Commit 821ec13
authored
File tree
- content
- engineering
- loginradius-launches-cli-enterprise-dashboard
- okta-and-the-lapsus-breach
- sso-for-wordpress-site
- growth
- 10-Video-Marketing-Stats-That-Brands-Cant-Ignore-in-2021
- 10-things-know-about-social-login
- 20-Content-Ideas-for-Most-Engaging-B2B-LinkedIn-Posts
- 360-degree-growth-data-driven
- 4-features-enterprise-software
- 4-tips-secure-frictionless-ux
- 5-signs-ciam-over-traditional-iam
- 5-ways-reduce-cloud-cost-optimization
- 7-Best-Marketing-Emails-to-Attract-Consumers-Right-Away
- 7-mistakes-companies-make-during-digital-transformation
- 7-tips-enjoy-cybersecurity-awareness-month
- 8-Effective-Communication-Strategies-for-Internal-Alignment-and-Growth-in-2021
- 9-facts-about-social-login-and-cro
- A-Brief-Guide-to-Online-Reputation-Management
- B2B-Lead-Generation-for-2021
- Benefits-of-Google-Tag-Manager
- Cybersecurity-Tips-for-Ecommerce-Websites
- Digitization-of-Agile-Marketing-Principles
- Does-Your-website-Imagery-Reflect-Your-Brand-Identity
- Duplicate-Content-and-SEO
- Future-Of-Social-Media-Video-Marketing
- Hotjar-vs-Microsoft-Clarity
- How-customer-retention-can-help-businesses-grow
- How-to-Boost-Your-B2B-Marketing-Strategy-with-Hyper-Personalization
- How-to-Drive-in-the-Highest-Quality-Leads-in-2021-with-Content-and-SEO
- How-to-add-Twitter-Blue-Checkmark
- Instagram-vs-Facebook-Which-One-is-Better-for-Your-Business-in-2021
- Is-AI-Really-Transforming-the-Digital-Marketing-Industry
- Leverage-Website-for-More-Conversions
- PR-Trends-to-Consider-in-2021
- Top-10-Tips-to-Enhance-Your-Creativity-While-Working-From-Home
- Top-5-Features-of-Google-My-Business-for-Marketers
- Top-5-Marketing-Strategies-to-Power-up-Your-Business
- Top-5-SEO-Tools-for-Auditing-WordPress-Website
- Top-UI-UX-Design-Tools-2021
- Twitter-for-B2B-Marketing-in-2021
- Understanding-Growth-Hacking-and-How-SaaS-Businesses-Can-Use-It-to-Optimize-Growth
- Vaccine-Success-can-Impact-the-Remote-Working-Culture
- Which-Marketing-Strategy-is-Best-for-You
- Why-Video-Testimonials-Are-A-Marketing-Must
- Why-is-Consumer-Onboarding-Critical-for-Startups
- advantage-social-login-as-marketer
- ai-innovations-transforming-compliance
- attract-consumers-to-your-website
- authentication-challenges-retail-industry
- authentication-critical-customer-acquistion-tool
- authentication-evolution-to-passwordless
- authentication-mainstream-marketers-benefit
- authentication-tools-boost-sales
- b2b-saas-security-management
- b2c-enterprises-ciam-retail-supply-chain
- balance-between-personalization-data-privacy
- best-brainstorming-tools-and-techniques
- best-practices-verification-emails-effective
- biometric-authentication-security-cx-balance
- boost-your-business-sales-with-marketing-business
- boosting-ecommerce-marketing-social-login
- build-customer-journeys-data-transparency
- business-advantages-cloud-computing
- business-review-meeting-success
- cdp-ciam-cookieless-marketing
- change-management-consumer-security-tool
- ciam-budget-2023-recession
- ciam-challenges-saas-business-app
- ciam-improves-customer-trust-and-loyalty
- ciam-minimizes-expenses-access-management
- ciam-opportunity-for-cmos
- ciam-prevents-abandoned-carts
- ciam-solution-digital-native-business
- consent-management-business-advantages
- consent-management-online-retail
- consumer-experience-and-privacy
- consumer-experience-b2b-saas
- consumer-identity-role-in-the-digital-banking
- consumer-identity-rule-personalized-marketing-2022
- consumer-journey-from-sign-up-to-purchase
- consumer-management-to-consumer-engagement
- consumer-onboarding-strategies-for-saas-businesses
- consumer-sentiments-on-modern-identity
- continuous-adaptive-authentication-future-2024
- customer-experience-media-entertainment-industry
- customer-experience-retail-industry
- customer-identity-drives-business-growth
- customer-identity-drives-digital-eCommerce-success
- customer-identity-resolution-marketing-success
- customer-identity-use-case
- customer-relationship-business
- customer-retention-magic-links
- customize-marketing-programs-on-consumer-journey
- cyberinsurance-2023-insurers-adapt-survive
- data-privacy-boost-marketing-success
- data-privacy-marketers-success
- data-privacy-marketing-regulations
- digital-identity-key-to-economic-growth
- digital-trust-business-invest-2022
- driving-merchant-growth-robust-authentication
- driving-success-through-customer-onboarding
- ecommerce-social-login-success
- emotional-intelligence
- engineering-as-marketing
- enhance-customer-experience-in-insurance-companies-with-ciam
- enhancing-ciam-customer-experience
- enterprise-level-security-trends
- evolution-digital-identity-better-cx
- finding-ideal-customer-user-profile-management
- free-resources-that-you-might-not-have-heard-of
- future-customer-authentication-market-needs
- future-of-authentication-service-market
- good-transaction-security
- grow-business-with-right-identity-strategy
- high-performing-growth-team
- how-CISO-can-improve-collaboration-on-security-risks
- how-businesses-approach-customer-security
- how-ciam-and-crm-integration-optimize-cx
- how-ciam-can-resolve-retail-industry-challenges
- how-consumer-identity-influence-brand-recognizability
- how-digital-identity-unlock-success-in-retail
- how-identity-management-help-mistaken-identity
- how-mfa-makes-qsr-promotions-fraud-free
- how-retailers-balance-security-ux
- how-to-improve-the-customer-xperience
- how-to-learn-copywriting
- how-to-leverage-email-automation-personalization
- how-to-make-personalized-marketing-effective-with-consumer-identity
- how-to-protect-consumer-social-identity
- how-to-use-identity-marketing-privacy-centric-world
- hybrid-workforce
- identity-at-centre-of-your-customer-strategy
- identity-convergence-market-dominance
- identity-management-critical-revenue-generation
- identity-management-for-better-cx
- identity-management-reduce-cpa-marketers
- identity-proofing-orchestration-security
- identity-resolution-data-accuracy
- identity-security-digital-trade
- identity-verification-in-customer-journey
- identity-verification-retailers-benefits
- implement-continuous-authentication-business-value
- importance-customer-health-scoring-saas-businesses
- importance-customer-onboarding
- improve-customer-experience-ecommerce
- improve-customer-experience-hospitality-industry
- improve-customer-relation-brand-identity
- improve-ecommerce-store-security
- improving-airline-customer-experience
- improving-customer-experience-in-the-gaming-industry
- improving-customer-fan-experience-sports-entertainment-industry
- inside-business-of-digital-privacy
- lead-era-customer-centric-marketing
- loginradius-certified-great-place-to-work
- loginradius-digital-identity-to-build-the-public-sector-of-the-future
- lr-commitment-customer-security
- lr-top-ciam-platform-cio-review
- manage-privacy-compliance-in-cookieless-world
- master-cro-customer-data
- maximize-roi-of-your-identity-projects
- modern-identity-customer-behavior
- multi-brand-ecommerce-experience-sso
- multi-brand-strategy-for-digital-enterprises
- multi-factor-authentication-ivr-banking
- north-star-metrics-nsm
- nurture-and-convert-leads-with-power-of-ciam
- omnichannel-customer-experience
- ott-authentication-boost-lead-generation-2022
- password-manager-tips
- passwordless-auth-reduces-pain-points-cx
- passwordless-authentication-customer-retention
- people-important-in-customer-iam
- power-of-adaptive-authentication
- power-of-login-box-for-seamless-user-experience
- prevent-identity-disclosure-spiderman
- product-marketers-ciam-login
- product-marketing-tips-for-b2c
- progressive-profiling-lead-generation-tool
- publishers-start-using-single-sign-on
- qr-code-in-marketing
- questions-to-ask-your-identity-provider-2022
- reasons-business-needs-customer-identity-strategy
- risk-based-authentication-gaming-industry
- role-cookieless-authentication-marketers
- role-it-marketing-customer-identity-management
- role-of-frictionless-payments-for-businesses
- role-sso-in-digital-marketing
- saas-consumer-support
- scale-business-with-loginradius-customer-segmentation
- secure-your-remote-workforce-with-identity-management
- secure-your-wi-fi-against-hackers
- sign-up-tips-conversion-rate
- smooth-onboarding-positive-user-impression
- sso-saas-business-sales
- stakeholder-engagement-modernize-ciam
- striking-balance-with-identity-orchestration
- successful-saas-onboarding-process
- the-relative-importance-of-customer-identity
- tips-and-tricks-b2b-consultant
- tips-managing-remote-team
- tips-on-how-cisos-convince-board-members
- top-3-ciam-indicators
- top-8-ciam-challenges-with-your-saas-business-app
- unified-identity-ensures-great-customer-interactions
- user-access-management-business-security
- user-onboarding-tools
- what-advanced-identity-means-for-cx
- what-is-digital-privacy
- what-is-identity-resolution
- what-is-omnichannel-cx
- when-to-switch-your-security-vendor
- why-brand-authenticity-is-important
- why-should-implement-social-login-authentication
- zero-party-data
- identity
- 10-black-friday-cyber-monday-tips-for-businesses
- 1fa-vs-2fa-vs-mfa
- 2fa-mfa-key-differences
- 2fa-security-measures
- 3-digital-onboarding-trends-2023
- 3-stages-gartner-carta-it-security
- 4-barriers-building-digital-business-overcome
- 5-access-management-best-practices-enterprises
- 5-myths-about-phishing-attack
- 5-ways-to-handle-a-data-breach
- 6-reliable-authentication-methods-customers
- 7-uncommon-cyberattacks-2023
- 7-web-app-sec-threats
- Maintaining-Quality-Data-Security-Practices
- Multi-Factor-Authentication-A-Beginners-Guide
- OAuth-authentication-vulnerabilities
- OAuth2-0-guide
- Put-Yourself-In-Control-of-Your-Data-by-Leveraging-LoginRadius-SSO
- Single-Sign-On-A-Beginners-Guide
- Top-10-Cybersecurity-Predictions-for-2021-That-SMBs-Must-Know
- What-is-User-Management
- account-security-consumers
- adaptive-authentication
- advanced-identity-security-based-attacks
- advanced-risk-based-authentication-2024
- ai-revolutionizing-user-authentication
- ai-security-risk-management
- alok-patidar-answers-cybersecurity-questions
- announcing-new-look-of-loginradius
- api-authentication-analytics
- apple-lockdown-mode-robust-security
- assess-improve-your-authentication-system
- attack-surface-vs-attack-vector
- aurora-wdc-loginradius-customer-success-story
- authenticating-in-the-age-of-no-code-technology
- authentication-identity-verification-identification
- authentication-option-for-your-product
- authentication-sso-native-mobile-apps
- authentication-vs-authorization-infographic
- authentication-vulnerabilities-security
- b2b-saas-security-challenges-iam
- b2b-saas-sso-login
- balancing-security-cx
- beginners-guide-zero-trust-security
- benefits-of-mfa
- benefits-of-reauthentication
- benefits-single-sign-on
- best-idaas-provider-loginradius
- best-practices-choosing-good-security-questions
- best-practices-username-password-authentication
- best-sso-providers-loginradius
- biometric-authentication-mobile-apps
- biometric-multi-factor-authentication
- biometric-vs-password-authentication
- bot-attacks
- bring-your-own-identity
- broadcastmed-loginradius-customer-success-story
- brute-force-lockout
- build-vs-buy-securing-customer-identity
- calcualting-roi-build-vs-buy
- ccpa-introduction
- ccpa-vs-gdpr-the-compliance-war
- changing-user-authentication-in-metaverse
- choosing-right-zero-trust-vendor
- ciam-addresses-utility-issues
- ciam-business-privacy-users
- ciam-data-security-user-trust
- ciam-deployment-flexibility
- ciam-improve-customer-support
- ciam-role-enterprise-decision-making
- ciam-trends-2021
- cisos-top-cybersecurity-threats-from-scattered-spider-to-deepfakes
- cloud-computing-security-challenges
- cloud-governance-business
- cloud-identity-platform
- cloud-security-governance-digital-protection
- cloud-security-management
- common-vulnerabilities-password-based-login
- consent-management
- consumer-data-privacy-security
- consumer-digital-identity-trends-report-2024
- consumer-identity-management-cmo-ciso-cio
- continuous-authentication
- converged-identity-platforms
- cookie-management-gdpr-ccpa
- corporate-account-takeover-attacks
- cross-device-authentication-enterprises
- customer-identification-challenges-retail
- customer-identity-and-access-management
- customer-identity-infrastructure-cruise-line-passengers-dont-see
- customer-identity-preference-trends-q1-2016
- customer-identity-preference-trends-q2-2016
- customer-identity-verification-best-practices
- customer-success-story-iom-x
- cyber-insurance-guide-2022
- cyber-threats-business-risk-covid-19
- cybersec-roundup-june-2021
- cybersecurity-attacks-business
- cybersecurity-awareness-month-2023
- cybersecurity-best-practices-for-enterprises
- cybersecurity-trends-2024
- d2c-brands-utilize-ciam-for-growth
- data-breaches-common-mistakes
- data-governance-best-practices
- data-privacy-compliance-future
- data-privacy-immediate-enterprise-priority
- data-security-best-practices
- data-security-hospitality-industry
- decentralized-authentication-future-of-authentication
- decoding-ethics-identity-first-security
- difference-between-authentication-login
- difference-between-identity-fabrics-zero-trust
- difference-between-incident-response-disaster-recovery
- difference-between-personal-info-pii
- difference-sso-social-login
- digital-agility
- digital-identity-verification
- digital-privacy-best-practices
- digital-transformation-consumer-iam
- dns-cache-poisoning
- ecommerce-security
- effortless-migration-login-hassles
- eidas-2-0-digital-revolution-transformation
- enterprise-application-security
- enterprise-single-sign-on-authentication
- etc-loginradius-customer-success-story
- federated-identity-management-vs-sso
- federated-identity-providers
- financial-grade-api-open-banking
- financial-industry-identity-management
- fix-identity-to-fix-citizens-security
- free-developer-plan-for-authentication
- google-one-tap-login
- govt-access-control-challenges-2022
- govtech-shaping-future-gov-services
- guide-choosing-right-ciam-solution
- guide-consent-management
- guide-to-five-a-of-cloud-identity-management
- hackproof-smartphone-security
- handling-scalability-security-loginradius
- history-human-identity-part-3
- history-identity-part-1
- history-identity-part-2
- how-ciam-helps-ott-platforms-scale-million-viewers
- how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach
- how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020
- how-secure-2fa
- how-to-choose-a-secure-password
- how-to-handle-data-breaches
- how-to-identity-mitigate-deepfake-attacks
- how-to-improve-customer-verification-process
- how-to-protect-business-BGP-hijacking
- how-to-setup-2fa-in-online-accounts
- how-to-stop-phone-hacking
- how-ui-ux-affects-registration
- iam-or-ciam-right-call-business-growth
- identity-access-management-best-practices
- identity-as-a-service-for-business
- identity-governance-cloud-security-compliance
- identity-governance-unlocks-digital-transformation
- identity-governance-vs-identity-management
- identity-governance
- identity-lifecycle-management
- identity-management-developers
- identity-management-for-education
- identity-management-healthcare
- identity-management-in-cloud-computing
- identity-management-in-media-industry
- identity-modernization-business-success-2022
- identity-proofing
- identity-security-device-trust-2024
- identity-system-customization
- identity-theft-frauds
- identity-theft-impact-on-businesses-in-2023
- identity-verification-challenges-and-solutions
- ifma-loginradius-customer-success-story
- improving-customer-experience-public-sector
- infographic-the-death-of-passwords
- iot-authentication-airlines
- iot-botnet-attacks-enterprises
- iot-smart-authentication
- is-password-reset-ruining-cx
- json-web-token-stolen
- just-in-time-migrations-ciam-transitions
- kuppingercole-names-lr-ciam-leader-2024
- legal-implications-of-sso
- login-security
- login-using-microsoft-account
- login-with-google-apps
- loginradius-announces-user-management
- loginradius-bans-zoom
- loginradius-business-continuity-covid-19-outbreak
- loginradius-ceo-shifting-data-strategies
- loginradius-ciam-china-business
- loginradius-ciam-retail-ecommerce-business
- loginradius-consumer-audit-trail-data-analysis
- loginradius-consumer-digital-identity-report-2023
- loginradius-consumer-digital-identity-trend-report-2020
- loginradius-consumer-identity-trend-report-2022
- loginradius-creates-trusted-digital-experience
- loginradius-federated-identity-management
- loginradius-identity-brokering
- loginradius-identity-experience-framework
- loginradius-identity-import-manager-data-migration
- loginradius-launches-passwordless-login-with-magic-link-or-otp
- loginradius-launches-voice-otp-authentication
- loginradius-m2m-authorization-data-access
- loginradius-named-ciam-leader-owi
- loginradius-password-policy-business-consumer
- loginradius-perfectmind-integration-sso-ux
- loginradius-pin-based-authentication
- loginradius-private-cloud-ciam-benefits
- loginradius-progressive-profiling
- loginradius-roi-enterprises-infographic
- loginradius-secures-identity-management-bc-municpality
- loginradius-self-serve-no-code-ciam-console
- loginradius-streamlines-user-onboarding-harry-rosen
- loginradius-to-spread-cybersecurity-awareness
- loginradius-top-performing-blogs-2021
- loginradius-webhook-datasync-realtime
- looking-gigya-alternative-try-loginradius-superior-modern-identity-platform
- low-code-ciam-user-experience
- lr-launches-autolookup-idp
- lr-launches-identity-orchestration
- lr-leads-ciam-landscape-2024-beyond
- lr-push-notification-mfa
- lr-reshapes-authentication-healthcare-company
- mapegy-loginradius-customer-success-story
- marriott-data-breach-2020
- media-entertainment-use-loginradius-platform
- mfa-fatigue-attacks-cybersec-menace
- mfa-prompt-bombing-businesses
- mfa-vs-rba
- mfa-vs-sso
- mobile-authentication
- multi-cloud-environment-optmization-challenges
- multi-tenancy-ciam-security
- new-age-ciam
- nist-password-guidelines-2021
- no-code-ciam-churn-reduction
- no-code-identity-orchestration-cx
- okta-acquires-auth0
- okta-hack-breach-lessons
- okta-token-theft-cloudflare-security
- oktapus-phishing-targets-okta-identity-credentials
- one-time-passwords-security-benefits
- online-casino-and-gambling-cyber-threat
- online-security-passkeys
- online-shopping-tips
- ott-simplify-authentication
- pam-best-practices
- passive-authentication-cx-future
- passkeys-online-authentication-experience
- passkeys-online-shopping-experience
- password-history-expiration-complexity
- password-spraying
- passwordless-authentication-automation
- passwordless-authentication-the-future-of-identity-and-security
- passwordless-login-future-authentication
- passwordless-magic-links
- phishing-for-identity
- phishing-resistant-mfa-login-mobile-apps
- pii-compliance-enterprise
- pki-future-secure-communications
- poor-login-concurrency-impact-ott-platforms
- presenting-progressive-profiling-loginradius
- prevent-accidental-data-exposure-company
- prevent-credential-stuffing-attacks
- privacy-compliance
- privacy-data-security-retail
- privacy-policy-management
- progressive-disclosure-user-onboarding
- progressive-profiling
- pros-cons-open-source-project
- pros-cons-reusable-digital-identity
- pros-cons-token-authentication
- public-cloud-risks-organization-ready
- push-notification-authentication
- real-time-techniques-detect-phishing-attacks
- reconsidering-social-login-security-privacy-angle
- rede-gazeta-loginradius-customer-success-story
- reduce-attack-surface-online-business
- refresh-tokens-jwt-interaction
- rise-of-machine-identity-m2m-authorization-role
- risk-based-authentication
- risk-management-essentials-enterprise
- risk-management-with-holistic-apis
- role-of-ciam-in-iot-security
- role-of-customer-authentication-digital-first-cx
- saas-security-iam-effective-governance
- safe-data-act
- saml-or-oidc-for-business
- saml-sso
- sase-zero-trust
- scale-business-with-identity-management
- seamless-customer-journey-identity-management
- secure-centralized-access-management-without-compromising-cx
- secure-data-amidst-identity-crisis-via-identity-based-access
- secure-email-address-website
- securing-digital-frontier-using-ai
- securing-enterprise-mobile-apps
- securing-gen-ai-rbac-implementation
- security-ux-can-coexist
- self-managed-vs-service-based-sso-solutions
- silver-saml-digital-identity-protection
- single-page-applications
- single-tenant-vs-multi-tenant
- skiperformance-loginradius-customer-success-story
- smart-cities-improve-unified-identity
- smart-citiy-cybersecurity-trends-2022
- smart-credentials-raising-bar-physical-ids
- sms-authentication-protect-business
- social-authentication
- social-engineering-attacks
- social-login-infographic
- social-media-privacy-threats-2022
- sso-business-strategy
- sso-integration-secure-cx
- sso-integrations-must-for-online-businesses
- sso-leverage-for-data-collection
- stay-compliant-with-data-privacy-laws-2023
- step-up-authentication-loginradius
- stop-scammers-getting-email-address
- strategies-secure-cloud-operations
- streaming-applications-secure-customer-data
- the-dual-nature-of-digital-identity
- things-customer-iam-leaders-prioritize-2023
- things-to-know-before-creating-ciam-strategy
- tips-from-loginradius-security-expert-2022
- tips-from-loginradius-security-expert-2023
- tiroler-loginradius-customer-success-story
- token-management-api-product-jwt
- top-10-blogs-2023
- top-authentication-methods
- top-readers-blogs-2022
- transform-business-with-loginradius-ciam
- true-passwordless-authentication-cyberattacks
- types-of-mfa
- understanding-on-premise-vs-cloud-iam-difference
- unified-cx-retail
- unlock-the-future-of-smart-cities
- use-multi-factor-authentication-dont-cell-phone-access
- user-authentication-evolution-challenges
- user-onboarding-revamp-application
- user-provisioning-mistakes
- user-session-management
- webauth-secures-user-login
- what-are-security-keys
- what-are-self-sovereign-identities
- what-is-OTP-authentication
- what-is-Phone-Login
- what-is-a-2fa-bypass-attack
- what-is-account-creation-fraud
- what-is-broken-authentication
- what-is-browser-in-browser-attack
- what-is-cloud-computing
- what-is-cloud-identity-and-its-benefits
- what-is-cloud-security
- what-is-decentralized-authentication
- what-is-digital-transformation
- what-is-distributed-multi-cloud-identity-management
- what-is-dynamic-authorization
- what-is-federated-identity-management
- what-is-federated-sso
- what-is-formjacking
- what-is-iam
- what-is-identity-modernization
- what-is-identity-provider
- what-is-identity-security
- what-is-identity-verification
- what-is-ldap-authentication-and-how-it-works
- what-is-login-authentication
- what-is-mitre-att-ck-framework
- what-is-mob-biometric-authentication
- what-is-oauth
- what-is-openid-connect
- what-is-out-of-band-authentication
- what-is-password-vault-how-does-it-work
- what-is-passwordless-login
- what-is-pin-authentication
- what-is-privileged-access-management
- what-is-rbac
- what-is-replatforming
- what-is-salt
- what-is-single-sign-on
- what-is-social-login
- what-is-standard-login
- what-is-token-authentication
- what-is-web-sso
- what-is-workflow-automation
- what-to-do-when-email-hacked
- why-business-needs-robust-identity-authentication
- why-multi-factor-authentication-imp-sso
- worst-passwords-list-2019
- zero-party-data-experience
- zero-trust-bulletproof-security-policy
- zero-trust-cybersecurity-government-sector
Some content is hidden
Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
Lines changed: 1 addition & 1 deletion
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
87 | 87 | | |
88 | 88 | | |
89 | 89 | | |
90 | | - | |
| 90 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
87 | 87 | | |
88 | 88 | | |
89 | 89 | | |
90 | | - | |
| 90 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
50 | 50 | | |
51 | 51 | | |
52 | 52 | | |
53 | | - | |
| 53 | + | |
54 | 54 | | |
Lines changed: 1 addition & 1 deletion
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
204 | 204 | | |
205 | 205 | | |
206 | 206 | | |
207 | | - | |
| 207 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
207 | 207 | | |
208 | 208 | | |
209 | 209 | | |
210 | | - | |
| 210 | + | |
Lines changed: 1 addition & 1 deletion
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
120 | 120 | | |
121 | 121 | | |
122 | 122 | | |
123 | | - | |
| 123 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
90 | 90 | | |
91 | 91 | | |
92 | 92 | | |
93 | | - | |
| 93 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
66 | 66 | | |
67 | 67 | | |
68 | 68 | | |
69 | | - | |
| 69 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
82 | 82 | | |
83 | 83 | | |
84 | 84 | | |
85 | | - | |
| 85 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
108 | 108 | | |
109 | 109 | | |
110 | 110 | | |
111 | | - | |
| 111 | + | |
0 commit comments