Microsoft has long been a leader in the identity space. This leadership goes back to the intro- duction of Active Directory (AD) with Windows 2000 before the cloud even existed. Microsoft moved into cloud identity with the introduction of Azure Active Directory (Azure AD), now Microsoft Entra ID, which is used by more than 5 […]
Important note To remember this easily, you can think of t for Tiny, m for Medium, c for Compute, and p and g for GPU. The CPU-related family instance types are t, m, r, and c. The GPU-related family instance types are p and g. Choosing the right instance type for a training job There […]
Adding Parentheses You might have noticed we said “Unless overridden with parentheses” prior to presenting Table 2.1 on operator precedence. That’s because you can change the order of operation explicitly by wrapping parentheses around the sections you want evaluated first. Changing the Order of Operation Let’s return to the previous price example. The following code […]
Note The Outbound rules tab shows exactly the same fields as the Inbound rules tab. However, the rules affect the traffic going out of the resource rather than coming into the resource associated with the security group. Table 10.1 presents a quick comparison between how NACLs and security groups operate: Security Method Operates At Rule Types State […]
HTTP Status Codes from an Origin When a cache miss occurs, the content must be retrieved from the origin. To the origin, this appears as a web request. The origin may return an HTTP error code (4xx or 5xx status codes). You can monitor, alarm, and receive notifications that include these HTTP response codes. CloudFront […]
Note To run this code, it is a prerequisite to have the CDK CLI installed on your terminal. First, as illustrated in the preceding example, creating resources with the CDK is usually concise and much less verbose than with CloudFormation and its templates in YAML or JSON. This is due to the fact that the […]
Using Salesforce Connect to pull in data in real time for read-only purposes In scenarios where data on a Salesforce record doesn’t necessarily need to reside within Salesforce (pulled on -demand from one or more systems or data sources), Salesforce Connect can be used to effectively present data to a user as if it resides […]
Increment and Decrement Operators Increment and decrement operators, ++ and –, respectively, can be applied to numeric var-iables and have a high order of precedence compared to binary operators. In other words, they are often applied first in an expression. Increment and decrement operators require special care because the order in which they are attached […]
Multi Protocol Label Switching The key components of an MPLS network are the label edge router (LER) that performs the classification and assigns the label. Label switch routers (LSRs) are core routers in the network that switch packets based on the assigned MPLS label. Each router has a label information base (LIB) that maps incoming […]
8.3 Implementing Security. stripInaccessible() Method This method allows you to filter records based on the permissions of the current user. It can be used to remove fields and objects that the user does not have access to across a set of records. It´s often used when dealing with collections of records like a list of […]