- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
On paper, scoped apps are the safer choice. Isolation, namespace protection, upgrade resilience—it all sounds compelling. In practice, the decision between scoped and global is rarely that simple.
I’ve been involved in upgrades where global customisations caused obvious conflicts. I’ve also seen scoped apps quietly break because of assumptions about APIs, UI behaviours, or data access that changed between releases. The difference is that scoped issues are often harder to diagnose, because teams assume “scope equals safety.”
One recurring issue is over-scoping. Teams create scoped apps for functionality that is deeply embedded in core processes, leading to awkward cross-scope dependencies. ACLs become complex, data access becomes opaque, and troubleshooting turns into detective work.
Global, on the other hand, is often abused. Quick fixes land there because “it’s faster,” and suddenly global becomes a dumping ground for logic that no one wants to own. Upgrades then become exercises in fear management rather than confidence.
The real lesson is that scope is not a governance model. Ownership, documentation, and discipline matter more than where the code lives. Scoped apps with poor ownership are just as risky as global scripts with no accountability.
Upgrade nightmares don’t happen because of scope choices alone—they happen because architecture decisions were made without long-term stewardship in mind.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
