wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic data interchange

profile
Ajay Vaxmani
Aug 29, 2022
0 Likes
0 Discussions
133 Reads

 Topic: Electronic Data Interc Electronic Data Interchange

Explain electronic data interchange. Electronic Data Interchange (EDI) is the process which involves electronic exchange of business data and their information with the help of regular format. It is a process that enables one company to share data and information to another company by using electronic features rather than with help of pen and paper. Occupational entities leading business by electronic means are called trading  partners.

Electronic data interchange is process which involves electronic communication technique which provides ideas for exchanging data through any electronic component or any electronic device.. EDI offers a practical basis for automatic commercial "conversations" among two

objects.

The word EDI includes the complete electronic data exchange process, including the communication, also the message flow, formatted document, and software used to understand the documents.

Buyer generates purchase order

Faxes of mails

1. Faster Informorgani efficien

2. Autom Data automs softwar purchas received automat

 

3. Receipt Verificati human in mistake a

4. Data Va

Validat

5. Availab

Softwar

1. Expens the form

2. Initial to setup Supplier entera order into internal ayatoms and print an invoice  3. EDI stcomplem


Comments ()


Sign in

Read Next

EVOLUTION OF MICROPROCESSOR

Blog banner

OS- Assignnment 1

Blog banner

Deadlock

Blog banner

I/O Buffering

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Disk Management

Blog banner

Evolution of Operating System

Blog banner

computer security

Blog banner

VIRTUAL MACHINES

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Memory management

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Europe Through My Lens

Blog banner

The Features of Blockchain

Blog banner

Mental Health

Blog banner

The Evolution of Operating Systems

Blog banner

Deadlock and Starvation

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Short note on expert system

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

VPN

Blog banner

Starvation

Blog banner

Evolution of Operating Sytems

Blog banner

Capacity management in ITSM

Blog banner

Network Security Risks

Blog banner

Travel: Everything Everywhere!

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

IT GOVERNANCE

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Deadlocks

Blog banner

Memory hierarchy

Blog banner

Google classroom

Blog banner

american greatines

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

De-Coding Love

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner