Different Types of Nodes on Shardeum – A Deep Dive
Learn about the different types of nodes on Shardeum and how we’re making it easy for anyone to run a node with simple button clicks.
Learn about the different types of nodes on Shardeum and how we’re making it easy for anyone to run a node with simple button clicks.
Shardeum’s low latency and scalability makes it possible for dapps and users to experience a smooth UX. Learn how this benefits its blockchain ecosystem.
Learn more about different types of node on Shardeum, what role archive nodes play on the network and how to run an archive node.
Shardeum’s transaction level consensus, dynamic state sharding and linear scalability will ensure the network not only achieves parallel transaction execution but also atomic and cross shard composability.
This blog will take you through time based transaction ordering in blockchain and how Shardeum will process transactions in a FCFS manner to achieve high fairness.
Shardeum has automated the EIP-2930 access lists on its testnet for network RPC nodes to route shards. This blog is primarily for educational purposes so developers can use it if needed
Shardeum, with its pioneering protocol, will achieve immediate finality and low latency through transaction level consensus & parallel execution of transactions.
In today’s world, linear scalability is a critical concept that organizations must understand to meet the needs of a universe …
Why Linear Scalability is the Holy Grail of Web3 Today and How Shardeum Achieves it? Read More »
Since Day Zero, Shardeum has been operating in a DAO-like manner by following the guiding principles of OCC (open, collaborative, …
Layer 1 blockchain Shardeum will demo its autoscaling feature live on 5th November 2022. Read more about this breakthrough milestone in this blog.
MEV is essentially a malpractice where miners or validators in a blockchain network prioritize transactions with higher fees over others.
The consensus mechanism leverages both the Proof-of-Stake (PoS) and Proof-of-Quorum (PoQ) algorithms – enabling it to scale linearly with high security.