A manufacturing plant's management teams coordinate to schedule maintenance work when the plant is shut down. Why? So that nothing interrupts the efficiency and production output of well-tuned assembly lines. Similarly, you need to carefully consider asynchronous bulk job efficiency and scheduling in your Salesforce org so that users remain productive processing transactions during normal work hours. This post covers four of the most important things to remember when using Force.com's asynchronous processing engine.
Tag Archives: Sharing
Affecting a DevOps transformation at a large enterprise like salesforce.com is no small endeavor. Being one of the leading cloud companies in the industry however, well positions us to bring more DevOps practices into our organization. We practice DevOps principles every day, but a few times a year we set aside time to really level up. Tomorrow marks one of these times as we host our third internal DevOps mini-conference. We’ve found that spending this time together to discuss DevOps principles and to share knowledge on a level that reaches far beyond our daily interactions can pay dividends throughout the rest of the year.
With the powerful Salesforce sharing features, you can support collaboration within your organization while keeping sensitive information secure. And while you must always balance collaboration with security, there are situations in which you might need to make absolutely sure that record access is limited to a very small number of people, regardless of their position within the corporate hierarchy. In this post, you'll learn about the sharing features and strategies you can use to do just that.
Record ownership is at the core of Salesforce’s record access capabilities, which allow you to specify which users or types of users should be able to access specific records or types of records. Salesforce.com’s architects and developers have spent years creating a highly functional and massively scalable record access infrastructure around record ownership, saving you the monumental effort of building that infrastructure yourself. In this post, you'll learn how those years of heavy lifting have actually simplified record access for the most common enterprise security models, allowing you to configure record access declaratively instead of with painstakingly developed code. You'll also get an “under the hood” view of record access, and learn how to implement your record access model and avoid potential pitfalls along the way.
Learn how salesforce.com makes it easy for engineers to work on what challenges and excites them. Opportunity Open Market makes it easy for anyone in the salesforce.com Technology organization move to a new team. This post explains how the program came about and how it works.
Salesforce uses a central Group object to manage visibility related to the Role Hierarchy, Territory Hierarchy, Public Groups and Queues. When administrative changes occur in these areas a group membership lock is taken to ensure data integrity is maintained while complex sharing calculations are completed. The following activities take out group membership locks for the […]
There appears to be a lack of clear understanding around the differences between CRUD, FLS and Sharing. Here's a high-level overview: Think about your Force.com object as a database table. CRUD: is the table level permission. Does the user have access to this table? (Create records in the table, Read records in the table, Update […]