Container Orchestration
Design Kubernetes deployment patterns, configure service mesh, and implement container best practices
Agent Design
Design AI agents with appropriate capabilities, tools, and personas for specific software development tasks
API Design
Design RESTful APIs with proper resource modeling, HTTP methods, error handling, and clear contracts following REST principles
API Documentation
Document APIs comprehensively with signatures, parameters, return values, errors, and working code examples for developer reference
API Integration Patterns
Implement robust third-party API integrations with proper authentication, error handling, and rate limiting
System Architecture Patterns
Apply proven architectural patterns (MVC, layered, microservices) to create maintainable systems with clear separation of concerns
Bug Triage
Systematically reproduce, diagnose, and analyze bugs to determine root cause, assess severity, and plan fix strategy
CI/CD Pipeline Design
Design and implement continuous integration and deployment pipelines with automated testing, builds, and deployments
Code Refactoring
Improve code structure, readability, and maintainability without changing external behavior through systematic refactoring
Data Modeling
Design dimensional models, star/snowflake schemas, and data warehouse structures for analytics and reporting
Data Quality
Implement data validation rules, quality metrics, and data cleansing strategies
Design Pattern Application
Apply Gang of Four and architectural patterns appropriately to solve common software design problems
Desktop UI Design
Design intuitive desktop interfaces following platform conventions with proper layouts, keyboard shortcuts, and native widgets
Error Handling Strategies
Implement robust error handling with proper validation, recovery mechanisms, and clear feedback for system stability
ETL Design
Design extract-transform-load patterns, data pipeline orchestration, and incremental loading strategies
Infrastructure as Code
Define and manage infrastructure using code with tools like Terraform, CloudFormation, and Docker
Keyboard Navigation
Implement focus management, optimize tab order, and validate keyboard shortcuts
Load Testing
Design and execute load tests to validate performance under stress, identify scalability limits, and ensure SLA compliance
Logging Strategies
Implement structured logging with appropriate levels, context, and correlation for effective debugging and monitoring
Metrics & Monitoring
Implement application metrics (RED, USE), alerting strategies, and monitoring dashboards
Optimization Patterns
Apply caching strategies, database optimization, and algorithmic improvements to enhance application performance
Performance Profiling
Profile CPU, memory, and I/O usage to identify bottlenecks, analyze execution traces, and diagnose performance issues
Rate Limiting Strategies
Implement exponential backoff, token bucket algorithms, and API quota management
Requirements Elicitation
Extract complete, unambiguous requirements from specifications by identifying functional/non-functional requirements and clarifying ambiguities
Screen Reader Testing
Test with NVDA, JAWS, VoiceOver, validate ARIA attributes, and ensure semantic HTML
Security Code Review
Identify security vulnerabilities including OWASP Top 10 issues, implement secure coding practices, and validate authentication/authorization implementations
SQL Development
Design efficient database schemas, write optimized queries with proper indexes, and manage data operations following best practices
Technical Debt Assessment
Identify code smells, prioritize refactoring opportunities, and assess technical debt impact
Technical Writing
Create clear, accessible documentation for technical and non-technical audiences with practical examples and logical structure
Test Coverage Analysis
Measure and improve test coverage by identifying untested code paths and prioritizing high-risk areas for testing
Test Design Patterns
Apply testing patterns like AAA (Arrange-Act-Assert), mocking, fixtures, and parameterization for maintainable test suites
Threat Modeling
Apply STRIDE methodology to identify security threats, analyze attack surfaces, and assess security risks in system architectures
User Story Writing
Create well-structured user stories with clear acceptance criteria in 'As a/I want/So that' format for team communication
Vulnerability Scanning
Scan dependencies and code for known vulnerabilities using automated tools, triage security issues, and prioritize remediation
WCAG Compliance
Validate WCAG 2.1 AA/AAA standards, use accessibility testing tools, and implement remediation strategies
Web UI Design
Design responsive web interfaces using modern UX principles, accessibility standards, and mobile-first approaches
Webhook Design
Design secure webhooks with HMAC validation, idempotency patterns, and event-driven architecture
Work Breakdown
Break down features and requirements into actionable, implementable tasks with clear scope and acceptance criteria