This commit is contained in:
mik-tf
2025-11-25 15:27:56 -05:00
commit c769942374
33 changed files with 24049 additions and 0 deletions

View File

@@ -0,0 +1,118 @@
---
sidebar_position: 2
---
# Agent Architecture & Design
This page summarizes the intended design of Mycelium Agents, based on the public descriptions on the main site. The details may evolve as we approach the 2026 launch.
## HighLevel View
From the **Agent Design** and **Advantages** sections:
- Each agent **runs entirely inside your environment**.
- Agents **communicate peertopeer** across trusted nodes.
- Agents **access data locally** without exposing it to external providers.
- Agents are **portable**, moving with your infrastructure rather than with a single cloud vendor.
Conceptually:
```mermaid
graph TD
A[Your Devices & Nodes] --> B[Agent Runtime]
B --> C[Local Data & Tools]
B --> D[Mycelium Network]
D --> E[Other Agents & Nodes]
```
- The **runtime** executes agent logic.
- Agents load and store data through local backends (files, QSFS, databases).
- Communication uses **Mycelium Network** between environments.
## Core Properties
### Local Execution
From the "Local Execution" highlight:
> *“Agents run entirely inside your environment. Models, logic, and memory stay within your own trusted hardware, never behind thirdparty APIs.”*
Implications:
- You choose where agents run: laptop, homelab, edge cluster, or VDC.
- No requirement to send prompts or data to centralized AI APIs.
- Compliance and sovereignty become much easier to reason about.
### Mesh Connectivity
From the "Mesh Connectivity" highlight:
> *“They communicate peertopeer across trusted nodes. Agents form direct encrypted paths between environments, without relays or central servers.”*
This leverages **Mycelium Network** to:
- Give agents a global, encrypted address space.
- Enable crosssite coordination (home ↔ office ↔ cloud ↔ edge).
- Avoid central bottlenecks and single points of failure.
### Private Data Access
From the "Private Data Access" highlight:
> *“They use your data without sending it elsewhere. Your datasets, embeddings, and context never leave your boundaries.”*
Design goals:
- Agents can work directly against local file systems, QSFS, and internal services.
- Sensitive inputs and outputs remain in environments you choose.
- Remote calls (if any) are explicit and policycontrolled.
### Portability
From the "Portability" highlight:
> *“They move with you, not with a cloud provider. Agents follow your devices, networks, and workflows, remaining sovereign across every location.”*
Over time the framework aims to allow:
- Redeploying agents between different nodes and VDCs.
- Maintaining state while moving execution closer to data or users.
- Using heterogeneous infrastructure (homelab + hoster nodes + VDCs) as one fabric.
## Example Deployment Topologies
### SingleNode Local Agent
- Agent runtime on your workstation.
- Local data and tools only.
- Mycelium Network used for optional remote access.
### MultiNode Mesh
- Agents running on several nodes (e.g. laptop, homelab, hoster node).
- P2P coordination over Mycelium.
- Some agents specialized for data access, others for orchestration.
### VDCBacked Agent Cluster
- Runtime deployed into a **VDC** as a set of Kubernetes workloads.
- Agents expose services reachable only via Mycelium Network.
- QSFS and other Mycelium components used for storage.
## Security & Trust (Preview)
From the "Security Architecture" and related messaging:
- **Provable sovereignty** Assign workloads to trusted zones and verify state with cryptographic proofs.
- **Autonomous zerotrust** Identity, policy, and attestation enforced continuously.
- **Planetaryscale resilience** Mesh routing around failures, including regional outages.
As the framework evolves, expect more detailed specifications around:
- Identity & authentication between agents.
- Policy models for where and how agents may run.
- Auditability and observability of agent behavior.
## Status
The architecture described here is intentionally highlevel and forwardlooking. For timelines and how to prepare, see **[Overview](/ai-agent-framework/overview)** and **[Getting Ready for Agents](/ai-agent-framework/getting-ready)**.

View File

@@ -0,0 +1,84 @@
---
sidebar_position: 4
---
# Getting Ready for Agents
The Agent Framework is planned for **H1 2026**, but you can start preparing your infrastructure and workflows today.
This page is based on the "Call To Action" content from the Mycelium Agents page.
## 1. Establish the Networking Layer
Agents will rely on **Mycelium Network** for secure, peertopeer connectivity.
- Install and use **[Mycelium Network](/network)** on your key devices.
- Become comfortable with overlay addresses and testing connectivity.
- Decide which machines, clusters, and locations will be part of your "agent fabric".
## 2. Set Up Compute & Clusters
Use **Mycelium Cloud** and **Virtual Data Centers** as the compute substrate for future agents.
- Deploy clusters via **[Mycelium Cloud Getting Started](/cloud/getting-started)**.
- Explore **[Kubernetes Basics](/cloud/kubernetes-basics)** and the **[Deployment Tutorials](/cloud/tutorial)**.
- Design where different workloads should live (personal VDC, shared VDC, edge nodes, etc.).
If you plan to run larger AI workloads, consider capacity with GPUs or highmemory nodes.
## 3. Decide How Youll Host Capacity
If you want agents to run on hardware beyond your personal machines, look into becoming a **hoster**:
- Read **[Hosters Overview](/hosters/overview)** to understand the role.
- Choose hardware via **[Buy or Build a Node](/hosters/buy-node)** and **[Advanced Node Options](/hosters/advanced-nodes)**.
- Set up your node using **[Set Up Your Node](/hosters/setup)**.
- Learn about **[Hosting Economics (SPORE)](/hosters/economics)**.
This prepares a foundation where agents can later run on your own nodes or on community capacity.
## 4. Map Your Data & Privacy Requirements
Agents are meant to operate on **your** data, not someone elses cloud silo.
Begin planning:
- Where your key datasets live today.
- Which data must stay in specific jurisdictions or networks.
- Which data could be processed on edge nodes, VDCs, or both.
- How quantumsafe and replicated storage (e.g. QSFS) might fit into your architecture.
## 5. Start with Todays Components
From the calltoaction message:
> *“The Agent Framework launches in H1 2026, but the foundation is ready now. Use todays components — models, storage, compute, and network — to deploy workloads, connect nodes, and prepare for the next generation of distributed AI.”*
Practical steps you can take now:
- Deploy AI workloads on Mycelium Cloud clusters.
- Use Mycelium Network to connect dev machines, clusters, and edge boxes.
- Experiment with multinode workflows and data flows across environments.
- Treat these as early prototypes that agents will later formalize and automate.
## 6. Stay Informed
As the Agent Framework evolves, watch for:
- Updated documentation and architecture deepdives.
- Early SDKs, CLIs, or runtimes for prototyping.
- Example patterns combining agents, VDCs, and QSFS.
Follow official channels (site, docs, community) for announcements.
---
## Summary
You dont need to wait for the Agent Framework launch to start building:
- Use **network**, **cloud**, **VDC**, and **hosting** pieces today.
- Organize data and infrastructure so that agents can slot in later.
- Think in terms of **sovereign, distributed AI** rather than centralized APIs.
When agents arrive, youll already have the networking, compute, and data foundations in place.

View File

@@ -0,0 +1,76 @@
---
sidebar_position: 1
slug: /ai-agent-framework
---
# Mycelium Agent Framework (Preview)
> **Status:** Coming in 2026 early design subject to change.
Mycelium Agents are **private, sovereign, and distributed AI systems** that run on infrastructure you control. Instead of sending your data and logic to a centralized AI cloud, agents live **inside your own environment** and connect over the **Mycelium Network**.
This page gives a highlevel preview of the framework and how it fits into the rest of Mycelium.
## What Are Mycelium Agents?
From the marketing overview:
> *“Private, Sovereign and Distributed AI You Control.”*
Mycelium Agents are designed so that:
- **Execution stays local** Models, logic, and memory run on your own hardware.
- **Connectivity is peertopeer** Agents communicate over Myceliums encrypted mesh.
- **Data remains private** Your datasets, embeddings, and tools stay inside your trust boundary.
- **Agents are portable** They can move with you across devices, clusters, and locations.
## Design Principles
The Agent Framework is being designed around a few core principles (see **Agent Design** and **Advantages** on the main site):
- **Inside your environment** Each agent operates entirely within your chosen infrastructure (laptop, homelab, edge node, cluster).
- **Mesh connectivity** Agents talk to each other across trusted nodes using Mycelium Network, without central relays.
- **Local data access** Agents read and write data locally (file systems, QSFS, databases) without shipping it to a thirdparty.
- **Zerotrust posture** Identity, policy, and attestation are enforced continuously.
- **Portability** Agents follow your workflows, not a particular cloud provider.
## Relationship to the Rest of Mycelium
The Agent Framework is built on top of existing Mycelium components:
- **Mycelium Network** Encrypted IPv6 overlay and addressing fabric between nodes.
- **Mycelium Cloud / VDC** Kubernetes clusters and virtual data centers hosting compute.
- **QSFS / Storage** Quantumsafe, replicated storage for longterm data and model artifacts.
- **Hosters** Communityrun capacity providing the underlying infrastructure.
Agents are planned to run:
- On your own devices (laptops, workstations, homelabs).
- On edge or datacenter nodes provided by hosters.
- Inside VDCs as part of larger application stacks.
## What You Can Expect
While the full technical spec is still evolving, you can expect:
- A **runtime** for defining and running agents on your nodes.
- A **connectivity layer** for secure P2P communication between agents.
- A **policy model** for where agents may run and which data they may access.
- **Composability** with existing tools containers, Kubernetes, storage backends, and Mycelium networking.
## Timeline and Scope
- **Launch window:** Agent Framework targeted for **H1 2026**.
- **Preview phase:** Before launch, expect design updates, early prototypes, and integration examples.
- **Ecosystem:** The goal is to make agents firstclass citizens of the wider Mycelium / ThreeFold ecosystem.
## How to Prepare
Although the Agent Framework itself is not yet released, you can prepare today by using the underlying components:
- **Networking:** Get familiar with **[Mycelium Network](/network)** and how overlay addressing works.
- **Compute:** Use **[Mycelium Cloud](/cloud)** and **[VDCs](/vdc)** to deploy clusters and workloads.
- **Capacity:** If you want to run agents on your own or community hardware, explore **[Hosters](/hosters)**.
- **Data:** Consider how sensitive data will be stored and accessed locally (e.g. QSFS).
See **[Getting Ready for Agents](/ai-agent-framework/getting-ready)** for a more practical checklist.

View File

@@ -0,0 +1,87 @@
---
sidebar_position: 3
---
# Agent Use Cases
This page adapts the **Agent Use Cases** section from the Mycelium site into documentation form.
## What the Framework Enables
> *“The framework gives you full control over where agents live, how they connect, and what data they use.”*
Agents are intended to be:
- **Locationaware** you decide which nodes or VDCs they inhabit.
- **Networkaware** connectivity and topology are visible and controllable.
- **Dataaware** data stays where it should, with explicit movement.
## Example Use Cases
### Run Agents on Your Own Hardware
Deploy agents directly on:
- Laptops and workstations.
- Homelabs and edge boxes.
- VDCs and clusters you control.
You are not tied to any single cloud or vendor; agents execute where it makes the most sense for latency, privacy, or cost.
### Connect Agents Over the Mycelium Network
Use **Mycelium Network** as the secure fabric between agents.
- Private overlay addressing across homes, offices, and datacenters.
- Encrypted paths between nodes in different countries or environments.
- One consistent address space spanning local and remote infrastructure.
### Keep Data and Memory Private by Default
Agents are designed to:
- Use local datasets, tools, prompts, and embeddings.
- Avoid sending sensitive context to external AI APIs by default.
- Respect policies for which data may be shared and where.
This is especially important for regulated sectors and internal systems.
### Build Workflows Across Cloud + Edge
Orchestrate multinode workflows that span:
- Edge clusters near data sources.
- Central VDCs for heavier compute or aggregation.
- Personal devices for interaction and control.
Examples:
- Realtime processing at the edge, with summarized results aggregated in a VDC.
- Agents coordinating tasks between office locations and remote workers.
- Data pipelines that never leave your chosen infrastructure.
### Operate in Regulated Contexts
Run agents where strict requirements apply:
- Healthcare, finance, public sector, and other regulated domains.
- Environments with **data residency** constraints.
- Workloads requiring verified identity and controlled connectivity.
The combination of **local execution**, **sovereign infrastructure**, and **encrypted mesh networking** is intended to make regulatory compliance more tractable.
### Blend Local and Remote Intelligence
Not all tasks need to run on the same node:
- Lightweight agents might run locally for responsiveness and interactivity.
- Heavier workloads can be scheduled to trusted remote nodes (e.g. GPU clusters).
- Data movement is explicit and policydriven.
This supports hybrid strategies where you balance privacy, performance, and cost.
---
## Looking Ahead
These use cases are **illustrative** and may expand as the Agent Framework matures. For how to prepare your infrastructure today, see **[Getting Ready for Agents](/ai-agent-framework/getting-ready)**.