By asking the same question in Gemini and OpenAI, not only can I further the understanding of the topic but also assess the two AIs. Here is the question for both: "help me systematically learn elastic search, i have basic understanding already but want to have a comprehensive view and particularly know how the query/search … Continue reading Further Understanding ES (Second Iteration)
Methodical in Research and Work
It is essential to approach tasks methodically; however, I often rush into completing research or serious work. I find myself wasting considerable time attempting to rectify mistakes, especially with the assistance of AI tools. This tendency leads to a more challenging outcome, as I become trapped in a vicious cycle repeatedly. Even when I manage … Continue reading Methodical in Research and Work
What You Might Miss in Your Whole Life Insurance Policy—Until It’s Too Late
Whole life insurance promises a sense of security: lifelong coverage, cash value growth, even the potential for dividends. But while policies like the one issued by MassMutual appear straightforward on the surface, there are several subtle but critical pitfalls that often catch policyholders by surprise. These issues are not unique to MassMutual—they’re systemic concerns across … Continue reading What You Might Miss in Your Whole Life Insurance Policy—Until It’s Too Late
Tips of Working with AI
There are quite a lot of pitfalls in using AI to help with coding. Hence, summarize and reference other users' experiences. Overall, as mentioned in previous blog, detailed markdown file to describe how your construct the codebase, including what classes, instance, methods in designing is the best approach to work with AI. Prompt with high … Continue reading Tips of Working with AI
Use Windsurf Effectively: Memories and Workflow
There are two mechanisms for Memory in Windsurf: Memories, which can be automatically generated by Cascade, and rules, which are manually defined by the user at both the local and global levels. Cascade will save memory itself, we can also prompt Cascade to “create a memory of …”. Rules has global level and workspace level. … Continue reading Use Windsurf Effectively: Memories and Workflow
Design Patterns in JavaScript
In JavaScript, there are several important design and asynchronous programming patterns used to structure code, manage complexity, and handle concurrency efficiently. Here’s a concise overview of key patterns: There are the code examples one by one: Callback Pattern function fetchData(callback) { setTimeout(() => { const data = { id: 1, name: "Alice" }; callback(data); }, … Continue reading Design Patterns in JavaScript
Model-View-Controller (MVC) Pattern and Blueprints
MVC is an architectural pattern (a reusable solution to a common problem) that tackles a hodge-podge styled codebase by dividing the application into three distinct, interconnected components: Model (M): The Data and Business Logic View (V): The User Interface Controller (C): The Orchestrator/Handler 1. Model (M): The Data & Brains What it is: Represents the application's data and … Continue reading Model-View-Controller (MVC) Pattern and Blueprints
Systematic Outline for SQL Proficiency
Module 1: SQL Fundamentals Refresher & Core Concepts Goal: Ensure a rock-solid understanding of the basics. Topics: Relational Database Concepts (Tables, Rows, Columns, Relationships, Keys) Core SQL Statements Review: SELECT (Filtering with WHERE, Sorting with ORDER BY, Limiting results) INSERT, UPDATE, DELETE (Data Manipulation Language - DML) Data Types (Common types like INT, VARCHAR, DATE, DECIMAL, BOOLEAN, etc.) Constraints (PRIMARY KEY, FOREIGN KEY, UNIQUE, NOT … Continue reading Systematic Outline for SQL Proficiency
Systematic Outline for Understanding Web Communication
Level 1: The Basics - Participants and Addressing Client: The entity making the request (e.g., your web browser, a mobile app, a command-line tool like curl). Server: The entity hosting the resource and responding to the request (e.g., a web server like Apache or Nginx running on a machine hosting website files or application logic). IP Address (Internet … Continue reading Systematic Outline for Understanding Web Communication
Security Technology Summary
In today’s digital world, security is no longer optional—it’s essential. Whether you're building apps, managing infrastructure, or just trying to protect sensitive data, there are several foundational security measures and protocols you should know about. In this blog, we'll explore some of the most widely used and important security technologies, including LIMA, OAuth, RSA, and … Continue reading Security Technology Summary