SlideShare une entreprise Scribd logo
1  sur  30
Which is it?
Configuration vs. Customization
Sr. Architect,
GlideFast Consulting
Travis Toulson
2 © 2019 ServiceNow, Inc. All Rights Reserved.
Safe harbor notice for forward-looking statements
This presentation may contain forward-looking statements. These statements are intended to be covered by
the safe harbor provisions contained in the U.S. Private Securities Litigation Reform Act of 1995. These
statements reflect the current beliefs of ServiceNow and are based on current information available to the
company as of the date hereof. ServiceNow does not assume any obligation to update the forward-looking
statements provided to reflect events that occur or circumstances that exist after the date on which they
were made. The forward-looking statements in this presentation are subject to various risks and
uncertainties that could cause actual outcomes and results to differ materially and adversely from those
expressed in such forward-looking statements. Further information on factors that could affect the
company’s financial and other results is included in the filings we make with the Securities and Exchange
Commission from time to time, including those discussed in our most recent Annual Report on Form 10-K.
The information in this presentation on new offerings, features, or functionality is intended
to outline our general product direction and should not be relied upon in making a purchasing decision.
The official guidance
4 © 2019 ServiceNow, Inc. All Rights Reserved.
ServiceNow’s KB0553407
A Customization is any change to code
that is part of the baseline install of a
ServiceNow instance.
5 © 2019 ServiceNow, Inc. All Rights Reserved.
Examples
Customization
• Modify Service Catalog checkout page UI
Macro
• Building a new “custom”
feature into the product
(e.g., custom applications,
third-party widgets, etc.)
Configuration
• UI Policy to make fields mandatory
• Modifying the Form and List Layout
• Installing a Plugin
• Modifying System Properties
Would you like to play a game?
Configuration or Customization?
7 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
1 ServiceNow Admin adds the Description field to the Incident form
8 © 2019 ServiceNow, Inc. All Rights Reserved.
Configuration!
How we know
• No code involved
• Form and list view changes
are Configuration
9 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
2 A new customer on a Geneva instance builds new widgets using Jelly UI Macros
for their CMS
10 © 2019 ServiceNow, Inc. All Rights Reserved.
Customization!
On the other hand
• In Geneva, a baseline CMS without
Customization would have been broken
due to a Known Error with iFrame sizing
• This Known Error would not be fixed until
halfway through the Istanbul upgrade cycle
• Customers were still using the custom
iFrame resize script on CMS well into
Jakarta due to on and off errors with the
baseline fix
How we know
• Code change is required
• Jelly is XML-based code in ServiceNow
similar to the Catalog checkout page
example
11 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
3 A Service Portal Developer tailors a Theme and modifies cloned widgets to support corporate branding,
accessibility, and style guide standards
12 © 2019 ServiceNow, Inc. All Rights Reserved.
Customization!
On the other hand
• Service Portal was designed so that cloning
a widget does not cause skipped upgrades
• Can you really imagine only changing the
logo, the logo position, some text colors,
button colors, and the nav bar?
How we know
• Code change is required
• Portal Themes especially pose risk for
breaking between versions
• ServiceNow Docs encourage using CSS
Variables to override Bootstrap styles first
13 © 2019 ServiceNow, Inc. All Rights Reserved.
Is it a Configuration or Customization?
4
A ServiceNow customer implements Test Management in Jakarta as part of PPM;
as part of the implementation, the customer adds some form fields, builds out reporting, dashboards,
and notifications investing in the tool
14 © 2019 ServiceNow, Inc. All Rights Reserved.
Configuration!
On the other hand
• Test Management 2.0 was released in
London using a completely different set of
modules leaving
the customer in question as to future
support
• A hard decision was faced to remain on
Test Management or reimplement on Test
Management v2
• In this case, Configuration failed
to prevent reimplementation
How we know
• No code involved
• Once again we are configuring form views
• Additionally, we are building reports and
dashboards which are all supported
Configurations
Wow, this game got dark real fast!
Sorry about that…
16 © 2019 ServiceNow, Inc. All Rights Reserved.
Awesome framed poster in my living room
Everything in life that matters
requires risk.
Managing Implementation Risk
18 © 2019 ServiceNow, Inc. All Rights Reserved.
Project Management Body of Knowledge
A risk is an uncertain event or condition
that, if it occurs, has a positive or negative
effect on a project's objectives
19 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 1: Identify the risk
Opportunities (Positive Risk)
• Reduced costs
• Creation of additional revenue
• Mitigation or avoidance of other
organizational risks
• Increased process transparency
Threats (Negative Risk)
• YOU are responsible for maintaining the
code
• Delayed upgrades: Future ServiceNow
upgrades can be skipped or broken
• Unable to use new ServiceNow applications
or features
• Worst case: Z-Boot, Reimplementation, or
Multiple Instances
20 © 2019 ServiceNow, Inc. All Rights Reserved.
Identifying Threat Sources
• Changing out-of-box records (even the active flag)
• Changing newly implemented apps or behaviors
• Changing frequently updated apps or behaviors
• Using non-standard APIs
• Using APIs in non-standard ways
• Modifying default or designed behavior
• Imitating behaviors that exist in other application
• Remember: Any record that can be influenced directly or via dependency by both you and ServiceNow is a
threat to your implementation.
21 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 2: Assess the risk
Rating Probability Severity (threat) Severity (opportunity)
1
Rare or very unlikely to
happen
Minimal maintenance is required to
maintain business operation
Minimal impact to users;
functionality is easily
replaced or ignored
2 Possible
Moderate maintenance will be required
or current business processes may
require change
Moderate impact to user;
functionality will noticeably
improve processes
3
Likely or almost certain
to happen
Severe maintenance required, potential
z-boot risk, or significant loss of business
functionality
Severe business impact;
functionality is likely mission critical
or of measurable impact to key
metrics
22 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 3: Plan risk response
Strategies for opportunities
• Exploit: Take action to maximize the upside
of the opportunity
• Share: Work with ServiceNow or a Partner
to devise the best way of achieving the
opportunity
• Enhance: Take action to increase the
likelihood of successfully realizing the
opportunity
• Accept: Still do nothing and hope for the
best
Strategies for threats
• Avoid: Devise a different implementation to
remove the cause of the risk
• Transfer: Engage with a ServiceNow Partner
to collaborate on upgrades and
maintenance
• Mitigate: Take action to limit the probability
or severity of the risk
• Accept: Do nothing and hope for the best
23 © 2019 ServiceNow, Inc. All Rights Reserved.
• Use Scoped Applications
• Use new tables to compose behavior onto existing tables
• Extend tables if composition won’t work—provides better isolation than nothing
• If you have to, modify existing records in place
– Inactivate the existing and create a new record is no longer the published best practice
• Record your Customizations somewhere!
– Make customizations easy to identify
Remember: The keys to mitigating threats in ServiceNow customization are isolation and limiting
dependencies
Avoidance is not the only strategy!
24 © 2019 ServiceNow, Inc. All Rights Reserved.
Step 4: Make a decision
• For a given solution, assess the Risk Score for
Threats and Opportunities
• (Probability * Severity) / 3 = Risk Score
• Plot the Threat Risk Score vs. the Opportunity
Risk Score on the matrix
• You can average the Risk Scores,
use the Maximum of each, use a more robust
aggregate, or SWAG it
Opportunity
High
Medium
Low
Low Medium High
Threat
25 © 2019 ServiceNow, Inc. All Rights Reserved.
Your Risk Gradient may varyOpportunity
Threat
Opportunity
Threat
Opportunity
Threat
26 © 2019 ServiceNow, Inc. All Rights Reserved.
Risk Management Process Recap
Identify the risk
• Identify the risks
and risk sources
• Identify both positive and
negative risks
Assess the risk
• Evaluate the probability
(likelihood)
and severity
(consequence)
Plan risk response
• Take action to minimize
the negative risks
and maximize
the positive
Make a decision
• To implement or
not to implement, that is
the question
27 © 2019 ServiceNow, Inc. All Rights Reserved.
Key takeaways
1 2 3
Every ServiceNow choice involves
risk.
Debating Configuration
vs. Customization is of limited
use.
Use a Risk Management process
to make
better decisions.
29 © 2019 ServiceNow, Inc. All Rights Reserved.
Tell us what you think!
Find the app in the Apple App Store or
Google Play Store by searching for
ServiceNow Events.
Give us your feedback and
submit the survey.
Thank you
https://glidefast.com
https://codecreative.io

Contenu connexe

Tendances

Supplier Risk Pugh Matrix
Supplier Risk Pugh MatrixSupplier Risk Pugh Matrix
Supplier Risk Pugh MatrixLewis Adams
 
Business process mapping
Business process mappingBusiness process mapping
Business process mappingDAVIS THOMAS
 
itSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementitSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementEric Sambraus
 
Business Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesBusiness Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesSlideTeam
 
BPMN 2.0 overview
BPMN 2.0 overviewBPMN 2.0 overview
BPMN 2.0 overviewsolomd
 
Operation Management PowerPoint Presentation Slides
Operation Management PowerPoint Presentation SlidesOperation Management PowerPoint Presentation Slides
Operation Management PowerPoint Presentation SlidesSlideTeam
 
How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...
How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...
How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...Jeremy Jay V. Lim, MBB, PMP
 
ServiceNow - Introduction.pptx
ServiceNow - Introduction.pptxServiceNow - Introduction.pptx
ServiceNow - Introduction.pptxUjjwalPandit7
 
As Is To Be Develop Analysis Business Strategy Management Process Improve
As Is To Be Develop Analysis Business Strategy Management Process ImproveAs Is To Be Develop Analysis Business Strategy Management Process Improve
As Is To Be Develop Analysis Business Strategy Management Process ImproveSlideTeam
 
Fixed assets accountant kpi
Fixed assets accountant kpiFixed assets accountant kpi
Fixed assets accountant kpiiricador
 
Company Operations Powerpoint Presentation Slides
Company Operations Powerpoint Presentation SlidesCompany Operations Powerpoint Presentation Slides
Company Operations Powerpoint Presentation SlidesSlideTeam
 
Dmaic phases & tools
Dmaic phases & toolsDmaic phases & tools
Dmaic phases & toolsSharif Rahman
 
Business analyst interview questions and answers
Business analyst interview questions and answersBusiness analyst interview questions and answers
Business analyst interview questions and answersRobin G
 
The Business Analyst And The Sdlc
The Business Analyst And The SdlcThe Business Analyst And The Sdlc
The Business Analyst And The SdlcCraig Brown
 
Business Analysis
Business AnalysisBusiness Analysis
Business AnalysisBCS-IT
 
Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...
Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...
Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...SlideTeam
 
DMAIC-Six sigma process Improvement Approach
DMAIC-Six sigma process Improvement ApproachDMAIC-Six sigma process Improvement Approach
DMAIC-Six sigma process Improvement ApproachConfiz
 
Free CBAP V3 study material
Free CBAP V3 study materialFree CBAP V3 study material
Free CBAP V3 study materialLN Mishra CBAP
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process ModelingSandy Kemsley
 
Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...
Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...
Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...TechExpert
 

Tendances (20)

Supplier Risk Pugh Matrix
Supplier Risk Pugh MatrixSupplier Risk Pugh Matrix
Supplier Risk Pugh Matrix
 
Business process mapping
Business process mappingBusiness process mapping
Business process mapping
 
itSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementitSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem Management
 
Business Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesBusiness Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation Slides
 
BPMN 2.0 overview
BPMN 2.0 overviewBPMN 2.0 overview
BPMN 2.0 overview
 
Operation Management PowerPoint Presentation Slides
Operation Management PowerPoint Presentation SlidesOperation Management PowerPoint Presentation Slides
Operation Management PowerPoint Presentation Slides
 
How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...
How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...
How to apply Six Sigma DMAIC for Reducing Client's Line Wait Time at the Bank...
 
ServiceNow - Introduction.pptx
ServiceNow - Introduction.pptxServiceNow - Introduction.pptx
ServiceNow - Introduction.pptx
 
As Is To Be Develop Analysis Business Strategy Management Process Improve
As Is To Be Develop Analysis Business Strategy Management Process ImproveAs Is To Be Develop Analysis Business Strategy Management Process Improve
As Is To Be Develop Analysis Business Strategy Management Process Improve
 
Fixed assets accountant kpi
Fixed assets accountant kpiFixed assets accountant kpi
Fixed assets accountant kpi
 
Company Operations Powerpoint Presentation Slides
Company Operations Powerpoint Presentation SlidesCompany Operations Powerpoint Presentation Slides
Company Operations Powerpoint Presentation Slides
 
Dmaic phases & tools
Dmaic phases & toolsDmaic phases & tools
Dmaic phases & tools
 
Business analyst interview questions and answers
Business analyst interview questions and answersBusiness analyst interview questions and answers
Business analyst interview questions and answers
 
The Business Analyst And The Sdlc
The Business Analyst And The SdlcThe Business Analyst And The Sdlc
The Business Analyst And The Sdlc
 
Business Analysis
Business AnalysisBusiness Analysis
Business Analysis
 
Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...
Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...
Dissertation Data Presentation Structure and Analysis PowerPoint Presentation...
 
DMAIC-Six sigma process Improvement Approach
DMAIC-Six sigma process Improvement ApproachDMAIC-Six sigma process Improvement Approach
DMAIC-Six sigma process Improvement Approach
 
Free CBAP V3 study material
Free CBAP V3 study materialFree CBAP V3 study material
Free CBAP V3 study material
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...
Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...
Управление конфигурациями и устройствами в GLPi, интеграция в корпоративную с...
 

Similaire à Configuration vs Customization: Which Is It?

5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User Friendly5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User FriendlyTraction on Demand
 
Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171IBMgbsNA
 
Understanding saa s
Understanding saa sUnderstanding saa s
Understanding saa sUmesh Kodmur
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Managementelliando dias
 
service-mapping-readiness.pptx
service-mapping-readiness.pptxservice-mapping-readiness.pptx
service-mapping-readiness.pptxssuser34987b
 
ISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsCodeScience
 
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clmReedy Feggins Jr
 
A Taste of Lightning in Action
A Taste of Lightning in ActionA Taste of Lightning in Action
A Taste of Lightning in ActionSteven Hugo
 
Salesforce Winter22 Release Overview
Salesforce Winter22 Release OverviewSalesforce Winter22 Release Overview
Salesforce Winter22 Release OverviewSara Sali
 
Sandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam BarnetSandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam BarnetSalesforce Admins
 
Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20Chandra Gundlapalli
 
Shorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for ApexShorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for ApexSalesforce Developers
 
Build Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from ApttusBuild Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from ApttusDreamforce
 
Move to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin WebinarMove to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin WebinarSalesforce Admins
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distjayvinarora
 

Similaire à Configuration vs Customization: Which Is It? (20)

Development Best Practices
Development Best PracticesDevelopment Best Practices
Development Best Practices
 
5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User Friendly5 Easy Ways to Make Your Org Instantly More User Friendly
5 Easy Ways to Make Your Org Instantly More User Friendly
 
Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171
 
Understanding saa s
Understanding saa sUnderstanding saa s
Understanding saa s
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Management
 
service-mapping-readiness.pptx
service-mapping-readiness.pptxservice-mapping-readiness.pptx
service-mapping-readiness.pptx
 
ISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning Components
 
The World of Agility
The World of Agility The World of Agility
The World of Agility
 
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm2016 interconnect   7 habits of a successful scaled agile adoption using ibm clm
2016 interconnect 7 habits of a successful scaled agile adoption using ibm clm
 
A Taste of Lightning in Action
A Taste of Lightning in ActionA Taste of Lightning in Action
A Taste of Lightning in Action
 
Patching at Scale
Patching at ScalePatching at Scale
Patching at Scale
 
Icld inter cloud-systems 1 21 14 3
Icld inter cloud-systems 1 21 14 3Icld inter cloud-systems 1 21 14 3
Icld inter cloud-systems 1 21 14 3
 
03 icld
03 icld03 icld
03 icld
 
Salesforce Winter22 Release Overview
Salesforce Winter22 Release OverviewSalesforce Winter22 Release Overview
Salesforce Winter22 Release Overview
 
Sandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam BarnetSandboxes: The Future of App Development by Evan Barnet & Pam Barnet
Sandboxes: The Future of App Development by Evan Barnet & Pam Barnet
 
Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20Chandra Gundlapalli ServiceKnow K20
Chandra Gundlapalli ServiceKnow K20
 
Shorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for ApexShorten Your Development Time with an Extensible Design for Apex
Shorten Your Development Time with an Extensible Design for Apex
 
Build Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from ApttusBuild Apps Fast with Lightning Components from Apttus
Build Apps Fast with Lightning Components from Apttus
 
Move to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin WebinarMove to Lightning in 60 Days - Admin Webinar
Move to Lightning in 60 Days - Admin Webinar
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for dist
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Configuration vs Customization: Which Is It?

  • 1. Which is it? Configuration vs. Customization Sr. Architect, GlideFast Consulting Travis Toulson
  • 2. 2 © 2019 ServiceNow, Inc. All Rights Reserved. Safe harbor notice for forward-looking statements This presentation may contain forward-looking statements. These statements are intended to be covered by the safe harbor provisions contained in the U.S. Private Securities Litigation Reform Act of 1995. These statements reflect the current beliefs of ServiceNow and are based on current information available to the company as of the date hereof. ServiceNow does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. The forward-looking statements in this presentation are subject to various risks and uncertainties that could cause actual outcomes and results to differ materially and adversely from those expressed in such forward-looking statements. Further information on factors that could affect the company’s financial and other results is included in the filings we make with the Securities and Exchange Commission from time to time, including those discussed in our most recent Annual Report on Form 10-K. The information in this presentation on new offerings, features, or functionality is intended to outline our general product direction and should not be relied upon in making a purchasing decision.
  • 4. 4 © 2019 ServiceNow, Inc. All Rights Reserved. ServiceNow’s KB0553407 A Customization is any change to code that is part of the baseline install of a ServiceNow instance.
  • 5. 5 © 2019 ServiceNow, Inc. All Rights Reserved. Examples Customization • Modify Service Catalog checkout page UI Macro • Building a new “custom” feature into the product (e.g., custom applications, third-party widgets, etc.) Configuration • UI Policy to make fields mandatory • Modifying the Form and List Layout • Installing a Plugin • Modifying System Properties
  • 6. Would you like to play a game? Configuration or Customization?
  • 7. 7 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 1 ServiceNow Admin adds the Description field to the Incident form
  • 8. 8 © 2019 ServiceNow, Inc. All Rights Reserved. Configuration! How we know • No code involved • Form and list view changes are Configuration
  • 9. 9 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 2 A new customer on a Geneva instance builds new widgets using Jelly UI Macros for their CMS
  • 10. 10 © 2019 ServiceNow, Inc. All Rights Reserved. Customization! On the other hand • In Geneva, a baseline CMS without Customization would have been broken due to a Known Error with iFrame sizing • This Known Error would not be fixed until halfway through the Istanbul upgrade cycle • Customers were still using the custom iFrame resize script on CMS well into Jakarta due to on and off errors with the baseline fix How we know • Code change is required • Jelly is XML-based code in ServiceNow similar to the Catalog checkout page example
  • 11. 11 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 3 A Service Portal Developer tailors a Theme and modifies cloned widgets to support corporate branding, accessibility, and style guide standards
  • 12. 12 © 2019 ServiceNow, Inc. All Rights Reserved. Customization! On the other hand • Service Portal was designed so that cloning a widget does not cause skipped upgrades • Can you really imagine only changing the logo, the logo position, some text colors, button colors, and the nav bar? How we know • Code change is required • Portal Themes especially pose risk for breaking between versions • ServiceNow Docs encourage using CSS Variables to override Bootstrap styles first
  • 13. 13 © 2019 ServiceNow, Inc. All Rights Reserved. Is it a Configuration or Customization? 4 A ServiceNow customer implements Test Management in Jakarta as part of PPM; as part of the implementation, the customer adds some form fields, builds out reporting, dashboards, and notifications investing in the tool
  • 14. 14 © 2019 ServiceNow, Inc. All Rights Reserved. Configuration! On the other hand • Test Management 2.0 was released in London using a completely different set of modules leaving the customer in question as to future support • A hard decision was faced to remain on Test Management or reimplement on Test Management v2 • In this case, Configuration failed to prevent reimplementation How we know • No code involved • Once again we are configuring form views • Additionally, we are building reports and dashboards which are all supported Configurations
  • 15. Wow, this game got dark real fast! Sorry about that…
  • 16. 16 © 2019 ServiceNow, Inc. All Rights Reserved. Awesome framed poster in my living room Everything in life that matters requires risk.
  • 18. 18 © 2019 ServiceNow, Inc. All Rights Reserved. Project Management Body of Knowledge A risk is an uncertain event or condition that, if it occurs, has a positive or negative effect on a project's objectives
  • 19. 19 © 2019 ServiceNow, Inc. All Rights Reserved. Step 1: Identify the risk Opportunities (Positive Risk) • Reduced costs • Creation of additional revenue • Mitigation or avoidance of other organizational risks • Increased process transparency Threats (Negative Risk) • YOU are responsible for maintaining the code • Delayed upgrades: Future ServiceNow upgrades can be skipped or broken • Unable to use new ServiceNow applications or features • Worst case: Z-Boot, Reimplementation, or Multiple Instances
  • 20. 20 © 2019 ServiceNow, Inc. All Rights Reserved. Identifying Threat Sources • Changing out-of-box records (even the active flag) • Changing newly implemented apps or behaviors • Changing frequently updated apps or behaviors • Using non-standard APIs • Using APIs in non-standard ways • Modifying default or designed behavior • Imitating behaviors that exist in other application • Remember: Any record that can be influenced directly or via dependency by both you and ServiceNow is a threat to your implementation.
  • 21. 21 © 2019 ServiceNow, Inc. All Rights Reserved. Step 2: Assess the risk Rating Probability Severity (threat) Severity (opportunity) 1 Rare or very unlikely to happen Minimal maintenance is required to maintain business operation Minimal impact to users; functionality is easily replaced or ignored 2 Possible Moderate maintenance will be required or current business processes may require change Moderate impact to user; functionality will noticeably improve processes 3 Likely or almost certain to happen Severe maintenance required, potential z-boot risk, or significant loss of business functionality Severe business impact; functionality is likely mission critical or of measurable impact to key metrics
  • 22. 22 © 2019 ServiceNow, Inc. All Rights Reserved. Step 3: Plan risk response Strategies for opportunities • Exploit: Take action to maximize the upside of the opportunity • Share: Work with ServiceNow or a Partner to devise the best way of achieving the opportunity • Enhance: Take action to increase the likelihood of successfully realizing the opportunity • Accept: Still do nothing and hope for the best Strategies for threats • Avoid: Devise a different implementation to remove the cause of the risk • Transfer: Engage with a ServiceNow Partner to collaborate on upgrades and maintenance • Mitigate: Take action to limit the probability or severity of the risk • Accept: Do nothing and hope for the best
  • 23. 23 © 2019 ServiceNow, Inc. All Rights Reserved. • Use Scoped Applications • Use new tables to compose behavior onto existing tables • Extend tables if composition won’t work—provides better isolation than nothing • If you have to, modify existing records in place – Inactivate the existing and create a new record is no longer the published best practice • Record your Customizations somewhere! – Make customizations easy to identify Remember: The keys to mitigating threats in ServiceNow customization are isolation and limiting dependencies Avoidance is not the only strategy!
  • 24. 24 © 2019 ServiceNow, Inc. All Rights Reserved. Step 4: Make a decision • For a given solution, assess the Risk Score for Threats and Opportunities • (Probability * Severity) / 3 = Risk Score • Plot the Threat Risk Score vs. the Opportunity Risk Score on the matrix • You can average the Risk Scores, use the Maximum of each, use a more robust aggregate, or SWAG it Opportunity High Medium Low Low Medium High Threat
  • 25. 25 © 2019 ServiceNow, Inc. All Rights Reserved. Your Risk Gradient may varyOpportunity Threat Opportunity Threat Opportunity Threat
  • 26. 26 © 2019 ServiceNow, Inc. All Rights Reserved. Risk Management Process Recap Identify the risk • Identify the risks and risk sources • Identify both positive and negative risks Assess the risk • Evaluate the probability (likelihood) and severity (consequence) Plan risk response • Take action to minimize the negative risks and maximize the positive Make a decision • To implement or not to implement, that is the question
  • 27. 27 © 2019 ServiceNow, Inc. All Rights Reserved. Key takeaways 1 2 3 Every ServiceNow choice involves risk. Debating Configuration vs. Customization is of limited use. Use a Risk Management process to make better decisions.
  • 28.
  • 29. 29 © 2019 ServiceNow, Inc. All Rights Reserved. Tell us what you think! Find the app in the Apple App Store or Google Play Store by searching for ServiceNow Events. Give us your feedback and submit the survey.

Notes de l'éditeur

  1. CCDT0026 Configuration vs customization: which Is It? Session Description: Customization: the most dreaded word on the ServiceNow Platform. But what exactly makes a configuration a configuration and a customization a customization? The rules aren't always clear. In this session, we will move beyond the traditional argument and instead explore criteria by which we can properly assess the risk of an implementation choice. Objective: To teach developers and implementers how to properly evaluate the risk of an implementation decision rather than rely on definitions of configuration and customization.
  2. A configuration is tailoring an instance using ServiceNow best practices and API to meet your requirements without making changes to code that is part of the baseline installation of an instance.
  3. With this in mind, I want to provide simple steps to evaluate an implementation decision
  4. Here I refer to negative risks as threats and positive risks as opportunities When identifying risks in ServiceNow, look for the positive and negative effects mentioned on this slide. The risk effects are fairly universal across most organizations. By looking for the more universal effects, you can more easily identify
  5. Here is a list of potential sources that can introduce negative risk into your implementation.
  6. Note that this matrix is very similar to our Change Management and Incident Management risk and priority assessments. Probability: What is the likelihood of risk occurrence Severity: What is the significance of the consequence if the risk occurs
  7. In addition to transferring and accepting the threats, we can also mitigate our threats. This slide gives some examples of how we might accomplish that by isolating the records that we own from the records that ServiceNow owns through clearly defined interfaces. The key to mitigating threats in ServiceNow customization: Isolate your customizations and limit the number of dependencies between your customizations and ServiceNow’s code. Dependencies are where processes break.
  8. Left: Low threat tolerance Middle: Balanced threat tolerance Right: High Opportunity pursuit