Network

Adaptive State Sharding

The Elrond Network can leverage parallel processing thanks to Adaptive State Sharding technology, which combines three standardized sharding types (state, network, and transaction sharding) into a single balanced high-performance system. As a consequence, a safe blockchain with lightning-fast scalability and transaction speeds has been created. This facilitates shard merging and shard splitting, which allows the

Adaptive State Sharding Read More »

Acquirer Node

Acquirer Nodes on the Crypto.com blockchain network assist the settlement of transactions between merchant and consumer. Customer and Merchant Acquirer Nodes are the two primary types of Acquirer Nodes. The two node types interact in order to validate merchant verification, process user settlement, and provide an escrow service that allows Crypto.com’s wallet and debit card

Acquirer Node Read More »

Account Model

The account model is a blockchain architecture that allows for direct data and value transfer. Smart contract platforms, such as Ethereum, employ the account model, as opposed to the UTXO model used by the Bitcoin network, which limits smart contract possibilities. One possible disadvantage of the account model design is the difficulty in scaling transactions-per-second.

Account Model Read More »

Aave

Aave is an Ethereum-based decentralized lending and borrowing network. Aave customers may obtain loans by pledging crypto holdings as collateral. Lenders that give collateral to Aave are rewarded with aTokens, which automatically pay interest to the bearer using platform trading fees. Aave invented ‘flash loans,’ which allow for the uncollateralized lending of cash as long

Aave Read More »

51% Attack

A 51 percent attack is a fictitious scenario in which more than half of a blockchain network’s nodes are controlled by a single party. In such a case, a network’s consensus is no longer sufficiently spread to be functional, leaving the blockchain vulnerable to manipulation. Attackers having more than 50% control of a network would

51% Attack Read More »

Computer network

A computer network is a collection of computers that share resources that are located on or provided by network nodes. Personal computers, servers, networking devices, and other specialized or general-purpose hosts are examples of nodes. They are recognized by network addresses and, in certain cases, by hostnames. Network addresses are used by communication protocols such

Computer network Read More »

Automation

Automation describes a wide range of technologies that reduce human intervention in processes. Human intervention is reduced by predetermining decision criteria, subprocess relationships, and related actions — and embodying those predeterminations in machines. Automation, includes the use of various equipment and control systems such as machinery, processes in factories, boilers, and heat-treating ovens, switching on telephone networks; steering and stabilization of ships, aircraft, and other applications and vehicles with

Automation Read More »