PromptsVault AI is thinking...
Searching the best prompts from our community
Searching the best prompts from our community
Discover the best AI prompts from our community
Manage complex research projects with multiple phases and stakeholders. Project planning: 1. Work breakdown structure: divide project into manageable tasks. 2. Dependencies: identify which tasks must be completed before others can start. 3. Critical path: sequence of tasks that determines minimum project duration. 4. Resource allocation: personnel, equipment, funding by time period. Timeline development: 1. Start with fixed deadlines (conference presentations, grant reports). 2. Work backwards to determine intermediate milestones. 3. Build in buffer time: 20-30% additional time for unexpected delays. 4. Plan for seasonal variations: holiday breaks, summer schedules. Tools: 1. Gantt charts: Microsoft Project, Smartsheet for visual timelines. 2. Agile methods: Scrum for iterative development with regular check-ins. 3. Risk management: identify potential problems and mitigation strategies. Communication: 1. Weekly team meetings with status updates. 2. Monthly steering committee reports. 3. Quarterly stakeholder briefings. Change management: formal process for protocol modifications, budget amendments.
Generate leads with webinars. Funnel structure: 1. Registration page with compelling promise. 2. Email sequence (reminders, prep content). 3. Live webinar with value delivery. 4. Pitch product/service naturally. 5. Q&A for objection handling. 6. Replay for registrants who missed. 7. Follow-up sequence to non-buyers. 8. Recorded webinar as evergreen funnel. Use tools like WebinarJam or Zoom. Aim for 60-90 minutes.
Build brand through podcasting. Strategy: 1. Niche topic with target audience. 2. Consistent publishing schedule. 3. Professional audio quality. 4. Guest strategy for cross-promotion. 5. Show notes with SEO optimization. 6. Audiograms for social promotion. 7. Transcripts for accessibility and SEO. 8. Call-to-actions for conversion. Distribute to all platforms. Leverage Spotify and Apple Podcasts.
Organize a classroom library to maximize student use. Organization: 1. Leveling: Use a system like Fountas & Pinnell or Lexile levels, but keep it simple for students (e.g., color-coded stickers). 2. Bins & Baskets: Sort books into bins labeled by genre (fantasy, mystery, biography), author (e.g., a Roald Dahl bin), topic (animals, sports), and series (Harry Potter). 3. Display: Feature new or high-interest books face-out on shelves. Create a 'teacher recommendations' section. 4. Check-out System: Use a simple system like a sign-out binder or a digital tool (e.g., Booksource Classroom). 5. Student Involvement: Assign 'librarian' as a classroom job to help manage the library. Regularly survey students on what books they want to see added.
Leverage user-generated content. Campaign tactics: 1. Create branded hashtag. 2. Incentivize submissions (contest, feature). 3. Clear guidelines and examples. 4. Make participating easy. 5. Showcase best UGC across channels. 6. Request permission for reuse. 7. Engage with every submission. 8. Track campaign performance. UGC builds trust and reduces content creation costs. Use tools like TINT or Taggbox.
Build engaged online communities. Approach: 1. Choose platform (Discord, Circle, Slack). 2. Clear purpose and guidelines. 3. Welcome rituals for new members. 4. Regular events and activities. 5. Facilitate member-to-member connections. 6. Recognize and reward contributors. 7. Moderation for healthy culture. 8. Gather feedback and iterate. Focus on value exchange. Create exclusive content for members.
Craft compelling stories using proven narrative structures and character development. Three-act structure: Act 1 (25%): setup, introduce character, inciting incident. Act 2 (50%): rising action, obstacles, midpoint crisis. Act 3 (25%): climax, resolution, denouement. Hero's journey: ordinary world → call to adventure → mentor → threshold → tests → ordeal → reward → return transformed. Character development: 1. Want vs. need: surface desire vs. deeper requirement for growth. 2. Internal conflict: contradictory motivations, fears, beliefs. 3. Character arc: how they change from beginning to end. 4. Dialogue voice: unique speech patterns, vocabulary, rhythm. Story elements: 1. Hook: compelling opening that raises questions. 2. Stakes: what character stands to gain/lose. 3. Pacing: balance of action, dialogue, description. 4. Theme: underlying message about human condition. Genre conventions: romance (meet-cute, obstacles, happy ending), mystery (red herrings, clues, revelation), thriller (ticking clock, danger escalation). Writing process: outline → first draft → character consistency check → dialogue polish → final edit.
Create SEO-optimized content that ranks well while providing genuine value to readers. Keyword research: 1. Primary keyword: 1-3 times in first 100 words, naturally integrated. 2. Secondary keywords: related terms throughout content. 3. Long-tail keywords: specific phrases with lower competition. 4. Search intent: informational, navigational, commercial, transactional. Content structure: 1. Title tag: primary keyword within 60 characters. 2. Meta description: compelling summary within 155 characters. 3. H1: single header with primary keyword. 4. H2-H6: logical hierarchy with secondary keywords. 5. Internal links: 2-5 relevant internal pages. On-page optimization: 1. URL structure: descriptive, keyword-included, hyphen-separated. 2. Image alt text: descriptive with keywords where natural. 3. Content length: 1500+ words for competitive terms. 4. Readability: short paragraphs, bullet points, transitions. Content quality factors: 1. E-A-T: expertise, authoritativeness, trustworthiness. 2. User engagement: time on page, bounce rate, social shares. Tools: Google Keyword Planner, Semrush, Yoast SEO plugin, Grammarly for readability.
Create clear, usable technical documentation that reduces support burden. Documentation hierarchy: 1. Getting started guide: installation, setup, first successful use. 2. User guides: task-oriented instructions with screenshots. 3. API reference: endpoints, parameters, examples, error codes. 4. Troubleshooting: common problems with step-by-step solutions. 5. FAQ: frequent questions from support tickets. Writing principles: 1. Task-oriented: focus on what users want to accomplish. 2. Scannable format: headings, bullet points, numbered steps. 3. Progressive disclosure: basic info first, advanced details in expandable sections. 4. Plain language: avoid jargon, explain technical terms. Information architecture: logical grouping, clear navigation, search functionality. Visual elements: screenshots with annotations, flowcharts for processes, code examples with syntax highlighting. Maintenance workflow: 1. Version control with product releases. 2. User feedback integration: comments, ratings, improvement suggestions. 3. Analytics tracking: most-viewed pages, drop-off points. Tools: GitBook for collaborative editing, Loom for video walkthroughs, Snagit for annotated screenshots.
Develop comprehensive content strategy with systematic editorial planning. Content audit: 1. Existing content inventory: blog posts, social media, emails, videos. 2. Performance analysis: top-performing topics, formats, publishing times. 3. Gap identification: missing topics, underserved audience segments. Content pillars (80/20 rule): 80% educational/entertaining, 20% promotional. Pillar examples: industry insights, how-to guides, behind-the-scenes, customer stories. Editorial calendar structure: 1. Monthly themes aligned with business goals and seasonal trends. 2. Weekly content mix: 2 blog posts, 5 social posts, 1 newsletter, 1 video. 3. Content formats: articles (1500-2500 words), infographics, podcasts, webinars. Publishing schedule: optimal times based on audience analytics (LinkedIn: Tuesday-Thursday 9-11am, Instagram: Wednesday-Friday 11am-1pm). Content production workflow: ideation → outline → first draft → review → final edit → publish → promote. Tools: CoSchedule for calendar management, Airtable for content database, BuzzSumo for topic research.
Execute SMS marketing effectively. Best practices: 1. Explicit opt-in with clear expectations. 2. Keep messages concise (160 characters). 3. Personalize with name or behavior. 4. Timing considerations (not too early/late). 5. Clear value proposition. 6. Easy opt-out mechanism. 7. Frequency caps to avoid annoyance. 8. TCPA and GDPR compliance. Use Twilio or Attentive. High open rates but use sparingly.
Optimize push notifications for engagement. Strategy: 1. Permission priming before asking. 2. Segment users for relevance. 3. Personalize based on behavior. 4. Optimal timing based on user activity. 5. Clear, actionable messages. 6. Rich notifications with images. 7. Deep linking to specific content. 8. A/B test copy and timing. Monitor opt-out rates. Use OneSignal or Firebase. Don't overuse.
Implement trauma-informed strategies to create a safe learning environment. Core Principles: Safety, Trustworthiness, Choice, Collaboration, Empowerment. Classroom Practices: 1. Predictable routines: post a daily schedule, use consistent procedures. 2. Create a 'calm-down corner' with sensory tools (stress balls, weighted lap pads). 3. Offer choice: allow students to choose their seat or how they demonstrate learning. 4. Build relationships: greet each student at the door, hold regular check-ins. 5. De-escalation techniques: use a calm tone, validate feelings ('I see you're frustrated'), provide space. 6. Avoid punitive discipline: focus on restorative conversations instead of punishment. Professional Development: train staff on the effects of trauma on learning and behavior.
Design microservices effectively. Patterns: 1. Service per business capability. 2. API Gateway for routing. 3. Service discovery (Consul, Eureka). 4. Circuit breaker for resilience. 5. Event-driven communication. 6. Database per service. 7. Saga pattern for distributed transactions. 8. CQRS for read/write separation. Use Docker and Kubernetes. Implement observability from start.
Design intuitive REST APIs. Guidelines: 1. Noun-based resource URLs. 2. HTTP methods correctly (GET, POST, PUT, DELETE, PATCH). 3. Proper status codes (200, 201, 400, 404, 500). 4. Versioning strategy (/v1/). 5. Pagination for large collections. 6. Filtering, sorting, searching. 7. HATEOAS for discoverability. 8. Consistent error format. Use JSON. Document with OpenAPI/Swagger. Implement rate limiting.
Measure and enhance research impact beyond academic publications. Impact types: 1. Academic impact: citations, h-index, journal impact factor. 2. Policy impact: cited in policy documents, government reports, legislation. 3. Practice impact: adopted by practitioners, changed guidelines. 4. Social impact: media coverage, public awareness, behavior change. 5. Economic impact: cost savings, commercialization, job creation. Knowledge translation strategies: 1. Stakeholder engagement: involve end-users throughout research process. 2. Plain language summaries: accessible versions of findings for non-experts. 3. Policy briefs: 1-2 page summaries with clear recommendations. 4. Professional conferences: presentations to practice and policy audiences. 5. Media engagement: press releases, social media, interviews. Measurement tools: 1. Altmetrics: social media mentions, news coverage, policy citations. 2. Google Scholar: track citations across academic and grey literature. 3. Surveys: follow-up with knowledge users about research utilization. Planning: develop knowledge translation plan during grant application, budget for dissemination activities, identify target audiences early.
Implement reproducible research practices throughout project lifecycle. Preregistration: 1. Register study protocol before data collection (OSF, ClinicalTrials.gov). 2. Include hypotheses, methods, analysis plan, sample size justification. 3. Distinguish confirmatory from exploratory analyses. Reproducible workflow: 1. Version control: Git/GitHub for code and document management. 2. Literate programming: R Markdown, Jupyter notebooks combining code and narrative. 3. Environment management: Docker containers, package version recording. 4. Automated reporting: dynamic documents that update with new data. Open data and materials: 1. Data repositories: disciplinary (e.g., ICPSR) or general (OSF, Zenodo). 2. Code sharing: GitHub with clear documentation and README files. 3. Materials sharing: survey instruments, interview guides, stimuli. Transparency reporting: 1. CONSORT for RCTs, STROBE for observational studies. 2. Report all measures, manipulations, exclusions. Publication: preprints for rapid dissemination, open access journals when possible.
Design scalable GraphQL schemas. Patterns: 1. Types for domain models. 2. Queries for reads, mutations for writes. 3. Input types for complex arguments. 4. Interfaces and unions for polymorphism. 5. Connection pattern for pagination. 6. DataLoader for N+1 prevention. 7. Directive for custom logic. 8. Federation for microservices. Use schema-first approach. Implement authorization at field level.
Optimize database performance with indexes. Strategies: 1. Index foreign keys. 2. Composite indexes for multi-column queries. 3. Covering indexes to avoid table lookups. 4. Partial indexes for filtered queries. 5. Monitor query plans (EXPLAIN). 6. Avoid over-indexing (write performance). 7. Index selectivity matters. 8. Regular index maintenance. Use for WHERE, JOIN, ORDER BY. Not for small tables or high-write scenarios.
Conduct an outdoor lesson in a schoolyard or local park. Topic: Ecosystems. Activity: 'Bio-Blitz'. 1. Preparation: Define a 10x10 meter area. Provide students with field guides, magnifying glasses, and data collection sheets. 2. The Blitz (30 mins): In small groups, students identify and count as many different species of plants and animals as they can find in their designated area. They can use apps like iNaturalist for identification. 3. Data Analysis (15 mins): Back in the classroom, groups pool their data to calculate the biodiversity of the area. Create a food web diagram based on the organisms they found. 4. Reflection (10 mins): Discuss human impact on the local ecosystem. Fosters observation skills, appreciation for nature, and understanding of ecological concepts.
Implement caching with Redis. Patterns: 1. Cache-aside (lazy loading). 2. Write-through (update cache on write). 3. Write-behind (async cache updates). 4. Cache invalidation strategies. 5. TTL for automatic expiration. 6. Key naming conventions. 7. Data structures (strings, hashes, lists, sets). 8. Pub/Sub for real-time. Use for session storage, rate limiting, leaderboards. Monitor memory usage.
Implement WebSocket for real-time features. Use cases: 1. Chat applications. 2. Live notifications. 3. Collaborative editing. 4. Live data dashboards. 5. Gaming multiplayer. 6. Stock tickers. Implementation: Establish connection, send/receive messages, handle disconnect, reconnect logic, heartbeat/ping-pong, scale with Redis pub/sub, authentication at connection. Use Socket.io or native WebSocket API.
Write compelling grant proposals that secure funding through systematic approach. Proposal components: 1. Executive summary (1-2 pages): project overview, funding request, expected impact. 2. Statement of need: problem definition with supporting data and statistics. 3. Project description: goals, objectives, methodology, timeline. 4. Evaluation plan: metrics, data collection methods, success indicators. 5. Budget: detailed breakdown with justifications. Pre-writing research: 1. Funder priorities: mission alignment, previous grants awarded. 2. Application guidelines: format requirements, submission deadlines. 3. Reviewer criteria: evaluation rubric, scoring system. 4. Competitive landscape: similar funded projects, differentiation opportunities. Writing strategy: 1. Clear, concise language avoiding jargon. 2. Logical flow: problem → solution → implementation → evaluation. 3. Evidence-based arguments: research citations, pilot data, expert testimonials. 4. Specific, measurable outcomes: quantified impact projections. Review process: internal reviews, external feedback, compliance checking. Success factors: early contact with program officers, collaborative partnerships, realistic budgets, demonstrated organizational capacity.
Create engaging blog content that builds audience and drives website traffic. Blog post structure: 1. Headline: compelling, specific, keyword-optimized (60 characters max). 2. Introduction: hook reader with question, statistic, or story (150 words). 3. Body: 3-5 main points with subheadings, examples, data. 4. Conclusion: recap key points, call-to-action for comments or shares. Content types: 1. How-to guides: step-by-step instructions with actionable advice. 2. List posts: '10 Ways to...', '5 Mistakes to Avoid'. 3. Case studies: real results with specific metrics and lessons. 4. Industry analysis: trends, predictions, expert opinions. 5. Personal stories: behind-the-scenes, challenges overcome. Engagement tactics: 1. Questions to readers: encourage comments and discussion. 2. Visual elements: images every 300 words, infographics, charts. 3. Internal linking: 3-5 relevant posts for deeper engagement. 4. Social sharing buttons: make spreading content easy. Publishing cadence: consistent schedule (weekly minimum for growth), optimal posting times based on analytics. Metrics tracking: page views, time on page, social shares, comment engagement, email signups.
Write high-converting email campaigns that engage subscribers and drive action. Email structure: 1. Subject line (10% open rate impact): 30-50 characters, avoid spam triggers, create curiosity or urgency. 2. Preview text: 90-100 characters complementing subject line. 3. Header: brand logo, navigation if needed. 4. Body: single-column design, scannable format, clear value proposition. 5. Call-to-action: prominent button, action-oriented text. Subject line formulas: 1. Curiosity: 'The mistake 90% of marketers make'. 2. Urgency: 'Last 24 hours to save 50%'. 3. Personal: 'John, your exclusive invitation inside'. 4. Benefit: 'Double your productivity in 30 days'. Email types: 1. Welcome series: 3-5 emails introducing brand and setting expectations. 2. Newsletter: weekly valuable content mix. 3. Promotional: product launches, sales, special offers. 4. Nurture sequences: educational content moving prospects toward purchase. Optimization: A/B testing subject lines, send times, content length. Metrics: open rate (20-25% good), click rate (3-5% good), conversion rate, unsubscribe rate (<0.5%).
Protect APIs with rate limiting. Strategies: 1. Fixed window (requests per minute). 2. Sliding window for smoother limits. 3. Token bucket for burst handling. 4. Leaky bucket for consistent rate. 5. Per-user vs global limits. 6. Redis for distributed rate limiting. 7. Return 429 with Retry-After header. 8. Different tiers for API keys. Use middleware like express-rate-limit. Implement exponential backoff guidance.
Integrate social login with OAuth 2.0. Flow: 1. Redirect to provider (Google, Facebook, GitHub). 2. User authorizes application. 3. Provider redirects with authorization code. 4. Exchange code for access token. 5. Fetch user profile. 6. Create or update user in database. 7. Issue JWT to client. 8. Handle errors and edge cases. Use libraries like passport.js. Implement state parameter for CSRF. Store tokens securely.
Teach solving algebraic equations using manipulatives. Concept: Solving '2x + 3 = 11'. Manipulatives: Use cups to represent the variable 'x' and two-color counters for integers. Process (Concrete-Representational-Abstract): 1. Concrete: Students model the equation on a mat. They place 2 cups and 3 positive counters on one side, and 11 positive counters on the other. To solve, they remove 3 counters from each side, then divide the remaining 8 counters equally between the 2 cups. They find each cup (x) equals 4. 2. Representational: Students draw pictures of the cups and counters to solve similar problems. 3. Abstract: Students transition to solving the equation using only symbols and numbers. This progression builds conceptual understanding before procedural fluency.
Implement JWT auth securely. Flow: 1. User login with credentials. 2. Server validates and creates JWT. 3. Client stores JWT (httpOnly cookie or memory). 4. Include JWT in Authorization header. 5. Server verifies signature and claims. 6. Refresh tokens for long sessions. 7. Token expiration and renewal. 8. Logout (blacklist or short expiry). Use RS256 for production. Don't store in localStorage. Implement CSRF protection.
Validate and sanitize user input. Techniques: 1. Whitelist allowed input. 2. Validate data types and formats. 3. Length restrictions. 4. Regex for pattern matching. 5. Sanitize HTML to prevent XSS. 6. Parameterized queries for SQL injection. 7. Validate on client AND server. 8. Contextual output encoding. Use libraries like Joi, Yup, or validator.js. Never trust user input. Fail securely.
Master platform-specific copywriting for maximum social media engagement. Platform specifications: 1. Twitter: 280 characters, 1-2 hashtags, newsjacking opportunities. 2. LinkedIn: professional tone, 1300 character sweet spot, industry insights. 3. Facebook: casual tone, 40-80 characters for high engagement, community focus. 4. Instagram: visual-first, longer captions OK, 10-30 hashtags, story highlights. 5. TikTok: trending sounds, casual language, hook in first 3 seconds. Copy formulas: 1. Hook-Value-CTA: attention grabber → useful content → clear action. 2. Problem-Solution-Proof: pain point → your answer → social proof. 3. Story-Lesson-Link: personal anecdote → key takeaway → resource. Content types: 1. Educational: tips, tutorials, how-tos with carousel posts. 2. Behind-the-scenes: process videos, team spotlights, company culture. 3. User-generated content: customer photos, testimonials, reviews. Hashtag strategy: mix of broad (#marketing) and niche (#b2bsaasmarketing) tags. Posting optimization: platform-specific peak times, consistent brand voice, engagement within first hour crucial for algorithm boost.
Ensure intervention delivery matches intended protocol. Fidelity dimensions (NIH BCC): 1. Design fidelity: intervention based on theory and prior evidence. 2. Training fidelity: standardized training for intervention providers. 3. Delivery fidelity: intervention delivered as intended. 4. Receipt fidelity: participants receive and understand intervention. 5. Enactment fidelity: participants use skills in real life. Monitoring strategies: 1. Session checklists: key components delivered (yes/no checklist). 2. Audio/video recording: sample sessions reviewed by independent raters. 3. Participant feedback: exit interviews about intervention components received. 4. Provider self-report: reflection on session delivery and challenges. Assessment tools: 1. Fidelity rating scales: Likert scales for component quality/adherence. 2. Time and motion studies: duration of intervention components. 3. Competence measures: how skillfully intervention delivered. Reporting: describe fidelity monitoring plan in protocol, report actual fidelity in results, discuss implications of low fidelity for interpretation.
Handle errors and log effectively. Practices: 1. Catch errors at boundaries. 2. Specific error types vs generic. 3. User-friendly error messages. 4. Detailed logs for debugging. 5. Structured logging (JSON). 6. Log levels (ERROR, WARN, INFO, DEBUG). 7. Correlation IDs for tracing. 8. Never log sensitive data. Use Winston, Pino, or similar. Centralize logs with ELK or Datadog. Monitor error rates.
Master async programming. Patterns: 1. async/await for readability. 2. Promise.all for parallel execution. 3. Promise.allSettled for all results. 4. Promise.race for timeout handling. 5. Try/catch for error handling. 6. Avoid callback hell. 7. Handle unhandled rejections. 8. Sequential vs parallel trade-offs. Use for I/O operations. Don't block event loop. Implement retry logic for resilience.
Synthesize research literature using systematic evidence mapping. Scope definition: 1. Broad research question suitable for mapping rather than systematic review. 2. Conceptual framework: logic model or theory of change. 3. Inclusion criteria: population, interventions, outcomes, study designs. Search strategy: 1. Comprehensive database searches: PubMed, EMBASE, PsycINFO, ERIC. 2. Grey literature: conference abstracts, government reports, organizational websites. 3. Citation chasing: reference lists of included studies. Screening and data extraction: 1. Title/abstract screening: liberal inclusion at this stage. 2. Full-text screening: apply inclusion criteria strictly. 3. Data extraction: study characteristics, interventions, outcomes, findings. Evidence map creation: 1. Visual representation: heat maps, bubble plots, network diagrams. 2. Dimensions: populations (x-axis) by interventions (y-axis), bubble size=number of studies. 3. Quality assessment: traffic light system for study quality. Gap identification: empty cells indicate research gaps, areas with low-quality evidence need better studies.
Detect and prevent memory leaks. Techniques: 1. Use browser DevTools memory profiler. 2. Heap snapshots comparison. 3. Clear event listeners on cleanup. 4. Unsubscribe from observables. 5. Clear timers and intervals. 6. Weak references for caches. 7. Avoid global variables accumulation. 8. Monitor production with tools like Sentry. Common causes: closures, forgotten subscriptions, detached DOM. Implement cleanup in useEffect/componentWillUnmount.
Choose Git workflow for team. Strategies: 1. Git Flow (main, develop, feature, release, hotfix). 2. GitHub Flow (main, feature branches, PR). 3. Trunk-based (short-lived branches, frequent merges). 4. Branch naming conventions. 5. Commit message standards. 6. Pull request templates. 7. Protected branches. 8. Squash vs merge commits. Use GitHub Actions or GitLab CI. Automate what you can.
Master academic writing with proper research methodology and citation practices. Paper structure: 1. Abstract: 150-300 words summarizing purpose, methods, results, conclusions. 2. Introduction: background, literature review, thesis statement, research questions. 3. Methodology: research design, data collection, analysis methods. 4. Results/Findings: data presentation without interpretation. 5. Discussion: interpretation, implications, limitations. 6. Conclusion: summary, future research directions. Citation styles: 1. APA: author-date system, common in psychology, education. 2. MLA: author-page system, literature and humanities. 3. Chicago: footnotes or author-date, history and arts. 4. IEEE: numbered citations, engineering and computer science. Research process: 1. Literature review: systematic search, source evaluation, gap identification. 2. Primary research: surveys, interviews, experiments with IRB approval. 3. Data analysis: statistical methods, qualitative coding, triangulation. Writing principles: 1. Objectivity: third person, unbiased language. 2. Precision: specific terminology, accurate data reporting. 3. Evidence-based: claims supported by credible sources. Revision strategies: peer reviews, plagiarism checking, professional editing for clarity and flow.
Write effective news articles using journalism fundamentals and ethical standards. Inverted pyramid structure: 1. Lead (25 words): who, what, when, where, why in order of importance. 2. Body: supporting details in descending order of significance. 3. Tail: background information, future implications. Lead types: 1. Straight news: factual, immediate information. 2. Feature: creative angle, human interest hook. 3. Summary: multiple related events condensed. News values: timeliness, proximity, prominence, impact, conflict, human interest, unusualness. Verification process: 1. Multiple source confirmation: minimum 2 independent sources. 2. Primary sources preferred: firsthand accounts, official documents. 3. Attribution: direct quotes with source credibility. 4. Fact-checking: numbers, dates, spelling of names. Ethical guidelines: 1. Accuracy over speed: verify before publishing. 2. Fairness: present multiple perspectives on controversial topics. 3. Independence: avoid conflicts of interest, disclose relationships. Interview techniques: open-ended questions, active listening, follow-up clarifications. Writing style: active voice, short sentences, AP Style for consistency. Digital considerations: SEO headlines, social media sharing, multimedia integration.
Develop distinctive writing voice and style through deliberate practice and technique. Voice elements: 1. Syntax: sentence structure, length variation, rhythm and flow. 2. Diction: word choice, vocabulary level, technical vs. conversational. 3. Tone: attitude toward subject matter and reader. 4. Point of view: first person intimacy, third person flexibility. 5. Perspective: unique worldview, cultural background, personal experiences. Style development exercises: 1. Imitation: rewrite passages in style of admired authors. 2. Constraint writing: 100-word stories, one-sentence paragraphs. 3. Stream of consciousness: unfiltered thoughts for authenticity. 4. Dialogue exercise: conversations revealing character through speech patterns. Voice consistency: maintain throughout piece while allowing evolution across projects. Reading influence: analyze favorite authors' techniques, identify appealing elements. Writing habits: daily practice minimum 250 words, experimentation with different forms. Feedback integration: writer's groups, beta readers, professional editing. Publishing considerations: genre expectations vs. unique voice, market demands vs. artistic integrity. Tools: Hemingway Editor for clarity, ProWritingAid for style analysis, Scrivener for organization.
Master business writing that communicates clearly and drives executive action. Executive summary structure: 1. Problem statement: business challenge in 2-3 sentences. 2. Recommended solution: specific action needed. 3. Key benefits: quantified impact (revenue, cost savings, efficiency). 4. Resource requirements: budget, timeline, personnel. 5. Next steps: specific actions with owners and dates. Email best practices: 1. Subject line: specific, actionable (Decision needed: Q4 budget allocation). 2. First paragraph: bottom line up front (BLUF). 3. Body: bullet points for scannability, bold key information. 4. Length: under 200 words for executives, longer OK for supporting data. Report writing: 1. Executive summary first (1-page maximum). 2. Methodology: how data was collected/analyzed. 3. Findings: key insights with supporting evidence. 4. Recommendations: prioritized action items. 5. Appendices: detailed data, calculations, supporting documents. Tone considerations: confident without arrogance, data-driven, solution-focused. Review checklist: clarity, accuracy, completeness, appropriate level of detail for audience.
Write professional screenplays using industry-standard formatting and structure. Screenplay format: 1. Courier 12-point font, 1 page = 1 minute screen time. 2. Scene headings: INT./EXT. LOCATION - TIME OF DAY. 3. Action lines: present tense, active voice, visual descriptions only. 4. Character names: CENTERED, CAPS when introduced and before dialogue. 5. Dialogue: centered, natural speech patterns, subtext over exposition. Three-act structure timing: Act I (25 pages): setup, character introduction, inciting incident at page 12-15. Act II (50 pages): rising action, midpoint at page 50-60, obstacles escalate. Act III (25 pages): climax, resolution, denouement. Plot points: 1. Inciting incident: event that starts story in motion. 2. Plot point I (end Act I): major story turn. 3. Midpoint: game-changing revelation or setback. 4. Plot point II (end Act II): final obstacle before climax. Character development: protagonist arc, antagonist motivation, supporting character functions. Industry guidelines: 90-120 pages for features, character names in CAPS only first appearance, minimal camera directions. Software: Final Draft (industry standard), WriterDuet (collaboration), Celtx (free option).
Manage codebase in monorepo. Tools: 1. Turborepo (fast task execution, caching). 2. Nx (powerful CLI, generators). 3. Lerna (package management, versioning). 4. pnpm workspaces (efficient dependencies). 5. Rush (large-scale enterprise). Benefits: Shared code, atomic changes, consistent versioning. Challenges: Build times, tooling complexity. Use build caching and affected commands. Implement code ownership.
Build serverless with AWS Lambda. Architecture: 1. Function handler receives event. 2. Stateless execution. 3. Cold start optimization. 4. Environment variables for config. 5. IAM roles for permissions. 6. API Gateway for HTTP triggers. 7. EventBridge for scheduling. 8. CloudWatch for logs and monitoring. Use Serverless Framework or SAM. Keep functions small and focused. Mind execution time limits.
Design a VR lesson for a world history class using Google Expeditions or similar platform. Objective: Students will identify key architectural features of the Colosseum and Roman Forum. Pre-VR Activity (10 mins): Introduce key vocabulary (arch, aqueduct, forum) and provide historical context. VR Experience (20 mins): 1. Guide students through a 360-degree tour of the Colosseum. 2. Pause at points of interest, asking questions ('What events took place here?' 'How does the architecture support a large crowd?'). 3. Move to the Roman Forum, have students identify different building types. Post-VR Activity (15 mins): Students write a 'postcard' from ancient Rome describing what they saw, or work in groups to build a model of a Roman structure.
Document APIs with OpenAPI/Swagger. Structure: 1. OpenAPI specification (YAML/JSON). 2. Paths for endpoints. 3. Request/response schemas. 4. Parameter descriptions. 5. Authentication schemes. 6. Example requests/responses. 7. Error codes documentation. 8. Interactive try-it-out. Use Swagger UI for visualization. Generate from code or design-first. Keep docs in sync with implementation.
Containerize applications with Docker. Best practices: 1. Small base images (Alpine). 2. Multi-stage builds. 3. Layer caching optimization. 4. .dockerignore file. 5. Non-root user for security. 6. Health checks. 7. Environment-specific configs. 8. Volume mounts for data. Keep images lean. One process per container. Use docker-compose for local development. Tag images properly.
Develop next generation of researchers through effective mentoring. Mentoring models: 1. Dyadic: traditional one-on-one mentor-mentee relationship. 2. Team mentoring: multiple mentors with different expertise areas. 3. Peer mentoring: lateral relationships between researchers at similar career stages. 4. Group mentoring: mentor works with cohort of mentees simultaneously. Mentoring competencies: 1. Research skills: methodology, analysis, writing, grant writing. 2. Professional development: networking, career planning, work-life balance. 3. Personal support: confidence building, resilience, identity development. Structure and process: 1. Goal setting: specific, measurable objectives for mentoring relationship. 2. Regular meetings: monthly face-to-face or virtual meetings with agenda. 3. Progress monitoring: quarterly reviews of goal achievement and relationship satisfaction. 4. Feedback: bidirectional feedback on mentoring effectiveness. Training programs: 1. Mentor training: active listening, giving feedback, cultural competence. 2. Mentee training: goal setting, communication, relationship management. Evaluation: surveys, focus groups, career outcome tracking for evidence-based improvement.
Plan a Tier 2 reading intervention for a small group of 3rd graders. Target Skill: Reading fluency. Group Size: 4-5 students. Frequency: 3 times a week for 30 minutes. Structure: 1. Warm-up (5 mins): Practice sight words with flashcards. 2. Modeling (5 mins): Teacher models fluent reading of a short, instructional-level passage, emphasizing prosody and pacing. 3. Choral Reading (5 mins): Teacher and students read the passage aloud together. 4. Partner Reading (10 mins): Students take turns reading the passage to a partner. Teacher provides feedback. 5. Progress Monitoring (5 mins): Once a week, conduct a 1-minute timed reading of a new passage to track words correct per minute (WCPM). Graph progress to show growth. Intervention should be systematic and data-driven.
Deploy with Kubernetes. Concepts: 1. Pods as deployment units. 2. Deployments for replica management. 3. Services for networking. 4. ConfigMaps and Secrets for config. 5. Namespaces for isolation. 6. Ingress for HTTP routing. 7. Resource limits and requests. 8. Health and readiness probes. Use kubectl and YAML manifests. Implement rolling updates and rollbacks. Monitor with Prometheus.