Kompute connects consumers of cloud services with resource providers of the network who can generate revenue by providing their computing resources and staking a specific amount of tokens.
Users of the network are able to deploy applications, containers or even virtual environments interacting with contracts deployed on the Ethereum blockchain through Web3 libraries.
Based on kubernetes
The off-chain layer running on the nodes is managed by Kubernetes, an open source orchestrator that automates Linux container operations. It eliminates many of the manual processes involved in deploying and scaling containerized applications.
The Kubernetes system automates the deployment and management of cloud native applications. It distributes application workloads across the network and scales automatically based on demand.
Secure by design
The containers that perform computational tasks use CRI-O as container engine, which removes all the linux capabilities from the container itself. This secures the runtime from malicious actors gaining access to it.
Kompute is compatible with trusted execution environments, ensuring the confidentiality of the software via memory enclaves. Intel SGX technology is supported.
Why choose Kompute
Decentralized cloud computing leverages infrastructure that is designed to mitigate undue control or influence.
High Availability Redundant design
Kompute automatically places and balances containerized workloads to accommodate increasing demand.
Scalability Limitless applications
Applications automatically scale in and out based on demand, efficiency and a number of other metrics.
Reliable & Low Cost Fair pricing model
The protocol is designed to adjust the prices automatically, offering better pricing than centralized providers.
Ecosystem key features
Our ecosystem enforces a permissionless model that enables developers to employ their services with reduced restrictions.
All the transactions on the network are enforced by smart contracts and recorded on the blockchain.
The protocol is confidential at multiple layers, protecting the user intelectual propertly.
Resource providers get incentivized by providing computing resources and maintaining the network integrity.
The integrity of the code and the data is guaranteed. Only authorized actions against the blockchain are allowed.