PRESENTED BY: K2 blackpoint Fundamentals Module 1: Understand J SCOTT PITMAN – [email protected].
-
Upload
ambrose-hensley -
Category
Documents
-
view
216 -
download
0
Transcript of PRESENTED BY: K2 blackpoint Fundamentals Module 1: Understand J SCOTT PITMAN – [email protected].
WWW.K2.COM
PRESENTED BY:
K2 blackpoint FundamentalsModule 1: Understand
J SCOTT PITMAN – [email protected]
WWW.K2.COM
K2 CONFIDENTIAL
• What is K2 blackpoint?• When would we want to use K2 blackpoint?understand
• How do we model an application with K2 blackpoint?• What tools are available? What is the procedure?model
• Which technologies are involved in K2 blackpoint implementations?build
• What tools and procedures are used to maintain K2 blackpoint implementations?maintain
• How can we do more with K2 blackpoint?• What are the limitations of K2 blackpoint?extend
OVERVIEW
WWW.K2.COM
K2 CONFIDENTIAL
WHAT IS K2 BLACKPOINT, THE PRODUCT?
K2 blackpoint
SharePoint
WWW.K2.COM
K2 CONFIDENTIAL
HOW ARE K2 BLACKPOINT APPLICATIONS USED?
> People interact with K2 applications using SharePoint. Including using Lists, Workflow forms, and InfoPath forms. People also use theK2 Worklist Web Part to interact with user tasks.
> Reporting and administration is handled through K2 Process Portalsthat live inside SharePoint.
WWW.K2.COM
K2 CONFIDENTIAL
HOW ARE K2 BLACKPOINT APPLICATIONS BUILT?
K2 Process Designer
design deploy use
K2 Studio
OR
WWW.K2.COM
K2 CONFIDENTIAL
DESIGNING K2 BLACKPOINT APPLICATIONS
K2 StudioInstalled on analyst’s computersFull functionality with no code
K2 Process DesignerNo installation, requires SilverlightLimited functionality with ease of use
WWW.K2.COM
K2 CONFIDENTIAL
THE ROLE OF THE K2 SERVER
People Systems
K2 Server Event
K2 Client EventWorklist
K2 assigns work to people andmanages the completion of thatwork using K2 Client Events
Work assigned to a user is collected in his own Worklist
Each user’s worklist tracks all the work they have been assignedacross all running K2 processes
K2 assigns work to machines andmanages the completion of thatwork using K2 Server Events
Work assigned to machinesis executed immediately
WWW.K2.COM
K2 CONFIDENTIAL
APPLICATIONS AND PROCESSES
> K2 blackpoint applications are made up of one or more K2 processes> It is helpful to consider any K2 process lifecycle in two parts: Start and Run
Process Start Process Running / Active
InfoPath IntegrationSharePoint Workflow IntegrationSharePoint Events Integration
K2 Client Events (work for people)K2 Server Events (work for machines)
WWW.K2.COM
K2 CONFIDENTIAL
ACTIVITIES, EVENTS AND LINES
This is an illustration of the simplest possible process allowed with K2 blackpoint.
This process has a Start Activity where the process begins.
This process has one Activity other than the start activity. This activity is attached to the default Start Activity with a Line.
Lines are one possible container for the Rules that drive K2 processes.
Except for start, every Activity must include at least one Client Event or Server Event.
Start Activity
Line
Activity
Event
WWW.K2.COM
K2 CONFIDENTIAL
RULES
Line ruleBoolean
Line rules are based on Boolean logic. This just means that the rule must evaluate to either true or false.
In the example below, the line rule will evaluate to true(if expense amount is less than or equal to $5000)OR(if the expense type is “cellphone” AND amount < $50)
Line rules that evaluate to true are followed to the next Activity.
Line rules that evaluate to false are ignored.
Line rules often use data stored in Process Data Fields or Process XML Fields.
WWW.K2.COM
K2 CONFIDENTIAL
SUMMARY
> K2 blackpoint is a platform for developing applications that extend workflow functionality in SharePoint.
> Applications are deployed to a K2 server at which point anyone with proper permissions may use the application as designed.
> Applications are made up of one or more processes. When designing K2 processes it is helpful to consider the process start and process run separately.
> Processes contain one or more activities, or stages, that are connected by lines. Lines are one possible container for business rules.
> Each activity must contain at least one client event or server event. Client events assign work to people while server events assign work to machines.