~JQ/var/lib/mailman/archives/private/e3-hacking/2013-March.txt}Vr6}.bߒLl|꺑o3(N=i%-}wI*Ӌݳg}l.q6[ PI0vf]8ٿ\]c~Jʀ3b G1}ۓWc|4v)ӥ2ş$R,0G&E?Ó2+\%*8UzmcHpHL`2Fq7N2ujx呸FeۗԂ6t|p;ޙu FGB,K8.Cgp2%u* 8P07f\kVCx@z2ҭ$i)&UD/Xۆ &4@=؜ нȫ gV>P+eBwRU)GS롹-H΄PGj0djC_[@& ]7Hd@@nHښ(dtob FwO{fJ%I=ApM/ M"8.1xT;0g(-au(M((V(C@+C#R{|KsKI5R9jGݶ9MP4!)Ab D) h[ZXl;6W)xX-KB ʚNpķ ;KRwyP?0R /e(IKhU(n[ߕNˮV<^bJֱ!,$A}jňƋ97p\ˢXF&Qfnm3b *Z_(!f-X[9$ҋGr/MD?Xd:&O_J0m\-yt8_8=n)ANwvqsMlrn~мi^<|>>ԯ?0B3@EZv;ʭֶ7it>&ux9&\[L"qC >`h\h6J F3(@wW;%퍬kaOT es+TeةEh%Z{DYFUK/IS{T>iS!f'\MV\4?CJ:R` !P^2mLwR$BEZPFm#h(#Fqߤ?zD=>Gr8ɞ