Welcome

[et_pb_section fb_built=”1″ background_color=”#101535″ fullwidth=”on” admin_label=”Hero Section” _builder_version=”3.3.1″ background_image=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto-bg-02.png” parallax=”on” custom_margin=”|||” custom_padding=”|||”][et_pb_fullwidth_header title=”SOLVING THE UNSOVLABLE.” text_orientation=”center” button_one_text=”SITEPIPER (MARKETING CONSULTANCY)” button_two_text=”twingravity (ENCRYPTION ALGORTHIM)” _builder_version=”3.0.106″ title_font=”Titillium Web||||||||” title_font_size=”66px” title_font_size_tablet=”40px” title_font_size_last_edited=”on|phone” title_text_color=”#e09900″ title_line_height=”1.5em” content_font=”||||||||” content_font_size=”18px” content_font_size_phone=”15px” content_font_size_last_edited=”on|phone” content_line_height=”2em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(16,21,53,0)” background_color_gradient_end=”#101535″ background_color_gradient_start_position=”50%” background_image=”http://thepowerpoint.us/wp-content/uploads/2018/07/Crypto_Illustration_07-1.png” background_position=”bottom_center” custom_margin=”|||” custom_padding=”5vw||40vw||false” custom_button_two=”on” button_two_text_size=”13px” button_two_text_color=”#4328b7″ button_two_bg_color=”#ffffff” button_two_border_width=”10px” button_two_border_color=”#ffffff” button_two_border_radius=”0px” button_two_letter_spacing=”2px” button_two_font=”Titillium Web|700||on|||||” button_two_letter_spacing_hover=”2px” custom_button_one=”on” button_one_text_size=”13px” button_one_text_color=”#ffffff” button_one_bg_color=”#4328b7″ button_one_border_width=”10px” button_one_border_color=”#4328b7″ button_one_border_radius=”0px” button_one_letter_spacing=”2px” button_one_font=”Titillium Web|700||on|||||” button_one_letter_spacing_hover=”2px” animation_style=”slide” animation_direction=”bottom” animation_duration=”1500ms” animation_intensity_slide=”2%” button_one_url=”wordpress.sitepiper.com” button_two_url=”twingravity.com”]

The Power Point provides unbreakable cybersecurity solutions.

[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ _builder_version=”3.3.1″ custom_margin=”|||” custom_padding=”|||”][et_pb_row custom_width_px=”1440px” _builder_version=”3.3.1″][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”OUT OF THE BOX” image=”http://thepowerpoint.us/wp-content/uploads/2018/07/Crypto_Icon_13.png” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ text_orientation=”center” custom_padding=”30px|16px|30px|16px” animation_style=”fold” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)” locked=”off”]

The Power Point provides unique solutions to complex problems. When others are stumped we provide the strategies, algorithms and insights that provide precise solutions. Creativite out-of-the-box thinking  is our strength.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”UNHACKABLE” image=”http://thepowerpoint.us/wp-content/uploads/2018/07/Crypto_Icon_15.png” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ text_orientation=”center” custom_padding=”30px|16px|30px|16px” animation_style=”fold” animation_delay=”300ms” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)” locked=”off”]

Sadly even the worlds’ most secure systems are vulnerable and have been seriously comprimized at one time or another.  The root basis of  cyber security lies in the mathematical formulas that drive encryption – hence The Power Point.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”OUT OF THE PARK” image=”http://thepowerpoint.us/wp-content/uploads/2018/07/Crypto_Icon_14.png” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ text_orientation=”center” custom_padding=”30px|16px|30px|16px” animation_style=”fold” animation_delay=”200ms” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)” locked=”off”]

Our unique mathematical formulas are unbreakable. Our algorithms are unhackable.  The Power Point’s main product line twingravity provides new core invulnerability for United States Intelligence and Defence Communities.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.3.1″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_button button_url=”http://www.twingravity.com” button_text=”Learn More About What We Have to Offer” button_alignment=”center” background_layout=”dark” _builder_version=”3.0.106″ custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#1b1f50″ button_border_width=”10px” button_border_color=”#1b1f50″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” button_letter_spacing_hover=”2px” box_shadow_style=”preset3″ locked=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”Featured Feature” _builder_version=”3.0.106″ custom_margin=”|||” custom_padding=”|||”][et_pb_row _builder_version=”3.3.1″][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em”]

EUGENE R. APODACA, PhD.

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.3.1″ max_width=”80px”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” text_font_size=”16px” text_line_height=”2em” header_font=”||||||||”]

The mathematician behind our twingravity product is Dr. Eugene Roger Apodaca. From his time as a United States Army Signal Corps Officer and XO in Viet Nam conflict to his time as a Senior Trajectory Engineer at JPL, Dr. Apodaca has developed unique and universal solutions to the worlds most challenging mathematical problems. His deep research across the most dificult scientific fields has helped him provide the core formulas and solutions for U.S. cyber security invulnerability.

[/et_pb_text][et_pb_button button_url=”http://www.twingravity.com” button_text=”Learn How” background_layout=”dark” _builder_version=”3.0.106″ custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#1b1f50″ button_border_width=”10px” button_border_color=”#1b1f50″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” button_letter_spacing_hover=”2px” box_shadow_style=”preset3″ locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto_illustration_19.png” align=”center” _builder_version=”3.0.106″ animation_style=”slide” animation_direction=”bottom” animation_delay=”500ms” animation_intensity_slide=”4%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”How it works” _builder_version=”3.0.106″ custom_margin=”|||” custom_padding=”|||”][et_pb_row _builder_version=”3.3.1″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em” text_orientation=”center”]

A Mathematical Solution

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.3.1″ max_width=”80px” module_alignment=”center”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” text_font_size=”16px” text_line_height=”2em” header_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center”]

At the core of all computing systems from computation to to encryption the math that drives the algorythm. The Power Point’s core product twingravity offers the United States Government with unbreakable solutions for its COMSEC systems.

[/et_pb_text][et_pb_button button_text=”VISIT TWINGRAVITY” button_alignment=”center” background_layout=”dark” _builder_version=”3.0.106″ custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#1b1f50″ button_border_width=”10px” button_border_color=”#1b1f50″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” button_letter_spacing_hover=”2px” box_shadow_style=”preset3″ locked=”off”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row use_custom_width=”on” custom_width_px=”1280px” _builder_version=”3.3.1″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto_illustration_02.png” align=”center” _builder_version=”3.3.1″ custom_padding=”|||” animation_style=”slide” animation_direction=”bottom” animation_delay=”500ms” animation_intensity_slide=”4%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”Features Section” _builder_version=”3.3.1″ custom_margin=”|||” custom_padding=”|||”][et_pb_row custom_padding_tablet=”||0px|” custom_padding_last_edited=”on|desktop” _builder_version=”3.0.106″][et_pb_column type=”2_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em”]

The Encryption Game

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.2″ max_width=”80px”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”||||||||” text_font_size=”16px” text_line_height=”2em” header_font=”||||||||”]

Both the Joint Technical Architecture (JTA) and the Army Technical Architecture (ATA) describe Internet Protocol (IP) version 6 (IPv6). IP Security (IPSec) is mandatory for IPv6 implementations. Given that IPv6 will be dominated by commercial off the shelf (COTS) software products, many in the DoD community will have a software encryption capability at their disposal. The Power Point will be in the GSA SAM system by Q3 2018.

[/et_pb_text][et_pb_button button_text=”Set Up a Consultation” background_layout=”dark” _builder_version=”3.3.1″ custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#1b1f50″ button_border_width=”10px” button_border_color=”#1b1f50″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” button_letter_spacing_hover=”2px” box_shadow_style=”preset3″ locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”Fast and Global” use_icon=”on” font_icon=”%%165%%” icon_color=”#3C3CC8″ icon_placement=”left” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ custom_margin_tablet=”70px|||” custom_margin_last_edited=”on|desktop” custom_padding=”30px|16px|30px|16px” animation_style=”fold” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”]

The twingravity product is available for  United States Intelligence Community and DOD Agencies approved for the highest level of COMSEC encryption solutions. 

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row custom_padding_tablet=”0px||0px|” custom_padding_last_edited=”on|tablet” _builder_version=”3.0.106″][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”HARDWARE INTEGRATION” use_icon=”on” font_icon=”%%14%%” icon_color=”#3C3CC8″ icon_placement=”left” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ custom_padding=”30px|16px|30px|16px” animation_style=”fold” animation_delay=”200ms” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”]

We hope to be able to leverage existing hardware solutions for the NSA and DOD, amongst  other U.S. authorized agencies. For Example the twingravity product line may integrate into DMS Fortezza cards and replace the Digital Signature Algorithm (DSA), the Secure Hash Algorithm (SHA), the SKIPJACK encryption algorithm, and on-board random number generators.  The twingravity core product many integrate into other devices are also being used in conjunction with Fortezza enabled Netscape Web products to enable an encrypted session.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”IMPOSSIBLE TO HACK” use_icon=”on” font_icon=”%%162%%” icon_color=”#3C3CC8″ icon_placement=”left” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ custom_padding=”30px|16px|30px|16px” animation_style=”fold” animation_delay=”400ms” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”]

Our core twingravity product is based on one of the worlds most challenging mathematical formulas which has never been solved until now.  Our universal solution, algorthym and strategies exceede NSA and DOD specifications.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”Guaranteed Security” use_icon=”on” font_icon=”%%166%%” icon_color=”#3C3CC8″ icon_placement=”left” background_layout=”dark” _builder_version=”3.3.1″ header_font=”Titillium Web|700||on|||||” header_font_size=”14px” header_letter_spacing=”2px” header_line_height=”1.8em” body_font=”Source Sans Pro||||||||” body_font_size=”16px” body_text_color=”rgba(255,255,255,0.7)” body_line_height=”1.8em” background_color=”rgba(60,60,200,0.2)” border_width_all=”2px” border_color_all=”#4328B7″ custom_padding=”30px|16px|30px|16px” animation_style=”fold” animation_delay=”100ms” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”]

Our American defense and intelligence systems face a daily and constant threat from a wide variety of enemies both foriegn and domestic. The Power Point, LLC’s twingravity core product provides a new generation of encryption capable of invulnerability.

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”CTA Section” custom_padding_last_edited=”on|phone” _builder_version=”3.3.1″ background_image=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto-bg-04.png” background_size=”contain” custom_margin=”|||” custom_padding=”|||35%” custom_padding_tablet=”|10%||10%||true” custom_padding_phone=”|||”][et_pb_row use_custom_width=”on” width_unit=”off” custom_width_percent=”100%” custom_padding=”50px|5%|50px|5%|true|true” custom_padding_tablet=”|40px||40px||true” custom_margin=”|||” custom_padding_last_edited=”on|tablet” _builder_version=”3.3.1″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(39,37,150,0.95)” background_color_gradient_end=”rgba(55,37,211,0.95)” background_color_gradient_direction=”35deg” custom_margin_last_edited=”off|desktop” animation_style=”fold” animation_direction=”left” animation_duration=”1500ms” animation_intensity_fold=”10%” animation_starting_opacity=”100%” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”Titillium Web|600||on|||||” text_letter_spacing=”1px” text_line_height=”1.8em” header_font=”||||||||”]

the power point, llc is a disabled veteran owned american business

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.3.1″ max_width=”80px”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em”]

Work with a Veteran Owned Business

[/et_pb_text][et_pb_button button_text=”Set Up A Free 30 Minute Call” background_layout=”dark” _builder_version=”3.3.1″ custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#1b1f50″ button_border_width=”10px” button_border_color=”#1b1f50″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” button_letter_spacing_hover=”2px” box_shadow_style=”preset3″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”Featured Feature” _builder_version=”3.0.106″ custom_margin=”|||” custom_padding=”|||”][et_pb_row _builder_version=”3.0.106″][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em”]

A New Generation of Encryption 

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.2″ max_width=”80px”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”||||||||” text_font_size=”16px” text_line_height=”2em” header_font=”||||||||”]

Imagine that most post-quantum cryptosystems that have been proposed, including lattice-based cryptosystems, code-based cryptosystems, multivariate cryptosystems, hash-based signatures, and others still dont have the mathematical problem-solution required to advance America’s encryption challenges. The Power Point, LLC’s twingravity core product accomplishes what others merely speculate upon. If your organization is an authorized U.S Intelligence or DOD agency, then call us. 

Note that the Federal Information Processing Standards Publication (FIPS) 186 and key establishment schemes specified in NIST Special Publications (SP) 800-56 A and B require core formulae. The process referred to as post-quantum cryptography standardization will still require what only The Power Point, LLC can provide – unbreakable encryption.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto_illustration_04.png” align=”center” _builder_version=”3.3.1″ animation_style=”slide” animation_direction=”bottom” animation_delay=”500ms” animation_intensity_slide=”4%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”Graph Chart Section” _builder_version=”3.3.1″ background_image=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto-bg-02.png” parallax=”on” custom_margin=”|||” custom_padding=”|||”][et_pb_row _builder_version=”3.0.106″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em” text_orientation=”center”]

Work with Disabled Veterans

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.2″ max_width=”80px” module_alignment=”center”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”||||||||” text_font_size=”16px” text_line_height=”2em” header_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center”]

U.S. Navy’s Space and Naval Warfare Systems Command (SPAWAR) Systems Center Atlantic (SSC Atlantic) is leveraging the flexible contracting platform known as other transaction authority to improve the service’s information warfare capabilities. Technologies will be developed through prototype project awards under the Navy’s new Information Warfare Research Project (IWRP) Consortium. The Power Point, LLC is applying to be part of this new consortium.

[/et_pb_text][et_pb_button button_text=”CALL US 8282165760″ button_alignment=”center” background_layout=”dark” _builder_version=”3.0.106″ custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#1b1f50″ button_border_width=”10px” button_border_color=”#1b1f50″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” button_letter_spacing_hover=”2px” box_shadow_style=”preset3″ locked=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#101535″ admin_label=”Investment Values” _builder_version=”3.3.1″ background_image=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto-bg-04.png” background_size=”initial” custom_margin=”|||” custom_padding=”|||”][et_pb_row custom_padding=”50px|50px||50px|false|true” background_color=”#191d52″ _builder_version=”3.3.1″ border_color_all=”#4328b7″ border_width_top=”2px” border_width_right=”2px” border_width_left=”2px” animation_direction=”bottom” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_divider height=”2px” _builder_version=”3.2″ max_width=”50px” module_alignment=”left”][/et_pb_divider][et_pb_contact_form email=”jmalki1@jhu.edu” module_id=”et_pb_contact_form_0″ _builder_version=”3.0.106″][et_pb_contact_field field_id=”Name” field_title=”Name” _builder_version=”3.0.47″ border_radii=”on||||”][/et_pb_contact_field][et_pb_contact_field field_id=”Email” field_title=”Email Address” field_type=”email” _builder_version=”3.0.106″ border_radii=”on||||”][/et_pb_contact_field][et_pb_contact_field field_id=”Message” field_title=”Message” field_type=”text” fullwidth_field=”on” _builder_version=”3.0.47″ border_radii=”on||||”][/et_pb_contact_field][/et_pb_contact_form][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”Roboto|500||on|||||” text_letter_spacing=”1px” text_line_height=”1.8em” header_font=”||||||||”]

Get in Touch with The Power Point, LLC

The Power Point, LLC provides nnovative information warfare solutions and defensive encyrption solutions for the United States Government.

We are a disabled veteran owned business.

Joseph B. MALKI, CEO

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row use_custom_gutter=”on” gutter_width=”2″ custom_padding=”|50px|50px|50px||true” background_color=”#191d52″ _builder_version=”3.3.1″ background_position=”bottom_center” border_color_all=”#4328b7″ border_width_right=”2px” border_width_bottom=”2px” border_width_left=”2px”][et_pb_column type=”1_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_number_counter title=”UNBREAKABLE” number=”9999999″ percent_sign=”off” background_layout=”dark” _builder_version=”3.0.106″ title_font=”Titillium Web|600||on|||||” title_font_size=”13px” title_letter_spacing=”1px” number_font=”Titillium Web|600|||||||” number_font_size=”50px” number_text_color=”#6FB8FC” number_line_height=”100px”][/et_pb_number_counter][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_number_counter title=”OUT OF THE BOX” number=”9999999″ percent_sign=”off” background_layout=”dark” _builder_version=”3.0.106″ title_font=”Titillium Web|600||on|||||” title_font_size=”13px” title_letter_spacing=”1px” number_font=”Titillium Web|600|||||||” number_font_size=”50px” number_text_color=”#6FB8FC” number_line_height=”100px”][/et_pb_number_counter][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_number_counter title=”OUT OF THE PARK” number=”9999999″ percent_sign=”off” background_layout=”dark” _builder_version=”3.0.106″ title_font=”Titillium Web|600||on|||||” title_font_size=”13px” title_letter_spacing=”1px” number_font=”Titillium Web|600|||||||” number_font_size=”50px” number_text_color=”#6FB8FC” number_line_height=”100px”][/et_pb_number_counter][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_number_counter title=”INVULNERABLE” number=”9999999″ percent_sign=”off” background_layout=”dark” _builder_version=”3.0.106″ title_font=”Titillium Web|600||on|||||” title_font_size=”13px” title_letter_spacing=”1px” number_font=”Titillium Web|600|||||||” number_font_size=”50px” number_text_color=”#6FB8FC” number_line_height=”100px”][/et_pb_number_counter][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Contact” custom_padding_last_edited=”on|phone” prev_background_color=”#101535″ _builder_version=”3.3.1″ use_background_color_gradient=”on” background_color_gradient_start=”#12163D” background_color_gradient_end=”#2b2996″ background_image=”http://thepowerpoint.us/wp-content/uploads/2018/07/crypto-bg-02.png” parallax=”on” custom_margin=”|||” custom_padding=”400px|0|120px||false|false” custom_padding_tablet=”200px|||” custom_padding_phone=”150px||100px|” top_divider_style=”arrow2″ top_divider_height=”350px” top_divider_height_tablet=”200px” top_divider_height_phone=”150px” top_divider_height_last_edited=”on|phone”][et_pb_row _builder_version=”3.0.106″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.0.106″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Titillium Web|600|||||||” header_2_font_size=”36px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” header_2_letter_spacing=”2px” header_2_line_height=”1.3em” text_orientation=”center”]

Need Consulting? Contact Us Now!

[/et_pb_text][et_pb_divider height=”4px” _builder_version=”3.2″ max_width=”80px” module_alignment=”center”][/et_pb_divider][et_pb_text background_layout=”dark” _builder_version=”3.3.1″ text_font=”||||||||” text_font_size=”18px” text_line_height=”2em” header_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center”]

U.S. DOD & U.S. INTELLIGENCE COMMUNITY ONLY.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0||0||false|false” custom_margin=”40px|||” _builder_version=”3.3.1″ animation_style=”fade” animation_direction=”top” box_shadow_style=”preset1″ box_shadow_blur=”60px” box_shadow_color=”rgba(60,60,200,0.4)”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_contact_form captcha=”off” email=”jmalki1@jhu.edu” form_background_color=”rgba(67,40,183,0.08)” module_id=”et_pb_contact_form_0″ _builder_version=”3.0.106″ title_font=”||||||||” form_field_font=”Titillium Web|600||on|||||” form_field_font_size=”12px” form_field_text_color=”#42526b” form_field_letter_spacing=”1px” background_color=”#ffffff” border_color_all=”#666EE8″ custom_margin=”|||” custom_padding=”50px|50px|50px|50px” custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#4328b7″ button_border_width=”10px” button_border_color=”#4328b7″ button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Titillium Web|700||on|||||” box_shadow_style_button=”preset3″][et_pb_contact_field field_id=”Name” field_title=”Name” _builder_version=”3.0.47″ border_radii=”on||||”][/et_pb_contact_field][et_pb_contact_field field_id=”Email” field_title=”Email Address” field_type=”email” _builder_version=”3.0.47″ border_radii=”on||||”][/et_pb_contact_field][et_pb_contact_field field_id=”Message” field_title=”Message” field_type=”text” fullwidth_field=”on” _builder_version=”3.0.47″ border_radii=”on||||”][/et_pb_contact_field][/et_pb_contact_form][/et_pb_column][/et_pb_row][/et_pb_section]