// Shared FAQ component for LLM-citable Q&A blocks at the bottom of key pages.
// Content is keyed by page; each entry renders as a semantic <section> with
// <h2> section heading and a list of <article> Q&A cards using
// <h3> questions + <p> answers. Matches the JSON-LD FAQPage injected in head.

window.FAQ_CONTENT = {
  home: {
    heading: 'Common questions',
    items: [
      {
        q: 'What does Technology Cycle do?',
        a: 'Technology Cycle is a technology operations firm. We help mid-market and enterprise businesses treat the entire technology stack as a system — spanning AI implementation, custom software development, cloud and SaaS optimization, technology spend audits, cybersecurity consulting, and ongoing managed services for the systems we build. AI is one of our capabilities, not the whole practice; most engagements touch multiple of these areas. Since 2016 we\u2019ve collectively managed business technology for over a thousand companies ranging from small business through enterprise.',
      },
      {
        q: 'Who is Technology Cycle for?',
        a: 'We serve companies from roughly 100 employees through enterprise — mid-market is our sweet spot, and we already run engagements for organizations with several thousand employees today. Typical clients are operations, IT, and transformation leaders who need a single partner accountable for AI, software, and technology strategy. We regularly work with teams in regulated industries — healthcare, financial services, legal, professional services — that must ship AI responsibly. Smaller growth-stage companies that are ready to move strategically are a fit too; we\u2019re selective regardless of size.',
      },
      {
        q: 'How is this different from a typical IT consultancy?',
        a: 'Most IT firms sell you tools and walk away. Most AI consultancies demo something impressive and leave you to implement. Technology Cycle is accountable for the outcome end-to-end: we design the system, build the pieces, operate them in production, and iterate with you quarterly. Security is baked in from day one, not bolted on later.',
      },
      {
        q: 'Do you replace jobs?',
        a: 'No. Every AI deployment we build is designed around the principle of reclaiming hours, not reducing headcount. Your team spends their time on strategy, relationships, and judgment calls — the work agents and pipelines handle is the repetitive work that shouldn\u2019t have required a human to begin with.',
      },
    ],
  },
  solutions: {
    heading: 'Questions about our solutions',
    items: [
      {
        q: 'What AI solutions does Technology Cycle build?',
        a: 'We build four categories of AI solutions: voice and chat agents that handle inbound call overflow and CX tickets, internal copilots that give teams structured access to company data, document pipelines that extract and route information from unstructured inputs, and custom automations that connect existing SaaS tools into end-to-end workflows.',
      },
      {
        q: 'Do you build custom software beyond AI?',
        a: 'Yes. Roughly half of our work is custom internal tools, dashboards, and workflow applications — often paired with AI, but also standalone. We also integrate existing SaaS stacks when off-the-shelf tools are the right fit, so you avoid building anything we can source.',
      },
      {
        q: 'Can you audit our current technology spend?',
        a: 'Yes. Our technology spend audit identifies redundant SaaS subscriptions, underused licenses, and opportunities to renegotiate or consolidate. Most clients find the audit pays for itself in the first quarter — we\u2019ve recovered six-figure annual spend for companies who thought their stack was already lean.',
      },
      {
        q: 'Are you an MSP? Do you handle day-to-day IT support?',
        a: 'No — we\'re not a traditional break/fix MSP and we don\'t run a help desk. What we do is advise on IT and cybersecurity strategy, and then help you source the right day-to-day IT and managed security provider from our vetted partner network — we have 300+ global technology partners and can match you to the right fit for your size, industry, and compliance posture. We also offer monthly managed services focused on the systems we build for you (AI agents, custom software, integrations, automations) — monitoring, optimization, and quarterly strategic planning. That\'s different from the endpoint-and-ticket help desk work most MSPs do.',
      },
      {
        q: 'Do you do cybersecurity consulting?',
        a: 'Yes. We advise on security architecture, compliance alignment (SOC 2, HIPAA, GDPR), vendor risk, and AI-specific security (model vetting, human-in-the-loop governance, audit trails, data-residency controls). When ongoing managed security work is needed — SIEM monitoring, SOC services, endpoint protection at scale — we bring in the right partner from our network and stay accountable end-to-end.',
      },
    ],
  },
  'the-cycle': {
    heading: 'About the framework',
    items: [
      {
        q: 'What is the Technology Cycle framework?',
        a: 'The Technology Cycle is our core operating model — a continuous four-stage loop: Assess, Build, Operate, Evolve. We audit your current state, design and implement what\u2019s needed, run it in production, and iterate with you through quarterly business reviews. The cycle is continuous because technology never stops moving.',
      },
      {
        q: 'Why is it a cycle and not a project?',
        a: 'Because technology never stays still. A one-off project gives you a snapshot of value that degrades as markets, models, and tools evolve. A cycle keeps you compounding: every quarter we revisit what we\u2019ve built, measure outcomes, retire what\u2019s no longer earning its place, and introduce new capabilities.',
      },
      {
        q: 'How long is a typical engagement?',
        a: 'Minimum engagements are structured in 90-day cycles, but most clients stay with us for multiple years. The longer the relationship, the more the cycle compounds — year two and three are typically when the biggest leverage shows up, because we\u2019ve earned enough context about your operation to make bigger moves.',
      },
      {
        q: 'What happens during the Assess stage?',
        a: 'We audit four things: your technology stack (what you have, what it costs, what\u2019s redundant), your security posture (gaps, compliance alignment), your workflow bottlenecks (where humans are doing work machines should), and your team\u2019s capacity (what you can absorb and maintain). The output is a prioritized roadmap of high-leverage moves.',
      },
    ],
  },
  security: {
    heading: 'Questions about security',
    items: [
      {
        q: 'How does Technology Cycle handle AI security?',
        a: 'Every AI deployment is zero-trust by default: data residency controls, PII redaction pipelines on every agent workflow, audit logs on all model calls, and explicit data-use agreements that prohibit training public models on client data. SOC 2 aligned processes govern how we build and operate.',
      },
      {
        q: 'Do you use client data to train models?',
        a: 'No. Client data is never used to train public or third-party models. Where fine-tuning is appropriate, we use private model instances with explicit contractual boundaries, and tenant data stays isolated to the tenant.',
      },
      {
        q: 'Are you SOC 2 certified?',
        a: 'Our internal processes are SOC 2 aligned, and we support clients pursuing their own SOC 2, HIPAA, or ISO 27001 certifications. When a client needs formal attestation, we coordinate with their auditor and provide the artifacts and controls documentation required.',
      },
      {
        q: 'How do you handle incident response?',
        a: 'Every engagement includes a defined incident response runbook: on-call rotation, escalation paths, post-mortems, and disclosure procedures. Managed IT clients get 24/7 monitoring with defined SLAs on response time, not just resolution time.',
      },
    ],
  },
};

// React component — render the FAQ for a given page key.
window.PageFAQ = function PageFAQ({ pageKey }) {
  const data = window.FAQ_CONTENT[pageKey];
  if (!data) return null;

  return (
    <section className="page-faq" id="faq" aria-labelledby="faq-heading">
      <div className="container">
        <div className="section-head left" style={{ marginBottom: 36 }}>
          <span className="kicker">FAQ</span>
          <h2 id="faq-heading" style={{ marginTop: 18 }}>{data.heading}</h2>
        </div>
        <div className="faq-list">
          {data.items.map((item, i) => (
            <article className="faq-card" key={i}>
              <h3 className="faq-q">{item.q}</h3>
              <p className="faq-a">{item.a}</p>
            </article>
          ))}
        </div>
      </div>
    </section>
  );
};
