This document provides an overview of topics related to accounting information systems and electronic commerce. It defines electronic commerce and discusses Internet technologies like packet switching and virtual private networks. It also summarizes common Internet protocols, benefits of Internet commerce, security risks, and implications for the accounting profession.
B2B electronic commerce involves the exchange of goods and services between businesses online. It can take several forms including supplier-oriented marketplaces, buyer-oriented marketplaces, and intermediary-oriented marketplaces. Key aspects of B2B e-commerce discussed in the document include procurement management, supply chain management, EDI, and the role of software agents in facilitating communication between buyers and sellers.
This document discusses how a company called ARPK1 helps traditional industries modernize through new technologies like RFID. It outlines ARPK1's supply chain management approach called "Supply Chain Fractal" which helps companies better manage requirements, orders, logistics, and processes. The document also highlights how ARPK1 provides benefits like cost reductions, continuous improvement programs, and quantifiable cost savings through efforts like supply chain enhancement and business process integration.
The document discusses enterprise mobility and traceability solutions provided by VisionID. It notes that VisionID is an Irish company that has been in business for 11 years and provides mobile computing and traceability solutions through offices in Dublin, Clonmel, Limerick and Belfast. It then provides details on VisionID's products, partners, customers and the industries it serves, with a focus on healthcare, retail, transport/logistics, manufacturing and government.
The document discusses the evolution of supplier collaboration and the benefits of an integrated supplier portal. It outlines how supplier collaboration has progressed from basic document exchange to more advanced processes like CPFR that integrate planning and forecasting between retailers and suppliers. It notes the deficiencies of traditional departmentalized approaches with multiple supplier systems. The document then proposes that a single, integrated supplier collaboration platform can automate processes, enable two-way communication, provide analytics, and scale collaboration beyond just top suppliers. It introduces the Manthan SPA supplier portal and analytics solution as an example of a product available today that can optimize processes and enhance performance between retailers and suppliers.
From distribution-channel-from-distribution-channel-to2569Bryk Miroslaw
The document discusses distribution systems and supply chain management. It defines distribution channels as systems of interdependent organizations that build value as products move through. Supply chain management involves coordinating flows of materials, information, and finances among channel members. E-business allows more efficient management of information flows. The document then discusses challenges like the bullwhip effect and how information technologies can help address them.
1) The traditional telecom business model is threatened by new technologies and competitors in the 2.0 world, but these changes also open new opportunities for telecom companies that can adapt.
2) To take advantage of opportunities in the 2.0 world, telecom companies need flexible front and back office systems to offer both traditional and new services, and adopt a business approach within and beyond the traditional ecosystem.
3) By identifying and prioritizing potential new customers, designing the right go-to-market strategy, and offering innovative services, telecom companies can turn competitors into customers in the 2.0 world.
During a 17 day event for a streaming media company:
- Over 1.3 billion page views and 50 million unique visitors were recorded
- Viewers watched over 70 million videos and 5,000 unique clips per day
- The company reported over $30 million in advertising revenue
B2B electronic commerce involves the exchange of goods and services between businesses online. It can take several forms including supplier-oriented marketplaces, buyer-oriented marketplaces, and intermediary-oriented marketplaces. Key aspects of B2B e-commerce discussed in the document include procurement management, supply chain management, EDI, and the role of software agents in facilitating communication between buyers and sellers.
This document discusses how a company called ARPK1 helps traditional industries modernize through new technologies like RFID. It outlines ARPK1's supply chain management approach called "Supply Chain Fractal" which helps companies better manage requirements, orders, logistics, and processes. The document also highlights how ARPK1 provides benefits like cost reductions, continuous improvement programs, and quantifiable cost savings through efforts like supply chain enhancement and business process integration.
The document discusses enterprise mobility and traceability solutions provided by VisionID. It notes that VisionID is an Irish company that has been in business for 11 years and provides mobile computing and traceability solutions through offices in Dublin, Clonmel, Limerick and Belfast. It then provides details on VisionID's products, partners, customers and the industries it serves, with a focus on healthcare, retail, transport/logistics, manufacturing and government.
The document discusses the evolution of supplier collaboration and the benefits of an integrated supplier portal. It outlines how supplier collaboration has progressed from basic document exchange to more advanced processes like CPFR that integrate planning and forecasting between retailers and suppliers. It notes the deficiencies of traditional departmentalized approaches with multiple supplier systems. The document then proposes that a single, integrated supplier collaboration platform can automate processes, enable two-way communication, provide analytics, and scale collaboration beyond just top suppliers. It introduces the Manthan SPA supplier portal and analytics solution as an example of a product available today that can optimize processes and enhance performance between retailers and suppliers.
From distribution-channel-from-distribution-channel-to2569Bryk Miroslaw
The document discusses distribution systems and supply chain management. It defines distribution channels as systems of interdependent organizations that build value as products move through. Supply chain management involves coordinating flows of materials, information, and finances among channel members. E-business allows more efficient management of information flows. The document then discusses challenges like the bullwhip effect and how information technologies can help address them.
1) The traditional telecom business model is threatened by new technologies and competitors in the 2.0 world, but these changes also open new opportunities for telecom companies that can adapt.
2) To take advantage of opportunities in the 2.0 world, telecom companies need flexible front and back office systems to offer both traditional and new services, and adopt a business approach within and beyond the traditional ecosystem.
3) By identifying and prioritizing potential new customers, designing the right go-to-market strategy, and offering innovative services, telecom companies can turn competitors into customers in the 2.0 world.
During a 17 day event for a streaming media company:
- Over 1.3 billion page views and 50 million unique visitors were recorded
- Viewers watched over 70 million videos and 5,000 unique clips per day
- The company reported over $30 million in advertising revenue
E-commerce Technology for Safe money transaction over the netRaman K. Attri
The Buzz word E-commerce has revolutionized the way the business and money transactions used to work in the past. It is the latest impact of software arena in the field of banking, business and purchasing. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier for big corporations. This paper mainly concentrates on technology revolution behind the transaction of money over the net. There are still doubts and questions from business and corporate users on the safety aspects of e-commerce. The software and web technology has innovated many encryptions and secure software layering and protocols techniques which tries to make the e-commerce transactions safer. The concept behind these techniques along-with the technical aspect of e-commerce and how it can be implemented in bank for money transaction is discussed in this paper. Further it deals with safety and security issues related to e-commerce implementation in banks and business transactions.
Blue Wind is a professional supply chain management partner that introduces new services using latest technologies. It focuses on supply chain process integration to improve efficiency, reduce costs and increase value for customers. Competition is now between entire supply chains rather than individual organizations. Blue Wind offers advanced procurement, ERP solutions, transportation, asset management, order fulfillment and other services. Implementing a supply chain approach can improve service levels, forecasting accuracy and avoid stockouts.
The document discusses the three stages of e-commerce:
1) Understanding the types of e-commerce solutions available, including fully automated, hybrid, and manual solutions.
2) The business-to-business e-commerce value chain, which involves both transactional and informational exchanges.
3) Details on fully automated e-commerce solutions, which allow for complete integration between trading partners' information systems.
The document discusses how B2B e-business and supply chain management can be improved through increased interoperability and use of standards like NemHandel and OIOUBL. It proposes reference models for a plug-and-play B2B supply chain where suppliers, producers, distributors, retailers, and customers can seamlessly exchange information. The models aim to allow boundaryless information flow across organizations. The document also discusses how e-business CRM and SCM systems can be integrated to provide a 360-degree view of customers and transactions through the use of technologies like web services and XML.
This document provides an overview and agenda for a presentation on the Russian broadband market. It includes sections on global broadband trends, the Russian ICT market situation, fixed and wireless networks in Russia, and the top 10 things to do in the Russian broadband sector. Slides cover topics like broadband forecasts, infrastructure, bandwidth, satellite services, and market projections. The presentation aims to analyze opportunities in the growing Russian broadband industry.
In this presentation we will discuss the necessary equipments that one would need to set up an e-business. E-commerce came into existence with the Internet and therefore an internet connection is a mandate to start an e-business.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
E-business includes a wide gamut of initiatives such as Merchandise planning and analysis, order entry and order tracking, order fulfillment, warehousing, inventory management, customer service and knowledge management.
There are a set of steps in which typical wholesale e-commerce transaction is concluded. Initially, the buyer logs on to the browser, he then looks for the relevant product, selects the product and orders the same. Post this, a purchase order is sent to the seller which the seller confirms. Then payment information is sent to the bank. The credit is checked, the credit is approved and the product is finally shipped. Further, In a B2B supply chain a raw material supplier sends the raw material to the manufacturer who in turn sends the finished product to the wholesaler and the wholesaler transmits the same to the retailer. The retailer then generates a demand with the wholesaler when he anticipates a higher off take from the shelves which in turn gets transmitted to the raw material supplier.
Moreover, before a product reaches a consumer there are different objectives on each aspects of the value chain. Differentiation is the goal in product development while lowering the cost is the objective when it comes to manufacturing and distribution while marketing is all about carrying out a focused campaign.
E-business is propagated through a host of community building programs such as E-mail newsletters, industry relevant reports, chat events and promotions and contests.
Oplægget blev holdt ved InfinIT-arrangementet "Temadag om værdikæder i netværk og plug'n play supply chains" afholdt den 1. november 2011.
Læs mere på http://infinit.dk/dk/hvad_kan_vi_goere_for_dig/viden/reportager/grib_chancen_nu.htm
The document presents Ontocom, a framework for estimating development efforts for large-scale business ontologies. Ontocom consists of a process for effort estimation, a formula and tool for calculating estimations, and a methodology for customizing the estimations to a particular company. It estimates ontology development costs with 30% accuracy in 80% of cases. The framework was successfully applied in an ontology project at a large German telecommunications operator as part of a service-oriented architecture initiative.
The document discusses the role of consultant companies in the supply chain, noting that they typically work as specialists placed between the customer and other parts of the supply chain. It describes the characteristics and challenges of consultant businesses and provides an example of a consultant company. Finally, it discusses future demands on consultant companies and potential solutions around platforms, flexibility, and use of new technologies like robotics and RFID tags.
The document summarizes Nokia's vision of increased mobility across different domains including the enterprise domain. It discusses key aspects of the enterprise domain such as services, usage scenarios, management, and trends driving adoption of mobility. Extending mobility into the enterprise domain can provide more cost-effective communication solutions and improve productivity through increased accessibility of information and collaboration tools.
AnswerNet is a large telemessaging firm established in 1998 that has grown through acquisitions to become a full-service provider of inbound, outbound, and digital call center solutions. It employs over 2,000 people across its network of over 50 call centers in the US and Canada. The document provides background on AnswerNet's services, leadership, and ownership.
Demtech is a business development and sales company founded in 2000 that specializes in assisting companies expand into Southern Europe and Latin America markets. It offers outsourced business development, sales, and account management support. Demtech helps clients with activities from market analysis to setting up subsidiaries. It provides local sales support, leads qualification, and cultural awareness to facilitate clients' success abroad. Demtech also assists clients with exhibition support and ongoing CRM services to generate qualified sales leads and maximize their market penetration.
PRIL is an Indian retail solutions company that offers the Retail Excel product. Retail Excel is a complete end-to-end retail management solution for small and mid-sized retailers. It offers various modules like inventory, sales, procurement, accounting, and analytics to enable smooth store operations. Retail Excel provides flexibility in business rules, security, and the ability to manage global operations in multiple countries and currencies. It also allows for robust merchandise management functions.
In this presentation, we will discuss e-commerce on a B2B level in detail while focusing on planning on e-business model, determinants, basic principle for effective outcome, guidelines and much more toget a positive result.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Printing is Easy - Everything Else is Hard Dscoop7charlesgehman
The document discusses Digital Lizard's PrintTrak system, which was built to automate print workflows. It has three key workflow entry points: client print systems, hosted print stores, and custom print orders. PrintTrak is made up of three core components - PrintTrak Watcher, PrintTrak Shop, and PrintTrak Communicator - that together allow for automated communication between partners and customers. The document also provides an overview of Mimeo's print production facilities and timeline, as well as their technology stack and Print Factory system which aims to drive print production through web services and automation.
The document discusses electronic commerce systems and technologies. It provides an overview of topics like e-commerce models, internet protocols, security issues, and implications for accounting. Specifically, it summarizes key concepts such as the benefits of e-commerce, internet technologies like packet switching and virtual private networks, common protocols, security methods involving encryption and digital signatures, and risks associated with intranets and the internet.
The document outlines the objectives and key concepts covered in Chapter 14 of the textbook "Accounting Information Systems, 6th edition". The objectives include the in-house development phase of the SDLC, tools used such as CASE and PERT/Gantt charts, structured vs object-oriented design approaches, documentation types, and the commercial software option. It then covers the phases of SDLC in more detail including in-house development, commercial packages, and maintenance. Design approaches like structured and object-oriented are defined. Documentation, testing, training and post-implementation review are discussed as part of system delivery.
The document discusses the key stages in the Systems Development Life Cycle (SDLC), including systems strategy, project initiation, development, and maintenance. It describes the objectives of each stage, such as assessing business needs during systems strategy and conducting feasibility studies and cost-benefit analysis during project initiation. Accountants play an important role by ensuring economic feasibility analysis, accurate cost reporting, and that systems have appropriate controls.
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...Habib Ullah Qamar
Expenditure Cycle part II in which Payroll Processing system is discussed in three regards: Conceptual , Physical (manual and Computerized) and Fixed Asset Processing Systesm
The document outlines the objectives and key concepts of Chapter 9, which discusses problems with flat file data management, the database concept, data normalization, and database design. The main points are:
- Flat file systems have issues like redundant data, difficulty updating across files, and lack of task independence that led to the database concept.
- A database centralizes data in a single repository, eliminating redundancy and allowing single updates across applications.
- Relational databases model data in tables linked by primary and foreign keys, avoiding anomalies from unnormalized data.
- Proper database design involves entity identification, data modeling, constructing physical tables, and preparing user views through a six-phase process.
This document outlines objectives and procedures for manual and computerized payroll and fixed asset accounting systems. For payroll, it describes processing steps from timekeeping and payroll preparation to general ledger posting. Key controls are transaction authorization, segregation of duties, and independent verification. For fixed assets, it outlines the asset lifecycle from acquisition to disposal and depreciation calculation. Computerized systems automate many tasks but still require authorization and verification controls.
E-commerce Technology for Safe money transaction over the netRaman K. Attri
The Buzz word E-commerce has revolutionized the way the business and money transactions used to work in the past. It is the latest impact of software arena in the field of banking, business and purchasing. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier for big corporations. This paper mainly concentrates on technology revolution behind the transaction of money over the net. There are still doubts and questions from business and corporate users on the safety aspects of e-commerce. The software and web technology has innovated many encryptions and secure software layering and protocols techniques which tries to make the e-commerce transactions safer. The concept behind these techniques along-with the technical aspect of e-commerce and how it can be implemented in bank for money transaction is discussed in this paper. Further it deals with safety and security issues related to e-commerce implementation in banks and business transactions.
Blue Wind is a professional supply chain management partner that introduces new services using latest technologies. It focuses on supply chain process integration to improve efficiency, reduce costs and increase value for customers. Competition is now between entire supply chains rather than individual organizations. Blue Wind offers advanced procurement, ERP solutions, transportation, asset management, order fulfillment and other services. Implementing a supply chain approach can improve service levels, forecasting accuracy and avoid stockouts.
The document discusses the three stages of e-commerce:
1) Understanding the types of e-commerce solutions available, including fully automated, hybrid, and manual solutions.
2) The business-to-business e-commerce value chain, which involves both transactional and informational exchanges.
3) Details on fully automated e-commerce solutions, which allow for complete integration between trading partners' information systems.
The document discusses how B2B e-business and supply chain management can be improved through increased interoperability and use of standards like NemHandel and OIOUBL. It proposes reference models for a plug-and-play B2B supply chain where suppliers, producers, distributors, retailers, and customers can seamlessly exchange information. The models aim to allow boundaryless information flow across organizations. The document also discusses how e-business CRM and SCM systems can be integrated to provide a 360-degree view of customers and transactions through the use of technologies like web services and XML.
This document provides an overview and agenda for a presentation on the Russian broadband market. It includes sections on global broadband trends, the Russian ICT market situation, fixed and wireless networks in Russia, and the top 10 things to do in the Russian broadband sector. Slides cover topics like broadband forecasts, infrastructure, bandwidth, satellite services, and market projections. The presentation aims to analyze opportunities in the growing Russian broadband industry.
In this presentation we will discuss the necessary equipments that one would need to set up an e-business. E-commerce came into existence with the Internet and therefore an internet connection is a mandate to start an e-business.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
E-business includes a wide gamut of initiatives such as Merchandise planning and analysis, order entry and order tracking, order fulfillment, warehousing, inventory management, customer service and knowledge management.
There are a set of steps in which typical wholesale e-commerce transaction is concluded. Initially, the buyer logs on to the browser, he then looks for the relevant product, selects the product and orders the same. Post this, a purchase order is sent to the seller which the seller confirms. Then payment information is sent to the bank. The credit is checked, the credit is approved and the product is finally shipped. Further, In a B2B supply chain a raw material supplier sends the raw material to the manufacturer who in turn sends the finished product to the wholesaler and the wholesaler transmits the same to the retailer. The retailer then generates a demand with the wholesaler when he anticipates a higher off take from the shelves which in turn gets transmitted to the raw material supplier.
Moreover, before a product reaches a consumer there are different objectives on each aspects of the value chain. Differentiation is the goal in product development while lowering the cost is the objective when it comes to manufacturing and distribution while marketing is all about carrying out a focused campaign.
E-business is propagated through a host of community building programs such as E-mail newsletters, industry relevant reports, chat events and promotions and contests.
Oplægget blev holdt ved InfinIT-arrangementet "Temadag om værdikæder i netværk og plug'n play supply chains" afholdt den 1. november 2011.
Læs mere på http://infinit.dk/dk/hvad_kan_vi_goere_for_dig/viden/reportager/grib_chancen_nu.htm
The document presents Ontocom, a framework for estimating development efforts for large-scale business ontologies. Ontocom consists of a process for effort estimation, a formula and tool for calculating estimations, and a methodology for customizing the estimations to a particular company. It estimates ontology development costs with 30% accuracy in 80% of cases. The framework was successfully applied in an ontology project at a large German telecommunications operator as part of a service-oriented architecture initiative.
The document discusses the role of consultant companies in the supply chain, noting that they typically work as specialists placed between the customer and other parts of the supply chain. It describes the characteristics and challenges of consultant businesses and provides an example of a consultant company. Finally, it discusses future demands on consultant companies and potential solutions around platforms, flexibility, and use of new technologies like robotics and RFID tags.
The document summarizes Nokia's vision of increased mobility across different domains including the enterprise domain. It discusses key aspects of the enterprise domain such as services, usage scenarios, management, and trends driving adoption of mobility. Extending mobility into the enterprise domain can provide more cost-effective communication solutions and improve productivity through increased accessibility of information and collaboration tools.
AnswerNet is a large telemessaging firm established in 1998 that has grown through acquisitions to become a full-service provider of inbound, outbound, and digital call center solutions. It employs over 2,000 people across its network of over 50 call centers in the US and Canada. The document provides background on AnswerNet's services, leadership, and ownership.
Demtech is a business development and sales company founded in 2000 that specializes in assisting companies expand into Southern Europe and Latin America markets. It offers outsourced business development, sales, and account management support. Demtech helps clients with activities from market analysis to setting up subsidiaries. It provides local sales support, leads qualification, and cultural awareness to facilitate clients' success abroad. Demtech also assists clients with exhibition support and ongoing CRM services to generate qualified sales leads and maximize their market penetration.
PRIL is an Indian retail solutions company that offers the Retail Excel product. Retail Excel is a complete end-to-end retail management solution for small and mid-sized retailers. It offers various modules like inventory, sales, procurement, accounting, and analytics to enable smooth store operations. Retail Excel provides flexibility in business rules, security, and the ability to manage global operations in multiple countries and currencies. It also allows for robust merchandise management functions.
In this presentation, we will discuss e-commerce on a B2B level in detail while focusing on planning on e-business model, determinants, basic principle for effective outcome, guidelines and much more toget a positive result.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Printing is Easy - Everything Else is Hard Dscoop7charlesgehman
The document discusses Digital Lizard's PrintTrak system, which was built to automate print workflows. It has three key workflow entry points: client print systems, hosted print stores, and custom print orders. PrintTrak is made up of three core components - PrintTrak Watcher, PrintTrak Shop, and PrintTrak Communicator - that together allow for automated communication between partners and customers. The document also provides an overview of Mimeo's print production facilities and timeline, as well as their technology stack and Print Factory system which aims to drive print production through web services and automation.
The document discusses electronic commerce systems and technologies. It provides an overview of topics like e-commerce models, internet protocols, security issues, and implications for accounting. Specifically, it summarizes key concepts such as the benefits of e-commerce, internet technologies like packet switching and virtual private networks, common protocols, security methods involving encryption and digital signatures, and risks associated with intranets and the internet.
The document outlines the objectives and key concepts covered in Chapter 14 of the textbook "Accounting Information Systems, 6th edition". The objectives include the in-house development phase of the SDLC, tools used such as CASE and PERT/Gantt charts, structured vs object-oriented design approaches, documentation types, and the commercial software option. It then covers the phases of SDLC in more detail including in-house development, commercial packages, and maintenance. Design approaches like structured and object-oriented are defined. Documentation, testing, training and post-implementation review are discussed as part of system delivery.
The document discusses the key stages in the Systems Development Life Cycle (SDLC), including systems strategy, project initiation, development, and maintenance. It describes the objectives of each stage, such as assessing business needs during systems strategy and conducting feasibility studies and cost-benefit analysis during project initiation. Accountants play an important role by ensuring economic feasibility analysis, accurate cost reporting, and that systems have appropriate controls.
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...Habib Ullah Qamar
Expenditure Cycle part II in which Payroll Processing system is discussed in three regards: Conceptual , Physical (manual and Computerized) and Fixed Asset Processing Systesm
The document outlines the objectives and key concepts of Chapter 9, which discusses problems with flat file data management, the database concept, data normalization, and database design. The main points are:
- Flat file systems have issues like redundant data, difficulty updating across files, and lack of task independence that led to the database concept.
- A database centralizes data in a single repository, eliminating redundancy and allowing single updates across applications.
- Relational databases model data in tables linked by primary and foreign keys, avoiding anomalies from unnormalized data.
- Proper database design involves entity identification, data modeling, constructing physical tables, and preparing user views through a six-phase process.
This document outlines objectives and procedures for manual and computerized payroll and fixed asset accounting systems. For payroll, it describes processing steps from timekeeping and payroll preparation to general ledger posting. Key controls are transaction authorization, segregation of duties, and independent verification. For fixed assets, it outlines the asset lifecycle from acquisition to disposal and depreciation calculation. Computerized systems automate many tasks but still require authorization and verification controls.
Chapter 1 - The Information System: An Accountant's Perspectiveermin08
This chapter discusses accounting information systems from an accountant's perspective. It defines key terms like transactions, accounting information systems, and management information systems. It describes the general model for information systems, including data sources, transforming data into information through collection, processing, management and generation. It also outlines the organizational structure of businesses and accounting's unique roles, including participating in systems design and performing external financial audits, internal audits, and fraud audits.
The document provides objectives and content for Chapter 4 of the textbook "Accounting Information Systems, 6th edition". It covers the revenue cycle, including key processes like sales orders, billing, cash receipts, and collections. It describes the flow of transactions, necessary documents and journals, risks and controls at each step. It also discusses how technology can automate or reengineer the revenue cycle through systems like real-time processing, EDI, point-of-sale, and the implications for internal controls.
The document discusses how the way people work is changing due to ubiquitous internet access and web 2.0 technologies which support collaborative and distributed working. Virtual organizations are commonly used to enable collaborative work across disciplines like government services, healthcare, and research. The document advocates involving staff in security discussions and agreeing on controls to ensure accountability from senior management down.
Replication for Business Continuity, Disaster Recovery and High AvailabilityTony Pearson
This document provides a 3-sentence summary of the replication document:
The document discusses business continuity through replication for disaster recovery and high availability. It explains that downtime can negatively impact businesses through loss of brand equity, goodwill, loyalty, revenue, and productivity. The document then outlines different replication strategies and technologies that can be used to minimize downtime and ensure business continuity through rapid recovery after an outage.
- Forrester predicts that enterprise and consumer technologies will become increasingly blurred as information workers use both personal and work technologies interchangeably
- An organization's information exists in both paper documents, electronic files, emails, as well as online resources like the internet, applications, R&D information, product info, etc.
- There is a need to integrate both structured transactional data from systems like ERP and CRM, as well as unstructured data from sources like product manuals, reports, and Excel files to provide relevant information to users depending on their context
TOMAS.MIS is a management information system that provides concise summaries of key business data in 3 sentences or less. It automatically captures data from operational applications and data warehouses, transforms it into customized reports for management, and distributes reports via a PC network. The system offers standard data cubes on finance, HR, production, inventory, sales, and procurement. It allows multidimensional analysis of data through features like rotating tables, drill down, sorting, graphical displays, decomposition trees, and ABC analysis to provide insights.
The document discusses the three stages of e-commerce:
1) Understanding the types of e-commerce solutions available, including fully automated, hybrid, and manual solutions.
2) The business-to-business e-commerce value chain, which involves both transactional and informational exchanges.
3) Details on fully automated e-commerce solutions, which allow for complete integration between trading partners' information systems.
eCommerce provides several benefits for businesses. It allows purchasing to become more efficient by automating transactional tasks, reducing inventory levels, and providing information to customers and suppliers quickly with no marginal costs. eCommerce also simplifies administration and creates opportunities for incremental revenues without additional costs. While it may reduce some purchasing head counts over time by automating low-value purchases, eCommerce really revolutionizes rather than eliminates the purchasing function by enabling strategic sourcing capabilities.
1) The document discusses big data analytics and introduces Greenplum, a massively parallel processing (MPP) database for big data analytics.
2) Greenplum allows for integrated analysis of structured and unstructured data at scale through its SQL database and Hadoop integration.
3) The architecture provides linear scalability, flexibility to handle various data types and schemas, and rich language support for analytics.
This document discusses big data and the challenges of integrating structured and unstructured data sources. It provides examples of big data use cases in various industries. It then introduces Greenplum as a platform for big data analytics that can handle high volumes, varieties and velocities of data using its massively parallel processing architecture. Greenplum allows for both SQL and MapReduce processing to enable real-time insights from large and diverse datasets.
This is a talk I delivered in April 2012 at the 33rd Degree conference in Krakow - its about building small simple applications and the unix philosophy
The document discusses how downturns can provide opportunities for necessary changes since the need for change is more clear and risks are lower. It cites a vendor who said "A downturn is a terrible thing to waste." The CEO of Home Depot is quoted as agreeing with this view.
The C-level executives are puzzled rightfully, why CDI projects are so complex, time consuming and too expensive when the subject matter is simply the "CUSTOMER" data. Achieving nirvana for a robust CDI solution is far fetched given the maturity level at present of CDI/MDM technologies. It is in this context that this paper makes an attempt to provide a direction with golden rules [Best Practices], distilled with years of experience to smoothen any CDI implementation.
Objectives:
1) Discuss the challenges associated with customer data management
2) Present the Best Practices in managing the customer data
3) Discuss the importance of Data Quality and Data Governance
For white paper which has more detailed information of this presentation, please send an email. Email address is listed in the last slide of this presentation.
E-commerce involves the buying and selling of products and services over the Internet. It provides several advantages such as cost savings, increased efficiency, and access to a global market. However, it also poses challenges such as lack of trust, lack of understanding between departments, and resistance to change. When evaluating hardware, software and services for e-commerce, factors like quality, cost, flexibility, security and documentation should be considered. Standards like ISO/IEC 9126 define key quality characteristics for software.
E-commerce involves the buying and selling of products and services over the Internet. It provides several advantages such as cost savings, increased efficiency, and access to a global market. However, it also poses challenges such as lack of trust, lack of understanding between departments, and resistance to change. When evaluating hardware, software and services for e-commerce, factors like quality, cost, flexibility, security and documentation should be considered. Standards like ISO/IEC 9126 define key quality characteristics for software.
This document provides an introduction to how businesses can use internet technology. It discusses how the internet can help businesses overcome geographic, time, cost, and structural barriers. It defines the differences between e-business and e-commerce, with e-business representing a comprehensive organizational shift and e-commerce focusing on transactions. The document also outlines strategic considerations for an e-business/e-commerce plan and how companies can utilize the internet in areas like marketing, sales, customer support, and interactions with suppliers.
The document summarizes the key topics presented in a lecture on e-commerce fundamentals and trends in the Philippines. It discusses definitions of e-commerce, types of e-commerce models, essential e-commerce processes, reasons for engaging in e-commerce, and components of developing an e-business plan including strategy, resources, and technology architecture. The presentation also covers converging technology and market trends driving changes in e-commerce and dimensions of managing organizational change.
The document discusses Sony's AtracTable technology and its potential applications. It describes AtracTable as a smart augmented reality tabletop device that can recognize users and operate without physical barcodes. Three potential applications are analyzed: advertising, retail shops using AtracTable instead of retail staff, and self-checkout systems. AtracTable is compared to competitors like Samsung SUR 40. The document also outlines Sony's strategy to protect its technology through patents and explores possibilities like expanding into consumer markets.
Disruptive Technologies to watch out for in Apparel Retail IndustryAmol Vidwans
This document discusses disruptive technologies that could impact the apparel business, including cloud computing, big data, and augmented video communication. It describes how these technologies could change business initiatives, models, and operations. Specifically, it may shift focus from costs to customer value, reduce lead times, and improve business intelligence. The future could see enterprise applications move to cloud-based models. Big data can provide customer insights. Augmented video could enhance remote collaboration and virtual product try-ons. Integrating new technologies into areas like e-tailing, retail stores, and security could help companies adapt.
Scaling MySQL: Benefits of Automatic Data DistributionScaleBase
In this webinar, we cover how ScaleBase provides transparent data distribution to its clients, overcoming caveats, hiding the complexity involved in data distribution, and making it transparent to the application.
Pertemuan membahas pengenalan struktur data dan paradigma rekayasa perangkat lunak. Topik utama meliputi pengenalan komputer, algoritma, struktur data, dan metode pengembangan perangkat lunak seperti daur hidup klasik, prototipe, dan model spiral."
1. Modul ini membahas pengenalan Adobe Photoshop CS3 dan komponen-komponennya seperti menu bar, tool box, dan pallete. Modul ini juga membahas tentang cara membuat dan memodifikasi lembar kerja/kanvas.
2. Modul ini juga membahas tentang layer dan duplikat layer yang berguna untuk mengedit gambar tanpa mengubah layer lain. Juga dibahas tentang channel dan path.
3. Modul menjelaskan berbagai macam koreksi warna sepert
Modul ini memberikan petunjuk penggunaan program Adobe Photoshop Cs3 untuk mahasiswa agar dapat mengerjakan berbagai desain seperti iklan. Modul ini diharapkan dapat memberikan manfaat dan dikembangkan lebih lanjut untuk menyusun karya seni menggunakan fitur Photoshop.
Dokumen tersebut membahas tentang mata kuliah Sistem Informasi Manajemen (SIM) Komputer. Mata kuliah ini membahas tentang pengertian SIM, peranan SIM dalam perusahaan, perancangan dan penerapan SIM berbasis komputer, serta daftar referensi buku yang relevan.
Interaksi manusia dengan komputer membahas prinsip dasar perancangan sistem interaksi yang mempertimbangkan kaidah interaksi dan komunikasi antara manusia dan komputer. Materi yang dibahas meliputi saluran input-output manusia, memori manusia, penalaran dan pemecahan masalah, serta desain interaksi dan gaya berinteraksi antara manusia dan komputer. Tujuannya agar mahasiswa dapat merancang sistem interaksi yang mendukung kemampuan
Makalah ini membahas tentang jaringan komputer dengan menjelaskan definisi jaringan komputer, manfaatnya untuk perusahaan, umum, dan masalah sosialnya, serta menjelaskan tiga jenis jaringan berdasarkan jaraknya yaitu LAN, MAN, dan WAN."
Dokumen tersebut membahas tentang Entity Relationship Diagram (ERD) yang merupakan model representasi data menggunakan entity dan hubungan antar entity. ERD digunakan untuk merancang basis data relasional dengan mendefinisikan entity, atribut, hubungan, dan constraint. Dokumen ini menjelaskan komponen-komponen ERD seperti entity, atribut, hubungan, cardinality ratio, dan transformasi ERD menjadi skema basis data relasional.
Dokumen tersebut membahas tentang jenis-jenis dan konsep sistem penunjang keputusan serta tingkat teknologi dan pihak-pihak yang berperan dalam pengembangannya. Kemudian diberikan contoh kasus rancangan global SPK untuk pemilihan komoditas dan produk unggulan nanas menggunakan metode perbandingan eksponensial dan matriks keputusan. Proyek selanjutnya adalah membuat rancangan SPK untuk masalah l
Teks tersebut membahas beberapa pendekatan pengembangan sistem aplikasi, yaitu pendekatan berorientasi proses, pendekatan berorientasi objek, dan pendekatan SADT. Pendekatan berorientasi proses berfokus pada proses sistem, pendekatan berorientasi objek berfokus pada data, sedangkan pendekatan SADT menggunakan diagram aktivitas dan data.
Dokumen ini membahas tentang sistem database, termasuk hierarki data, sumber data, diagram entity relationship (E-R), dan sistem manajemen basis data. Secara ringkas, dokumen ini menjelaskan struktur organisasi data dari tingkat terkecil hingga terbesar, komponen penting dalam sumber data seperti entitas dan atribut, jenis hubungan antar entitas dalam diagram E-R, serta model-model data yang umum digunakan dalam sistem basis data.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
2. Objectives for Chapter 12
Topologies that are employed to achieve connectivity across
the Internet
Protocols and understand the specific purposes served by
several Internet protocols
Business benefits associated with Internet commerce and be
aware of several Internet business models
Risks associated with intranet and Internet electronic
commerce
Issues of security, assurance, and trust pertaining to
electronic commerce
Electronic commerce implications for the accounting
profession
3. What is E‐Commerce?
The electronic processing and transmission of business
data
electronic buying and selling of goods and services
on-line delivery of digital products
electronic funds transfer (EFT)
electronic trading of stocks
direct consumer marketing
electronic data interchange (EDI)
the Internet revolution
4. Internet Technologies
Packet switching
messages are divided into small packets
each packet of the message takes a different routes
Virtual private network (VPN)
a private network within a public network
Extranets
a password controlled network for private users
World Wide Web
an Internet facility that links users locally and globally
Internet addresses
e-mail address
URL address
IP address
5. Protocol Functions…
facilitate the physical connection between the
network devices
synchronize the transfer of data between
physical devices
provide a basis for error checking and measuring
network performance
promote compatibility among network devices
promote network designs that are flexible,
expandable, and cost-effective
6. Internet Protocols
Transfer Control Protocol/Internet Protocol (TCP/IP) -
controls how individual packets of data are formatted,
transmitted, and received
Hypertext Transfer Protocol (HTTP) - controls web
browsers
File Transfer Protocol (FTP) - used to transfer files
across the internet
Simple Network Mail Protocol (SNMP) - e-mail
Secure Sockets Layer (SSL) and Secure Electronic
Transmission (SET) - encryption schemes
7. Open System Interface (OSI)
The International Standards
Organization developed a layered set
of protocols called OSI.
The purpose of OSI is to provide
standards by which the products of
different manufacturers can interface
with one another in a seamless
interconnection at the user level.
8. The OSI Protocol
NODE 1 NODE 2
Layer 7 Application Layer 7 Application
Data
Manipulation Layer 6 Presentation
Layer 6 Presentation
Tasks Layer 5 Session SOFT
Layer 5 Session SOFT
WARE WARE
Layer 4 Transport Layer 4 Transport
Data Layer 3 Network
Communications Layer 3 Network
Tasks Layer 2 Data Link HARD
Layer 2 Data Link HARD
HARD HARD
WARE WARE
WARE
WARE Layer 1 Physical
Layer 1 Physical
Communications Channel
9. Benefits of Internet‐Commerce
Access to a worldwide customer and/or supplier
base
Reductions in inventory investment and carrying
costs
Rapid creation of business partnerships to fill
emerging market niches
Reductions in retail prices through lower
marketing costs
Reductions in procurement costs
Better customer service
10. The Internet Business Model
Information level
using the Internet to display and make accessible
information about the company, its products, services,
and business policies
Transaction level
using the Internet to accept orders from customers
and/or to place them with their suppliers
Distribution level
using the Internet to sell and deliver digital products to
customers
11. Dynamic Virtual Organization
Business
Business
Consumers
Consumers
Customers
Customers
Perhaps the greatest
Information
Information
Customer
Customer
potential benefit to
Product
Product
Orders
Orders
be derived from
Marketing Organization e-commerce is the
firm’s ability to forge
dynamic business
alliances with other
Information
Information
Information
Inventory
Inventory
Inventory
Product
Product
Product
Orders
Orders
Orders
organizations to fill
Toy Music Book
unique market
Manufacturer Distributor Publisher
niches as the
opportunities arise.
Physical Physical Physical
Inventory Inventory Inventory
12. Areas of General Concern
Data Security: are stored and transmitted data
adequately protected?
Business Policies: are policies publicly stated
and consistently followed?
Privacy: how confidential are customer and
trading partner data?
Business Process Integrity: how accurately,
completely, and consistently does the company
processes its transactions?
13. Intranet Risks
Intercepting network messages
sniffing: interception of user IDs, passwords, confidential
e-mails, and financial data files
Accessing corporate databases
connections to central databases increase the risk that
data will be accessible by employees
Privileged employees
override privileges may allow unauthorized access to
mission-critical data
Reluctance to prosecute
fear of negative publicity leads to such reluctance but
encourages criminal behavior
14. Internet Risks to Consumers
How serious is the risk?
National Consumer League: Internet fraud rose by
600% between 1997 and 1998
SEC: e-mail complaints alleging fraud rose from 12
per day in 1997 to 200-300 per day in 1999
Major areas of concern:
Theft of credit card numbers
Theft of passwords
Consumer privacy--cookies
15. Internet Risks to Businesses
IP spoofing: masquerading to gain access to a
Web server and/or to perpetrate an unlawful act
without revealing one’s identity
Denial of service (DOS) attacks: assaulting a Web
server to prevent it from servicing users
particularly devastating to business entities that
cannot receive and process business transactions
Other malicious programs: viruses, worms, logic
bombs, and Trojan horses pose a threat to both
Internet and Intranet users
16. SYN Flood DOS Attack
Sender Receiver
Step 1: SYN messages
Step 2: SYN/ACK
Step 3: ACK packet code
In a DOS Attack, the sender sends hundreds of messages, receives the
SYN/ACK packet, but does not response with an ACK packet. This leaves the
receiver with clogged transmission ports, and legitimate messages cannot be
received.
17. Three Common Types of DOS Attacks
SYN Flood – when the three-way handshake needed
to establish an Internet connection occurs, the final
acknowledgement is not sent by the DOS attacker,
thereby tying-up the receiving server while it waits
Smurf – the DOS attacker uses numerous
intermediary computer to flood the target computer
with test messages, “pings”
Distributed DOS (DDOS) – can take the form of
Smurf or SYN attacks, but distinguished by the vast
number of “zombie” computers hi-jacked to launch
the attacks
18.
19.
20. E‐Commerce Security:
Data Encryption
Encryption - A computer program transforms a clear
message into a coded (ciphertext) form using an
algorithm.
Key
Cleartext Encryption Communication
Message Program Ciphertext System
Cleartext Encryption
Communication
Message Program
Ciphertext System
Key
21. Message A Message B Message C Message D
Multiple people
may have the public key Public Key is used for
(e.g., subordinates). encoding messages.
Ciphertext Ciphertext Ciphertext Ciphertext
Typically one person or Private Key is used for
a small number of people decoding messages.
have the private key (e.g.,
a supervisor).
Message A Message B Message C Message D
22. E‐Commerce Security:
Digital Authentication
Digital signature: electronic authentication
technique that ensures that the transmitted
message originated with the authorized sender
and that it was not tampered with after the
signature was applied
Digital certificate: like an electronic identification
card that is used in conjunction with a public key
encryption system to verify the authenticity of the
message sender
23. E‐Commerce Security: Firewalls
Firewalls: software and hardware that provide
security by channeling all network connections
through a control gateway
Network level firewalls
low cost/low security access control
uses a screening router to its destination
does not explicitly authenticate outside users
penetrate the system using an IP spoofing technique
Application level firewalls
high level/high cost customizable network security
allows routine services and e-mail to pass through
performs sophisticated functions such as logging or user
authentication for specific tasks
25. Implications for Accounting Profession
Privacy violation
major issues:
a stated privacy policy
consistent application of stated privacy policies
what information is the company capturing
sharing or selling of information
ability of individuals and businesses to verify and
update information on them
1995 Safe Harbor Agreement
establishes standards for information transmittal
between US and European companies
26. Implications for Accounting Profession
Audit implication for XBRL
taxonomy creation: incorrect taxonomy results in
invalid mapping that may cause material
misrepresentation of financial data
validation of instance documents: ensure that
appropriate taxonomy and tags have been
applied
audit scope and timeframe: impact on auditor
responsibility as a consequence of real-time
distribution of financial statements
27. Implications for Accounting Profession
Continuous auditing
auditors review transactions at frequent intervals
or as they occur
intelligent control agents: heuristics that search
electronic transactions for anomalies
Electronic audit trails
electronic transactions generated without human
intervention
no paper audit trail
28. Implications for Accounting Profession
Confidentiality of data
open system designs allow mission-critical
information to be at the risk to intruders
Authentication
in e-commerce systems, determining the identity
of the customer is not a simple task
Nonrepudiation
repudiation can lead to uncollected revenues or
legal action
use digital signatures and digital certificates
29. Implications for Accounting Profession
Data integrity
determine whether data has been intercepted and
altered
Access controls
prevent unauthorized access to data
Changing legal environment
provide client with estimate of legal exposure
30.
31. Local Area Networks (LAN)
A federation of computers located close together
(on the same floor or in the same building) linked
together to share data and hardware
The physical connection of workstations to the LAN
is achieved through a network interface card (NIC)
which fits into a PC’s expansion slot and contains
the circuitry necessary for inter-node
communications.
A server is used to store the network operating
system, application programs, and data to be
shared.
32. LAN Files
File Server
Node
Node
LAN
Node Printer Server
Node
Printer
33. Wide Are Network (WAN)
A WAN is a network that is dispersed
over a wider geographic area than a
LAN. It typically requires the use of:
gateways to connect different types of LANs
bridges to connect same-type LANs
WANs may use common carrier
facilities, such as telephone lines, or
they may use a Value Added Network
(VAN).
35. Star Topology
A network of IPUs with a large central
computer (the host)
The host computer has direct connections
to smaller computers, typically desktop or
laptop PCs.
This topology is popular for mainframe
computing.
All communications must go through the
host computer, except for local computing.
36. Star Network
Topeka St. Louis
Local Data Local Data
Kansas
City Central Data
POS
POS
Dallas
Tulsa
Local Data
POS
Local Data
POS
POS
37. Hierarchical Topology
A host computer is connected to several
levels of subordinate smaller computers in a
master-slave relationship.
Corporate Production
Level Planning System
Production
Regional Scheduling
Regional
Level System Sales System
Sales Sales Sales
Warehouse Warehouse Production Production Local Processing
Processing Processing
System System System System Level System
System System
38. Ring Topology
This configuration eliminates the central
site. All nodes in this configuration are of
equal status (peers).
Responsibility for managing
communications is distributed among the
nodes.
Common resources that are shared by all
nodes can be centralized and managed by
a file server that is also a node.
39. Ring Central
Topology Files
Server Local
Local
Files Files
Local Local
Files Files
Local
Files
40. Bus Topology
The nodes are all connected to a
common cable - the bus.
Communications and file transfers
between workstations are controlled by
a server.
It is generally less costly to install than a
ring topology.
41. Bus Topology
Print Server
Node Node
Local Files Local Files
Node
Local Files
Server
Central
Files
Node Node
Local Files Local Files
42. Client‐Server Topology
This configuration distributes the
processing between the user’s (client’s)
computer and the central file server.
Both types of computers are part of the
network, but each is assigned functions
that it best performs.
This approach reduces data
communications traffic, thus reducing
queues and increasing response time.
43. Client-Server Topology
Client Client
Data Manipulation Data Manipulation
Capabilities Capabilities Server
Record
Searching
Capabilities
Client
Data Manipulation
Capabilities
Common
Files
Client Client
Data Manipulation Data Manipulation
Capabilities Capabilities
44. Network Control Objectives
establish a communications session
between the sender and the receiver
manage the flow of data across the
network
detect errors in data caused by line failure
or signal degeneration
detect and resolve data collisions between
competing nodes
45. POLLING METHOD OF CONTROLLING DATA COLLISIONS
SLAVE Locked Locked SLAVE
MASTER
WAN
Polling Signal
Data Transmission SLAVE
SLAVE Locked
One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit.
If a slave responds in the affirmative, the master site locks the network while the data are
transmitted.
Allows priorities to be set for data communications across the network
46. Token Central Files
Ring
Server
Node
Local Files
Node
Local Files
Contains data
Empty token
Node
Local Files
47. Carrier Sensing
A random access technique that detects collisions when
they occur
This technique is widely used--found on Ethernets.
The node wishing to transmit listens to the line to
determine if in use. If it is, it waits a pre-specified time to
transmit.
Collisions occur when nodes listen, hear no transmissions,
and then simultaneously transmit. Data collides and the
nodes are instructed to hang up and try again.
Disadvantage: The line may not be used optimally when
multiple nodes are trying to transmit simultaneously.
48. What is Electronic Data
Interchange (EDI)?
The exchange of business transaction
information:
between companies
in a standard format (ANSI X.12 or EDIFACT)
via a computerized information system
In “pure” EDI systems, human
involvements is not necessary to approve
transactions.
49. Communications Links
Companies may have internal EDI
translation/communication software and
hardware.
OR
They may subscribe to VANs to perform
this function without having to invest in
personnel, software, and hardware.
50. EDI System
Company A Company B
Application Purchases Sales Order Application
Software System System Software
EDI EDI
Translation Translation
Software Software
Direct Connection
Communications Communications
Software Software
Other
Mailbox
Company VAN Company
A’s mailbox B’s mailbox
Other
Mailbox
51. Advantages of EDI
Reduction or elimination of data entry
Reduction of errors
Reduction of paper
Reduction of paper processing and
postage
Reduction of inventories (via JIT systems)