Bitcoin Forum
December 10, 2016, 02:48:14 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Poll
Question: What type of pool payouts do you prefer?
Bitcoins - 3160 (80.5%)
Bank transfer / USD - 407 (10.4%)
Gold/silver coins and bars - 359 (9.1%)
Total Voters: 3924

Pages: « 1 ... 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 [934] 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 ... 1105 »
  Print  
Author Topic: [40+ PH] SlushPool (slushpool.com); World's First Mining Pool  (Read 3933021 times)
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 05:54:51 AM
 #18661

@wasikidding, everything you said I appreciate. I may have mis-worded something though.

Slush has not paid me out 3 times, but there have been 3 completed sessions for the 24th, the most recent completion actually happened on the 25th based on Slush time zone. The first took 4h 24min, second took 1h 6min, third took 4h 19min all time stamped for the 24th. I have not been paid out so to speak because my payout is higher then they total. But the balance for each session is sitting in my balance on Slush.
So what I was under the impression is that each completed session was a block that was completed or solved. I initially commented on it because the original poster to my post said "So far I don't even think we have had single block all day", but don't the completed sessions = 3 blocks solved or finalized?
I appreciate your patience with me. Thanks
Yes in that regard unlike other pools we mine in a session until a block is solved, slush's number stays the same as network block number we are solving climbs so yes sorry i thought you meant you received three payouts so that is why i explained that way unlike ghash which I believe has like a set time per session etc we run until a block is solved and then score is calculated based on total shares and last share etc to calculate our btc value for that solved block

Hi,

I'm NEW to mining as well.  Slush's pool does not appear to have it setup to notify you if a "worker" has gone idol like some other pools do.  I'm NOT going to another pool.  I tried BTC Guild for about 12 hours but I don't like it.  I DO like the fact they notify you if a worker goes idol.

DOES ANYONE KNOW IF I CAN MAKE MY BITMAIN ANTMINER S3's NOTIFY ME IF IT STOPS HASHING WHILE I'M AWAY FROM HOME; WITHOUT HAVING TO LOG IN TO SLUSH'S POOL ON OCCASIONS TO SEE IF THEY ARE HASHING OUT?

I'm calling my ISP tomorrow to get a STATIC IP to have access to my home network, which in turn will give me access to my miners [To reboot or whatever might be needed].  I just thought it would be nice to be notified if they go idol / down [how ever you want to say it].



BTC ADDRESS:
1481381294
Hero Member
*
Offline Offline

Posts: 1481381294

View Profile Personal Message (Offline)

Ignore
1481381294
Reply with quote  #2

1481381294
Report to moderator
1481381294
Hero Member
*
Offline Offline

Posts: 1481381294

View Profile Personal Message (Offline)

Ignore
1481381294
Reply with quote  #2

1481381294
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481381294
Hero Member
*
Offline Offline

Posts: 1481381294

View Profile Personal Message (Offline)

Ignore
1481381294
Reply with quote  #2

1481381294
Report to moderator
1481381294
Hero Member
*
Offline Offline

Posts: 1481381294

View Profile Personal Message (Offline)

Ignore
1481381294
Reply with quote  #2

1481381294
Report to moderator
tom99
Sr. Member
****
Offline Offline

Activity: 420


View Profile
September 25, 2014, 06:06:22 AM
 #18662

  you can check Slush pool for miner up or not.
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 06:16:08 AM
 #18663

  you can check Slush pool for miner up or not.

Sure...

Just thought it would be nice to know within 5 minutes of them going down without having to check so often while I'm out of town working.

Thanks for the reply...


BTC ADDRESS:
Sir Alan
Full Member
***
Offline Offline

Activity: 221


View Profile
September 25, 2014, 09:30:32 AM
 #18664

Just thought it would be nice to know within 5 minutes of them going down without having to check so often while I'm out of town working.
Just curious... if you're out of town working, what difference does it make?  You can't do anything about it and you will only be fretting.  It's not as as if you are there when the alarm beeps and you can spring into action.

1Eeyore17YeHrbJW5Q3pSdV8sXujkdrrFc
Jcga
Hero Member
*****
Offline Offline

Activity: 700


Tipsters Championship www.DirectBet.eu/Competition


View Profile
September 25, 2014, 10:55:21 AM
 #18665

Hello, bonjour guyz.

My miner's hashrate is going wrong, going down.
Does it happen to you?

LOM
Newbie
*
Offline Offline

Activity: 14


View Profile
September 25, 2014, 11:09:59 AM
 #18666

hehe =) where we are minig?  Shocked
moss
Member
**
Offline Offline

Activity: 98


View Profile
September 25, 2014, 11:15:28 AM
 #18667

Hello, bonjour guyz.

My miner's hashrate is going wrong, going down.
Does it happen to you?

Yes.  I'm losing a third of my actual hashrate.  Unfortunately, my shares are down by the same amount and hence my reward too.
This is not good.  I can't sustain this for long.  Sad
Jcga
Hero Member
*****
Offline Offline

Activity: 700


Tipsters Championship www.DirectBet.eu/Competition


View Profile
September 25, 2014, 11:16:08 AM
 #18668

what is going on? never seen that, my hashrate is almost equal to 0...

Jcga
Hero Member
*****
Offline Offline

Activity: 700


Tipsters Championship www.DirectBet.eu/Competition


View Profile
September 25, 2014, 11:18:30 AM
 #18669

Hello, bonjour guyz.

My miner's hashrate is going wrong, going down.
Does it happen to you?

Yes.  I'm losing a third of my actual hashrate.  Unfortunately, my shares are down by the same amount and hence my reward too.
This is not good.  I can't sustain this for long.  Sad

Goona go back to normal, a little issue and this is very rare Smiley

FUTURAMA
Newbie
*
Offline Offline

Activity: 13


View Profile
September 25, 2014, 12:42:40 PM
 #18670

Total average hash rate in last 60 minutes: 0 Mhash/s  Huh
moss
Member
**
Offline Offline

Activity: 98


View Profile
September 25, 2014, 01:06:31 PM
 #18671

Hopefully, it's just a front end problem and the back end is still registering the hash, but my rewards are way down, so I have my doubts.

Edit: looks like it's been fixed! Grin
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 01:49:39 PM
 #18672

Just thought it would be nice to know within 5 minutes of them going down without having to check so often while I'm out of town working.
Just curious... if you're out of town working, what difference does it make?  You can't do anything about it and you will only be fretting.  It's not as as if you are there when the alarm beeps and you can spring into action.

There is such a thing as a "Static IP" that you can have at your house instead of a "Dynamic IP" to have access to the Airport Extreme Base Station.  

My S3's are connected to the Airport Extreme via "Assigned MAC IP" [Example:AC:CE:02:17:22:EC] through DHCP and not "static" on the miner's themselves.  I can connect to my Network "while I'm away from the house" with the static IP assigned to my house by my ISP to view surveillance cameras "and even connect to each S3 to do whatever I may need or want to do with them.

IF my wife is home and something needs to be "physically" done with anything, et al: rebooting the modem, I can ask here to do so.

PLEASE don't assume too much...  I'm trying to be nice.

I thought it was a legitimate question?  Yes, I am a "Newbie" when it comes to mining but I have enough "drive" and "knowhow" to TRY to figure things out to make things less "fretful" as possible.

So, please, IF anyone knows Bitmain Antminer S3's pretty well, I thought they might know if they have the capability to send an email to alert you IF THEY STOP HASHING?  NOT IF THEY GO COMPLETELY DOWN (no lights or activity whatsoever).

After looking in the S3's "System" [With it's sub-menus] and the S3's "Network" [With it's sub-menus] last night, it does not appear to have the ability to send emails.  However, I could have looked over it because of not knowing some of the protocols or whatever.



BTC ADDRESS:
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 02:34:38 PM
 #18673

Total average hash rate in last 60 minutes: 0 Mhash/s  Huh

https://www.cryptocoinsnews.com/bitcoin-at-risk-major-vulnerability-discovered-in-gnu-bash/

BITCOIN AT RISK: MAJOR VULNERABILITY DISCOVERED IN GNU BASH
 David Parker  25/09/2014  News 1 Comment

105
SHARES
TwitterFacebookSubscribe

dangerThe National Vulnerability Database has issued a critical security advisory about a major vulnerability in GNU Bourne Again Shell (Bash). GNU Bash is the command-line shell used in most operating systems based on Linux and Unix – including MacOS.

A Red Hat security advisory said:

“This issue is especially dangerous as there are many possible ways Bash can be called by an application,”

The GNU Bash vulnerability was first discovered by Stephane Schazelas. Arstechnica writes:

… is related to how Bash processes environmental variables passed by the operating system or by a program calling a Bash-based script. If Bash has been configured as the default system shell, it can be used by network–based attackers against servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts.

Bitcoin at Major Risk

This is not a Bitcoin Core vulnerability. However, Bitcoin Core is stopped and started via the bash shell and can also be interacted with, via the bash shell.

The bash vulnerability is at a lower level – in a command line shell that is used by almost every Linux operating system and some of it’s components. For example:

the Python language popen module calls a bash process by default
Apache‘s mod_cgi runs CGI scripts written in bash, or spawn bash subshells
OpenSSH is the standard method of remotely logging into a Linux host and, typically, spawns a bash shell for the logged in user
PHP scripts are not vulnerable to this bash exploit nor are shell scripts which do not export variables. However, this is little consolation and an immediate bash upgrade is required on any *nix system (see below).

Miners, exchanges and anyone else running Linux hosted Bitcoin nodes are looking at vulnerable systems – the bash vulnerability effectively opens access to the Bitcoin Core process and any Bitcoin wallets hosted on the system.

Most mining hardware built on firmware running Linux will have remote login available via OpenSSH. Check with the manufacturer for their security solution.

 

What To Do: Immediate Security Steps

Every Version of Bash Since 1994

This security vulnerability affects GNU Bash versions 1.14 (released in 1994) through to the most recent version 4.3, according to NVD. The pervasive use of bash on systems across the internet means that the vulnerability is as serious as the Heartbleed bug. If you run a Linux (or any *nix) system it is most definitely vulnerable – and has been since it’s first boot.

Package Upgrade Now!

Your Linux distribution’s package repository should contain a patched version of bash that fixes the vulnerability.

Upgrade bash as soon as possible
Store access and audit logs for forensic analysis (should it later become apparent someone accessing your system exploited the bash vulnerability)
Search for rootkits via chkrootkit and rkhunter – a sensible initial step on any system right now
Ubuntu Linux currently has a fixed version of bash in package bash_4.3-7ubuntu1.1

Note that the version number is still 4.3, but the -7 suffix indicates that the package version has been bumped following application of a security patch.

CCN
How Does The Exploit Work?

Like most programming languages the bash shell allows for the definition of functions. A bash environment variable can contain code and, therefore, functions. This vulnerability takes advantage of the fact that any string following a function declaration is executed when bash reads an environmental variable containing such a function declaration. For example:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

In a patched version of the bash shell the command injection attempt above has the following output:

patched GNU bash 4.3 output

Introshine gives some examples of how the exploit may be used in practice:

That’s pretty serious. Most of the attack vector hits pretty specific server-type scenarios. Or running crafted bash scripts.

The exception is the DHCP attack vector. I’ll explain: What this actually does is the following: There is a protocol called DHCP – it gives the devices in your network an IP address. Normally, this is the router/server in your LAN.

Some guy could be running a 2nd DHCP server in a public LAN that gives out non-valid addresses or even a non-valid one. Because DHCP is a broadcast, your client will talk to this rogue server when he is the fastest to reply. So you would not even notice, but can still use the internet fine because after DHCP is done, the DHCP server is no longer needed for internet/network to function.

He could include a variable (mostly used to deploy Proxy settings etc). with a rogue string included, that string can be executed because Bash is broken – hence he could:

- Copy the wallet.dat over
– If DHCP client runs as root (some distro’s): Infect the machine with a keylogger/virus/rootkit
– etc.

GNU/Linux users and other OS’ses: Be safe, check your update repo if CVE-2014-6271 has been patched. Be wary of unknown network, especially open networks near Bitcoin events or hacker spaces.

Btw, Trezor, Co-sign wallets like Greenaddress and cold wallet unaffected.

For more details see the Red Hat security advisory pertaining to this issue.

This story will be updated as relevant facts come to light.

BTC ADDRESS:
TradersWay.JC
Full Member
***
Offline Offline

Activity: 159


View Profile WWW
September 25, 2014, 02:40:24 PM
 #18674

What doesn't kill BTC will make it stronger.

Trader's Way - Forex & Binary Options Trading, Accepts Bitcoin - US Traders Accepted Smiley
Get a 100% Deposit Bonus when you sign up with us. Free VPS with deposits above $1000
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 02:43:11 PM
 #18675

What doesn't kill BTC will make it stronger.

After reading this article, I'm more concerned with someone hacking Slush's Pool than someone trying to hurt Bitcoin.

"Miners, exchanges and anyone else running Linux hosted Bitcoin nodes are looking at vulnerable systems – the bash vulnerability effectively opens access to the Bitcoin Core process and any Bitcoin wallets hosted on the system."

"Most mining hardware built on firmware running Linux will have remote login available via OpenSSH. Check with the manufacturer for their security solution."

BTC ADDRESS:
jterry211
Member
**
Offline Offline

Activity: 114


View Profile
September 25, 2014, 02:50:38 PM
 #18676

Diff's gone wild... Time to add another S1 to compensate.

JT
toptek
Hero Member
*****
Offline Offline

Activity: 756


View Profile
September 25, 2014, 03:17:10 PM
 #18677

Total average hash rate in last 60 minutes: 0 Mhash/s  Huh

https://www.cryptocoinsnews.com/bitcoin-at-risk-major-vulnerability-discovered-in-gnu-bash/

BITCOIN AT RISK: MAJOR VULNERABILITY DISCOVERED IN GNU BASH
 David Parker  25/09/2014  News 1 Comment

105
SHARES
TwitterFacebookSubscribe

dangerThe National Vulnerability Database has issued a critical security advisory about a major vulnerability in GNU Bourne Again Shell (Bash). GNU Bash is the command-line shell used in most operating systems based on Linux and Unix – including MacOS.

A Red Hat security advisory said:

“This issue is especially dangerous as there are many possible ways Bash can be called by an application,”

The GNU Bash vulnerability was first discovered by Stephane Schazelas. Arstechnica writes:

… is related to how Bash processes environmental variables passed by the operating system or by a program calling a Bash-based script. If Bash has been configured as the default system shell, it can be used by network–based attackers against servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts.

Bitcoin at Major Risk

This is not a Bitcoin Core vulnerability. However, Bitcoin Core is stopped and started via the bash shell and can also be interacted with, via the bash shell.

The bash vulnerability is at a lower level – in a command line shell that is used by almost every Linux operating system and some of it’s components. For example:

the Python language popen module calls a bash process by default
Apache‘s mod_cgi runs CGI scripts written in bash, or spawn bash subshells
OpenSSH is the standard method of remotely logging into a Linux host and, typically, spawns a bash shell for the logged in user
PHP scripts are not vulnerable to this bash exploit nor are shell scripts which do not export variables. However, this is little consolation and an immediate bash upgrade is required on any *nix system (see below).

Miners, exchanges and anyone else running Linux hosted Bitcoin nodes are looking at vulnerable systems – the bash vulnerability effectively opens access to the Bitcoin Core process and any Bitcoin wallets hosted on the system.

Most mining hardware built on firmware running Linux will have remote login available via OpenSSH. Check with the manufacturer for their security solution.

 

What To Do: Immediate Security Steps

Every Version of Bash Since 1994

This security vulnerability affects GNU Bash versions 1.14 (released in 1994) through to the most recent version 4.3, according to NVD. The pervasive use of bash on systems across the internet means that the vulnerability is as serious as the Heartbleed bug. If you run a Linux (or any *nix) system it is most definitely vulnerable – and has been since it’s first boot.

Package Upgrade Now!

Your Linux distribution’s package repository should contain a patched version of bash that fixes the vulnerability.

Upgrade bash as soon as possible
Store access and audit logs for forensic analysis (should it later become apparent someone accessing your system exploited the bash vulnerability)
Search for rootkits via chkrootkit and rkhunter – a sensible initial step on any system right now
Ubuntu Linux currently has a fixed version of bash in package bash_4.3-7ubuntu1.1

Note that the version number is still 4.3, but the -7 suffix indicates that the package version has been bumped following application of a security patch.

CCN
How Does The Exploit Work?

Like most programming languages the bash shell allows for the definition of functions. A bash environment variable can contain code and, therefore, functions. This vulnerability takes advantage of the fact that any string following a function declaration is executed when bash reads an environmental variable containing such a function declaration. For example:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

In a patched version of the bash shell the command injection attempt above has the following output:

patched GNU bash 4.3 output

Introshine gives some examples of how the exploit may be used in practice:

That’s pretty serious. Most of the attack vector hits pretty specific server-type scenarios. Or running crafted bash scripts.

The exception is the DHCP attack vector. I’ll explain: What this actually does is the following: There is a protocol called DHCP – it gives the devices in your network an IP address. Normally, this is the router/server in your LAN.

Some guy could be running a 2nd DHCP server in a public LAN that gives out non-valid addresses or even a non-valid one. Because DHCP is a broadcast, your client will talk to this rogue server when he is the fastest to reply. So you would not even notice, but can still use the internet fine because after DHCP is done, the DHCP server is no longer needed for internet/network to function.

He could include a variable (mostly used to deploy Proxy settings etc). with a rogue string included, that string can be executed because Bash is broken – hence he could:

- Copy the wallet.dat over
– If DHCP client runs as root (some distro’s): Infect the machine with a keylogger/virus/rootkit
– etc.

GNU/Linux users and other OS’ses: Be safe, check your update repo if CVE-2014-6271 has been patched. Be wary of unknown network, especially open networks near Bitcoin events or hacker spaces.

Btw, Trezor, Co-sign wallets like Greenaddress and cold wallet unaffected.

For more details see the Red Hat security advisory pertaining to this issue.

This story will be updated as relevant facts come to light.




Maybe why the Price seems to heading back down again ?. I'm gonna bookmark this news site it looks very up to date .
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 03:31:18 PM
 #18678

Diff's gone wild... Time to add another S1 to compensate.

JT

The new Bitmain Antminer S4-Batch 1 is available now.

Speed:  2 TH/s

Weight:  16.2 kg

Price:  1450 USD (3.508 BTC)

https://www.bitmaintech.com/productDetail.htm?pid=00020140916100720380cS1tRWd00684

The last price on a Bitmain Antminer S3+ was (.58 BTC) at Bitmaintech.  You had to make a minimum order of two (2) at a total of 1.16 BTC ($450.00 USD APPROX.)  The S4 has BUILT IN POWER SUPPLY (PSU) [Don't know how reliable the PSU is].  The S3's require additional purchase of PSU (APPROX. $129.00 for Corsair RM850 Gold on Amazon - pretty reliable).

So, 6 - S3's at $225.00 USD each [at present rate] = $1,350.00
      3 - Corsair AX860's at $169.00 each from Amazon = $387.00

TOTAL:  $1,737.00 for a combined total of 2.7 TH/s (6 - S3's)  [370 watts x 6 [if you include the watts consumed by power supply] = 2,220 watts total of power consumed.
             $1,500.00 approx. for five S3's with three power supplies to get 2.3 TH/s minimum [370 watts x 5 [if you include the watts consumed by power supply] = 1,850 watts total of power consumed.

The new S4 claims * Hash Rate: 2,000GH/s guaranteed * Power Efficiency: 0.69Watt/GH/s at the wall = 1380 watts of power consumed.  THAT IS LESS COST ON POWER CONSUMPTION VERSES the 1,850 watts for five (5) S3's to get 2.3 TH/s.

In comparison, the new S4 ($1450 USD) will save an additional 470 watts for every 5 S3's purchased ($1,500.00).  However, you get 300 GH/s more hashing power with the five (5) S3's.  The 370 watts more power consumed at the wall [with the five S3's] will be offset by the 300 GH/s extra hashing power more than likely.

$1,450.00 USD sounds like a fair price for 2 TH/s


BTC ADDRESS:
jterry211
Member
**
Offline Offline

Activity: 114


View Profile
September 25, 2014, 03:51:06 PM
 #18679

Diff's gone wild... Time to add another S1 to compensate.

JT

The new Bitmain Antminer S4-Batch 1 is available now.

Speed:  2 TH/s

Weight:  16.2 kg

Price:  1450 USD (3.508 BTC)

https://www.bitmaintech.com/productDetail.htm?pid=00020140916100720380cS1tRWd00684

The last price on a Bitmain Antminer S3+ was (.58 BTC) at Bitmaintech.  You had to make a minimum order of two (2) at a total of 1.16 BTC ($450.00 USD APPROX.)  The S4 has BUILT IN POWER SUPPLY (PSU) [Don't know how reliable the PSU is].  The S3's require additional purchase of PSU (APPROX. $129.00 for Corsair RM850 Gold on Amazon - pretty reliable).

So, 6 - S3's at $225.00 USD each [at present rate] = $1,350.00
      3 - Corsair AX860's at $169.00 each from Amazon = $387.00

TOTAL:  $1,737.00 for a combined total of 2.7 TH/s (6 - S3's)  [370 watts x 6 [if you include the watts consumed by power supply] = 2,220 watts total of power consumed.
             $1,500.00 approx. for five S3's with three power supplies to get 2.3 TH/s minimum [370 watts x 5 [if you include the watts consumed by power supply] = 1,850 watts total of power consumed.

The new S4 claims * Hash Rate: 2,000GH/s guaranteed * Power Efficiency: 0.69Watt/GH/s at the wall = 1380 watts of power consumed.  THAT IS LESS COST ON POWER CONSUMPTION VERSES the 1,850 watts for five (5) S3's to get 2.3 TH/s.

In comparison, the new S4 ($1450 USD) will save an additional 470 watts for every 5 S3's purchased ($1,500.00).  However, you get 300 GH/s more hashing power with the five (5) S3's.  The 370 watts more power consumed at the wall [with the five S3's] will be offset by the 300 GH/s extra hashing power more than likely.

$1,450.00 USD sounds like a fair price for 2 TH/s



I have a couple S1's in the closet that i don't use since i got S3'S so every time the Diff goes up i add one to the rack and now im gonna upgrade them so i can keep ahead just a hair.

JT
dmwardjr
Hero Member
*****
Offline Offline

Activity: 714


The Few, The Proud, The BTC


View Profile
September 25, 2014, 04:19:46 PM
 #18680

Diff's gone wild... Time to add another S1 to compensate.

JT

The new Bitmain Antminer S4-Batch 1 is available now.

Speed:  2 TH/s

Weight:  16.2 kg

Price:  1450 USD (3.508 BTC)

https://www.bitmaintech.com/productDetail.htm?pid=00020140916100720380cS1tRWd00684

The last price on a Bitmain Antminer S3+ was (.58 BTC) at Bitmaintech.  You had to make a minimum order of two (2) at a total of 1.16 BTC ($450.00 USD APPROX.)  The S4 has BUILT IN POWER SUPPLY (PSU) [Don't know how reliable the PSU is].  The S3's require additional purchase of PSU (APPROX. $129.00 for Corsair RM850 Gold on Amazon - pretty reliable).

So, 6 - S3's at $225.00 USD each [at present rate] = $1,350.00
      3 - Corsair AX860's at $169.00 each from Amazon = $387.00

TOTAL:  $1,737.00 for a combined total of 2.7 TH/s (6 - S3's)  [370 watts x 6 [if you include the watts consumed by power supply] = 2,220 watts total of power consumed.
             $1,500.00 approx. for five S3's with three power supplies to get 2.3 TH/s minimum [370 watts x 5 [if you include the watts consumed by power supply] = 1,850 watts total of power consumed.

The new S4 claims * Hash Rate: 2,000GH/s guaranteed * Power Efficiency: 0.69Watt/GH/s at the wall = 1380 watts of power consumed.  THAT IS LESS COST ON POWER CONSUMPTION VERSES the 1,850 watts for five (5) S3's to get 2.3 TH/s.

In comparison, the new S4 ($1450 USD) will save an additional 470 watts for every 5 S3's purchased ($1,500.00).  However, you get 300 GH/s more hashing power with the five (5) S3's.  The 370 watts more power consumed at the wall [with the five S3's] will be offset by the 300 GH/s extra hashing power more than likely.

$1,450.00 USD sounds like a fair price for 2 TH/s



I have a couple S1's in the closet that i don't use since i got S3'S so every time the Diff goes up i add one to the rack and now im gonna upgrade them so i can keep ahead just a hair.

JT

Sounds great!!!

I have ten (10) S3+'s going.  I first started mining with them September 22nd [When we found 13 blocks on Slush's Pool].  My first time to mine EVER!  Beginners luck I suppose...

I'm teaching a class next week.  I'm a contractor for CenturyLink.  I teach technicians how to use their meters to identify and locate troubles.  It's a four day course.  I used to teach as many as 42 to 45 classes a year.  I'm lucky to get 12 classes a year since 2010.  The economy has killed training budgets!  They cannot be as aggressive in training as they used to be until the economy changes for the better.  I clear approximately $4,500.00 for each class I teach.  I will use part of that to get 2 more miners and I'm using all of my bit coin I make from September 22 to November 22 to buy more S3's as well.  My goal is to have thirty (30) S3's going ASAP.  I have more classes coming up in November and December.

I bought two S1's through another seller on Amazon at $310.00 each but ended up canceling the order to buy ten S3's at $355.00 each BRAND NEW SHIPPED FROM BITMAIN.  It's cheaper to buy straight from Bitmain.  I used credit card to purchase them instead of cash.  Will be straight up cash from here on out.

That dude was upset I canceled the order on the two S1's.  He asked me why.  I didn't bother explaining.  HE KNEW WHY!!!  I got more than TWICE the hashing power with the S3's for only $45 more for each unit.  It was a no brainer!!!

I just bought a D Square 125 AMP sub panel to connect to the MAIN breaker panel.  I'm installing six (6) 20 AMP circuits (2400 watts each) to power up to thirty-six (36) S3's.  I will get busy installing six (6) 20 feet runs of 12/2 electrical wiring today and tomorrow.  I will not install the sub panel until I run the wire and install the receptacles (outlets) in the box I'm making for them near the racks I have set up in the recreation room downstairs.


BTC ADDRESS:
Pages: « 1 ... 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 [934] 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 ... 1105 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!