Presented by Irina Kon and Ulrike Kruger on January 25th, 2017.
Irina and Ulrike take a deep dive into our CRM solution to help you get some hands-on experience that you can bring back to your workplace and better understand the solution.
Alliance 2017 - World of Possibilities Using CRM and PortalsSparkrock
Presented by Irina Kon and Paria Panahandeh on January 26th, 2017.
Irina and Paria give some valuable insight on how CRM portals work, WebApp features, and what they can do to improve your organization's efficiency.
Alliance 2017 - New to CRM? Top 10 Things You Need to KnowSparkrock
Presented by Chris Carre on January 26th, 2017.
Whether you're the experienced user or completely new to CRM, Chris will help you get the most out of CRM with these helpful tips and tricks.
SLAS 2017 - "Multiple Research Platforms: One Single Data Sharing Portal"CSols, Inc.
Electronic Laboratory Notebook (ELN) Presentation by Farid Said of CSols, Inc. (the Premier Laboratory Informatics Experts).
For more information and any questions visit: http://www.csolsinc.com
Gartner analysts will discuss latest BPM trends at the Gartner Business Process Summit 2011, 7-8 March in London. For further information about the event please visit europe.gartner.com
Gartner analysts will further discuss how to prioritise IT initiatives, while balancing the use of resources at Gartner PPM & IT Governance Summit 2011, 14-15 June in London. For more information please visit europe.gartner.com/ppm
Alliance 2017 - World of Possibilities Using CRM and PortalsSparkrock
Presented by Irina Kon and Paria Panahandeh on January 26th, 2017.
Irina and Paria give some valuable insight on how CRM portals work, WebApp features, and what they can do to improve your organization's efficiency.
Alliance 2017 - New to CRM? Top 10 Things You Need to KnowSparkrock
Presented by Chris Carre on January 26th, 2017.
Whether you're the experienced user or completely new to CRM, Chris will help you get the most out of CRM with these helpful tips and tricks.
SLAS 2017 - "Multiple Research Platforms: One Single Data Sharing Portal"CSols, Inc.
Electronic Laboratory Notebook (ELN) Presentation by Farid Said of CSols, Inc. (the Premier Laboratory Informatics Experts).
For more information and any questions visit: http://www.csolsinc.com
Gartner analysts will discuss latest BPM trends at the Gartner Business Process Summit 2011, 7-8 March in London. For further information about the event please visit europe.gartner.com
Gartner analysts will further discuss how to prioritise IT initiatives, while balancing the use of resources at Gartner PPM & IT Governance Summit 2011, 14-15 June in London. For more information please visit europe.gartner.com/ppm
CIO Standard Requirements
Source: https://store.theartofservice.com/cio-standard-requirements/
Sample Requirements:
The full extent of a given risk and its priority compared to other risks are not understood. Failure to address the most important risks first leads to dangerous exposures. Nearly all managers believe that their risks are the most important in the enterprise (or at least they say so) but whose risks really matter most?
Does your organization constantly monitor in real time your networks, systems and applications for unauthorized access or anomalous behavior such as viruses, malicious code insertion, or break-in attempts?
We have determined whether the goals, norms and rules of our organization are properly transmitting the value of the organizational culture to staff members and if there are areas for improvement
When deciding to outsource we know if the candidate services require extensive interactions between the service providers and the business's competitive and strategic resources and capabilities
Has the CIO ensured security training and awareness of all agency employees, including contractors and those employees with significant IT security responsibilities?
If services come in direct contact with the customers of customers, we have additional policies and guidelines required to handle user interactions and user information?
What impact has emerging technology (e.g., cloud computing, virtualization and mobile computing) had on your companys ITRM program over the past 12 months?
Do you have a good understanding of emerging technologies and business trends that are vital for the management of IT risks in a fast-changing environment?
Is the CIO or someone similar, responsible for strategic planning, implementation, and management of integrated systems identified by the IT infrastructure plan?
Our strategic approach to Service Design results in services that can be offered at a competitive market price, substantially reduced risk, or offers superior value?
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-4.pptxRamanaBulusu1
ERP Systems Post Implementation Audit - This is going to be useful for the audit of an ERP implementation after the implementation is completed. Refer the previous parts before coming here.
Steps Of Strategic Procurement Process PowerPoint Presentation SlidesSlideTeam
Steps Of Strategic Procurement Process PowerPoint Presentation Slides is a custom virtual solution for management professionals. The outsourcing process PPT theme helps individuals from all domains to represent the steps involved in strategic partnership. Showcase the distribution network of any organization with the help of our partners strategy PowerPoint slideshow. This graphically-gripping strategic sourcing PPT presentation features interesting and informative data visualizations. Employ our comprehensive PowerPoint layout to cover all the fundamentals of the procurement procedure. Use this business process outsourcing PPT templates deck to convey the need for an external service provider by your firm. You can also represent all the related business functions to determine which ones you can outsource. Demonstrate your organization’s partner relationship improvement strategy. Other aspects highlighted in this presentation are requests for proposals, channel partner selection, and SaaS implementation roadmap. Get access to dashboard diagrams to display the evaluation of channel partner performance. Hit the download icon and begin personalization. Our Steps Of Strategic Procurement Process PowerPoint Presentation Slides are explicit and effective. They combine clarity and concise expression. https://bit.ly/3901a9I
Process Change: Communication & Training TipsTKMG, Inc.
Subscribe: ksmartin.com/subscribe
Recorded Webinar: http://bit.ly/1Gl23Hm
Rolling out process improvements is a common point of failure in organizations.
CIO Standard Requirements
Source: https://store.theartofservice.com/cio-standard-requirements/
Sample Requirements:
The full extent of a given risk and its priority compared to other risks are not understood. Failure to address the most important risks first leads to dangerous exposures. Nearly all managers believe that their risks are the most important in the enterprise (or at least they say so) but whose risks really matter most?
Does your organization constantly monitor in real time your networks, systems and applications for unauthorized access or anomalous behavior such as viruses, malicious code insertion, or break-in attempts?
We have determined whether the goals, norms and rules of our organization are properly transmitting the value of the organizational culture to staff members and if there are areas for improvement
When deciding to outsource we know if the candidate services require extensive interactions between the service providers and the business's competitive and strategic resources and capabilities
Has the CIO ensured security training and awareness of all agency employees, including contractors and those employees with significant IT security responsibilities?
If services come in direct contact with the customers of customers, we have additional policies and guidelines required to handle user interactions and user information?
What impact has emerging technology (e.g., cloud computing, virtualization and mobile computing) had on your companys ITRM program over the past 12 months?
Do you have a good understanding of emerging technologies and business trends that are vital for the management of IT risks in a fast-changing environment?
Is the CIO or someone similar, responsible for strategic planning, implementation, and management of integrated systems identified by the IT infrastructure plan?
Our strategic approach to Service Design results in services that can be offered at a competitive market price, substantially reduced risk, or offers superior value?
ERP SYSTEM POST IMPLEMENTATION AUDIT_TRNG_May,2023 - Part-4.pptxRamanaBulusu1
ERP Systems Post Implementation Audit - This is going to be useful for the audit of an ERP implementation after the implementation is completed. Refer the previous parts before coming here.
Steps Of Strategic Procurement Process PowerPoint Presentation SlidesSlideTeam
Steps Of Strategic Procurement Process PowerPoint Presentation Slides is a custom virtual solution for management professionals. The outsourcing process PPT theme helps individuals from all domains to represent the steps involved in strategic partnership. Showcase the distribution network of any organization with the help of our partners strategy PowerPoint slideshow. This graphically-gripping strategic sourcing PPT presentation features interesting and informative data visualizations. Employ our comprehensive PowerPoint layout to cover all the fundamentals of the procurement procedure. Use this business process outsourcing PPT templates deck to convey the need for an external service provider by your firm. You can also represent all the related business functions to determine which ones you can outsource. Demonstrate your organization’s partner relationship improvement strategy. Other aspects highlighted in this presentation are requests for proposals, channel partner selection, and SaaS implementation roadmap. Get access to dashboard diagrams to display the evaluation of channel partner performance. Hit the download icon and begin personalization. Our Steps Of Strategic Procurement Process PowerPoint Presentation Slides are explicit and effective. They combine clarity and concise expression. https://bit.ly/3901a9I
Process Change: Communication & Training TipsTKMG, Inc.
Subscribe: ksmartin.com/subscribe
Recorded Webinar: http://bit.ly/1Gl23Hm
Rolling out process improvements is a common point of failure in organizations.
Deciding What To Outsource To Partners And What To Insource Powerpoint Presen...SlideTeam
Get this ready-to-use deck named Deciding What To Outsource To Partners And What To Insource PowerPoint Presentation Slides and discuss the factors to consider for making outsourcing decisions for your business. Take the assistance of an attention-grabbing PPT slideshow to display information on an organization’s system, components of partner strategy, and partners strategy steps- summary. Showcase primary and supportive functions of the business with this visually appealing PPT slide deck. You can outline your requirements for outsourcing business activities with the help of these PPT templates. Demonstrate your requirement for business activity by taking the assistance of outsourcing decision framework PPT slideshow. Elucidate requirement specifications for HR and Payroll software by utilizing these PPT themes. You can also display the implementation plan and measure partner performance by taking assistance from our easy-to-use PPT slides. Present the strategies for better outsourcing relationship management by downloading our content-ready outsourcing decision analysis PPT slide deck. https://bit.ly/3dgwu5T
Bright Ideas-Strategies for Developing Championship FormKathryn Alexandrei
Using business process improvement strategies to overcome the challenges of the current economic climate.
PDCC members are invited to complete an online survey by going to:
http://www.surveymonkey.com/s.aspx?sm=xrxn2HpbhmM72RdQQJnClQ_3d_3d
Find out what your peers think.
Similar to Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troubleshooting (20)
This presentation includes "Social Media for Social Good" presented by Paul Nazareth and "Rules of Engagement: Making Connections Last" by our keynote speaker, Dr. Froswa Booker-Drew.
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best PracticesSparkrock
This presentation covers security principles for On-Premise organizations, security principles in the Cloud including Azure Deployment and Azure Build Services, and Environment Monitoring.
Fuel Good 2018: Strategic Funding Models Sparkrock
Alain Mootoo from the Surrey Place Center explains how they were able to achieve a 54% increase in program revenues and provide a framework for funding your organization's mission.
Fuel Good 2018: Filling the Fundraising Gaps: The Decline of Granting & Rise ...Sparkrock
CanadaHelps shares current and cutting edge data and resources from across the sector so you can bring more clarity and sustainability to your funding strategy.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troubleshooting
1. 1
CRM Deep Dive: Workflows, Business
Rules, Security and Troubleshooting
# A L L I A N C E 2 0 1 7
Please have your trial ready (or come see us if you need help setting up)
2. 2
YOUR TRAINERS
IRINA KON
SOLUTION ARCHITECT
JOINED SPARKROCK IN 2015
ULRIKE KRUGER
SENIOR APPLICATION
CONSULTANT
JOINED SPARKROCK IN 2013
3. 3
T h e R e t i r e d Te a c h e r s o f O n t a r i o
Charles Tabone
Monica Depta
Marzena Wspanialy
Ewa Romanski
U n i t e d C h u r c h o f C a n a d a
Jayne King
Jason Ding
Ric de Leon
R e g i o n Te n
Paul Mawyer
Amy Downey
R e h o b o t h C h r i s t i a n
M i n i s t r i e s
Susan Dexter
Attendee Introductions
Quick round table: introduce yourself, your organization, comfort level with CRM
O n t a r i o L e g i s l a t i v e A s s e m b l y
D i s t r i c t o f N i p i s s i n g S o c i a l
S e r v i c e s A d m i n i s t r a t i v e B o a r d
Saxon Yanta
Shara Ali
B r a m p t o n C a l e d o n
C o m m u n i t y L i v i n g
Turel Matadin
4. 4
AGENDA
W o r k f l o w s / B u s i n e s s
R u l e s O v e r v i e w
H a n d s O n P r a c t i c e B r e a k S e c u r i t y T r o u b l e s h o o t i n g
1 0 : 1 5 - 1 0 : 3 0
8 : 4 5 - 9 : 4 0
9 : 4 5 - 1 0 : 1 5 1 0 : 3 0 - 1 1 : 4 5 1 1 : 4 5 - 1 2 : 0 0
6. 6
WHAT ARE WORKFLOWS?
S E T O F S T E P S
Sequential steps to be performed on a record
or related records.
P E R F O R M C O M M O N TA S K S
Create/Update records
Add someone to queue
Assign records
Change record status
Send email notifications
Add Tasks
Call ‘Child’ workflows
Create Reminders/Follow-ups
Perform validations
A U T O M AT I C / O N D E M A N D
Triggered by an event in the system or
manually selected by a user to run.
7. 7
WHY USE WORKFLOWS?
Automate for efficiency and correctness and increase revenue.
Increased
Efficiency
Increased
Accuracy
Streamlined
Processes
Support timely
communications
Create follow-
up tasks
Validate the
data
8. 8
CONSIDERATIONS
Users with solid knowledge of the system.
Knowledge of data, business processes and current
implementation of CRM.
D E E P U N D E R S TA N D I N G
Must have a security role that allows creation of
workflows. Typically these are System
Administrators/System customizers.
S E C U R I T Y R O L E
Level of experience depends on the complexity of the
workflow.
E X P E R I E N C E W I T H C R M C O N F I G
9. 9
DEFINE
Define and document the business
process.
01
ANALYZE
Consider the current system: other
workflows running? Plugins exist?
Queues set up? Attributes available?
02
CONSIDER
Think from an end user perspective, is
workflow the right choice? Can the
action be done on demand? Is a
business rule required?
03
PLANNING A WORKFLOW
Steps to take in consideration of adding a workflow.
10. 10
DEFINE
Define each step and how to handle
the exceptions from standard process.
01
ANALYZE
Steps to automate, trigger, expected
outcomes, changes to other workflows.
02
CONFIGURE AND TEST
Use test records and test emails!
03
GETTING STARTED
Steps to take in consideration of adding a workflow.
DEPLOY
Plan for appropriate timing and impacts.04
11. 11
Dialog – similar to a
wizard
Workflows -
Background
Workflows – Real-time
User initiated from the
ribbon bar (on-demand)
Triggered by the
system, or initiated from
the ribbon bar
(Automatic or On-
demand)
Triggered by the
system, or initiated from
the ribbon bar
(Automatic or On-
demand)
One record at a time One or Multiple records One or Multiple records
Prompt and responses
that guides the user
No user interaction No user interaction
Can call child dialogs Can call child workflows Can call child workflows
User must refresh CRM
form to see results
Runs in the background
– user must refresh
CRM form when
complete
Runs in real-time – user
sees results quickly, but
can impact system
resources
PROCESS CATEGORIES
13. 13
WHAT ARE BUSINESS RULES?
F O R M L O G I C
A set of conditions and actions that you can
apply to a form, or an entity.
P O S S I B L E A C T I O N S
Set field values
Clear field values
Set field requirement levels
Show or hide fields
Enable or disable fields
Validate data and show error messages
Business Recommendations – new in D365!
D R A G & D R O P D E S I G N E R
Easy to design and develop. Easy to
activate/deactivate.
14. 14
WHY USE BUSINESS RULES?
Automation and validation.
Increased
Efficiency
Increased
Accuracy
Streamlined
Processes
Cleaner Forms
and UX
Guide users Validate the
data
15. 15
CONSIDERATIONS
Users with solid knowledge of the system.
Knowledge of form impacts and ability to test out
functionality. Knowledge of which form is used by
which users.
B A S I C U N D E R S TA N D I N G
Must have a security role that allows creation of
business rules. Typically these are System
Administrators/System customizers. Forms also tie in
with security profiles so knowledge of the security
setup is recommended.
S E C U R I T Y R O L E
Level of experience depends on the complexity of the
business rule.
E X P E R I E N C E W I T H C R M C O N F I G
16. 16
DEFINE
Define and document what the forms
need to look like, any required fields
and order of data entry.
01
ANALYZE
Consider the current system: how many
forms exist? Who are the users for these
forms? Do you need the rule to run on
the server (during data import,
background processes etc.)?
02
CONSIDER
Business rules should be flexible
enough to allow exceptions to the flow.
Overusing business rules can reduce
the user experience.
03
PLANNING A BUSINESS RULE
Steps to take in consideration of adding a business rule.
17. 17
DEFINE
Define the order of data entry and the
related conditions. Consider security.
01
ANALYZE
Required business logic. Consider the
inverse of the rule may be required.
02
CONFIGURE AND TEST
Open up the form in different stages to
ensure business rules are functioning
as intended.
03
GETTING STARTED
Steps to take in consideration of adding a business rule.
DEPLOY
Easy to deactivate if they don’t function
as expected.
04
18. 18
Entity All Forms Specific Form
Run on all forms Applies to all forms for
that entity.
Applies to only a
specific form.
Run on the server
(during data import,
during processes)
Circular references are
not allowed (i.e. field =
field + 100) because
rule runs twice
BUSINESS RULE SCOPE
21. 21
01 DEFINE - SCENARIO
Step Action Who System Details
1 Send paper application Applicant Nothing
2 HR Rep fills in application in CRM from a Contact HR Rep Default status = New
Application Date – Recommend to set to Today’s Date when New
Job Posting
3 HR Rep performs the initial screening HR Rep Date Screening Completed
4 HR Rep approves the application for Interviewing HR Rep Set Status to “Interviewing”
5 System triggers an email on the Status change to
Interviewing and sends it to the Hiring Manager
System Create Email
6 Hiring Manager gets the email and reviews the
application.
Interview the candidates
Hiring Manager Create Tasks/appointments/Notes to manage the interview process
Rank
Date Interviews completed
7-1 REJECT: Hiring Manager Rejects candidates Hiring Manager Date Rejected/Withdrawn
Cancel/Withdrawn Reason
Cancel/Withdrawn Reason Description
7-2 OFFER: Hiring Manager approves to Offer Hiring Manager Click on Approval to Offer
Set Date Offered
Add offer details to the Notes
[System changes status to “Offer”]
8 System triggers an email on the status change to
Offer and sends it to the HR Manager
System Create email
9 HR Manager reviews offer and approves the Hire HR Manager Expected Start Date – validate date is future
Date Hired
Final Decision Notes
Add details to the Notes
Click on Approval to Hire
[System changes status to “Hired”]
[System update the Date Hired on the Contact]
22. 22
02 ANALYZE - DESIGN
Step Action Who System Details
1 Send paper application Applicant Nothing
2 HR Rep fills in application in CRM from a Contact HR Rep Business Rule: Default status = New
Application Date – Recommend to set to Today’s Date when New
Job Posting
3 HR Rep performs the initial screening HR Rep Date Screening Completed
4 HR Rep approves the application for Interviewing HR Rep Set Status to “Interviewing”
5 System triggers an email on the Status change to
Interviewing and sends it to the Hiring Manager
System Workflow: Create Email
6 Hiring Manager gets the email and reviews the
application.
Interview the candidates
Hiring Manager Create Tasks/appointments/Notes to manage the interview process
Rank
Date Interviews completed
7-1 REJECT: Hiring Manager Rejects candidates Hiring Manager Date Rejected/Withdrawn
Cancel/Withdrawn Reason
Cancel/Withdrawn Reason Description
7-2 OFFER: Hiring Manager approves to Offer Hiring Manager Click on Approval to Offer
Business Rule: Date Offered
Add offer details to the Notes
Workflow: [System changes status to “Offer”]
8 System triggers an email on the status change to
Offer and sends it to the HR Manager
System Workflow: Create email
9 HR Manager reviews offer and approves the Hire HR Manager Expected Start Date – Real-Time Workflow: validate date is future
Date Hired
Final Decision Notes
Add details to the Notes
Click on Approval to Hire
Workflow: [System changes status to “Hired”]
Workflow: [System update the Date Hired on the Contact]
25. 25
UNDERSTAND REQUIREMENTS
Identify the business areas of the organization, and what the users will see
and do. CRM attributes and business rules identifies. Create a Security
Matrix
01
BUSINESS UNITS/SECURITY ROLES
Set up the business and security roles to be assigned to
user that enforce what entities user can see and update
02
SETUP FIELD SECURITY ROLES
Identify specific attributes that can be seen/updated by specific
teams/users only.
03
SECURITY IMPLEMENTATION
SET UP MULTI-FORMS
Controls what information that user can update on a form04
ASSIGN THE ROLES
Assign the user to a Business Unit, Security Role and Field
Security Profiles
05
TEST, RINSE AND REPEAT
Log in with different users to test, tweak and repeat06
26. 26
HR
Rep
[Bill]
HR
Manager
[Grace]
Hiring Manager
[Sally]
Add Job
Application
Yes No No
Read Job
Applications
All All Only within the
Department
Approve to Offer No Yes Yes
Approve to Hire No Yes No
Reject No Yes Yes
Can Import Job
Applications
Yes No No
Can Customize No No No
Can create and
publish
workflows?
No Yes No
CXO Levels
HR Rep
[Bill]
HR Manager
[Grace]
Dept. 1
Director
Dept. 1
Hiring
Manager
[Sally]
Dept. 2
Director
Dept. 2
Hiring
Manager
Dept. 2
Hiring
Manager
What entities can users see?
What entities can users update?
This example is a simplistic version of a security matrix
S e c u r i t y M a t r i x
What are the organizational areas of the
business that users are associated with?
W h o a r e t h e u s e r s ?
01 UNDERSTAND REQUIREMENTS
27. 27
• Users are assigned to a Business Units.
• Indirectly, records owned by users are
also owned by the Business Unit
B u s i n e s s U n i t s
02 BUSINESS UNITS
The Org
Dept. 2
z
IT
Human
Resources
[Bill]
[Grace]
Operations
Dept. 1
[Sally]
Marketing
28. 28
What entities can they see and/or update.
S e c u r i t y R o l e – w h a t i s i t ?
02 SECURITY ROLES
E x a m p l e : H i r i n g M a n a g e r
Entity
Create Read Write Delete Append Append To Assign Share
Contact No
[None]
All
[Organization]
Yes No All All No No
Activities All All If owner
[User]
No All All In Dept In Dept
Job Posting No Yes No No All All No No
Job Application No Yes In Dept and subordinate
[Parent: Child Business Units]
No All In Dept In Dept Yes
29. 29
Controls entities the user can see and update
…
AND which parts of the organizations date they can see and update
S e c u r i t y R o l e s a n d B u s i n e s s U n i t s
02 USER SETUP
E x a m p l e : S a l l y c a n o n l y s e e / u p d a t e J o b A p p l i c a t i o n s i n D e p t . 1
31. 31
• Identify specific attributes that can be seen/updated by specific teams/users only.
• Users see data as asterisks (***) if no field security profile is assigned to them
Consider our scenario
• Only the Hiring Manager can click on Approval to Offer.
F i e l d S e c u r i t y
03 FIELD SECURITY ROLE
How do we do implement?
• Customization – the attribute is marked with Field Security enabled.
• User requires a Field Security Profile to create/view/update
33. 33
• Ensure users update only information that is part of their business process
• Enhance the user experience
Consider our scenario
• The Hiring Manager has a different business process
• Only the Hiring Manager will enter the following information:
M u l t i - f o r m s
04 Multi-Forms
How do we do implement?
• Customization
• Job Application form design for the Hiring Manger
• Enable the security role on the form
You may be asking – why are we not using Field Security here?
• Use Field Security for sensitive information (Date of birth, Salary, etc.) or approval flags
• We could have used Multi-form for the approval scenario
35. 35
More on Security Roles
Types of security roles and other CRM impacts such as dashboards,
reporting, business process flows, customization, setup
02
Access Hierarchy/Positions
Introduced in 2015, an additional layer that allows
access based on manager and position hierarchy
03
Access teams
Introduced in 2013, provides a method to set up access teams.
Uses the ‘Sharing’ functionality
04
Other Security Topics
Record Ownership (Assign / Share)
Controls what information that user can update on a form01
36. 36
01 Record Ownership
• Every record has an owner
• An owner can be a User or a Team
• The current User is the Owner of a new record when added
• Unless workflows, mapping or other implementation overrides
• Security Role Privileges determine who can reassign a record
• Security Roles and Business Units use the Owner of a record to
derive who can see/update
Remember this business rule?
Sally can only see and update Job Application in her Department?
This rule is true when:
Job Application is assigned to someone in Dept. 1
37. 37
02 More on Security Roles
Security Roles also defines access to:
• Dashboards
• Business Process Flows
• Reports
• Charts
• Customization
• Importing
• .. And many more …
39. 39
04 Access Teams
Introduced in 2013, provides a method to set up access
teams.
• Uses the ‘Sharing’ functionality in the background
• Useful for automating using SDK
43. 43
EVALUATIONS
P L E A S E T A K E 5 M I N S T O
C O M P L E T E A S E S S I O N
E V A L U A T I O N .
WIN ME!
One lucky survey will
take home a Ecobee
Smart Wi-Fi
Thermostat