diff --git a/config.toml b/config.toml
index 92a072f..ddd73dc 100644
--- a/config.toml
+++ b/config.toml
@@ -1,8 +1,8 @@
# The URL the site will be built for
-base_url = "https://www2.freezone.ourworld.tf/"
+base_url = "https://www2.tf9.io/"
# Change this to your own URL! Please note this variable **must** be uncommented.
-title = "OurWorld Free Zone"
+title = "TF9"
description="Accessible and affordable for all"
# When set to "true", a feed is automatically generated.
diff --git a/content/_index.md b/content/_index.md
index da07e40..2013fed 100644
--- a/content/_index.md
+++ b/content/_index.md
@@ -8,4 +8,5 @@ sort_by: weight
weight: 1
extra:
logo_path: images/logo.png
+template: "layouts/home.html"
---
diff --git a/content/about/img/about2.png b/content/about/img/about2.png
new file mode 100644
index 0000000..8899877
Binary files /dev/null and b/content/about/img/about2.png differ
diff --git a/content/about/img/about22.png b/content/about/img/about22.png
new file mode 100644
index 0000000..bfbaeaf
Binary files /dev/null and b/content/about/img/about22.png differ
diff --git a/content/about/img/brand1.png b/content/about/img/brand1.png
new file mode 100644
index 0000000..757eb6a
Binary files /dev/null and b/content/about/img/brand1.png differ
diff --git a/content/about/img/brand2.png b/content/about/img/brand2.png
new file mode 100644
index 0000000..db6302c
Binary files /dev/null and b/content/about/img/brand2.png differ
diff --git a/content/about/img/brand3.png b/content/about/img/brand3.png
new file mode 100644
index 0000000..faf73f5
Binary files /dev/null and b/content/about/img/brand3.png differ
diff --git a/content/about/img/brand4.png b/content/about/img/brand4.png
new file mode 100644
index 0000000..668892c
Binary files /dev/null and b/content/about/img/brand4.png differ
diff --git a/content/about/img/brand5.png b/content/about/img/brand5.png
new file mode 100644
index 0000000..09fbbb2
Binary files /dev/null and b/content/about/img/brand5.png differ
diff --git a/content/about/img/brand6.png b/content/about/img/brand6.png
new file mode 100644
index 0000000..1e8973b
Binary files /dev/null and b/content/about/img/brand6.png differ
diff --git a/content/about/img/pioneers2.png b/content/about/img/pioneers2.png
new file mode 100644
index 0000000..16f3783
Binary files /dev/null and b/content/about/img/pioneers2.png differ
diff --git a/content/about/index.md b/content/about/index.md
new file mode 100644
index 0000000..8b46921
--- /dev/null
+++ b/content/about/index.md
@@ -0,0 +1,28 @@
+---
+title: "About"
+description: ""
+date: 2018-09-14
+updated: 2021-02-20
+draft: false
+weight: 2
+template: "layouts/about.html"
+---
+
+
+
\ No newline at end of file
diff --git a/content/blog/_index.md b/content/blog/_index.md
new file mode 100644
index 0000000..1d763b9
--- /dev/null
+++ b/content/blog/_index.md
@@ -0,0 +1,33 @@
+---
+title: "Blog"
+paginate_by: 6
+# paginate_reversed: false
+sort_by: "date"
+insert_anchor_links: "left"
+#base_url: "posts"
+#first: "first"
+#last: "last"
+template: "layouts/blog.html"
+page_template: "blogPage.html"
+#transparent: true
+extra:
+ imgPath: /images/threefold_img2.png
+---
+
+
+
\ No newline at end of file
diff --git a/content/blog/cyberwall/cyberwall.png b/content/blog/cyberwall/cyberwall.png
new file mode 100644
index 0000000..d9c339a
Binary files /dev/null and b/content/blog/cyberwall/cyberwall.png differ
diff --git a/content/blog/cyberwall/index.md b/content/blog/cyberwall/index.md
new file mode 100644
index 0000000..691c8b1
--- /dev/null
+++ b/content/blog/cyberwall/index.md
@@ -0,0 +1,76 @@
+---
+id: cyberwall
+title: "An Antidote for the Cyber Pandemic"
+image_caption: "An Antidote to the Cyber Pandemic"
+description: In today's interconnected world, the rise of cyber threats presents a significant challenge...
+date: 2024-03-20
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: cyberwall.png
+---
+**An Antidote for the Cyber Pandemic**
+
+
+
+In today's interconnected world, the rise of cyber threats presents a significant challenge to global security and stability. Much like the world has faced virus-based pandemics, the emergence of a cyber pandemic poses a serious risk to our digital infrastructure and societal well-being. At TF9, we recognize the gravity of these threats and are committed to providing robust solutions to protect against them.
+
+
+
+**Understanding the Cyber Landscape**
+
+
+
+Cybersecurity experts universally agree that the potential for a cyber pandemic is not a presumption but a looming reality. With numerous systems already compromised and vulnerabilities deeply embedded, the possibility of large-scale exploitation is a growing concern. The accessibility of sensitive information at relatively low costs underscores the urgent need for proactive measures.
+
+
+
+**Vulnerabilities in Africa**
+
+
+
+Africa, despite its abundant natural resources, faces significant challenges due to exploitation.
+
+
+
+Instances such as Tanzania's economic struggles highlight the complexities of investment deals which often lead to debt, mass-scale internet manipulation, and corruption. Despite being among the richest countries globally in terms of natural resources, it has one of the lowest GDP per capita figures. This discrepancy raises the question: is Tanzania being exploited? These vulnerabilities underscore the need for comprehensive strategies to ensure economic resilience and sovereignty.
+
+
+
+**Navigating the Digital Battlefield**
+
+
+
+In the modern era, data has emerged as a critical asset, and nations vie for supremacy in this domain. Recent conflicts, such as those witnessed between Ukraine and Russia, underscore the strategic significance of digital infrastructure. For example, Russia took out 5 data centers as their first targets in Ukraine to destabilize the country and destroy important data for the country (e.g. birth certificates and land ownership data are now gone). The reality remains that only a select few nations possess the requisite resources to navigate this new frontier, leaving others vulnerable to manipulation and attacks.
+
+
+
+**Internet Infrastructure Vulnerabilities**
+
+
+
+The centralization of internet infrastructure poses significant risks, as demonstrated by the potential impact of denial of service attacks or routing manipulation. Such vulnerabilities highlight the fragility of our digital ecosystem and the importance of strengthening resilience measures.
+
+
+
+**Information Manipulation**
+
+
+
+The manipulation of information presents a formidable challenge to democracy and societal stability. Instances such as the events in Egypt, during the revolution some years ago, serve as stark reminders of the power wielded by those who seek to exploit public opinion. Effective safeguards and transparency measures are essential to mitigate the risks associated with information manipulation.
+
+
+
+**Advocating for a Secure Digital Future:**
+
+
+
+As we confront these challenges, it is imperative to adopt a proactive and collaborative approach to cybersecurity. Rather than succumbing to fear or resorting to isolationist measures, we must strive for a more inclusive and secure digital ecosystem. At TF9, we are committed to pioneering innovative solutions that prioritize security, resilience, and global cooperation.
+
+
+
+The threat of a cyber pandemic looms large, but it is not insurmountable. Through strategic investments in cybersecurity, enhanced collaboration among stakeholders, and a commitment to transparency, we can build a safer digital future for all. Join us in our mission to safeguard against cyber threats and foster a more secure and resilient global digital infrastructure with TF9.
+
+
+
diff --git a/content/blog/empowering_india/empowering_india.png b/content/blog/empowering_india/empowering_india.png
new file mode 100644
index 0000000..ad7a5f7
Binary files /dev/null and b/content/blog/empowering_india/empowering_india.png differ
diff --git a/content/blog/empowering_india/index.md b/content/blog/empowering_india/index.md
new file mode 100644
index 0000000..1df3e42
--- /dev/null
+++ b/content/blog/empowering_india/index.md
@@ -0,0 +1,69 @@
+---
+id: empowering_india
+title: "Empowering India: The promise of Decentralization"
+image_caption: "Empowering India: The promise of Decentralization"
+description: While Indian internet usage ranks second in the world today behind China, with 43% of its total...
+date: 2023-01-03
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: empowering_india.png
+---
+## How would Decentralisation of the Internet help India?
+
+*"This article was originally published by Ashish Bansal, a former member of ThreeFold Foundation."*
+
+*Ashish Bansal has been a member of the ThreeFold support team since October 2021. He was born in India. Ashish believes that we all deserve a better internet which is free, decentralized and equal for all.*
+
+
+
+The Internet has become one of the most important aspects of human life. Our everyday lives are impacted by social media and other online platforms on a very minute level. Facebook, Instagram, WhatsApp and others have become the most convenient way to stay in touch with friends and family. WhiteHart, Udemy and others have made quality education accessible to all. Swiggy, Zomato and others have made our favourite cuisine accessible at home. Amazon, Flipkart and others have grown the shopping experience for Indians with a variety of choices. Netflix, Hotstar, Youtube and others have made entertainment on demand easy for us.
+
+
+
+Over the past decade, we have all gotten addicted to the comforts that the internet has brought to us, and it wouldn't be wrong for us to say that we cannot imagine our lives without the internet.
+
+
+
+While Indian internet usage ranks second in the world today behind China, with 43% of its total population online, this also means that there is still a lot of untapped potential in India.
+
+## Issues with current Internet
+
+Although the internet has helped us in making our lives comfortable, there are several issues with the current Internet services we use. Some of them are mentioned below:
+
+### Cyber security
+
+The cyber security infrastructure in India today is not well equipped to tackle increasing cyber-crimes. You may not have the resolution to your complaints filed with Cyber Cell Portals on time. Hence there is an increasing number of fraudsters and hackers in India.
+
+### Data ownership
+
+Personal details shared by you on the internet are used by big companies to influence your decision-making process strategically.
+
+### Higher cost to customers
+
+Since internet infrastructure is owned and controlled by a few big companies, there is an irregular price increase which makes the internet unaffordable to many parts of rural India.
+
+## Decentralised Internet is the solution
+
+Decentralisation of the internet refers to the arrangement of the internet or its components such that no single entity or organization has control or authority over the network. It holds the potential to revolutionize the way every nation accesses and utilizes the world wide web. India, one of the biggest players in the digital world, can greatly benefit from Internet decentralization. It would open up many new opportunities for both the country and its citizens.
+
+
+
+To start, decentralization of the internet would give India more control over its digital landscape. Instead of relying on a single, centralized entity to power its network, India could decentralize its internet and make the administration of the network much more efficient. With this additional control and efficiency, India could develop a more secure and reliable infrastructure, while also controlling the delivery of services. This could lead to faster, more reliable connection speeds, along with increased safety and security.
+
+
+
+Additionally, decentralization of the internet would allow India to establish itself as a technological leader. By decentralizing the internet, India could shift its focus from the existing internet infrastructure to developing innovative technology and applications. This could include the development of decentralized artificial intelligence, blockchain technology, and much more. Potential applications of these technologies could drastically improve the education, healthcare, and transportation sectors of India.
+
+
+
+Finally, decentralization of the internet could help with digital media access and distribution. This could open up new opportunities for providing access to digital media in rural areas, allowing for more effective access to education and entertainment. Furthermore, it could also provide access to more reliable payment services, as well as better consumer protection policies.
+
+
+
+In conclusion, decentralization of the internet holds the potential to greatly benefit India and its citizens. It would give India control over its internet infrastructure, opening the door for development of innovative technologies and applications. Additionally, it could provide more effective access to digital media, along with more reliable payment services and consumer protection policies. In order for India to take full advantage of the potential of decentralization of the internet, it must take decisive steps towards implementing the necessary reforms and investments to ensure its success.
+
+## How TF9 can contribute
+
+TF9 technology runs on the concept of a grid formed by farmers who are independent people, unlike big corporations, that connect their nodes anywhere network and electricity is present to create a global distributed internet infrastructure. This resolves the problem of monopoly and price of big internet companies.
diff --git a/content/blog/ensuring_reliability/ensuring_reliability.png b/content/blog/ensuring_reliability/ensuring_reliability.png
new file mode 100644
index 0000000..f992844
Binary files /dev/null and b/content/blog/ensuring_reliability/ensuring_reliability.png differ
diff --git a/content/blog/ensuring_reliability/index.md b/content/blog/ensuring_reliability/index.md
new file mode 100644
index 0000000..bbe746e
--- /dev/null
+++ b/content/blog/ensuring_reliability/index.md
@@ -0,0 +1,34 @@
+---
+id: ensuring_reliability
+title: "Ensuring Reliability: Strategies for Decentralized Internet Infrastructure"
+image_caption: "Ensuring Reliability: Strategies for Decentralized Internet Infrastructure"
+description: Through a combination of technical and strategic advancements, our journey towards a dependable...
+date: 2023-12-06
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: ensuring_reliability.png
+ isFeatured: true
+---
+In today's digital landscape, the development of a decentralized open-source Internet infrastructure marks a significant leap forward. However, while the foundational structure of this innovation brings promise, its inherent reliability isn't guaranteed. After more than five years of building and expanding TF9's open-source technologies, it's now time we pivot towards commercialization. Ensuring a robust, dependable, and trustworthy offering becomes paramount. In this post, we'll share the various ways that reliability is being integrated with TF9 technology.
+
+### **Technical Redundancy**
+
+Our quantum safe storage system, coupled with replication, and web gateways, presents a pathway to achieve technical redundancy already. While these capabilities exist, we admit that at this time it is too complex for a starting user. Making this easier through refined tooling and a strong user experience will be imperative in order to allow a wide audience to take advantage here.
+
+### **TF9 Cloud**
+
+Our upcoming commercial offering, TF9 Cloud, will bolster reliability and trustworthiness. Through TF Cloud, we will need to provide comprehensive service, robust support, service level agreements (SLAs), and streamlined payment methods, including credit card options. The development of user-friendly tooling will significantly simplify and easen the process as well, enabling users to deploy and maintain reliable workloads effortlessly.
+
+### **Farming Pools**
+
+The introduction of farming pools in TF Grid 4.x will play an important role in fostering reliability as well. These pools not only contribute to resource pooling but also offer visibility into the network's participants. This transparency enhances trust and aids in identifying reliable contributors within a decentralized framework.
+
+### **Establishing Reputation and Transparency**
+
+Building a system that emphasizes reputation and complete visibility regarding service levels and uptimes is pivotal. By offering insights into each participant's performance metrics, Grid users will be able to more effectively choose a trusted provider.
+
+
+
+In essence, through a combination of technical and strategic advancements, our journey towards a dependable and trustworthy decentralized Internet infrastructure is underway, setting the stage for the [next phase](/next) of ThreeFold.
\ No newline at end of file
diff --git a/content/blog/mycelium/index.md b/content/blog/mycelium/index.md
new file mode 100644
index 0000000..00443e5
--- /dev/null
+++ b/content/blog/mycelium/index.md
@@ -0,0 +1,45 @@
+---
+id: introducing_mycelium
+title: "Introducing Mycelium"
+image_caption: "Introducing Mycelium"
+description: TF9 is implementing a planetary network, aiming to allow efficient, end-to-end encrypted...
+date: 2023-09-19
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: introducing_mycelium.png
+---
+*Lee is working on a very exciting new project called Mycelium, our own Ipv6 overlay network. Thanks to him for taking the time to create this short write-up on what it is and why it is needed.*
+
+
+
+As part of the grid, ThreeFold is also implementing a planetary network. This peer 2 peer network implementation aims to allow efficient, end-to-end encrypted communication with other participants on the network. Currently, we are using Yggdrasil as the core technology for this network. This is an open source implementation, and we have been using this since of grid v2.
+
+
+
+Over time, some problems have been noticed. We have since spent time looking into these issues, and performed an analysis of the root cause(s).
+
+### Yggdrasil’s Limitations
+
+To start, it should be noted that Yggdrasil is an experimental routing protocol (based on DHT’s), which is currently still in an alpha stage. We very much admire the fact that they have been able to create a standalone network with worldwide participants from scratch. Over time, the network has grown, in part due to the grid, but also because a lot of individual participants joined and started running a node.
+
+
+
+After investigating, we reached the conclusion that the current architecture has some scalability issues. While we have no doubt that these will eventually be solved, the importance of the planetary network in the grid is unfortunately too big to be able to wait for this. Additionally, Yggdrasil uses a technique called crypto key routing, and uses a tree structure for its routing info. This means data follows the “shortest path” in the tree, rather than the physical shortest path, which might deviate from this. As such, we have decided to implement our own Ipv6 overlay network, Mycelium.
+
+### Implementing Mycelium
+
+As previously pointed out, the main goal of our network is to be efficient, and end-to-end encrypted. Every node in the network is identified by a key pair. The address of a node is derived from this key pair, and data traffic between 2 nodes is encrypted using a secret derived from the key pair of both these nodes. As a result, every 2 nodes in the system use a different secret for encryption, and we can verify that the address used by a node is indeed owned by it (i.e. it has the corresponding private key). We have based our initial implementation (loosely) on the babel routing protocol.
+
+
+
+Therefore, sending data to a remote node will follow the shortest path in terms of latency (i.e. the fastest route). The network adjusts itself in case nodes disappear or join, and multiple paths to a given destination are possible.
+
+
+
+We are also considering implementing more advanced use cases in the future, though this remains to be seen at this stage. We are gearing up for some larger scale testing on the grid in the near future (after all, we do have multiple thousand nodes at our disposal to verify scalability), and will adjust as needed once these are done.
+
+
+
+*If you'd like to dive deeper, take a look at the Mycelium manual [here](https://threefoldfoundation.github.io/info_cloud_production/tfcloud/mycelium/mycelium.html).
\ No newline at end of file
diff --git a/content/blog/mycelium/introducing_mycelium.png b/content/blog/mycelium/introducing_mycelium.png
new file mode 100644
index 0000000..61b8713
Binary files /dev/null and b/content/blog/mycelium/introducing_mycelium.png differ
diff --git a/content/blog/resolving_global_tech/index.md b/content/blog/resolving_global_tech/index.md
new file mode 100644
index 0000000..75feb2c
--- /dev/null
+++ b/content/blog/resolving_global_tech/index.md
@@ -0,0 +1,41 @@
+---
+id: resolving_global_tech
+title: "Decentralized Internet: Resolving Global Tech Challenges"
+image_caption: "Decentralized Internet: Resolving Global Tech Challenges"
+description: By constructing a decentralized, autonomous internet infrastructure from scratch, we're tackling...
+date: 2023-11-12
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: resolving_global_tech.png
+---
+Imagine this: two friends in East Africa trying to connect via a video call. Instead of a direct link, their data embarks on a round trip to far-off data centers, consuming resources and adding costs. It's a snippet of a larger issue—how centralized infrastructure is holding back progress in connectivity.
+
+### **Breaking the Distance Barrier**
+
+In many regions, the internet economy remains anchored in distant lands due to reliance on long cables to Europe, North America, or China, where colossal data centers reside. This scenario keeps data, jobs, and economic benefits outside developing regions. But what if connectivity was local, decentralized, and efficient?
+
+### **The East Africa Example**
+
+Picture our technology in action. Instead of relying on data centers thousands of miles away, our decentralized infrastructure brings the connection closer. Those friends in East Africa can communicate peer-to-peer, reducing bandwidth needs by up to 10 times while boosting security. This isn't just about video calls; it's about revolutionizing every digital interaction.
+
+### **Streamlining Complexity**
+
+The tech world often gets tangled in layers of abstraction, favoring integration over innovation. While layers aid compatibility and incremental progress, they hinder true change. Excessive abstraction results in inefficiencies, performance lags, increased costs, and scalability woes.
+
+### **The Education Gap**
+
+Innovation takes a back seat when education leans heavily on commercial technologies. The push for quick-fix solutions neglects long-term innovation. It's like opting for a painkiller instead of addressing the root cause of the problem.
+
+### **Local, Secure, Reliable**
+
+Our vision? A decentralized internet where compute, storage, and network are local, sovereign, and secure. Storage becomes more reliable with less overhead, doubling up as a global content delivery network. The network stays resilient, routes around issues, encrypts end-to-end, and knows precisely where data originates and ends.
+
+### **Tackling the Root Issues**
+
+By constructing a decentralized, autonomous internet infrastructure from scratch, we're tackling these issues head-on. Minimizing complexity while solving problems at their core is our mantra. It's not just about a tech revolution; it's about reshaping connectivity to be inclusive, efficient, and empowering for everyone, everywhere.
+
+The digital world stands at a crossroads. We can either perpetuate the status quo, or we can pave a new path—one that's decentralized, efficient, and equitable. The time for a decentralized internet that solves problems at their roots is now. It's time for connectivity that knows no boundaries.
+
+The power to transform connectivity is in our hands. Let's reimagine the internet not as a distant entity but as a network that thrives locally, serves globally, and empowers universally. Together, let's build a decentralized internet that propels us into a future where connectivity is a right, not a privilege.
\ No newline at end of file
diff --git a/content/blog/resolving_global_tech/resolving_global_tech.png b/content/blog/resolving_global_tech/resolving_global_tech.png
new file mode 100644
index 0000000..9a5cded
Binary files /dev/null and b/content/blog/resolving_global_tech/resolving_global_tech.png differ
diff --git a/content/blog/revolutionizing_data_center/index.md b/content/blog/revolutionizing_data_center/index.md
new file mode 100644
index 0000000..0c19ca9
--- /dev/null
+++ b/content/blog/revolutionizing_data_center/index.md
@@ -0,0 +1,112 @@
+---
+id: revolutionizing_data_center
+title: "Revolutionizing Data Center Design: Exploring Tier S"
+image_caption: "Revolutionizing Data Center Design: Exploring Tier S"
+description: The Tier S model is designed to exceed the capabilities of traditional data centers...
+date: 2024-02-10
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: revolutionizing_data_center.png
+---
+In an era where artificial intelligence is reshaping our technological landscape, it is imperative to reconsider how we design and operate data centers. With decades of experience in the Internet and Cloud space and in response to technological evolutions, ThreeFold is proposing a new approach.
+
+
+
+Over the last 30 years, data center construction has largely remained static. Contemporary data centers risk becoming obsolete if they continue to neglect evolving needs. As we stand at this technological crossroads, the urgency to adapt is clear: unless we pay close attention, new data centers risk repeating the inefficiencies of their predecessors, leading to a poor utilization of investments and a significant mismatch with current and future requirements.
+
+## The Two Main Flaws of Existing Data Centers
+
+### Inadequate Power Provision
+
+The advent of AI has dramatically escalated power needs. An AI-centric rack can consume up to 200 kW – a staggering 15 times more than the capacity of data centers built in the conventional model. This exponential increase poses significant challenges, particularly when dissipation exceeds 50 kW per rack. Traditional designs fall short in crucial aspects like cooling and power distribution, with conventional air cooling methods becoming increasingly unviable.
+
+### The Shift in Market Needs: Beyond Co-location
+
+The market dynamics have evolved; selling space in a data center, akin to ‘advanced real estate’, is a model that is rapidly losing relevance. The traditional co-location framework, which expects customers to manage their hardware and infrastructure within leased rack space, is becoming antiquated.
+
+
+
+In the modern landscape, the role of a data center should transcend mere space rental. The emphasis should be on providing integrated solutions – selling compute, storage, and network capacity, not just rackspace and power. It’s about delivering a comprehensive service that aligns with the complex, ever-evolving needs of businesses immersed in the digital and AI revolution.
+
+## The Data Center Landscape Today
+
+Tier 3 and Tier 4 Data Centers are classifications outlined by the Uptime Institute, which provide standards for the design, construction, and operation of data centers. The Institute defines four tiers (1, 2, 3, & 4) to categorize data centers according to their design and infrastructure capabilities. For the purposes of this article, we will focus on the top two tiers.
+
+### Tier 3
+
+A Tier 3 Data Center is a type of data center facility that is designed to provide a high level of availability and redundancy for IT infrastructure and data storage.
+
+
+
+#### Key Characteristics
+
+- Availability: Tier 3 Data Centers typically offer 99.982% availability, translating to around 1.6 hours of downtime per year.
+- Redundancy: They feature N+1 redundancy for power and cooling systems, providing backup components to ensure continuous operation in case of failure.
+- Concurrent Maintenance: Tier 3 Data Centers allow for maintenance and repairs to be performed on systems without disrupting operations.
+- Cost: Tier 3 Data Centers are less expensive to build and operate compared to Tier 4 due to lower redundancy requirements.
+
+It's important to note that while Tier 3 Data Centers provide a high level of availability and redundancy, they are not as robust as Tier 4 Data Centers, which are designed to provide even higher levels of fault tolerance and uptime. The choice of data center tier depends on the specific needs and risk tolerance of the organization using the facility.
+
+#### Key Challenges
+
+- Limited Uptime: Despite high reliability, Tier 3 Data Centers may still experience noticeable downtime, which could impact critical operations.
+- Single Points of Failure: While designed for redundancy, Tier 3 Data Centers may still have single points of failure, potentially leading to downtime during component failures.
+- Scalability: They may have limitations in scalability compared to higher tier data centers, potentially requiring more significant upgrades for expansion.
+
+
+
+When a business is considering colocation or hosting in a Tier 3 Data Center, it's important to assess its power requirements carefully. For operations with high power demands, it might be necessary to discuss with the data center provider the possibilities of allocating additional power resources or choosing a high-density zone within the data center. Data center providers typically measure power in kilowatts (kW) per rack and will have different pricing models based on the power and cooling requirements of the equipment hosted.
+
+### Tier 4
+
+A Tier 4 Data Center is the most advanced type of data center tier, as classified by the Uptime Institute. The Tier 4 Data Center is the most robust and less prone to failures. Its design ensures redundancy and reliability.
+
+#### Key Characteristics
+
+- Availability: Tier 4 Data Centers offer the highest level of availability, typically guaranteeing 99.995% uptime or just around 26.3 minutes of downtime per year.
+- Fault Tolerance: They feature a fault-tolerant design with 2N+1 redundancy for critical systems, ensuring uninterrupted operation even during component failures.
+- Redundancy: Tier 4 Data Centers have redundant power and cooling distribution paths, eliminating single points of failure.
+- Security: They often have advanced security measures in place, including biometric access controls and surveillance systems.
+
+#### Key Challenges
+
+- Complexity: Tier 4 Data Centers are more complex and expensive to design, build, and maintain due to their fault-tolerant architecture.
+- High Cost: The increased redundancy and fault tolerance come with higher costs, making Tier 4 Data Centers more expensive to operate compared to lower tiers.
+- Overkill for Some Applications: For organizations with less critical operations or smaller budgets, Tier 4 Data Centers may be overkill and not cost-effective.
+
+### Choosing Between Tier 3 and Tier 4
+
+- Cost vs. Need: Tier 4 Data Centers are significantly more expensive to build and operate. Organizations should assess whether they need the highest level of uptime and fault tolerance that Tier 4 provides.
+- Business Requirements: Businesses that can afford occasional downtimes for maintenance or those that don't have extremely critical data operations may find Tier 3 facilities adequately sufficient.
+- Industry Compliance: Certain industries may require or favor Tier 4 facilities due to regulatory requirements.
+
+
+
+In summary, while both Tier 3 and Tier 4 Data Centers are designed to ensure high levels of uptime and reliability, Tier 4 takes this a step further with increased redundancy, fault tolerance, and a correspondingly higher price point.
+
+## Introducing the Tier S Data Center
+
+The Tier S model is designed to exceed the capabilities of traditional Tier 3 and 4 Data Centers, addressing the increasing demand for infrastructure that can support emerging IT workloads with greater efficiency and resilience. Where "S" stands for "Self-Healing," Tier S Data Centers present a new way forward, while remaining backwards compatible.
+
+
+
+The Tier S "circular approach" allows us to build the most reliable and redundant data centers in the world. A larger data center (typically 2-10 mW capacity) is extended with at least nine edge data centers. Key features include advanced liquid cooling technology and cybersecurity mechanisms, enhancing the center's ability to handle complex IT workloads like AI and ML.
+
+
+
+Flexibility is central to the design, with each edge data center capable of housing 3-30 pods (subsections), and a versatile main data center. The innovative self-healing technology ensures continuous, secure operations, reducing downtime and maintenance needs. The infrastructure, integrating state-of-the-art hydro coolant distribution units, is designed for high-performance computing, meeting emerging technological demands.
+
+### Key Benefits
+
+- Superior Reliability: Data storage is highly secure and can't be lost, would even be safe if quantum computing would be used for hacking.
+- 100% Redundancy: Fully redundant power and network paths. All hardware is equipped with liquid cooling for enhanced reliability and energy-efficiency..
+- Capacity and Expansion: A main data center with a 2-10 MW capacity, supplemented by at least 9 edge data centers.
+- Flexible Configuration: Each edge data center can include 3 to 30 pods (more information below), with the main data centers configurable as pod, rack, or container-based.
+- Disaster Resilience: The circular design, with a main data center and edge data centers, offers robust protection against natural disasters, war, or unrest.
+- Self-Healing: Equipped with self-healing properties, Tier S Data Centers ensure that workloads can operate safely with minimal need for human intervention.
+
+## In Conclusion
+
+The existing data center model is simply insufficient for emerging demands of the IT world. Billions of dollars will be mis-spent if we continue down the existing path. This is why ThreeFold is presenting a new approach. While the Tier S Data Center is still in its conceptual phase, we are actively working with partners on implementing the first of its kind in the near future.
\ No newline at end of file
diff --git a/content/blog/revolutionizing_data_center/revolutionizing_data_center.png b/content/blog/revolutionizing_data_center/revolutionizing_data_center.png
new file mode 100644
index 0000000..18aed69
Binary files /dev/null and b/content/blog/revolutionizing_data_center/revolutionizing_data_center.png differ
diff --git a/content/blog/shifting_to_the_edge/index.md b/content/blog/shifting_to_the_edge/index.md
new file mode 100644
index 0000000..661a628
--- /dev/null
+++ b/content/blog/shifting_to_the_edge/index.md
@@ -0,0 +1,64 @@
+---
+id: shifting_to_the_edge
+title: "Shifting to the Edge: The Internet's Evolution"
+image_caption: "Shifting to the Edge: The Internet's Evolution"
+description: With emerging technologies like IoT, Web 3 and more, computing needs to be pushed from centralized...
+date: 2022-05-10
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: shifting_to_the_edge.png
+---
+With new devices being connected every day and emerging technologies like the Internet of Things (IoT), the metaverse and Web 3 gaining popularity, the [demand](https://www.cbre.com/en/insights/reports/north-america-data-center-trends-h2-2021) for Internet capacity is booming. Already, these developments are shifting the [Internet’s “center of gravity”](https://www.securityinfowatch.com/perimeter-security/physical-hardening/article/21263002/real-words-or-buzzwords-edge-cloud-and-the-evolving-internet) from its core to the edges in order to keep up with the growing demand. In an increasingly interconnected world, centralized cloud architectures are proving to be [bottlenecks](https://www.forbes.com/sites/forbestechcouncil/2022/03/25/demystifying-edge-technology/) hindering future growth.
+
+
+
+Here are some interesting numbers to emphasize the explosive growth of connected devices and the impending data explosion:
+
+
+
+* Back in 2018, [90% of global data creation](https://www.securityinfowatch.com/perimeter-security/physical-hardening/article/21263002/real-words-or-buzzwords-edge-cloud-and-the-evolving-internet) took place within the two previous years.
+* In 2022, [4.95 billion people](https://www.securityinfowatch.com/perimeter-security/physical-hardening/article/21263002/real-words-or-buzzwords-edge-cloud-and-the-evolving-internet) are using the Internet and about [2.5 quintillion bytes](https://www.securityinfowatch.com/perimeter-security/physical-hardening/article/21263002/real-words-or-buzzwords-edge-cloud-and-the-evolving-internet) of data are created on a daily basis.
+* About 2 billion computers, 15 billion mobile devices and more than 22 billion IoT devices are [active worldwide](https://www.securityinfowatch.com/perimeter-security/physical-hardening/article/21263002/real-words-or-buzzwords-edge-cloud-and-the-evolving-internet) on a daily basis.
+* By 2025, more than [1 billion people](https://www.cisco.com/c/en/us/solutions/executive-perspectives/annual-internet-report/index.html) and [75 billion IoT devices](https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/#:~:text=Internet%20of%20Things%20%2D%20number%20of%20connected%20devices%20worldwide%202015%2D2025&text=By%202025%2C%20forecasts%20suggest%20that,IoT%20installed%20base%20in%202019.) are expected to join the Internet.
+
+
+
+And yet, the expansion of Internet capacity still largely occurs in the same centralized and inefficient way. The client-server model of hyperscale data centers is unable to meet this rapidly growing demand due to high building and operational costs to fulfill bandwidth, performance and cybersecurity requirements. As data centers are primarily built in the US, China and Europe, emerging countries have to be connected via sea cables which makes the model’s limitations particularly severe for these countries. And even in countries where many data centers are located, they are built in regions where land and electricity are as cheap as possible. Consequently, the bulk of data centers is still [far away](https://www.securityinfowatch.com/perimeter-security/physical-hardening/article/21263002/real-words-or-buzzwords-edge-cloud-and-the-evolving-internet) from where the majority of users and connected devices reside, and where huge amounts of data are generated that require processing – resulting in a [weak distribution](https://library.threefold.me/info/threefold#/tfgrid/threefold__grid_valuation?id=what39s-the-potential-of-the-threefold-grid) of Internet capacity.
+
+
+
+About [175 Zettabytes](https://www.seagate.com/files/www-content/our-story/rethink-data/files/Rethink_Data_Report_2020.pdf) of data will be created by 2025, as our economy becomes increasingly digital and data driven. And this amount of data needs to be captured, stored and activated in a secure, efficient and high-performing way. So, the aforementioned technological use cases will not only [accelerate the demand](https://www.cbre.com/en/insights/reports/north-america-data-center-trends-h2-2021) for Internet capacity but also require edge capabilities, such as low latencies, in order to run and scale successfully. In fact, the centralized data center model poses one of the biggest obstacles to the success and spread of the Internet of Things and related applications. This will have to change. Actually, industry experts [expect 75%](https://www.i-scoop.eu/edge-computing-explained/) of data to be processed outside of the traditional data center or cloud model by 2025.
+
+## The rise of edge computing
+
+Computing needs to be pushed from centralized data centers to the edge to support the massive data consumption coupled to the rise of connected devices and emerging technologies. For instance, as more and more home appliances and devices are getting interconnected through the IoT economy, the amount of real-time data generated within our homes on a daily basis is rapidly expanding. Edge computing [tackles the shortcomings](https://www.i-scoop.eu/edge-computing-explained/) of the centralized model in terms of bandwidth, latency and autonomy. It enables applications and solutions to be hosted closer to where their data is being produced and consumed, thereby allowing for low latencies, rapid data processing and real-time decisions.
+
+
+
+The industry analyst company [IDC estimates](https://www.idc.com/getdoc.jsp?containerId=prUS48772522) the global spending on edge computing to increase by 14.8% compared to 2021 – amounting to roughly $176 billion in 2022. By 2025, this number is predicted to reach about $274 billion.
+
+
+
+The idea of edge computing’s ability to process data on-site is simple enough. Nevertheless, edge computing fails to deliver on its promise as it still remains somewhat centralized today. Granted, so-called edge data centers are [closer](https://stlpartners.com/articles/edge-computing/edge-data-centres/) to where the data is being consumed than hyperscale data centers. But while they do provide an improvement from traditional data centers, they are not able to provide [far-edge](https://www.thefastmode.com/expert-opinion/23002-what-are-various-types-of-edge-computing-that-exist-today) capabilities, i.e. moving as close to the user and point of data creation as possible. They are simply smaller types of data centers that are still operated in a centralized manner, require the [same infrastructure elements](https://connectorsupplier.com/how-the-rise-of-edge-computing-will-reshape-the-data-center-landscape/) as centralized data centers, and usually [rely](https://www.techtarget.com/searchdatacenter/definition/edge-data-center) on bigger, central data centers. Quite edgy isn’t it?
+
+
+
+As the need for Internet capacity – specifically at the edge – is rapidly intensifying, a new approach to Internet infrastructure is clearly needed. The Web 3 movement created a spur of interest across industries due to its promise to decentralize the Internet and cloud as we know it. Future data will be generated at the edge of the network and Internet which certainly requires an [architectural shift](https://www.forbes.com/sites/forbestechcouncil/2022/03/25/demystifying-edge-technology/) away from the current model.
+
+## Realizing an interconnected future
+
+Ironically, decades after the spark of the open-source peer-to-peer Internet movement was steamrolled by large tech companies and governments eager to centralize the global Internet, we seem to enter an era of decentralization again. There’s no doubt that large tech companies did bring a lot of innovation to our global Internet and cloud stack. Technically though, [peer-to-peer](https://threefold.io/blog/p2p_web3/) systems have always been the most scalable option. Moreover, open-source architectures have built a strong reputation for providing high levels of security and flexibility.
+
+
+
+In a peer-to-peer model, people and devices are able to exchange directly, without intermediaries or servers in the middle – leading to a more energy-efficient, scalable and flexible paradigm that can expand on-demand. And undoubtedly, open-source will play a [key role](https://news.crunchbase.com/news/edge-computing-said-quissal-zededa/) in edge computing by simplifying and enhancing the building and deployment of software at the edge.
+
+
+
+By leveraging open-source and peer-to-peer technologies, TF9 has come up with an Internet infrastructure that is capable of far-edge computing. TF9 offers a powerful set of [compute primitives](https://threefold.io/blog/building_a_new_internet_from_the_ground_up_3/) that provide the agility to create and deploy containers, Virtual Machines (VMs) and [Kubernetes](https://library.threefold.me/info/threefold#/technology/threefold__zkube?id=zkube) environments at the edge. Having integrated all leading industry-standard tools, ThreeFold’s solution allows for a seamless migration of any digital workload, making TF9 the ideal infrastructure for edge workloads. And all data produced by these workloads can be stored in a way that is ultra safe, highly reliable and [unbreakable](https://library.threefold.me/info/threefold#/technology/qsss/threefold__qsss_home?id=quantum-safe-storage-system). Combined with end-to-end encrypted peer-to-peer [networking](https://library.threefold.me/info/threefold#/technology/threefold__planetary_network?id=planetary-network), applications can be hosted closer to where the data is being consumed – representing the ideal underlying layer for IoT networks, blockchain-based workloads and more to run and scale at the edge seamlessly, efficiently and privately.
+
+
+
+The shift towards the edge is inevitable. TF9 is the first full-stack, [decentralized](https://coincheckup.com/blog/threefold-is-the-decentralized-web-the-future-of-the-internet/), peer-to-peer Internet infrastructure in the world that combines compute in the form of highly-optimized containers, storage and network capacity in an all-in-one solution. With more than [81 Petabytes](https://threefold.io/) of capacity distributed across thousands of 3Nodes and 76 countries as well as [plans](https://threefold.io/blog/connecting_the_dots/) to sponsor the expansion of the Internet to developing regions, TF9 is the foundation for a thriving interconnected future that is secure, borderless and at the edge.
\ No newline at end of file
diff --git a/content/blog/shifting_to_the_edge/shifting_to_the_edge.png b/content/blog/shifting_to_the_edge/shifting_to_the_edge.png
new file mode 100644
index 0000000..becce21
Binary files /dev/null and b/content/blog/shifting_to_the_edge/shifting_to_the_edge.png differ
diff --git a/content/blog/tf9_depin_hub/index.md b/content/blog/tf9_depin_hub/index.md
new file mode 100644
index 0000000..44edcf5
--- /dev/null
+++ b/content/blog/tf9_depin_hub/index.md
@@ -0,0 +1,22 @@
+---
+id: tf9_depin_hub
+title: ThreeFold Listed on DePIN Hub
+image_caption: ThreeFold Listed on DePIN Hub
+description: ThreeFold are now listed on DePIN (Decentralized Physical Infrastructure Networks)....
+date: 2023-12-15
+taxonomies:
+ tags: []
+ categories: [News]
+extra:
+ imgPath: tf9_depin_hub.png
+---
+
+DePIN Hub is "the ultimate resource to learn more about the DePIN ecosystem," created by the Hotspotty team and launched officially yesterday. (Congrats!)
+
+
+
+Take a look at the [ThreeFold project listing](https://depinhub.io/projects/threefold) and feel free to let us know if you have any feedback or share within your networks!
+
+
+
+*DePIN stands for Decentralized Physical Infrastructure Networks, and covers projects ranging from connectivity to clean energy production to projects like ours.*
\ No newline at end of file
diff --git a/content/blog/tf9_depin_hub/tf9_depin_hub.png b/content/blog/tf9_depin_hub/tf9_depin_hub.png
new file mode 100644
index 0000000..72efdbe
Binary files /dev/null and b/content/blog/tf9_depin_hub/tf9_depin_hub.png differ
diff --git a/content/blog/tf9_dunia_yetu/index.md b/content/blog/tf9_dunia_yetu/index.md
new file mode 100644
index 0000000..5229da7
--- /dev/null
+++ b/content/blog/tf9_dunia_yetu/index.md
@@ -0,0 +1,26 @@
+---
+id: tf9_dunia_yetu
+title: ThreeFold Announces a Sovereign Internet for Tanzania
+image_caption: ThreeFold Announces a Sovereign Internet for Tanzania
+description: Dunia Yetu Formally Announced in Dar Es Salaam, in partnership with Tanzania's ICT Commission...
+date: 2024-01-29
+taxonomies:
+ tags: []
+ categories: [News]
+extra:
+ imgPath: tf9_dunia_yetu.png
+---
+
+Recently ThreeFold formally announced Dunia Yetu, in collaboration with the ICT Commission of Tanzania and Arthur Brock, the founder of Holochain.
+
+
+
+Plans include coding academies and innovation hubs across Tanzania, and the deployment of sovereign infrastructure on top of which local developers can store, build, and deploy.
+
+
+
+Read more about Dunia Yetu [here](https://www.threefold.io/blog/dunia-yetu/) and stay tuned for what's next!
+
+
+
+*Take a look at some coverage Dunia Yetu received in Tanzanian News [here](https://www.youtube.com/watch?v=qqYFAa2NXLg&t=895s).*
\ No newline at end of file
diff --git a/content/blog/tf9_dunia_yetu/tf9_dunia_yetu.png b/content/blog/tf9_dunia_yetu/tf9_dunia_yetu.png
new file mode 100644
index 0000000..ca93b9b
Binary files /dev/null and b/content/blog/tf9_dunia_yetu/tf9_dunia_yetu.png differ
diff --git a/content/blog/tf9_freezone/index.md b/content/blog/tf9_freezone/index.md
new file mode 100644
index 0000000..38b3096
--- /dev/null
+++ b/content/blog/tf9_freezone/index.md
@@ -0,0 +1,24 @@
+---
+id: tf9_depin_hub
+title: A Digital Free Zone in Zanzibar – And More!
+image_caption: OurWorld Digital Free Zone
+description: The President of Zanzibar, Dr. Hussein Mwinyi, visited ThreeFold this weekend to publicly share...
+date: 2023-07-27
+taxonomies:
+ tags: []
+ categories: [News]
+extra:
+ imgPath: tf9_freezone.png
+---
+
+This past weekend, ThreeFold was honored with a visit from Zanzibar's President Dr. Hussein Mwinyi at the African Regenerative Cities Summit.
+
+
+
+There, he formally and publicly expressed the government's commitment to the establishment of a digital free zone, a locally-owned Internet infrastructure, an incubator to support young local innovators – all in collaboration with ThreeFold – and their commitment to the ICT sector as a whole.
+
+
+
+Read [Zanzibar Seeks to Become a Digital FreeZone](https://www.thecitizen.co.tz/tanzania/zanzibar/zanzibar-seeks-to-become-digital-freezone--4316150) (via The Citizen) and [Mwinyi Commits to Improvement of Digital Spaces](https://dailynews.co.tz/mwinyi-commits-to-improvement-of-digital-spaces/) (via Daily News Tanzania) for further details.
+
+
\ No newline at end of file
diff --git a/content/blog/tf9_freezone/tf9_freezone.png b/content/blog/tf9_freezone/tf9_freezone.png
new file mode 100644
index 0000000..447bee9
Binary files /dev/null and b/content/blog/tf9_freezone/tf9_freezone.png differ
diff --git a/content/blog/tf9_ict_conference/index.md b/content/blog/tf9_ict_conference/index.md
new file mode 100644
index 0000000..a4d43a0
--- /dev/null
+++ b/content/blog/tf9_ict_conference/index.md
@@ -0,0 +1,22 @@
+---
+id: tf9_ict_conference
+title: ThreeFold @ Tanzania ICT Conference
+image_caption: ThreeFold @ Tanzania ICT Conference
+description: Some of the team recently attended the Tanzania Annual ICT Conference...
+date: 2023-10-23
+taxonomies:
+ tags: []
+ categories: [News]
+extra:
+ imgPath: tf9_ict_conference.png
+---
+
+Some of the ThreeFold team recently attended the Tanzania Annual ICT Conference where ThreeFold co-founder Kristof De Spiegeleer participated in two separate panels.
+
+
+
+He took the opportunity to underline the importance of a sovereign Internet and the incredible potential of an open source and decentralized ecosystem to build Tanzania's digital economy.
+
+
+
+Take a look at some clips from the talk [here](https://forum.threefold.io/t/threefold-tanzania-ict-conference-2023/4106).
\ No newline at end of file
diff --git a/content/blog/tf9_ict_conference/tf9_ict_conference.png b/content/blog/tf9_ict_conference/tf9_ict_conference.png
new file mode 100644
index 0000000..2b195da
Binary files /dev/null and b/content/blog/tf9_ict_conference/tf9_ict_conference.png differ
diff --git a/content/blog/towards_sustainable_it/index.md b/content/blog/towards_sustainable_it/index.md
new file mode 100644
index 0000000..820d3d9
--- /dev/null
+++ b/content/blog/towards_sustainable_it/index.md
@@ -0,0 +1,58 @@
+---
+id: towards_sustainable_it
+title: "Towards Sustainable IT: A Better Solution for Our Planet"
+image_caption: "Towards Sustainable IT: A Better Solution for Our Planet"
+description: We believe IT can be sustainable. Actually, it should be! That's why energy efficiency has...
+date: 2020-12-02
+taxonomies:
+ tags: []
+ categories: []
+extra:
+ imgPath: towards_sustainable_it.png
+---
+Today, the global Internet and IT infrastructure requires enormous amounts of energy, responsible for about 10% of annual global energy consumption. This makes the IT industry amongst the most pollutive industries in the world (along with the often-discussed airline industry, for comparison).
+
+
+We believe IT can be sustainable. Actually, it should be! That's why energy efficiency has always been a key focus of ours. With climate change and sustainability as some of the most pressing issues of our times, new green solutions need to be our priority. It has been key to ThreeFold since the very beginning of its story to enable a technological infrastructure that can reduce the Internet’s carbon footprint drastically.
+
+## Simplicity is the key to unlock a better future
+
+Over time, integration suites, middleware solutions, and enterprise service busses have been invented and implemented to cover integration challenges within the current internet. This has further complicated IT architectures, resulting in a loss of actual end user workload performance.
+
+
+ThreeFold reworked the whole approach to IT architectures and eliminated the layers of complexity. The result is a cloud stack that presents minimal overhead and that requires less hardware – reducing heat generation and eventually cooling requirements. By reducing the need for power, the net result is an energy-efficient Internet grid.
+
+## Improving resilience and efficiency through Self-Healing IT
+
+Keeping systems up and running is a major requirement in modern day IT. Leading vendors earn most of their margin by selling maintenance contracts, performance guarantees, and professional services. Their business models bring no incentive to make things simple and efficient for consumers.
+
+
+Creating a self-healing environment requires only minimal manual intervention to replace broken hardware components. Broken hardware components are inevitable, and the Zero-OS distributed node architecture deals with such failures by turning off broken components and provisioning unused capacity. By removing the need to ship broken parts back and forth, and linking to the corresponding installation knowledge (engineers), a lower carbon footprint can be achieved.
+
+## “No painkiller” approach. We tackle the root issue
+
+If a specific piece of software or hardware is not delivering the required performance or reliability, we should analyze the core design/algorithm and its usage of soft/hard components to determine the root causes of persistent issues to be solved.
+
+
+Currently, most storage vendors follow the path of least resistance when trying to improve on performance. Their solution for meeting performance targets is to use faster components (CPU, memory, network card, proprietary acceleration) rather than looking at the core algorithms that drive the utilization of those components. Swapping components for faster ones perpetuates a cycle of cutting corners and focuses reliance on innovation from hardware component providers rather than solving the more fundamental and underlying issues. That's a "painkiller" approach.
+
+
+Zero-OS was designed to solve root problem issues by design. While still using high-performance hardware components on the ThreeFold Grid, the algorithm of Zero-OS maximizes utilization possibilities. This enables greater performance and sustainability. Some key examples how this is achieved:
+
+## Eliminating unnecessary elements from standard architectures
+
+Virtualization adds a layer of software between the actual end-user workload and physical hardware. It also allows for multiple workloads to run on the same hardware by using excess capacity. There is definitely merit in building a virtualization solution. Building an effective virtualization solution that does not require abundant context switching is key and this is why Zero-OS has been developed. Zero-OS uses a minimal Linux kernel that allows for a number of user spaces to co-exist. In these user spaces, containerized versions of software can be run, eliminating the need for hypervisors, virtual OS to fuel the virtual machines, and guest operating systems. This also minimizes the required overhead for the host OS.
+
+## Minimizing network connections usage
+
+Supercomputing delivered many new technologies. But, not all of them are usable solutions for everyday workloads. One technology invented to make supercomputers performant is the use of Remote Direct Memory Access (RDMA). RDMA allowed physical CPU boards (containing both CPUs and memory) to access other CPU boards in memory stored data over a dedicated channel. This eliminated the need to transport data between CPU nodes over network connections (or other mainstream means to exchange data). The result was a considerable reduction in overhead created when allowing distributed end user workloads to operate over multiple physical cores. The leading server and storage solutions brands have never considered nor implemented such mechanisms. This resulted in an increased need for faster networks - increasing complexity, costs, efforts and resources needed to operate solutions.
+
+
+RDMA is only used in certified farms and requires involvement of TFTech.
+
+## Minimizing disk usage
+
+The storage solution uses slow and big (the bigger the better) HDD disks which drive in rack density. As they spin slower they consume less power and need less cooling. But then, how can you deal with read/write intensive workloads? The storage algorithm uses a SSD cache to acknowledge Inputs/Outputs coming from the applications, fills the erasure coded data blocks in large (up to 64MB) storage containers and writes the big chunks of data on the big and slow HHDs. If you are familiar with HDD disks, you know they like to be streamed on instead of having a lot of small bits written in a scratchy way.
+
+
+**Continuous innovation in all of these areas are leading to an efficient technology stack.**
diff --git a/content/blog/towards_sustainable_it/towards_sustainable_it.png b/content/blog/towards_sustainable_it/towards_sustainable_it.png
new file mode 100644
index 0000000..031efb3
Binary files /dev/null and b/content/blog/towards_sustainable_it/towards_sustainable_it.png differ
diff --git a/content/contact/index.md b/content/contact/index.md
index 0db4764..60f207f 100644
--- a/content/contact/index.md
+++ b/content/contact/index.md
@@ -8,3 +8,17 @@ weight: 6
template: "layouts/contact.html"
---
+
+
\ No newline at end of file
diff --git a/content/footer/_index.md b/content/footer/_index.md
index 71294f7..293df7f 100644
--- a/content/footer/_index.md
+++ b/content/footer/_index.md
@@ -4,7 +4,7 @@ description: ""
insert_anchor_links: "left"
template: "partials/footer.html"
extra:
- logoPath: "images/logo.png"
+ logoPath: "images/logo.svg"
socialLinks: { Github: "https://github.com/ourworldfreezone", Twitter: "https://twitter.com/threefold_io", Telegram: "https://t.me/threefoldnews" }
---
@@ -16,36 +16,19 @@ extra:
ThreeFold
-###### [Incubaid](https://manual.grid.tf/threefold_token/buy_sell_tft/buy_sell_tft.html)
-
-###### [Mazraa](https://dashboard.grid.tf/)
-
-###### [Freeflow Nation](https://manual.grid.tf/farmers/farmers.html)
-
-|||
-
-##### OurWorld
-
-
+###### [Incubaid](https://incubaid.com)
OurWorld
-###### [Freezone](/)
-
-OurPhone
-
-OurParadise
-
-
|||
-##### About Us
+##### Company
-Manual
+Manual
Telegram
@@ -53,8 +36,20 @@ extra:
Support
+|||
+
+##### TF9
+
+
+
+Technology
+
+
+Use Cases
+
+
+Blog
-Github
{% end %}
diff --git a/content/header/_index.md b/content/header/_index.md
index 334478b..aca253e 100644
--- a/content/header/_index.md
+++ b/content/header/_index.md
@@ -4,12 +4,17 @@ description: "this is a header."
insert_anchor_links: "left"
template: "partials/header.html"
extra:
- logoPath: "/images/logo.png"
+ logoPath: "/images/logo.svg"
imgPath: ""
---
-- [Mycelium]("/mycelium")
-- [Hero]("/hero")
-- [Nodes]("/nodes")
-- [Xperiences]("/xperiences")
+- [Home]("/")
+- [About]("/about")
+- [Technology]("/technology")
+- [Use Cases]("/usecases")
+- [Blog]("/blog")
+- [Team]("/people")
- [Contact]("/contact")
+
+
+
diff --git a/content/home/img/cyberwall.png b/content/home/img/cyberwall.png
new file mode 100644
index 0000000..d9c339a
Binary files /dev/null and b/content/home/img/cyberwall.png differ
diff --git a/content/home/img/hometech.jpg b/content/home/img/hometech.jpg
new file mode 100644
index 0000000..c561608
Binary files /dev/null and b/content/home/img/hometech.jpg differ
diff --git a/content/home/img/hometech2.jpg b/content/home/img/hometech2.jpg
new file mode 100644
index 0000000..bbed188
Binary files /dev/null and b/content/home/img/hometech2.jpg differ
diff --git a/content/home/img/revolutionizing_data_center.png b/content/home/img/revolutionizing_data_center.png
new file mode 100644
index 0000000..18aed69
Binary files /dev/null and b/content/home/img/revolutionizing_data_center.png differ
diff --git a/content/home/img/tf9_depin_hub.png b/content/home/img/tf9_depin_hub.png
new file mode 100644
index 0000000..72efdbe
Binary files /dev/null and b/content/home/img/tf9_depin_hub.png differ
diff --git a/content/home/img/tf9_dunia_yetu.png b/content/home/img/tf9_dunia_yetu.png
new file mode 100644
index 0000000..ca93b9b
Binary files /dev/null and b/content/home/img/tf9_dunia_yetu.png differ
diff --git a/content/home/index.md b/content/home/index.md
index 163ed26..31e54c9 100644
--- a/content/home/index.md
+++ b/content/home/index.md
@@ -1,267 +1,30 @@
---
-title: "Hero"
+title: "TF9"
description: ""
date: 2018-09-14
updated: 2021-02-20
draft: false
weight: 1
+template: "layouts/home.html"
---
-
-
-{% row(style="left" margin="hero" padding="top") %}
-
-
-
-
-
-![placeholder](./img/hero2.png#mx-auto)
-
-|||
-
-# Start Owning Your Data
and Digital Life
-### With **Hero**, We Can Build a Conscious Collective Intelligence Together.
-
-
-
Meet Hero: your unique digital avatar, streamlining your online presence by eliminating the need for duplicate identities across platforms.
- -Heroes were designed with technologies
that promote universal accessibility,
freedom, equality, and personal growth for all.
Discover how Mycelium Network is revolutionizing internet access with a community-powered connectivity approach. We aim to empower individuals worldwide by enabling them to own and manage internet resources collectively.
- -Mycelium Network and Heroes exist thanks to a vast network of cloud capacity deployed by ‘Farmers’- who deploy Mycelium Nodes in supporting locations worldwide.
- -Together, we can create a globally distributed AI and internet infrastructure and earn an income.
- -Embark on a journey towards digital sovereignty with Hero, where you take a full control of your online identity and data, starting with these 3 easy steps:
- -{% end %} - -{% row(style="center" margin="narrow" padding="bottom") %} - -Dive into a world of fully decentralized and completely secure applications on the Mycelium Network, built to empower and enable our Heroes with innovative digital Xperiences.
- -