Remove geeksforgeeks links

pull/8326/head
Kamran Ahmed 1 month ago
parent e27146d549
commit fda56a5d30
  1. 2
      src/data/guides/java-vs-javascript.md
  2. 4
      src/data/roadmaps/computer-science/content/base@q3nRhTYS5wg9tYnQe2sCF.md
  3. 3
      src/data/roadmaps/computer-science/content/dcl@4bUmfuP2qgcli8I2Vm9zh.md
  4. 7
      src/data/roadmaps/computer-science/content/scheduling-algorithms@Ge2nagN86ofa2y-yYR1lv.md
  5. 1
      src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md
  6. 1
      src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md
  7. 1
      src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md
  8. 1
      src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md
  9. 6
      src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md
  10. 1
      src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md
  11. 6
      src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md
  12. 1
      src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md
  13. 1
      src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md
  14. 1
      src/data/roadmaps/data-analyst/content/types-of-data-analytics@Lsapbmg-eMIYJAHpV97nO.md
  15. 1
      src/data/roadmaps/datastructures-and-algorithms/content/102-data-structures/101-importance-of-datastructures.md
  16. 1
      src/data/roadmaps/datastructures-and-algorithms/content/105-sorting-algorithms/105-heap-sort.md
  17. 1
      src/data/roadmaps/datastructures-and-algorithms/content/106-search-algorithms/100-linear-search.md
  18. 1
      src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/102-avl-trees.md
  19. 1
      src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/103-b-trees.md
  20. 2
      src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/100-b-bplus-trees.md
  21. 1
      src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/101-skip-list.md
  22. 1
      src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/102-isam.md
  23. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/101-backtracking.md
  24. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/102-greedy-algorithms.md
  25. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/103-randomised-algorithms.md
  26. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/104-divide-and-conquer.md
  27. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/105-recursion.md
  28. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/106-dynamic-programming.md
  29. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/107-two-pointer-techniques.md
  30. 1
      src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/108-sliding-window-technique.md
  31. 1
      src/data/roadmaps/docker/content/104-data-persistence/102-bind-mounts.md
  32. 1
      src/data/roadmaps/game-developer/content/artificial-neural-network@AoH2r4EOHyZd8YaV24rBk.md
  33. 1
      src/data/roadmaps/game-developer/content/computer-graphics@lIb5MeDoqVj6HycveOgTS.md
  34. 1
      src/data/roadmaps/game-developer/content/mcts@QD9TfZn3yhGPVwiyJ6d0V.md
  35. 1
      src/data/roadmaps/git-github/content/collaborators@r-u1vTpUyuvsB0revOU0C.md
  36. 3
      src/data/roadmaps/javascript/content/block@uqEzHYx13Y2EpvTTRzykn.md
  37. 3
      src/data/roadmaps/postgresql-dba/content/relational-model@mDVbjdVN0spY7dI_8k1YW.md
  38. 1
      src/data/roadmaps/python/content/loops@Dvy7BnNzK55qbh_SgOk8m.md
  39. 3
      src/data/roadmaps/redis/content/lists@4-C4XqACUp4nvcMIj6djF.md
  40. 3
      src/data/roadmaps/redis/content/pipelining@LHlwjN3WHYUBUafzzwsWQ.md
  41. 4
      src/data/roadmaps/software-architect/content/important-skills-to-learn@lBtlDFPEQvQ_xtLtehU0S.md
  42. 4
      src/data/roadmaps/software-architect/content/levels-of-architecture@2sR4KULvAUUoOtopvsEBs.md
  43. 1
      src/data/roadmaps/software-architect/content/tcpip-model@UCCT7-E_QUKPg3jAsjobx.md
  44. 4
      src/data/roadmaps/software-architect/content/tools@SuMhTyaBS9vwASxAt39DH.md
  45. 4
      src/data/roadmaps/typescript/content/hybrid-types@lvtTSHH9yBTCiLng8btnI.md
  46. 3
      src/data/roadmaps/vue/content/binding-events@b7iXwtUnELg_ShbCyTrNA.md

@ -68,7 +68,7 @@ Usually saved in a .js file extension, this code will show **"Sign up on roadmap
### Java vs. JavaScript: Execution and runtime
Java is often used for server-side programming. It is a compiled language that requires a [Java Virtual Machine](https://www.geeksforgeeks.org/jvm-works-jvm-architecture/) **(JVM)** to run Java code. Before running your code, it's compiled into bytecode, a platform-independent format. The JVM then executes the bytecode to ensure that Java programs run on any system with JVM installed. It makes Java a good choice for large-scale applications that run on any operating system. These operating systems include Windows, macOS, Linux, and mobile devices.
Java is often used for server-side programming. It is a compiled language that requires a Java Virtual Machine **(JVM)** to run Java code. Before running your code, it's compiled into bytecode, a platform-independent format. The JVM then executes the bytecode to ensure that Java programs run on any system with JVM installed. It makes Java a good choice for large-scale applications that run on any operating system. These operating systems include Windows, macOS, Linux, and mobile devices.
![](https://assets.roadmap.sh/guest/java-vs-javascript-execution-and-runtime-csnnz.png)

@ -5,7 +5,3 @@ The rise in popularity of NoSQL databases provided a flexible and fluidity with
- **B**asically **A**vailable
- **S**oft state
- **E**ventual consistency
Visit the following resources to learn more:
- [@article@BASE Model vs. ACID Model](https://www.geeksforgeeks.org/acid-model-vs-base-model-for-database/)

@ -4,5 +4,4 @@ DCL includes commands such as GRANT and REVOKE which mainly deal with the rights
Visit the following resources to learn more:
- [@article@DCL](https://en.wikipedia.org/wiki/Data_Control_Language)
- [@article@DCL Commands](https://www.geeksforgeeks.org/sql-ddl-dql-dml-dcl-tcl-commands/)
- [@article@DCL](https://en.wikipedia.org/wiki/Data_Control_Language)

@ -13,10 +13,3 @@ Here is the list of some of the most commonly used scheduling algorithms:
- **Multi-level Feedback Queue Scheduling:** The processes are divided into different queues based on their priority. The process with the highest priority is allocated the CPU first. If a process is preempted, it is moved to the next queue. It is a preemptive algorithm.
- **Highest Response Ratio Next(HRRN):** CPU is allotted to the next process which has the highest response ratio and not to the process having less burst time. It is a Non-Preemptive algorithm.
- **Lottery Scheduling:** The process is allocated the CPU based on a lottery system. It is a preemptive algorithm.
Visit the following resources to learn more
- [@video@Introduction to CPU Scheduling](https://youtu.be/EWkQl0n0w5M?si=Lb-PxN_t-rDfn4JL)
- [@article@CPU Scheduling in Operating Systems - geeksforgeeks](https://www.geeksforgeeks.org/cpu-scheduling-in-operating-systems/)
- [@article@Lottery Scheduling for Operating Systems - geeksforgeeks](https://www.geeksforgeeks.org/lottery-process-scheduling-in-operating-system/)
- [@article@Program for Round Robin Scheduling for the same Arrival time - geeksforgeeks](https://www.geeksforgeeks.org/program-for-round-robin-scheduling-for-the-same-arrival-time/)

@ -7,5 +7,4 @@ Visit the following resources to learn more:
- [@article@What is DNS cache poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/)
- [@article@What Is DNS Poisoning?](https://www.fortinet.com/resources/cyberglossary/dns-poisoning)
- [@article@DNS Spoofing or DNS Cache poisoning](https://www.geeksforgeeks.org/dns-spoofing-or-dns-cache-poisoning/)
- [@article@DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning/)

@ -4,5 +4,4 @@
Learn more from the following resources:
- [@article@What is a loopback address?](https://www.geeksforgeeks.org/what-is-a-loopback-address/)
- [@article@Understanding the loopback address and loopback interfaces](https://study-ccna.com/loopback-interface-loopback-address/)

@ -14,4 +14,3 @@ This knowledge is essential for designing, implementing, and maintaining effecti
Learn more from the following resources:
- [@article@What are Network Protocols?](https://www.solarwinds.com/resources/it-glossary/network-protocols)
- [@article@Types of Network Topology](https://www.geeksforgeeks.org/types-of-network-topology/)

@ -4,5 +4,4 @@
Learn more from the following resources:
- [@article@What is an operating system?](https://www.geeksforgeeks.org/what-is-an-operating-system/)
- [@video@What is an operating system as fast as possible](https://www.youtube.com/watch?v=pVzRTmdd9j0)

@ -1,7 +1,3 @@
# Port Blocking
Port blocking is an essential practice in hardening the security of your network and devices. It involves restricting, filtering, or entirely denying access to specific network ports to minimize exposure to potential cyber threats. By limiting access to certain ports, you can effectively safeguard your systems against unauthorized access and reduce the likelihood of security breaches.
Learn more from the following resources:
- [@article@What is port blocking with LAN?](https://www.geeksforgeeks.org/what-is-port-blocking-within-lan/)
Port blocking is an essential practice in hardening the security of your network and devices. It involves restricting, filtering, or entirely denying access to specific network ports to minimize exposure to potential cyber threats. By limiting access to certain ports, you can effectively safeguard your systems against unauthorized access and reduce the likelihood of security breaches.

@ -4,5 +4,4 @@
Learn more from the following resources:
- [@article@What is a protocol analyzer?](https://www.geeksforgeeks.org/what-is-protocol-analyzer/)
- [@video@Protocol Analyzers](https://www.youtube.com/watch?v=hTMhlB-o0Ow)

@ -1,7 +1,3 @@
# route
The `route` command is a network utility used to view and manipulate the IP routing table on Unix-like and Windows systems. It allows users to display the current routes that data packets take, as well as add, modify, or delete routes for network traffic. This command is often used in network troubleshooting and configuration to control how data flows between different networks and subnets. By specifying routes manually, administrators can define specific paths for network traffic, bypassing default routes and optimizing performance or security.
Learn more from the following resources:
- [@article@How to check the routing table in Linux](https://www.geeksforgeeks.org/route-command-in-linux-with-examples/)
The `route` command is a network utility used to view and manipulate the IP routing table on Unix-like and Windows systems. It allows users to display the current routes that data packets take, as well as add, modify, or delete routes for network traffic. This command is often used in network troubleshooting and configuration to control how data flows between different networks and subnets. By specifying routes manually, administrators can define specific paths for network traffic, bypassing default routes and optimizing performance or security.

@ -4,5 +4,4 @@ A star network topology is a configuration where all devices (nodes) are connect
Learn more from the following resources:
- [@article@Advantages and Disadvantages of Star Topology](https://www.geeksforgeeks.org/advantages-and-disadvantages-of-star-topology/)
- [@video@Star Topology](https://www.youtube.com/watch?v=EQ3rW22-Py0)

@ -4,5 +4,4 @@ In networking and cybersecurity, a handshake is a process of establishing a secu
Learn more from the following resources:
- [@article@TCP 3-Way Handshake Process](https://www.geeksforgeeks.org/tcp-3-way-handshake-process/)
- [@video@TLS Handshake Explained](https://www.youtube.com/watch?v=86cQJ0MMses)

@ -11,7 +11,6 @@ Data Analysts, as ambassadors of this domain, employ these types, to answer vari
Visit the following resources to learn more:
- [@article@Data Analytics and its type](https://www.geeksforgeeks.org/data-analytics-and-its-type/)
- [@article@The 4 Types of Data Analysis: Ultimate Guide](https://careerfoundry.com/en/blog/data-analytics/different-types-of-data-analysis/)
- [@video@Descriptive vs Diagnostic vs Predictive vs Prescriptive Analytics: What's the Difference?](https://www.youtube.com/watch?v=QoEpC7jUb9k)
- [@video@Types of Data Analytics](https://www.youtube.com/watch?v=lsZnSgxMwBA)

@ -4,5 +4,4 @@ Data structures are crucial in the field of computer science and coding because
Learn more from the following links:
- [@article@Why Data Structures and Algorithms Are Important to Learn?](https://www.geeksforgeeks.org/why-data-structures-and-algorithms-are-important-to-learn/)
- [@video@What are Data Structures? Why is it Important?](https://www.youtube.com/watch?v=18V8Avz2OH8)

@ -4,6 +4,5 @@ Heap Sort is an efficient, comparison-based sorting algorithm. It utilizes a dat
Learn more from the following resources:
- [@article@Heap Sort - W3Schools](https://www.geeksforgeeks.org/heap-sort/)
- [@article@Heap Sort Visualize](https://www.hackerearth.com/practice/algorithms/sorting/heap-sort/tutorial/)
- [@video@Heap sort in 4 minutes](https://www.youtube.com/watch?v=2DmK_H7IdTo)

@ -5,5 +5,4 @@ Linear search is one of the simplest search algorithms. In this method, every el
Learn more from the following resources:
- [@article@DSA Linear Search - W3Schools](https://www.w3schools.com/dsa/dsa_algo_linearsearch.php)
- [@article@Linear Search - GeeksForGeeks](https://www.geeksforgeeks.org/linear-search/)
- [@video@Learn Linear Search in 3 minutes](https://www.youtube.com/watch?v=246V51AWwZM)

@ -4,5 +4,4 @@ An **AVL tree** is a type of binary search tree that is self-balancing, which me
Learn more from the following links:
- [@article@AVL Tree Data Structure](https://www.geeksforgeeks.org/introduction-to-avl-tree/)
- [@video@AVL trees in 5 minutes — Intro & Search](https://www.youtube.com/watch?v=DB1HFCEdLxA)

@ -4,5 +4,4 @@ B-Tree is a self-balanced search tree data structure that maintains sorted data
Learn more from the following links:
- [@article@Introduction of B-Tree](https://www.geeksforgeeks.org/introduction-of-b-tree-2/)
- [@video@B-trees in 4 minutes — Intro](https://www.youtube.com/watch?v=FgWbADOG44s)

@ -4,6 +4,4 @@
Learn more from the following resources:
- [@article@Introduction of B Tree](https://www.geeksforgeeks.org/introduction-of-b-tree-2/)
- [@article@Introduction of B+ Tree](https://www.geeksforgeeks.org/introduction-of-b-tree/)
- [@video@B Trees and B+ Trees. How they are useful in Databases](https://www.youtube.com/watch?v=aZjYr87r1b8)

@ -4,5 +4,4 @@ A **Skip List** is a probabilistic data structure that allows efficient search,
Learn more from the following resources:
- [@article@Skip List – Efficient Search, Insert and Delete in Linked List](https://www.geeksforgeeks.org/skip-list/)
- [@video@Skip Lists](https://www.youtube.com/watch?v=NDGpsfwAaqo)

@ -4,5 +4,4 @@ ISAM, which stands for Indexed Sequential Access Method, is a type of disk stora
Learn more from the following resources:
- [@article@ISAM in Database](https://www.geeksforgeeks.org/isam-in-database/)
- [@video@DBMS - Index Sequential Access Method (ISAM)](https://www.youtube.com/watch?v=EiW1VVPor10)

@ -4,5 +4,4 @@ Backtracking is a powerful algorithmic technique that aims to solve a problem in
Learn more from the following links:
- [@article@Backtracking Algorithm](https://www.geeksforgeeks.org/backtracking-algorithms/)
- [@video@What is backtracking?](https://www.youtube.com/watch?v=Peo7k2osVVs)

@ -4,5 +4,4 @@ Greedy algorithms follow the problem-solving heuristic of making the locally opt
Learn more from the following links:
- [@article@Greedy Algorithm Tutorial – Examples, Application and Practice Problem](https://www.geeksforgeeks.org/introduction-to-greedy-algorithm-data-structures-and-algorithm-tutorials/)
- [@video@Greedy Algorithms Tutorial ](https://www.youtube.com/watch?v=bC7o8P_Ste4)

@ -4,5 +4,4 @@ Randomised algorithms are a type of algorithm that employs a degree of randomnes
Learn more from the following links:
- [@article@Randomized Algorithms](https://www.geeksforgeeks.org/randomized-algorithms/)
- [@video@Algorithm Classification Randomized Algorithm](https://www.youtube.com/watch?v=J_EVG6yCOz0)

@ -4,5 +4,4 @@ Divide and conquer is a powerful algorithm design technique that solves a proble
Learn more from the following links:
- [@article@Introduction to Divide and Conquer Algorithm](https://www.geeksforgeeks.org/introduction-to-divide-and-conquer-algorithm/)
- [@video@Divide & Conquer Algorithm In 3 Minutes](https://www.youtube.com/watch?v=YOh6hBtX5l0)

@ -4,5 +4,4 @@ Recursion is a method where the solution to a problem depends on solutions to sh
Learn more from the following links:
- [@article@Introduction to Recursion](https://www.geeksforgeeks.org/introduction-to-recursion-2/)
- [@video@Recursion in 100 Seconds](https://www.youtube.com/watch?v=rf60MejMz3E)

@ -4,7 +4,6 @@
Learn more from the following links:
- [@article@Dynamic Programming (DP) Tutorial with Problems](https://www.geeksforgeeks.org/introduction-to-dynamic-programming-data-structures-and-algorithm-tutorials/)
- [@article@Getting Started with Dynamic Programming in Data Structures and Algorithms](https://medium.com/@PythonicPioneer/getting-started-with-dynamic-programming-in-data-structures-and-algorithms-126c7a16775c)
- [@video@What Is Dynamic Programming and How To Use It](https://www.youtube.com/watch?v=vYquumk4nWw&t=4s)
- [@video@5 Simple Steps for Solving Dynamic Programming Problems](https://www.youtube.com/watch?v=aPQY__2H3tE)

@ -4,7 +4,6 @@ The **two-pointer technique** is a strategy that can be used to solve certain ty
Learn more from the following links:
- [@article@Two Pointers Technique](https://www.geeksforgeeks.org/two-pointers-technique/)
- [@article@Two Pointers Technique](https://medium.com/@johnnyJK/data-structures-and-algorithms-907a63d691c1)
- [@article@Mastering the Two Pointers Technique: An In-Depth Guide](https://lordkonadu.medium.com/mastering-the-two-pointers-technique-an-in-depth-guide-3c2167584ccc)
- [@video@Visual introduction Two Pointer Algorithm](https://www.youtube.com/watch?v=On03HWe2tZM)

@ -4,6 +4,5 @@ The **Sliding Window Technique** is an algorithmic paradigm that manages a subse
Learn more from the following links:
- [@article@Sliding Window Technique](https://www.geeksforgeeks.org/window-sliding-technique/)
- [@article@Mastering Sliding Window Techniques](https://medium.com/@rishu__2701/mastering-sliding-window-techniques-48f819194fd7)
- [@video@Sliding window technique](https://www.youtube.com/watch?v=p-ss2JNynmw)

@ -5,4 +5,3 @@ Bind mounts have limited functionality compared to volumes. When you use a bind
Visit the following resources to learn more:
- [@official@Docker Bind Mounts](https://docs.docker.com/storage/bind-mounts/)
- [@article@How to Use Bind Mount in Docker?](https://www.geeksforgeeks.org/how-to-use-bind-mount-in-docker/)

@ -4,6 +4,5 @@ Artificial Neural Networks (ANN) are a branch of machine learning that draw insp
Visit the following resources to learn more:
- [@article@Artificial Neural Networks (ANN)](https://www.geeksforgeeks.org/artificial-neural-networks-and-its-applications/)
- [@article@What is ANN?](https://www.coursera.org/articles/artificial-neural-network)
- [@article@What is Neural Network?](https://www.ibm.com/topics/neural-networks)

@ -4,6 +4,5 @@ Computer Graphics is a subfield of computer science that studies methods for dig
Visit the following resources to learn more:
- [@article@What is Computer Graphics?](https://www.geeksforgeeks.org/introduction-to-computer-graphics/)
- [@article@Introduction to Computer Graphics](https://open.umn.edu/opentextbooks/textbooks/420)
- [@video@How do Video Game Graphics Work?](https://www.youtube.com/watch?v=C8YtdC8mxTU)

@ -5,4 +5,3 @@
Visit the following resources to learn more:
- [@article@MCTS Algorithm](https://en.wikipedia.org/wiki/Monte_Carlo_tree_search/)
- [@article@Monte Carlo Tree Search](https://www.geeksforgeeks.org/ml-monte-carlo-tree-search-mcts/)

@ -6,6 +6,5 @@ Visit the following resources to learn more:
- [@official@How to add collaborators to your personal projects](https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-access-to-your-personal-repositories/inviting-collaborators-to-a-personal-repository)
- [@official@Adding outside collaborators to repositories in your organization](https://docs.github.com/en/organizations/managing-user-access-to-your-organizations-repositories/managing-outside-collaborators/adding-outside-collaborators-to-repositories-in-your-organization)
- [@article@What are github collaborators](https://www.geeksforgeeks.org/what-are-github-collaborators/)
- [@article@How to Add Collaborators to Your GitHub Repository](https://www.blinkops.com/blog/how-to-add-collaborators-to-your-github-repository)
- [@video@Using Github for Team collaboration](https://youtu.be/4nyIS58ORWw?si=yK5LCONNVm9OIUK5)

@ -4,5 +4,4 @@ This scope restricts the variable that is declared inside a specific block, from
Visit the following resources to learn more:
- [@article@JavaScript Scope](https://www.w3schools.com/js/js_scope.asp)
- [@article@Block Scoping in JavaScript](https://www.geeksforgeeks.org/javascript-es2015-block-scoping)
- [@article@JavaScript Scope](https://www.w3schools.com/js/js_scope.asp)

@ -4,5 +4,4 @@ The relational model is an approach to organizing and structuring data using tab
Learn more from the following resources:
- [@article@What is the Relational Model?](https://www.postgresql.org/docs/7.1/relmodel-oper.html)
- [@article@The Relational Model](https://www.geeksforgeeks.org/relational-model-in-dbms/)
- [@article@What is the Relational Model?](https://www.postgresql.org/docs/7.1/relmodel-oper.html)

@ -4,7 +4,6 @@ Loops are used to execute a block of code repeatedly.
Visit the following resources to learn more:
- [@article@Loops in Python](https://www.geeksforgeeks.org/loops-in-python/)
- [@article@Python "while" Loops (Indefinite Iteration)](https://realpython.com/python-while-loop/)
- [@article@Python "for" Loops (Definite Iteration)](https://realpython.com/python-for-loop/#the-guts-of-the-python-for-loop)
- [@video@Python For Loops](https://www.youtube.com/watch?v=KWgYha0clzw)

@ -4,5 +4,4 @@ Lists in Redis are ordered collections of string elements, allowing operations s
Learn more from the following resources:
- [@official@Redis Lists](https://redis.io/docs/latest/develop/data-types/lists/)
- [@article@Complete Guide to Redis Lists](https://www.geeksforgeeks.org/complete-guide-to-redis-lists/)
- [@official@Redis Lists](https://redis.io/docs/latest/develop/data-types/lists/)

@ -4,5 +4,4 @@ Pipelining in Redis is a technique that allows clients to send multiple commands
Learn more from the following resources:
- [@official@Redis Pipelining](https://redis.io/docs/latest/develop/use/pipelining/)
- [@article@Complete Guide to Redis Pipelining](https://www.geeksforgeeks.org/complete-guide-to-redis-pipelining/)
- [@official@Redis Pipelining](https://redis.io/docs/latest/develop/use/pipelining/)

@ -12,7 +12,3 @@ To support the laid-out activities specific skills are required. From my experie
- Balance
- Consult
- Market
Visit the following resources to learn more:
- [@article@Software Architect Skills](https://www.geeksforgeeks.org/software-architects-skills/)

@ -5,7 +5,3 @@ Architecture can be done on several “levels” of abstractions. The level infl
- **Application Level:** The lowest level of architecture. Focus on one single application. Very detailed, low level design. Communication is usually within one development team.
- **Solution Level:** The mid-level of architecture. Focus on one or more applications which fulfill a business need (business solution). Some high, but mainly low-level design. Communication is between multiple development teams.
- **Enterprise Level:** The highest level of architecture. Focus on multiple solutions. High level, abstract design, which needs to be detailed out by solution or application architects. Communication is across the organization.
Visit the following resources to learn more:
- [@article@Software Engineering Architecture](https://www.geeksforgeeks.org/software-engineering-architectural-design/)

@ -13,5 +13,4 @@ The `TCP/IP model` defines how devices should transmit data between them and ena
Visit the following resources to learn more:
- [@article@What is Transmission Control Protocol TCP/IP? - Fortinet](https://www.fortinet.com/resources/cyberglossary/tcp-ip#:~:text=The%20TCP%2FIP%20model%20defines,exchanged%20and%20organized%20over%20networks.)
- [@article@TCP/IP Model](https://www.geeksforgeeks.org/tcp-ip-model/)
- [@article@What is TCP/IP and How Does it Work?](https://www.techtarget.com/searchnetworking/definition/TCP-IP)git reset

@ -1,7 +1,3 @@
# Architect Tools
Architect tools are software tools that help architects to design, document, and manage software architectures. These tools can be used to create architecture diagrams, generate code, and automate the software development process.
Visit the following resources to learn more:
- [@article@Top 10 Software Architecture Tools in 2024](https://www.geeksforgeeks.org/software-architecture-tools/)

@ -24,7 +24,3 @@ type User = {
education: Education;
};
```
Learn more from the following links:
- [@official@Geeksforgeeks.org - Hybrid Types](https://www.geeksforgeeks.org/what-are-hybrid-types-in-typescript/#:~:text=Hybrid%20types%20are%20a%20combination,properties%20like%20a%20regular%20object.)

@ -4,5 +4,4 @@ Vue.js is an open-source Model–View–ViewModel front-end JavaScript framework
Visit the following resources to learn more:
- [@official@Binding Events](https://vuejs.org/guide/essentials/event-handling)
- [@article@Vue.js Event Handling](https://www.geeksforgeeks.org/vue-js-event-handling/)
- [@official@Binding Events](https://vuejs.org/guide/essentials/event-handling)
Loading…
Cancel
Save