init
This commit is contained in:
87
docs/ai-agent-framework/use-cases.md
Normal file
87
docs/ai-agent-framework/use-cases.md
Normal file
@@ -0,0 +1,87 @@
|
||||
---
|
||||
sidebar_position: 3
|
||||
---
|
||||
|
||||
# Agent Use Cases
|
||||
|
||||
This page adapts the **Agent Use Cases** section from the Mycelium site into documentation form.
|
||||
|
||||
## What the Framework Enables
|
||||
|
||||
> *“The framework gives you full control over where agents live, how they connect, and what data they use.”*
|
||||
|
||||
Agents are intended to be:
|
||||
|
||||
- **Location‑aware** – you decide which nodes or VDCs they inhabit.
|
||||
- **Network‑aware** – connectivity and topology are visible and controllable.
|
||||
- **Data‑aware** – data stays where it should, with explicit movement.
|
||||
|
||||
## Example Use Cases
|
||||
|
||||
### Run Agents on Your Own Hardware
|
||||
|
||||
Deploy agents directly on:
|
||||
|
||||
- Laptops and workstations.
|
||||
- Homelabs and edge boxes.
|
||||
- VDCs and clusters you control.
|
||||
|
||||
You are not tied to any single cloud or vendor; agents execute where it makes the most sense for latency, privacy, or cost.
|
||||
|
||||
### Connect Agents Over the Mycelium Network
|
||||
|
||||
Use **Mycelium Network** as the secure fabric between agents.
|
||||
|
||||
- Private overlay addressing across homes, offices, and datacenters.
|
||||
- Encrypted paths between nodes in different countries or environments.
|
||||
- One consistent address space spanning local and remote infrastructure.
|
||||
|
||||
### Keep Data and Memory Private by Default
|
||||
|
||||
Agents are designed to:
|
||||
|
||||
- Use local datasets, tools, prompts, and embeddings.
|
||||
- Avoid sending sensitive context to external AI APIs by default.
|
||||
- Respect policies for which data may be shared and where.
|
||||
|
||||
This is especially important for regulated sectors and internal systems.
|
||||
|
||||
### Build Workflows Across Cloud + Edge
|
||||
|
||||
Orchestrate multi‑node workflows that span:
|
||||
|
||||
- Edge clusters near data sources.
|
||||
- Central VDCs for heavier compute or aggregation.
|
||||
- Personal devices for interaction and control.
|
||||
|
||||
Examples:
|
||||
|
||||
- Real‑time processing at the edge, with summarized results aggregated in a VDC.
|
||||
- Agents coordinating tasks between office locations and remote workers.
|
||||
- Data pipelines that never leave your chosen infrastructure.
|
||||
|
||||
### Operate in Regulated Contexts
|
||||
|
||||
Run agents where strict requirements apply:
|
||||
|
||||
- Healthcare, finance, public sector, and other regulated domains.
|
||||
- Environments with **data residency** constraints.
|
||||
- Workloads requiring verified identity and controlled connectivity.
|
||||
|
||||
The combination of **local execution**, **sovereign infrastructure**, and **encrypted mesh networking** is intended to make regulatory compliance more tractable.
|
||||
|
||||
### Blend Local and Remote Intelligence
|
||||
|
||||
Not all tasks need to run on the same node:
|
||||
|
||||
- Lightweight agents might run locally for responsiveness and interactivity.
|
||||
- Heavier workloads can be scheduled to trusted remote nodes (e.g. GPU clusters).
|
||||
- Data movement is explicit and policy‑driven.
|
||||
|
||||
This supports hybrid strategies where you balance privacy, performance, and cost.
|
||||
|
||||
---
|
||||
|
||||
## Looking Ahead
|
||||
|
||||
These use cases are **illustrative** and may expand as the Agent Framework matures. For how to prepare your infrastructure today, see **[Getting Ready for Agents](/ai-agent-framework/getting-ready)**.
|
||||
Reference in New Issue
Block a user