1:"$Sreact.fragment" 2:I[43271,["/_next/static/chunks/a2f6e9c9de6c3836.js","/_next/static/chunks/6592a0777d8d13c5.js","/_next/static/chunks/169b15eba181c95c.js"],"AnimatedSection"] 3:I[85437,["/_next/static/chunks/a2f6e9c9de6c3836.js","/_next/static/chunks/6592a0777d8d13c5.js","/_next/static/chunks/169b15eba181c95c.js"],"Image"] 7:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"OutletBoundary"] 8:"$Sreact.suspense" 0:{"buildId":"UzlLLXVhBc0YXHHD7Br13","rsc":["$","$1","c",{"children":[["$","main",null,{"className":"min-h-screen bg-[#151A21] text-slate-100 px-6 py-32","children":["$","div",null,{"className":"max-w-7xl mx-auto space-y-16","children":[["$","$L2",null,{"direction":"left","className":"space-y-6","children":[["$","div",null,{"className":"relative w-full h-[260px] md:h-[340px] rounded-3xl overflow-hidden border border-white/10","children":[["$","$L3",null,{"src":"/images/platforms/aiot-management/aiot-dashboard.svg","alt":"AIoT device management dashboard","fill":true,"className":"object-cover","sizes":"(max-width: 768px) 100vw, 90vw","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-[#151A21] via-transparent to-transparent"}]]}],["$","h1",null,{"className":"text-5xl font-semibold","children":"AIoT Device Management"}],["$","p",null,{"className":"text-white/70 text-lg max-w-3xl","children":"A unified Mobile Device Management (MDM) and IoT monitoring suite. Secure, configure, and update your entire fleet of radios and sensors from the cloud."}]]}],["$","$L2",null,{"direction":"right","className":"grid md:grid-cols-3 gap-8","children":[["$","div",null,{"className":"bg-white/5 p-8 rounded-2xl border border-white/10 space-y-4","children":[["$","div",null,{"className":"relative w-full h-40 overflow-hidden rounded-xl","children":["$","$L3",null,{"src":"/images/platforms/aiot-device-management/devices-network.png","alt":"Connected AIoT devices","fill":true,"className":"object-cover"}]}],["$","h3",null,{"className":"text-xl font-semibold text-white mb-4","children":"Zero-Touch Provisioning"}],["$","p",null,{"className":"text-slate-400 text-sm","children":"Deploy devices instantly. Configurations are pushed over-the-air (OTA) immediately upon activation, removing the need for manual setup."}]]}],["$","div",null,{"className":"bg-white/5 p-8 rounded-2xl border border-white/10 space-y-4","children":[["$","div",null,{"className":"relative w-full h-40 overflow-hidden rounded-xl","children":["$","$L3",null,{"src":"/images/platforms/aiot-device-management/device-dashboard.png","alt":"AIoT management dashboard","fill":true,"className":"object-cover"}]}],["$","h3",null,{"className":"text-xl font-semibold text-white mb-4","children":"Kiosk Mode"}],["$","p",null,{"className":"text-slate-400 text-sm","children":"Lock down devices to specific applications. Prevent distraction and misuse by restricting access to unauthorised apps and settings."}]]}],["$","div",null,{"className":"bg-white/5 p-8 rounded-2xl border border-white/10 space-y-4","children":[["$","div",null,{"className":"relative w-full h-40 overflow-hidden rounded-xl","children":["$","$L3",null,{"src":"/images/platforms/aiot-device-management/device-security.png","alt":"Device security","fill":true,"className":"object-cover"}]}],["$","h3",null,{"className":"text-xl font-semibold text-white mb-4","children":"Remote Diagnostics"}],["$","p",null,{"className":"text-slate-400 text-sm","children":"Monitor battery health, signal strength, and storage status. Troubleshoot issues remotely with screen sharing and log retrieval."}]]}]]}],["$","$L2",null,{"direction":"left","className":"mb-4","children":[["$","h2",null,{"className":"text-3xl font-semibold text-white mb-8","children":"Enterprise Security Features"}],["$","ul",null,{"className":"grid md:grid-cols-2 gap-4 text-slate-300","children":[["$","li",null,{"className":"flex items-center gap-3 p-4 bg-white/5 rounded-lg border border-white/5","children":[["$","span",null,{"className":"text-[#0EA5E9]","children":"✓"}]," Remote Wipe & Lock capability"]}],["$","li",null,{"className":"flex items-center gap-3 p-4 bg-white/5 rounded-lg border border-white/5","children":[["$","span",null,{"className":"text-[#0EA5E9]","children":"✓"}]," Application Whitelisting/Blacklisting"]}],["$","li",null,{"className":"flex items-center gap-3 p-4 bg-white/5 rounded-lg border border-white/5","children":[["$","span",null,{"className":"text-[#0EA5E9]","children":"✓"}]," Enforced Password Policies"]}],"$L4"]}]]}]]}]}],["$L5"],"$L6"]}],"loading":null,"isPartial":false} 4:["$","li",null,{"className":"flex items-center gap-3 p-4 bg-white/5 rounded-lg border border-white/5","children":[["$","span",null,{"className":"text-[#0EA5E9]","children":"✓"}]," Geofence-based Policy Enforcement"]}] 5:["$","script","script-0",{"src":"/_next/static/chunks/169b15eba181c95c.js","async":true}] 6:["$","$L7",null,{"children":["$","$8",null,{"name":"Next.MetadataOutlet","children":"$@9"}]}] 9:null