How to Display All Records in a Lookup Search in Salesforce

Danie ZhengProblem Solved, Salesforce, Technical TipsLeave a Comment

salesforce wallpaper

Problem: What does someone do when they do not know all the possible values are for a lookup, considering it requires a few characters before it searches, even if it only has 4 values in the lookup? Solution: Follow the steps below to accomplish displaying all available records in a lookup search. 1. Create a lookup relationship to the object you are trying to search   2. Create a text field on the parent object with a default value of ‘All’ 3. (Optional) Remove the new text field from the page layout so the user can’t see it. 4. To … Read More

On-Premises Identity and Access Management – Vendor + Product + Feature Matrix (2021)

Ben MarckCloud and Virtualization, Identity & Access Management, Offerings, Oracle, SAP, Technical TipsLeave a Comment

Finding the best Identity Management (IdM) products for your enterprise is not a trivial task. This is especially true when different products from different vendors that accomplish other objectives or services have remarkably similar (and therefore confusing) naming conventions. Not unlike other COTS enterprise suites, the ‘cloudification’ of these products has matured rapidly. To help layout the current Identity Management vendor/product landscape as we see it, we’ve put together the following matrix of products by vendors. Click Here to enlarge the table below. Identity management is challenging in today’s world, organizations must manage user identities across a wide range of … Read More

How to Register A Custom Scheduled Job or Plugin in Oracle Identity Manager (OIM)

Jimmy LutzIdentity & Access Management, Oracle, Technical TipsLeave a Comment

There are multiple scenarios where we may have to develop a custom scheduled job to perform tasks to meet client requirements. Once the expected job functionality is developed, below are the steps to register the expected job/plugin in OIM so that it can be used. Create the folder structure as follows.                 lib                 META-INF                 Plugin.xml The “lib” folder would have the jar file of the functionality that has been developed along with the dependent jar files. The “META-INF” folder should have the scheduledtask.xml file, which should hold the below content. The text displayed in RED … Read More

University Virtual Desktop Infrastructure (VDI) Assessment and Migration

Dom PucciCloud and Virtualization, Higher Education, Industry Trends, Offerings, Problem Solved, Technical TipsLeave a Comment

A Higher Education institution recently reached out to us for support regarding their ongoing Virtual Desktop Infrastructure (VDI) migration to address a handful of pain points they had been experiencing along the way. The University wanted to leverage the enhanced VDI capabilities offered by AWS AppStream 2.0 to streamline and improve their students’ remote learning experience. Our team worked with the University to optimize the AWS AppStream 2.0 workloads by providing insight into usage patterns for the VDI applications. We also established landing zones using the hub-and-spoke account model to lay a strong foundation for the institute’s future cloud journey. … Read More

Monitoring Your Kubernetes Cluster at a Glance with Lens

David SmithbauerCloud and Virtualization, Industry Trends, Technical TipsLeave a Comment

Kubernetes is an incredible technology that enables you to do so much more with your resources than ever before. But, how do you know what’s going on inside your cluster? Many folks are already aware of in-cluster solutions like Prometheus and Grafana. These de-facto tools do an excellent job of storing and displaying cluster metrics and performance over time. What if you have more than one cluster to monitor, though? You’d need to log in and view your Grafana dashboards in each cluster or create a combined dashboard showing all your clusters’ current state. Lens is a rapidly growing, free, … Read More

CMMC for DoD Contractors and Suppliers: A Primer

Ben MarckBusiness Strategy, News and Updates, Notes, Technical TipsLeave a Comment

Much like most operating programs/projects/entities within the Department of Defense (DoD) enforce the Federal Information Security Management Act (FISMA) and Risk Management Framework (RMF – NIST Special Publication 800-53), the new Cybersecurity Maturity Model Certification (CMMC) is the DoD’s attempt at commonly securing and documenting the cyber controls of it’s Defense Industrial Base (DIB). Following repeated cyberattacks on the DIB, the DoD decided to enforce standards and checks on its contractors and its periphery, much like any program operating on a US Government system. Particularly DIB’s with the following information stored or accessible across that entity’s systems. Beyond that, it … Read More

Overview of AWS CloudShell

Jeff ZemerickCloud and Virtualization, Technical TipsLeave a Comment

At AWS re:Invent 2020, AWS CloudShell was announced as a new service. A browser-based shell that provides access to AWS services from your web browser. This feature has been available in Azure and Google Cloud in some form for some time now; AWS CloudShell now brings the same capability to AWS. AWS CloudShell has unquestionably made many AWS tasks easier. CloudShell inherits your current user’s credentials, so there is no need to authenticate; simply click the AWS CloudShell icon, and you are ready to go. AWS CloudShell itself provides a managed Amazon Linux 2 environment. The service already includes the … Read More