File tree Expand file tree Collapse file tree 1 file changed +0
-41
lines changed
Expand file tree Collapse file tree 1 file changed +0
-41
lines changed Original file line number Diff line number Diff line change @@ -125,47 +125,6 @@ Collaborative research on sensitive datasets across institutions
125125
126126</CardGrid >
127127
128- ## Getting Started
129-
130- <Banner >
131-
132- ## Time to build!
133-
134- Let's build an iApp that can process protected data in a secure environment
135- using the [ iExec iApp generator tool] ( /references/iapp-generator ) . This tool
136- helps you create, test and deploy iApp with just a few commands.
137-
138- </Banner >
139-
140- ### Quick Start Path
141-
142- 1 . ** Protect your data** with [ DataProtector] ( /references/dataProtector )
143- 2 . ** Build your iApp** using the [ iApp Generator] ( /references/iapp-generator )
144- 3 . ** Deploy and test** your application
145- 4 . ** Process protected data** securely
146-
147- ### What You'll Learn
148-
149- - How to create a Docker container for your application
150- - How to handle inputs and outputs securely
151- - How to deploy to the iExec network
152- - How to process protected data in TEE environments
153-
154- ::: tip
155-
156- These are just a few examples, the possibilities are endless. Want to explore
157- iApp Generator? Check out our [ documentation] ( /references/iapp-generator ) and
158- see what you can build!
159-
160- :::
161-
162- ## Technical Requirements
163-
164- - ** Docker** : Your application must be containerized
165- - ** Input/Output** : Define clear input and output schemas
166- - ** TEE Compatibility** : Ensure your code runs in secure enclaves
167- - ** Network Access** : Configure any external API calls or dependencies
168-
169128## Next Steps
170129
171130Ready to build your first privacy-preserving application? Start with our
You can’t perform that action at this time.
0 commit comments