wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic data interchange

profile
Ajay Vaxmani
Aug 29, 2022
0 Likes
0 Discussions
133 Reads

 Topic: Electronic Data Interc Electronic Data Interchange

Explain electronic data interchange. Electronic Data Interchange (EDI) is the process which involves electronic exchange of business data and their information with the help of regular format. It is a process that enables one company to share data and information to another company by using electronic features rather than with help of pen and paper. Occupational entities leading business by electronic means are called trading  partners.

Electronic data interchange is process which involves electronic communication technique which provides ideas for exchanging data through any electronic component or any electronic device.. EDI offers a practical basis for automatic commercial "conversations" among two

objects.

The word EDI includes the complete electronic data exchange process, including the communication, also the message flow, formatted document, and software used to understand the documents.

Buyer generates purchase order

Faxes of mails

1. Faster Informorgani efficien

2. Autom Data automs softwar purchas received automat

 

3. Receipt Verificati human in mistake a

4. Data Va

Validat

5. Availab

Softwar

1. Expens the form

2. Initial to setup Supplier entera order into internal ayatoms and print an invoice  3. EDI stcomplem


Comments ()


Sign in

Read Next

NETWORK SECURITY RISKS

Blog banner

Bharat Maps

Blog banner

Uber

Blog banner

I/O Buffering

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

RAID_142

Blog banner

Elements and Principles of Photography

Blog banner

Clarizen

Blog banner

MY FIRST BLOG?

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Cache Memory

Blog banner

Advantage of freedom

Blog banner

On-Page SEO

Blog banner

Virtual Machine's

Blog banner

Buffering

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Deadlock and starvation

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

The Evolution of Operating Systems

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Health and fitness

Blog banner

"Audit" In Data Science

Blog banner

The Role of cryptography in cyber security

Blog banner

Memory management

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Process, process creation and process termination

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

semaphores

Blog banner

Memory Management

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Social Media.

Blog banner

Modern operating system

Blog banner

Network Footprinting in Cybersecurity

Blog banner

What is a geographic information system (GIS)?

Blog banner

Social Media Sentiment Analysis

Blog banner

Man In The Middle Attack

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

"Mahakali cave"

Blog banner

Evolution of operating system

Blog banner

MODERN OPERATING SYSTEM

Blog banner