Skip to main content

Agent Use Cases

This page adapts the Agent Use Cases section from the Mycelium site into documentation form.

What the Framework Enables

“The framework gives you full control over where agents live, how they connect, and what data they use.”

Agents are intended to be:

  • Location‑aware – you decide which nodes or VDCs they inhabit.
  • Network‑aware – connectivity and topology are visible and controllable.
  • Data‑aware – data stays where it should, with explicit movement.

Example Use Cases

Run Agents on Your Own Hardware

Deploy agents directly on:

  • Laptops and workstations.
  • Homelabs and edge boxes.
  • VDCs and clusters you control.

You are not tied to any single cloud or vendor; agents execute where it makes the most sense for latency, privacy, or cost.

Connect Agents Over the Mycelium Network

Use Mycelium Network as the secure fabric between agents.

  • Private overlay addressing across homes, offices, and datacenters.
  • Encrypted paths between nodes in different countries or environments.
  • One consistent address space spanning local and remote infrastructure.

Keep Data and Memory Private by Default

Agents are designed to:

  • Use local datasets, tools, prompts, and embeddings.
  • Avoid sending sensitive context to external AI APIs by default.
  • Respect policies for which data may be shared and where.

This is especially important for regulated sectors and internal systems.

Build Workflows Across Cloud + Edge

Orchestrate multi‑node workflows that span:

  • Edge clusters near data sources.
  • Central VDCs for heavier compute or aggregation.
  • Personal devices for interaction and control.

Examples:

  • Real‑time processing at the edge, with summarized results aggregated in a VDC.
  • Agents coordinating tasks between office locations and remote workers.
  • Data pipelines that never leave your chosen infrastructure.

Operate in Regulated Contexts

Run agents where strict requirements apply:

  • Healthcare, finance, public sector, and other regulated domains.
  • Environments with data residency constraints.
  • Workloads requiring verified identity and controlled connectivity.

The combination of local execution, sovereign infrastructure, and encrypted mesh networking is intended to make regulatory compliance more tractable.

Blend Local and Remote Intelligence

Not all tasks need to run on the same node:

  • Lightweight agents might run locally for responsiveness and interactivity.
  • Heavier workloads can be scheduled to trusted remote nodes (e.g. GPU clusters).
  • Data movement is explicit and policy‑driven.

This supports hybrid strategies where you balance privacy, performance, and cost.


Looking Ahead

These use cases are illustrative and may expand as the Agent Framework matures. For how to prepare your infrastructure today, see Getting Ready for Agents.