Let’s untangle the subject of code coverage requirements for Apex Triggers on the Salesforce platform.

I recently inherited a Trigger that had been neglected for some time. The code was stringy, highly coupled and poorly tested. I added a few lines of code and tried to deploy it. It failed…

Computers only know binary. Base 2 is binary. Let’s convert a couple of integers to their binary representation.

The number 10.

n = 10

n/2 = 5 with a remainder of 0, so the last number in our binary string is 0.


Now n=5

n/2 is 2 with a…

Advanced Encryption Standard 256 bit encryption is an encryption algorithm, or cipher, that is the current industry standard used to encrypt/decrypt files and data transmitted over secure file transfer protocols like HTTPS, FTPS, SFTP etc.

If you want to learn more about AES256 bit encryption, you can read more here

Salesforce, like the Internet, was built on the fly and in retrospect we probably should have done things differently. While Apex and Visualforce provide a lot of functionality and convenience, some things should just be easier. Enter <apex:inputField /> and <apex:inputText /> and <apex:input />.

Scenario 1: Capture text data…

Most of us interact with REST APIs on a regular basis, but from time-to-time we need to interact with SOAP APIs as well. For those of us with less exposure to SOAP, REST APIs are like the Shire and SOAP APIs are a little like Mordor. …

Postman is a clean, easy-to-use REST client, but it also works well for sending SOAP message via HTTP. Configuring Postman for a SOAP request is similar to a REST configuration.

It might help if you already understand:

- Sending REST API requests with Postman


For the purpose…

Kris Sparks

Software developer. Turing School alum.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store