This is an automated email from the ASF dual-hosted git repository.

zfc pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/incubator-teaclave-website.git

commit db8ef58f29c897a1a4a8cbac3142d7e7b60257bd
Author: Zhaofeng Chen <[email protected]>
AuthorDate: Thu Jul 17 10:58:47 2025 +0000

    site: update homepage description
---
 site/docusaurus.config.js                     |  2 +-
 site/src/components/HomepageFeatures/index.js | 27 +++++++++++++--------------
 2 files changed, 14 insertions(+), 15 deletions(-)

diff --git a/site/docusaurus.config.js b/site/docusaurus.config.js
index ca83f24bf..803c53ed0 100644
--- a/site/docusaurus.config.js
+++ b/site/docusaurus.config.js
@@ -11,7 +11,7 @@ import { themes as prismThemes } from 'prism-react-renderer';
 /** @type {import('@docusaurus/types').Config} */
 const config = {
   title: 'Apache Teaclave (incubating)',
-  tagline: 'Apache Teaclave (incubating) is an open source universal secure 
computing platform, making computation on privacy-sensitive data safe and 
simple.',
+  tagline: 'Open-source SDKs to build memory-safe Trusted Applications on 
Intel SGX, Arm TrustZone, and beyond.',
   favicon: undefined,
 
   // Future flags, see https://docusaurus.io/docs/api/docusaurus-config#future
diff --git a/site/src/components/HomepageFeatures/index.js 
b/site/src/components/HomepageFeatures/index.js
index 54bc10da6..9151c80b1 100644
--- a/site/src/components/HomepageFeatures/index.js
+++ b/site/src/components/HomepageFeatures/index.js
@@ -4,45 +4,44 @@ import styles from './styles.module.css';
 
 const FeatureList = [
   {
-    title: 'Secure and Attestable',
+    title: 'Enabling Memory-Safe Secure Computing',
     description: (
       <>
-        Teaclave adopts multiple security technologies to enable secure 
computing, in particular, 
-        Teaclave uses Intel SGX to serve the most security-sensitive tasks 
with hardware-based isolation, memory encryption and attestation. 
-        Also, Teaclave is written in Rust to prevent memory-safety issues.
+        Teaclave enables secure computing using memory-safe languages like 
Rust across multiple TEE platforms. 
+        Developers can build secure applications without worrying about 
memory-safety issues.
       </>
     ),
   },
   {
-    title: 'Function-as-a-Service',
+    title: 'Open-Source SDKs for Multiple TEE Platforms',
     description: (
       <>
-        Teaclave is a function-as-a-service platform supporting tasks like 
privacy-preserving machine learning, private set intersection, and crypto 
computation. 
-        In addition, developers can also write and execute Python function. 
-        Teaclave supports both general secure computing tasks and flexible 
multi-party secure computation.
+        Teaclave provides open-source SDKs targeting Intel SGX, Arm TrustZone. 
+        Developers can build secure computing use cases across cloud, edge, 
and embedded systems.
       </>
     ),
   },
   {
-    title: 'Ease of Use',
+    title: 'Modular Components for Confidential Computing',
     description: (
       <>
-        Teaclave builds its components in containers, therefore, it supports 
deployment both locally and within cloud infrastructures. 
-        Teaclave also provides convenient endpoint APIs, client SDKs and 
command line tools.
+        Teaclave offers reusable Rust crates designed for composable secure 
systems. 
+        Developers can easily integrate features like secure storage, remote 
attestation, and key management into their own confidential computing use cases.
       </>
     ),
   },
   {
-    title: 'Flexible',
+    title: 'Developer-Friendly Emulation Support',
     description: (
       <>
-        Components in Teaclave are designed in modular, and features like 
remote attestation can be easily embedded in other projects. 
-        In addition, Teaclave SGX SDK, Teaclave Java TEE SDK, and Teaclave 
TrustZone SDK can also be used separately to write TEE apps for other purposes.
+        Teaclave provides prebuilt Docker images and tools to simplify local 
development and testing of TEE applications. 
+        Developers can prototype and validate Trusted Applications quickly, 
even without TEE hardware.
       </>
     ),
   },
 ];
 
+
 const featureStyle = {
   features: {
     flexWrap: 'wrap',


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to