• 0 Posts
  • 14 Comments
Joined 8 months ago
cake
Cake day: March 2nd, 2024

help-circle






  • thr0w4w4y2@sh.itjust.workstohomeassistant@lemmy.worldHome Wiring
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    3 months ago

    I’m using PoE Extractors to run some regular 12vdc stuff using existing ethernet cabling.

    A couple of points to note:

    • network switches won’t turn on power by default unless the receiving device asks for it using the right protocols, so you need to inject the power using the corresponding PoE injector at the other end of the cable. you can’t just snip the end off a RJ45 and wire it into things.
    • Cat cable won’t take high currents, be sure to stick within the allowed range for the cable or it will melt and maybe bust your device
    • there is a voltage drop over distance, be sure to calculate if you need to change your transformer as 12vdc could become 9 or lower by the time it gets to your device
    • there are some really poor quality PoE injectors/extractors.
    • running mains cable and having a transformer nearer the device might be simpler and cheaper in the long run.


  • Hi I have installed half a dozen Shelly 1PM Mini units around the house and they do work well. I’ve not had one fall off the wifi, and they are great with HomeAssistant. I use InfluxDB to capture data from HomeAssistant and do calculations and aggregations in the DB to get overall costs of devices. I also use HomeAssistant to automate the relays so lights come on at night etc.

    Installation is a bit tricky so I tend to use IP64 rated enclosures rather than leave them in the drywall like the website says you can. I also find the mains cables a bit thick to go into the terminals and adding ferrules would make it impossible. Other than that I think they’re great.



  • Yup, but you have to think “how would malicious software/spyware/whatever get in our source code and if it does, how would we detect it?”

    that’s where ISO and SOC II add value and give some assurance that detective, preventative and corrective controls exist and are working to prevent an issue.

    If the company maliciously inserts back doors into closed source code and sells it like that, no amount of external audit is going to defend against that because they’ll just hide the code from the auditors.