l of the pipeline illustrated in FIG. 39A; and FIG. 40 is a block diagram illustrating an example where a conflict item is logged with a copy of the target item; FIG. 41 is a block diagram illustrating the scenario in which two clients must synchronize through an intermediary; FIG. 42 is a flow diagram illustrating the steps by which a client, via an STI Adapter, sends change data to an intermedia