SlideShare a Scribd company logo
1 of 11
Quick Solution Delivery Offered by Knowledge IT
                                                          Industry Wise Solutions

  Patent & Intellectual          Manufacturing        Medical & Health care        Beauty & care     Education              Oil and energy
       Property                    Industry                 Industry                 Industry         Industry                 Industry


                             Electronics              Franchising             Industry Products        Construction
 Public Utilities                                                                                                              Government
                              Industry                  Industry                 & Services              Industry




                                                            Knowledge IT Solutions

                                                          2. HR Strategy                             3. CRM Incidence Response
         1. IP Management (IPM)                           Management (HRSM)                          Management (CIM)



                                  4. Emergency Incidence                         5. Corporate Governance
                                  Management (EIM)                               Management (CGM)




                                                              Knowledge IT Products

                 Object                      Forensic           Administration                Project               Review
              Manager (OM)                 Manager (FM)         Manager (AM)                Manager (PM)          Manager (RM)


               Discovery                 Workflow                    Schedule              Human Resource              Corporate
              Manager (DM)             Manager (WM)                 Manager (SM)            Manager (HRM)             Manager (CM)



                                     2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
    With any application, you effectively use only 10% of the application. But
    with Knowledge IT’s SaaS applications, you use only those functions that
    you need.
                                                    The Knowledge IT Products


                                                      Object             Forensic
                                                   Manager (OM)        Manager (FM)


                                                     Review              Workflow
                                                   Manager (RM)        Manager (WM)



                                                  Human Resource      Administration
                                                   Manager (HRM)      Manager (AM)


                                                     Project            Discovery
                                                   Manager (PM)        Manager (DM)



                                                     Corporate          Schedule
                                                    Manager (CM)       Manager (SM)




                                                        Easy Third Party Software
                                                               Integration



          2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium               Small and Medium                   For large companies
 Personal Offices                 enterprises or                 Enterprises or                     looking for full control
  or Small Offices                Shop owners                    Enterprise Subcontractors           and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Typical Usage                 Secure user access.              determined by the customer and    Ultimate set comes with the freedom
Size: 1-10 Users              Typical Usage                    set/added per category of users   to build a solution view and dig-
                              Size: 50-1000 of Users           from Packaged Solution.           down feature according to each
                                                               Typical Usage                     customer’s need. Role based as well
                                                               Size: 100-1000 of Users           as privilege based access control can
                                                                                                 be set by the Business and above.
                                                                                                 Typical Usage
                                                                                                 Size: Above 100 Users



                                2012 © Knowledge IT Corporation. All Rights Reserved
Customer Search


Different                                        Different
Search Criteria                                  Search Form




                  2012 © Knowledge IT Corporation. All Rights Reserved
Customer Registration




                                                Different Escalation
                                                Form




2012 © Knowledge IT Corporation. All Rights Reserved
Notification of Customer Registration


                                                Internal Mail




                                                      Internal Mail




              Choose possible advice in
              given situation to possible
              Team




      2012 © Knowledge IT Corporation. All Rights Reserved
Mail Escalated for various Templates




                                                     External Mail




     2012 © Knowledge IT Corporation. All Rights Reserved
Seasonal Mail Sent to Multiple Customers




                                                  Select multiple
                                                  customers to sent
                                                  mail.




                                                   External Mail




        2012 © Knowledge IT Corporation. All Rights Reserved
User Follow up




Various index
description form




                                                             Follow up
                                                             registration




                   2012 © Knowledge IT Corporation. All Rights Reserved
Pull Mail Escalation Form


                                  2. Register customer Details
                                  according to Escalation Form
1. Escalation Form




2012 © Knowledge IT Corporation. All Rights Reserved
Pull Mail Escalation

Internal Mail




                                                Mail Escalated if the
                                                fields of escalation
                                                form matches




      2012 © Knowledge IT Corporation. All Rights Reserved

More Related Content

What's hot (20)

IRM_E_25.2.12
IRM_E_25.2.12IRM_E_25.2.12
IRM_E_25.2.12
 
CIM_E_24.2.12
CIM_E_24.2.12CIM_E_24.2.12
CIM_E_24.2.12
 
CGS_E_17.3.12
CGS_E_17.3.12CGS_E_17.3.12
CGS_E_17.3.12
 
CGS_E_19.3.12
CGS_E_19.3.12CGS_E_19.3.12
CGS_E_19.3.12
 
CGS_E_23.4.12
CGS_E_23.4.12CGS_E_23.4.12
CGS_E_23.4.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
CGS_E_7.4.12
CGS_E_7.4.12CGS_E_7.4.12
CGS_E_7.4.12
 
IPM_E_3.2.12
IPM_E_3.2.12IPM_E_3.2.12
IPM_E_3.2.12
 
CGS_E_1.4.12
CGS_E_1.4.12CGS_E_1.4.12
CGS_E_1.4.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_19.3.12
IPM_E_19.3.12IPM_E_19.3.12
IPM_E_19.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IRM_E_15.3.12
IRM_E_15.3.12IRM_E_15.3.12
IRM_E_15.3.12
 
IRM_E_14.3.12
IRM_E_14.3.12IRM_E_14.3.12
IRM_E_14.3.12
 
IPM_E_7.4.12
IPM_E_7.4.12IPM_E_7.4.12
IPM_E_7.4.12
 
IPM_E_23.4.12
IPM_E_23.4.12IPM_E_23.4.12
IPM_E_23.4.12
 
IRM_E_14.03.2012
IRM_E_14.03.2012IRM_E_14.03.2012
IRM_E_14.03.2012
 
IPM
IPMIPM
IPM
 
HSM_E_23.2.12
HSM_E_23.2.12HSM_E_23.2.12
HSM_E_23.2.12
 
IRM_E_17.03.2012
IRM_E_17.03.2012IRM_E_17.03.2012
IRM_E_17.03.2012
 

Viewers also liked (14)

CIM_J_12.3.12
CIM_J_12.3.12CIM_J_12.3.12
CIM_J_12.3.12
 
IPM_J_1.4.12
IPM_J_1.4.12IPM_J_1.4.12
IPM_J_1.4.12
 
IRM_J_14.2.12
IRM_J_14.2.12IRM_J_14.2.12
IRM_J_14.2.12
 
HSM_E_1.4.12
HSM_E_1.4.12HSM_E_1.4.12
HSM_E_1.4.12
 
IPM_J_29.2.12
IPM_J_29.2.12IPM_J_29.2.12
IPM_J_29.2.12
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
HSM_E_21.4.12
HSM_E_21.4.12HSM_E_21.4.12
HSM_E_21.4.12
 
CIM_J_6.3.12
CIM_J_6.3.12CIM_J_6.3.12
CIM_J_6.3.12
 
IPM_J_19.3.12
IPM_J_19.3.12IPM_J_19.3.12
IPM_J_19.3.12
 
HSM_J_16.3.12
HSM_J_16.3.12HSM_J_16.3.12
HSM_J_16.3.12
 
HSM_E_19.3.12
HSM_E_19.3.12HSM_E_19.3.12
HSM_E_19.3.12
 
HSM_J_27.2.12
HSM_J_27.2.12HSM_J_27.2.12
HSM_J_27.2.12
 
IPM_J_7.4.12
IPM_J_7.4.12IPM_J_7.4.12
IPM_J_7.4.12
 
IRM_J_28.2.12
IRM_J_28.2.12IRM_J_28.2.12
IRM_J_28.2.12
 

Similar to CMS_01.03.12 (10)

IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
IRM_E_17.3.12
IRM_E_17.3.12IRM_E_17.3.12
IRM_E_17.3.12
 
IRM_E_7.4.12
IRM_E_7.4.12IRM_E_7.4.12
IRM_E_7.4.12
 
IRM_E_1.4.12
IRM_E_1.4.12IRM_E_1.4.12
IRM_E_1.4.12
 
HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
IRM_E_19.3.12
IRM_E_19.3.12IRM_E_19.3.12
IRM_E_19.3.12
 
HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
HSM_E_7.4.12
HSM_E_7.4.12HSM_E_7.4.12
HSM_E_7.4.12
 
HSM_E_24.2.12
HSM_E_24.2.12HSM_E_24.2.12
HSM_E_24.2.12
 

More from Hemant_Kumar_Setya (17)

HSM_J_14.6.2012
HSM_J_14.6.2012HSM_J_14.6.2012
HSM_J_14.6.2012
 
Ipm j 7april2012
Ipm j 7april2012Ipm j 7april2012
Ipm j 7april2012
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
IRM_J_7.4.12
IRM_J_7.4.12IRM_J_7.4.12
IRM_J_7.4.12
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
CGS_J_7.4.12
CGS_J_7.4.12CGS_J_7.4.12
CGS_J_7.4.12
 
IRM_J_1.4.12
IRM_J_1.4.12IRM_J_1.4.12
IRM_J_1.4.12
 
HSM_J_1.4.12
HSM_J_1.4.12HSM_J_1.4.12
HSM_J_1.4.12
 
CGS_J_1.4.12
CGS_J_1.4.12CGS_J_1.4.12
CGS_J_1.4.12
 
CGS_J_20.3.12
CGS_J_20.3.12CGS_J_20.3.12
CGS_J_20.3.12
 
IRM_J_20.3.12
IRM_J_20.3.12IRM_J_20.3.12
IRM_J_20.3.12
 
IPM_J_20.3.12
IPM_J_20.3.12IPM_J_20.3.12
IPM_J_20.3.12
 
HSM_J_20.3.12
HSM_J_20.3.12HSM_J_20.3.12
HSM_J_20.3.12
 
IPM_J_19.3.12
IPM_J_19.3.12IPM_J_19.3.12
IPM_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 
CGS_J_19.3.12
CGS_J_19.3.12CGS_J_19.3.12
CGS_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 

Recently uploaded

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

CMS_01.03.12

  • 1. Quick Solution Delivery Offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 2. HR Strategy 3. CRM Incidence Response 1. IP Management (IPM) Management (HRSM) Management (CIM) 4. Emergency Incidence 5. Corporate Governance Management (EIM) Management (CGM) Knowledge IT Products Object Forensic Administration Project Review Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM) Discovery Workflow Schedule Human Resource Corporate Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Forensic Manager (OM) Manager (FM) Review Workflow Manager (RM) Manager (WM) Human Resource Administration Manager (HRM) Manager (AM) Project Discovery Manager (PM) Manager (DM) Corporate Schedule Manager (CM) Manager (SM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Typical Usage Secure user access. determined by the customer and Ultimate set comes with the freedom Size: 1-10 Users Typical Usage set/added per category of users to build a solution view and dig- Size: 50-1000 of Users from Packaged Solution. down feature according to each Typical Usage customer’s need. Role based as well Size: 100-1000 of Users as privilege based access control can be set by the Business and above. Typical Usage Size: Above 100 Users 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Customer Search Different Different Search Criteria Search Form 2012 © Knowledge IT Corporation. All Rights Reserved
  • 5. Customer Registration Different Escalation Form 2012 © Knowledge IT Corporation. All Rights Reserved
  • 6. Notification of Customer Registration Internal Mail Internal Mail Choose possible advice in given situation to possible Team 2012 © Knowledge IT Corporation. All Rights Reserved
  • 7. Mail Escalated for various Templates External Mail 2012 © Knowledge IT Corporation. All Rights Reserved
  • 8. Seasonal Mail Sent to Multiple Customers Select multiple customers to sent mail. External Mail 2012 © Knowledge IT Corporation. All Rights Reserved
  • 9. User Follow up Various index description form Follow up registration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 10. Pull Mail Escalation Form 2. Register customer Details according to Escalation Form 1. Escalation Form 2012 © Knowledge IT Corporation. All Rights Reserved
  • 11. Pull Mail Escalation Internal Mail Mail Escalated if the fields of escalation form matches 2012 © Knowledge IT Corporation. All Rights Reserved