Creating a Lifecycle Policy for an S3 Bucket – Parsing Logs and Events with AWS Native Tools – SCS-C02 Study Guide

Creating a Lifecycle Policy for an S3 Bucket This exercise uses the AWS Management Console. To create a Lifecycle policy on a new S3 bucket, perform the following steps: Figure 9.2: Configuration for S3 bucket screen This will bring up the Lifecycle rules section in the middle of the main screen. It should have a […]

Getting hands-on with Amazon Comprehend – AWS Application Services for AI/ML – MLS-C01 Study Guide

Getting hands-on with Amazon Comprehend In this section, you will build a pipeline where you can integrate AWS Lambda with Amazon Rekognition and Amazon Comprehend. You will then read an image file stored in an S3 bucket and detect the language of the text that has been extracted from the image. You will also use […]

Territory hierarchy access – Understanding Salesforce sharing and security – Salesforce Certified Data Architect Study Guide

Territory hierarchy access It is possible to create a hierarchy to represent your organization’s sales territories. This essentially facilitates automatic account assignment based on criteria to denote it belonging to a particular branch of the territory model. Chapter 12, Territory Management, covers territory management in further detail. Programmatic sharing Using what used to be known […]

Gateways – Connecting On-Premises Networks – ANS-C01 Study Guide

Gateways A gateway is a device or software that interconnects dissimilar systems. A gateway translates between two networks with different protocols, as shown in Figure 7.5. Routers and gateways are terms that are often used interchangeably, and while there is a lot of overlap in functionality, there are also differences that distinguish the roles they are used for. […]

NullPointerException – Data Manipulation Language (DML) – Salesforce Certified Platform Developer I Study Guide

5.5 NullPointerException In Apex, a NullPointerException occurs when you attempt to access or manipulate an object that is null. In other words, you are trying to perform an operation on an object reference that doesn’t point to any instance of an object. This can lead to runtime errors and unexpected behavior in your Apex code. […]

Defining Text Blocks – Building Blocks – 1Z0-829 Study Guide

Defining Text Blocks Earlier we saw a simple String with the value “hello”. What if we want to have a String with something more complicated? For example, let’s figure out how to create a String with this value: “Java Study Guide” by Scott & Jeanne Building this as a String requires two things you haven’t […]

AWS WAF – Networking and Connectivity – SOA-C02 Study Guide

AWS WAF This section covers the following objective of Domain 5 (Networking and Content Delivery) from the official AWS Certified SysOps Administrator – Associate (SOA-C02) exam guide: 5.1 Implement networking features and connectivity CramSaver If you can correctly answer these questions before going through this section, save time by skimming the Exam Alerts in this […]

Important note – AWS Application Services for AI/ML – MLS-C01 Study Guide

Important note It is a best practice not to overprovision your function’s timeout settings. Always understand your code performance and set a function timeout accordingly. Overprovisioning a function timeout results in Lambda functions running longer, causing unexpected costs. If you are using asynchronous API calls in your Lambda function, then it is good to write […]

Switching – Connecting On-Premises Networks – ANS-C01 Study Guide

Switching Layer 2 switching forwards Ethernet frames at the data link layer, which is layer 2 of the OSI model. The switch examines the Media Access Control (MAC) address of each frame and builds a forwarding table based on the source MAC address to determine the interface where the frames are to be forwarded. All […]

Sharing rules – Understanding Salesforce sharing and security – Salesforce Certified Data Architect Study Guide

Sharing rules Sharing rules exist to provide exceptions to the OWD and role hierarchy, opening up users record access based on conditions. Sharing rules fall into two categories: Manual sharing In bespoke sharing scenarios not covered by the mechanisms we’ve covered already, manual sharing exists to provide a facility to manually share a record, granting […]