
LoRa Data Rates, what are they?
One of the settings that can be adjusted with our LoRa Board is known as the Data Rate and can affect the performance in speed and range of your LoRa Node. In this guide we’ll evaluate the data rates for...
One of the settings that can be adjusted with our LoRa Board is known as the Data Rate and can affect the performance in speed and range of your LoRa Node. In this guide we’ll evaluate the data rates for...
Our IoT LoRa Node Shield allows you to create an inexpensive LoRa node, compatible with The Things Network, in conjunction with an Arduino or compatible Arduino board. This shield allows quicker prototyping as it has the LoRa stack on the...
This quick guide will show you how to connect your RAK831 concentrator module to the Raspberry Pi and configure the software to connect to TTN via Ethernet or Wi-Fi connection. What you need You will need the following hardware components...
In this guide we will show you how to assemble your IP67 HAT Holder into the Nebra IP67 casing. We will also show you where to connect all your HATs on the HAT holder as well as where all the...
This is a quick and easy project to show you how you can utilise the functionality of the PaPiRus display HAT to display inspirational tweets to keep you motivated throughout the day. The project gets the top 20 tweets from...
How to assemble your PiJuice Zero Case The PiJuice Zero case is designed to hold your Raspberry Pi Zero, PiJuice Zero pHAT board and a small LiPo battery. It has been uniquely designed to include a small shelf within the...
This project is designed to show you some of the very cool features of the PiJuice Make Kit case, which includes a PiJuice HAT, Media Centre HAT and a very cool case to fit it all in. This project is...
This guide will show you how to setup and configure your Pi hole to display the pi hole system status and ads blocked using the Pi Supply Media Center HAT. The Pi Supply Media Center HAT is a 2.8″ TFT...
Pwnagotchi is an A2C-based “AI” powered by bettercap that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures (either through passive sniffing or by performing deauthentication and association attacks). This material is...