1:"$Sreact.fragment" 2:I[92825,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"ClientSegmentRoot"] 3:I[42525,["/_next/static/chunks/e9233006304db403.js"],"default"] 4:I[39756,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"default"] 5:I[37457,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"default"] 7:I[5500,["/_next/static/chunks/e9233006304db403.js"],"Image"] 16:I[68027,[],"default"] :HL["/_next/static/chunks/17a6e432ecb79440.css","style"] 0:{"P":null,"b":"1_7GfoAioU3NaHecXPaeH","c":["","about"],"q":"","i":false,"f":[[["",{"children":["about",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/17a6e432ecb79440.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/e9233006304db403.js","async":true,"nonce":"$undefined"}]],["$","$L2",null,{"Component":"$3","slots":{"children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]},"serverProvidedParams":{"params":{},"promises":["$@6"]}}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[["$","main",null,{"className":"w-full overflow-x-hidden","children":[["$","section",null,{"className":"relative bg-[#081020] py-36 overflow-hidden","children":[["$","div",null,{"className":"absolute inset-y-0 right-0 w-[42%]","children":[["$","$L7",null,{"src":"/images/editorial-bg.webp","alt":"Cybersecurity operations center","fill":true,"className":"object-cover","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-l from-[#081020]/20 via-[#081020]/60 to-[#081020]"}]]}],["$","div",null,{"className":"relative mx-auto max-w-5xl px-6","children":[["$","p",null,{"className":"text-xs tracking-[0.3em] text-blue-400 uppercase","children":"About the Company"}],["$","h1",null,{"className":"mt-8 text-4xl md:text-5xl font-semibold text-white leading-tight max-w-3xl","children":["Engineering secure systems",["$","br",null,{}],"for mission-critical operations."]}],["$","p",null,{"className":"mt-10 max-w-3xl text-lg text-slate-300 leading-relaxed","children":"Simplified Datahub Solutions delivers enterprise cybersecurity, infrastructure, and ICT services for organizations that prioritize reliability, governance, and long-term operational resilience."}]]}]]}],["$","section",null,{"className":"bg-[#0B1730] py-32","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Core Capabilities"}],["$","div",null,{"className":"mt-20 space-y-20 border-l border-white/10 pl-14","children":[["$","div","Cybersecurity",{"className":"relative","children":[["$","span",null,{"className":"absolute -left-[31px] top-2 h-3 w-3 rounded-full bg-blue-500"}],["$","h3",null,{"className":"text-xl font-medium text-white","children":"Cybersecurity"}],["$","p",null,{"className":"mt-4 max-w-3xl text-slate-300 leading-relaxed","children":"Layered controls designed to protect networks, endpoints, applications, and data against evolving threats."}],["$","ul",null,{"className":"mt-6 space-y-2 text-slate-300","children":[["$","li","Network & Endpoint Security",{"className":"flex items-start gap-3","children":[["$","span",null,{"className":"mt-2 h-1.5 w-1.5 rounded-full bg-blue-400"}],["$","span",null,{"children":"Network & Endpoint Security"}]]}],"$L8","$L9"]}],"$La"]}],"$Lb","$Lc"]}]]}]}],"$Ld","$Le","$Lf","$L10","$L11","$L12","$L13"]}],null,"$L14"]}],{},null,false,false]},null,false,false]},null,false,false],"$L15",false]],"m":"$undefined","G":["$16",[]],"S":true} 1c:I[22016,["/_next/static/chunks/e9233006304db403.js"],""] 1d:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"OutletBoundary"] 1e:"$Sreact.suspense" 20:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"ViewportBoundary"] 22:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"MetadataBoundary"] 8:["$","li","Cloud & Identity Security",{"className":"flex items-start gap-3","children":[["$","span",null,{"className":"mt-2 h-1.5 w-1.5 rounded-full bg-blue-400"}],["$","span",null,{"children":"Cloud & Identity Security"}]]}] 9:["$","li","Governance & Compliance",{"className":"flex items-start gap-3","children":[["$","span",null,{"className":"mt-2 h-1.5 w-1.5 rounded-full bg-blue-400"}],["$","span",null,{"children":"Governance & Compliance"}]]}] a:["$","div",null,{"className":"mt-14 relative aspect-[16/7] rounded-2xl overflow-hidden border border-white/10","children":[["$","$L7",null,{"src":"/images/architecture.webp","alt":"Enterprise IT architecture overview","fill":true,"className":"object-cover","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-[#0B1730]/60 via-transparent to-transparent"}]]}] b:["$","div","Infrastructure",{"className":"relative","children":[["$","span",null,{"className":"absolute -left-[31px] top-2 h-3 w-3 rounded-full bg-blue-500"}],["$","h3",null,{"className":"text-xl font-medium text-white","children":"Infrastructure"}],["$","p",null,{"className":"mt-4 max-w-3xl text-slate-300 leading-relaxed","children":"Design and deployment of resilient server, storage, virtualization, and backup environments."}],"$undefined",false]}] c:["$","div","Professional & Consultancy",{"className":"relative","children":[["$","span",null,{"className":"absolute -left-[31px] top-2 h-3 w-3 rounded-full bg-blue-500"}],["$","h3",null,{"className":"text-xl font-medium text-white","children":"Professional & Consultancy"}],["$","p",null,{"className":"mt-4 max-w-3xl text-slate-300 leading-relaxed","children":"Advisory services aligned with governance, compliance, and operational continuity."}],"$undefined",false]}] d:["$","section",null,{"className":"bg-[#0E1627] py-28","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Our Engineering Principles"}],["$","div",null,{"className":"mt-14 grid grid-cols-1 md:grid-cols-3 gap-14","children":[["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-medium text-white","children":"Security-First Architecture"}],["$","p",null,{"className":"mt-4 text-sm leading-relaxed text-slate-300","children":"Security controls, access models, and monitoring are designed into systems from inception — not retrofitted after deployment."}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-medium text-white","children":"Operationally Viable Design"}],["$","p",null,{"className":"mt-4 text-sm leading-relaxed text-slate-300","children":"We design systems that can be realistically operated, maintained, audited, and supported over their full lifecycle."}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-medium text-white","children":"Governance by Default"}],["$","p",null,{"className":"mt-4 text-sm leading-relaxed text-slate-300","children":"Documentation, change control, and accountability are treated as engineering requirements — not administrative afterthoughts."}]]}]]}]]}]}] e:["$","section",null,{"className":"bg-gradient-to-b from-[#0C1424] to-[#0E1B34] py-28","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 grid md:grid-cols-[2fr_3fr] gap-16 items-start","children":[["$","div",null,{"children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Operating Model"}],["$","p",null,{"className":"mt-6 text-slate-300 leading-relaxed max-w-md","children":"Our delivery model is built on structured assessment, security-first design, controlled implementation, and SLA-driven operational support."}],["$","ul",null,{"className":"mt-8 space-y-3 text-slate-300 max-w-md","children":[["$","li",null,{"children":"• Pre-implementation risk assessment"}],["$","li",null,{"children":"• Standards-aligned architecture design"}],["$","li",null,{"children":"• Controlled change & documentation"}],["$","li",null,{"children":"• Ongoing monitoring and accountability"}]]}]]}],["$","div",null,{"className":"border-l border-white/10 pl-10","children":["$","svg",null,{"viewBox":"0 0 1200 700","className":"w-full h-auto","xmlns":"http://www.w3.org/2000/svg","children":[["$","defs",null,{"children":["$","linearGradient",null,{"id":"panel","x1":"0","y1":"0","x2":"1","y2":"1","children":[["$","stop",null,{"offset":"0%","stopColor":"#1E3A8A"}],["$","stop",null,{"offset":"100%","stopColor":"#0B1530"}]]}]}],["$","text",null,{"x":"600","y":"60","textAnchor":"middle","fill":"#FFFFFF","fontSize":"34","fontWeight":"600","children":"Enterprise IT Operating Model"}],[["$","g","Assessment",{"children":[["$","rect",null,{"x":"120","y":140,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":172,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"Assessment"}],["$","text",null,{"x":"160","y":196,"fill":"#CBD5E1","fontSize":"14","children":"Pre-implementation risk assessment"}],["$","line",null,{"x1":"330","y1":220,"x2":"330","y2":250,"stroke":"rgba(255,255,255,0.3)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","System Design",{"children":[["$","rect",null,{"x":"120","y":250,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":282,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"System Design"}],["$","text",null,{"x":"160","y":306,"fill":"#CBD5E1","fontSize":"14","children":"Security-first architecture design"}],["$","line",null,{"x1":"330","y1":330,"x2":"330","y2":360,"stroke":"rgba(255,255,255,0.3)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Implementation",{"children":[["$","rect",null,{"x":"120","y":360,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":392,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"Implementation"}],["$","text",null,{"x":"160","y":416,"fill":"#CBD5E1","fontSize":"14","children":"Controlled deployment & change mgmt"}],["$","line",null,{"x1":"330","y1":440,"x2":"330","y2":470,"stroke":"rgba(255,255,255,0.3)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Operation & Support",{"children":[["$","rect",null,{"x":"120","y":470,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":502,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"Operation & Support"}],["$","text",null,{"x":"160","y":526,"fill":"#CBD5E1","fontSize":"14","children":"Monitoring & SLA-driven support"}],false]}]],[["$","g","Risk Assessment",{"children":[["$","rect",null,{"x":"700","y":160,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],["$","text",null,{"x":"730","y":190,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"Risk Assessment"}],["$","text",null,{"x":"730","y":212,"fill":"#94A3B8","fontSize":"13","children":"Identify and mitigate risks"}],["$","line",null,{"x1":"540","y1":195,"x2":"700","y2":195,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Security Alignment",{"children":[["$","rect",null,{"x":"700","y":260,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],["$","text",null,{"x":"730","y":290,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"Security Alignment"}],["$","text",null,{"x":"730","y":312,"fill":"#94A3B8","fontSize":"13","children":"Industry standards & best practices"}],["$","line",null,{"x1":"540","y1":295,"x2":"700","y2":295,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Change Control",{"children":[["$","rect",null,{"x":"700","y":360,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],"$L17","$L18","$L19"]}],"$L1a"],"$L1b"]}]}]]}]}] f:["$","section",null,{"className":"bg-[#0C1424] py-28","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Engagement Scope & Delivery Assurance"}],["$","div",null,{"className":"mt-14 grid grid-cols-1 md:grid-cols-2 gap-14 items-center","children":[["$","div",null,{"className":"space-y-6 text-slate-300 leading-relaxed","children":[["$","p",null,{"children":"Client engagements typically begin with a structured assessment of the existing environment, including architecture, security posture, operational processes, and risk exposure."}],["$","p",null,{"children":"All solutions are designed with defined scope, documented architecture, implementation controls, and clear operational ownership to ensure long-term maintainability and audit readiness."}],["$","p",null,{"children":"Delivery is governed through agreed milestones, change control procedures, and acceptance criteria aligned with enterprise ICT practices."}]]}],["$","div",null,{"className":"relative aspect-[4/3] rounded-2xl overflow-hidden border border-white/10","children":[["$","$L7",null,{"src":"/images/engagement-process.webp","alt":"Structured enterprise ICT engagement and delivery process","fill":true,"className":"object-cover","priority":false}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-[#0C1424]/50 via-transparent to-transparent"}]]}]]}]]}]}] 10:["$","section",null,{"className":"bg-[#0B1730] py-28","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":["$","div",null,{"className":"rounded-2xl border border-white/10 bg-[#0A1324]/80 px-10 py-12","children":["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-3 gap-12 items-start","children":[["$","div",null,{"children":["$","h3",null,{"className":"text-sm font-semibold uppercase tracking-wider text-blue-400","children":"Compliance & Governance"}]}],["$","div",null,{"className":"md:col-span-2 space-y-6 text-slate-300 leading-relaxed","children":[["$","p",null,{"children":"Delivery aligns with commonly adopted enterprise security and risk management practices, ensuring systems are designed, implemented, and operated within controlled governance models."}],["$","ul",null,{"className":"space-y-3 text-sm text-slate-400","children":[["$","li",null,{"children":"• Controlled change and release management"}],["$","li",null,{"children":"• Defined access governance and accountability"}],["$","li",null,{"children":"• Documented architecture and operational ownership"}],["$","li",null,{"children":"• Audit-aware delivery for regulated environments"}]]}]]}]]}]}]}]}] 11:["$","section",null,{"className":"bg-[#050A14] border-y border-white/10","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 py-12 grid grid-cols-2 md:grid-cols-4 gap-10","children":[["$","div","Incorporated",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Incorporated"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"2024 · Kenya"}]]}],["$","div","Legal Status",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Legal Status"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"Private Limited Company"}]]}],["$","div","Operating Region",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Operating Region"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"East Africa"}]]}],["$","div","Core Focus",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Core Focus"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"Cybersecurity · Infrastructure · ICT"}]]}]]}]}] 12:["$","section",null,{"className":"py-24 bg-[#0C1424]","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6","children":[["$","h2",null,{"className":"text-3xl font-semibold text-white","children":"Technology Partners"}],["$","p",null,{"className":"mt-3 max-w-2xl text-sm text-slate-400","children":"Technology platforms we deploy and support"}],["$","div",null,{"className":"mt-12 grid grid-cols-2 md:grid-cols-4 gap-10 items-center","children":[["$","div","dell",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/dell.webp","alt":"dell logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","hpe",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/hpe.webp","alt":"hpe logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","fortinet",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/fortinet.webp","alt":"fortinet logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","sophos",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/sophos.webp","alt":"sophos logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","vmware",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/vmware.webp","alt":"vmware logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","veeam",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/veeam.webp","alt":"veeam logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","lenovo",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/lenovo.webp","alt":"lenovo logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","checkpoint",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L7",null,{"src":"/images/partners/checkpoint.webp","alt":"checkpoint logo","width":140,"height":60,"className":"object-contain"}]}]]}]]}]}] 13:["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0E1627] py-24","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"max-w-2xl","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Ready to Work With Us?"}],["$","p",null,{"className":"mt-4 text-slate-400 leading-relaxed","children":"Whether you’re planning a new initiative or strengthening existing systems, our team can help you move forward with clarity and confidence."}],["$","div",null,{"className":"mt-8","children":["$","$L1c",null,{"href":"/request-consultation","children":["$","button",null,{"className":"bg-blue-600 hover:bg-blue-500 text-white px-7","style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Start a Conversation"}]}]}]]}]}]}] 14:["$","$L1d",null,{"children":["$","$1e",null,{"name":"Next.MetadataOutlet","children":"$@1f"}]}] 15:["$","$1","h",{"children":[null,["$","$L20",null,{"children":"$L21"}],["$","div",null,{"hidden":true,"children":["$","$L22",null,{"children":["$","$1e",null,{"name":"Next.Metadata","children":"$L23"}]}]}],null]}] 6:"$0:f:0:1:0:props:children:1:props:serverProvidedParams:params" 17:["$","text",null,{"x":"730","y":390,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"Change Control"}] 18:["$","text",null,{"x":"730","y":412,"fill":"#94A3B8","fontSize":"13","children":"Disciplined change management"}] 19:["$","line",null,{"x1":"540","y1":395,"x2":"700","y2":395,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}] 1a:["$","g","SLA Commitment",{"children":[["$","rect",null,{"x":"700","y":460,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],["$","text",null,{"x":"730","y":490,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"SLA Commitment"}],["$","text",null,{"x":"730","y":512,"fill":"#94A3B8","fontSize":"13","children":"Accountability & service stability"}],["$","line",null,{"x1":"540","y1":495,"x2":"700","y2":495,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}] 1b:["$","defs",null,{"children":["$","marker",null,{"id":"arrow","markerWidth":"10","markerHeight":"10","refX":"6","refY":"3","orient":"auto","children":["$","path",null,{"d":"M0,0 L0,6 L9,3 z","fill":"rgba(255,255,255,0.4)"}]}]}] 21:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 24:I[27201,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"IconMark"] 1f:null 23:[["$","link","0",{"rel":"icon","href":"/favicon.ico?favicon.0b3bf435.ico","sizes":"256x256","type":"image/x-icon"}],["$","$L24","1",{}]]