Scaling with CloudFormation StackSets – Establishing a Deployment Strategy – SAP-C02 Study Guide

Scaling with CloudFormation StackSets Imagine you have created your AWS resources using CloudFormation templates only to realize some time later that you actually need to roll out and manage the same stack in multiple accounts across multiple AWS Regions. If the stacks were to be managed independently of each other, creating them separately one by […]

Salesforce holding the golden record associations – Master Data Management – Salesforce Certified Data Architect Study Guide

Salesforce holding the golden record associations In scenarios where Salesforce is to be considered as the data master for customer information, connected system identifiers can be represented as either custom fields on a particular record, or as a custom object associated with the record. For example, a contact record in Salesforce is the golden record […]

Complement and Negation Operators – Operators – 1Z0-829 Study Guide

Complement and Negation Operators Since we’re going to be working with a lot of numeric operators in this chapter, let’s get the boolean one out of the way first. The logical complement operator (!) flips the value of a boolean expression. For example, if the value is true, it will be converted to false, and […]

ACLs – Configuring Infrastructure Security – SCS-C02 Study Guide

NACLs NACLs are a type of security control used in VPC environments that act as a firewall for inbound and outbound traffic at the subnet level. They are stateless, meaning that they apply to all traffic regardless of the connection state. The primary role of NACLs in VPC security is to provide an additional layer […]

Execution Context – Access Control and Permissions – Salesforce Certified Platform Developer I Study Guide

8.1 Execution Context In Apex, there are two types of execution contexts such as system execution context and user execution context. User execution context is when a user clicks a button or link, for example, that executes Apex code. When a system event or process executes Apex code, a system execution context is created. Apex […]

Multi Protocol Label Switching – Inter-VPC and Multi-account Networking – ANS-C01 Study Guide

Multi Protocol Label Switching Multi Protocol Label Switching (MPLS) is a networking architecture commonly used in telecommunications networks and has replaced traditional IP routing. Labels, or tags, are used to create a predefined path through the carrier’s wide-area network. MPLS networks are a common offering by service providers and telephone companies worldwide and are widely […]

Model tuning – Amazon SageMaker Modeling – MLS-C01 Study Guide

Model tuning In Chapter 7, Evaluating and Optimizing Models, you learned many important concepts about model tuning. Let’s now explore this topic from a practical perspective. In order to tune a model on SageMaker, you have to call create_hyper_parameter_tuning_job and pass the following main parameters: In SageMaker, the main metric that you want to use […]

Reusing Common Patterns – Establishing a Deployment Strategy – SAP-C02 Study Guide

Reusing Common Patterns As your environment expands on AWS, you may identify a need to reuse the same resource configurations over and over from one stack to the next across teams or projects. For instance, you may want to implement best practices across various projects by enforcing some specific guidelines in their infrastructure resource configurations, […]

The golden record – Master Data Management – Salesforce Data Architect Theory – Salesforce Certified Data Architect Study Guide

The golden record As we now know, the golden record, or single source of truth, is essentially a data record where the definitive source of information is stored in order to orchestrate business operations. Users should be able to view a golden record to see the correct version of a piece of information. While the […]

Cram Quiz 2 – Troubleshoot Network Connectivity – SOA-C02 Study Guide

Cram Quiz Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can. 1. You want to identify and count requests that are hitting a web application from varying on-premises datacenters. All datacenters are in the same country but have different IP address […]