Frequently Asked Questions
Find answers to commonly asked questions about our products and services.
How is pollination with bees arranged through BEEsharing?
We receive pollination requests from farmers for their crops (e.g., almonds, apples, etc.) for a specific cultivation area. Using our platform, we then search for suitable beekeepers. If you are registered as a beekeeper, you will automatically receive a request to pollinate the area, provided you meet the search criteria.Â
How can I determine my pollination needs?
Using our app (ETA: October 2024), you can determine your pollination needs for your specific cultivation area. The app always considers the optimal mix of honeybees, bumblebees, and mason bees. This mix varies depending on weather conditions, soil conditions, and competing floral resources.Â
How does the BEEsharing pollination calculator work?
Our database is based on data and empirical values regarding the pollination efficiency of honeybees, bumblebees, and mason bees under different conditions, such as protected and unprotected cultivation, the presence of competing flora in the surrounding area, or soil conditions. Using our AI, the pollination needs for your specific cultivation area are calculated.Â
Do you offer international shipping?
Yes, we offer international shipping to selected countries. During the checkout process, you will be able to see if your country is eligible for shipping. Please note that additional customs fees or taxes may apply upon delivery, which are the responsibility of the recipient.
Why is the BEEsharing pollinator mix more efficient?
The perfect pollination result is achieved through a smart mix of honeybees, bumblebees, and mason bees. Using different pollinators gives you more flexibility if, for example, the bloom arrives earlier or later than expected, or if the temperatures are colder. Each pollinator has its unique characteristics. For instance, the horned mason bee (Osmia Cornuta) starts flying early in spring at lower temperatures, while bumblebees can fly in wind speeds of up to 70 km per hour.Â
Which pollinators are best suited for my cultivation area?
The optimal pollinator mix depends on many factors. The blooming period of the crop is crucial, as well as the distinction between protected and unprotected cultivation and the presence of other wild bees or competing flora in the surrounding area of the fields that need to be pollinated. With our AI-based application, you will soon be able to easily and conveniently determine the optimal mix at any time.Â
What should I consider when I have pollinators on my cultivation area?
The use of bee-harmful pesticides should absolutely be avoided. In the case of application, the beekeeper must be informed in advance so they can remove their bees from the area or take other precautions. When arranging pollination services, we assume that the contracting parties will communicate closely and coordinate directly if in doubt.Â
What types of wild bees are there?
Worldwide, there are more than 20,000 species of wild bees. Most wild bees are solitary bees, meaning they do not live in large colonies like honeybees but as individuals. Examples of wild bees include the blue orchard bee, leafcutter bee, horned mason bee, red mason bee, garden wool-carder bee, hairy-footed flower bee, buff-tailed bumblebee, and the blue carpenter bee.Â
Why are other pollinators, like butterflies, important for pollination?
In addition to wild bees, other pollinators are also crucial for the pollination of trees, flowers, and crops. There are a variety of other pollinating insects, such as butterflies, hoverflies, beetles, and moths. Some tropical and subtropical plant species have even adapted to be pollinated by bats. The best pollination results are achieved through the combined efforts of wild insects, especially wild bees, and honeybees. Wild bees, for example, can pollinate more than twice as many flowers as honeybees per individual.Â
What does BEEsharing do with my data?
The protection of your personal data is of the utmost importance to us. Therefore, we strictly comply with data protection regulations, especially the European General Data Protection Regulation (GDPR). Your personal data is encrypted by digital security systems and transmitted to us. Our websites are protected by technical measures against damage, destruction, or unauthorized access. We only use your data for the technical provision of the member areas in our network, for transaction processing, and for internal business evaluations.Â
What role does bee mortality and bee health play for BEEsharing?
The extinction of pollinating insects caused by monocultures, various diseases, pesticide use, and lack of food diversity is a major problem. Not only is biodiversity at risk, but also our food security. Our goal is to counter these negative developments and their impacts with innovative solutions. We aim to raise awareness for regionality, nature-friendly, bee-friendly products, and quality. For successful, cost-optimized beekeeping and agriculture.Â
How can I become part of BEEsharing.io?
If you are a beekeeper or a farmer, it’s best to register now through our pre-registration. Our application is expected to be launched at the beginning of Q4 2024 and will be available in the Apple and Android App Stores.Â
Why do we use “Password via Mail” instead of static passwords?
We have chosen to implement a “Password via Mail” approach for security reasons.
Traditional static passwords are often reused across multiple platforms, making them vulnerable to security breaches. By sending a unique, time-sensitive password directly to your email each time you log in, we can significantly reduce the risk of unauthorized access due to password leaks or brute-force attacks.
This method ensures that even if one account is compromised elsewhere, your account in our app remains protected. Furthermore, it eliminates the need for you to remember or store a static password, enhancing convenience without sacrificing security.
The “Password via Mail” is temporary and single-use, which adds an extra layer of protection by ensuring that no long-term password is stored or vulnerable to theft.