/home/arranoyd/mail/.spam/cur/1659052418.M207270P107570.nl53.altushost.com,S=20401,W=20698:2,
Return-Path: <msbounce@bounce.techmarketingguide.com>
Delivered-To: arranoyd+spam@nl53.altushost.com
Received: from nl53.altushost.com
	by nl53.altushost.com with LMTP
	id dS6JC4Ih42IypAEAmQ2V0w
	(envelope-from <msbounce@bounce.techmarketingguide.com>)
	for <arranoyd+spam@nl53.altushost.com>; Fri, 29 Jul 2022 01:53:38 +0200
Return-path: <msbounce@bounce.techmarketingguide.com>
Envelope-to: tbarmann@nobelcorporation.hr
Delivery-date: Fri, 29 Jul 2022 01:53:38 +0200
Received: from relay1271.mysmtp2.com ([194.9.86.70]:37535)
	by nl53.altushost.com with esmtps  (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
	(Exim 4.95)
	(envelope-from <msbounce@bounce.techmarketingguide.com>)
	id 1oHDJw-000Rq3-69
	for tbarmann@nobelcorporation.hr;
	Fri, 29 Jul 2022 01:53:38 +0200
Received: from [non-disclosed] for <tbarmann@nobelcorporation.hr>; Thu, 28 Jul 2022 20:36:50 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
	d=techmarketingguide.com; s=default; t=1659033411;
	bh=xUWsfneW8K19u5wuzdJzUB0eislc9KoaGSFdLhj+9OQ=;
	h=To:Subject:List-Unsubscribe:Date:From:Reply-To:From;
	b=bDj22YuPMwqcbzn/pbiHxdNA/DIWZ1qJ4yVAvTi7mpOR8n2kSVtUWP/Hi0Z1tI7Cr
	 0MJ2ijRJFu3wm5V7JtXDsS0hYHPyEzCt6fj+ne6O7cewN0atqkwmq+a5/PRaDV0fgO
	 IrHz+OszbBBmCCPws5r/7eKZPHfEipymWGE5Lj20=
To: tbarmann@nobelcorporation.hr
List-Unsubscribe: <http://track.techmarketingguide.com/?xul=4vb9cxch476it4v6ddy4skr2khwbff3mc6yspccs3meecyhrfswem5v6widn84mwbvw5zexvrt13sezh875wjpp9d2m99l&amp;ei=tbarmann@nobelcorporation.hr>
Content-ID: oJScoTyhMl4mYwueZl5jq2DlqJRhpUqypQV1YwRmpQR=$!$
Date: Thu, 28 Jul 2022 18:36:50 +0000
From: Tech Marketing Guide <news@techmarketingguide.com>
Reply-To: Tech Marketing Guide <news@techmarketingguide.com>
Content-Type: multipart/alternative;
 boundary="=_3a805f677253fc852eb0a6cfedcbdb45"
MIME-Version: 1.0
Message-Id: <20220728183650.D667621BA8@relay1269.mysmtp2.com>
X: eyJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiYWxnIjoiQTEyOEtXIn0.qXE-5ng3l0acgQvUwRJOqwhjumVcZIrfDVPcRSMowELHht28MGDZRA.hztWsweN5KzgCIPJ3lSVvA.M-DzXAtD6Mdl04iOT_PuOgO3i2r0dHVb1bqzQ49O2AXcFgQdDw3bYx2F-3QSjXNy-ouyme-LGBZzNjRTjW07-EmeCCvRdF4FTNdfKyAUcjummYQ-p0wURVHyslRVQIdPY7kpRWCnEX1-roo6DbHL4IbGNIr8VQLm2Y7ibDX3duqvuG9YaH5ZrhR-H6ukRD1TI8YLWJRAWfxaMQ05FCaY5UufR76MsimCnoEZ7O3moetWk4qXBaHQ1xKcQKq5x9D-CPS0KZkZLzdARck5vlNhrb4Qo13gmQWbaECaXCxEsQDaLe-wR-SezkRrKchKN5GLI8l-qpM9tc6g7I9hh5RVsA.2SZZUfAXNQ0ft9y5iQQK_Q
X-Spam-Status: Yes, score=8.4
X-Spam-Score: 84
X-Spam-Bar: ++++++++
X-Spam-Report: Spam detection software, running on the system "nl53.altushost.com",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  3 Tips for Endpoint Security: How to Protect your Virtual
   Workforce http://track.techmarketingguide.com/?xtl=p0rsbo5p2ytyrywxwrgcdulv6653bn57t1zxoygsdhxqx1htgweojoubzmube3pysqgwj0ldpf8wo6s8kbe1c9e4apk
    [...] 
 Content analysis details:   (8.4 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was
                             blocked.  See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: mcusercontent.com]
 -0.0 SPF_PASS               SPF: sender matches SPF record
  1.1 DATE_IN_PAST_03_06     Date: is 3 to 6 hours before Received: date
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.2 KAM_TRACKIMAGE         RAW: Message has a remote image explicitly meant
                             for tracking
 -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from
                             envelope-from domain
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from
                             author's domain
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily
                             valid
  1.7 RAZOR2_CHECK           Listed in Razor2 (http://razor.sf.net/)
  2.4 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
                             [cf: 100]
  0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay
                             lines
  0.0 T_KAM_HTML_FONT_INVALID Test for Invalidly Named or Formatted
                             Colors in HTML
  3.2 KAM_ACCOUNTPHISH       Spam that tries to get account information
X-Spam-Flag: YES
Subject:  ***SPAM***  3 Tips for Endpoint Security: How to Protect your Virtual Workforce
X-From-Rewrite: unmodified, forwarded message

--=_3a805f677253fc852eb0a6cfedcbdb45
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

3 Tips for Endpoint Security: How to Protect your Virtual Workforce=0Aht=
tp://track.techmarketingguide.com/?xtl=3Dp0rsbo5p2ytyrywxwrgcdulv6653bn5=
7t1zxoygsdhxqx1htgweojoubzmube3pysqgwj0ldpf8wo6s8kbe1c9e4apkd2k3vtlkxqxr=
xvi56f4tv7hhibb0sb1tu55o6bqo6yc5nwa7howd9zig1yib1odgjo7k4f0mgofrzabrg5hh=
85g4cljnpbfn2ddu43qxc2ygrv3g0x52ob5f4oaaxzru4unwmxgprrrwv8ph1uwnyt56x7bc=
858azwnqsg4a7nz0indrnjoe3obyj7fjii31b&eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2=
sj2586h0x5paf48r9=0A=0Ahttp://track.techmarketingguide.com/?xtl=3Dp0rsbo=
5p2ytyrywxwrgcdulv6653bn57eu9ky2qo1n31eulg8q2x8r27wcb8zd4ofis7o2awppwp3b=
j3d0skhmqrhwbah2uqnzloz26zdlef8ve3d1vkogjz226duq8nc2msb4kd12x1zhd4ibxmz6=
30ilsj3mpjt407q47muzt3nek96409ottzpvym9rwp8eo68sy5sgmi994938zhy73r1758o0=
x0ys95g5vy8uqr6l2zsq4xu6w6gai95cp37xemf0rxkb3pfjg4mqah5ou1j0fd&eih=3D1pg=
kibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9=0A=0ANearly two thirds of org=
anizations face endpoint attacks that compromise data or IT infrastructu=
re. With so many employees working remotely, endpoint devices are even m=
ore vulnerable.=0A=0A In the e-book, "3 Tips for Endpoint Security: How=
 to Protect your Virtual Workforce," you'll learn how to strengthen endp=
oint security from chip to cloud to help make IT more efficient and your=
 people more productive. All with a solution you already own: Microsoft=
 365.=0A=0ALEARN MORE=0Ahttp://track.techmarketingguide.com/?xtl=3Dp0rsb=
o5p2ytyrywxwrgcdulv6653bn583kinhtk7mcwb0046y7ofvtxbu6hdvqh37q1fd4ppoji5h=
9pkvn5i0n0d2dsyz6j95o03hujc03srzl2am78000gfr2i0hz4scc8cdve6tsk7l6d05uovz=
rt0t72igofc57bwrqkjoxuotc1m6phdb1zj19jtd3yyq62yqmphqwddjp65tnuyhbu8qkeo5=
bxcz24i8hub8yjehpfarz2xezq5w53gd5nbx2iqmpgnxydrcui583cf2h26jkxi&eih=3D1p=
gkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9=0A=0ACopyright =C2=A9 2022 T=
ech Marketing Guide=0Anews@techmarketingguide.com=0A=0A316 California Av=
e. #34 Reno NV 89509 United States=0A=0A=C2=A0=0A=0A This email was sent=
 by Tech Marketing Guide. We respect your privacy. To learn more about o=
ur lawful basis for processing your personal data, about the recipients=
 or categories of recipients with whom we may share your personal data,=
 and how you may exercise your privacy rights, please view our=C2=A0=0AP=
rivacy Notice.=0Ahttp://track.techmarketingguide.com/?xtl=3D86i2ghc6z8dp=
a65fxzj2jwh1zutncibekbfevw3oh6w5ob5o7ig6kp2j3kaq5xf21ndw8qs3caw28sb7nwrw=
nexoxgoxym8clnrkpzgndadscy6xjpqkyfzsc8hgda1awcixe2nb0u7g6goot8ibg52kyeqy=
xfebkxz3gefflmb3jm5naz5sfx&eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5p=
af48r9=0A=C2=A0To opt-out of future emails from us, please click=0Ahere=
=0Ahttp://track.techmarketingguide.com/?xul=3D4iff261a6t2ljkxsln6hvz3tsf=
dba5scx1ao8wjs32fnpcdzyzxbx6fkvzn0ysu0okz83bsgp33c8yz6kgrj2ta6he08ac4fbu=
08rd4fyr5d3t0&eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9=0A.

--=_3a805f677253fc852eb0a6cfedcbdb45
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html>=0A<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:=
o=3D"urn:schemas-microsoft-com:office:office" lang=3D"en"><head><meta co=
ntent=3D"text/html; charset=3Dutf-8" http-equiv=3D"Content-Type"><title>=
</title><meta name=3D"viewport" content=3D"width=3Ddevice-width,initial-=
scale=3D1"><!--[if mso]><xml><o:OfficeDocumentSettings><o:PixelsPerInch>=
96</o:PixelsPerInch><o:AllowPNG/></o:OfficeDocumentSettings></xml><![end=
if]--><style>=0A*{box-sizing:border-box}body{margin:0;padding:0}a[x-appl=
e-data-detectors]{color:inherit!important;text-decoration:inherit!import=
ant}#MessageViewBody a{color:inherit;text-decoration:none}p{line-height:=
inherit}.desktop_hide,.desktop_hide table{mso-hide:all;display:none;max-=
height:0;overflow:hidden}@media (max-width:520px){.image_block img.big,.=
row-content{width:100%!important}.mobile_hide{display:none}.stack .colum=
n{width:100%;display:block}.mobile_hide{min-height:0;max-height:0;max-wi=
dth:0;overflow:hidden;font-size:0}.desktop_hide,.desktop_hide table{disp=
lay:table!important;max-height:none!important}}=0A</style></head><body s=
tyle=3D"background-color:#fff;margin:0;padding:0;-webkit-text-size-adjus=
t:none;text-size-adjust:none">=0A<table class=3D"nl-container" width=3D"=
100%" border=3D"0" cellpadding=3D"0" cellspacing=3D"0" role=3D"presentat=
ion" style=3D"mso-table-lspace:0;mso-table-rspace:0;background-color:#ff=
f"><tbody><tr><td><table class=3D"row row-1" align=3D"center" width=3D"1=
00%" border=3D"0" cellpadding=3D"0" cellspacing=3D"0" role=3D"presentati=
on" style=3D"mso-table-lspace:0;mso-table-rspace:0"><tbody><tr><td><tabl=
e class=3D"row-content stack" align=3D"center" border=3D"0" cellpadding=
=3D"0" cellspacing=3D"0" role=3D"presentation" style=3D"mso-table-lspace=
:0;mso-table-rspace:0;color:#000;width:500px" width=3D"500"><tbody><tr><=
td class=3D"column column-1" width=3D"100%" style=3D"mso-table-lspace:0;=
mso-table-rspace:0;font-weight:400;text-align:left;vertical-align:top;pa=
dding-top:5px;padding-bottom:5px;border-top:0;border-right:0;border-bott=
om:0;border-left:0">=0A<table class=3D"divider_block block-1" width=3D"1=
00%" border=3D"0" cellpadding=3D"10" cellspacing=3D"0" role=3D"presentat=
ion" style=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=3D"pa=
d"><div class=3D"alignment" align=3D"center"><table border=3D"0" cellpad=
ding=3D"0" cellspacing=3D"0" role=3D"presentation" width=3D"100%" style=
=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=3D"divider_inne=
r" style=3D"font-size:1px;line-height:1px;border-top:3px solid #0068a5">=
<span>=E2=80=8A</span></td></tr></table></div></td></tr></table><table c=
lass=3D"text_block block-2" width=3D"100%" border=3D"0" cellpadding=3D"0=
" cellspacing=3D"0" role=3D"presentation" style=3D"mso-table-lspace:0;ms=
o-table-rspace:0;word-break:break-word"><tr><td class=3D"pad" style=3D"p=
adding-left:20px;padding-right:20px"><div style=3D"font-family:sans-seri=
f"><div class=3D"txtTinyMce-wrapper" style=3D"font-size:14px;mso-line-he=
ight-alt:16.8px;color:#555;line-height:1.2;font-family:Arial,Helvetica N=
eue,Helvetica,sans-serif"><p style=3D"margin:0;font-size:14px;text-align=
:center">=0A<span style=3D"font-size:22px;"><strong><a href=3D"http://tr=
ack.techmarketingguide.com/?xtl=3Dp0rsbo5p2ytyrywxwrgcdulv6653aha7805c2x=
3ati9y2s277i2oiebze815ssz3y3ioo29r0qg5cwo3ozmc40uo89mwyl4ez8qbnsehhpax2j=
av9g0ariod3sc8t9sob03lvvvhrphssth65yxhpz0ntsj0nw6edlm7whpq6cwah8qq91joxm=
iyw4dji7h34w6vflhtbedbyfs4lrgq3ze0g14v3b7d86t04l3iawzma48zms1i7vwqficqkf=
2xzvrs764f5ogmzqmwmf6ze3afph1k&amp;eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2=
586h0x5paf48r9" target=3D"_blank" style=3D"text-decoration: underline; c=
olor: #0068A5;" rel=3D"noopener" data-id=3D"4417939423">3 Tips for Endpo=
int Security: How to Protect your Virtual Workforce</a></strong></span><=
/p></div></div></td></tr></table><table class=3D"divider_block block-3"=
 width=3D"100%" border=3D"0" cellpadding=3D"10" cellspacing=3D"0" role=
=3D"presentation" style=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><t=
d class=3D"pad"><div class=3D"alignment" align=3D"center"><table border=
=3D"0" cellpadding=3D"0" cellspacing=3D"0" role=3D"presentation" width=
=3D"100%" style=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=
=3D"divider_inner" style=3D"font-size:1px;line-height:1px;border-top:3px=
 solid #0068a5"><span>=E2=80=8A</span></td></tr></table></div></td></tr>=
</table><table class=3D"image_block block-4" width=3D"100%" border=3D"0"=
 cellpadding=3D"0" cellspacing=3D"0" role=3D"presentation" style=3D"mso-=
table-lspace:0;mso-table-rspace:0"><tr><td class=3D"pad" style=3D"width:=
100%;padding-right:0;padding-left:0"><div class=3D"alignment" align=3D"c=
enter" style=3D"line-height:10px"><a href=3D"http://track.techmarketingg=
uide.com/?xtl=3Dp0rsbo5p2ytyrywxwrgcdulv6653aha7vse3o0zvdnd99j6vxbox7h95=
ba7ao4pflxtkd3k7ll5ku3ek4jlz914zrs1ur3vzsirsvjvk3to7uol3elac329jstrtguot=
ba29xkpmhe8ydeh1qrp4piqn1av02yyxs2lwy6510axk15tr9negjh2i7h35phjo9jillfz7=
zv8xmju1pub5p66g7edyjq8t8eocvb2lab6aoula9aliu0qpvok0w81810vvavvuemuovlox=
8u8xby8kqef2&amp;eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9" ta=
rget=3D"_blank" style=3D"outline:none" tabindex=3D"-1" data-id=3D"441793=
9424"><img class=3D"big" src=3D"https://mcusercontent.com/43ee8020009eb5=
d676af49ece/images/4eeb2853-4b2d-43d0-bd9f-aaf29a7319a5.jpg" style=3D"di=
splay:block;height:auto;border:0;width:450px;max-width:100%" width=3D"45=
0"></a></div></td></tr></table><table class=3D"text_block block-5" width=
=3D"100%" border=3D"0" cellpadding=3D"0" cellspacing=3D"0" role=3D"prese=
ntation" style=3D"mso-table-lspace:0;mso-table-rspace:0;word-break:break=
-word"><tr><td class=3D"pad" style=3D"padding-bottom:10px;padding-left:1=
0px;padding-right:10px;padding-top:15px"><div style=3D"font-family:sans-=
serif"><div class=3D"txtTinyMce-wrapper" style=3D"font-size:14px;text-al=
ign:left;mso-line-height-alt:21px;color:#555;line-height:1.5;font-family=
:Arial,Helvetica Neue,Helvetica,sans-serif"><p style=3D"margin:0;font-si=
ze:14px;text-align:justify;mso-line-height-alt:21px"><span style=3D"font=
-size:14px;">Nearly two thirds of organizations face endpoint attacks th=
at compromise data or IT infrastructure. With so many employees working=
 remotely, endpoint devices are even more vulnerable.</span><br><br><spa=
n style=3D"font-size:14px;">In the e-book, <strong>"3 Tips for Endpoint=
 Security: How to Protect your Virtual Workforce,"</strong> you'll learn=
 how to strengthen endpoint security from chip to cloud to help make IT=
 more efficient and your people more productive. All with a solution you=
 already own: Microsoft 365.</span></p></div></div></td></tr></table><ta=
ble class=3D"button_block block-6" width=3D"100%" border=3D"0" cellpaddi=
ng=3D"10" cellspacing=3D"0" role=3D"presentation" style=3D"mso-table-lsp=
ace:0;mso-table-rspace:0"><tr><td class=3D"pad"><div class=3D"alignment"=
 align=3D"center">=0A<!--[if mso]><v:roundrect xmlns:v=3D"urn:schemas-mi=
crosoft-com:vml" xmlns:w=3D"urn:schemas-microsoft-com:office:word" href=
=3D"https://mcusercontent.com/43ee8020009eb5d676af49ece/files/ebf8c5ec-5=
f7a-4668-9f0c-81ff75612af4/original_11_.05.pdf" style=3D"height:42px;wid=
th:147px;v-text-anchor:middle;" arcsize=3D"10%" stroke=3D"false" fillcol=
or=3D"#3AAEE0"><w:anchorlock/><v:textbox inset=3D"0px,0px,0px,0px"><cent=
er style=3D"color:#ffffff; font-family:Arial, sans-serif; font-size:16px=
"><![endif]-->=0A<a href=3D"http://track.techmarketingguide.com/?xtl=3Dp=
0rsbo5p2ytyrywxwrgcdulv6653aha7gjqsxs7r0d8itqmhluyfujezz4q77e4wp33x65z0l=
vtd9z9ej8awq1ckyyes77kumws7eqn0nwlfje9ao5odc873fu4d7d8yco0vap6co6xf33giz=
84pq5emxi4lfb2q46ajzsizgyz772ws9xapmr95hxqohvlxrnzs5zqjx9bsl1vjdxviyaxzx=
wqcd3979q8skr22afc20jcb8jjiet8o8f5y5ylgqtzz5ik8r86qswqy67mvz4f3rcxf&amp;=
eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9" target=3D"_blank" s=
tyle=3D"text-decoration:none;display:inline-block;color:#ffffff;backgrou=
nd-color:#3AAEE0;border-radius:4px;width:auto;border-top:1px solid #3AAE=
E0;font-weight:400;border-right:1px solid #3AAEE0;border-bottom:1px soli=
d #3AAEE0;border-left:1px solid #3AAEE0;padding-top:5px;padding-bottom:5=
px;font-family:Arial, Helvetica Neue, Helvetica, sans-serif;text-align:c=
enter;mso-border-alt:none;word-break:keep-all;" data-id=3D"4417939425"><=
span style=3D"padding-left:20px;padding-right:20px;font-size:16px;displa=
y:inline-block;letter-spacing:normal;"><span dir=3D"ltr" style=3D"word-b=
reak: break-word; line-height: 32px;"><strong>LEARN MORE</strong></span>=
</span></a>=0A<!--[if mso]></center></v:textbox></v:roundrect><![endif]-=
->=0A</div></td></tr></table><table class=3D"divider_block block-7" widt=
h=3D"100%" border=3D"0" cellpadding=3D"10" cellspacing=3D"0" role=3D"pre=
sentation" style=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=
=3D"pad"><div class=3D"alignment" align=3D"center"><table border=3D"0" c=
ellpadding=3D"0" cellspacing=3D"0" role=3D"presentation" width=3D"100%"=
 style=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=3D"divide=
r_inner" style=3D"font-size:1px;line-height:1px;border-top:1px solid #bb=
b"><span>=E2=80=8A</span></td></tr></table></div></td></tr></table><tabl=
e class=3D"text_block block-8" width=3D"100%" border=3D"0" cellpadding=
=3D"10" cellspacing=3D"0" role=3D"presentation" style=3D"mso-table-lspac=
e:0;mso-table-rspace:0;word-break:break-word"><tr><td class=3D"pad"><div=
 style=3D"font-family:sans-serif"><div class=3D"txtTinyMce-wrapper" styl=
e=3D"font-size:14px;font-family:Arial,Helvetica Neue,Helvetica,sans-seri=
f;mso-line-height-alt:16.8px;color:#555;line-height:1.2">=0A<p style=3D"=
margin:0;font-size:11px;text-align:center"><span style=3D"font-size:11px=
;">Copyright =C2=A9 2022 Tech Marketing Guide</span><br><span style=3D"f=
ont-size:11px;">news@techmarketingguide.com</span></p>=0A<p style=3D"mar=
gin:0;font-size:11px;text-align:center"><span style=3D"font-size:11px;">=
316 California Ave. #34 Reno NV 89509 United States</span></p>=0A<p styl=
e=3D"margin:0;font-size:11px;text-align:center;mso-line-height-alt:16.8p=
x">=C2=A0</p>=0A<p style=3D"margin:0;font-size:11px;text-align:center">=
=0A<span style=3D"font-size:11px;">This email was sent by Tech Marketing=
 Guide. We respect your privacy. To learn more about our lawful basis fo=
r processing your personal data, about the recipients or categories of r=
ecipients with whom we may share your personal data, and how you may exe=
rcise your privacy rights, please view our=C2=A0<a href=3D"http://track.=
techmarketingguide.com/?xtl=3D86i2ghc6z8dpa65fxzj2jwh1zutncyl5rkcl8tjdel=
kdcbnay56f1zua1mgjq3f6writtgzipmeuz7f36319z7r6ug411nzapvzb5ndurz58agujxi=
07e0lbtal2dzoo5ubc5w462d9z0x671y2qlu4irtgmgbhet5vonk4wjk5yb30jrjh8ff&amp=
;eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9" target=3D"_blank"=
 rel=3D"noopener" style=3D"color: #0068A5;" data-id=3D"4417939426">Priva=
cy Notice.</a>=C2=A0</span><span style=3D"font-size:11px;"><span style=
=3D"background-color:transparent;">To opt-out of future emails from us,=
 please click </span><a href=3D"http://track.techmarketingguide.com/?xul=
=3D4iff261a6t2ljkxsln6hvz3tsfdba5scx1ao8wjs32fnpcdzyzxbx6fkvzn0ysu0okz83=
bsgp33c8yz6kgrj2ta6he08ac4fbu08rd4fyr5d3t0&amp;eih=3D1pgkibq7o1ukhd7aye4=
qz1ng4xs2sj2586h0x5paf48r9" target=3D"_blank" rel=3D"noopener" style=3D"=
font-family: Arial, Helvetica Neue, Helvetica, sans-serif; background-co=
lor: transparent; color: #0068A5;" data-id=3D"4417939427">here</a><span=
 style=3D"background-color:transparent;">.</span></span>=0A</p>=0A</div>=
</div></td></tr></table><table class=3D"divider_block block-9" width=3D"=
100%" border=3D"0" cellpadding=3D"10" cellspacing=3D"0" role=3D"presenta=
tion" style=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=3D"p=
ad"><div class=3D"alignment" align=3D"center"><table border=3D"0" cellpa=
dding=3D"0" cellspacing=3D"0" role=3D"presentation" width=3D"100%" style=
=3D"mso-table-lspace:0;mso-table-rspace:0"><tr><td class=3D"divider_inne=
r" style=3D"font-size:1px;line-height:1px;border-top:1px solid #bbb"><sp=
an>=E2=80=8A</span></td>=0A</tr></table></div></td></tr></table></td></t=
r></tbody></table></td></tr></tbody></table></td></tr></tbody></table><!=
-- End -->=0A<img src=3D"http://track.techmarketingguide.com/?xol=3Dmtjp=
oedko4oa6dlcbzaia&eih=3D1pgkibq7o1ukhd7aye4qz1ng4xs2sj2586h0x5paf48r9" a=
lt=3D"" width=3D"1" height=3D"1">=0A</body></html>=0A

--=_3a805f677253fc852eb0a6cfedcbdb45--