Ma Wei Says
Author

Ma Wei Says

Follow me! Discussing software architecture and development, AIGC and AI Agents... Sometimes sharing insights on IT professionals' life experiences.

29
Articles
0
Likes
19
Views
0
Comments
Recent Articles

Latest from Ma Wei Says

29 recent articles
Ma Wei Says
Ma Wei Says
Feb 21, 2025 · Artificial Intelligence

How PIKE‑RAG Boosts Retrieval‑Augmented Generation for Industrial AI

PIKE‑RAG, a Retrieval‑Augmented Generation framework from Microsoft Research, tackles knowledge source diversity, one‑size‑fits‑all limitations, and LLMs' lack of domain expertise by building multi‑layer heterogeneous graphs, task‑driven modular pipelines, and a staged L0‑L4 system for more accurate industrial AI responses.

AIKnowledgeGraphLLM
0 likes · 5 min read
How PIKE‑RAG Boosts Retrieval‑Augmented Generation for Industrial AI
Ma Wei Says
Ma Wei Says
Feb 19, 2025 · Fundamentals

Safe List Operations: Remove, SubList Casting, and Efficient Traversal in Java

This article explains why modifying a List inside a foreach loop causes ConcurrentModificationException, shows the proper ways to remove elements using iterators or lambda expressions, warns against casting subList to ArrayList, clarifies correct toArray and Arrays.asList usage, compares LinkedList and ArrayList performance, and recommends the most efficient traversal techniques.

CollectionsIteratorJava
0 likes · 9 min read
Safe List Operations: Remove, SubList Casting, and Efficient Traversal in Java
Ma Wei Says
Ma Wei Says
Feb 14, 2025 · Databases

Master MySQL Regex: All REGEXP Functions Explained

This guide explains MySQL's regular‑expression capabilities—including REGEXP, NOT REGEXP, REGEXP_LIKE, REGEXP_REPLACE, REGEXP_SUBSTR, REGEXP_INSTR and their RLIKE equivalents—covering syntax, multibyte safety, match‑type flags, and practical usage examples.

MySQLRegExpSQL
0 likes · 7 min read
Master MySQL Regex: All REGEXP Functions Explained
Ma Wei Says
Ma Wei Says
Feb 13, 2025 · Artificial Intelligence

Master AI Prompting: 5 Proven Techniques to Unlock Accurate Outputs

This guide presents five practical prompting techniques—including structured output, role‑playing, visual conversion, multi‑turn refinement, and multilingual handling—plus industry‑specific examples and common pitfalls, helping users craft precise commands for AI models like DeepSeek.

AI promptinglarge language modelsprompt engineering
0 likes · 8 min read
Master AI Prompting: 5 Proven Techniques to Unlock Accurate Outputs
Ma Wei Says
Ma Wei Says
Feb 10, 2025 · Databases

How Redis Handles Expired Keys: Periodic vs Lazy Deletion Strategies

This article explains Redis's two expiration mechanisms—periodic scanning with configurable frequency and lazy deletion on client access—detailing their configurations, execution steps, performance trade‑offs, and replication pitfalls to help developers manage memory efficiently.

ExpirationLazy DeletionPeriodic Deletion
0 likes · 5 min read
How Redis Handles Expired Keys: Periodic vs Lazy Deletion Strategies
Ma Wei Says
Ma Wei Says
Mar 5, 2024 · Backend Development

How to Prevent Cache Penetration Attacks with Bloom Filters and Null Caching

The article explains what cache penetration is, why it can crash databases under malicious traffic, and presents practical mitigation techniques such as Bloom filters, null-value caching, data pre‑warming, and request validation to protect Redis‑backed systems.

Backend PerformanceNull CachingRedis
0 likes · 6 min read
How to Prevent Cache Penetration Attacks with Bloom Filters and Null Caching