...
@ -1,7 +1,5 @@
|
|||||||
{
|
{
|
||||||
"label": "Architecture",
|
"label": "Architecture",
|
||||||
"position": 4,
|
"position": 10,
|
||||||
"link": {
|
"link": {"type": "generated-index"}
|
||||||
"type": "generated-index",
|
|
||||||
}
|
|
||||||
}
|
}
|
@ -1,60 +0,0 @@
|
|||||||
---
|
|
||||||
title: Internet Re-Invented
|
|
||||||
sidebar_position: 2
|
|
||||||
---
|
|
||||||
|
|
||||||
# The Internet’s Natural Progression
|
|
||||||
|
|
||||||
The Internet was always meant to be a peer-to-peer infrastructure.
|
|
||||||
|
|
||||||
As large companies became profit and data centric, centralization quickly became the norm.
|
|
||||||
|
|
||||||
***We have a vision of the Internet which is much more close to how the Internet was intended to be.***
|
|
||||||
|
|
||||||
## Requirements For A New Internet
|
|
||||||
|
|
||||||
- Compute, Storage, Network need to be
|
|
||||||
- Local
|
|
||||||
- Sovereign
|
|
||||||
- Private
|
|
||||||
- More Secure
|
|
||||||
- Storage needs to be
|
|
||||||
- More reliable with less overhead
|
|
||||||
- Capable to be global and be used as Content Delivery Network (CDN)
|
|
||||||
- Fast enough for the use case at hand
|
|
||||||
- Network needs to be
|
|
||||||
- Working no matter what happens with existing network, route around issues
|
|
||||||
- Local sensitive (chose shortest path)
|
|
||||||
- End2End Encrypted
|
|
||||||
- Capable to really know where information goes to or comes from (authenticity)
|
|
||||||
|
|
||||||
## Internet/Cloud Architecture
|
|
||||||
|
|
||||||
!!wiki.include page:'internet_archtecture0.md'
|
|
||||||
|
|
||||||
## Base Layer for a New Cloud / Internet
|
|
||||||
|
|
||||||
![](../img/base_layer.png)
|
|
||||||
|
|
||||||
We need a new cloud engine which supports the evolution of the Internet
|
|
||||||
|
|
||||||
|
|
||||||
## Natural Progression
|
|
||||||
|
|
||||||
![alt text](../img/natural_progression.png)
|
|
||||||
|
|
||||||
We envision a world where every person is at the center of their digital life. In this new Internet, each person has their own digital avatar, which we call a ***Hero***.
|
|
||||||
|
|
||||||
The technical backbone enabling the Hero is a component known as the 3Bot. This server, owned and managed by you, operates on our decentralized cloud infrastructure.
|
|
||||||
|
|
||||||
Communication between 3Bots is optimized to use the shortest possible paths, ensuring that all interactions are end-to-end encrypted for maximum security and privacy.
|
|
||||||
|
|
||||||
|
|
||||||
## 3Bot Architecture
|
|
||||||
|
|
||||||
![alt text](../img/arch_minimal.png)
|
|
||||||
|
|
||||||
The underlying network of capacity is the decentralized cloud which is like the basic IT energy which makes all of this possible.
|
|
||||||
|
|
||||||
The cecentralized cloud is the result of more than 20 years of development and it is now active on more than 2000 nodes.
|
|
||||||
|
|
@ -1,14 +0,0 @@
|
|||||||
---
|
|
||||||
title: World Records
|
|
||||||
sidebar_position: 4
|
|
||||||
---
|
|
||||||
|
|
||||||
## World Records
|
|
||||||
|
|
||||||
Our team is working on re-inventing layers of the Internet for more than 30 years. While we were doing so this has resulted in some world records and innovative products.
|
|
||||||
|
|
||||||
Here is an overview of those achievements:
|
|
||||||
|
|
||||||
![](../img/world_records.png)
|
|
||||||
|
|
||||||
|
|
@ -1,19 +0,0 @@
|
|||||||
---
|
|
||||||
title: History of Computers
|
|
||||||
sidebar_position: 3
|
|
||||||
---
|
|
||||||
|
|
||||||
|
|
||||||
## Hardware Is No Longer Used Efficiently
|
|
||||||
|
|
||||||
The IT world fails to harness the full potential of computer hardware.
|
|
||||||
|
|
||||||
![Commodore 64](../img/c64.png)
|
|
||||||
|
|
||||||
While hardware advancements have surged forward, user experiences and features have often stagnated, failing to keep pace with these developments.
|
|
||||||
|
|
||||||
The original Commodore 64, with only 64 KB of memory, was a remarkably capable machine for its time. In contrast, today's computers boast 8 GB or more of memory, yet their capabilities have not necessarily improved proportionately.
|
|
||||||
|
|
||||||
This highlights a regression in our ability to fully utilize computer hardware.
|
|
||||||
|
|
||||||
We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential.
|
|
@ -1,34 +0,0 @@
|
|||||||
---
|
|
||||||
title: The Onion Analogy
|
|
||||||
sidebar_position: 1
|
|
||||||
---
|
|
||||||
|
|
||||||
![](../img/onion.jpg)
|
|
||||||
|
|
||||||
# Cloud Stacks: The Onion Analogy
|
|
||||||
|
|
||||||
Most cloud stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure.
|
|
||||||
|
|
||||||
#### 1. **The Outer Layers: Quick Fixes and Additions**
|
|
||||||
- **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue.
|
|
||||||
- **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched.
|
|
||||||
|
|
||||||
#### 2. **The Middle Layers: Compounded Complexity**
|
|
||||||
- **Problem:** As more layers are added to solve different issues, the cloud stack becomes increasingly complicated. Each new layer interacts with the existing ones, often in unpredictable ways, leading to a system that is difficult to manage and troubleshoot.
|
|
||||||
- **Analogy:** Just like adding more painkillers to treat worsening symptoms, the system becomes dependent on these layers to function. However, this doesn’t address the root cause of the issues; instead, it creates a reliance on temporary fixes that complicate the system further.
|
|
||||||
- **Example:** Security patches or monitoring tools are added after incidents of data breaches or unauthorized access. While these layers enhance security, they do not address the underlying issue of poor security practices in the original architecture, leading to a cloud stack that is more difficult to maintain and secure.
|
|
||||||
|
|
||||||
#### 3. **The Core: Root Causes Ignored**
|
|
||||||
- **Problem:** At the core of the onion, the fundamental issues often remain unaddressed. These could be poor initial design choices, lack of planning, or failure to align the cloud architecture with the business’s long-term needs.
|
|
||||||
- **Analogy:** Similar to how treating only the symptoms of an illness without addressing its cause can lead to recurring issues, adding layers to a cloud stack without fixing the root problems results in a cycle of ongoing maintenance, inefficiency, and potential failure.
|
|
||||||
- **Example:** If a cloud environment was initially set up without considering future scalability, each layer added to address scaling problems doesn’t solve the underlying issue of an inflexible architecture. As the system grows, the layers pile up, making the system more cumbersome and fragile.
|
|
||||||
|
|
||||||
### Painkiller Approach: Treating Symptoms, Not Causes
|
|
||||||
|
|
||||||
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges:
|
|
||||||
|
|
||||||
- **Cyber Pandemic** The Cyber Pandemic is real, added these layers leads to weak security.
|
|
||||||
- **Increased Complexity:** Each new layer adds complexity, making the system harder to understand and maintain.
|
|
||||||
- **Higher Costs:** More layers often mean more resources, licenses, and management overhead, increasing operational costs.
|
|
||||||
- **Reduced Agility:** The more complex the stack, the harder it is to make changes or adapt to new requirements, reducing the system’s overall agility.
|
|
||||||
- **Fragility:** A stack built on temporary fixes is more prone to failures because the core issues are not resolved, making the system brittle.
|
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"label": "Core Features",
|
"label": "Core Features",
|
||||||
"position": 7,
|
"position": 9,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
||||||
}
|
}
|
||||||
|
BIN
docs/img/evolution.png
Normal file
After Width: | Height: | Size: 427 KiB |
BIN
docs/img/web0.png
Normal file
After Width: | Height: | Size: 104 KiB |
@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"label": "The Cloud Re-Invented",
|
"label": "Internet Re-Invented",
|
||||||
"position": 3,
|
"position": 3,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
48
docs/internet_reinvented/architecture.md
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
---
|
||||||
|
sidebar_position: 2
|
||||||
|
---
|
||||||
|
|
||||||
|
# Architecture
|
||||||
|
|
||||||
|
![](img/architecture_high_level.png)
|
||||||
|
|
||||||
|
Decentralized, geo-aware, and sovereign internet infrastructure.
|
||||||
|
|
||||||
|
### **Core Components:**
|
||||||
|
|
||||||
|
1. **Geo-Aware Private AI Agents (3AI):**
|
||||||
|
- Personal AI agents that are private, secure, and sovereign.
|
||||||
|
- These agents can deploy applications in a self-healing, consensus-driven context.
|
||||||
|
- Geo-awareness ensures that the AI operates within defined physical and legal boundaries, providing compliance and data privacy.
|
||||||
|
|
||||||
|
2. **3CORE (Ledger):**
|
||||||
|
- A geo-fenced ledger that supports identity management, digital assets, and smart contracts.
|
||||||
|
- It integrates seamlessly with external blockchains and digital currencies, functioning as a Layer 2 solution for blockchain interoperability.
|
||||||
|
- Optimized for consensus-driven code, it extends beyond basic smart contracts to enable advanced decentralized applications.
|
||||||
|
|
||||||
|
3. **Decentralized Infrastructure Layers:**
|
||||||
|
- **Unbreakable Network Layer**: Provides robust connectivity with resilience to failures and attacks.
|
||||||
|
- **Unbreakable Storage Layer**: Offers decentralized, reliable, and secure data storage.
|
||||||
|
- Together, these layers form an "Unbreakable Cloud Engine," ensuring continuity and reliability.
|
||||||
|
|
||||||
|
4. **Sovereign Quantum Compute:**
|
||||||
|
- A computational layer designed for sovereignty, allowing nations or organizations to maintain control over their infrastructure and data.
|
||||||
|
- Quantum-compute-ready, future-proofing the system for advanced workloads.
|
||||||
|
|
||||||
|
5. **Geo-Fenced and Aware AI:**
|
||||||
|
- Integrates AI functionalities that are tied to geographical and jurisdictional contexts, ensuring secure and compliant operations across borders.
|
||||||
|
|
||||||
|
6. **Interconnected 3Nodes:**
|
||||||
|
- The foundation of the infrastructure, combining compute, storage, and networking capabilities.
|
||||||
|
- These nodes create a resilient, scalable, and distributed ecosystem for internet services.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **Key Features:**
|
||||||
|
- **Seamless Blockchain Integration:** Allows integration with any public blockchain and supports digital currencies.
|
||||||
|
- **Sovereignty and Security:** Ensures that data and AI remain under the control of users or local entities, promoting decentralization.
|
||||||
|
- **Resilience and Efficiency:** The interconnected infrastructure reduces dependency on centralized systems, creating a highly reliable and efficient network.
|
||||||
|
|
||||||
|
This system embodies the principles of **Web 0**, focusing on decentralization, sovereignty, and geo-awareness, offering a future-ready alternative to the centralized internet paradigm.
|
||||||
|
|
||||||
|
|
BIN
docs/internet_reinvented/img/architecture_high_level.png
Normal file
After Width: | Height: | Size: 153 KiB |
BIN
docs/internet_reinvented/img/architecture_low_level.png
Normal file
After Width: | Height: | Size: 96 KiB |
BIN
docs/internet_reinvented/img/inventions.png
Normal file
After Width: | Height: | Size: 188 KiB |
BIN
docs/internet_reinvented/img/unique.png
Normal file
After Width: | Height: | Size: 134 KiB |
BIN
docs/internet_reinvented/img/usable_by_all.png
Normal file
After Width: | Height: | Size: 248 KiB |
59
docs/internet_reinvented/infrastructure.md
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
---
|
||||||
|
sidebar_position: 3
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
# Infrastructure
|
||||||
|
|
||||||
|
![](img/architecture_low_level.png)
|
||||||
|
|
||||||
|
|
||||||
|
## Unbreakable Network Layer
|
||||||
|
|
||||||
|
**Shortest Path Optimization**:
|
||||||
|
- The network layer utilizes advanced routing algorithms to dynamically calculate the most efficient path for data to travel. It adapts in real time, considering factors like network congestion, node availability, and latency. This ensures that data always takes the shortest and fastest route, reducing delays and improving performance.
|
||||||
|
- Built-in **Naming and Content Delivery Network (CDN)** systems further enhance efficiency by storing and delivering frequently accessed content from the nearest available node.
|
||||||
|
|
||||||
|
**Survival During Internet Failures**:
|
||||||
|
|
||||||
|
- The network operates on a decentralized infrastructure. If the broader internet or certain nodes experience a failure (due to disasters, attacks, or other disruptions), the system self-heals and reroutes traffic through available paths. Local nodes maintain communication within their region, ensuring that even in disconnected environments, services remain operational. This makes the system resilient and disaster-proof.
|
||||||
|
- There are agents for desktop and mobile phones which guarantee seamless integration.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Unbreakable Storage Layer
|
||||||
|
- **Data Integrity and Durability**:
|
||||||
|
The storage layer is designed to ensure that data can never be lost or corrupted. This is achieved through:
|
||||||
|
- **Unbreakable Geo Aware Data Storage**: Data is fragmented and distributed across multiple nodes in the network. Even if some nodes fail, the remaining fragments are sufficient to reconstruct the original data.
|
||||||
|
- **Ultra Efficient**: This system is ultra efficient, upto 10x less harddisks needed.
|
||||||
|
- **Geo Aware**: The user has full control over where the data is and only his/her application or AI agent can get access to this data.
|
||||||
|
- **Self-Healing Mechanism**: If a storage fragment becomes unavailable or damaged, the system automatically regenerates the broken data.
|
||||||
|
- **Immutable Storage**: The architecture prevents unauthorized modifications, maintaining data integrity, data can never be lost.
|
||||||
|
|
||||||
|
- **Scalability to Zetabytes**:
|
||||||
|
The decentralized storage system scales effortlessly by adding new nodes. Unlike traditional centralized systems with physical constraints, this network expands horizontally, leveraging unused storage capacity globally. This approach has been proven to handle zetabytes of data efficiently, with previous iterations widely adopted by organizations requiring massive-scale storage solutions.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Sovereign Quantum Compute & AI Layer
|
||||||
|
- **Solving the World’s Serious Issues**:
|
||||||
|
The quantum compute layer introduces unparalleled computational power, capable of tackling complex problems that classical systems struggle with, such as:
|
||||||
|
- **Climate Modeling**: Simulating intricate environmental systems to predict and mitigate climate change.
|
||||||
|
- **Medical Research**: Accelerating drug discovery and personalized medicine development.
|
||||||
|
- **Optimization Problems**: Enhancing logistics, energy usage, and resource allocation for global efficiency.
|
||||||
|
|
||||||
|
- **Integration with AI**:
|
||||||
|
The quantum layer works seamlessly with geo-aware AI agents. AI leverages quantum capabilities to process vast datasets, derive insights, and make informed decisions faster and more accurately. Together, they:
|
||||||
|
- Model scenarios and test solutions at unprecedented speed.
|
||||||
|
- Provide personalized, context-aware outputs based on geographical and jurisdictional needs.
|
||||||
|
- Drive collaborative decision-making by balancing global and local priorities.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **How it All Works Together**
|
||||||
|
The system's core components—network, storage, and compute layers—are deeply interconnected, forming an **Unbreakable Cloud Engine**:
|
||||||
|
- The **network layer** ensures seamless communication and data transmission across nodes, even under adverse conditions.
|
||||||
|
- The **storage layer** safeguards data, enabling ultra-reliable access and scalability to support global demands.
|
||||||
|
- The **compute layer**, powered by quantum technology, works in harmony with AI to deliver groundbreaking solutions for real-world challenges.
|
||||||
|
|
||||||
|
This integrated approach ensures that services are not only resilient and scalable but also future-proof, sustainable, and capable of empowering users globally. It’s a holistic solution redefining the Internet for the modern world.
|
22
docs/internet_reinvented/internet_reinvented.md
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
---
|
||||||
|
title: Internet Re-Invented
|
||||||
|
sidebar_position: 2
|
||||||
|
---
|
||||||
|
|
||||||
|
# The Internet’s Natural Progression
|
||||||
|
|
||||||
|
The Internet was always meant to be a peer-to-peer infrastructure.
|
||||||
|
|
||||||
|
As large companies became profit and data centric, centralization quickly became the norm.
|
||||||
|
|
||||||
|
***We have a vision of the Internet which is much more close to how the Internet was intended to be.***
|
||||||
|
|
||||||
|
|
||||||
|
## Usable by Everyone
|
||||||
|
|
||||||
|
![](img/usable_by_all.png)
|
||||||
|
|
||||||
|
## A Different Approach
|
||||||
|
|
||||||
|
![](img/unique.png)
|
||||||
|
|
15
docs/internet_reinvented/inventions.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
sidebar_position: 4
|
||||||
|
title: 'Inventions'
|
||||||
|
---
|
||||||
|
|
||||||
|
## Infrastructure Level
|
||||||
|
|
||||||
|
![](img/inventions.png)
|
||||||
|
|
||||||
|
## 3AI
|
||||||
|
|
||||||
|
- Ledger
|
||||||
|
- Autonomous Self Healing deployments.
|
||||||
|
|
||||||
|
|
@ -1,11 +1,9 @@
|
|||||||
---
|
---
|
||||||
title: A New Cloud Engine
|
title: Requirements
|
||||||
sidebar_position: 1
|
sidebar_position: 1
|
||||||
---
|
---
|
||||||
|
|
||||||
# A New Cloud Engine
|
# Requirements for a New Internet
|
||||||
|
|
||||||
## Requirements for a New Cloud Engine
|
|
||||||
|
|
||||||
![alt text](../img/requirements.png)
|
![alt text](../img/requirements.png)
|
||||||
|
|
||||||
@ -30,3 +28,4 @@ sidebar_position: 1
|
|||||||
- It should be possible to operate without human Intervention
|
- It should be possible to operate without human Intervention
|
||||||
- Green
|
- Green
|
||||||
- We believe Internet / Cloud can be delivered using at least 10x less energy.
|
- We believe Internet / Cloud can be delivered using at least 10x less energy.
|
||||||
|
|
@ -1,28 +1,25 @@
|
|||||||
---
|
---
|
||||||
title: Cloud Beyond Cost
|
title: Trust
|
||||||
sidebar_position: 3
|
sidebar_position: 6
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
![](../img/farming_pools.jpg)
|
![](../img/farming_pools.jpg)
|
||||||
|
|
||||||
# The Cloud: Beyond Cost – A Business Perspective
|
# Trust is everything.
|
||||||
|
|
||||||
## Introduction
|
|
||||||
|
|
||||||
The transition to cloud computing isn't solely driven by cost savings.
|
While affordability is a factor, the primary appeal of AI & Internet services lies in their reliability, scalability, and performance.
|
||||||
|
|
||||||
While affordability is a factor, the primary appeal of cloud services lies in their reliability, scalability, and performance.
|
This parallels the concept of insurance, where customers are willing to pay a premium for the assurance of superior service and uptime.
|
||||||
|
|
||||||
This parallels the concept of insurance, where customers are willing to pay a premium for the assurance of superior service and uptime.
|
In the decentralized infrastructure (DePIN) space, establishing trust and reliability is super important, but not enough available in current offerings.
|
||||||
|
|
||||||
In the decentralized infrastructure (DePIN) space, establishing trust and reliability is super important, but not enough available in current offerings.
|
|
||||||
|
|
||||||
## Cost vs. Quality
|
## Cost vs. Quality
|
||||||
|
|
||||||
### Reliability and Uptime
|
### Reliability and Uptime
|
||||||
|
|
||||||
Customers often prefer to pay a higher price for cloud services that guarantee better uptime and reliability.
|
Customers often prefer to pay a higher price for cloud, AI, Internet services that guarantee better uptime and reliability.
|
||||||
|
|
||||||
For example, paying $10 per terabyte for a service with stellar uptime and customer support is more appealing than a $5 per terabyte service with frequent downtimes and minimal support. The value proposition lies in uninterrupted access to data and services, which is critical for business operations.
|
For example, paying $10 per terabyte for a service with stellar uptime and customer support is more appealing than a $5 per terabyte service with frequent downtimes and minimal support. The value proposition lies in uninterrupted access to data and services, which is critical for business operations.
|
||||||
|
|
@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"label": "The Cloud Today",
|
"label": "Internet is Broken",
|
||||||
"position": 2,
|
"position": 2,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
39
docs/internet_today/ai.md
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
---
|
||||||
|
title: 'The Race For Intelligence'
|
||||||
|
sidebar_position: 4
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
![](img/ai_agents_centralized.png)
|
||||||
|
|
||||||
|
**Within 2 years we will no longer be using all those hundreds of apps, but we will be talking to AI driven agents.**
|
||||||
|
|
||||||
|
### **The Role of AI in Our Lives**
|
||||||
|
|
||||||
|
- Right now, humans interact with the internet mainly through apps on their phones, computers, and other devices.
|
||||||
|
- In the near future (within 2 years), apps will fade into the background, and **AI-driven agents** will become the primary way we interact with technology. For example, instead of using multiple apps for messaging, shopping, or searching, you might simply ask an AI assistant to handle all those tasks through conversation.
|
||||||
|
- These AI agents will be accessed using modern devices like phones, glasses, or even futuristic interfaces like brain implants (e.g., Neuralink).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
### **The Race for Intelligence**
|
||||||
|
|
||||||
|
![](img/race_intelligence.png)
|
||||||
|
|
||||||
|
|
||||||
|
The world is in a rapid phase of technological advancement, driven by innovations in AI, quantum computing, and biotechnology.
|
||||||
|
|
||||||
|
**Key milestones in internet history:**
|
||||||
|
|
||||||
|
- **1960s:** The internet started as a free and open platform, allowing people to share ideas, collaborate, and connect directly.
|
||||||
|
- **2000–2024:** The internet has become increasingly controlled by large corporations. These companies dominate through data collection and commercial interests, compromising the internet’s original vision of freedom and openness.
|
||||||
|
- **2025 and Beyond:** Large corporations are now racing to develop **Artificial General Intelligence (AGI)**—AI systems that can think and reason like humans. This raises concerns about centralization, control, and ethical use.
|
||||||
|
|
||||||
|
### **A Vision for the Future**
|
||||||
|
|
||||||
|
Instead of leaving the future of AI in the hands of a few powerful corporations, there is a push to create **Augmented Collective Intelligence.**
|
||||||
|
|
||||||
|
- This concept envisions AI as a tool that empowers everyone, enabling collaboration and shared decision-making rather than monopolizing power.
|
||||||
|
- The goal is to restore the internet’s original ideals of openness, privacy, and community-driven innovation.
|
||||||
|
|
45
docs/internet_today/centralization_risk.md
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
---
|
||||||
|
title: 'Centralization Risk'
|
||||||
|
sidebar_position: 3
|
||||||
|
---
|
||||||
|
|
||||||
|
# Centralization Risk
|
||||||
|
|
||||||
|
![](img/blocked.png)
|
||||||
|
|
||||||
|
### Why Countries Need Their Own Infrastructure
|
||||||
|
|
||||||
|
The internet is not just cables; it’s a combination of physical infrastructure (like data centers and servers), software, and services that enable global communication and access to information. When countries don’t have control over their own infrastructure, they become overly dependent on external, centralized providers, which is risky for several reasons:
|
||||||
|
|
||||||
|
1. **Vulnerability to Political Decisions**
|
||||||
|
- Imagine a situation where a global service like Google decides to block access to certain countries due to political pressure or conflicts. Citizens, businesses, and governments in those regions would be instantly cut off from critical tools, data, and communication platforms.
|
||||||
|
|
||||||
|
2. **Disruptions in Emergencies**
|
||||||
|
- If a natural disaster, conflict, or cyberattack occurs, centralized systems become single points of failure. Without local infrastructure, countries cannot ensure continuity of services for their citizens.
|
||||||
|
|
||||||
|
3. **Loss of Sovereignty**
|
||||||
|
- Relying on foreign infrastructure means a country doesn’t have full control over its own data or communication. This compromises national security and privacy for both individuals and governments.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Ukraine: A Real-Life Example of Infrastructure Targeting
|
||||||
|
|
||||||
|
In the early stages of the war in Ukraine, one of the first targets was the country's data centers and communication infrastructure. Bombing these centers disrupted access to critical systems, cutting off communication and data services. This highlighted the vulnerability of relying on centralized or exposed infrastructure during conflicts.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### The Risks of Relying on Centralized Services Like Google or Microsoft
|
||||||
|
|
||||||
|
1. **Single Point of Failure**
|
||||||
|
|
||||||
|
Google and other tech giants operate as centralized hubs for many internet services, from search engines and email to cloud storage and apps.
|
||||||
|
|
||||||
|
If these services were disrupted (due to cyberattacks, internal decisions, or geopolitical conflicts), millions or even billions of people would lose access to essential tools overnight.
|
||||||
|
|
||||||
|
2. **Dependence on Foreign Entities**
|
||||||
|
|
||||||
|
Many countries rely on Google’s infrastructure for businesses, education, and government operations. If access to these services were blocked, it would lead to economic and societal chaos.
|
||||||
|
|
||||||
|
3. **Disaster in the Making**
|
||||||
|
|
||||||
|
A world dependent on a handful of centralized providers is a fragile one. If one of these providers experiences a major failure, it can create a ripple effect that impacts global economies, healthcare systems, and daily life.
|
36
docs/internet_today/compare_electricity.md
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
---
|
||||||
|
title: 'Something to think about.'
|
||||||
|
sidebar_position: 1
|
||||||
|
---
|
||||||
|
# Something to think about.'
|
||||||
|
|
||||||
|
## Would a country do this?
|
||||||
|
|
||||||
|
![](img/electricity.png)
|
||||||
|
|
||||||
|
Imagine this: Would it make sense to rely on electricity that’s generated far away, on the other side of the world? You’d need a super expensive cable to bring it to you, and if that cable breaks, you’d lose power completely. No country would ever choose to do this because it’s costly, inefficient, and risky.
|
||||||
|
|
||||||
|
|
||||||
|
## Why is +70% of the world doing it for the Internet?
|
||||||
|
|
||||||
|
![](img/we_are_doing_it_for_internet.png)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Now think about the internet. That’s exactly what most of the world is doing! Over 70% of the world depends on internet infrastructure that’s far away, requiring expensive cables and systems to bring it to users. Here’s why this doesn’t make sense:
|
||||||
|
|
||||||
|
1. **It’s Too Expensive**
|
||||||
|
Using distant infrastructure means you’re paying not only for the internet service itself but also for the costly cables and systems to deliver it. This makes it much more expensive than building local infrastructure.
|
||||||
|
|
||||||
|
2. **It’s Vulnerable**
|
||||||
|
A single cable or system can fail because of natural disasters, accidents, or even sabotage. If that happens, millions of people could lose access to the internet.
|
||||||
|
|
||||||
|
3. **It Compromises Control**
|
||||||
|
Relying on systems controlled by other countries or big companies means you have less independence. They control your access to the internet and your data.
|
||||||
|
|
||||||
|
4. **It’s Inefficient**
|
||||||
|
Just like it’s smarter to generate electricity close to where it’s used, it’s also better to host internet services closer to the people using them. This makes things faster, cheaper, and more reliable.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Instead of relying on faraway systems, we should build local, decentralized internet infrastructure. It’s safer, more affordable, and gives people more control over their digital lives.
|
43
docs/internet_today/conclusion.md
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
---
|
||||||
|
title: 'Conclusion'
|
||||||
|
sidebar_position: 10
|
||||||
|
---
|
||||||
|
|
||||||
|
![](img/conclusion.png)
|
||||||
|
|
||||||
|
Only 50% of world has decent access to Internet, let's recap the issues.
|
||||||
|
|
||||||
|
### **1. Centralization Risks**
|
||||||
|
|
||||||
|
- **Dependence on Few Entities:** Countries and individuals heavily rely on centralized providers like Google, Amazon, and Microsoft for critical services, creating vulnerabilities to disruptions, geopolitical conflicts, and external control over data and infrastructure.
|
||||||
|
- **Loss of Sovereignty:** Centralized data centers and infrastructure compromise autonomy, leaving nations and organizations at the mercy of foreign entities and global policies.
|
||||||
|
- **Fragility:** The current centralized model leads to single points of failure, where disruptions can have widespread economic and societal impacts.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **2. Internet Inefficiency**
|
||||||
|
- **Long-Distance Data Transfer:** Much of the world depends on internet infrastructure located far away, requiring data to travel unnecessarily long distances, increasing costs and reducing reliability.
|
||||||
|
- **Underutilized Hardware:** Modern computing systems fail to efficiently utilize hardware advancements due to inefficiencies like excessive context switching, leading to wasted resources and performance bottlenecks.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **3. Economic and Structural Challenges**
|
||||||
|
- **GDP Negative Impact:** Developing nations face economic disadvantages due to the internet's structure. Revenue is lost to global platforms (e.g., booking sites, advertising), creating economic leakage and dependency.
|
||||||
|
- **Infrastructure Costs:** Developing countries disproportionately bear the cost of accessing global internet infrastructure without reaping proportional benefits.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **4. Technological and Architectural Flaws**
|
||||||
|
|
||||||
|
![](img/problem_overview.png)
|
||||||
|
- **Outdated Protocols:** TCP/IP, the foundational internet protocol, was not designed for modern needs like dynamic networks, security, and session management, leading to inefficiencies and vulnerabilities.
|
||||||
|
- **Layer Complexity:** The current "onion-like" stack of layers in cloud and internet architecture adds unnecessary complexity and fragility, masking core problems rather than addressing them.
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **5. Not to forget less than 50% of world has decent internet.**
|
||||||
|
|
||||||
|
![alt text](img/fortune.png)
|
||||||
|
|
||||||
|
And we should not forget the internet is only available to 50% of the world
|
51
docs/internet_today/gdp_negative.md
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
---
|
||||||
|
title: GDP Negative
|
||||||
|
sidebar_position: 5
|
||||||
|
---
|
||||||
|
|
||||||
|
# Internet is GDP Negative
|
||||||
|
|
||||||
|
![](img/gdp_negative.png)
|
||||||
|
|
||||||
|
|
||||||
|
The concept of "Internet GDP negative" in this context highlights the economic disadvantages countries face when relying heavily on the centralized as located in wealthier nations.
|
||||||
|
|
||||||
|
> **A feasibility study done for Tanzania shows a yearly lost of 10 Billion USD per year.**
|
||||||
|
|
||||||
|
### 1. **Loss of Revenue from Booking Sites**
|
||||||
|
- Platforms like global booking and e-commerce websites often charge high commission fees, which results in local businesses losing a significant portion of their revenue.
|
||||||
|
- **Impact:** Instead of money circulating within the local economy, it is extracted and transferred to the countries where these platforms are headquartered.
|
||||||
|
- **For a small country like Zanzibar the impact of centralized booking sites means a loss of 200m USD per year**
|
||||||
|
|
||||||
|
### 2. **Loss of Advertising and Marketing Dollars**
|
||||||
|
- Companies within countries purchase online advertisements primarily on platforms like Google, Facebook, and others. These platforms are headquartered in a handful of nations, meaning most of the advertising revenue flows out.
|
||||||
|
- **Impact:** Local businesses indirectly fund foreign economies instead of building up domestic digital marketing ecosystems.
|
||||||
|
|
||||||
|
### 3. **Data Dependency**
|
||||||
|
- User data from most countries is stored and processed in foreign data centers. This creates dependency on a few nations for internet services and data storage.
|
||||||
|
- **Impact:** The local economy loses the opportunity to benefit from data-driven industries (e.g., AI, analytics). Furthermore, countries become vulnerable to foreign policy changes, data access restrictions, or breaches.
|
||||||
|
|
||||||
|
### 4. **Loss of Sovereignty and Influence**
|
||||||
|
- When internet infrastructure and critical data storage are external, nations lose control over how their citizens’ data is managed and utilized.
|
||||||
|
- **Impact:** This reduces the ability to enforce regulations, build influence, or compete globally in the digital space.
|
||||||
|
|
||||||
|
### 5. **Infrastructure Costs and Dependency**
|
||||||
|
- Sea cables and external server access are essential for internet connectivity, but these are often controlled by a few companies or nations.
|
||||||
|
- **Impact:** Developing countries pay disproportionately for infrastructure access and maintenance without gaining ownership or influence over it.
|
||||||
|
|
||||||
|
### 6. **Economic Leakage**
|
||||||
|
- Payments for cloud services, digital tools, and other online services are made to companies based overseas.
|
||||||
|
- **Impact:** Funds that could be used to build local internet ecosystems instead boost the economies of tech giants.
|
||||||
|
|
||||||
|
### 7. **Inability to Drive Local Innovation**
|
||||||
|
- Centralized control of data and reliance on external internet infrastructure limit opportunities for local startups to thrive.
|
||||||
|
- **Impact:** Countries lose out on developing their digital economies and creating jobs in the tech industry.
|
||||||
|
|
||||||
|
### 8. **Digital Divide**
|
||||||
|
- Developing nations often pay more for connectivity while receiving slower or less reliable services compared to developed nations.
|
||||||
|
- **Impact:** This perpetuates inequality in access to opportunities, education, and innovation.
|
||||||
|
|
||||||
|
These factors combined mean that many nations are effectively "Internet GDP negative"—paying more into the global internet economy than they gain.
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,18 +1,63 @@
|
|||||||
---
|
---
|
||||||
title: Too Many Layers
|
title: 'Hardware Badly Used.'
|
||||||
sidebar_position: 4
|
sidebar_position: 6
|
||||||
---
|
---
|
||||||
|
|
||||||
# Layers
|
### The IT world fails to harness the full potential of computer hardware.
|
||||||
|
|
||||||
![](../img/layers.png)
|
![](img/hardware_comparison.png)
|
||||||
|
|
||||||
Too many abstraction layers results in bad efficiency, performance loss, increased management costs, and scalability challenges.
|
|
||||||
|
|
||||||
This is due to a number of reasons.
|
While hardware advancements have surged forward, user experiences and features have often stagnated, failing to keep pace with these developments.
|
||||||
|
|
||||||
![](../img/fourreasons.png)
|
The original Commodore 64, with only 64 KB of memory, was a remarkably capable machine for its time. In contrast, today's computers have 8 GB or more of memory, yet their capabilities have not necessarily improved proportionately.
|
||||||
|
|
||||||
|
This highlights a regression in our ability to fully utilize computer hardware.
|
||||||
|
|
||||||
|
We are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential.
|
||||||
|
|
||||||
|
## Why are servers so badly used?
|
||||||
|
|
||||||
|
![](img/layers.png)
|
||||||
|
|
||||||
|
Context switches occur when a computer's processor shifts from executing one task (or context) to another. While necessary for multitasking, too many context switches lead to inefficiency, as demonstrated in this diagram. Here's a simplified explanation:
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Why Context Switches Are a Problem:
|
||||||
|
|
||||||
|
1. **What Are Context Switches?**
|
||||||
|
|
||||||
|
- Imagine you're working on two tasks: reading a book and answering emails. Every time you switch between them, you lose time refocusing. Computers experience a similar "refocusing" delay when switching between tasks.
|
||||||
|
|
||||||
|
2. **The Layered Architecture Causes Overhead**
|
||||||
|
|
||||||
|
- Modern computing systems use many layers (e.g., applications, storage drivers, network layers) to get work done. Each layer requires the system to switch between different modes (user mode and kernel mode) and tasks.
|
||||||
|
- For example:
|
||||||
|
- A web app might need to talk to a storage driver.
|
||||||
|
- This requires moving data through multiple layers (network, file system, etc.).
|
||||||
|
- Each layer adds a context switch.
|
||||||
|
|
||||||
|
3. **Millions of Switches Per Second**
|
||||||
|
|
||||||
|
- Each switch requires saving and loading the state of a process. This takes time and uses CPU power. When millions of context switches occur every second (as shown in the diagram), most of the computer’s capacity is spent switching rather than doing useful work.
|
||||||
|
|
||||||
|
4. **Result: Wasted Resources**
|
||||||
|
|
||||||
|
- Sometimes up to 90% of the computer’s capacity can be lost because of this inefficiency.
|
||||||
|
- Instead of performing tasks like running applications or processing data, the computer is stuck managing unnecessary complexity.
|
||||||
|
|
||||||
|
|
||||||
|
### Simplified Analogy:
|
||||||
|
|
||||||
|
Imagine driving on a highway where you have to stop and pay a toll at every intersection. You waste more time paying tolls than actually driving to your destination. Similarly, excessive context switches in modern systems cause the computer to "stop and pay tolls" constantly, leaving little time for real work.
|
||||||
|
|
||||||
|
|
||||||
|
### How did we get here:
|
||||||
|
|
||||||
|
![](img/eng_model_failing.png)
|
||||||
|
|
||||||
|
### Context Switching Details
|
||||||
|
|
||||||
In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time.
|
In the context of CPU scheduling in Linux (and in most modern operating systems), a context switch refers to the process of saving the state of a currently running process (such as its registers, program counter, and other relevant information) and loading the state of a different process to allow it to run. This switching of execution from one process to another is a fundamental aspect of multitasking operating systems, where multiple processes share the CPU's time.
|
||||||
|
|
BIN
docs/internet_today/img/3layers.png
Normal file
After Width: | Height: | Size: 121 KiB |
BIN
docs/internet_today/img/absurd.png
Normal file
After Width: | Height: | Size: 211 KiB |
BIN
docs/internet_today/img/ai_agents_centralized.png
Normal file
After Width: | Height: | Size: 69 KiB |
BIN
docs/internet_today/img/blocked.png
Normal file
After Width: | Height: | Size: 89 KiB |
BIN
docs/internet_today/img/conclusion.png
Normal file
After Width: | Height: | Size: 144 KiB |
BIN
docs/internet_today/img/electricity.png
Normal file
After Width: | Height: | Size: 245 KiB |
BIN
docs/internet_today/img/eng_model_failing.png
Normal file
After Width: | Height: | Size: 98 KiB |
BIN
docs/internet_today/img/fortune.png
Normal file
After Width: | Height: | Size: 2.2 MiB |
BIN
docs/internet_today/img/gdp_negative.png
Normal file
After Width: | Height: | Size: 1.3 MiB |
BIN
docs/internet_today/img/hardware_comparison.png
Normal file
After Width: | Height: | Size: 210 KiB |
BIN
docs/internet_today/img/internet_cables.png
Normal file
After Width: | Height: | Size: 1.3 MiB |
BIN
docs/internet_today/img/layers.png
Normal file
After Width: | Height: | Size: 134 KiB |
BIN
docs/internet_today/img/onion.png
Normal file
After Width: | Height: | Size: 227 KiB |
BIN
docs/internet_today/img/problem_overview.png
Normal file
After Width: | Height: | Size: 186 KiB |
BIN
docs/internet_today/img/race_intelligence.png
Normal file
After Width: | Height: | Size: 161 KiB |
BIN
docs/internet_today/img/this_is_our_internet.png
Normal file
After Width: | Height: | Size: 770 KiB |
BIN
docs/internet_today/img/we_are_doing_it_for_internet.png
Normal file
After Width: | Height: | Size: 256 KiB |
@ -1,56 +1,44 @@
|
|||||||
---
|
---
|
||||||
title: The Internet Today
|
title: 'More than cables'
|
||||||
sidebar_position: 2
|
sidebar_position: 2
|
||||||
---
|
---
|
||||||
|
|
||||||
# Rethinking the Internet
|
# Internet is more than the cables.
|
||||||
|
|
||||||
**The Three Layers Of The Internet**
|
|
||||||
|
|
||||||
![](../img/3layers.png)
|
|
||||||
|
|
||||||
The Internet is made up of 3 layers:
|
![](img/3layers.png)
|
||||||
|
|
||||||
1. Compute & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below).
|
**The Internet is made up of 3 layers:**
|
||||||
|
|
||||||
|
1. Compute, AI & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below).
|
||||||
|
|
||||||
2. Network: this is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and for most countries very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity.
|
2. Network: this is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and for most countries very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity.
|
||||||
|
|
||||||
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
|
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
|
||||||
|
|
||||||
ThreeFold is providing solutions for the first 2 layers and allows everyone else to build on top.
|
We are providing a more optimized solution for the first 2 layers and allows everyone else to build on top.
|
||||||
|
|
||||||
**Current Challenges**
|
## The role of Internet Cables.
|
||||||
|
|
||||||
Digital information mainly travels over large fiber backbone links as pictured here.
|
Digital information mainly travels over large fiber backbone links as pictured here.
|
||||||
|
|
||||||
![](../img/global_net.png)
|
![](img/internet_cables.png)
|
||||||
|
|
||||||
The Internet as we know it has significantly diverged from its original intent. If 2 people in e.g. Zanzibar (an Island in Africa) use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted and back again.
|
The Internet as we know it has significantly diverged from its original intent. If 2 people in e.g. Zanzibar (an Island in Africa) use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted and back again.
|
||||||
|
|
||||||
This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be.
|
This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be.
|
||||||
|
|
||||||
![](../img/network_path.png)
|
![](img/absurd.png)
|
||||||
|
|
||||||
**Issues with Autonomy and Sovereignty**
|
|
||||||
|
## The role of datacenters.
|
||||||
|
|
||||||
|
![](img/this_is_our_internet.png)
|
||||||
|
|
||||||
|
The internet applications stacks are replicated many times for the various applications we use, each requiring its own full infrastructure. This approach is unsustainable and inefficient.
|
||||||
|
|
||||||
|
## Issues with Autonomy and Sovereignty
|
||||||
|
|
||||||
Our current internet model compromises autonomy and sovereignty. Most data is stored in large data centers controlled by a few major corporations, effectively turning users into products.
|
Our current internet model compromises autonomy and sovereignty. Most data is stored in large data centers controlled by a few major corporations, effectively turning users into products.
|
||||||
|
|
||||||
![alt text](../img/we_are_products.png)
|
|
||||||
|
|
||||||
|
|
||||||
Moreover, the internet is replicated many times across various applications, each requiring its own full infrastructure. This approach is unsustainable and inefficient.
|
|
||||||
|
|
||||||
## The ThreeFold Cloud Engine resolves quite a lot of those issues
|
|
||||||
|
|
||||||
ThreeFold resolves
|
|
||||||
|
|
||||||
- reliability for data, data can never be corrupted nor lost
|
|
||||||
- reliability for network, connectivity should always be possible
|
|
||||||
- sovereignity
|
|
||||||
- scalability
|
|
||||||
- security
|
|
||||||
- locality
|
|
||||||
- cost
|
|
||||||
- management (easier to scale)
|
|
||||||
|
|
||||||
|
|
116
docs/internet_today/internet_risk.md
Normal file
@ -0,0 +1,116 @@
|
|||||||
|
---
|
||||||
|
title: 'Internet Protocol Is Broken'
|
||||||
|
sidebar_position: 6
|
||||||
|
---
|
||||||
|
|
||||||
|
The foundational protocols of the internet, TCP/IP (Transmission Control Protocol/Internet Protocol), were created in the 1970s to connect a few academic and military computers. While they served their initial purpose, they were never designed for the complex, global, and interconnected world we live in today. Even IPv6, which addresses some scalability issues, does not solve the fundamental design flaws.
|
||||||
|
|
||||||
|
|
||||||
|
### How the Internet is Broken Due to TCP/IP Design
|
||||||
|
|
||||||
|
The internet, as we know it today, is built on an outdated foundation that was designed for simpler times. Decades ago, TCP/IP was created to connect a handful of computers for research and military purposes. It worked well back then, but it’s no longer enough to handle the complexities of our modern, globally interconnected world. Unless we address its flaws, the internet will struggle to keep up—and could ultimately fail us.
|
||||||
|
|
||||||
|
One major issue is that the internet has no way of "remembering" conversations. For example, when you watch a video or make a video call, your device creates a session—a temporary connection with another server. If this session is interrupted, the entire connection breaks, and you must start over. TCP/IP wasn’t designed to manage sessions, making it unreliable for modern apps and services that depend on continuous communication.
|
||||||
|
|
||||||
|
Another problem is the internet’s complexity. The way it works involves layers of technology stacked on top of each other—apps, storage systems, networks, and more. These layers often don’t communicate efficiently, wasting resources and making everything slower, more expensive, and harder to fix. This complexity also makes the internet fragile, as small issues can cascade into larger failures.
|
||||||
|
|
||||||
|
Security is another area where TCP/IP falls short. It wasn’t designed with cybersecurity in mind, which is why we rely on add-ons like firewalls, VPNs, and encryption. But these tools are essentially patches over a flawed system, and they add even more complexity, making the internet less robust and more vulnerable to attacks.
|
||||||
|
|
||||||
|
Modern services and devices have also outgrown the static design of TCP/IP. The system assumes that servers and devices stay in fixed locations, but today’s internet is dynamic. Cloud services, mobile devices, and apps often move across networks. This static model creates inefficiencies and slows down the system.
|
||||||
|
|
||||||
|
Adding to the problem is the internet’s dependence on a few centralized services, such as Google, Amazon, and Microsoft. These companies control much of the infrastructure we rely on for communication, storage, and services. If one of them fails—or if access is blocked due to political conflicts—entire regions could lose critical internet functions. This centralization makes the system fragile and leaves users vulnerable.
|
||||||
|
|
||||||
|
> The stakes are high. The internet is essential for communication, education, business, and so much more. Yet its foundation is crumbling under modern demands. Without major changes, we’ll see more frequent failures, slower services, and increased vulnerabilities. In extreme cases, parts of the internet could break entirely.
|
||||||
|
|
||||||
|
To fix this, we need a smarter, more resilient approach. Decentralized networks can distribute resources and reduce our dependence on a few central providers. Emerging technologies like RINA (Recursive Inter-Network Architecture) offer a simplified, more secure, and more efficient alternative to TCP/IP. These systems are designed to handle the needs of the modern internet, with built-in reliability, smarter communication, and security at their core.
|
||||||
|
|
||||||
|
> The bottom line is clear: the internet’s outdated foundation is holding us back. If we want the internet to remain reliable and serve future generations, we must address these issues now. A decentralized, secure, and modernized internet isn’t just a technical upgrade—it’s a necessity for our connected world.
|
||||||
|
|
||||||
|
|
||||||
|
## Tech brief (only for the experts)
|
||||||
|
|
||||||
|
|
||||||
|
### 1. **Lack of Session Management**
|
||||||
|
- **TCP/IP’s Shortcomings:**
|
||||||
|
- TCP/IP lacks true session management. A session represents an ongoing communication between two entities (e.g., a user browsing a website). If the connection is interrupted (e.g., due to a network outage or device change), the session is lost, and applications must restart or recover manually.
|
||||||
|
- This flaw creates inefficiencies in modern applications that require reliable, continuous communication, such as video calls, gaming, or IoT devices.
|
||||||
|
|
||||||
|
- **Why It Matters:**
|
||||||
|
- Every time a session breaks, applications have to rebuild connections at a higher level (e.g., re-authenticate or restart a video call). This is inefficient and increases complexity, making the internet fragile and less resilient.
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### 2. **Layer Violations**
|
||||||
|
|
||||||
|
- **The Problem:**
|
||||||
|
- TCP/IP combines different functionalities into a single stack, leading to inefficiencies. For example:
|
||||||
|
- Routing decisions happen at the IP layer.
|
||||||
|
- Reliable data transfer happens at the TCP layer.
|
||||||
|
- However, these layers are not isolated and often interfere with each other, creating unnecessary overhead.
|
||||||
|
|
||||||
|
- **Impact:**
|
||||||
|
- Modern networks require additional layers (e.g., firewalls, VPNs, NATs) to patch these issues, making the architecture increasingly complex and brittle.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### 3. **No Built-In Security**
|
||||||
|
- **TCP/IP Design Flaw:**
|
||||||
|
- Security was not a priority when TCP/IP was designed. The protocols do not inherently protect against common threats like spoofing, hijacking, or denial of service.
|
||||||
|
- IPv6 introduces some improvements, such as built-in IPsec, but these are optional and often not used, leaving the same vulnerabilities.
|
||||||
|
|
||||||
|
- **Impact:**
|
||||||
|
- Every modern application must implement its own security mechanisms (e.g., HTTPS, VPNs), leading to duplicated efforts and inconsistent protections.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### 4. **Scalability Issues**
|
||||||
|
|
||||||
|
- **IPv4 vs. IPv6:**
|
||||||
|
- IPv4, with its 32-bit addressing, exhausted available addresses, leading to NAT (Network Address Translation) as a workaround. This introduced complexity and broke the end-to-end connectivity principle of the internet.
|
||||||
|
- IPv6, with 128-bit addressing, solves the address exhaustion problem but does not address underlying issues like routing table explosion or inefficiencies in the protocol stack.
|
||||||
|
|
||||||
|
- **Routing Problems:**
|
||||||
|
- The lack of built-in session and naming management makes routing inefficient. Large routing tables and decentralized updates slow down the internet and make it harder to scale.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### 5. **No Support for Application-Centric Networking**
|
||||||
|
- **TCP/IP’s Assumption:**
|
||||||
|
- The protocol assumes communication happens between fixed endpoints (e.g., IP addresses). Modern applications, however, focus on data and services rather than specific endpoints. For example:
|
||||||
|
- Cloud applications may move across data centers.
|
||||||
|
- Mobile devices frequently change networks.
|
||||||
|
- TCP/IP’s static model is incompatible with this dynamic, service-oriented world.
|
||||||
|
|
||||||
|
- **Impact:**
|
||||||
|
- Workarounds like DNS (Domain Name System) and CDNs (Content Delivery Networks) add layers of complexity, but they’re still built on a flawed foundation.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### RINA: A Better Alternative
|
||||||
|
|
||||||
|
The **Recursive Inter-Network Architecture (RINA)** proposes a solution to the flaws of TCP/IP by rethinking the internet's architecture. Here’s how RINA addresses these issues:
|
||||||
|
|
||||||
|
1. **Unified Layering:**
|
||||||
|
- Unlike TCP/IP, which has rigid and distinct layers, RINA uses recursive layers. Each layer provides the same functionalities (e.g., routing, security, session management), simplifying the architecture.
|
||||||
|
|
||||||
|
2. **Built-In Session Management:**
|
||||||
|
- RINA natively supports session management, ensuring continuity and reliability for modern applications, even in the face of interruptions.
|
||||||
|
|
||||||
|
3. **Application-Centric Networking:**
|
||||||
|
- RINA treats applications as first-class citizens, focusing on the services they need rather than rigid endpoint communication. This aligns with the dynamic nature of modern networks.
|
||||||
|
|
||||||
|
4. **Improved Security:**
|
||||||
|
- Security is integral to RINA, with mechanisms for authentication, confidentiality, and integrity built into every layer.
|
||||||
|
|
||||||
|
5. **Simplified Routing and Scaling:**
|
||||||
|
- RINA reduces the size and complexity of routing tables, making the network easier to scale and manage.
|
||||||
|
|
||||||
|
- **Source:**
|
||||||
|
- [RINA Leaflet](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### More info
|
||||||
|
|
||||||
|
more info [https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf](https://www.open-root.eu/IMG/pdf/rina-leaflet_20191115_en.pdf)
|
26
docs/internet_today/onion_analogy.md
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
title: Painkillers
|
||||||
|
sidebar_position: 7
|
||||||
|
---
|
||||||
|
|
||||||
|
![](img/onion.png)
|
||||||
|
|
||||||
|
# The Onion Analogy
|
||||||
|
|
||||||
|
Most cloud & internet stacks can be compared to an onion, where each layer represents an additional component or service added to address a problem in the system. However, like peeling an onion, as you dig deeper, you often find that these layers are not solving the core issues but merely masking symptoms, leading to a complex and often fragile structure.
|
||||||
|
|
||||||
|
**Quick Fixes and Additions**
|
||||||
|
|
||||||
|
- **Problem:** When an issue arises, such as performance bottlenecks or security vulnerabilities, organizations often add another tool, service, or layer to the cloud stack to mitigate the issue.
|
||||||
|
- **Analogy:** This is akin to applying a bandage or taking a painkiller when you feel pain. The immediate discomfort might be alleviated, but the underlying problem remains untouched.
|
||||||
|
|
||||||
|
|
||||||
|
### Painkiller Approach: Treating Symptoms, Not Causes
|
||||||
|
|
||||||
|
This onion-like structure represents a "painkiller approach" to cloud management, where immediate issues are addressed with quick fixes rather than tackling the underlying problems. Over time, this approach leads to several challenges:
|
||||||
|
|
||||||
|
- **Cyber Pandemic** The Cyber Pandemic is real, added these layers leads to weak security.
|
||||||
|
- **Increased Complexity:** Each new layer adds complexity, making the system harder to understand and maintain.
|
||||||
|
- **Higher Costs:** More layers often mean more resources, licenses, and management overhead, increasing operational costs.
|
||||||
|
- **Reduced Agility:** The more complex the stack, the harder it is to make changes or adapt to new requirements, reducing the system’s overall agility.
|
||||||
|
- **Fragility:** A stack built on temporary fixes is more prone to failures because the core issues are not resolved, making the system brittle.
|
@ -1,53 +1,48 @@
|
|||||||
---
|
---
|
||||||
sidebar_position: 1
|
sidebar_position: 1
|
||||||
description: ThreeFold is laying the foundation for Web4, the next generation of the Internet.
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Introduction
|
![](img/web0.png)
|
||||||
![](./img/dream_comes_true.png)
|
|
||||||
|
|
||||||
For over 20 years, through more than seven startups, ThreeFold has been developing an infrastructure base layer of software. This platform is ideal for any Decentralized Physical Infrastructure Network (DePIN) or Web 2/3 project to build upon.
|
|
||||||
|
|
||||||
This robust platform serves as a truly decentralized infrastructure base layer, designed to be hosted by everyone, for everyone.
|
|
||||||
|
|
||||||
## ThreeFold: The Base Layer for DePin and Web 2 and 3
|
|
||||||
|
|
||||||
![](./img/base_layer.png)
|
|
||||||
|
|
||||||
ThreeFold has developed a scalable, reliable, and efficient decentralized infrastructure base layer.
|
|
||||||
This serves as the foundational base for any Decentralized Physical Infrastructure Network (DePin) or Web 3 application.
|
|
||||||
|
|
||||||
## Anyone can be a cloud service provider
|
|
||||||
|
|
||||||
![ThreeFold Node](./img/3node_simple.png)
|
|
||||||
|
|
||||||
**Getting started is easy:** Just get a ThreeFold node and connect it to the Internet.
|
|
||||||
|
|
||||||
Around the world, thousands of entities, from individuals to companies, have become ThreeFold farmers. They connect their computers, known as nodes, to the Internet and install our software. This allows them to provide GPU, compute, storage, and network capacity to the ThreeFold Grid.
|
|
||||||
|
|
||||||
Farmers have two options: they can either buy a ready-made node from our partners or build their own using our detailed DIY (Do It Yourself) guides.
|
|
||||||
|
|
||||||
|
|
||||||
## Usable by Everyone
|
Welcome to the future of the Internet, **Web 0**, a logical evolution that rethinks and reinvents the foundations of how we connect, communicate, and collaborate globally.
|
||||||
|
|
||||||
![](./img/architecture_usage.png)
|
The Internet is burdened with inefficiencies, risks, and a growing dependency on centralization.
|
||||||
|
|
||||||
Our platform is designed for everyone, whether you are a developer, system administrator, or IT expert.
|
**This legacy has left over 50% of the world without decent access, widened economic gaps, and exposed critical vulnerabilities.**
|
||||||
|
|
||||||
## Open Source Technology
|
#### **The Challenges We Face**
|
||||||
|
|
||||||
All of our technology is open source and build by our tech company called TF9 and used to build the ThreeFold Grid. For more information, visit the [ThreeFold Website](https://www.threefold.io).
|
- **Centralization Risks**: Our digital lives are controlled by a few corporations, compromising sovereignty and increasing fragility.
|
||||||
|
- **Economic Loss of GDP**: The Internet has become GDP-negative for many nations, funneling resources out of local economies into global giants.
|
||||||
|
- **Outdated Infrastructure**: TCP/IP, the Internet's core protocol, was never designed for the complexities of today, leading to inefficiency, security flaws, and waste.
|
||||||
|
- **Environmental and Economic Inefficiency**: Over 70% of the world relies on distant infrastructure, making access expensive, unreliable, and dependent on fragile global systems.
|
||||||
|
|
||||||
## Bridging the Web2, Web3, and Blockchain Worlds
|
---
|
||||||
|
|
||||||
ThreeFold acts as the essential layer connecting traditional web technologies with the new, decentralized Web3 and blockchain worlds.
|
### **Our Vision**
|
||||||
|
|
||||||
![](./img/pathtoweb4.png)
|
**Web 0** is not just an alternative; it’s the reinvention of the Internet as it was meant to be: local, decentralized, and resilient.
|
||||||
|
|
||||||
## Scalability and Growth
|
By addressing core issues and optimizing the Internet's foundational layers, we enable:
|
||||||
|
|
||||||
Our system is designed to scale effortlessly, meeting the needs of a rapidly evolving digital landscape.
|
1. **Decentralized AI, Compute and Storage**: Bringing autonomy and reliability to your doorstep, eliminating the inefficiencies of centralized data centers.
|
||||||
|
2. **Smarter Networking**: Keeping data local whenever possible, reducing costs and boosting performance. Invent new algoritms to fix some of the serious issues TCP (the current internet protocol) is facing.
|
||||||
|
3. **Better Hardware Utilization**: Unlocking the true potential of computing power by eliminating wasteful inefficiencies, this leads to better security and energy usage.
|
||||||
|
|
||||||
![](./img/scale.png)
|
![](img/evolution.png)
|
||||||
|
|
||||||
|
**Web 0 is here. It’s ready. Its a logival evolution. It’s scalable.**
|
||||||
|
|
||||||
|
> It’s time to restore control, privacy, and equality to the digital age.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **Why It Matters**
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
This is more than technology, it’s about sovereignty, security, and sustainability. Web 0 empowers local communities, restores economic balance, and ensures that no one is left behind in our connected world.
|
||||||
|
|
||||||
|
Join us in embracing the Internet we all deserve—a resilient, decentralized, and equitable global network. Together, we can ensure a brighter digital future.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"label": "Key Innovations",
|
"label": "Key Innovations",
|
||||||
"position": 5,
|
"position": 6,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"label": "Compute",
|
"label": "Compute",
|
||||||
"position": 1,
|
"position": 5,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
||||||
}
|
}
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
sidebar_position: 4
|
sidebar_position: 20
|
||||||
---
|
---
|
||||||
|
|
||||||
# Energy Efficient
|
# Energy Efficient
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"label": "Network",
|
"label": "Network",
|
||||||
"position": 2,
|
"position": 6,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"label": "Storage",
|
"label": "Storage",
|
||||||
"position": 3,
|
"position": 7,
|
||||||
"link": {
|
"link": {
|
||||||
"type": "generated-index",
|
"type": "generated-index",
|
||||||
}
|
}
|
||||||
|
7
docs/team/_category_.json
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
{
|
||||||
|
"label": "Our Story",
|
||||||
|
"position": 4,
|
||||||
|
"link": {
|
||||||
|
"type": "generated-index"
|
||||||
|
}
|
||||||
|
}
|
BIN
docs/team/img/exits.png
Normal file
After Width: | Height: | Size: 517 KiB |
BIN
docs/team/img/ourworld.png
Normal file
After Width: | Height: | Size: 239 KiB |
BIN
docs/team/img/the_story.png
Normal file
After Width: | Height: | Size: 234 KiB |
BIN
docs/team/img/world_records.png
Normal file
After Width: | Height: | Size: 217 KiB |
31
docs/team/ourstory.md
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
---
|
||||||
|
title: Web 0 Story
|
||||||
|
sidebar_position: 1
|
||||||
|
---
|
||||||
|
# Our Story to Web 0
|
||||||
|
|
||||||
|
![](img/the_story.png)
|
||||||
|
|
||||||
|
**Web 0: The Next Evolution of the Internet**
|
||||||
|
|
||||||
|
Web 0 represents a bold reimagination of the internet, built to address the inefficiencies, vulnerabilities, and centralization of today's digital world. Unlike its predecessors, Web 0 doesn’t just add layers of technology—it reinvents the very foundation of the internet to prioritize decentralization, efficiency, and sovereignty.
|
||||||
|
|
||||||
|
In a world dominated by centralized cloud systems, Web 0 brings a much-needed shift. It eliminates costly dependencies, restores autonomy to users and nations, and ensures greater security. This new internet architecture focuses on decentralizing physical infrastructure while delivering seamless, self-healing applications. The result is a system designed for resilience and sustainability, capable of adapting to modern demands.
|
||||||
|
|
||||||
|
### **Why Web 0 Matters**
|
||||||
|
While Web 2.0 centered on social connections and Web 3.0 introduced blockchain, Web 0 goes deeper—it rebuilds the core principles of the internet to address its long-standing flaws. At its heart is the **Sovereign Internet**, allowing countries and regions to control their own digital infrastructure and data, reducing reliance on global tech giants. It also introduces **DePIN (Decentralized Physical Infrastructure Networks)**, combining software and hardware into systems that deliver real-world impact.
|
||||||
|
|
||||||
|
### **Proven and Operational**
|
||||||
|
Web 0 is no longer just a vision. Over the past eight years, it has evolved from a concept to a reality:
|
||||||
|
- **Global Reach**: Deployed in over 50 countries, Web 0 has proven its ability to handle large-scale applications.
|
||||||
|
- **Real-World Success**: Partnerships like Sikana, an education platform with billions of views, demonstrate how Web 0 reduces cloud costs while scaling globally.
|
||||||
|
- **Tangible Impact**: In East Africa, the creation of a Sovereign Digital Zone and CyberCity showcases Web 0’s ability to transform regions by enabling local infrastructure and governance.
|
||||||
|
|
||||||
|
### **The Growing Ecosystem**
|
||||||
|
The Web 0 ecosystem continues to expand with groundbreaking innovations:
|
||||||
|
- **3AI**: Geo-aware artificial intelligence that adapts to local needs.
|
||||||
|
- **3Phone**: A secure, privacy-focused device.
|
||||||
|
- **3Router**: Encrypted network connectivity.
|
||||||
|
- **3Bot**: Self-healing applications that reduce downtime and improve reliability.
|
||||||
|
|
||||||
|
With $65 million in investments and years of development, Web 0 has transitioned from a groundbreaking idea to a proven, operational reality. It offers a future where the internet is decentralized, resilient, and truly empowering for people and nations alike.
|
64
docs/team/ourworld.md
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
---
|
||||||
|
title: 'OurWorld Venture Creator'
|
||||||
|
sidebar_position: 3
|
||||||
|
---
|
||||||
|
|
||||||
|
# OurWorld Venture Creator
|
||||||
|
|
||||||
|
![](img/ourworld.png)
|
||||||
|
|
||||||
|
OurWorld envisions a transformative future built on the principles of sovereignty across three key domains: internet, legal, and financial. By empowering individuals and organizations, it seeks to create a decentralized, sustainable, and fair ecosystem that redefines the way we interact with technology, governance, and the economy.
|
||||||
|
|
||||||
|
**Internet Sovereignty** lies at the heart of this vision, enabling everyone to become digitally sovereign. This means providing individuals with full control over their digital presence and assets, free from the reliance on centralized entities. OurWorld addresses the fundamental flaws of the current internet—such as lack of privacy, security vulnerabilities, and monopolization—by building a new foundation that ensures trust and freedom. Through technologies like Augmented Collective Intelligence, it fosters collaborative problem-solving and scalable innovation, creating a more inclusive and empowered digital society.
|
||||||
|
|
||||||
|
**Legal Sovereignty** focuses on creating fair, accessible, and innovative legal frameworks that prioritize human dignity and technological neutrality. This includes the establishment of Digital Freezones—legally independent hubs for digital innovation—and the development of a futuristic Cyber City spanning 700,000 square meters. Designed for co-living and co-working, this city will be a space where sustainability and collaboration thrive. Complementing these initiatives is a unique dispute resolution system that combines the analytical power of AI with the fairness of human judgment to deliver unbiased and equitable outcomes.
|
||||||
|
|
||||||
|
**Financial Sovereignty** aims to democratize financial systems, promoting inclusivity and resilience in an increasingly digital world. The Digital Freezone will also serve as a hub for financial innovation, supporting decentralized finance (DeFi) projects and providing a secure environment for trading regulated digital assets such as shares, gold, and cryptocurrencies. Regenerative investment models, such as Public-Private Partnerships, will fund sustainable and impactful projects, while advanced liquidity pool concepts will enhance market fluidity, creating accessible investment opportunities for everyone.
|
||||||
|
|
||||||
|
By uniting these three pillars of sovereignty, OurWorld is building a comprehensive system that empowers individuals and organizations to thrive. This vision seeks to foster a more equitable, resilient, and innovative global society, unlocking the potential for a truly decentralized future.
|
||||||
|
|
||||||
|
### **1. TF9**
|
||||||
|
- **Description**: Next-generation Web 0 software company.
|
||||||
|
- **Key Features**:
|
||||||
|
- First platform capable of providing unmatched privacy, security, and unlimited scale.
|
||||||
|
- Lowest possible cost and energy usage for Web 2, 3, and 4.
|
||||||
|
- **Milestones**:
|
||||||
|
- Over 1 million users onboarded through its technology.
|
||||||
|
- **Goal**: Become a leading player in privacy-focused and scalable technology solutions.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **2. ThreeFold**
|
||||||
|
- **Description**: Decentralized Web 0 platform for the world.
|
||||||
|
- **Key Features**:
|
||||||
|
- Enables a decentralized platform for co-creating the future of the internet.
|
||||||
|
- Incorporates Web 4 and Augmented Collective Intelligence.
|
||||||
|
- **Goal**: Be one of the top 5 players in DePIN (Decentralized Physical Infrastructure Network).
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **3. Sikana**
|
||||||
|
- **Description**: Essential life skills education platform.
|
||||||
|
- **Key Features**:
|
||||||
|
- Delivered over 2 billion courses globally.
|
||||||
|
- Aims to become the "Netflix of Education."
|
||||||
|
- **Goal**: Provide education to billions of people worldwide at virtually no cost.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **4. Digital Freezone**
|
||||||
|
- **Description**: 100% sovereign, secure digital free zone.
|
||||||
|
- **Key Features**:
|
||||||
|
- First-of-its-kind legal and financial infrastructure.
|
||||||
|
- Offers full sovereignty and dispute resolution services.
|
||||||
|
- **Goal**: Achieve fair legal and financial independence for hundreds of millions of people within two years.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### **5. OW Cyber City**
|
||||||
|
- **Description**: A +700,000 m² startup city.
|
||||||
|
- **Key Features**:
|
||||||
|
- Includes sovereign land and over 3,000 houses.
|
||||||
|
- Projected $600M revenue potential.
|
||||||
|
- **Goal**: Support 10,000 people in building a regenerative future.
|
||||||
|
|
17
docs/team/team.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
title: 'Team'
|
||||||
|
sidebar_position: 2
|
||||||
|
---
|
||||||
|
|
||||||
|
## We have been around.
|
||||||
|
|
||||||
|
![](img/exits.png)
|
||||||
|
|
||||||
|
We are part of a group of 5 companies which are hosted by OurWorld in Mauritius which is a venture creator.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## World Records
|
||||||
|
|
||||||
|
![](img/world_records.png)
|
||||||
|
|
@ -8,7 +8,7 @@ cd "${script_dir}"
|
|||||||
|
|
||||||
echo "Docs directory: $script_dir"
|
echo "Docs directory: $script_dir"
|
||||||
|
|
||||||
Check if bun is installed
|
#Check if bun is installed
|
||||||
if ! command -v bun &> /dev/null; then
|
if ! command -v bun &> /dev/null; then
|
||||||
echo "Bun is not installed. Installing..."
|
echo "Bun is not installed. Installing..."
|
||||||
curl -fsSL https://bun.sh/install | bash
|
curl -fsSL https://bun.sh/install | bash
|
||||||
|