diff --git a/src/pages/cloud/CloudPros.tsx b/src/pages/cloud/CloudPros.tsx index d0ebfea..26e6cd6 100644 --- a/src/pages/cloud/CloudPros.tsx +++ b/src/pages/cloud/CloudPros.tsx @@ -1,4 +1,4 @@ -import { Eyebrow, H3, P, Small } from "@/components/Texts"; +import { H3, P, Small } from "@/components/Texts"; const highlights = [ { diff --git a/src/pages/home/archive/HomeComparisonTable.tsx b/src/pages/home/archive/HomeComparisonTable.tsx index 7d7b7d6..0a8d75d 100644 --- a/src/pages/home/archive/HomeComparisonTable.tsx +++ b/src/pages/home/archive/HomeComparisonTable.tsx @@ -20,7 +20,7 @@ export function HomeComparisonTable() { COMPARISON

Why People Choose Mycelium

- Mycelium brings cloud-grade automation to infrastructure you control — without surrendering data, identity, + Mycelium brings cloud-grade automation to infrastructure you control without surrendering data, identity, or uptime to centralized platforms.

diff --git a/src/pages/pods/animations/DataControl.tsx b/src/pages/pods/animations/DataControl.tsx index d3b4c85..5e90997 100644 --- a/src/pages/pods/animations/DataControl.tsx +++ b/src/pages/pods/animations/DataControl.tsx @@ -42,7 +42,7 @@ export default function DataControl({ const line = (a: {x:number;y:number}, b:{x:number;y:number}) => `M ${a.x} ${a.y} L ${b.x} ${b.y}`; // "Gates" sit near the center to symbolize explicit permission before data leaves your pod - const gates = peers.map((p, i) => { + const gates = peers.map((p) => { // point 30% of the way from center to peer const gx = center.x + (p.x - center.x) * 0.28; const gy = center.y + (p.y - center.y) * 0.28; diff --git a/src/pages/storage/StorageArchitecture.tsx b/src/pages/storage/StorageArchitecture.tsx index 43bffac..037f0d7 100644 --- a/src/pages/storage/StorageArchitecture.tsx +++ b/src/pages/storage/StorageArchitecture.tsx @@ -37,7 +37,7 @@ export function StorageArchitecture() {

A layered design that encrypts, routes, and exposes storage through - multiple protocols — without duplicating data or compromising + multiple protocols without duplicating data or compromising sovereignty.