Summary In this chapter, we covered a lot of the theory behind MDM, having a single source of truth for data records, and some methods for its implementation, along with considerations for doing so. While Salesforce is often implemented to act as the de facto source of truth, it is important to understand why that […]
Border Gateway Protocol Border Gateway Protocl (BGP) provides loop-free routing between different autonomous systems or organizations, or domains. It uses a path-vector routing algorithm to exchange routing information between BGP speakers. Based on this information, each BGP speaker determines a path to reach a particular destination while detecting and avoiding paths with routing loops. The […]
TCP/IP Data-Link and Physical Layers The TCP/IP model’s data-link and physical layers define the protocols and hardware required to deliver data across some physical network. The two work together quite closely; in fact, some standards define both the data-link and physical layer functions. The physical layer defines the cabling and energy (for example, electrical signals) […]
Manage resource groups When creating resource groups, it is important that you consider factors for your resource group design: region or location details along with a valid resource group name (see Figure 1-42). FIGURE 1-42 Create A Resource Group blade Move resources across resource groups Some resources in Azure can be moved between resource groups and even across subscrip- tions, but support for move operations varies based on the service. A reference of services that can be moved can be found at https://learn.microsoft.com/en-us/azure/azure-resource- manager/management/move-support-resources. In Figure 1-43, the VM in Resource Group 2 can be moved into Resource Group 1, and it can also be moved across subscriptions into the resource […]
Securing SageMaker notebooks If you are reading this section of the chapter, then you have already learned how to use notebook instances, which type of training instances should be chosen, and how to configure and use endpoints. Now, let’s learn about securing those instances. The following aspects will help to secure the instances: In this […]
Casting Values vs. Variables Revisiting our third numeric promotional rule, the compiler doesn’t require casting when working with literal values that fit into the data type. Consider these examples: byte hat = 1; byte gloves = 7 * 10; short scarf = 5; short boots = 2 + 1; All of these statements compile without […]
Apply and manage tags on resources Resource tags allow you to apply custom metadata to your Azure resources to logically orga- nize them and to build out custom taxonomies. A tag is a name and a value pair. For example, suppose as you deploy resources in Azure, you want to track the environment the resource […]
AWS Proton AWS Proton is a service that lets you coordinate the work of infrastructure and platform teams for them to define prescriptive AWS environments that developers can use to deploy their applications. Using Proton, infrastructure and platform teams can define environment and service templates describing the combination of resources that developers can then use […]
Configure resource locks Azure resource locks (sometimes called management locks) are used to prevent the accidental deletion or modification of resources. There are two types of locks: resource and does not impede the modification of a resource. Note that both types of resource locks allow authorized users to read resources; resource locks apply across all users and […]
This chapter covers the following official AWS Certified SysOps Administrator – Associate (SOA-C02) exam domain: Domain 6: Cost and Performance Optimization (For more information on the official AWS Certified SysOps Administrator – Associate [SOA-C02] exam topics, see the Introduction.) In this chapter, you learn how to use AWS strategies and services to optimize your costs. […]