wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic data interchange

profile
Ajay Vaxmani
Aug 29, 2022
0 Likes
0 Discussions
133 Reads

 Topic: Electronic Data Interc Electronic Data Interchange

Explain electronic data interchange. Electronic Data Interchange (EDI) is the process which involves electronic exchange of business data and their information with the help of regular format. It is a process that enables one company to share data and information to another company by using electronic features rather than with help of pen and paper. Occupational entities leading business by electronic means are called trading  partners.

Electronic data interchange is process which involves electronic communication technique which provides ideas for exchanging data through any electronic component or any electronic device.. EDI offers a practical basis for automatic commercial "conversations" among two

objects.

The word EDI includes the complete electronic data exchange process, including the communication, also the message flow, formatted document, and software used to understand the documents.

Buyer generates purchase order

Faxes of mails

1. Faster Informorgani efficien

2. Autom Data automs softwar purchas received automat

 

3. Receipt Verificati human in mistake a

4. Data Va

Validat

5. Availab

Softwar

1. Expens the form

2. Initial to setup Supplier entera order into internal ayatoms and print an invoice  3. EDI stcomplem


Comments ()


Sign in

Read Next

File management

Blog banner

Health and fitness in technology

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Direct memory access (DMA)

Blog banner

Marvel Cinematic Universe

Blog banner

Online Education

Blog banner

What is E-commerce

Blog banner

"Audit" In Data Science

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Hubspot

Blog banner

Fault Tolerance

Blog banner

Race Condition

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

OS Assignment 3

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Full Disk Encryption

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

Never give up

Blog banner

Embedded Operating System

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Depression

Blog banner

DIGITAL TECHNOLOGY

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Data Exfiltration

Blog banner

Session Vulnerabilities

Blog banner

Evolution of operating systems

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

This is my first blog.

Blog banner

Remote Work in 2026

Blog banner

Process in OS

Blog banner

Electronic Funds Transfer

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

LiquidPlanner

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

AI and Cyber Security

Blog banner

Concurrency:Deadlock and Starvation

Blog banner