Cloud Academy – Getting Started with Azure Virtual Machines {2020}

Cloud Academy – Getting Started with Azure Virtual Machines {2020}
English | Size: 1.12 GB
Category: Tutorial


This course will give you a basic understanding of Azure virtual machines (VMs) and how you can use them in your Azure environments.
The course begins by introducing you to Azure VMs and what resources are necessary to deploy them, before moving onto pricing and the different virtual machine options available. Next, the course explores availability sets and availability zones and gives a demonstration that shows you how to create an availability set using the Azure portal.

Lynda – AWS Certified Solutions Architect Associate SAA C02 3 Virtual Private Cloud

Lynda – AWS Certified Solutions Architect Associate SAA C02 3 Virtual Private Cloud-APoLLo
English | Size: 821.34 MB
Category: Tutorial


Preparing for the AWS Certified Solutions Architect – Associate (SAA-C02) exam? This course is part of a nine-part series-completely updated for 2020-that prepares you to ace the critical qualifying exam. In this course, review a key subject covered on the test: Amazon Virtual Private Cloud (VPC), the networking layer for Amazon Elastic Compute Cloud (EC2). Instructor Tom Carpenter begins by providing an overview of creating and configuring VPCs, and then dives into a deeper discussion of networking infrastructure, including VPC peering. Plus, learn how AWS security groups work in tandem with network address translation (NAT) and gateways to secure your VPC.

PluralSight – Understanding the Java Virtual Machine Memory Management UPDATED 2020/05/08

PluralSight – Understanding the Java Virtual Machine Memory Management UPDATED 20200508-ELOHiM
English | Size: 163.63 MB
Category: Tutorial


Garbage Collection (GC) is a fundamental part of Java. Understanding how GC works is core to understanding how the Java Virtual Machine (JVM) works and will help you write better applications and to improve the performance of those applications. This course will look at all aspects of garbage collection, including looking at what ‘young’ and ‘old’ generations are, how the JVM moves objects between eden and survivor spaces, how memory is promoted into the ‘old’ generation, how different garbage collectors work and how they affect the running of your application. We will also look at ‘card tables’ and how they help manage memory in the old generation. We will examine each of the garbage collectors including the serial and parallel collectors; the CMS collector and the G1 collector. We cover the tools you can use to monitor GC including jstat and VisualVM. Finally we look at ways you interact with the GC through classes Such as Soft, Weak, and PhantomReference and their associated helpers ReferenceQueue and WeakHashMap

PluralSight – Understanding the Java Virtual Machine Security UPDATED 2020/05/13

PluralSight – Understanding the Java Virtual Machine Security UPDATED 20200513-ELOHiM
English | Size: 143.98 MB
Category: Tutorial


Java security is built around the idea of permissions and policy. Code is granted permissions based on the currently in-force policy. In this course we look at how the security manager and access controller work hand-in-hand to provide this security. The course covers how to set a security manager and how to set up and edit a policy file to grant the levels of permissions that code needs. Permissions are typically based on where code is loaded from but we also look at how to sign code, so that permissions can be based on who created a library. The course also looks at how the AccessController walk the call stack to check that a permission can be granted. While the JRE comes with a set of permissions, these are not always enough so the class covers creating and using your own permissions. Finally we cover the idea of ‘privileged scope’ which allows code to be granted some permission even when code around them should cause the grant to fail

Cisco ACI Virtual Edge 2.2.3b

Cisco ACI Virtual Edge 2.2.3b
English | Size: 1.02 GB
Category: Tutorial


Cisco Application Centric Infrastructure (ACI) Virtual Edge is a hypervisor-independent distributed service virtual machine (VM) that is specifically designed for Cisco ACI. It leverages the native distributed virtual switch that belongs to the hypervisor. Cisco ACI Virtual Edge runs in the user space, operates as a virtual leaf, and is managed by Cisco APIC.