1:"$Sreact.fragment" 2:I[22016,["/_next/static/chunks/e9233006304db403.js"],""] 6:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"OutletBoundary"] 7:"$Sreact.suspense" :HL["/images/services/cybersecurity.webp","image"] :HL["/images/services/infrastructure.webp","image"] :HL["/images/services/consultancy.webp","image"] 0:{"buildId":"1_7GfoAioU3NaHecXPaeH","rsc":["$","$1","c",{"children":[[["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0C1424]","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":[["$","h2",null,{"className":"text-white","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"center"},"children":"Our Services"}],["$","p",null,{"className":"mt-6 mx-auto max-w-[780px] text-center text-slate-300","children":"We design, secure, and optimize enterprise-grade ICT systems using proven technologies and structured delivery methodologies."}]]}]}],["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0E1627] py-16 md:py-20","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"grid items-center gap-12 md:grid-cols-2","children":[["$","div",null,{"className":"relative h-[260px] md:h-[320px] overflow-hidden rounded-2xl border border-white/10 md:order-1","children":["$","img",null,{"src":"/images/services/cybersecurity.webp","alt":"Cybersecurity Solutions","className":"h-full w-full object-cover"}]}],["$","div",null,{"className":"md:order-2","children":[["$","h2",null,{"className":"text-white","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"left"},"children":"Cybersecurity Solutions"}],["$","p",null,{"className":"mt-4 max-w-[520px] text-slate-300","children":"Protect your digital assets with proactive, intelligence-driven security strategies."}],["$","div",null,{"className":"mt-6","children":["$","$L2",null,{"href":"/services/cybersecurity","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Explore Service"}]}]}]]}]]}]}]}],["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0E1627] py-16 md:py-20","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"grid items-center gap-12 md:grid-cols-2","children":[["$","div",null,{"className":"relative h-[260px] md:h-[320px] overflow-hidden rounded-2xl border border-white/10 md:order-2","children":["$","img",null,{"src":"/images/services/infrastructure.webp","alt":"Infrastructure & Cloud","className":"h-full w-full object-cover"}]}],["$","div",null,{"className":"md:order-1","children":[["$","h2",null,{"className":"text-white","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"left"},"children":"Infrastructure & Cloud"}],["$","p",null,{"className":"mt-4 max-w-[520px] text-slate-300","children":"Scalable, resilient, and performance-optimized infrastructure for modern workloads."}],["$","div",null,{"className":"mt-6","children":["$","$L2",null,{"href":"/services/infrastructure","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Explore Service"}]}]}]]}]]}]}]}],["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0E1627] py-16 md:py-20","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"grid items-center gap-12 md:grid-cols-2","children":[["$","div",null,{"className":"relative h-[260px] md:h-[320px] overflow-hidden rounded-2xl border border-white/10 md:order-1","children":["$","img",null,{"src":"/images/services/consultancy.webp","alt":"ICT Consultancy","className":"h-full w-full object-cover"}]}],"$L3"]}]}]}],"$L4"],null,"$L5"]}],"loading":null,"isPartial":false} 3:["$","div",null,{"className":"md:order-2","children":[["$","h2",null,{"className":"text-white","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"left"},"children":"ICT Consultancy"}],["$","p",null,{"className":"mt-4 max-w-[520px] text-slate-300","children":"Strategic guidance that aligns technology decisions with business outcomes."}],["$","div",null,{"className":"mt-6","children":["$","$L2",null,{"href":"/services/consultancy","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Explore Service"}]}]}]]}] 4:["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n relative overflow-hidden bg-[#0B1220]","children":[["$","div",null,{"className":"pointer-events-none absolute inset-0 bg-[radial-gradient(circle_at_top,rgba(59,130,246,0.15),transparent_60%)]"}],["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"relative rounded-3xl border border-white/10 bg-white/5 px-8 py-16 text-center backdrop-blur-xl md:px-20","children":[["$","h2",null,{"className":"text-white","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"center"},"children":"Let’s Build Something Reliable"}],["$","p",null,{"className":"mx-auto mt-6 max-w-[720px] text-slate-300 leading-relaxed","children":"Whether you’re planning a new system, upgrading infrastructure, or strengthening security, our team is ready to support you with structured, enterprise-grade solutions."}],["$","div",null,{"className":"mt-10 flex flex-col items-center justify-center gap-4 sm:flex-row","children":[["$","$L2",null,{"href":"/contact","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Talk to an Expert"}]}],["$","$L2",null,{"href":"/services","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"transparent","color":"#1F4ED8","border":"1px solid #1F4ED8"},"children":"Explore Our Services"}]}]]}]]}]}]]}] 5:["$","$L6",null,{"children":["$","$7",null,{"name":"Next.MetadataOutlet","children":"$@8"}]}] 8:null