DIDO Solutions

Scalable Distributed Testing made easy!

DIDO Testing Environment

From personal experimentation to a reliable infrastructure for large companies and analytical insights for government agencies test your distributive systems

Consulting and Support​

Interested in, but don't know how to start your distributed technology idea? We offer Consulting and Support Services as well


Learn more about the DIDO-Reference Architecture (DIDO-RA), DIDO-Data Model (DIDO-DM) and the DIDO Command Line Interface (DIDO-CLI)


Not sure if our service can help your industry? We have identified over 10 industries that is using or interested in distributive technology solutions

about our company

Leading the way in Distributive Technology Simulation & Testing

Corporations are moving into new unfamiliar areas that are no longer conducive to siloed working conditions. Researching distributive solutions is difficult, expensive, and can take months to get up and running.

Our mission is to assure customers their distributive solutions are robust, rugged and tested to meet functional and nonfunctional requirements by simplifying the process of selecting, using, and participating in high quality, community based distributed computing solutions.



60+ years in the Industry

Although Requirements at first glance appear to be simple, they can quickly become very complex as more requirements are identified, and consequently need to be managed and governed. Add this complexity to the complexity associated with any distributed system, and it can quickly seem daunting and overwhelming.

Testing is a process that generally involves the execution of the system or program under scripted, controlled situations. The scripts can be human instructions in documents or they can be captured in text files that a testing engine uses to drive the software.There are various requirement conformity checks that can be done to verify functional requirements:

Configurable Test Environment for distributed networks up and running in 30 seconds or less. Every configurable node created is booted up in a concurrent manner.

Information security, often referred to as InfoSec, is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerian hexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility

our services

We Offer Two Types of Services

DIDO Testing Environment (DIDO-TE)

From personal experimentation to a reliable infrastructure for large companies and analytical insights for government agencies test your distributive systems

Consulting Services

We offer three services: Management, Engineering and Procurement. Offering guidance and training through the hype of current DIDO Technologies to focus precious R&D budgets on getting the best return on investment.


Check the resources below for more information

DIDO Command Line Interface (DIDO-CLI)

The DIDO Command Line Interface (DIDO-CLI) is a text-based interface used to operate software and operating systems while allowing the user to respond to visual prompts by typing single commands into the interface and receiving a reply in the same way.

DIDO Data Model (DIDO-DM)

The DIDO Data Model (DIDO-DM) ties all the parts of the DIDO together. It refers to the conceptual, domain independent, data elements, the relationship between the inter-relationships between the data elements and the data that flows between different components with a generalized DIDO.


The term Distributed Immutable Data Objects (DIDO) refers to the underlying technologies supporting distributed data and computation across a distributed network of peers using consensus algorithms to maintain integrity and consistency across the network. DIDOs are not limited to cryptocurrencies, the original blockchain, or distributed ledger technologies. DIDOs are applicable to other non-cryptocurrency domains such as supply chain, registries for birth, deaths etc., and lists of identification and authentication (IA) acceptable certificates including those that have been revoked. The DIDO concepts are captured within a Reference Architecture (RA), intended to represent any architectures relying on distributed networks of peers that store data and allow parallel computation. The DIDO RA is not intended as a physical “must-have” requirements list, but more as a conceptual catalog of what “can-be”.

Learn more about who is behind the DIDO team

We are excited to introduce ourselves!