Interview with the CEO about the company
Today we talk with the CEO of MineFactory about the nuances of the mining hosting and consider convenient, profitable and safe of it. In order to understand all the details, we offer you an interview with the founder and inspirer of our company, Dmitry.
“It all began quite banal, we are in the hype, bought rigs and started mine. Hosted them in the office. It was incredibly hot. The question arose: what to do next? We looked for more or less suitable hosting, but at that time we did not find anything suitable and decided to make our own hosting. It started when we made our own MDC. It quickly got clogged, then a specific hipe started (it was the fall of 2017). Began to look for MDCs. We found one with legal electricity, with good security, and brought the MDC there, first one, then the second one. Then they began to advertise and host customers in our MDC.”
A question from most customers that arises immediately, how is security provided, how is it provided at the facility, and how do you control it?
“Safety is the key point of all our work, because we are fully responsible for the equipment of our customers. That’s why we have chosen high-security facilities that have a pass system, round-the-clock security and video surveillance. Accordingly, a person from the outside will not get there just like that.”
The second issue that concerns customers is the legality of electricity. How can they check and find out that electricity is legal and at some point the equipment is not confiscated?
“This is a good question. we ask it to our landlords and electricity suppliers. We ask them for all the necessary documents that confirm that the electricity is actually paid for and it’s all legal.”
How long have your company been working in the mining sphere?
“We have been on the market for more than two and a half years. We found all the hypes associated with mining and crypto, and we survived the crypto winter.”
What do the MineFactory provide to clients?
“We provide maximum comfort to our clients. You do not need to go anywhere and take your equipment, everything happens in our office. Customers bring their equipment to us, we sign a contract, sign a transfer and acceptance certificate. The equipment is also configured in the office. And this is done personally by the CTO, he personally looks at each device, monitoring it, if necessary, overlocking or boost it, and does everything at the request of the client. In fact, the equipment is configured, goes to the data center, turns on and starts working there.”
How smooth is the work of ASIC? How stable is the communication channel? How does it all work?
“We have two communication channels at each MDC. The main one, and the second one is the backup channel. This ensures maximum reliability of the equipment.”
After that, the question about security inside the network, how is it provided? Do clients see each other or can they somehow get remote access to the device?
“There are three levels of security in our company. The first level of security is checking ASIC in the office, only after passing the initial diagnostics, the equipment is sent to the MDC. The second level of security is network security based on Cisco hardware. Finally, the third level of security is the organization of an individual subnet for each client, that is, client A cannot see client B. Also, an isolated subnet give remote access to clients’ devices.”
How do you know that something went wrong with the equipment? It is clear that the customer can call technical support or there are tools that allow you to solve the problem proactively?
“Most often, we know about hardware problems earlier than our customers. We have our own development — a monitoring system that allows us to track the performance of devices, hashrate, temperature, all required parameters. If an emergency occurs, our engineers and CTO are notified of a problem with the device.”
Is this system only available to your specialists or can the client also use it to monitoring the work of the equipment in real time?
“This system was developed specifically for our engineers and for our specialists, because our work is aimed at ensuring that the client does not worry about the operation of their devices, and considers the cryptocurrency that they are mining.”
What is the minimum device amount to host and are there any discounts?
“We host from one unit of any equipment, whether it is an ASIC or a rig. And of course there are always discounts. We have an individual approach to each client.”
A very important question is who is responsible for devices and do you sign a contract?
“Of course, we conclude a contract with the client. And we are fully responsible for the equipment that we have adopted and hosted in our MDC.”
The question is about boost of ASICs. A lot of people boost it to the maximum values, do you install firmware and help with it?
“At the request of the client, we install firmware and boost devices. If the customer wants to boost your ASIC, of course, we warn him of the consequences, such as ASIC can overheat, and then the client can decide whether to disperse to the maximum his equipment or take our recommendations and boost to the optimum settings when the device is mining well with good hashrate”.
The equipment breaks down, what do you do in this case?
“Unfortunately, modern equipment sometimes fails. In such situations, we provide the client with a choice. The first thing we do is get the equipment from the MDC to the office. Next, we offer the customer to get the equipment for self-repair, or we provide the repair of our service partners. We agree on the repair price with the client. If the price is satisfactory for the customer, the equipment is repaired and sent to the MDC for further mining.”