With content addressing, we take data, hash it, and use that data as the key value.
In IPVM we're introducing input addressing, where we get a receipt as the value, and the input is the hash of the instruction (the description of what you want to have run).
Instead of validating with a hash, we validate with a receipt, making it fully deterministic! #computeoverdata
Using capabilities based on UCAN, we can determine who can run different computations. Perhaps one job is better for Bacalhau, another for Fastly, etc.
Maybe you only want computation to happen on a cluster of machines that you and your friends run and no others.
We let IPVM handle the matchmaking and authorization checking so that different systems can work together to complete the job. Learn more: https://fission.codes/blog/cod-summit-2023-foundations-for-open-world-compute/ #computeoverdata #distributedsystems #compute