• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some

Extracts from this document...

Introduction

Introduction I will expand on what Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some of the benefits are lower costs, improved accuracy, and decreased paper output and processing time. One main downfall is the initial cost of the implementation of the system. I will also give you an example of how a company uses this technology. Electronic Data Interchange (EDI) as defined by Roger Clarke: "the exchange of documents in standardized electronic form, between organizations, in an automated manner, directly from a computer application in one organization to an application in another." EDI has been around for several decades and it has been the primary method of conducting electronic business-to-business commerce. It contains the same information that would be found on paper documents used for the same function within an organization. The following are elements of EDI: * Electronic transmission medium (VAN or the Internet) is used rather than the dispatch of physical storage media such as magnetic tapes and disks. ...read more.

Middle

Compatibility with new applications is difficult because of the complexity of the X12 formats. As a result of the compatibility the process of transferring large batches of data are delayed, which is at odds with today's real-time world. Also, the cost of transmitting data through VANs is very costly at $25 per 1,000 characters, but today costs are getting lower. Because conventional EDI is so rigid, costly and time consuming to initiate, it is only cost-effective for very large companies. For these reasons it keeps the number of EDI participants relatively very low. EDI via the Internet The internet was once thought to be the end of EDI, but instead it has given EDI users new options. EDI via the internet is basically the same as conventional EDI with the exception of how the information is transmitted. EDI transactions can now be sent over the internet instead of sending X12 forms back and forth via VANs. Software products put transactions into encrypted envelopes and then electronically seal them so that only authorized parties with the encryption key can view the contents. ...read more.

Conclusion

The full potential of an EDI system can be best utilized if it is integrated with other applications such as inventory control, shipping, accounts payable and production planning. Unfortunately, suppliers are forced to use the sometimes costly EDI system in order to continue a business relationship with the larger companies. This is not always as cost-effective for suppliers as it is for the larger companies. Summary EDI saves time because it is faster at transmitting data, delivers data with the utmost accuracy, cuts down on paper usage and decreases overall time by eliminating re-keying of information. It is a more stream-lined business process for both trading parties. Benefits can be obtained in areas like administration, inventory management, distribution, and cash management. EDI has its share of problems, but its benefits far exceed them. With the internet it is becoming easier for trading partners to transmit data at a much greater reduced cost to both parties. The next few years hold great promise for EDI and the internet. Existing EDI forms can be kept by trading partners and new ways of transmitting data can be found cheaper, which will enable more new partners. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    If not in stock she tells client its unavailable. Luki takes payment by cash then hands over item OR Luki gets sent cheque/cash and sends order off in post Luki then writes down what she has sold, how much it cost, who the person was who order it.

  2. Smart Card System

    Smart cards provide data portability, security and convenience. Smart card is very unique and it can be used as personal data storage, where all personal information can be store in the smart card. This technology allows company like banks to create ATM card to user which all information is store in the smart card.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    This is a diagram shown below: UPT UPT stands for Unshielded twisted pair. This cable is the most common kind of copper telephone wiring. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    This specification includes the key size of this algorithm, how much of that key is secret, whether it is a block or stream cipher, the block size of the cipher (if appropriate), and whether it is considered as an "export cipher".

  1. LAN & WAN Protocols

    A micro filter allows for this to happen. It allows the ADSL connections as well as the voice calls working simultaneously on the same line. It can be used for short distance communication of around 4 Km. The phone lines differ in the quality because they are originally made with DSL technology.

  2. Comparing Operating Systems

    The popularity of Windows has been more so in its marketing strategy in that it has not limited itself to geographical boundaries. As a result of its becoming popular and being the most commonly used operating system also had advantages in terms of support.

  1. importance of data security and data safety

    What is the difference between the Internet, Intranet and Extranet? (P8) Internet: Are public networks that allow the user to use any of its facilities. Intranet and Extranet: is like a private internet. It is like a website that is only accessible to the members of a business or company.

  2. Flexible Architectures in Communication Security Application

    but at the same time allows the intended recipient to retrieve the original information using a secret key. Cryptographic algorithms (or ciphers, as they are often called) are special programs designed to protect sensitive information on public communication networks. During encryption, ciphers transform the original plaintext message into unintelligible ciphertext.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work