PK Chunking and the importance of setting the correct chunk size

pk-chunking

What is PK Chunking? PK Chunking is a feature in Salesforce’s Bulk API designed to optimize the processing of large datasets by breaking them into smaller, manageable chunks. This method is particularly beneficial when working with objects containing millions of records, as it helps prevent timeouts and ensures efficient use of system resources. How PK … Read more

Comparing Salesforce Deployments: Validate Only vs. Unlocked Packages

salesforce-unlocked-packages

Salesforce deployments are integral to managing and evolving your Salesforce environment. Two primary methods of deploying changes in Salesforce are “validate only” deployments and “unlocked package” deployments. Each approach has its strengths and weaknesses, and the choice between them can significantly impact the efficiency, reliability, and maintainability of your Salesforce org. This is particularly true … Read more

Salesforce Hyperforce: A quick overview

hyperforce

Introduction Salesforce Hyperforce is a significant innovation in the realm of cloud computing, specifically tailored for Salesforce customers. As businesses evolve and data requirements expand, the need for scalable, secure, and compliant cloud infrastructure becomes critical. Hyperforce addresses these needs by reimagining Salesforce’s architecture, making it more robust, flexible, and aligned with the diverse regulatory … Read more

An introduction to OmniStudio

salesforce-omnistudio

OmniStudio is a suite of Salesforce tools designed to enhance the customer experience by streamlining data processes and enabling guided interactions. These tools offer a range of functionalities that help create seamless, automated workflows and integrate data from multiple sources. This tutorial will cover the basics of OmniStudio, its benefits, and detailed descriptions and examples … Read more

External Client App is the new Connected App

salesforce-external-client-app

As part of Summer 24 improvements, External Clients App, the “Connected App v2”, now has a frontend to create them and support more oAuth flows. They were designed to improve security and resolve the cumbersome packaging and distribution issues that affect connected apps. In Salesforce’s own words, External Client Apps are the new generation of connected apps. … Read more

Evaluate Dynamic Formulas in Apex

salesforce-dynamic-formulas

Imagine a scenario where you need to check complex conditions on an SObject record and don’t want to or can’t create a formula field on the object? Dynamic formula evaluation solves your problem. This capability was added in Summer 24. Let’s see an example: FormulaEval.FormulaInstance isPrimeCustomer = Formula.builder() .withType(Account.SObjectType) .withReturnType(FormulaEval.FormulaReturnType.BOOLEAN) .withFormula(‘AnnualRevenue > 30000 AND ISPICKVAL(Industry, … Read more

Set Conditional Visibility for Individual Tabs in Lightning App Builder

tab-visibility

After the Summer ’24 release, Salesforce will allow administrators to set component visibility for tabs, which was not possible before. Tab visibility is similar to component visibility in that it allows administrators to control the display of individual tabs on a Lightning page based on specific criteria or conditions. This feature enhances the customization and dynamic nature … Read more

Salesforce Flow Orchestration Tutorial for Beginners

flow-orchestration

Salesforce Flow Orchestration is a tool that allows you to automate complex business processes involving multiple steps and approvals. It’s useful for managing long-running processes that require human intervention and coordination across different departments. Step-by-Step Tutorial on Salesforce Flow Orchestration Step 1: Enable Flow Orchestration To start using Flow Orchestration, you need to ensure it … Read more

Comparing Salesforce Security Methods: isAccessible(), with User Mode, and with SECURITY_ENFORCED

salesforce-security

In Salesforce development, ensuring data security and proper permissions are essential to maintaining the integrity and confidentiality of your data. Three key methods to enforce security are isAccessible(), with User Mode, and with SECURITY_ENFORCED. This article provides a detailed comparison of these methods, exploring their use cases, advantages, and limitations. 1. Using isAccessible() Overview isAccessible() … Read more