Process Builder: A Handy Tool

The Process Builder is a workflow tool that helps you easily automate your business processes by providing a powerful and user-friendly graphical representation of your process as you build it. The Process Builder’s simple and powerful design allows you to:

  • Create your processes using a convenient layout with point-and-click efficiency.
  • Create your whole process in one place rather than using multiple workflow rules.
  • Create processes by collaborating with different teams in your business.
  • Stop using Apex code to automate simple tasks. Like update child record from parent.
  • Stop worrying about test classes and their coverage.Bz5Y5AxCcAIG14g.jpg
Automated processes in the Process Builder are based on records and consist of:

  • Criteria that determine when to execute action groups.
  • Immediate and scheduled actions to execute when those criteria are met.

Any change that causes a record to match the criteria can automatically trigger the action group.

You can use the more powerful and flexible Process Builder to perform the same actions as workflow. The process builder doesn’t support outbound messages, but you can easily create one yourself with Apex. With the Process Builder, you can:

  • Create a record
  • Update any related record—not just the record or its parent
  • Use a quick action to create a record, update a record, or log a call
  • Launch a flow—you can’t schedule this action with workflow
  • Send an email
  • Post to Chatter
  • Submit for approval

If you need your process to do more than what those actions allow, don’t worry. You can also call Apex from a process.

Here is a basic comparison between Workflow, Visual Flow and the Process Builder


Workflow enables you to set up workflow rules that identify what kinds of record changes or additions trigger specified workflow actions, such as sending email alerts and updating record fields.

Visual Workflow

Visual Workflow enables you to create flows, which are applications that are user-triggered instead of event-triggered. Unlike Workflow, which always executes rules and actions behind the scenes, Visual Workflow offers screens for displaying and collecting information from the user running the flow.

Process Builder

Process Builder can be utilized to automate all workflow actions (with the exception of outbound messages). Traditional workflow can still be utilized in parallel, however, Process Builder gives you the ability to do things that workflow can’t. Although, somewhat of a double edged sword this puts some very powerful tools at the disposal of an experienced administrator.


If you want to learn more here are some tools which you can use.

TrailHead Process Builder

Which Automation Tool Should I Use?


Virus and Trojan lots of information

Viruses and identity theft are not new issues, but recently, individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use. Follow these tips to protect yourself from such an attack so that you won’t be the next victim.

For example, you receive an email promising a great joke if you open the attachment. You’re not sure who sent it but you feel like a laugh and open it anyway. Big mistake.
Attackers can break into your computer by sending you an email attachment with malware (malicious software) or downloading malware on to your computer when you open a link on a webpage.
They want to use personal and financial details on your computer to steal money, buy things on your credit card or open up bank accounts in your name.

Anyone who uses the internet needs to be aware of basic computer security:

1. Don’t click the link

If you don’t know who sent the email, or if it’s not a trusted website, then don’t click the link.

Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online.

2. Install Antivirus software

Always have up-to-date antivirus protection and get regular updates, Don’t press ‘do it later’ and update six weeks later.

3. Use strong passwords

Most of the population is still using ‘1234567’ or their first name and last name,

The problem is that there are about 20 different things that require passwords. The strategy now is to write them down it is a complete U-turn and put them in your wallet [which is usually in a safe place]. If you lose your wallet, you stop your credit cards and can also reset all your online passwords.

* Never click ‘remember my password’.

* Use capitals, lower case, numbers and symbols in passwords. Don’t use words in the dictionary.

* Change passwords regularly.

* Password software is good at generating strong passwords but the human brain is the best tool of all.

4. Keep software up to date

This will ensure your software has the latest security upgrades. Attackers are always thinking up new ways to penetrate security. Don’t ignore update notifications.

5. Reconfigure wireless routers

Buy a router with secure wireless encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online.

When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administratihhgon panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption.

Reconfiguring routers is easy and something people don’t do properly.
hChanghuki,,uiliuihhhghvjhge the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router. Also, change the default login to a unique password.

6. Encrypt email

Learn to use email encryption for sensitive documents.

Don’t send emails such as a child’s health resume using Gmail or Hotmail. “There was  where a Gmail employee started going through people’s email accounts.”

7. Use a secure web browser

Firefox or Opera are secure web browsers

“Internet Explorer is highly targeted by attackers because it is on so many machines. IE generally takes longer to patch or fix vulnerabilities.”

Eliminating internet and computer use from your life is impossible, so be sure to practice safe computing habits to protect yourself from cyber attacks.