How WebAssembly Gets Used: The 18 Most Exciting Startups Building with Wasm

## Structure of the post

  1. How are you using Wasm?
  2. Why did you choose Wasm over other technical approaches?
  • Server-side
  • Client-side
  • Server-side
  • Client-side

## Startups building products that use Wasm

### Using Wasm — client-side

## Startups building Wasm infrastructure

### Building Wasm infrastructure — client-side

## What’s next? Areas to keep an eye on

### Client-side Wasm

  1. Frameworks: There are still not enough client web frameworks that use WebAssembly to manipulate the DOM. Developers want options when building applications, and right now, they are limited to only a few Wasm frameworks — most notably, Blazor, from Microsoft.
  2. Feature support: There are variations in feature support for WebAssembly across browsers, so it’s difficult to build an experience that will work in every browser. There is still an opportunity to simplify this experience.
  3. Debugging: WebAssembly applications are still non-trivial to debug, which severely limits developer productivity.

### Server-side Wasm

  1. Observability — I’m curious what the observability story will look like for WebAssembly applications. The shift to containers/microservices enabled new observability solutions like Honeycomb and Lightstep, and I imagine that the shift to server-side WebAssembly could enable the same.
  2. Databases — Bringing “compute closer to data” seems to be the future for low-latency applications. WebAssembly modules are small and easy to integrate, so they could sit within a database. I’m not exactly sure what a product would look like in this space, but I’ve seen a few people try to extend user-defined functions (UDFs) within databases with Wasm modules.
  3. Security — I still believe that there needs to be a Wasm-specific security paradigm. WebAssembly modules don’t have any built-in access, so developers have to explicitly grant capabilities, which makes these modules much more secure. But, these modules are still a new attack vector, and I can imagine that they will catch the eye of sophisticated hackers.

--

--

--

Partner at Amplify Partners focused on infra, dev tools, and security

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Data Warehouse Project

Network Analysis of Wikipedia

Fuzzy.One The Q&A Evolution

Serving Structured Data in Alluxio: Concept

Topological sorting of Directed Acyclic Graph in Rust using DFS

edge 0 and edge 1 are directed at edge 2, edge 2 is directed at edge 3 and edge 3 is directed at edge 4

Coronavirus Hits Excessively Near and dear

Swift ADS: Insertion Sort

2021 Lenda Murray Savannah Pro-Am — Wings of Strength’ Livestream | LIVE° [Fullᴴᴰ]

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Renee Shah

Renee Shah

Partner at Amplify Partners focused on infra, dev tools, and security

More from Medium

How to create a react app with Go support using WebAssembly in under 60 seconds

Go logo

Features in Go you will like

Rust, my initial thoughts thus far

Is FaunaDB The Next Big Database Technology?