{"id":74,"date":"2019-02-25T04:33:48","date_gmt":"2019-02-25T04:33:48","guid":{"rendered":"https:\/\/doosys.ma\/elements\/accordions-toggles\/"},"modified":"2019-02-25T04:33:48","modified_gmt":"2019-02-25T04:33:48","slug":"accordions-toggles","status":"publish","type":"page","link":"https:\/\/doosys.ma\/en\/elements\/accordions-toggles\/","title":{"rendered":"Accordions &#038; Toggles"},"content":{"rendered":"<div id=\"tm-row-69f2eee0287a9\" class=\"vc_row vc_row-outer vc_row-fluid\"><div id=\"tm-column-69f2eee028c24\" class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"tm-row-inner-69f2eee028eb9\" class=\"vc_row vc_inner vc_row-fluid\"><div id=\"tm-column-inner-69f2eee0290d2\" class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-md-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n<div class=\"tm-heading  left tm-animation move-up\" id=\"tm-heading-69f2eee0292fb\">\n\t<h3 class=\"heading\" style=\"\">Accordions<\/h3><\/div>\n\n<div class=\"tm-spacer\" id=\"tm-spacer-69f2eee029532\"><\/div>\n<div class=\"tm-accordion style-01 tm-animation move-up\" id=\"tm-accordion-69f2eee029607\"\n\t>\n\t\n\t\t<div class=\"accordion-section active\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">How can we help your business?<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\tstyle=\"display: block;\"\t\t\t>\n\t\t\t\t\t\t\t\t\tThrough the collaboration with customers in discussing needs and demand, we're able to attain mutual understanding, gain customer trust to offer appropriate advice, and bring about suggestions on suitable technology to transform your business.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">What are the advantages of Mitech?<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tMitech takes into consideration every little detail to make sure the system run smoothly and responsively. Mitech employs a new technique called Minified Technology for securing customers' database &amp; building up highly confidential firewalls.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">How working process is simplified?<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tWe reduce redundant complex calculations and lengthy erroneous code texts with simpler ones to ensure Mitech would run seamlessly and the design is reserved in its best form when viewed from a wide range of mobile devices &amp; browsers.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">Product Engineering &amp; Services<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tOur service offerings to enhance customer experience throughout the product lifecycle includes \u2013 test and repair, service management, and end-to-end warranty management.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<div class=\"tm-spacer\" id=\"tm-spacer-69f2eee0296ad\"><\/div>\n<\/div><\/div><\/div><div id=\"tm-column-inner-69f2eee02973d\" class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-md-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n<div class=\"tm-heading  left tm-animation move-up\" id=\"tm-heading-69f2eee02985d\">\n\t<h3 class=\"heading\" style=\"\">Toggles<\/h3><\/div>\n\n<div class=\"tm-spacer\" id=\"tm-spacer-69f2eee029a1a\"><\/div>\n<div class=\"tm-accordion style-01 tm-animation move-up\" id=\"tm-accordion-69f2eee029a75\"\n\tdata-multi-open=\"1\">\n\t\n\t\t<div class=\"accordion-section active\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">How can we help your business?<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\tstyle=\"display: block;\"\t\t\t>\n\t\t\t\t\t\t\t\t\tThrough the collaboration with customers in discussing needs and demand, we're able to attain mutual understanding, gain customer trust to offer appropriate advice, and bring about suggestions on suitable technology to transform your business.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">What are the advantages of Mitech?<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tMitech takes into consideration every little detail to make sure the system run smoothly and responsively. Mitech employs a new technique called Minified Technology for securing customers' database &amp; building up highly confidential firewalls.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">How working process is simplified?<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tWe reduce redundant complex calculations and lengthy erroneous code texts with simpler ones to ensure Mitech would run seamlessly and the design is reserved in its best form when viewed from a wide range of mobile devices &amp; browsers.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">Product Engineering &amp; Services<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tOur service offerings to enhance customer experience throughout the product lifecycle includes \u2013 test and repair, service management, and end-to-end warranty management.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"tm-spacer\" id=\"tm-spacer-69f2eee029b46\"><\/div>\n<\/div><\/div><\/div><\/div><div id=\"tm-row-69f2eee029c2d\" class=\"vc_row vc_row-outer vc_row-fluid\"><div id=\"tm-column-69f2eee029d43\" class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"tm-row-inner-69f2eee029e36\" class=\"vc_row vc_inner vc_row-fluid\"><div id=\"tm-column-inner-69f2eee029f39\" class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-md-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n<div class=\"tm-heading  left tm-animation move-up\" id=\"tm-heading-69f2eee02a04c\">\n\t<h3 class=\"heading\" style=\"\">Accordions<\/h3><\/div>\n\n<div class=\"tm-spacer\" id=\"tm-spacer-69f2eee02a201\"><\/div>\n<div class=\"tm-accordion style-02 tm-animation move-up\" id=\"tm-accordion-69f2eee02a25d\"\n\t>\n\t\n\t\t<div class=\"accordion-section active\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">New multiple site connectivity<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\tstyle=\"display: block;\"\t\t\t>\n\t\t\t\t\t\t\t\t\tWe use a newly developed technology to connect sites that are based on different types of servers and networks, SiteConnect, which helps to reduce the misinterpretation of signals as well as the loss of data during transfering.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">IT security &amp; software<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tTo keep your systems, your devices, and network stay secure, we have developed a new program that limits the access of suspicious objects or people and authenticate all logins to the system.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">Weak hosted capability<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tSome hosts are unaware of the potential risks as well as security loopholes in their system. By detecting these errors and taking prompt actions on improving firewalls, we can upgrade the system security.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">Build internal network<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tThe internal network is essential for all companies and corporations, especially for those working in IT sector. To avoid possible risks when sharing internal confidential files and documentation to an external receiver, internal network must be strong.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<div class=\"tm-spacer\" id=\"tm-spacer-69f2eee02a2e7\"><\/div>\n<\/div><\/div><\/div><div id=\"tm-column-inner-69f2eee02a375\" class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-md-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n<div class=\"tm-heading  left tm-animation move-up\" id=\"tm-heading-69f2eee02a488\">\n\t<h3 class=\"heading\" style=\"\">Toggles<\/h3><\/div>\n\n<div class=\"tm-spacer\" id=\"tm-spacer-69f2eee02a636\"><\/div>\n<div class=\"tm-accordion style-02 tm-animation move-up\" id=\"tm-accordion-69f2eee02a68a\"\n\tdata-multi-open=\"1\">\n\t\n\t\t<div class=\"accordion-section active\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">New multiple site connectivity<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\tstyle=\"display: block;\"\t\t\t>\n\t\t\t\t\t\t\t\t\tWe use a newly developed technology to connect sites that are based on different types of servers and networks, SiteConnect, which helps to reduce the misinterpretation of signals as well as the loss of data during transfering.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">IT security &amp; software<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tTo keep your systems, your devices, and network stay secure, we have developed a new program that limits the access of suspicious objects or people and authenticate all logins to the system.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">Weak hosted capability<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tSome hosts are unaware of the potential risks as well as security loopholes in their system. By detecting these errors and taking prompt actions on improving firewalls, we can upgrade the system security.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"accordion-section\">\n\t\t\t\t\t\t\t<div class=\"accordion-title-wrapper\">\n\t\t\t\t\t<h6 class=\"accordion-title\">Build internal network<span\n\t\t\t\t\t\t\tclass=\"accordion-icon\"><\/span><\/h6>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"accordion-content\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\tThe internal network is essential for all companies and corporations, especially for those working in IT sector. To avoid possible risks when sharing internal confidential files and documentation to an external receiver, internal network must be strong.\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Accordions How can we help your business? Through the collaboration with customers in discussing needs and demand, we're able to attain mutual understanding, gain customer trust to offer appropriate advice, and bring about suggestions on suitable technology to transform your business. What are the advantages of Mitech? Mitech takes into consideration every little detail to make sure the system run smoothly and responsively. Mitech employs a new technique called Minified Technology for securing customers' database &amp; building up highly confidential firewalls. How working process is simplified? We reduce redundant complex calculations and lengthy erroneous code texts with simpler ones to ensure Mitech would run seamlessly and the design is reserved in its best form when viewed from a wide range of mobile devices &amp; browsers. Product Engineering &amp; Services Our service offerings to enhance customer experience throughout the product lifecycle includes \u2013 test and repair, service management, and end-to-end warranty management. Toggles How can we help your business? Through the collaboration with customers in discussing needs and demand, we're able to attain mutual understanding, gain customer trust to offer appropriate advice, and bring about suggestions on suitable technology to transform your business. What are the advantages of Mitech? Mitech takes into consideration every little detail to make sure the system run smoothly and responsively. Mitech employs a new technique called Minified Technology for securing customers' database &amp; building up highly confidential firewalls. How working process is simplified? We reduce redundant complex calculations and lengthy erroneous code texts with simpler ones to ensure Mitech would run seamlessly and the design is reserved in its best form when viewed from a wide range of mobile devices &amp; browsers. Product Engineering &amp; Services Our service offerings to enhance customer experience throughout the product lifecycle includes \u2013 test and repair, service management, and end-to-end warranty management. Accordions New multiple site connectivity We use a newly developed technology to connect sites that are based on different types of servers and networks, SiteConnect, which helps to reduce the misinterpretation of signals as well as the loss of data during transfering. IT security &amp; software To keep your systems, your devices, and network stay secure, we have developed a new program that limits the access of suspicious objects or people and authenticate all logins to the system. Weak hosted capability Some hosts are unaware of the potential risks as well as security loopholes in their system. By detecting these errors and taking prompt actions on improving firewalls, we can upgrade the system security. Build internal network The internal network is essential for all companies and corporations, especially for those working in IT sector. To avoid possible risks when sharing internal confidential files and documentation to an external receiver, internal network must be strong. Toggles New multiple site connectivity We use a newly developed technology to connect sites that are based on different types of servers and networks, SiteConnect, which helps to reduce the misinterpretation of signals as well as the loss of data during transfering. IT security &amp; software To keep your systems, your devices, and network stay secure, we have developed a new program that limits the access of suspicious objects or people and authenticate all logins to the system. Weak hosted capability Some hosts are unaware of the potential risks as well as security loopholes in their system. By detecting these errors and taking prompt actions on improving firewalls, we can upgrade the system security. Build internal network The internal network is essential for all companies and corporations, especially for those working in IT sector. To avoid possible risks when sharing internal confidential files and documentation to an external receiver, internal network must be strong.","protected":false},"author":1,"featured_media":0,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/pages\/74"}],"collection":[{"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":0,"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/pages\/74\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/pages\/46"}],"wp:attachment":[{"href":"https:\/\/doosys.ma\/en\/wp-json\/wp\/v2\/media?parent=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}