1 Commits

Author SHA1 Message Date
2b630151b8 Update src/app/page.tsx 2026-03-09 18:24:15 +00:00

View File

@@ -56,19 +56,19 @@ export default function LandingPage() {
<div id="services" data-section="services" className="py-20"> <div id="services" data-section="services" className="py-20">
<FeatureCardTwentyFour <FeatureCardTwentyFour
title="Where Programming Makes the Difference" title="Intelligent Programming Powers Your Operations"
description="Cutting-edge telecom solutions programmed for your operational excellence" description="Each feature is precisely configured to match your facility's workflow, making complex systems intuitive and reliable"
features={[ features={[
{ {
id: "1", title: "Security That Matches Your Operations", author: "Infrastructure Team", description: "Access levels, camera zones, and alert paths configured around how your facility actually runs. The system behaves the way the building expects it to.", tags: ["Security", "Operations"], id: "1", title: "Security That Matches Your Operations", author: "Infrastructure Team", description: "Access levels, camera zones, and alert paths configured around how your facility actually runs. The system behaves the way the building expects it to.", tags: ["Security", "Operations"],
imageSrc: "http://img.b2bpic.net/free-photo/general-manager-working-data-management-with-infographics_482257-91096.jpg", imageAlt: "security system access control interface" imageSrc: "http://img.b2bpic.net/free-photo/general-manager-working-data-management-with-infographics_482257-91096.jpg", imageAlt: "security system access control interface"
}, },
{ {
id: "2", title: "Every Platform Configured Correctly", author: "Integration Team", description: "Access control, surveillance, and facility communication systems configured to the standards set by the manufacturers who build them.", tags: ["Integration", "Standards"], id: "2", title: "Every Platform Configured Correctly", author: "Integration Team", description: "Access control, surveillance, and facility communication systems configured to the standards set by the manufacturers who build them. No shortcuts, no compromises.", tags: ["Integration", "Standards"],
imageSrc: "http://img.b2bpic.net/free-photo/it-professionals-analyzing-real-time-data-control-room_23-2152029078.jpg", imageAlt: "platform configuration settings integration" imageSrc: "http://img.b2bpic.net/free-photo/it-professionals-analyzing-real-time-data-control-room_23-2152029078.jpg", imageAlt: "platform configuration settings integration"
}, },
{ {
id: "3", title: "Tested, Documented, Ready to Run", author: "Quality Assurance", description: "Every access rule, recording trigger, and alert path verified before handover, with documentation and walkthroughs for the team managing the system.", tags: ["Testing", "Documentation"], id: "3", title: "Tested, Documented, Ready to Run", author: "Quality Assurance", description: "Every access rule, recording trigger, and alert path verified before handover. Full documentation and team walkthroughs included so your staff manages the system with confidence.", tags: ["Testing", "Documentation"],
imageSrc: "http://img.b2bpic.net/free-photo/physician-recommending-vitamins-painkillers-healthcare-insurance_482257-116451.jpg", imageAlt: "quality assurance testing verification" imageSrc: "http://img.b2bpic.net/free-photo/physician-recommending-vitamins-painkillers-healthcare-insurance_482257-116451.jpg", imageAlt: "quality assurance testing verification"
} }
]} ]}