Total 32,200 skills
Showing 12 of 32200 skills
Generate authentic social media content in Ken's distinctive multilingual style - mixing Cantonese, English, and Traditional Chinese for personal branding, product promotion, and educational content. Perfect for creating viral posts that combine vulnerability, authority, and conversion optimization.
Analyze gaps between requirements/features that should be tested and actual test coverage, identifying testing deficiencies and prioritizing test improvements
Create algorithmic art using p5.js with seed-based randomness and interactive parameter exploration. Use this when users request to create art with code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art instead of copying existing artists' works to avoid copyright infringement.
Testing doctrine, commands, and test layout conventions
n8n expression syntax validation, context-aware testing, common pitfalls detection, and performance optimization. Use when validating n8n expressions and data transformations.
Run isolated mux desktop (Electron) instances (temp MUX_ROOT + free ports)
Implement distributed tracing using logs, including trace context propagation, span logging, correlation IDs, and OpenTelemetry integration for observability
Systematisk analys av intervjutranskript enligt Gioia-metodiken. [VAD] Analyserar kvalitativa intervjutranskript genom 1st-order kodning (informantspråk), 2nd-order tematisering (forskarkonceptualisering) och aggregerade dimensioner. Producerar standardiserad dokumentation med indexerade, export-ready citat. [NÄR] Use when: gioia, intervjuanalys, transkriptanalys, kvalitativ analys, kodning, tematisk analys, grounded theory, 1st-order, 2nd-order [SPRÅK] Svenska (primärt), engelska vid behov [KÄLLA] Gioia, D.A., Corley, K.G. & Hamilton, A.L. (2013). Seeking Qualitative Rigor in Inductive Research. Organizational Research Methods.
Run integration tests for component interactions
Comprehensive data safety auditor for Vue 3 + Pinia + IndexedDB + PouchDB applications. Detects data loss risks, sync issues, race conditions, and browser-specific vulnerabilities with actionable remediation guidance.
Use when conducting authorized penetration tests, performing security assessments, running red team exercises, testing security controls, identifying attack paths, or validating hardening measures
Use when auditing websites for Japanese accessibility compliance, checking JIS X 8341-3 conformance, or advising on Japan's Act for Eliminating Discrimination against Persons with Disabilities.