SlideShare a Scribd company logo
1 of 28
Download to read offline
What Does Real World
Mass Adoption of
Decentralized Tech Look
Like?
All Things Open 2023
Karl Mozurkewich, Sr. Enterprise Architect
Introduction
What does it mean to be centralized?
The US National Institute of Standards and Technology (NIST) defines cloud computing as
“a model for enabling ubiquitous, convenient, on-demand network access to a shared pool
of configurable computing resources (e.g., networks, servers, storage, applications,
services) that can be rapidly provisioned and released with minimal management effort or
service provider interaction.”1
According to NIST, cloud computing is composed of the
following (figure 1):
● Five essential characteristics—On-demand self- service, broad network access,
resource pooling, rapid elasticity and measured service
● Three service models—Software as a Service (SaaS), Platform as a Service
(PaaS) and Infrastructure as a Service (IaaS)
● Four deployment models—Private cloud, community cloud, public cloud and
hybrid cloud
Daniel D. Wu, Ph.D., CISA, CISM - 29 September 2021 - Decentralized Cloud Computing
Introduction
What does it mean to be Decentralized?
Tenets
● No central points of control
● Curb inequality
● Smooth Network Effects
Daniel D. Wu, Ph.D., CISA, CISM - 29 September 2021 - Decentralized Cloud Computing
Design Traits
● Secure-by-Default (Zero Trust)
● Efficient resource usage
● Resilient Operation
Historical Context
● Internet
● Usenet / IRC
● Napster / Gnutella / Bittorrent
● Bitcoin and the emergence of
blockchain technology.
Characteristics of Decentralized Systems
“create a technical drawing that represents a
centralized data network”
“create a technical drawing that represents a
distributed data storage network.”
Characteristics of Decentralized Systems
Decentralized Systems == Distributed Systems
● CAP
● Trustless operations. (Zero-Trust)
● Peer-to-peer networks
● Scalability
● Fault Tolerance
● Transparency and immutability. (maybe)
● Open Source
Geographically diverse data centers
Virtually unlimited bandwidth
Complex routing between PoPs
Global container distribution
Minimal localized high speed storage
Latency sensitive applications
The state of distributed
compute today.
Centralized Applications
Central Authority
Single Point of Failure
Opaque
Security by People
Trust me
Decentralized Applications
Consensus
Distributed Nodes
Transparent
Security by Math
Zero trust
VS
Decentralized services are fundamentally different
from centralized services
Centralized Applications
Amazon
Google
Microsoft
Secretary of State
Decentralized Applications
Storj
Filecoin
Ethereum
Bitcoin
VS
Decentralized services are fundamentally different
from centralized services
Sectors Vulnerable to Disruption
● Financial systems and banking (e.g., decentralized finance and
embedded finance)
● Supply chains (e.g., transparent and traceable goods).
● Social media (e.g., decentralized platforms).
● Web hosting and storage (e.g., web services).
● Governance and voting systems.
“Only a crisis - actual or perceived - produces real change. When that crisis occurs, the actions that
are taken depend on the ideas that are lying around.”
― Milton Friedman
Adoption - What does It look like?
B2B vs. B2C - Approaches differ for the end-users
B2B requires:
● Certainty
● Known Quantities, TCO
● Guarantees
● Regular Updates
● Provenance
B2C requires:
● Speed
● Network Effects
● Personalization
● Silent & Graceful
Errors
Adoption - Real World Examples
● Infrastructure
a. Compute / time sharing (Livepeer, Akash, Valdi)
b. Storage (Storj, Filecoin)
● Decentralized Identity
● Mobile Telecommunication infrastructure
(MVNOs, DePIN)
● Distributed Data Exchanges
Let’s look at
cloud object
storage
Outcome first: migrate from Hyperscalers
(AWS, Azure, GCP)
Reduce cost, increase privacy and
security, democratize cloud economy,
minimize centralized dependencies
But you can’t skimp on the actual cloud
storage - it has to be good (Performance,
durability, compatibility)
Exceed feature parity, example, regionless
global implementation
Adoption Architecture - Storj has 3 key elements
System Overview
Nodes
Tens of thousands of shared hard drives
store data on the network, without access to
any complete file or usable data
Supply
Applications
Client applications store encrypted and
encoded files split into pieces and stored
across a distributed network
Demand
Satellites
The network enables applications to store
data, ensures data reliability, manages
access controls and data audit/repair
Protocol
15
Storj uses encryption and erasure encoding to
distribute data keeping it durable and available
Encode & Split
Encrypt
AES-256-GCM
Identify Nodes Distribute
Decrypt Data Assemble File Download Segments Identify Nodes
Storj Bridges Web2 & Web3
Decentralized
infrastructure
Storj solves uses cases in Web2 and Web3
Built for Web3 and Web2 use cases
Storj
Blockchain Fast
Sync
AI/ML/HPC
Workloads
Video Storage &
Streaming
Software
Distribution
Web3 Web2
Applications
Media Storage Backup & DR
IPFS Pinning
Challenges for of Adoption
● Scalability concerns
○ Adoption Curve inflection: Zero-Sum to
Positive-Sum
● Integration and Compatibility
● Cohort Bootstrapping
*UX
*Security Issues
Ian Gonsher
Overview of Adoption - Commercial Implications
Technology Adoption Bell-Curve (Rogers 2003)
● Empowerment of individuals and reduced
intermediary friction
● Potential for more efficient distribution of
resources (AirBnB for X)
Commercial Implications - ESG
How Storj DCS is Green
Pre-existing
Hardware
No Dedicated Data
Centers
Energy Efficient
Storage
Commercial Implications - ESG
Distributed architecture
provides radical
cost advantages…
*Per website (https://aws.amazon.com/s3/pricing/?nc=sn&loc=4) as of April 3, 2023
**Wasabi typically stores in one data center. Pricing is for storage in 3 locations: Oregon, Virginia and Plano,
TX per website: https://wasabi.com/cloud-storage-pricing/#three-info
Cost to store 100 TB for one year
(storage only)
Data transfer, API,
and egress fees
not included
90 day minimum
storage length,
egress throttling
Predictable fees
and no minimum
storage length
28
Displacing Incumbents - Gaining Adoption
● New technology must provide current
market functionality to Users
○ At-least as good as current technology features
● Increase value from novel architectures and
implementation choices
● Solve the same problem a better way
● Market leaders will react slowly
Displacing Incumbents - Gaining Adoption
Results of 2022 vs 2023 Performance Tuning
Comparing 2022 and 2023 Storj Performance Tests
Transferring a large dataset to Digital Ocean droplets from Storj and a single region in AWS with
downloads at progressively increasing distance from origin
Displacing Incumbents - Open Source Ethos
Tenets of Open Source contribution, specifically
applicable to decentralized and distributed systems:
● Redistribution
● Source Availability
● Integrity of Provenance
● No Discrimination (Fields or Groups)
● Technology-Neutral
Future Predictions
● Growing integration of AI with decentralized tech
● Evolution of open / decentralized marketplaces
● Interoperability between different decentralized platforms
will increase
● The emergence of new collaboration structures built upon
distributed tech.
● AWS will lose market dominance within six years
crn - https://www.crn.com/news/cloud/cloud-market-share-q2-2023-aws-microsoft-google-battle
AWS - 32% (-2%)
Azure - 23% (even)
GCP - 11% (+1%)
Q & A

More Related Content

Similar to What Does Real World Mass Adoption of Decentralized Tech Look Like?

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101 Predrag Mitrovic
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
 
An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack Zara Tariq
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsHaribabu Nandyal Padmanaban
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformshnandy
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcDataTactics
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Cloud computing 1 introduction
Cloud computing 1 introductionCloud computing 1 introduction
Cloud computing 1 introductionVaibhav Khanna
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 

Similar to What Does Real World Mass Adoption of Decentralized Tech Look Like? (20)

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
 
An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platforms
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platforms
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
13778757.ppt
13778757.ppt13778757.ppt
13778757.ppt
 
Cloud Design Patterns
Cloud Design PatternsCloud Design Patterns
Cloud Design Patterns
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Cloud computing 1 introduction
Cloud computing 1 introductionCloud computing 1 introduction
Cloud computing 1 introduction
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

More from All Things Open

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityAll Things Open
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best PracticesAll Things Open
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public PolicyAll Things Open
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...All Things Open
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashAll Things Open
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptAll Things Open
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractAll Things Open
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlowAll Things Open
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and SuccessAll Things Open
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with BackgroundAll Things Open
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblyAll Things Open
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksAll Things Open
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptAll Things Open
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramAll Things Open
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceAll Things Open
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamAll Things Open
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in controlAll Things Open
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsAll Things Open
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...All Things Open
 
Building AlmaLinux OS without RHEL sources code
Building AlmaLinux OS without RHEL sources codeBuilding AlmaLinux OS without RHEL sources code
Building AlmaLinux OS without RHEL sources codeAll Things Open
 

More from All Things Open (20)

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best Practices
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public Policy
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScript
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart Contract
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and Success
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with Background
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssembly
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in Haystacks
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit Intercept
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship Program
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open Source
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache Beam
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in control
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
 
Building AlmaLinux OS without RHEL sources code
Building AlmaLinux OS without RHEL sources codeBuilding AlmaLinux OS without RHEL sources code
Building AlmaLinux OS without RHEL sources code
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

What Does Real World Mass Adoption of Decentralized Tech Look Like?

  • 1. What Does Real World Mass Adoption of Decentralized Tech Look Like? All Things Open 2023 Karl Mozurkewich, Sr. Enterprise Architect
  • 2. Introduction What does it mean to be centralized? The US National Institute of Standards and Technology (NIST) defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”1 According to NIST, cloud computing is composed of the following (figure 1): ● Five essential characteristics—On-demand self- service, broad network access, resource pooling, rapid elasticity and measured service ● Three service models—Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) ● Four deployment models—Private cloud, community cloud, public cloud and hybrid cloud Daniel D. Wu, Ph.D., CISA, CISM - 29 September 2021 - Decentralized Cloud Computing
  • 3. Introduction What does it mean to be Decentralized? Tenets ● No central points of control ● Curb inequality ● Smooth Network Effects Daniel D. Wu, Ph.D., CISA, CISM - 29 September 2021 - Decentralized Cloud Computing Design Traits ● Secure-by-Default (Zero Trust) ● Efficient resource usage ● Resilient Operation
  • 4. Historical Context ● Internet ● Usenet / IRC ● Napster / Gnutella / Bittorrent ● Bitcoin and the emergence of blockchain technology.
  • 5. Characteristics of Decentralized Systems “create a technical drawing that represents a centralized data network” “create a technical drawing that represents a distributed data storage network.”
  • 6. Characteristics of Decentralized Systems Decentralized Systems == Distributed Systems ● CAP ● Trustless operations. (Zero-Trust) ● Peer-to-peer networks ● Scalability ● Fault Tolerance ● Transparency and immutability. (maybe) ● Open Source
  • 7. Geographically diverse data centers Virtually unlimited bandwidth Complex routing between PoPs Global container distribution Minimal localized high speed storage Latency sensitive applications The state of distributed compute today.
  • 8. Centralized Applications Central Authority Single Point of Failure Opaque Security by People Trust me Decentralized Applications Consensus Distributed Nodes Transparent Security by Math Zero trust VS Decentralized services are fundamentally different from centralized services
  • 9. Centralized Applications Amazon Google Microsoft Secretary of State Decentralized Applications Storj Filecoin Ethereum Bitcoin VS Decentralized services are fundamentally different from centralized services
  • 10. Sectors Vulnerable to Disruption ● Financial systems and banking (e.g., decentralized finance and embedded finance) ● Supply chains (e.g., transparent and traceable goods). ● Social media (e.g., decentralized platforms). ● Web hosting and storage (e.g., web services). ● Governance and voting systems. “Only a crisis - actual or perceived - produces real change. When that crisis occurs, the actions that are taken depend on the ideas that are lying around.” ― Milton Friedman
  • 11. Adoption - What does It look like? B2B vs. B2C - Approaches differ for the end-users B2B requires: ● Certainty ● Known Quantities, TCO ● Guarantees ● Regular Updates ● Provenance B2C requires: ● Speed ● Network Effects ● Personalization ● Silent & Graceful Errors
  • 12. Adoption - Real World Examples ● Infrastructure a. Compute / time sharing (Livepeer, Akash, Valdi) b. Storage (Storj, Filecoin) ● Decentralized Identity ● Mobile Telecommunication infrastructure (MVNOs, DePIN) ● Distributed Data Exchanges
  • 13. Let’s look at cloud object storage Outcome first: migrate from Hyperscalers (AWS, Azure, GCP) Reduce cost, increase privacy and security, democratize cloud economy, minimize centralized dependencies But you can’t skimp on the actual cloud storage - it has to be good (Performance, durability, compatibility) Exceed feature parity, example, regionless global implementation
  • 14. Adoption Architecture - Storj has 3 key elements System Overview Nodes Tens of thousands of shared hard drives store data on the network, without access to any complete file or usable data Supply Applications Client applications store encrypted and encoded files split into pieces and stored across a distributed network Demand Satellites The network enables applications to store data, ensures data reliability, manages access controls and data audit/repair Protocol 15
  • 15. Storj uses encryption and erasure encoding to distribute data keeping it durable and available Encode & Split Encrypt AES-256-GCM Identify Nodes Distribute Decrypt Data Assemble File Download Segments Identify Nodes
  • 16. Storj Bridges Web2 & Web3 Decentralized infrastructure
  • 17. Storj solves uses cases in Web2 and Web3 Built for Web3 and Web2 use cases Storj Blockchain Fast Sync AI/ML/HPC Workloads Video Storage & Streaming Software Distribution Web3 Web2 Applications Media Storage Backup & DR IPFS Pinning
  • 18. Challenges for of Adoption ● Scalability concerns ○ Adoption Curve inflection: Zero-Sum to Positive-Sum ● Integration and Compatibility ● Cohort Bootstrapping *UX *Security Issues Ian Gonsher
  • 19. Overview of Adoption - Commercial Implications Technology Adoption Bell-Curve (Rogers 2003) ● Empowerment of individuals and reduced intermediary friction ● Potential for more efficient distribution of resources (AirBnB for X)
  • 21. How Storj DCS is Green Pre-existing Hardware No Dedicated Data Centers Energy Efficient Storage
  • 23. Distributed architecture provides radical cost advantages… *Per website (https://aws.amazon.com/s3/pricing/?nc=sn&loc=4) as of April 3, 2023 **Wasabi typically stores in one data center. Pricing is for storage in 3 locations: Oregon, Virginia and Plano, TX per website: https://wasabi.com/cloud-storage-pricing/#three-info Cost to store 100 TB for one year (storage only) Data transfer, API, and egress fees not included 90 day minimum storage length, egress throttling Predictable fees and no minimum storage length 28
  • 24. Displacing Incumbents - Gaining Adoption ● New technology must provide current market functionality to Users ○ At-least as good as current technology features ● Increase value from novel architectures and implementation choices ● Solve the same problem a better way ● Market leaders will react slowly
  • 25. Displacing Incumbents - Gaining Adoption Results of 2022 vs 2023 Performance Tuning Comparing 2022 and 2023 Storj Performance Tests Transferring a large dataset to Digital Ocean droplets from Storj and a single region in AWS with downloads at progressively increasing distance from origin
  • 26. Displacing Incumbents - Open Source Ethos Tenets of Open Source contribution, specifically applicable to decentralized and distributed systems: ● Redistribution ● Source Availability ● Integrity of Provenance ● No Discrimination (Fields or Groups) ● Technology-Neutral
  • 27. Future Predictions ● Growing integration of AI with decentralized tech ● Evolution of open / decentralized marketplaces ● Interoperability between different decentralized platforms will increase ● The emergence of new collaboration structures built upon distributed tech. ● AWS will lose market dominance within six years crn - https://www.crn.com/news/cloud/cloud-market-share-q2-2023-aws-microsoft-google-battle AWS - 32% (-2%) Azure - 23% (even) GCP - 11% (+1%)
  • 28. Q & A