#decentralization
- #alerting
- #architecture
- #asus
- #bios
- #bmc
- #chain-fusion
- #cloud-engine
- #compliance
- #concept
- #core-concept
- #cryptography
- #data-center
- #dell
- #deployment
- #dns
- #economics
- #faq
- #firmware
- #gen-1
- #gen-2
- #gigabyte
- #governance
- #hardening
- #hardware
- #hsm
- #ic-os
- #idrac
- #infrastructure
- #ipmi
- #ipv4
- #ipv6
- #legal
- #maas
- #maintenance
- #monitoring
- #networking
- #nitrokey
- #nns
- #node-provider
- #onboarding
- #operations
- #operator
- #procurement
- #protocol
- #proxmox
- #recovery
- #registry
- #remuneration
- #rewards
- #rmu
- #runbook
- #security
- #sovereignty
- #supermicro
- #teleport
- #troubleshooting
- #uefi
- #useful-work
Validation of Candidate Node Machines
How prospective node operators check whether their planned machines actually improve network decentralization, using the community optimization model and the IC target topology.
Proof of Useful Work
The Internet Computer's membership and consensus model — dedicated standardised hardware doing real computation, governed by the NNS, instead of hashing or pure stake.
Node Provider Documentation
How independent operators run the hardware that hosts the Internet Computer — the role, the current onboarding status, the lifecycle from proposal to operation, and the rewards.
Decentralization and Security Guide
Operational practices that node providers should follow to defend the Internet Computer's decentralization — independence, supply-chain hygiene, physical security, and key handling.
Data Center and ISP Guide
How node providers should approach selecting a data center and an ISP — distributing across countries, gathering quotes, and finalizing a colocation contract.