Author: Dhanik Lal Sahni

Dhanik Lal Sahni is a Salesforce Independent Consultant and Architect with extensive experience in Salesforce implementation, integration, and custom development. He helps businesses design scalable, AI-driven CRM solutions using Sales Cloud, Service Cloud, Experience Cloud, and Salesforce Data Cloud. As the founder of SalesforceCodex.com, Dhanik shares practical insights, tutorials, and architectural best practices to help professionals grow in the Salesforce ecosystem. Explore his consulting and freelance services at dhaniksahni.com , where he offers end-to-end Salesforce solutions for startups and enterprises worldwide.

Worlds number 1 CRM and Marketing Technology company has acquired The CMO Club . The CMO Club is member based Content Marketing and Media company. They are the world’s most innovative and engaged community of CMOs, committed to helping each other. Stephanie Buscemi, CMO of Salesforce announced this latest Salesforce acquisition through an official blog. Stephanie said, Today I am excited to announce that Salesforce has acquired The CMO Club. She also added that founder and CEO Pete Krainik and the entire The CMO Club community would join the Salesforce family. Stephanie added, “The CMO Club is the world’s most innovative and engaged member-based community…

Read More

I am using the Google Fit Android app for my daily fitness activity monitoring.  Based on this, I thought of integrating Google Fitbit with Salesforce.   This blog will give step by step process of integrating Google Fitbit/Fit with Salesforce. This complete integration requires the below step Get an Access Token from Google to call Google Fit API Get activities using the authentication token in Apex and Lightning Component Show activities in Line Chart 1. Get an Access Token from Google to call Google Fit API Please refer blog http://salesforcecodex.com/2020/02/integrating-google-api-with-salesforce/ to get an access token for Google Fit API. 2. Get activities…

Read More

Apex is a strongly typed, object-oriented programming language that allows developers to execute flow and transaction control statements on Salesforce servers in conjunction with calls to the API. Below are some of important questions. You can also check below question posts for interview questions. Salesforce Interview Question – Security Top 20 Salesforce Interview Question – Integration What is difference between custom controller and controller extension? Ans. custom controller: Custom controller is required when standard controller is not fitting a requirement Like if you need to some custom validation or some external system call. We have to implements all of the…

Read More

Salesforce has announced to buy Vlocity, a San Francisco-based cloud and mobile software provider, for approximately $1.33B. Vlocity is a leading provider of industry-specific cloud and mobile software, driving digital transformation for the world’s largest companies. A three-time Forbes Cloud 100 Winner (2017 – 2019), Vlocity, is an industry cloud app pioneer built in partnership with Salesforce®, the world’s #1 CRM provider, that increases agility, operational efficiency and simplicity, at a lower cost of ownership for the enterprise. The transaction is expected to be finalized in the second quarter of fiscal 2021, subject to regulatory approvals. David Schmaier, CEO and founder of Vlocity,…

Read More

Salesforce Spring ’20 Release Features Now Available This release includes about 300 innovations, including some new products like below: Sustainability Cloud Salesforce Sustainability Cloud, a carbon accounting product for businesses to drive climate action, is now generally available. With Salesforce Sustainability Cloud, businesses now have a trusted sustainability platform that gives them a 360-degree view of their environmental impact and provides data-driven insights that will accelerate the world’s efforts towards carbon neutrality. Marketing Audience Studio: Marketing Audience Studio is a new product that enables customers improve the reach of email campaigns Einstein Analytics for Consumer Goods – Einstein Analytics for Consumer…

Read More

Apex code is mostly run in system context so it is not considering current user’s permission. It is creating data integrity issue. Using  with sharing keywords when declaring a class enforces Sharing Rules, but not object and field-level permissions. In Spring 20 release some security enhancements are added to enforce object and field-level permissions. Using Schema Methods We can now use Schema.DescribeFieldResult to check current user has read, create, or update access for a field. For example, if we want to check that logged user has read access on PersonEmail field of the Account Object, we can enclose the SOQL query inside an if block that…

Read More

Salesforce Queueable Job is very important for long running data updates. We must notify when particular data update is finished. This feature was not available till winter 2020 release. Salesforce has introduced transaction finalizer in Spring 2020 release. This will help us adding any post completion logic for Queueable Job. Finalizers Finalizer is interface which need to be implemented in a class to add post action. It’s execute method takes FinalizerContext as parameter which will give current executing job detail. So, we can attach the same Finalizer to multiple Queueable jobs and utilize a consistent, common codebase for post-async actions. Like in…

Read More

This post is related to top 20 questions related to Salesforce security implementation. We have another post related to interview questions for salesforce integration and asynchronous apex. 1. What is Phishing? Ans. Phishing is a social engineering technique that attempts to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishers often direct users to enter details at a fake website whose URL and look-and-feel are almost identical to the legitimate one. 2. What is Malware? Ans. Malware is software designed to infiltrate or damage a computer system without the…

Read More