AWS App Runner – Establishing a Deployment Strategy – SAP-C02 Study Guide

AWS App Runner AWS App Runner is an AWS service that simplifies the deployment of web applications and APIs on AWS. App Runner goes a step further than Elastic Beanstalk by offering a software deployment environment fully managed by AWS. It does not just manage the EC2 instances supporting your application but also manages the […]

VPC Peering – Inter-VPC and Multi-account Networking – ANS-C01 Study Guide

VPC Peering VPC peering connections allow two or more VPCs to access resources in each VPC from the other, as shown in Figure 8.1. The AWS peering service has no bandwidth limitations, and there is no single failure point. It does not rely on gateways, Direct Connect, or VPN interconnections. This allows full IPv4 and IPv6 […]

CloudFront and HTTPs – Domains, DNS, and Content Delivery – SOA-C02 Study Guide

CloudFront and HTTPs When you create a CloudFront distribution, you can configure different options for HTTPs. One option is to redirect HTTP to HTTPs. This allows users to connect to the content with HTTP, but the traffic is then redirected to secure HTTPs. You can also set the distribution to HTTPs only, and HTTP requests […]

Create Triggers with Context Variables – Triggers and Bulk Processing – Salesforce Certified Platform Developer I Study Guide

Now when you insert new Contact records, this trigger ensures that the FirstName is set to “Max” and the LastName is set to “Blank” before the records are actually inserted into the Salesforce database. You can test the Apex trigger in your Salesforce environment by creating the new contact. Trigger events indicate when the trigger […]

Exam Readiness Drill – Chapter Review Questions – AWS Application Services for AI/ML – MLS-C01 Study Guide

Exam Readiness Drill – Chapter Review Questions Apart from a solid understanding of key concepts, being able to think quickly under time pressure is a skill that will help you ace your certification exam. That is why working on these skills early on in your learning journey is key. Chapter review questions are designed to […]

Summary – Building Blocks – 1Z0-829 Study Guide

Summary Java begins program execution with a main() method. The most common signature for this method run from the command line is public static void main(String[] args). Arguments are passed in after the class name, as in java NameOfClass firstArgument. Arguments are indexed starting with 0. Java code is organized into folders called packages. To […]

Inter-VPC and Multi-account Networking – ANS-C01 Study Guide

THE AWS CERTIFIED ADVANCED NETWORKING – SPECIALTY EXAM OBJECTIVES COVERED IN THIS CHAPTER MAY INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING: Task Statement 2.2: Implement routing and connectivity across multiple AWS accounts, Regions, and VPCs to support different connectivity patterns. Networking Services of VPCs This chapter will focus on interconnecting AWS virtual private clouds […]

Technical Requirements – Configuring Infrastructure Security – SCS-C02 Study Guide

Technical Requirements Access to AWS CLI and the AWS Management Console with an active account are both required for this chapter. A basic understanding of network terms will also help as you work through this chapter. If you need help understanding networking fundamentals and basic terms such as CIDR, route, and access control list, refresh […]

First – AWS Elastic Beanstalk – Establishing a Deployment Strategy – SAP-C02 Study Guide

First, make sure you have an EC2 instance profile that can be used for your Beanstalk environment. If you’re wondering what that is or how to create an EC2 instance profile, please refer to Chapter 5, Determining Security Requirements and Controls. The sample application simply displays Hello World on a web page, so you do not […]

Summary – Understanding Salesforce sharing and security – Salesforce Data Architect Theory – Salesforce Certified Data Architect Study Guide

Summary We’ve started our learning journey and begun with concepts around data modelling and design. We’ve covered sharing and security, delving into the various mechanisms available in Salesforce to control access to data. We’ve paid particular attention to how the OWDs and role hierarchy can have a profound impact on the data that your users […]