SlideShare a Scribd company logo
1 of 9
eMANIFEST Application
Overview About ERP
 eMANIFEST is a comprehensive software solution to
manage complete Delivery order, Bol and Consignment for
the organization. Generating DPAMAN , XML file . There
are also various types of Customized Report available in it.
 This software is developed on latest technologies to fulfill
latest technical requirements of clients.
System
 Change Password.
 Software Control Master – Customize your application
 Database Compression.
 Back Up – Automatic Backup Facility
Features & Benefits
 This is Multi-user Software, which allows all the modules to work under a single server.
 Menu Driven Software (Easy to use).
 User wise access right is defined but administrator has complete right to view all reports.
 Software is protected with multi-level password protection for security.
 Inbuilt Backup & Restore facility to ensure “Data Protection”.
 Administrator can have complete access to all modules of system
Specifications
(Hardware/Software)
 Minimum Pentium based Computer with 1GB RAM of more recommended.
 MS-Windows XP or above is required.
Eman,scrsots

More Related Content

What's hot

System scalability
System scalabilitySystem scalability
System scalabilityAVEVA
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0lisanl
 
SCUG.DK - Windows 10 Planning - April 2015
SCUG.DK - Windows 10 Planning - April 2015SCUG.DK - Windows 10 Planning - April 2015
SCUG.DK - Windows 10 Planning - April 2015Ronni Pedersen
 
Conceptual framework software (2)
Conceptual framework   software (2)Conceptual framework   software (2)
Conceptual framework software (2)Rajendra Sharma
 
Sccm Interview Questions and Answers
Sccm Interview Questions and AnswersSccm Interview Questions and Answers
Sccm Interview Questions and AnswersKashifSCCMTrainer
 
Grid Control
Grid ControlGrid Control
Grid Controlbcole23
 
E business solutions l07 systems admin
E business solutions l07 systems adminE business solutions l07 systems admin
E business solutions l07 systems adminPeter Merchant
 
SCUG.DK: Protecting Company Data using EMS, April 2015
SCUG.DK: Protecting Company Data using EMS, April 2015SCUG.DK: Protecting Company Data using EMS, April 2015
SCUG.DK: Protecting Company Data using EMS, April 2015Ronni Pedersen
 
what is sccm ? sccm online Training
what is sccm ? sccm online Training what is sccm ? sccm online Training
what is sccm ? sccm online Training KashifSCCMTrainer
 
Product Information - Fuse Management Central 1.0.0
Product Information - Fuse Management Central 1.0.0Product Information - Fuse Management Central 1.0.0
Product Information - Fuse Management Central 1.0.0antonio.carvalho
 
Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012COMMON Europe
 

What's hot (18)

System scalability
System scalabilitySystem scalability
System scalability
 
Introduction to erp
Introduction to erpIntroduction to erp
Introduction to erp
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
 
Lec # 1 chapter 2
Lec # 1 chapter 2Lec # 1 chapter 2
Lec # 1 chapter 2
 
SCUG.DK - Windows 10 Planning - April 2015
SCUG.DK - Windows 10 Planning - April 2015SCUG.DK - Windows 10 Planning - April 2015
SCUG.DK - Windows 10 Planning - April 2015
 
Conceptual framework software (2)
Conceptual framework   software (2)Conceptual framework   software (2)
Conceptual framework software (2)
 
Computer System
Computer SystemComputer System
Computer System
 
Sccm Interview Questions and Answers
Sccm Interview Questions and AnswersSccm Interview Questions and Answers
Sccm Interview Questions and Answers
 
Grid Control
Grid ControlGrid Control
Grid Control
 
E business solutions l07 systems admin
E business solutions l07 systems adminE business solutions l07 systems admin
E business solutions l07 systems admin
 
SCUG.DK: Protecting Company Data using EMS, April 2015
SCUG.DK: Protecting Company Data using EMS, April 2015SCUG.DK: Protecting Company Data using EMS, April 2015
SCUG.DK: Protecting Company Data using EMS, April 2015
 
what is sccm ? sccm online Training
what is sccm ? sccm online Training what is sccm ? sccm online Training
what is sccm ? sccm online Training
 
Product Information - Fuse Management Central 1.0.0
Product Information - Fuse Management Central 1.0.0Product Information - Fuse Management Central 1.0.0
Product Information - Fuse Management Central 1.0.0
 
types of software
types of softwaretypes of software
types of software
 
SCCM 2007 Presentation
SCCM 2007 PresentationSCCM 2007 Presentation
SCCM 2007 Presentation
 
Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012
 
Types of software
Types of softwareTypes of software
Types of software
 

Viewers also liked

Online assignment jyothy
Online  assignment jyothyOnline  assignment jyothy
Online assignment jyothyDhaneesh Dan
 
DOING IT: The Reflective Practioner
DOING IT: The Reflective PractionerDOING IT: The Reflective Practioner
DOING IT: The Reflective PractionerAnn Kovalchick
 
Reflective teaching
Reflective teachingReflective teaching
Reflective teachingBen Cruz
 
Reflective Teaching Workshop
Reflective Teaching WorkshopReflective Teaching Workshop
Reflective Teaching WorkshopShaun
 
Reflective teaching-in-elt
Reflective teaching-in-eltReflective teaching-in-elt
Reflective teaching-in-eltsachin gaikwad
 
The Purpose Of Reflective Practice
The Purpose Of Reflective PracticeThe Purpose Of Reflective Practice
The Purpose Of Reflective PracticeToby Adams
 
Basics of Reflective Teaching
Basics of Reflective TeachingBasics of Reflective Teaching
Basics of Reflective TeachingAmin Neghavati
 
Reflective Practice Presentation
Reflective Practice PresentationReflective Practice Presentation
Reflective Practice PresentationJennifer Fenton
 
Reflective Teaching
Reflective TeachingReflective Teaching
Reflective TeachingBSEPhySci14
 

Viewers also liked (15)

Online assignment jyothy
Online  assignment jyothyOnline  assignment jyothy
Online assignment jyothy
 
Anaswara
AnaswaraAnaswara
Anaswara
 
DOING IT: The Reflective Practioner
DOING IT: The Reflective PractionerDOING IT: The Reflective Practioner
DOING IT: The Reflective Practioner
 
ONLINE
ONLINE ONLINE
ONLINE
 
Reflective teaching
Reflective teachingReflective teaching
Reflective teaching
 
Reflective Teaching Workshop
Reflective Teaching WorkshopReflective Teaching Workshop
Reflective Teaching Workshop
 
Reflective teaching
Reflective teachingReflective teaching
Reflective teaching
 
Reflective teaching-in-elt
Reflective teaching-in-eltReflective teaching-in-elt
Reflective teaching-in-elt
 
The Purpose Of Reflective Practice
The Purpose Of Reflective PracticeThe Purpose Of Reflective Practice
The Purpose Of Reflective Practice
 
Reflective Teaching
Reflective TeachingReflective Teaching
Reflective Teaching
 
Basics of Reflective Teaching
Basics of Reflective TeachingBasics of Reflective Teaching
Basics of Reflective Teaching
 
Reflective Teaching powerpoint mkdds
Reflective Teaching powerpoint mkddsReflective Teaching powerpoint mkdds
Reflective Teaching powerpoint mkdds
 
Reflective Practice Presentation
Reflective Practice PresentationReflective Practice Presentation
Reflective Practice Presentation
 
Reflective Teaching
Reflective TeachingReflective Teaching
Reflective Teaching
 
Reflective Teaching
Reflective TeachingReflective Teaching
Reflective Teaching
 

Similar to Eman,scrsots

Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
La2 Software1
La2 Software1La2 Software1
La2 Software1Cma Mohd
 
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_onlineAsecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_onlinewardell henley
 
Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)DanaAlexander13
 
Hardware management systems
Hardware management systemsHardware management systems
Hardware management systemsIUBAT
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
Invoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptxInvoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptxcajativ595
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17Yabibo
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17Yabibo
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint ProtectionScientia Groups
 
Pharmacymanagement- Harish(221348092).pptx
Pharmacymanagement- Harish(221348092).pptxPharmacymanagement- Harish(221348092).pptx
Pharmacymanagement- Harish(221348092).pptxHKShab
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for managementShareef AP
 

Similar to Eman,scrsots (20)

Ch03_Software.ppt
Ch03_Software.pptCh03_Software.ppt
Ch03_Software.ppt
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
unit 3.pptx
unit 3.pptxunit 3.pptx
unit 3.pptx
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
La2 Software1
La2 Software1La2 Software1
La2 Software1
 
Software1
Software1Software1
Software1
 
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_onlineAsecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
 
HP mProve Datasheet Final
HP mProve Datasheet FinalHP mProve Datasheet Final
HP mProve Datasheet Final
 
Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)Fundamental concepts and_principles_of_operating_systems (2)
Fundamental concepts and_principles_of_operating_systems (2)
 
Hardware management systems
Hardware management systemsHardware management systems
Hardware management systems
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Invoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptxInvoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptx
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Pharmacymanagement- Harish(221348092).pptx
Pharmacymanagement- Harish(221348092).pptxPharmacymanagement- Harish(221348092).pptx
Pharmacymanagement- Harish(221348092).pptx
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
 
Ch3
Ch3Ch3
Ch3
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Eman,scrsots

  • 1. eMANIFEST Application Overview About ERP  eMANIFEST is a comprehensive software solution to manage complete Delivery order, Bol and Consignment for the organization. Generating DPAMAN , XML file . There are also various types of Customized Report available in it.  This software is developed on latest technologies to fulfill latest technical requirements of clients.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. System  Change Password.  Software Control Master – Customize your application  Database Compression.  Back Up – Automatic Backup Facility Features & Benefits  This is Multi-user Software, which allows all the modules to work under a single server.  Menu Driven Software (Easy to use).  User wise access right is defined but administrator has complete right to view all reports.  Software is protected with multi-level password protection for security.  Inbuilt Backup & Restore facility to ensure “Data Protection”.  Administrator can have complete access to all modules of system Specifications (Hardware/Software)  Minimum Pentium based Computer with 1GB RAM of more recommended.  MS-Windows XP or above is required.