Inferable provides a robust, distributed architecture designed for building reliable AI-powered applications. Unlike traditional frameworks that require co-location of model calls and function execution, Inferable takes a fundamentally different approach, separating these concerns while maintaining persistent state throughout the entire application lifecycle.
Unlike many AI orchestration frameworks, Inferable’s Control Plane includes a built-in persistence layer that automatically maintains the complete state of all running workflows:Key benefits of this design:
Automatic Checkpointing: Every state change is persisted without developer intervention
Transactional Integrity: State updates use ACID transactions to prevent corruption
Zero-Loss Recovery: Workflows resume from exactly where they left off, even after system failures
Temporal Durability: State can be maintained for any duration - minutes, hours, or months
The Control Plane incorporates a sophisticated distributed job queue that routes function calls to the appropriate execution environments:This job queue provides:
Fair Distribution: Balances workloads across available worker pools
Prioritization: Handles urgent tasks ahead of lower-priority ones
One of Inferable’s most distinctive architectural features is its use of long polling for communication between the Control Plane and function execution environments:This approach offers significant advantages:
Zero Inbound Ports: Your execution environments need no open inbound ports
Firewall-Friendly: Works with standard outbound HTTPS (port 443)
NAT Traversal: Functions behind NAT can still participate
No VPN Required: Connect from any network with internet access
No DNS Configuration: No need to set up DNS records or certificates
For organizations with strict security requirements, this means:
Functions can run in private subnets with no internet-accessible endpoints
No need to expose internal services to the public internet
No complex network configuration or tunneling required
Works seamlessly with existing security boundaries