Merge pull request 'update book for typos' (!4) from development_2 into main

Reviewed-on: #4
This commit is contained in:
mik-tf 2025-01-21 00:49:41 +00:00
commit 0ca5bcb69d
43 changed files with 273 additions and 265 deletions

View File

@ -4,7 +4,7 @@ sidebar_position: 5
hide_title: true hide_title: true
--- ---
## Hero and data ## Hero and Data
![](img/ai_data.png) ![](img/ai_data.png)
@ -14,7 +14,7 @@ hide_title: true
The ThreeFold system ensures that your data can never be lost, corrupted, or hacked by leveraging **Zero Knowledge Quantum Safe Encoding** and a **unique dispersal algorithm**. Heres how it works: The ThreeFold system ensures that your data can never be lost, corrupted, or hacked by leveraging **Zero Knowledge Quantum Safe Encoding** and a **unique dispersal algorithm**. Heres how it works:
#### **1. Geo-Aware and Distributed Data Storage** #### **1. Geo Aware and Distributed Data Storage**
- **Data Location Control**: Through your Hero, you decide where your data is stored. This means your data can be distributed across multiple geographically relevant locations, ensuring proximity and compliance with regional data sovereignty laws. - **Data Location Control**: Through your Hero, you decide where your data is stored. This means your data can be distributed across multiple geographically relevant locations, ensuring proximity and compliance with regional data sovereignty laws.
- **Dispersal Algorithm**: Your data is fragmented into smaller pieces, encoded, and distributed across multiple independent storage nodes (3Nodes). These pieces are stored in a way that no single node—or even a group of nodes—can reconstruct the data. - **Dispersal Algorithm**: Your data is fragmented into smaller pieces, encoded, and distributed across multiple independent storage nodes (3Nodes). These pieces are stored in a way that no single node—or even a group of nodes—can reconstruct the data.
@ -32,4 +32,4 @@ The ThreeFold system ensures that your data can never be lost, corrupted, or hac
#### **5. You Always Stay in Control** #### **5. You Always Stay in Control**
- Your Hero is the sole gatekeeper for your data. With it, you can choose the level of redundancy, control data retention, and ensure your information aligns with your needs while staying completely private. - Your Hero is the sole gatekeeper for your data. With it, you can choose the level of redundancy, control data retention, and ensure your information aligns with your needs while staying completely private.
In this architecture, your data is geo-aware, secure, and accessible only to you. No centralized server or third-party authority can compromise your information, making it future-proof and reliable for all your digital interactions. In this architecture, your data is geo aware, secure, and accessible only to you. No centralized server or third-party authority can compromise your information, making it future-proof and reliable for all your digital interactions.

View File

@ -4,7 +4,7 @@ sidebar_position: 6
hide_title: true hide_title: true
--- ---
## Hero and network ## Hero and Network
![](img/ai_network.png) ![](img/ai_network.png)

View File

@ -4,7 +4,7 @@ sidebar_position: 7
hide_title: true hide_title: true
--- ---
## Hero on a phone ## Hero on a Phone
![](img/phone.png) ![](img/phone.png)

View File

@ -4,15 +4,15 @@ sidebar_position: 10
hide_title: true hide_title: true
--- ---
### Roadmap for Full Deployment # Roadmap for Full Deployment
#### **Q2: Phone Delivery with Basic Features (Alpha)** ## **2025 Q2: Phone Delivery with Basic Features (Alpha)**
- **Phone Launch**: - **Phone Launch**:
- Deliver the first batch of phones with essential functionality and hardware. - Deliver the first batch of phones with essential functionality and hardware.
- Integrate **Hero** with core tasks (calendar, email, search, and chat). - Integrate **Hero** with core tasks (calendar, email, search, and chat).
- **Hero**: - **Hero**:
- our AI agent is the core of the phone - Our AI agent is the core of the phone.
- **Core Infrastructure**: - **Core Infrastructure**:
- Establish connection to the **Mycelium Network** for basic peer-to-peer connectivity (Wi-Fi, 5G, satellite). - Establish connection to the **Mycelium Network** for basic peer-to-peer connectivity (Wi-Fi, 5G, satellite).
- Enable **end-to-end encryption** for all communication. - Enable **end-to-end encryption** for all communication.
@ -24,7 +24,7 @@ hide_title: true
--- ---
#### **Q3: Feature Expansion and Usability Improvements (Beta)** ## **2025 Q3: Feature Expansion and Usability Improvements (Beta)**
- **Enhanced Hero Functionality**: - **Enhanced Hero Functionality**:
- Expand Heros capabilities to include meeting transcription, advanced task automation, and customizable workflows. - Expand Heros capabilities to include meeting transcription, advanced task automation, and customizable workflows.
- Improve conversational interfaces for better natural language understanding. - Improve conversational interfaces for better natural language understanding.
@ -35,13 +35,13 @@ hide_title: true
- Enable personal blockchain functionality for secure logging and auditing of activities. - Enable personal blockchain functionality for secure logging and auditing of activities.
- Integrate with select private and public blockchains for Web3 applications. - Integrate with select private and public blockchains for Web3 applications.
- **Data Control**: - **Data Control**:
- Introduce **geo-aware storage controls**, allowing users to select storage locations across regions. - Introduce **geo aware storage controls**, allowing users to select storage locations across regions.
- **Web3 Integration**: - **Web3 Integration**:
- Seamless interaction with public blockchains for decentralized finance (DeFi), NFT management, and Web3 apps. - Seamless interaction with public blockchains for decentralized finance (DeFi), NFT management, and Web3 apps.
--- ---
#### **Q4: Enterprise and Business Use Cases** ## **2025 Q4: Enterprise and Business Use Cases**
- **Enterprise Integration**: - **Enterprise Integration**:
- Provide support for enterprise-level applications, including private blockchain solutions. - Provide support for enterprise-level applications, including private blockchain solutions.
- Enable secure access to government and corporate systems via **Hero**. - Enable secure access to government and corporate systems via **Hero**.
@ -54,7 +54,7 @@ hide_title: true
--- ---
#### **Q1 Next Year: Full Ecosystem Rollout** ## **2026 Q1: Full Ecosystem Rollout**
- **Mass Production**: - **Mass Production**:
- Scale up phone production with stable software, targeting a wider audience. - Scale up phone production with stable software, targeting a wider audience.
- **Hero Sovereign Network**: - **Hero Sovereign Network**:
@ -65,7 +65,7 @@ hide_title: true
--- ---
#### **Q2 Next Year: Global Adoption and Continuous Innovation** ## **2026 Q2: Global Adoption and Continuous Innovation**
- **Global Availability**: - **Global Availability**:
- Expand phone delivery to more regions with localized features. - Expand phone delivery to more regions with localized features.
- **Network State Deployment**: - **Network State Deployment**:

View File

@ -11,13 +11,14 @@ sidebar_position: 2
Most cloud & internet stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure. Most cloud & internet stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure.
**Quick Fixes and Additions** ## Quick Fixes and Additions
- **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue. - **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue.
- **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched. - **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched.
## Painkiller Approach: Treating Symptoms, Not Causes
### Painkiller Approach: Treating Symptoms, Not Causes This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges.
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems.

View File

@ -1,10 +1,10 @@
--- ---
title: 'Hardware Is Powerfull' title: 'Hardware Is Powerful'
sidebar_position: 6 sidebar_position: 6
hide_title: true hide_title: true
--- ---
# Hardware Is Powefull # Hardware Is Poweful
![](img/hardware_comparison.png) ![](img/hardware_comparison.png)
@ -20,15 +20,13 @@ This highlights a regression in our ability to fully utilize computer hardware.
We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential.  We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential. 
## Why are servers so badly used? ## Why Are Servers So Badly Used?
![](img/layers.png) ![](img/layers.png)
Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Here's a simplified explanation: Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Below, we provide a simplified explanation.
--- ## Why Context Switches Are a Problem
## Why Context Switches Are a Problem:
### What Are Context Switches? ### What Are Context Switches?
@ -54,31 +52,30 @@ Each switch requires saving and loading the state of a process. This takes time
- Instead of performing tasks like running applications or processing data, the computer is stuck managing unnecessary complexity. - Instead of performing tasks like running applications or processing data, the computer is stuck managing unnecessary complexity.
### Simplified Analogy: ## Simplified Analogy
Imagine driving on a highway where you have to stop and pay a toll at every intersection. You waste more time paying tolls than actually driving to your destination. Similarly, excessive context switches in modern systems cause the computer to "stop and pay tolls" constantly, leaving little time for real work. Imagine driving on a highway where you have to stop and pay a toll at every intersection. You waste more time paying tolls than actually driving to your destination. Similarly, excessive context switches in modern systems cause the computer to "stop and pay tolls" constantly, leaving little time for real work.
### How did we get here: ## How Did We Get Here
![](img/eng_model_failing.png) ![](img/eng_model_failing.png)
## How do we resolve this problem. ## How to Resolve This Problem
We decided to reinvent the way an operating system functions in a cloud and data center context. We decided to reinvent the way an operating system functions in a cloud and data center context.
While leveraging the Linux kernel, we rebuilt many surrounding tools to minimize complexity and reduce context switching. While leveraging the Linux kernel, we rebuilt many surrounding tools to minimize complexity and reduce context switching.
This approach results in significantly improved security, scalability, and sustainability. This approach results in significantly improved security, scalability, and sustainability.
> [see here for more information about our operating system called Zero-OS](../key_innovations_overview/compute/zos_compute.md) > [See here for more information about our operating system called Zero-OS](../key_innovations_overview/compute/zos_compute.md)
--------
--------
### Context Switching Details ### Context Switching Details
In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time. In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time.
### How It Works
Here's how a context switch typically works in Linux: Here's how a context switch typically works in Linux:
1. **Interrupt Handling**: When a higher-priority process needs to run or an event requiring immediate attention occurs (such as I/O completion), the CPU interrupts the currently running process. 1. **Interrupt Handling**: When a higher-priority process needs to run or an event requiring immediate attention occurs (such as I/O completion), the CPU interrupts the currently running process.
@ -91,6 +88,8 @@ Here's how a context switch typically works in Linux:
5. **Execution**: The newly loaded process begins executing on the CPU. 5. **Execution**: The newly loaded process begins executing on the CPU.
### Overhead and Performance Impact
Context switches are essential for multitasking, but they come with overhead that can impact system performance: Context switches are essential for multitasking, but they come with overhead that can impact system performance:
1. **Time Overhead**: Context switches require time to save and restore process states, as well as to perform scheduling decisions. This overhead adds up, especially in systems with many processes frequently switching contexts. 1. **Time Overhead**: Context switches require time to save and restore process states, as well as to perform scheduling decisions. This overhead adds up, especially in systems with many processes frequently switching contexts.

View File

@ -20,7 +20,7 @@ Security is another area where TCP/IP falls short. It wasnt designed with cyb
Modern services and devices have also outgrown the static design of TCP/IP. The system assumes that servers and devices stay in fixed locations, but todays internet is dynamic. Cloud services, mobile devices, and apps often move across networks. This static model creates inefficiencies and slows down the system. Modern services and devices have also outgrown the static design of TCP/IP. The system assumes that servers and devices stay in fixed locations, but todays internet is dynamic. Cloud services, mobile devices, and apps often move across networks. This static model creates inefficiencies and slows down the system.
Adding to the problem is the internets dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions could lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable. Adding to the problem is the internets dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions can lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable.
> The stakes are high. The internet is essential for communication, education, business, and so much more. Yet its foundation is crumbling under modern demands. Without major changes, well see more frequent failures, slower services, and increased vulnerabilities. In extreme cases, parts of the internet could break entirely. > The stakes are high. The internet is essential for communication, education, business, and so much more. Yet its foundation is crumbling under modern demands. Without major changes, well see more frequent failures, slower services, and increased vulnerabilities. In extreme cases, parts of the internet could break entirely.
@ -29,15 +29,16 @@ To fix this, we need a smarter, more resilient approach. Decentralized networks
> The bottom line is clear: the internets outdated foundation is holding us back. If we want the internet to remain reliable and serve future generations, we must address these issues now. A decentralized, secure, and modernized internet isnt just a technical upgrade—its a necessity for our connected world. > The bottom line is clear: the internets outdated foundation is holding us back. If we want the internet to remain reliable and serve future generations, we must address these issues now. A decentralized, secure, and modernized internet isnt just a technical upgrade—its a necessity for our connected world.
## Tech brief (only for the experts) ## Tech Brief
The following tech brief is aimed at experts.
### 1. **Lack of Session Management** ### 1. **Lack of Session Management**
- **TCP/IPs Shortcomings:** - **TCP/IPs Shortcomings**
- TCP/IP lacks true session management. A session represents an ongoing communication between two entities (e.g., a user browsing a website). If the connection is interrupted (e.g., due to a network outage or device change), the session is lost, and applications must restart or recover manually. - TCP/IP lacks true session management. A session represents an ongoing communication between two entities (e.g., a user browsing a website). If the connection is interrupted (e.g., due to a network outage or device change), the session is lost, and applications must restart or recover manually.
- This flaw creates inefficiencies in modern applications that require reliable, continuous communication, such as video calls, gaming, or IoT devices. - This flaw creates inefficiencies in modern applications that require reliable, continuous communication, such as video calls, gaming, or IoT devices.
- **Why It Matters:** - **Why It Matters**
- Every time a session breaks, applications have to rebuild connections at a higher level (e.g., re-authenticate or restart a video call). This is inefficient and increases complexity, making the internet fragile and less resilient. - Every time a session breaks, applications have to rebuild connections at a higher level (e.g., re-authenticate or restart a video call). This is inefficient and increases complexity, making the internet fragile and less resilient.
@ -45,58 +46,58 @@ To fix this, we need a smarter, more resilient approach. Decentralized networks
### 2. **Layer Violations** ### 2. **Layer Violations**
- **The Problem:** - **The Problem**
- TCP/IP combines different functionalities into a single stack, leading to inefficiencies. For example: - TCP/IP combines different functionalities into a single stack, leading to inefficiencies. For example:
- Routing decisions happen at the IP layer. - Routing decisions happen at the IP layer.
- Reliable data transfer happens at the TCP layer. - Reliable data transfer happens at the TCP layer.
- However, these layers are not isolated and often interfere with each other, creating unnecessary overhead. - However, these layers are not isolated and often interfere with each other, creating unnecessary overhead.
- **Impact:** - **Impact**
- Modern networks require additional layers (e.g., firewalls, VPNs, NATs) to patch these issues, making the architecture increasingly complex and brittle. - Modern networks require additional layers (e.g., firewalls, VPNs, NATs) to patch these issues, making the architecture increasingly complex and brittle.
--- ---
### 3. **No Built-In Security** ### 3. **No Built-In Security**
- **TCP/IP Design Flaw:** - **TCP/IP Design Flaw**
- Security was not a priority when TCP/IP was designed. The protocols do not inherently protect against common threats like spoofing, hijacking, or denial of service. - Security was not a priority when TCP/IP was designed. The protocols do not inherently protect against common threats like spoofing, hijacking, or denial of service.
- IPv6 introduces some improvements, such as built-in IPsec, but these are optional and often not used, leaving the same vulnerabilities. - IPv6 introduces some improvements, such as built-in IPsec, but these are optional and often not used, leaving the same vulnerabilities.
- **Impact:** - **Impact**
- Every modern application must implement its own security mechanisms (e.g., HTTPS, VPNs), leading to duplicated efforts and inconsistent protections. - Every modern application must implement its own security mechanisms (e.g., HTTPS, VPNs), leading to duplicated efforts and inconsistent protections.
--- ---
### 4. **Scalability Issues** ### 4. **Scalability Issues**
- **IPv4 vs. IPv6:** - **IPv4 vs. IPv6**
- IPv4, with its 32-bit addressing, exhausted available addresses, leading to NAT (Network Address Translation) as a workaround. This introduced complexity and broke the end-to-end connectivity principle of the internet. - IPv4, with its 32-bit addressing, exhausted available addresses, leading to NAT (Network Address Translation) as a workaround. This introduced complexity and broke the end-to-end connectivity principle of the internet.
- IPv6, with 128-bit addressing, solves the address exhaustion problem but does not address underlying issues like routing table explosion or inefficiencies in the protocol stack. - IPv6, with 128-bit addressing, solves the address exhaustion problem but does not address underlying issues like routing table explosion or inefficiencies in the protocol stack.
- **Routing Problems:** - **Routing Problems**
- The lack of built-in session and naming management makes routing inefficient. Large routing tables and decentralized updates slow down the internet and make it harder to scale. - The lack of built-in session and naming management makes routing inefficient. Large routing tables and decentralized updates slow down the internet and make it harder to scale.
--- ---
### 5. **No Support for Application-Centric Networking** ### 5. **No Support for Application-Centric Networking**
- **TCP/IPs Assumption:** - **TCP/IPs Assumption**
- The protocol assumes communication happens between fixed endpoints (e.g., IP addresses). Modern applications, however, focus on data and services rather than specific endpoints. For example: - The protocol assumes communication happens between fixed endpoints (e.g., IP addresses). Modern applications, however, focus on data and services rather than specific endpoints. For example:
- Cloud applications may move across data centers. - Cloud applications may move across data centers.
- Mobile devices frequently change networks. - Mobile devices frequently change networks.
- TCP/IPs static model is incompatible with this dynamic, service-oriented world. - TCP/IPs static model is incompatible with this dynamic, service-oriented world.
- **Impact:** - **Impact**
- Workarounds like DNS (Domain Name System) and CDNs (Content Delivery Networks) add layers of complexity, but theyre still built on a flawed foundation. - Workarounds like DNS (Domain Name System) and CDNs (Content Delivery Networks) add layers of complexity, but theyre still built on a flawed foundation.
--- ---
### RINA: A Better Alternative ### RINA: A Better Alternative
The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Heres how RINA addresses these issues: The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Heres how RINA addresses these issues[^1]:
1. **Unified Layering:** 1. **Unified Layering**
- Unlike TCP/IP, which has rigid and distinct layers, RINA uses recursive layers. Each layer provides the same functionalities (e.g., routing, security, session management), simplifying the architecture. - Unlike TCP/IP, which has rigid and distinct layers, RINA uses recursive layers. Each layer provides the same functionalities (e.g., routing, security, session management), simplifying the architecture.
2. **Built-In Session Management:** 2. **Built-In Session Management**
- RINA natively supports session management, ensuring continuity and reliability for modern applications, even in the face of interruptions. - RINA natively supports session management, ensuring continuity and reliability for modern applications, even in the face of interruptions.
3. **Application-Centric Networking:** 3. **Application-Centric Networking:**
@ -108,11 +109,4 @@ The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the f
5. **Simplified Routing and Scaling:** 5. **Simplified Routing and Scaling:**
- RINA reduces the size and complexity of routing tables, making the network easier to scale and manage. - RINA reduces the size and complexity of routing tables, making the network easier to scale and manage.
- **Source:** [^1]: [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)
- [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)
---
### More info
more info [https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)

View File

@ -6,9 +6,9 @@ hide_title: true
![](img/geo_aware2.png) ![](img/geo_aware2.png)
## Geo Awareness is the Solution for many of the Internet Problems ## Geo Awareness is the Solution for Many of the Internet Problems
The problems: ### The Problems
- [Compare Electricity](../internet_today/compare_electricity.md) - Compares the inefficiency of relying on distant internet infrastructure to the absurdity of using electricity generated on the other side of the world. - [Compare Electricity](../internet_today/compare_electricity.md) - Compares the inefficiency of relying on distant internet infrastructure to the absurdity of using electricity generated on the other side of the world.
- [Internet Basics](../internet_today/internet_basics.md) - Explains the three fundamental layers of the internet: compute/AI/storage, network, and applications, highlighting current centralization issues. - [Internet Basics](../internet_today/internet_basics.md) - Explains the three fundamental layers of the internet: compute/AI/storage, network, and applications, highlighting current centralization issues.
@ -26,9 +26,9 @@ The problems:
| ---------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------- | | ---------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------- |
| **Centralization** | Dominated by a few corporations; creates fragility and dependency. | Often more Decentralized, but lacks local autonomy; often relies on centralized validators and still datacenters. | Fully decentralized and location-specific, empowering local infrastructure and sovereignty. | | **Centralization** | Dominated by a few corporations; creates fragility and dependency. | Often more Decentralized, but lacks local autonomy; often relies on centralized validators and still datacenters. | Fully decentralized and location-specific, empowering local infrastructure and sovereignty. |
| **Data Sovereignty** | Data stored in centralized data centers controlled by corporations. | Decentralized storage, but users often lack control over physical location. | Users choose specific locations for data storage, ensuring sovereignty and privacy. | | **Data Sovereignty** | Data stored in centralized data centers controlled by corporations. | Decentralized storage, but users often lack control over physical location. | Users choose specific locations for data storage, ensuring sovereignty and privacy. |
| **Infrastructure Resilience** | Vulnerable to disasters, geopolitical issues, and single points of failure. | Often less resilient compared to Web2 (^1) | Shortest physical paths and local redundancies ensure continued operation during disruptions. New paths are found when needed even by using nodes from your friends | | **Infrastructure Resilience** | Vulnerable to disasters, geopolitical issues, and single points of failure. | Often less resilient compared to Web2. | Shortest physical paths and local redundancies ensure continued operation during disruptions. New paths are found when needed even by using nodes from your friends. |
| **Economic Impact (GDP Negative)** | High costs for infrastructure; revenue flows to global platforms. | The validators are still too centralized and often hosted in centralized datanceters. Too complicated and too early days to help right now. | Localized infrastructure boosts regional economies, keeping revenue within countries. | | **Economic Impact (GDP Negative)** | High costs for infrastructure; revenue flows to global platforms. | The validators are still too centralized and often hosted in centralized datanceters. Too complicated and too early days to help right now. | Localized infrastructure boosts regional economies, keeping revenue within countries. |
| **Internet Efficiency** | Long data routes; underutilized hardware; inefficient layers. | Reliant on outdated protocols, vulnerable because of used ledger tech (^1) and layered inefficiencies. | Shortest paths reduce latency and cost; full hardware optimization ensures efficiency. | | **Internet Efficiency** | Long data routes; underutilized hardware; inefficient layers. | Reliant on outdated protocols, vulnerable because of used ledger tech and layered inefficiencies. | Shortest paths reduce latency and cost; full hardware optimization ensures efficiency. |
| **Security and Transparency** | Complex, security by smart employees of the corporations. | Smart contracts improve security, but issues remain as code upgrade path. | Transparent and tamper-proof deployments ensure security and resilience. | | **Security and Transparency** | Complex, security by smart employees of the corporations. | Smart contracts improve security, but issues remain as code upgrade path. | Transparent and tamper-proof deployments ensure security and resilience. |
| **Layer Complexity** | Redundant layers create inefficiencies and fragility. | Often web3 is more complex compared to web 2. | Simplifies architecture by localizing compute, storage, and networking. 10x less development effort is possible | | **Layer Complexity** | Redundant layers create inefficiencies and fragility. | Often web3 is more complex compared to web 2. | Simplifies architecture by localizing compute, storage, and networking. 10x less development effort is possible |
| **Application Hosting** | Hosted in large centralized data centers, increasing latency and cost. | Sometimes, decentralized hosting but not geographically optimized. | Applications can be hosted locally, reducing latency and ensuring autonomy. | | **Application Hosting** | Hosted in large centralized data centers, increasing latency and cost. | Sometimes, decentralized hosting but not geographically optimized. | Applications can be hosted locally, reducing latency and ensuring autonomy. |
@ -37,7 +37,7 @@ The problems:
### Challenges in the Current Depin (Decentralized Internet) World ## Challenges in the Current Depin (Decentralized Internet) World
Despite advancements in decentralized technology, geo-awareness remains under-prioritized. Despite advancements in decentralized technology, geo-awareness remains under-prioritized.
@ -45,7 +45,7 @@ Current Web3 solutions focus on decentralization without accounting for the geog
--- ---
### Comparison Table: Current Web3 Solutions vs. Geo-Aware Systems ## Comparison Table: Current Web3 Solutions vs. Geo-Aware Systems
| **Feature** | **Current Web3 Solutions** | **Geo-Awareness** | | **Feature** | **Current Web3 Solutions** | **Geo-Awareness** |
@ -55,12 +55,12 @@ Current Web3 solutions focus on decentralization without accounting for the geog
| **Network** | Relies on global, non-optimized routing | Shortest physical path for communication | | **Network** | Relies on global, non-optimized routing | Shortest physical path for communication |
| **Ledger** | Public blockchains are unreliable in case of network issues | Location-aware sovereign ledgers for national and local control | | **Ledger** | Public blockchains are unreliable in case of network issues | Location-aware sovereign ledgers for national and local control |
| **Resilience** | Vulnerable to global internet disruptions | Independent operation during outages | | **Resilience** | Vulnerable to global internet disruptions | Independent operation during outages |
| **Application Control** | Limited transparency on app deployment locations and upgrade paths. | Full control and visibility of app deployment | | **Application Control** | Limited transparency on app deployment locations and upgrade paths | Full control and visibility of app deployment |
| **Data Integrity** | Prone to distributed risks and complexities | Tamper-proof, user-controlled data access | | **Data Integrity** | Prone to distributed risks and complexities | Tamper-proof, user-controlled data access |
--- ---
### Why Geo-Awareness Matters ## Why Geo-Awareness Matters
The current centralized and globalized digital architecture exacerbates inefficiencies, compromises sovereignty, and creates economic dependencies. Geo-awareness addresses these problems by creating a decentralized yet location-sensitive framework. This ensures that infrastructure is resilient, secure, and operates in harmony with the physical realities of the world, ultimately empowering users and nations alike. The current centralized and globalized digital architecture exacerbates inefficiencies, compromises sovereignty, and creates economic dependencies. Geo-awareness addresses these problems by creating a decentralized yet location-sensitive framework. This ensures that infrastructure is resilient, secure, and operates in harmony with the physical realities of the world, ultimately empowering users and nations alike.

View File

@ -7,9 +7,9 @@ sidebar_position: 1
![](img/ai_agents_centralized.png) ![](img/ai_agents_centralized.png)
**Within 2 years we will no longer be using all those hundreds of apps, but we will be talking to AI driven agents.** **Within the next two years, we will no longer be using all those hundreds of apps, but we will be talking to AI driven agents.**
### **The Role of AI in Our Lives** ## **The Role of AI in Our Lives**
- Right now, humans interact with the internet mainly through apps on their phones, computers, and other devices. - Right now, humans interact with the internet mainly through apps on their phones, computers, and other devices.
- In the near future (within 2 years), apps will fade into the background, and **AI-driven agents** will become the primary way we interact with technology. For example, instead of using multiple apps for messaging, shopping, or searching, you might simply ask an AI assistant to handle all those tasks through conversation. - In the near future (within 2 years), apps will fade into the background, and **AI-driven agents** will become the primary way we interact with technology. For example, instead of using multiple apps for messaging, shopping, or searching, you might simply ask an AI assistant to handle all those tasks through conversation.
@ -18,20 +18,20 @@ sidebar_position: 1
### **The Race for Intelligence** ## **The Race for Intelligence**
![](img/race_intelligence.png) ![](img/race_intelligence.png)
The world is in a rapid phase of technological advancement, driven by innovations in AI, quantum computing, and biotechnology. The world is in a rapid phase of technological advancement, driven by innovations in AI, quantum computing, and biotechnology.
**Key milestones in internet history:** ### **Key Milestones in Internet History**
- **1960s:** The internet started as a free and open platform, allowing people to share ideas, collaborate, and connect directly. - **1960s:** The internet started as a free and open platform, allowing people to share ideas, collaborate, and connect directly.
- **20002024:** The internet has become increasingly controlled by large corporations. These companies dominate through data collection and commercial interests, compromising the internets original vision of freedom and openness. - **20002024:** The internet has become increasingly controlled by large corporations. These companies dominate through data collection and commercial interests, compromising the internets original vision of freedom and openness.
- **2025 and Beyond:** Large corporations are now racing to develop **Artificial General Intelligence (AGI)**—AI systems that can think and reason like humans. This raises concerns about centralization, control, and ethical use. - **2025 and Beyond:** Large corporations are now racing to develop **Artificial General Intelligence (AGI)**—AI systems that can think and reason like humans. This raises concerns about centralization, control, and ethical use.
### **A Vision for the Future** ## **A Vision for the Future**
Instead of leaving the future of AI in the hands of a few powerful corporations, there is a push to create **Augmented Collective Intelligence.** Instead of leaving the future of AI in the hands of a few powerful corporations, there is a push to create **Augmented Collective Intelligence.**

View File

@ -23,7 +23,9 @@ Decentralized, geo-aware, and sovereign internet infrastructure.
3. **Decentralized Infrastructure Layers:** 3. **Decentralized Infrastructure Layers:**
- **Unbreakable Network Layer**: Provides robust connectivity with resilience to failures and attacks. - **Unbreakable Network Layer**: Provides robust connectivity with resilience to failures and attacks.
- **Unbreakable Storage Layer**: Offers decentralized, reliable, and secure data storage. - **Unbreakable Storage Layer**: Offers decentralized, reliable, and secure data storage.
- Together, these layers form an "Unbreakable Cloud Engine," ensuring continuity and reliability.
Together, these layers form an "Unbreakable Cloud Engine," ensuring continuity and reliability.
4. **Sovereign Quantum Compute:** 4. **Sovereign Quantum Compute:**
- A computational layer designed for sovereignty, allowing nations or organizations to maintain control over their infrastructure and data. - A computational layer designed for sovereignty, allowing nations or organizations to maintain control over their infrastructure and data.

View File

@ -26,7 +26,7 @@ sidebar_position: 5
The storage layer is designed to ensure that data can never be lost or corrupted. This is achieved through: The storage layer is designed to ensure that data can never be lost or corrupted. This is achieved through:
- **Unbreakable Geo Aware Data Storage**: Data is fragmented and distributed across multiple nodes in the network. Even if some nodes fail, the remaining fragments are sufficient to reconstruct the original data. - **Unbreakable Geo Aware Data Storage**: Data is fragmented and distributed across multiple nodes in the network. Even if some nodes fail, the remaining fragments are sufficient to reconstruct the original data.
- **Ultra Efficient**: This system is ultra efficient, up to 10x less hard disks needed. - **Ultra Efficient**: This system is ultra efficient, up to 10x less hard disks needed.
- **Geo Aware**: The user has full control over where the data is and only his/her application or AI agent can get access to this data. - **Geo Aware**: Users have full control over where the data is and only their applications or AI agents can get access to this data.
- **Self-Healing Mechanism**: If a storage fragment becomes unavailable or damaged, the system automatically regenerates the broken data. - **Self-Healing Mechanism**: If a storage fragment becomes unavailable or damaged, the system automatically regenerates the broken data.
- **Immutable Storage**: The architecture prevents unauthorized modifications, maintaining data integrity, data can never be lost. - **Immutable Storage**: The architecture prevents unauthorized modifications, maintaining data integrity, data can never be lost.
@ -38,7 +38,7 @@ sidebar_position: 5
## Sovereign Quantum Compute & AI Layer ## Sovereign Quantum Compute & AI Layer
- **Solving the Worlds Serious Issues**: - **Solving the Worlds Serious Issues**:
The quantum compute layer introduces unparalleled computational power, capable of tackling complex problems that classical systems struggle with, such as: The quantum compute layer introduces unparalleled computational power, capable of tackling complex problems that classical systems struggle with, such as:
- **Climate Modeling**: Simulating intricate environmental systems to predict and mitigate climate change. - **Climate Modeling**: Simulating intricate environmental systems to predict climate patterns.
- **Medical Research**: Accelerating drug discovery and personalized medicine development. - **Medical Research**: Accelerating drug discovery and personalized medicine development.
- **Optimization Problems**: Enhancing logistics, energy usage, and resource allocation for global efficiency. - **Optimization Problems**: Enhancing logistics, energy usage, and resource allocation for global efficiency.

View File

@ -7,18 +7,19 @@ title: 'Inventions'
![](img/inventions.png) ![](img/inventions.png)
All life for years, in our Proof of Concept generation 3 network, see https://dashboard.grid.tf/ Live in production mode for years, our generation 3 network represents our proof of concept.
## Hero = our 3AI Agent Technology > [Explore the ThreeFold Dashboard](https://dashboard.grid.tf/)
## Hero = Our 3AI Agent Technology
![](../ai_agent/img/ai_agent.png) ![](../ai_agent/img/ai_agent.png)
- Personal Private Ledger with Offline Capabilities - Personal private ledger with offline capabilities
- Autonomous Self Healing deployments. - Autonomous self-healing deployments
- Integrated with our Unbreakable Data & Network Layer (Mycelium) - Integrated with Mycelium, our unbreakable data & network layer
- Super intelligent, good mix between rule based data and AI LLM interactions. - Super intelligent
- Full peer2peer operation. - A good mix between rule-based data and AI LLM interactions
- Full peer-to-peer operations
> Will launch in Q2 2025, this is the end result of + 10 years of development.
> This technology will be launched in Q2 2025, this is the end result of more than 10 years of development.

View File

@ -7,23 +7,22 @@ draft: true
![](../img/farming_pools.jpg) ![](../img/farming_pools.jpg)
# Trust is everything. # Trust is Everything
While affordability is a factor, the primary appeal of AI & Internet services lies in their reliability, scalability, and performance. While affordability is a factor, the primary appeal of AI & internet services lies in their reliability, scalability, and performance.
This parallels the concept of insurance, where customers are willing to pay a premium for the assurance of superior service and uptime. This parallels the concept of insurance, where customers are willing to pay a premium for the assurance of superior service and uptime.
In the decentralized infrastructure (DePIN) space, establishing trust and reliability is super important, but not enough available in current offerings. In the decentralized infrastructure (DePIN) space, establishing trust and reliability is super important, but not sufficiently available in current offerings.
## Cost vs. Quality ## Cost vs. Quality
### Reliability and Uptime ### Reliability and Uptime
Customers often prefer to pay a higher price for cloud, AI, Internet services that guarantee better uptime and reliability. Customers often prefer to pay a higher price for cloud, AI, internet services that guarantee better uptime and reliability.
For example, paying $10 per terabyte for a service with stellar uptime and customer support is more appealing than a $5 per terabyte service with frequent downtimes and minimal support. The value proposition lies in uninterrupted access to data and services, which is critical for business op For example, paying $10 per terabyte for a service with stellar uptime and customer support is more appealing than a $5 per terabyte service with frequent downtimes and minimal support. The value proposition lies in uninterrupted access to data and services, which is critical for business operations.
erations.
### Service Level Agreements (SLAs) ### Service Level Agreements (SLAs)

View File

@ -1,13 +1,13 @@
--- ---
title: 'Centralization Risk' title: 'Centralization Risks'
sidebar_position: 3 sidebar_position: 3
--- ---
# Centralization Risk # Centralization Risks
![](img/blocked.png) ![](img/blocked.png)
### Why Countries Need Their Own Infrastructure ## Why Countries Need Their Own Infrastructure
The internet is not just cables; its a combination of physical infrastructure (like data centers and servers), software, and services that enable global communication and access to information. When countries dont have control over their own infrastructure, they become overly dependent on external, centralized providers, which is risky for several reasons: The internet is not just cables; its a combination of physical infrastructure (like data centers and servers), software, and services that enable global communication and access to information. When countries dont have control over their own infrastructure, they become overly dependent on external, centralized providers, which is risky for several reasons:
@ -22,13 +22,13 @@ The internet is not just cables; its a combination of physical infrastructure
--- ---
### Ukraine: A Real-Life Example of Infrastructure Targeting ## Ukraine: A Real-Life Example of Infrastructure Targeting
In the early stages of the war in Ukraine, one of the first targets was the country's data centers and communication infrastructure. Bombing these centers disrupted access to critical systems, cutting off communication and data services. This highlighted the vulnerability of relying on centralized or exposed infrastructure during conflicts. In the early stages of the war in Ukraine, one of the first targets was the country's data centers and communication infrastructure. Bombing these centers disrupted access to critical systems, cutting off communication and data services. This highlighted the vulnerability of relying on centralized or exposed infrastructure during conflicts.
--- ---
### The Risks of Relying on Centralized Services Like Google or Microsoft ## The Risks of Relying on Centralized Services Like Google or Microsoft
1. **Single Point of Failure** 1. **Single Point of Failure**

View File

@ -1,17 +1,16 @@
--- ---
title: 'Something to think about.'
sidebar_position: 1 sidebar_position: 1
--- ---
# Something to think about.' # Something to Think About...
## Would a country do this? ## Would a Country Do This?
![](img/electricity.png) ![](img/electricity.png)
Imagine this: Would it make sense to rely on electricity thats generated far away, on the other side of the world? Youd need a super expensive cable to bring it to you, and if that cable breaks, youd lose power completely. No country would ever choose to do this because its costly, inefficient, and risky. Imagine this: Would it make sense to rely on electricity thats generated far away, on the other side of the world? Youd need a super expensive cable to bring it to you, and if that cable breaks, youd lose power completely. No country would ever choose to do this because its costly, inefficient, and risky.
## Why is +70% of the world doing it for the Internet? ## Why is +70% of the World Doing it for the Internet?
![](img/we_are_doing_it_for_internet.png) ![](img/we_are_doing_it_for_internet.png)

View File

@ -36,8 +36,8 @@ Only 50% of world has decent access to Internet, let's recap the issues.
--- ---
### **5. Not to forget less than 50% of world has decent internet.** ### **5. Less than 50% of world has decent internet**
![alt text](img/fortune.png) ![alt text](img/fortune.png)
And we should not forget the internet is only available to 50% of the world Finally, we should not forget that the internet is only available to 50% of the world!

View File

@ -15,7 +15,7 @@ The concept of "Internet GDP negative" in this context highlights the economic d
### 1. **Loss of Revenue from Booking Sites** ### 1. **Loss of Revenue from Booking Sites**
- Platforms like global booking and e-commerce websites often charge high commission fees, which results in local businesses losing a significant portion of their revenue. - Platforms like global booking and e-commerce websites often charge high commission fees, which results in local businesses losing a significant portion of their revenue.
- **Impact:** Instead of money circulating within the local economy, it is extracted and transferred to the countries where these platforms are headquartered. - **Impact:** Instead of money circulating within the local economy, it is extracted and transferred to the countries where these platforms are headquartered.
- **For a small country like Zanzibar the impact of centralized booking sites means a loss of 200m USD per year** - For a small country like Zanzibar **the impact of centralized booking sites means a loss of 200m USD per year**.
### 2. **Loss of Advertising and Marketing Dollars** ### 2. **Loss of Advertising and Marketing Dollars**
- Companies within countries purchase online advertisements primarily on platforms like Google, Facebook, and others. These platforms are headquartered in a handful of nations, meaning most of the advertising revenue flows out. - Companies within countries purchase online advertisements primarily on platforms like Google, Facebook, and others. These platforms are headquartered in a handful of nations, meaning most of the advertising revenue flows out.

View File

@ -1,9 +1,9 @@
--- ---
title: 'More than cables' title: 'More Than Cables'
sidebar_position: 2 sidebar_position: 2
--- ---
# Internet is more than the cables. # Internet is More Than the Cables
@ -13,26 +13,26 @@ sidebar_position: 2
1. Compute, AI & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below). 1. Compute, AI & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below).
2. Network: this is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and for most countries very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity. 2. Network: This is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and, for most countries, very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity.
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable. 3. Applications: Currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
We are providing a more optimized solution for the first 2 layers and allows everyone else to build on top. We are providing a more optimized solution for the first 2 layers and allows everyone else to build on top.
## The role of Internet Cables. ## The Role of Internet Cables
Digital information mainly travels over large fiber backbone links as pictured here. Digital information mainly travels over large fiber backbone links as pictured below.
![](img/internet_cables.png) ![](img/internet_cables.png)
The Internet as we know it has significantly diverged from its original intent. If 2 people in e.g. Zanzibar (an Island in Africa) use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted and back again. The Internet as we know it has significantly diverged from its original intent. For example, if two people in Zanzibar, an Island in Africa, use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted, and back again.
This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be. This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be.
![](img/absurd.png) ![](img/absurd.png)
## The role of datacenters. ## The Role of Datacenters
![](img/this_is_our_internet.png) ![](img/this_is_our_internet.png)

View File

@ -1,4 +1,5 @@
--- ---
title: Introduction
sidebar_position: 1 sidebar_position: 1
slug: / slug: /
--- ---
@ -6,26 +7,26 @@ slug: /
![](img/web0.png) ![](img/web0.png)
Welcome to the future of the Internet, **Web 0**, a logical evolution that rethinks and reinvents the foundations of how we connect, communicate, and collaborate globally. Welcome to the future of the internet, **Web 0**, a logical evolution that rethinks and reinvents the foundations of how we connect, communicate, and collaborate globally.
The Internet is burdened with inefficiencies, risks, and a growing dependency on centralization. The internet is burdened with inefficiencies, risks, and a growing dependency on centralization.
**This legacy has left over 50% of the world without decent access, widened economic gaps, and exposed critical vulnerabilities.** **This legacy has left over 50% of the world without decent internet access, widened economic gaps, and exposed critical vulnerabilities.**
#### **The Challenges We Face** ### **The Challenges We Face**
- **Centralization Risks**: Our digital lives are controlled by a few corporations, compromising sovereignty and increasing fragility. - **Centralization Risks**: Our digital lives are controlled by a few corporations, compromising sovereignty and increasing fragility.
- **Economic Loss of GDP**: The Internet has become GDP-negative for many nations, funneling resources out of local economies into global giants. - **Economic Loss of GDP**: The internet has become GDP-negative for many nations, funneling resources out of local economies and into global giants.
- **Outdated Infrastructure**: TCP/IP, the Internet's core protocol, was never designed for the complexities of today, leading to inefficiency, security flaws, and waste. - **Outdated Infrastructure**: TCP/IP, the internet's core protocol, was never designed for the complexities of today, leading to inefficiency, security flaws, and waste.
- **Environmental and Economic Inefficiency**: Over 70% of the world relies on distant infrastructure, making access expensive, unreliable, and dependent on fragile global systems. - **Environmental and Economic Inefficiency**: Over 70% of the world relies on distant infrastructure, making access expensive, unreliable, and dependent on fragile global systems.
--- ---
### **Our Vision** ### **Our Vision**
**Web 0** is not just an alternative; its the reinvention of the Internet as it was meant to be: local, decentralized, and resilient. **Web 0** is not just an alternative; its the reinvention of the internet as it was meant to be: local, decentralized, and resilient.
By addressing core issues and optimizing the Internet's foundational layers, we enable: By addressing core issues and optimizing the internet's foundational layers, we enable:
1. **Decentralized AI, Compute and Storage**: Bringing autonomy and reliability to your doorstep, eliminating the inefficiencies of centralized data centers. 1. **Decentralized AI, Compute and Storage**: Bringing autonomy and reliability to your doorstep, eliminating the inefficiencies of centralized data centers.
2. **Smarter Networking**: Keeping data local whenever possible, reducing costs and boosting performance. Invent new algoritms to fix some of the serious issues TCP (the current internet protocol) is facing. 2. **Smarter Networking**: Keeping data local whenever possible, reducing costs and boosting performance. Invent new algoritms to fix some of the serious issues TCP (the current internet protocol) is facing.
@ -33,7 +34,7 @@ By addressing core issues and optimizing the Internet's foundational layers, we
![](img/evolution.png) ![](img/evolution.png)
**Web 0 is here. Its ready. Its a logival evolution. Its scalable.** **Web 0 is here. Its ready. It's a logical evolution. Its scalable.**
> Its time to restore control, privacy, and equality to the digital age. > Its time to restore control, privacy, and equality to the digital age.
@ -45,5 +46,5 @@ By addressing core issues and optimizing the Internet's foundational layers, we
This is more than technology, its about sovereignty, security, and sustainability. Web 0 empowers local communities, restores economic balance, and ensures that no one is left behind in our connected world. This is more than technology, its about sovereignty, security, and sustainability. Web 0 empowers local communities, restores economic balance, and ensures that no one is left behind in our connected world.
Join us in embracing the Internet we all deserve—a resilient, decentralized, and equitable global network. Together, we can ensure a brighter digital future. Join us in embracing the internet we all deserve—a resilient, decentralized, and equitable global network. Together, we can ensure a brighter digital future.

View File

@ -1,38 +1,45 @@
--- ---
title: Geo-Aware Cloud title: Geo Aware Cloud
sidebar_position: 3 sidebar_position: 3
--- ---
## Zero OS as a generator for Compute, Storage, Network capacity ## Capacity Generator
### Compute (uses CU) Zero OS can be conceived as a generator for compute, storage, network capacity.
### Compute Features
- ZKube - ZKube
- kubernetes deployment - Kubernetes deployment
- Zero VM - Zero VM
- the container or virtual machine running inside ZOS - The container or virtual machine running inside ZOS
- CoreX - CoreX
- process manager (optional), can be used to get remote access to your zero_vm - Process manager (optional), can be used to get remote access to your zero_vm
A 3Node is a Zero-OS enabled computer which is hosted with any of the Cloud Providers. A 3Node is a Zero-OS enabled computer which is hosted with any of the Cloud Providers.
### There are 4 storage mechanisms which can be used to store your data: ### Storage Mechanisms
- ZOS FS There are 4 storage mechanisms which can be used to store your data
- is our dedupe unique filesystem, replaces docker images.
- ZOS Filesystem
- This is our dedupe unique filesystem, replaces docker images.
- ZOS Mount - ZOS Mount
- is a mounted disk location on SSD, this can be used as faster storage location. - This is a mounted disk location on SSD, this can be used as faster storage location.
- Quantum Safe Filesystem - Quantum Safe Filesystem
- this is a super unique storage system, data can never be lost or corrupted. Please be reminded that this storage layer is only meant to be used for secondary storage applications. - This is a super unique storage system, data can never be lost or corrupted. Please be reminded that this storage layer is only meant to be used for secondary storage applications.
- ZOS Disk - ZOS Disk
- a virtual disk technology, only for TFTech OEM partners. - A virtual disk technology, only for TFTech OEM partners.
### There are 4 ways how networks can be connected to a Z-Machine. ### Network Connections
There are three ways how networks can be connected to a Z-Machine.
- Mycelium = Planetary network - Mycelium = Planetary network
- is a planetary scalable network, we have clients for windows, osx, android and iphone. - This is a planetary scalable network
- We have clients for Windows, OSx, Android and iPhone.
- ZOS NIC - ZOS NIC
- connection to a public ipaddress - Connection to a public IP address.
- WEB GW - WEB GW
- web gateway, a secure way to allow internet traffic reach your secure Z-Machine. - Web gateway, a secure way to allow internet traffic reach your secure Z-Machine.

View File

@ -7,7 +7,7 @@ description: The computer layer compared.
| | Zos Compute Layer Benefits | Default | | | Zos Compute Layer Benefits | Default |
|----------------|--------------------------------------------------------------------------------|------------------------------------------------------------------| |----------------|--------------------------------------------------------------------------------|------------------------------------------------------------------|
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized e.g. Kubernetes, ... | | Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized e.g. Kubernetes, etc. |
| OS Deploy | Stateless, there are no files copied on local HDD/SSD. | Deploy image or execute installer on a physical server | | OS Deploy | Stateless, there are no files copied on local HDD/SSD. | Deploy image or execute installer on a physical server |
| OS Upgrade | Seamless, rolling upgrades, 100% modular and pre-deterministic, decentralized | Difficult and error prone + vulnerable from security perspective | | OS Upgrade | Seamless, rolling upgrades, 100% modular and pre-deterministic, decentralized | Difficult and error prone + vulnerable from security perspective |
| Tamperproof | If file gets modified Zero-OS will not boot the file. | No, man in middle is possible. | | Tamperproof | If file gets modified Zero-OS will not boot the file. | No, man in middle is possible. |
@ -18,5 +18,5 @@ description: The computer layer compared.
| Sovereign | Yes | Mostly not. | | Sovereign | Yes | Mostly not. |
| Complexity | Anyone can do it, we made it to allow everyone to be a provider. | Real experts needed. | | Complexity | Anyone can do it, we made it to allow everyone to be a provider. | Real experts needed. |
> We do not compare our system with those that claim to be full cloud solutions but merely deploy containers using other management systems and optionally connect to a blockchain for billing purposes. Nor do we compare with marketplace systems that simply act as frontends for other systems. We believe these systems, while visually impressive, lack substantial technological foundations and cannot serve as a fundamental base layer for others. > We do not compare our system with those that claim to be full cloud solutions but merely deploy containers using other management systems and optionally connect to a blockchain for billing purposes, nor do we compare our system with marketplace systems that simply act as frontends for other systems. We believe these systems, while visually impressive, lack substantial technological foundations and cannot serve as a fundamental base layer for others.

View File

@ -5,7 +5,7 @@ description: 'Everyone can build on top of the ThreeFold new internet'
# hide_title: true # hide_title: true
--- ---
## Zero-OS is easy to dploy ## Zero-OS is Easy to Deploy
![](img/zos_simple.png) ![](img/zos_simple.png)

View File

@ -37,4 +37,4 @@ Flists provide the flexibility to manage metadata and data as separate entities,
### Status ### Status
Usable for years, see Zero-OS. Usable for years, [see Zero-OS](./zos_compute.md) for more information.

View File

@ -10,11 +10,11 @@ The Zero-OS is delivered to the 3Nodes over the internet network (network boot)
### 3Node Install ### 3Node Install
1. Deploy a computer 1. Deploy a computer.
2. Configure a farm on the TFGrid explorer 2. Configure a farm on the TFGrid explorer.
3. Download the bootloader and put on a USB stick or configure a network boot device 3. Download the bootloader and put on a USB stick or configure a network boot device.
4. Power on the computer and connect to the internet 4. Power on the computer and connect to the internet.
5. Boot! The computer will automatically download the components of the operating system (Zero-OS) 5. Boot! The computer will automatically download the components of the operating system (Zero-OS).
The actual bootloader is very small, it brings up the network interface of your computer and queries TFGrid for the remainder of the boot files needed. The actual bootloader is very small, it brings up the network interface of your computer and queries TFGrid for the remainder of the boot files needed.
@ -24,9 +24,9 @@ The mechanism to allow this to work in a safe and efficient manner is an innovat
### Process ### Process
- optionally: configure booting from secure BIOS - Optionally: Configure booting from secure BIOS.
- optionally: install signing certificate in the BIOS, to make sure that only the right bootloader can be started - Optionally: Install signing certificate in the BIOS, to make sure that only the right bootloader can be started.
- the bootloader (ISO, PXE, USB, ...) get's downloaded from Internet (TFGrid CDN or private deployment) - The bootloader (ISO, PXE, USB, etc.) gets downloaded from the internet (TFGrid CDN or private deployment).
- core-0 (the first boot process) starts, self verification happens - Core-0 (the first boot process) starts and self verification happens.
- the metadata for the the required software modules is downloaded and checked against signature and hashes - The metadata for the the required software modules is downloaded and checked against signature and hashes .
- the core-0 zero_image service - The core-0 zero image service starts.

View File

@ -1,5 +1,5 @@
--- ---
title: 'ZOS - geo-aware OS' title: 'ZOS - Geo Aware OS'
sidebar_position: 1 sidebar_position: 1
description: The computer layer description: The computer layer
hide_title: true hide_title: true
@ -8,12 +8,12 @@ hide_title: true
![](img/zos_intro.png) ![](img/zos_intro.png)
# ZOS - geo-aware OS # ZOS - Geo Aware OS
ThreeFold has developed its own operating system, Zero-OS, which is based on the Linux Kernel. The purpose of Zero-OS is to strip away the unnecessary complexities commonly found in contemporary operating systems. ThreeFold has developed its own operating system, Zero-OS, which is based on the Linux Kernel. The purpose of Zero-OS is to strip away the unnecessary complexities commonly found in contemporary operating systems.
### Imagine An Operating System With The Following Benefits ## Imagine An Operating System With The Following Benefits
- Up to 10x more efficient for certain workloads (e.g. storage) - Up to 10x more efficient for certain workloads (e.g. storage)
- No install required - No install required
@ -28,7 +28,7 @@ ThreeFold has developed its own operating system, Zero-OS, which is based on the
> We have created an operating system from scratch. We used the Linux kernel and its components and then built further on it. We have been able to achieve all of the above benefits. > We have created an operating system from scratch. We used the Linux kernel and its components and then built further on it. We have been able to achieve all of the above benefits.
## Requirements: ## Requirements
- **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators. - **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators.
- **Simplicity**: An operating system should be simple, able to exist anywhere for anyone, and be good for the planet. - **Simplicity**: An operating system should be simple, able to exist anywhere for anyone, and be good for the planet.
@ -36,7 +36,7 @@ ThreeFold has developed its own operating system, Zero-OS, which is based on the
## Key Features of Zero-OS: ## Key Features of Zero-OS
Zero-OS is designed with minimalism in mind, supporting only a few fundamental primitives that handle essential low-level functions: Zero-OS is designed with minimalism in mind, supporting only a few fundamental primitives that handle essential low-level functions:
@ -52,9 +52,9 @@ Default features:
- Integrated unique storage & network primitives - Integrated unique storage & network primitives
- Integrated smart contract for IT layer - Integrated smart contract for IT layer
## benefits ## Benefits
- No need to work with images, we work with our unique ZOS FS - No need to work with images, we work with our unique ZOS filesystem
- Every container runs in a dedicated virtual machine providing more security - Every container runs in a dedicated virtual machine providing more security
- The containers talk to each other over a private network (Mycelium) - The containers talk to each other over a private network (Mycelium)
- The containers can use a web gateway to allow internet users to connect to the applications which are running in their secure containers - The containers can use a web gateway to allow internet users to connect to the applications which are running in their secure containers

View File

@ -1,17 +0,0 @@
---
sidebar_position: 1
---
# Geo Aware Sovereign AI Agent
![](../ai_agent/img/ai_agent.png)
> ask us for more information, the result of +10 years of research.
unique
- integrated personal blockchain with offline support (can even run on phone)
- revolutionary backend database called OSIS with structured record (+10,000 records per second on a phone)
- unbreakable network & data storage layer integration (in the phone and cloud)
- easy to use very powerful development language with +30,000 github stars.
- development 10x less time required compared to alternative web3 mechanisms.

View File

@ -1,14 +1,17 @@
--- ---
sidebar_position: 20 sidebar_position: 1
--- ---
# Energy Efficient # Geo Aware Sovereign AI Agent
Below are some of the ways in which we achieve energy efficiency as compared to traditional models. ![](../ai_agent/img/ai_agent.png)
![](img/energy_efficiency.png) > Ask us for more information, the result of +10 years of research.
In addition, a decentralized peer-to-peer infrastructure which finds the shortest path between end points is by nature energy-efficient. Data needs to travel a much shorter distance. Our technology is unique:
> Depending on the use case the our approach can lead to 10x energy savings.
- Integrated personal blockchain with offline support (can even run on phone).
- Revolutionary backend database called OSIS with structured record (+10,000 records per second on a phone).
- Unbreakable network & data storage layer integration (in the phone and cloud).
- Easy to use very powerful development language with +30,000 github stars.
- Development 10x less time required compared to alternative web3 mechanisms.

View File

@ -0,0 +1,14 @@
---
sidebar_position: 20
---
# Energy Efficient
Below are some of the ways in which we achieve energy efficiency as compared to traditional models.
![](img/energy_efficiency.png)
In addition, a decentralized peer-to-peer infrastructure which finds the shortest path between end points is by nature energy-efficient. Data needs to travel a much shorter distance.
> Depending on the use case the our approach can lead to 10x energy savings.

View File

@ -12,15 +12,15 @@ Any participating node only stores small incomplete parts of objects (files, pho
## Benefits ## Benefits
- Not even a quantum computer can hack - Not even a quantum computer can hack.
- Zetabytes can be stored as easily as Petabytes - Zetabytes can be stored as easily as Petabytes.
- The system is truly autonomous & self healing - The system is truly autonomous & self healing.
- Datarot is detected and fixed. - Datarot is detected and fixed.
- There is 100% contorl over where data is (GDPR) - There is 100% contorl over where data is (GDPR).
## Peer2Peer Advantages ## Peer-to-Peer Advantages
Peer2peer provides the unique proposition of selecting storage providers that match your application and service of business criteria. For example, you might be looking to store data for your application in a certain geographic area (for governance and compliance) reasons. You might also want to use different "storage policies" for different types of data. Examples are live versus archived data. All of these uses cases are possible with this storage architecture, and could be built by using the same building slice produced by farmers and consumed by developers or end-users. Peer-to-peer provides the unique proposition of selecting storage providers that match your application and service of business criteria. For example, you might be looking to store data for your application in a certain geographic area (for governance and compliance) reasons. You might also want to use different "storage policies" for different types of data. Examples are live versus archived data. All of these uses cases are possible with this storage architecture, and could be built by using the same building slice produced by farmers and consumed by developers or end-users.
> There is 100% control over where the data is positioned and the security is incredible. > There is 100% control over where the data is positioned and the security is incredible.

View File

@ -12,9 +12,9 @@ description: 'compare how its dont in other overlay network systems.'
| Post Quantum | Possible (ask us) | No | | Post Quantum | Possible (ask us) | No |
| Scalability | Yes, this system exists +10 years, is being used by large orgs for zetabytes. | Some systems, most not, but centralized. | | Scalability | Yes, this system exists +10 years, is being used by large orgs for zetabytes. | Some systems, most not, but centralized. |
| Compatibility | Yes thanks to filesystem approach | Depends, often not | | Compatibility | Yes thanks to filesystem approach | Depends, often not |
| Backdoors | NO, all is based on opensource | ? | | Backdoors | No, everything is based on open-source code | ? |
| Performance | Is not a super fast system but good for most cases, +- 100 MB / sec per content creator. | Variable, hard to say, some are | | Performance | Is not a super fast system but good for most cases, +- 100 MB / sec per content creator. | Variable, hard to say, some are |
| Efficiency for redundancy | Ultra efficient, only 20% overhead to allow 4 locations to go down | NO, sometimes +5 copies = 500% | | Efficiency for redundancy | Ultra efficient, only 20% overhead to allow 4 locations to go down | NO, sometimes +5 copies = 500% |
| Fully integrated in compute | Yes | Lots of different solutions | | Fully integrated in compute | Yes | Lots of different solutions |
| Management | Full P2P, done by 3bot Agents, blockchain IT contract | Centralized leading to security issues | | Management | Full P2P, done by 3Bot Agents, blockchain IT contract | Centralized leading to security issues |
| Locality | Data can be local and sovereign, full control by the the user (data creator) | Based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. | | Locality | Data can be local and sovereign, full control by the the user (data creator) | Based on centralized control mechanisms or inefficient algorithms that route traffic indiscriminately across the globe. |

View File

@ -8,12 +8,12 @@ The UnbreakableStorage Algorithm is the heart of the Storage engine. The storage
Data gets stored over multiple ZDB's in such a way that data can never be lost. Data gets stored over multiple ZDB's in such a way that data can never be lost.
Unique features Unique features:
- Data always append, can never be lost - Data always append, can never be lost.
- Even a quantum computer cannot decrypt the data - Even a quantum computer cannot decrypt the data.
- Data is spread over multiple sites. If these sites are lost the data will still be available - Data is spread over multiple sites. If these sites are lost the data will still be available.
- Protects from datarot - Protects from datarot.
## The Problem ## The Problem
@ -63,9 +63,7 @@ With these numbers we could create endless amounts of equations:
3: b-c+a=0 3: b-c+a=0
4: 2b+a-c=2 4: 2b+a-c=2
5: 5c-b-a=12 5: 5c-b-a=12
...
etc.
``` ```
Mathematically we only need 3 to describe the content (value) of the fragments. But creating more adds reliability. Now store those equations distributed (one equation per physical storage device) and forget the original object. So we no longer have access to the values of a, b, c and we just remember the locations of all the equations created with the original data fragments. Mathematically we only need 3 to describe the content (value) of the fragments. But creating more adds reliability. Now store those equations distributed (one equation per physical storage device) and forget the original object. So we no longer have access to the values of a, b, c and we just remember the locations of all the equations created with the original data fragments.

View File

@ -19,7 +19,7 @@ The NFT system operates on top of a very reliable storage system which is sustai
## The Benefits ## The Benefits
#### Persistence = Owned by the data user, as represented by their associated 3Bot ### Persistence = Owned by the data user, as represented by their associated 3Bot
The system is not based on a shared-all architecture. The system is not based on a shared-all architecture.
@ -32,7 +32,7 @@ Whoever stores the data has full control over:
- CDN policy (where the data is available and for how long) - CDN policy (where the data is available and for how long)
#### Reliability ### Reliability
- Data cannot be corrupted - Data cannot be corrupted
- Data cannot be lost - Data cannot be lost
@ -40,13 +40,13 @@ Whoever stores the data has full control over:
- All data is encrypted and compressed (unique per storage owner) - All data is encrypted and compressed (unique per storage owner)
- Data owner chooses the level of redundancy - Data owner chooses the level of redundancy
#### Lookup ### Lookup
- Multi URL & storage network support (see more in the interfaces section) - Multi URL & storage network support (see more in the interfaces section)
- IPFS, HyperDrive URL schema - IPFS, HyperDrive URL schema
- Unique DNS schema (with long key which is globally unique) - Unique DNS schema (with long key which is globally unique)
#### CDN Support ### CDN Support
Each file (movie, image etc.) stored is available in many locations worldwide. Each file (movie, image etc.) stored is available in many locations worldwide.
@ -54,13 +54,13 @@ Each file gets a unique url pointing to the data which can be retrieved from all
Caching happens at each endpoint. Caching happens at each endpoint.
#### Self Healing & Auto Correcting Storage Interface ### Self Healing & Auto Correcting Storage Interface
Any corruption e.g. bitrot gets automatically detected and corrected. Any corruption e.g. bitrot gets automatically detected and corrected.
In case of a HD crash or storage node crash the data will automatically be expanded again to fit the chosen redundancy policy. In case of a HD crash or storage node crash the data will automatically be expanded again to fit the chosen redundancy policy.
#### The Storage Algoritm Uses Unbreakable Storage System As Its Base ### The Storage Algoritm Uses Unbreakable Storage System As Its Base
Not even a quantum computer can hack data stored on our QSSS. Not even a quantum computer can hack data stored on our QSSS.
@ -68,11 +68,11 @@ The QSSS is a super innovative storage system which works on planetary scale and
It uses forward looking error correcting codes inside. It uses forward looking error correcting codes inside.
#### Green ### Green
Storage uses upto 10x less energy compared to classic replicated system. Storage uses upto 10x less energy compared to classic replicated system.
#### Multi Interface ### Multi Interface
The stored data is available over multiple interfaces at once. The stored data is available over multiple interfaces at once.

View File

@ -4,11 +4,11 @@ sidebar_position: 20
--- ---
# Government, Commercial hosters, Telco and Enterprise Roadmap # Government, Commercial Hosters, Telco and Enterprise Roadmap
We are working on our Government, Commercial hosters, Telco and Enterprise Release of our Technology. We are working on the government, commercial hosters, telco and enterprise releases of our technology.
> 90% of the work has been done as part of our base offering but we need additional features for enterprise > 90% of the work has been done as part of our base offering but we need additional features for enterprises.
## Enterprise User Interface ## Enterprise User Interface
@ -22,7 +22,7 @@ The current user interface is designed for an open-source tech audience. For ent
## Windows Support ## Windows Support
The virtual Machine technology we use does support windows, but we need to do some further integration. The virtual Machine technology we use does support Windows, but we need to do some further integration.
## High Performance Network Integration ## High Performance Network Integration
@ -40,14 +40,16 @@ Next to the existing already integrated storage backends we want to support a hi
- Supports our high speed backbone as defined above - Supports our high speed backbone as defined above
- Scalable to thousands of machines per cluster. - Scalable to thousands of machines per cluster.
- Replication capability between zones. - Replication capability between zones.
- **Custom Integration**: We offer integration with selected storage equipment from our customers, accommodating custom integration requirements. - Custom Integration
- We offer integration with selected storage equipment from our customers, accommodating custom integration requirements.
## Service Level Management ## Service Level Management
- The system will have hooks and visualization for achievement of Service levels. - The system will have hooks and visualization for achievement of Service levels.
- This will allow a commercial service provider to get to higher revenue and better uptime management. - This will allow a commercial service provider to get to higher revenue and better uptime management.
## Support for Liquid Cooling tanks ## Support for Liquid Cooling Tanks
- Do a test setup in liquid cooling rack or node, we can use our selfhealing capabilities to manage better. - Do a test setup in liquid cooling rack or node.
- Is Integration effort, not really code changes - We can use our self-healing capabilities to manage in a better way.
- This is an integration effort, and not much code changes are needed.

View File

@ -5,25 +5,27 @@ hide_title: true
--- ---
## Our private AI agent called Hero, High Level Roadmap ## AI Agent High Level Roadmap
Hero is our private AI agent.
The first version of our Hero enables the management of core services such as an innovative database backend, a sovereign decentralized git system, and the automatic integration and deployment of our workloads. The first version of our Hero enables the management of core services such as an innovative database backend, a sovereign decentralized git system, and the automatic integration and deployment of our workloads.
This stack allows everyone to deploy scalable web 2/3/4 apps on top of the TFGrid in a full automated way. This stack allows everyone to deploy scalable Web 2,3 and 4 apps on top of the TFGrid in a fully automated way.
| | Roadmap | Timing | | | Roadmap | Timing |
| -------------------------------- | -------------------------------------------------------------------------------------------------------------------- | ------ | | -------------------------------- | -------------------------------------------------------------------------------------------------------------------- | ------ |
| Hero Publisher | Publish websites, e-books, ... on top of TFGrid | Q2 25 | | Hero Publisher | Publish websites, e-books, and more on top of the ThreeFold Grid | Q2 25 |
| Hero CI = Continuous Integration | Easier to use Continuous Integration/Development, very powerfull, with multinode support | Q2 25 | | Hero CI = Continuous Integration | Easier to use Continuous Integration/Development, very powerfull, with multinode support | Q2 25 |
| Hero Play | Integrate declarative automation and configuration management as part of wiki approach in hero Publisher | Q2 25 | | Hero Play | Integrate declarative automation and configuration management as part of wiki approach in Hero Publisher | Q2 25 |
| Hero Git | Alternative to centralized Github (based on Gitea), fully integrated on top of TFGrid | Q2 25 | | Hero Git | Alternative to centralized Github (based on Gitea), fully integrated on top of TFGrid | Q2 25 |
| Hero DB | Flexible ultra redundant database stor with indexing, queries, stored procesudes, super scalable replication | Q2 25 | | Hero DB | Flexible ultra redundant database stor with indexing, queries, stored procesudes, super scalable replication | Q2 25 |
| Hero OSIS | Object Storage and Index system integrates with hero Git, all data on git based backend | Q2 25 | | Hero OSIS | Object Storage and Index system integrates with Hero Git, all data on git based backend | Q2 25 |
| Hero WEB | Web framework (with co-routines) using Vlang, deployable globally on TFGrid, integrated with Mycelium Net and Names. | Q2 25 | | Hero WEB | Web framework (with co-routines) using Vlang, deployable globally on TFGrid, integrated with Mycelium Net and Names | Q2 25 |
| Hero Monitor | Monitor all your different components on redundant monitoring stack | Q2 25 | | Hero Monitor | Monitor all your different components on redundant monitoring stack | Q2 25 |
| Hero Happs | Hero natively supports Holochain HAPPS | Q3 25 | | Hero Happs | Hero natively supports Holochain HAPPS | Q3 25 |
| Hero Actors | Hero can serve actors which respond and act on OpenRPC calls ideal as backend for web or other apps. | Q3 25 | | Hero Actors | Hero can serve actors which respond and act on OpenRPC calls ideal as backend for web or other apps | Q3 25 |
| Hero Web 3 Gateway | Hero aims to have native support for chosen Web3 partner solutions (dfinity, bitcoin, eth, ...) | Q3 25 | | Hero Web 3 Gateway | Hero aims to have native support for chosen Web3 partner solutions (Dfinity, Bitcoin, Ethereum, and more) | Q3 25 |
All of above is fully integrated with Mycelium Network and the TF Grid. All of the specs above are fully integrated with the Mycelium network and the ThreeFold Grid.

View File

@ -8,36 +8,39 @@ sidebar_position: 2
# Roadmap in Phases # Roadmap in Phases
## phase 1: wave 1 of companies, leading to our expertise (DONE) ## Phase 1: Wave 1 of Companies, Leading to Our expertise (DONE)
- technology creation, was result of 20 years of evolution - Technology creation
- This was result of 20 years of evolution
- 7 startups acquired as part of this process - 7 startups acquired as part of this process
- technology used globally by big vendors - Technology used globally by big vendors
- +600m USD Exits - +600m USD in exits
## phase 2: proof of tech (DONE) ## Phase 2: Proof of Tech (DONE)
- Technology launched globally (as opensource) - Open source technology launched globally
- +60,000,000 vcpu active - +60,000,000 active vCPU
- Large scale proof of core technology - Large scale proof of core technology
- Focus on early adoptors in tech space (cloud, web 2/3 ...) - Focus on early adoptors in tech space (Cloud, Web2, Web3, etc.)
- 50m USD funded by founders, community and farmers (people providing capacity) - 50m USD funded by founders, community and farmers (people providing capacity)
## phase 3: commercialization & global expansion (START) ## Phase 3: Commercialization & Global Expansion (START)
### phase 3.1: Commercial Partners ### Phase 3.1: Commercial Partners
- ThreeFold Launches with Commercial Strategic Partners - ThreeFold Launches with commercial strategic partners
- Telco Operatators - Telco Operatators
- IT Integrators - IT Integrators
- Enterprise Roadmap delivered < 6 months (is mainly integration, documentation and UI work) - Enterprise roadmap delivered within 6 months
- Together with partners we deliver on the many projects which are in our funnel today e.g. East Africa, Brazil - This is mainly about integration, documentation and UI work
- Together with partners we deliver on the many projects which are in our funnel today, e.g., East Africa, Brazil
### phase 3.2: Large Scale Financancing for Infrastructure ### Phase 3.2: Large Scale Financancing for Infrastructure
**Large scaling financing round** **Large Scaling Financing Round**
- financing for infrastructure projects (trillions available right now for infra in emerging countries) - Financing for infrastructure projects (trillions available right now for infrastructures in emerging countries)
- Public STO (security token offering), let world co-own the infra for their Internet - Public STO (security token offering)
- large partnerships drive alternative to Tier 3/4 Datacenters - This lets people around the world to co-own the infrastructure for their internet
- Large partnerships drive alternative to Tier 3 and 4 datacenters

View File

@ -5,13 +5,13 @@ hide_title: true
--- ---
## Version 3 Proof of Concept Network Life ## Our Proof of Concept Network is Live
![](img/status.png) ![](img/status.png)
Every day people expand the ThreeFold current Network (Grid) and deploy applications on it. Every day people expand the current ThreeFold V3 Grid, our decentralized proof of concept network, and deploy applications on it.
The current network is a proof of concept network which has shown that the concept and technology works, we are now going to the next step which is full blown commercialization. The current network has shown that the concept and technology work. We are now going to the next step which is full blown commercialization.
![](img/dashboard.png) ![](img/dashboard.png)

View File

@ -9,8 +9,7 @@ sidebar_position: 3
### Status Today ### Status Today
The core offering is functioning effectively, maintained through a community-driven, best-effort approach. Currently, The core offering is functioning effectively, maintained through a community-driven, best-effort approach. Currently,
there are no Service Level Agreements (SLAs) in place, and there should be increased visibility for users regarding their expectations for uptime, there are no Service Level Agreements (SLAs) in place, and there should be increased visibility for users regarding their expectations for uptime, performance, and other service related requirements.
performance, and other service related requirements.
The uptime and stability of Zero-OS are very good. The uptime and stability of Zero-OS are very good.
@ -43,7 +42,7 @@ Below you can find some of the planned features of TFGrid 4.0 mainly to achieve
| | Roadmap | Timing | | | Roadmap | Timing |
| ----------------------------------- | ---------------------------------------------------------------- | ------ | | ----------------------------------- | ---------------------------------------------------------------- | ------ |
| Zero-OS v4 (our next major release) | v4, no more TFChain, mutual credit, marketplace | Q2/3 25 | | Zero-OS v4 (our next major release) | V4, without TFChain, mutual credit, marketplace | Q2/3 25 |
| Zero-Images from Docker | CI/CD integration (See Hero CI/CD) | Q1 25 | | Zero-Images from Docker | CI/CD integration (See Hero CI/CD) | Q1 25 |
| Zero-Images Hub Integration | CI/CD integration (See Hero CI/CD) no more need for separate Hub | Q1 25 | | Zero-Images Hub Integration | CI/CD integration (See Hero CI/CD) no more need for separate Hub | Q1 25 |
| Mycelium Core | Just more hardening and testing | Q1 25 | | Mycelium Core | Just more hardening and testing | Q1 25 |
@ -53,7 +52,7 @@ Below you can find some of the planned features of TFGrid 4.0 mainly to achieve
| Zero-OS VM's Cloud Slices | Integration Hero CI, use cloud slices to manage | Q2 25 | | Zero-OS VM's Cloud Slices | Integration Hero CI, use cloud slices to manage | Q2 25 |
| Zero-OS Monitoring Docu | More docu and easier API | Q2 25 | | Zero-OS Monitoring Docu | More docu and easier API | Q2 25 |
| Zero-OS Web Gateway Expansion | Need more deployed, better integration with new Mycelium | Q2 25 | | Zero-OS Web Gateway Expansion | Need more deployed, better integration with new Mycelium | Q2 25 |
| Mycelium Names | in v4, name services | Q3 25 | | Mycelium Names | In V4, name services | Q3 25 |
| Zero-OS Cloud,Storage,AI Slices | as part of marketplace for v4, flexible billing mutual credit | Q3 25 | | Zero-OS Cloud,Storage,AI Slices | As part of marketplace for V4, flexible billing mutual credit | Q3 25 |
| FungiStor | A revolutionary different way how to deliver content | Q3 25 | | FungiStor | A revolutionary different way how to deliver content | Q3 25 |
| Zero-Images on FungiStor | Can be stored on FungiStor | Q3 25 | | Zero-Images on FungiStor | Can be stored on FungiStor | Q3 25 |

View File

@ -41,7 +41,7 @@ By uniting these three pillars of sovereignty, OurWorld is building a comprehens
- **Description**: Essential life skills education platform. - **Description**: Essential life skills education platform.
- **Key Features**: - **Key Features**:
- Delivered over 2 billion courses globally. - Delivered over 2 billion courses globally.
- Aims to become the "Netflix of Education." - Aims to become the "Netflix of Education".
- **Goal**: Provide education to billions of people worldwide at virtually no cost. - **Goal**: Provide education to billions of people worldwide at virtually no cost.
--- ---

View File

@ -3,11 +3,11 @@ title: 'Team'
sidebar_position: 2 sidebar_position: 2
--- ---
## We have been around. ## We've Been Around...
![](img/exits.png) ![](img/exits.png)
We are part of a group of 5 companies which are hosted by OurWorld in Mauritius which is a venture creator. We are part of a group of 5 companies which are hosted by OurWorld, a venture creator, in Mauritius.

View File

@ -23,13 +23,13 @@ This infrastructure represents "Layer Zero," a foundational, decentralized alter
4. **Storage Solutions**: 4. **Storage Solutions**:
- The ThreeFold Grid provides scalable storage, with 8,124,403 GB of SSD capacity, allowing for decentralized and secure data storage solutions. - The ThreeFold Grid provides scalable storage, with 8,124,403 GB of SSD capacity, allowing for decentralized and secure data storage solutions.
### Underlying Infrastructure: ### Underlying Infrastructure
- **Interconnected 3Nodes**: - **Interconnected 3Nodes**:
- The 3Nodes collectively form a decentralized network that provides compute, storage, and networking capabilities. - The 3Nodes collectively form a decentralized network that provides compute, storage, and networking capabilities.
- The network operates using Zero OS, a self-healing planetary operating system, ensuring reliability and scalability. - The network operates using Zero OS, a self-healing planetary operating system, ensuring reliability and scalability.
### Advantages: ### Advantages
- **Decentralized and Sovereign Cloud**: - **Decentralized and Sovereign Cloud**:
- The platform operates without central authority, ensuring data sovereignty, security, and resilience. - The platform operates without central authority, ensuring data sovereignty, security, and resilience.
@ -40,7 +40,7 @@ This infrastructure represents "Layer Zero," a foundational, decentralized alter
![](../status/img/dashboard.png) ![](../status/img/dashboard.png)
## Get started ## Get Started
- https://dashboard.grid.tf/ - [Explore the ThreeFold Dashboard](https://dashboard.grid.tf/)
- extensive manual on: https://manual.grid.tf/ - [Read the ThreeFold Manual](https://manual.grid.tf/)

View File

@ -5,7 +5,7 @@ hide_title: true
--- ---
## ThreeFold as the Digital Backbone for a Nation State # ThreeFold as the Digital Backbone for a Nation State
![](img/container.png) ![](img/container.png)
@ -15,7 +15,7 @@ A nation has made the groundbreaking decision to transform its digital infrastru
--- ---
### **Sovereign Digital Infrastructure** ## **Sovereign Digital Infrastructure**
- **Decentralized Ownership**: - **Decentralized Ownership**:
The country is deploying its own network of **3Nodes** across its regions, establishing a fully sovereign, decentralized infrastructure. This ensures: The country is deploying its own network of **3Nodes** across its regions, establishing a fully sovereign, decentralized infrastructure. This ensures:
- **Full Data Sovereignty**: Critical national data remains within its borders, eliminating reliance on foreign cloud providers. - **Full Data Sovereignty**: Critical national data remains within its borders, eliminating reliance on foreign cloud providers.
@ -29,7 +29,7 @@ A nation has made the groundbreaking decision to transform its digital infrastru
--- ---
### **Digital Governance and Services** ## **Digital Governance and Services**
- **E-Government Platforms**: - **E-Government Platforms**:
The government is planning to deploy key services—such healthcare, education tools, and e-governance portals—to the ThreeFold Grid. The government is planning to deploy key services—such healthcare, education tools, and e-governance portals—to the ThreeFold Grid.
@ -48,7 +48,7 @@ A nation has made the groundbreaking decision to transform its digital infrastru
--- ---
### **Scalable Blockchain Integration** ## **Scalable Blockchain Integration**
- **3Ledger as a Scalable Layer 2**: - **3Ledger as a Scalable Layer 2**:
- -
@ -59,7 +59,7 @@ ayments, and economic initiatives, while integrating with global crypto markets.
--- ---
### **Empowering Citizens with Personal AI** ## **Empowering Citizens with Personal AI**
- **Digital Representatives**: - **Digital Representatives**:
Citizens are beginning to benefit from **personal AI agents** powered by ThreeFolds **Hero**. These agents: Citizens are beginning to benefit from **personal AI agents** powered by ThreeFolds **Hero**. These agents:
- Represent citizens in digital governance, enabling secure and private interactions with government systems like voting, tax filing, and welfare access. - Represent citizens in digital governance, enabling secure and private interactions with government systems like voting, tax filing, and welfare access.
@ -71,7 +71,7 @@ ayments, and economic initiatives, while integrating with global crypto markets.
--- ---
### **A Decentralized Digital Economy** ## **A Decentralized Digital Economy**
- **Private Sector Innovation**: - **Private Sector Innovation**:
Businesses within the country are preparing to leverage the decentralized infrastructure to deploy their own applications, marketplaces, and platforms. This fosters innovation and local economic growth while ensuring compatibility with global systems. Businesses within the country are preparing to leverage the decentralized infrastructure to deploy their own applications, marketplaces, and platforms. This fosters innovation and local economic growth while ensuring compatibility with global systems.
@ -80,7 +80,7 @@ ayments, and economic initiatives, while integrating with global crypto markets.
--- ---
### **Tailored Sovereignty and Regional Development** ## **Tailored Sovereignty and Regional Development**
- **Localized Governance**: - **Localized Governance**:
The deployment of 3Nodes in different regions is enabling a **federalized digital infrastructure**. Each region can: The deployment of 3Nodes in different regions is enabling a **federalized digital infrastructure**. Each region can:
- Operate its own nodes, applications, and services while remaining interconnected at the national level. - Operate its own nodes, applications, and services while remaining interconnected at the national level.
@ -91,7 +91,7 @@ ayments, and economic initiatives, while integrating with global crypto markets.
--- ---
### **Transforming Governance and Infrastructure** ## **Transforming Governance and Infrastructure**
- **National Defense**: - **National Defense**:
Sensitive data and defense applications are being hosted on sovereign infrastructure, ensuring maximum security and eliminating vulnerabilities associated with foreign dependencies. Sensitive data and defense applications are being hosted on sovereign infrastructure, ensuring maximum security and eliminating vulnerabilities associated with foreign dependencies.
@ -103,7 +103,7 @@ ayments, and economic initiatives, while integrating with global crypto markets.
--- ---
### **A Model for Other Nations** ## **A Model for Other Nations**
This nation is taking a leadership role in demonstrating how a decentralized infrastructure can redefine digital sovereignty. By embracing ThreeFold, the country is: This nation is taking a leadership role in demonstrating how a decentralized infrastructure can redefine digital sovereignty. By embracing ThreeFold, the country is:
- Building a digital backbone that ensures independence and resilience. - Building a digital backbone that ensures independence and resilience.
- Empowering its citizens with personal AI agents and secure, sovereign data ownership. - Empowering its citizens with personal AI agents and secure, sovereign data ownership.

View File

@ -5,4 +5,4 @@ sidebar_position: 3
![](../ai_agent/img/ai_agent.png) ![](../ai_agent/img/ai_agent.png)
> see [Hero section](../ai_agent/ai_agent.md) > See the [Hero section](../ai_agent/ai_agent.md) for more information

View File

@ -1,6 +1,7 @@
--- ---
title: Overview title: Overview
sidebar_position: 1 sidebar_position: 1
description: Overview of the project
--- ---
![](img/trillion_market.png) ![](img/trillion_market.png)