• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some

Extracts from this document...

Introduction

Introduction I will expand on what Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some of the benefits are lower costs, improved accuracy, and decreased paper output and processing time. One main downfall is the initial cost of the implementation of the system. I will also give you an example of how a company uses this technology. Electronic Data Interchange (EDI) as defined by Roger Clarke: "the exchange of documents in standardized electronic form, between organizations, in an automated manner, directly from a computer application in one organization to an application in another." EDI has been around for several decades and it has been the primary method of conducting electronic business-to-business commerce. It contains the same information that would be found on paper documents used for the same function within an organization. The following are elements of EDI: * Electronic transmission medium (VAN or the Internet) is used rather than the dispatch of physical storage media such as magnetic tapes and disks. ...read more.

Middle

Compatibility with new applications is difficult because of the complexity of the X12 formats. As a result of the compatibility the process of transferring large batches of data are delayed, which is at odds with today's real-time world. Also, the cost of transmitting data through VANs is very costly at $25 per 1,000 characters, but today costs are getting lower. Because conventional EDI is so rigid, costly and time consuming to initiate, it is only cost-effective for very large companies. For these reasons it keeps the number of EDI participants relatively very low. EDI via the Internet The internet was once thought to be the end of EDI, but instead it has given EDI users new options. EDI via the internet is basically the same as conventional EDI with the exception of how the information is transmitted. EDI transactions can now be sent over the internet instead of sending X12 forms back and forth via VANs. Software products put transactions into encrypted envelopes and then electronically seal them so that only authorized parties with the encryption key can view the contents. ...read more.

Conclusion

The full potential of an EDI system can be best utilized if it is integrated with other applications such as inventory control, shipping, accounts payable and production planning. Unfortunately, suppliers are forced to use the sometimes costly EDI system in order to continue a business relationship with the larger companies. This is not always as cost-effective for suppliers as it is for the larger companies. Summary EDI saves time because it is faster at transmitting data, delivers data with the utmost accuracy, cuts down on paper usage and decreases overall time by eliminating re-keying of information. It is a more stream-lined business process for both trading parties. Benefits can be obtained in areas like administration, inventory management, distribution, and cash management. EDI has its share of problems, but its benefits far exceed them. With the internet it is becoming easier for trading partners to transmit data at a much greater reduced cost to both parties. The next few years hold great promise for EDI and the internet. Existing EDI forms can be kept by trading partners and new ways of transmitting data can be found cheaper, which will enable more new partners. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    If not in stock she tells client its unavailable. Luki takes payment by cash then hands over item OR Luki gets sent cheque/cash and sends order off in post Luki then writes down what she has sold, how much it cost, who the person was who order it.

  2. LAN & WAN Protocols

    It works with to lower layer of the OSI model. The data link layer and the physical layer. It further splits the data link layer into Logical Link Control and Media Access Control. IEEE 802.11 This is the standard which handles Wi-Fi connections.

  1. Comparing Operating Systems

    But like its popularity it had other people who liked to know more of the Operating system and who wanted to know more about how it works in the background. This led to a new breed of programmers who liked to tear things apart and learn about the mechanism of the system.

  2. Smart Card System

    4. When an end node receives the Incoming control signal, it prepares to receive a packet by stopping the transmission of requests and listening on the media for the data packet. 5. Once the repeater has decoded the destination address, the packet is delivered to the addressed end node or end nodes and to any promiscuous nodes.

  1. importance of data security and data safety

    * What is a browser? Is programme that can read web pages, by downloading HTML code and that allows the browser to interpret the code to the web page. A browser displays web pages, keeps track of where you've been, and remembers the places you want to return to, the most used browsers are Internet Explorer and Netscape Navigator.

  2. Flexible Architectures in Communication Security Application

    key private key private key Lisa Wu Page 10 4/22/01 Public-key ciphers have the advantage of being able to establish a secure communication channel without an unsafe exchange of keys. Private-key ciphers, on the other hand, require a shared private key before secure communication can commence.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    apartment on a per week basis including the pricing on each specific week, whether it is vacant or not and to record customer information and contact details. The system also produces a series of paper based documents and emails for the end user.

  2. Bytecode Engineering

    It also works for modifying existing classes -- to handle that case, there's a constructor that takes a JavaClass instance and uses it to initialize the ClassGen class information. Once you're done with your class modifications, you can get a usable class representation from the ClassGen instance by calling a

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work