For Computing Resource Providers¶
iExec distinguishes between 3 different types of cloud resource providers :
- Application providers
Your algorithms can change the world! Developers and application providers can monetize their apps, dapps, functions or algorithms.
- Computing providers
No more CPU cycle wasted! Computing providers can make the most of their servers, by joining the iExec network and renting them.
- Data providers
Data is the new gold! Data providers can monetize datasets usage and open up new revenue streams for their assets. A single entity can be all types of providers at the same time.
Application providers or developers can monetize their applications and algorithms by setting a fixed-fee for each single usage of their software (pay-per-task model). As a developer of decentralized applications, you may use iExec to overcome blockchain limitations (few kilobytes of storage, very inefficient virtual machines and very high latency protocol) by executing your computations “off-chain” on the iExec decentralized infrastructure. Developers also benefit from being free from adjusting resource allocation. By not having to maintain any servers, developers deploy applications that can rapidly upscale/downscale based on user-demand.
Go to the How to provide an application section to learn how to build dapp for the community.
Within the iExec network, providers of computing power are called ‘Workers’. As a worker, you can connect your machine to the network and provide computing power.
This materializes in your machine executing computational tasks in exchange for a price freely determined by you (in RLC tokens). Workers can be individuals or companies. Anyone owning computing resources can make them available by joining a “worker pool” and renting computing power to the network. Any machine, from an individual laptop to a large-scale data center, can join a worker pool. Head to the How to become a worker section to learn how to deploy your worker software.
Worker pools are made up of multiple individual machines. They are led by a Pool manager, a lead entity that organizes the workload and signals how many tasks it is able to process and at which price. Pool manager, while not doing the actual computation, receive a fee for the management of the worker pool. Pool manager compete to attract workers to their worker pool by providing efficient management and guaranteeing earnings for workers. Head to the How to Become a pool manager section to learn how to deploy your worker pool service.
You may also check out the list of worker pool currently available on the iExec Marketplace in the Pools Registry.
Coming May 2019
Data providers that own valuable datasets can make them available for use by applications through the iExec Data Store. Technologies such as Intel SGX and IBM Datashield, combined with iExec’s pay-per-task model, offer new opportunities of creating highly-secure applications that respect data privacy and ownership.
For Cloud Resource Requesters¶
Buying applications, computing power and datasets¶
‘Requester’ is the name given to an individual or enterprise requesting the use of cloud resources through iExec.
iExec allows requesters (individuals and enterprises) to access affordable, secure and scalable cloud resources.
- Access to applications
On the iExec Dapp Store, requesters have access to an extensive list of ready-to-use decentralized applications.
- Access to computing power
On the iExec Marketplace, requesters have access to large amounts of computational power from a variety of computing providers (networks of individuals, private data centers, Green IT providers, Trusted Execution Environments (TEE) worker pools).
Computing resources can be traded as any commodities. In the cloud market today, providers generally charge a flat rate for all resources per time.
On the iExec marketplace, a requester submits a task request that can be fulfilled by available computing resources.
- Access to datasets
On the iExec Data Store, requesters have access to a large amount of varied datasets that can be opened from associated dapps from the Dapp Store.
Requesters can freely browse available cloud resources, and trigger an execution once they gather a triplet of resources compatible with each other.
They can then monitor and audit all the orders they have triggered since each activity log is recorded on the blockchain.
Secure and privacy-preserving cloud computing¶
iExec offers optional full end-to-end trusted and private execution on the decentralized cloud.
End-to-end protection means full protection of the application data, user data, embedded data as well as application output data.
Results can never be inspected by anyone else but their requester, answering the needs of highly-confidential applications and sensitive datasets.