What is claimed is:1. A method for delivering a network slice to a user, comprising:receiving by a network a communication from a network slice artifact executing on a computer system, wherein the network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising an identity of a network slice, and wherein the communication comprises the identity of the network slice;comparing by a network function of the network the identity of the network slice communicated from the network slice artifact with a set of executable instructions associated with the network slice;retrieving the set of executable instructions by the network function from a data store of the network in response to matching the identity of the network slice with the set of executable instructions;communicating the set of executable instructions by the network function to the network slice artifact, wherein the network slice artifact instantiates the network slice transforming the computer system into an endpoint node of the network slice;receiving by the network a second communication from the network slice artifact;deactivating the network slice by a second network function in response to receiving the second communication, wherein at least some network resources allocated to the network slice upon instantiation are released;receiving by the network a third communication from the network slice artifact; andcompleting a re-instantiation of the network slice by the second network function in response to receiving the third communication.2. The method of claim 1, further comprising storing the set of executable instructions on the network by the network function prior to receiving the communication from the network slice artifact.3. The method of claim 2, wherein the set of executable instructions are stored in a distributed ledger.4. The method of claim 1, wherein the multi-segment filename provides for two way authentication before the network slice associated with the network artifact is instantiated.5. The method of claim 1, wherein the multi-segment filename further comprises a segment comprising instructions for executing the network slice artifact and a segment comprising a hash of the binary code associated with the set of executable instructions.6. The method of claim 1, further comprising:receiving by the network a fourth communication from a second network slice artifact executing on the computer system, wherein the second network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising an identity of a second network slice, and wherein the second communication comprises the identity of the second network slice;comparing by the network function the identity of the second network slice communicated from the second network slice artifact with a second set of executable instructions associated with the second network slice;retrieving the second set of executable instructions by the network function from the data store in response to matching the identity of the second network slice with the second set of executable instructions; andcommunicating the second set of executable instructions by the network function to the second network slice artifact, wherein the second network slice artifact instantiates the second network slice transforming the computer system into an endpoint node of the second network slice.7. The method of claim 6, wherein the network slice comprises one or more quality of service parameters, and wherein the second network slice comprises one or more different quality of service parameters than the network slice.8. The method of claim 6, wherein at least one of the network slice is selectably instantiated by a user of the computer system invoking the network slice artifact or the second network slice is selectably instantiated by the user invoking the second network slice artifact.9. The method of claim 8, wherein at least one of the network slice is selectably deactivated by the user invoking the network slice artifact or the second network slice is selectably deactivated by the user invoking the second network slice artifact.10. A system for delivering a network slice to a user, comprising:a server comprising a non-transitory memory and a processor; anda network function executed on the server that:compares an identity of a network slice communicated from a network slice artifact executing on a computer system with a set of executable instructions associated with the network slice, wherein the network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising the identity of the network slice,retrieves the set of executable instructions from a data store in response to matching the identity of the network slice with the set of executable instructions, andcommunicates the set of executable instructions to the network slice artifact, wherein the network slice artifact instantiates the network slice transforming the computer system into an endpoint node of the network slice;a second server comprising a second non-transitory memory and a second processor; anda second network function executed on the second server that:deactivates the network slice in response to receiving a communication from the network slice artifact, wherein at least some network resources allocated to the network slice upon instantiation are released, andcompletes a re-instantiation of the network slice in response to receiving a second communication from the network slice artifact.11. The system of claim 10, wherein the network function further stores the set of executable instructions on a network prior to the identity of the network slice being received from the network slice artifact.12. The system of claim 11, wherein the set of executable instructions are stored in a distributed ledger.13. The system of claim 10, wherein the multi-segment filename provides for two way authentication before the network slice associated with the first network artifact is instantiated.14. The system of claim 10, wherein the multi-segment filename further comprises a segment comprising instructions for executing the network slice artifact and a segment comprising a hash of the binary code associated with the set of executable instructions.15. The system of claim 10, wherein the server and the second server comprise different virtual servers.16. The system of claim 10, wherein the network function further:compares an identity of a second network slice communicated from a second network slice artifact executing on the computer system with a second set of executable instructions associated with the second network slice, wherein the second network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising the identity of the second network slice,retrieves the second set of executable instructions from the data store in response to matching the identity of the second network slice with the second set of executable instructions, andcommunicates the second set of executable instructions to the second network slice artifact, wherein the second network slice artifact instantiates the second network slice transforming the computer system into an endpoint node of the second network slice.17. The system of claim 16, wherein at least one of the network slice is selectably instantiated by a user of the computer system invoking the network slice artifact or the second network slice is selectably instantiated by the user invoking the second network slice artifact.18. The system of claim 17, wherein at least one of the network slice is selectably deactivated by the user invoking the network slice artifact or the second network slice is selectably deactivated by the user invoking the second network slice artifact.