Merge version_1 into main #2
186
src/app/page.tsx
186
src/app/page.tsx
@@ -99,25 +99,15 @@ const HomePage = () => {
|
||||
buttonAnimation="slide-up"
|
||||
mediaItems={[
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-modern-sleek-tech-dashboard-interface--1772563551136-ee9abc07.png?_wi=1",
|
||||
imageAlt: "Advanced tech dashboard interface",
|
||||
},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-modern-sleek-tech-dashboard-interface--1772563551136-ee9abc07.png", imageAlt: "Advanced tech dashboard interface"},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-professional-software-development-team-1772563552871-438ff697.png?_wi=1",
|
||||
imageAlt: "Software development team collaboration",
|
||||
},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-professional-software-development-team-1772563552871-438ff697.png", imageAlt: "Software development team collaboration"},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png?_wi=1",
|
||||
imageAlt: "Cloud infrastructure visualization",
|
||||
},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png", imageAlt: "Cloud infrastructure visualization"},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png?_wi=1",
|
||||
imageAlt: "AI and machine learning innovation",
|
||||
},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png", imageAlt: "AI and machine learning innovation"},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/modern-tech-company-office-environment-w-1772563550699-ac79f00f.png?_wi=1",
|
||||
imageAlt: "Modern tech workplace",
|
||||
},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/modern-tech-company-office-environment-w-1772563550699-ac79f00f.png", imageAlt: "Modern tech workplace"},
|
||||
]}
|
||||
mediaAnimation="slide-up"
|
||||
/>
|
||||
@@ -146,64 +136,34 @@ const HomePage = () => {
|
||||
tagAnimation="slide-up"
|
||||
features={[
|
||||
{
|
||||
id: "1",
|
||||
title: "Cloud Architecture",
|
||||
description:
|
||||
"Scalable, secure cloud infrastructure solutions designed for enterprise growth. AWS, Azure, and GCP expertise with enterprise-grade reliability.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png?_wi=2",
|
||||
imageAlt: "Cloud architecture visualization",
|
||||
},
|
||||
id: "1", title: "Cloud Architecture", description:
|
||||
"Scalable, secure cloud infrastructure solutions designed for enterprise growth. AWS, Azure, and GCP expertise with enterprise-grade reliability.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png", imageAlt: "Cloud architecture visualization"},
|
||||
{
|
||||
id: "2",
|
||||
title: "AI & Machine Learning",
|
||||
description:
|
||||
"Advanced AI and ML solutions that drive intelligent automation and predictive analytics. Transform raw data into actionable business intelligence.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png?_wi=2",
|
||||
imageAlt: "AI innovation representation",
|
||||
},
|
||||
id: "2", title: "AI & Machine Learning", description:
|
||||
"Advanced AI and ML solutions that drive intelligent automation and predictive analytics. Transform raw data into actionable business intelligence.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png", imageAlt: "AI innovation representation"},
|
||||
{
|
||||
id: "3",
|
||||
title: "Custom Development",
|
||||
description:
|
||||
"Bespoke software development tailored to your unique business requirements. Full-stack expertise with modern, maintainable code architecture.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-professional-software-development-team-1772563552871-438ff697.png?_wi=2",
|
||||
imageAlt: "Software development team",
|
||||
},
|
||||
id: "3", title: "Custom Development", description:
|
||||
"Bespoke software development tailored to your unique business requirements. Full-stack expertise with modern, maintainable code architecture.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-professional-software-development-team-1772563552871-438ff697.png", imageAlt: "Software development team"},
|
||||
{
|
||||
id: "4",
|
||||
title: "Digital Transformation",
|
||||
description:
|
||||
"End-to-end digital modernization strategies that revolutionize business operations. From legacy system migration to cloud-native architecture redesign.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-modern-sleek-tech-dashboard-interface--1772563551136-ee9abc07.png?_wi=2",
|
||||
imageAlt: "Digital transformation dashboard",
|
||||
},
|
||||
id: "4", title: "Digital Transformation", description:
|
||||
"End-to-end digital modernization strategies that revolutionize business operations. From legacy system migration to cloud-native architecture redesign.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-modern-sleek-tech-dashboard-interface--1772563551136-ee9abc07.png", imageAlt: "Digital transformation dashboard"},
|
||||
{
|
||||
id: "5",
|
||||
title: "DevOps & Infrastructure",
|
||||
description:
|
||||
"Continuous integration and deployment pipelines with infrastructure-as-code. Maximize efficiency, minimize downtime, accelerate delivery cycles.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png?_wi=3",
|
||||
imageAlt: "Infrastructure automation",
|
||||
},
|
||||
id: "5", title: "DevOps & Infrastructure", description:
|
||||
"Continuous integration and deployment pipelines with infrastructure-as-code. Maximize efficiency, minimize downtime, accelerate delivery cycles.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png", imageAlt: "Infrastructure automation"},
|
||||
{
|
||||
id: "6",
|
||||
title: "Security Solutions",
|
||||
description:
|
||||
"Comprehensive cybersecurity framework including threat detection, compliance, and disaster recovery. Enterprise-grade security for mission-critical systems.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png?_wi=3",
|
||||
imageAlt: "Security framework visualization",
|
||||
},
|
||||
id: "6", title: "Security Solutions", description:
|
||||
"Comprehensive cybersecurity framework including threat detection, compliance, and disaster recovery. Enterprise-grade security for mission-critical systems.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png", imageAlt: "Security framework visualization"},
|
||||
]}
|
||||
gridVariant="three-columns-all-equal-width"
|
||||
animationType="slide-up"
|
||||
textboxLayout="default"
|
||||
useInvertedBackground="noInvert"
|
||||
useInvertedBackground={false}
|
||||
/>
|
||||
</div>
|
||||
|
||||
@@ -214,17 +174,11 @@ const HomePage = () => {
|
||||
tagAnimation="slide-up"
|
||||
metrics={[
|
||||
{
|
||||
id: "1",
|
||||
value: "99.99%",
|
||||
description:
|
||||
"System uptime and reliability across all deployed solutions and services.",
|
||||
},
|
||||
id: "1", value: "99.99%", description:
|
||||
"System uptime and reliability across all deployed solutions and services."},
|
||||
{
|
||||
id: "2",
|
||||
value: "48 hours",
|
||||
description:
|
||||
"Average time to deploy complex enterprise solutions from concept to production.",
|
||||
},
|
||||
id: "2", value: "48 hours", description:
|
||||
"Average time to deploy complex enterprise solutions from concept to production."},
|
||||
]}
|
||||
metricsAnimation="slide-up"
|
||||
useInvertedBackground={true}
|
||||
@@ -240,45 +194,21 @@ const HomePage = () => {
|
||||
tagAnimation="slide-up"
|
||||
testimonials={[
|
||||
{
|
||||
id: "1",
|
||||
name: "Sarah Chen",
|
||||
role: "CTO",
|
||||
company: "FinTech Innovators",
|
||||
rating: 5,
|
||||
id: "1", name: "Sarah Chen", role: "CTO", company: "FinTech Innovators", rating: 5,
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-confident-fem-1772563550335-f2dec30f.png?_wi=1",
|
||||
imageAlt: "Sarah Chen testimonial",
|
||||
},
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-confident-fem-1772563550335-f2dec30f.png", imageAlt: "Sarah Chen testimonial"},
|
||||
{
|
||||
id: "2",
|
||||
name: "Michael Rodriguez",
|
||||
role: "VP Engineering",
|
||||
company: "Enterprise Solutions Inc",
|
||||
rating: 5,
|
||||
id: "2", name: "Michael Rodriguez", role: "VP Engineering", company: "Enterprise Solutions Inc", rating: 5,
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-male-tech-ent-1772563550086-a7384157.png?_wi=1",
|
||||
imageAlt: "Michael Rodriguez testimonial",
|
||||
},
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-male-tech-ent-1772563550086-a7384157.png", imageAlt: "Michael Rodriguez testimonial"},
|
||||
{
|
||||
id: "3",
|
||||
name: "Emily Watson",
|
||||
role: "Digital Director",
|
||||
company: "Global Tech Ventures",
|
||||
rating: 5,
|
||||
id: "3", name: "Emily Watson", role: "Digital Director", company: "Global Tech Ventures", rating: 5,
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-confident-fem-1772563550677-39e84f00.png?_wi=1",
|
||||
imageAlt: "Emily Watson testimonial",
|
||||
},
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-confident-fem-1772563550677-39e84f00.png", imageAlt: "Emily Watson testimonial"},
|
||||
{
|
||||
id: "4",
|
||||
name: "David Kim",
|
||||
role: "CEO",
|
||||
company: "StartupXYZ",
|
||||
rating: 5,
|
||||
id: "4", name: "David Kim", role: "CEO", company: "StartupXYZ", rating: 5,
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-male-software-1772563550376-b9377434.png?_wi=1",
|
||||
imageAlt: "David Kim testimonial",
|
||||
},
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/professional-headshot-of-a-male-software-1772563550376-b9377434.png", imageAlt: "David Kim testimonial"},
|
||||
]}
|
||||
kpiItems={[
|
||||
{ value: "180+", label: "Successful Projects" },
|
||||
@@ -295,41 +225,23 @@ const HomePage = () => {
|
||||
<FaqSplitText
|
||||
faqs={[
|
||||
{
|
||||
id: "1",
|
||||
title: "What industries does T4IT serve?",
|
||||
content:
|
||||
"T4IT specializes in fintech, enterprise software, healthcare technology, e-commerce, and telecommunications. Our solutions are customized for companies ranging from startups to Fortune 500 enterprises.",
|
||||
},
|
||||
id: "1", title: "What industries does T4IT serve?", content:
|
||||
"T4IT specializes in fintech, enterprise software, healthcare technology, e-commerce, and telecommunications. Our solutions are customized for companies ranging from startups to Fortune 500 enterprises."},
|
||||
{
|
||||
id: "2",
|
||||
title: "How long does a typical project take?",
|
||||
content:
|
||||
"Project timelines vary based on complexity and scope. Small solutions typically take 2-4 months, while large enterprise transformations can span 12-18 months. We provide detailed project plans during the discovery phase.",
|
||||
},
|
||||
id: "2", title: "How long does a typical project take?", content:
|
||||
"Project timelines vary based on complexity and scope. Small solutions typically take 2-4 months, while large enterprise transformations can span 12-18 months. We provide detailed project plans during the discovery phase."},
|
||||
{
|
||||
id: "3",
|
||||
title: "Do you provide ongoing support?",
|
||||
content:
|
||||
"Yes, we offer comprehensive support packages including 24/7 monitoring, maintenance, security updates, and performance optimization. Our dedicated support teams ensure your systems run at peak efficiency.",
|
||||
},
|
||||
id: "3", title: "Do you provide ongoing support?", content:
|
||||
"Yes, we offer comprehensive support packages including 24/7 monitoring, maintenance, security updates, and performance optimization. Our dedicated support teams ensure your systems run at peak efficiency."},
|
||||
{
|
||||
id: "4",
|
||||
title: "What are your security credentials?",
|
||||
content:
|
||||
"T4IT maintains ISO 27001, SOC 2 Type II, and GDPR compliance certifications. We implement enterprise-grade security protocols and undergo regular third-party security audits.",
|
||||
},
|
||||
id: "4", title: "What are your security credentials?", content:
|
||||
"T4IT maintains ISO 27001, SOC 2 Type II, and GDPR compliance certifications. We implement enterprise-grade security protocols and undergo regular third-party security audits."},
|
||||
{
|
||||
id: "5",
|
||||
title: "Can you integrate with existing systems?",
|
||||
content:
|
||||
"Absolutely. We specialize in seamless integration with legacy systems and modern platforms. Our team has expertise in API development, data migration, and system modernization.",
|
||||
},
|
||||
id: "5", title: "Can you integrate with existing systems?", content:
|
||||
"Absolutely. We specialize in seamless integration with legacy systems and modern platforms. Our team has expertise in API development, data migration, and system modernization."},
|
||||
{
|
||||
id: "6",
|
||||
title: "How do you handle data security?",
|
||||
content:
|
||||
"Data security is paramount. We implement end-to-end encryption, secure authentication protocols, regular vulnerability assessments, and comprehensive disaster recovery planning.",
|
||||
},
|
||||
id: "6", title: "How do you handle data security?", content:
|
||||
"Data security is paramount. We implement end-to-end encryption, secure authentication protocols, regular vulnerability assessments, and comprehensive disaster recovery planning."},
|
||||
]}
|
||||
sideTitle="Frequently Asked Questions"
|
||||
sideDescription="Find answers to common questions about T4IT's services, implementation process, and support."
|
||||
@@ -349,7 +261,7 @@ const HomePage = () => {
|
||||
description="Join hundreds of companies that have revolutionized their operations with T4IT's innovative solutions. Let's discuss how we can accelerate your digital transformation journey."
|
||||
background={{ variant: "radial-gradient" }}
|
||||
useInvertedBackground={false}
|
||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/modern-tech-company-office-environment-w-1772563550699-ac79f00f.png?_wi=2"
|
||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/modern-tech-company-office-environment-w-1772563550699-ac79f00f.png"
|
||||
imageAlt="T4IT team collaboration"
|
||||
mediaAnimation="slide-up"
|
||||
mediaPosition="right"
|
||||
|
||||
@@ -81,64 +81,34 @@ const SolutionsPage = () => {
|
||||
tagAnimation="slide-up"
|
||||
features={[
|
||||
{
|
||||
id: "1",
|
||||
title: "Cloud Architecture",
|
||||
description:
|
||||
"Scalable, secure cloud infrastructure solutions designed for enterprise growth. AWS, Azure, and GCP expertise with enterprise-grade reliability and 99.99% uptime SLAs.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png?_wi=4",
|
||||
imageAlt: "Cloud architecture visualization",
|
||||
},
|
||||
id: "1", title: "Cloud Architecture", description:
|
||||
"Scalable, secure cloud infrastructure solutions designed for enterprise growth. AWS, Azure, and GCP expertise with enterprise-grade reliability and 99.99% uptime SLAs.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png", imageAlt: "Cloud architecture visualization"},
|
||||
{
|
||||
id: "2",
|
||||
title: "AI & Machine Learning",
|
||||
description:
|
||||
"Advanced AI and ML solutions that drive intelligent automation and predictive analytics. Transform raw data into actionable business intelligence with our expert data scientists.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png?_wi=4",
|
||||
imageAlt: "AI innovation representation",
|
||||
},
|
||||
id: "2", title: "AI & Machine Learning", description:
|
||||
"Advanced AI and ML solutions that drive intelligent automation and predictive analytics. Transform raw data into actionable business intelligence with our expert data scientists.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png", imageAlt: "AI innovation representation"},
|
||||
{
|
||||
id: "3",
|
||||
title: "Custom Development",
|
||||
description:
|
||||
"Bespoke software development tailored to your unique business requirements. Full-stack expertise with modern, maintainable code architecture and agile methodologies.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-professional-software-development-team-1772563552871-438ff697.png?_wi=3",
|
||||
imageAlt: "Software development team",
|
||||
},
|
||||
id: "3", title: "Custom Development", description:
|
||||
"Bespoke software development tailored to your unique business requirements. Full-stack expertise with modern, maintainable code architecture and agile methodologies.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-professional-software-development-team-1772563552871-438ff697.png", imageAlt: "Software development team"},
|
||||
{
|
||||
id: "4",
|
||||
title: "Digital Transformation",
|
||||
description:
|
||||
"End-to-end digital modernization strategies that revolutionize business operations. From legacy system migration to cloud-native architecture redesign with zero downtime.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-modern-sleek-tech-dashboard-interface--1772563551136-ee9abc07.png?_wi=3",
|
||||
imageAlt: "Digital transformation dashboard",
|
||||
},
|
||||
id: "4", title: "Digital Transformation", description:
|
||||
"End-to-end digital modernization strategies that revolutionize business operations. From legacy system migration to cloud-native architecture redesign with zero downtime.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/a-modern-sleek-tech-dashboard-interface--1772563551136-ee9abc07.png", imageAlt: "Digital transformation dashboard"},
|
||||
{
|
||||
id: "5",
|
||||
title: "DevOps & Infrastructure",
|
||||
description:
|
||||
"Continuous integration and deployment pipelines with infrastructure-as-code. Maximize efficiency, minimize downtime, accelerate delivery cycles with automated workflows.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png?_wi=5",
|
||||
imageAlt: "Infrastructure automation",
|
||||
},
|
||||
id: "5", title: "DevOps & Infrastructure", description:
|
||||
"Continuous integration and deployment pipelines with infrastructure-as-code. Maximize efficiency, minimize downtime, accelerate delivery cycles with automated workflows.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/abstract-visualization-of-cloud-computin-1772563551335-54c19d72.png", imageAlt: "Infrastructure automation"},
|
||||
{
|
||||
id: "6",
|
||||
title: "Security Solutions",
|
||||
description:
|
||||
"Comprehensive cybersecurity framework including threat detection, compliance management, and disaster recovery. Enterprise-grade security for mission-critical systems.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png?_wi=5",
|
||||
imageAlt: "Security framework visualization",
|
||||
},
|
||||
id: "6", title: "Security Solutions", description:
|
||||
"Comprehensive cybersecurity framework including threat detection, compliance management, and disaster recovery. Enterprise-grade security for mission-critical systems.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/artificial-intelligence-and-machine-lear-1772563553193-7b519543.png", imageAlt: "Security framework visualization"},
|
||||
]}
|
||||
gridVariant="three-columns-all-equal-width"
|
||||
animationType="slide-up"
|
||||
textboxLayout="default"
|
||||
useInvertedBackground="noInvert"
|
||||
useInvertedBackground={false}
|
||||
/>
|
||||
</div>
|
||||
|
||||
@@ -149,17 +119,11 @@ const SolutionsPage = () => {
|
||||
tagAnimation="slide-up"
|
||||
metrics={[
|
||||
{
|
||||
id: "1",
|
||||
value: "3-6 months",
|
||||
description:
|
||||
"Typical implementation timeline for enterprise solutions with dedicated project management.",
|
||||
},
|
||||
id: "1", value: "3-6 months", description:
|
||||
"Typical implementation timeline for enterprise solutions with dedicated project management."},
|
||||
{
|
||||
id: "2",
|
||||
value: "500+",
|
||||
description:
|
||||
"Enterprise clients across 45+ countries relying on T4IT for mission-critical systems.",
|
||||
},
|
||||
id: "2", value: "500+", description:
|
||||
"Enterprise clients across 45+ countries relying on T4IT for mission-critical systems."},
|
||||
]}
|
||||
metricsAnimation="slide-up"
|
||||
useInvertedBackground={false}
|
||||
@@ -175,7 +139,7 @@ const SolutionsPage = () => {
|
||||
description="Our team of expert engineers and architects are ready to discuss how our solutions can transform your business. Schedule a consultation with a solutions specialist today."
|
||||
background={{ variant: "radial-gradient" }}
|
||||
useInvertedBackground={false}
|
||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/modern-tech-company-office-environment-w-1772563550699-ac79f00f.png?_wi=3"
|
||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARlnpjsMud0Ghx0a2BpPw48SFX/modern-tech-company-office-environment-w-1772563550699-ac79f00f.png"
|
||||
imageAlt="T4IT solutions team"
|
||||
mediaAnimation="slide-up"
|
||||
mediaPosition="right"
|
||||
|
||||
Reference in New Issue
Block a user