Welcome to SiteFog!

16 May

SiteFog is the brainchild of Kyle Mulka, idly spouted during a pitch session at Startup Weekend in Detroit.  In the ensuing 42 hours, the process of examining its potential has been exhilirating, tiring, and downright mind-bending.

The principles that we used to build SiteFog off of are the three points:

1- There is a market for cloud processing

2- Distributed computing systems work

3- Many millions of people use the web

Knowing these things, Kyle hypothesized that we could use Javascript to solicit an idle browser’s spare CPU cycles to accomplish small tasks.  By breaking up enormous tasks into smaller processes, we could distribute even enormous tasks over many millions of users, and accomplish them incredibly quickly.

There have been distributed computing processes before, but the real innovation is that by creating the Javascript and distributing it to websites, users will be maximizing their CPU’s ability, and helping to solve amazingly difficult programs just by passively using a website.

Since Amazon sells server space at $0.10/hour for purposes of cloud computing, we know that a market exists for this service.  Not only does the market exist, but by employing this model, we can provide nearly identical results for considerably less cost.  We have quite an advantage on a company that is maintaining all of its servers in-house.

SiteFog also offers websites a new way of monetizing its users.  We will compensate websites a portion of our sales, in return for being the channel through which we are accumulating processing.  Websites act as an aggregator for large amounts of users, and give us access to user’s PCs.

This may be an attractive monetization alternative or addition for website owners who are struggling for profitability by relying on advertising.

Advertisements

2 Responses to “Welcome to SiteFog!”

  1. Ryan Meray | ctechsinc.com May 16, 2010 at 8:22 pm #

    As we’ve seen with recent zero-click-required exploits circulated through networks as reputable as Google Adwords itself, the bad guys have become experts at finding effective ways to deploy malware payloads. I realize you guys are in the planning stages with this, but I think it’s crucial that from the ground up, the system is built so that malicious code can never make it onto a website. Just a thought going forward. Good luck!

  2. Kyle Mulka May 17, 2010 at 2:58 pm #

    Ryan, that is definitely a big concern of ours as well. We need to make sure that code that runs in the users’ browser is appropriately sandboxed and can not access any of the user’s or website’s data. This is definitely a big challenge, but its not an impossible feat. Facebook has proven that this is possible by creating FBJS which allows arbitrary code execution on a website without affecting other areas of the page:
    http://wiki.developers.facebook.com/index.php/FBJS

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: