Skip to content

Commit 1d8180e

Browse files
Merge pull request #1800 from jasonrandrews/review
Spelling and tag updates
2 parents 1295fb7 + 9651cb8 commit 1d8180e

File tree

6 files changed

+57
-11
lines changed

6 files changed

+57
-11
lines changed

.wordlist.txt

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3916,4 +3916,46 @@ truncations
39163916
ulp
39173917
unmangled
39183918
unportable
3919-
zeropoint
3919+
zeropoint
3920+
AO
3921+
Autoware
3922+
CCC
3923+
ECUs
3924+
HTTPs
3925+
Hawksbill
3926+
HelloworldPublisher
3927+
HelloworldSubscriber
3928+
IMU
3929+
Jalisco
3930+
LiDAR
3931+
MLPerf’s
3932+
OTA
3933+
OpenAD
3934+
OpenADKit
3935+
ROS
3936+
RViz
3937+
Rviz
3938+
SDV
3939+
SDVs
3940+
SOAFEE
3941+
SSO
3942+
Unsloth’s
3943+
Veraison's
3944+
amazonq
3945+
autoware
3946+
autowarefoundation
3947+
casted
3948+
certifiability
3949+
codewhisperer
3950+
cyclonedds
3951+
distros
3952+
dlrm
3953+
musl
3954+
openadkit
3955+
printenv
3956+
qdeveloper
3957+
ros
3958+
rviz
3959+
testbed
3960+
ug
3961+
vnc

content/learning-paths/automotive/_index.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,15 @@ subtitle: Build secure, connected, smart IoT devices
1111
title: Automotive
1212
weight: 4
1313
subjects_filter:
14-
- Containers and Virtualization: 1
14+
- Containers and Virtualization: 2
1515
- Performance and Architecture: 1
1616
operatingsystems_filter:
1717
- Baremetal: 1
18-
- Linux: 1
18+
- Linux: 2
1919
- RTOS: 1
2020
tools_software_languages_filter:
2121
- Automotive: 1
22+
- Docker: 1
23+
- Python: 1
24+
- ROS2: 1
2225
---

content/learning-paths/automotive/openadkit1_container/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ further_reading:
3939
link: https://learn.arm.com/install-guides/ros2/
4040
type: documentation
4141
- resource:
42-
title: AutoWare OpenAD Kit deom project
42+
title: Autoware OpenAD Kit demo project
4343
link: https://github.com/autowarefoundation/openadkit_demo.autoware/
4444
type: documentation
4545

content/learning-paths/servers-and-cloud-computing/_index.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ maintopic: true
99
operatingsystems_filter:
1010
- Android: 2
1111
- Baremetal: 1
12-
- Linux: 133
12+
- Linux: 134
1313
- macOS: 10
1414
- Windows: 14
1515
pinned_modules:
@@ -24,7 +24,7 @@ subjects_filter:
2424
- Databases: 15
2525
- Libraries: 8
2626
- ML: 24
27-
- Performance and Architecture: 48
27+
- Performance and Architecture: 49
2828
- Storage: 1
2929
- Web: 10
3030
subtitle: Optimize cloud native apps on Arm for performance and cost
@@ -61,7 +61,7 @@ tools_software_languages_filter:
6161
- C++: 7
6262
- C/C++: 2
6363
- Capstone: 1
64-
- CCA: 5
64+
- CCA: 6
6565
- Clair: 1
6666
- Clang: 10
6767
- ClickBench: 1
@@ -90,6 +90,7 @@ tools_software_languages_filter:
9090
- Glibc: 1
9191
- Go: 2
9292
- Google Axion: 3
93+
- Google Cloud: 1
9394
- GoogleTest: 1
9495
- HammerDB: 1
9596
- Herd7: 1
@@ -129,7 +130,7 @@ tools_software_languages_filter:
129130
- Redis: 3
130131
- Remote.It: 2
131132
- RME: 4
132-
- Runbook: 61
133+
- Runbook: 62
133134
- Rust: 2
134135
- snappy: 1
135136
- Snort3: 1

content/learning-paths/servers-and-cloud-computing/cca-veraison-aws/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ learning_objectives:
1717

1818
prerequisites:
1919
- An [AWS account](/learning-paths/servers-and-cloud-computing/csp/aws/) for accessing AWS cloud services.
20-
- An x86 computer running Ubuntu or Arch Linux, which is authorised to use the AWS account. Other build environments might be possible, but will require the configuration of toolchains for cross-compilation.
20+
- An x86 computer running Ubuntu or Arch Linux, which is authorized to use the AWS account. Other build environments might be possible, but will require the configuration of toolchains for cross-compilation.
2121

2222

2323
author: Paul Howard

content/learning-paths/servers-and-cloud-computing/cca-veraison-aws/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ layout: learningpathall
77
---
88

99
## Overview
10-
[Veraison](https://github.com/veraison) is a community open-source project that is part of the [Confidential Computing Consortium (CCC)](https://confidentialcomputing.io). Veraison provides the components that are needed to build attestation verification services for confidential computing or other use cases. Veraison acts as the Verifier role in the [RATS architecture (RFC9334)](https://datatracker.ietf.org/doc/rfc9334/), which is a common model for attestation-based systems. Veraison makes use of community standardisation efforts to ensure a high degree of interoperability.
10+
[Veraison](https://github.com/veraison) is a community open-source project that is part of the [Confidential Computing Consortium (CCC)](https://confidentialcomputing.io). Veraison provides the components that are needed to build attestation verification services for confidential computing or other use cases. Veraison acts as the Verifier role in the [RATS architecture (RFC9334)](https://datatracker.ietf.org/doc/rfc9334/), which is a common model for attestation-based systems. Veraison makes use of community standardization efforts to ensure a high degree of interoperability.
1111

12-
Attestation is essential for confidential computing, and Veraison can be used as the verifier service for Arm's Confidential Compute Architecture (CCA). If you have not already familiarised yourself with CCA attestation and Veraison, it is recommended that you first follow the learning paths [Get Started with CCA Attestation and Veraison](https://learn.arm.com/learning-paths/servers-and-cloud-computing/cca-veraison/) and [Run an end-to-end Attestation Flow with Arm CCA](https://learn.arm.com/learning-paths/servers-and-cloud-computing/cca-essentials/).
12+
Attestation is essential for confidential computing, and Veraison can be used as the verifier service for Arm's Confidential Compute Architecture (CCA). If you have not already familiarized yourself with CCA attestation and Veraison, it is recommended that you first follow the learning paths [Get Started with CCA Attestation and Veraison](https://learn.arm.com/learning-paths/servers-and-cloud-computing/cca-veraison/) and [Run an end-to-end Attestation Flow with Arm CCA](https://learn.arm.com/learning-paths/servers-and-cloud-computing/cca-essentials/).
1313

1414
The two learning paths linked above make use of a Veraison verification service that is published and maintained by [Linaro](https://www.linaro.org).
1515

0 commit comments

Comments
 (0)