Académique Documents
Professionnel Documents
Culture Documents
WWW.K2.COM
WWW.K2.COM
INTRODUCTIONS
>
Lets start by getting to know one another > Your Name > Your Company or Organization Affiliation > Title and Job Function > Job Responsibility > Workflow Experience > K2 Experience > Expectations for the Course
CONFIDENTIAL
WWW.K2.COM
COURSE MATERIALS
>
>
>
Student Manual > Includes detailed reference information for you to take with you > Includes Step-by-Step Labs Student DVD > Includes the K2 blackpearl 101 VPC for use with the Labs Course Evaluation
CONFIDENTIAL
WWW.K2.COM
COURSE OUTLINE
>
26 Modules over three days > Day One > Introduction > K2 Fundamentals and Building Blocks > SmartObjects > K2 Designer for Visual Studio > K2 Workspace > Day Two > K2 Web Designer for SharePoint > K2 Designer for Visio > Collaborative Process Design > InfoPath > SharePoint Administration > Day Three > SharePoint Content Management > Business Data Catalog
CONFIDENTIAL
WWW.K2.COM
COURSE LOGISTICS
> >
>
> > > >
>
> >
Course Hours Building Hours Parking Restrooms Meals Phones Internet Access Messages Smoking Recycling
CONFIDENTIAL
WWW.K2.COM
>
>
>
K2.com (www.k2.com) > Powered by K2 blackpearl, built on SmartObjects > Check out the case study to learn more > Content includes videos, white papers, technical briefs, case studies, events and more K2 Underground (www.k2underground.com) > Powered by the K2 community > K2 blackmarket for code and solution sharing > 3000+ registered users > Active forums and blogs > Content includes podcasts, videos, white papers, and discussions Portal (portal.k2workflow.com) > Content includes the Knowledge Base, downloads for additional documentation > Sign up for the RSS feed to be notified of new KB articles Product Documentation > Includes the Getting Started Guide, User Guide, Tutorials, SDK > Also available from the button within the product
CONFIDENTIAL
WWW.K2.COM
>
> >
K2 is a platform for building process-driven applications Automate and manage business processes Reuse existing components, code and processes Enabling business people with visual tools and technical people with tools they know. Everything is visual, declarative, reusable and intuitive.
CONFIDENTIAL
WWW.K2.COM
>
> > > >
>
> >
Founded in 2000 More than 300 employees Headquarters in Redmond, Washington Offices in Africa, Australia, Canada, China, Europe, New Zealand and Singapore Increased revenues 200 percent from 2005 to 2007 Customers in more than 40 countries 15 percent of Fortune 100 companies 1,500 customers More than 1 million users 3.9 percent share of the total BPMS market and an 8 percent share of the Windows-based BPMS market
CONFIDENTIAL
WWW.K2.COM
K2 Underground with more than 3,000 users > People who use and sell our software, offer help and share insight and solutions. K2 Insiders > Hand-selected, global leaders in the K2 community drive conversation and content on the Underground.
>
CONFIDENTIAL
WWW.K2.COM
>
Our partner ties are strong, varied and extensive Partners include: Avanade, Bearing Point, Dimension Data, HP Strong relationship with Microsoft > One of only 30 ISVs managed by the Global ISV Team > Deeply involved in collaboration, research and development > Strategic product and go-to-market initiatives across many verticals
CONFIDENTIAL
WWW.K2.COM
These are my trusty partners when I have trouble. I call them up and they help me solve business problems.
Jonathan Wynn
Manager of Advanced Technology and Collaborative Services Del Monte Foods
CONFIDENTIAL
WWW.K2.COM
ORDER
STAFF
SALES
SUPPORT
PLANT
MANUFACTURING GOODS RECEIVABLE
CUSTOMERS
PAYROLL
PRODUCT
INVOICE COLLECTION DELIVERY LOGISTICS
SUPPLIER
BANK
WAREHOUSE
PAYMENT
CONFIDENTIAL
WWW.K2.COM
ORDER
STAFF PERFORMANCE
REVIEW SALES SUPPORT
PLANT
EXPENSE MANUFACTURING GOODS ABSENCE RECEIVABLE REQUEST
CUSTOMERS
PAYROLL ORDER SALES INVOICE COLLECTION
SUPPLIER
PAYMENT
CONFIDENTIAL
WWW.K2.COM
FORMS
> PAPER > INFOPATH > WEB > SHAREPOINT LISTS > ADOBE
ACTIONS
> APPROVE > REJECT > DELEGATE
INFORMATION
> SAP & SIEBEL > DATABASE:SQL AND ORACLE > DOCUMENTS:SHAREPOINT > NEW DATA:NEED TO CREATE
REPORTS
> OUT-OF-THE-BOX > FOR BUSINESS USERS > FOR TECHNICAL USERS
PEOPLE
> ROLES > INFORMATION EXISTS > STATE
EVENT MONITORING
> INTERNAL EVENTS > EXTERNAL EVENTS
POLICIES
> CUSTOMER DISCOUNT > TASK DELIVERY > SLA > EXPENSE CLAIM LIMIT
PROCESS
> DESIGN > ASSEMBLE > EXECUTE > MONITOR > OPTIMIZE
WWW.K2.COM
FORMS
ACTIONS
START
INFORMATION REPORTS
CHANGE PROCESS
ACT1
PEOPLE
ACT2
EVENT MONITORING
POLICIES
PROCESS
1400
2000
1800
OUT OF OFFICE
> 5000
WWW.K2.COM
QUESTIONS?
CONFIDENTIAL