In programming, a memory leak happens when a program allocates a block of memory but then fails to release that memory when it's no longer needed. The program "loses track" of the memory, or otherwise holds onto it, preventing the operating system from reclaiming it for other uses. This accumulated, unused memory can cause the … Continue reading Memory Leak and GIL
Uncategorized
Solving Problems Solvers vs. Talkers: A Personal Reflection on Problem-Solving and Purpose
There are two types of people in this world when it comes to facing problems:those who solve them — and those who talk about solving them. From the monumental challenges like launching spacecraft to Mars or curing cancer, to everyday tasks like planning a meal for your family, problems are everywhere. But once a solution … Continue reading Solving Problems Solvers vs. Talkers: A Personal Reflection on Problem-Solving and Purpose
The Twelve Factors by Heroku Founder
This book is worth a thorough reading, below is the content: codebase: once codebase tracked in revision control, many deploys dependencies: explicitly declare and isolate dependencies config: store config in the environment backing services: treat backing services as attached resources build, release, run: strictly separate build and run stages processes: execute the app as one … Continue reading The Twelve Factors by Heroku Founder
Weaviate Add on and Its Key Value
Weaviate was created by a Dutch startup called SeMI Technologies (founded in 2019). The company is indeed for-profit, but Weaviate itself is open-source and free to use under the BSD-3 license, which is a permissive open-source license. Key Value of Weaviate 1. ⚡ Fast, Scalable Vector Indexing & Search Weaviate uses specialized vector indexes (like … Continue reading Weaviate Add on and Its Key Value
Insight of “LLM” Sent to LLM for Verification
"is chatGPT AI literally a huge elastic search plus prediction of next words based on entire human knowledge"? sent to Gemini 2.5 for verification: Your analogy of "a huge Elasticsearch plus prediction of next words based on entire human knowledge" is intuitively helpful, but it's important to refine it to truly understand LLMs. Let's break … Continue reading Insight of “LLM” Sent to LLM for Verification
Methods for Authentication and Authorization
Session-based authentication is the traditional model and continues to be widely employed in classic web applications. A session ID is transmitted to the client via cookies. This method is effective when a single backend controls everything and can manage state. However, when clients are external services rather than individuals, managing sessions becomes impractical. Machines require … Continue reading Methods for Authentication and Authorization
Designing Rocket Software Using Claude 3.7 and Gemini
asking LLM to help design a rocket software system, here is what's provided by the Claude 3.7: rocket_control_system/ ├── system/ │ ├── rtos/ # Real-time OS configuration │ ├── drivers/ # Hardware interface drivers │ └── boot/ # Boot sequence and initialization ├── gnc/ │ ├── navigation/ # Navigation algorithms │ ├── guidance/ # Guidance … Continue reading Designing Rocket Software Using Claude 3.7 and Gemini
LLM Model Comparison Using Garage Parking System Designing
Asking the same question to SWE-1 by Windsurf, Claude 3.7 Sonnet thinking, openAI and Gemini 2.5, I'd like o assess and compare these three LLMs. The question is generic and simple "if i want to build up a codebase for garage parking system, please sketch our blueprint md file first, then write out codes" SWE … Continue reading LLM Model Comparison Using Garage Parking System Designing
The Only Thing You Control – Your Own Mindset
We often hear people say, “I’ll try if things work out,” or “I’m not sure I’m good enough for this.” These statements aren’t reflections of facts; they’re reflections of fear. At the core of that fear lies self-doubt—a mental parasite that erodes potential long before failure ever happens. Let’s be clear: You absolutely cannot allow … Continue reading The Only Thing You Control – Your Own Mindset
Comparison of Two Approaches for Scheduling Tasks: Windows Scheduler vs. APScheduler
Scheduling tasks to run at specific intervals or during certain conditions is a common requirement for many applications. wo popular approaches are using Windows built-in Task Scheduler versus leveraging APScheduler, a Python-based scheduling library. Let’s compare these two approaches by taking a look at two examples: Using APScheduler to define more sophisticated scheduling logic with … Continue reading Comparison of Two Approaches for Scheduling Tasks: Windows Scheduler vs. APScheduler