THE AWS CERTIFIED ADVANCED NETWORKING – SPECIALTY EXAM OBJECTIVES COVERED IN THIS CHAPTER MAY INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING: Task Statement 2.1: Implement routing and connectivity between on-premises networks and the AWS Cloud. On-Premises Network Connectivity In this chapter, you will continue to learn about hybrid networking. In Chapter 6, “Hybrid Networking,” […]
An interface in Apex specifies a set of methods that implementing classes must provide. Interfaces enable a form of multiple inheritance, allowing a class to implement multiple interfaces. It is similar to a class, but it does not have any of its methods implemented. Instead, each method’s body is empty, and only the method signatures […]
Creating Objects Our programs wouldn’t be able to do anything useful if we didn’t have the ability to create new objects. Remember that an object is an instance of a class. In the following sections, we look at constructors, object fields, instance initializers, and the order in which values are initialized. Calling Constructors To create […]
Understanding Salesforce sharing and security Any data access in Salesforce is determined by a layered security model. With each layer, data access is gradually opened up. Therefore, it is imperative that at the lowest level the sharing and security requirements are well understood in order to configure the security settings as appropriate. The layers of […]
Here are some considerations: Figure 8.1: EBS volume attach, snapshot, and restore Amazon Elastic File System (EFS) offers a managed Network File System (NFS) that can scale to petabytes without disruptions. With EFS, typically the amount of IOPS and throughput you get depends on your storage size. The larger your storage, the more IOPS and […]
The previous chapter showed you how the CloudWatch service can help collect and store logs from a myriad of services in AWS. You are now ready to turn your attention to the most cost-effective ways to retain those log files for long-term storage, along with the methods to pull out the necessary data from them. […]
Exploring the benefits of Amazon Rekognition Here are some of the benefits of using Amazon Rekognition: With or without knowledge of image processing, you can perform image and video analysis just by using the APIs provided in Amazon Rekognition, which can be used for any application or service on several platforms. Getting hands-on with Amazon […]
Gateway Endpoints A gateway endpoint connects to DynamoDB or S3. You configure the route table within your VPC to send traffic over a VPC endpoint instead of the Internet. A VPC can have multiple gateway endpoints to different services in a route table. This greatly enhances security. For example, for a private subnet in a […]
Private class is a class that can only be accessed within the same Apex class or trigger in which it is defined. It cannot be accessed outside of the class or trigger, including within other classes or triggers in the same Salesforce organization. Private classes are primarily used for encapsulating functionality that is specific to […]
Creating a JAR File Some JARs are created by others, such as those downloaded from the Internet or created by a teammate. Alternatively, you can create a JAR file yourself. To do so, you use the jar command. The simplest commands create a jar containing the files in the current directory. You can use the […]