MRMatthew Rheainmattrhea.hashnode.dev#002: Atlas Comes OnlineSection 1: The Arrival All of the parts for my Raspberry Pi build finally arrived, and somehow they all made it in right around my birthday. That made the whole thing feel a little more special. I had4d ago·11 min read
NPNoah Plochinai-at-the-edge.hashnode.devGiving OpenClaw the Keys to Robotics: Agentic ROS on a Raspberry PiDate: February 2026Project Repository: openclaw/openclaw-ros TL;DR We tested whether OpenClaw could autonomously build and maintain real ROS applications on a Raspberry Pi 4 using ROS 2 from high-leFeb 26·13 min read
PJPatryk Jakubikinvelocip.comOpenClaw on Raspberry Pi 5I've been testing an OpenClaw on a Raspberry Pi 5. This post documents the journey of turning a Pi and a 7" Touch Display into a useful home IoT device without writing a single line of code. 1. The SeFeb 25·8 min read
AaltCourierincouriersandbox.hashnode.devIn Silicon: Some Motor TypesWhen picking a motor for your project, what do you take into account? This guide breaks down three main motor categories, their strengths, weaknesses, and what you need to know to make a decision. SteFeb 22·6 min read
JCJuan Carlos Gonzalez Cabreroinmalkomich.hashnode.devSelf-Hosting n8n on Raspberry Pi: HTTPS, DDNS & Automated Backups1. Why I Choose to Self-Host n8n on a Raspberry Pi When I first started working with automation tools, n8n's cloud offering seemed like the best choice. But after a few months, I found myself increasiFeb 19·11 min read
TMTom Mathewinridingbluewaves.hashnode.devRiding the Blue Wave: Building Autonomous Intelligence on the Edge #01Welcome. Join me as I surf the digital wave; designing systems, breaking code, and experimenting with modern software to see what truly works in the real world. With the rise of modern Artificial InteFeb 6·5 min read
KTKalyan Tamarapalliinktamarapalli.hashnode.devThe Intent-Verification Gap in CI/CD: Why Authentication Fails Under Real AttacksFrom Stochastic Trust to Deterministic Human Intent in Hostile Build Environments Introduction: The Assumption That Keeps Failing Modern CI/CD pipelines are built on a deceptively simple assumption: If an action originates from a valid session toke...Feb 7·6 min read
LJLee Jonesinblog.hastylabs.comSIEM installationToday’s focus was expanding the home lab by deploying Wazuh SIEM on a second laptop. To keep things flexible, I opted for a Docker container deployment. Since this is a testing phase, I’m not overly concerned about potential issues; I plan to have a ...Feb 6·2 min read
DGDevansh Guptainexempl4r.hashnode.devHello World (and other Shenanigans) 👋Welcome to Shenanigans.log. If you're reading this, you've stumbled upon my archive of chaos. I'm Devansh, a 21-year-old Electrical Engineering student at IIT Kharagpur who is perpetually one syntax error away from a breakdown. I have a bad habit of ...Feb 1·5 min read
VMVictor Mayekarinjournalbyvictor.hashnode.devThe Pen Drive You’d Definitely Plug In — And Why That’s the ProblemI once built something so small, so ordinary-looking, that nobody would ever question it. It looked like a pen drive.It felt like a pen drive.It fit perfectly inside an old USB casing — the kind you’ve probably seen a hundred times on office desks, k...Jan 24·4 min read