SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Which is it?
Configuration vs. Customization
Sr. Architect,
GlideFast Consulting
Travis Toulson
2 © 2019 ServiceNow, Inc. All Rights Reserved.
Safe harbor notice for forward-looking statements
This presentation may contain forward-looking statements. These statements are intended to be covered by
the safe harbor provisions contained in the U.S. Private Securities Litigation Reform Act of 1995. These
statements reflect the current beliefs of ServiceNow and are based on current information available to the
company as of the date hereof. ServiceNow does not assume any obligation to update the forward-looking
statements provided to reflect events that occur or circumstances that exist after the date on which they
were made. The forward-looking statements in this presentation are subject to various risks and
uncertainties that could cause actual outcomes and results to differ materially and adversely from those
expressed in such forward-looking statements. Further information on factors that could affect the
company’s financial and other results is included in the filings we make with the Securities and Exchange
Commission from time to time, including those discussed in our most recent Annual Report on Form 10-K.
The information in this presentation on new offerings, features, or functionality is intended
to outline our general product direction and should not be relied upon in making a purchasing decision.
The official guidance
4 © 2019 ServiceNow, Inc. All Rights Reserved.
ServiceNow’s KB0553407
A Customization is any change to code
that is part of the baseline install of a
ServiceNow instance.
5 © 2019 ServiceNow, Inc. All Rights Reserved.
Examples
Customization
• Modify Service Catalog checkout page UI
Macro
• Building a new “custom”
feature into the product
(e.g., custom applications,
third-party widgets, etc.)
Configuration
• UI Policy to make fields mandatory
• Modifying the Form and List Layout
• Installing a Plugin
• Modifying System Properties
Would you like to play a game?
Configuration or Customization?
7 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
1 ServiceNow Admin adds the Description field to the Incident form
8 © 2019 ServiceNow, Inc. All Rights Reserved.
Configuration!
How we know
• No code involved
• Form and list view changes
are Configuration
9 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
2 A new customer on a Geneva instance builds new widgets using Jelly UI Macros
for their CMS
10 © 2019 ServiceNow, Inc. All Rights Reserved.
Customization!
On the other hand
• In Geneva, a baseline CMS without
Customization would have been broken
due to a Known Error with iFrame sizing
• This Known Error would not be fixed until
halfway through the Istanbul upgrade cycle
• Customers were still using the custom
iFrame resize script on CMS well into
Jakarta due to on and off errors with the
baseline fix
How we know
• Code change is required
• Jelly is XML-based code in ServiceNow
similar to the Catalog checkout page
example
11 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
3 A Service Portal Developer tailors a Theme and modifies cloned widgets to support corporate branding,
accessibility, and style guide standards
12 © 2019 ServiceNow, Inc. All Rights Reserved.
Customization!
On the other hand
• Service Portal was designed so that cloning
a widget does not cause skipped upgrades
• Can you really imagine only changing the
logo, the logo position, some text colors,
button colors, and the nav bar?
How we know
• Code change is required
• Portal Themes especially pose risk for
breaking between versions
• ServiceNow Docs encourage using CSS
Variables to override Bootstrap styles first
13 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
4
A ServiceNow customer implements Test Management in Jakarta as part of PPM;
as part of the implementation, the customer adds some form fields, builds out reporting, dashboards,
and notifications investing in the tool
14 © 2019 ServiceNow, Inc. All Rights Reserved.
Configuration!
On the other hand
• Test Management 2.0 was released in
London using a completely different set of
modules leaving
the customer in question as to future
support
• A hard decision was faced to remain on
Test Management or reimplement on Test
Management v2
• In this case, Configuration failed
to prevent reimplementation
How we know
• No code involved
• Once again we are configuring form views
• Additionally, we are building reports and
dashboards which are all supported
Configurations
Wow, this game got dark real fast!
Sorry about that…
16 © 2019 ServiceNow, Inc. All Rights Reserved.
Awesome framed poster in my living room
Everything in life that matters
requires risk.
Managing Implementation Risk
18 © 2019 ServiceNow, Inc. All Rights Reserved.
Project Management Body of Knowledge
A risk is an uncertain event or condition
that, if it occurs, has a positive or negative
effect on a project's objectives
19 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 1: Identify the risk
Opportunities (Positive Risk)
• Reduced costs
• Creation of additional revenue
• Mitigation or avoidance of other
organizational risks
• Increased process transparency
Threats (Negative Risk)
• YOU are responsible for maintaining the
code
• Delayed upgrades: Future ServiceNow
upgrades can be skipped or broken
• Unable to use new ServiceNow applications
or features
• Worst case: Z-Boot, Reimplementation, or
Multiple Instances
20 © 2019 ServiceNow, Inc. All Rights Reserved.
Identifying Threat Sources
• Changing out-of-box records (even the active flag)
• Changing newly implemented apps or behaviors
• Changing frequently updated apps or behaviors
• Using non-standard APIs
• Using APIs in non-standard ways
• Modifying default or designed behavior
• Imitating behaviors that exist in other application
• Remember: Any record that can be influenced directly or via dependency by both you and ServiceNow is a
threat to your implementation.
21 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 2: Assess the risk
Rating Probability Severity (threat) Severity (opportunity)
1
Rare or very unlikely to
happen
Minimal maintenance is required to
maintain business operation
Minimal impact to users;
functionality is easily
replaced or ignored
2 Possible
Moderate maintenance will be required
or current business processes may
require change
Moderate impact to user;
functionality will noticeably
improve processes
3
Likely or almost certain
to happen
Severe maintenance required, potential
z-boot risk, or significant loss of business
functionality
Severe business impact;
functionality is likely mission critical
or of measurable impact to key
metrics
22 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 3: Plan risk response
Strategies for opportunities
• Exploit: Take action to maximize the upside
of the opportunity
• Share: Work with ServiceNow or a Partner
to devise the best way of achieving the
opportunity
• Enhance: Take action to increase the
likelihood of successfully realizing the
opportunity
• Accept: Still do nothing and hope for the
best
Strategies for threats
• Avoid: Devise a different implementation to
remove the cause of the risk
• Transfer: Engage with a ServiceNow Partner
to collaborate on upgrades and
maintenance
• Mitigate: Take action to limit the probability
or severity of the risk
• Accept: Do nothing and hope for the best
23 © 2019 ServiceNow, Inc. All Rights Reserved.
• Use Scoped Applications
• Use new tables to compose behavior onto existing tables
• Extend tables if composition won’t work—provides better isolation than nothing
• If you have to, modify existing records in place
– Inactivate the existing and create a new record is no longer the published best practice
• Record your Customizations somewhere!
– Make customizations easy to identify
Remember: The keys to mitigating threats in ServiceNow customization are isolation and limiting
dependencies
Avoidance is not the only strategy!
24 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 4: Make a decision
• For a given solution, assess the Risk Score for
Threats and Opportunities
• (Probability * Severity) / 3 = Risk Score
• Plot the Threat Risk Score vs. the Opportunity
Risk Score on the matrix
• You can average the Risk Scores,
use the Maximum of each, use a more robust
aggregate, or SWAG it
Opportunity
High
Medium
Low
Low Medium High
Threat
25 © 2019 ServiceNow, Inc. All Rights Reserved.
Your Risk Gradient may varyOpportunity
Threat
Opportunity
Threat
Opportunity
Threat
26 © 2019 ServiceNow, Inc. All Rights Reserved.
Risk Management Process Recap
Identify the risk
• Identify the risks
and risk sources
• Identify both positive and
negative risks
Assess the risk
• Evaluate the probability
(likelihood)
and severity
(consequence)
Plan risk response
• Take action to minimize
the negative risks
and maximize
the positive
Make a decision
• To implement or
not to implement, that is
the question
27 © 2019 ServiceNow, Inc. All Rights Reserved.
Key takeaways
1 2 3
Every ServiceNow choice involves
risk.
Debating Configuration
vs. Customization is of limited
use.
Use a Risk Management process
to make
better decisions.
29 © 2019 ServiceNow, Inc. All Rights Reserved.
Tell us what you think!
Find the app in the Apple App Store or
Google Play Store by searching for
ServiceNow Events.
Give us your feedback and
submit the survey.
Thank you
https://glidefast.com
https://codecreative.io

Weitere ähnliche Inhalte

Was ist angesagt?

How to add targets to salesforce reports and dashboards
How to add targets to salesforce reports and dashboardsHow to add targets to salesforce reports and dashboards
How to add targets to salesforce reports and dashboardsLynda Lewis, MA
 
Mule idempotent filter and Object Store
Mule idempotent filter and Object StoreMule idempotent filter and Object Store
Mule idempotent filter and Object StoreAnirban Sen Chowdhary
 
Introduction To Salesforce Content Management System (CMS)
Introduction To Salesforce Content Management System (CMS)Introduction To Salesforce Content Management System (CMS)
Introduction To Salesforce Content Management System (CMS)Cloud Analogy
 
Sales Lifecycle at Dreamforce 2014
Sales Lifecycle at Dreamforce 2014Sales Lifecycle at Dreamforce 2014
Sales Lifecycle at Dreamforce 2014Deepa Patel
 
Classic vs. lightning
Classic vs. lightningClassic vs. lightning
Classic vs. lightningGaurav Kumar
 
3 Ways to Increase Executive Adoption of Salesforce
3 Ways to Increase Executive Adoption of Salesforce3 Ways to Increase Executive Adoption of Salesforce
3 Ways to Increase Executive Adoption of SalesforceSalesforce Admins
 
Salesforce Overview For Beginners/Students
Salesforce Overview For Beginners/StudentsSalesforce Overview For Beginners/Students
Salesforce Overview For Beginners/StudentsSujesh Ramachandran
 
Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...
Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...
Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...Salesforce Developers
 
LWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura InteroperabilityLWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura InteroperabilitySalesforce Developers
 
Seamless Authentication with Force.com Canvas
Seamless Authentication with Force.com CanvasSeamless Authentication with Force.com Canvas
Seamless Authentication with Force.com CanvasSalesforce Developers
 
Fearless Date Formulas: Leap Years and More by Beth Breisnes
Fearless Date Formulas: Leap Years and More by Beth BreisnesFearless Date Formulas: Leap Years and More by Beth Breisnes
Fearless Date Formulas: Leap Years and More by Beth BreisnesSalesforce Admins
 
MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...
MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...
MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...Jitendra Bafna
 
MuleSoft for Enterprises
MuleSoft for EnterprisesMuleSoft for Enterprises
MuleSoft for EnterprisesPrashantGolani1
 
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...Jitendra Bafna
 
Finit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEFinit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEfinitsolutions
 
Introduction to MuleSoft Anytime Platform
Introduction to MuleSoft Anytime PlatformIntroduction to MuleSoft Anytime Platform
Introduction to MuleSoft Anytime PlatformSalesforce Developers
 
SAP Integration: Best Practices | MuleSoft
SAP Integration: Best Practices | MuleSoftSAP Integration: Best Practices | MuleSoft
SAP Integration: Best Practices | MuleSoftMuleSoft
 

Was ist angesagt? (20)

How to add targets to salesforce reports and dashboards
How to add targets to salesforce reports and dashboardsHow to add targets to salesforce reports and dashboards
How to add targets to salesforce reports and dashboards
 
Mule idempotent filter and Object Store
Mule idempotent filter and Object StoreMule idempotent filter and Object Store
Mule idempotent filter and Object Store
 
Introduction To Salesforce Content Management System (CMS)
Introduction To Salesforce Content Management System (CMS)Introduction To Salesforce Content Management System (CMS)
Introduction To Salesforce Content Management System (CMS)
 
Introduction to Apex for Developers
Introduction to Apex for DevelopersIntroduction to Apex for Developers
Introduction to Apex for Developers
 
Sales Lifecycle at Dreamforce 2014
Sales Lifecycle at Dreamforce 2014Sales Lifecycle at Dreamforce 2014
Sales Lifecycle at Dreamforce 2014
 
Classic vs. lightning
Classic vs. lightningClassic vs. lightning
Classic vs. lightning
 
CPQ Solution Study
CPQ Solution StudyCPQ Solution Study
CPQ Solution Study
 
3 Ways to Increase Executive Adoption of Salesforce
3 Ways to Increase Executive Adoption of Salesforce3 Ways to Increase Executive Adoption of Salesforce
3 Ways to Increase Executive Adoption of Salesforce
 
Salesforce Overview For Beginners/Students
Salesforce Overview For Beginners/StudentsSalesforce Overview For Beginners/Students
Salesforce Overview For Beginners/Students
 
Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...
Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...
Intro to Force.com Canvas: Running External Apps within the Salesforce UI Web...
 
LWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura InteroperabilityLWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura Interoperability
 
Seamless Authentication with Force.com Canvas
Seamless Authentication with Force.com CanvasSeamless Authentication with Force.com Canvas
Seamless Authentication with Force.com Canvas
 
Fearless Date Formulas: Leap Years and More by Beth Breisnes
Fearless Date Formulas: Leap Years and More by Beth BreisnesFearless Date Formulas: Leap Years and More by Beth Breisnes
Fearless Date Formulas: Leap Years and More by Beth Breisnes
 
MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...
MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...
MuleSoft Surat Meetup#52 - Flex Gateway (Port Based Routing V/S Path Based Ro...
 
MuleSoft for Enterprises
MuleSoft for EnterprisesMuleSoft for Enterprises
MuleSoft for Enterprises
 
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
MuleSoft Surat Virtual Meetup#25 - Anypoint Platform Features and Capabilitie...
 
Finit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEFinit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEE
 
webMethods Integration Server Introduction
webMethods Integration Server Introduction webMethods Integration Server Introduction
webMethods Integration Server Introduction
 
Introduction to MuleSoft Anytime Platform
Introduction to MuleSoft Anytime PlatformIntroduction to MuleSoft Anytime Platform
Introduction to MuleSoft Anytime Platform
 
SAP Integration: Best Practices | MuleSoft
SAP Integration: Best Practices | MuleSoftSAP Integration: Best Practices | MuleSoft
SAP Integration: Best Practices | MuleSoft
 

Ähnlich wie Configuration vs Customization: Which Is It?

5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User Friendly5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User FriendlyTraction on Demand
 
Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171IBMgbsNA
 
Understanding saa s
Understanding saa sUnderstanding saa s
Understanding saa sUmesh Kodmur
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Managementelliando dias
 
service-mapping-readiness.pptx
service-mapping-readiness.pptxservice-mapping-readiness.pptx
service-mapping-readiness.pptxssuser34987b
 
ISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsCodeScience
 
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clmReedy Feggins Jr
 
A Taste of Lightning in Action
A Taste of Lightning in ActionA Taste of Lightning in Action
A Taste of Lightning in ActionSteven Hugo
 
Salesforce Winter22 Release Overview
Salesforce Winter22 Release OverviewSalesforce Winter22 Release Overview
Salesforce Winter22 Release OverviewSara Sali
 
Sandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam BarnetSandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam BarnetSalesforce Admins
 
Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20Chandra Gundlapalli
 
Shorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for ApexShorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for ApexSalesforce Developers
 
Build Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from ApttusBuild Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from ApttusDreamforce
 
Move to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin WebinarMove to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin WebinarSalesforce Admins
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distjayvinarora
 

Ähnlich wie Configuration vs Customization: Which Is It? (20)

Development Best Practices
Development Best PracticesDevelopment Best Practices
Development Best Practices
 
5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User Friendly5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User Friendly
 
Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171
 
Understanding saa s
Understanding saa sUnderstanding saa s
Understanding saa s
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Management
 
service-mapping-readiness.pptx
service-mapping-readiness.pptxservice-mapping-readiness.pptx
service-mapping-readiness.pptx
 
ISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning Components
 
The World of Agility
The World of Agility The World of Agility
The World of Agility
 
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clm
 
A Taste of Lightning in Action
A Taste of Lightning in ActionA Taste of Lightning in Action
A Taste of Lightning in Action
 
Patching at Scale
Patching at ScalePatching at Scale
Patching at Scale
 
Icld inter cloud-systems 1 21 14 3
Icld inter cloud-systems 1 21 14 3Icld inter cloud-systems 1 21 14 3
Icld inter cloud-systems 1 21 14 3
 
03 icld
03 icld03 icld
03 icld
 
Salesforce Winter22 Release Overview
Salesforce Winter22 Release OverviewSalesforce Winter22 Release Overview
Salesforce Winter22 Release Overview
 
Sandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam BarnetSandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam Barnet
 
Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20
 
Shorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for ApexShorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for Apex
 
Build Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from ApttusBuild Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from Apttus
 
Move to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin WebinarMove to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin Webinar
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for dist
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Configuration vs Customization: Which Is It?

  • 1. Which is it? Configuration vs. Customization Sr. Architect, GlideFast Consulting Travis Toulson
  • 2. 2 © 2019 ServiceNow, Inc. All Rights Reserved. Safe harbor notice for forward-looking statements This presentation may contain forward-looking statements. These statements are intended to be covered by the safe harbor provisions contained in the U.S. Private Securities Litigation Reform Act of 1995. These statements reflect the current beliefs of ServiceNow and are based on current information available to the company as of the date hereof. ServiceNow does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. The forward-looking statements in this presentation are subject to various risks and uncertainties that could cause actual outcomes and results to differ materially and adversely from those expressed in such forward-looking statements. Further information on factors that could affect the company’s financial and other results is included in the filings we make with the Securities and Exchange Commission from time to time, including those discussed in our most recent Annual Report on Form 10-K. The information in this presentation on new offerings, features, or functionality is intended to outline our general product direction and should not be relied upon in making a purchasing decision.
  • 4. 4 © 2019 ServiceNow, Inc. All Rights Reserved. ServiceNow’s KB0553407 A Customization is any change to code that is part of the baseline install of a ServiceNow instance.
  • 5. 5 © 2019 ServiceNow, Inc. All Rights Reserved. Examples Customization • Modify Service Catalog checkout page UI Macro • Building a new “custom” feature into the product (e.g., custom applications, third-party widgets, etc.) Configuration • UI Policy to make fields mandatory • Modifying the Form and List Layout • Installing a Plugin • Modifying System Properties
  • 6. Would you like to play a game? Configuration or Customization?
  • 7. 7 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 1 ServiceNow Admin adds the Description field to the Incident form
  • 8. 8 © 2019 ServiceNow, Inc. All Rights Reserved. Configuration! How we know • No code involved • Form and list view changes are Configuration
  • 9. 9 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 2 A new customer on a Geneva instance builds new widgets using Jelly UI Macros for their CMS
  • 10. 10 © 2019 ServiceNow, Inc. All Rights Reserved. Customization! On the other hand • In Geneva, a baseline CMS without Customization would have been broken due to a Known Error with iFrame sizing • This Known Error would not be fixed until halfway through the Istanbul upgrade cycle • Customers were still using the custom iFrame resize script on CMS well into Jakarta due to on and off errors with the baseline fix How we know • Code change is required • Jelly is XML-based code in ServiceNow similar to the Catalog checkout page example
  • 11. 11 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 3 A Service Portal Developer tailors a Theme and modifies cloned widgets to support corporate branding, accessibility, and style guide standards
  • 12. 12 © 2019 ServiceNow, Inc. All Rights Reserved. Customization! On the other hand • Service Portal was designed so that cloning a widget does not cause skipped upgrades • Can you really imagine only changing the logo, the logo position, some text colors, button colors, and the nav bar? How we know • Code change is required • Portal Themes especially pose risk for breaking between versions • ServiceNow Docs encourage using CSS Variables to override Bootstrap styles first
  • 13. 13 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 4 A ServiceNow customer implements Test Management in Jakarta as part of PPM; as part of the implementation, the customer adds some form fields, builds out reporting, dashboards, and notifications investing in the tool
  • 14. 14 © 2019 ServiceNow, Inc. All Rights Reserved. Configuration! On the other hand • Test Management 2.0 was released in London using a completely different set of modules leaving the customer in question as to future support • A hard decision was faced to remain on Test Management or reimplement on Test Management v2 • In this case, Configuration failed to prevent reimplementation How we know • No code involved • Once again we are configuring form views • Additionally, we are building reports and dashboards which are all supported Configurations
  • 15. Wow, this game got dark real fast! Sorry about that…
  • 16. 16 © 2019 ServiceNow, Inc. All Rights Reserved. Awesome framed poster in my living room Everything in life that matters requires risk.
  • 18. 18 © 2019 ServiceNow, Inc. All Rights Reserved. Project Management Body of Knowledge A risk is an uncertain event or condition that, if it occurs, has a positive or negative effect on a project's objectives
  • 19. 19 © 2019 ServiceNow, Inc. All Rights Reserved. Step 1: Identify the risk Opportunities (Positive Risk) • Reduced costs • Creation of additional revenue • Mitigation or avoidance of other organizational risks • Increased process transparency Threats (Negative Risk) • YOU are responsible for maintaining the code • Delayed upgrades: Future ServiceNow upgrades can be skipped or broken • Unable to use new ServiceNow applications or features • Worst case: Z-Boot, Reimplementation, or Multiple Instances
  • 20. 20 © 2019 ServiceNow, Inc. All Rights Reserved. Identifying Threat Sources • Changing out-of-box records (even the active flag) • Changing newly implemented apps or behaviors • Changing frequently updated apps or behaviors • Using non-standard APIs • Using APIs in non-standard ways • Modifying default or designed behavior • Imitating behaviors that exist in other application • Remember: Any record that can be influenced directly or via dependency by both you and ServiceNow is a threat to your implementation.
  • 21. 21 © 2019 ServiceNow, Inc. All Rights Reserved. Step 2: Assess the risk Rating Probability Severity (threat) Severity (opportunity) 1 Rare or very unlikely to happen Minimal maintenance is required to maintain business operation Minimal impact to users; functionality is easily replaced or ignored 2 Possible Moderate maintenance will be required or current business processes may require change Moderate impact to user; functionality will noticeably improve processes 3 Likely or almost certain to happen Severe maintenance required, potential z-boot risk, or significant loss of business functionality Severe business impact; functionality is likely mission critical or of measurable impact to key metrics
  • 22. 22 © 2019 ServiceNow, Inc. All Rights Reserved. Step 3: Plan risk response Strategies for opportunities • Exploit: Take action to maximize the upside of the opportunity • Share: Work with ServiceNow or a Partner to devise the best way of achieving the opportunity • Enhance: Take action to increase the likelihood of successfully realizing the opportunity • Accept: Still do nothing and hope for the best Strategies for threats • Avoid: Devise a different implementation to remove the cause of the risk • Transfer: Engage with a ServiceNow Partner to collaborate on upgrades and maintenance • Mitigate: Take action to limit the probability or severity of the risk • Accept: Do nothing and hope for the best
  • 23. 23 © 2019 ServiceNow, Inc. All Rights Reserved. • Use Scoped Applications • Use new tables to compose behavior onto existing tables • Extend tables if composition won’t work—provides better isolation than nothing • If you have to, modify existing records in place – Inactivate the existing and create a new record is no longer the published best practice • Record your Customizations somewhere! – Make customizations easy to identify Remember: The keys to mitigating threats in ServiceNow customization are isolation and limiting dependencies Avoidance is not the only strategy!
  • 24. 24 © 2019 ServiceNow, Inc. All Rights Reserved. Step 4: Make a decision • For a given solution, assess the Risk Score for Threats and Opportunities • (Probability * Severity) / 3 = Risk Score • Plot the Threat Risk Score vs. the Opportunity Risk Score on the matrix • You can average the Risk Scores, use the Maximum of each, use a more robust aggregate, or SWAG it Opportunity High Medium Low Low Medium High Threat
  • 25. 25 © 2019 ServiceNow, Inc. All Rights Reserved. Your Risk Gradient may varyOpportunity Threat Opportunity Threat Opportunity Threat
  • 26. 26 © 2019 ServiceNow, Inc. All Rights Reserved. Risk Management Process Recap Identify the risk • Identify the risks and risk sources • Identify both positive and negative risks Assess the risk • Evaluate the probability (likelihood) and severity (consequence) Plan risk response • Take action to minimize the negative risks and maximize the positive Make a decision • To implement or not to implement, that is the question
  • 27. 27 © 2019 ServiceNow, Inc. All Rights Reserved. Key takeaways 1 2 3 Every ServiceNow choice involves risk. Debating Configuration vs. Customization is of limited use. Use a Risk Management process to make better decisions.
  • 28.
  • 29. 29 © 2019 ServiceNow, Inc. All Rights Reserved. Tell us what you think! Find the app in the Apple App Store or Google Play Store by searching for ServiceNow Events. Give us your feedback and submit the survey.

Hinweis der Redaktion

  1. CCDT0026 Configuration vs customization: which Is It? Session Description: Customization: the most dreaded word on the ServiceNow Platform. But what exactly makes a configuration a configuration and a customization a customization? The rules aren't always clear. In this session, we will move beyond the traditional argument and instead explore criteria by which we can properly assess the risk of an implementation choice. Objective: To teach developers and implementers how to properly evaluate the risk of an implementation decision rather than rely on definitions of configuration and customization.
  2. A configuration is tailoring an instance using ServiceNow best practices and API to meet your requirements without making changes to code that is part of the baseline installation of an instance.
  3. With this in mind, I want to provide simple steps to evaluate an implementation decision
  4. Here I refer to negative risks as threats and positive risks as opportunities When identifying risks in ServiceNow, look for the positive and negative effects mentioned on this slide. The risk effects are fairly universal across most organizations. By looking for the more universal effects, you can more easily identify
  5. Here is a list of potential sources that can introduce negative risk into your implementation.
  6. Note that this matrix is very similar to our Change Management and Incident Management risk and priority assessments. Probability: What is the likelihood of risk occurrence Severity: What is the significance of the consequence if the risk occurs
  7. In addition to transferring and accepting the threats, we can also mitigate our threats. This slide gives some examples of how we might accomplish that by isolating the records that we own from the records that ServiceNow owns through clearly defined interfaces. The key to mitigating threats in ServiceNow customization: Isolate your customizations and limit the number of dependencies between your customizations and ServiceNow’s code. Dependencies are where processes break.
  8. Left: Low threat tolerance Middle: Balanced threat tolerance Right: High Opportunity pursuit