diff --git a/.gitignore b/.gitignore deleted file mode 100644 index 77793ac..0000000 --- a/.gitignore +++ /dev/null @@ -1,34 +0,0 @@ -# Dependencies -/node_modules - -# Production -/build - -# Generated files -.docusaurus -.cache-loader - -# Misc -.DS_Store -.env.local -.env.development.local -.env.test.local -.env.production.local - -npm-debug.log* -yarn-debug.log* -yarn-error.log* -bun.lockb -bun.lock - -yarn.lock - -build.sh -build_dev.sh -develop.sh - -docusaurus.config.ts - -sidebars.ts - -tsconfig.json diff --git a/LICENSE b/LICENSE deleted file mode 100644 index 925e59e..0000000 --- a/LICENSE +++ /dev/null @@ -1,21 +0,0 @@ -MIT License - -Copyright (c) 2024 ThreeFold. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. \ No newline at end of file diff --git a/README.md b/README.md index 4393703..5dd3570 100644 --- a/README.md +++ b/README.md @@ -1,47 +1 @@ -

ThreeFold TFGrid Main Documentation Website

- -

Table of Contents

- -- [Introduction](#introduction) -- [Install Hero](#install-hero) -- [Deploy Locally](#deploy-locally) -- [Push Changes](#push-changes) -- [URL](#url) - ---- - -## Introduction - -This repository contains the code to deploy the ThreeFold TFGrid Main Documentation website. - -## Install Hero - -```bash -curl https://raw.githubusercontent.com/freeflowuniverse/herolib/refs/heads/development/install_hero.sh > /tmp/install_hero.sh -bash /tmp/install_hero.sh -``` - -## Deploy Locally - -You can run the website in your development environment on a local browser. Make sure to start a new shell if you've just installed Hero. - -``` -hero docusaurus -u https://git.ourworld.tf/tfgrid/docs_tfgrid4_tech -d -``` - -## Push Changes - -- Development - ``` - hero docusaurus -u https://git.ourworld.tf/tfgrid/docs_tfgrid4_tech -bpd - ``` -- Production - - ```bash - hero docusaurus -u https://git.ourworld.tf/tfgrid/docs_tfgrid4_tech -bp - ``` - -## URL - -- The website in staging mode is at https://dev.threefold.info/tech -- The website in production mode is at https://threefold.info/tech \ No newline at end of file +everything moved to tech dir in docs_tfgrid4 \ No newline at end of file diff --git a/cfg/footer.json b/cfg/footer.json deleted file mode 100644 index deab232..0000000 --- a/cfg/footer.json +++ /dev/null @@ -1,64 +0,0 @@ -{ - "style": "dark", - "links": [ - { - "title": "Docs", - "items": [ - { - "label": "Introduction", - "to": "/docs" - }, - { - "label": "V3 Manual", - "href": "https://manual.grid.tf/" - }, - { - "label": "V4 Docs", - "href": "https://docs.threefold.io/" - } - ] - }, - { - "title": "Community", - "items": [ - { - "label": "Telegram", - "href": "https://t.me/threefold" - }, - { - "label": "X", - "href": "https://x.com/threefold_io" - }, - { - "label": "Forum", - "href": "https://forum.threefold.io" - }, - { - "label": "Support", - "to": "/support" - } - ] - }, - { - "title": "Links", - "items": [ - { - "label": "ThreeFold.io", - "href": "https://threefold.io" - }, - { - "label": "Dashboard", - "href": "https://dashboard.grid.tf" - }, - { - "label": "GitHub", - "href": "https://github.com/threefoldtech/home" - }, - { - "label": "Gitea", - "href": "https://git.ourworld.tf" - } - ] - } - ] -} diff --git a/cfg/main.json b/cfg/main.json deleted file mode 100644 index 6f47f3b..0000000 --- a/cfg/main.json +++ /dev/null @@ -1,16 +0,0 @@ -{ - "title": "ThreeFold", - "tagline": "Geo Aware Internet Platform", - "favicon": "img/favicon.png", - "url": "https://threefold.info", - "url_home": "docs/", - "baseUrl": "/tech/", - "image": "img/tf_graph.png", - "metadata": { - "description": "ThreeFold is laying the foundation for a geo aware Web 4, the next generation of the Internet.", - "image": "https://threefold.info/tftech/img/tf_graph.png", - "title": "ThreeFold Technology Vision" - }, - "buildDest":["root@info.ourworld.tf:/root/hero/www/info/tech"], - "buildDestDev":["root@info.ourworld.tf:/root/hero/www/infodev/tech"] -} diff --git a/cfg/navbar.json b/cfg/navbar.json deleted file mode 100644 index ff2a56b..0000000 --- a/cfg/navbar.json +++ /dev/null @@ -1,26 +0,0 @@ -{ - "title": "", - "logo": { - "alt": "ThreeFold Logo", - "src": "img/new_logo_tft.png" - }, - "items": [ - { - "href": "https://docs.threefold.io/", - "label": "TFGrid 4 Docs" - }, - { - "href": "https://manual.grid.tf/", - "label": "Manual" - }, - { - "href": "https://dashboard.grid.tf/", - "label": "Dashboard" - }, - { - "href": "https://threefold.io", - "label": "ThreeFold.io", - "position": "right" - } - ] -} diff --git a/docs/main/2_the_future.md b/docs/main/2_the_future.md deleted file mode 100644 index 128ff40..0000000 --- a/docs/main/2_the_future.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -sidebar_position: 2 -title: 'The future is Now - web4' ---- - -![](https://threefold.info/tftech/assets/images/web0-4d67ef81ee465755e657ba4f7b1b9247.png) - - -## ThreeFold Web 4 = Augmented Collection Intelligence - -Founded by Internet 1.0 Pioneers - -Welcome to the future of the internet, Web 4, a logical evolution that rethinks and reinvents the foundations of how we connect, communicate, and collaborate globally. - -- The internet is burdened with inefficiencies, risks, and a growing dependency on centralization. -- This legacy has left over 50% of the world without decent internet access, widened economic gaps, and exposed critical vulnerabilities. - -ThreeFold has created an alternative deployed today ready to scale to the planet. - - -## +5 billion - -The DePIN market has seen projects achieve billion-dollar valuations despite offering limited scalability, innovation, or real-world utility. Much of this is driven by the market's excitement around decentralization and its potential to revolutionize traditional infrastructure industries. - -The hype driving DePIN valuations reflects a growing recognition of the need for decentralized infrastructure. For ThreeFold, this is validation of our vision and an opportunity to seize market leadership by combining innovation, execution, and global impact. - -We are a **grounded** project: - -- Already deployed in +50 countries, +60,000 vcpu life. -- 1 Country signed on for deployment, more coming. -- We didn't do any marketing yet, news will be released as we work on our Token Launch. - -## **The Future is here today** - -- **Alternative to Centralized Datacenters: GPU/Compute/Storage** - - The only Geo Aware decentralized Datancenter solution in the world. - - **Cost to provision < 1/5 compared to alternatives** -- AI Mind, compatible with the world - - AI LLM's (large language model, prompts) Sovereign & geo aware, under control of ourselves and our community. - - Be the provider of AI Mind (GPU Capacity) to your friends and yourself, and make a recurring income by doing so. - - Let's be smarter all together. - - Compatible with any existing AI (agent) framework. - - **Cost to provision < 1/3 compared to alternatives** -- New: Geo Aware AI agents (Q2 2025) - - The only Geo Aware agent techno in the world. - - Combination of humans & machines with the potential of the creation of Collective Augmented Intelligence - - 10x easier development of truly geo aware & decentralized app (super safe, flexible and scalable). - - **Cost to provision < 1/10 compared to alternatives** - -**Planned 2026** - -- The first decentralized Geo-Aware Quantum Computer in the world - - ThreeFold will deliver this capability end H1 2025 together with a partner on top of the ThreeFold grid. - - **Cost to provision < 1/10 compared to alternatives** - -> More info see [https://threefold.info/tftech](https://threefold.info/tftech) - -## SAFT = Safe Agreement for Future Tokens - -- Starting end Feb 2025, we will raise 30-50m USD for the launch of our INCA token for ThreeFold. -- This token will be launched on major platforms with the help of major partners & influencers. -- The timing is right. - -Contact us for more info - -## Information about ThreeFold - -
- -
- -
- - Presentation ThreeFold Intro Jan 2025 - -
diff --git a/docs/main/first_principle_thinking/1_onion_analogy.md b/docs/main/first_principle_thinking/1_onion_analogy.md deleted file mode 100644 index 5c5be1a..0000000 --- a/docs/main/first_principle_thinking/1_onion_analogy.md +++ /dev/null @@ -1,48 +0,0 @@ ---- -title: 'Avoid Painkillers' -sidebar_position: 2 ---- - -![](img/onion.png) - -> First principles thinking is a problem-solving method that involves breaking down a problem into its most basic parts and then rebuilding it from the ground up - -# The Onion Analogy - -Most cloud & internet stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure. - -## Quick Fixes and Additions - -- **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue. -- **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched. - -## Painkiller Approach: Treating Symptoms, Not Causes - -This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges. - -This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. - -Over time, this approach leads to several challenges: - -- **Cyber Pandemic** The Cyber Pandemic is real, added these layers leads to weak security. -- **Increased Complexity:** Each new layer adds complexity, making the system harder to understand and maintain. -- **Higher Costs:** More layers often mean more resources, licenses, and management overhead, increasing operational costs. -- **Reduced Agility:** The more complex the stack, the harder it is to make changes or adapt to new requirements, reducing the system’s overall agility. -- **Fragility:** A stack built on temporary fixes is more prone to failures because the core issues are not resolved, making the system brittle. - -### We cannot solve our problems with the same thinking we used when we created them - - -This is a famous quote by Einstein that we deeply admire. -Here are a few others that we strive to live by. - ---------- - -"If I had an hour to solve a problem, I would spend 55 minutes thinking about the problem and 5 minutes thinking about solutions." - ---------- - -"Everything should be made as simple as possible, but not simpler." - - - diff --git a/docs/main/first_principle_thinking/2_hardware_badly_used.md b/docs/main/first_principle_thinking/2_hardware_badly_used.md deleted file mode 100644 index 0539efd..0000000 --- a/docs/main/first_principle_thinking/2_hardware_badly_used.md +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: 'Hardware Is Powerful' -sidebar_position: 6 -hide_title: true ---- - -# Hardware Is Powerful - -![](img/hardware_comparison.png) - - -### The IT world fails to harness the full potential of computer hardware. - - -While hardware advancements have surged forward, user experiences and features have often stagnated, failing to keep pace with these developments. - -The original Commodore 64, with only 64 KB of memory, was a remarkably capable machine for its time. In contrast, today's computers have 8 GB or more of memory, yet their capabilities have not necessarily improved proportionately. - -This highlights a regression in our ability to fully utilize computer hardware. - -We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential.  - -## Why Are Servers So Badly Used? - -![](img/layers.png) - -Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Below, we provide a simplified explanation. - -## Why Context Switches Are a Problem - -### What Are Context Switches? - -Imagine you're working on two tasks: reading a book and answering emails. Every time you switch between them, you lose time refocusing. Computers experience a similar "refocusing" delay when switching between tasks. - -### The Layered Architecture Causes Overhead - -Modern computing systems use many layers (e.g., applications, storage drivers, network layers) to get work done. Each layer requires the system to switch between different modes (user mode and kernel mode) and tasks. - -For example: - - - A web app might need to talk to a storage driver. - - This requires moving data through multiple layers (network, file system, etc.). - - Each layer adds a context switch. - -### Millions of Switches Per Second - -Each switch requires saving and loading the state of a process. This takes time and uses CPU power. When millions of context switches occur every second (as shown in the diagram), most of the computer’s capacity is spent switching rather than doing useful work. - -### Result: Wasted Resources - -- Sometimes up to 90% of the computer’s capacity can be lost because of this inefficiency. -- Instead of performing tasks like running applications or processing data, the computer is stuck managing unnecessary complexity. - - -## Simplified Analogy - -Imagine driving on a highway where you have to stop and pay a toll at every intersection. You waste more time paying tolls than actually driving to your destination. Similarly, excessive context switches in modern systems cause the computer to "stop and pay tolls" constantly, leaving little time for real work. - - -## How Did We Get Here - -![](img/eng_model_failing.png) - - -## How to Resolve This Problem - -We decided to reinvent the way an operating system functions in a cloud and data center context. -While leveraging the Linux kernel, we rebuilt many surrounding tools to minimize complexity and reduce context switching. -This approach results in significantly improved security, scalability, and sustainability. - -> [See here for more information about our operating system called Zero-OS](../key_innovations_overview/cloud/compute/zos_compute.md) - -### Context Switching Details - -In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time. - -### How It Works - -Here's how a context switch typically works in Linux: - -1. **Interrupt Handling**: When a higher-priority process needs to run or an event requiring immediate attention occurs (such as I/O completion), the CPU interrupts the currently running process. - -2. **Saving Context**: The operating system saves the state of the current process, including its registers, program counter, and other relevant data, into its process control block (PCB). This step ensures that when the process resumes execution later, it can continue from where it left off. - -3. **Scheduling Decision**: The operating system scheduler determines which process should run next based on scheduling algorithms and the priority of processes in the system. - -4. **Loading Context**: The operating system loads the state of the selected process from its PCB into the CPU, allowing it to execute. This includes restoring the process's registers, program counter, and other relevant data. - -5. **Execution**: The newly loaded process begins executing on the CPU. - -### Overhead and Performance Impact - -Context switches are essential for multitasking, but they come with overhead that can impact system performance: - -1. **Time Overhead**: Context switches require time to save and restore process states, as well as to perform scheduling decisions. This overhead adds up, especially in systems with many processes frequently switching contexts. - -2. **Cache Invalidation**: Each time a process is switched in, it may result in cache invalidation, where the CPU's cache needs to be refreshed with data from the new process's memory space. This can lead to cache misses and performance degradation. - -3. **Resource Contentions**: Context switches can exacerbate resource contention issues, especially in systems with limited CPU cores. If multiple processes are frequently contending for CPU time, the overhead of context switches can further delay process execution. - -4. **Fragmentation**: Frequent context switches can lead to memory fragmentation, as processes are loaded and unloaded into memory. This fragmentation can degrade system performance over time, as it becomes more challenging to find contiguous slice of memory for new processes. - -While context switches are necessary for multitasking, excessive context switching can indeed lead to a significant loss of execution power by introducing overhead and resource contention in the system. - -Therefore, efficient scheduling algorithms and optimization techniques are crucial for minimizing the impact of context switches on system performance. \ No newline at end of file diff --git a/docs/main/first_principle_thinking/3_internet_risk.md b/docs/main/first_principle_thinking/3_internet_risk.md deleted file mode 100644 index a7c4c27..0000000 --- a/docs/main/first_principle_thinking/3_internet_risk.md +++ /dev/null @@ -1,112 +0,0 @@ ---- -title: 'Internet Protocol Upgrade' -sidebar_position: 6 ---- - -![](img/tcpip.png) - -The foundational protocols of the internet, TCP/IP (Transmission Control Protocol/Internet Protocol), were created in the 1970s to connect a few academic and military computers. While they served their initial purpose, they were never designed for the complex, global, and interconnected world we live in today. Even IPv6, which addresses some scalability issues, does not solve the fundamental design flaws. - - -### How the Internet is Broken Due to TCP/IP Design - -The internet, as we know it today, is built on an outdated foundation that was designed for simpler times. Decades ago, TCP/IP was created to connect a handful of computers for research and military purposes. It worked well back then, but it’s no longer enough to handle the complexities of our modern, globally interconnected world. Unless we address its flaws, the internet will struggle to keep up—and could ultimately fail us. - -One major issue is that the internet has no way of "remembering" conversations. For example, when you watch a video or make a video call, your device creates a session—a temporary connection with another server. If this session is interrupted, the entire connection breaks, and you must start over. TCP/IP wasn’t designed to manage sessions, making it unreliable for modern apps and services that depend on continuous communication. - -Another problem is the internet’s complexity. The way it works involves layers of technology stacked on top of each other—apps, storage systems, networks, and more. These layers often don’t communicate efficiently, wasting resources and making everything slower, more expensive, and harder to fix. This complexity also makes the internet fragile, as small issues can cascade into larger failures. - -Security is another area where TCP/IP falls short. It wasn’t designed with cybersecurity in mind, which is why we rely on add-ons like firewalls, VPNs, and encryption. But these tools are essentially patches over a flawed system, and they add even more complexity, making the internet less robust and more vulnerable to attacks. - -Modern services and devices have also outgrown the static design of TCP/IP. The system assumes that servers and devices stay in fixed locations, but today’s internet is dynamic. Cloud services, mobile devices, and apps often move across networks. This static model creates inefficiencies and slows down the system. - -Adding to the problem is the internet’s dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions can lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable. - -> The stakes are high. The internet is essential for communication, education, business, and so much more. Yet its foundation is crumbling under modern demands. Without major changes, we’ll see more frequent failures, slower services, and increased vulnerabilities. In extreme cases, parts of the internet could break entirely. - -To fix this, we need a smarter, more resilient approach. Decentralized networks can distribute resources and reduce our dependence on a few central providers. Emerging technologies like RINA (Recursive Inter-Network Architecture) offer a simplified, more secure, and more efficient alternative to TCP/IP. These systems are designed to handle the needs of the modern internet, with built-in reliability, smarter communication, and security at their core. - -> The bottom line is clear: the internet’s outdated foundation is holding us back. If we want the internet to remain reliable and serve future generations, we must address these issues now. A decentralized, secure, and modernized internet isn’t just a technical upgrade—it’s a necessity for our connected world. - - -## Tech Brief - -The following tech brief is aimed at experts. - -### 1. **Lack of Session Management** -- **TCP/IP’s Shortcomings** - - TCP/IP lacks true session management. A session represents an ongoing communication between two entities (e.g., a user browsing a website). If the connection is interrupted (e.g., due to a network outage or device change), the session is lost, and applications must restart or recover manually. - - This flaw creates inefficiencies in modern applications that require reliable, continuous communication, such as video calls, gaming, or IoT devices. - -- **Why It Matters** - - Every time a session breaks, applications have to rebuild connections at a higher level (e.g., re-authenticate or restart a video call). This is inefficient and increases complexity, making the internet fragile and less resilient. - - ---- - -### 2. **Layer Violations** - -- **The Problem** - - TCP/IP combines different functionalities into a single stack, leading to inefficiencies. For example: - - Routing decisions happen at the IP layer. - - Reliable data transfer happens at the TCP layer. - - However, these layers are not isolated and often interfere with each other, creating unnecessary overhead. - -- **Impact** - - Modern networks require additional layers (e.g., firewalls, VPNs, NATs) to patch these issues, making the architecture increasingly complex and brittle. - ---- - -### 3. **No Built-In Security** -- **TCP/IP Design Flaw** - - Security was not a priority when TCP/IP was designed. The protocols do not inherently protect against common threats like spoofing, hijacking, or denial of service. - - IPv6 introduces some improvements, such as built-in IPsec, but these are optional and often not used, leaving the same vulnerabilities. - -- **Impact** - - Every modern application must implement its own security mechanisms (e.g., HTTPS, VPNs), leading to duplicated efforts and inconsistent protections. - ---- - -### 4. **Scalability Issues** - -- **IPv4 vs. IPv6** - - IPv4, with its 32-bit addressing, exhausted available addresses, leading to NAT (Network Address Translation) as a workaround. This introduced complexity and broke the end-to-end connectivity principle of the internet. - - IPv6, with 128-bit addressing, solves the address exhaustion problem but does not address underlying issues like routing table explosion or inefficiencies in the protocol stack. - -- **Routing Problems** - - The lack of built-in session and naming management makes routing inefficient. Large routing tables and decentralized updates slow down the internet and make it harder to scale. - ---- - -### 5. **No Support for Application-Centric Networking** -- **TCP/IP’s Assumption** - - The protocol assumes communication happens between fixed endpoints (e.g., IP addresses). Modern applications, however, focus on data and services rather than specific endpoints. For example: - - Cloud applications may move across data centers. - - Mobile devices frequently change networks. - - TCP/IP’s static model is incompatible with this dynamic, service-oriented world. - -- **Impact** - - Workarounds like DNS (Domain Name System) and CDNs (Content Delivery Networks) add layers of complexity, but they’re still built on a flawed foundation. - ---- - -### RINA: A Better Alternative - -The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Here’s how RINA addresses these issues[^1]: - -1. **Unified Layering** - - Unlike TCP/IP, which has rigid and distinct layers, RINA uses recursive layers. Each layer provides the same functionalities (e.g., routing, security, session management), simplifying the architecture. - -2. **Built-In Session Management** - - RINA natively supports session management, ensuring continuity and reliability for modern applications, even in the face of interruptions. - -3. **Application-Centric Networking:** - - RINA treats applications as first-class citizens, focusing on the services they need rather than rigid endpoint communication. This aligns with the dynamic nature of modern networks. - -4. **Improved Security:** - - Security is integral to RINA, with mechanisms for authentication, confidentiality, and integrity built into every layer. - -5. **Simplified Routing and Scaling:** - - RINA reduces the size and complexity of routing tables, making the network easier to scale and manage. - -[^1]: [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf) \ No newline at end of file diff --git a/docs/main/first_principle_thinking/_category_.json b/docs/main/first_principle_thinking/_category_.json deleted file mode 100644 index c745ab8..0000000 --- a/docs/main/first_principle_thinking/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "First Principle Thinking", - "position": 4, - "link": { - "type": "generated-index" - } - } \ No newline at end of file diff --git a/docs/main/first_principle_thinking/img/eng_model_failing.png b/docs/main/first_principle_thinking/img/eng_model_failing.png deleted file mode 100644 index 8a5ebbb..0000000 Binary files a/docs/main/first_principle_thinking/img/eng_model_failing.png and /dev/null differ diff --git a/docs/main/first_principle_thinking/img/hardware_comparison.png b/docs/main/first_principle_thinking/img/hardware_comparison.png deleted file mode 100644 index 11f39be..0000000 Binary files a/docs/main/first_principle_thinking/img/hardware_comparison.png and /dev/null differ diff --git a/docs/main/first_principle_thinking/img/layers.png b/docs/main/first_principle_thinking/img/layers.png deleted file mode 100644 index 1dd774e..0000000 Binary files a/docs/main/first_principle_thinking/img/layers.png and /dev/null differ diff --git a/docs/main/first_principle_thinking/img/onion.png b/docs/main/first_principle_thinking/img/onion.png deleted file mode 100644 index a15c522..0000000 Binary files a/docs/main/first_principle_thinking/img/onion.png and /dev/null differ diff --git a/docs/main/first_principle_thinking/img/tcpip.png b/docs/main/first_principle_thinking/img/tcpip.png deleted file mode 100644 index a95fbfd..0000000 Binary files a/docs/main/first_principle_thinking/img/tcpip.png and /dev/null differ diff --git a/docs/main/geoaware/_category_.json b/docs/main/geoaware/_category_.json deleted file mode 100644 index dc9fdd6..0000000 --- a/docs/main/geoaware/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "The solution", - "position": 3, - "link": { - "type": "generated-index" - } - } \ No newline at end of file diff --git a/docs/main/geoaware/datacenters.md b/docs/main/geoaware/datacenters.md deleted file mode 100644 index ecd74cb..0000000 --- a/docs/main/geoaware/datacenters.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -sidebar_position: 1 -title: 'Datacenters' -hide_title: true ---- - -# ThreeFold as alternative to Centralized Datacenters - -> TODO: ... - diff --git a/docs/main/geoaware/geo_aware.md b/docs/main/geoaware/geo_aware.md deleted file mode 100644 index b9b5716..0000000 --- a/docs/main/geoaware/geo_aware.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -sidebar_position: 1 -title: 'What is Geo Awareness' -hide_title: true ---- - -![](img/geo_aware.png) - -## What is Geo Awareness - -**Geo-awareness** ensures that digital systems operate with respect to geographic and physical realities. This concept radically shifts how we approach storage, computation, and networking by enabling location-centric control and efficiency. Here's what it entails: - -#### Key Features of Geo-Awareness: - -1. **Shortest Physical Path for Communication** - Communication between two parties happens through the shortest physical route, reducing latency and energy consumption while increasing efficiency. - -2. **Data Autonomy and Integrity** - Users can decide where their data is stored. The data remains incorruptible and accessible only to the user or their personal AI agent, ensuring data privacy and autonomy. - -3. **Resilient Internet Functionality** - Even in cases of internet outages or disasters, most apps and services remain operational, ensuring reliability and continuity. - -4. **Control Over Applications and AI** - Geo-awareness enables users to decide where their applications and personal AI agents operate, giving them full control over their digital footprint and reducing external vulnerabilities. - -5. **Transparent Deployment of Code** - Knowing exactly which code or app is deployed where ensures security and prevents tampering. - -6. **Relevance for Nations and Public Infrastructure** - Unlike public blockchains that lack geo-awareness, this model empowers countries with localized control, enhancing autonomy and trust. - diff --git a/docs/main/geoaware/img/geo_aware.png b/docs/main/geoaware/img/geo_aware.png deleted file mode 100644 index dcfe0ec..0000000 Binary files a/docs/main/geoaware/img/geo_aware.png and /dev/null differ diff --git a/docs/main/geoaware/img/geo_aware2.png b/docs/main/geoaware/img/geo_aware2.png deleted file mode 100644 index 5d8013d..0000000 Binary files a/docs/main/geoaware/img/geo_aware2.png and /dev/null differ diff --git a/docs/main/geoaware/solution.md b/docs/main/geoaware/solution.md deleted file mode 100644 index 43a249f..0000000 --- a/docs/main/geoaware/solution.md +++ /dev/null @@ -1,64 +0,0 @@ ---- -sidebar_position: 4 -title: 'Solution For a Better Internet' -hide_title: true ---- - -![](img/geo_aware2.png) - -## Geo Awareness is the Solution for Many of the Internet Problems - -### The Problems - -- [Compare Electricity](../internet_today/compare_electricity.md) - Compares the inefficiency of relying on distant internet infrastructure to the absurdity of using electricity generated on the other side of the world. -- [Internet Basics](../internet_today/internet_basics.md) - Explains the three fundamental layers of the internet: compute/AI/storage, network, and applications, highlighting current centralization issues. -- [Centralization Risk](../internet_today/centralization_risk.md) - Details the dangers of relying on centralized infrastructure and services, using real-world examples like the Ukraine conflict. -- [The Race For Intelligence](../internet_reinvented/aci.md) - Discusses how AI agents will replace traditional apps within 2 years and the implications of centralized AI development. -- [GDP Negative Impact](../internet_today/gdp_negative.md) - Reveals how the current internet structure causes economic losses for developing nations, with case studies showing billions in yearly losses. - - -**The following table shows how the problems as listed above are fixed because of geo awareness.** - - -| **Problem Area** | **Web2** | **Web3** | **Web 4 = Geo-Aware** | -| ---------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------- | -| **Centralization** | Dominated by a few corporations; creates fragility and dependency. | Often more Decentralized, but lacks local autonomy; often relies on centralized validators and still datacenters. | Fully decentralized and location-specific, empowering local infrastructure and autonomy. | -| **Data Autonomy** | Data stored in centralized data centers controlled by corporations. | Decentralized storage, but users often lack control over physical location. | Users choose specific locations for data storage, ensuring autonomy and privacy. | -| **Infrastructure Resilience** | Vulnerable to disasters, geopolitical issues, and single points of failure. | Often less resilient compared to Web2. | Shortest physical paths and local redundancies ensure continued operation during disruptions. New paths are found when needed even by using nodes from your friends. | -| **Economic Impact (GDP Negative)** | High costs for infrastructure; revenue flows to global platforms. | The validators are still too centralized and often hosted in centralized datanceters. Too complicated and too early days to help right now. | Localized infrastructure boosts regional economies, keeping revenue within countries. | -| **Internet Efficiency** | Long data routes; underutilized hardware; inefficient layers. | Reliant on outdated protocols, vulnerable because of used ledger tech and layered inefficiencies. | Shortest paths reduce latency and cost; full hardware optimization ensures efficiency. | -| **Security and Transparency** | Complex, security by smart employees of the corporations. | Smart contracts improve security, but issues remain as code upgrade path. | Transparent and tamper-proof deployments ensure security and resilience. | -| **Layer Complexity** | Redundant layers create inefficiencies and fragility. | Often web3 is more complex compared to web 2. | Simplifies architecture by localizing compute, storage, and networking. 10x less development effort is possible | -| **Application Hosting** | Hosted in large centralized data centers, increasing latency and cost. | Sometimes, decentralized hosting but not geographically optimized. | Applications can be hosted locally, reducing latency and ensuring autonomy. | -| **Access Inequality** | Over 50% of the world lacks reliable access. | Expands access but without addressing local infrastructure challenges. | Geo-aware systems build localized, affordable infrastructure to improve access. | -| **Session Management** | Breaks under interruptions; no native continuity. | Some continuity improvements via decentralized protocols. | Built-in session management ensures reliability even during disruptions. | - - - -## Challenges in the Current Depin (Decentralized Internet) World - -Despite advancements in decentralized technology, geo-awareness remains under-prioritized. - -Current Web3 solutions focus on decentralization without accounting for the geographic efficiency or autonomy that geo-awareness offers. - ---- - -## Comparison Table: Current Web3 Solutions vs. Geo-Aware Systems - - -| **Feature** | **Current Web3 Solutions** | **Geo-Awareness** | -| ----------------------- | ------------------------------------------------------- | -------------------------------------------------------- | -| **Storage** | Global, often randomly distributed without user control | Users choose storage locations; data remains autonomous | -| **Compute** | Decentralized but lacks location-specific optimization | Compute occurs at chosen locations; optimized for region | -| **Network** | Relies on global, non-optimized routing | Shortest physical path for communication | -| **Ledger** | Public blockchains are unreliable in case of network issues | Location-aware autonomous ledgers for national and local control | -| **Resilience** | Vulnerable to global internet disruptions | Independent operation during outages | -| **Application Control** | Limited transparency on app deployment locations and upgrade paths | Full control and visibility of app deployment | -| **Data Integrity** | Prone to distributed risks and complexities | Tamper-proof, user-controlled data access | - - ---- - -## Why Geo-Awareness Matters - -The current centralized and globalized digital architecture exacerbates inefficiencies, compromises autonomy, and creates economic dependencies. Geo-awareness addresses these problems by creating a decentralized yet location-sensitive framework. This ensures that infrastructure is resilient, secure, and operates in harmony with the physical realities of the world, ultimately empowering users and nations alike. \ No newline at end of file diff --git a/docs/main/img/boot.png b/docs/main/img/boot.png deleted file mode 100644 index 6fcd493..0000000 Binary files a/docs/main/img/boot.png and /dev/null differ diff --git a/docs/main/img/dashboard.png b/docs/main/img/dashboard.png deleted file mode 100644 index e7dec9b..0000000 Binary files a/docs/main/img/dashboard.png and /dev/null differ diff --git a/docs/main/img/evolution.png b/docs/main/img/evolution.png deleted file mode 100644 index 30d45ca..0000000 Binary files a/docs/main/img/evolution.png and /dev/null differ diff --git a/docs/main/img/farming_pools.jpg b/docs/main/img/farming_pools.jpg deleted file mode 100644 index 5115427..0000000 Binary files a/docs/main/img/farming_pools.jpg and /dev/null differ diff --git a/docs/main/img/fourreasons.png b/docs/main/img/fourreasons.png deleted file mode 100644 index fd803da..0000000 Binary files a/docs/main/img/fourreasons.png and /dev/null differ diff --git a/docs/main/img/freezone.png b/docs/main/img/freezone.png deleted file mode 100644 index c0d435d..0000000 Binary files a/docs/main/img/freezone.png and /dev/null differ diff --git a/docs/main/img/freezone2.png b/docs/main/img/freezone2.png deleted file mode 100644 index 34cf3de..0000000 Binary files a/docs/main/img/freezone2.png and /dev/null differ diff --git a/docs/main/img/global_net.png b/docs/main/img/global_net.png deleted file mode 100644 index 6ee0402..0000000 Binary files a/docs/main/img/global_net.png and /dev/null differ diff --git a/docs/main/img/hero_archit.png b/docs/main/img/hero_archit.png deleted file mode 100644 index a62e536..0000000 Binary files a/docs/main/img/hero_archit.png and /dev/null differ diff --git a/docs/main/img/holochain.png b/docs/main/img/holochain.png deleted file mode 100644 index d97c104..0000000 Binary files a/docs/main/img/holochain.png and /dev/null differ diff --git a/docs/main/img/holochain2.png b/docs/main/img/holochain2.png deleted file mode 100644 index c3fb9ac..0000000 Binary files a/docs/main/img/holochain2.png and /dev/null differ diff --git a/docs/main/img/ipfs.jpg b/docs/main/img/ipfs.jpg deleted file mode 100644 index 0927468..0000000 Binary files a/docs/main/img/ipfs.jpg and /dev/null differ diff --git a/docs/main/img/itcontract.png b/docs/main/img/itcontract.png deleted file mode 100644 index 820e13d..0000000 Binary files a/docs/main/img/itcontract.png and /dev/null differ diff --git a/docs/main/img/net1.png b/docs/main/img/net1.png deleted file mode 100644 index 2df8a29..0000000 Binary files a/docs/main/img/net1.png and /dev/null differ diff --git a/docs/main/img/net2.png b/docs/main/img/net2.png deleted file mode 100644 index d2d2658..0000000 Binary files a/docs/main/img/net2.png and /dev/null differ diff --git a/docs/main/img/network_path.png b/docs/main/img/network_path.png deleted file mode 100644 index 3fd3df5..0000000 Binary files a/docs/main/img/network_path.png and /dev/null differ diff --git a/docs/main/img/network_wall.png b/docs/main/img/network_wall.png deleted file mode 100644 index 6baa448..0000000 Binary files a/docs/main/img/network_wall.png and /dev/null differ diff --git a/docs/main/img/nft_architecture_updated.png b/docs/main/img/nft_architecture_updated.png deleted file mode 100644 index 4ad2363..0000000 Binary files a/docs/main/img/nft_architecture_updated.png and /dev/null differ diff --git a/docs/main/img/pathtoweb4.png b/docs/main/img/pathtoweb4.png deleted file mode 100644 index d233d62..0000000 Binary files a/docs/main/img/pathtoweb4.png and /dev/null differ diff --git a/docs/main/img/peer2peer_network.jpg b/docs/main/img/peer2peer_network.jpg deleted file mode 100644 index d5b8f69..0000000 Binary files a/docs/main/img/peer2peer_network.jpg and /dev/null differ diff --git a/docs/main/img/planetary_net.jpg b/docs/main/img/planetary_net.jpg deleted file mode 100644 index f4be658..0000000 Binary files a/docs/main/img/planetary_net.jpg and /dev/null differ diff --git a/docs/main/img/qss_fs_arch.png b/docs/main/img/qss_fs_arch.png deleted file mode 100644 index 7a33e77..0000000 Binary files a/docs/main/img/qss_fs_arch.png and /dev/null differ diff --git a/docs/main/img/qss_system.jpg b/docs/main/img/qss_system.jpg deleted file mode 100644 index 3c4656e..0000000 Binary files a/docs/main/img/qss_system.jpg and /dev/null differ diff --git a/docs/main/img/qsss.png b/docs/main/img/qsss.png deleted file mode 100644 index 2bbe588..0000000 Binary files a/docs/main/img/qsss.png and /dev/null differ diff --git a/docs/main/img/qsss_intro2.png b/docs/main/img/qsss_intro2.png deleted file mode 100644 index cc40d29..0000000 Binary files a/docs/main/img/qsss_intro2.png and /dev/null differ diff --git a/docs/main/img/qsss_overview.png b/docs/main/img/qsss_overview.png deleted file mode 100644 index 3f47b53..0000000 Binary files a/docs/main/img/qsss_overview.png and /dev/null differ diff --git a/docs/main/img/qsstorage_architecture.jpg b/docs/main/img/qsstorage_architecture.jpg deleted file mode 100644 index 811e6ab..0000000 Binary files a/docs/main/img/qsstorage_architecture.jpg and /dev/null differ diff --git a/docs/main/img/re_invented.png b/docs/main/img/re_invented.png deleted file mode 100644 index 630c217..0000000 Binary files a/docs/main/img/re_invented.png and /dev/null differ diff --git a/docs/main/img/redundant_net.jpg b/docs/main/img/redundant_net.jpg deleted file mode 100644 index 1975ef7..0000000 Binary files a/docs/main/img/redundant_net.jpg and /dev/null differ diff --git a/docs/main/img/requirements.png b/docs/main/img/requirements.png deleted file mode 100644 index 295c6c4..0000000 Binary files a/docs/main/img/requirements.png and /dev/null differ diff --git a/docs/main/img/roadmap.jpg b/docs/main/img/roadmap.jpg deleted file mode 100644 index 5390f6d..0000000 Binary files a/docs/main/img/roadmap.jpg and /dev/null differ diff --git a/docs/main/img/scale.png b/docs/main/img/scale.png deleted file mode 100644 index 312549f..0000000 Binary files a/docs/main/img/scale.png and /dev/null differ diff --git a/docs/main/img/shortest_path_routing.jpg b/docs/main/img/shortest_path_routing.jpg deleted file mode 100644 index f3f281f..0000000 Binary files a/docs/main/img/shortest_path_routing.jpg and /dev/null differ diff --git a/docs/main/img/sikana1.png b/docs/main/img/sikana1.png deleted file mode 100644 index 6acf040..0000000 Binary files a/docs/main/img/sikana1.png and /dev/null differ diff --git a/docs/main/img/sikana2.png b/docs/main/img/sikana2.png deleted file mode 100644 index 39af218..0000000 Binary files a/docs/main/img/sikana2.png and /dev/null differ diff --git a/docs/main/img/smartcontract_deploy.png b/docs/main/img/smartcontract_deploy.png deleted file mode 100644 index 8c0a900..0000000 Binary files a/docs/main/img/smartcontract_deploy.png and /dev/null differ diff --git a/docs/main/img/status.png b/docs/main/img/status.png deleted file mode 100644 index ca18b5c..0000000 Binary files a/docs/main/img/status.png and /dev/null differ diff --git a/docs/main/img/storage_arch.png b/docs/main/img/storage_arch.png deleted file mode 100644 index a4c56e1..0000000 Binary files a/docs/main/img/storage_arch.png and /dev/null differ diff --git a/docs/main/img/storage_inno.png b/docs/main/img/storage_inno.png deleted file mode 100644 index 01a0608..0000000 Binary files a/docs/main/img/storage_inno.png and /dev/null differ diff --git a/docs/main/img/storage_today.png b/docs/main/img/storage_today.png deleted file mode 100644 index 80d8114..0000000 Binary files a/docs/main/img/storage_today.png and /dev/null differ diff --git a/docs/main/img/syncthing.jpg b/docs/main/img/syncthing.jpg deleted file mode 100644 index cd1a17e..0000000 Binary files a/docs/main/img/syncthing.jpg and /dev/null differ diff --git a/docs/main/img/tanzania1.png b/docs/main/img/tanzania1.png deleted file mode 100644 index 850f431..0000000 Binary files a/docs/main/img/tanzania1.png and /dev/null differ diff --git a/docs/main/img/tiers1.png b/docs/main/img/tiers1.png deleted file mode 100644 index 9e2e9a4..0000000 Binary files a/docs/main/img/tiers1.png and /dev/null differ diff --git a/docs/main/img/tiers_6pod.png b/docs/main/img/tiers_6pod.png deleted file mode 100644 index 1b67785..0000000 Binary files a/docs/main/img/tiers_6pod.png and /dev/null differ diff --git a/docs/main/img/tiers_container.png b/docs/main/img/tiers_container.png deleted file mode 100644 index 6b213a5..0000000 Binary files a/docs/main/img/tiers_container.png and /dev/null differ diff --git a/docs/main/img/tiers_pod.png b/docs/main/img/tiers_pod.png deleted file mode 100644 index f0bcf44..0000000 Binary files a/docs/main/img/tiers_pod.png and /dev/null differ diff --git a/docs/main/img/unique.png b/docs/main/img/unique.png deleted file mode 100644 index 585ee29..0000000 Binary files a/docs/main/img/unique.png and /dev/null differ diff --git a/docs/main/img/usable_by_all.png b/docs/main/img/usable_by_all.png deleted file mode 100644 index 40c13e4..0000000 Binary files a/docs/main/img/usable_by_all.png and /dev/null differ diff --git a/docs/main/img/usecases_tfgrid.png b/docs/main/img/usecases_tfgrid.png deleted file mode 100644 index 2eb8667..0000000 Binary files a/docs/main/img/usecases_tfgrid.png and /dev/null differ diff --git a/docs/main/img/vindo0.png b/docs/main/img/vindo0.png deleted file mode 100644 index 2e2720d..0000000 Binary files a/docs/main/img/vindo0.png and /dev/null differ diff --git a/docs/main/img/vindo1.png b/docs/main/img/vindo1.png deleted file mode 100644 index 9c33536..0000000 Binary files a/docs/main/img/vindo1.png and /dev/null differ diff --git a/docs/main/img/vindo2.png b/docs/main/img/vindo2.png deleted file mode 100644 index 87bdc5f..0000000 Binary files a/docs/main/img/vindo2.png and /dev/null differ diff --git a/docs/main/img/vindo3.png b/docs/main/img/vindo3.png deleted file mode 100644 index fa67e56..0000000 Binary files a/docs/main/img/vindo3.png and /dev/null differ diff --git a/docs/main/img/vindo4.png b/docs/main/img/vindo4.png deleted file mode 100644 index ded2f16..0000000 Binary files a/docs/main/img/vindo4.png and /dev/null differ diff --git a/docs/main/img/vindo5.png b/docs/main/img/vindo5.png deleted file mode 100644 index 0ae7541..0000000 Binary files a/docs/main/img/vindo5.png and /dev/null differ diff --git a/docs/main/img/vindo6.png b/docs/main/img/vindo6.png deleted file mode 100644 index 1395b91..0000000 Binary files a/docs/main/img/vindo6.png and /dev/null differ diff --git a/docs/main/img/vindo7.png b/docs/main/img/vindo7.png deleted file mode 100644 index 28cc1fe..0000000 Binary files a/docs/main/img/vindo7.png and /dev/null differ diff --git a/docs/main/img/vindo8.png b/docs/main/img/vindo8.png deleted file mode 100644 index 76408c8..0000000 Binary files a/docs/main/img/vindo8.png and /dev/null differ diff --git a/docs/main/img/virtual_browser.jpg b/docs/main/img/virtual_browser.jpg deleted file mode 100644 index 40948e5..0000000 Binary files a/docs/main/img/virtual_browser.jpg and /dev/null differ diff --git a/docs/main/img/virtual_sysadmin.jpg b/docs/main/img/virtual_sysadmin.jpg deleted file mode 100644 index cb429ab..0000000 Binary files a/docs/main/img/virtual_sysadmin.jpg and /dev/null differ diff --git a/docs/main/img/vstreaming.png b/docs/main/img/vstreaming.png deleted file mode 100644 index f3a0f98..0000000 Binary files a/docs/main/img/vstreaming.png and /dev/null differ diff --git a/docs/main/img/vverse_museum.png b/docs/main/img/vverse_museum.png deleted file mode 100644 index f6a160a..0000000 Binary files a/docs/main/img/vverse_museum.png and /dev/null differ diff --git a/docs/main/img/vverse_museum2.png b/docs/main/img/vverse_museum2.png deleted file mode 100644 index 5e6aac3..0000000 Binary files a/docs/main/img/vverse_museum2.png and /dev/null differ diff --git a/docs/main/img/we_are_products.png b/docs/main/img/we_are_products.png deleted file mode 100644 index 73e65cb..0000000 Binary files a/docs/main/img/we_are_products.png and /dev/null differ diff --git a/docs/main/img/web4.png b/docs/main/img/web4.png deleted file mode 100644 index 65e4c37..0000000 Binary files a/docs/main/img/web4.png and /dev/null differ diff --git a/docs/main/img/webgateway.jpg b/docs/main/img/webgateway.jpg deleted file mode 100644 index ce67712..0000000 Binary files a/docs/main/img/webgateway.jpg and /dev/null differ diff --git a/docs/main/img/webgw_scaling.jpg b/docs/main/img/webgw_scaling.jpg deleted file mode 100644 index ad8819c..0000000 Binary files a/docs/main/img/webgw_scaling.jpg and /dev/null differ diff --git a/docs/main/img/whitelists.jpg b/docs/main/img/whitelists.jpg deleted file mode 100644 index 2958abb..0000000 Binary files a/docs/main/img/whitelists.jpg and /dev/null differ diff --git a/docs/main/img/world_records.png b/docs/main/img/world_records.png deleted file mode 100644 index 01fa5d0..0000000 Binary files a/docs/main/img/world_records.png and /dev/null differ diff --git a/docs/main/img/zkube_architecture.jpg b/docs/main/img/zkube_architecture.jpg deleted file mode 100644 index f8fc59a..0000000 Binary files a/docs/main/img/zkube_architecture.jpg and /dev/null differ diff --git a/docs/main/img/zos00.png b/docs/main/img/zos00.png deleted file mode 100644 index ce96ec3..0000000 Binary files a/docs/main/img/zos00.png and /dev/null differ diff --git a/docs/main/img/zos23.png b/docs/main/img/zos23.png deleted file mode 100644 index 230315d..0000000 Binary files a/docs/main/img/zos23.png and /dev/null differ diff --git a/docs/main/img/zos_compute.png b/docs/main/img/zos_compute.png deleted file mode 100644 index ecb22c0..0000000 Binary files a/docs/main/img/zos_compute.png and /dev/null differ diff --git a/docs/main/img/zos_images.jpg b/docs/main/img/zos_images.jpg deleted file mode 100644 index 2d8302f..0000000 Binary files a/docs/main/img/zos_images.jpg and /dev/null differ diff --git a/docs/main/img/zos_network_overview.jpg b/docs/main/img/zos_network_overview.jpg deleted file mode 100644 index febb1d6..0000000 Binary files a/docs/main/img/zos_network_overview.jpg and /dev/null differ diff --git a/docs/main/img/zos_overview.png b/docs/main/img/zos_overview.png deleted file mode 100644 index 572e280..0000000 Binary files a/docs/main/img/zos_overview.png and /dev/null differ diff --git a/docs/main/img/zos_overview_compute_storage.jpg b/docs/main/img/zos_overview_compute_storage.jpg deleted file mode 100644 index 23257e5..0000000 Binary files a/docs/main/img/zos_overview_compute_storage.jpg and /dev/null differ diff --git a/docs/main/internet_reinvented/_category_.json b/docs/main/internet_reinvented/_category_.json deleted file mode 100644 index 169fae9..0000000 --- a/docs/main/internet_reinvented/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Internet Re-Invented", - "position": 3, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/internet_reinvented/aci.md b/docs/main/internet_reinvented/aci.md deleted file mode 100644 index 402e3a4..0000000 --- a/docs/main/internet_reinvented/aci.md +++ /dev/null @@ -1,38 +0,0 @@ ---- -title: 'Augmented Collective Intelligence' -sidebar_position: 1 ---- - -## The Race For Intelligence - -![](img/ai_agents_centralized.png) - -**Within the next two years, we will no longer be using all those hundreds of apps, but we will be talking to AI driven agents.** - -## **The Role of AI in Our Lives** - -- Right now, humans interact with the internet mainly through apps on their phones, computers, and other devices. -- In the near future (within 2 years), apps will fade into the background, and **AI-driven agents** will become the primary way we interact with technology. For example, instead of using multiple apps for messaging, shopping, or searching, you might simply ask an AI assistant to handle all those tasks through conversation. -- These AI agents will be accessed using modern devices like phones, glasses, or even futuristic interfaces like brain implants (e.g., Neuralink). - - -## **The Race for Intelligence** - -![](img/race_intelligence.png) - - -The world is in a rapid phase of technological advancement, driven by innovations in AI, quantum computing, and biotechnology. - -### **Key Milestones in Internet History** - -- **1960s:** The internet started as a free and open platform, allowing people to share ideas, collaborate, and connect directly. -- **2000–2024:** The internet has become increasingly controlled by large corporations. These companies dominate through data collection and commercial interests, compromising the internet’s original vision of freedom and openness. -- **2025 and Beyond:** Large corporations are now racing to develop **Artificial General Intelligence (AGI)**—AI systems that can think and reason like humans. This raises concerns about centralization, control, and ethical use. - -## **A Vision for the Future** - -Instead of leaving the future of AI in the hands of a few powerful corporations, there is a push to create **Augmented Collective Intelligence.** - -- This concept envisions AI as a tool that empowers everyone, enabling collaboration and shared decision-making rather than monopolizing power. -- The goal is to restore the internet’s original ideals of openness, privacy, and community-driven innovation. - diff --git a/docs/main/internet_reinvented/architecture.md b/docs/main/internet_reinvented/architecture.md deleted file mode 100644 index ba46396..0000000 --- a/docs/main/internet_reinvented/architecture.md +++ /dev/null @@ -1,50 +0,0 @@ ---- -sidebar_position: 4 ---- - -# Threefold Architecture - -![](img/architecture_high_level.png) - -Decentralized, geo-aware, and autonomous internet infrastructure. - -### **Core Components:** - -1. **Geo-Aware Private AI Agents (3AI):** - - Personal AI agents that are private, secure, and autonomous. - - These agents can deploy applications in a self-healing, consensus-driven context. - - Geo-awareness ensures that the AI operates within defined physical and legal boundaries, providing compliance and data privacy. - -2. **3CORE (Ledger):** - - A geo-fenced ledger that supports identity management, digital assets, and smart contracts. - - It integrates seamlessly with external blockchains and digital currencies, functioning as a Layer 2 solution for blockchain interoperability. - - Optimized for consensus-driven code, it extends beyond basic smart contracts to enable advanced decentralized applications. - -3. **Decentralized Infrastructure Layers:** - - **Unbreakable Network Layer**: Provides robust connectivity with resilience to failures and attacks. - - **Unbreakable Storage Layer**: Offers decentralized, reliable, and secure data storage. - -Together, these layers form an "Unbreakable Cloud Engine," ensuring continuity and reliability. - - -4. **Autonomous Quantum Compute:** - - A computational layer designed for autonomy, allowing nations or organizations to maintain control over their infrastructure and data. - - Quantum-compute-ready, future-proofing the system for advanced workloads. - -5. **Geo-Fenced and Aware AI:** - - Integrates AI functionalities that are tied to geographical and jurisdictional contexts, ensuring secure and compliant operations across borders. - -6. **Interconnected 3Nodes:** - - The foundation of the infrastructure, combining compute, storage, and networking capabilities. - - These nodes create a resilient, scalable, and distributed ecosystem for internet services. - ---- - -### **Key Features:** -- **Seamless Blockchain Integration:** Allows integration with any public blockchain and supports digital currencies. -- **Autonomy and Security:** Ensures that data and AI remain under the control of users or local entities, promoting decentralization. -- **Resilience and Efficiency:** The interconnected infrastructure reduces dependency on centralized systems, creating a highly reliable and efficient network. - -This system embodies the principles of **Web 4**, focusing on decentralization, autonomy, and geo-awareness, offering a future-ready alternative to the centralized internet paradigm. - - diff --git a/docs/main/internet_reinvented/img/ai_agents_centralized.png b/docs/main/internet_reinvented/img/ai_agents_centralized.png deleted file mode 100644 index 125be2e..0000000 Binary files a/docs/main/internet_reinvented/img/ai_agents_centralized.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/architecture_high_level.png b/docs/main/internet_reinvented/img/architecture_high_level.png deleted file mode 100644 index bdbb746..0000000 Binary files a/docs/main/internet_reinvented/img/architecture_high_level.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/architecture_low_level.png b/docs/main/internet_reinvented/img/architecture_low_level.png deleted file mode 100644 index 72f8fbe..0000000 Binary files a/docs/main/internet_reinvented/img/architecture_low_level.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/inventions.png b/docs/main/internet_reinvented/img/inventions.png deleted file mode 100644 index 3fbc46e..0000000 Binary files a/docs/main/internet_reinvented/img/inventions.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/natural_progression.png b/docs/main/internet_reinvented/img/natural_progression.png deleted file mode 100644 index fe71a7b..0000000 Binary files a/docs/main/internet_reinvented/img/natural_progression.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/people_first.png b/docs/main/internet_reinvented/img/people_first.png deleted file mode 100644 index d3c489d..0000000 Binary files a/docs/main/internet_reinvented/img/people_first.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/race_intelligence.png b/docs/main/internet_reinvented/img/race_intelligence.png deleted file mode 100644 index d91cc86..0000000 Binary files a/docs/main/internet_reinvented/img/race_intelligence.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/unique.png b/docs/main/internet_reinvented/img/unique.png deleted file mode 100644 index 585ee29..0000000 Binary files a/docs/main/internet_reinvented/img/unique.png and /dev/null differ diff --git a/docs/main/internet_reinvented/img/usable_by_all.png b/docs/main/internet_reinvented/img/usable_by_all.png deleted file mode 100644 index 40c13e4..0000000 Binary files a/docs/main/internet_reinvented/img/usable_by_all.png and /dev/null differ diff --git a/docs/main/internet_reinvented/infrastructure.md b/docs/main/internet_reinvented/infrastructure.md deleted file mode 100644 index 3a81c0b..0000000 --- a/docs/main/internet_reinvented/infrastructure.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -sidebar_position: 5 ---- - - -# Infrastructure - -![](img/architecture_low_level.png) - - -## Unbreakable Network Layer - -**Shortest Path Optimization**: -- The network layer utilizes advanced routing algorithms to dynamically calculate the most efficient path for data to travel. It adapts in real time, considering factors like network congestion, node availability, and latency. This ensures that data always takes the shortest and fastest route, reducing delays and improving performance. -- Built-in **Naming and Content Delivery Network (CDN)** systems further enhance efficiency by storing and delivering frequently accessed content from the nearest available node. - -**Survival During Internet Failures**: - -- The network operates on a decentralized infrastructure. If the broader internet or certain nodes experience a failure (due to disasters, attacks, or other disruptions), the system self-heals and reroutes traffic through available paths. Local nodes maintain communication within their region, ensuring that even in disconnected environments, services remain operational. This makes the system resilient and disaster-proof. -- There are agents for desktop and mobile phones which guarantee seamless integration. - ---- - -## Unbreakable Storage Layer -- **Data Integrity and Durability**: - The storage layer is designed to ensure that data can never be lost or corrupted. This is achieved through: - - **Unbreakable Geo Aware Data Storage**: Data is fragmented and distributed across multiple nodes in the network. Even if some nodes fail, the remaining fragments are sufficient to reconstruct the original data. - - **Ultra Efficient**: This system is ultra efficient, up to 10x less hard disks needed. - - **Geo Aware**: Users have full control over where the data is and only their applications or AI agents can get access to this data. - - **Self-Healing Mechanism**: If a storage fragment becomes unavailable or damaged, the system automatically regenerates the broken data. - - **Immutable Storage**: The architecture prevents unauthorized modifications, maintaining data integrity, data can never be lost. - -- **Scalability to Zetabytes**: - The decentralized storage system scales effortlessly by adding new nodes. Unlike traditional centralized systems with physical constraints, this network expands horizontally, leveraging unused storage capacity globally. This approach has been proven to handle zetabytes of data efficiently, with previous iterations widely adopted by organizations requiring massive-scale storage solutions. - ---- - -## Autonomous Quantum Compute & AI Layer -- **Solving the World’s Serious Issues**: - The quantum compute layer introduces unparalleled computational power, capable of tackling complex problems that classical systems struggle with, such as: - - **Climate Modeling**: Simulating intricate environmental systems to predict climate patterns. - - **Medical Research**: Accelerating drug discovery and personalized medicine development. - - **Optimization Problems**: Enhancing logistics, energy usage, and resource allocation for global efficiency. - -- **Integration with AI**: - The quantum layer works seamlessly with geo-aware AI agents. AI leverages quantum capabilities to process vast datasets, derive insights, and make informed decisions faster and more accurately. Together, they: - - Model scenarios and test solutions at unprecedented speed. - - Provide personalized, context-aware outputs based on geographical and jurisdictional needs. - - Drive collaborative decision-making by balancing global and local priorities. - ---- - -## **How it All Works Together** -The system's core components—network, storage, and compute layers—are deeply interconnected, forming an **Unbreakable Cloud Engine**: -- The **network layer** ensures seamless communication and data transmission across nodes, even under adverse conditions. -- The **storage layer** safeguards data, enabling ultra-reliable access and scalability to support global demands. -- The **compute layer**, powered by quantum technology, works in harmony with AI to deliver groundbreaking solutions for real-world challenges. - -This integrated approach ensures that services are not only resilient and scalable but also future-proof, sustainable, and capable of empowering users globally. It’s a holistic solution redefining the Internet for the modern world. - -## Requirements for a New Internet - -Lets us know how you think we are doing to resolve the following requirements: - -![alt text](../img/requirements.png) - -- Compute, Storage, Network need to be - - Local - - Autonomous - - Private - - More Secure -- Storage needs to be - - More reliable with less overhead (only 20% overhead needed) - - Capable to be global and be used as CDN (Content Delivery Network) - - Fast enough for the Use Case at hand - - Data can never get lost nor corrupted. - - Storage can scale to Zetabytes as Easily as Petabytes -- Network needs to be - - Working no matter what happens with existing network, route around issues. - - Local sensitive (chose shortest path) - - End2End Encrypted - - Capable to really know where information goes to or comes from (authenticity) -- The full system needs to be - - Autonomous & self Healing - - It should be possible to operate without human Intervention -- Green - - We believe Internet / Cloud can be delivered using at least 10x less energy. - diff --git a/docs/main/internet_reinvented/internet_reinvented.md b/docs/main/internet_reinvented/internet_reinvented.md deleted file mode 100644 index a7ded51..0000000 --- a/docs/main/internet_reinvented/internet_reinvented.md +++ /dev/null @@ -1,24 +0,0 @@ ---- -title: Internet Natural Progression -sidebar_position: 3 ---- - -## Augemented Collective Intelligence - -We envision a world where we collectively create an intelligence greater than ourselves, guided by simple values and principles that resonate with us, such as authenticity, open source, and simplicity. - -All of above is in line with [First Principle Thinking](../first_principle_thinking/1_onion_analogy.md) - - -## Planet People First - -![](img/people_first.png) - -## The Internet’s Natural Progression - -![](img/natural_progression.png) - -> We believe Web 4 is the implementation of Augmented Collective Intelligence. - - - diff --git a/docs/main/internet_reinvented/inventions.md b/docs/main/internet_reinvented/inventions.md deleted file mode 100644 index 9bfd14d..0000000 --- a/docs/main/internet_reinvented/inventions.md +++ /dev/null @@ -1,25 +0,0 @@ ---- -sidebar_position: 4 -title: 'Inventions' ---- - -## Infrastructure Level - -![](img/inventions.png) - -Live in production mode for years, our generation 3 network represents our proof of concept. - -> [Explore the ThreeFold Dashboard](https://dashboard.grid.tf/) - -## 3AI = Our 3AI Agent Technology - -![](../key_innovations_overview/ai/img/ai_agent.png) - -- Personal private ledger with offline capabilities -- Autonomous self-healing deployments -- Integrated with Mycelium, our unbreakable data & network layer -- Super intelligent - - A good mix between rule-based data and AI LLM interactions -- Full peer-to-peer operations - -> This technology will be launched in Q2 2025, this is the end result of more than 10 years of development. \ No newline at end of file diff --git a/docs/main/internet_reinvented/trust.md b/docs/main/internet_reinvented/trust.md deleted file mode 100644 index de69674..0000000 --- a/docs/main/internet_reinvented/trust.md +++ /dev/null @@ -1,60 +0,0 @@ ---- -title: Trust -sidebar_position: 9 -draft: true ---- - - -![](../img/farming_pools.jpg) - -# Trust is Everything - - -While affordability is a factor, the primary appeal of AI & internet services lies in their reliability, scalability, and performance. - -This parallels the concept of insurance, where customers are willing to pay a premium for the assurance of superior service and uptime. - -In the decentralized infrastructure (DePIN) space, establishing trust and reliability is super important, but not sufficiently available in current offerings. - -## Cost vs. Quality - -### Reliability and Uptime - -Customers often prefer to pay a higher price for cloud, AI, internet services that guarantee better uptime and reliability. - -For example, paying $10 per terabyte for a service with stellar uptime and customer support is more appealing than a $5 per terabyte service with frequent downtimes and minimal support. The value proposition lies in uninterrupted access to data and services, which is critical for business operations. - -### Service Level Agreements (SLAs) - -Service Level Agreements (SLAs) play a crucial role in this decision-making process. - - SLAs provide a clear, contractual guarantee of the service levels customers can expect. Companies offering robust SLAs with high uptime guarantees, fast response times, and comprehensive support are more attractive, even at a higher cost. - -## Decentralized Infrastructure (DePIN) and Trust - -### Challenges in DePIN - -One of the significant challenges in DePIN is ensuring that customers can trust decentralized hosters. - -Unlike traditional centralized providers, decentralized hosters need to establish credibility and reliability in a market that is inherently less controlled. - -### Farming Pools and Legal Decentralization - -#### Formation of Farming Pools - -Hosters can group together in farming pools, creating a collaborative environment where resources and responsibilities are shared. These pools can offer combined storage and computational power, enhancing overall performance and reliability. - -#### Security Token Offerings (STOs) - -To fund these farming pools, we can utilize Security Token Offerings (STOs). Investors can buy tokens, representing shares in these pools, thus promoting legal decentralization. This model not only democratizes investment but also ensures that the operations of these pools are transparent and regulated. - -### Transparency and Legal Assurance - -#### Open SLAs - -Each farming pool must be explicit about the SLAs they can deliver. Transparency in service commitments ensures that customers know what performance and reliability to expect. This openness is critical in building trust in a decentralized environment. - -#### Legal Blockchain Contracts - -Blockchain contracts must be legally binding in the real world. These contracts should clearly define the terms of service, dispute resolution mechanisms, and compliance with relevant regulations. Legal enforceability ensures that customers can trust the decentralized hosters to honor their commitments. - diff --git a/docs/main/internet_today/_category_.json b/docs/main/internet_today/_category_.json deleted file mode 100644 index 330aa01..0000000 --- a/docs/main/internet_today/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Internet is Broken", - "position": 2, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/internet_today/centralization_risk.md b/docs/main/internet_today/centralization_risk.md deleted file mode 100644 index ac141f7..0000000 --- a/docs/main/internet_today/centralization_risk.md +++ /dev/null @@ -1,45 +0,0 @@ ---- -title: 'Centralization Risks' -sidebar_position: 3 ---- - -# Centralization Risks - -![](img/blocked.png) - -## Why Countries Need Their Own Infrastructure - -The internet is not just cables; it’s a combination of physical infrastructure (like data centers and servers), software, and services that enable global communication and access to information. When countries don’t have control over their own infrastructure, they become overly dependent on external, centralized providers, which is risky for several reasons: - -1. **Vulnerability to Political Decisions** - - Imagine a situation where a global service like Google decides to block access to certain countries due to political pressure or conflicts. Citizens, businesses, and governments in those regions would be instantly cut off from critical tools, data, and communication platforms. - -2. **Disruptions in Emergencies** - - If a natural disaster, conflict, or cyberattack occurs, centralized systems become single points of failure. Without local infrastructure, countries cannot ensure continuity of services for their citizens. - -3. **Loss of Autonomy** - - Relying on foreign infrastructure means a country doesn’t have full control over its own data or communication. This compromises national security and privacy for both individuals and governments. - ---- - -## Ukraine: A Real-Life Example of Infrastructure Targeting - -In the early stages of the war in Ukraine, one of the first targets was the country's data centers and communication infrastructure. Bombing these centers disrupted access to critical systems, cutting off communication and data services. This highlighted the vulnerability of relying on centralized or exposed infrastructure during conflicts. - ---- - -## The Risks of Relying on Centralized Services Like Google or Microsoft - -1. **Single Point of Failure** - -Google and other tech giants operate as centralized hubs for many internet services, from search engines and email to cloud storage and apps. - -If these services were disrupted (due to cyberattacks, internal decisions, or geopolitical conflicts), millions or even billions of people would lose access to essential tools overnight. - -2. **Dependence on Foreign Entities** - -Many countries rely on Google’s infrastructure for businesses, education, and government operations. If access to these services were blocked, it would lead to economic and societal chaos. - -3. **Disaster in the Making** - -A world dependent on a handful of centralized providers is a fragile one. If one of these providers experiences a major failure, it can create a ripple effect that impacts global economies, healthcare systems, and daily life. diff --git a/docs/main/internet_today/compare_electricity.md b/docs/main/internet_today/compare_electricity.md deleted file mode 100644 index f6d3b91..0000000 --- a/docs/main/internet_today/compare_electricity.md +++ /dev/null @@ -1,35 +0,0 @@ ---- -sidebar_position: 1 ---- -# Something to Think About... - -## Would a Country Do This? - -![](img/electricity.png) - -Imagine this: Would it make sense to rely on electricity that’s generated far away, on the other side of the world? You’d need a super expensive cable to bring it to you, and if that cable breaks, you’d lose power completely. No country would ever choose to do this because it’s costly, inefficient, and risky. - - -## Why is +70% of the World Doing it for the Internet? - -![](img/we_are_doing_it_for_internet.png) - - - -Now think about the internet. That’s exactly what most of the world is doing! Over 70% of the world depends on internet infrastructure that’s far away, requiring expensive cables and systems to bring it to users. Here’s why this doesn’t make sense: - -1. **It’s Too Expensive** - Using distant infrastructure means you’re paying not only for the internet service itself but also for the costly cables and systems to deliver it. This makes it much more expensive than building local infrastructure. - -2. **It’s Vulnerable** - A single cable or system can fail because of natural disasters, accidents, or even sabotage. If that happens, millions of people could lose access to the internet. - -3. **It Compromises Control** - Relying on systems controlled by other countries or big companies means you have less independence. They control your access to the internet and your data. - -4. **It’s Inefficient** - Just like it’s smarter to generate electricity close to where it’s used, it’s also better to host internet services closer to the people using them. This makes things faster, cheaper, and more reliable. - ---- - -Instead of relying on far away systems, we should build local, decentralized internet infrastructure. It’s safer, more affordable, and gives people more control over their digital lives. \ No newline at end of file diff --git a/docs/main/internet_today/conclusion.md b/docs/main/internet_today/conclusion.md deleted file mode 100644 index 274a1e2..0000000 --- a/docs/main/internet_today/conclusion.md +++ /dev/null @@ -1,43 +0,0 @@ ---- -title: 'Conclusion' -sidebar_position: 10 ---- - -![](img/conclusion.png) - -Only 50% of world has decent access to Internet, let's recap the issues. - -### **1. Centralization Risks** - -- **Dependence on Few Entities:** Countries and individuals heavily rely on centralized providers like Google, Amazon, and Microsoft for critical services, creating vulnerabilities to disruptions, geopolitical conflicts, and external control over data and infrastructure. -- **Loss of Autonomy:** Centralized data centers and infrastructure compromise autonomy, leaving nations and organizations at the mercy of foreign entities and global policies. -- **Fragility:** The current centralized model leads to single points of failure, where disruptions can have widespread economic and societal impacts. - ---- - -### **2. Internet Inefficiency** -- **Long-Distance Data Transfer:** Much of the world depends on internet infrastructure located far away, requiring data to travel unnecessarily long distances, increasing costs and reducing reliability. -- **Underutilized Hardware:** Modern computing systems fail to efficiently utilize hardware advancements due to inefficiencies like excessive context switching, leading to wasted resources and performance bottlenecks. - ---- - -### **3. Economic and Structural Challenges** -- **GDP Negative Impact:** Developing nations face economic disadvantages due to the internet's structure. Revenue is lost to global platforms (e.g., booking sites, advertising), creating economic leakage and dependency. -- **Infrastructure Costs:** Developing countries disproportionately bear the cost of accessing global internet infrastructure without reaping proportional benefits. - ---- - -### **4. Technological and Architectural Flaws** - -![](img/problem_overview.png) -- **Outdated Protocols:** TCP/IP, the foundational internet protocol, was not designed for modern needs like dynamic networks, security, and session management, leading to inefficiencies and vulnerabilities. -- **Layer Complexity:** The current "onion-like" stack of layers in cloud and internet architecture adds unnecessary complexity and fragility, masking core problems rather than addressing them. - - ---- - -### **5. Less than 50% of world has decent internet** - -![alt text](img/fortune.png) - -Finally, we should not forget that the internet is only available to 50% of the world! \ No newline at end of file diff --git a/docs/main/internet_today/countries.md b/docs/main/internet_today/countries.md deleted file mode 100644 index 91bcb90..0000000 --- a/docs/main/internet_today/countries.md +++ /dev/null @@ -1,232 +0,0 @@ ---- -title: 'National Security' -sidebar_position: 3 -hide_title: true ---- - -![](img/atomic_race.png) - -## Countries Digital National Security is Compromised - -> In our Opinion, there are 3 matters of national security to be considered. - -### Geo Politics in Digital - -Over 90% of the world depends on the digital infrastructure/software/platforms controlled by a single superpower, including cloud services, internet cables, and platforms like Google and Microsoft. - -This creates extreme vulnerability: if leveraged, the superpower could disrupt economies, cut off access, or manipulate systems to force compliance. Such dependence grants it immense geopolitical power, turning digital infrastructure into a tool for coercion and threatening global sovereignty. - -**Questions to ask yourself** - -- **How much of your critical infrastructure, data & apps are hosted in the cloud?** - - The **U.S. owns 99%** of global cloud capacity. - - Even if a U.S. company builds a data center in your country: - - They **still have full control**. - - They **will use** that power if they believe they need to. - - **See**: [CLOUD Act](https://www.justice.gov/criminal/cloud-act-resources). -- **Who comes first?** - - Do you believe the **U.S. will always put its own interests first?** - - Could there come a time when **your country or currency is less aligned**? - - If yes, what is the chance that the U.S. would: - - Use its cloud services as **leverage**? - - Restrict access to critical tools? - - Enforce economic or political pressure? -- **Real-world examples:** - - **[DeepSeek AI](https://www.computerweekly.com/news/366619153/US-lawmakers-move-to-ban-DeepSeek-AI-tool)** – U.S. lawmakers moving to ban foreign AI tools. - - **China tariffs** – Trade restrictions based on geopolitical interests. - - **Mexico** – U.S. economic and trade pressures. - - **Other cases** – Numerous examples of digital and economic influence. -- **What’s the risk?** - - If your businesses **lose access** to these cloud services: - - How many of your **systems would go down**? - - How dependent are you on **foreign-controlled infrastructure**? - - Even if unlikely, **can you afford the risk?** - - -### Disasters (war, climate) - -The global internet system is dangerously fragile due to its centralized structure and reliance on outdated protocols like TCP/IP, which were designed decades ago. There are many points of centralization (internet exchange points, name services, datacenters, cloud services, ...) leading to very vulnerable situation. - - -A single outage or attack on these systems **will** cripple a nation’s infrastructure, from banking, airports to healthcare, leaving it defenseless. The system’s vulnerability to both human-made and natural threats highlights the urgent need for decentralized, secure, and resilient alternatives. - -**Questions to ask yourself** - -- **Do you expect climate change to impact your critical infrastructure?** - - If yes, could this disrupt **connections to the U.S. and Europe**, where your apps are hosted? - - Could extreme weather events increase the risk of **cable cuts**? - - **See appendix** for proof points and their impact. - - Do you want to take the risk? - -- **Is the current internet infrastructure outdated?** - - The internet was not designed for today’s demands—it functions **like a traffic jam** under heavy load. - - Do you believe outdated technology could cause **even more issues** in the future? - -- **Who controls the infrastructure?** - - Do you believe that **U.S. companies play the biggest role** in running global internet infrastructure? - - If two people in your country join a **Zoom call**, their connection **routes through the U.S. or Europe**—is this how it should work? - -- **Are you losing money by relying on foreign internet capacity?** - - Do you agree that **not having your own infrastructure** means: - - **You loose billions of revenue which should stay in country.** - - You pay more for bandwidth. - - Your economy depends on **foreign-controlled** systems. - -> **[More info](https://threefold.info/tech/docs/category/internet-is-broken).** - - - -### Cyberpandemic - -Intelligence agencies worldwide have embedded backdoors into various systems—an approach that may have once seemed beneficial but has since led to numerous unintended consequences. - -With the advent of AI and quantum computing, securing centralized systems using traditional methods has or will become virtually impossible, unless we completely rethink the way how to create our digital future. - -The **Cyberpandemic** is now a reality. - -**Questions to ask yourself** - -- **Do you believe intelligence agencies have embedded backdoors into various systems?** - - If yes, do you think this has led to **unintended consequences**? - - Do you trust that these backdoors will **never be exploited** by hackers or worse? - -- **Can traditional security methods protect centralized systems in the AI & quantum era?** - - Do you think AI and quantum computing will make **current security models obsolete**? - - If so, do we need to **completely rethink** how we build digital infrastructure? - - Do you believe that using bolted on solutions will help often provided by Israel or US? - -- **Is a **Cyberpandemic** already happening?** - - Are you seeing **increasing cyberattacks** on critical infrastructure? - - Do you believe **centralized systems** are a major security risk? - - Do you have a **contingency plan** if key systems are compromised? - -> **[More info](https://threefold.info/cyberpandemic).** - -## THIS IS A MATTER OF NATIONAL SECURITY - -> **It's not a question of **"if"**, but "**when**".** - -- **Is building local datacenters a real solution?** - - It is **expensive and complicated** - - Even if built, would it truly solve the problem? - - The software, apps, and systems **are still controlled by U.S./China-linked companies**. - - Most existing tech is based on **outdated paradigms**. - -- **Can hosting U.S. cloud infrastructure locally ensure control?** - - Even if U.S. companies **host data in your country**, do they still hold the keys? - - Does any contract **truly prevent them** from using their control when they deem necessary? - -- **What about European companies?** - - Even if EU-based, do they still **rely on U.S. cloud infrastructure**? - - Is the tech stack **still dependent on U.S./Chinese technology**? - - Does this mean the problem **remains unsolved**? - -- **Is quickly rolling your own infrastructure a viable solution?** - - It would **take years** and come with **high risks**. - - Would it still be **based on outdated paradigms**? - - Does any solution **using the current way of thinking** truly resolve the issue at its core? - -## Lets' act. - -A group of individuals, has developed a system designed to overcome the challenges as described above. - -Built from the ground up on a fundamentally different paradigm, this system offers: - -- **Geographic awareness** for optimized performance and resilience -- **100x greater reliability** compared to traditional architectures -- **Robust protection against AI- and quantum-based threats** -- **Drastically lower energy consumption** for sustainable operation -- **Extreme scalability**, enabling significantly more efficiency with fewer resources -- **10x cost-effectiveness**, making advanced technology accessible to a broader audience -- **Augmented Collective Intelligence**, optimized safe Intelligence for our future. - - -## A Digital "Atomic Race" is going on. - -We are witnessing a digital world war, a global race for dominance in "super" intelligence (AI) that mirrors the 20th-century competition for atomic power. - -Nations and corporations are investing heavily in AI to secure economic, military, and geopolitical advantages, as AI promises to redefine industries, enhance cyber and physical warfare, and shape global power dynamics. - -Just as atomic power redefined the balance of power in the Cold War, super intelligence is becoming the cornerstone of 21st-century strategy, with the stakes including national security, economic prosperity, and technological sovereignty. The race to develop and control AI technologies is not just about innovation but about ensuring that these advancements are harnessed responsibly to avoid misuse, ethical dilemmas, and escalating global tensions. - -### Super intelligence is much more than AI - -Its the combination of: - -- AI LLM's (Large Language Models) -- Self Healing Autonomous Agents (AI is only subset) -- Quantum Compute, Encryption, ... -- Access to Self Healing Geo-Aware and Sovereign Internet Systems (network, storage, compute) -- Synthetic biology (this is like playing god) - -### It's on - -Superpower(s) are pouring massive funds to dominate in these fields, focusing on its own economic and military gains while ignoring broader global impacts. - -Other nations are left behind, widening global inequality and creating a divide between technological leaders and those struggling to compete. This strategy prioritizes self-interest over international cooperation. - -Over 90% of nations have no chance to compete in this race unless they redefine the rules of the game. - -## Augmented Collective Intelligence - -Artificial Intelligence (AI) lacks ethical understanding, cultural sensitivity, and human intuition—critical for global leadership. ACI enhances decision-making by integrating human wisdom with machine intelligence, avoiding AI’s limitations. - -AI is centralized, prone to bias, and easily weaponized, while ACI fosters decentralized, transparent, and resilient governance. It enables leaders to adapt to uncertainty, unlike AI, which relies solely on past data. - -AI’s high energy demands and monopolized control make it unsustainable. ACI optimizes intelligence, reducing resource consumption while ensuring stability and a safer "digital" future. - -## The Future: Leadership Augmented, Not Replaced - -Global leaders cannot afford to be passive recipients of AI-driven conclusions. - -Instead, they must leverage Augmented Collective Intelligence to: - -- Enhance human judgment rather than automate it away -- Empower decentralized problem-solving rather than rely on centralized AI control -- Ensure transparent, ethical, and inclusive decision-making - -# The way forward. - - -We are carefully considering how to release our breakthrough technology and the powerful ideas behind to countries who need it the most. - -Initially, we considered a fully decentralized approach but realized it wouldn’t drive change quickly enough. - -Our current plan is to establish 2 a 3 **well energised technology centers** to further develop the technology and ensure its accessibility within their regions. - - -## Apendix - - -### The Internet gets disrupted - -Here are four notable incidents where undersea internet cables were cut, along with their impacts just over the last year: - -#### **2024 Red Sea Cable Cuts** - -- **Date**: February 2024 -- **Location**: Red Sea -- **Details**: Multiple submarine cables, including AAE-1, SEACOM, and EIG, were damaged, possibly due to a ship's anchor dragging along the seabed. -- **Impact**: Approximately 25% of internet traffic between Europe, Asia, and the Middle East was affected, leading to downtime and unusable internet for a lot of people. - -#### **2024 Baltic Sea Cable Disruptions** - -- **Date**: November 2024 -- **Location**: Baltic Sea -- **Details**: The BCS East-West Interlink and C-Lion1 submarine cables were severed, with suspicions pointing towards a Chinese-registered vessel, the Yi Peng 3, possibly dragging its anchor. -- **Impact**: Despite the damage, significant redundancy and resilience in Europe's internet infrastructure mitigated major disruptions. - -#### **2025 Taiwan Undersea Cable Incident** - -- **Date**: January 2025 -- **Location**: Northeast of Taiwan -- **Details**: The Chinese-owned vessel Shunxing 39 was suspected of damaging an undersea internet cable by dragging its anchor. -- **Impact**: While services in Taiwan remained mostly uninterrupted due to quick rerouting by Chunghwa Telecom, the incident highlighted vulnerabilities in undersea infrastructure amid geopolitical tensions. - -#### **March 14, 2024: West Africa Cable System (WACS) and Africa Coast to Europe (ACE) Cable Cuts** - -- In 2024, South Africa experienced significant internet disruptions due to undersea cable damages: -- **Cause**: A suspected underwater rockslide off the coast of Côte d'Ivoire damaged multiple submarine cables, including WACS and ACE, or could this have another reason? -- **Impact**: Thirteen African countries, including South Africa, faced degraded services or near-total internet outages. Lots of countries had no or limited internet for up to a week. - -These incidents underscore the vulnerability of undersea cables and the need for geo-aware Internet / AI Capacity in country \ No newline at end of file diff --git a/docs/main/internet_today/gdp_negative.md b/docs/main/internet_today/gdp_negative.md deleted file mode 100644 index 609db2c..0000000 --- a/docs/main/internet_today/gdp_negative.md +++ /dev/null @@ -1,51 +0,0 @@ ---- -title: GDP Negative -sidebar_position: 5 ---- - -# Internet is GDP Negative - -![](img/gdp_negative.png) - - -The concept of "Internet GDP negative" in this context highlights the economic disadvantages countries face when relying heavily on the centralized as located in wealthier nations. - -> **A feasibility study done for Tanzania shows a yearly lost of 10 Billion USD per year.** - -### 1. **Loss of Revenue from Booking Sites** - - Platforms like global booking and e-commerce websites often charge high commission fees, which results in local businesses losing a significant portion of their revenue. - - **Impact:** Instead of money circulating within the local economy, it is extracted and transferred to the countries where these platforms are headquartered. - - For a small country like Zanzibar **the impact of centralized booking sites means a loss of 200m USD per year**. - -### 2. **Loss of Advertising and Marketing Dollars** - - Companies within countries purchase online advertisements primarily on platforms like Google, Facebook, and others. These platforms are headquartered in a handful of nations, meaning most of the advertising revenue flows out. - - **Impact:** Local businesses indirectly fund foreign economies instead of building up domestic digital marketing ecosystems. - -### 3. **Data Dependency** - - User data from most countries is stored and processed in foreign data centers. This creates dependency on a few nations for internet services and data storage. - - **Impact:** The local economy loses the opportunity to benefit from data-driven industries (e.g., AI, analytics). Furthermore, countries become vulnerable to foreign policy changes, data access restrictions, or breaches. - -### 4. **Loss of Autonomy and Influence** - - When internet infrastructure and critical data storage are external, nations lose control over how their citizens’ data is managed and utilized. - - **Impact:** This reduces the ability to enforce regulations, build influence, or compete globally in the digital space. - -### 5. **Infrastructure Costs and Dependency** - - Sea cables and external server access are essential for internet connectivity, but these are often controlled by a few companies or nations. - - **Impact:** Developing countries pay disproportionately for infrastructure access and maintenance without gaining ownership or influence over it. - -### 6. **Economic Leakage** - - Payments for cloud services, digital tools, and other online services are made to companies based overseas. - - **Impact:** Funds that could be used to build local internet ecosystems instead boost the economies of tech giants. - -### 7. **Inability to Drive Local Innovation** - - Centralized control of data and reliance on external internet infrastructure limit opportunities for local startups to thrive. - - **Impact:** Countries lose out on developing their digital economies and creating jobs in the tech industry. - -### 8. **Digital Divide** - - Developing nations often pay more for connectivity while receiving slower or less reliable services compared to developed nations. - - **Impact:** This perpetuates inequality in access to opportunities, education, and innovation. - -These factors combined mean that many nations are effectively "Internet GDP negative"—paying more into the global internet economy than they gain. - - - diff --git a/docs/main/internet_today/img/3layers.png b/docs/main/internet_today/img/3layers.png deleted file mode 100644 index 53a2fc6..0000000 Binary files a/docs/main/internet_today/img/3layers.png and /dev/null differ diff --git a/docs/main/internet_today/img/absurd.png b/docs/main/internet_today/img/absurd.png deleted file mode 100644 index 447731c..0000000 Binary files a/docs/main/internet_today/img/absurd.png and /dev/null differ diff --git a/docs/main/internet_today/img/atomic_race.png b/docs/main/internet_today/img/atomic_race.png deleted file mode 100644 index 7e7779a..0000000 Binary files a/docs/main/internet_today/img/atomic_race.png and /dev/null differ diff --git a/docs/main/internet_today/img/blocked.png b/docs/main/internet_today/img/blocked.png deleted file mode 100644 index 41c7297..0000000 Binary files a/docs/main/internet_today/img/blocked.png and /dev/null differ diff --git a/docs/main/internet_today/img/conclusion.png b/docs/main/internet_today/img/conclusion.png deleted file mode 100644 index 73a65e8..0000000 Binary files a/docs/main/internet_today/img/conclusion.png and /dev/null differ diff --git a/docs/main/internet_today/img/electricity.png b/docs/main/internet_today/img/electricity.png deleted file mode 100644 index 280181d..0000000 Binary files a/docs/main/internet_today/img/electricity.png and /dev/null differ diff --git a/docs/main/internet_today/img/fortune.png b/docs/main/internet_today/img/fortune.png deleted file mode 100644 index 3362663..0000000 Binary files a/docs/main/internet_today/img/fortune.png and /dev/null differ diff --git a/docs/main/internet_today/img/gdp_negative.png b/docs/main/internet_today/img/gdp_negative.png deleted file mode 100644 index b112181..0000000 Binary files a/docs/main/internet_today/img/gdp_negative.png and /dev/null differ diff --git a/docs/main/internet_today/img/internet_cables.png b/docs/main/internet_today/img/internet_cables.png deleted file mode 100644 index e24606c..0000000 Binary files a/docs/main/internet_today/img/internet_cables.png and /dev/null differ diff --git a/docs/main/internet_today/img/problem_overview.png b/docs/main/internet_today/img/problem_overview.png deleted file mode 100644 index 07722ee..0000000 Binary files a/docs/main/internet_today/img/problem_overview.png and /dev/null differ diff --git a/docs/main/internet_today/img/this_is_our_internet.png b/docs/main/internet_today/img/this_is_our_internet.png deleted file mode 100644 index fb99d37..0000000 Binary files a/docs/main/internet_today/img/this_is_our_internet.png and /dev/null differ diff --git a/docs/main/internet_today/img/we_are_doing_it_for_internet.png b/docs/main/internet_today/img/we_are_doing_it_for_internet.png deleted file mode 100644 index 556e94c..0000000 Binary files a/docs/main/internet_today/img/we_are_doing_it_for_internet.png and /dev/null differ diff --git a/docs/main/internet_today/internet_basics.md b/docs/main/internet_today/internet_basics.md deleted file mode 100644 index 6521285..0000000 --- a/docs/main/internet_today/internet_basics.md +++ /dev/null @@ -1,44 +0,0 @@ ---- -title: 'More Than Cables' -sidebar_position: 2 ---- - -# Internet is More Than the Cables - - - -![](img/3layers.png) - -**The Internet is made up of 3 layers:** - -1. Compute, AI & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below). - -2. Network: This is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and, for most countries, very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity. - -3. Applications: Currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable. - -We are providing a more optimized solution for the first 2 layers and allows everyone else to build on top. - -## The Role of Internet Cables - -Digital information mainly travels over large fiber backbone links as pictured below. - -![](img/internet_cables.png) - -The Internet as we know it has significantly diverged from its original intent. For example, if two people in Zanzibar, an Island in Africa, use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted, and back again. - -This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be. - -![](img/absurd.png) - - -## The Role of Datacenters - -![](img/this_is_our_internet.png) - -The internet applications stacks are replicated many times for the various applications we use, each requiring its own full infrastructure. This approach is unsustainable and inefficient. - -## Issues with Autonomy and Autonomy - -Our current internet model compromises autonomy. Most data is stored in large data centers controlled by a few major corporations, effectively turning users into products. - diff --git a/docs/main/introduction.md b/docs/main/introduction.md deleted file mode 100644 index 58064ee..0000000 --- a/docs/main/introduction.md +++ /dev/null @@ -1,50 +0,0 @@ ---- -title: Introduction -sidebar_position: 0 -slug: / ---- - -![](img/web4.png) - - -Welcome to the future of the internet, **Web 4**, a logical evolution that rethinks and reinvents the foundations of how we connect, communicate, and collaborate globally. - -The internet is burdened with inefficiencies, risks, and a growing dependency on centralization. - -**This legacy has left over 50% of the world without decent internet access, widened economic gaps, and exposed critical vulnerabilities.** - -### **The Challenges We Face** - -- **Centralization Risks**: Our digital lives are controlled by a few corporations, compromising autonomy and increasing fragility. -- **Economic Loss of GDP**: The internet has become GDP-negative for many nations, funneling resources out of local economies and into global giants. -- **Outdated Infrastructure**: TCP/IP, the internet's core protocol, was never designed for the complexities of today, leading to inefficiency, security flaws, and waste. -- **Environmental and Economic Inefficiency**: Over 70% of the world relies on distant infrastructure, making access expensive, unreliable, and dependent on fragile global systems. - ---- - -### **Our Vision** - -**Web 4** is not just an alternative; it’s the reinvention of the internet as it was meant to be: local, decentralized, and resilient. - -By addressing core issues and optimizing the internet's foundational layers, we enable: - -1. **Decentralized AI, Compute and Storage**: Bringing autonomy and reliability to your doorstep, eliminating the inefficiencies of centralized data centers. -2. **Smarter Networking**: Keeping data local whenever possible, reducing costs and boosting performance. Invent new algoritms to fix some of the serious issues TCP (the current internet protocol) is facing. -3. **Better Hardware Utilization**: Unlocking the true potential of computing power by eliminating wasteful inefficiencies, this leads to better security and energy usage. - -![](img/evolution.png) - -**Web 4 is here. It’s ready. It's a logical evolution. It’s scalable.** - -> It’s time to restore control, privacy, and equality to the digital age. - ---- - -### **Why It Matters** - - - -This is more than technology, it’s about sovereignty, security, and sustainability. ACI empowers local communities, restores economic balance, and ensures that no one is left behind in our connected world. - -Join us in embracing the internet we all deserve—a resilient, decentralized, and equitable global network. Together, we can ensure a brighter digital future. - diff --git a/docs/main/key_innovations_overview/_category_.json b/docs/main/key_innovations_overview/_category_.json deleted file mode 100644 index 0747940..0000000 --- a/docs/main/key_innovations_overview/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Key Innovations", - "position": 7, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/_category_.json b/docs/main/key_innovations_overview/ai/_category_.json deleted file mode 100644 index ec40f6a..0000000 --- a/docs/main/key_innovations_overview/ai/_category_.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "label": "Geo Aware AI", - "position": 2, - "description":"Geo Aware AI Agent & AI Brain.", - "link": { - "type": "generated-index" - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/ai_agent_how_it_works.md b/docs/main/key_innovations_overview/ai/ai_agent_how_it_works.md deleted file mode 100644 index 0a7ea17..0000000 --- a/docs/main/key_innovations_overview/ai/ai_agent_how_it_works.md +++ /dev/null @@ -1,55 +0,0 @@ ---- -title: AI Agent How It Works -sidebar_position: 2 -hide_title: true ---- - - -## 3AI Geo Aware AI Agent - -![](img/capabilities.png) - -Imagine a world where you are in full control of your digital life—your communications, creativity, transactions, and data all managed seamlessly, securely, and privately. This is the future of the internet, and it’s happening now. - -The traditional internet relies on centralized systems that often compromise privacy, security, and freedom. Every message, every file, every transaction is routed through servers owned by corporations, leaving you with little control over your data. The new internet powered by ThreeFold changes that by decentralizing everything, ensuring you own your digital identity and interactions. - -With this paradigm shift, you can communicate effortlessly with peers through video conferencing or chats while your personal AI manages and organizes conversations. Discovering information becomes easier and faster, tailored to your needs, without fear of data surveillance. Creativity flourishes when you can produce videos, collaborate on documents, and innovate without limitations, all on a secure and private infrastructure. - -Developers and innovators can create and deploy applications at unprecedented speeds, leveraging decentralized storage and networking for unparalleled performance. Sharing becomes frictionless—publish data, files, and videos directly without centralized servers dictating what, where, and how you share. Transactions, once cumbersome and insecure, now happen in seconds, safeguarded by a decentralized framework that ensures trust and transparency. - -This matters because it puts the internet back into the hands of people. It is the internet designed for individuals, not corporations. Decentralization guarantees that your data, privacy, and freedom are no longer commodities but rights. This is not just an evolution; it’s a revolution in how we live, work, and connect—a future where you are truly in charge. - -> Note: the 3AI Agent is also called the 3AI in some pictures. - - -## How it Works - -![](img/3ai_overview.png) - -This system seamlessly integrates with your existing devices by leveraging standard Web 2 and Web 3 protocols, ensuring compatibility across phones, laptops, desktops, and other devices without requiring specialized hardware or proprietary systems. - -- **Personal AI Hosted on Autonomous Infrastructure**: Your **3AI** can be hosted on a secure **3Cloud** or **3Phone**, ensuring your contextual data—like your calendar, email, and contacts—is stored securely and privately. This means your data remains under your control, regardless of the device you're using. - -- **Access From Any Device**: Whether you're working on a laptop, another phone, or a desktop, you can connect to your personal AI seamlessly. It bridges the gap between devices, making transitions effortless while maintaining privacy and security. - -- **Standard Protocols for Universality**: By using widely adopted Web 2 and Web 3 protocols, the system ensures interoperability with all modern devices and applications. There's no need to overhaul your existing workflows or technology. - -- **Secure and Flexible Work Environment**: For enterprises, governments, or individuals, the system provides a **quantum-safe working environment**. This ensures sensitive information is protected while enabling seamless access across different devices. - -This integration brings convenience, security, and privacy together, empowering users to work, communicate, and manage their lives without sacrificing compatibility or ease of use. - -### 3AI: Autonomous AI Agents for a Secure and Convenient Future - -![](img/ai_agent.png) - -3AI agents represent a new paradigm where personal autonomy meets cutting-edge AI capabilities. These agents are designed to work on your behalf, ensuring your data remains secure while making your life more efficient and manageable. - -All Heros are connected to geo aware autonomous or centralized AI models but operate in a secure way that gives you full control over your data. You decide what information is shared or exposed, maintaining complete ownership of your digital life. - -3AI enhances convenience with features like conversational interfaces, automating repetitive tasks, transcribing meetings, and helping you find information faster. By managing the "boring side" of your digital interactions, these agents free up your time for more meaningful activities. - -Depending on the task, your 3AI can intelligently select the most appropriate AI model to work with, ensuring efficiency and relevance. Most of the processing happens locally on your 3Phone or other secure devices, reducing reliance on external systems and protecting your privacy. - -3AI agents also enable the creation of **autonomous knowledge networks**, where individuals and organizations collaborate securely and independently of centralized control. These networks allow data and knowledge to flow freely without compromising privacy or autonomy. - -By serving as your interface to large language models and other AI systems, 3AI ensures your digital interactions are secure, efficient, and aligned with your needs. This represents a future where technology works for you, on your terms, with the highest level of security and convenience. diff --git a/docs/main/key_innovations_overview/ai/ai_agent_intro.md b/docs/main/key_innovations_overview/ai/ai_agent_intro.md deleted file mode 100644 index 828c4ef..0000000 --- a/docs/main/key_innovations_overview/ai/ai_agent_intro.md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: 'AI Agent intro.' -sidebar_position: 1 ---- - -# Geo Aware Autonomous AI Agent - -![](img/ai_agent.png) - -> Ask us for more information, the result of +10 years of research. - -Our technology is unique: - -- Integrated personal blockchain with offline support (can even run on phone). -- Revolutionary backend database called OSIS with structured record (+10,000 records per second on a phone). -- Unbreakable network & data storage layer integration (in the phone and cloud). -- Easy to use very powerful development language with +30,000 github stars. -- Development 10x less time required compared to alternative web3 mechanisms. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/blockchain.md b/docs/main/key_innovations_overview/ai/blockchain.md deleted file mode 100644 index 8e9fe66..0000000 --- a/docs/main/key_innovations_overview/ai/blockchain.md +++ /dev/null @@ -1,19 +0,0 @@ ---- -title: Blockchain -sidebar_position: 4 -hide_title: true ---- - - -## 3AI and Blockchain - -![](img/ai_ai.png) - - -3AI introduces **RecordChain**, a personal private ledger that ensures all your data and transactions remain secure, decentralized, and under your control. Each 3AI agent maintains its own blockchain, acting as a **personal ledger** that protects your data on devices like the 3Phone. - -The system enables seamless communication across **peer-to-peer networks**, allowing 3AI agents to exchange information securely without relying on centralized intermediaries. This design supports both **private blockchains**, such as those used by enterprises or governments, and **public blockchains** within the broader Web3 ecosystem. - -Your 3AI agent automates and streamlines business processes by integrating with the necessary blockchains. Whether it's managing enterprise tasks, facilitating transactions, or interacting with decentralized applications, 3AI ensures efficient and secure operations across all layers. - -This interconnected yet decentralized setup allows individuals and organizations to automate repetitive tasks, conduct business securely, and maintain autonomy over their data. By bridging private, public, and personal blockchain networks, 3AI creates a future where technology simplifies life while enhancing privacy and trust. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/data.md b/docs/main/key_innovations_overview/ai/data.md deleted file mode 100644 index 7e34a6c..0000000 --- a/docs/main/key_innovations_overview/ai/data.md +++ /dev/null @@ -1,35 +0,0 @@ ---- -title: Data Layer -sidebar_position: 5 -hide_title: true ---- - -## 3AI and Data - - -![](img/ai_data.png) - - -### Your Data: Secure, Uncorrupted, and Always Accessible - -The ThreeFold system ensures that your data can never be lost, corrupted, or hacked by leveraging **Zero Knowledge Quantum Safe Encoding** and a **unique dispersal algorithm**. Here’s how it works: - -#### **1. Geo Aware and Distributed Data Storage** -- **Data Location Control**: Through your 3AI, you decide where your data is stored. This means your data can be distributed across multiple geographically relevant locations, ensuring proximity and compliance with regional data autonomy laws. -- **Dispersal Algorithm**: Your data is fragmented into smaller pieces, encoded, and distributed across multiple independent storage nodes (3Nodes). These pieces are stored in a way that no single node—or even a group of nodes—can reconstruct the data. - -#### **2. Quantum-Safe Security** -- **Zero Knowledge Encoding**: The dispersal algorithm is quantum-safe, meaning it is resistant to even the most advanced hacking technologies, including quantum computing. Without access to the complete set of fragments and the encryption key, your data is unreadable. - -#### **3. Exclusive Access via 3AI** -- **Controlled by Your 3AI**: Only your 3AI has the cryptographic keys and protocols to reassemble and decrypt the data. No third party, not even the nodes storing the fragments, can access your data. -- **Peer-to-Peer Security**: When your 3AI needs to retrieve data, it securely communicates with the storage nodes to reconstruct it without exposing any sensitive information. - -#### **4. Data Redundancy and Fault Tolerance** -- **Resilience Against Failures**: The system is designed to maintain multiple copies of data fragments across geographically dispersed nodes. If a node goes offline or fails, the remaining fragments ensure uninterrupted access to your data. -- **Immutable and Unhackable**: Since no complete dataset resides on any single node, and all fragments are quantum-encrypted, your data is immune to tampering or unauthorized access. - -#### **5. You Always Stay in Control** -- Your 3AI is the sole gatekeeper for your data. With it, you can choose the level of redundancy, control data retention, and ensure your information aligns with your needs while staying completely private. - -In this architecture, your data is geo aware, secure, and accessible only to you. No centralized server or third-party authority can compromise your information, making it future-proof and reliable for all your digital interactions. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/img/3ai_overview.png b/docs/main/key_innovations_overview/ai/img/3ai_overview.png deleted file mode 100644 index 7fedfde..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/3ai_overview.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/ai_agent.png b/docs/main/key_innovations_overview/ai/img/ai_agent.png deleted file mode 100644 index 4b41037..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/ai_agent.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/ai_agent0.png b/docs/main/key_innovations_overview/ai/img/ai_agent0.png deleted file mode 100644 index 125be2e..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/ai_agent0.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/ai_ai.png b/docs/main/key_innovations_overview/ai/img/ai_ai.png deleted file mode 100644 index 0619458..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/ai_ai.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/ai_data.png b/docs/main/key_innovations_overview/ai/img/ai_data.png deleted file mode 100644 index c0f254a..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/ai_data.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/ai_network.png b/docs/main/key_innovations_overview/ai/img/ai_network.png deleted file mode 100644 index 01abe93..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/ai_network.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/capabilities.png b/docs/main/key_innovations_overview/ai/img/capabilities.png deleted file mode 100644 index be33a69..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/capabilities.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/img/phone.png b/docs/main/key_innovations_overview/ai/img/phone.png deleted file mode 100644 index 9fe89ee..0000000 Binary files a/docs/main/key_innovations_overview/ai/img/phone.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/ai/network.md b/docs/main/key_innovations_overview/ai/network.md deleted file mode 100644 index 536262d..0000000 --- a/docs/main/key_innovations_overview/ai/network.md +++ /dev/null @@ -1,41 +0,0 @@ ---- -title: Network Layer -sidebar_position: 6 -hide_title: true ---- - -## 3AI and Network - -![](img/ai_network.png) - -### Mycelium Network: An Unbreakable and Adaptive System - -The Mycelium Network ensures an unbreakable connection between all **3AI agents** through its highly resilient and intelligent design. Here’s how it works: - -#### **1. End-to-End Encryption and Unique Addresses** -- Every **3AI agent** has a **unique private network address**, ensuring that all data exchanges are highly secure and completely isolated from unauthorized access. -- All communications are **end-to-end encrypted**, providing quantum-safe security against even the most advanced threats. - -#### **2. Multi-Path Connectivity** -- The Mycelium Network operates over a variety of connection types, including **5G, Wi-Fi, fiber internet, and satellite links**. This redundancy guarantees that even if one type of connection fails, others can maintain uninterrupted service. - -#### **3. Dynamic Path Optimization** -- The network continuously **reroutes itself**, always seeking the shortest and most efficient path between two **3AI agents**. This intelligent routing minimizes latency and optimizes performance in real time. - -#### **4. Fault Tolerance and Self-Healing** -- If a node or connection becomes unavailable, the network automatically finds alternative paths, ensuring no single point of failure. This **self-healing capability** makes the system virtually unbreakable. - -#### **5. Context-Aware Networking** -- The system adapts based on the context of the communication, prioritizing the fastest and most secure route for critical data while balancing efficiency for less sensitive tasks. - -#### **6. Decentralized Infrastructure** -- The decentralized architecture of the Mycelium Network means no central authority or server can disrupt or control the system. Every node contributes to the network’s resilience and ensures uninterrupted connectivity. - ---- - -### **Why It’s Unbreakable** -- **Redundant Paths**: With connections spanning multiple technologies (5G, fiber, satellite, Wi-Fi), there’s always an available route. -- **Self-Healing Mechanisms**: The network instantly adjusts to outages, ensuring constant availability. -- **Decentralized Design**: No single point of failure ensures resilience against attacks or failures. - -This design creates an adaptive and resilient network that not only keeps your data safe but also guarantees uninterrupted and efficient communication. The Mycelium Network is the backbone of a new era of connectivity, prioritizing speed, security, and reliability for all users. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/phone.md b/docs/main/key_innovations_overview/ai/phone.md deleted file mode 100644 index ad8d803..0000000 --- a/docs/main/key_innovations_overview/ai/phone.md +++ /dev/null @@ -1,61 +0,0 @@ ---- -title: Phone -sidebar_position: 7 -hide_title: true ---- - -## 3AI on a Phone - -![](img/phone.png) - -### A Phone as the Heart of Your Decentralized Digital Life - -This phone is not just a communication device—it is a **personal gateway to your decentralized digital ecosystem**, seamlessly integrating all the components of **3AI**, the **Mycelium Network**, and the secure infrastructure discussed above. Here’s how it brings everything together: - ---- - -#### **1. Hosting Your Personal 3AI** -- **Your Personal Assistant**: The phone hosts **3AI**, your always-available digital agent. It manages tasks like communication, scheduling, searching, secure transactions, and more, acting as your digital representative. -- **Privacy by Design**: All data processed by 3AI remains on your device or within your **autonomous storage network** (e.g., 3Cloud or decentralized nodes), ensuring no external access to your sensitive information. - ---- - -#### **2. Powered by Mycelium Network** -- **Unbreakable Connectivity**: The phone is seamlessly connected to the **Mycelium Network**, enabling peer-to-peer communication over Wi-Fi, 5G, satellite, or fiber. The network dynamically routes traffic, ensuring the shortest and most secure path to other devices and nodes. -- **Decentralized Infrastructure**: It does not rely on centralized servers for operations. Instead, it leverages the global ThreeFold Grid, enabling unmatched security and resilience for communication and data exchange. - ---- - -#### **3. A Quantum-Safe Environment** -- **Data Encryption**: The phone integrates with the **Zero Knowledge Quantum-Safe Encoder**, protecting all communications and data exchanges with quantum-resistant encryption. -- **Dispersed Data**: Your data is encoded, fragmented, and stored across multiple nodes. Only your phone, via 3AI, can retrieve and reconstruct it. - ---- - -#### **4. Hosting Personal Blockchain (RecordChain)** -- **Private Ledger**: Your phone hosts your personal blockchain, known as **RecordChain**, which logs all important actions and transactions securely. This ensures complete transparency and traceability, under your control. -- **Interoperability**: The phone’s RecordChain integrates with both private blockchains (e.g., enterprise systems) and public Web3 blockchains for seamless interaction across ecosystems. - ---- - -#### **5. Fully Functional for Business and Personal Use** -- **Unified Ecosystem**: Whether for personal or enterprise use, the phone becomes the control center for communication, data, and transactions. It automates mundane tasks, helps you collaborate securely, and simplifies digital workflows. -- **Ready for Web3**: With native blockchain compatibility and decentralized app support, the phone is a powerful tool for navigating and contributing to the Web3 world. - ---- - -#### **6. Geo-Aware and Decentralized** -- **Local Storage Decisions**: The phone allows you to decide where your data is stored geographically, aligning with local regulations or personal preferences for faster access. -- **Self-Sufficient**: Even without internet connectivity, the phone communicates and performs tasks via the Mycelium Network, ensuring uninterrupted functionality. - ---- - -### **A Revolution in Digital Autonomy** -This phone is the backbone of your decentralized life. It combines: -- **3AI** as your personal agent and manager. -- **Mycelium Network** for unbreakable, adaptive connectivity. -- **RecordChain** for secure and private blockchain integration. -- **Quantum-Safe Encoding** for unhackable data protection. -- **Geo-Aware Data Management** for ultimate control. - -It’s not just a phone—it’s your digital companion, your decentralized workstation, and the hub of a new, autonomous internet. This is the future, now in your hands. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/ai/roadmap.md b/docs/main/key_innovations_overview/ai/roadmap.md deleted file mode 100644 index 999cb2a..0000000 --- a/docs/main/key_innovations_overview/ai/roadmap.md +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: Roadmap -sidebar_position: 10 -hide_title: true ---- - -# Roadmap for Full Deployment - -## **2025 Q2: Version 0.9 (Alpha)** - -- **3AI**: your personal AI Agent - - Chat, Files, Calendar, Contacts, Meetings, Search ... -- **Core Infrastructure**: - - Establish connection to the **Mycelium Network** for basic peer-to-peer connectivity (Wi-Fi, 5G, satellite). - - Enable **end-to-end encryption** for all communication. -- **Data Autonomy**: - - Deploy **Zero Knowledge Quantum-Safe Encoding** for secure local storage. - - Basic integration with **3Cloud** for optional decentralized storage. -- **Quantum-Safe Data Management**: - - Ensure all user data is securely stored using the **quantum-safe dispersal algorithm** across global 3Nodes. -- **Phone Launch** (optional): - - Deliver the first batch of phones with essential functionality and hardware. - - Integrated **3AI** running on Phone as well as in Cloud - ---- - -## **2025 Q3: Feature Expansion and Usability Improvements (Beta)** -- **Enhanced 3AI Functionality**: - - Expand 3AI’s capabilities to include meeting transcription, advanced task automation, and customizable workflows. - - Improve conversational interfaces for better natural language understanding. -- **Decentralized Connectivity**: - - Full rollout of **Mycelium Network** for seamless multi-path connectivity across Wi-Fi, 5G, fiber, and satellite. - - Introduce **dynamic rerouting** for optimal speed and efficiency. -- **RecordChain Activation**: - - Enable personal blockchain functionality for secure logging and auditing of activities. - - Integrate with select private and public blockchains for Web3 applications. -- **Data Control**: - - Introduce **geo aware storage controls**, allowing users to select storage locations across regions. -- **Web3 Integration**: - - Seamless interaction with public blockchains for decentralized finance (DeFi), NFT management, and Web3 apps. - ---- - -## **2025 Q4: Enterprise and Business Use Cases** -- **Enterprise Integration**: - - Provide support for enterprise-level applications, including private blockchain solutions. - - Enable secure access to government and corporate systems via **3AI**. -- **Business Automation**: - - Expand 3AI’s automation capabilities to handle business transactions, reporting, and operational workflows. -- **Decentralized Collaboration**: - - Launch tools for real-time collaboration on documents, videos, and projects within the decentralized infrastructure. -- **Advanced Privacy Tools**: - - Roll out advanced **peer-to-peer secure file sharing** and messaging tools. - ---- - -## **2026 Q1: Full Ecosystem Rollout** -- **Mass Production**: - - Scale up phone production with stable software, targeting a wider audience. -- **3AI Autonomous Network**: - - Fully operationalize 3AI as a autonomous AI assistant with unmatched privacy and interoperability. - -- **Decntralized Knowledge Networks**: - - Enable collaboration and data sharing between users and enterprises without central control. - ---- - -## **2026 Q2: Global Adoption and Continuous Innovation** -- **Global Availability**: - - Expand phone delivery to more regions with localized features. -- **Network State Deployment**: - - Provide tools for organizations and nations to deploy their own decentralized networks. -- **AI Personalization**: - - Develop deeper customization for **3AI**, adapting to individual or organizational needs. -- **Full Decentralization**: - - Ensure all systems operate without reliance on centralized servers, completing the transition to a decentralized digital ecosystem. - diff --git a/docs/main/key_innovations_overview/cloud/_category_.json b/docs/main/key_innovations_overview/cloud/_category_.json deleted file mode 100644 index 6b966b1..0000000 --- a/docs/main/key_innovations_overview/cloud/_category_.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "label": "Geo Aware Cloud", - "position": 2, - "description":"Geo Aware, Self Healing, Decentralized, Secure.", - "link": { - "type": "generated-index" - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/compute/_category_.json b/docs/main/key_innovations_overview/cloud/compute/_category_.json deleted file mode 100644 index 3a9b939..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Compute", - "position": 5, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/compute/cloud.md b/docs/main/key_innovations_overview/cloud/compute/cloud.md deleted file mode 100644 index d089313..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/cloud.md +++ /dev/null @@ -1,45 +0,0 @@ ---- -title: Geo Aware Cloud -sidebar_position: 3 ---- - - -## Capacity Generator - -Zero OS can be conceived as a generator for compute, storage, network capacity. - -### Compute Features - -- ZKube - - Kubernetes deployment -- Zero VM - - The container or virtual machine running inside ZOS -- CoreX - - Process manager (optional), can be used to get remote access to your zero_vm - -A 3Node is a Zero-OS enabled computer which is hosted with any of the Cloud Providers. - -### Storage Mechanisms - -There are 4 storage mechanisms which can be used to store your data - -- ZOS Filesystem - - This is our dedupe unique filesystem, replaces docker images. -- ZOS Mount - - This is a mounted disk location on SSD, this can be used as faster storage location. -- Quantum Safe Filesystem - - This is a super unique storage system, data can never be lost or corrupted. Please be reminded that this storage layer is only meant to be used for secondary storage applications. -- ZOS Disk - - A virtual disk technology, only for TFTech OEM partners. - -### Network Connections - -There are three ways how networks can be connected to a Z-Machine. - -- Mycelium = Planetary network - - This is a planetary scalable network - - We have clients for Windows, OSx, Android and iPhone. -- ZOS NIC - - Connection to a public IP address. -- WEB GW - - Web gateway, a secure way to allow internet traffic reach your secure Z-Machine. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/compute/compute_compare.md b/docs/main/key_innovations_overview/cloud/compute/compute_compare.md deleted file mode 100644 index 82f9e3b..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/compute_compare.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -title: 'Compare' -sidebar_position: 30 -description: The computer layer compared. ---- - - -| | Zos Compute Layer Benefits | Default | -|----------------|--------------------------------------------------------------------------------|------------------------------------------------------------------| -| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized e.g. Kubernetes, etc. | -| OS Deploy | Stateless, there are no files copied on local HDD/SSD. | Deploy image or execute installer on a physical server | -| OS Upgrade | Seamless, rolling upgrades, 100% modular and pre-deterministic, decentralized | Difficult and error prone + vulnerable from security perspective | -| Tamperproof | If file gets modified Zero-OS will not boot the file. | No, man in middle is possible. | -| Scalability | To the world | Expensive and depending on lots of capital | -| Security | A lot of effort went into the capability to deploy for high security usecases. | Very hard to deploy securely, and expensive | -| Green | For certain workloads we can safe upto 10x on power usage | Super power hungry. | -| Liquid Cooling | Easy to do because of autonomous behavior no need to replace HW. | Hard to do, how to do maintenance. | -| Autonomous | Yes | Mostly not. | -| Complexity | Anyone can do it, we made it to allow everyone to be a provider. | Real experts needed. | - -> We do not compare our system with those that claim to be full cloud solutions but merely deploy containers using other management systems and optionally connect to a blockchain for billing purposes, nor do we compare our system with marketplace systems that simply act as frontends for other systems. We believe these systems, while visually impressive, lack substantial technological foundations and cannot serve as a fundamental base layer for others. - diff --git a/docs/main/key_innovations_overview/cloud/compute/energy_efficient.md b/docs/main/key_innovations_overview/cloud/compute/energy_efficient.md deleted file mode 100644 index 4a2e434..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/energy_efficient.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -sidebar_position: 50 ---- - -# Energy Efficient - -Below are some of the ways in which we achieve energy efficiency as compared to traditional models. - -![](img/energy_efficiency.png) - -In addition, a decentralized peer-to-peer infrastructure which finds the shortest path between end points is by nature energy-efficient. Data needs to travel a much shorter distance. - -> Depending on the use case the our approach can lead to 10x energy savings. - diff --git a/docs/main/key_innovations_overview/cloud/compute/for_everyone.md b/docs/main/key_innovations_overview/cloud/compute/for_everyone.md deleted file mode 100644 index 0105e1f..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/for_everyone.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: 'For Everyone' -sidebar_position: 2 -description: 'Everyone can build on top of the ThreeFold new internet' -# hide_title: true ---- - -## Zero-OS is Easy to Deploy - -![](img/zos_simple.png) - -## Everyone Can Build - -![](img/for_everyone.png) \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/compute/img/deterministic.png b/docs/main/key_innovations_overview/cloud/compute/img/deterministic.png deleted file mode 100644 index 5ed1693..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/deterministic.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/img/energy_efficiency.png b/docs/main/key_innovations_overview/cloud/compute/img/energy_efficiency.png deleted file mode 100644 index f2af509..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/energy_efficiency.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/img/for_everyone.png b/docs/main/key_innovations_overview/cloud/compute/img/for_everyone.png deleted file mode 100644 index 6ac85b7..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/for_everyone.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/img/smart_contract_it.png b/docs/main/key_innovations_overview/cloud/compute/img/smart_contract_it.png deleted file mode 100644 index 45cf860..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/smart_contract_it.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/img/superhub.png b/docs/main/key_innovations_overview/cloud/compute/img/superhub.png deleted file mode 100644 index b22dcad..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/superhub.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/img/zos_intro.png b/docs/main/key_innovations_overview/cloud/compute/img/zos_intro.png deleted file mode 100644 index 3a6f164..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/zos_intro.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/img/zos_simple.png b/docs/main/key_innovations_overview/cloud/compute/img/zos_simple.png deleted file mode 100644 index 940ef97..0000000 Binary files a/docs/main/key_innovations_overview/cloud/compute/img/zos_simple.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/compute/super_hub.md b/docs/main/key_innovations_overview/cloud/compute/super_hub.md deleted file mode 100644 index 46d2bc9..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/super_hub.md +++ /dev/null @@ -1,16 +0,0 @@ ---- -title: 'Super HUB' -sidebar_position: 20 -description: 'Ultra scalable architecture.' -hide_title: true ---- - - -## Superhub Architecture - - -![](img/superhub.png) - - - - diff --git a/docs/main/key_innovations_overview/cloud/compute/zero_deploy_inno.md b/docs/main/key_innovations_overview/cloud/compute/zero_deploy_inno.md deleted file mode 100644 index 3ba4c4e..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/zero_deploy_inno.md +++ /dev/null @@ -1,50 +0,0 @@ ---- -title: Deterministic Deploy -sidebar_position: 5 -hide_title: true ---- - -# Deterministic Deployment - - -![](img/deterministic.png) - - - - -The concept of Zero-Deploy is a key component of the **Smart Contract for IT** framework, which can be applied to any type of workload—whether it's containers, virtual machines (VMs), network gateways, volumes, Kubernetes resources, or other network elements. This framework serves as a formal agreement between a farmer (provider) and a user regarding the deployment of an IT workload. - -### Process - -1. **Build Your Code** -2. - Develop and prepare your application (AI agents, web 2, web 3) code. - -3. **Convert to Zero-Image** - - Use a CI/CD solution to convert your Docker build (or other format) into a Zero-Image format. The 3Bot will do this on behalf of the user in the future. - -4. **Define the Workload** - - Specify all the details of your workload, including network bridges, web gateways, required machines, and more. - -5. **Register and Sign** - - Register the workload and sign it with your private key. - -6. **Automatic Detection** - All necessary Zero-OS nodes (our infrastructure) will detect that a new workload needs to be deployed. - -7. **Deployment Process** - The nodes will pull down the formal workload descriptions and initiate the deployment process. - -8. **Validation** - Every step of the deployment is verified by Zero-OS (ZOS) to ensure that the intended result is accurately replicated. If any discrepancies are detected, ZOS will halt the deployment and provide an error message. - -### Benefits - -- **Deterministic Deployment**: There is no dynamic behavior during deployment at runtime, ensuring a consistent and predictable outcome. -- **Strict Compliance**: No process can start unless all files and configurations are fully described at the flist level. - - - diff --git a/docs/main/key_innovations_overview/cloud/compute/zero_image_inno.md b/docs/main/key_innovations_overview/cloud/compute/zero_image_inno.md deleted file mode 100644 index a73cb56..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/zero_image_inno.md +++ /dev/null @@ -1,40 +0,0 @@ ---- -title: Zero-Images -sidebar_position: 3 ---- - -![](../../../img/zos_images.jpg) - - -### The Problem - -The current method of deploying workloads in the cloud using Docker containers and virtual machine images has inherent issues. These images consume significant storage space, result in slow and bandwidth-intensive transfers to the internet's edge, drive up costs, introduce complexity, and pose security risks due to difficulties in tracking their contents over time. - -For instance, a complete Ubuntu image can easily be 2 GB in size, comprising millions of files. In contrast, the Flist (metadata for Zero-Image) for a full Ubuntu image is less than 2 MB (1000 times smaller). Based on this flist only the required files will be dowbloaded which can easily be 10x less compared to the original image size. These downloaded files (or subparts of files) are identified by a fingerprint (hash) and will only boot once authenticity can be verified. - - -### Process - -- Zero-OS or the Zero-Image Command Line (works on linux) gets informed to provision a virtual filesystem based on a Zero-Image URL. -- The Zero-Image Metadata is stored on e.g. an S3 Server or our Zero-Hub. - - -### Introducing Flist - -A new image format that separates the image data (comprising files and subfile parts) from the metadata describing the image structure. - -An Flist's format uniquely encompasses comprehensive file descriptions along with all relevant metadata such as size, modification and creation timestamps, and POSIX attributes. Additionally, it incorporates a fingerprint for each component, ensuring deterministic behavior—a crucial feature for security focused use cases. - -Flists provide the flexibility to manage metadata and data as separate entities, offering a versatile approach to handling various build and delivery scenarios. - -### The Benefits - -- **Rapid deployment:** Zero-OS enables containers and virtual machines to launch up to 100 times faster, especially in decentralized scenarios. -- **Enhanced security:** Zero-OS prevents tampering with images, ensuring higher security levels. -- **Reduced storage and bandwidth:** Zero-OS significantly reduces storage and bandwidth requirements, potentially achieving up to a 100-fold improvement. -- **Deterministic deployments:** engineers can precisely define deployments beforehand, ensuring predictable outcomes without changes during deployment. -- **100% compatible:** with existing standards, docker and virtual machines. The same format is useful for VM's as well as any container technology. - -### Status - -Usable for years, [see Zero-OS](./zos_compute.md) for more information. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/compute/zero_install_inno.md b/docs/main/key_innovations_overview/cloud/compute/zero_install_inno.md deleted file mode 100644 index 985707f..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/zero_install_inno.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -title: Zero-Install -sidebar_position: 4 ---- - -![](../../../img/boot.png) - -The Zero-OS is delivered to the 3Nodes over the internet network (network boot) and does not need to be installed. - - -### 3Node Install - -1. Deploy a computer. -2. Configure a farm on the TFGrid explorer. -3. Download the bootloader and put on a USB stick or configure a network boot device. -4. Power on the computer and connect to the internet. -5. Boot! The computer will automatically download the components of the operating system (Zero-OS). - -The actual bootloader is very small, it brings up the network interface of your computer and queries TFGrid for the remainder of the boot files needed. - -The operating system is not installed on any local storage medium (hard disk, ssd), Zero-OS is stateless. - -The mechanism to allow this to work in a safe and efficient manner is an innovation called our container virtual filesystem. - -### Process - -- Optionally: Configure booting from secure BIOS. -- Optionally: Install signing certificate in the BIOS, to make sure that only the right bootloader can be started. -- The bootloader (ISO, PXE, USB, etc.) gets downloaded from the internet (TFGrid CDN or private deployment). -- Core-0 (the first boot process) starts and self verification happens. -- The metadata for the the required software modules is downloaded and checked against signature and hashes . -- The core-0 zero image service starts. diff --git a/docs/main/key_innovations_overview/cloud/compute/zos_compute.md b/docs/main/key_innovations_overview/cloud/compute/zos_compute.md deleted file mode 100644 index ce0fca4..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/zos_compute.md +++ /dev/null @@ -1,66 +0,0 @@ ---- -title: 'ZOS - Geo Aware OS' -sidebar_position: 1 -description: The computer layer -hide_title: true ---- - -![](img/zos_intro.png) - -# ZOS - Geo Aware OS - -ThreeFold has developed its own operating system, Zero-OS, which is based on the Linux Kernel. The purpose of Zero-OS is to strip away the unnecessary complexities commonly found in contemporary operating systems. - - -## Imagine An Operating System With The Following Benefits - -- Up to 10x more efficient for certain workloads (e.g. storage) -- No install required -- All files are deduped for the VM's, containers and the ZOS itself, no more data duplicated filesystems -- The hacking footprint is very small which leads to much safer systems - - Every file is fingerprinted and gets checked at launch time of an application - - There is no shell or server interface on the operating system - - The networks are end2end encrypted between all Nodes -- It is possible to completely disconnect the compute/storage from the network service part which means hackers have a lot less chance to access the data -- A smart contract for the IT layer allows groups of people to deploy IT workloads with consensus and full control -- All workloads which can run on linux can run on Zero-OS but in a much more controlled, private and safe way - -> We have created an operating system from scratch. We used the Linux kernel and its components and then built further on it. We have been able to achieve all of the above benefits. - -## Requirements - -- **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators. -- **Simplicity**: An operating system should be simple, able to exist anywhere for anyone, and be good for the planet. -- **Stateless**: In a grid (peer-to-peer) set up, the sum of the components provides a stable basis for single elements to fail and not bring the whole system down. Therefore, it is necessary for single elements to be stateless, and the state needs to be stored within the grid. - - - -## Key Features of Zero-OS - -Zero-OS is designed with minimalism in mind, supporting only a few fundamental primitives that handle essential low-level functions: - -1. **Storage Capacity** -2. **Compute Capacity** -3. **Network Capacity** - -Default features: - -- Compatible with Docker -- Compatible with any VM (Virtual Machine) -- Compatible with any Linux workload -- Integrated unique storage & network primitives -- Integrated smart contract for IT layer - -## Benefits - -- No need to work with images, we work with our unique ZOS filesystem -- Every container runs in a dedicated virtual machine providing more security -- The containers talk to each other over a private network (Mycelium) -- The containers can use a web gateway to allow internet users to connect to the applications which are running in their secure containers -- Can use core-x to manage the workload - -**Security and Simplicity:** - -Zero-OS provides a Autonomous Decentralized Cloud. - -This not only blocks hacker access but also eliminates human error, enhancing both security and reliability. diff --git a/docs/main/key_innovations_overview/cloud/compute/zos_contract_for_it.md b/docs/main/key_innovations_overview/cloud/compute/zos_contract_for_it.md deleted file mode 100644 index 86ebe57..0000000 --- a/docs/main/key_innovations_overview/cloud/compute/zos_contract_for_it.md +++ /dev/null @@ -1,35 +0,0 @@ ---- -title: 'Smart Contract for IT' -sidebar_position: 3 -description: 'How smart contract tech can be used to deploy IT workloads.' -hide_title: true ---- - - -## Deployment of Workloads Using Secure Smart IT Contracts - - -![](img/smart_contract_it.png) - - - -Workloads can be deployed through a secure and decentralized system enabled by **smart IT contracts**. - - -These contracts ensure the following: - -1. **Multi-Signature Authorization** - Before a workload is deployed, multiple authorized individuals must sign off on the deployment contract. This ensures a consensus-driven process, adding a layer of security and accountability. No single individual has unilateral control over the process. - -2. **Immutable and Autonomous Deployment** - Once the deployment is signed and approved, the workload is executed as defined in the smart IT contract. The system ensures that: - - No party, including the signers, can alter the deployed workload or access the stored data. - - The deployment process is verified, authenticated, and recorded immutably on the blockchain, guaranteeing transparency and trust. - -3. **Managed by Virtual Administrators (3BOTs)** - The workloads can optionally be autonomously managed by virtual administrators, known as **3BOTs**. These bots operate as trustworthy system administrators and ensure the deployed solution adheres strictly to the agreed-upon parameters. - -4. **Registered on a Decentralized Geo-Aware Ledger** - Once the contract is finalized and deployment occurs, the details are permanently registered in the **TFChain blockchain**, providing an immutable record of the transaction. This further enhances security and transparency. - -By leveraging these mechanisms, the system ensures that IT workloads are deployed securely, remain tamper-proof, and operate in a decentralized, autonomous manner. This approach eliminates risks of unauthorized changes and protects the integrity of deployed solutions. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/network/_category_.json b/docs/main/key_innovations_overview/cloud/network/_category_.json deleted file mode 100644 index 101861d..0000000 --- a/docs/main/key_innovations_overview/cloud/network/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Network", - "position": 6, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/network/compare.md b/docs/main/key_innovations_overview/cloud/network/compare.md deleted file mode 100644 index bdaf614..0000000 --- a/docs/main/key_innovations_overview/cloud/network/compare.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -title: Compare -sidebar_position: 20 ---- - - -| | ThreeFold Network Layer | Other Overlay Network Technologies (like VPN) | -|-----------------------------|-----------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------| -| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized leading to security issues | -| Locality | Find shortest path on latency and quality, this allows traffic to stay autonomous. | NO, based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. | -| Encryption | End2End ecryption, unique for every relation, linked to private key | Normally based on key exchange, or pre-shared keys. | -| Post Quantum | Possible (ask us) | No | -| Scalability | Our aim is to be planetary scalable, but we need more exposure. | Bad | -| Compatibility | We aim to support mobile, desktop, IOT, ... | Depends, often not | -| Backdoors | NO, all is based on opensource | Often, yes, unfortunately. | -| Performance | Quite good, 1 gbit / sec can be achieved on std node (which is high for overlay) | Often slow. | -| Security Model | Whitelist model | Blacklist model, list who is bad e.g. firewalls | -| Fully integrated in compute | Yes | Lots of different solutions | - - diff --git a/docs/main/key_innovations_overview/cloud/network/img/how_network.png b/docs/main/key_innovations_overview/cloud/network/img/how_network.png deleted file mode 100644 index 442df54..0000000 Binary files a/docs/main/key_innovations_overview/cloud/network/img/how_network.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/network/img/how_router_network.png b/docs/main/key_innovations_overview/cloud/network/img/how_router_network.png deleted file mode 100644 index 316a57d..0000000 Binary files a/docs/main/key_innovations_overview/cloud/network/img/how_router_network.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/network/img/mycelium_overview.png b/docs/main/key_innovations_overview/cloud/network/img/mycelium_overview.png deleted file mode 100644 index 369ecdd..0000000 Binary files a/docs/main/key_innovations_overview/cloud/network/img/mycelium_overview.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/network/mycelium.md b/docs/main/key_innovations_overview/cloud/network/mycelium.md deleted file mode 100644 index eab667d..0000000 --- a/docs/main/key_innovations_overview/cloud/network/mycelium.md +++ /dev/null @@ -1,42 +0,0 @@ ---- -title: Mycelium -sidebar_position: 2 ---- - - -# Mycelium: Our Planetary Network - -![](img/mycelium_overview.png) - - -The planetary network called Mycelium is an overlay network which lives on top of the existing Internet or other peer-to-peer networks created. - -In the Mycelium network, everyone is connected to everyone. End-to-end encryption between users of an app and the app runs behind the network wall. - -## Mycelium: A New Network Layer for the Internet - -### The Problem - -The current centralized state of the internet poses significant security risks, with compromised routers and growing cyber threats (trillions of USD per year now), making everyone vulnerable to hacking. Industry responses involve disabling original features, hindering true peer-to-peer connectivity and personal server capabilities. Workarounds and system hacks have become the norm. - -**Our Internet is seriously broken. We need new ways to communicate** - -### Introducing Mycelium - -Mycelium is an overlay network layer designed to enhance the existing internet infrastructure while remaining compatible with all current applications. It empowers true peer-to-peer communication. By installing a Network Agent on your device, you gain the ability to securely connect with any other participant on this network. Mycelium intelligently reroutes traffic to maintain connectivity taking location of you and your peer into consideration. - -### The Benefits - - -- **Continuous connectivity:** Mycelium ensures uninterrupted connectivity by dynamically rerouting traffic through available connections (friends, satellites, 4/5G, fiber). -- **End-to-end encryption:** robust encryption stops man-in-the-middle attacks, guaranteeing secure communication. -- **Proof of authenticity (POA): ensures that we know who we are communicating with -- **Optimized routing:** Mycelium finds the shortest path between network participants, reducing latency and keeping traffic localized. -- **Universal server capability:** empowers individuals to act as servers, a foundational element for any peer-to-peer system. -- **Full Compatibility:** Mycelium seamlessly integrates with the current internet, supporting any application. -- **Impressive speed:** achieves 1 Gbps per Network Agent, ensuring rapid data transfer. - -### Status - -In beta and usable from TFGrid 3.13, its our 3e generation approach to networking and took us years to do. We are looking forward to your feedback. - diff --git a/docs/main/key_innovations_overview/cloud/network/mycelium_shortest_path_routing_inno.md b/docs/main/key_innovations_overview/cloud/network/mycelium_shortest_path_routing_inno.md deleted file mode 100644 index dde0b47..0000000 --- a/docs/main/key_innovations_overview/cloud/network/mycelium_shortest_path_routing_inno.md +++ /dev/null @@ -1,63 +0,0 @@ ---- -title: Shortest Path Routing -sidebar_position: 5 ---- - - -# Shortest Path Routing - -## Empowering Connectivity with an End-to-End Encrypted Overlay Network - -### The Concept of End-to-End Encryption - -End-to-end encryption (E2EE) ensures that data is encrypted on the sender's device and only decrypted on the recipient's device. This means that no intermediaries, including service providers, can access or alter the data while it is in transit. - -### Shortest Path Routing in Overlay Networks - -An overlay network is a virtual network built on top of an existing physical network. - -Each enduser mycelium agent will execute custom routing logic and protocols to improve connectivity. - -- In the context of a Mycelium peer-to-peer (P2P) overlay network, nodes (participants) can dynamically discover and connect to each other, forming a mesh-like structure. -- Shortest Path Routing: The network can use algorithms to find the shortest or most efficient path between nodes. This ensures that data packets travel the minimum distance required to reach their destination, reducing latency and improving performance. - -### Multi-Hop Communication - -In a P2P overlay network, data can hop through multiple nodes to reach its destination. This means that if a direct connection is not available, the data can be relayed through intermediary nodes. For example: - -1. **Node A** wants to send data to **Node D**. -2. There is no direct connection, but **Node A** can reach **Node B**, which can reach **Node C**, which finally reaches **Node D**. -3. The data is encrypted end-to-end, so it remains secure throughout its journey. - -Network usage tracking and billing can be used to make sure all participants are rewarded. - -### Leveraging Existing Networks - -This overlay network operates on top of existing internet infrastructure. - -This leads to: - -1. **Cost Efficiency**: By leveraging existing infrastructure, there is no need for extensive new investments in physical hardware. -2. **Flexibility**: The network can dynamically adapt to changing conditions, such as network congestion or outages. - -### Improving Connectivity for Underserved Populations - -Currently, around 4 billion people lack decent internet access. - -Mycelium can significantly improve their connectivity: - -1. **Decentralized Access**: People in remote or underserved areas can connect to the network through nearby nodes, which may belong to friends, community members, or even commercial providers offering bandwidth. -2. **Community-Driven Networks**: Local communities can set up nodes that connect to the broader overlay network, creating a resilient and scalable web of connectivity. -3. **Increased Bandwidth**: By aggregating available bandwidth from multiple sources, the overlay network can provide higher data rates and more reliable connections. - -### Example Scenario - -Imagine a remote village with limited internet access. The villagers set up several nodes that connect to each other and to nearby towns with better connectivity, also some of the nodes can be connected to Internet over satelite, mobile 4g or other mechanisms. - -Here’s how it works: - -1. **Local Node Setup**: Villagers install nodes on their devices, which form a local mesh network. -2. **Connecting to Broader Network**: Some nodes have access to satellite internet or long-range Wi-Fi that connects to nearby towns. -3. **Dynamic Routing**: When a villager wants to access online resources, their data is encrypted end-to-end and routed through the shortest path available, which may include local nodes, satellite links, and commercial internet providers. -4. **Enhanced Access**: This setup leverages all available bandwidth sources, providing more reliable and faster internet access to the village. - diff --git a/docs/main/key_innovations_overview/cloud/network/mycelium_whiltelist.md b/docs/main/key_innovations_overview/cloud/network/mycelium_whiltelist.md deleted file mode 100644 index cb4c65e..0000000 --- a/docs/main/key_innovations_overview/cloud/network/mycelium_whiltelist.md +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: Whitelists -sidebar_position: 4 ---- - -# Mycelium Whitelists - -> Rethinking Network Security: Beyond Traditional Firewalls - -### The Limitations of Traditional Firewalls - -Firewalls have long been the cornerstone of network security, operating as gatekeepers to keep malicious actors out. - -They work by monitoring incoming and outgoing network traffic and applying security rules to block or allow data packets based on predefined criteria. However, while firewalls are effective at creating a barrier, they have inherent limitations: - -1. **Perimeter Focus**: Firewalls are designed to protect the perimeter of the network. This approach assumes that threats come from outside the network, but it does not adequately address threats from within. -2. **Static Rules**: Firewalls rely on static rules that can be bypassed by sophisticated attacks. They do not adapt dynamically to changing threat landscapes. -3. **Single Point of Failure**: As a centralized barrier, firewalls represent a single point of failure. If a firewall is compromised, the entire network can be exposed. - -### The Need for Strong Authentication and Peer-to-Peer Communication - -To address these limitations, a more modern approach to network security involves strong authentication and decentralized communication. By ensuring that all participants on the network are strongly authenticated, we can establish trust at the individual level rather than relying solely on perimeter defenses. - -#### Strong Authentication - -Strong authentication involves verifying the identity of network participants using robust methods such as: - -- **Multi-Factor Authentication (MFA)**: Requires multiple forms of verification, such as passwords, biometrics, and hardware tokens. -- **Public Key Infrastructure (PKI)**: Uses cryptographic keys to authenticate users and devices. - -By implementing strong authentication, we can ensure that only legitimate users and devices can access the network, significantly reducing the risk of unauthorized access. - -#### Peer-to-Peer Communication Over an Overlay Network - -Instead of routing all traffic through a central firewall, participants can communicate directly with each other and applications using a peer-to-peer (P2P) overlay network. An overlay network, called Mycelium, can facilitate this decentralized communication. - -- **Mycelium Overlay Network**: This overlay network functions like a mesh, allowing nodes (participants) to connect directly with each other and applications. It provides a resilient and scalable architecture where each node can dynamically find the best path for communication. - -### Whitelists and Group-Based Access Control - -To further enhance security, applications can use whitelists and group-based access control. This approach involves: - -1. **Whitelisting Users**: Only allowing access to users who are explicitly permitted. This can be based on strong authentication credentials. -2. **Group-Based Access Control**: Organizing users into groups with specific permissions. Each application can define which groups have access based on their source IP addresses and other criteria. - -#### Example Scenario - -Consider an application hosted on the network. Instead of relying on a firewall to block unauthorized access, the application uses Mycelium to communicate with authenticated peers. It employs a whitelist to specify which users or groups can access the application. For instance: - -- **Group A**: Developers with access to development resources. -- **Group B**: Administrators with access to administrative tools. -- **Group C**: End-users with access to specific application features. - -Each group’s access is controlled by specifying the allowed source IP addresses and other authentication factors. This ensures that only authorized users can access the application, regardless of their location. - -> only available in the enterprise edition. - diff --git a/docs/main/key_innovations_overview/cloud/network/networking.md b/docs/main/key_innovations_overview/cloud/network/networking.md deleted file mode 100644 index 82af98a..0000000 --- a/docs/main/key_innovations_overview/cloud/network/networking.md +++ /dev/null @@ -1,31 +0,0 @@ ---- -sidebar_position: 1 -title: 'Overview' ---- - - -# Network Technology Overview - -Our decentralized networking platform allows any compute and storage workload to be connected together on a private (overlay) network and exposed to the existing Internet network. The peer-to-peer network platform allows any workload to be connected over secure encrypted networks, which will look for the shortest path between nodes. - -### Secure Mesh Overlay Network (Peer-to-Peer) - -ZNet is the foundation of any architecture running on the TF Grid. It can be seen as a virtual private data center and the network allows all of the *N* containers to connect to all of the *(N-1)* other containers. Any network connection is a secure network connection between your containers, it creates a peer-to-peer network between containers. - -No connection is made with the Internet. The ZNet is a single tenant network and by default not connected to the public Internet. Everything stays private. For connecting to the public Internet, a Web Gateway is included in the product to allow for public access, if and when required. - -### Redundancy - -As integrated with Web Gateway - -- Any app can get (securely) connected to the Internet by any chosen IP address made available by ThreeFold network farmers through WebW -- An app can be connected to multiple web gateways at once, the DNS round robin principle will provide load balancing and redundancy -- An easy clustering mechanism where web gateways and nodes can be lost and the public service will still be up and running -- Easy maintenance. When containers are moved or re-created, the same end user connection can be reused as that connection is terminated on the Web Gateway. The moved or newly created Web Gateway will recreate the socket to the Web Gateway and receive inbound traffic. - -### Network Wall - - -For OEM projects we can implement a cloud deployment without using TCP-IP or Ethernet this can lead to super secure environments, ideal to battle the Cuber Pandemic. - - diff --git a/docs/main/key_innovations_overview/cloud/network/webgw.md b/docs/main/key_innovations_overview/cloud/network/webgw.md deleted file mode 100644 index 61bb706..0000000 --- a/docs/main/key_innovations_overview/cloud/network/webgw.md +++ /dev/null @@ -1,41 +0,0 @@ ---- -sidebar_position: 3 -title: Web Gateway ---- - -# Web Gateway - -The Web Gateway is a mechanism to connect private networks to the open Internet in such a way that there is no direct connection between the Internet and the secure workloads running in the Zero VMs. - -### Key Benefits - -- Separation between where compute workloads are and where services are exposed -- Redundancy: Each app can be exposed on multiple web gateways at once -- Support for many interfaces -- Helps resolve shortage of IPv4 addresses - -### Implementation - -Some 3Nodes support gateway functionality (this is configured by the farmers). A 3Node with gateway configuration can then accept gateway workloads and forward traffic to Zero VMs that only have Planetary Network or IPv6 addresses. - -The gateway workloads consist of a name (prefix) that first needs to be reserved on the blockchain. Then, the list of backend IPs. There are other flags that can be set to control automatic TLS (please check Terraform documentation for the exact details of a reservation). - -Once the 3Node receives this workload, the network configures proxy for this name and the Planetary Network IPs. - -### Security - -Zero VMs have to have a Planetary Network IP or any other IPv6 (IPv4 is also accepted). This means that any person connected to the Planetary Network can also reach the Zero VM without the need for a proxy. - -So it's up to the Zero VM owner/maintainer to make sure it is secured and that only the required ports are open. - -### Redundant Network Connection - -![](../../../img/redundant_net.jpg) - -### Unlimited Scale - -![](../../../img/webgw_scaling.jpg) - -The network architecture is a pure scale-out network system. It can scale to unlimited size, there is simply no bottleneck. Network "supply" is created by network farmers, and network "demand" is done by TF Grid users. - -Supply and demand scale independently. For supply, there can be unlimited network farmers providing web gateways on their own 3Nodes, and unlimited compute farmers providing 3Nodes for compute and storage. The demand side is driven by developers creating software that runs on the grid, system integrators creating solutions for enterprises, and so on. Globally, there is exponentially-growing demand for data processing and storage use cases. \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/storage/1_storage.md b/docs/main/key_innovations_overview/cloud/storage/1_storage.md deleted file mode 100644 index 0b611e8..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/1_storage.md +++ /dev/null @@ -1,28 +0,0 @@ ---- -sidebar_position: 1 ---- - -# Unbreakable Storage - -Our storage architecture follows the true peer2peer design of the cecentralized cloud system. - -![](img/unbreakable_storage.png) - -Any participating node only stores small incomplete parts of objects (files, photos, movies, databases etc.) by offering a slice of the present (local) storage devices. Managing the storage and retrieval of all of these distributed fragments is done by a software that creates development or end-user interfaces for this storage algorithm. We call this '**dispersed storage**'. - -## Benefits - -- Not even a quantum computer can hack. -- Zetabytes can be stored as easily as Petabytes. -- The system is truly autonomous & self healing. -- Datarot is detected and fixed. -- There is 100% contorl over where data is (GDPR). - -## Peer-to-Peer Advantages - -Peer-to-peer provides the unique proposition of selecting storage providers that match your application and service of business criteria. For example, you might be looking to store data for your application in a certain geographic area (for governance and compliance) reasons. You might also want to use different "storage policies" for different types of data. Examples are live versus archived data. All of these uses cases are possible with this storage architecture, and could be built by using the same building slice produced by farmers and consumed by developers or end-users. - -> There is 100% control over where the data is positioned and the security is incredible. - - - diff --git a/docs/main/key_innovations_overview/cloud/storage/20_compare.md b/docs/main/key_innovations_overview/cloud/storage/20_compare.md deleted file mode 100644 index b1cd633..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/20_compare.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -title: Compare -sidebar_position: 20 -description: 'compare how its dont in other overlay network systems.' ---- - - - -| | ThreeFold Storage Layer | Overlay Storage Systems | -|-----------------------------|------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------| -| Unbreakable | Yes, novel encoding system (not encryption based) makes impossible to hack data. | No | -| Post Quantum | Possible (ask us) | No | -| Scalability | Yes, this system exists +10 years, is being used by large orgs for zetabytes. | Some systems, most not, but centralized. | -| Compatibility | Yes thanks to filesystem approach | Depends, often not | -| Backdoors | No, everything is based on open-source code | ? | -| Performance | Is not a super fast system but good for most cases, +- 100 MB / sec per content creator. | Variable, hard to say, some are | -| Efficiency for redundancy | Ultra efficient, only 20% overhead to allow 4 locations to go down | NO, sometimes +5 copies = 500% | -| Fully integrated in compute | Yes | Lots of different solutions | -| Management | Full P2P, done by 3Bot Agents, blockchain IT contract | Centralized leading to security issues | -| Locality | Data can be local and autonomous, full control by the the user (data creator) | Based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. | diff --git a/docs/main/key_innovations_overview/cloud/storage/2_qsfs_innovation.md b/docs/main/key_innovations_overview/cloud/storage/2_qsfs_innovation.md deleted file mode 100644 index 731a82d..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/2_qsfs_innovation.md +++ /dev/null @@ -1,89 +0,0 @@ ---- -title: File System -sidebar_position: 2 ---- - -### The Problem - -There is a growing need for more accessible and user-friendly solutions to store and manage large volumes of data efficiently. - -While Zero-Stor addresses numerous storage challenges effectively, it may not be accessible or user-friendly for typical developers or system administrators. QSFS has been developed to bridge this gap and provide a more approachable storage solution. - -### Introducing QSFS - -A filesystem utilizing Zero-Stor as its backend. Metadata is safeguarded to prevent loss, inheriting Zero-Stor's benefits and simplifying usage for developers and system administrators. - -The filesystem is always deployed in one location, data is distributed (using zero-stor) across multiple sites for unparalleled reliability. - -Metadata redundancy is included. While not consistently synchronized in real-time, the system allows configuration of consistency levels. Typically, the decentralized state may lag by up to 15 minutes. - -This filesystem can be mounted under various storage-aware applications, such as backup servers, file servers, or S3 servers, enhancing versatility. - -### Benefits - -- Inherits the advantages of Zero-Stor, including enhanced data security, efficiency, and scalability. -- Provides a user-friendly interface for seamless integration with a wide range of applications. -- Offers considerable scalability capabilities, although not unlimited in scale. -- Achieves reasonable performance data transfer rates of up to 50 MB/sec, particularly for larger files. -- Can scale to about 2 million files per filesystem. - - -## Details - -Our Unbreakable filesystem technology has unique features. - - -A redundant filesystem, can store PB's (millions of gigabytes) of information. - -Unique features: - -- Unlimited scalability (many petabytes) -- Unbreakable: - - No farmer knows what the data is - - Even a quantum computer cannot decrypt the data -- Data can't be lost - - Protection for datarot, data will autorepair -- Data is kept forever (data does not get deleted) -- Data is dispersed over multiple sites - - Even if the sites go down the data will not be lost -- Up to 10x more efficient than storing on classic storage cloud systems -- Can be mounted as filesystem on any OS or any deployment system (OSX, Linux, Windows, Docker, Kubernetes etc.) -- Compatible with ± all data workloads (not high performance data driven workloads like a database) -- Self-healing: when a node or disk is lost, the storage system can get back to the original redundancy level -- Helps with compliance for regulations like GDPR (as the hosting facility has no view on what is stored: information is encrypted and incomplete) -- Hybrid: can be installed onsite, public and private -- Read-write caching on encoding node (the front end) - - -### Mount Any Files In Your Storage Infrastructure - -The QSFS is a mechanism to mount any file system (in any format) on the grid, in a quantum secure way. - -This storage layer relies on 3 primitives: - -- [0-db](https://github.com/threefoldtech/0-db) is the storage engine. -It is an always append database, which stores objects in an immutable format. It allows history to be kept out-of-the-box, good performance on disk, low overhead, easy data structure and easy backup (linear copy and immutable files). - -- [0-stor-v2](https://github.com/threefoldtech/0-stor_v2) is used to disperse the data into chunks by performing 'forward-looking error-correcting code' (FLECC) on it and send the fragments to safe locations. -It takes files in any format as input, encrypts the file with AES based on a user-defined key, then FLECC-encodes the file and spreads out the result -to multiple 0-DBs. The number of generated chunks is configurable to make it more or less robust against data loss through unavailable fragments. Even if some 0-DBs are unreachable, you can still retrieve the original data, and missing 0-DBs can even be rebuilt to have full consistency. It is an essential element of the operational backup. - -- [0-db-fs](https://github.com/threefoldtech/0-db-fs) is the filesystem driver which uses 0-DB as a primary storage engine. It manages the storage of directories and metadata in a dedicated namespace and file payloads in another dedicated namespace. - -Together they form a storage layer that is quantum secure: even the most powerful computer can't hack the system because no single node contains all of the information needed to reconstruct the data. - - - -This concept scales forever, and you can bring any file system on top of it: -- S3 storage -- any backup system -- an ftp-server -- IPFS and Hypercore distributed file sharing protocols - - -### Architecture - -By using our filesystem inside a Virtual Machine or Kubernetes, the cloud user can deploy any storage application on top e.g. Minio for S3 storage, OwnCloud as online fileserver. - -Any storage workload can be deployed on top of Unbreakable Storage System. - diff --git a/docs/main/key_innovations_overview/cloud/storage/3_qss_algorithm.md b/docs/main/key_innovations_overview/cloud/storage/3_qss_algorithm.md deleted file mode 100644 index ed9eb32..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/3_qss_algorithm.md +++ /dev/null @@ -1,116 +0,0 @@ ---- -sidebar_position: 3 ---- - -# Algorithm - -The UnbreakableStorage Algorithm is the heart of the Storage engine. The storage engine takes the original data objects and creates data part descriptions that it stores over many virtual storage devices (ZDB/s). - -Data gets stored over multiple ZDB's in such a way that data can never be lost. - -Unique features: - -- Data always append, can never be lost. -- Even a quantum computer cannot decrypt the data. -- Data is spread over multiple sites. If these sites are lost the data will still be available. -- Protects from datarot. - -## The Problem - -Today we produce more data than ever before. We cannot continue to make full copies of data to make sure it is stored reliably. This will simply not scale. We need to move from securing the whole dataset to securing all the objects that make up a dataset. - -We are using technology which was originally used for communication in space. - -The algo stores data fragments over multiple devices (physical storage devices ). - -The solution is not based on replication or sharding, the algo represents the data as equasions which are distributed over multiple locations. - - -## How Data Is Stored Today - -![](img/storage_old.png) - -In most distributed systems, as used on the Internet or in blockchain today, the data will get replicated (sometimes after sharding, which means distributed based on the content of the file and spread out over the world). - -This leads to a lot of overhead and minimal control where the data is. - -In well optimized systems overhead will be 400% but in some it can be orders of magnitude higher to get to a reasonable redundancy level. - -## The UnbreakableStorage System Works Differently - -![](img/unbreakable2.png) - -We have developed a new storage algorithm which is more efficient, ultra reliable and gives you full control over where your data is stored. - -Our approach is different. Let's try to visualize this new approach with a simple analogy using equations. - -Let a,b,c,d.... be the parts of the original object. You could create endless unique equations using these parts. A simple example: let's assume we have 3 parts of original objects that have the following values: - -``` -a=1 -b=2 -c=3 -``` - -(and for reference the part of the real-world objects is not a simple number like `1` but a unique digital number describing the part, like the binary code for it `110101011101011101010111101110111100001010101111011.....`). - - -With these numbers we could create endless amounts of equations: - -``` -1: a+b+c=6 -2: c-b-a=0 -3: b-c+a=0 -4: 2b+a-c=2 -5: 5c-b-a=12 -... -``` - -Mathematically we only need 3 to describe the content (value) of the fragments. But creating more adds reliability. Now store those equations distributed (one equation per physical storage device) and forget the original object. So we no longer have access to the values of a, b, c and we just remember the locations of all the equations created with the original data fragments. - -Mathematically we need three equations (any 3 of the total) to recover the original values for a, b or c. So do a request to retrieve 3 of the many equations and the first 3 to arrive are good enough to recalculate the original values. Three randomly retrieved equations are: - -``` -5c-b-a=12 -b-c+a=0 -2b+a-c=2 -``` -And this is a mathematical system we could solve: - -- First: `b-c+a=0 -> b=c-a` -- Second: `2b+a-c=2 -> c=2b+a-2 -> c=2(c-a)+a-2 -> c=2c-2a+a-2 -> c=a+2` -- Third: `5c-b-a=12 -> 5(a+2)-(c-a)-a=12 -> 5a+10-(a+2)+a-a=12 -> 5a-a-2=2 -> 4a=4 -> a=1` - -Now that we know `a=1` we could solve the rest `c=a+2=3` and `b=c-a=2`. And we have from 3 random equations regenerated the original fragments and could now recreate the original object. - -The redundancy and reliability in this system results from creating equations (more than needed) and storing them. As shown these equations in any random order can recreate the original fragments and therefore redundancy comes in at a much lower overhead. - -In our system we don't do this with 3 parts but with thousands. - -### Example of 16/4 - - -Each object is fragmented into 16 parts. So we have 16 original fragments for which we need 16 equations to mathematically describe them. Now let's make 20 equations and store them dispersedly on 20 devices. To recreate the original object we only need 16 equations. The first 16 that we find and collect allows us to recover the fragment and in the end the original object. We could lose any 4 of those original 20 equations. - -The likelihood of losing 4 independent, dispersed storage devices at the same time is very low. Since we have continuous monitoring of all of the stored equations, we could create additional equations immediately when one of them is missing, making it an auto-regeneration of lost data and a self-repairing storage system. - -> The overhead in this example is 4 out of 20 which is a mere **20%** instead of **400%** . - -## Content Delivery - -This system can be used as backend for content delivery networks. - -E.g. content distribution policy could be a 10/50 distribution which means, the content of a movie would be distributed over 60 locations from which we can lose 50 at the same time. - -If someone now wants to download the data, the first 10 locations to answer will provide enough of the data parts to rebuild the data. - -The overhead here is more, compared to previous example, but stil orders of magnitude lower compared to other CDN systems. - -## The UnbreakableStorage System Can Avoid Datarot - -Datarot is the fact that data storage degrades over time and becomes unreadable e.g. on a harddisk. - -The storage system provided by ThreeFold intercepts this silent data corruption ensurinf that data does not rot. - -> See also https://en.wikipedia.org/wiki/Data_degradation - diff --git a/docs/main/key_innovations_overview/cloud/storage/_category_.json b/docs/main/key_innovations_overview/cloud/storage/_category_.json deleted file mode 100644 index 2e15b95..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Storage", - "position": 7, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/cloud/storage/fungistor_innovation.md b/docs/main/key_innovations_overview/cloud/storage/fungistor_innovation.md deleted file mode 100644 index f1bc981..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/fungistor_innovation.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -title: FungiStor -sidebar_position: 19 ---- - -## FungiStor (H2 2025) - -### The Problem - -Existing blockchain, internet, and P2P content delivery and storage systems suffer from sluggish performance and are too expensive. Content retrieval is often slow, and the overhead for ensuring redundancy is excessive. We require innovative approaches to facilitate efficient information sharing among users. - -Content delivery frequently represents the most significant expense for social networks. Running a basic social video network for 10 million users currently costs approximately $2 million per month using traditional cloud providers. We have the potential to reduce this cost by several orders of magnitude. - - -### Introducing FungiStor - -FungiStor is a peer-to-peer (P2P) content delivery layer designed to store and distribute an extensive range of objects, including images, videos, files, and more. It has the capability to handle trillions of objects and files efficiently. FungiStor serves as an excellent solution for content delivery networks (CDNs), significantly reducing costs for organizations seeking to stream or deliver substantial data volumes to their user base. - - -### The Benefits - -- **Global scalability, sub-50ms lookups:** FungiStor scales worldwide with ultra-fast data retrieval under 50 milliseconds. -- **Localized content delivery:** prioritizes local data access for optimized speed and efficiency. -- **Quantum-Safe security:** incorporates robust quantum security measures. -- **Interoperability:** works seamlessly with IPFS, Torrent, and more. -- **Cost efficiency:** offers significant cost savings, potentially 10 to 100 times less than conventional solutions. - -### Status - -Planned for the end of 2024 - -Remark, FungiStor will act as the backend infrastructure for the Flists within our own system. It is versatile and can be utilized by anyone in need of a global-level content delivery system for files, objects, and images. diff --git a/docs/main/key_innovations_overview/cloud/storage/img/how_data.png b/docs/main/key_innovations_overview/cloud/storage/img/how_data.png deleted file mode 100644 index b2b5ed9..0000000 Binary files a/docs/main/key_innovations_overview/cloud/storage/img/how_data.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/storage/img/storage_old.png b/docs/main/key_innovations_overview/cloud/storage/img/storage_old.png deleted file mode 100644 index 2a42d3f..0000000 Binary files a/docs/main/key_innovations_overview/cloud/storage/img/storage_old.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/storage/img/unbreakable2.png b/docs/main/key_innovations_overview/cloud/storage/img/unbreakable2.png deleted file mode 100644 index f59784c..0000000 Binary files a/docs/main/key_innovations_overview/cloud/storage/img/unbreakable2.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/storage/img/unbreakable_storage.png b/docs/main/key_innovations_overview/cloud/storage/img/unbreakable_storage.png deleted file mode 100644 index acff8bd..0000000 Binary files a/docs/main/key_innovations_overview/cloud/storage/img/unbreakable_storage.png and /dev/null differ diff --git a/docs/main/key_innovations_overview/cloud/storage/nft_storage.md b/docs/main/key_innovations_overview/cloud/storage/nft_storage.md deleted file mode 100644 index bb5b5e0..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/nft_storage.md +++ /dev/null @@ -1,89 +0,0 @@ ---- -sidebar_position: 18 -title: NFT Storage ---- - -# Unbreakable Storage System for NFT - -Our technology enables Unbreakable storage for NFT. - -The owner of the NFT can upload the data using one of our supported interfaces: - -- Http upload (everything possible on https://nft.storage/ is also possible on our system) -- Filesystem - -Anyone in the world can retrieve the NFT (if allowed) and the data will be verified when doing so. The data is available anywhere in the world using multiple interfaces again (IPFS, HTTP(S) etc.). Caching happens on a global level. No special software or account on ThreeFold is needed to do this. - -The NFT system operates on top of a very reliable storage system which is sustainable for the planet and ultra secure and private. The NFT owner also owns the data. - - -## The Benefits - -### Persistence = Owned by the data user, as represented by their associated 3Bot - - -The system is not based on a shared-all architecture. - -Whoever stores the data has full control over: - -- Where data is stored (specific locations) -- The redundancy policy which is used -- How long the data is kept -- CDN policy (where the data is available and for how long) - - -### Reliability - -- Data cannot be corrupted -- Data cannot be lost -- Each time data is fetched back the hash (fingerprint) is checked. If there are any issues then autorecovery occurs -- All data is encrypted and compressed (unique per storage owner) -- Data owner chooses the level of redundancy - -### Lookup - -- Multi URL & storage network support (see more in the interfaces section) -- IPFS, HyperDrive URL schema -- Unique DNS schema (with long key which is globally unique) - -### CDN Support - -Each file (movie, image etc.) stored is available in many locations worldwide. - -Each file gets a unique url pointing to the data which can be retrieved from all these locations. - -Caching happens at each endpoint. - -### Self Healing & Auto Correcting Storage Interface - -Any corruption e.g. bitrot gets automatically detected and corrected. - -In case of a HD crash or storage node crash the data will automatically be expanded again to fit the chosen redundancy policy. - -### The Storage Algoritm Uses Unbreakable Storage System As Its Base - -Not even a quantum computer can hack data stored on our QSSS. - -The QSSS is a super innovative storage system which works on planetary scale and has many benefits compared to shared and/or replicated storage systems. - -It uses forward looking error correcting codes inside. - -### Green - -Storage uses upto 10x less energy compared to classic replicated system. - -### Multi Interface - -The stored data is available over multiple interfaces at once. - -- Interfaces - - IPFS - - HTTP(S) on top of 3Bot - - Syncthing - - Filesystem - -This allows ultimate flexibility from the end user perspective. - -The object (video, image etc.) can easily be embedded in any website or other representation which supports http. - - diff --git a/docs/main/key_innovations_overview/cloud/storage/qss_zero_knowledge_proof.md b/docs/main/key_innovations_overview/cloud/storage/qss_zero_knowledge_proof.md deleted file mode 100644 index 436eec4..0000000 --- a/docs/main/key_innovations_overview/cloud/storage/qss_zero_knowledge_proof.md +++ /dev/null @@ -1,13 +0,0 @@ ---- -sidebar_position: 3 -title: Zero Knowledge Proof ---- - -# Zero Knowledge Proof Storage System - -The Unbreakable Storage System is zero knowledge proof compliant. The storage system is made up of / split into 2 components: the actual storage devices use to store the data (ZDB's) and the Unbreakable Storage engine. - - -The zero proof knowledge compliancy comes from the fact that all of the physical storage nodes (3Nodes) can prove that they store a valid part of the data that the Unbreakable storage engine (QSSE) has stored on multiple independent devices. The QSSE can validate that all of the QSSE storage devices have a valid part of the original information. The storage devices however have no idea what the original stored data is as they only have a part (description) of the original data and have no access to the original data part or the complete original data objects. - - diff --git a/docs/main/key_innovations_overview/quantum/10_quantum.md b/docs/main/key_innovations_overview/quantum/10_quantum.md deleted file mode 100644 index b0df01a..0000000 --- a/docs/main/key_innovations_overview/quantum/10_quantum.md +++ /dev/null @@ -1,131 +0,0 @@ ---- -sidebar_position: 10 -title: 'Quantum Computing' -description: Leverage next-generation quantum computing capabilities -hide_title: true ---- - -![](img/quantum.png) - -## Neuromorphic Quantum Computing - -> Planned H2 2025 - -Transform your computational capabilities with next-generation quantum computing technology which is run on large GPU clouds in phase 1. - -Our platform integrates cutting-edge neuromorphic quantum computing to solve complex problems that are beyond the reach of traditional computing systems. - -### The Challenge of Complex Computation - -Current computing approaches face significant limitations: - -- **Limited Processing Power**: Traditional computers struggle with complex optimization problems -- **High Energy Consumption**: Conventional computing systems require massive energy resources -- **Scalability Issues**: Current solutions don't scale efficiently with problem complexity -- **Time Constraints**: Complex calculations can take excessive time to complete -- **Resource Intensity**: Traditional approaches require substantial computational resources -- **Optimization Challenges**: Finding optimal solutions becomes exponentially harder with problem size - ---- - -> While quantum computing might sound futuristic, it's already here. -> -> Our neuromorphic quantum computing technology provides immediate advantages over traditional computing methods, available today. - -### **1. Advanced Quantum Computing** - -Leverage next-generation quantum computing capabilities: - -- **Neuromorphic Architecture**: Utilizes ion drifting of electrons for quantum operations -- **Memristive Elements**: Quick reaction to changes for optimal solution finding -- **Quantum Advantage Today**: Access quantum computing benefits years ahead of traditional timelines -- **Scalable Solutions**: Handle increasingly complex problems efficiently - -**Implementation**: - -- Deploy quantum computing solutions for complex calculations -- Integrate with existing computational workflows -- Optimize resource-intensive processes -- Scale computing capabilities as needed - ---- - -### **2. Performance and Efficiency** - -Transform your computational capabilities: - -- **Superior Processing**: Faster computation for complex problems -- **Energy Efficiency**: Optimized power consumption -- **Resource Optimization**: Better utilization of computing resources -- **Accelerated Solutions**: Quantum-speed problem solving - -**Implementation**: - -- Implement quantum-powered optimization -- Deploy efficient processing solutions -- Establish quantum-enhanced workflows -- Optimize computational resources - ---- - -### **3. Problem-Solving Capabilities** - -Tackle previously unsolvable problems: - -- **Complex Optimization**: Solve intricate optimization challenges -- **Pattern Recognition**: Enhanced pattern identification -- **Simulation Capabilities**: Advanced system simulation -- **Predictive Analytics**: Improved forecasting and analysis - -**Implementation**: - -- Deploy quantum solutions for optimization problems -- Implement advanced pattern recognition -- Enhance simulation capabilities -- Improve predictive modeling - ---- - -### **4. Future-Ready Technology** - -Stay ahead of the technological curve: - -- **Early Quantum Advantage**: Access quantum benefits today -- **Scalable Architecture**: Grow with your needs -- **Innovation Ready**: Prepared for future advancements -- **Competitive Edge**: Lead in computational capabilities - -**Implementation**: - -- Establish quantum computing infrastructure -- Implement scalable solutions -- Develop quantum-ready workflows -- Train teams on quantum capabilities - -This is a technology which will become more important as implementation progresses. - -## Practically What Can I Do With it Today - -- Solve complex optimization problems -- Enhance machine learning capabilities -- Improve financial modeling and simulation -- Accelerate research and development -- Optimize logistics and supply chain operations - -Special - -- Use quantum computing to achieve results that would be impossible with traditional computing methods. - -## Comparison - -| Aspect | Our Quantum Approach | Traditional Computing | -|--------|---------------------|----------------------| -| **Processing Power** | - Neuromorphic quantum architecture
- Quantum-speed calculations
- Efficient problem solving | - Limited by classical architecture
- Sequential processing
- Resource-intensive calculations | -| **Technology Readiness** | - Available today
- Immediate quantum advantage
- Future-proof architecture | - Limited to classical computing
- No quantum capabilities
- Traditional architecture limitations | -| **Problem Solving** | - Complex optimization capable
- Advanced pattern recognition
- Quantum-enhanced simulation | - Limited optimization abilities
- Basic pattern recognition
- Classical simulation only | -| **Scalability** | - Highly scalable architecture
- Grows with problem complexity
- Efficient resource utilization | - Limited scalability
- Resource constraints
- Performance bottlenecks | -| **Energy Efficiency** | - Optimized power consumption
- Efficient processing
- Resource-conscious operation | - High power consumption
- Resource-intensive
- Limited efficiency | -| **Innovation Potential** | - Leading-edge technology
- Continuous advancement
- Future-ready platform | - Traditional technology
- Limited innovation
- Legacy constraints | -| **Time to Solution** | - Quantum-speed processing
- Rapid problem solving
- Efficient optimization | - Sequential processing
- Time-intensive calculations
- Limited optimization speed | -| **Application Range** | - Wide problem scope
- Complex calculations
- Advanced simulations | - Limited problem scope
- Basic calculations
- Simple simulations | -| **Competitive Advantage** | - Market-leading capabilities
- Early quantum adoption
- Innovation leadership | - Standard capabilities
- No quantum features
- Traditional approach | diff --git a/docs/main/key_innovations_overview/quantum/_category_.json b/docs/main/key_innovations_overview/quantum/_category_.json deleted file mode 100644 index be26331..0000000 --- a/docs/main/key_innovations_overview/quantum/_category_.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "label": "Geo Aware Quantum", - "position": 2, - "description":"Geo Aware Quantum.", - "link": { - "type": "generated-index" - } - } \ No newline at end of file diff --git a/docs/main/key_innovations_overview/quantum/img/quantum.png b/docs/main/key_innovations_overview/quantum/img/quantum.png deleted file mode 100644 index bda9d57..0000000 Binary files a/docs/main/key_innovations_overview/quantum/img/quantum.png and /dev/null differ diff --git a/docs/main/legal/_category_.json b/docs/main/legal/_category_.json deleted file mode 100644 index 543c41c..0000000 --- a/docs/main/legal/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Legal", - "position": 12, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/legal/disclaimer.md b/docs/main/legal/disclaimer.md deleted file mode 100644 index 3e3413f..0000000 --- a/docs/main/legal/disclaimer.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: Disclaimer -description: Disclaimer -sidebar_position: 3 ---- - -## Disclaimer - -> The information provided in these tutorials or any related discussion is not intended as investment advice. The purpose is to provide educational and informational content only. Investing in cryptocurrencies or any other assets carries inherent risks, and it is crucial to conduct your own research and exercise caution before making any investment decisions. -> -> The different ThreeFold tokens (TFT, INCA, INCA-G) are not to be considered as traditional investment instruments. The value of cryptocurrencies can be volatile, and there are no guarantees of profits or returns. Always be aware of the risks involved and make informed choices based on your own assessment and understanding. \ No newline at end of file diff --git a/docs/main/legal/privacy_policy.md b/docs/main/legal/privacy_policy.md deleted file mode 100644 index 64a14f2..0000000 --- a/docs/main/legal/privacy_policy.md +++ /dev/null @@ -1,116 +0,0 @@ ---- -title: Privacy Policy -description: Privacy Policy concerning ThreeFold -sidebar_position: 2 ---- - -*This privacy policy will explain how ThreeFold Movement ("companies", "we", or "us") uses the personal data we collect from you when you use our websites, including the ThreeFold website.* - -### What data do we collect? - -All websites using the ThreeFold Movement Privacy Policy do not collect any data on a personal level by default. All data being processed is anonymized. When signing up for our newsletter we collect your: *email address*. - -**How do we collect your data?** - -Browsing data: -We automatically collect data and process data when you use or view our website via your browser's cookies. - -Newsletter Signups: -Collected only with your permission through our sign-up form that uses a double opt-in mechanism for you to explicitly accept. - -### How will we use your data? - -We use this information to monitor and analyze your use of our website and for the website's technical administration, to increase our website's functionality and user-friendliness, and to better tailor it to our visitors needs. - -If you agree, our companies will share your data with the following partner companies so that they may offer you or us their products and services: - -* Matomo: offers us services relating to monitoring and measuring website traffic and access, creating user navigation reports, etc. All information processed here is anonymized. We run this service within our own environments. The data being processed does not leave our servers and is not shared with any thrid parties. - -* Mailerlite: offers us services relating newsletter sending and monitoring. - -**We do not track individual IP's or any other personal data.** - -The aforementioned processors operate independently from us and have their own privacy policy, which we strongly suggest you review. These processors may use the information collected through their services to evaluate visitors’ activity, as set out in their respective privacy policies. - -### How do we store your data? - -We store the anonmyzed data in Matomo for us to research usage and improve user experience on our websites. -We store email addresses in Mailerlite's system. - -### Marketing - -We will not use your information for any (re)marketing reasons, nor send you information about products and/or services of ours or any partner companies unless you explicitly agreed to signing up for our newsletter. - -### What are your data protection rights? - -We would like to make sure you are fully aware of all of your data protection rights. Every user is entitled to the following: - -#### The right to access - -You have the right to request from us copies of your personal data. We may charge you a small fee for this service. - -#### The right to rectification - -You have the right to request that we correct any information you believe is inaccurate. You also have the right to request us to complete information you believe is incomplete. - -#### The right to erasure - -You have the right to request that we erase your personal data, under certain conditions. - -#### The right to restrict processing - -You have the right to request that we restrict the processing of your personal data, under certain conditions. - -#### The right to object to processing - -You have the right to object to our companies' processing of your personal data, under certain conditions. - -#### The right to data portability - -You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions. - -If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us: - -* email: dataprivacy@threefold.io - -### What are cookies? - -Cookies are text files placed on your computer to collect standard Internet log information and visitor behavior information. When you visit our websites, we may collect information from you automatically through cookies or similar technology. - -For further information, visit: http://allaboutcookies.org/ - -### How do we use cookies? - -We use cookies in a range of ways to improve your experience on our website, including: - -* understanding how you use our website - -* for the websites technical administration - -### What types of cookies do we use? - -There are a number of different types of cookies, however, our websites use: - -* Functionality - Our companies use these cookies so that we recognize you on our website and remember your previously selected preferences. These could include what language you prefer and the location you are in. A mix of first-party and third-party cookies are used. - -* No Advertising - Our companies use these cookies to collect information about your visit to our website, the content you viewed, the links you followed and information about your browser, device, and your IP address. However, we will not share this data with third parties for advertising purposes. - -* Analytics cookies - Our companies use these to monitor how users reached the Site, and how they interact with and move around once on the Site. These cookies let us know what features on the Site are working the best and what features on the Site can be improved. - -### How to manage cookies - -You can set your browser to not accept cookies, and the above website tells you how to remove cookies from your browser. However, in a few cases, some of our website features may not function as a result. - -### Privacy policies of other websites - -Our website contains links to other websites. Our privacy policy applies only to our website, so if you click on a link to another website, you should read their privacy policy. - -### Changes to our privacy policy - -We keep our privacy policy under regular review and places any updates on this web page. - -### How to contact us - -If you have any questions about our privacy policy, the data we hold on you, or you would like to exercise one of your data protection rights, please do not hesitate to contact us. - -Email us at: dataprivacy@threefold.io \ No newline at end of file diff --git a/docs/main/legal/terms_and_conditions.md b/docs/main/legal/terms_and_conditions.md deleted file mode 100644 index bfa97f3..0000000 --- a/docs/main/legal/terms_and_conditions.md +++ /dev/null @@ -1,155 +0,0 @@ ---- -title: Terms and Conditions -description: Terms and Conditions for ThreeFold -sidebar_position: 1 ---- - -These Terms of Use constitute a legally binding agreement made between you, whether personally or on behalf of an entity (“you”) and ThreeFold, doing business as ThreeFold (“ThreeFold“, “we”, “us”, or “our”), concerning your access to and use of the ThreeFold related websites: - -The ThreeFold website, websites/wikis/forums ending with threefold.io, threefold.me, grid.tf, threefold.tech, TFT.com, freeflownation.org, 3bot.org, incubaid.com or consciousinternet.org or any other website as used/promoted by the ThreeFold Foundation or any other site as originating from our open-source git repository on https://github.com/threefoldfoundation, as well as any other media form, media channel, forum, mobile website or mobile application related, linked, or otherwise connected thereto (collectively, the “Site”). - -You agree that by accessing the Site, you have read, understood, and agreed to be bound by all of these Terms of Use. - -IF YOU DO NOT AGREE WITH ALL OF THESE TERMS OF USE, THEN YOU ARE EXPRESSLY PROHIBITED FROM USING THE SITE AND YOU MUST DISCONTINUE USE IMMEDIATELY. - -Supplemental terms and conditions or documents that may be posted on the Site from time to time are hereby expressly incorporated herein by reference. We reserve the right, in our sole discretion, to make changes or modifications to these Terms of Use at any time and for any reason. We will alert you about any changes by updating the “Last updated” date of these Terms of Use, and you waive any right to receive specific notice of each such change. It is your responsibility to periodically review these Terms of Use to stay informed of updates. You will be subject to, and will be deemed to have been made aware of and to have accepted, the changes in any revised Terms of Use by your continued use of the Site after the date such revised Terms of Use are posted. - -The information provided on the Site is not intended for distribution to or use by any person or entity in any jurisdiction or country where such distribution or use would be contrary to law or regulation or which would subject us to any registration requirement within such jurisdiction or country. Accordingly, those persons who choose to access the Site from other locations do so on their own initiative and are solely responsible for compliance with local laws, if and to the extent local laws are applicable. - -The Site is intended for users who are at least 18 years old. Persons under the age of 18 are not permitted to use or register for the Site. - -**INTELLECTUAL PROPERTY RIGHTS** - -Unless otherwise indicated, the Site is our proprietary property and all source code, databases, functionality, software, website designs, audio, video, text, photographs, and graphics on the Site (collectively, the “Content”) and the trademarks, service marks, and logos contained therein (the “Marks”) are owned or controlled by us or licensed to us, and are protected by copyright and trademark laws and various other intellectual property rights and EU competition laws, foreign jurisdictions, and international conventions. The Content and the Marks are provided on the Site “AS IS” for your information and personal use only. Except as expressly provided in these Terms of Use, no part of the Site and no Content or Marks may be copied, reproduced, aggregated, republished, uploaded, posted, publicly displayed, encoded, translated, transmitted, distributed, sold, licensed, or otherwise exploited for any commercial purpose whatsoever, without our express prior written permission. - -Provided that you are eligible to use the Site, you are granted a limited license to access and use the Site and to download or print a copy of any portion of the Content to which you have properly gained access solely for your personal, non-commercial use. We reserve all rights not expressly granted to you in and to the Site, the Content and the Marks. - -**USER REPRESENTATIONS** - -By using the Site, you represent and warrant that: (1) all registration information you submit will be true, accurate, current, and complete; (2) you will maintain the accuracy of such information and promptly update such registration information as necessary; (3) you have the legal capacity and you agree to comply with these Terms of Use; (4) you are not a minor in the jurisdiction in which you reside; (5) you will not access the Site through automated or non-human means, whether through a bot, script, or otherwise; (6) you will not use the Site for any illegal or unauthorized purpose; and (7) your use of the Site will not violate any applicable law or regulation. - -If you provide any information that is untrue, inaccurate, not current, or incomplete, we have the right to suspend or terminate your account and refuse any and all current or future use of the Site (or any portion thereof). - -**USER REGISTRATION** - -You may be required to register with the Site. You agree to keep your password confidential and will be responsible for all use of your account and password. We reserve the right to remove, reclaim, or change a username you select if we determine, in our sole discretion, that such username is inappropriate, obscene, or otherwise objectionable. - -**PROHIBITED ACTIVITIES** - -You may not access or use the Site for any purpose other than that for which we make the Site available. The Site may not be used in connection with any commercial endeavors except those that are specifically endorsed or approved by us. - -As a user of the Site, you agree not to: - -- Systematically retrieve data or other content from the Site to create or compile, directly or indirectly, a collection, compilation, database, or directory without written permission from us. -- Circumvent, disable, or otherwise interfere with security-related features of the Site, including features that prevent or restrict the use or copying of any Content or enforce limitations on the use of the Site and/or the Content contained therein. -- Engage in unauthorized framing of or linking to the Site. -- Trick, defraud, or mislead us and other users, especially in any attempt to learn sensitive account information such as user passwords. -- Engage in any automated use of the system, such as using scripts to send comments or messages, or using any data mining, robots, or similar data gathering and extraction tools. -- Interfere with, disrupt, or create an undue burden on the Site or the networks or services connected to the Site. -- Use the Site as part of any effort to compete with us or otherwise use the Site and/or the Content for any revenue-generating endeavor or commercial enterprise. -- Decipher, decompile, disassemble, or reverse engineer any of the software comprising or in any way making up a part of the Site. -- Upload or transmit (or attempt to upload or to transmit) viruses, Trojan horses, or other material, including excessive use of capital letters and spamming (continuous posting of repetitive text), that interferes with any party’s uninterrupted use and enjoyment of the Site or modifies, impairs, disrupts, alters, or interferes with the use, features, functions, operation, or maintenance of the Site. -- Upload or transmit (or attempt to upload or to transmit) any material that acts as a passive or active information collection or transmission mechanism, including without limitation, clear graphics interchange formats (“gifs”), 1×1 pixels, web bugs, cookies, or other similar devices (sometimes referred to as “spyware” or “passive collection mechanisms” or “pcms”). -- Except as may be the result of standard search engine or Internet browser usage, use, launch, develop, or distribute any automated system, including without limitation, any spider, robot, cheat utility, scraper, or offline reader that accesses the Site, or using or launching any unauthorized script or other software. -- Use the Site in a manner inconsistent with any applicable laws or regulations. - -**USER GENERATED CONTRIBUTIONS** - -The Site may invite you to chat, contribute to, or participate in blogs, message boards, online forums, and other functionality, and may provide you with the opportunity to create, submit, post, display, transmit, perform, publish, distribute, or broadcast content and materials to us or on the Site, including but not limited to text, writings, video, audio, photographs, graphics, comments, suggestions, or personal information or other material (collectively, “Contributions”). Contributions may be viewable by other users of the Site and through third-party websites. As such, any Contributions you transmit may be treated as non-confidential and non-proprietary. When you create or make available any Contributions, you thereby represent and warrant that: - -- The creation, distribution, transmission, public display, or performance, and the accessing, downloading, or copying of your Contributions do not and will not infringe the proprietary rights, including but not limited to the copyright, patent, trademark, trade secret, or moral rights of any third party. -- You are the creator and owner of or have the necessary licenses, rights, consents, releases, and permissions to use and to authorize us, the Site, and other users of the Site to use your Contributions in any manner contemplated by the Site and these Terms of Use. -- You have the written consent, release, and/or permission of each and every identifiable individual person in your Contributions to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of your Contributions in any manner contemplated by the Site and these Terms of Use. -- Your Contributions are not false, inaccurate, or misleading. -- Your Contributions are not unsolicited or unauthorized advertising, promotional materials, pyramid schemes, chain letters, spam, mass mailings, or other forms of solicitation. -- Your Contributions are not obscene, lewd, lascivious, filthy, violent, harassing, libelous, slanderous, or otherwise objectionable (as determined by us). -- Your Contributions do not ridicule, mock, disparage, intimidate, or abuse anyone. 98 Your Contributions do not advocate the violent overthrow of any government or incite, encourage, or threaten physical harm against another. -- Your Contributions do not violate any applicable law, regulation, or rule. -- Your Contributions do not violate the privacy or publicity rights of any third party. -- Your Contributions do not contain any material that solicits personal information from anyone under the age of 18 or exploits people under the age of 18 in a sexual or violent manner. -- Your Contributions do not violate any federal or state law concerning child pornography, or otherwise intended to protect the health or well-being of minors; -- Your Contributions do not include any offensive comments that are connected to race, national origin, gender, sexual preference, or physical handicap. -- Your Contributions do not otherwise violate, or link to material that violates, any provision of these Terms of Use, or any applicable law or regulation. -- Any use of the Site in violation of the foregoing violates these Terms of Use and may result in, among other things, termination or suspension of your rights to use the Site. CONTRIBUTION LICENSE - -By posting your Contributions to any part of the Site or making Contributions accessible to the Site by linking your account from the Site to any of your social networking accounts, you automatically grant, and you represent and warrant that you have the right to grant, to us an unrestricted, unlimited, irrevocable, perpetual, non-exclusive, transferable, royalty-free, fully-paid, worldwide right, and license to host, use, copy, reproduce, disclose, sell, resell, publish, broadcast, retitle, archive, store, cache, publicly perform, publicly display, reformat, translate, transmit, excerpt (in whole or in part), and distribute such Contributions (including, without limitation, your image and voice) for any purpose, commercial, advertising, or otherwise, and to prepare derivative works of, or incorporate into other works, such Contributions, and grant and authorize sublicenses of the foregoing. The use and distribution may occur in any media formats and through any media channels. - -This license will apply to any form, media, or technology now known or hereafter developed, and includes our use of your name, company name, and franchise name, as applicable, and any of the trademarks, service marks, trade names, logos, and personal and commercial images you provide. You waive all moral rights in your Contributions, and you warrant that moral rights have not otherwise been asserted in your Contributions. - -We do not assert any ownership over your Contributions. You retain full ownership of all of your Contributions and any intellectual property rights or other proprietary rights associated with your Contributions. We are not liable for any statements or representations in your Contributions provided by you in any area on the Site. You are solely responsible for your Contributions to the Site and you expressly agree to exonerate us from any and all responsibility and to refrain from any legal action against us regarding your Contributions. - -We have the right, in our sole and absolute discretion, (1) to edit, redact, or otherwise change any Contributions; (2) to re-categorize any Contributions to place them in more appropriate locations on the Site; and (3) to pre-screen or delete any Contributions at any time and for any reason, without notice. We have no obligation to monitor your Contributions. - -**SOCIAL MEDIA** - -As part of the functionality of the Site, you may link your account with online accounts you have with third-party service providers (each such account, a “Third-Party Account”) by either: (1) providing your Third-Party Account login information through the Site; or (2) allowing us to access your Third-Party Account, as is permitted under the applicable terms and conditions that govern your use of each Third-Party Account. You represent and warrant that you are entitled to disclose your Third-Party Account login information to us and/or grant us access to your Third-Party Account, without breach by you of any of the terms and conditions that govern your use of the applicable Third-Party Account, and without obligating us to pay any fees or making us subject to any usage limitations imposed by the third-party service provider of the Third-Party Account. By granting us access to any Third-Party Accounts, you understand that (1) we may access, make available, and store (if applicable) any content that you have provided to and stored in your Third-Party Account (the “Social Network Content”) so that it is available on and through the Site via your account, including without limitation any friend lists and (2) we may submit to and receive from your Third-Party Account additional information to the extent you are notified when you link your account with the Third-Party Account. Depending on the Third-Party Accounts you choose and subject to the privacy settings that you have set in such Third-Party Accounts, personally identifiable information that you post to your Third-Party Accounts may be available on and through your account on the Site. Please note that if a Third-Party Account or associated service becomes unavailable or our access to such Third Party Account is terminated by the third-party service provider, then Social Network Content may no longer be available on and through the Site. You will have the ability to disable the connection between your account on the Site and your Third-Party Accounts at any time. - -PLEASE NOTE THAT YOUR RELATIONSHIP WITH THE THIRD-PARTY SERVICE PROVIDERS ASSOCIATED WITH YOUR THIRD-PARTY ACCOUNTS IS GOVERNED SOLELY BY YOUR AGREEMENT(S) WITH SUCH THIRD-PARTY SERVICE PROVIDERS. - -We make no effort to review any Social Network Content for any purpose, including but not limited to, for accuracy, legality, or non-infringement, and we are not responsible for any Social Network Content. You acknowledge and agree that we may access your email address book associated with a Third-Party Account and your contacts list stored on your mobile device or tablet computer solely for purposes of identifying and informing you of those contacts who have also registered to use the Site. You can deactivate the connection between the Site and your Third-Party Account by contacting us using the contact information below or through your account settings (if applicable). We will attempt to delete any information stored on our servers that was obtained through such Third-Party Account, except the username and profile picture that become associated with your account. - -**SUBMISSIONS** - -You acknowledge and agree that any questions, comments, suggestions, ideas, feedback, or other information regarding the Site (“Submissions”) provided by you to us are non-confidential and shall become our sole property. We shall own exclusive rights, including all intellectual property rights, and shall be entitled to the unrestricted use and dissemination of these Submissions for any lawful purpose, commercial or otherwise, without acknowledgment or compensation to you. You hereby waive all moral rights to any such Submissions, and you hereby warrant that any such Submissions are original with you or that you have the right to submit such Submissions. You agree there shall be no recourse against us for any alleged or actual infringement or misappropriation of any proprietary right in your Submissions. - -**THIRD-PARTY WEBSITES AND CONTENT** - -The Site may contain (or you may be sent via the Site) links to other websites (“Third-Party Websites”) as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software, and other content or items belonging to or originating from third parties (“Third-Party Content”). Such Third-Party Websites and Third-Party Content are not investigated, monitored, or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third-Party Websites accessed through the Site or any Third-Party Content posted on, available through, or installed from the Site, including the content, accuracy, offensiveness, opinions, reliability, privacy practices, or other policies of or contained in the Third-Party Websites or the Third-Party Content. Inclusion of, linking to, or permitting the use or installation of any Third-Party Websites or any Third-Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Site and access the Third-Party Websites or to use or install any Third-Party Content, you do so at your own risk, and you should be aware these Terms of Use no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Site or relating to any applications you use or install from the Site. Any purchases you make through Third-Party Websites will be through other websites and from other companies, and we take no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. You agree and acknowledge that we do not endorse the products or services offered on Third-Party Websites and you shall hold us harmless from any harm caused by your purchase of such products or services. Additionally, you shall hold us harmless from any losses sustained by you or harm caused to you relating to or resulting in any way from any Third-Party Content or any contact with Third-Party Websites. - -**SITE MANAGEMENT** - -We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site. - -**PRIVACY POLICY** - -We care about data privacy and security. Please review our Privacy Policy. - -By using the Site, you agree to be bound by our Privacy Policy, which is incorporated into these Terms of Use. Please be advised the Site is hosted in the United States. If you access the Site from the European Union, Asia, or any other region of the world with laws or other requirements governing personal data collection, use, or disclosure that differ from applicable laws in the United States, then through your continued use of the Site, you are transferring your data to the United States, and you expressly consent to have your data transferred to and processed in the United States. Further, we do not knowingly accept, request, or solicit information from children or knowingly market to children. Therefore, in accordance with the U.S. Children’s Online Privacy Protection Act, if we receive actual knowledge that anyone under the age of 13 has provided personal information to us without the requisite and verifiable parental consent, we will delete that information from the Site as quickly as is reasonably practical. - -**TERM AND TERMINATION** - -These Terms of Use shall remain in full force and effect while you use the Site. WITHOUT LIMITING ANY OTHER PROVISION OF THESE TERMS OF USE, WE RESERVE THE RIGHT TO, IN OUR SOLE DISCRETION AND WITHOUT NOTICE OR LIABILITY, DENY ACCESS TO AND USE OF THE SITE (INCLUDING BLOCKING CERTAIN IP ADDRESSES), TO ANY PERSON FOR ANY REASON OR FOR NO REASON, INCLUDING WITHOUT LIMITATION FOR BREACH OF ANY REPRESENTATION, WARRANTY, OR COVENANT CONTAINED IN THESE TERMS OF USE OR OF ANY APPLICABLE LAW OR REGULATION. WE MAY TERMINATE YOUR USE OR PARTICIPATION IN THE SITE OR DELETE YOUR ACCOUNT AND ANY CONTENT OR INFORMATION THAT YOU POSTED AT ANY TIME, WITHOUT WARNING, IN OUR SOLE DISCRETION. - -If we terminate or suspend your account for any reason, you are prohibited from registering and creating a new account under your name, a fake or borrowed name, or the name of any third party, even if you may be acting on behalf of the third party. In addition to terminating or suspending your account, we reserve the right to take appropriate legal action, including without limitation pursuing civil, criminal, and injunctive redress. - -**MODIFICATIONS AND INTERRUPTIONS** - -We reserve the right to change, modify, or remove the contents of the Site at any time or for any reason at our sole discretion without notice. However, we have no obligation to update any information on our Site. We also reserve the right to modify or discontinue all or part of the Site without notice at any time. We will not be liable to you or any third party for any modification, price change, suspension, or discontinuance of the Site. - -We cannot guarantee the Site will be available at all times. We may experience hardware, software, or other problems or need to perform maintenance related to the Site, resulting in interruptions, delays, or errors. We reserve the right to change, revise, update, suspend, discontinue, or otherwise modify the Site at any time or for any reason without notice to you. You agree that we have no liability whatsoever for any loss, damage, or inconvenience caused by your inability to access or use the Site during any downtime or discontinuance of the Site. Nothing in these Terms of Use will be construed to obligate us to maintain and support the Site or to supply any corrections, updates, or releases in connection therewith. - -**GOVERNING LAW** - -These Terms of Use and your use of the Site are governed by and construed in accordance with the laws of Belgium, without regard to its conflict of law principles. DISPUTE RESOLUTION - -Any legal action of whatever nature brought by either you or us (collectively, the “Parties” and individually, a “Party”) shall be commenced or prosecuted in courts located in Belgium, Ghent, and the Parties hereby consent to, and waive all defenses of lack of personal jurisdiction and forum non conveniens with respect to venue and jurisdiction in such state and federal courts. Application of the United Nations Convention on Contracts for the International Sale of Goods and the Uniform Computer Information Transaction Act (UCITA) are excluded from these Terms of Use. In no event shall any claim, action, or proceeding brought by either Party related in any way to the Site be commenced more than one (1) years after the cause of action arose. - -**CORRECTIONS** - -There may be information on the Site that contains typographical errors, inaccuracies, or omissions, including descriptions, pricing, availability, and various other information. We reserve the right to correct any errors, inaccuracies, or omissions and to change or update the information on the Site at any time, without prior notice. - -**DISCLAIMER** - -THE SITE IS PROVIDED ON AN AS-IS AND AS-AVAILABLE BASIS. YOU AGREE THAT YOUR USE OF THE SITE AND OUR SERVICES WILL BE AT YOUR SOLE RISK. TO THE FULLEST EXTENT PERMITTED BY LAW, WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, IN CONNECTION WITH THE SITE AND YOUR USE THEREOF, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. WE MAKE NO WARRANTIES OR REPRESENTATIONS ABOUT THE ACCURACY OR COMPLETENESS OF THE SITE’S CONTENT OR THE CONTENT OF ANY WEBSITES LINKED TO THE SITE AND WE WILL ASSUME NO LIABILITY OR RESPONSIBILITY FOR ANY (1) ERRORS, MISTAKES, OR INACCURACIES OF CONTENT AND MATERIALS, (2) PERSONAL INJURY OR PROPERTY DAMAGE, OF ANY NATURE WHATSOEVER, RESULTING FROM YOUR ACCESS TO AND USE OF THE SITE, (3) ANY UNAUTHORIZED ACCESS TO OR USE OF OUR SECURE SERVERS AND/OR ANY AND ALL PERSONAL INFORMATION AND/OR FINANCIAL INFORMATION STORED THEREIN, (4) ANY INTERRUPTION OR CESSATION OF TRANSMISSION TO OR FROM THE SITE, (5) ANY BUGS, VIRUSES, TROJAN HORSES, OR THE LIKE WHICH MAY BE TRANSMITTED TO OR THROUGH THE SITE BY ANY THIRD PARTY, AND/OR (6) ANY ERRORS OR OMISSIONS IN ANY CONTENT AND MATERIALS OR FOR ANY LOSS OR DAMAGE OF ANY KIND INCURRED AS A RESULT OF THE USE OF ANY CONTENT POSTED, TRANSMITTED, OR OTHERWISE MADE AVAILABLE VIA THE SITE. WE DO NOT WARRANT, ENDORSE, GUARANTEE, OR ASSUME RESPONSIBILITY FOR ANY PRODUCT OR SERVICE ADVERTISED OR OFFERED BY A THIRD PARTY THROUGH THE SITE, ANY HYPERLINKED WEBSITE, OR ANY WEBSITE OR MOBILE APPLICATION FEATURED IN ANY BANNER OR OTHER ADVERTISING, AND WE WILL NOT BE A PARTY TO OR IN ANY WAY BE RESPONSIBLE FOR MONITORING ANY TRANSACTION BETWEEN YOU AND ANY THIRD-PARTY PROVIDERS OF PRODUCTS OR SERVICES. AS WITH THE PURCHASE OF A PRODUCT OR SERVICE THROUGH ANY MEDIUM OR IN ANY ENVIRONMENT, YOU SHOULD USE YOUR BEST JUDGMENT AND EXERCISE CAUTION WHERE APPROPRIATE. LIMITATIONS OF LIABILITY - -IN NO EVENT WILL WE OR OUR DIRECTORS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, EXEMPLARY, INCIDENTAL, SPECIAL, OR PUNITIVE DAMAGES, INCLUDING LOST PROFIT, LOST REVENUE, LOSS OF DATA, OR OTHER DAMAGES ARISING FROM YOUR USE OF THE SITE, EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. NOTWITHSTANDING ANYTHING TO THE CONTRARY CONTAINED HEREIN, OUR LIABILITY TO YOU FOR ANY CAUSE WHATSOEVER AND REGARDLESS OF THE FORM OF THE ACTION, WILL AT ALL TIMES BE LIMITED TO $1.00 USD. CERTAIN STATE LAWS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES OR THE EXCLUSION OR LIMITATION OF CERTAIN DAMAGES. IF THESE LAWS APPLY TO YOU, SOME OR ALL OF THE ABOVE DISCLAIMERS OR LIMITATIONS MAY NOT APPLY TO YOU, AND YOU MAY HAVE ADDITIONAL RIGHTS. INDEMNIFICATION - -You agree to defend, indemnify, and hold us harmless, including our subsidiaries, affiliates, and all of our respective officers, agents, partners, and employees, from and against any loss, damage, liability, claim, or demand, including reasonable attorneys’ fees and expenses, made by any third party due to or arising out of: (1) your Contributions; (2) use of the Site; (3) breach of these Terms of Use; (4) any breach of your representations and warranties set forth in these Terms of Use; (5) your violation of the rights of a third party, including but not limited to intellectual property rights; or (6) any overt harmful act toward any other user of the Site with whom you connected via the Site. Notwithstanding the foregoing, we reserve the right, at your expense, to assume the exclusive defense and control of any matter for which you are required to indemnify us, and you agree to cooperate, at your expense, with our defense of such claims. We will use reasonable efforts to notify you of any such claim, action, or proceeding which is subject to this indemnification upon becoming aware of it. - -**USER DATA** - -We will maintain certain data that you transmit to the Site for the purpose of managing the performance of the Site, as well as data relating to your use of the Site. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Site. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data. - -**ELECTRONIC COMMUNICATIONS, TRANSACTIONS, AND SIGNATURES** - -Visiting the Site, sending us emails, and completing online forms constitute electronic communications. You consent to receive electronic communications, and you agree that all agreements, notices, disclosures, and other communications we provide to you electronically, via email and on the Site, satisfy any legal requirement that such communication be in writing. YOU HEREBY AGREE TO THE USE OF ELECTRONIC SIGNATURES, CONTRACTS, ORDERS, AND OTHER RECORDS, AND TO ELECTRONIC DELIVERY OF NOTICES, POLICIES, AND RECORDS OF TRANSACTIONS INITIATED OR COMPLETED BY US OR VIA THE SITE. You hereby waive any rights or requirements under any statutes, regulations, rules, ordinances, or other laws in any jurisdiction which require an original signature or delivery or retention of non-electronic records, or to payments or the granting of credits by any means other than electronic means. MISCELLANEOUS - -These Terms of Use and any policies or operating rules posted by us on the Site or in respect to the Site constitute the entire agreement and understanding between you and us. Our failure to exercise or enforce any right or provision of these Terms of Use shall not operate as a waiver of such right or provision. These Terms of Use operate to the fullest extent permissible by law. We may assign any or all of our rights and obligations to others at any time. We shall not be responsible or liable for any loss, damage, delay, or failure to act caused by any cause beyond our reasonable control. If any provision or part of a provision of these Terms of Use is determined to be unlawful, void, or unenforceable, that provision or part of the provision is deemed severable from these Terms of Use and does not affect the validity and enforceability of any remaining provisions. There is no joint venture, partnership, employment or agency relationship created between you and us as a result of these Terms of Use or use of the Site. You agree that these Terms of Use will not be construed against us by virtue of having drafted them. You hereby waive any and all defenses you may have based on the electronic form of these Terms of Use and the lack of signing by the parties hereto to execute these Terms of Use. - -**CONTACT US** - -In order to resolve a complaint regarding the Site or to receive further information regarding use of the Site, please contact us at: - -- ThreeFold FCZ -- BA1120 DMCC BUSINESS CENTRE, LEVEL NO 1, JEWELLERY & GEMPLEX 3, DUBAI, UNITED EMIRATES ARAB -- info@threefold.io \ No newline at end of file diff --git a/docs/main/presentation.md b/docs/main/presentation.md deleted file mode 100644 index c330eed..0000000 --- a/docs/main/presentation.md +++ /dev/null @@ -1,13 +0,0 @@ ---- -title: Presentation -sidebar_position: 1 -draft: true ---- - -# ThreeFold Tech Presentation - -import CanvaEmbed from '@site/src/components/CanvaEmbed'; - - - -## ThreeFold Technology v3.7 July 2024.pptx by Kristof De Spiegeleer diff --git a/docs/main/roadmap/_category_.json b/docs/main/roadmap/_category_.json deleted file mode 100644 index aa3473c..0000000 --- a/docs/main/roadmap/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Roadmap", - "position": 11, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/roadmap/enterprise_roadmap.md b/docs/main/roadmap/enterprise_roadmap.md deleted file mode 100644 index 8ba8087..0000000 --- a/docs/main/roadmap/enterprise_roadmap.md +++ /dev/null @@ -1,55 +0,0 @@ ---- -title: Enterprise Roadmap -sidebar_position: 20 ---- - - -# Government, Commercial Hosters, Telco and Enterprise Roadmap - -We are working on the government, commercial hosters, telco and enterprise releases of our technology. - -> 90% of the work has been done as part of our base offering but we need additional features for enterprises. - -## Enterprise User Interface - -The current user interface is designed for an open-source tech audience. For enterprise use, we need a different approach to meet the unique needs of enterprise environments: - -- **Private or Hybrid Context**: All operations should be conducted within a private or hybrid cloud context to ensure security and compliance. -- **Enhanced Monitoring**: We need more comprehensive monitoring dashboard screens to provide real-time insights and analytics. -- **Identity Management Integration**: Integration with enterprise-grade Identity Management solutions, such as LDAP, Active Directory, and SSO (Single Sign-On), is essential. -- **Enterprise-Friendly UI**: The user interface needs to be redesigned to be more intuitive and tailored to enterprise users, focusing on usability and efficiency. -- **Token Irrelevance**: Tokens are not a priority in this context and should be de-emphasized in the solution. - -## Windows Support - -The virtual Machine technology we use does support Windows, but we need to do some further integration. - -## High Performance Network Integration - -- **Local Network Integration**: Zero-OS is designed to support a wide range of technologies, though additional integration work is required to optimize performance. -- **High-Speed Backbones**: We aim to support high-speed Ethernet and RDMA (Infiniband) based backbones. -- **Instrumentation Enhancements**: Additional instrumentation needs to be incorporated into Zero-OS to achieve optimal performance. -- **Target Performance**: Our goal is to achieve network speeds exceeding 100 Gbps. -- **Custom Integration**: We offer integration with selected network equipment from our customers, accommodating custom integration requirements. - -## High Performance Storage Block Device Integration - -Next to the existing already integrated storage backends we want to support a high performance redundant storage block device. - -- High performance redundant storage network -- Supports our high speed backbone as defined above -- Scalable to thousands of machines per cluster. -- Replication capability between zones. -- Custom Integration - - We offer integration with selected storage equipment from our customers, accommodating custom integration requirements. - -## Service Level Management - -- The system will have hooks and visualization for achievement of Service levels. -- This will allow a commercial service provider to get to higher revenue and better uptime management. - -## Support for Liquid Cooling Tanks - -- Do a test setup in liquid cooling rack or node. - - We can use our self-healing capabilities to manage in a better way. -- This is an integration effort, and not much code changes are needed. \ No newline at end of file diff --git a/docs/main/roadmap/hero_roadmap.md b/docs/main/roadmap/hero_roadmap.md deleted file mode 100644 index 4725927..0000000 --- a/docs/main/roadmap/hero_roadmap.md +++ /dev/null @@ -1,31 +0,0 @@ ---- -title: 'AI Agent Roadmap' -sidebar_position: 4 -hide_title: true ---- - - -## AI Agent High Level Roadmap - -3AI is our private AI agent. - -The first version of our 3AI enables the management of core services such as an innovative database backend, a autonomous decentralized git system, and the automatic integration and deployment of our workloads. - -This stack allows everyone to deploy scalable Web 2,3 and 4 apps on top of the TFGrid in a fully automated way. - - -| | Roadmap | Timing | -| -------------------------------- | -------------------------------------------------------------------------------------------------------------------- | ------ | -| 3AI Publisher | Publish websites, e-books, and more on top of the ThreeFold Grid | Q2 25 | -| 3AI CI = Continuous Integration | Easier to use Continuous Integration/Development, very powerfull, with multinode support | Q2 25 | -| 3AI Play | Integrate declarative automation and configuration management as part of wiki approach in 3AI Publisher | Q2 25 | -| 3AI Git | Alternative to centralized Github (based on Gitea), fully integrated on top of TFGrid | Q2 25 | -| 3AI DB | Flexible ultra redundant database stor with indexing, queries, stored procedures, super scalable replication | Q2 25 | -| 3AI OSIS | Object Storage and Index system | Q2 25 | -| 3AI WEB | Web framework, deployable globally on TFGrid, integrated with Mycelium Net and Names | Q2 25 | -| 3AI Monitor | Monitor all your different components on redundant monitoring stack | Q2 25 | -| 3AI Happs | 3AI natively supports Holochain HAPPS | Q3 25 | -| 3AI Actors | 3AI can serve actors which respond and act on OpenRPC calls ideal as backend for web or other apps | Q3 25 | -| 3AI Web 3 Gateway | 3AI aims to have native support for chosen Web3 partner solutions (Bitcoin, Ethereum, and more) | Q3 25 | - -All of the specs above are fully integrated with the Mycelium network and the ThreeFold Grid. diff --git a/docs/main/roadmap/high_level.md b/docs/main/roadmap/high_level.md deleted file mode 100644 index 5e8a2e2..0000000 --- a/docs/main/roadmap/high_level.md +++ /dev/null @@ -1,46 +0,0 @@ ---- -title: 'High Level Roadmap' -sidebar_position: 2 ---- - - -![](../img/roadmap.jpg) - -# Roadmap in Phases - -## Phase 1: Wave 1 of Companies, Leading to Our expertise (DONE) - -- Technology creation - - This was result of 20 years of evolution -- 7 startups acquired as part of this process -- Technology used globally by big vendors -- +600m USD in exits - -## Phase 2: Proof of Tech (DONE) - -- Open source technology launched globally -- +60,000,000 active vCPU -- Large scale proof of core technology -- Focus on early adoptors in tech space (Cloud, Web2, Web3, etc.) -- 50m USD funded by founders, community and farmers (people providing capacity) - -## Phase 3: Commercialization & Global Expansion (START) - -### Phase 3.1: Commercial Partners - -- ThreeFold Launches with commercial strategic partners - - Telco Operatators - - IT Integrators -- Enterprise roadmap delivered within 6 months - - This is mainly about integration, documentation and UI work -- Together with partners we deliver on the many projects which are in our funnel today, e.g., East Africa, Brazil - -### Phase 3.2: Large Scale Financancing for Infrastructure - -**Large Scaling Financing Round** - -- Financing for infrastructure projects (trillions available right now for infrastructures in emerging countries) -- Public STO (security token offering) - - This lets people around the world to co-own the infrastructure for their internet -- Large partnerships drive alternative to Tier 3 and 4 datacenters - diff --git a/docs/main/roadmap/tfgrid_roadmap.md b/docs/main/roadmap/tfgrid_roadmap.md deleted file mode 100644 index cce3211..0000000 --- a/docs/main/roadmap/tfgrid_roadmap.md +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "TFGrid Roadmap" -sidebar_position: 3 ---- - - -## TFGrid High Level Roadmap - -### Status Today - -The core offering is functioning effectively, maintained through a community-driven, best-effort approach. Currently, -there are no Service Level Agreements (SLAs) in place, and there should be increased visibility for users regarding their expectations for uptime, performance, and other service related requirements. - -The uptime and stability of Zero-OS are very good. - -Additionally, hardware compatibility is excellent, with most machines now supported out of the box. - - -| | Status today | SDK/API | Web UI | -| ----------------------- | ------------------------------------------------------------------------------------------------------------ | ------- | ------ | -| Zero-OS | Used for management of +30,000 logical CPU cores | yes | yes | -| Zero-Images (flists) | Basis for Zero-OS modules as well as replaces images for VM's ... | yes | yes | -| Zero-Images from Docker | convert docker through our Hub | yes | yes | -| Zero-Images Hub | ThreeFold is hosting some as well as everyone can install their own Hub | yes | yes | -| Mycelium Core | Integrated in Zero-OS for VM's as well s ZDB and monitoring | yes | yes | -| Mycelium Message Bus | Can be used by any developer for their own usecases | NA | NA | -| Unbreakable Storage | Usable for experts only, is reliably working for +6 years, +100 MB/sec per stream | yes | no | -| Unbreakable Filesystem | QSFS= usable for experts, is a fuse based filesystem on top of the QSS Core | yes | no | -| Zero-OS Kubernetes | Working very well, Integrated in ZOS, uses our overlay networks based on Wireguard, can use QSFS underneith. | yes | yes | -| Zero-OS VM's | The base of our service portfolio, missing is better service level management | yes | yes | -| Zero-OS Monitoring | Working well | yes | yes | -| Zero-OS VM Monitoring | Working well, can be retrieved through SDK | yes | yes | -| Zero-OS Web Gateway | Working well, but documentation not good enough, and not enough of them deployed | yes | yes | -| Zero-Boot | There are multiple ways active on how to deploy Zero-OS all are stateless and capable for full secure boot | yes | yes | - -### Planned new features: - -Considerable effort is being made to enable our partners to go into production; -however, for this initiative to truly succeed on planetary level, we need many more nodes deployed in the field. - -Below you can find some of the planned features of TFGrid 4.0 mainly to achieve ability to scale to hundred of thousand of nodes. - -| | Roadmap | Timing | -| ----------------------------------- | ---------------------------------------------------------------- | ------ | -| Zero-OS v4 (our next major release) | V4, without TFChain, mutual credit, marketplace | Q2/3 25 | -| Zero-Images from Docker | CI/CD integration (See 3AI CI/CD) | Q1 25 | -| Zero-Images Hub Integration | CI/CD integration (See 3AI CI/CD) no more need for separate Hub | Q1 25 | -| Mycelium Core | Just more hardening and testing | Q1 25 | -| Mycelium Message Bus | Replace our current RMB, all our own RPC over Mycelium | Q1 25 | -| Unbreakable Storage UI | Integration in UI, better documentation | Q1 25 | -| Unbreakable Filesystem UI | Integration in UI, better documentation | Q1 25 | -| Zero-OS VM's Cloud Slices | Integration 3AI CI, use cloud slices to manage | Q2 25 | -| Zero-OS Monitoring Docu | More docu and easier API | Q2 25 | -| Zero-OS Web Gateway Expansion | Need more deployed, better integration with new Mycelium | Q2 25 | -| Mycelium Names | In V4, name services | Q3 25 | -| Zero-OS Cloud,Storage,AI Slices | As part of marketplace for V4, flexible billing mutual credit | Q3 25 | -| FungiStor | A revolutionary different way how to deliver content | Q3 25 | -| Zero-Images on FungiStor | Can be stored on FungiStor | Q3 25 | diff --git a/docs/main/status.md b/docs/main/status.md deleted file mode 100644 index f5fbe96..0000000 --- a/docs/main/status.md +++ /dev/null @@ -1,28 +0,0 @@ ---- -title: 'Status' -sidebar_position: 5 -hide_title: true ---- - - -## Our Proof of Concept Network is Live - -![](img/status.png) - -Every day people expand the current ThreeFold V3 Grid, our decentralized proof of concept network, and deploy applications on it. - -The current network has shown that the concept and technology work. We are now going to the next step which is full blown commercialization. - -![](img/dashboard.png) - - -## Usable by Everyone for any other Usecase - -![](img/usable_by_all.png) - -A new Internet needs to be usable by any other usecase. - -## A Different Approach - -![](img/unique.png) - diff --git a/docs/main/team/_category_.json b/docs/main/team/_category_.json deleted file mode 100644 index 8d4e2eb..0000000 --- a/docs/main/team/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Our Story", - "position": 4, - "link": { - "type": "generated-index" - } - } \ No newline at end of file diff --git a/docs/main/team/img/exits.png b/docs/main/team/img/exits.png deleted file mode 100644 index 6e96676..0000000 Binary files a/docs/main/team/img/exits.png and /dev/null differ diff --git a/docs/main/team/img/ourworld.png b/docs/main/team/img/ourworld.png deleted file mode 100644 index cef1cb4..0000000 Binary files a/docs/main/team/img/ourworld.png and /dev/null differ diff --git a/docs/main/team/img/the_story.png b/docs/main/team/img/the_story.png deleted file mode 100644 index fc782a4..0000000 Binary files a/docs/main/team/img/the_story.png and /dev/null differ diff --git a/docs/main/team/img/world_records.png b/docs/main/team/img/world_records.png deleted file mode 100644 index a487f4d..0000000 Binary files a/docs/main/team/img/world_records.png and /dev/null differ diff --git a/docs/main/team/ourstory.md b/docs/main/team/ourstory.md deleted file mode 100644 index 9c51918..0000000 --- a/docs/main/team/ourstory.md +++ /dev/null @@ -1,31 +0,0 @@ ---- -title: Web 4 Story -sidebar_position: 1 ---- -# Our Story to Web 4. - -![](img/the_story.png) - -**Augmented Collective Intelligence: The Next Evolution of the Internet** - -Web 4 represents a bold reimagination of the internet, built to address the inefficiencies, vulnerabilities, and centralization of today's digital world. Unlike its predecessors, Web 4 doesn’t just add layers of technology—it reinvents the very foundation of the internet to prioritize decentralization, efficiency, and autonomy. - -In a world dominated by centralized cloud systems, Web 4 brings a much-needed shift. It eliminates costly dependencies, restores autonomy to users and nations, and ensures greater security. This new internet architecture focuses on decentralizing physical infrastructure while delivering seamless, self-healing applications. The result is a system designed for resilience and sustainability, capable of adapting to modern demands. - -### **Why Web 4 Matters** -While Web 2.0 centered on social connections and Web 3.0 introduced blockchain, Web 4 goes deeper—it rebuilds the core principles of the internet to address its long-standing flaws. At its heart is the **Autonomous Internet**, allowing countries and regions to control their own digital infrastructure and data, reducing reliance on global tech giants. It also introduces **DePIN (Decentralized Physical Infrastructure Networks)**, combining software and hardware into systems that deliver real-world impact. - -### **Proven and Operational** -Web 4 is no longer just a vision. Over the past eight years, it has evolved from a concept to a reality: -- **Global Reach**: Deployed in over 50 countries, Web 4 has proven its ability to handle large-scale applications. -- **Real-World Success**: Partnerships like Sikana, an education platform with billions of views, demonstrate how Web 4 reduces cloud costs while scaling globally. -- **Tangible Impact**: In East Africa, the creation of an Autonomous Digital Zone and CyberCity showcases Web 4’s ability to transform regions by enabling local infrastructure and governance. - -### **The Growing Ecosystem** -The Web 4 ecosystem continues to expand with groundbreaking innovations: -- **3AI**: Geo-aware artificial intelligence that adapts to local needs. -- **3Phone**: A secure, privacy-focused device. -- **3Router**: Encrypted network connectivity. -- **3Bot**: Self-healing applications that reduce downtime and improve reliability. - -With $65 million in investments and years of development, Web 4 has transitioned from a groundbreaking idea to a proven, operational reality. It offers a future where the internet is decentralized, resilient, and truly empowering for people and nations alike. diff --git a/docs/main/team/ourworld.md b/docs/main/team/ourworld.md deleted file mode 100644 index 50b1419..0000000 --- a/docs/main/team/ourworld.md +++ /dev/null @@ -1,64 +0,0 @@ ---- -title: 'OurWorld Venture Creator' -sidebar_position: 3 ---- - -# OurWorld Venture Creator - -![](img/ourworld.png) - -OurWorld envisions a transformative future built on the principles of autonomy across three key domains: internet, legal, and financial. By empowering individuals and organizations, it seeks to create a decentralized, sustainable, and fair ecosystem that redefines the way we interact with technology, governance, and the economy. - -**Internet Autonomy** lies at the heart of this vision, enabling everyone to become digitally autonomous. This means providing individuals with full control over their digital presence and assets, free from the reliance on centralized entities. OurWorld addresses the fundamental flaws of the current internet—such as lack of privacy, security vulnerabilities, and monopolization—by building a new foundation that ensures trust and freedom. Through technologies like Augmented Collective Intelligence, it fosters collaborative problem-solving and scalable innovation, creating a more inclusive and empowered digital society. - -**Legal Autonomy** focuses on creating fair, accessible, and innovative legal frameworks that prioritize human dignity and technological neutrality. This includes the establishment of Digital Autonomous Zones—legally independent hubs for digital innovation—and the development of a futuristic Cyber City spanning 700,000 square meters. Designed for co-living and co-working, this city will be a space where sustainability and collaboration thrive. Complementing these initiatives is a unique dispute resolution system that combines the analytical power of AI with the fairness of human judgment to deliver unbiased and equitable outcomes. - -**Financial Autonomy** aims to democratize financial systems, promoting inclusivity and resilience in an increasingly digital world. The Digital Freezone will also serve as a hub for financial innovation, supporting decentralized finance (DeFi) projects and providing a secure environment for trading regulated digital assets such as shares, gold, and cryptocurrencies. Regenerative investment models, such as Public-Private Partnerships, will fund sustainable and impactful projects, while advanced liquidity pool concepts will enhance market fluidity, creating accessible investment opportunities for everyone. - -By uniting these three pillars of autonomy, OurWorld is building a comprehensive system that empowers individuals and organizations to thrive. This vision seeks to foster a more equitable, resilient, and innovative global society, unlocking the potential for a truly decentralized future. - -### **1. TF9** -- **Description**: Next-generation Web 4 software company. -- **Key Features**: - - First platform capable of providing unmatched privacy, security, and unlimited scale. - - Lowest possible cost and energy usage for Web 2, 3, and 4. -- **Milestones**: - - Over 1 million users onboarded through its technology. -- **Goal**: Become a leading player in privacy-focused and scalable technology solutions. - ---- - -### **2. ThreeFold** -- **Description**: Decentralized Web 4 platform for the world. -- **Key Features**: - - Enables a decentralized platform for co-creating the future of the internet. - - Incorporates ACI and Augmented Collective Intelligence. -- **Goal**: Be one of the top 5 players in DePIN (Decentralized Physical Infrastructure Network). - ---- - -### **3. Sikana** -- **Description**: Essential life skills education platform. -- **Key Features**: - - Delivered over 2 billion courses globally. - - Aims to become the "Netflix of Education". -- **Goal**: Provide education to billions of people worldwide at virtually no cost. - ---- - -### **4. Autonomous Zone** -- **Description**: 100% autonomous, secure digital autonomy zone. -- **Key Features**: - - First-of-its-kind legal and financial infrastructure. - - Offers full autonomy and dispute resolution services. -- **Goal**: Achieve fair legal and financial independence for hundreds of millions of people within two years. - ---- - -### **5. OW Cyber City** -- **Description**: A +700,000 m² startup city. -- **Key Features**: - - Includes autonomous land and over 3,000 houses. - - Projected $600M revenue potential. -- **Goal**: Support 10,000 people in building a regenerative future. - diff --git a/docs/main/team/team.md b/docs/main/team/team.md deleted file mode 100644 index 5ac0641..0000000 --- a/docs/main/team/team.md +++ /dev/null @@ -1,17 +0,0 @@ ---- -title: 'Team' -sidebar_position: 2 ---- - -## We've Been Around... - -![](img/exits.png) - -We are part of a group of 5 companies which are hosted by OurWorld, a venture creator, in Mauritius. - - - -## World Records - -![](img/world_records.png) - diff --git a/docs/main/use_cases/_category_.json b/docs/main/use_cases/_category_.json deleted file mode 100644 index ee3e464..0000000 --- a/docs/main/use_cases/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Use Cases", - "position": 6, - "link": { - "type": "generated-index", - } - } \ No newline at end of file diff --git a/docs/main/use_cases/cloud.md b/docs/main/use_cases/cloud.md deleted file mode 100644 index cbcb660..0000000 --- a/docs/main/use_cases/cloud.md +++ /dev/null @@ -1,44 +0,0 @@ ---- -title: Cloud -sidebar_position: 2 ---- - - -![](img/cloud_users.png) - - -This infrastructure represents "Layer Zero," a foundational, decentralized alternative to traditional cloud providers, designed for workloads requiring high security, scalability, and sustainability. - -1. **Kubernetes Deployment**: - - Users can deploy Kubernetes clusters directly on the ThreeFold Grid. This enables container orchestration for applications requiring high scalability and availability. - -2. **Docker Container Support**: - - Docker containers can run on the 3Nodes, providing flexibility for developers and system administrators to package, distribute, and execute applications efficiently. - -3. **Virtual Machine Deployment**: - - Users can deploy virtual machines (VMs) on the ThreeFold Grid, offering isolated and customizable environments for applications. - -4. **Storage Solutions**: - - The ThreeFold Grid provides scalable storage, with 8,124,403 GB of SSD capacity, allowing for decentralized and secure data storage solutions. - -### Underlying Infrastructure - -- **Interconnected 3Nodes**: - - The 3Nodes collectively form a decentralized network that provides compute, storage, and networking capabilities. - - The network operates using Zero OS, a self-healing planetary operating system, ensuring reliability and scalability. - -### Advantages - -- **Decentralized and Autonomous Cloud**: - - The platform operates without central authority, ensuring data autonomy, security, and resilience. -- **Support for Web 2 and Web 3 Applications**: - - Workloads can range from traditional web applications to blockchain, AI, and metaverse-related solutions. - -## Dashboard - -![](../img/dashboard.png) - -## Get Started - -- [Explore the ThreeFold Dashboard](https://dashboard.grid.tf/) -- [Read the ThreeFold Manual](https://manual.grid.tf/) \ No newline at end of file diff --git a/docs/main/use_cases/country_state.md b/docs/main/use_cases/country_state.md deleted file mode 100644 index 1024d72..0000000 --- a/docs/main/use_cases/country_state.md +++ /dev/null @@ -1,112 +0,0 @@ ---- -title: 'Nation State Backbone' -sidebar_position: 5 -hide_title: true ---- - - -# ThreeFold as the Digital Backbone for a Nation State - - -![](img/container.png) - - -A nation has made the groundbreaking decision to transform its digital infrastructure using ThreeFold's decentralized ecosystem. Deployment is currently underway, creating an autonomous, scalable, and sustainable digital backbone that empowers its citizens, government, and businesses. - ---- - -## **Autonomous Digital Infrastructure** -- **Decentralized Ownership**: - The country is deploying its own network of **3Nodes** across its regions, establishing a fully autonomous, decentralized infrastructure. This ensures: - - **Full Data Autonomy**: Critical national data remains within its borders, eliminating reliance on foreign cloud providers. - - **Localized Compute and Storage**: Enhanced performance and energy efficiency by utilizing local nodes for all digital workloads. - -- **Thousands of Interconnected Internets**: - The ThreeFold Grid enables the country to establish its own "internet," fully independent yet interconnected with the global ThreeFold ecosystem. This architecture allows the nation to maintain control while benefiting from seamless international collaboration. - -- **Resilience**: - The decentralized design protects against cyberattacks, infrastructure failures, and geopolitical threats associated with centralized systems. - ---- - -## **Digital Governance and Services** -- **E-Government Platforms**: - The government is planning to deploy key services—such healthcare, education tools, and e-governance portals—to the ThreeFold Grid. - - These systems are being redesigned to: - - - Operate securely and efficiently. - - Offer faster access to citizens through local hosting. - - Reduce operational costs with sustainable infrastructure. - -- **Blockchain-Based Governance**: - - The country is planning to implement the **3Ledger** to modernize governance systems: - - - Processes like voting, land registration, public tenders, and welfare distribution are becoming more transparent and efficient through smart contracts. - - Transactions between citizens and the government are streamlined, reducing corruption and bureaucracy. - ---- - -## **Scalable Blockchain Integration** - -- **3Ledger as a Scalable Layer 2**: -- - The country is deploying **3Ledger** as a **Layer 2 blockchain**, handling local operations efficiently while remaining compatible with global public blockchains like Ethereum and Bitcoin. - - **Efficient Domestic Operations**: Taxation, social services, and local commerce are executed seamlessly on 3Ledger, avoiding the costs and delays of public blockchains. - - **Global Interoperability**: The country integrates public blockchains for international trade and diplomacy while keeping localized transactions fast and affordable. -ayments, and economic initiatives, while integrating with global crypto markets. - ---- - -## **Empowering Citizens with Personal AI** -- **Digital Representatives**: - Citizens are beginning to benefit from **personal AI agents** powered by ThreeFold’s **3AI**. These agents: - - Represent citizens in digital governance, enabling secure and private interactions with government systems like voting, tax filing, and welfare access. - - Manage personal data, ensuring it is shared only with explicit consent, aligning with data autonomy principles. - - Simplify everyday tasks, such as healthcare management, accessing education resources, or applying for government services. - -- **Streamlined Access to Services**: - AI agents are transforming how citizens interact with public services, removing bureaucratic barriers and ensuring faster, more personalized responses. - ---- - -## **A Decentralized Digital Economy** -- **Private Sector Innovation**: - Businesses within the country are preparing to leverage the decentralized infrastructure to deploy their own applications, marketplaces, and platforms. This fosters innovation and local economic growth while ensuring compatibility with global systems. - -- **Sustainable Development**: - By hosting services on ThreeFold’s energy-efficient infrastructure, the country is reducing the environmental impact of its digital economy. - ---- - -## **Tailored Autonomy and Regional Development** -- **Localized Governance**: - The deployment of 3Nodes in different regions is enabling a **federalized digital infrastructure**. Each region can: - - Operate its own nodes, applications, and services while remaining interconnected at the national level. - - Define governance structures and token economies tailored to local needs. - -- **Resilient Collaboration**: - While operating independently, the country’s infrastructure remains interconnected with the global ThreeFold Grid, enabling seamless collaboration with other nations, businesses, and institutions. - ---- - -## **Transforming Governance and Infrastructure** -- **National Defense**: - Sensitive data and defense applications are being hosted on autonomous infrastructure, ensuring maximum security and eliminating vulnerabilities associated with foreign dependencies. - -- **Education and Healthcare**: - Education platforms are being deployed to offer personalized learning experiences, powered by AI agents. Healthcare systems are securely managing citizens’ medical records, accessible only through their personal AI agents. - -- **Voting and Public Participation**: - National elections and public consultations are transitioning to 3Ledger, where citizens participate securely and transparently through their personal AI agents. - ---- - -## **A Model for Other Nations** -This nation is taking a leadership role in demonstrating how a decentralized infrastructure can redefine digital autonomy. By embracing ThreeFold, the country is: -- Building a digital backbone that ensures independence and resilience. -- Empowering its citizens with personal AI agents and secure, autonomous data ownership. -- Pioneering a sustainable and scalable infrastructure that fosters innovation and economic growth. - -This deployment marks a new era where nations can fully control their digital destinies, ensuring the security, prosperity, and well-being of their citizens in the digital age. As the rollout progresses, the country is setting an example for others to follow. \ No newline at end of file diff --git a/docs/main/use_cases/geo_aware_ai_agent.md b/docs/main/use_cases/geo_aware_ai_agent.md deleted file mode 100644 index 217d7ed..0000000 --- a/docs/main/use_cases/geo_aware_ai_agent.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: Geo Aware AI Agent -sidebar_position: 3 ---- - -![](../key_innovations_overview//ai/img/ai_agent0.png) - -> See the [3AI section](../key_innovations_overview/ai/ai_agent_how_it_works.md) for more information \ No newline at end of file diff --git a/docs/main/use_cases/img/cloud_users.png b/docs/main/use_cases/img/cloud_users.png deleted file mode 100644 index faba505..0000000 Binary files a/docs/main/use_cases/img/cloud_users.png and /dev/null differ diff --git a/docs/main/use_cases/img/container.png b/docs/main/use_cases/img/container.png deleted file mode 100644 index 36be401..0000000 Binary files a/docs/main/use_cases/img/container.png and /dev/null differ diff --git a/docs/main/use_cases/img/offline.png b/docs/main/use_cases/img/offline.png deleted file mode 100644 index 1babe25..0000000 Binary files a/docs/main/use_cases/img/offline.png and /dev/null differ diff --git a/docs/main/use_cases/img/tanzania.png b/docs/main/use_cases/img/tanzania.png deleted file mode 100644 index 58a28ba..0000000 Binary files a/docs/main/use_cases/img/tanzania.png and /dev/null differ diff --git a/docs/main/use_cases/img/trillion_market.png b/docs/main/use_cases/img/trillion_market.png deleted file mode 100644 index f565176..0000000 Binary files a/docs/main/use_cases/img/trillion_market.png and /dev/null differ diff --git a/docs/main/use_cases/network_state.md b/docs/main/use_cases/network_state.md deleted file mode 100644 index e10accd..0000000 --- a/docs/main/use_cases/network_state.md +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: 'Network State Backbone' -sidebar_position: 4 -hide_title: true ---- - - -## ThreeFold as the Digital Backbone for a Network State - -![](../internet_reinvented/img/architecture_high_level.png) - -The ThreeFold ecosystem, with its decentralized infrastructure, integrated 3Ledger, and 3AI, offers a transformative foundation for creating and managing network states. - - -### **1. Infrastructure for Network States** -- **Decentralized Computing, Storage, and Networking**: - - ThreeFold Grid's global network of 3Nodes provides the compute, storage, and networking resources required to support autonomous digital infrastructures. Every network state can deploy its own virtual "internet" on top of this decentralized backbone. - - **Scalability**: The infrastructure scales seamlessly with workload demands, making it ideal for network states with growing populations and digital ecosystems. - -- **Not One Internet, but Thousands**: - - Unlike the centralized internet, ThreeFold enables the creation of **thousands of interconnected internets**. Each network state can have its own dedicated infrastructure, ensuring autonomy, privacy, and independence while still being connected to the larger global ThreeFold ecosystem. - -- **Interoperability**: - - The infrastructure supports **Kubernetes, Docker, VMs, and storage**, making it compatible with a wide range of existing software and systems. This allows network states to build diverse services, from governance platforms to citizen services, all hosted on decentralized infrastructure. - ---- - -### **2. The Role of 3Ledger** -- **Integrated L2 Blockchain**: - - 3Ledger acts as a local, highly scalable Layer 2 blockchain solution that complements public blockchains. This makes ThreeFold: - - **Compatible with Any Blockchain**: Network states can use Ethereum, Bitcoin, or other public blockchains for transparency and global interaction while relying on 3Ledger for localized transactions, governance, and scalability. - - **Efficient and Scalable**: By handling high-throughput transactions locally on 3Ledger, network states avoid the high costs and slow speeds associated with public blockchains. - -- **Tokenized Economies**: - - Network states can issue their own tokens and run economic systems on 3Ledger, enabling seamless value exchange, governance, and community-building. - ---- - -### **3. Personal AI Agents as Digital Representatives** -- **The Role of 3AI**: - - Each citizen can have a **personal AI agent** powered by 3AI, which: - - Acts as their **digital representative** in the network state. - - Handles routine tasks, such as voting, identity verification, and resource allocation, while protecting the user’s privacy and autonomy. - - Offers personalized services like managing digital assets, participating in decentralized governance, and communicating with other agents. - -- **Empowering Individuals**: - - These personal AI agents are autonomous, ensuring that individuals maintain control over their data and digital interactions while benefiting from AI-driven efficiency. - ---- - -### **4. Building Autonomous and Interconnected Network States** -- **Customizable for Any Network State**: - - Each network state can deploy its own decentralized infrastructure on ThreeFold’s grid. They can define: - - Custom governance systems. - - Token economies. - - Privacy rules and communication protocols. - -- **Interconnection for Collaboration**: - - While each network state operates independently, they remain interconnected through ThreeFold’s decentralized backbone, fostering collaboration, trade, and knowledge exchange. - ---- - -### **Why ThreeFold Is Perfect for Network States** -- **Autonomy**: - - Complete ownership of infrastructure, data, and governance processes ensures independence from centralized authorities. -- **Sustainability**: - - Energy-efficient design aligns with the sustainability goals of many network states. -- **Interoperability**: - - Compatible with public blockchains and existing technologies, it bridges the gap between Web2 and Web3. -- **People-Centric**: - - The integration of personal AI agents empowers individuals to actively participate in their network state’s ecosystem. - -ThreeFold’s decentralized, scalable, and interoperable infrastructure creates the perfect foundation for building autonomous network states. Its design supports localized governance while ensuring global interconnectivity, making it a key enabler of the network state revolution. \ No newline at end of file diff --git a/docs/main/use_cases/overview.md b/docs/main/use_cases/overview.md deleted file mode 100644 index 7dd6389..0000000 --- a/docs/main/use_cases/overview.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: Overview -sidebar_position: 1 -description: Overview of the project ---- - -![](img/trillion_market.png) \ No newline at end of file diff --git a/static/img/favicon.png b/static/img/favicon.png deleted file mode 100644 index 40b4c0b..0000000 Binary files a/static/img/favicon.png and /dev/null differ diff --git a/static/img/new_logo_tft.png b/static/img/new_logo_tft.png deleted file mode 100644 index b07c72c..0000000 Binary files a/static/img/new_logo_tft.png and /dev/null differ diff --git a/static/img/tf_graph.png b/static/img/tf_graph.png deleted file mode 100644 index 0640dca..0000000 Binary files a/static/img/tf_graph.png and /dev/null differ diff --git a/tosort/architecture/_category_.json b/tosort/architecture/_category_.json deleted file mode 100644 index e2c2c4f..0000000 --- a/tosort/architecture/_category_.json +++ /dev/null @@ -1,5 +0,0 @@ -{ - "label": "Architecture", - "position": 10, - "link": {"type": "generated-index"} - } \ No newline at end of file diff --git a/tosort/architecture/architecture.md b/tosort/architecture/architecture.md deleted file mode 100644 index 8835258..0000000 --- a/tosort/architecture/architecture.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -sidebar_position: 1 ---- - - -# Base Layer for Many Usecases - -![](../img/usecases_tfgrid.png) - -Our Decentralized Cloud Technology the ideal platform for hosting any web3 and AI workloads. - -Our Zero-OS operating system also supports integrated GPUs, ensuring optimal performance for decentralized AI applications. - -> Any workload (web2/3 and AI) can run on on our Decentralized Cloud. diff --git a/tosort/architecture/cloudengine.md b/tosort/architecture/cloudengine.md deleted file mode 100644 index 87882f0..0000000 --- a/tosort/architecture/cloudengine.md +++ /dev/null @@ -1,27 +0,0 @@ ---- -sidebar_position: 2 ---- - - -# Architecture Cloud Engine - -![](../img/cloud_engine.jpg) - - - -The 3 Nodes form the base layer, providing compute, storage, and network capabilities. - -The quantum safe network enables all IT workloads to communicate with one another using the most efficient route and the strongest security measures. - -![](../img/cloudengine_architecture.png) - -The Storage layer make sure we all have perfect control over our storage and can never loose our information. - - - -## Autonomous Deployments - -![](../img/autonomous_workloads.png) - -The hero's can deploy and manage IT workloads on our behalf. - diff --git a/tosort/architecture/hero_virtual_admin.md b/tosort/architecture/hero_virtual_admin.md deleted file mode 100644 index ff2cc56..0000000 --- a/tosort/architecture/hero_virtual_admin.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -sidebar_position: 4 ---- - -# 3AI as Virtual System Administrator - -![](../img/virtual_sysadmin.jpg) - - -![](../img/3bot_virtualsysadmin.png) - -Every individual has a personal 3AI—a virtual assistant that manages your digital life and serves as your system administrator for AI or Edge Cloud workloads. - -These Heroes communicate with each other over the private Mycelium network, which offers a secure message bus for scalable and secure communication. - -A 3AI can store an unlimited amount of information, and only your 3AI has access to this data, deciding how and when it can be shared with other Heroes or AI systems. - -Active 24/7, your 3AI continuously monitors your IT infrastructure. If something goes wrong, the 3AI will automatically resolve the issue, ensuring smooth and uninterrupted service. - - -### Natural Evolution - -![](../img/hero_archit.png) - - - -We believe this represents the natural evolution away from reliance on centralized services. - -With millions of Heroes working together, can form a collective global intelligence, leveraging various tools to interact with existing services on behalf of their users within all safety of our own autonomy. - - - diff --git a/tosort/architecture/internet_arch.md b/tosort/architecture/internet_arch.md deleted file mode 100644 index 43a9c6c..0000000 --- a/tosort/architecture/internet_arch.md +++ /dev/null @@ -1,64 +0,0 @@ ---- -sidebar_position: 3 ---- - -# Architecture for an Upgraded Internet - - -![](../img/architecture.png) - -- **3Nodes**: Deliver compute, storage, and GPU capacity. -- **Mycelium Routers**: Allow all Mycelium Network participants to communicate with each other and also connect over existing Internet links. Mycelium Routers provide bandwidth to our ecosystem. -- **WebGateways**: Provide a bridge between the current Internet and the Mycelium Network. -- **3AI 3Bots**: Represent our digital lives and possess the knowledge to act as virtual system administrators, ensuring our IT workloads remain operational. -- **Users**: Arrange their digital lives through their 3AI 3Bots. -- **AI Clouds**: Are created by connecting GPUs from the 3Nodes over the Mycelium Network. - -## 3Nodes - -Each 3node provides compute, storage and network capacity, its the core capacity layer of the cloud. - -![](../img/3node.png) - -A cloud needs hardware/servers to function. Servers of all shapes and sizes can be added. The production of Cloud Capacity is called Farming and parties who add these servers to the grid are called Farmers. - -Farmers download the Zero-OS operating system and boot their servers. Once booted, these servers become 3Nodes. The 3Nodes will register themselves in a blockchain. Once registered, the capacity of the 3Nodes will become available. This enables a peer2peer environment for people or companies to reserve their Internet Capacity directly from the hardware but yet allowing full control by commercial parties if that would be required. - -Each 3Node is running our Zero-OS operating system. - -## Mycelium Routers - -Mycelium is an end-to-end encrypted overlay meshed wireless network with agents available for any desktop and mobile operating system. - -We have also created a dedicated Mycelium Router. Mycelium Routers seamlessly integrate with our Mycelium network technology, efficiently selecting the shortest path between all participants. - -These Mycelium Routers are compatible not only with Satelite, Wi-Fi but also with 4G and 5G networks, ensuring versatile connectivity options. - -The Mycelium Routers can be installed in locations with substantial network capacity, allowing everyone to bridge between the current Internet and the overlay Mycelium network. - -## Web Gateways - -The Web Gateway serves as a mechanism to connect the private (overlay) networks (Mycelium) to the open Internet. - -By not providing an open and direct path into the private network, many malicious phishing and hacking attempts are stopped at the Web Gateway level for container applications. - -The Web Gateways provide HTTP(S) and, in the future, other web services, which get forwarded to the relevant service exposing itself over Mycelium. This setup offers multiple access points to various backend services. - - -## TFChain: Our Blockchain - -This blockchain does the following: - -- registry for all 3bots (identity system, aka phonebook) -- registry for all farmers & 3nodes -- registry for our reputation system -- info as required for the Smart Contract for IT - -This is the hart of our operational system of our decentralized cloud. - - -## Ultra Scalable - -![](../img/architecture_scalable.png) - -This architecture scales to the planet. \ No newline at end of file diff --git a/tosort/features/compute/zkube.md b/tosort/features/compute/zkube.md deleted file mode 100644 index 74ee4c3..0000000 --- a/tosort/features/compute/zkube.md +++ /dev/null @@ -1,34 +0,0 @@ ---- -sidebar_position: 5 -title: ZKube ---- - - -# ZKube - -TFGrid is compatible with Kubernetes Technology. - -![](../../img/kubernetes_0.jpg) - -### Unique for our Kubernetes implementation - -- The Kubernetes networks are on top of our Mycelium technology which means all traffic between containers and kubernetes hosts is end2end encrypted independent of where your Kubernetes nodes are deployed. -- You can mount a Quantum Safe Storage System underneath a Kubernetes Node (VM), which means that you can deploy containers on top of QSFS to host unlimited amounts of storage in a super safe way. -- You Kubernetes environment is for sure 100% decentralized, you define where you want to deploy your Kubernetes nodes and only you have access to the deployed workloads on the TFGrid. - -### Features - -* integration with znet (efficient, secure encrypted network between the zero_vms) -* can be easily deployed at the edge -* single-tenant! - - - -### Architecture - -![](../../img/zkube_architecture.jpg) - diff --git a/tosort/roadmap/_category_.json b/tosort/roadmap/_category_.json deleted file mode 100644 index 4f1803e..0000000 --- a/tosort/roadmap/_category_.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "label": "Roadmap", - "position": 6, - "link": { - "type": "generated-index", - } - } \ No newline at end of file