There are quite a lot of pitfalls in using AI to help with coding. Hence, summarize and reference other users' experiences. Overall, as mentioned in previous blog, detailed markdown file to describe how your construct the codebase, including what classes, instance, methods in designing is the best approach to work with AI. Prompt with high … Continue reading Tips of Working with AI
Uncategorized
Use Windsurf Effectively: Memories and Workflow
There are two mechanisms for Memory in Windsurf: Memories, which can be automatically generated by Cascade, and rules, which are manually defined by the user at both the local and global levels. Cascade will save memory itself, we can also prompt Cascade to “create a memory of …”. Rules has global level and workspace level. … Continue reading Use Windsurf Effectively: Memories and Workflow
Design Patterns in JavaScript
In JavaScript, there are several important design and asynchronous programming patterns used to structure code, manage complexity, and handle concurrency efficiently. Here’s a concise overview of key patterns: There are the code examples one by one: Callback Pattern function fetchData(callback) { setTimeout(() => { const data = { id: 1, name: "Alice" }; callback(data); }, … Continue reading Design Patterns in JavaScript
Model-View-Controller (MVC) Pattern and Blueprints
MVC is an architectural pattern (a reusable solution to a common problem) that tackles a hodge-podge styled codebase by dividing the application into three distinct, interconnected components: Model (M): The Data and Business Logic View (V): The User Interface Controller (C): The Orchestrator/Handler 1. Model (M): The Data & Brains What it is: Represents the application's data and … Continue reading Model-View-Controller (MVC) Pattern and Blueprints
Systematic Outline for SQL Proficiency
Module 1: SQL Fundamentals Refresher & Core Concepts Goal: Ensure a rock-solid understanding of the basics. Topics: Relational Database Concepts (Tables, Rows, Columns, Relationships, Keys) Core SQL Statements Review: SELECT (Filtering with WHERE, Sorting with ORDER BY, Limiting results) INSERT, UPDATE, DELETE (Data Manipulation Language - DML) Data Types (Common types like INT, VARCHAR, DATE, DECIMAL, BOOLEAN, etc.) Constraints (PRIMARY KEY, FOREIGN KEY, UNIQUE, NOT … Continue reading Systematic Outline for SQL Proficiency
Systematic Outline for Understanding Web Communication
Level 1: The Basics - Participants and Addressing Client: The entity making the request (e.g., your web browser, a mobile app, a command-line tool like curl). Server: The entity hosting the resource and responding to the request (e.g., a web server like Apache or Nginx running on a machine hosting website files or application logic). IP Address (Internet … Continue reading Systematic Outline for Understanding Web Communication
Security Technology Summary
In today’s digital world, security is no longer optional—it’s essential. Whether you're building apps, managing infrastructure, or just trying to protect sensitive data, there are several foundational security measures and protocols you should know about. In this blog, we'll explore some of the most widely used and important security technologies, including LIMA, OAuth, RSA, and … Continue reading Security Technology Summary
Kafka and Redis Add-on Explained by Gemini
Kafka's mechanism closely resembles that of the Robot Operating System (ROS), a prominent robot communication system. It is developed on the Java Virtual Machine and functions as a logbook, enabling users to view, pool, and manage data efficiently. Utilize Kafka to manage real-time price data from various global exchanges. This represents a prevalent and robust … Continue reading Kafka and Redis Add-on Explained by Gemini
Self-Awareness
What you view in others reflects who you are at your true self. If you perceive others as arrogant or self-bragging, it might indicate a deep desire within you to express those traits, yet something always inhibits you from doing so. Perhaps you admire their confidence and wish to embrace a similar authenticity, but societal … Continue reading Self-Awareness
JWT Overview
JWT is for authorization, not authentication — Authentication checks credentials (e.g., username/password), while authorization ensures requests are made by the logged-in user. Traditional session-based authorization — User info is stored on the server; client sends a session ID via cookies with each request. JWT-based authorization — Server sends a signed JSON Web Token back to … Continue reading JWT Overview