Skip to content

Commit ac4f544

Browse files
committed
refactor: maximize search visibility and developer discovery
1 parent 5a5b11f commit ac4f544

File tree

8 files changed

+117
-21
lines changed

8 files changed

+117
-21
lines changed

src/build-iapp/iapp-generator.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,13 @@
11
---
22
title: iApp Generator
33
description:
4-
Build privacy-first applications that run in secure TEE environments. Your
5-
complete toolkit for creating, testing, and deploying confidential iApps on
6-
the iExec network.
4+
iApp Generator CLI toolkit for building confidential computing applications.
5+
Create privacy-preserving AI, data analysis, and Web3 apps that run in secure
6+
TEE environments. Deploy in minutes.
7+
keywords:
8+
iApp Generator, confidential computing CLI, TEE applications,
9+
privacy-preserving development, secure AI development, Web3 privacy tools,
10+
trusted execution environment, iExec development
711
---
812

913
# 🤖 iApp Generator

src/build-iapp/what-is-iapp.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,24 @@
11
---
22
title: What is an iApp?
3-
description: Privacy-first applications that run on decentralized infrastructure
3+
description:
4+
Learn about iExec Applications (iApps) - confidential computing apps that
5+
process sensitive data in secure TEE environments. Build privacy-preserving
6+
AI, data analysis, and Web3 apps.
7+
keywords:
8+
iApp, iExec application, confidential computing, TEE, trusted execution
9+
environment, privacy-preserving apps, secure data processing, Web3 development
410
---
511

612
# 🚀 What is an iApp?
713

814
An iExec Application (iApp) brings Turnkey Privacy to your regular application
9-
code (Python script, AI model, data processor, ...) enabling it to securely
10-
process protected data (created by [DataProtector](/manage-data/dataProtector))
11-
inside a confidential computing environment called TEE (a Trusted Execution
12-
Environment).
15+
code. Your Python scripts, AI models, or data processors can securely process
16+
protected data inside a TEE (Trusted Execution Environment).
1317

1418
## Why iApps Matter ?
1519

16-
iApps provide Turnkey Privacy capabilities that let you process sensitive data
17-
while keeping it private and secure.
20+
iApps provide Turnkey Privacy capabilities. Process sensitive data while keeping
21+
it private and secure.
1822

1923
Imagine you want to build:
2024

@@ -170,9 +174,11 @@ Try our [Hello World](/overview/helloWorld) for a quick start, or check the
170174

171175
::: details 🔧 What programming languages are supported?
172176

173-
iApps can be built in any language that runs in Docker (Python, JavaScript, R,
177+
You can build iApps in any language that runs in Docker (Python, JavaScript, R,
174178
Java, Go, etc.). However, **iApp Generator** currently supports only Python and
175-
Node.js for simplified development.
179+
uns in Docker (Python, JavaScript, R, Java, Go, etc.). However, **iApp
180+
Generator** currently supports only Python and Node.js for simplified
181+
development.
176182

177183
:::
178184

src/manage-data/dataProtector/getting-started.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
---
22
title: Getting Started
3-
description: DataProtector getting started
3+
description:
4+
Get started with DataProtector - iExec's turnkey privacy toolkit for
5+
encrypting, controlling, and monetizing sensitive data. Learn SDK setup, data
6+
protection, and access controls in minutes.
7+
keywords:
8+
DataProtector, data encryption SDK, privacy-preserving data, secure data
9+
monetization, Web3 data protection, confidential data management, encrypted
10+
data sharing
411
---
512

613
# Getting Started with DataProtector

src/manage-data/guides/monetize-protected-data.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
---
22
title: Monetize Protected Data
33
description:
4-
Explore different ways to monetize your protected data with signed orders
5-
(usage-based) and time-based access (time-period payments)
4+
Monetize your encrypted data with iExec's DataProtector. Learn usage-based
5+
payments with signed orders and time-based access subscriptions. Turn your
6+
data into revenue streams securely.
7+
keywords:
8+
data monetization, DataProtector monetization, encrypted data revenue, Web3
9+
data marketplace, secure data sharing, privacy-preserving monetization, data
10+
licensing, blockchain data economy
611
---
712

813
# 💰 Monetize Protected Data

src/manage-data/what-is-protected-data.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
---
22
title: What is Protected Data?
3-
description: Understanding iExec's data protection mechanisms
3+
description:
4+
Learn about iExec's Protected Data - encrypted datasets that enable
5+
privacy-preserving computation. Understand DataProtector encryption, access
6+
controls, and secure data monetization.
7+
keywords:
8+
protected data, DataProtector, data encryption, privacy-preserving data,
9+
secure data sharing, Web3 data protection, encrypted datasets, confidential
10+
data processing
411
---
512

613
# ❓ What is Protected Data?

src/overview/develop-with-ai.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
---
22
title: Develop with AI
33
description:
4-
Learn how to use AI tools like Vibe Coding and Context7 to build privacy-first
5-
applications with iExec
4+
Accelerate privacy-first development with AI tools. Learn to use Vibe Coding,
5+
Context7, and AI assistants to build confidential computing applications with
6+
iExec faster and more efficiently.
7+
keywords:
8+
AI-assisted development, Vibe Coding, Context7, privacy-first AI development,
9+
confidential computing with AI, AI code generation, Web3 AI development,
10+
secure AI development
611
---
712

813
# 🤖 Develop with AI

src/overview/rlc.md

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,33 @@
11
---
22
title: RLC Token
33
description:
4-
The RLC token is the cryptocurrency that powers the iExec decentralized
5-
computing ecosystem
4+
RLC (Run on Lots of Computers) is the cryptocurrency powering iExec's
5+
confidential computing ecosystem. Learn about RLC tokenomics, utility, and how
6+
it drives privacy-first Web3 applications.
7+
keywords:
8+
RLC token, RLC cryptocurrency, iExec token, confidential computing token, Web3
9+
privacy token, blockchain tokenomics, decentralized computing economy, privacy
10+
ecosystem token
611
---
712

13+
<script type="application/ld+json">
14+
{
15+
"@context": "https://schema.org",
16+
"@type": "TechArticle",
17+
"headline": "RLC Token - Cryptocurrency for Confidential Computing",
18+
"description": "RLC (Run on Lots of Computers) is the cryptocurrency powering iExec's confidential computing ecosystem. Learn about RLC tokenomics, utility, and how it drives privacy-first Web3 applications.",
19+
"author": {
20+
"@type": "Organization",
21+
"name": "iExec"
22+
},
23+
"mainEntity": {
24+
"@type": "DigitalDocument",
25+
"name": "RLC Token Guide",
26+
"description": "Comprehensive guide to RLC token utility, tokenomics, and ecosystem"
27+
}
28+
}
29+
</script>
30+
831
<div class="flex flex-col items-center mb-8">
932
<img :src="rlcGif" alt="RLC Token Animation" class="w-80 h-80 mb-0" />
1033
<h1 class="text-3xl font-bold text-center mb-2">RLC Token</h1>

src/overview/welcome.md

Lines changed: 40 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,48 @@
11
---
22
title: About iExec
33
description:
4-
Discover how iExec empowers developers to build privacy-first applications
4+
Build privacy-first Web3 applications with iExec's turnkey privacy toolkit.
5+
Confidential computing, TEE technology, and blockchain data protection made
6+
simple for developers.
7+
keywords:
8+
iExec, confidential computing, TEE, privacy-first applications, Web3 privacy,
9+
blockchain data protection, trusted execution environment, turnkey privacy
510
---
611

12+
<script type="application/ld+json">
13+
{
14+
"@context": "https://schema.org",
15+
"@type": "TechArticle",
16+
"headline": "iExec Turnkey Privacy Toolkit - Build Privacy-First Web3 Applications",
17+
"description": "Build privacy-first Web3 applications with iExec's turnkey privacy toolkit. Confidential computing, TEE technology, and blockchain data protection made simple for developers.",
18+
"author": {
19+
"@type": "Organization",
20+
"name": "iExec",
21+
"url": "https://iex.ec"
22+
},
23+
"publisher": {
24+
"@type": "Organization",
25+
"name": "iExec",
26+
"logo": {
27+
"@type": "ImageObject",
28+
"url": "https://iex.ec/logo.png"
29+
}
30+
},
31+
"mainEntity": {
32+
"@type": "SoftwareApplication",
33+
"name": "iExec",
34+
"applicationCategory": "Developer Tools",
35+
"operatingSystem": "Cross-platform",
36+
"description": "Turnkey privacy toolkit for building confidential computing applications",
37+
"offers": {
38+
"@type": "Offer",
39+
"price": "0",
40+
"priceCurrency": "USD"
41+
}
42+
}
43+
}
44+
</script>
45+
746
# 💡 Turnkey Privacy Toolkit
847

948
<div class="bg-gradient-to-r from-[#fcd15a] to-[#ffad4d] rounded-[6px] px-8 pb-4 text-gray-800 max-w-3xl mx-auto mb-6">

0 commit comments

Comments
 (0)