K2 blackpoint Fundamentals Module 1: Understand – PRESENTED BY:
Transcription
K2 blackpoint Fundamentals Module 1: Understand – PRESENTED BY:
K2 blackpoint Fundamentals Module 1: Understand PRESENTED BY: J SCOTT PITMAN – SCOTTP@K2.COM WWW.K2.COM WWW.K2.COM OVERVIEW understand model build maintain extend K2 CONFIDENTIAL • What is K2 blackpoint? • When would we want to use K2 blackpoint? • How do we model an application with K2 blackpoint? • What tools are available? What is the procedure? • Which technologies are involved in K2 blackpoint implementations? • What tools and procedures are used to maintain K2 blackpoint implementations? • How can we do more with K2 blackpoint? • What are the limitations of K2 blackpoint? WWW.K2.COM WHAT IS K2 BLACKPOINT, THE PRODUCT? K2 blackpoint SharePoint K2 CONFIDENTIAL WWW.K2.COM HOW ARE K2 BLACKPOINT APPLICATIONS USED? > People interact with K2 applications using SharePoint. Including using Lists, Workflow forms, and InfoPath forms. People also use the K2 Worklist Web Part to interact with user tasks. > K2 CONFIDENTIAL Reporting and administration is handled through K2 Process Portals that live inside SharePoint. WWW.K2.COM HOW ARE K2 BLACKPOINT APPLICATIONS BUILT? K2 Studio OR K2 Process Designer design K2 CONFIDENTIAL deploy use WWW.K2.COM DESIGNING K2 BLACKPOINT APPLICATIONS K2 Studio Installed on analyst’s computers Full functionality with no code K2 CONFIDENTIAL K2 Process Designer No installation, requires Silverlight Limited functionality with ease of use WWW.K2.COM THE ROLE OF THE K2 SERVER People Systems Worklist K2 Client Event K2 Server Event K2 assigns work to people and manages the completion of that work using K2 Client Events K2 assigns work to machines and manages the completion of that work using K2 Server Events Work assigned to a user is collected in his own Worklist Work assigned to machines is executed immediately Each user’s worklist tracks all the work they have been assigned across all running K2 processes K2 CONFIDENTIAL WWW.K2.COM APPLICATIONS AND PROCESSES > > K2 blackpoint applications are made up of one or more K2 processes It is helpful to consider any K2 process lifecycle in two parts: Start and Run Process Start InfoPath Integration SharePoint Workflow Integration SharePoint Events Integration K2 CONFIDENTIAL Process Running / Active K2 Client Events (work for people) K2 Server Events (work for machines) WWW.K2.COM ACTIVITIES, EVENTS AND LINES Start Activity Line Activity This is an illustration of the simplest possible process allowed with K2 blackpoint. This process has a Start Activity where the process begins. This process has one Activity other than the start activity. This activity is attached to the default Start Activity with a Line. Event Lines are one possible container for the Rules that drive K2 processes. Except for start, every Activity must include at least one Client Event or Server Event. K2 CONFIDENTIAL WWW.K2.COM RULES Line rule Boolean Line rules that evaluate to true are followed to the next Activity. Line rules that evaluate to false are ignored. Line rules often use data stored in Process Data Fields or Process XML Fields. K2 CONFIDENTIAL Line rules are based on Boolean logic. This just means that the rule must evaluate to either true or false. In the example below, the line rule will evaluate to true (if expense amount is less than or equal to $5000) OR (if the expense type is “cellphone” AND amount < $50) WWW.K2.COM SUMMARY > K2 blackpoint is a platform for developing applications that extend workflow functionality in SharePoint. > Applications are deployed to a K2 server at which point anyone with proper permissions may use the application as designed. > Applications are made up of one or more processes. When designing K2 processes it is helpful to consider the process start and process run separately. > Processes contain one or more activities, or stages, that are connected by lines. Lines are one possible container for business rules. > Each activity must contain at least one client event or server event. Client events assign work to people while server events assign work to machines. K2 CONFIDENTIAL WWW.K2.COM QUESTIONS? K2 CONFIDENTIAL