Compare commits
1 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 2b630151b8 |
@@ -56,19 +56,19 @@ export default function LandingPage() {
|
|||||||
|
|
||||||
<div id="services" data-section="services" className="py-20">
|
<div id="services" data-section="services" className="py-20">
|
||||||
<FeatureCardTwentyFour
|
<FeatureCardTwentyFour
|
||||||
title="Where Programming Makes the Difference"
|
title="Intelligent Programming Powers Your Operations"
|
||||||
description="Cutting-edge telecom solutions programmed for your operational excellence"
|
description="Each feature is precisely configured to match your facility's workflow, making complex systems intuitive and reliable"
|
||||||
features={[
|
features={[
|
||||||
{
|
{
|
||||||
id: "1", title: "Security That Matches Your Operations", author: "Infrastructure Team", description: "Access levels, camera zones, and alert paths configured around how your facility actually runs. The system behaves the way the building expects it to.", tags: ["Security", "Operations"],
|
id: "1", title: "Security That Matches Your Operations", author: "Infrastructure Team", description: "Access levels, camera zones, and alert paths configured around how your facility actually runs. The system behaves the way the building expects it to.", tags: ["Security", "Operations"],
|
||||||
imageSrc: "http://img.b2bpic.net/free-photo/general-manager-working-data-management-with-infographics_482257-91096.jpg", imageAlt: "security system access control interface"
|
imageSrc: "http://img.b2bpic.net/free-photo/general-manager-working-data-management-with-infographics_482257-91096.jpg", imageAlt: "security system access control interface"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "2", title: "Every Platform Configured Correctly", author: "Integration Team", description: "Access control, surveillance, and facility communication systems configured to the standards set by the manufacturers who build them.", tags: ["Integration", "Standards"],
|
id: "2", title: "Every Platform Configured Correctly", author: "Integration Team", description: "Access control, surveillance, and facility communication systems configured to the standards set by the manufacturers who build them. No shortcuts, no compromises.", tags: ["Integration", "Standards"],
|
||||||
imageSrc: "http://img.b2bpic.net/free-photo/it-professionals-analyzing-real-time-data-control-room_23-2152029078.jpg", imageAlt: "platform configuration settings integration"
|
imageSrc: "http://img.b2bpic.net/free-photo/it-professionals-analyzing-real-time-data-control-room_23-2152029078.jpg", imageAlt: "platform configuration settings integration"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "3", title: "Tested, Documented, Ready to Run", author: "Quality Assurance", description: "Every access rule, recording trigger, and alert path verified before handover, with documentation and walkthroughs for the team managing the system.", tags: ["Testing", "Documentation"],
|
id: "3", title: "Tested, Documented, Ready to Run", author: "Quality Assurance", description: "Every access rule, recording trigger, and alert path verified before handover. Full documentation and team walkthroughs included so your staff manages the system with confidence.", tags: ["Testing", "Documentation"],
|
||||||
imageSrc: "http://img.b2bpic.net/free-photo/physician-recommending-vitamins-painkillers-healthcare-insurance_482257-116451.jpg", imageAlt: "quality assurance testing verification"
|
imageSrc: "http://img.b2bpic.net/free-photo/physician-recommending-vitamins-painkillers-healthcare-insurance_482257-116451.jpg", imageAlt: "quality assurance testing verification"
|
||||||
}
|
}
|
||||||
]}
|
]}
|
||||||
|
|||||||
Reference in New Issue
Block a user