PEKKA-logo

PEKKA

The First Innovation Towards The Future of Computing

Renting Computer Power Has
Never Been Cheaper!

PEKKA connects customers who need computing power with
clients who can rent our their idle computers on top of a
blockchain network

PEKKA connects customers who need computing power with clients who can rent our their idle computers ontop of a blockchain network

Go to Pekka

Pekka is not intended for mobile use.

Pekka is not intended for mobile use.

What is Pekka?

  • Distributed
  • Shared
  • Computing
  • Platform

What can Pekka do?

  • Machine Learning
  • 3D Rendering
  • Scientific Computing
  • And More

How does it work?

Pekka is hosted on an in-house blockchain solution,
named Canonchain.

Pekka is able to maintain a network of idle computers from which customers are able to choose for their computational needs.

Providers are compensated via fiat currency or crypto currency which can be exchanged on any major exchange platform.

Why Pekka?

Fast and Cheap

Canonchain, Pekka’s blockchain network, enables high-throughput, fast, cross-border P2P transactions at almost no cost. This means Pekka can connect to anyone in the world almost without having to pay extra fees and extchange rates.

Safe and Secure Blockchain

Guarantee privacy and security for both customer and provider: a blockchain solution based on the multi-sig smart contract provides this security. On the provider's side, using blockchain over the docker system to isolate tasks from reading or modifying the files in the host machines provieds privacy.

New and Diverse Marketplace

Cloud service providers force the clients to have no chance to negotiate the price and must pay regardless of requirement or results.
Pekka establishes a “pay-as-you-go” marketplace model for fair pricing that will undercut these industry giants and cloud service providers.

Efficent and Reliable

Conduct verification on the results of the task: This problem, recognized as verifiable computing, has been studied by computer scientists for nearly decade. However, due to the tremendous system-setup overhead and the computational cost, these systems are not very practical. As such, we propose a new blockchain-based verification protocol developed here at Nakamoto & Turing Labs, called EntrapNet, for trustless computing.

Road Map

<