This is the slide deck of our Kickoff Saima - Session (Salesforce Architects in the Making)
The recording can be found on YouTube, through the following link:
https://youtu.be/bp3xFNRk7mM
The content is aimed towards Salesforce professionals, preparing for their technical architect journey.
It covers two topics:
- Implicit Sharing
- Record Locks & Skews
The document provides an overview of Lightning Message Service (LMS) and how to use it across Lightning Web Components (LWC), Aura, and Visualforce. LMS allows components to communicate by publishing and subscribing to messages on channels. In LWC, the messageService module is used to publish, subscribe, and handle messages. In Aura, the lightning:messageChannel component provides publishing and subscribing. In Visualforce, the $MessageChannel global and sforce.one functions are used.
This presentation is based on the Data model of Salesforce platform. I prepared this presentation for the DEV 401 certification discussion at Sabre Technologies.
This document provides a safe harbor statement for any forward-looking statements made in salesforce.com presentations. It notes that actual results could differ from forward-looking statements if risks and uncertainties materialize or assumptions prove incorrect. It lists various risks and uncertainties including those associated with new products and services, operating losses, fluctuations in operating results, service interruptions, intellectual property litigation, mergers and acquisitions, and the company's relatively limited operating history. The document states that additional information on risk factors is included in salesforce.com's annual report.
Join us as we provide an overview of how to integrate to Salesforce using the built-in tools, and look at integration on the different layers of Salesforce (User Interface, Data Logic, and Database). We'll be providing tips, best practices, and real-life examples.
Webinar: Take Control of Your Org with Salesforce OptimizerSalesforce Admins
The Salesforce Optimizer provides concise reports on over 25 metrics related to maintenance, productivity, and adoption in a Salesforce org. It analyzes sharing rules, workflow rules, user management, profiles and permission sets, fields, custom code, custom layouts, validation rules, and more. The reports identify prioritized insights and provide actionable recommendations and best practices to efficiently maintain customizations, reduce business and technical debt, increase admin and user productivity, and drive Salesforce usage. Additional resources are available in the Success Community and documentation to help admins utilize the reports for proactive maintenance, improving user experience, cleanup, and planning a transition to Lightning Experience.
While there are many ways to build integrations with salesforce, one of the fastest growing ways is through the Salesforce REST API. Join us as we explore the current REST-ful mechanisms available to the AppCloud, and see what the next year has to offer. In this session we will discuss the Salesforce REST API structure, Authenticating to the REST API, sObject Manipulation, and Composition through the REST API.
Endless Use Cases with Salesforce Experience Cloud by Dar VeverkaAlesia Dvorkina
Salesforce Experience Cloud allows organizations to create digital experiences like portals, communities, and customer service sites. It leverages Salesforce data and features like cases, flows, Lightning web components, and more. Experience Cloud can be used for partner portals, volunteer portals, donor portals, client portals, commerce sites, and any other type of external engagement site. The presentation covered license types, templates, and themes in Experience Cloud; common components like records, cases, Chatter, files, and flows; designing experiences; and resources for learning more.
The document provides an overview of Lightning Message Service (LMS) and how to use it across Lightning Web Components (LWC), Aura, and Visualforce. LMS allows components to communicate by publishing and subscribing to messages on channels. In LWC, the messageService module is used to publish, subscribe, and handle messages. In Aura, the lightning:messageChannel component provides publishing and subscribing. In Visualforce, the $MessageChannel global and sforce.one functions are used.
This presentation is based on the Data model of Salesforce platform. I prepared this presentation for the DEV 401 certification discussion at Sabre Technologies.
This document provides a safe harbor statement for any forward-looking statements made in salesforce.com presentations. It notes that actual results could differ from forward-looking statements if risks and uncertainties materialize or assumptions prove incorrect. It lists various risks and uncertainties including those associated with new products and services, operating losses, fluctuations in operating results, service interruptions, intellectual property litigation, mergers and acquisitions, and the company's relatively limited operating history. The document states that additional information on risk factors is included in salesforce.com's annual report.
Join us as we provide an overview of how to integrate to Salesforce using the built-in tools, and look at integration on the different layers of Salesforce (User Interface, Data Logic, and Database). We'll be providing tips, best practices, and real-life examples.
Webinar: Take Control of Your Org with Salesforce OptimizerSalesforce Admins
The Salesforce Optimizer provides concise reports on over 25 metrics related to maintenance, productivity, and adoption in a Salesforce org. It analyzes sharing rules, workflow rules, user management, profiles and permission sets, fields, custom code, custom layouts, validation rules, and more. The reports identify prioritized insights and provide actionable recommendations and best practices to efficiently maintain customizations, reduce business and technical debt, increase admin and user productivity, and drive Salesforce usage. Additional resources are available in the Success Community and documentation to help admins utilize the reports for proactive maintenance, improving user experience, cleanup, and planning a transition to Lightning Experience.
While there are many ways to build integrations with salesforce, one of the fastest growing ways is through the Salesforce REST API. Join us as we explore the current REST-ful mechanisms available to the AppCloud, and see what the next year has to offer. In this session we will discuss the Salesforce REST API structure, Authenticating to the REST API, sObject Manipulation, and Composition through the REST API.
Endless Use Cases with Salesforce Experience Cloud by Dar VeverkaAlesia Dvorkina
Salesforce Experience Cloud allows organizations to create digital experiences like portals, communities, and customer service sites. It leverages Salesforce data and features like cases, flows, Lightning web components, and more. Experience Cloud can be used for partner portals, volunteer portals, donor portals, client portals, commerce sites, and any other type of external engagement site. The presentation covered license types, templates, and themes in Experience Cloud; common components like records, cases, Chatter, files, and flows; designing experiences; and resources for learning more.
This document provides best practices for using Apex in 2022. It discusses security practices like enforcing CRUD/FLS permissions and encrypting data. It also covers performance techniques like using Platform Cache to store reusable data. Designing for scale is addressed, including bulkifying code and using Queueables for large data volumes. The document also discusses making code reusable with trigger frameworks, and maintainable through coding standards, error logging, and writing tests.
Salesforce MVPs Alex Sutherland and Maria Belli give Salesforce Admins an overview of security in Salesforce. From Org wide defaults, to object, field, and record access this presentation will help you understand how to secure your data and understand sharing rules.
Maximizing Salesforce Lightning Experience and Lightning Component PerformanceSalesforce Developers
The document discusses various factors that affect the performance of Lightning Experience and Lightning Component pages. It outlines six main factors: geographical and network latency, device and browser capabilities, Salesforce org configuration, page complexity, component architecture, and server processing. For each factor, it provides recommendations for how to measure and optimize performance, such as enabling the Salesforce Edge network, limiting the number of components on a page, using conditional rendering, and leveraging caching features. The overall message is that page load time in Lightning Experience is sensitive to these infrastructure, code, and configuration factors.
Choosing the Right Demo Environment (Salesforce Partners)Salesforce Partners
This document discusses different types of Salesforce demo environments that can be used for various purposes like opportunities, learning, development, and showcasing. It describes the key environments like Partner Developer Edition (PDE), Simple Demo Org (SDO), and Integrated Demo Org (IDO) and compares their features such as expiration dates, included licenses, and suitability for different use cases. The document recommends choosing the PDE for most opportunities as it never expires and fully supports environment hub and Trialforce. It also provides guidance on how and when to request access to demo environments like the SDO.
Apex code is a strongly typed, object-oriented programming language that allows developers to execute flow and transaction control statements on the Force.com platform. It provides the ability to define triggers and classes that can be initiated by user interface events as well as API calls. Apex code executes on the Force.com servers and provides a way for developers to add custom application logic to their Force.com deployments in a way that is integrated with the platform. Testing of Apex code is also supported to help ensure code quality.
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
Deep dive into Salesforce Connected AppDhanik Sahni
This document provides an overview of connected apps in Salesforce. It defines connected apps and their usage, protocols like OAuth and SAML, and terminology. It also demonstrates how to create a connected app, integrate a service provider using SAML or OpenID Connect, and manage access to third-party apps. The document contains examples of connected app use cases and managing OAuth access policies. It concludes by encouraging the reader to continue exploring and learning.
Salesforce sharing and visibility Part 1Ahmed Keshk
This document provides an overview of Salesforce sharing and visibility settings including profiles, permission sets, field level security, record level security, organization wide defaults, and role hierarchies. It discusses how profiles control user access and permissions. Permission sets extend user access without changing profiles. Field level security controls field visibility. Record level security and organization wide defaults specify default sharing while role hierarchies ensure managers have access to subordinate records.
This document provides an overview of Lightning Web Components (LWC) including why LWC was introduced, the pillars of web components, LWC anatomy, lifecycle methods, calling Apex methods from LWC, using Lightning Data Services in LWC, handling events in LWC, coexistence of LWC and Aura components, and some miscellaneous topics like refreshing Apex data and sharing JS between LWC and Aura. The agenda covers these topics at a high level with examples provided for key concepts like creating a web component, calling Apex, handling events, and using Lightning Data Services to create a record in JavaScript.
Understanding the Salesforce Architecture: How We Do the Magic We DoSalesforce Developers
Join us for a deep dive into the architecture of the Salesforce1 Platform. We'll explain how multitenancy actually works and how it affects you as a Salesforce customer. By understanding the technology we use and the design principles we adhere to, you'll see how our platform teams manage three major upgrades a year without causing any issues to existing development. We'll cover the performance and security implications around the platform to give you an understanding of how limits have evolved. By the end of the session, you'll have a better grasp of the architecture underpinning Force.com and understand how to get the most out of it.
This document summarizes the key aspects of Salesforce's sharing architecture discussed in a study group meeting. The sharing architecture includes:
1. Implicit sharing rules that provide access based on record ownership, such as a parent record's owner seeing related child records.
2. Organization-wide defaults that set the base level of access to records.
3. Role hierarchies that extend access to records owned by subordinates in the role hierarchy.
4. Additional layers like public groups, sharing rules, manual sharing, and team sharing provide more granular control over record access and sharing.
Salesforce is an open and easily extensible platform. However, sometimes it's hard to figure out the best, most secure way to build these integrations. Join us as we help you build secure integrations with Salesforce by understanding the platform authentication and authorization constructs like profile permissions and OAuth scopes. We will demonstrate the importance of leveraging Salesforce security features like mutual SSL, IP range restrictions, and Connected Apps.
From Sandbox To Production: An Introduction to Salesforce Release ManagementSalesforce Developers
Wondering how to manage multiple Salesforce environments for managing your release? Join us as our Architects show how large enterprises manage Sandbox environments. Learn some of the key considerations in picking sandbox types and migration tools to lay out a process to manage an effective Release Management.
There are three main types of relationships in Salesforce:
1. Master-detail relationships model parent-child relationships where child records cannot exist without a parent record and parent deletion deletes children. Up to two master-detail relationships are allowed per object.
2. Lookup relationships can link objects without implications for security, deletion, or required fields. Up to 25 lookups are allowed.
3. Many-to-many relationships are modeled using a junction object with two master-detail relationships to the original objects. This allows each record to link to multiple others in both directions.
Salesforce integration best practices columbus meetupMuleSoft Meetup
onnectivity Overview
Connectivity to Salesforce Clouds
Connectors and Salesforce APIs
Connector interacting with Salesforce core
Composite Connector
Triggers
Establishing a connected app for MuleSoft Connectors
Salesforce Integration Best Practices
When to move data into SFDC
Appropriate use of APEX
Salesforce integration technologies and considerations
Data Virtualization/Live Read
Data Manipulation and Migration
Real-time changes, events and Streaming
Resources
Salesforce Accelerators for Service Cloud and Commerce Cloud
Earlier when you required a custom feature in your Salesforce installation to support your business process, the only available options were to create a brand new app and integrate it in your Salesforce or to use existing features in a creative way to achieve the same objective. However Salesforce evolved and we now have got Salesforce Visual Flow, also known as Salesforce Visual Workflow or simply Salesforce Flow.
Visual flow can be summed up as an app inside the Salesforce app. Analogically, what methods are to object oriented programming, visual flow is to Salesforce. To be more precise, a Flow is a wizard or a set of screens in sequential order which can be used to complete a business process. This business process can be anything like filling out a form, or working on a script, or even filling out a survey. The Flow has the ability to fetch, edit, and create all Salesforce information in an appealing, quick and smart manner.
Difference between Salesforce.com Flow and Workflow
Salesforce Flow or Visual Workflow is often confused with a feature named Workflow in Salesforce and that’s forgivable! They may be similar in certain fashion such as assisting in automating a business process, but in essence they both are different. Here is how:
- Visual Workflow is more of a front-end based tool. It is mainly used when you have to display or collect information through screens making it more visible to the users. Workflow on the other hand execute pre-defined rules behind the scenes. They are used to process information rather than collecting it.
- While Workflows are mainly triggered by events, Visual Workflows are triggered by user actions. However in Visual Workflows, you can also Autolaunch Flows i.e. start a Flow without user interaction. Since they are triggered without user interactions you cannot include steps, choices, screens or dynamic choices in your Autolaunch Flow.
- Flows can fetch, delete, update or even create records on multiple objects but Workflows are defined to affect only a single specified object. The exception to this is the case of Workflows having to update fields on specified object’s related master records.
How to create and trigger Flow?
Flows can be used to execute a business logic, interact with Salesforce Databases, call defined Apex classes and guide user through screens. There are three main aspects of a Flow creation process:
- Designing
- Management
- Flow Runtime
You can create Flows and open Cloud Flow Designer by going through the following steps
Name-> Setup-> App Setup-> Create-> Workflow & Approvals-> Flows-> New Flow.
Once you have defined your Flow you can easily add it to any Visualforce page or you can add your Flow’s URL link to your Salesforce installation’s homepage.
You can create your Flow triggers by going through the same above process and instead of clicking Flow, click Flow Trigger.
The document summarizes the Winter12 Release Party for the Orlando Salesforce User Group meeting. It includes a safe harbor statement, an agenda for the meeting covering Winter12 highlights and ways to get more involved in the community. Winter12 features for Collaboration Cloud, Sales Cloud, Analytics, Force.com and more are briefly outlined. Upcoming community events are mentioned and contact info provided.
The document discusses implicit sharing in Salesforce, which provides access to related records without explicit configuration. It defines several types of implicit sharing: parent-child sharing between accounts and related objects, high volume user sharing, portal user sharing of accounts and contacts, and portal user access to cases they are associated with. The document includes definitions, explanations, and demonstrations of each implicit sharing type. It concludes with reminding attendees to provide feedback and capturing the session.
This document provides best practices for using Apex in 2022. It discusses security practices like enforcing CRUD/FLS permissions and encrypting data. It also covers performance techniques like using Platform Cache to store reusable data. Designing for scale is addressed, including bulkifying code and using Queueables for large data volumes. The document also discusses making code reusable with trigger frameworks, and maintainable through coding standards, error logging, and writing tests.
Salesforce MVPs Alex Sutherland and Maria Belli give Salesforce Admins an overview of security in Salesforce. From Org wide defaults, to object, field, and record access this presentation will help you understand how to secure your data and understand sharing rules.
Maximizing Salesforce Lightning Experience and Lightning Component PerformanceSalesforce Developers
The document discusses various factors that affect the performance of Lightning Experience and Lightning Component pages. It outlines six main factors: geographical and network latency, device and browser capabilities, Salesforce org configuration, page complexity, component architecture, and server processing. For each factor, it provides recommendations for how to measure and optimize performance, such as enabling the Salesforce Edge network, limiting the number of components on a page, using conditional rendering, and leveraging caching features. The overall message is that page load time in Lightning Experience is sensitive to these infrastructure, code, and configuration factors.
Choosing the Right Demo Environment (Salesforce Partners)Salesforce Partners
This document discusses different types of Salesforce demo environments that can be used for various purposes like opportunities, learning, development, and showcasing. It describes the key environments like Partner Developer Edition (PDE), Simple Demo Org (SDO), and Integrated Demo Org (IDO) and compares their features such as expiration dates, included licenses, and suitability for different use cases. The document recommends choosing the PDE for most opportunities as it never expires and fully supports environment hub and Trialforce. It also provides guidance on how and when to request access to demo environments like the SDO.
Apex code is a strongly typed, object-oriented programming language that allows developers to execute flow and transaction control statements on the Force.com platform. It provides the ability to define triggers and classes that can be initiated by user interface events as well as API calls. Apex code executes on the Force.com servers and provides a way for developers to add custom application logic to their Force.com deployments in a way that is integrated with the platform. Testing of Apex code is also supported to help ensure code quality.
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
Deep dive into Salesforce Connected AppDhanik Sahni
This document provides an overview of connected apps in Salesforce. It defines connected apps and their usage, protocols like OAuth and SAML, and terminology. It also demonstrates how to create a connected app, integrate a service provider using SAML or OpenID Connect, and manage access to third-party apps. The document contains examples of connected app use cases and managing OAuth access policies. It concludes by encouraging the reader to continue exploring and learning.
Salesforce sharing and visibility Part 1Ahmed Keshk
This document provides an overview of Salesforce sharing and visibility settings including profiles, permission sets, field level security, record level security, organization wide defaults, and role hierarchies. It discusses how profiles control user access and permissions. Permission sets extend user access without changing profiles. Field level security controls field visibility. Record level security and organization wide defaults specify default sharing while role hierarchies ensure managers have access to subordinate records.
This document provides an overview of Lightning Web Components (LWC) including why LWC was introduced, the pillars of web components, LWC anatomy, lifecycle methods, calling Apex methods from LWC, using Lightning Data Services in LWC, handling events in LWC, coexistence of LWC and Aura components, and some miscellaneous topics like refreshing Apex data and sharing JS between LWC and Aura. The agenda covers these topics at a high level with examples provided for key concepts like creating a web component, calling Apex, handling events, and using Lightning Data Services to create a record in JavaScript.
Understanding the Salesforce Architecture: How We Do the Magic We DoSalesforce Developers
Join us for a deep dive into the architecture of the Salesforce1 Platform. We'll explain how multitenancy actually works and how it affects you as a Salesforce customer. By understanding the technology we use and the design principles we adhere to, you'll see how our platform teams manage three major upgrades a year without causing any issues to existing development. We'll cover the performance and security implications around the platform to give you an understanding of how limits have evolved. By the end of the session, you'll have a better grasp of the architecture underpinning Force.com and understand how to get the most out of it.
This document summarizes the key aspects of Salesforce's sharing architecture discussed in a study group meeting. The sharing architecture includes:
1. Implicit sharing rules that provide access based on record ownership, such as a parent record's owner seeing related child records.
2. Organization-wide defaults that set the base level of access to records.
3. Role hierarchies that extend access to records owned by subordinates in the role hierarchy.
4. Additional layers like public groups, sharing rules, manual sharing, and team sharing provide more granular control over record access and sharing.
Salesforce is an open and easily extensible platform. However, sometimes it's hard to figure out the best, most secure way to build these integrations. Join us as we help you build secure integrations with Salesforce by understanding the platform authentication and authorization constructs like profile permissions and OAuth scopes. We will demonstrate the importance of leveraging Salesforce security features like mutual SSL, IP range restrictions, and Connected Apps.
From Sandbox To Production: An Introduction to Salesforce Release ManagementSalesforce Developers
Wondering how to manage multiple Salesforce environments for managing your release? Join us as our Architects show how large enterprises manage Sandbox environments. Learn some of the key considerations in picking sandbox types and migration tools to lay out a process to manage an effective Release Management.
There are three main types of relationships in Salesforce:
1. Master-detail relationships model parent-child relationships where child records cannot exist without a parent record and parent deletion deletes children. Up to two master-detail relationships are allowed per object.
2. Lookup relationships can link objects without implications for security, deletion, or required fields. Up to 25 lookups are allowed.
3. Many-to-many relationships are modeled using a junction object with two master-detail relationships to the original objects. This allows each record to link to multiple others in both directions.
Salesforce integration best practices columbus meetupMuleSoft Meetup
onnectivity Overview
Connectivity to Salesforce Clouds
Connectors and Salesforce APIs
Connector interacting with Salesforce core
Composite Connector
Triggers
Establishing a connected app for MuleSoft Connectors
Salesforce Integration Best Practices
When to move data into SFDC
Appropriate use of APEX
Salesforce integration technologies and considerations
Data Virtualization/Live Read
Data Manipulation and Migration
Real-time changes, events and Streaming
Resources
Salesforce Accelerators for Service Cloud and Commerce Cloud
Earlier when you required a custom feature in your Salesforce installation to support your business process, the only available options were to create a brand new app and integrate it in your Salesforce or to use existing features in a creative way to achieve the same objective. However Salesforce evolved and we now have got Salesforce Visual Flow, also known as Salesforce Visual Workflow or simply Salesforce Flow.
Visual flow can be summed up as an app inside the Salesforce app. Analogically, what methods are to object oriented programming, visual flow is to Salesforce. To be more precise, a Flow is a wizard or a set of screens in sequential order which can be used to complete a business process. This business process can be anything like filling out a form, or working on a script, or even filling out a survey. The Flow has the ability to fetch, edit, and create all Salesforce information in an appealing, quick and smart manner.
Difference between Salesforce.com Flow and Workflow
Salesforce Flow or Visual Workflow is often confused with a feature named Workflow in Salesforce and that’s forgivable! They may be similar in certain fashion such as assisting in automating a business process, but in essence they both are different. Here is how:
- Visual Workflow is more of a front-end based tool. It is mainly used when you have to display or collect information through screens making it more visible to the users. Workflow on the other hand execute pre-defined rules behind the scenes. They are used to process information rather than collecting it.
- While Workflows are mainly triggered by events, Visual Workflows are triggered by user actions. However in Visual Workflows, you can also Autolaunch Flows i.e. start a Flow without user interaction. Since they are triggered without user interactions you cannot include steps, choices, screens or dynamic choices in your Autolaunch Flow.
- Flows can fetch, delete, update or even create records on multiple objects but Workflows are defined to affect only a single specified object. The exception to this is the case of Workflows having to update fields on specified object’s related master records.
How to create and trigger Flow?
Flows can be used to execute a business logic, interact with Salesforce Databases, call defined Apex classes and guide user through screens. There are three main aspects of a Flow creation process:
- Designing
- Management
- Flow Runtime
You can create Flows and open Cloud Flow Designer by going through the following steps
Name-> Setup-> App Setup-> Create-> Workflow & Approvals-> Flows-> New Flow.
Once you have defined your Flow you can easily add it to any Visualforce page or you can add your Flow’s URL link to your Salesforce installation’s homepage.
You can create your Flow triggers by going through the same above process and instead of clicking Flow, click Flow Trigger.
The document summarizes the Winter12 Release Party for the Orlando Salesforce User Group meeting. It includes a safe harbor statement, an agenda for the meeting covering Winter12 highlights and ways to get more involved in the community. Winter12 features for Collaboration Cloud, Sales Cloud, Analytics, Force.com and more are briefly outlined. Upcoming community events are mentioned and contact info provided.
The document discusses implicit sharing in Salesforce, which provides access to related records without explicit configuration. It defines several types of implicit sharing: parent-child sharing between accounts and related objects, high volume user sharing, portal user sharing of accounts and contacts, and portal user access to cases they are associated with. The document includes definitions, explanations, and demonstrations of each implicit sharing type. It concludes with reminding attendees to provide feedback and capturing the session.
This document summarizes an agenda for a Salesforce user group meeting. The agenda includes a live Chatter demo and presentation, open discussion, announcements on self-help resources and upcoming events. It also provides links to resources for using Chatter and getting started with the Salesforce community. In addition, it lists upcoming events including a feature review at the next user group meeting and information on the annual Dreamforce conference in the fall.
Are you only using 10% of Act's capabilities? Follow these tips by Karen Fredricks, Act Consultant, to make your Act database for efficient, effective and profitable!
See how you can create custom roll-up summaries with process builder and flow, for use with lookup relationships and parent child relationships on the same object. You can automation your roll-ups without a developer, totally declaratively. YouTube: https://mrockssf.site/2LfRegm
The Demise of Duplicate Data Webinar (Part 1)Cloudingo
The Demise of Duplicate Data:
Best Practices from Salesforce MVPs (Part 1)
Do you have a best practices plan in place for your Salesforce data?
Learn how Salesforce MVPs Geraldine Gray, Jason Paquette, and Kyla Longe suggest you configure and administer your Salesforce records and find out how these practices can transform your record keeping habits.
Topics of Discussion:
> Aligning your sales process to maximize data
> Safeguarding your data during migration
> How to protect your points of entry from duplicate data
> Non-profit expertise & gotchas
The passage provides a dialectical journal entry summarizing the reader's thoughts on the first section of Anthony Burgess' novel "A Clockwork Orange". The reader found the section confusing but interesting due to Burgess' thorough organization of ideas and use of foreshadowing. However, the constant unfamiliar slang ("Nadsat") was distracting, requiring the reader to frequently refer to the glossary. Nonetheless, the slang kept the reader engaged and interested despite the brutality described. Overall, the journal entry reflects on key elements of the novel's style and themes in the first section.
Where security and privacy meet partnering tips for CSOs and privacy/complian...Compliancy Group
This webinar will identifying challenges in both the privacy and security offices, explaining the necessities of working together, and identify mutual goals, both within their departments and in the context of the rest of the business. It will include solutions and suggestions for working together and case studies/examples showing common mistakes as well as success stories of privacy and IT offices working together.
Panelists:
Gant Redmon, General Counsel and VP of Business Development, Co3 Systems
The document summarizes key statistics about data loss incidents in 2013, including that over 2,000 incidents exposed over 800 million records. It outlines the typical stages companies go through after an incident and laws requiring preparation and response. The document provides a self-assessment for companies and best practices around security, forensics, communications, and international considerations for responding to a data breach. It emphasizes that companies should plan for an incident as regulatory requirements and costs can be significant for unprepared organizations.
Sumit Sarkar conducted a 5 day proof of concept to integrate invoice data from an on-premise system into Salesforce using Lightning Connect. On day 1, he obtained connection information and learned the invoices were stored in both ERP and a data warehouse. On day 2, he planned the data model relationships with an analyst. On day 3, he set up developer and trial accounts to produce OData. On day 4, he encountered an issue building a related list and got help from an online community. On day 5, he migrated the proof of concept from his developer org to a new sandbox for further testing.
Presentation Build Your First App by TrailheadOm Prakash
Slide Credit: Trailhead.
Presented during "Build Your First App Workshop #BAM" in "Motihari, IN Developers Group".
"Be a Multiplier" Workshop is brought by Salesforce #TrailblazerCommunity & #Trailhead.
https://trailblazercommunitygroups.com/events/details/salesforce-motihari-in-developers-group-presents-build-your-first-app-workshop-bam
This document summarizes a 5 day proof of concept (POC) for integrating invoice data from an on-premise system into Salesforce using Lightning Connect. On day 1, the author requested connection information and learned invoices were stored in both ERP and a data warehouse. On day 2, they planned the data model relationship and learned to consult data experts. On day 3, they set up developer and trial accounts to produce OData. On day 4, they encountered an issue building a related list and got help from an online community. On day 5, Lightning Connect was enabled and they migrated the POC to a new sandbox for testing. Future projects were discussed to integrate additional systems using Lightning Connect.
Dreamforce 13 Optimizing Data Sync for Mobile AppsTeodoro Alonso
The document provides best practices for optimizing offline data synchronization for mobile apps. It discusses common challenges like synchronizing too much data or unreliable connectivity. It then presents four design patterns: 1) Only synchronize essential data, not all data; 2) Flatten data models to reduce objects; 3) Use flags to filter synchronized records; and 4) Resolve conflicts by taking the last version, unless Salesforce indicates otherwise. It also describes an anti-pattern of relying on users to resolve conflicts and concludes by emphasizing selecting only required data and fields to synchronize.
Consistent flexibility - Creating and Managing your Desktop WorkflowsIpro Tech
The document discusses creating consistent yet flexible workflows for desktop document review. It provides examples of different case definition options and considerations for case settings, tag groups, and production templates for various practice groups. The purpose is to help administrators standardize processes while allowing for the needs of different cases and law firms. Attendees are guided through hands-on exercises for creating a case, case coding set, and production template to develop their own functional workflows.
How to assess your it needs and implement technology at your nonprofitTechSoup Canada
This document outlines 8 steps for nonprofits to assess their IT needs and implement new technology:
1. Assess the entire organization including size, geography, goals, pain points and new technology needs.
2. Evaluate network assets such as firewalls, routers, switches and wireless access points to identify vulnerabilities.
3. Review servers to ensure reliability, warranty coverage, security updates and disaster recovery.
4. Assess workstations and laptops for operating systems, security, software and administrator access.
5. Evaluate line-of-business software for support, hosting, future needs and reliability.
6. Review policies on acceptable use, email/computer monitoring, and bring-your
2020 Barcelona Administrators Group - Virtual Event Dec 15animuscrm
This document provides an agenda and summary for a Barcelona Administrators Group meeting on Salesforce topics. The agenda includes checking in on how attendees are doing, reviewing market statistics for Salesforce professionals, learning about new features in the Spring '21 release, a live demo of the Flow Builder, and a discussion on best practices for GDPR and data protection. The meeting encourages participation through questions in the chat and a post-meeting survey. Presenters will cover geographical data on Salesforce professionals, common job roles, salaries in Spain, and new features in Winter and Spring releases. A representative from PlumCloud Labs will discuss Salesforce GDPR compliance and data privacy best practices.
Topic Tech companies prepare for cyber-attacks using common cyber.docxjuliennehar
Topic: Tech companies prepare for cyber-attacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption
Read and respond to two students discussions. (100 words on each response)
#1.Posted by Ashok
As the cyber-attacks are growing in number, it is the responsibility of the organization to take the necessary steps to counter-act the attacks. One of the best ways to protect the data of an organization is to encrypt the data. The first thing that companies ought to do is to identify the vulnerabilities present in their network and systems. The staff should be well aware of the attacks and their implications. The ways that a hacker tries to get access should be known.
For those companies, which possess secure data, measures have to be taken to protect its data through encryption. We should keep our information safe by using full disk encryption tools which are default to some operating systems. These tools take a very less time to encrypt the data and they do not cause any effect on the drives. The hackers tries to attack a system if there is no log in and log off option or if the user forgot to log off the system. So your system should be such that it logs off in 5 minutes if not in use.
So encryption is a compulsory thing to do because even if the hackers get the data, they will not be in a position to alter it.
#2. Posted by Bhavya
Encryption is the method in which information is converted into secret code which hides the true meaning of the information and the science of encrypting and decrypting the information is called cryptography. When information is not encrypted then it called as plaintext and when data is encrypted it is known as cypertext, and to encrypt and decrypt the information algorithms are used these algorithms are called ciphers or encryption algorithms. When someone unauthorized tries to intercept a encrypted message then the person should guess the cipher sender used to encrypt the message and has to guess the keys which are used as variables. The time which takes to guess this information is what makes encryption a secured tool.
There are two types of Ciphers which are symmetric and Asymmetric ciphers, Symmetric ciphers which is secret key encryption uses a single key which is sometimes used as a shared secret because the entities which do the encryption should share the secret key information with all the entities that decrypt the message. Symmetric key encryption is much faster than the Asymmetric encryption, Asymmetric ciphers which is also known as public encryption used two different but linked keys. This often uses prime numbers which is difficult to factor large prime numbers and reverse engineer encryption.
Business 130: Introduction to Business
CRN #25037: MTWR 08:00 – 10:10 ...
This webinar provided tips and tricks for admins to optimize the Salesforce1 mobile app experience. Speakers from Metso and FFF Enterprises shared how they improved mobile adoption by reducing opportunity edit time using publisher actions, enabling access to files on the go, and providing analytics via dashboards. Additional tips included approving items using the Approval Central app, leveraging Twitter connections, and translating labels. Resources like the admin guide, AppExchange apps, and upcoming webinars were provided to help admins mobilize their orgs.
Similar to Salesforce - Implicit Sharing, Record Locks & Skews (20)
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
2. Agenda
1. Welcome & Introduction
2. Implicit Sharing
3. Skews and Record Locking
4. Summary
3. Who We Are
Johann Furmann
Technical Product
Manager Salesforce
jfuermann@gmail.com
Nora Nicklis
Freelance Salesforce
Trainer & Consultant
nora@nicklis.de
4. What We Want To Achieve
We want to support each other in preparing for the Technical
Architect certification by:
● Creating and sharing content that helps to prepare for
the certification
● Facilitating small study groups to make room for
discussion based learning
If you have more ideas on what we could/should do, please
let us know!
5. Housekeeping Rules
● Post your questions in the chat, we will answer them
during or after the session
● We are not perfect, neither do we know everything. If
you spot a mistake, please do let us know!
● Interested in presenting? Please reach out to us,
everybody is welcome to present!
9. Parent
Definition
Read-only access to the parent account for a user with access to a child
record
• Not used when sharing on the child is controlled by its parent
• Expensive to maintain with many account children
• When a user loses access to a child, Salesforce needs to check all other
children to see if it can delete the implicit parent.
20 April 2020Johann Furmann 3
10. Parent
Explanation
• Only affects Account to Case, Contact and Opportunity
• Account = private AND Child != “Controlled by Parent”
As soon as a User has at least Read access to a Case, Contact or
Opportunity the User has Read access to the related Account.
20 April 2020Johann Furmann 4
Kind of
Sure
11. Parent
Demo
Demo User: Carla Sunflower (Salesforce License)
OWD Private: Account, Contact, Case, Opportunity
1. Carla Sunflower no access to any Accounts, Cases, Contacts or
Opportunities
2. Man. Share a Contact with Carla Sunflower
-> Carla Sunflower gets Read access to Account
20 April 2020Johann Furmann 5
12. Child
Definition
Access to child records for the owner of the parent account
• Not used when sharing on the child is controlled by its parent
• Controlled by child access settings for the account owner’s role
• Supports account sharing rules that grant child record access
• Supports account team access based on team settings
• When a user loses access to the parent, Salesforce needs to remove all
the implicit children for that user.
20 April 2020Johann Furmann 6
13. Child
Explanation
• Only affects Account to Case, Contact and Opportunity
• Only affects Account Owner
Each role independently can define what Child-Record access the Account
Ownership provides.
20 April 2020Johann Furmann 7
14. Child
Demo
Demo User: Carla Sunflower (Role: Eastern Sales Team)
OWD Private: Account, Contact, Case, Opportunity
1. Set Carla Sunflower as Account Owner
-> Carla Sunflower gets Edit Access to all Opportunities
2. Setting “Opportunity Access” is “Cannot access” for Role
-> Carla can not Access the Opportunity anymore
20 April 2020Johann Furmann 8
15. Portal
Definition
Access to portal account and all associated contacts for all portal users
under that account.
Shared to the lowest role under the portal account
20 April 2020Johann Furmann 9
16. Portal
Explanation
• Only Partner Community License
• Only affects Contacts which were enabled for Partner Community
A Partner-Community User has read access to her Account and all other
Contacts on that Account.
20 April 2020Johann Furmann 10
17. Portal
Demo
Demo Contact: Mia Learnsalot
OWD Private: Account & Contact
1. Log-In to community
-> Her Account and other Contacts visible
20 April 2020Johann Furmann 11
18. Case Access
Definition
Case access—If a portal or customer community plus user is a contact on a
case, then the user has Read and Write access on the case.
20 April 2020Johann Furmann 12
19. Case Access
Explanation
The Contact for a Case has Read & Edit Access on that Case.
• Only affects Partner and Community Plus Licenses
• Community License Users need Sharing-Set
20 April 2020Johann Furmann 13
Kind of
Sure
20. Case Access
Demo
Demo Contact / Customer: Mia Learnsalot
OWD Private: Account, Contact and Case
1. Mia sees no Cases
2. Create a Case for Mia
3. Add Mia as the Contact to the Case
-> Mia can see and edit the Case
20 April 2020Johann Furmann 14
21. Share Group (High Volume)
Definition
Access to data owned by high volume users associated
with a sharing set for users member of the sharing set's
access group.
All members of the sharing set access group gain
access to every record owned by every high volume
user associated with that sharing set.
20 April 2020Johann Furmann 15
22. Share Group (High Volume)
Explanation
Profile: Customer Community
• Record Ownership by User is necessary
• Affects (almost?) all Objects
• Record Owner needs profile in Share Set
• Any Record owned by a Profile mentioned in the Share Set is shared with
any user mentioned in the related Share Group
20 April 2020Johann Furmann 16
Kind of
Sure
23. Share Group (High Volume)
Demo
High Volume Community User AND Carla Sunflower
1. Create share set for Custom Demo Object and Community Profile
2. Share Group add Carla Sunflower
3. High Volume Community User creates Case Record
-> Record is shared to Carla Sunflower too
20 April 2020Johann Furmann 17
56. Summary
● Slides & Recording will be shared after the meeting (Slides →
Linkedin, Recording → Youtube)
● Unanswered questions will be answered in the upcoming days in the
comments of the video
● We will keep you posted on the topics and the date for the next
session
(if your are interested in being a presenter next time, please reach out)