Download presentation
Presentation is loading. Please wait.
Published byAmbrose Hensley Modified over 9 years ago
1
WWW.K2.COM PRESENTED BY: K2 blackpoint Fundamentals Module 1: Understand J SCOTT PITMAN – SCOTTP@K2.COM
2
WWW.K2.COM K2 CONFIDENTIAL What is K2 blackpoint? When would we want to use K2 blackpoint? understand How do we model an application with K2 blackpoint? What tools are available? What is the procedure? model Which technologies are involved in K2 blackpoint implementations? build What tools and procedures are used to maintain K2 blackpoint implementations? maintain How can we do more with K2 blackpoint? What are the limitations of K2 blackpoint? extend OVERVIEW
3
WWW.K2.COM K2 CONFIDENTIAL WHAT IS K2 BLACKPOINT, THE PRODUCT? K2 blackpoint SharePoint
4
WWW.K2.COM K2 CONFIDENTIAL HOW ARE K2 BLACKPOINT APPLICATIONS USED? > People interact with K2 applications using SharePoint. Including using Lists, Workflow forms, and InfoPath forms. People also use the K2 Worklist Web Part to interact with user tasks. > Reporting and administration is handled through K2 Process Portals that live inside SharePoint.
5
WWW.K2.COM K2 CONFIDENTIAL HOW ARE K2 BLACKPOINT APPLICATIONS BUILT? K2 Process Designer designdeployuse K2 Studio OR
6
WWW.K2.COM K2 CONFIDENTIAL DESIGNING K2 BLACKPOINT APPLICATIONS K2 Studio Installed on analyst’s computers Full functionality with no code K2 Process Designer No installation, requires Silverlight Limited functionality with ease of use
7
WWW.K2.COM K2 CONFIDENTIAL THE ROLE OF THE K2 SERVER People Systems K2 Server Event K2 Client Event Worklist K2 assigns work to people and manages the completion of that work using K2 Client Events Work assigned to a user is collected in his own Worklist Each user’s worklist tracks all the work they have been assigned across all running K2 processes K2 assigns work to machines and manages the completion of that work using K2 Server Events Work assigned to machines is executed immediately
8
WWW.K2.COM K2 CONFIDENTIAL APPLICATIONS AND PROCESSES > K2 blackpoint applications are made up of one or more K2 processes > It is helpful to consider any K2 process lifecycle in two parts: Start and Run Process Start Process Running / Active InfoPath Integration SharePoint Workflow Integration SharePoint Events Integration K2 Client Events (work for people) K2 Server Events (work for machines)
9
WWW.K2.COM K2 CONFIDENTIAL ACTIVITIES, EVENTS AND LINES This is an illustration of the simplest possible process allowed with K2 blackpoint. This process has a Start Activity where the process begins. This process has one Activity other than the start activity. This activity is attached to the default Start Activity with a Line. Lines are one possible container for the Rules that drive K2 processes. Except for start, every Activity must include at least one Client Event or Server Event. Start Activity Line Activity Event
10
WWW.K2.COM K2 CONFIDENTIAL ACTIVITIES, EVENTS AND LINES (CONTINUED)
11
WWW.K2.COM K2 CONFIDENTIAL RULES Line rule Boolean Line rule Boolean Line rules are based on Boolean logic. This just means that the rule must evaluate to either true or false. In the example below, the line rule will evaluate to true (if expense amount is less than or equal to $5000) OR (if the expense type is “cellphone” AND amount < $50) Line rules that evaluate to true are followed to the next Activity. Line rules that evaluate to false are ignored. Line rules often use data stored in Process Data Fields or Process XML Fields.
12
WWW.K2.COM K2 CONFIDENTIAL SUMMARY > K2 blackpoint is a platform for developing applications that extend workflow functionality in SharePoint. > Applications are deployed to a K2 server at which point anyone with proper permissions may use the application as designed. > Applications are made up of one or more processes. When designing K2 processes it is helpful to consider the process start and process run separately. > Processes contain one or more activities, or stages, that are connected by lines. Lines are one possible container for business rules. > Each activity must contain at least one client event or server event. Client events assign work to people while server events assign work to machines.
13
K2 CONFIDENTIAL WWW.K2.COM QUESTIONS?
14
WWW.K2.COM K2 CONFIDENTIAL KEY TERMS
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.