Chiwai Chan's Blog

These words are my own

Smart Cat Feeder – Part 4

This is the Part 4 and final blog of the series where I detail my journey in learning to build an IoT solution. Please have a read of my previous blogs to get the full context leading up to this point before continuing. Part 1: I talked about setting up a Seeed AWS IoT Button […]

Smart Cat Feeder – Part 3

In this Part 3 of the blog series I talk about my experience printing objects using a 3D Printer for the first time. In Part 1, I talked about setting up an IoT Button; and in Part 2, I talked about publishing events to an Adruino Micro-controller from AWS. After putting in the hard work […]

Hosting multiple subsites under a serverless website instance

Introduction Recently, I was tasked with coming up with a solution for a single website instance to host various pockets of documentations scattered across a growing number of Git repositories; each repository hosted documentation for a specific subject domain written in Markdown format – you may have come across README.md files all over the internet […]

Smart Cat Feeder – Part 2

The source code for this blog can be found in my Github repository: https://github.com/chiwaichan/aws-iot-cat-feeder. This repository only includes the source code for the solution implemented up to this stage/blog in the project. In the end I decided to go with the Seeed Studio XIAO ESP32C3 implementation of the ESP32 micro-controller for $4.99 (USD). I also […]

Storing Electricity Price Data on AWS

For a personal project of mine, I like to be able to analyse the pattern of New Zealand’s electricity Spot Prices; to identify the cheapest hours during the day to pull power from the grid, as well as, the best time of the day to sell back to the grid. I will be creating a […]

Hack The Box

Last week, I finally sat down to create an account on Hack The Box. It was no simple task even for someone that has not been technically active for the last year. The aim of learning how to hack on HTB is to provide me with a better understanding of the techniques used by hackers, […]

Scroll to top