From 9f446764bcf493291045253dba1d5e81e500837f Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Thu, 12 Sep 2024 12:25:01 +0100 Subject: [PATCH] chore: update roadmap content json (#7087) Co-authored-by: kamranahmedse <4921183+kamranahmedse@users.noreply.github.com> --- public/roadmap-content/backend.json | 15 +++++++++++++-- public/roadmap-content/cyber-security.json | 15 +++++++++++++-- public/roadmap-content/game-developer.json | 13 +++++++++---- public/roadmap-content/python.json | 5 ----- public/roadmap-content/terraform.json | 15 +++++++++++++-- 5 files changed, 48 insertions(+), 15 deletions(-) diff --git a/public/roadmap-content/backend.json b/public/roadmap-content/backend.json index a2acdd3fd..cd432beb7 100644 --- a/public/roadmap-content/backend.json +++ b/public/roadmap-content/backend.json @@ -2863,8 +2863,19 @@ }, "osvajAJlwGI3XnX0fE-kA": { "title": "Long Polling", - "description": "Long polling is a technique where the client polls the server for new data. However, if the server does not have any data available for the client, instead of sending an empty response, the server holds the request and waits for some specified period of time for new data to be available. If new data becomes available during that time, the server immediately sends a response to the client, completing the open request. If no new data becomes available and the timeout period specified by the client expires, the server sends a response indicating that fact. The client will then immediately re-request data from the server, creating a new request-response cycle.", - "links": [] + "description": "Long polling is a technique where the client polls the server for new data. However, if the server does not have any data available for the client, instead of sending an empty response, the server holds the request and waits for some specified period of time for new data to be available. If new data becomes available during that time, the server immediately sends a response to the client, completing the open request. If no new data becomes available and the timeout period specified by the client expires, the server sends a response indicating that fact. The client will then immediately re-request data from the server, creating a new request-response cycle.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Long polling", + "url": "https://javascript.info/long-polling", + "type": "article" + }, + { + "title": "What are Long-Polling, Websockets, Server-Sent Events (SSE) and Comet?", + "url": "https://stackoverflow.com/questions/11077857/what-are-long-polling-websockets-server-sent-events-sse-and-comet", + "type": "article" + } + ] }, "Tt7yr-ChHncJG0Ge1f0Xk": { "title": "Short Polling", diff --git a/public/roadmap-content/cyber-security.json b/public/roadmap-content/cyber-security.json index 2f8f31cea..7f84666e2 100644 --- a/public/roadmap-content/cyber-security.json +++ b/public/roadmap-content/cyber-security.json @@ -1428,8 +1428,19 @@ }, "PUgPgpKio4Npzs86qEXa7": { "title": "Perimiter vs DMZ vs Segmentation", - "description": "Perimeter and DMZ (Demilitarized Zone) segmentation is a crucial aspect of network security that helps protect internal networks by isolating them from external threats. In this section, we will discuss the concepts of perimeter and DMZ segmentation, and how they can be used to enhance the security of your organization.\n\nPerimeter Segmentation\n----------------------\n\nPerimeter segmentation is a network security technique that involves isolating an organization's internal networks from the external, untrusted network (typically the internet). The goal is to create a protective barrier to limit the access of external attackers to the internal network, and minimize the risk of data breaches and other security threats.\n\nTo achieve this, perimeter segmentation typically involves the use of network security appliances such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These devices act as gatekeepers, enforcing security policies and filtering network traffic to protect the internal network from malicious activity.\n\nDMZ Segmentation\n----------------\n\nThe DMZ is a specially isolated part of the network situated between the internal network and the untrusted external network. DMZ segmentation involves creating a separate, secure area for hosting public-facing services (such as web servers, mail servers, and application servers) that need to be accessible to external users.\n\nThe primary purpose of the DMZ is to provide an additional layer of protection for internal networks. By keeping public-facing services in the DMZ and isolated from the internal network, you can prevent external threats from directly targeting your organization's most sensitive assets.\n\nTo implement a DMZ in your network, you can use devices such as firewalls, routers, or dedicated network security appliances. Properly configured security policies and access controls help ensure that only authorized traffic flows between the DMZ and the internal network, while still allowing necessary external access to the DMZ services.\n\nKey Takeaways\n-------------\n\n* Perimeter and DMZ segmentation are crucial security techniques that help protect internal networks from external threats.\n* Perimeter segmentation involves isolating an organization's internal networks from the untrusted external network, typically using security appliances such as firewalls, IDS, and IPS.\n* DMZ segmentation involves creating a separate, secure area within the network for hosting public-facing services that need to be accessible to external users while maintaining additional security for internal assets.\n* Implementing proper network segmentation and security policies can significantly reduce the risk of data breaches and other security threats.", - "links": [] + "description": "Perimeter and DMZ (Demilitarized Zone) segmentation is a crucial aspect of network security that helps protect internal networks by isolating them from external threats. In this section, we will discuss the concepts of perimeter and DMZ segmentation, and how they can be used to enhance the security of your organization.\n\nPerimeter Segmentation\n----------------------\n\nPerimeter segmentation is a network security technique that involves isolating an organization's internal networks from the external, untrusted network (typically the internet). The goal is to create a protective barrier to limit the access of external attackers to the internal network, and minimize the risk of data breaches and other security threats.\n\nTo achieve this, perimeter segmentation typically involves the use of network security appliances such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These devices act as gatekeepers, enforcing security policies and filtering network traffic to protect the internal network from malicious activity.\n\nDMZ Segmentation\n----------------\n\nThe DMZ is a specially isolated part of the network situated between the internal network and the untrusted external network. DMZ segmentation involves creating a separate, secure area for hosting public-facing services (such as web servers, mail servers, and application servers) that need to be accessible to external users.\n\nThe primary purpose of the DMZ is to provide an additional layer of protection for internal networks. By keeping public-facing services in the DMZ and isolated from the internal network, you can prevent external threats from directly targeting your organization's most sensitive assets.\n\nTo implement a DMZ in your network, you can use devices such as firewalls, routers, or dedicated network security appliances. Properly configured security policies and access controls help ensure that only authorized traffic flows between the DMZ and the internal network, while still allowing necessary external access to the DMZ services.\n\nKey Takeaways\n-------------\n\n* Perimeter and DMZ segmentation are crucial security techniques that help protect internal networks from external threats.\n* Perimeter segmentation involves isolating an organization's internal networks from the untrusted external network, typically using security appliances such as firewalls, IDS, and IPS.\n* DMZ segmentation involves creating a separate, secure area within the network for hosting public-facing services that need to be accessible to external users while maintaining additional security for internal assets.\n* Implementing proper network segmentation and security policies can significantly reduce the risk of data breaches and other security threats.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Best practice for network segmentation", + "url": "https://github.com/sergiomarotco/Network-segmentation-cheat-sheet", + "type": "opensource" + }, + { + "title": "OWASP Network segmentation Cheat Sheet", + "url": "https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Network_Segmentation_Cheat_Sheet.md#network-segmentation-cheat-sheet", + "type": "opensource" + } + ] }, "HavEL0u65ZxHt92TfbLzk": { "title": "Core Concepts of Zero Trust", diff --git a/public/roadmap-content/game-developer.json b/public/roadmap-content/game-developer.json index be386cc88..a03ebbd57 100644 --- a/public/roadmap-content/game-developer.json +++ b/public/roadmap-content/game-developer.json @@ -378,12 +378,17 @@ "links": [] }, "AaRZiItRcn8fYb5R62vfT": { - "title": "Assembly", - "description": "**Assembly** is a low-level programming language, often used for direct hardware manipulation, real-time systems, and to write performance-critical code. It provides a strong correspondence between its instructions and the architecture's machine-code instructions, since it directly represents the specific commands of the computer's CPU structure. However, it's closer to machine language (binary code) than to human language, which makes it difficult to read and understand. The syntax varies greatly, which depends upon the CPU architecture for which it's designed, thus Assembly language written for one type of processor can't be used on another. Despite its complexity, time-intensive coding process and machine-specific nature, Assembly language is still utilized for speed optimization and hardware manipulation where high-level languages may not be sufficient.", + "title": "GDScript", + "description": "GDScript is a high-level, dynamically-typed programming language designed specifically for the Godot Engine, an open-source game development platform. It is tailored for ease of use and rapid development of game logic and functionality. GDScript features a syntax similar to Python, which simplifies learning and coding for developers familiar with Python, while providing direct access to Godot's rich set of built-in functions and game-specific APIs. The language integrates closely with Godot's scene system and scripting environment, enabling developers to create and manipulate game objects, handle input, and control game behavior efficiently.\n\nLearn more from the following resources:", "links": [ { - "title": "Code walkthrough of a game written in x64 assembly", - "url": "https://www.youtube.com/watch?v=WUoqlp30M78", + "title": "GDScript Website", + "url": "https://gdscript.com/", + "type": "article" + }, + { + "title": "How to program in Godot - GDScript Tutorial", + "url": "https://www.youtube.com/watch?v=e1zJS31tr88", "type": "video" } ] diff --git a/public/roadmap-content/python.json b/public/roadmap-content/python.json index 00c95e3d8..58c3d1795 100644 --- a/public/roadmap-content/python.json +++ b/public/roadmap-content/python.json @@ -336,11 +336,6 @@ "url": "https://www.programiz.com/dsa", "type": "article" }, - { - "title": "DSA Course by Google", - "url": "https://www.udacity.com/course/data-structures-and-algorithms-in-python--ud513", - "type": "article" - }, { "title": "Explore top posts about Algorithms", "url": "https://app.daily.dev/tags/algorithms?ref=roadmapsh", diff --git a/public/roadmap-content/terraform.json b/public/roadmap-content/terraform.json index 22c85cf9d..d947ddf5a 100644 --- a/public/roadmap-content/terraform.json +++ b/public/roadmap-content/terraform.json @@ -475,8 +475,19 @@ }, "1mFih8uFs3Lc-1PLgwiAU": { "title": "Local Values", - "description": "", - "links": [] + "description": "Local values can be understood as a name assigned to any expression to use it multiple times directly by the name in your terraform module. Local values are referred to as locals and can be declared using the `locals` block. Local values can be a literal constants, resource attributes, variables, or other local values. Local values are helpful to define expressions or values that you need to use multiple times in the module as it allows the value to be updated easily just by updating the local value. A local value can be accessed using the `local` argument like `local.`.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Local Values", + "url": "https://developer.hashicorp.com/terraform/language/values/locals", + "type": "article" + }, + { + "title": "@Article@Terraform Locals", + "url": "https://spacelift.io/blog/terraform-locals", + "type": "article" + } + ] }, "7GK4fQf1FRKrZgZkxNahj": { "title": "Outputs",