1:"$Sreact.fragment" 2:I[3452,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"InternalLinkGuard"] 3:I[39756,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default"] 4:I[37457,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default"] 5:I[62319,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js","/_next/static/chunks/0vcrl8nq585~c.js","/_next/static/chunks/0b6-gt.yzr91b.js"],"Navbar"] 16:I[68027,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default",1] :HL["/_next/static/chunks/13hwtrg01czxk.css","style"] 0:{"P":null,"c":["","case-studies"],"q":"","i":false,"f":[[["",{"children":["case-studies",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",16],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/13hwtrg01czxk.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/0hddkyy7scto8.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/0d3shmwh5_nmn.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"en","children":["$","body",null,{"children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]]}]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[[["$","$L5",null,{}],["$","main",null,{"className":"min-h-screen bg-[#f5f5f5] px-4 pb-24 pt-36 text-[#0e1229] md:px-8","children":["$","section",null,{"className":"mx-auto max-w-[1180px]","children":[["$","div",null,{"className":"mb-12","children":[["$","p",null,{"className":"text-sm font-semibold uppercase tracking-[0.32em] text-[#6f7280]","children":"Case studies"}],["$","h1",null,{"className":"mt-4 max-w-4xl text-[52px] font-semibold leading-none tracking-normal md:text-[86px]","children":"Applied AI systems with measurable outcomes."}]]}],["$","div",null,{"className":"grid gap-5","children":[["$","a","support-pilot",{"href":"/case-studies/support-pilot","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#323d68"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Multichannel Integration",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Multichannel Integration"}],["$","span","Knowledge Base Engineering",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Knowledge Base Engineering"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Support Pilot - Multichannel AI Customer Assistant"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A customer support assistant connected across chat, email, and internal documentation to reduce response delays and keep service available around the clock."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":"$L6"}]]}]]}]]}],"$L7","$L8","$L9","$La","$Lb","$Lc","$Ld","$Le","$Lf","$L10"]}]]}]}]],["$L11","$L12"],"$L13"]}],{},null,false,null]},null,false,"$@14"]},null,false,null],"$L15",false]],"m":"$undefined","G":["$16",["$L17"]],"S":true,"h":null,"s":"$undefined","l":"$undefined","p":"$undefined","d":"$undefined","b":"5GYVpYaq5Rczv4hgtnuFm"} 18:I[5014,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js","/_next/static/chunks/0vcrl8nq585~c.js","/_next/static/chunks/0b6-gt.yzr91b.js"],"default"] 19:I[97367,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"OutletBoundary"] 1a:"$Sreact.suspense" 1d:I[97367,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"ViewportBoundary"] 1f:I[97367,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"MetadataBoundary"] 6:["$","$L18",null,{"ref":"$undefined","iconNode":[["path",{"d":"M7 7h10v10","key":"1tivn9"}],["path",{"d":"M7 17 17 7","key":"1vkiza"}]],"className":"lucide-arrow-up-right","size":22}] 7:["$","a","retail-flow",{"href":"/case-studies/retail-flow","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#0e1229"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","AI Forecasting",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"AI Forecasting"}],["$","span","Process Automation",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Process Automation"}],["$","span","Systems Integration",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Systems Integration"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Retail Flow - AI-Driven Demand Forecasting & Inventory Automation"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A forecasting and inventory automation workflow that helped store teams anticipate demand, reduce stockouts, and save operational time."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 8:["$","a","leadsense",{"href":"/case-studies/leadsense","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#4f5b7f"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","AI Lead Scoring",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"AI Lead Scoring"}],["$","span","Workflow Automation",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Workflow Automation"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Leadsense - Automated Lead Qualification & Routing Engine"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A qualification and routing engine that scored incoming leads, matched them to the right team, and reduced manual review work."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 9:["$","a","cyber-threats-pakistan-power-grid",{"href":"/case-studies/cyber-threats-pakistan-power-grid","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#1f3650"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Critical Infrastructure",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Critical Infrastructure"}],["$","span","Threat Analysis",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Threat Analysis"}],["$","span","ICS/OT Security",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"ICS/OT Security"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Cyber Threats to Pakistan's National Power Grid"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Analysis of cyber risk exposure in Pakistan's power infrastructure and the strategic implications for grid resilience and public service continuity."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] a:["$","a","strategic-comprehension-cyber-insecurity-pakistan",{"href":"/case-studies/strategic-comprehension-cyber-insecurity-pakistan","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#253f58"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","National Cyber Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"National Cyber Strategy"}],["$","span","Policy Gap",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Policy Gap"}],["$","span","Cyber Governance",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyber Governance"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"The Absence of Strategic Comprehension Leading to Cyber Insecurity for Pakistan"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A policy-focused paper exploring structural and strategic gaps that weaken national cybersecurity posture and institutional cyber preparedness."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] b:["$","a","cyber-risks-to-nuclear-strategic-environment",{"href":"/case-studies/cyber-risks-to-nuclear-strategic-environment","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#2b4a65"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Strategic Security",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Strategic Security"}],["$","span","Nuclear Domain",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Nuclear Domain"}],["$","span","Cyber Risk",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyber Risk"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Dissecting Security Strategies for the Cyberspace Strategic Environment and Identifying Cyber Risks to the Nuclear Strategic Environment"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Examination of strategic security theory in cyberspace and its relevance to risk within nuclear decision environments."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] c:["$","a","algorithmic-warfare-analysis",{"href":"/case-studies/algorithmic-warfare-analysis","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#324f6b"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Emerging Technology",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Emerging Technology"}],["$","span","Military Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Military Strategy"}],["$","span","AI and Security",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"AI and Security"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Algorithmic Warfare - Analysis"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A strategic review of algorithmic warfare and the implications of rapid technological change for military power and national security."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] d:["$","a","cyber-attack-a-nation-unprepared",{"href":"/case-studies/cyber-attack-a-nation-unprepared","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#3a5875"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Incident Analysis",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Incident Analysis"}],["$","span","National Resilience",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"National Resilience"}],["$","span","Operational Impact",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Operational Impact"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"A Cyber Attack, A Nation Unprepared"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Case analysis of national-level disruption and the wider institutional and societal consequences of cyber-induced outages."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] e:["$","a","pakistan-private-sector-strategic-cyber-context",{"href":"/case-studies/pakistan-private-sector-strategic-cyber-context","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#43627f"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Private Sector",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Private Sector"}],["$","span","Defense Innovation",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Defense Innovation"}],["$","span","Cyber Ecosystem",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyber Ecosystem"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Examining the Role of Pakistan's Private Sector in a Strategic Cyber Context"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Discussion of how private industry contributes to strategic cyber capability development and national security outcomes."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] f:["$","a","strategic-competitive-enabler-part-1",{"href":"/case-studies/strategic-competitive-enabler-part-1","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#4c6c89"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Cyberspace Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyberspace Strategy"}],["$","span","Competition",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Competition"}],["$","span","Military Thought",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Military Thought"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"A Strategic Competitive Enabler (Part-1)"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Part one of a strategic series framing cyberspace as a core competitive domain in contemporary statecraft and security planning."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 10:["$","a","strategic-competitive-enabler-part-2",{"href":"/case-studies/strategic-competitive-enabler-part-2","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#557694"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Cyberspace Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyberspace Strategy"}],["$","span","Competition",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Competition"}],["$","span","Military Thought",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Military Thought"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"A Strategic Competitive Enabler (Part-2)"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Part two continuing the strategic perspective on cyberspace as a decisive factor in long-term national competition."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L18",null,{"ref":"$undefined","iconNode":"$6:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 11:["$","script","script-0",{"src":"/_next/static/chunks/0vcrl8nq585~c.js","async":true,"nonce":"$undefined"}] 12:["$","script","script-1",{"src":"/_next/static/chunks/0b6-gt.yzr91b.js","async":true,"nonce":"$undefined"}] 13:["$","$L19",null,{"children":["$","$1a",null,{"name":"Next.MetadataOutlet","children":"$@1b"}]}] 1c:[] 14:"$W1c" 15:["$","$1","h",{"children":[null,["$","$L1d",null,{"children":"$L1e"}],["$","div",null,{"hidden":true,"children":["$","$L1f",null,{"children":["$","$1a",null,{"name":"Next.Metadata","children":"$L20"}]}]}],null]}] 17:["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/13hwtrg01czxk.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}] 1e:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 21:I[27201,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"IconMark"] 1b:null 20:[["$","title","0",{"children":"CyberArmour"}],["$","meta","1",{"name":"description","content":"Next-generation AI automation systems, workflows, chatbots, analytics, and consulting for modern businesses."}],["$","link","2",{"rel":"shortcut icon","href":"/cyberarmour-logo-mark.svg"}],["$","link","3",{"rel":"icon","href":"/cyberarmour-logo-mark.svg"}],["$","link","4",{"rel":"apple-touch-icon","href":"/cyberarmour-logo-mark.svg"}],["$","$L21","5",{}]]