chore: update roadmap content json (#6996)

Co-authored-by: kamranahmedse <4921183+kamranahmedse@users.noreply.github.com>
pull/7030/head
github-actions[bot] 3 months ago committed by GitHub
parent fc3acb9702
commit dcb5538b12
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 30
      public/roadmap-content/android.json
  2. 10
      public/roadmap-content/backend.json
  3. 62
      public/roadmap-content/cyber-security.json
  4. 190
      public/roadmap-content/devops.json
  5. 5
      public/roadmap-content/frontend.json
  6. 5
      public/roadmap-content/javascript.json
  7. 8
      public/roadmap-content/postgresql-dba.json
  8. 45
      public/roadmap-content/software-architect.json
  9. 2
      public/roadmap-content/sql.json
  10. 5
      public/roadmap-content/ux-design.json

@ -184,18 +184,36 @@
},
"Dp2DOX10u2xJUjB8Okhzh": {
"title": "Frame",
"description": "",
"links": []
"description": "**FrameLayout** is a simple ViewGroup subclass in Android that is designed to hold a single child view or a stack of overlapping child views. It positions each child in the top-left corner by default and allows them to overlap on top of each other, which makes it useful for situations where you need to layer views on top of one another.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: Frame Layout",
"url": "https://developer.android.com/reference/android/widget/FrameLayout",
"type": "article"
}
]
},
"U8iMGGOd2EgPxSuwSG39Z": {
"title": "Linear",
"description": "",
"links": []
"description": "**LinearLayout** is a view group that aligns all children in a single directioni, vertically or horizontally. You can specify the layout direction with the `android:orientation` attribute.\n\n**LinearLayout** was commonly used in earlier Android development, but with the introduction of ConstraintLayout, it’s less frequently used in modern apps.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: Linear Layout",
"url": "https://developer.android.com/develop/ui/views/layout/linear",
"type": "article"
}
]
},
"yE0qAQZiEC9R8WvCdskpr": {
"title": "Relative",
"description": "",
"links": []
"description": "A **RelativeLayout** in Android is a type of ViewGroup that allows you to position child views relative to each other or relative to the parent layout. It's a flexible layout where you can arrange the child views in relation to one another based on certain rules, making it suitable for creating complex UI designs.\n\n**RelativeLayout** was commonly used in earlier Android development, but with the introduction of `ConstraintLayout`, it's less frequently used in modern apps.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: Relative Layout",
"url": "https://developer.android.com/develop/ui/views/layout/relative",
"type": "article"
}
]
},
"3fFNMhQIuuh-NRzSXYpXO": {
"title": "Constraint",

@ -796,11 +796,6 @@
"url": "https://en.wikipedia.org/wiki/Object%E2%80%93relational_mapping",
"type": "article"
},
{
"title": "What is an ORM and how should I use it?",
"url": "https://stackoverflow.com/questions/1279613/what-is-an-orm-how-does-it-work-and-how-should-i-use-one",
"type": "article"
},
{
"title": "What is an ORM, how does it work, and how should I use one?",
"url": "https://stackoverflow.com/a/1279678",
@ -927,6 +922,11 @@
"title": "Database Indexes",
"description": "An index is a data structure that you build and assign on top of an existing table that basically looks through your table and tries to analyze and summarize so that it can create shortcuts.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Database index - Wikipedia",
"url": "https://en.wikipedia.org/wiki/Database_index",
"type": "article"
},
{
"title": "Explore top posts about Database",
"url": "https://app.daily.dev/tags/database?ref=roadmapsh",

@ -1735,8 +1735,19 @@
},
"iolsTC-63d_1wzKGul-cT": {
"title": "DLP",
"description": "",
"links": []
"description": "Data Loss Prevention (DLP) refers to a set of strategies, tools, and processes used by organizations to ensure that sensitive data is not lost, accessed, or misused by unauthorized users. DLP solutions monitor, detect, and block the movement of critical information outside an organization’s network, helping to prevent data breaches, leaks, and other security incidents.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is data loss prevention (DLP)?",
"url": "https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP",
"type": "article"
},
{
"title": "What is DLP (data loss prevention)?",
"url": "https://www.cloudflare.com/es-es/learning/access-management/what-is-dlp/",
"type": "article"
}
]
},
"35oCRzhzpVfitQPL4K9KC": {
"title": "ACL",
@ -1750,13 +1761,35 @@
},
"l5EnhOCnkN-RKvgrS9ylH": {
"title": "HIPS",
"description": "",
"links": []
"description": "A Host Intrusion Prevention System (HIPS) is a security solution designed to monitor and protect individual host devices, such as servers, workstations, or laptops, from malicious activities and security threats. HIPS actively monitors system activities and can detect, prevent, and respond to unauthorized or anomalous behavior by employing a combination of signature-based, behavior-based, and heuristic detection methods.\n\nHIPS operates at the host level, providing a last line of defense by securing the individual endpoints within a network. It is capable of preventing a wide range of attacks, including zero-day exploits, malware infections, unauthorized access attempts, and policy violations.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is an Intrusion Prevention System?",
"url": "https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips",
"type": "article"
},
{
"title": "What is Host intrusion prevention system (HIPS)?",
"url": "https://cyberpedia.reasonlabs.com/EN/host%20intrusion%20prevention%20system%20(hips).html",
"type": "article"
}
]
},
"LIPtxl_oKZRcbvXT4EdNf": {
"title": "NIDS",
"description": "",
"links": []
"description": "A Network Intrusion Detection System (NIDS) is a security solution designed to monitor and analyze network traffic for signs of suspicious activity or potential threats. NIDS operates by inspecting the data packets that flow through a network, looking for patterns that match known attack signatures or anomalies that could indicate malicious behavior. Unlike a Host Intrusion Detection System (HIDS), which focuses on individual host devices, NIDS provides a broader view by monitoring network traffic across multiple systems and devices.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is an Intrusion Detection System?",
"url": "https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids",
"type": "article"
},
{
"title": "What is a Network Intrusion Detection system (NIDS)?",
"url": "https://bunny.net/academy/security/what-is-network-intrusion-detection-nids/",
"type": "article"
}
]
},
"7w9qj16OD4pUzq-ItdxeK": {
"title": "NIPS",
@ -2149,7 +2182,7 @@
},
"nOND14t7ISgSH3zNpV3F8": {
"title": "Memory Leak",
"description": "",
"description": "A Memory Leak occurs when a computer program consumes memory but fails to release it back to the operating system after it is no longer needed. Over time, this can lead to reduced system performance, increased memory usage, and, in severe cases, the program or system may crash due to the exhaustion of available memory.",
"links": []
},
"2jo1r9O_rCnDwRv1_4Wo-": {
@ -2202,8 +2235,19 @@
},
"sMuKqf27y4iG0GrCdF5DN": {
"title": "Pass the Hash",
"description": "",
"links": []
"description": "Pass the Hash (PtH) is a hacking technique that allows an attacker to authenticate to a remote server or service using the hashed value of a user's password, without needing to know the actual plaintext password. This method exploits weaknesses in the way some authentication protocols handle hashed credentials, particularly in Windows-based systems.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is a pass-the-hash attack?",
"url": "https://www.crowdstrike.com/cybersecurity-101/pass-the-hash/",
"type": "article"
},
{
"title": "Pass the Hash Attack",
"url": "https://www.netwrix.com/pass_the_hash_attack_explained.html",
"type": "article"
}
]
},
"L0ROYh2DNlkybNDO2ezJY": {
"title": "Directory Traversal",

File diff suppressed because one or more lines are too long

@ -2470,6 +2470,11 @@
"url": "https://developer.mozilla.org/en-US/docs/Web/Progressive_web_apps/",
"type": "article"
},
{
"title": "Building a simple offline-capable Notepad app ",
"url": "https://www.amitmerchant.com/Building-Simple-Offline-Notepad-Using-Service-Worker/",
"type": "article"
},
{
"title": "Explore top posts about Web Development",
"url": "https://app.daily.dev/tags/webdev?ref=roadmapsh",

@ -429,6 +429,11 @@
"title": "String",
"url": "https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String",
"type": "article"
},
{
"title": "JavaScript Strings",
"url": "https://javascript.info/string",
"type": "article"
}
]
},

@ -2,7 +2,13 @@
"lDIy56RyC1XM7IfORsSLD": {
"title": "Introduction",
"description": "PostgreSQL is a powerful, open-source Object-Relational Database Management System (ORDBMS) that is known for its robustness, extensibility, and SQL compliance. It was initially developed at the University of California, Berkeley, in the 1980s and has since become one of the most popular open-source databases in the world.",
"links": []
"links": [
{
"title": "History of POSTGRES to PostgreSQL",
"url": "https://www.postgresql.org/docs/current/history.html",
"type": "article"
}
]
},
"soar-NBWCr4xVKj7ttfnc": {
"title": "What are Relational Databases?",

@ -1437,8 +1437,29 @@
},
"PKqwKvoffm0unwcFwpojk": {
"title": "Scrum",
"description": "",
"links": []
"description": "`Scrum` is a popular agile framework used for project management, particularly in software development. It emphasizes iterative development, collaboration, and flexibility to deliver high-quality products.\n\nKey elements of Scrum:\n\n* **Sprints**: Time-boxed iterations (usually 2-4 weeks) where teams work on specific goals.\n* **Product Backlog**: Prioritized list of features or requirements for the product.\n* **Sprint Backlog**: Selected items from the Product Backlog to be completed during a Sprint.\n* **Daily Scrum (Stand-up)**: Brief daily meeting where team members share progress, challenges, and plans for the day.\n* **Sprint Review**: Meeting at the end of a Sprint to demonstrate completed work and gather feedback.\n* **Sprint Retrospective**: Meeting to reflect on the Sprint, identify improvements, and adjust processes for the next Sprint.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is scrum and how to get started",
"url": "https://www.atlassian.com/agile/scrum.",
"type": "article"
},
{
"title": "Scrum Methodology: The Complete Guide & Best Practices",
"url": "https://thedigitalprojectmanager.com/projects/pm-methodology/scrum-methodology-complete-guide/",
"type": "article"
},
{
"title": "Essential Topics for the Scrum Product Owner",
"url": "https://www.scrum.org/resources/blog/essential-topics-scrum-product-owner",
"type": "article"
},
{
"title": "Scrum • Topics - Thriving Technologist",
"url": "https://thrivingtechnologist.com/topics/scrum/",
"type": "article"
}
]
},
"7fL9lSu4BD1wRjnZy9tM9": {
"title": "XP",
@ -1479,8 +1500,24 @@
},
"UCCT7-E_QUKPg3jAsjobx": {
"title": "TCP/IP Model",
"description": "",
"links": []
"description": "The `TCP/IP model` defines how devices should transmit data between them and enables communication over networks and large distances. The model represents how data is exchanged and organized over networks. It is split into four layers, which set the standards for data exchange and represent how data is handled and packaged when being delivered between applications, devices, and servers.\n\n* **Network Access Layer**: The network access layer is a group of applications requiring network communications. This layer is responsible for generating the data and requesting connections.\n \n* **Internet Layer**: The internet layer is responsible for sending packets from a network and controlling their movement across a network to ensure they reach their destination.\n \n* **Transport Layer**: The transport layer is responsible for providing a solid and reliable data connection between the original application or device and its intended destination.\n \n* **Application Layer**: The application layer refers to programs that need TCP/IP to help them communicate with each other.\n \n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is Transmission Control Protocol TCP/IP? - Fortinet",
"url": "https://www.fortinet.com/resources/cyberglossary/tcp-ip#:~:text=The%20TCP%2FIP%20model%20defines,exchanged%20and%20organized%20over%20networks.",
"type": "article"
},
{
"title": "TCP/IP Model",
"url": "https://www.geeksforgeeks.org/tcp-ip-model/",
"type": "article"
},
{
"title": "What is TCP/IP and How Does it Work?",
"url": "https://www.techtarget.com/searchnetworking/definition/TCP-IP",
"type": "article"
}
]
},
"Nq6o6Ty8VyNRsvg-UWp7D": {
"title": "HTTP, HTTPS",

@ -1,7 +1,7 @@
{
"R9DQNc0AyAQ2HLpP4HOk6": {
"title": "What are Relational Databases?",
"description": "Relational databases are a type of database management system (DBMS) that stores and provides access to data points that are related to one another. Based on the relational model introduced by E.F. Codd in 1970, they use a structure that allows data to be organized into tables with rows and columns. Key features include:\n\n* Use of SQL (Structured Query Language) for querying and managing data\n* Support for ACID transactions (Atomicity, Consistency, Isolation, Durability)\n* Enforcement of data integrity through constraints (e.g., primary keys, foreign keys)\n* bility to establish relationships between tables, enabling complex queries and data retrieval\n* Scalability and support for multi-user environments\n\nExamples of popular relational database systems include MySQL, PostgreSQL, Oracle, and Microsoft SQL Server. They are widely used in various applications, from small-scale projects to large enterprise systems, due to their reliability, consistency, and powerful querying capabilities.\n\nLearn more from the following resources:",
"description": "Relational databases are a type of database management system (DBMS) that stores and provides access to data points that are related to one another. Based on the relational model introduced by E.F. Codd in 1970, they use a structure that allows data to be organized into tables with rows and columns. Key features include:\n\n* Use of SQL (Structured Query Language) for querying and managing data\n* Support for ACID transactions (Atomicity, Consistency, Isolation, Durability)\n* Enforcement of data integrity through constraints (e.g., primary keys, foreign keys)\n* Ability to establish relationships between tables, enabling complex queries and data retrieval\n* Scalability and support for multi-user environments\n\nExamples of popular relational database systems include MySQL, PostgreSQL, Oracle, and Microsoft SQL Server. They are widely used in various applications, from small-scale projects to large enterprise systems, due to their reliability, consistency, and powerful querying capabilities.\n\nLearn more from the following resources:",
"links": [
{
"title": "What is a relational database - AWS",

@ -24,11 +24,6 @@
"url": "https://www.businessballs.com/improving-workplace-performance/nudge-theory/",
"type": "article"
},
{
"title": "Nudge Theory Explained with Examples (on YouTube)",
"url": "https://www.youtube.com/watch?v=u3yxxteiyya&ab_channel=epm",
"type": "video"
},
{
"title": "Nudge Theory Explained in less than 10 minutes",
"url": "https://youtu.be/fA5eGIMZTRQ",

Loading…
Cancel
Save