Manage Azure identities and governance – AZ-104 Study Guide

Microsoft has long been a leader in the identity space. This leadership goes back to the intro- duction of Active Directory (AD) with Windows 2000 before the cloud even existed. Microsoft moved into cloud identity with the introduction of Azure Active Directory (Azure AD), now Microsoft Entra ID, which is used by more than 5 […]

Choosing the right instance type for a training job – Amazon SageMaker Modeling – MLS-C01 Study Guide

Important note To remember this easily, you can think of t for Tiny, m for Medium, c for Compute, and p and g for GPU. The CPU-related family instance types are t, m, r, and c. The GPU-related family instance types are p and g. Choosing the right instance type for a training job There […]

Adding Parentheses – Working with Binary Arithmetic Operators – 1Z0-829 Study Guide

Adding Parentheses You might have noticed we said “Unless overridden with parentheses” prior to presenting Table 2.1 on operator precedence. That’s because you can change the order of operation explicitly by wrapping parentheses around the sections you want evaluated first. Changing the Order of Operation Let’s return to the previous price example. The following code […]

Note – Configuring Infrastructure Security – SCS-C02 Study Guide

Note The Outbound rules tab shows exactly the same fields as the Inbound rules tab. However, the rules affect the traffic going out of the resource rather than coming into the resource associated with the security group. Table 10.1 presents a quick comparison between how NACLs and security groups operate: Security Method Operates At Rule Types State […]

HTTP Status Codes from an Origin – Troubleshoot Network Connectivity – SOA-C02 Study Guide

HTTP Status Codes from an Origin When a cache miss occurs, the content must be retrieved from the origin. To the origin, this appears as a web request. The origin may return an HTTP error code (4xx or 5xx status codes). You can monitor, alarm, and receive notifications that include these HTTP response codes. CloudFront […]

Amazon Elastic Container Service (ECS) – Establishing a Deployment Strategy – SAP-C02 Study Guide

Note To run this code, it is a prerequisite to have the CDK CLI installed on your terminal. First, as illustrated in the preceding example, creating resources with the CDK is usually concise and much less verbose than with CloudFormation and its templates in YAML or JSON. This is due to the fact that the […]

Using Salesforce Connect to pull in data in real time for read-only purposes – Master Data Management – Salesforce Certified Data Architect Study Guide

Using Salesforce Connect to pull in data in real time for read-only purposes In scenarios where data on a Salesforce record doesn’t necessarily need to reside within Salesforce (pulled on -demand from one or more systems or data sources), Salesforce Connect can be used to effectively present data to a user as if it resides […]

Increment and Decrement Operators – Operators – 1Z0-829 Study Guide

Increment and Decrement Operators Increment and decrement operators, ++ and –, respectively, can be applied to numeric var-iables and have a high order of precedence compared to binary operators. In other words, they are often applied first in an expression. Increment and decrement operators require special care because the order in which they are attached […]

Multi Protocol Label Switching – Inter-VPC and Multi-account Networking – ANS-C01 Study Guide

Multi Protocol Label Switching The key components of an MPLS network are the label edge router (LER) that performs the classification and assigns the label. Label switch routers (LSRs) are core routers in the network that switch packets based on the assigned MPLS label. Each router has a label information base (LIB) that maps incoming […]

Implementing Security. stripInaccessible() Method – Access Control and Permissions – Salesforce Certified Platform Developer I Study Guide

8.3 Implementing Security. stripInaccessible() Method This method allows you to filter records based on the permissions of the current user. It can be used to remove fields and objects that the user does not have access to across a set of records. It´s often used when dealing with collections of records like a list of […]