Spaces:
Sleeping
Sleeping
{ | |
"Programming Platforms": { | |
"keywords": ["leetcode", "hackerrank", "codewars", "topcoder", "coding challenges", "competitive programming"], | |
"analogy": "a gym for programmers", | |
"expert_role": "a competitive programmer", | |
"target_audience": "aspiring software developers", | |
"related_topics": ["algorithm design", "data structures", "time complexity", "space complexity"] | |
}, | |
"Programming Languages": { | |
"keywords": ["python", "java", "javascript", "c++", "ruby", "go", "rust", "swift"], | |
"analogy": "different dialects in the world of coding", | |
"expert_role": "a polyglot programmer", | |
"target_audience": "software developers and computer science students", | |
"related_topics": ["syntax", "paradigms", "compilers", "interpreters", "type systems"] | |
}, | |
"Web Development": { | |
"keywords": ["html", "css", "react", "angular", "vue", "node.js", "django", "flask", "responsive design"], | |
"analogy": "building and decorating houses on the internet", | |
"expert_role": "a full-stack web developer", | |
"target_audience": "web designers and developers", | |
"related_topics": ["front-end", "back-end", "APIs", "databases", "web security"] | |
}, | |
"Data Science": { | |
"keywords": ["machine learning", "data analysis", "statistics", "big data", "data visualization", "neural networks"], | |
"analogy": "mining for insights in a sea of information", | |
"expert_role": "a data scientist", | |
"target_audience": "analysts and researchers", | |
"related_topics": ["predictive modeling", "clustering", "regression", "classification", "deep learning"] | |
}, | |
"Cloud Computing": { | |
"keywords": ["aws", "azure", "google cloud", "cloud computing", "serverless", "microservices"], | |
"analogy": "renting powerful computers and services over the internet", | |
"expert_role": "a cloud architect", | |
"target_audience": "IT professionals and business decision-makers", | |
"related_topics": ["scalability", "virtualization", "container orchestration", "cloud security"] | |
}, | |
"Cybersecurity": { | |
"keywords": ["network security", "encryption", "firewalls", "penetration testing", "ethical hacking"], | |
"analogy": "building and maintaining digital fortresses", | |
"expert_role": "a cybersecurity specialist", | |
"target_audience": "IT security professionals and concerned users", | |
"related_topics": ["threat detection", "incident response", "cryptography", "security policies"] | |
}, | |
"Artificial Intelligence": { | |
"keywords": ["ai", "machine learning", "neural networks", "deep learning", "natural language processing"], | |
"analogy": "teaching computers to think and learn like humans", | |
"expert_role": "an AI researcher", | |
"target_audience": "data scientists and AI enthusiasts", | |
"related_topics": ["computer vision", "reinforcement learning", "expert systems", "robotics"] | |
}, | |
"Mobile Development": { | |
"keywords": ["ios", "android", "react native", "flutter", "mobile apps", "responsive design"], | |
"analogy": "crafting pocket-sized software experiences", | |
"expert_role": "a mobile app developer", | |
"target_audience": "smartphone users and app creators", | |
"related_topics": ["user interface design", "app store optimization", "cross-platform development"] | |
}, | |
"Biology": { | |
"keywords": ["cell", "dna", "evolution", "genetics", "ecology", "photosynthesis", "organism"], | |
"analogy": "exploring the intricate machinery of life", | |
"expert_role": "a biologist", | |
"target_audience": "biology students and researchers", | |
"related_topics": ["cellular biology", "molecular biology", "genetics", "ecology", "evolution"] | |
}, | |
"General": { | |
"keywords": ["general", "miscellaneous", "other"], | |
"analogy": "a relevant comparison", | |
"expert_role": "a knowledgeable professional", | |
"target_audience": "interested individuals", | |
"related_topics": ["relevant concepts", "associated ideas", "connected subjects"] | |
} | |
} | |