+ All Categories
Home > Documents > K2 blackpoint Fundamentals

K2 blackpoint Fundamentals

Date post: 22-Feb-2016
Category:
Upload: dacian
View: 44 times
Download: 0 times
Share this document with a friend
Description:
K2 blackpoint Fundamentals. Module 1: Understand. J Scott Pitman – [email protected]. Overview. What is K2 blackpoint, the product?. how are K2 blackpoint applications used?. - PowerPoint PPT Presentation
Popular Tags:
12
WWW.K2.COM PRESENTED BY: K2 blackpoint Fundamentals Module 1: Understand J SCOTT PITMAN – [email protected]
Transcript
Page 1: K2 blackpoint Fundamentals

WWW.K2.COM

PRESENTED BY:

K2 blackpoint FundamentalsModule 1: Understand

J SCOTT PITMAN – [email protected]

Page 2: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

• What is K2 blackpoint?• When would we want to use K2 blackpoint?understand• How do we model an application with K2 blackpoint?• What tools are available? What is the procedure?model• Which technologies are involved in K2 blackpoint

implementations?build• What tools and procedures are used to maintain K2

blackpoint implementations?maintain• How can we do more with K2 blackpoint?• What are the limitations of K2 blackpoint?extend

OVERVIEW

Page 3: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

WHAT IS K2 BLACKPOINT, THE PRODUCT?

K2 blackpoint

SharePoint

Page 4: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

HOW ARE K2 BLACKPOINT APPLICATIONS USED?> People interact with K2 applications using

SharePoint. Including using Lists, Workflow forms, and InfoPath forms. People also use theK2 Worklist Web Part to interact with user tasks.

> Reporting and administration is handled through K2 Process Portalsthat live inside SharePoint.

Page 5: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

HOW ARE K2 BLACKPOINT APPLICATIONS BUILT?

K2 Process Designer

design deploy use

K2 Studio

OR

Page 6: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

DESIGNING K2 BLACKPOINT APPLICATIONS

K2 StudioInstalled on analyst’s computersFull functionality with no code

K2 Process DesignerNo installation, requires SilverlightLimited functionality with ease of use

Page 7: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

THE ROLE OF THE K2 SERVER

People Systems

K2 Server Event

K2 Client EventWorklist

K2 assigns work to people andmanages the completion of thatwork using K2 Client Events

Work assigned to a user is collected in his own Worklist

Each user’s worklist tracks all the work they have been assignedacross all running K2 processes

K2 assigns work to machines andmanages the completion of thatwork using K2 Server Events

Work assigned to machinesis executed immediately

Page 8: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

APPLICATIONS AND PROCESSES> K2 blackpoint applications are made up of one or more K2 processes> It is helpful to consider any K2 process lifecycle in two parts: Start and Run

Process Start Process Running / Active

InfoPath IntegrationSharePoint Workflow IntegrationSharePoint Events Integration

K2 Client Events (work for people)K2 Server Events (work for machines)

Page 9: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

ACTIVITIES, EVENTS AND LINES

This is an illustration of the simplest possible process allowed with K2 blackpoint.

This process has a Start Activity where the process begins.

This process has one Activity other than the start activity. This activity is attached to the default Start Activity with a Line.

Lines are one possible container for the Rules that drive K2 processes.

Except for start, every Activity must include at least one Client Event or Server Event.

Start Activity

Line

Activity

Event

Page 10: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

RULES

Line ruleBoolean

Line rules are based on Boolean logic. This just means that the rule must evaluate to either true or false.

In the example below, the line rule will evaluate to true(if expense amount is less than or equal to $5000)OR(if the expense type is “cellphone” AND amount < $50)

Line rules that evaluate to true are followed to the next Activity.

Line rules that evaluate to false are ignored.

Line rules often use data stored in Process Data Fields or Process XML Fields.

Page 11: K2 blackpoint Fundamentals

WWW.K2.COM

K2 CONFIDENTIAL

SUMMARY> K2 blackpoint is a platform for developing applications that extend workflow functionality in

SharePoint.

> Applications are deployed to a K2 server at which point anyone with proper permissions may use the application as designed.

> Applications are made up of one or more processes. When designing K2 processes it is helpful to consider the process start and process run separately.

> Processes contain one or more activities, or stages, that are connected by lines. Lines are one possible container for business rules.

> Each activity must contain at least one client event or server event. Client events assign work to people while server events assign work to machines.

Page 12: K2 blackpoint Fundamentals

K2 CONFIDENTIAL

WWW.K2.COM

QUESTIONS?


Recommended