diff --git a/src/app/page.tsx b/src/app/page.tsx index b3ad825..4f2795c 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -28,7 +28,7 @@ export default function LandingPage() { borderRadius="pill" contentWidth="mediumSmall" sizing="mediumLargeSizeMediumTitles" - background="noise" + background="circleGradient" cardStyle="glass-elevated" primaryButtonStyle="double-inset" secondaryButtonStyle="layered" @@ -52,7 +52,7 @@ export default function LandingPage() { @@ -93,27 +99,33 @@ export default function LandingPage() { { id: "anti-theft", title: "Anti-Theft Logic", description: "Mandatory checksum validation ensures the sum of all line items perfectly matches the entered Total Amount before any record can be saved. Prevents unauthorized modifications and ghost worker inflation.", imageSrc: - "http://img.b2bpic.net/free-vector/workout-tracker-app_23-2148639062.jpg?_wi=2", imageAlt: "Anti-Theft Logic"}, + "http://img.b2bpic.net/free-vector/workout-tracker-app_23-2148639062.jpg", imageAlt: "Anti-Theft Logic" + }, { id: "audit-trail", title: "Immutable Audit Trail", description: "Silent logging captures original values, new values, and precise timestamps for every modification. Complete documentation prevents unauthorized tampering and provides compliance evidence.", imageSrc: - "http://img.b2bpic.net/free-photo/elderly-people-discussing-with-financial-expert-about-suitable-retirement-plans_482257-107519.jpg?_wi=2", imageAlt: "Audit Trail"}, + "http://img.b2bpic.net/free-photo/elderly-people-discussing-with-financial-expert-about-suitable-retirement-plans_482257-107519.jpg", imageAlt: "Audit Trail" + }, { id: "material-reconciliation", title: "Material Reconciliation Module", description: "Cross-references Material In against Material Used to automatically calculate variances. Highlights shortages in high-contrast red to immediately flag potential site theft.", imageSrc: - "http://img.b2bpic.net/free-psd/transport-invoice-template-design_23-2151930564.jpg?_wi=2", imageAlt: "Material Reconciliation"}, + "http://img.b2bpic.net/free-psd/transport-invoice-template-design_23-2151930564.jpg", imageAlt: "Material Reconciliation" + }, { id: "offline-first", title: "Offline-First PWA", description: "Progressive Web App with HTML5, CSS3, and JavaScript. IndexedDB ensures complete functionality without active internet connection. Automatic synchronization when online.", imageSrc: - "http://img.b2bpic.net/free-photo/database-computer-system-digital-storage-concept_53876-123742.jpg?_wi=2", imageAlt: "Offline-First PWA"}, + "http://img.b2bpic.net/free-photo/database-computer-system-digital-storage-concept_53876-123742.jpg", imageAlt: "Offline-First PWA" + }, { id: "role-based-access", title: "Role-Based Access Control", description: "Site clerks input data with restricted permissions. Administrators hold master PIN to lock weekly entries and prevent unauthorized modifications. Granular access management.", imageSrc: - "http://img.b2bpic.net/free-vector/flat-organizational-chart-infographic-with-photo_23-2149002320.jpg?_wi=2", imageAlt: "Role-Based Access Control"}, + "http://img.b2bpic.net/free-vector/flat-organizational-chart-infographic-with-photo_23-2149002320.jpg", imageAlt: "Role-Based Access Control" + }, { id: "receipt-capture", title: "Receipt Capture & Verification", description: "High-value items require photographic evidence. Receipts are linked to line items and stored securely. Supports multiple formats for comprehensive documentation.", imageSrc: - "http://img.b2bpic.net/free-vector/copyright-stamps-collection_23-2148696098.jpg?_wi=1", imageAlt: "Receipt Capture & Verification"}, + "http://img.b2bpic.net/free-vector/copyright-stamps-collection_23-2148696098.jpg", imageAlt: "Receipt Capture & Verification" + }, ]} gridVariant="bento-grid" animationType="slide-up" @@ -167,13 +179,16 @@ export default function LandingPage() { products={[ { id: "weekly-summary", name: "Weekly Summary Report", price: "Export", imageSrc: - "http://img.b2bpic.net/free-vector/copyright-stamps-collection_23-2148696098.jpg?_wi=2", imageAlt: "Weekly Summary Report"}, + "http://img.b2bpic.net/free-vector/copyright-stamps-collection_23-2148696098.jpg", imageAlt: "Weekly Summary Report" + }, { id: "material-variance", name: "Material Variance Report", price: "Export", imageSrc: - "http://img.b2bpic.net/free-psd/transport-invoice-template-design_23-2151930564.jpg?_wi=3", imageAlt: "Material Variance Report"}, + "http://img.b2bpic.net/free-psd/transport-invoice-template-design_23-2151930564.jpg", imageAlt: "Material Variance Report" + }, { id: "audit-log", name: "Immutable Audit Log", price: "Export", imageSrc: - "http://img.b2bpic.net/free-photo/elderly-people-discussing-with-financial-expert-about-suitable-retirement-plans_482257-107519.jpg?_wi=3", imageAlt: "Audit Log Report"}, + "http://img.b2bpic.net/free-photo/elderly-people-discussing-with-financial-expert-about-suitable-retirement-plans_482257-107519.jpg", imageAlt: "Audit Log Report" + }, ]} gridVariant="three-columns-all-equal-width" animationType="slide-up" @@ -193,24 +208,30 @@ export default function LandingPage() { faqs={[ { id: "1", title: "How does the anti-theft checksum validation work?", content: - "The system performs real-time validation comparing the sum of all individual line items against the entered Total Amount. No record can be saved until perfect alignment is achieved. This prevents unauthorized modifications, duplicate entries, and ghost worker inflation."}, + "The system performs real-time validation comparing the sum of all individual line items against the entered Total Amount. No record can be saved until perfect alignment is achieved. This prevents unauthorized modifications, duplicate entries, and ghost worker inflation." + }, { id: "2", title: "What is captured in the immutable audit trail?", content: - "Every modification is silently logged with: original value, new value, timestamp, user ID, and modification type. The audit trail is immutable and cryptographically signed to prevent tampering. Perfect for compliance audits and forensic analysis."}, + "Every modification is silently logged with: original value, new value, timestamp, user ID, and modification type. The audit trail is immutable and cryptographically signed to prevent tampering. Perfect for compliance audits and forensic analysis." + }, { id: "3", title: "How does material reconciliation detect theft?", content: - "The module cross-references Material In (purchases/deliveries) against Material Used (consumed on projects). Variances are automatically calculated and displayed. Shortages exceeding defined thresholds are highlighted in high-contrast red for immediate notification."}, + "The module cross-references Material In (purchases/deliveries) against Material Used (consumed on projects). Variances are automatically calculated and displayed. Shortages exceeding defined thresholds are highlighted in high-contrast red for immediate notification." + }, { id: "4", title: "Can the app work without internet?", content: - "Yes. The PWA uses IndexedDB for complete offline functionality. All data is stored locally on the device. When internet is available, synchronization occurs automatically without manual intervention."}, + "Yes. The PWA uses IndexedDB for complete offline functionality. All data is stored locally on the device. When internet is available, synchronization occurs automatically without manual intervention." + }, { id: "5", title: "How are administrator permissions enforced?", content: - "Administrators hold a master PIN required to lock weekly entries and approve PDF invoices. Site clerks can only input data. Role-based access control prevents unauthorized actions and maintains clear accountability."}, + "Administrators hold a master PIN required to lock weekly entries and approve PDF invoices. Site clerks can only input data. Role-based access control prevents unauthorized actions and maintains clear accountability." + }, { id: "6", title: "Are generated invoices tamper-proof?", content: - "PDF invoices include cryptographic signatures, timestamp verification, and visual security markers. They're linked to immutable audit trails and cannot be modified without detection. Perfect for financial audits and compliance."}, + "PDF invoices include cryptographic signatures, timestamp verification, and visual security markers. They're linked to immutable audit trails and cannot be modified without detection. Perfect for financial audits and compliance." + }, ]} - animationType="slide-up" + animationType="smooth" faqsAnimation="slide-up" textboxLayout="default" useInvertedBackground={false}