This is an automated email from the ASF dual-hosted git repository.

wohali pushed a commit to branch more-how-tos
in repository https://gitbox.apache.org/repos/asf/couchdb-documentation.git

commit c70123b780f971bec70eb839cf8a302f0790a4c8
Author: Joan Touzet <jo...@atypical.net>
AuthorDate: Tue Dec 18 11:56:40 2018 -0500

    Typos and fixes from @flimzy review
---
 src/best-practices/documents.rst | 9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

diff --git a/src/best-practices/documents.rst b/src/best-practices/documents.rst
index 6230679..9cc181c 100644
--- a/src/best-practices/documents.rst
+++ b/src/best-practices/documents.rst
@@ -141,8 +141,7 @@ periodically, and are disconnected for more than this time 
before they
 resynchronise.
 
 All of the approaches below which allow automated merging of changes rely on
-having some sort of history back in time to the point where the replicas
-diverged.
+having some sort of history, back to the point where the replicas diverged.
 
 CouchDB does not provide a mechanism for this itself. It stores arbitrary
 numbers of old _ids for one document (trunk now has a mechanism for pruning the
@@ -160,7 +159,7 @@ live replicas last diverged.
 Approach 1: Single JSON doc
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^
 
-The above structure is already valid Javascript, and so could be represented in
+The above structure is already valid JSON, and so could be represented in
 CouchDB just by wrapping it in an object and storing as a single document:
 
 .. code-block:: javascript
@@ -328,8 +327,8 @@ layer on the database to test each transaction. Some 
advantages are:
 
 * Only the client or someone with the knowledge of the name and password can 
compute
   the value of SHA256 and recover the data.
-* Some columns are still left in the clear, an advantage if the marketing 
department
-  wants to compute aggregated statistics.
+* Some columns are still left in the clear, an advantage for computing 
aggregated
+  statistics.
 * Computation of SHA256 is left to the client side computer which usually has 
cycles
   to spare.
 * The system prevents server-side snooping by insiders and any attacker who 
might

Reply via email to