjustment to Exercise Price. Whenever the Exercise Price is adjusted pursuant to any provision of this Section 3, the Company shall promptly deliver to the Holder a notice setting forth the Exercise Price after such adjustment and any resulting adjustment to the number of Warrant Shares and setting forth a brief statement of the facts requiring such adjustment.

 

(ii) Notice to Allow Exercise by Holder. If (A) the Company shall declare a dividend (or any other distribution in whatever form) on the Common Stock, (B) the Company shall declare a special nonrecurring cash dividend on or a redemption of the Common Stock, (C) the Company shall authorize the granting to all holders of the Ordinary Shares, rights or warrants to subscribe for or purchase any shares of capital stock of any class or of any rights, (D) the approval of any stockholders of the Company shall be required in connection with any reclassification of the Common Stock, any consolidation or merger to which the Company is a party, any sale or transfer of all or substantially all of the assets of the Company, or any compulsory share exchange whereby the Ordinary Shares are converted into other securities, cash or property, or (E) the Company shall authorize the voluntary or involuntary dissolution, liquidation or winding up of the affairs of the Company, then, in each case, the Company shall cause to be mailed to the Holder at its last address as it shall appear upon the Warrant Register of the Company, at least 20 calendar days prior to the applicable record or effective date hereinafter specified, a notice stating (x) the date on which a record is to be taken for the purpose of such dividend, distribution, redemption, rights or warrants, or if a record is not to be taken, the date as of which the holders of the Ordinary Shares of record to be entitled to such dividend, distributions, redemption, rights or warrants are to be determined or (y) the date on which such reclassification, consolidation, merger, sale, transfer or share exchange is expected to become effective or close, and the date as of which it is expected that holders of the Ordinary Shares of record shall be entitled to exchange their Ordinary Shares for securities, cash or other property deliverable upon such reclassification, consolidation, merger, sale, transfer or share exchange; provided that the failure to mail such notice or any defect therein or in the mailing thereof shall not affect the validity of the corporate action required to be specified in such notice. The Holder shall remain entitled to exercise this Warrant during the period commencing on the date of such notice to the effective date of the event triggering such notice except as may otherwise be expressly set forth herein.

 

6

 

 

Section 4. Transfer of Warrant.

 

(a) Transferability. Subject to compliance with any applicable securities laws and the conditions set forth in Section 4(d) hereof, this Warrant and all rights hereunder (including, without limitation, any registration rights) are transferable, in whole or in part, upon surrender of this Warrant at the principal office of the Company or its designated agent, together with a written assignment of this Warrant substantially in the form attached hereto duly executed by the Holder or its agent or attorney and funds sufficient to pay any transfer taxes payable upon the making of such transfer. Upon such surrender and, if required, such payment, the Company shall execute and deliver a new Warrant or Warrants in the name of the assignee or assignees, as applicable, and in the denomination or denominations reasonably requested in such instrument of assignment, and shall issue to the assignor a new Warrant evidencing the portion of this Warrant not so assigned, and this Warrant shall promptly be cancelled. The Warrant, if properly assigned in accordance herewith, may be exercised by a new holder for the purchase of Warrant Shares without having a new Warrant issued.

 

(b) New Warrants. This Warrant may be divided or combined with other Warrants upon presentation hereof at the aforesaid office of the Company, together with a written notice specifying the names and denominations in which new Warrants are to be issued, signed by the Holder or its agent or attorney. Subject to compliance with Section 4(a), as to any transfer which may be involved in such division or combination, the Company shall execute and deliver a new Warrant or Warrants in exchange for the Warrant or Warrants to be divided or combined in accordance with such notice. All Warrants issued on transfers or exchanges shall be dated the Initial Exercise Date and shall be substantially identical with this Warrant except as to the number of Warrant Shares issuable pursuant thereto.

 

(c) Warrant Register. The Company shall register this Warrant, upon records to be maintained by the Company for that purpose (the “Warrant Register”), in the name of the record Holder hereof from time to time. The Company may deem and treat the registered Holder of this Warrant as the absolute owner hereof for the purpose of any exercise hereof or any distribution to the Holder, and for all other purposes, absent actual notice to the contrary.

 

(d) Transfer Restrictions. If, at the time of the surrender of this Warrant in connection with any transfer of this Warrant, the transfer of this Warrant shall not be either (i) registered pursuant to an effective registration statement under the Securities Act and under applicable state securities or blue sky laws or (ii) eligible for resale without volume or manner-of-sale restrictions or current public information requirements pursuant to Rule 144, the Company may require, as a condition of allowing such transfer, that the Holder or transferee of this Warrant, as the case may be, comply with the provisions of applicable securities laws.

 

(e) Representation by the Holder. The Holder, by the acceptance hereof, represents and warrants that it is acquiring this Warrant and, upon any exercise hereof, will acquire the Warrant Shares issuable upon such exercise, for its own account and not with a view to or for distributing or reselling such Warrant Shares or any part thereof in violation of the Securities Act or any applicable state securities law, except pursuant to sales registered or exempted under the Securities Act.

 

7

 

 

Section 5. Miscellaneous.

 

(a) No Rights as Stockholder Until Exercise. This Warrant does not entitle the Holder to any voting rights, dividends or other rights as a stockholder of the Company prior to the exercise hereof except as expressly set forth herein.

 

(b) Loss, Theft, Destruction or Mutilation of Warrant. The Company covenants that upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant or any stock certificate relating to the Warrant Shares, and in case of loss, theft or destruction, of indemnity or security reasonably satisfactory to it (which, in the case of the Warrant, shall not include the posting of any bond), and upon surrender and cancellation of such Warrant or stock certificate, if mutilated, the Company will make and deliver a new Warrant or stock certificate of like tenor and dated as of such cancellation, in lieu of such Warrant or stock certificate.

 

(c) Saturdays, Sundays, Holidays, etc. If the last or appointed day for the taking of any action or the expiration of any right required or granted herein shall not be a Business Day, then, such action may be taken or such right may be exercised on the next succeeding Business Day.

 

(d) Authorized Shares. The Company covenants that, during the period the Warrant is outstanding, it will reserve from its authorized and unissued Ordinary Shares a sufficient number of shares to provide for the issuance of the Warrant Shares upon the exercise of any purchase rights under this Warrant.

 

(e) Governing Law; Jurisdiction. This Warrant shall be governed by and construed in accordance with the internal laws of the State of New York, without giving effect to any of the conflicts of law principles which would result in the application of the substantive law of another jurisdiction. Each of the Company and the Holder (i) hereby irrevocably submits to the jurisdiction of the United States District Court sitting in the Southern District of New York and the courts of the State of New York located in New York county for the purposes of any suit, action or proceeding arising out of or relating to this Agreement or any of the other Transaction Documents or the transactions contemplated hereby or thereby and (ii) hereby waives, and agrees not to assert in any such suit, action or proceeding, any claim that it is not personally subject to the jurisdiction of such court, that the suit, action or proceeding is brought in an inconvenient forum or that the venue of the suit, action or proceeding is improper.

 

(f) Restrictions. The Holder acknowledges that the Warrant Shares acquired upon the exercise of this Warrant will have restrictions upon resale imposed by state and federal securities laws.

 

(g) Nonwaiver and Expenses. No course of dealing or any delay or failure to exercise any right hereunder on the part of Holder shall operate as a waiver of such right or otherwise prejudice the Holder’s rights, powers or remedies, notwithstanding the fact that all rights hereunder terminate on the Termination Date.

 

(h) Notices. Whenever notice is required to be given under this Warrant, unless otherwise provided herein, such notice shall be given in accordance with the terms of the Business Development & Marketing Consulting Agreement.

 

8

 

 

(i) Successors and Assigns. Subject to applicable securities laws, this Warrant and the rights and obligations evidenced hereby shall inure to the benefit of and be binding upon the successors and permitted assigns of the Company and the successors and permitted assigns of Holder. The provisions of this Warrant are intended to be for the benefit of any Holder from time to time of this Warrant and shall be enforceable by the Holder or holder of Warrant Shares.

 

(j) Amendment. This Warrant may be modified or amended or the provisions hereof waived with the prior written consent of the Company and the Holder.

 

(k) Severability. Wherever possible, each provision of this Warrant shall be interpreted in such manner as to be effective and valid under applicable law, but if any provision of this Warrant shall be prohibited by or invalid under applicable law, such provision shall be ineffective to the extent of such prohibition or invalidity, without invalidating the remainder of such provisions or the remaining provisions of this Warrant.

 

(l) Headings. The headings used in this Warrant are for the convenience of reference only and shall not, for any purpose, be deemed a part of this Warrant.

 

********************

 

9

 

 

IN WITNESS WHEREOF, the Company has caused this Warrant to be executed by its officer thereunto duly authorized as of the date first above indicated.

 

  PRESTIGE WEALTH INC.
   
  By:  
    Name:  Hongtao Shi
    Title: Chief Executive Officer and Chairman

 

 

 

 

WARRANT

 

NOTICE OF EXERCISE

 

To:PRESTIGE WEALTH INC.

 

(1) The undersigned hereby elects to purchase ________ Warrant Shares of the Company pursuant to the terms of the attached Warrant (only if exercised in full), and tenders herewith payment of the exercise price in full, together with all applicable transfer taxes, if any.

 

(2) Please issue a certificate or certificates representing said Warrant Shares in the name of the undersigned or in such other name as is specified below:

 

_______________________________

 

The Warrant Shares shall be delivered to the following DWAC Account Number or by physical delivery of a certificate to:

 

_______________________________

 

_______________________________

 

_______________________________

 

(3) Accredited Investor. The undersigned is an “accredited investor” as defined in Regulation D promulgated under the Securities Act of 1933, as amended.

 

(4) The undersigned intends that payment of the Exercise Price shall be made as (check one):

 

Cash Exercise_______

 

Cashless Exercise_______

 

If the Holder has elected a Cash Exercise, the Holder shall pay the sum of $________ by certified or official bank check (or via wire transfer) to the Company in accordance with the terms of the Warrant.

 

If the Holder has elected a Cashless Exercise, a certificate shall be issued to the Holder for the number of shares equal to the whole number portion of the product of the calculation set forth below, which is ___________.

 

 

 

 

X = Y -(A)(Y)
B

 

Where:

 

The number of Ordinary Shares to be issued to the Holder is (“X”).

 

The number of Ordinary Shares purchasable upon exercise of all of the Warrant or, if only a portion of the Warrant is being exercised, the portion of the Warrant being exercised is (“Y”).

 

The Exercise Price is (“A”).

 

The Per Share Market Value of one Ordinary Share is (“B”).

 

[SIGNATURE OF HOLDER]

 

Name of Investing Entity: ________________________________________________________

 

Signature of Authorized Signatory of Investing Entity:__________________________________

 

Name of Authorized Signatory: ____________________________________________________

 

Title of Authorized Signatory: _____________________________________________________

 

Date: _________________________________________________________________________

 

 

 

 

ASSIGNMENT FORM

 

(To assign the foregoing warrant, execute
this form and supply required information.
Do not use this form to exercise the warrant.)

 

FOR VALUE RECEIVED, [____ all of or [_______ shares of the foregoing Warrant and all rights evidenced thereby are hereby assigned to

 

_______________________________________________ whose address is

 

_______________________________________________________________.

 

_______________________________________________________________

 

Dated: ______________, _______

 

Holder’s Signature:    
     
Holder’s Address:    
     
     
     

 

 

 

 

 

 

GRAPHIC 4 ex10-1_001.jpg GRAPHIC begin 644 ex10-1_001.jpg M_]C_X 02D9)1@ ! 0$ 8 !@ #_VP!# @&!@<&!0@'!P<)"0@*#!0-# L+ M#!D2$P\4'1H?'AT:'!P@)"XG("(L(QP<*#7J#A(6&AXB)BI*3E)66EYB9FJ*CI*6FIZBIJK*SM+6VM[BYNL+#Q,7& MQ\C)RM+3U-76U]C9VN'BX^3EYN?HZ>KQ\O/T]?;W^/GZ_\0 'P$ P$! 0$! M 0$! 0 $" P0%!@<("0H+_\0 M1$ @$"! 0#! <%! 0 0)W $" M Q$$!2$Q!A)!40=A<1,B,H$(%$*1H;'!"2,S4O 58G+1"A8D-.$E\1<8&1HF M)R@I*C4V-S@Y.D-$149'2$E*4U155E=865IC9&5F9VAI:G-T=79W>'EZ@H.$ MA8:'B(F*DI.4E9:7F)F:HJ.DI::GJ*FJLK.TM;:WN+FZPL/$Q<;'R,G*TM/4 MU=;7V-G:XN/DY>;GZ.GJ\O/T]?;W^/GZ_]H # ,! (1 Q$ /P#W^BBB@ HH MHH **** "BBB@ HHHH **** "BBB@ JO>65M?VY@NH5EB)!*MTS5BBC832>C M,Q_#VDOYFZQA/F8W\'G'2A_#VDOYFZQA/F,&;@\D=*TZB2XBDGE@5P9(@"Z] MUSTJN:7'M)??NL8CO8.W!Y8=#2GP_I3%B;&([G\P\'EO6M#>O'S# MGISUJ)KR!;L6ID'G%#(%_P!D$ G]11S2[AR0[%0^']*))^PQ?ZSS>A^]ZU9M M-/M+#S/LL"1>8VY]O\1]:L@Y&1R**7,WU&H16J04444B@HHHH **** "BBB@ M HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** " MBBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH ** M** "BBB@ HHHH **** "BBB@ HHJ.::.WA>:5PD:#ZU- M;9HHX;Z%4$WF$/&5!'3'.<^M7QX@TH@8OHCN0R#K]T=31_PD&E8_X_HN4\SO M]WUJDI+H9N<.YS\GAC46M[>*%HX@LGFD&3)C;A / QR:0^%;QC*72% MF\ID\Q)2'F8R!PS9!';ISGITKH#X@TH9S?1<)YG?[OK2GQ!I(W9OHAM0.>O" MGH:KWNPN:'\N$B!^ZIY9OH!R:S-6UN47+:=I@5[H#][,W*0 ^OJWH*SK?3XX93.[ M-/=-]ZXE.7/T]!["M8T]+R.6I7L[0+DGB>YE/^@Z3,Z]I+AQ$#^')J/^VMAD!1Q_P$\UE8JO=6,%X!YJ?.O*2*=KH?4$L91<7J=E.HIJZ"BBBI- HHHH * M*** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HH MHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH *0C(P>12T M4 -\M/[J_E1Y:?W5_*G44"L,,2$$%5P1CI5+[#/;_P#'K,'3_GE.-P_!NH_6 MM"B@9GB^CC.R[MS;-TW,,H?HP_K5U A 9-I!Z$=Z<0&!# $'J#5-M-1&+VDC M6SGLG*GZJ>* +M%4?M5W;<75OYB#_EK!S^:]?RS5B"Z@NDW0RJX[X/(^HH F MHHHH **** "LG7M2DL;-(K8 WMRWE0 ] >['V YK6KE96-]XENYSS'9J+>+_ M 'C\SG^0K2FKO4QK2<8V6[$L[..RMQ$F6.=SNWWG8]6/N:L8]J?@T8-;;ZG& MHV&?A1^%/P:,&D.PS\*/PI^#1@T!8@F@CN(7AF0/&XPRGN*G\.WLL;RZ1=.7 MEMU#0R-UDBZ GW'0_A1@U0U!FLKBRU-.#;S!9/>-SM;^A_"G;F7*"?))2_JQ MU]%(*6N4]$**** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH ** M** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHH MH **** "BBB@ HHHH **** "BBB@ JM/86]PP=DVR#I(AVL/Q%3R2)#&TDCJ MB*,LS' JF-9TTK&WVZ +(2$)<#<1_\ K% !MO[;[K+=1^C?*X_'H?TI\6H0 M2/Y;%HI?^> (;% % MRBJ/V*>WYL[@@?\ /*7YE_ ]10-0,/%[ T'^V/F0_B.GXT 7JY'129;2:8_> MENIG/_?9']*ZQ'21 Z,K*>A4Y!KEM$'E6]Q ?O07ZEE^6[C2-83$G4G!0+M/J,CKZ&M=.YC8W(KRWF> M54E4^6X1CD8)(S@'OUI8+J"X:58W&Z)V1E/!!'7CT]ZQO^$=N/,$R&SAE^TB M8"-3LC&U00%(P<[?:BY\-SW,]T1-!$LLDTBRQJ?-^=<;2?04:!8V#>VPN(X# M*N^1"ZG(P0"!U]&X)P,GYAQ53556?1;P*0RF! MB"#D<#-93>%BTMR6E0K))N0DG[I<-M*].,8%7;FV&F>'M20%=K>:Z*HP%#GA M?UH6Z)DO=9U.GR&;3K64]7A1C^(%6:KV,1@L+:(]8XE4_@!5BN9[G?'9!111 M2*"BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH M **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ MHHHH **** "BBB@#.UNSFO; )"JNZ2I+Y;G"R!6!*GZXK(U32K[5Y$G6#[*% MMY$:%F4^82RG:2.@(!Y'2NHHH YC^S+]W-L;54A-V;L2^8" "OW<=U2U%I;F%L.&,Q./3L,9Y]:Z*B@ H(!&#THHH IOIL0AK"2.73_$,T5PZL+]?-C95P"ZC##ZD8-=36;K6FG4;(+$_EW4+"6WD M_NN/Z'H?K5P=GJ958MQNMT1XHQ5;3K];^!BR>5<1'9/">L;^GT]#5S%6U8P5 MFKH9BC%/Q1B@=AF*,4_%&* L,Q69J*?;;ZQTM>?-E$TWM&AS^IP*OWEW#86K MW-PVV-/Q)/8 =R:-!L9E,VI7J;;RZQ^[/_+&,?=3^I]S3ORJY/+S/E^\VA11 M16!VA1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% &?GZUJXHIW78AQ?Z MJ-V-)!P@*_Z2O+=UZ?K0U[JH#[=)!PH*_P"DK\Q[CIQBM2EQ3NNP.GTJS1BBI*04444#"BBB@ HHHH **** "BBB@ HHH MH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** ,C5-' M:>=;ZQD%O?H,;B,K*O\ =<=Q[]15*#6(UF%KJ,9L;OILE/R/_N/T/\ZZ2H;F MTM[R$PW,,P M'N:>/#AF_P"/W5;ZX7N@<1J?P4"M.RTZSTZ+R[.VCA4]=@Y/U/4T"#WH PTO[VSAM6GE2]GOB!#%$HC53M+'YLG(P*AB\5 MK<,IALI3&3&K.S@;6?( QWY7!-:*Z!I2PM$ME$(V8-M&>".F/3J>E3IIED@ M2UB4 H0 O]W[OY55T+4PH/%P6TTZ2]M1&]TJF01/N\O<3M./0XJ67Q)/$ME< M/8;+.X225G,H+"-4W X'<^E:2Z%I:/&ZV,(:,Y3C[O.1^I-.31=-C556SC"H MY=1C@$C!Q^':B\169D+XM+Q*R:9.78.X4L%&U5#$@GKP?SKHH)EN+>.9,[9% M#C/H1FJT6DV$*!([5 JA@!UP&&"/Q%6T18XU1 %51@ =A2=N@U<=1112&%%% M% !15>\^V>1_H1A$V1_KL[;#8=1LR'Z=\TTKDN5NAIT5F-_;?S M[&L/O#9D/]WOGWH;^W,MM;3\;QMR'^[[^]/E\Q<_DS3HK,/]MY.&T_'F<;&T M_P"\-F0_3OGWJ*YGU:V5VDGTU%WC9NW_ '>_U/TJWMO[GJRVD?HOS.?QZ#]: ME@L+>!_,"%Y3UDD.YC^)I\WD')YLSH9];N?,:-;-4$@V-(CKN3Z= MM2BB_D')YLJV0OO+;[<;^>]6J**DI*P4444#"BBB@ HKGKJY63 MQ%);7FHR6<<21O;QHXC$Q).23_%S@8K./C&X8W?EQP&*$HPE((PA+ _+G)(V M].#STIJ+%<[*BN1/BJ_D:\,%I"4AW!?,?:1@@9()YR"2!QVYYKI=/NA>Z?!= M*P82H&!"E5R?YUI[)=6XN[=AT,5PW\C MD5;BU+6=/.7*:C .H("3 >W9OTH=+LQK$K[2M^)UE%4=-U:TU6%I+:3)0X>- MAM=#Z,.U7JR::T9U*2DKH****0PHHHH **** "BBB@ HHHH *HR?],B6_MQUDA7;*H]2O1OPKH+'4 M+74K87%I,LL9XR.H/H1V-9R@XF\*L9Z+V]L0LD@WGH@Y8_@*@\V^N M?]5$MM'_ 'Y>6_!1T_&H-2Y)(D2%Y'5%'4L<"J?V]IB5LX&F_P"FC?*GYGK^ M%.33H0_F3%KB3^]*;RQ*J.0=R'N"* MT* "BBB@ HHHH **** "BBB@ HS4<\;2P/&DK1,PP'7&5]^:SETJ]&W.LW1Q M&5/R)R?[W3K32);:V1I/%%(5,D:,5.5+*#CZ4TV\!!!AC()R?D')]:SQI=[@ M?\3FZ_U>S[B=?[W3K2-I=]M.W6;G/E;!\B?>_O=.M.R[D\TNWY&BT$#EBT,9 M+##$J.?K4@P !@#H!7.M%?1 B[U*^@R@7>L:.@/][('7ZU;2PN9T9H==N&5 MD"@JJ':1WZ=319=Q\TNWY&Q15*ULKB"Y:674)IT*A1&ZJ #Z\#K5VDRDV]PH MHHI#"BBB@ HHK%\27DL-G'9VS%;F\?RD8=47JS?@*<5=V)G)0BY,S=1O9-=N M9+2!V33(F*32(<&=AU4'LH[GO4L<211K'&BHBC"JHP *6"WCMK>."%0L<:A5 M%2;:Z=E9;'GN\GS2W&8HQ3]M&VD%AF*,4_;1MH"Q1N;-S.MY9R>1?1CY).SC M^ZX[C^5;^CZHNJ6AJD_*W MX']#1)@%%%% !1110 4444 %%%% !5(\ZT/: MW_\ 9JNU3'_(9;VMQ_Z$: +E%(3@$GH*I6&KV>I,RVSL650V'0J2IX##/4<' MF@"]1110 4444 %%%% !1110 4444 -=E12S$!0,DGL*Y"XN'\1S>8^5TI&_ M=1=/M!'\;?[/H._6K_B6=KF2WT>,D"XS)<$=1$.W_ CQ^=($"J%4 *!@ =A6 M]-67-U.*M/F?(MEN,"@ # '0#M2XI^VC;5&5AF*,4_;1MH"PS%4+FTF@E>] MTXE+D@"6-6VB=?0^A]#6EMHVT[BMV-'1IK&[L$NK*,*K\-N'SAAU#=\@UHUR MEG*=*U]".+74#L<=EF ^4_\ AQ^ KJZPG'E>AW4I\\==PJGJ%@+Y(BLS0S0 MOYD4J@$J<8Z'J""1BKE%0:F/+H"7$PN;BX9[Q50).$ *%6)R![YP1Z4S_A'5 M;?&]Y*T&)1%'M'[LR Y.>_4XS6W10!G:?I1LY?/FN7N9Q&(E=E"A4'8 ?K6C M110 4444 %%%% !1110 4444 %%%% !1110 54DTVW=RZ!H9/[\1VG\?6K=% M %'&H6YX*74?H?D?_ _I3DU* N(YMUO(>BS#;GZ'H:N4UXTE0K(BLI[,,B@! MW49%%43IPB.;2>2W/]T?,G_?)_I1]HO+?B>V\U/^>D!_]E//Y9H O45!!>V] MSQ%*I8=5/##\#S4] >EOG1 M_EY8Q6M/JSGQ&R7F6=M&VL\37-SJUU"ETEO#:%-R; S29&223T';CWJFOB5' M\S;;?+'(BF3?\@5@<,3CIQCICWK2S,#*SF:-(M[G^Z=F_'3&.V<]:+,#=VU#>6JW=E/ M;MRLB%?TK*;Q&8Y)$>PES%'NDVMG:=F\#.,8Q@9]36CIM\U\95D@\F2(IE=X M;(90P.?H:6JU$U?0U_#]TU[H%E.YR[1 -]1P?U%:58?A+_D 1CMYLN/IO:MR ML9JTFCLI.\$WV"BBBH- HHHH **** "BBB@ JFG.L3>T*_S-7*I1?\A>X_ZY M)_,T 7&&4('<8K%T30WT>3(E$BO"JON))# G[I/1>>GK6W10 4444 %%%% ! M1110 4444 %%%% ')PG[3KFJW9YQ(MLGLJ#G]2:N[:HZ."8KPGK]MFS_ -]5 MHXKIEH['G1U5S(2_GD>ZNCY,6GVLCQN6!,C;/O$8X'/:FG78581FUNA.Q&(= M@W$%2P/7&, U<;2+-YY9C&V9<^:@A.*(='LH&5DC8NIR&=RS?=VX MR>V#BG=%6*"^(82+J0V\H@A6-ED)4>8'7/&32RZ_%]AGNK6UGN8X8PY90 ,D M A>3UP15IM!T]@!Y3+@*!MD(QM! _'!(I5T.P2-XTB98WC\ID$AVL,8&1ZX[ M]:+H+%1_$=C'+/$RS;X02X"@G<,97&>HR/:M"SNDO(Y&6.2-HY#&Z2#!5A_^ ML4P:-9#S?D.%I#&N#*Y=^>K=,_I2;70+%'6H3)I M%PR'$D0$R'T9#N'\JZBUF%S:0SKTD17'XC-8ETH^Q7&>GE-G\C5[P]D^'=.S MU^SI_*HG\)I1TF_0TZ***Q.L**** "BBB@ HHHH **** "BBB@ HHHH **** M "BBB@ HHHH *S#?7<^J36MI'"([?9YSRDY)89PH'MW-:=4I=+MY;W[8&EBF M( F14GV6Z@.;:Z++_SSG&X? M@W7^=6;:VAM+=(($"1H,!14M %'^T&AXO+=X?]L?.GYCI^-8I=%\4W(1U:.[ MMTE1E.02IVD?D1745@>(+ 0Q)J=G OGVK^8ZHO,D?\8^N.?PJZ;UMW,:T;QO MV&S:=:7$Z3S6T;RI]URO(J,:/IRH4%E"%)#$!>I'2KL,D=Q"DT3AHY%#*P[@ MU)MK2[,;%!M+LG,I:UC_ 'IS)QC<:7^S+(7"7 M(1*@ 5]O( &!^0J[MHVT7 M"Q3BTZT@QY5M&F&W# Z'&,C\":0:79!]PM(@=GE\+_#C&/RJ[MHVT7"Q3?3K M224RO;1F0IL+$=5QC!_"B(=5ETJ MVMY(C&OF2[&:1&8*-I.<+SVH V:*K:?/)=:?;W$J".26-790<@$BK- !1110 M 52AYU:Z]HXQ_.KM4K?_ )"EX?\ 9C'Z&@"[1110 4444 %%%% !1110 444 M4 %%%% '+V:^1J^K6A[3"=?]UQ_B#6ABJVO(;&]M=84?ND_<76/^>9/#?@WZ M&K@&1G/%;MW29Q*-FXF1KEQ-:PV;0RI$6NXT9G.%P([JXG2!+-.4 MR[AL!@2PW)GJ!MSWZUU#Q+(NUU5E/9AD4A@C)4F-"4X4[1\OT]*=]!V.3AU^ M^MK*VBFACEFDBA997=/*0>K-\H_G70V< M;* M"W'2*-4_(8K "'4_$$-LO-M8D33GL9"/D7\.3^5=-4S=DD715VY?(****R.D M**** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ H MHHH *0C(I:* .6FC/ANY8E2=(FY>Q1BLY_$ M.E*=L=SY[]E@1I"?R% DUC4?EM+06,)ZSW7+X_V4']:+/KH',GMKZ#]0U 6> MR&*,SWLW$-NIY8^I]%'VAN5VS1*X]QTJ6BLS<_P P_ ]10-0,/%Y \'^V/F0_B.GXU>HQF@!LZLG[^=$2OX,,BKM?;4PKN0\Q'L.B_CFM;3M+M=+@,=LA!8[GD8Y=SZL> MYI-J.XU&4]M$-TK38]+LEMXV+L27DE;[TCGJQJ]1163=W=G4DDK(****0PHH MHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB M@ HHHH **** #%1-:V[G+P1,?4H#4M% K)C4C2,81%4>BC%.HHH&%%%% !11 M10 4444 %%%% $4]M#'- M4WM+1FWPRB"0_P 4+@9^HZ&@5T:%4K+_ (_;\_\ 311_XZ*9'/=12*KO!<1L M?OJP5A[D=#^%-M[B&WDO999%5&ERISU&T#B@+HTJ*S_[3,O%M S C(>1@B_7 MGG]*3%S,/WM]%$I&=L&,X^I_PH"Z+[R)$NZ1U1?5C@54_M.%SMMTEN#_ -,E MR/SZ4V.SL$(9BLKXSOE?>?KS5Q9(R0J,G3( (Z4!=%7=J,QX6&W3U)WM_A1_ M9JR/;N5\=&&1R"1T-7JSM+TF+21)';M MB!]I\O;@*P&"1]<#BM&@ HHHH **** "DP",$4M% $)M+9CDV\1/J4%2JBJ, M*H ] ,4M%%Q608HHHH&%%%% !1110 4444 %%%% !1110 4444 %%%% !111 M0 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% M!1110 4444 %%%% !5:YT^TO)(I+BW25XCE"PSM^E6:*!-)[F=N%Z9ZUH,P12S' R:SK'7;"_.(I'4E/,7S4*;D M_O#/455Y=R>2'85-!TI-FVQA&P$+A>@/6A=!TI-FVPA&Q2J_+T!ZBK$]_;6] MNT[S)L"&0;2"6 &3CUJ(ZO9*;;,RXN,[&R,<#)R>W%%Y=PY(=A@T'2EVXL8? ME0H/EZ*>HH&@Z4,8L(.$\L?+_#Z5=\^(2"/S$WD;@NX9(]<4@N8&566:,JQP M"&')]*.9]PY(]BG_ &#I7_/A#]SR_N_P^E2V^DV%K.)X+6*.54V!E'(7TI]O M?V]UB"BBBD4%%%% !1110 4444 %%%% ! M1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %% M%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !1110 444 M4 %%%% !1110 4454N]2MK*6**=G#2G";8V;^0XH2N)M+5EB5/,B=,XW*1FN M93P[J36$$,UU;+):P&&#RT.#G&2V?4#'3C.:U$\0Z<_E[9)?WA*KF!QR.O:A M/$.G/Y>V27]YG;F!^W7MQ5I270CG@^IB1>$+J*%(UN80?+FC=SELJY8A0#TQ MNZC!J6;PI(LZR6_V,HI!\F5#L)\K83QWSS6NGB'3W\O;)+^\!*Y@?H.O:FCQ M'IQ )>4*4+AC"P&!^%/W@4H/9F1'X2NH51([N$E"CK<.A,JE4V[?39[?6BU\ M(2HK?:+B,L?-*E03L9T5=P]P5)_&M=/$>FR*K)+(RLAD!$+XP/P]J4>(M../ MWDO,?F?ZA_N_E^E'OBYH=R+0M'FTR6YDE%LIF6)0ENI &P$9.>YK:K*_X2'3 ML?ZR7_5^9_J'^[^7Z5-;:Q9W=RMO"TAD*;P#$RC'U(J6I;LI3CLF7Z***DL* M*** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HH MHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB M@ HHHH **** "BBB@ HHHH **** "BN5\.SWQU)OM>]M[8[9'^<]$498_@*A\R^N?]7&MM'_>D^9_^^>@_&@" MU++'"A>6144=V.*J_;9;CBS@+J?^6LGRK^'HH A@N M8+EOX5:H **** "BBB@ HHHH **** "BBB@ HHH MH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ M HHHH **** "BBB@ HHHH **** "BHYIHX(GEE=4C099F. !7-3Z]>ZD2NE( ML%M_S]S+DO\ [B?U-5&#EL9SJQAN=.[K&NYV"J.Y.*IOK.F1MM?4+53Z&5?\ M:Y3KCU!_B'N*UJQ::=F=49*2N@HHI MDLT<"%Y75%'=CBD4/H)P,U1^W37'%E;EU/\ RUE^5/\ $T?V>T^#>SM-_L+\ MJ?D.OXT .?48MYCMU:XD':(9 ^IZ"F^1>7/^OF$"?\\X>OXM_A5Q$2- B*%4 M= !@4Z@"&"T@M@?*C"D]6ZD_4]:FHHH **** "J4'RZK=C^\D;?S%7:I#Y=: M;_;@!_)O_KT 7:*** "BBB@".:"*X39-&KKZ,,U5^QW%OS:7!V_\\IOF7\#U M%7J* *(U$1-MO(FMS_>/*'_@0_K5U65U#*00>A!H(!!! (/8U3;3D1B]K(UN MY[)RI^J]* +M%4?M5U;<75OO0?\ +6#G\UZC]:LP7,-RF^&17'L>E $M%%% M!114%Y>6]A;/<74JQ1(.6:@3:2NR>F22QQ+ND=47U8X%B_CS50:/:,_F7 >ZD/5[ERY_(\5LJ7\S.66)_E5SIVUK3%;:=1 MM0?3S5_QJS#=6]P,P3Q2_P"XX/\ *N6%C: 8%K !Z>6*ADT>PD.[[,B/V>+Y M&_,4_9Q[D?6)]D=K17(0SZMIF#;7!OH!UM[D_/C_ &7_ ,:W]+UBUU6-_*+) M-'Q+!(,/&?=Y(8-,A8J]XQ61@>5B'+G\>GXU48\SL1.?)%R,VXG;Q%<^:^?[+B;]S'_ M ,]V'\;?[/H/QJYMIR1I&BH@"HH 51V I<5T>2//LV[O<;MHVT['O1M]Z0[# M=M)MI^VC'O0%BG>6*W:J0[13QG=#,GWHV]1[>U:6EZ\LL#Q7P\N^A.R2-%)W M^C*/0_I4.VJ-](=/N;;5D) @;9.!_%$QP?R.#0US*PX2]G+FZ=3HO,O[K_5Q MK:Q_WI/F<_AT'XT^+3H$<22;IY1_'*=Q'T[#\*M*0R@@Y!Y!I:YCT0HHHH * M*** "BBB@ HHHH *HR_+K-L?[T3K^1!J]5*[^74+%_\ :=?S7_ZU %VBBB@ MHHHH **** .>EUNZ7Q1_9R+&8_,1-I0@[2FXMNZ9'IWKH:JR:=:2R-(\*EV= M9"W?XI+WCD&UOR/7\*M5%/;0W*;9HU<=LCI0 7%Q%:V\D\SA(HU+,QZ M"N2!EUFZ74;U2L*\VMLW1!_?8=V/Z5-K$1EUN)7M=HN+B-SG"@_*N>N" M>WM5K%;P7*K]3BK2YY@+#=M5+JS=Y M4N[23R;Z'_5R=B/[K>JFKN*,4T["<;ES2M>MM0A D(@N5.R6%^-K]QGO6M7( M';8ZU!<.JFUO"+>Y5AD;OX&_I^-=#]@:'FSG>'_IFWS)^1Z?A6$XV>AVT9N4 M==T7J*I?;)X.+NV(7_GI#\R_B.HJS#/%<)NAD5U]5.:@V)**I:L;H:3=&SW? M:/+.S;US[>]6\=Q9VL>C1R2$R,95F>5.U9L>N3QF> I'(UDC3&2.N6YQQQQ6_/:PW4?EW$2 M2QYSM=PM)(XXWMH62/[BE!A?IZ5HFC&QEQZUYJ+,MN!;M<+;JS28?<2 M 25QP.:@_P"$B=\F&R#JI4,3,!UD,8QQZC-;3Z?:2-(SVT+-* )"4'S?6G)9 M6T:[4MXE7C@*,<'(_7FG=!8Q(_$32SI M@[2#_7!&SM^<<5$WB"Z MDAMVBLXD:9H67?+D;',UI6TB:OI.YX]@ MF1T9,YP2%&2WK]:ECB2,!44*H/11@4K]@:+'ANX M:Y\.V3NQEE(^F]JW*QG\3.ND[P3?8****@T"B MBB@ HHHH **** "J6H2UQY*G_90 ?S)J]MJCI _=7@/WA> MS9_[ZK0VUTRW/.CJKF!=ZRT'B&&U4YME*Q3?(2-[_=^;H,<9'^U5:TUVZM[1 M)+Z$$R"602>9\I*EL1KQUPO>NE-O$5=3&FUVW,,?>/J?4\"H+C3+2XC=&@0% MD:,.JC*@YSC\S3NBK&7'KLKW,5M]C02R%3D39559"^2<=0 >*IS>*,/&RQ$( MLRJ=IXE5T8JH"#GC M'\B?SHN@L8S>(7!N=M@[) Q3<&P"X8*1G'3)X^E:=A=-=Q2F2(1R13/"ZAMP MRIZ@U,MA:*S,MM$&8 ,0@Y Z?R%3+$J;MJA=Q+' ZGUI706*&L0>?H]TH^\J M%U/HR_,/Y5TECOX5:IDL,VP*GU=# M@C\B*Z6LCQ#92W-DEQ:KF[M'\Z(?WL=5_$9%7!V9C6C>-UT$VUF^($E.A77D MAS)A2-BDG[PZ =:OVES#?6D5S"7 K+LB^_ER">1G(7!P!3Q=:UY8D$@81HKX2'/FYEV MD$D#!V^@]ZZG%&*.8+#"O)JMJ%PMEI]QW'W$^I//T%);ZDRO:RW9L:':-8Z'9VS_?2(;O]X\G]36A116+=W<[8 MJR204444AA1110 4444 %%%% %>._M);I[:.XB:=,[HPPW#'7BH]5'_$LG/H M ?R(-95IH]W;ZY]M?$D1GF8(6'[L-C##U)Q@@^M;-^N[3[A?6-OY4 6 <@&B MHK9M]K"W]Y%/Z5+0 4444 %%%% !1110 4444 %%%% ',6Z_9M>U2T/ =ENH M_<,,']15_;4/B*!X&M]7A0LUID3*HY>$_>_+K^%3QNDL:R1L'1P&5@>"#WK> M]TF<7+RR<3(U\2+;V;1O(@6[C+O&A06B(\X$L" M>GRG 4XXZUUV*/QHN.QQB7&M6-A;P NR&*$F5HL&'*MD=#GD#J.,U/->:XD# MRLP \V.,[(>%4IEG&02?FXZ<9KK*,4^;R"QS5O*)T2'"E6CR MSY//!KH=M/Q1BDW<+&7KCLFD31Q\RSX@C'JSG']372V\*V]O%"OW8T"#Z 8K MG;5/[5\0!UYL].)Y[/.1_P"RC]373"IF]$C2BKMR"BBBLCH"BBB@!KNL:[G8 M*HZDG IAN8!G,T8QR?F%)=6L%[ T%S"DL3?>1QD&J;:!I+[]VGVYWJ%;*=0. M@IJW4E\W0?+!8NYD65(91UDCD"G\?7\:9]IN+;.9H+I!U^8(X_H?TH;0-)?? MNT^W.\ -E.H'2AM TE_,W:?;GS,%\I]['3-/W2;S\B:#5+2=B@E5)5^]'(=K M"I_M,(SF:/@X/S"J9T+2RSDV%N2Y!8[.I%#:#I3;]VGVYWL';*=6'0T:#]_R M+GVF'_GK'UQ]X=:/M$/_ #VCZX^\.OI5,Z#I3$YT^W.Y_,/R=6]?K0=!TK)/ M]GV^2_F?<_B]?K1[H>_Y%T3Q,0!*A).,!AUJ2J$.BZ;!*LD5E CJYD#*G(8] M3]:OTG;H4K]0HHHI#"BBB@ HHHH **** "BBB@ HJK-J$$3^6NZ67_GG$-Q_ M'T_&H_+OKK_6.+6/^['\SG\>@_"@">XO(+4#S9 &/11RQ^@'-5_-OKK_ %48 MMH_[\HRQ^B]OQJ>WLK>VR8XQO/5VY8_4FK% ',W5E/H<[WEJLEQ9R'==0@?, MK=Y$ _45?MIX;NW2>WE62)QE64\5KXK%NM 7[0]UIEPUCHSMVS#Y:_FV*>MAK6H_P#'U*FG M0'K';G?*P]W/ _ 4K6W#FO\ "KC;R_D:X.GZ:JS7Y')/W(!_><_TZFM;2M-C MTNT\E&:21B7EE;[TCGJQJ2PTZUTVW\BTA$:9R>Y8^I/4FK51*5]%L;0IV?-+ M<****@V"BBB@ HHHH **** "BBB@ IDR[H9%]5(_2GT4 5-,;=IEL3_SS4?I M5NJ>E?\ (/C7^Z67\F-7* "BBB@ HHHH **** "BBB@ HHHH 0@,,'D5R\T3 M^&YF(5GT=VR"HR;4GKQW3^5=32$!@00"#U!JHRL9SAS>IF1LDL:R1NKHPRK* M<@BG8JG+X?DM9&FT>Y^RECN:W==T+'Z=5_"HCJ&HVO%]HT^!_P M+1A*I_#@ MBM+)[&#;C\2-'%&*S/\ A(K$?>AOE/H;1\_RI1J\TXQ9:1?S$]#(@B7\VI\K M%SQZ,TMM94]U-J-P^G:4WS@XN+L2?4D]R:LT45EN=*22L@HHHH&%%%% !1110!#<74-HJ-/($5W" G^\> * M9#?VUQ;"XBE#1$$JW]X#J1ZBJ>OZ1_;>G+9ERB&9'<@X.T')Q[UDW&@:M=W5 MD\T]KMMMH#(-I(&0>,=P1QG YII(5V=+!=0W,$^*62XBBA: M9G4(H))SZ5R7_"(WGF/ON%?-N(T?>1L/E[-N,2M.W]P\(/^ _XT !U%9&*6D;7#>J\(/JW3\J3[)<7/-W<$+_S MRA^4?B>I_2KJJJ*%4 = !@4M &:NHZ992O:HZ1F,$N$0[5P,G) QG%2VVK6 M-WL$%PK%VV!<$'.,XP?;FL[^S+^.VU"PC6!K>Y,KK,7(8%\\$8YP3USTJ"'0 M[ZQECE@:.X:*42 S2'>X*;"I;';M[<4 :LFN:;$RJ]V@W9.<' .#D]N1CFK MX((R#D&N:CT;4H%9(Q;/Y]NT4K,QPA9V8X&/F'S>U=!:6XM+."W5BPBC5 QZ MG Q0!-1110 4444 )BEHHH **** "BBB@ HHHH **** "BBB@ HHHH **** M*6F\13I_:>O2FK=27S="@=?TH$@W\ M.1)Y9Y_B]*/[?TK('VZ'E_+'/\7I5_RH_P#GFG7/2CRH_P#GFG7/2G[HK3[H MH#7]*8J!?PDL_ECGJWI0OB#27V;;^$[V*+SU([5?\J/_ )YIZ_=H\F/_ )YI M_P!\BCW0M/NB@OB#27V;;^$[R57YNI'6A/$&DR>7LOX3YF0F#UQUJ_Y48Q^[ M3C_9%'E1C'[M..GRBCW0M/NBE#KFF7$D,<-["[S9\L _>QUQ6A3!%&""$48Z M<=*?2=NA2OU,^XU0V\\L7V"]D\M=VZ.+*M[ YY-1MK)4/_Q+-0.U0W$/7/8< M]:U**+KL3:7&[\S-M<0;&V_ODV[O<>HJU112*5[:A1110,**** M "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BL*^\21Q3O M::?";VZ7AMIQ'&?]IOZ#FLR1M7O3FZU-H%/_ "RM%V@?\".2:TC3;U>ASSQ$ M8Z+4Z.V^74KU?78WZ8_I5S-<4=(MV.9)+J1N[-HPCJ4 CE'X=&_2MW3=5M-5A,EK) MDJBW+U%%%0;!1110 4444 %%%% !1110 4444 M%%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !6#?:U= MVU[?".VA>VL8TDE),< =ZWJS+G0K*[O7NI?-)D"B2,2$(^WIN7O3 M5NHF0_\ "3:>-[-YRQ@,4E,9VR%>"%]3DXJ8:Y;#<)(YXG7R]R2)AAO;:N?Q M%1OX:5_#UG+-'+*]P[KLR6F/S[6W+N]<&G[ MH:D$?BS3Y'0>5=*K%<.T)"[6;:&SZ;N*$\6:;+GR?.E;>$143)DSG!'/3Y3U MQ5G^P=/\I8O+;8J(@&\]%?>/UHM] L;4((E<+'*)8U+<(1GI[+K M+S9=T,ZPK%&ZRE0 Y6)(Q.PU:7B&_DL=.VVY_TNX<0P>S M'O\ @,G\*S+2TCLK6.WB^Z@ZGJQ[D^Y-;4XV]YG)7FV^1?,(+:*V@6&"-8XU MZ*HJ3;3]MESGY;#-M&VGX-&*0[#-M5+FR6^C'RR <./[KCN*O M8-!L)QN:&C:LNJ6K%D\JYB;9/"3RC?X'J#6E7'W$ATO4(-53A 1#=#UC) MX;ZJ?TS77@@@$'(K&<;.ZV.RC4F,?K4(O-7XSI4?\ J]W_ !\C[W]WI^M:M&*=_(AQ?\U<>9LTJ-L$;/]) W>O;C%:M%%_(.5]RG M:3WLL\JW-HL,:_ZMQ*&W_AVJY114E)6"BBB@84444 %%%% !1110 4444 %% M%% !1110 4444 %%%% !112&@#FM38W7BF*,_);=V@'V6X4S*' P"0 MA;:&('OG\*5F!IW%NMU;2V[C*RH4/XBKWANZ:ZT"T>0YD5/+<^ZG:?Y5D:=J MT>HRA%@EB)B$R>9CYD+%<\>XJ]X3XTNX'87DP'TW&IG\)5+2I\C>HHHK [0H MHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BB MB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** M "BBB@ HHHH **** "BBB@ HHHH **** .;NU^S^+&STN[0$>[(>?T:G7.G6 MMVV^>$.VT+NR00 2/E!R%//(XZ&G+I=HC.5A M WN)"NX[=P.<@=!SS5[%=A8H#2K19A,L.V0$G*L1G)RY:5TSR"S%OZU4U8->/!I$1_>79_>X_@A'WC^/3\:Z&2QMIHE1XEP@PI' M!4>QZBIF_=L525Y-]BQ15'R;VVY@E%Q&/^6\G@>RMK>18GNYO+\YAD( I/ [DXP*RKK4]1L]9@LQ=>:H\ MH,S0@(^YF!W,/NG XQU- '445R\FN7@TBVN%DC\Z2*X9OEZ% <7? MV]K*YG6Y_P!'6<2J@4KDXVD#CW% &S1110 4444 %%%% !1110 4444 %%%% M !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 M%%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% 1FN7GC M/ARZ9L$Z1,V[(&?LKGKG_8/Z&NHIKHKH4=0RL,$$9!%5&7*9U(:CJ'RZ;8-$A_Y>+P;%'N$ MZG]*T--T6*QF:ZFD>ZOG&&N).H'HHZ*/84:1W!,T73);7S;R]*O?W& M#(5Z1KV1?8?J:UZ**R;;=V=,8J*L@ILD:2H4D174]0PR*=12*,RXT=)(C%&P M,)Y\B8;X_P .X_"HD2UMHC!=Z>D*$!2RC?&0#D<]1SSS6Q1U% %&+3M-=I9X MK:!C.")'4 [P>OYU-:6-K8QF.U@CA4G)"#&:B?3HMQDMV:VD/),7 /U7H:;] MHO+7_CXA$Z#_ ):0#G\5_P * +]%0P74%RI,,JMCJ.X^HJ:@ HHHH **** " MBBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH ** M** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHHH **** "BBB@ HHH MH **** "BBB@ I" P((!'H:6B@"H^F6#MN>QMF/J8E_PJ2*TM[<_N;>*/_<0 M#^53T4[LGE78****104444 %%%% #)O,\E_)V>9@[=_3/O6:HUWY-S:=]P[\ M!_O=L>W2M6BFG8EQN9077<#+Z=G85UWYL/IWW!MR'^_P!\^U:M%'-Y!R>; M,IEU[Y]KZ=]P;;,S;K>]OF ML-N5V\/G'\6?Z5I"EHI-W&E8****104444 %%%% !1110 4444 %%%% !111 M0 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% M!1110 4444 %%%% !1110 4444 %%%% !1110 4444 %%%% !1110 4444 % M%%% !1110 5A^(UF"V+Q7ES;[KI(G\EL95CSVKE.Z[$V?SWD5P+A$66"X>%C'G:V, M