Variables Data Types – Apex Programming – Salesforce Certified Platform Developer I Study Guide

4.3  Variables Data Types As the data types of variables in Apex are generally strongly typed, you must declare the data type when you declare a variable. Declaring a variable means defining a container for holding data. When you declare a variable, you are essentially creating a named storage location in the computer’s memory. In […]

CloudTrail Lake – Logging and Monitoring – SCS-C02 Study Guide

CloudTrail Lake AWS CloudTrail Lake is a solution that helps you store and analyze AWS CloudTrail data at a much larger scale instead of dealing with a single trail at a time. It uses Amazon S3, Amazon Athena, and AWS Glue to create a data lake that can store CloudTrail logs for an extended period […]

Baseline Network Performance – Logging and Monitoring – ANS-C01 Study Guide

Baseline Network Performance Baseline data collected from monitoring metrics and logs are used to understand your usage over time and to create a performance baseline. Baselines can help you understand what is considered a normal usage pattern. When the tracking data exceeds the baseline metrics, you will have visibility into what is out of range […]

Trusted Advisor – Security and Compliance – SOA-C02 Study Guide

Trusted Advisor AWS Trusted Advisor is a tool that performs checks on five different categories: Cost optimization Performance Security Fault tolerance Service limits For security and compliance, you should focus on the Security checks. When you go to the Trusted Advisor, you can click the Refresh All Checks button to see whether the Trusted Advisor has […]

Establishing a Business Continuity Plan – Ensuring Business Continuity – SAP-C02 Study Guide

Establishing a Business Continuity Plan It may sound obvious, but every measure you take to protect your workload against a disaster should be carefully considered and planned accordingly. First, these measures will have a significant impact on your solution design. Second, the cost of your solution will increase with the degree of protection against a […]

Introducing the Salesforce Data Architect Journey – Salesforce Data Architect Theory – Salesforce Certified Data Architect Study Guide

1 Introducing the Salesforce Data Architect Journey The Salesforce Certified Data Architect credential is an important part of every Salesforce Architect’s certification journey. It forms a constituent part of the Application Architect domain of the Certified Technical Architect credential, but it can stand alone, given the varying complexities and knowledge required to pass the exam. […]

Data Events for S3 Buckets – Logging and Monitoring – SCS-C02 Study Guide

Data Events for S3 Buckets When you created your new trail, you enabled the data events for S3 objects. These logs closely resemble the S3 access logs but are stored in the CloudTrail logging system rather than a specified S3 bucket (in the case of S3 access logs). One of the most obvious reasons to […]

Automating Recovery for Components Constrained to a Single Location – SAP-C02 Study Guide

Automating Recovery for Components Constrained to a Single Location In some cases, it will not be possible to run components of the workload across multiple AZs. For example, all nodes of an Amazon EMR cluster are launched in the same AZ to improve job performance thanks to reduced latency and thus a higher data access […]

Conclusion – Applying Machine Learning Algorithms – MLS-C01 Study Guide

Conclusion That was a really good accomplishment: you just mastered the basics of clustering algorithms and you should now be able to drive your own projects and research about this topic! For the exam, remember that clustering belongs to the unsupervised field of machine learning, so there is no need to have labeled data. Also, […]

Using Fault Isolation to Protect Your Data – Determining Security Requirements and Controls – SAP-C02 Study Guide

Using Fault Isolation to Protect Your Data Fault isolation limits the impact a failure can have on a workload to a limited set of components. This is a similar effect to the blast radius limitation that you want to achieve in terms of security. The idea is always the same: the components located outside of […]