SlideShare uma empresa Scribd logo
1 de 28
POP108 Workflow Approval Anywhere - Anytime

Graham Robinson
Yelcho Systems Consulting
Introduction

@grahamrobbo
Photo by Martin Gillet

© Yelcho Systems Consulting 2013. All rights reserved. / Page 2
Agenda
Workflow Approval – what a mess!
A different perspective
Let’s see it in action
How does it work?
What about security?
Questions

© Yelcho Systems Consulting 2013. All rights reserved. / Page 3
Workflow Approval – what a mess!

© Yelcho Systems Consulting 2013. All rights reserved. / Page 4
Out of the box

© Yelcho Systems Consulting 2013. All rights reserved. / Page 5
SBWP

See the
objects being
worked on

See additional
attachments
or text

© Yelcho Systems Consulting 2013. All rights reserved. / Page 6
Business Document

© Yelcho Systems Consulting 2013. All rights reserved. / Page 7
Universal Worklist

© Yelcho Systems Consulting 2013. All rights reserved. / Page 8
NW BPM Inbox

© Yelcho Systems Consulting 2013. All rights reserved. / Page 9
Notification Email

© Yelcho Systems Consulting 2013. All rights reserved. / Page 10
Fiori Wave 1
25 Apps
13 workflow Apps

© Yelcho Systems Consulting 2013. All rights reserved. / Page 11
2-Cliks – A Different Perspective

© Yelcho Systems Consulting 2013. All rights reserved. / Page 12
Overview

F
© Yelcho Systems Consulting 2013. All rights reserved. / Page 13
Let’s see it in action

© Yelcho Systems Consulting 2013. All rights reserved. / Page 14
Any Email Client

© Yelcho Systems Consulting 2013. All rights reserved. / Page 15
Any Mobile Client

© Yelcho Systems Consulting 2013. All rights reserved. / Page 16
© Yelcho Systems Consulting 2013. All rights reserved. / Page 18
© Yelcho Systems Consulting 2013. All rights reserved. / Page 19
Security
Uses same encrypted channel as SAP Support and
Consulting – SAPRouter

Dedicated “system” account RFC user

© Yelcho Systems Consulting 2013. All rights reserved. / Page 20
Security
Each work item & decision for each agent is
assigned a unique key

Inbound email processing checks



Receiver address is correct



Key is correct



© Yelcho Systems Consulting 2013. All rights reserved. / Page 21

Sender address is correct

Subject line contains action (optional)
Security
Special function group that contains proxy
function modules for Workflow API’s
Can replace any proxy function with your own
for email customization and other
enhancements such as…


Opt-in/out



Non-decision tasks



Extend beyond enterprise

Support for Substitutes

© Yelcho Systems Consulting 2013. All rights reserved. / Page 22
Role of Proxy Function Modules

© Yelcho Systems Consulting 2013. All rights reserved. / Page 24
Role of Proxy Function Modules

© Yelcho Systems Consulting 2013. All rights reserved. / Page 25
Role of Proxy Function Modules

© Yelcho Systems Consulting 2013. All rights reserved. / Page 26
Error Handling/Reporting
Application Status
Email connectivity
Work Item Status
Work Item Logs
Resend Work Items

© Yelcho Systems Consulting 2013. All rights reserved. / Page 27
“To the cloud…”
Rapid deployment
Transaction based pricing
No lock-in, no contracts, no minimums
Less than 20c per workflow decision
No additional infrastructure required
Emails completely tailored for each organisation

You can have total control of email contents
No corporate data stored except key attributes
© Yelcho Systems Consulting 2013. All rights reserved. / Page 28
More Information
http://www.yelcho.com.au/2-cliks

Send email to…
wflow.info@2-cliks.com

wflow.sample@2-cliks.com

© Yelcho Systems Consulting 2013. All rights reserved. / Page 29
Thank you. Questions?

© Yelcho Systems Consulting 2013. All rights reserved. / Page 30

Mais conteúdo relacionado

Destaque

Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Tiina Sarisalmi
 
KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7phuphax
 
Turkey School Presentation
Turkey School PresentationTurkey School Presentation
Turkey School PresentationTiina Sarisalmi
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsBrian Honan
 
Orivesi - Down the Mainstreet
Orivesi - Down the MainstreetOrivesi - Down the Mainstreet
Orivesi - Down the MainstreetTiina Sarisalmi
 
NCrafts.IO 2015 - Future of User eXperiences
NCrafts.IO 2015 - Future of User eXperiencesNCrafts.IO 2015 - Future of User eXperiences
NCrafts.IO 2015 - Future of User eXperiencesVincent Guigui
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011Tiina Sarisalmi
 
The Boardwalk Difference v6.15
The Boardwalk Difference v6.15The Boardwalk Difference v6.15
The Boardwalk Difference v6.15Scott Sadler
 
From student to professional – my experiences - 2010
From student to professional – my experiences - 2010From student to professional – my experiences - 2010
From student to professional – my experiences - 2010Dennis Chong
 
Verkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessäVerkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessäTiina Sarisalmi
 

Destaque (20)

Rok 09
Rok 09Rok 09
Rok 09
 
Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009
 
KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7
 
Unleash the 95%
Unleash the 95%Unleash the 95%
Unleash the 95%
 
Turkey School Presentation
Turkey School PresentationTurkey School Presentation
Turkey School Presentation
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Orivesi - Down the Mainstreet
Orivesi - Down the MainstreetOrivesi - Down the Mainstreet
Orivesi - Down the Mainstreet
 
NCrafts.IO 2015 - Future of User eXperiences
NCrafts.IO 2015 - Future of User eXperiencesNCrafts.IO 2015 - Future of User eXperiences
NCrafts.IO 2015 - Future of User eXperiences
 
Exercici11.3
Exercici11.3Exercici11.3
Exercici11.3
 
Welcome to Dywity
Welcome to DywityWelcome to Dywity
Welcome to Dywity
 
Case Note Record
Case Note RecordCase Note Record
Case Note Record
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
 
Voimaa verkostoitumalla
Voimaa verkostoitumallaVoimaa verkostoitumalla
Voimaa verkostoitumalla
 
The Boardwalk Difference v6.15
The Boardwalk Difference v6.15The Boardwalk Difference v6.15
The Boardwalk Difference v6.15
 
From student to professional – my experiences - 2010
From student to professional – my experiences - 2010From student to professional – my experiences - 2010
From student to professional – my experiences - 2010
 
Verkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessäVerkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessä
 
Idea
IdeaIdea
Idea
 
Twelve Gods of Olympus
Twelve Gods of OlympusTwelve Gods of Olympus
Twelve Gods of Olympus
 
Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...
Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...
Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...
 
East Side Rising
East Side RisingEast Side Rising
East Side Rising
 

Semelhante a Workflow Approval Anywhere, Anytime

Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
System Center 2012 R2 - Enterprise Automation
System Center 2012 R2 - Enterprise AutomationSystem Center 2012 R2 - Enterprise Automation
System Center 2012 R2 - Enterprise AutomationScientia Groups
 
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationSystem Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationScientia Groups
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
2011 05-11 IIBA Vendor Webinar- Business Process Modeling
2011 05-11 IIBA Vendor Webinar- Business Process Modeling2011 05-11 IIBA Vendor Webinar- Business Process Modeling
2011 05-11 IIBA Vendor Webinar- Business Process ModelingTracy Cook
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditoreprentise
 
Using Change Management in Primavera Contract Management
Using Change Management in Primavera Contract ManagementUsing Change Management in Primavera Contract Management
Using Change Management in Primavera Contract Managementp6academy
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateTechWell
 
Micro Front Ends for Micro Services using Oracle JET
Micro Front Ends for Micro Services using Oracle JETMicro Front Ends for Micro Services using Oracle JET
Micro Front Ends for Micro Services using Oracle JETVijay Nair
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
20101007 how smart use cases drive web development
20101007   how smart use cases drive web development20101007   how smart use cases drive web development
20101007 how smart use cases drive web developmentSander Hoogendoorn
 
SharePoint Site Redesign : Information Architecture and User-centered Design ...
SharePoint Site Redesign : Information Architecture and User-centered Design ...SharePoint Site Redesign : Information Architecture and User-centered Design ...
SharePoint Site Redesign : Information Architecture and User-centered Design ...arsathe
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
So we've done APM. Now what?
 So we've done APM. Now what? So we've done APM. Now what?
So we've done APM. Now what?SL Corporation
 
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field Davalen LLC
 
SystemQuest Ltd - Simple Maintenance Systems
SystemQuest Ltd - Simple Maintenance SystemsSystemQuest Ltd - Simple Maintenance Systems
SystemQuest Ltd - Simple Maintenance Systemsleechris58
 
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...Rundeck
 

Semelhante a Workflow Approval Anywhere, Anytime (20)

Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
System Center 2012 R2 - Enterprise Automation
System Center 2012 R2 - Enterprise AutomationSystem Center 2012 R2 - Enterprise Automation
System Center 2012 R2 - Enterprise Automation
 
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationSystem Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT Automation
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
ARAS - change management
ARAS - change managementARAS - change management
ARAS - change management
 
2011 05-11 IIBA Vendor Webinar- Business Process Modeling
2011 05-11 IIBA Vendor Webinar- Business Process Modeling2011 05-11 IIBA Vendor Webinar- Business Process Modeling
2011 05-11 IIBA Vendor Webinar- Business Process Modeling
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 
Using Change Management in Primavera Contract Management
Using Change Management in Primavera Contract ManagementUsing Change Management in Primavera Contract Management
Using Change Management in Primavera Contract Management
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to Automate
 
Micro Front Ends for Micro Services using Oracle JET
Micro Front Ends for Micro Services using Oracle JETMicro Front Ends for Micro Services using Oracle JET
Micro Front Ends for Micro Services using Oracle JET
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
20101007 how smart use cases drive web development
20101007   how smart use cases drive web development20101007   how smart use cases drive web development
20101007 how smart use cases drive web development
 
SharePoint Site Redesign : Information Architecture and User-centered Design ...
SharePoint Site Redesign : Information Architecture and User-centered Design ...SharePoint Site Redesign : Information Architecture and User-centered Design ...
SharePoint Site Redesign : Information Architecture and User-centered Design ...
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
So we've done APM. Now what?
 So we've done APM. Now what? So we've done APM. Now what?
So we've done APM. Now what?
 
SSE SE Practices Introduction
SSE SE Practices IntroductionSSE SE Practices Introduction
SSE SE Practices Introduction
 
Puvvati_Resume
Puvvati_ResumePuvvati_Resume
Puvvati_Resume
 
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
 
SystemQuest Ltd - Simple Maintenance Systems
SystemQuest Ltd - Simple Maintenance SystemsSystemQuest Ltd - Simple Maintenance Systems
SystemQuest Ltd - Simple Maintenance Systems
 
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Workflow Approval Anywhere, Anytime

  • 1. POP108 Workflow Approval Anywhere - Anytime Graham Robinson Yelcho Systems Consulting
  • 2. Introduction @grahamrobbo Photo by Martin Gillet © Yelcho Systems Consulting 2013. All rights reserved. / Page 2
  • 3. Agenda Workflow Approval – what a mess! A different perspective Let’s see it in action How does it work? What about security? Questions © Yelcho Systems Consulting 2013. All rights reserved. / Page 3
  • 4. Workflow Approval – what a mess! © Yelcho Systems Consulting 2013. All rights reserved. / Page 4
  • 5. Out of the box © Yelcho Systems Consulting 2013. All rights reserved. / Page 5
  • 6. SBWP See the objects being worked on See additional attachments or text © Yelcho Systems Consulting 2013. All rights reserved. / Page 6
  • 7. Business Document © Yelcho Systems Consulting 2013. All rights reserved. / Page 7
  • 8. Universal Worklist © Yelcho Systems Consulting 2013. All rights reserved. / Page 8
  • 9. NW BPM Inbox © Yelcho Systems Consulting 2013. All rights reserved. / Page 9
  • 10. Notification Email © Yelcho Systems Consulting 2013. All rights reserved. / Page 10
  • 11. Fiori Wave 1 25 Apps 13 workflow Apps © Yelcho Systems Consulting 2013. All rights reserved. / Page 11
  • 12. 2-Cliks – A Different Perspective © Yelcho Systems Consulting 2013. All rights reserved. / Page 12
  • 13. Overview F © Yelcho Systems Consulting 2013. All rights reserved. / Page 13
  • 14. Let’s see it in action © Yelcho Systems Consulting 2013. All rights reserved. / Page 14
  • 15. Any Email Client © Yelcho Systems Consulting 2013. All rights reserved. / Page 15
  • 16. Any Mobile Client © Yelcho Systems Consulting 2013. All rights reserved. / Page 16
  • 17. © Yelcho Systems Consulting 2013. All rights reserved. / Page 18
  • 18. © Yelcho Systems Consulting 2013. All rights reserved. / Page 19
  • 19. Security Uses same encrypted channel as SAP Support and Consulting – SAPRouter Dedicated “system” account RFC user © Yelcho Systems Consulting 2013. All rights reserved. / Page 20
  • 20. Security Each work item & decision for each agent is assigned a unique key Inbound email processing checks   Receiver address is correct  Key is correct  © Yelcho Systems Consulting 2013. All rights reserved. / Page 21 Sender address is correct Subject line contains action (optional)
  • 21. Security Special function group that contains proxy function modules for Workflow API’s Can replace any proxy function with your own for email customization and other enhancements such as…  Opt-in/out  Non-decision tasks  Extend beyond enterprise Support for Substitutes © Yelcho Systems Consulting 2013. All rights reserved. / Page 22
  • 22. Role of Proxy Function Modules © Yelcho Systems Consulting 2013. All rights reserved. / Page 24
  • 23. Role of Proxy Function Modules © Yelcho Systems Consulting 2013. All rights reserved. / Page 25
  • 24. Role of Proxy Function Modules © Yelcho Systems Consulting 2013. All rights reserved. / Page 26
  • 25. Error Handling/Reporting Application Status Email connectivity Work Item Status Work Item Logs Resend Work Items © Yelcho Systems Consulting 2013. All rights reserved. / Page 27
  • 26. “To the cloud…” Rapid deployment Transaction based pricing No lock-in, no contracts, no minimums Less than 20c per workflow decision No additional infrastructure required Emails completely tailored for each organisation You can have total control of email contents No corporate data stored except key attributes © Yelcho Systems Consulting 2013. All rights reserved. / Page 28
  • 27. More Information http://www.yelcho.com.au/2-cliks Send email to… wflow.info@2-cliks.com wflow.sample@2-cliks.com © Yelcho Systems Consulting 2013. All rights reserved. / Page 29
  • 28. Thank you. Questions? © Yelcho Systems Consulting 2013. All rights reserved. / Page 30