chore: update roadmap content json (#7031)

Co-authored-by: kamranahmedse <4921183+kamranahmedse@users.noreply.github.com>
pull/6978/head^2
github-actions[bot] 1 month ago committed by GitHub
parent 762444725a
commit 7cf4618634
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 2
      public/roadmap-content/angular.json
  2. 5
      public/roadmap-content/backend.json
  3. 2
      public/roadmap-content/cyber-security.json
  4. 2
      public/roadmap-content/postgresql-dba.json

@ -856,7 +856,7 @@
"links": [
{
"title": "Understanding Pipes",
"url": "https://angular.dev/guide/pipes",
"url": "https://angular.dev/tutorials/learn-angular/22-pipes",
"type": "article"
},
{

@ -964,6 +964,11 @@
"title": "Data Replication",
"description": "Data replication is the process by which data residing on a physical/virtual server(s) or cloud instance (primary instance) is continuously replicated or copied to a secondary server(s) or cloud instance (standby instance). Organizations replicate data to support high availability, backup, and/or disaster recovery.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is data replication?",
"url": "https://www.ibm.com/topics/data-replication",
"type": "article"
},
{
"title": "What is Data Replication?",
"url": "https://youtu.be/fUrKt-AQYtE",

@ -1818,7 +1818,7 @@
},
"MBnDE0VyVh2u2p-r90jVk": {
"title": "WPA vs WPA2 vs WPA3 vs WEP",
"description": "",
"description": "WEP (Wired Equivalent Privacy): WEP is the oldest and least secure of the protocols listed. It uses a static 64-bit or 128-bit key for encryption, which is vulnerable to various attacks due to weak encryption and poor key management. It's considered obsolete and should not be used.\n\nWPA (Wi-Fi Protected Access): WPA improved upon WEP by introducing TKIP (Temporal Key Integrity Protocol), which dynamically changes encryption keys and provides better security. However, it still has vulnerabilities and is considered less secure compared to WPA2 and WPA3.\n\nWPA2 (Wi-Fi Protected Access 2): WPA2 introduced AES (Advanced Encryption Standard) for stronger encryption, replacing TKIP. It provides improved security compared to WPA by using more robust encryption and authentication methods. It is generally considered secure but has some known vulnerabilities, especially in implementation.\n\nWPA3 (Wi-Fi Protected Access 3): WPA3 is the most current standard and offers enhanced security features. It uses SAE (Simultaneous Authentication of Equals) for more secure password-based authentication and improved encryption. WPA3 provides stronger protection against brute-force attacks and ensures better security for both personal and enterprise networks. It also includes forward secrecy, which helps protect past communications from future compromises.\n\nVisit the following resources to learn more:\n\n* \\[@article@wep-vs-wpa-vs-wpa2-vs-wpa3\\][https://community.fs.com/article/wep-vs-wpa-vs-wpa2-vs-wpa3.html](https://community.fs.com/article/wep-vs-wpa-vs-wpa2-vs-wpa3.html)\n* \\[@article@Wifi Protected Access (WPA)\\][https://www.geeksforgeeks.org/wifi-protected-access-wpa/](https://www.geeksforgeeks.org/wifi-protected-access-wpa/)",
"links": []
},
"w6V4JOtXKCMPAkKIQxvMg": {

@ -312,7 +312,7 @@
"description": "Multi-Version Concurrency Control (MVCC) is a technique used by PostgreSQL to allow multiple transactions to access the same data concurrently without conflicts or delays. It ensures that each transaction has a consistent snapshot of the database and can operate on its own version of the data.\n\nLearn more from the following resources:",
"links": [
{
"title": "",
"title": "Multiversion concurrency control - Wikipedia",
"url": "https://en.wikipedia.org/wiki/Multiversion_concurrency_control",
"type": "article"
},

Loading…
Cancel
Save