4. 5.4 Develop code that uses Stream data methods and calculation methods Hello everyone. In this lesson we will focus on the fourth item of the Java Stream API topic in the Java Sea Programmer two exam syllabus that is developing code that uses stream data methods and calculation methods. Stream data methods and calculation […]
1. 5.1 Develop code to extract data from an object using peek() and map() methods i Hello everyone. In this lesson we will focus on the first item of the Java Stream API topic in the Javas Eight programmer two exam syllabus that is developing code to extract data from an object using Peak and […]
7. 3.7 Filter a collection by using lambda expressions Hello everyone. In this lesson, we will focus on the 7th item of the Generics and Collections topic and the JavaScript programmer two exam syllabus that is, filtering a collection by using lambda expressions. You can filter elements of a collection using the Remove If method. […]
1. 6.1 Use try-catch and throw statements Hello everyone. In this lesson, we will focus on the first item of the exceptions and assertions topic in the Java Se Eight Programmer Two exam syllabus that is using try, catch and throw statements. The try block is the first step in constructing an exception handler. In […]
5. Data States (OBJ 1.7) When developing a security architecture to protect our data, it’s important to understand that people can access or modify data at any point during its life cycle. We normally break this concept down into one of three data states data at Rest when data is being stored, data in Use […]
4. Demo Configure the NSX-T Edge Firewall In this video, we’ll configure the NSS 3.0 data centre gateway firewall, and I’ll be using the free labs available at hol.vmware.com to demonstrate these tasks. So we’re going to reconfigure the North and South firewalls. This is basically the perimeter firewall for our NSX domain, and the […]
1. NSX-T Firewalls Before we get started, I want to make sure that everybody understands the concept of a stateful firewall. So let’s break it down in a little diagram here. At the bottom left, you can see I’ve got a virtual machine, VM 1, that’s connected to a Layer 2 segmen, and it’s running […]
7. Load Balancing And in the next lesson, we’re going to do an extensive demo showing you how to set up load balancing in Nsxt two four. So let’s start with Layer 4 load balancing. And there are a couple of characteristics that I just want to mention. Load balancing is enabled on a Tier […]
1. Layer 2 Bridging And that’s the basic purpose of layer 2’s bridging. It allows you to connect an overlay segment with a VLAN. And you can have virtual machines or even physical servers with the same IP address range as your virtual machines that are connected to an NSX layer 2 segment. So now […]
11. NSX-T Routing Protocols Now, just bear in mind, the Tierzero Gateway is our north-south router. This is the router that’s going to form a relationship with the physical routers in our network. And so, how does it know which traffic to send to those physical routers? How does it learn routes from them? And […]