Bitmain Bytom (BTM) mining machine Ant B7 trial experience

Bitmain Bytom (BTM) mining machine Ant B7 trial experience

Recently, Bitmain has produced a batch of Bytom (BTM) mining machines, model is Ant B7. Before experiencing the mining machine, let us first understand what Bytom (BTM) is.

Bytom (BTM)
Bytom is an interactive protocol for diverse bit assets. Heterogeneous bit assets (native digital currencies, digital assets) and atomic assets (warrants, securities, dividends, bonds, intelligence information, forecast information, etc. that exist in the physical world) running in different forms on the Bytom blockchain can be registered, exchanged, participated in and bet against other more complex and smart contract-based interactive operations through Bytom. Bytom is committed to bridging the atomic world and the bit world, promoting the interaction and circulation of assets between the two worlds, and its mission is to create diversified assets and a programmable economy. The Bytom Blockchain is managed by the Bytom Foundation (a non-profit foundation registered in Singapore)
Full name: Bytom Blockchain Protocol
Short name: Bytom
Official website: https://bytom.io/
Wallet download: http://bytom.io/wallet/
Block explorer: http://blockmeta.com/
Mining pools that support BTM mining: F2Pool | AntPool | Shuangyou | viabtc
Wallets that support BTM: Cobo Wallet | BEPAL | Bitpie | Bixin | Bycoin
Exchanges that support BTM: Huobi | OKEX | AEX88
Antminer B7 uses the Tensority encryption algorithm, with a rated computing power of 96KH/s, an officially announced wall power consumption of 528W, an energy efficiency ratio of 5.50J/KH), and is compatible with a 12V680W DC power supply.

The Antminer B7 is compact and exquisite. The measured weight of the single unit is 2.76 kg. The dimensions of the mining machine are 243.9*130.6*155.7mm.

The control panel and power terminal are closed with a pull-out cover

Press the button on the upper part of the air outlet side and push it towards the air inlet side to open the cover, making it easier to connect the power cord.

There is also a positioning pin inside the cover, which stops when pushed to a certain position. It is not recommended to close the cover immediately after plugging in the power cord. Wait until there is no problem in the test before closing the cover. Otherwise, the friction at the cover position is too large, which will be inconvenient to operate in actual use.

Antminer B7 adopts a single-fan design, with only one fan on the air inlet side of the entire machine. It is estimated that the heat generated by B7 will not be too great, and the noise will be relatively small.

Antminer B7 has 3 hash boards with 18 chips in total. Each hash board uses only one 6-pin power plug, plus one control board connector. The whole machine only needs 4 6-pin connector power cables.

According to the current mining machine power supply is equipped with about 10 6-pin connectors, Antminer B7 can use one standard mining machine power supply to power two mining machines

Antminer B7 also uses cgminer. The console operation page is the same as other Antminers. You can start mining after setting the mining pool and miner number.

After more than an hour of observation, the background display shows that the computing power value remains at 103000H/S=103KH/S, which is equivalent to the officially announced computing power value of 96KH/s. Since I have not played with it for a long time, I cannot see the situation of the mining pool.

The power consumption of Antminer B7 was tested in two ways. In the case of single machine and single power supply, the power consumption of Antminer B7 is 579W.

If one power supply is used for two mining machines, the power consumption is 1173W.

The noise situation is good. If you switch to a silent or PC power supply, except for the slightly loud fan noise when starting up, the noise is very small after normal operation.
-- end --

<<:  Instructions and precautions for using the power cords of Shemma M10, M20S, and M21S

>>:  Bitcoin extortion has a new trick, Canon SLR was hacked by hackers, but white hats used a vulnerability to redeem the photos

Recommend

IPFS Official @ You | 99th Weekly Report

IPFS Weekly 99 99th Statement: The article conten...

What kind of people are prone to aging?

What kind of people are prone to aging? 1. The ar...

What does a mole on the leg mean for your fortune?

In physiognomy, if a person has a mole on his kne...

Triangle pattern palmistry

Triangle lines are triangular lines that appear o...

How to tell a man's face by looking at his eyebrows

In physiognomy, eyebrows represent emotions, inte...

The fortune secrets hidden in the palm lines

The fortune secrets hidden in the palm lines Ever...

How to tell your fortune from your neck

A person's fortune can actually be seen from ...

What kind of facial features are the characteristics of a villain?

There are all kinds of people in this society. Yo...

What kind of face is lucky?

Having a good-looking appearance can not only att...

Why do some people always fail to succeed?

Why do some people always fail to succeed? People...