Sharp decline in earnings? Unsure what’s going on? In this blog post we discuss factors affecting HNT rewards and why your miner may be outputting less than you’re used to. If you are new to Helium, or are not sure how Helium works, then you should read Helium FAQ for Noobs prior to reading this […]
Waiting for your Helium hotspot? Not sure if you’ll get coverage? Want something to do whilst you wait? Let’s get mapping! Disclaimer Fiddling with crypto is generally a risky venture and your cashola is at risk. This is not financial advice and any crypto dabbling you do is entirely at your own risk. Prices and […]
Earnings down? Feeling gloomy? See all this chatter about being relayed and port forwarding? This guide tells you how to identify if your Helium Hotspot is being relayed and how to fix it. Disclaimer Fiddling with crypto is generally a risky venture and your cashola is at risk. This is not financial advice and any […]
Following the recent publicity of Helium (HNT) by YouTubers and other such characters we have seen an influx of people to discord / forums etc.. who are not of the traditional persuasions (IoT and Crypto) probably trying to make a quick buck. I have found myself answering the same questions repeatedly hence I have made […]
These days keeping an eye on social media for negative views about your business and tackling them head-on is paramount to not ending up customerless and eventually moneyless. This quick guide demonstrates how somebody with very little artificial intelligence know-how can set up Node-RED on a Virtual Private Server (VPS) to alert when somebody is […]
Over the last couple of years LoRa has been growing in popularity and if you live near to an active gateway on The Things Network you can build cheap low power devices to send data such as sensor readings to the internet.
Research suggests that page loads of over 3 seconds drastically increases user bounce rate, retain your traffic with these top ten tips to speed up your web site.
The entry point to SDR is now ridiculously cheap, so I decided to give it a go using a readily available RTL-2832 based USB stick.
In a world of evolving and targeted cyber threats understanding your attacker’s intentions and tools has never been more crucial. By deliberately maintaining vulnerable systems, or Honey Pots, and letting the attackers in you can analyse their activity and gather intelligence so you can be ahead of the game if you ever have a compromise.