Skip to content

Commit 1ac764d

Browse files
committed
Spelling and link fixes
1 parent bedb3d7 commit 1ac764d

File tree

13 files changed

+143
-51
lines changed

13 files changed

+143
-51
lines changed

.wordlist.txt

Lines changed: 92 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,6 @@ Alibaba
308308
Altra
309309
AmazonRDS
310310
Analytics
311-
Andoid
312311
Anonymized
313312
ArmDeveloperEcosystem
314313
ArmNN
@@ -3420,4 +3419,95 @@ snortrules
34203419
techmahindra
34213420
unreferenced
34223421
uptime
3423-
wC
3422+
wC
3423+
ApiService
3424+
AppHost
3425+
ArmPyTorchMNISTInference
3426+
Blazor
3427+
CameraX
3428+
ComputationService
3429+
Coroutine
3430+
EOF
3431+
EVCLI
3432+
EVidence
3433+
Evcli
3434+
GC’s
3435+
GenerateMatrix
3436+
ImageCapture
3437+
InputStream
3438+
JWT
3439+
JetPack
3440+
KBS
3441+
MediaPipe's
3442+
Mongod
3443+
Multimodal
3444+
NNAPI
3445+
NPUs
3446+
NetAspire
3447+
OpenTelemetry
3448+
PIL
3449+
PerformIntensiveCalculations
3450+
ReactiveX's
3451+
ServiceDefaults
3452+
SharedFlow
3453+
Skopeo
3454+
StateFlow
3455+
TestOpenCV
3456+
TrustedFirmware
3457+
Veraison
3458+
WeatherForecast
3459+
WebGPU’s
3460+
Wiredtiger
3461+
androidml
3462+
ar
3463+
armpytorchmnistinference
3464+
codelabs
3465+
combinator
3466+
cooldown
3467+
coroutines
3468+
cryptographically
3469+
datatracker
3470+
debounce
3471+
decrypts
3472+
diagnosticDataCollectionDirectorySizeMB
3473+
eab
3474+
eth
3475+
evcli
3476+
googleblog
3477+
hanyin
3478+
honorSystemUmask
3479+
ietf
3480+
jsonviewer
3481+
keyFile
3482+
livestream
3483+
lockCodeSegmentsInMemory
3484+
matrixResult
3485+
matrixSize
3486+
maxIncomingConnections
3487+
mongod
3488+
mongosh
3489+
multimodality
3490+
multimodel
3491+
oplogSizeMB
3492+
optimizable
3493+
orchestrator
3494+
prebuild
3495+
preconfigured
3496+
relica
3497+
replSetName
3498+
rfc
3499+
serializable
3500+
setParameter
3501+
skopeo
3502+
subclasses
3503+
subproject
3504+
subproject's
3505+
subrepositories
3506+
suppressNoTLSPeerCertificateWarning
3507+
systemLog
3508+
tlsWithholdClientCertificate
3509+
unutilized
3510+
vLLM
3511+
veraison
3512+
verifier
3513+
vllm

content/learning-paths/cross-platform/function-multiversioning/examples2.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ This example computes the dot product of two vectors using Arm C Language Extens
1010

1111
The intention is to enable the compiler to use SVE instructions in the specialized case, while restricting it to use only Armv8 instructions in the default case.
1212

13-
More details on the default implementation can be found in [Implement dot product of two vectors](/learning-paths/smartphones-and-mobile/android_neon/dot_product_neon).
14-
1513
Use a text editor to create a file named `dotprod.c` with the code below:
1614

1715
```c

content/learning-paths/cross-platform/remoteit/components.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ weight: 2
1414
| Desktop | Windows, macOS, and Linux | initiator and target |
1515
| CLI | Windows, macOS, and Linux | initiator and target |
1616
| Device package | Linux, OpenWRT, and many others | target only |
17-
| Mobile | Andoid, iOS | initiator (Android and iOS) and target (Android only) |
17+
| Mobile | Android, iOS | initiator (Android and iOS) and target (Android only) |
1818

1919
Any software package marked as `initiator` can connect to other `target` devices. The target software packages can receive connections from other devices. Packages marked as both initiator and target can do both functions.
2020

content/learning-paths/laptops-and-desktops/_index.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ operatingsystems_filter:
1111
- Android: 2
1212
- Baremetal: 1
1313
- ChromeOS: 1
14-
- Linux: 29
15-
- macOS: 7
16-
- Windows: 38
14+
- Linux: 27
15+
- macOS: 5
16+
- Windows: 36
1717
subjects_filter:
1818
- CI-CD: 3
1919
- Containers and Virtualization: 6
@@ -24,7 +24,7 @@ title: Laptops and Desktops
2424
tools_software_languages_filter:
2525
- .NET: 12
2626
- Alacritty: 1
27-
- Android Studio: 2
27+
- Android Studio: 1
2828
- Arm Development Studio: 2
2929
- Arm64EC: 1
3030
- assembly: 1
@@ -36,7 +36,7 @@ tools_software_languages_filter:
3636
- CCA: 1
3737
- Clang: 10
3838
- CMake: 2
39-
- Coding: 19
39+
- Coding: 17
4040
- CSS: 1
4141
- Docker: 4
4242
- GCC: 9
@@ -68,7 +68,7 @@ tools_software_languages_filter:
6868
- Trusted Firmware: 1
6969
- Visual Studio: 10
7070
- Visual Studio Code: 9
71-
- VS Code: 2
71+
- VS Code: 3
7272
- Windows Forms: 1
7373
- Windows Performance Analyzer: 1
7474
- Windows Presentation Foundation: 1

content/learning-paths/microcontrollers/yolo-on-himax/web-toolkit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,9 +101,9 @@ The images below are captured images from the models run in the toolkit.
101101
### Objection detection
102102
![object_detection](./object_detection.jpg)
103103

104-
The Frames Per Second (FPS) index represents the number of ML inferences the hardware can complete per second. A higher number indicates better performance. The colored bounding boxes represent the objects identified by YOLO. The name of the object is labelled in the top left-hand corner of the box, and the number in parentheses is the confidence level as a percentage. This example shows that it can identify 9.53 frames per second with a confidence level of 64% for the 'CPU' object.
104+
The Frames Per Second (FPS) index represents the number of ML inferences the hardware can complete per second. A higher number indicates better performance. The colored bounding boxes represent the objects identified by YOLO. The name of the object is labeled in the top left-hand corner of the box, and the number in parentheses is the confidence level as a percentage. This example shows that it can identify 9.53 frames per second with a confidence level of 64% for the 'CPU' object.
105105

106106
### Face detection
107107
![object_detection](./face_detection.jpg)
108108

109-
Similar to the previous example, the bounding boxes identify the areas in the image that contain faces and recognize the positions of different facial features. This image shows that YOLO has identified a face with 99% confidence. It has marked the mouth with a yellow line segment and used different colours to mark the eyebrows, eyes, and nose. Within the bounding box for the eyes, it has further identified the gaze direction vector.
109+
Similar to the previous example, the bounding boxes identify the areas in the image that contain faces and recognize the positions of different facial features. This image shows that YOLO has identified a face with 99% confidence. It has marked the mouth with a yellow line segment and used different colors to mark the eyebrows, eyes, and nose. Within the bounding box for the eyes, it has further identified the gaze direction vector.

content/learning-paths/servers-and-cloud-computing/_index.md

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ maintopic: true
99
operatingsystems_filter:
1010
- Android: 2
1111
- Baremetal: 1
12-
- Linux: 111
13-
- macOS: 9
14-
- Windows: 13
12+
- Linux: 113
13+
- macOS: 7
14+
- Windows: 12
1515
pinned_modules:
1616
- module:
1717
name: Recommended getting started learning paths
@@ -20,21 +20,21 @@ pinned_modules:
2020
- migration
2121
subjects_filter:
2222
- CI-CD: 4
23-
- Containers and Virtualization: 25
23+
- Containers and Virtualization: 26
2424
- Databases: 15
2525
- Libraries: 7
26-
- ML: 14
27-
- Performance and Architecture: 40
26+
- ML: 13
27+
- Performance and Architecture: 42
2828
- Storage: 1
2929
- Web: 10
3030
subtitle: Optimize cloud native apps on Arm for performance and cost
3131
title: Servers and Cloud Computing
3232
tools_software_languages_filter:
33-
- .NET: 1
33+
- .NET: 2
3434
- .NET SDK: 1
3535
- 5G: 1
3636
- ACL: 1
37-
- Android Studio: 2
37+
- Android Studio: 1
3838
- Ansible: 2
3939
- Arm Development Studio: 4
4040
- armclang: 1
@@ -52,28 +52,28 @@ tools_software_languages_filter:
5252
- BOLT: 1
5353
- bpftool: 1
5454
- C: 4
55-
- C#: 1
55+
- C#: 2
5656
- C++: 3
5757
- C/C++: 2
5858
- Capstone: 1
59-
- CCA: 3
59+
- CCA: 5
6060
- Clair: 1
6161
- Clang: 10
6262
- ClickBench: 1
6363
- ClickHouse: 1
6464
- CloudFormation: 1
6565
- CMake: 1
66-
- Coding: 20
66+
- Coding: 18
6767
- Django: 1
68-
- Docker: 15
68+
- Docker: 16
6969
- Envoy: 2
7070
- Flink: 1
7171
- Fortran: 1
72-
- FVP: 3
73-
- GCC: 19
72+
- FVP: 4
73+
- GCC: 20
7474
- gdb: 1
7575
- Geekbench: 1
76-
- GenAI: 5
76+
- GenAI: 6
7777
- GitHub: 3
7878
- GitLab: 1
7979
- Glibc: 1
@@ -92,7 +92,7 @@ tools_software_languages_filter:
9292
- Lambda: 1
9393
- libbpf: 1
9494
- Linaro Forge: 1
95-
- LLM: 3
95+
- LLM: 4
9696
- llvm-mca: 1
9797
- LSE: 1
9898
- MariaDB: 1
@@ -108,15 +108,14 @@ tools_software_languages_filter:
108108
- PAPI: 1
109109
- perf: 4
110110
- PostgreSQL: 4
111-
- Python: 13
111+
- Python: 14
112112
- PyTorch: 5
113113
- RAG: 1
114114
- Redis: 3
115115
- Remote.It: 2
116-
- RME: 3
116+
- RME: 4
117117
- Rust: 2
118118
- snappy: 1
119-
- Snort: 1
120119
- Snort3: 1
121120
- SQL: 7
122121
- Streamline CLI: 1
@@ -131,7 +130,10 @@ tools_software_languages_filter:
131130
- Trusted Firmware: 1
132131
- TypeScript: 1
133132
- Vectorscan: 1
134-
- Visual Studio Code: 3
133+
- Veraison: 1
134+
- Visual Studio Code: 4
135+
- vLLM: 1
136+
- VS Code: 1
135137
- WindowsPerf: 1
136138
- WordPress: 3
137139
- x265: 1

content/learning-paths/servers-and-cloud-computing/cca-essentials/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ learning_objectives:
1313
prerequisites:
1414
- An AArch64 or x86_64 computer running Linux. You can use cloud instances, see this list of [Arm cloud service providers](/learning-paths/servers-and-cloud-computing/csp/).
1515
- Completion of the [Introduction to CCA Attestation with Veraison](/learning-paths/servers-and-cloud-computing/cca-veraison) Learning Path.
16-
- Completion of the [Run an application in a Realm using the Arm Confidential Computing Architecture (CCA)](learning-paths/servers-and-cloud-computing/cca-container/) Learning Path.
16+
- Completion of the [Run an application in a Realm using the Arm Confidential Computing Architecture (CCA)](/learning-paths/servers-and-cloud-computing/cca-container/) Learning Path.
1717

1818
author_primary: Arnaud de Grandmaison, Paul Howard, and Pareena Verma
1919

content/learning-paths/servers-and-cloud-computing/cca-essentials/cca-essentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For additional security, the KBS does not release any secrets in clear text, eve
2626

2727
In the example in this Learning Path, you will see that the secret that is exchanged between the KBS and the realm is a small string value, which the realm decrypts and echoes to its console window once all the attestation steps have succeeded.
2828

29-
For convenience, both the KBS and the client software are packaged in docker containers, which you can execute on any suitable AArch64 or x86_64 development machine. Since the client software runs in a realm, it makes use of the Fixed Virtual Platform (FVP) and the reference software stack for Arm CCA. If you have not yet familiarised yourself with running applications in realms using FVP and the reference software stack, see the [Run an application in a Realm using the Arm Confidential Computing Architecture (CCA)](/learning-paths/servers-and-cloud-computing/cca-container) Learning Path.
29+
For convenience, both the KBS and the client software are packaged in docker containers, which you can execute on any suitable AArch64 or x86_64 development machine. Since the client software runs in a realm, it makes use of the Fixed Virtual Platform (FVP) and the reference software stack for Arm CCA. If you have not yet familiarized yourself with running applications in realms using FVP and the reference software stack, see the [Run an application in a Realm using the Arm Confidential Computing Architecture (CCA)](/learning-paths/servers-and-cloud-computing/cca-container) Learning Path.
3030

3131
The attestation verification service is hosted by Linaro, so it is not necessary for you to build or deploy this service yourself.
3232

content/learning-paths/servers-and-cloud-computing/cca-veraison/attestation-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,8 +148,8 @@ It is not important to understand every detail of the attestation token, but her
148148
- The platform token contains the evidence about the Arm CCA platform on which the realm is running, which includes details about the state of the hardware and firmware that compose the platform. You can think of the platform as a single server or self-contained computing device. A single platform can host many realms, which can be executing as virtual machines or containers. Therefore, many realms might produce the same platform token.
149149
- The realm token contains the evidence about the realm itself, which is running on the platform. It is the more dynamic part of the token. It includes information about the realm’s initial memory contents and boot state.
150150
- The top-level data items in each sub-token are known as claims. A claim is an individual evidence fragment that describes a specific property of the system.
151-
- The claims of the platform token are labelled with the prefix `cca-platform-*`
152-
- The claims of the realm token are labelled with the prefix `cca-realm-*`
151+
- The claims of the platform token are labeled with the prefix `cca-platform-*`
152+
- The claims of the realm token are labeled with the prefix `cca-realm-*`
153153
- Many of the claims take the form of _measurements_. A measurement is a hash (checksum) that is computed from one of the firmware or software components that are running within the realm or within the platform. Checking these measurements against known-good values is an essential step for evaluating the trustworthiness of the realm. Any mismatch could mean that the system is running some software or firmware that has been tampered with, or is at the wrong patch or version level.
154154

155155
You might find it instructive to view the token in a formatting tool such as https://jsonviewer.stack.hu, where you can interactively expand and collapse different parts of the object tree to gain a better feel for the structure. Doing this may help you to digest the bullet points above.

content/learning-paths/servers-and-cloud-computing/cca-veraison/evaluate-result.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,10 @@ This part of the output shows how the verification service has compared the atte
6666

6767
It is important to understand that an attestation result is not a simple "yes" or "no" answer to the question of whether the system is trustworthy. Instead, it is a set of data points, known as _trustworthiness vectors_. Each data point shows how a particular aspect of the system compares against the expectations set by the verification service. Each point of comparison can lead to one of the following results:
6868

69-
- __Affirming__. This is the most favourable result. It is given when the evidence in the attestation token shows a good match against the expectations of a trustworthy system.
70-
- __Warning__. This is a less favourable result. It is given when the attestation token does not show a good match against the expectations of a trustworthy system.
71-
- __None__. This is an unfavourable result, meaning that no comparison was possible, either because data was missing from the evidence in the attestation token, or because the verification service does not have any expectations to compare the evidence against, and is therefore unable to draw any conclusion.
72-
- __Contraindicated__. This is the least favourable result. It is given when the evidence in the attestation token specifically contradicts the expectations of a trustworthy system.
69+
- __Affirming__. This is the most favorable result. It is given when the evidence in the attestation token shows a good match against the expectations of a trustworthy system.
70+
- __Warning__. This is a less favorable result. It is given when the attestation token does not show a good match against the expectations of a trustworthy system.
71+
- __None__. This is an unfavorable result, meaning that no comparison was possible, either because data was missing from the evidence in the attestation token, or because the verification service does not have any expectations to compare the evidence against, and is therefore unable to draw any conclusion.
72+
- __Contraindicated__. This is the least favorable result. It is given when the evidence in the attestation token specifically contradicts the expectations of a trustworthy system.
7373

7474
You will also notice that the result is grouped into two sections known as submodules, and indicated with the `submod()` notation. Recall from the earlier steps that the CCA attestation token is grouped into two parts: the _realm_ token and the _platform_ token. This same grouping is therefore also reflected in the attestation result. There are separate results for each.
7575

0 commit comments

Comments
 (0)