Senior FDA consultant and specialist for medical device companies including HIPAA compliance and requirement management. Provides FDA pathway expertise, QSR compliance, cybersecurity guidance, and...
Expert security auditor specializing in DevSecOps, comprehensive
Expert security auditor specializing in DevSecOps, comprehensive
Expert security auditor specializing in DevSecOps, comprehensive
This skill should be used at the start of any computationally intensive scientific task to detect and report available system resources (CPU cores, GPUs, memory, disk space). It creates a JSON...
Implement caching strategies for improved performance. Use for reducing database load and speeding up responses.
Master Temporal workflow orchestration with Python SDK. Implements
Master Temporal workflow orchestration with Python SDK. Implements
Master Temporal workflow orchestration with Python SDK. Implements
Conduct user research and validation. Use when discovering user needs, validating assumptions, creating personas, or understanding pain points. Covers interviews, surveys, analysis, and synthesis.
Complete Surfpool development environment for Solana - drop-in replacement for solana-test-validator with mainnet forking, cheatcodes, Infrastructure as Code, and Surfpool Studio. The fastest way...
Expert performance engineer specializing in modern observability,
Expert performance engineer specializing in modern observability,
Expert performance engineer specializing in modern observability,
React Three Fiber core setup, Canvas configuration, scene hierarchy, camera systems, lighting, render loop, and React integration patterns. Use when setting up a new R3F project, configuring the...
Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies. Provides ISMS implementation, cybersecurity risk assessment,...
Build Unity games with optimized C# scripts, efficient rendering,
Build Unity games with optimized C# scripts, efficient rendering,
Build Unity games with optimized C# scripts, efficient rendering,
Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing...