Create a custom role In addition to built-in roles available in Azure, you might need to create a custom role to provide a set of permissions that are not available in any of the built-in roles. Custom roles can be created and assigned through the Azure portal, Azure PowerShell, Azure CLI, and REST API. This […]
Reviewing Primitive Assignments See if you can figure out why each of the following lines does not compile: int fish = 1.0; // DOES NOT COMPILE short bird = 1921222; // DOES NOT COMPILE int mammal = 9f; // DOES NOT COMPILE long reptile = 192_301_398_193_810_323; // DOES NOT COMPILE The first statement does not […]
Preserving traceability and business rule context In line with our establishment of a golden record, or single source of truth, it is important that an MDM strategy plays nicely with existing business rules, and changes to data are preserved throughout the organization. For example, the process of creating a bank account in a connected system […]
Understand how RBAC works The specific permissions that are applied to a resource with RBAC are defined in a role definition. A role definition contains the list of permissions—or declared permissions—and those permissions define what actions can or cannot be performed against a type of resource, such as read, write, or delete. Role definitions, or roles, can be […]
Assigning Values Compilation errors from assignment operators are often overlooked on the exam, in part because of how subtle these errors can be. To be successful with the assignment operators, you should be fluent in understanding how the compiler handles numeric promotion and when casting is required. Being able to spot these issues is critical […]
Using Bastion Hosts to Connect to Your VPC Bastion hosts are used to gain access to your instances that reside within your private subnets from the internet, and the bastion itself resides within the public subnet. The difference between a public subnet and a private subnet is that subnets only become classed as public when […]
Understand how RBAC works Role-based access control (RBAC) facilitates the management of access to Azure resources by entities referred to as security principals, as well as controls what actions those entities can perform. In addition to determining who can do what, in Azure, access can be granted to users, groups, service principals, and managed identities through role assignments, […]
9.2 Try-Catch Method In Apex, the Try-Catch method is used to handle exceptions that may occur during the execution of a block of code. It allows you to catch and handle specific types of exceptions, preventing your code from crashing and providing error handling capabilities. If you try to execute the code example as follows […]
Configure self-service password reset The password reset is one of the highest cost-incurring activities for many organizations, and many organizations have dedicated front-line help desks to handle such requests. Self-service password reset (SSPR) allows users to reset their own passwords in Microsoft Entra ID, including the ability to optionally write the password back to an on-premises environment when […]
Taking care of Scalability Configurations To kickstart auto scaling for your model, you can take advantage of the SageMaker console, AWS Command Line Interface (AWS CLI), or an AWS SDK through the Application Auto Scaling API. For those inclined towards the CLI or API, the process involves registering the model as a scalable target, defining […]