K2 blackpoint Fundamentals Module 1: Understand – PRESENTED BY:

Transcription

K2 blackpoint Fundamentals Module 1: Understand – PRESENTED BY:
K2 blackpoint Fundamentals
Module 1: Understand
PRESENTED BY: J SCOTT PITMAN – [email protected]
WWW.K2.COM
WWW.K2.COM
OVERVIEW
understand
model
build
maintain
extend
K2 CONFIDENTIAL
• What is K2 blackpoint?
• When would we want to use K2 blackpoint?
• How do we model an application with K2 blackpoint?
• What tools are available? What is the procedure?
• Which technologies are involved in K2 blackpoint
implementations?
• What tools and procedures are used to maintain K2
blackpoint implementations?
• How can we do more with K2 blackpoint?
• What are the limitations of K2 blackpoint?
WWW.K2.COM
WHAT IS K2 BLACKPOINT, THE PRODUCT?
K2 blackpoint
SharePoint
K2 CONFIDENTIAL
WWW.K2.COM
HOW ARE K2 BLACKPOINT APPLICATIONS USED?
>
People interact with K2 applications using
SharePoint. Including using Lists, Workflow
forms, and InfoPath forms. People also use the
K2 Worklist Web Part to interact with user tasks.
>
K2 CONFIDENTIAL
Reporting and administration is
handled through K2 Process Portals
that live inside SharePoint.
WWW.K2.COM
HOW ARE K2 BLACKPOINT APPLICATIONS BUILT?
K2 Studio
OR
K2 Process Designer
design
K2 CONFIDENTIAL
deploy
use
WWW.K2.COM
DESIGNING K2 BLACKPOINT APPLICATIONS
K2 Studio
Installed on analyst’s computers
Full functionality with no code
K2 CONFIDENTIAL
K2 Process Designer
No installation, requires Silverlight
Limited functionality with ease of use
WWW.K2.COM
THE ROLE OF THE K2 SERVER
People
Systems
Worklist
K2 Client
Event
K2 Server
Event
K2 assigns work to people and
manages the completion of that
work using K2 Client Events
K2 assigns work to machines and
manages the completion of that
work using K2 Server Events
Work assigned to a user is
collected in his own Worklist
Work assigned to machines
is executed immediately
Each user’s worklist tracks all the
work they have been assigned
across all running K2 processes
K2 CONFIDENTIAL
WWW.K2.COM
APPLICATIONS AND PROCESSES
>
>
K2 blackpoint applications are made up of one or more K2 processes
It is helpful to consider any K2 process lifecycle in two parts: Start and Run
Process Start
InfoPath Integration
SharePoint Workflow Integration
SharePoint Events Integration
K2 CONFIDENTIAL
Process Running / Active
K2 Client Events (work for people)
K2 Server Events (work for machines)
WWW.K2.COM
ACTIVITIES, EVENTS AND LINES
Start
Activity
Line
Activity
This is an illustration of the simplest
possible process allowed with K2
blackpoint.
This process has a Start Activity
where the process begins.
This process has one Activity other
than the start activity. This activity is
attached to the default Start Activity
with a Line.
Event
Lines are one possible container for
the Rules that drive K2 processes.
Except for start, every Activity must
include at least one Client Event or
Server Event.
K2 CONFIDENTIAL
WWW.K2.COM
RULES
Line rule
Boolean
Line rules that evaluate to true are
followed to the next Activity.
Line rules that evaluate to false are
ignored.
Line rules often use data stored in
Process Data Fields or Process XML
Fields.
K2 CONFIDENTIAL
Line rules are based on Boolean logic.
This just means that the rule must evaluate to
either true or false.
In the example below, the line rule will evaluate to true
(if expense amount is less than or equal to $5000)
OR
(if the expense type is “cellphone” AND amount < $50)
WWW.K2.COM
SUMMARY
>
K2 blackpoint is a platform for developing applications that extend workflow functionality in
SharePoint.
>
Applications are deployed to a K2 server at which point anyone with proper permissions
may use the application as designed.
>
Applications are made up of one or more processes. When designing K2 processes it is
helpful to consider the process start and process run separately.
>
Processes contain one or more activities, or stages, that are connected by lines. Lines are
one possible container for business rules.
>
Each activity must contain at least one client event or server event. Client events assign
work to people while server events assign work to machines.
K2 CONFIDENTIAL
WWW.K2.COM
QUESTIONS?
K2 CONFIDENTIAL